seal

Results 1 - 25 of 52Sort Results By: Published Date | Title | Company Name
By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
     3D Systems
By: Adobe     Published Date: May 12, 2016
This white paper reveals the reason why integrating electronic signatures into the B2B sales cycle will save you both time and money.
Tags : esignature, digital signature, online signature, electronic signature, benefits of using esignatures
     Adobe
By: Adobe     Published Date: Mar 17, 2016
Learn why integrating electronic signatures into the B2B sales cycle will save you both time and money.
Tags : adobe, electronic signature, b2b, sales cycle
     Adobe
By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest “NonLinear ADaptivity” (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the “true” design solution.
Tags : 
     ANSYS
By: DocuSign     Published Date: Aug 17, 2016
In 2015, the speed and complexity of business continues to increase, with business leaders struggling to keep pace with the ever-changing demands of the market. Innovation rules the day: newer, more advance products, and shorter development timelines, mean that enterprises, in general, and procurement teams in particular, need to be agile.
Tags : 
     DocuSign
By: DocuSign     Published Date: Feb 13, 2017
On-Demand Webinar: Ardent Partners research, DocuSign, and a special guest from a major company’s procurement group discuss strategies and tools that modern CPOs and their procurement teams can adopt to become more agile, collaborative, and innovative throughout their supplier contract lifecycles.
Tags : 
     DocuSign
By: DocuSign     Published Date: Apr 12, 2017
In a 2015 survey of 318 procurement leaders, Ardent Partners research found that the majority still view the number one goals to be enhancing procurement's overall effectiveness and supplier influence in an organization. Download this research report to learn more about how you can utilize new technologies to reach optimal success.
Tags : 
     DocuSign
By: Dynapar Corp.     Published Date: Jun 22, 2008
As if the selection of manufacturer weren't enough, many encoders offered in today's marketplace are highly configurable. Resolution, shaft size, seal options and connector variations all confront the design engineer with serious choices. Output type is equally important. In this paper, we'll cover some of the more typical applications and common output types.
Tags : dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
     Dynapar Corp.
By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : mobile device management, mobile document sharing, risk mitigation, document security, byod, security, it management
     IBM MaaS360
By: Master Bond     Published Date: Jul 23, 2018
In this white paper, we explore how a one part system is constructed, how it can and should be used, and how it can be modified to achieve a variety of performance properties.
Tags : master bond, epoxies, adhesives, sealants, coatings
     Master Bond
By: Outreach.io     Published Date: Sep 17, 2019
The Navy SEALs — a highly skilled, extremely cohesive unit that can be deployed at a moment's notice to take on the toughest missions. The same tactics and training that make the SEALs so formidable and effective can be applied to your Sales Development team. In this guide, we will teach you how to take your best Sales Development Representatives (SDRs) and turn them into a highly actionable team of world-class prospectors, ready to do battle with the toughest of territories in the most efficient way possible. You'll learn: How to identify your standout SDRs and recruit them for special missions The best ways to measure, adjust and iterate your tactics with every evolution so you can book more qualified meetings and win more deals How to deploy your new SDR SEAL team to not only boost revenue, but to rescue struggling Account Executives
Tags : 
     Outreach.io
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid these attacks.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
By: Symantec     Published Date: Jan 04, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
     Symantec
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com