Software  >   Applications Software  >   Industrial Applications Software  >  

Fleet Management Systems

RSS Feed   
Fleet Management Systems Reports
 
Royal Holloway: Driverless vehicle security for military applications
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
Posted: 09 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Going the Last Mile to Deliver Mobile Apps
sponsored by Apperian, Inc.
CASE STUDY: Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

Apperian, Inc.

School Bus Operator Drives Competitive Advantage with Blackberry Solution
sponsored by BlackBerry
CASE STUDY: Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

BlackBerry

Building Better Driver Portraits: IoT in The Telematics Industry
sponsored by Aeris
EGUIDE: In this expert-guide, learn how one telematics firm is putting IoT to work using roaming networks to deliver connectivity not only in their native UK, but across Europe. Then, read about how big data gained from IoT devices is helping to paint a more three-dimensional portrait of the transportation industry.
Posted: 14 Aug 2017 | Published: 09 Aug 2017

Aeris

3 Smart Moves That Slash Intermodal Costs
sponsored by Quintiq
WHITE PAPER: Even with near limitless intermodal options, planners typically fall back on familiar routes and patterns – regardless of whether or not there's a better way to operate. Fortunately, this resource lays out three smart moves that slash intermodal costs while delivering real planning transparency.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Quintiq

A DIGITAL PRESCRIPTION FOR HEALTHCARE’S TECHNOLOGY CHALLENGES
sponsored by HPE and Intel®
WHITE PAPER: The global COVID-19 pandemic has been a disruption unprecedented in our lifetimes, and healthcare providers around the world have been sorely tested. But challenges within the industry were visible long before this. Read this white paper to learn how healthcare providers are embracing solutions like HPE GreenLake and conquering these challenges.
Posted: 18 Jun 2021 | Published: 18 Jun 2021

HPE and Intel®

Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.
Posted: 17 Aug 2020 | Published: 18 Aug 2020

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Evaluate your machine learning and AI data storage needs
sponsored by SearchStorage.com
EBOOK: Access this expert white paper to learn how your organization can best address the requirements of AI applications, 6 criteria for selecting the right AI data storage for your needs, the products that can help, and more.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

SearchStorage.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences