Modeling Software Reports

Customer Testimonials for MIMIC® Simulator Suite
sponsored by Gambit Communications
PRODUCT REVIEW: Customer and Analyst Testimonials.
Posted: 30 May 2004 | Published: 01 May 2004

Gambit Communications

CFD for Mechanical Design Engineers: “A Paradigm Shift for Better Design”
sponsored by Mentor Graphics
WHITE PAPER: This paper provides CIMdata’s perspective on Computational Fluid Dynamics (CFD) analysis, including its motivation for use, value and future. It also describes Mentor Graphics’ FloEFD CFD analysis solution that is designed to provide product designers and engineers with direct access to CFD techniques directly in their design (CAD) environment.
Posted: 10 Jun 2010 | Published: 10 Jun 2010

Mentor Graphics

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Metastorm BPM Product Overview
sponsored by Metastorm
WHITE PAPER: Metastorm BPM empowers knowledge workers, managers, and executives to contribute to enterprise success in measurable ways. Click here to learn how Metastorm BPM helps organizations achieve Enterprise Process Advantage.
Posted: 10 Jul 2007 | Published: 01 Jul 2007

Metastorm

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly – 28 February 2023: The race to net zero
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.
Posted: 27 Feb 2023 | Published: 28 Feb 2023

TechTarget ComputerWeekly.com

Marketing software moves closer to centre of the CIO's vision
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Software for marketing, from content marketing through customer experience management to marketing automation, and the rest, has not been as central to the vision of CIOs as ERP and the full panoply of IT infrastructure: storage, security, networking, data centres, and all of the above delivered by way of the cloud.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com