Vertical Industries  >   Transportation Industry  >  

Air Traffic Control

RSS Feed    Add to Google    Add to My Yahoo!
Air Traffic Control White Papers (View All Report Types)
 
Airline IT Trends Survey
sponsored by ComputerWeekly.com
WHITE PAPER: For the 11th year in succession, the Airline IT Trends Survey tracks the key technology trends in the airline industry. It demonstrates the role that the survey’s global benchmarks play in underlining the importance of IT within the airline industry, while also stimulating debate in boardrooms worldwide about the way ahead.
Posted: 24 Oct 2011 | Published: 24 Jun 2010

ComputerWeekly.com

Streamlining Information Management for Airlines
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper today to learn how HP Information Workflow Solutions can reduce the time, cost, and hassle of capturing, managing, distributing, and securing documents while improving collaborative communications for airlines.
Posted: 26 Feb 2015 | Published: 30 Jun 2014

Hewlett-Packard Limited

Cutting Through the Complexity of Multi-Protocol Label Switching (MPLS) Performance
sponsored by NetScout Systems, Inc.
WHITE PAPER: This paper outlines the best practices for collecting network and application performance information over MPLS enabled wide area networks by using the nGenius Solution's Site Monitoring feature to monitor traffic flows destined for remote sites.
Posted: 16 Jan 2006 | Published: 01 Jan 2005

NetScout Systems, Inc.

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Six Tips for Reducing Downtime in Travel and Transport
sponsored by Marathon Technologies
WHITE PAPER: Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

Marathon Technologies

Create Flexible Process Automation in the Trade Management Sector
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Access this brief paper to discover how you can now get Oracle Transportation and Global Trade Management in the cloud, minimizing cost, optimizing service levels and creating flexible business process automation within global transportation and logistics networks.
Posted: 08 Dec 2014 | Published: 31 Aug 2014

Oracle Corporation UK Ltd

Air Transport Industry Insights 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from SITA looks at the impact of business intelligence on airlines and airports.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

Airport IT Trends Survey
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Airports are spending a larger slice of their revenues on technology as they look to improve the passenger experience, this major study  from SITA reveals.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Helping United Soar to New Heights
sponsored by Hewlett-Packard Company
WEBCAST: View this short webcast to see how United Airlines benefited from a flexible data center solution that ensured constant availability, as well as the scalability to meet their ever-changing environment needs.
Posted: 02 Jan 2014 | Premiered: Jan 2, 2014

Hewlett-Packard Company

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

The Basics of Configuring and Using Cisco Access Control Lists
sponsored by Global Knowledge
WHITE PAPER: This resource discusses how to design, configure, and troubleshoot Cisco Access Control Lists (ACLs), which is a requirement for all network engineers working within a Cisco network.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Global Knowledge

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Rethink Defense-In-Depth Security Model For BYOD
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchSecurity.com

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

IT in Europe - May 2012
sponsored by SearchSecurity.com
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

SearchSecurity.com

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

The New Network: Software-Defined Networking Gets Real
sponsored by SearchSecurity.com
EZINE: Take a look at what lies behind the software-defined data center network to uncover if data center convergence will truly become a reality and if we will finally achieve the total orchestration and automation in a virtualized environment we've been waiting for.
Posted: 14 Feb 2013 | Published: 14 Feb 2013

SearchSecurity.com

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement