Vertical Industries  >  

Defense Parts Industry

RSS Feed   
Defense Parts Industry Reports
 
Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Analyst's take: Siemens product lifecycle management software solutions for aerospace industry
sponsored by ComputerWeekly.com
WHITE PAPER: Siemens supports solutions for service and sustainment in the aerospace and defense industries that enable companies to reduce service costs and time cycles while increasing profitability across the service life of products.
Posted: 26 Oct 2011 | Published: 17 Jan 2011

ComputerWeekly.com

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by SearchWinIT
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

SearchWinIT

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

The technological evolution of IT industry leaders: Part two
sponsored by ComputerWeekly.com
EGUIDE: Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

ComputerWeekly.com

The technological evolution of IT industry leaders: Part one
sponsored by ComputerWeekly.com
EGUIDE: This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

ComputerWeekly.com

Targeted attacks: Preparation and Mitigation
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Offsite Data Centers Key Part of Effective Disaster Recovery Plans
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com explores the importance of an offsite data center in ensuring your best defense against an unforeseen disaster. Read now to learn about the key elements of planning for a disaster, and how to build this planning into your everyday operations and workflow.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

HP & Intel®

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Vitens Moves to Cloud Security With BloxOne™ Threat Defense From Infoblox
sponsored by Infoblox
CASE STUDY: Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox

How to Tackle Endpoint Defense Issues
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 31 Jan 2017 | Published: 27 Jan 2017

Carbon Black

Close the Gaps in Your Defenses with Automated Detection, Investigation and Response
sponsored by Splunk
WHITE PAPER: This e-book explores the anatomy of a truly integrated defense, including automated detection, investigation and response. Read on to start thinking about where the gaps might be in your own environment, so you can build a strategy to lock them down for good.
Posted: 21 May 2020 | Published: 21 May 2020

Splunk

Reducing Security Risk in the Financial Services Industry
sponsored by AWS Rapid7
WHITE PAPER: A report from the Department of Digital, Culture, Media and Sport revealed almost half of UK businesses (46%) have had cybersecurity breaches or attacks in the last 12 months. The financial services industry is a prime target for such attacks, but by absorbing this white paper, you can learn measures to take to reduce organizational risk.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

AWS Rapid7

Digital Transformation: Part I
sponsored by ComputerWeekly.com
PRESENTATION: In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

ComputerWeekly.com

Enable and Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

AT&T Cybersecurity

The Future of Financial Services: Part 1
sponsored by ComputerWeekly.com
EGUIDE: In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

ComputerWeekly.com

Technology Industry Survey2012
sponsored by ComputerWeekly.com
WHITE PAPER: Whether it is an inappropriate ‘tweet’, an internetsecurity scandal or a story of the fastest growingcompany in the world, technology, be it for theright or wrong reasons, has become regular frontpagenews.This survey aims to give a snapshot of thetechnology industry from the inside.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

ComputerWeekly.com

New Mobile Risks Call for a Layered Security Approach
sponsored by SearchCIO.com
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TOPICS:  CIOs
SearchCIO.com

COVID Resilience Report For Aerospace & Defense
sponsored by Interos
WHITE PAPER: Between July and August of 2020, Interos surveyed executives in the Aerospace and Defense industry to assess the disruptions and vulnerabilities brought to light by COVID-19 and actions that organizations were taken to build resilience. Explore the survey results and the 5 core findings in this white paper.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Interos

The Future of Financial Services: Part 2
sponsored by ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

ComputerWeekly.com

People and skills: the critical parts to manufacturing’s “new normal”
sponsored by Cornerstone OnDemand
WHITE PAPER: With the onset of the pandemic, manufacturers did a 180, instead placing even more value into larger workforces. Now, manufacturers must face the challenges of a larger workforce: filling in the skills gap. Learn how people (and skillsets) will power manufacturing’s future in this guide.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cornerstone OnDemand

Securing Embedded Software with Threat Modeling
sponsored by Klocwork
PRESENTATION TRANSCRIPT: This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Klocwork
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info