Weapons Industry Reports

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

CW Europe – December 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

TechTarget ComputerWeekly.com

Computer Weekly – 2 May 2023: The ethics of military AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.
Posted: 02 May 2023 | Published: 02 May 2023

TechTarget ComputerWeekly.com

CW Benelux ezine February 2019
sponsored by TechTarget ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

TechTarget ComputerWeekly.com

Solution Brief: Get Fast, Secure Wireless WAN for Your Industrial Edge
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: The Industrial Internet-of-Things (IIoT) has increased data capture for devices like sensors, gauges, and more. However, with these efficiency gains comes increased risk. How can your organization scale while remaining secure and operating without interruption? Read this white paper to learn how.
Posted: 31 Aug 2023 | Published: 31 Aug 2023

TOPICS:  .NET
Fortinet, Inc.

CW Nordics August 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

TechTarget ComputerWeekly.com

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET

8X8 Connect - Your Weapon To Omnichannel Victory
sponsored by 8x8
WHITE PAPER: The challenge of building a consistent brand and maintaining quality communications multiplies as more channels are added. But scaling does not have to come at the expense of customer satisfaction if done right. Read this white paper to learn how you can deliver contextualized, on-demand conversations across multiple channels at scale.
Posted: 15 Feb 2023 | Published: 15 Feb 2023

TOPICS:  .NET
8x8

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
EBOOK: Industrial systems present a unique concern for enterprises, as any compromise to their digital security can affect the physical infrastructure that surrounds us. This e-book investigates the most effective practices, processes, and strategies, that you can use to most effectively monitor and secure your industrial systems. Read on to learn more.
Posted: 07 Nov 2023 | Published: 07 Nov 2023

TOPICS:  .NET
Cisco

Malware Exploiting Machine Identities Doubled Between 2018 to 2019
sponsored by Venafi & Intel
RESOURCE: Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade. Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TOPICS:  .NET
Venafi & Intel

Indispensable Channel Analysis
sponsored by MicroScope
EZINE: In this issue of MicroScope, print management steps into the spotlight and the channel positions itself for the fourth industrial revolution. Where is the recent swell of distributor optimism for growth and innovation coming from? Find out.
Posted: 24 May 2017 | Published: 26 May 2017

MicroScope

Secret Weapon - ECM For Cost-Efficient, Audit-Proof And Future-Proof Management Of SAP Data
sponsored by T-Systems
EBOOK: As organizations continue to work to improve their business resilience, many are finding that this is only possible if their data foundations are secure and reliably set up. To combat this, companies are turning to enterprise content management (ECM) systems. Browse this guide to learn more.
Posted: 20 Oct 2023 | Published: 20 Oct 2023

TOPICS:  .NET
T-Systems

All industries - Digital Transformation in the Idea Economy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Transform or become obsolete. That's the reality as demand for next-generation, contextually aware experiences grows.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 21 Sep 2016 | Published: 22 Sep 2016

TechTarget ComputerWeekly.com

Crucial Considerations When Enabling Secure Industrial Digital Transformation
sponsored by Fortinet, Inc.
EBOOK: With the rapid adoption of new digital tools and services, internet-connected IT networks are increasingly intersecting with previously isolated OT networks, exposing OT systems to new threats. Learn how to seamlessly integrate security into OT environments and empower digital transformation in your organization in this e-book.
Posted: 21 Mar 2023 | Published: 22 Mar 2023

TOPICS:  .NET
Fortinet, Inc.

Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Getting the Most out of Your Wi-Fi Network
sponsored by Ekahau
EGUIDE: On the hunt for a wireless network management tool? Nolan Greene, analyst at IDC, cautions that the most important features to assess in wireless network management depend on the use case. Learn more about what Greene and other analysts think about managing wireless networks today in this expert e-guide.
Posted: 30 Jun 2017 | Published: 26 Jun 2017

Ekahau

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 12 Oct 2018 | Published: 12 Oct 2018

TechTarget ComputerWeekly.com

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Fighting Cybercrime in the 21st Century
sponsored by TechTarget Security
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

TechTarget Security

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 13 Jan 2017 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

Social Media Monitoring Long on Promise, Short on Results
sponsored by TechTarget Content Management
EBOOK: Every company knows that social media holds great insight into customer desires, but many are failing. This handbook on social media monitoring identifies some of the difficulties and provides suggestions on converting raw data into actionable information to successfully engage audiences, identify prospects and enhance brand awareness.
Posted: 03 Aug 2016 | Published: 04 Aug 2016

TechTarget Content Management

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

TechTarget ComputerWeekly.com

IT in Europe: Security in the Cloud
sponsored by TechTarget Security
EZINE: Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

TechTarget Security