Vertical Industries  >  

Weapons Industry

RSS Feed    Add to Google    Add to My Yahoo!
Weapons Industry White Papers (View All Report Types)
 
Automating Job Card Generation for Maintenance, Repair and Overhaul
sponsored by Enigma, Inc.
WHITE PAPER: Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.
Posted: 11 Mar 2008 | Published: 01 Oct 2007

Enigma, Inc.

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Case Study: Nissan Optimizes Distribution with Business Rules Management
sponsored by Red Hat
CASE STUDY: After opening a new production plant, Nissan needed to align their processes more closely with customers' buying trends. This case study reveals the business rules management strategy that empowered Nissan to quickly and flexibly process production plans.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

Red Hat

Optimising your OmniPayments: Consumers, payments and the future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

ComputerWeekly.com

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

How HPE Vertica is Helping to Win With Big Data in Financial Services Institutions
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Banks and financial services companies are challenged to simply manage core processes and operational flows. In this white paper you will discover how financial services institutions are able to meet these challenges by using big data analytics platforms that deliver real time insights.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Hewlett-Packard Enterprise

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: Get an in‐depth examination of the modern threat landscape — including malware, exploits, and vulnerabilities — as this ultra-popular "Dummies" guide reveals the shortcomings of traditional endpoint protection solutions.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc. and Intel®

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Cybersecurity Buyers Guide
sponsored by Palo Alto Networks
WHITE PAPER: This white paper shows you how to keep up with the hackers and defend against all advanced threats. Read more to learn how to architect a cyber security solution that dynamically adapts to changing threats.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Digital Guardian for Data Protection and Export Control Compliance
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn about context-aware protection and its capability to address a wide range of real-world cases for export controlled products and services.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

State of the Global Supply Chain: A Research Report on the Top Issues Facing Industry Executives for 2016 and Beyond
sponsored by GT Nexus
WHITE PAPER: In a recent study, a leading supply chain vendor sought to discover the top supply chain issues facing manufacturers for 2016 and beyond. Download the full report now to get the results of the study.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

GT Nexus

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Data-Driven Sales: Using Reports & Dashboards to Give Yourself an Edge
sponsored by Salesforce.com
EBOOK: This e-book examines how the right reports, dashboards, and sales forecasting tools can dramatically improve your sales performance and help you to fully embrace the big data revolution.
Posted: 29 May 2015 | Published: 29 May 2015

Salesforce.com

IT in Europe: Security in the Cloud
sponsored by SearchSecurity.com
EZINE: Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

SearchSecurity.com

How to Deal With a Perfect Storm of Disruption in the Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper features expert advice about what companies in the managed services industry should do to prepare for transformational change in IT.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

MicroScope E-Zine April 2015
sponsored by MicroScope
EZINE: In this issue, we look at how employers can check staff criminal records and get industry views on the progress of the partnership between IBM and Apple.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

MicroScope

Terrorist use of the internet
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Goodbye LUN Technology, You Served Us Well
sponsored by Tintri
EGUIDE: In a virtual server world, the concept of LUN technology and the amount of attention LUNs require from storage admins is soon becoming a thing of the past. This e-guide details how the introduction of server virtualization impacted LUN technology and discover how the storage industry responded.
Posted: 03 Feb 2016 | Published: 01 Feb 2016

Tintri

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement