Ingeniøren Insights

X.e Case Study: Service Life of a Conveyor Belt DriveHent

Besides the oil seals, the shaft-hub connection and the lubricant used, the key factors in determining the service life of an industrial gear unit are the rolling bearings, the loads placed on them and the gearing’s load capacity for reliably transferring the torque.

These loads primarily result from the torques and the radial and axial forces that affect the output shaft of the gear unit during operation and are consequently transferred to the bearings. Other factors that influence the bearing service life are the type of gear oil, the oil level in the gear unit and the application’s ambient conditions.

Læs også

IEC 60601-1 standarden beskytter elektrisk medicinsk udstyr

Konsekvent ydelse og pålidelighed er kritisk inden for medicoteknik. Derfor bruger man ODU-forbindelsesteknik i eksempelvis stationære apparater som hjerte-/lungemaskiner. De pålidelige og robuste komponenter er også vigtige i lægens praksis og til mobil brug, hvad enten der er tale om EKG-målinger eller operationsborde til åben patientkirurgi. ODU muliggør størst mulig patient- og brugerbeskyttelse iht. IEC 60601-1 ved anvendelse af cirkulære konnektorer.

The Cisco Umbrella Advantage

Hvordan får du friheden til arbejde sikkert - hvor som helst og når som helst

I dag kan "arbejdskontoret" være hvor som helst og traditionelle sikkerhedsløsninger, kan ikke altid følge med de udfordringer, hjemmearbejde medfører. Men her kan Cisco Umbrella være en løsning. Cisco Umbrella er baseret på "predictive intelligence" og fungerer som "first line" forsvar mod trusler. Læs denne ebook om Cisco Umbrella og bliv klogere på de unikke fordele denne løsning kan give til virksomheder og organisationer.

Dette Whitepaper er sponseret af Cisco

2020 Open Source Security & Risk Analysis Report

Synopsys’ Open Source Security and Risk Analysis (OSSRA) report includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape.

To help organisations develop secure, high-quality software, the Synopsys Cybersecurity Research Center (CyRC) publishes research that supports strong cyber security practices.

Download the report for an in-depth snapshot of the current state of open source security, compliance, and code quality risk in commercial software

Undgå email-fejlsendinger og sikkerhedsbrud i din virksomhed

Med 269 millarder sendte emails per dag modtager de forkerte personer ind i mellem fortrolig information ved en fejl. Dette kan undgåes med en god DLP-løsning. Dette whitepaper er en guide til, hvordan du kan udvælge og implementere Data Loss Prevention-løsninger (DLP) til at styrke sikkerheden i din virksomheds email-håndtering.

State of email security 2019

Hvis du ved, hvad du skal kigge efter og være opmærksom på, er halvdelen af kampen vundet. Download denne rapport, og forstå de mest aggressive typer e-mail-trusler, hvordan sikkerhedsfolk ser dem, og hvad de gør for at kæmpe mod dem. Og vigtigst: Du går derfra med reelle værktøjer til at forbedre din organisations e-mail-sikkerhed og cybermodstandsdygtighed.

Få via 1.025 globale it-beslutningstagere et værdifuldt indblik i e-mail-baserede angreb, cybermodstandsdygtighed, forretningskontinuitet, opmærksomhedstræning og trusselsefterforskning.

Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

Today’s vehicle is a connected, mobile computer, which has introduced an issue the automotive industry has little experience dealing with: cybersecurity risk. Automotive manufacturers have become as much software as transportation companies, facing all the challenges inherent to software security.

4 Software Compliance Gotchas to Avoid

Many people think software quality and software compliance are completely separate topics. In reality, software quality and compliance are closely related: Well-written, high-quality code is less likely to contain the bugs, security vulnerabilities, and structural issues named in software standards. In short, writing quality code goes a long way toward writing compliant code. But the quest for software compliance doesn’t end there.

Modern development teams face significant challenges as they make their way through the complex software standards landscape.

Privileged Access Management (PAM) as a Service - for Dummies

If protecting privileged access is so critical to protecting a company’s crown jewels, why aren’t companies doing more to guard against these types of attacks? Well, the good news is if you pick up this book, you likely have an interest in learning and doing more. By using this knowledge, you can help your company mitigate against privileged access security risks.

With IT infrastructure, platforms, and software all rapidly moving to “as a service” models, we also examine how you can help your company successfully run Privileged Access Management (PAM) as a Service.

Medarbejdervalg – en vejledning til IT-afdelinger

For at forblive konkurrencedygtige er det vigtigt, at virksomheder kan tilbyde deres medarbejdere de bedste værktøjer til arbejdet. Apples produkter er de bedste værktøjer til virksomheder, fordi de er enkle og intuitive og samtidig effektive, sikre og lette at implementere. Mac, iPad eller iPhone – alle Apple-produkter muliggør problemløsning på kreative måder og giver gnidningsfrie oplevelser, der øger medarbejdernes produktivitet.

Why IT leaders should consider a zero trust network access strategy

While technology has long been considered an engine necessary to keep the business moving forward, it is now recognized as a true business driver, capable of creating new efficiencies, capabilities, and revenue opportunities as well. The role of the IT leader has similarly evolved, with CISOs, CIOs, and CTOs now part of the executive suite due to a new strategic focus on technology.