Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

engineering

Results 226 - 250 of 316Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : 
ema radar, network management, systems, network, management, infrastructure, network architecture, network performance, network performance management
    
HP - Enterprise
Published By: Business Software     Published Date: May 28, 2013
Job shops often specialize in a particular metal fabrication, or a specialization around certain types of products, like fasteners or machined bar stock. They provide unique services for larger manufacturing operations such as working with unique materials, incredibly tight tolerances, the ability to generate quickly manufactured prototypes, design and CAD assistance, reverse engineering, quick-turn parts, in-house tooling, amongst other services. Some typical job shop operations include: • Machine Builders • Tool and Mold Shops • Plastic Processors • Stamping Houses • Contract Cutters and Engravers • Vehicle and Boat Converters • Niche Product Manufacturers • Furniture, Cabinet, and Display Makers
Tags : 
top 10 job shop vendors, metal fabrication, fasteners, machine builders, stamping houses, business software
    
Business Software
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees
    
HP and Intel ®
Published By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : 
message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
    
Message Systems
Published By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : 
rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks
    
Rapid7
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: CollabNet     Published Date: Jan 11, 2013
Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.
Tags : 
performance management, it operations, productivity, measurement
    
CollabNet
Published By: Red Hat     Published Date: Jan 01, 2013
IT provisioning was slowing Cigna’s developers. In response, they developed Infrastructure-as-a-Service (IaaS) self-service provisioning using Red Hat and Red Hat-supported open source projects. Success led to a development infrastructure that speeds results and boosts the bottom line.
Tags : 
red hat, cigna, provisioning processes, infrastructure-as-a-service, innovations, agility, seamless interactions, superior engineering, open source innovations, deployment
    
Red Hat
Published By: Webroot     Published Date: Nov 02, 2012
When IT administrator, Ty Smith deployed SecureAnywhere Business - Endpoint Protection, system wide, it quickly became clear that he had made the right choice, both from a security standpoint and a financial one.
Tags : 
endpoint security, endpoint protection, malware protection, antivirus software, case study, security
    
Webroot
Published By: Sage     Published Date: Nov 01, 2012
The E R H Group differentiates itself with integrated contract processing
Tags : 
integrated contract processing, construction, integrated software solution, key performance indicators, civil engineering
    
Sage
Published By: EMA     Published Date: Aug 22, 2012
Join EMA Research Director, Charles Betz, and Blazent Senior Director of Sales Engineering, Adam Clark, to learn how Blazent is pioneering a new approach to master data management that can greatly improve the business results from IT.
Tags : 
it infrastructure, data management, backup and recovery, data strategy, data quality, blazent, improving business results
    
EMA
Published By: AMD FirePro     Published Date: Apr 18, 2012
Help optimize the performance of your current workstation with the Solidworks special edition of "Workstation Tuning Guide" in association with Develop 3D.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization, it management, enterprise applications, data center
    
AMD FirePro
Published By: AMD FirePro     Published Date: Apr 18, 2012
A comprehensive overview of the AMD FirePro and Solidworks relationship, highlighting the key selling points, benchmarks, case studies, customer references, and much more.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization, it management, enterprise applications
    
AMD FirePro
Published By: Proofpoint     Published Date: Apr 06, 2012
Download Proofpoint's free email security whitepaper discussing the latest trends in email phishing attacks, how they work, and how to protect your email users against them.
Tags : 
phishing, email security, phish, email, attacks, blended threats, social engineering, outbound spam, anti-phishing, anti-virus, anti-malware, saas, proofpoint, security
    
Proofpoint
Published By: Cisco     Published Date: Jan 20, 2012
Read how Internetwork Engineering's customer, NCCAR, a NC based automotive research facility relies on Cisco Borderless Network to keep engineers connected to data and services anywhere, anytime.
Tags : 
cisco, engineering nccar, north carolina, borderless network, data, services, networking, auto, development
    
Cisco
Published By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
Thawte
Published By: BHC Rhodes     Published Date: Oct 06, 2011
Engineers at BHC RHODES in Overland Park, Kan., helped the city of Kansas City create and implement an effective system for tracking assets with RFID.
Tags : 
traffic, inventory, engineering, rfid
    
BHC Rhodes
Published By: Gates     Published Date: Aug 12, 2011
Field redesigns point the way to next-generation machines. This paper includes case studies showing how conversions from roller chain or gears to synchronous belt drives improved performance while saving maintenance and replacement costs.
Tags : 
gates, power transmission, engineering, oe manufacturing, field retrofits, field redesigns, drive designs, drive systems, designing drives, roller chains, gears, belt drives, v-belts, synchronous belt drives, retensioning, maintenance, energy efficiency, poly chain belts, poly chain gt carbon belt drive, powergrip belts
    
Gates
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This white paper shows how upgrading to LTO-5 technology and consolidating storage onto fewer tapes enables organizations to achieve a 5yr ROI and a 17-month payback period.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
Published By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Following are best practices amassed through working with leading global companies on learning initiatives.
Tags : 
jonckers, multilingual elearning, successful knowledge, training
    
Jonckers Translation & Engineering
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.