RSS feed Get our RSS feed

News by Topic

control

Results 2026 - 2050 of 2259Sort Results By: Published Date | Title | Company Name
By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
     Dynapar Corp.
By: IFS     Published Date: Aug 15, 2011
Learn to use IFS Applications to achieve ISO/TS 16949, the global standard for quality control in the automotive industry.
Tags : ifs applications, iso/ts 16949, event management, quality control, automotive industry, quality assurance, document management, tqm
     IFS
By: Inductive Automation     Published Date: Jun 23, 2008
In this case study, Bronco Wine Company, Ceres, Calif., (the producer of “Two-buck Chuck”) uses FactoryPMI for enterprise-wide process monitoring, control and troubleshooting. It was a business decision to use this technology, and is paying off handsomely for the Franzia family-owned business.
Tags : bronco, manufacturing, plant management, winery, inductive automation, plm
     Inductive Automation
By: IQS     Published Date: Jun 23, 2008
Compliance initiatives typically have been viewed as overhead projects. In this white paper, learn how you can turn your compliance initiatives into a competitive advantage.
Tags : plm, compliance, manufacturing, quality control, quality assurance, iqs
     IQS
By: Laser Design Inc.     Published Date: Jun 23, 2008
A manufacturer of glass tableware noticed a decline in the quality of a glass mug it produced because of wear in its cavity mold. This case study illustrates the investigation process that determined where the errors were occurring so corrections could be made.
Tags : production, quality, quality assurance, quality control, manufacturing, laser, lasers, laser design
     Laser Design Inc.
By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : project management, project success, psi
     Project Success, Inc.
By: Watlow     Published Date: Jun 23, 2008
Ethernet communications is rapidly gaining popularity in industrial applications because it enables the real-time exchange of information between processing equipment and companies' Ethernet-based management systems. The emergence of protocols such as EtherNet/IP enables engineers to attain the advantages of using Ethernet in industrial applications.
Tags : ethernet, engineering, productivity, watlow
     Watlow
By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec
     NCP Engineering GmbH
By: HighRoads     Published Date: Jul 29, 2008
How bad has the impact of the high costs of benefits become? For the past five years, the cost of healthcare rose at double-digit rates, greater than the growth of wages or inflation. The high cost of employee benefits is one of the primary reasons preventing leading companies from achieving their financial objectives.
Tags : workforce, highroads, benefits, employee, employees, human resources, hcm, human capital
     HighRoads
By: KEMP Technologies     Published Date: Aug 04, 2008
KEMP Technologies LoadMaster Application Delivery Controller and Server Load Balancer appliances provide full support for Microsoft Windows Terminal Services (WTS). The LoadMaster WTS capabilities helps organizations maximize the efficiency and effectiveness of their networks. KEMP delivers this at an affordable price.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: KEMP Technologies     Published Date: Aug 04, 2008
Kemp Technologies’ LoadMaster Application Delivery Controller (ADC) and Server Load Balancer (SLB) appliances are low energy consumers. Reducing energy use at the point of consumption, LoadMaster provides benefits to other areas by reducing load on power and cooling facilities, which in turn reduce their own energy use.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Marketo     Published Date: Nov 04, 2011
Did you learn everything you needed to during your marketing automation demo? Use this checklist to feel confident about the six critical areas of marketing automation. This checklist covers topics including functionality, branding and design control, and marketing campaign creation.
Tags : marketo, marketing automation, demo, whitepaper, checklist, branding, design control, crm solutions/software
     Marketo
By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
     LogRhythm
By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
     LogRhythm
By: Icron     Published Date: Sep 26, 2008
TV 2.0 offers TV Viewing PLUS complete control of all PC applications from the comfort of your couch. The complete convergence of the PC and TV has arrived. Read more in this white paper by Icron Technologies Corporation.
Tags : icron, tv. 2.0, catv, web surfing, video streaming, gaming, music, facebook
     Icron
By: Godfrey     Published Date: Oct 02, 2008
A key difference between consumer and business-to-business branding is the influence of selling channels, including sales reps, dealers and distributors. While many consumer products are also sold through a channel, the marketer generally reaches past the channel with branding messages, relegating the channel to the status of a local point of sale. By contrast, in many B-to-B markets, the local dealer or distributor really “owns” the end customer and can control access and communications to and from the customer.
Tags : godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b brand, distribution, b-to-b distribution
     Godfrey
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: OrderDynamics     Published Date: Dec 01, 2008
OrderDynamics provides an example of it helped a high growth brand deliver a superior online shopping experience for its consumers while maintaining flexibility and control over their web design.
Tags : orderdynamics, balmshell, customer service, ecommerce, e-commerce solutions
     OrderDynamics
By: OrderDynamics     Published Date: Dec 08, 2008
OrderDynamics provides an example of it helped a high growth brand deliver a superior online shopping experience for its consumers while maintaining flexibility and control over their web design.
Tags : orderdynamics, balmshell, customer service, ecommerce
     OrderDynamics
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : aprimo, marketing process, financial control, digital asset management, data management
     Aprimo, Inc.
By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization, security
     Prodiance Corp.
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, security
     Prodiance Corp.
By: Orbitform Group     Published Date: Jan 07, 2009
Today, resistance welding takes many forms across numerous applications in diverse market seg-ments. While each company must decide the most efficient welding technology for its various operations, the parameters that govern such decisions often change, sometimes rather quickly over short time intervals. This means decision makers must constantly monitor welding processes to ensure the right technology is applied to each application and done so in a cost effective manner.
Tags : orbitform, welding process control, resistance welding, welding technology, wlan, wan
     Orbitform Group
By: Cisco     Published Date: Mar 15, 2011
This whitepaper discusses how the Cisco Unified Computing System and Cisco Tidal Enterprise Orchestrator can help IT departments to control costs, improve efficiency, and speed service delivery to the business.
Tags : cisco, run book automation, unified computing system, operations management, automated infrastructure platform, tidal enterprise orchestrator
     Cisco
Start   Previous    75 76 77 78 79 80 81 82 83 84 85 86 87 88 89    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics