Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER:
This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008
|
|
|
Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER:
Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010
|
|
|
Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER:
A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009
|
|
|
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER:
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
Is GMO Product Information on Your Radar?
sponsored by LANSA
WHITE PAPER:
This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.
Posted: 19 Feb 2014 | Published: 19 Feb 2014
|
|
|
Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER:
Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005
|
|
|
Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
sponsored by XtelligentMedia Healthcare
EGUIDE:
With cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
Wind River in Aerospace and Defense
sponsored by Wind River
CASE STUDY:
For over 40 years, Wind River has helped build safe, secure computing systems for aerospace and defense. Meet safety certification needs and accelerate innovation with Wind River’s cloud platform. Read this resource to learn how Wind River enables the intelligent edge.
Posted: 02 Dec 2023 | Published: 02 Dec 2023
|
|
|
Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER:
Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020
|
|
|
The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO:
Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013
|
|
|
E-Guide: Is Your Storage Infrastructure Ready for the Cloud?
sponsored by AdvizeX Technologies
WHITE PAPER:
To be properly prepared for the coming clouds, you'll have to make the right preparations. Check out this brief e-guide to learn what some of the hot new products are in the storage market, and to see what should be on your radar as you transform your infrastructure in anticipation for the cloud.
Posted: 20 May 2011 | Published: 20 May 2011
|
|
|
Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER:
Endpoint security is critical with the growth of technology devices. Learn how to protect your enterprise.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
|
Avoid downtime: DDoS Defense Model Guide
sponsored by Cloudflare
EBOOK:
팬데믹 이후 DDoS 공격의 빈도와 복잡도가 증가함에 따라 합법적인 트래픽을 유지하여 수익을 보호하는 것이 중요해 졌습니다. 오늘날의 경제 현실과 하이브리드 근무 환경에서 기업은 DDoS 방어체계를 재평가해야 합니다. Cloudflare를 사용하면 다른 공급자에서 흔히 발생하는 대기 시간 문제나 높은 비용 문제 없이 공격으로부터 빠르고 쉽게 보호할 수 있고 상시 가동 클라우드 전략을 쉽게 선택할 수 있습니다.
Posted: 24 Nov 2023 | Published: 24 Nov 2023
|
|
|
Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT:
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010
|
|
|
VXWorks for Aerospace and Defense
sponsored by Wind River
PRODUCT OVERVIEW:
VxWorks® aerospace and defense software saves costs and accelerates certification. Proven in 750+ safety programs and 120+ aircraft, Read how VxWorks streamlines compliance, satisfies real-time operating systems needs, secures systems, simplifies software integration, and inspires developers.
Posted: 02 Dec 2023 | Published: 02 Dec 2023
|
|
|
New Mobile Risks Call for a Layered Security Approach
sponsored by TechTarget CIO
EBOOK:
As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016
|
|
|
Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER:
The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012
|
|
|
Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Microsoft and Citrix
EGUIDE:
This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016
|
|
|
Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST:
This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010
|
|
|
Malware Attacks Demand a New Malware Defense Approach
sponsored by TechTarget Security
EGUIDE:
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
|
|
|
Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK:
The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018
|
|
|
Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
EBOOK:
Industrial systems present a unique concern for enterprises, as any compromise to their digital security can affect the physical infrastructure that surrounds us. This e-book investigates the most effective practices, processes, and strategies, that you can use to most effectively monitor and secure your industrial systems. Read on to learn more.
Posted: 07 Nov 2023 | Published: 07 Nov 2023
|
|
|
Back to the Basics, Other Payment Integrity Strategies Post-PHE
sponsored by XtelligentMedia Healthcare
EGUIDE:
Fraud in healthcare isn't as black and white as in other industries, so providers need a comprehensive payment integrity strategy after the COVID-19 public health emergency. The back-to-the-basics approach has become a good choice after the expiration of the PHE. Download the article to read more.
Posted: 19 Jul 2023 | Published: 19 Jul 2023
|
|
|
Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER:
One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
|
|
|
How Cloud Fax Enhances the Security of Your Mission Critical Data
sponsored by Consensus Cloud Solutions
WHITE PAPER:
Many IT teams cite privacy and security among the reasons their organizations continue to support fax capability. In one sense, these teams are correct: Faxes tend to travel under hackers' radar. But if you're operating a paper-based fax environment, you could be exposing your organization to security risks without realizing it.
Posted: 15 Feb 2023 | Published: 15 Feb 2023
|
|