Ingeniøren Insights

Multifysiske simuleringer driver udviklingenTILMELD

Comsol multiphysics

Verden er multifysisk og derfor bør multifysiske simuleringer findes i al udvikling af produkter/komponenter. Det er simpelthen en nødvendighed når man skal analysere performance under forskellige forhold.

På dette INGENIØREN webinar vil Thure Ralfs fra COMSOL fortælle om anvendelsen af multifysike modeller og give hands-on demonstrationer på hvordan og hvor hurtigt man kan oprette og udføre multifysiske simuleringer.

På webinaret giver vi først et indblik i hvorfor og hvordan forskellige industrier bruger multifysik til at lave performancetests, men i høj grad også bruger multifysiske simuleringer til at komme hurtigere og længere i udviklingen af deres produkter.

Endelig slutter vi webinaret af med at tale om, hvordan simuleringerne også kan gøres tilgængelige for andre i virksomheden, der enten arbejder med relaterede produkter, eller hvor formålet kan være at dele viden med hele organisationen og frigive udviklingsressourcer til andre projekter.

Det får du ud af webinaret:

• Konkrete eksempler på situationer hvorfor multifysiske simulering er et absolut must
• Hvilke muligheder giver multifysik til dine simuleringer
•...

Læs mere

Læs også

Secure business continuity and reduce cost with Elastic Secure SD-WAN

Today, most businesses are highly dependent that their offices, employees—and even vehicles—are connected at all times and that resources can be accessed easily. And not simply accessed but connected to securely, with a high degree of protection to ensure business continuity.

10 Questions for Assessing Data Security in the Enterprise

It’s hard to imagine an organization today that does not rely on file servers, SharePoint or Office 365 for storing data, including valuable and sensitive information such as intellectual property and personal data. This makes these systems particularly attractive targets for all sort of attackers, from external hackers to disgruntled employees. To protect data from both external and internal threats, businesses must regularly conduct thorough data security assessments as part of their broader cyber security assessments.

Architecture & Engineering Industry Report: Trends and benchmarks in the Nordic region

The Deltek Clarity Architecture & Engineering Report identifies the key issues impacting the A&E market in the Nordics, uncovers how A&E firms are using technology to drive competitive advantage and helps you to benchmark your own firm’s performance against other Nordic firms along with competitors and peers in the wider EMEA region.

Secure Remote Working with the Zero-Trust Approach

Ever since COVID-19, remote working went into overdrive. This shift has also increased the usage of privately owned and unmanaged devices. This, in turn, has increased the demand for security tools that protect company data. The big question is: how to (really) secure remote working? In our new white paper, we introduce you to the zero-trust approach: a mindset that will help you make remote working safe- wherever your co-workers are and no matter which device they use. In the white paper, you’ll learn about:
• The downsides to VPN
• The meaning of zero-trust

Weakest Link: The Supply Chain Backdoor for AD Attacks

Cyberthreats stemming from the subcontracting chain represent a new major risk to businesses and government agencies. Looking at the attack models used in 2018 and 2019, cyberattacks exploiting the subcontracting chain doubled in 2019 over the previous year. This is a major development in the operational models of hacker groups: instead of going directly at the target, threat agents operate by first infecting a direct or indirect supplier of the intended victim.

Securing Active Directory: Proactively Detecting Attacks

Active Directory has been the main identity and access management solution for organizations over the past 20 years. That fact has not changed, yet the technology from Microsoft hasn’t changed much either. This stale IAM solution is known not only to admins but attackers. Organizations need to take a different approach when it comes to protecting their AD infrastructure, as well as all the resources on the network where AD is controlling and protecting access. Attackers have taken a highly sophisticated approach to attacking AD, from external and internal positions alike.

POS: Preventing Malware in Point-of-Sale Systems

In this whitepaper, Alsid looks at the resurgence of point-of-sale (POS) malware and what steps you can take to prevent it from infecting your networks. While organizations should follow regulations to protect credit card transactions, compliance isn’t always enough to safeguard data. Case in point, POS malware exploded in 2019. Restoring infected systems, settling lawsuits, and bandaging up reputational damage carried a hefty price tag. Target spent $18.5 million just in payouts from lawsuits from 47 U.S. states over a data breach of its POS systems.

Healthcare: A Cybersecurity Health Check

Cyberattacks against the medical and hospital sector exploded at the end of 2019. Organizations operating in the private medical services industry were the first victims of this tidal wave. Following this, hospital centers the world over were subject to particularly meticulous cyberattacks from cybermafia groups. It is important to fully understand the particularities of this sector and analyze in depth the pathways for improvement so that we can confront this new threat to the healthcare industry.

DCShadow Explained - A Technical Deep Dive into the New AD Attack

On January 24, 2018, security researchers Benjamin Delpy and Vincent Le Toux announced a new attack technique targeting Active Directory at the BlueHat IL security conference. Named DCShadow, this attack allows an attacker with certain rights to create a rogue domain controller and replicate malicious objects in an AD infrastructure. Here, we’ll explain the technical foundations of the attack, its impact on Active Directory security, and how blue teams can detect it.

Active Directory Holds the Keys to your Kingdom, but is it Secure?

Microsoft’s Active Directory (AD) is widely used by enterprises around the world to connect and manage individual endpoints inside corporate networks. AD, built into the Windows server operating
system, stores information about users, passwords, devices, applications, services, and operations across the IT infrastructure. It also and controls access to Windows networks, programs, and data.