engineering

Results 276 - 300 of 307Sort Results By: Published Date | Title | Company Name
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec, ssl, central management, remote access, network security, next generation, authentication, security management
    
NCP Engineering GmbH
Published By: Orchid Technologies Engineering & Consulting     Published Date: Sep 03, 2008
Shrinking product development cycles coupled with demanding product requirements and increasingly complex design implementations can overwhelm a design team. The technical risk of employing new, complex, high-speed processor technology can often deter a design group from incorporating new technology in their product designs.
Tags : 
scm, supply chain, oem, manufacturing, manufacture, manufacturer, product development, chip, chips, electronics, orchid, product lifecycle management, supply chain management
    
Orchid Technologies Engineering & Consulting
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s), software development, it management, storage
    
Orchid Technologies Engineering & Consulting
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : 
ema radar, network management, systems, network, management, infrastructure, network architecture, network performance, network performance management
    
HP - Enterprise
Published By: GlobalSpec     Published Date: Nov 21, 2008
Gain practical tips for making marketing work in a difficult business environment, helping to prevent a downward spiral of falling behind, gain market share from competitors who cut back, and position your company for a surge when conditions improve.
Tags : 
globalspec, engineering, technical, industrial marketers, marketing investments
    
GlobalSpec
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s, enterprise applications, data center design and management
    
Genesys
Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk, assessment, social, engineering, internal, external, web application, network, security, secure, vulnerability, threat, identify, glba, compliance, testing
    
TraceSecurity
Published By: Tormach LLC     Published Date: Nov 05, 2010
Best practices and proper maintenance with R8, ER, Morse and other collet systems can greatly improve tool holding
Tags : 
collet slip, cnc, pcnc, milling, tormach, manufactoring, engineering
    
Tormach LLC
Published By: Eloqua     Published Date: Mar 16, 2011
This whitepaper demonstrates how the fastest-growing companies are using Revenue Performance Management, or RPM, to break down silos between sales and marketing and drive explosive revenue growth.
Tags : 
benchmarking, forecasting, joe payne, lead management, lead scoring, marketing automation, predictive analytics, revenue, revenue performance, revenue performance management, rpm
    
Eloqua
Published By: MySmartPlans     Published Date: May 04, 2011
How implementing online collaboration and project management technology can revolutionize the architecture, engineering and construction industry's communication, efficiency and overall project completion
Tags : 
construction, architect, engineer, aec, closeout
    
MySmartPlans
Published By: AMD FirePro     Published Date: Apr 18, 2012
Help optimize the performance of your current workstation with the Solidworks special edition of "Workstation Tuning Guide" in association with Develop 3D.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization, it management, knowledge management, enterprise applications, data management, data center
    
AMD FirePro
Published By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security, application security, ddos, firewalls, hacker detection, security management
    
Arbor
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees, application integration, application performance management, workforce management, business technology, cloud computing, infrastructure
    
HP and Intel ®
Published By: Oracle     Published Date: Oct 20, 2016
This paper shows how Oracle is committed to supporting the Engineering an Construction industry with innovative solutions, such as Primavera P6 EPPM Cloud Service.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2016
This whitepaper reveals how Oracle recognises that the forces reshaping the engineering and construction industry require technology that can meet these demands. Oracle is committed to supporting the industry with innovative solutions, such as Primavera P6 EPPM Cloud Service.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2016
Download this whitepaper now to find out how Primavera P6 EPPM Cloud Service Oracle solution will support the Engineering and Construction industry.
Tags : 
    
Oracle
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Engineers are likely not who you would expect them to be. To create messages that resonate with this unique audience, you must understand them on a more personal level. Analyzing a recent worldwide survey of more than 2,600 engineering professionals, we help you get inside the minds of engineers and discover some surprising insights that enable you to relate to them on a deeper, more personal level.
Tags : 
    
Tyco Integrated Security
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations, business analytics, business intelligence, product lifecycle management
    
IBM
Published By: IBM     Published Date: May 27, 2015
Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.
Tags : 
continuous engineering, systems development, product development, data analysis, software development, it management, knowledge management, data management
    
IBM
Published By: VMware AirWatch     Published Date: Nov 13, 2015
Nella sessione keynote al WWDC 2014, il Senior Vice President Software Engineering di Apple Craig Federighi ha definito iOS come “un grande successo in azienda”, rilevando la vastità delle applicazioni aziendali specifiche per iOS, così come le funzionalità di gestione aziendale che Apple ha aggiunto al sistema operativo nel corso degli anni. Federighi inoltre ha indicato le nuove funzionalità di produttività che rendono Mac OS X Yosemite una piattaforma desktop attraente per gli utenti aziendali.
Tags : 
vmware, emm, mac management, managing macs, airwatch, it management, wireless, data management, business technology
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 13, 2015
Auf einer Keynote-Sitzung der WWDC 2014 nannte Craig Federighi, Apples Senoir Vice President of Software Engineering, iOS „ein Riesenerfolg im Unternehmen.“ Dabei betone er die Breite der iOS-gerechten Unternehmens-Apps, sowie die unternehmensspezifischen Verwaltungsfunktionen, die Apple dem Betriebssystem über die Jahre gegeben hat. Federighi wies auch auf die neuen Produktivitäts-Features hin, die Mac OS X Yosemite zur beliebten Desktop-Plattform für Unternehmensbenutzer machen würden.
Tags : 
vmware, emm, mac management, managing macs, airwatch, it management, wireless, data management, business technology
    
VMware AirWatch
Published By: Polycom     Published Date: Feb 16, 2017
"Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft."
Tags : 
polycom, business technology, roi, voice solutions, office 365, cloud pbx
    
Polycom
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information, hacker detection, security management
    
Microsoft Office 365
Published By: OpenText     Published Date: May 26, 2017
The global nature of today’s manufacturing industry means that it is more important than ever to ensure that all participants in the design and engineering process are able to access digital information relating to a product any time, or anywhere around the world.
Tags : 
opentext, manufacturing, design, engineering, information management
    
OpenText
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.