IT Management  >   Systems Design and Development  >   Application Development  >  

Computer-Aided Systems Engineering

RSS Feed    Add to Google    Add to My Yahoo!
Computer-Aided Systems Engineering Reports
 
Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Limited
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Limited

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Limited
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Limited

CAE Analysis in a Hybrid Compute Environment
sponsored by Cray
PRESENTATION TRANSCRIPT: This presentation transcript will review of some of the recent technology enhancements for high performance computing, on the hardware side, and also how this technology could be leveraged in a hybrid compute environment, specifically targeted for computer-aided engineering, or CAE.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Cray

Computer Weekly – 27 January 2015: Why we need cyber war games
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK and US are starting a cyber war – all in the name of testing each other's defences. We look at why the war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationships. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

ComputerWeekly.com

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

A Modular and Flexible Approach Integration: The Power of the End-User
sponsored by Presidio
WHITE PAPER: Access this white paper to discover four burgeoning end-user trends, including perseonalized self-service and a demand for collaboration. Learn how to prepare your portfolio for this new era of end-user focused IT, and what it means for your infrastructure.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Presidio

Istanbul Kultur University: Ready for the Future
sponsored by Hewlett-Packard Limited
CASE STUDY: Check out this case study that profiles one university in particular that needed to replace an ageing network infrastructure to accommodate high-performance wireless solutions.
Posted: 22 Jan 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited

IBM Cloudant: The Do-More NoSQL Data Layer
sponsored by IBM
WHITE PAPER: Access this resource to learn about a fully managed database-as-a-service approach that enables applications and their developers to be more agile. You'll learn how this approach provides a NoSQL data layer, delivered as a fully managed service, liberating developers from the cost, complexity, and risk of do-it-yourself data later solutions.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

IBM

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement