Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER:
Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010
|
|
|
Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER:
A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009
|
|
|
Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER:
This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008
|
|
|
Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST:
This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010
|
|
|
Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018
|
|
|
Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021
|
|
|
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER:
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018
|
|
|
The Secret Weapon for Your Modern Pentest: Skilled Hackers
sponsored by HackerOne
WHITE PAPER:
Security teams can learn the most from pentests (penetration tests) when working with skilled pentesters. HackerOne has developed a platform on which security teams can interact with qualified hackers. Dig into this white paper for an overview of the platform’s goal: enabling effective matches between security teams and pentesters.
Posted: 13 Sep 2022 | Published: 13 Sep 2022
|
|
|
CW Benelux ezine February 2019
sponsored by TechTarget ComputerWeekly.com
EZINE:
Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019
|
|
|
CW Nordics August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE:
In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018
|
|
|
8X8 Connect - Your Weapon To Omnichannel Victory
sponsored by 8x8
WHITE PAPER:
The challenge of building a consistent brand and maintaining quality communications multiplies as more channels are added. But scaling does not have to come at the expense of customer satisfaction if done right. Read this white paper to learn how you can deliver contextualized, on-demand conversations across multiple channels at scale.
Posted: 15 Feb 2023 | Published: 15 Feb 2023
|
|
|
A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE:
Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011
|
|
|
Debunking 6 industrial IoT myths
sponsored by Software AG
EBOOK:
Manufacturers that haven’t adopted IoT now compete against companies that do. Those competitors have very different cost and revenue structures, which lets them offer their customers a more flexible range of purchase options and service programs. Read on to learn about 6 IIoT myths that may be standing in the way of your organization’s success.
Posted: 24 Feb 2023 | Published: 24 Feb 2023
|
|
|
Malware Exploiting Machine Identities Doubled Between 2018 to 2019
sponsored by Venafi & Intel
RESOURCE:
Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade. Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.
Posted: 14 Dec 2021 | Published: 14 Dec 2021
|
|
|
Indispensable Channel Analysis
sponsored by MicroScope
EZINE:
In this issue of MicroScope, print management steps into the spotlight and the channel positions itself for the fourth industrial revolution. Where is the recent swell of distributor optimism for growth and innovation coming from? Find out.
Posted: 24 May 2017 | Published: 26 May 2017
|
|
|
The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Inc.
WHITE PAPER:
This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020
|
|
|
All industries - Digital Transformation in the Idea Economy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
Transform or become obsolete. That's the reality as demand for next-generation, contextually aware experiences grows.
Posted: 17 Oct 2016 | Published: 17 Oct 2016
|
|
|
PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Control Systems
sponsored by Dragos
EBOOK:
What are the capabilities of CHERNOVITE’S malware specific to Industrial Control Systems? How can you protect your business from this threat? Explore this e-book to review PIPEDREAM’s deployment scenarios and to unlock defense strategies.
Posted: 25 Oct 2022 | Published: 25 Oct 2022
|
|
|
Crucial Considerations When Enabling Secure Industrial Digital Transformation
sponsored by Fortinet, Inc.
EBOOK:
With the rapid adoption of new digital tools and services, internet-connected IT networks are increasingly intersecting with previously isolated OT networks, exposing OT systems to new threats. Learn how to seamlessly integrate security into OT environments and empower digital transformation in your organization in this e-book.
Posted: 21 Mar 2023 | Published: 22 Mar 2023
|
|
|
E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE:
Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011
|
|
|
Getting the Most out of Your Wi-Fi Network
sponsored by Ekahau
EGUIDE:
On the hunt for a wireless network management tool? Nolan Greene, analyst at IDC, cautions that the most important features to assess in wireless network management depend on the use case. Learn more about what Greene and other analysts think about managing wireless networks today in this expert e-guide.
Posted: 30 Jun 2017 | Published: 26 Jun 2017
|
|
|
Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
|
|
|
Fighting Cybercrime in the 21st Century
sponsored by TechTarget Security
EBOOK:
Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015
|
|
|
Social Media Monitoring Long on Promise, Short on Results
sponsored by TechTarget Content Management
EBOOK:
Every company knows that social media holds great insight into customer desires, but many are failing. This handbook on social media monitoring identifies some of the difficulties and provides suggestions on converting raw data into actionable information to successfully engage audiences, identify prospects and enhance brand awareness.
Posted: 03 Aug 2016 | Published: 04 Aug 2016
|
|
|
IT in Europe: Security in the Cloud
sponsored by TechTarget Security
EZINE:
Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.
Posted: 26 Aug 2011 | Published: 26 Aug 2011
|
|
|
April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE:
This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011
|
|
|
Computer Weekly – 6 November 2012: The business benefits of 4G
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now.
Posted: 05 Nov 2012 | Published: 06 Nov 2012
|
|
|
File Upload Security: The Missing Category for a Comprehensive Security Posture
sponsored by Deep Instinct
WHITE PAPER:
Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
Posted: 25 Feb 2023 | Published: 25 Feb 2023
|
|
|
Using Code Quality Metrics in Management of Outsourced Development and Maintenance
sponsored by McCabe Software, Inc.
WHITE PAPER:
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations.
Posted: 13 Mar 2009 | Published: 13 Mar 2009
|
|
|
MicroScope E-Zine April 2015
sponsored by MicroScope
EZINE:
In this issue, we look at how employers can check staff criminal records and get industry views on the progress of the partnership between IBM and Apple.
Posted: 09 Apr 2015 | Published: 09 Apr 2015
|
|
|
MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE:
In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023
|
|