Vertical Industries  >  

Defense Industry

RSS Feed    Add to Google    Add to My Yahoo!
Defense Industry White Papers (View All Report Types)
 
Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Automating Job Card Generation for Maintenance, Repair and Overhaul
sponsored by Enigma, Inc.
WHITE PAPER: Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.
Posted: 11 Mar 2008 | Published: 01 Oct 2007

Enigma, Inc.

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

EMM Vendor Analysis: Market Leaders, Challengers and Followers
sponsored by IBM
ANALYST REPORT: This analyst report breaks down the EMM market options by identifying the leading vendors based their strengths and challenges.
Posted: 17 Jul 2015 | Published: 17 Sep 2014

IBM

ISG Outsourcing Index (EMEA)
sponsored by ComputerWeekly.com
IT BRIEFING: The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

A Smarter Way to Create the Longitudinal Patient Record
sponsored by Hitachi Data Systems
WHITE PAPER: Access this strategy profile to discover the benefits and capabilities of a new paradigm in sharing, managing and connecting all clinical data anytime, anywhere.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

Hitachi Data Systems

Best Practices for Communication and Engagement in Healthcare
sponsored by 8x8, Inc.
EGUIDE: In this expert e-guide, discover how healthcare providers are overcoming the security risks imposed by today's electronic methods of communication – specifically telemedicine – in order to safeguard physician-patient communication.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

8x8, Inc.

A Smart Way to Put Clinical Information at your Fingertips
sponsored by Hitachi Data Systems
WHITE PAPER: Discover the foundation of an effective clinical repository strategy when you access this white paper. Read on and learn how to share, manage and connect data across the healthcare enterprise.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

Hitachi Data Systems

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Intelligently Connect the Healthcare Enterprise With The Right Platform
sponsored by Hitachi Data Systems
WHITE PAPER: This white paper considers one data system that promises to integrate your healthcare data, revealing key connections across your organization. A complementary platform to electronic medical records, this product empowers insightful enterprise-wide analytics.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Hitachi Data Systems

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

E-Zine: Enterprise CIO Decisions: Running Lean in 2010
sponsored by SearchCIO.com
EZINE: Technology decision makers in the enterprise are under pressure to deliver results on tight budgets while streamlining efficiency, cutting costs, and reducing risk for their organizations. Read this E-Zine from Enterprise CIO Decisions to find out how ITSM, outsourcing and technology are combining to make IT a lean, mean fighting machine in 2010.
Posted: 30 Mar 2010 | Published: 26 Mar 2010

SearchCIO.com

Transforming Data Center Security for Business Mobility with Smart Networking
sponsored by VMware
WHITE PAPER: In this white paper, you will learn about an IT solution that solves this challenge of securing proprietary applications and data in the cloud data center. Learn what these cloud security approaches can offer over traditional security methods.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

VMware

Storage Magazine: March
sponsored by SearchStorage.com
EZINE: This issue of Storage Magazine breaks down the DR planning process and offers tips to help organizations increase their ability to tolerate disruptive events. It also covers the key findings from a recent report on storage arrays and rounds up the newest players in the PCIe solid state landscape.
Posted: 04 Mar 2013 | Published: 01 Mar 2013

SearchStorage.com

The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: This white paper outlines the 5 steps to implementing and maintaining PCI DSS compliace in your organization.
Posted: 27 Oct 2015 | Published: 07 Oct 2015

AlienVault

Modelling the Insurance Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

State-sponsored Hacking troubles US Government
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow

Protect Against Evolving DDoS Threats: The Case for Hybrid
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will discover how you can achieve assurance and protect your organization now and into the future. Learn how to choose a solution that will help you defend and block attacks as well as be fully embraced by your operations team.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement