HIT Consultant Insightful coverage of healthcare innovation
 

it engineering

Results 126 - 150 of 190Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2014
This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, advancing product, traceability, engineering information, collaboration, engineering disciplines, collaboration process
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
This IBM ebook explains what systems engineering is and how it can help you simplify the development of smart, connected products.  Learn how to speed time-to-market, ensure business agility, deliver high-quality smart products, and cut costs.
Tags : 
ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.
Tags : 
ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
In this paper, IBM proposes that organizations relying on the traditional waterfall process for systems and software delivery-that is, an engineering governance model-need to make changes to reduce risk and improve results
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
IBM
Published By: Oracle     Published Date: Sep 05, 2014
The art and science of effective marketing and demand generation is like a great recipe- Marketing master chefs turn traditional pairings on their sides by re-engineering campaign planning and turning siloed fixings into successful mixings. Read seven master chefs’ recipes for their most customer-approved dishes.
Tags : 
demand, marketing, art, science, effective, re-engineering, recipes, dishes
    
Oracle
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability
    
NEC
Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management
    
IBM
Published By: Polycom     Published Date: Jul 24, 2014
Build or buy? When manufacturers have sought new leaders, they have typically done both: grooming talent in-house and paying market rates for the best thinkers and managers. With the growing STEM (science, technology, engineering, and mathematics) shortage, companies will be harder-pressed to buy – and keep – top technical talent. Emerging and established leaders will command premium prices and field continual offers, increasing the likelihood they’ll make frequent job changes, taking their industry and institutional knowledge with them. As a consequence, manufacturers will need to build their talent pipeline, empower knowledge workers with the tools and intelligence they need to succeed, and provide professional development opportunities that exceed what competitors offer. This will be a marathon, not a sprint. What’s key to making the race for talent successful: virtual training environments that accelerate learning and innovation.
Tags : 
polycom, management, virtual, training, development
    
Polycom
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management
    
Alert Logic
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts
    
McAfee
Published By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, product development, systems development, it engineering, business objectives, traceability, collaboration
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for you. This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, cut costs, systems engineering for dummies, revolutionizing requirements
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration
    
IBM
Published By: Plex Systems     Published Date: Feb 26, 2014
Aerospace and Defense manufacturers manage complex programs. With cyclical demands and tight time-to-market expectations, manufacturing is both an art and a science. You need an ERP system with close integration between engineering and manufacturing operations while supporting regulatory compliance.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management
    
IBM
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network
    
Noction
Published By: IBM     Published Date: Jan 02, 2014
Discusses why converged systems, such as IBM PureSystems platforms, can radically simplify the IT life cycle and how these changes can deliver business value by accelerating time to market, improving application performance, and reducing required staff time.
Tags : 
ibm, idc, puresystems, cut costs, increase agility, it life cycle, converged systems, application development
    
IBM
Published By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : 
advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions
    
Coveo
Published By: Adobe     Published Date: Nov 07, 2013
Audi differentiates its brand experience using web content and digital asset management capabilities in Adobe Experience Manager.
Tags : 
adobe, audi, audi cars, adobe marketing cloud, audi website, latest innovation, brand experience, head of brand portal
    
Adobe
Published By: Business Software     Published Date: May 28, 2013
Job shops often specialize in a particular metal fabrication, or a specialization around certain types of products, like fasteners or machined bar stock. They provide unique services for larger manufacturing operations such as working with unique materials, incredibly tight tolerances, the ability to generate quickly manufactured prototypes, design and CAD assistance, reverse engineering, quick-turn parts, in-house tooling, amongst other services. Some typical job shop operations include: • Machine Builders • Tool and Mold Shops • Plastic Processors • Stamping Houses • Contract Cutters and Engravers • Vehicle and Boat Converters • Niche Product Manufacturers • Furniture, Cabinet, and Display Makers
Tags : 
top 10 job shop vendors, metal fabrication, fasteners, machine builders, stamping houses, business software
    
Business Software
Published By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : 
rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks
    
Rapid7
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.