HIT Consultant Insightful coverage of healthcare innovation
 

it engineering

Results 101 - 125 of 190Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2014
In this paper, IBM proposes that organizations relying on the traditional waterfall process for systems and software delivery-that is, an engineering governance model-need to make changes to reduce risk and improve results
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : 
mobile malware, mobile usage, mobile security, cybercrime
    
IBM
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations
    
IBM
Published By: IBM     Published Date: Mar 10, 2015
This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.
Tags : 
ibm, systems engineering, plm, alm, product quality
    
IBM
Published By: IBM     Published Date: Mar 10, 2015
This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.
Tags : 
ibm, product quality, continuous engineering, continuous verification, embedded software
    
IBM
Published By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : 
continuous verification, product development, product engineering, mobile, prototyping
    
IBM
Published By: IBM     Published Date: Jul 29, 2015
By unlocking engineering insight with IBM solutions, organizations can deliver fast, easy access to engineering information - across multiple disciplines - so engineers can make the right decisions at the right time to speed development, improve quality and advance innovation. Learn more in this IBM white paper.
Tags : 
engineering, interconnectivity, ibm, innovation, optimization, internet of things, engineering information, development
    
IBM
Published By: IBM     Published Date: Jul 29, 2015
This white paper explores how you can use the best practices of continuous engineering to harness the power of the IoT and increase the pace of innovation to obtain a strategic advantage.
Tags : 
internet of things, product development, continuous engineering, innovation, optimization, development, strategy, consumer expectations
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
By unlocking engineering knowledge with IBM Rational solutions, organizations can deliver fast, easy access to engineering information - across multiple disciplines - so engineers can make the right decisions at the right time to speed development, improve quality and advance innovation.
Tags : 
ibm, engineering, innovation
    
IBM
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development
    
IBM
Published By: iDirect     Published Date: Aug 21, 2009
The Internet boom continues to grow as more and more businesses, residential and SOHO clients start using the Internet. As service providers begin to scale their networks to accommodate this tripledigit growth, traffic engineering and scalability of the network has been of utmost importance.
Tags : 
soho, soho security, service providers, network scalability, traffic management, network expansion, idirect
    
iDirect
Published By: Igroup Ltd.     Published Date: Oct 28, 2008
The current gold standard as far as business technology goes is wireless/mobile computing. It’s what business and engineering courses are training the future workplace in using. It’s what provides an income stream and stock value to a whole mushrooming sector of the economy. It’s what makes large-scale projects in virtually any field not only easier to coordinate and complete, but also cheaper and faster all around. Finally, it’s what you and your company need to learn how to use, in order to maintain your lead over the rest of the competitive world.
Tags : 
igroup, mobile computing, wireless computing, mobile computing solutions, wireless strategy, wireless technology, mobile solution
    
Igroup Ltd.
Published By: Infosys     Published Date: May 21, 2018
Our client is a Finnish consulting and engineering company that deals with some of the world's toughest industries. Since 1958, the company has handled the power transmission system for the Swedish National Grid, revamped Salzburg railway station, and has been involved in 90 percent of the world's largest pulp mill designs. The nature of our client's work places unique demands on their IT infrastructure. Many of their projects require them to set up temporary offices in remote locations to deliver their engineering expertise, making seamless connectivity a critical business requirement. Large files, such as complex pipeline drawings, are passed between team members in different locations. Any outage that causes a delay in projects leads to potential financial penalties and damage to reputation.
Tags : 
landscape, company, industry
    
Infosys
Published By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : 
abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad
    
ITI
Published By: ITI     Published Date: Aug 21, 2009
The dynamic interaction between these parts is simulated using ABAQUS/Explicit. With the model, it is possible to predict the kinematics of the impact mechanism, including torque spike characteristics and driving speed. Key characteristics of the model have been validated by tests.
Tags : 
abaqus, explicit, impact driver, product development, product testing, cad, computer aided design, cad
    
ITI
Published By: Kaminario     Published Date: May 05, 2016
Is there that much of a future for magnetic spinning disk? Even if manufacturers could move to 30,000 rpm disks with better areal density, the constraints in the engineering and physical capabilities of magnetic disks will still put them orders of magnitude behind flash-based systems in overall performance terms.
Tags : 
storage, manufacturing, best practices, business management, preformance
    
Kaminario
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data
    
LogRhythm
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts
    
McAfee
Published By: Mentor Graphics     Published Date: Mar 10, 2010
This white paper explains the impact of the latest advances in CFD software that helps companies use CFD to improve product performance, reduce time to market, and lower engineering costs.
Tags : 
mentor graphics, engineering, mechanical design
    
Mentor Graphics
Published By: Micro Focus     Published Date: Apr 27, 2011
This white paper and accompanying webcast highlight what makes VisiBroker the best fit for mission critical needs, and how its intelligent engineering delivers high throughput and reliability for both server-centric and decentralized application architectures, and onto the cloud.
Tags : 
micro focus, visibroker, corba, object request broker, distributed application
    
Micro Focus
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Engineering firm Barge Waggoner Sumner & Cannon, Inc. needed to collaborate more efficiently across its 11 offices in the eastern United States. The firm chose ProjectWise collaboration software for engineering content management, content publishing, and design review, and integrated it with Microsoft® Office SharePoint® Server 2007, to manage business processes and documents in a distributed environment. Find out more.
Tags : 
microsoft, sharepoint server, application virtualization
    
Microsoft Office SharePoint Server
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.