engineering

Results 126 - 150 of 328Sort Results By: Published Date | Title | Company Name
Published By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : 
message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
    
Message Systems
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications
    
Okta
Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite
Published By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
    
Genesys
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : 
customer, product lifecycle, aerospace, defense, management, plm, dassault
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : 
product development, engineering, companies, plm, product lifecycle management, market, designs, budget, dassault
    
Dassault Systèmes
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider
Published By: Motorola Solutions     Published Date: Apr 26, 2019
Rosen Hotels & Resorts was looking to improve its two-way radio communications. The organization had an aging analog radio system to support its existing properties, with the main antenna located at its tallest building, the 24-story Rosen Centre Hotel. However, with the opening of a new property, Rosen Shingle Creek, the lack of wide area coverage became an immediate concern. Employees situated across departments such as catering, engineering and security, and subpar radio connections hindered collaboration and a real-time flow of information.
Tags : 
    
Motorola Solutions
Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta
    
Okta
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group
Published By: HP Data Center     Published Date: Feb 18, 2009
The recent release of the Environmental Protection Agency (EPA) study on data center energy efficiency is adding fuel to the fire in the research and development of new ways to reduce energy use in centers. The findings, summarized on the EPA website, are staggering: Data centers consumed about 60 billion kilowatt-hours (kWh) in 2006, roughly 1.5 percent of total US electricity consumption -Energy consumption of servers and data centers has doubled in the past five years and is expected to almost double again in the next five years to more than 100 billion kWh, costing about $7.4 billion annually.
Tags : 
green data centers, epa, hp data center, energy consumption, server rack consumption, environmental protection agency, digital power, leed rating system, green grid, engineering economic principles, it hardware productivity, efficient site infrastructure, cooling, voc, co2 emissions, operational continuity, lifecycle cost, environmental impact, it effectiveness, power usage effectiveness
    
HP Data Center
Published By: CollabNet     Published Date: Jan 11, 2013
Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.
Tags : 
performance management, it operations, productivity, measurement
    
CollabNet
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities.
Tags : 
wifi, wireless, technology, network, cisco, cvd, deployment
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd, cisco
    
Cisco
Published By: Plex Systems     Published Date: Feb 26, 2014
Aerospace and Defense manufacturers manage complex programs. With cyclical demands and tight time-to-market expectations, manufacturing is both an art and a science. You need an ERP system with close integration between engineering and manufacturing operations while supporting regulatory compliance.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Polycom     Published Date: Dec 18, 2017
Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft.
Tags : 
forrester, microsoft, polycom, communication integration, voice solutions, office 365, cloud pbx
    
Polycom
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data
    
LogRhythm
Published By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : 
social, engineering, fraud, cyber, security, scams
    
FICO
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Hospitals and other healthcare organizations must contend with a daunting set of challenges when deploying mobile technology. That’s why it’s important to develop a carefully planned mobility strategy. To be successful, your strategy will need strong senior level leadership, commitment, funding and resources. An interdisciplinary team should be gathered— including nursing, physicians, pharmacy, IT, ancillary care, biomedical engineering and finance—to develop a vision for a common technology infrastructure that supports all staff across the organization. This white paper highlights a five-step roadmap for building an effective mobility strategy.
Tags : 
five-step, roadmap, mobility, strategy, hospital
    
Zebra Technologies
Published By: Infosys     Published Date: May 21, 2018
Our client is a Finnish consulting and engineering company that deals with some of the world's toughest industries. Since 1958, the company has handled the power transmission system for the Swedish National Grid, revamped Salzburg railway station, and has been involved in 90 percent of the world's largest pulp mill designs. The nature of our client's work places unique demands on their IT infrastructure. Many of their projects require them to set up temporary offices in remote locations to deliver their engineering expertise, making seamless connectivity a critical business requirement. Large files, such as complex pipeline drawings, are passed between team members in different locations. Any outage that causes a delay in projects leads to potential financial penalties and damage to reputation.
Tags : 
landscape, company, industry
    
Infosys
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
Product design, engineering and manufacturing consulting company, Zeta Group LLC, uses a variety of SOLIDWORKS mechanical and electrical design solutions to deliver advanced automated manufacturing systems. By implementing these solutions, Zeta Group was able to cut design cycles by 50 percent and reduce customer scrap. This case study provides details about how Zeta Group streamlined, improved and accelerated development cycles with SOLIDWORKS.
Tags : 
zeta, solidworks, solutions, automation, manufacturing, business
    
Dassault Systemes SolidWorks Corp.
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
Kinder Design Inc., a design and engineering services consulting firm, developed the Lift Top — an adjustable desktop table which enables users to comfortably work in either a sitting or standing position. With SOLIDWORKS Premium software, the firm automated the design process, cut development time and reduced the number of prototypes. This case study shares how Kinder Design implemented SOLIDWORKS Premium design and analysis software to support services and drive innovative product development.
Tags : 
kinder, design, solidworks, development, streamline, production
    
Dassault Systemes SolidWorks Corp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.