Vertical Industries  >  

Defense Parts Industry

RSS Feed    Add to Google    Add to My Yahoo!
Defense Parts Industry White Papers (View All Report Types)
 
Automating Job Card Generation for Maintenance, Repair and Overhaul
sponsored by Enigma, Inc.
WHITE PAPER: Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.
Posted: 11 Mar 2008 | Published: 01 Oct 2007

Enigma, Inc.

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software

Top 3 Strategies to Reduce Risk in Automotive / In-Vehicle Software Development
sponsored by Rogue Wave Software
WHITE PAPER: This white paper explores 3 of the biggest challenges exacerbated by today's complexity and connectivity trends that face automotive software teams. Learn how embedded development systems can help improve code quality, safety, and compliance throughout the development cycle.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Rogue Wave Software

Boosting the satisfaction of premium car customers
sponsored by IBM
WHITE PAPER: This white paper describes an example of a big data analytics tool that can keep track of your enterprise's data and help you assess customer satisfaction.
Posted: 26 Feb 2015 | Published: 31 Dec 2013

IBM

The Internet of Things Runs on Linux
sponsored by IBM
WHITE PAPER: Access this infographic to learn about the Linux-based technologies that surround us as part of the Internet of Things, including our cars, our phones, and the cloud.
Posted: 08 May 2015 | Published: 07 May 2015

IBM

How to deliver more secure automotive software
sponsored by Rogue Wave Software
RESOURCE: In October 2014, Toyota recalled 2.1 million vehicles globally because of a software problem that could cause cars to stop suddenly. Check out this concise infographic that addresses ways to ensure that the code that automotive software developers are building is safe, secure, and reliable.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Rogue Wave Software

How to Choose the Right Compute Best Fit For Your Business
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: This white paper highlights 6 steps to take towards the software-defined enterprise where general compute resources can be configured and scaled for any workload.
Posted: 16 Apr 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Operational Intelligence Adds to Business Smarts
sponsored by SearchBusinessAnalytics
EBOOK: In this 3-part guide, SearchBusinessAnalytics explores organizations' operational intelligence initiatives and their impact on business processes in customer service, logistics, energy, and manufacturing.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

SearchBusinessAnalytics

ISG Outsourcing Index (EMEA)
sponsored by ComputerWeekly.com
IT BRIEFING: The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CW Special report on Capgemini
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Forrester Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
sponsored by Absolute Software
WHITE PAPER: The following white paper discusses the current state of endpoint data loss in healthcare organizations using the current breach data to highlight the need for a data-centric approach to endpoint security on all employee devices. In addition, this paper intends to illustrate an approach that can lead to fewer compliance violations and reduced risk.
Posted: 21 Oct 2014 | Published: 04 Sep 2014

Absolute Software

The Art of Medicine in a Digital World
sponsored by Nuance
WHITE PAPER: This exclusive resource displays thoughts and desires from physicians about how technology can help and hurt them in the process of providing care to patients. Right now, electronic health records (EHRs) are optimal for collecting data, not improving care. Learn what next steps must be taken to improve this for the future.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Nuance

Quick Guide to HIPAA Contingency Plan Compliance with Recovery-as-a-Service
sponsored by Bluelock
WHITE PAPER: View this informative white paper that explains how recovery-as-a-service (RaaS) can help ensure vital data and systems persist indefinitely, and can be rapidly recovered and brought back to a production state.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Bluelock

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement