Weapons Industry Reports

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Your Industrial business transformation
sponsored by Vodafone
EBOOK: Transport and logistics, public transport, and manufacturing companies today are facing more finite resources and rising customer expectations. In this e-book, you will learn about an IoT solution is designed to empower manufacturers to deliver safer, smarter, more efficient operations. Read on to learn about solution benefits and features.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TOPICS:  .NET
Vodafone

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

The Secret Weapon for Your Modern Pentest: Skilled Hackers
sponsored by HackerOne
WHITE PAPER: Security teams can learn the most from pentests (penetration tests) when working with skilled pentesters. HackerOne has developed a platform on which security teams can interact with qualified hackers. Dig into this white paper for an overview of the platform’s goal: enabling effective matches between security teams and pentesters.
Posted: 13 Sep 2022 | Published: 13 Sep 2022

TOPICS:  .NET
HackerOne

CW Nordics August 2018
sponsored by ComputerWeekly.com
EZINE: In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.
Posted: 17 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

CW Benelux ezine February 2019
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

ComputerWeekly.com

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security

Generating Profit And Advanced Threat Intelligence
sponsored by Webroot
EBOOK: As hackers continue to improve and find new ways to commit cybercrimes, it is important that cybersecurity also improves in order to meet the increasing threat. AI and ML are powerful resources that could prove indispensable in the defense against cybercrime. Read on to learn more about how AI and ML are changing cybersecurity.
Posted: 04 May 2022 | Published: 04 May 2022

TOPICS:  .NET
Webroot

Malware Exploiting Machine Identities Doubled Between 2018 to 2019
sponsored by Venafi & Intel
RESOURCE: Business have seen an 8X increase in malware attacks weaponizing machine identities over the last decade. Read this infographic to explore more trends in machine identity exploitation and learn why a robust machine identity program is in order.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TOPICS:  .NET
Venafi & Intel

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Inc.
WHITE PAPER: This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020

TOPICS:  Cybersecurity
F5 Inc.

Indispensable Channel Analysis
sponsored by MicroScope
EZINE: In this issue of MicroScope, print management steps into the spotlight and the channel positions itself for the fourth industrial revolution. Where is the recent swell of distributor optimism for growth and innovation coming from? Find out.
Posted: 24 May 2017 | Published: 26 May 2017

MicroScope

Detecting and Responding to Zero-Day Attacks
sponsored by eSentire
WHITE PAPER: Zero-day attacks will always be a threat, so it’s imperative that you detect and respond to this this post-exploitation behavior effectively. If you’re not currently engaged with a Managed Detection and Response provider, join forces with eSentire for security services to disrupt threats before they impact your business.
Posted: 09 Aug 2021 | Published: 09 Aug 2021

TOPICS:  .NET
eSentire

All industries - Digital Transformation in the Idea Economy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Transform or become obsolete. That's the reality as demand for next-generation, contextually aware experiences grows.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Computer Weekly 50th anniversary special
sponsored by ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 21 Sep 2016 | Published: 22 Sep 2016

ComputerWeekly.com

A Blueprint to Build a Commanding, Cyber-Ready Workforce
sponsored by CyberVista
WHITE PAPER: Your employees, even those working outside of cybersecurity, may be your secret weapon in keeping your organization safe from digital threats. Properly investing in cybersecurity training for your workforce can mitigate risk while also improving your bottom line. Read this white paper to learn 4 steps to building a cyber-ready workforce.
Posted: 01 Oct 2021 | Published: 28 Jul 2021

TOPICS:  .NET
CyberVista

Turning the Tables
sponsored by Proofpoint
EBOOK: Cybercriminals are increasingly targeting people over infrastructures, but it’s about time people started fighting back. Learn how user reporting can turn the tables on threat actors in this e-book.
Posted: 01 Sep 2022 | Published: 01 Sep 2022

TOPICS:  .NET
Proofpoint

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

Getting the Most out of Your Wi-Fi Network
sponsored by Ekahau
EGUIDE: On the hunt for a wireless network management tool? Nolan Greene, analyst at IDC, cautions that the most important features to assess in wireless network management depend on the use case. Learn more about what Greene and other analysts think about managing wireless networks today in this expert e-guide.
Posted: 30 Jun 2017 | Published: 26 Jun 2017

Ekahau

Computer Weekly – 16 October 2018: Drilling into AI at Shell
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how oil giant Shell is using AI and machine learning to boost workforce productivity. We analyse the attempted Russian cyber attack revealed by the Dutch government. And we look at how blockchain is being used in the food and drink industry to improve supply chain management. Read the issue now.
Posted: 12 Oct 2018 | Published: 12 Oct 2018

ComputerWeekly.com

eSentire Managed Vulnerability Service
sponsored by eSentire
DATA SHEET: Without regular vulnerability scanning that stays ahead of the latest common vulnerabilities and exposures (CVEs) and zero-days, your environment presents opportunities that threat actors will exploit. Access this data sheet to learn about the 9 intended benefits of a managed vulnerability service.
Posted: 01 Apr 2022 | Published: 01 Apr 2022

TOPICS:  .NET
eSentire

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Fighting Cybercrime in the 21st Century
sponsored by SearchSecurity.com
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

Global Risks Report 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 13 Jan 2017 | Published: 13 Jan 2017

ComputerWeekly.com

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends
sponsored by ComputerWeekly.com
EBOOK: In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

ComputerWeekly.com

Social Media Monitoring Long on Promise, Short on Results
sponsored by SearchContentManagement
EBOOK: Every company knows that social media holds great insight into customer desires, but many are failing. This handbook on social media monitoring identifies some of the difficulties and provides suggestions on converting raw data into actionable information to successfully engage audiences, identify prospects and enhance brand awareness.
Posted: 03 Aug 2016 | Published: 04 Aug 2016

SearchContentManagement

IT in Europe: Security in the Cloud
sponsored by SearchSecurity.com
EZINE: Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

SearchSecurity.com