Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

engineering

Results 126 - 150 of 337Sort Results By: Published Date | Title | Company Name
Published By: WorkBook from Deltek     Published Date: May 04, 2018
Pöyry is an international consulting and engineering company that delivers smart solutions across power generation, transmission & distribution, forestry, chemicals & bio-refining, mining & metals, transportation and water. Pöyry’s net sales in 2016 were €530 million. The company’s shares are quoted on Nasdaq Helsinki (POY1V). Pöyry has approximately 5,500 experts in 130 offices across 40 countries delivering 10,000 projects each year. As a global firm, Pöyry wanted a single, integrated ERP solution that could provide transparency and realtime visibility into finance and projects, while streamlining operations and enhancing collaboration. After evaluating a number of solutions, the organization selected Deltek. Since implementing Deltek, Pöyry has experienced numerous benefits including increased visibility and better collaboration across the entire business.
Tags : 
deltek, delivery, financial, project, management, international, consulting, engineering
    
WorkBook from Deltek
Published By: Dassault Systèmes     Published Date: May 09, 2018
Today’s thriving High-Tech sector is driven by shrinking product lifecycles, rapid innovation, distributed engineering/manufacturing—and highly demanding customer expectations. The industry needs to deliver on multiple fronts, including: • Embed customer-centric innovation throughout the lifecycle: Only with customer experience at the core can companies stay ahead. • Tame ideas into executable products: Detecting early trends and using customer feedback is vital. • Manage complexity better: Increasing visibility of all product data helps build and manage digital models to use in every business function from R&D to field service. • Create relevant connected systems: High-Tech innovators use IoT for an ongoing dialogue of customers, devices and manufacturers. • Provide agility to compete on software, hardware and service: Customers want value from every interaction. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: May 09, 2018
Tight schedules, cost challenges and lack of visibility can strain relationships in the Architecture, Engineering and Construction (AEC) market. As new technologies raise owner expectations, you need to respond rapidly to customer needs with on-target solutions. You need to know how to anticipate and exceed owners’ expectations. You need to deliver on multiple fronts, including: • Be a partner not just a supplier: Owners are looking for irreplaceable partners who transparently deliver value. • Achieve more predictable outcomes: Partnerships build from developing plans, mitigating risks and delivering. • Deliver on time and on budget: Firms must meet expectations precisely and avoid costly waste and delays. • Be involved from day one: Owners now expect visibility and involvement across the project. • Deliver something unexpected: AEC firms need to deliver unique, surprising solutions. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes
Published By: Entelo     Published Date: Sep 06, 2017
With tech talent in high demand, understanding the networks engineers live and work in is fundamental to finding qualified people and establishing rapport. Learn how to leverage GitHub, Stack Overflow, and Hacker News to identify relevant candidates, assess their skill sets, and boost your company's engineering brand to stand out from competing recruiters. GitHub Lead Talent Strategist Tessa Wilder joins us to share recommendations on how to best use GitHub to connect with engineers. In this webinar, you'll learn: How to read a GitHub profile to understand an engineer's contributions, impact, and how to cross-reference this info with resumes and other social profiles Ways to use Stack Overflow's reputation score and tags to find active, notable engineers How to (tastefully) utilize Hacker News beyond a social news site to generate interest with tech candidates and find those actively seeking new opportunities
Tags : 
    
Entelo
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle is making significant engineering investments to ensure that Oracle systems coupled with Oracle software deliver the best possible business results. Integrated hardware, accelerated virtualization, and encryption ensure that cloud deployments benefit from the utmost agility and security without suffering performance losses. It’s never been easier to upgrade your legacy systems and take advantage of Oracle's cutting-edge infrastructure systems. Advanced data security, extreme efficiency with Software in Silicon and dramatic gains in performance make Oracle systems the best choice for your Oracle software deployments.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : 
message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
    
Message Systems
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, enterprise applications
    
Okta
Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite
Published By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
    
Genesys
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : 
customer, product lifecycle, aerospace, defense, management, plm, dassault
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : 
product development, engineering, companies, plm, product lifecycle management, market, designs, budget, dassault
    
Dassault Systèmes
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider
Published By: Motorola Solutions     Published Date: Apr 26, 2019
Rosen Hotels & Resorts was looking to improve its two-way radio communications. The organization had an aging analog radio system to support its existing properties, with the main antenna located at its tallest building, the 24-story Rosen Centre Hotel. However, with the opening of a new property, Rosen Shingle Creek, the lack of wide area coverage became an immediate concern. Employees situated across departments such as catering, engineering and security, and subpar radio connections hindered collaboration and a real-time flow of information.
Tags : 
    
Motorola Solutions
Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta, security, it management
    
Okta
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture, networking
    
Burton Group
Published By: HP Data Center     Published Date: Feb 18, 2009
The recent release of the Environmental Protection Agency (EPA) study on data center energy efficiency is adding fuel to the fire in the research and development of new ways to reduce energy use in centers. The findings, summarized on the EPA website, are staggering: Data centers consumed about 60 billion kilowatt-hours (kWh) in 2006, roughly 1.5 percent of total US electricity consumption -Energy consumption of servers and data centers has doubled in the past five years and is expected to almost double again in the next five years to more than 100 billion kWh, costing about $7.4 billion annually.
Tags : 
green data centers, epa, hp data center, energy consumption, server rack consumption, environmental protection agency, digital power, leed rating system, green grid, engineering economic principles, it hardware productivity, efficient site infrastructure, cooling, voc, co2 emissions, operational continuity, lifecycle cost, environmental impact, it effectiveness, power usage effectiveness
    
HP Data Center
Published By: CollabNet     Published Date: Jan 11, 2013
Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.
Tags : 
performance management, it operations, productivity, measurement
    
CollabNet
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities.
Tags : 
wifi, wireless, technology, network, cisco, cvd, deployment
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd, cisco, migration, network architecture, network management, cloud computing, data center design and management
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.