Defense and Aerospace Industry Reports

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 08 Feb 2021 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

ThreatLabz Ransomware Report
sponsored by Zscaler
RESEARCH CONTENT: This in-depth ransomware report from Zscaler ThreatLabz analyzes the latest trends, including record-high ransom payments, the most targeted industries, and effective defense strategies. Download the report to stay ahead of evolving ransomware threats.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT: The Zscaler ThreatLabz 2024 Phishing Report examines the evolving phishing landscape, including the impact of AI, top targeted industries, and emerging tactics like vishing and browser-in-the-browser attacks. Learn how to enhance your organization's phishing defenses by reading the full report.
Posted: 28 Aug 2024 | Published: 28 Aug 2024

Zscaler

30 top edge computing companies to watch in 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: With the amount of data organizations are generating today, IT leaders should consider edge computing technologies to keep all that data closer to the edge. In this infographic, we point out 30 vendors that are investing heavily in edge technologies to help organisations as they build edge computing ecosystems.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Publishing Test
sponsored by Lead Approval II Test Org
ANALYST BRIEF: Publishing Test
Posted: 08 Nov 2018 | Published: 08 Nov 2018

TOPICS:  .NET
All resources sponsored by Lead Approval II Test Org

Securing Virtualized Environments: The Imperative of Preemptive Protection
sponsored by Centripetal Networks
WHITE PAPER: Virtualized environments face unique security challenges due to vulnerabilities in VDI and virtual server technologies. This white paper explores how intelligence-powered cybersecurity can deliver preemptive protection against exploits, reducing the risk of damaging breaches during the patching window. Read the full white paper to learn more.
Posted: 11 Jun 2024 | Published: 11 Jun 2024

Centripetal Networks

The Importance of Securing Workloads for Generative AI
sponsored by AWS & Illumio
ESG SHOWCASE: Despite its benefits, GenAI tends to have some security risks, with 41% of today’s businesses reporting their concerns. So, how can you ensure that your threat detection, access management, and adversarial defenses are up to par? Access this report to gain more insight.
Posted: 01 Oct 2024 | Published: 01 Oct 2024

AWS & Illumio

MDR Marketing Report
sponsored by Kaspersky
EBOOK: The annual Kaspersky Managed Detection and Response (MDR) report provides insights into the latest threat tactics, techniques, and tools, as well as the nature and distribution of incidents across industries and regions. Download the report to learn how you can enhance your security posture.
Posted: 01 Oct 2024 | Published: 02 Oct 2024

Kaspersky

Financial Services and Cyber Security Playbook
sponsored by Checkpoint Software Technologies
WHITE PAPER: Discover how financial services firms can enhance their cybersecurity posture and protect against evolving threats. Download the Financial Services and Cyber Security Playbook to learn more.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Checkpoint Software Technologies

TMS Technology Value Matrix 2023
sponsored by Blue Yonder
RESEARCH CONTENT: As the TMS market continues to evolve, it can be difficult for supply chain organizations to navigate the various vendors, and many can have trouble finding a solution that fits their unique needs. Access this report to discover the industry’s top vendors and how they stack up.
Posted: 27 Jun 2023 | Published: 27 Jun 2023

TOPICS:  .NET
Blue Yonder

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024

NOKIA

Security 360: Annual Trends Report 2024
sponsored by JAMF
RESEARCH CONTENT: Jamf's annual security report analyzes the evolving threat landscape, evaluating device, application, malware, and web-based risks. It provides best practices to improve security posture, including managing vulnerabilities, implementing defense-in-depth, and aligning with compliance standards. Read the full report to secure your modern workplace.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

JAMF

The SUSE Guide to Edge Computing in a Cloud Native World 2022
sponsored by SUSE
EBOOK: What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.
Posted: 19 Sep 2022 | Published: 20 Sep 2022

TOPICS:  .NET
SUSE

Computer Weekly – 14 January 2020: Building the internet of the future
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Jan 2020

TechTarget ComputerWeekly.com

Deep Learning Delivers Proactive Cyber Defense
sponsored by Deep Instinct
ANALYST REPORT: Amidst the cybersecurity skills shortage, organizations are hard pressed to find new answers to evolving problems. Deep learning, a subset of machine learning, offers a highly accurate way to identify attack patterns and stop threats before they become attacks, without the need for highly skilled cybersecurity experts. Read on to learn more.
Posted: 22 Feb 2023 | Published: 22 Feb 2023

TOPICS:  .NET
Deep Instinct

Computer Weekly – 18 July 2023: Soaring ahead with data at Rolls-Royce
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how aerospace giant Rolls-Royce uses data to improve its competitive advantage. We examine the benefits and best practices in software-defined storage. And we analyse calls for a review of laws around the use of computer evidence prompted by the Post Office IT scandal. Read the issue now.
Posted: 17 Jul 2023 | Published: 18 Jul 2023

TechTarget ComputerWeekly.com

The 2024 Technology Trends Report
sponsored by Upstack, Inc.
RESEARCH CONTENT: This report is a powerful glimpse into the future of the changing IT landscape informed by insights gleaned from UPSTACK's leading technology experts.
Posted: 13 Mar 2024 | Published: 13 Mar 2024

TOPICS:  .NET
Upstack, Inc.

Agile today & tomorrow: Shaping organizational transformation
sponsored by Appfire
EBOOK: Appfire and Vanson Bourne surveyed 450 global technology decision-makers and found that 94% of their organizations use agile methodologies, with budgets up by 10% on average. This e-book explores the trends, challenges, maturity levels, and future of agile implementation in organizations like yours. Download your copy to access its chapters.
Posted: 25 Oct 2024 | Published: 25 Oct 2024

Appfire

CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
sponsored by TechTarget ComputerWeekly.com
EZINE: Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
Posted: 23 Nov 2022 | Published: 08 Dec 2022

TechTarget ComputerWeekly.com

Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.
Posted: 16 Feb 2024 | Published: 20 Feb 2024

TechTarget ComputerWeekly.com

How Offensive Security Strengthens Security Posture and Reduces Defensive Costs
sponsored by CyberMaxx
ESG SHOWCASE: In the face of abounding security risks, many organizations are turning to managed detection and response (MDR) providers for help. To understand how MDR can support both offensive and defensive security, download this report by TechTarget’s Enterprise Strategy Group (ESG).
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  .NET
CyberMaxx

Don’t drown in data debt; champion your Data First culture
sponsored by Syniti
ANALYST REPORT: Modern enterprises are struggling with data debt, as over 40% of data is unusable. This creates lost opportunity cost. To harness data's full power, enterprises must champion a "Data First" culture, address data quality, and partner with specialized data providers. Download this report to learn how you can reduce your data debt.
Posted: 18 Jul 2024 | Published: 18 Jul 2024

Syniti

Platform Datasheet
sponsored by SimSpace
PRODUCT OVERVIEW: What if there was a way to simulate an attack to gain experience, without putting your organization at risk? Download this data sheet to learn how the SimSpace platform can help you model your production environment and continuously emulate real adversaries to test your defenses.
Posted: 07 May 2024 | Published: 07 May 2024

TOPICS:  .NET
SimSpace

Protect the Endpoint: Threats, Virtualization, Questions, Backup, and More
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 08 Feb 2021 | Published: 27 Jan 2017

Carbon Black

Defense Agency Dramatically Shrinks Data Center Footprint
sponsored by Hitachi Vantara
CASE STUDY: A defense agency dramatically reduced its data center footprint by 25% through storage virtualization and infrastructure modernization with Hitachi Vantara. The solution delivered major benefits in cost, resiliency, and performance. Read the full case study to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Hitachi Vantara

How to Evaluate Threat Intelligence Feeds
sponsored by ReversingLabs
WHITE PAPER: Know When Software Is Malware. With this guide, you will learn how to evaluate open source and commercial threat intelligence feeds to ensure you have relevant and useful information about malware, ransomware, Indicators of Compromise (IoC) and threat actors, so that your team can identify malicious events and reduce noisy, time-consuming alerts.
Posted: 24 Jul 2024 | Published: 24 Jul 2024

ReversingLabs