Vertical Industries  >  

Weapons Industry

RSS Feed    Add to Google    Add to My Yahoo!
Weapons IndustryWhite Papers (View All Report Types)
 
Automating Industrial Supply Chains
sponsored by Intermec
WHITE PAPER: Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Automating Job Card Generation for Maintenance, Repair and Overhaul
sponsored by Enigma, Inc.
WHITE PAPER: Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.
Posted: 11 Mar 2008 | Published: 01 Oct 2007

Enigma, Inc.

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Weaponized Malware - A Clear and Present Danger
sponsored by Lumension
WHITE PAPER: Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?
Posted: 30 Jan 2013 | Published: 30 Sep 2012

Lumension

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Healthcare Fraud Management: Solutions for Identification and Intervention
sponsored by Verizon
WHITE PAPER: This white paper features a healthcare fraud management solution that leverages predictive analytics to identify potentially fraudulent claims and prevent improper payment before they occur.
Posted: 18 Mar 2014 | Published: 30 Nov 2011

Verizon

Optimising your OmniPayments: Consumers, payments and the future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

ComputerWeekly.com

Critical Factors to Endpoint Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc.

Stuxnet 0.5: The Missing Link
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Symantec Corporation

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

FireEye

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by ComputerWeekly.com
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

Accenture Technology Vision 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

ComputerWeekly.com

Top 10 Predictions for 2013
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Group, Nucleus Research gives its view of the IT trends and technologies that will shape 2013.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

How to Deal With a Perfect Storm of Disruption in the Managed Services Business
sponsored by N-able Technologies
WHITE PAPER: This guide explores some practical strategies for adapting your services to the rapid IT changes your customers are facing and how you can continue to provider top-notch services.
Posted: 28 Feb 2014 | Published: 31 May 2013

N-able Technologies

Neustar® SiteProtect: Intelligent DDoS Protection
sponsored by Neustar®
WHITE PAPER: This exclusive resource examines a DDoS security solution that stops attacks quickly, mitigates risks to revenue and customer experience all while eliminating the need for in-house resources.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Neustar®

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Poison Ivy: Assessing Damage and Extracting Intelligence
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Preparing for the Next Generation of Data Integration
sponsored by Informatica
WHITE PAPER: This white paper explains why rapid data integration is vital to competitive advantage, examines why data integration projects are so time consuming, and suggests an approach that streamlines projects to make them as much as five times faster.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Informatica

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Get Back to Basics for Improved Network Security
sponsored by Lumeta Corporation
EGUIDE: This expert guide from SearchSecurity.com examines why it is that so few organizations know about SNMP, discussing how to forget the bells and whistles of network security and revisit the best practices that can ensure the safest environment.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Lumeta Corporation

Enabling the Business with Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: Social media is quickly becoming a key part of enterprise business strategy. According to an IDG Research survey, 73% of respondents expect it to be critical or very important in the coming years. So how can CIOs prepare for and encourage the adoption of social media in the enterprise in a secure, compliant way?
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Hootsuite

Supercomputers: A Computer Weekly guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special Computer Weekly report analyses the market for supercomputers, peripherals and applications, the supercomputer community, developments in technology, and offers a country by country comparison.
Posted: 17 May 2012 | Published: 17 May 2012

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement