Ingeniøren Insights

Multifysiske simuleringer driver udviklingenTILMELD

Comsol multiphysics

Verden er multifysisk og derfor bør multifysiske simuleringer findes i al udvikling af produkter/komponenter. Det er simpelthen en nødvendighed når man skal analysere performance under forskellige forhold.

På dette INGENIØREN webinar vil Thure Ralfs fra COMSOL fortælle om anvendelsen af multifysike modeller og give hands-on demonstrationer på hvordan og hvor hurtigt man kan oprette og udføre multifysiske simuleringer.

På webinaret giver vi først et indblik i hvorfor og hvordan forskellige industrier bruger multifysik til at lave performancetests, men i høj grad også bruger multifysiske simuleringer til at komme hurtigere og længere i udviklingen af deres produkter.

Endelig slutter vi webinaret af med at tale om, hvordan simuleringerne også kan gøres tilgængelige for andre i virksomheden, der enten arbejder med relaterede produkter, eller hvor formålet kan være at dele viden med hele organisationen og frigive udviklingsressourcer til andre projekter.

Det får du ud af webinaret:

• Konkrete eksempler på situationer hvorfor multifysiske simulering er et absolut must
• Hvilke muligheder giver multifysik til dine simuleringer
•...

Læs mere

Læs også

Phishing — Baiting the Hook

Almost any data scientist will tell you that a significant part of their time is spent on cleaning data to prepare it for analysis. Whether we’re talking about log files, event histories, or any other type of data, issues always need to be resolved before the work can begin. In some cases, it’s missing data. In others it’s outliers: events that skew the data or were misreported. Or maybe multiple data sets need to be brought together to form the data you want to analyze. No matter the cause, it takes time and work to ensure the most accurate data is available.

Financial Services — Hostile Takeover Attempts

In this report, we examine application programming interfaces, or APIs, that criminals target with credential stuffing attacks. When it comes to credential stuffing, the APIs we’re examining use REST and SOAP to access resources. This includes account summary pages with personal information, account records, and balances, as well as other tools or services within the platform. While they’re not directly comparable, both REST and SOAP are essentially methods of communication between applications. REST can be implemented in different ways, depending on the project.

Protect Your Online Business from Credential Stuffing - Stay Ahead of Threats with Advanced Bot Management Technology

With the proliferation of online applications, most users don’t practice good internet hygiene — often repurposing the same login credentials across multiple accounts. That makes every online business with a login page a potential target for credential stuffing, whether you’ve had a data breach or not. Your network and data can be properly secured, but your business is still exposed to fraud if you can’t see and stop credential stuffing before a successful combination is found.

Protecting Personal Data While Enhancing Customer Engagement: How To Manage PII and Boost Loyalty And Retention

Retailers need to develop ever-closer relationships with their customers in order to win their spend and improve loyalty. Many are increasing investment in personalised retail efforts and structured loyalty programmes to help to achieve these goals. By better identifying their customers, as well as their individual needs, retailers are able to target them more specifically, boosting their propensity to spend in the process. Yet it’s become harder than ever to meet these goals.

Akamai Edge Security Solutions

Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your business connected. Protecting those connections can be critical in a world of evolving security threats and changing business requirements. Mobile. Cloud. DevOps. Akamai can help. We understand the Internet and how you use it to drive your business forward.

Application Access Redefined: Managing the Modern Workforce

The paradigm shift sweeping enterprise technology and business gets more palpable by the day. The transition to cloud computing is near its tipping point. Mergers and acquisitions have burgeoned. And with a growing number of end users outside the corporate environment, IT departments need to serve an increasingly diverse, distributed, and demanding user ecosystem. Providing secure, application-specific access to enterprise systems and data has become more important than ever. And more challenging.

Sikkerhed – det usynlige internet

Når vi taler om ”Det usynlige internet”, så handler det måske i virkeligheden mere om ”usynligt indhold”, og om at effektiviteten af traditionelle IPS/IDS-systemer og firewalls er faldende på grund af den stigende brug af kryptering. Når næsten al datatrafik til internettet er krypteret, er det svært at se og analysere den reelle trafik mellem applikationerne. Dette har været en kendt udvikling i lang tid, men det er stadig noget, som mange har valgt ikke at forholde sig til. Problemet er på sin vis selvskabt, da det selvfølgelig er en god idé at benytte sig af kryptering.

Understanding the benefits of a hybrid-cloud SD-WAN strategy

Flexible, secure branch-to-internet connectivity has become a business imperative. Nearly every organization, distributed or otherwise, now relies on cloud-based technology, including software-as-a-service applications, cloud storage, or other cloud infrastructure, for mission-critical business activities.

Security Analytics

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know that you are protected? Most of us have firewalls, end point clients and authentication solutions, but do you know what they do? What threats they detect? What actions you should take to further improve your security? Security is complex and how do you know that you have proper protection if you’re not aware of what is happening in your network and to your users.

Secure business continuity and reduce cost with Elastic Secure SD-WAN

Today, most businesses are highly dependent that their offices, employees—and even vehicles—are connected at all times and that resources can be accessed easily. And not simply accessed but connected to securely, with a high degree of protection to ensure business continuity.