Vertical Industries  >   Transportation Industry  >  

Air Traffic Control

RSS Feed    Add to Google    Add to My Yahoo!
Air Traffic Control White Papers (View All Report Types)
 
Streamlining Information Management for Airlines
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper today to learn how HP Information Workflow Solutions can reduce the time, cost, and hassle of capturing, managing, distributing, and securing documents while improving collaborative communications for airlines.
Posted: 26 Feb 2015 | Published: 30 Jun 2014

Hewlett-Packard Limited

The Travel Industry’s Journey to Customer Satisfaction
sponsored by Mashery
WHITE PAPER: This resource explores how good API management can enhance the customer experience across the travel industry, creating a seamless experience for customers while allowing companies to maintain control over their data.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

Mashery

Airline IT Trends Survey
sponsored by ComputerWeekly.com
WHITE PAPER: For the 11th year in succession, the Airline IT Trends Survey tracks the key technology trends in the airline industry. It demonstrates the role that the survey’s global benchmarks play in underlining the importance of IT within the airline industry, while also stimulating debate in boardrooms worldwide about the way ahead.
Posted: 24 Oct 2011 | Published: 24 Jun 2010

ComputerWeekly.com

Cutting Through the Complexity of Multi-Protocol Label Switching (MPLS) Performance
sponsored by NetScout Systems, Inc.
WHITE PAPER: This paper outlines the best practices for collecting network and application performance information over MPLS enabled wide area networks by using the nGenius Solution's Site Monitoring feature to monitor traffic flows destined for remote sites.
Posted: 16 Jan 2006 | Published: 01 Jan 2005

NetScout Systems, Inc.

Create Flexible Process Automation in the Trade Management Sector
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Access this brief paper to discover how you can now get Oracle Transportation and Global Trade Management in the cloud, minimizing cost, optimizing service levels and creating flexible business process automation within global transportation and logistics networks.
Posted: 08 Dec 2014 | Published: 31 Aug 2014

Oracle Corporation UK Ltd

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

ATL SuperLoader™
sponsored by Quantum Corporation
WHITE PAPER: This paper shows how SuperLoader directly addresses the increased storage requirements and shrinking resources of smaller, distributed organizations, the need to centrally administer and simply manage distributed data, the security, data restoration.
Posted: 29 Jul 2004 | Published: 01 Nov 2002

Quantum Corporation

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Air Transport Industry Insights 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from SITA looks at the impact of business intelligence on airlines and airports.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

Airport IT Trends Survey
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Airports are spending a larger slice of their revenues on technology as they look to improve the passenger experience, this major study  from SITA reveals.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Helping United Soar to New Heights
sponsored by Hewlett-Packard Company
WEBCAST: View this short webcast to see how United Airlines benefited from a flexible data center solution that ensured constant availability, as well as the scalability to meet their ever-changing environment needs.
Posted: 02 Jan 2014 | Premiered: Jan 2, 2014

Hewlett-Packard Company

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

Rethink Defense-In-Depth Security Model For BYOD
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchSecurity.com

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

IT in Europe - May 2012
sponsored by SearchSecurity.com
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

SearchSecurity.com

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

The Essential Guide to Privileged Activity Monitoring
sponsored by BalaBit
WHITE PAPER: In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

BalaBit

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

The New Network: Software-Defined Networking Gets Real
sponsored by SearchSecurity.com
EZINE: Take a look at what lies behind the software-defined data center network to uncover if data center convergence will truly become a reality and if we will finally achieve the total orchestration and automation in a virtualized environment we've been waiting for.
Posted: 14 Feb 2013 | Published: 14 Feb 2013

SearchSecurity.com

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement