HIT Consultant Insightful coverage of healthcare innovation
 

re engineering

Results 26 - 50 of 230Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development
    
IBM
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: IBM     Published Date: Mar 24, 2009
Electronics and Software Engineering are quickly merging with traditional Mechanical Engineering to create a new paradigm in auto manufacturing: Mechatronics. Industry experts predict that this shift will bring about profound advances in automotive product development. Unfortunately, existing IT and process infrastructures do not provide sufficient capabilities to support the new paradigm: multiple data silos, a lack of standardized processes, and integration issues on a tool level (Mechanical, Electronic, Software) continue to pose serious obstacles to development efficiency, and remain a frequent source of delays, quality issues and cost increases.
Tags : 
ibm, ibm telelogic, automotive system design, mechanical engineering, mechatronics, oems, electronic stability programs, esp
    
IBM
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network
    
Noction
Published By: Silverpop Engage B2B     Published Date: Mar 24, 2009
B2B marketers, like their B2C colleagues, have diligently worked at perfecting the art of shaping customer and prospect perceptions. They have years of experience developing precisely targeted communications comprised of finely tuned content directed at the specific audiences they want to influence. Traditional brand marketing requires the engineering of messages that engender the right impressions about the company’s products in the marketplace. The traditional art of branding has grown and flourished for many years. But that’s all begun to change.
Tags : 
silverpop b2b, b2b, engagement marketing, engagement marketing, online customer engagement, crm, push marketing, pull marketing
    
Silverpop Engage B2B
Published By: Dassault Systèmes     Published Date: May 09, 2018
Tight schedules, cost challenges and lack of visibility can strain relationships in the Architecture, Engineering and Construction (AEC) market. As new technologies raise owner expectations, you need to respond rapidly to customer needs with on-target solutions. You need to know how to anticipate and exceed owners’ expectations. You need to deliver on multiple fronts, including: • Be a partner not just a supplier: Owners are looking for irreplaceable partners who transparently deliver value. • Achieve more predictable outcomes: Partnerships build from developing plans, mitigating risks and delivering. • Deliver on time and on budget: Firms must meet expectations precisely and avoid costly waste and delays. • Be involved from day one: Owners now expect visibility and involvement across the project. • Deliver something unexpected: AEC firms need to deliver unique, surprising solutions. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes
Published By: Igroup Ltd.     Published Date: Oct 28, 2008
The current gold standard as far as business technology goes is wireless/mobile computing. It’s what business and engineering courses are training the future workplace in using. It’s what provides an income stream and stock value to a whole mushrooming sector of the economy. It’s what makes large-scale projects in virtually any field not only easier to coordinate and complete, but also cheaper and faster all around. Finally, it’s what you and your company need to learn how to use, in order to maintain your lead over the rest of the competitive world.
Tags : 
igroup, mobile computing, wireless computing, mobile computing solutions, wireless strategy, wireless technology, mobile solution
    
Igroup Ltd.
Published By: IBM     Published Date: Sep 02, 2009
This webcast presents the IBM® Rational® HarmonyT for Systems Engineering process for the model-based systems development.
Tags : 
model-based systems engineering, ibm, ibm rational harmonyt, model-based systems development, uml and sysml languages, requirements analysis, design synthesis, interface definition
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Agile methods are increasingly popular in application, enterprise and embedded development. Yet the question remains: Do the 12 agile principles apply to more than just software? Find out how leading companies are beginning to exploit agile's iterative processes for far more than software.
Tags : 
ibm, ibm software, product development, systems engineering, agile organization, embedded development, enterprise, application
    
IBM
Published By: ASME     Published Date: Oct 03, 2019
When Verizon wanted to add new digital and internet-connected kiosks around New York City, they turned to Boyce Technologies and Boyce turned to 3D printing to save them time and money. Boyce Technologies is one of the leading manufacturers of security and communication equipment for the mass transit market in New York. Since incorporating large-format 3D printing, Boyce has seen firsthand how 3D printing helps compress the design, engineering, and production time so they can meet tighter deadlines and get to production faster. Boyce uses its BigRep large-format 3D printers across a variety of applications including prototyping, end-use parts, and vacuum forming molds. Download now to discover: Best practices for integrating 3D printing How a prototyping exercise turned into end use parts for Verizon kiosks around New York City Case studies for end use parts, molds, and prototypes Making the business case for investing in AM
Tags : 
    
ASME
Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta
    
Okta
Published By: Polycom     Published Date: Jul 24, 2014
Build or buy? When manufacturers have sought new leaders, they have typically done both: grooming talent in-house and paying market rates for the best thinkers and managers. With the growing STEM (science, technology, engineering, and mathematics) shortage, companies will be harder-pressed to buy – and keep – top technical talent. Emerging and established leaders will command premium prices and field continual offers, increasing the likelihood they’ll make frequent job changes, taking their industry and institutional knowledge with them. As a consequence, manufacturers will need to build their talent pipeline, empower knowledge workers with the tools and intelligence they need to succeed, and provide professional development opportunities that exceed what competitors offer. This will be a marathon, not a sprint. What’s key to making the race for talent successful: virtual training environments that accelerate learning and innovation.
Tags : 
polycom, management, virtual, training, development
    
Polycom
Published By: SAP     Published Date: Jun 23, 2009
Is your company seeking to incorporate finance as a core line of business? This SAP Executive Insight examines the changing role of the finance organization in today's business environment - and describes how companies can develop best-run finance organizations.
Tags : 
finance, sap, business realities, best-run finance organizations, executive insight, sox, agile, metric
    
SAP
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications
    
Okta
Published By: Pindrop Security     Published Date: Mar 21, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Published By: Cisco     Published Date: Jan 06, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities.
Tags : 
wifi, wireless, technology, network, cisco, cvd, deployment
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
customer engagement, business practices, technology, design management
    
Cisco
Published By: Nasuni     Published Date: Nov 19, 2014
The global architecture and engineering firm Environmental Systems Design, Inc., had enough capacity to handle its data. The challenge was protecting that data. The firm would often have 15TB of data in production at a given time and its existing backup solutions simply could not keep pace. After quickly outgrowing several other systems, ESD turned to Nasuni’s enterprise storage as a service. Now, thanks to Nasuni’s automated backup, which delivers unlimited versioning, fast disaster recovery and an unmatched RPO, IT can stop worrying about backup and focus on its core mission of enhancing business productivity.
Tags : 
automated protection, enhanced productivity, data protection, backup solutions
    
Nasuni
Published By: Cisco     Published Date: Jul 08, 2016
Cisco Helped to Deploy the World’s Largest 802.11ac Wave 2 Wireless Network for China University of Geosciences. China University of Geosciences at Wuhan is one of the country’s leading universities and a national key university directly under the Ministry of Education. Focusing on earth science, the university has national level-1 disciplines in geology, geological resources and geological engineering. in science and technology and a leader in applications instruction. Six years ago the university built a wireless network based on 802.11a/b/g—becoming the first university in Wuhan to deploy this type of wireless network—and has become one of the leaders among Chinese universities when it comes to wireless network development.
Tags : 
    
Cisco
Published By: Dell     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departments to spend less time managing separate data center components and more time proactively delivering value to the business. In this white paper, we compare the portfolio offerings of Dell EMC and HPE, and highlight significant benefits to be realized when partnering with the HCI market leader: Dell EMC. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.