design

Results 1676 - 1700 of 1931Sort Results By: Published Date | Title | Company Name

Best Practices for Developing Model Based Embedded Software with Bruce Douglas

Published By: IBM     Published Date: Sep 02, 2009
This webcast presents an easy to follow process that you can use to capture requirements and specify a system architecture.
Tags : 
modeling, embedded software, ibm, sysml, seamless transition, model execution, dr. hoffman, rational harmony, application integration, software testing, system on a chip, embedded systems and networking
    
IBM

Best Practices for Model-based Systems Engineering

Published By: IBM     Published Date: Sep 02, 2009
This webcast presents the IBM® Rational® HarmonyT for Systems Engineering process for the model-based systems development.
Tags : 
model-based systems engineering, ibm, ibm rational harmonyt, model-based systems development, uml and sysml languages, requirements analysis, design synthesis, interface definition, application integration, software testing, electronic test and measurement, embedded systems and networking
    
IBM

Questions to Ask a Potential Search Engine Optimization Company - Part 3

Published By: iDirect     Published Date: Jan 29, 2007
This article is the third and final part of a series designed to help you find a search engine optimization company that is worthy of your trust. In this installment, you will learn questions to ask search engine optimization companies in order to assess the business assurances that they have made.
Tags : 
search engine optimization, search marketing, seo, seo firm, seo firms
    
iDirect

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata, network security, access control, application security
    
Imprivata

Build .NET Applications Without Hand-Coding

Published By: Iron Speed     Published Date: Aug 21, 2009
See how Iron Speed Designer builds database forms, and reporting applications for .NET without hand-coding. Quickly create feature-complete custom applications that integrate Web pages, controls, data access, validation and security.
Tags : 
.net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code, application integration, web development, web services, web service management
    
Iron Speed

How Modern Code Generation Works

Published By: Iron Speed     Published Date: Aug 21, 2009
This white paper explains how to quickly create feature-complete custom database applications that integrate Web pages, controls, data access, validation and security.
Tags : 
.net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code, database development, scripting, web development, web services, oracle, database security
    
Iron Speed

Website Search -- 4 Steps to Deriving Measurable Benefits

Published By: ISYS     Published Date: Aug 21, 2009
The benefits to an effective search function on your website can be substantial. This white paper leads you through the process of designing and selecting your website search engine, in four easy steps.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search, web site search, search engines, site search, knowledge management, extranets, content delivery, content management system, search and retrieval, secure content management
    
ISYS

How to Create HTML for Modern Email Clients: a Guide for Designers and Marketers

Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS

Simulating Image Transfer Belt Tracking with ABAQUS/Explicit

Published By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : 
abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti, simulation software
    
ITI

Simulating an Impact Driver with ABAQUS/Explicit

Published By: ITI     Published Date: Aug 21, 2009
The dynamic interaction between these parts is simulated using ABAQUS/Explicit. With the model, it is possible to predict the kinematics of the impact mechanism, including torque spike characteristics and driving speed. Key characteristics of the model have been validated by tests.
Tags : 
abaqus, explicit, impact driver, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti, simulation software
    
ITI

The New Product Development Paradigm Led by Simulation and Testing

Published By: ITI     Published Date: Aug 21, 2009
This "paradigm shift" includes a move from a predominance of physical testing for product prototype validation to simulation-led problem solving and performance validation, using Computer Aided Engineering, and Design (CAE and CAD) tools.
Tags : 
product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti, enterprise resource planning, performance testing, product lifecycle management, simulation software
    
ITI

Engineering Supply Chain Data Exchange

Published By: ITI     Published Date: Aug 21, 2009
Today 3D CAD models are driving the world's product development processes. Finite Element Analysis, Rapid Prototyping, NC programming, Data Exchange, and other downstream applications rely to a growing extent on the direct use of CAD models to streamline processes saving time and money.
Tags : 
supply chain, scm, supply chain management, computer aided design, cad models, cad model, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti, simulation software
    
ITI

All You Need to Know About Service Oriented Architecture (SOA) and the iSeries

Published By: LookSoftware     Published Date: Aug 21, 2009
SOA is a set of architectural and design principles that are probably new to most iSeries people. SOA considers an enterprise as consisting of many processes and services. SOA comes with the expected set of acronyms and jargon, such as "loose coupling" and "granularity" and is typically implemented with Web Services.
Tags : 
service oriented architecture, web service management, soa, application integration, look software, looksoftware, as/400, software development
    
LookSoftware

Telecom & IT Consumption Management: The New Imperative

Published By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : 
phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip, voice over ip, mbg, mgb, total cost of ownership
    
MBG

Global Product Development: Moving From Strategy to Execution

Published By: PTC     Published Date: Aug 21, 2009
This paper is designed to help CEOs, CFOs, and senior Engineering executives understand how and where to leverage the growing phenomenon known as Global Product Development as a means to gain a dramatic increase in productivity within their product development operation.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, ptc, simulation software
    
PTC

From Concept to Customer: Winning Web Strategies for Small Business

Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo, domain name, hosting, web site design, website design
    
PTC

Architecting the Infrastructure for SOA and XML

Published By: Reactivity     Published Date: Aug 21, 2009
This white paper introduces the requirements for an XML infrastructure that is designed to ensure the opportunities and benefits of SOAs and Web Services can be realized.
Tags : 
soa, web services, xml, infrastructure, service oriented architecture, service-oriented architecture, xml infrastructure, reactivity, software development, data management, network architecture, analytical applications, web service management
    
Reactivity

The Value of Rules-Driven Product Management

Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream, project management
    
RuleStream

Rewriting the Rules for ETO Manufacturers

Published By: RuleStream     Published Date: Aug 21, 2009
This white paper from Managing Automation Research Services addresses how these ideas can be applied by engineer-to-order manufacturers.
Tags : 
product design, product development, made to order, make to order, made-to-order, make-to-order, engineer to order, engineer-to-order, engineering, mars, manufacturing, supply chain, rulestream, simulation software, supply chain management
    
RuleStream

Dude! You Say I Need an Application Layer Firewall?!

Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing, microsoft exchange
    
Secure Computing

Comparison of FTP and Signiant

Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery, information management
    
Signiant

WLAN Design Considerations for Stationary CE Applications

Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments, wireless, mobile data systems, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless service providers
    
Texas Instruments

Lower the Cost of Designing and Creating Reports for Enterprise Systems

Published By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : 
business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi, return on investment, winward, business metrics
    
Winward

Security Design Principles

Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security, firewalls, hacker detection, internet security
    
Nixu

Use of Efficient Data Storage Increases Revenue

Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization’s growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area network, storage area networks, san, storage, storage performance, high availability, migration, storage migration, xiotech, storage management
    
Xiotech
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.