IT Management  >   Systems Design and Development  >   Application Development  >  

Computer-Aided Systems Engineering

RSS Feed    Add to Google    Add to My Yahoo!
Computer-Aided Systems EngineeringReports
 
Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Limited
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Limited

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Limited
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Limited

CAE Analysis in a Hybrid Compute Environment
sponsored by Cray
PRESENTATION TRANSCRIPT: This presentation transcript will review of some of the recent technology enhancements for high performance computing, on the hardware side, and also how this technology could be leveraged in a hybrid compute environment, specifically targeted for computer-aided engineering, or CAE.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Cray

Building the Modern Application Architecture
sponsored by Nginx, Inc.
WEBCAST: View this informative webcast to discover how application performance has evolved, and what modern tools you need to succeed. See how trends in app development has spiked performance expectations, and how you can meet those demands.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

Nginx, Inc.

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

How Critical is the Internet for Business Commerce?
sponsored by Akamai Technologies
VIDEO: This short video discusses the critical nature of the internet to all businesses today, from customer-facing websites to business-to-business transactions.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Akamai Technologies

The Total Economic Impact Of INetU’s Managed Server And Infrastructure Hosting
sponsored by INetU Inc.
WHITE PAPER: This resource examines the total economic impact and the real-world value of INetU's Managed Hosting services. You'll also get better insight into how this solution allows you to manage your networking and server environments so that you can focus on using the system data to run your day-to-day operations, improving efficiency and capaci
Posted: 30 Oct 2014 | Published: 28 Jun 2013

INetU Inc.

Business Process Automation: iHeart Studios Uses PaaS to Grow its Business
sponsored by Cisco & Fujitsu
VIDEO: In this video case study, learn how iHeart Studios harnessed a Salesforce-integrated application that tracks all steps of their business workflow. Learn about the direct benefits that iHeart enjoys now with an automated business process, and how they were able to grow their business 600% over 12 months.
Posted: 27 Oct 2014 | Premiered: 24 Mar 2014

Cisco & Fujitsu

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement