system requirements

Results 126 - 150 of 153Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plants overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec
    
Aventail
Published By: IBM     Published Date: Mar 17, 2009
Download this webcast replay to learn more about: Integrating Software Development and System Engineering, Integrated Requirements Engineering, Cross-Discipline Change and Configuration Management
Tags : 
ibm, telelogic, automotive system designs, mechatronics, electronic and software engineering, ptc, ibm rational, integrated requirements engineering
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
For most high tech companies, the Bill of Materials (BOM) is the central hub of product definition activities. It conveys the information needed by various departments to get the product to market.During this one-hour web cast, the AberdeenGroup will discuss how Best-in-Class companies are not only addressing these challenges but are excelling in their product development processes. In addition, PTC and IBM Rational will show how high tech manufacturers' can synchronize system requirements, multiple design disciplines and internal systems to provide a single definition of a product - 'a single source of truth' - throughout the product development process.
Tags : 
global bom development, bill of materials, ibm, telelogic, best in class, business continuity, ptc, ibm rational
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
This webcast presents an easy to follow process that you can use to capture requirements and specify a system architecture.
Tags : 
modeling, embedded software, ibm, sysml, seamless transition, model execution, dr. hoffman, rational harmony
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
This webcast presents the IBM® Rational® HarmonyT for Systems Engineering process for the model-based systems development.
Tags : 
model-based systems engineering, ibm, ibm rational harmonyt, model-based systems development, uml and sysml languages, requirements analysis, design synthesis, interface definition
    
IBM
Published By: Objectivity     Published Date: Aug 21, 2009
There is often a great deal of confusion in determining whether an object database management system (ODBMS) is right for you. Most of this confusion can be resolved by focusing on your application's requirements. In those situations where the application requires the very clear advantages of an ODBMS, choosing which ODBMS becomes a continuation of the exercise of analyzing those application requirements.
Tags : 
database performance, object-oriented, database development, objectivity, software development, high availability, database security
    
Objectivity
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 is a comprehensive solution for software developers, network administrators and IT departments wanting to integrate automated update capabilities into their software applications and business processes. Read through a comprehensive list of features, and learn about the system requirements of TrueUpdate 2.0.
Tags : 
software development, networking, it management, indigo rose
    
Indigo Rose Corporation
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Visual Patch 2.0 is a fast and efficient solution for software developers and content distributors who need to create software patches. Read through a comprehensive list of features, and learn about the system requirements of Visual Patch 2.0.
Tags : 
software development, software patch, patches, software updates, indigo rose
    
Indigo Rose Corporation
Published By: Infor     Published Date: May 25, 2007
Given the potential for SOA to solve pressing business problems, it’s inevitable that most companies will begin adopting SOA constructs within the next year or two. As they move to SOA, the approach they choose will have both immediate and long-term effects on their ability to support and adjust their ecosystem to meet future business requirements.
Tags : 
soa, service oriented architecture, service-oriented architecture, business management, business process management, bpm, customer service, infor
    
Infor
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals
    
Ecora Software
Published By: Tyco Electronics     Published Date: Jun 23, 2008
Adding ESD protection to your HDMI system design can be simplified by choosing the proper solution. Tyco Electronics' ESD and overcurrent protection reference layout complies with the HDMI 1.3 specification at 3.4GHz, helps meet the requirements of the IEC 61000-4-2 ESD protection specification, and optimizes board space, all of which helps minimize risk for designers.
Tags : 
esd, scm, plm, supply chain, product lifecycle, tyco, circuit protection
    
Tyco Electronics
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : 
network management, on-device network management systems, carrier-grade requirements, high availability, network scalability, tail-f, tailf, networking
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention
    
MessageLabs
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules, business management
    
IBM ILOG.
Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
    
ScriptLogic
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management
    
Attachmate
Published By: HP - Intel Xeon processors     Published Date: May 06, 2013
Whats needed today is storage thats flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel Xeon processors
Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM
Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organizations CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, todays CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega
Published By: Polycom     Published Date: Feb 16, 2017
" Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes; Small/Huddle Rooms Teaming Rooms Standard Meeting Rooms Executive Boardrooms Reconfigurable Spaces Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now."
Tags : 
polycom, business technology, wainhouse, collaboration
    
Polycom
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.