esi

Results 2676 - 2700 of 3049Sort Results By: Published Date | Title | Company Name
Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS
Published By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : 
abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: ITI     Published Date: Aug 21, 2009
The dynamic interaction between these parts is simulated using ABAQUS/Explicit. With the model, it is possible to predict the kinematics of the impact mechanism, including torque spike characteristics and driving speed. Key characteristics of the model have been validated by tests.
Tags : 
abaqus, explicit, impact driver, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: ITI     Published Date: Aug 21, 2009
This "paradigm shift" includes a move from a predominance of physical testing for product prototype validation to simulation-led problem solving and performance validation, using Computer Aided Engineering, and Design (CAE and CAD) tools.
Tags : 
product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: ITI     Published Date: Aug 21, 2009
Today 3D CAD models are driving the world's product development processes. Finite Element Analysis, Rapid Prototyping, NC programming, Data Exchange, and other downstream applications rely to a growing extent on the direct use of CAD models to streamline processes saving time and money.
Tags : 
supply chain, scm, supply chain management, computer aided design, cad models, cad model, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: LookSoftware     Published Date: Aug 21, 2009
SOA is a set of architectural and design principles that are probably new to most iSeries people. SOA considers an enterprise as consisting of many processes and services. SOA comes with the expected set of acronyms and jargon, such as "loose coupling" and "granularity" and is typically implemented with Web Services.
Tags : 
service oriented architecture, web service management, soa, application integration, look software, looksoftware, as/400
    
LookSoftware
Published By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : 
phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip, voice over ip, mbg, mgb
    
MBG
Published By: Metafuse     Published Date: Sep 26, 2007
In speaking with project managers, directors of operations, vice presidents of professional services, chief financial offers, and other project team members every day, we hear familiar stories repeatedly and there are some trends, or commonalities. This document outlines five of the most common project management challenges.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse, project insight
    
Metafuse
Published By: PTC     Published Date: Aug 21, 2009
This paper is designed to help CEOs, CFOs, and senior Engineering executives understand how and where to leverage the growing phenomenon known as Global Product Development as a means to gain a dramatic increase in productivity within their product development operation.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, ptc
    
PTC
Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo, domain name, hosting, web site design, website design
    
PTC
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper introduces the requirements for an XML infrastructure that is designed to ensure the opportunities and benefits of SOAs and Web Services can be realized.
Tags : 
soa, web services, xml, infrastructure, service oriented architecture, service-oriented architecture, xml infrastructure, reactivity
    
Reactivity
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
This white paper from Managing Automation Research Services addresses how these ideas can be applied by engineer-to-order manufacturers.
Tags : 
product design, product development, made to order, make to order, made-to-order, make-to-order, engineer to order, engineer-to-order, engineering, mars, manufacturing, supply chain, rulestream
    
RuleStream
Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
    
Secure Computing
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments
    
Texas Instruments
Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments
    
Texas Instruments
Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered, multi-tiered, multi tiered
    
TopLayer
Published By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : 
business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi, return on investment, winward
    
Winward
Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu
    
Nixu
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization’s growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area network, storage area networks, san, storage, storage performance, high availability, migration, storage migration, xiotech, storage management
    
Xiotech
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization's growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area networks, storage area network, san, san storage, storage, storage performance, storage management, offsite storage, off-site storage, xiotech
    
Xiotech
Published By: KM Sciences     Published Date: Dec 13, 2006
Microsoft Project has been the most popular project scheduling tool on earth.  But have you ever wanted to share your task and collaborate on task details, requirement specification, design discussions or track the functional progress?
Tags : 
collaboration, project management, knowledge management, collaborate, team management, project schedule, schedule, scheduling, productivity, ms project, microsoft, km science, km sciences
    
KM Sciences
Published By: Siperian     Published Date: Jan 24, 2007
Master Data Management is a cohesive strategy for managing all master data domains.  Where is your organization most likely to derive business value from a Master Data Management solutions?  This report answers these questions and details the path forward:  Adaptive Master Data Management.
Tags : 
data management, master data management, mdm, business intelligence, data integration, data quality, siperian
    
Siperian
Start   Previous    101 102 103 104 105 106 107 108 109 110 111 112 113 114 115    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.