Vertical Industries  >  

Weapons Industry

RSS Feed   
Weapons Industry White Papers (View All Report Types)
 
Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

Storage Wars: Ceph as a secret weapon for HPC
sponsored by SoftIron
WHITE PAPER: Explore this white paper for an introduction or refresher to Ceph and discover the 7 benefits of using SoftIron’s Ceph solution for HPC.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SoftIron

CW Benelux ezine February 2019
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

ComputerWeekly.com

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security

eBizQ eBook: Dynamic Case Management: A powerful weapon in the war on 'untamed processes'
sponsored by IBM
EBOOK: Learn how dynamic case management (DCM) can help enterprises deal with dysfunctional processes. In this expert eBook, you’ll be introduced to DCM, define untamed processes and explore such processes in the context of enterprise resource planning (ERP) and integration.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Cyber Threat Perspective Manufacturing Sector
sponsored by Dragos
WHITE PAPER: Dragos is a cybersecurity firm focused on protecting the manufacturing sector, particularly from industrial control system (ICS) threats. They publicly track 5 activity groups targeting ICS as well as various ransomware. Read Dragos’s Cyberthreat Perspective to learn more about these threats and what you can do to defend against them.
Posted: 07 Apr 2021 | Published: 30 Nov 2020

Dragos

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Networks
WHITE PAPER: This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020

TOPICS:  Cybersecurity
F5 Networks

Mitsubishi Heavy Industries Constructs Digital Transformation With Looker
sponsored by Looker
CASE STUDY: Read on to learn how Google Looker plays a key role in Mitsubishi Heavy Industries’ data architecture, accelerating data analysis and democratizing access to BI tools.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Looker

Indispensable Channel Analysis
sponsored by MicroScope
EZINE: In this issue of MicroScope, print management steps into the spotlight and the channel positions itself for the fourth industrial revolution. Where is the recent swell of distributor optimism for growth and innovation coming from? Find out.
Posted: 24 May 2017 | Published: 26 May 2017

MicroScope

All industries - Digital Transformation in the Idea Economy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Transform or become obsolete. That's the reality as demand for next-generation, contextually aware experiences grows.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

eBizQ.net E-Book: Dynamic case management: A powerful weapon in the war on ‘untamed processes’  - Part One
sponsored by IBM
EBOOK: Check out this expert e-book, the first part of a series on process management, to learn how dunamic case management (DCM) can be used to overcome this challenge.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

IBM

Detecting and Responding to Zero-Day Attacks
sponsored by eSentire
WHITE PAPER: Zero-day attacks will always be a threat, so it’s imperative that you detect and respond to this this post-exploitation behavior effectively. If you’re not currently engaged with a Managed Detection and Response provider, join forces with eSentire for security services to disrupt threats before they impact your business.
Posted: 09 Aug 2021 | Published: 09 Aug 2021

TOPICS:  .NET
eSentire

eBizQ.net E-Book: Dynamic case management: A powerful weapon in the war on ‘untamed processes’ - Part Two
sponsored by IBM
EBOOK: Fortunately, dynamic case management (DCM) can help enterprises deal with dysfunctional processes. This expert e-book, part two of a series on process management, will introduce readers to DCM, define untamed processes and explore such processes in the context of enterprise resource planning (ERP) and integration.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

IBM

Computer Weekly 50th anniversary special
sponsored by ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 21 Sep 2016 | Published: 22 Sep 2016

ComputerWeekly.com

A Blueprint to Build a Commanding, Cyber-Ready Workforce
sponsored by CyberVista
WHITE PAPER: Your employees, even those working outside of cybersecurity, may be your secret weapon in keeping your organization safe from digital threats. Properly investing in cybersecurity training for your workforce can mitigate risk while also improving your bottom line. Read this white paper to learn 4 steps to building a cyber-ready workforce.
Posted: 28 Jul 2021 | Published: 28 Jul 2021

TOPICS:  .NET
CyberVista

Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Understanding Cyberattacks
sponsored by Panda Security
WHITE PAPER: It is critical to understand the cyber-kill chain for identifying threats throughout the different stages of an attack lifecycle. There are 7 basic steps to the cyber-kill chain. Download this white paper to discover details on all of them to halt cyberattacks in their tracks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Supercharge Incident Response with Data
sponsored by Infoblox
WHITE PAPER: DDI data is a powerful, yet little understood, weapon for improving incident response.This SANS report provides a detailed roadmap for security teams that want to leverage their DDI systems to advance and improve incident response operations. Access your copy to unlock this tool set today.
Posted: 07 Sep 2021 | Published: 07 Sep 2021

TOPICS:  .NET
Infoblox

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 12 Oct 2018 | Published: 12 Oct 2018

ComputerWeekly.com

Getting the Most out of Your Wi-Fi Network
sponsored by Ekahau
EGUIDE: On the hunt for a wireless network management tool? Nolan Greene, analyst at IDC, cautions that the most important features to assess in wireless network management depend on the use case. Learn more about what Greene and other analysts think about managing wireless networks today in this expert e-guide.
Posted: 30 Jun 2017 | Published: 26 Jun 2017

Ekahau

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences