You can try the Advanced Course Search.
Or you can call (Mon-Fri, 9-8 US Eastern) or email us (anytime).
Download Brochures, View Online Catalogs:
Brochures: Eogogics Brochure
Catalogs: Telecom, Engineering, Technical Management, Leadership / Soft Skills
Slide Shows: Eogogics Intro, Eogogics Classes Worldwide
Technologies
Technologies: General
Blockchain, the Distributed Ledger Technology behind Bitcoin, has attracted interest across many industries including financial services, legal, real estate, digital rights, identity management, healthcare, asset tracking, supply chain management, and the Internet of Things (IoT). A disruptive technology, it has the potential to transform the way many transactions are conducted.
Related Courses :
“It’s not gum, that’s for sure. Looks like sports drink and it’s been here a while.” Is this the opening scene from a CSI TV show? Not quite. I had boarded the Sydney City Rail train at Central Station bound for Green Square. Morning commuters juggled their cups of coffee, newspapers and PDAs.
I count myself as one of the lucky people for many reasons, but one of the top reasons is my work with Eogogics Inc. I travel to some fairly exotic locales as an Eogogics faculty member, and I see parts of the world many folks do not.
The nature of much of the “training” that Eogogics does has been changing over the last twelve months. I hadn’t really noticed it until a training client brought it up. “This training session is really great”, he said. “It provides a “cheap” second opinion on a lot of our development directions.”
“Why don’t you offer online classes on emerging telecom technologies, so those of us who’re too busy to travel to public classes can keep up with the industry?” asked a fellow telecom exec in a recent conversation. “Aren’t there plenty of companies already offering free webinars?” I asked. “Yeah, but it’s not training. They’re all selling something: hardware, software, tools, or whatever” he countered.
Related Courses :
The F-117 Nighthawk stealth strike aircraft was a remarkable achievement: an aircraft so stealthy that its invisibility allowed adversaries to detect it. How? From indirect evidence.
Members of the press waited along with company executives and industry dignitaries for the long-anticipated unveiling of the WANG Professional Computer. The newest member of the WANG Laboratories’ computer family was a “blazing fast” MS-DOS machine boasting a 16 bit processor and up to 640 kilobytes of memory – “the most memory”, I recall Bill Gates saying – “that would ever be needed”. The date was April 5th, 1983.
If you enjoy science fiction, as I do, you know that it’s replete with visions of worlds enabled by technology, both utopian and dystopian. A world without hunger or disease on the one hand to one reduced to a post-apocalyptic state by nuclear, biological, or cyber warfare or by a “technological singularity” (where, e.g., the…
Technology and Society: Introduction In the halcyon days of technology development, just a few decades ago, advances were greeted with enthusiasm. Everyone expected a better life from new devices: computers, microwaves, and nuclear power, to mention a few. Environmental concerns, global warming, worker displacement, Intellectual Property Rights (IPR), energy conservation, and globalization were not on…
Related Courses :
Photography — like audio, video, telephony, and most other forms of communication — went digital many years ago. Digital images, whether from digital cameras, the Internet, or software programs, are used in nearly every industry as well as in science and technology, medicine, education, and many other areas. Because the images are digital, a vast…
Information Technology: Cloud Computing, Software Engineering
As of this writing, hundreds of MOOCs are being offered by US and foreign universities and millions of people have registered for them. But are they effective? They have been criticized for their lack of academic rigor. They also suffer from poor completion rates, with the bulk of participants dropping out in the first few days of the course. But they do offer the promise of making higher education and degrees accessible to a much larger chunk of the world’s population at a fraction of the cost, significantly reducing the cost of corporate training, and providing a convenient and cost-effective option for lifelong learning.
SDN and NFV have been developed to help meet the challenge of increasing demand for services and user expectation of rapid provisioning and universal availability. Both rely on virtualization, the ability to make a piece of equipment look like another via the magic of software. SDN was originally developed to address the problems of large data centers, where virtualization of hardware and operating system is important. It will likely spread to other areas, including the WAN, where virtualization and the ability to dial up bandwidth and related characteristics would be extremely valuable as well. NFV is an outgrowth of SDN in many respects, concentrating on backbone networks, where the need to rapidly reconfigure resources is key.
Related Courses :
Cloud computing appears simple but is very complex. The apparent simplicity has caused many organizations to move to cloud computing somewhat blindly, driven largely by promises of simplification which will result in cost savings, or just sheer cost savings. Cost savings alone is often enough cause for celebration. And, interestingly, the results achieved by those organizations who “just go for it” are, unexpectedly, usually very positive.
Related Courses :
If functional requirements are not capabilities of the system, what are they? Formal definitions of requirements almost universally agree on this essential characteristic of a functional requirement: it defines a transformation of inputs into outputs.
Related Courses :
Exchange is Microsoft Corporation’s premier email server. In the world of Internet, there are email servers and email clients. Servers are responsible for sending, receiving, and storing email messages and attachments; clients are needed to read these messages and download the associated attachments.
Mechanical Engineering and Manufacturing
Dimensional tolerances specify allowed variability around nominal dimensions. We assign tolerances to assure component interchangeability while meeting performance and producibility requirements. In general, as tolerances become smaller, manufacturing costs become greater.
Related Courses :
The tolerance assignment approach used by most organizations offers opportunities to reduce cost and improve quality through tolerance relaxation. While quality improvement based on relaxed tolerances seems counterintuitive, a quick look at how tolerances are assigned and the consequences of overly-stringent tolerances reveal why this is so.
To better define a part, Geometric Dimensioning and Tolerancing (GD&T) is often used as a symbolic way of showing specific tolerances on drawings. GD&T is a valuable tool that effectively communicates the design intent to manufacturing and inspection.
Related Courses :
How long has it been since your suppliers felt competitors chasing their business? If you have to think deeply to remember when you last made your suppliers compete, it’s been too long.
Related Courses :
Reliability Engineering
You know the problem: You’ve had a product in production for years with recurring failures you can’t seem to stop. Your people say it’s inherent to the product, and there’s nothing you can do about it. Production continues and so do the failures. You get to watch a sizeable chunk of your profits continue to move from the production line to the scrap bin.
Related Courses :
This curriculum offers courses and workshops on FMEA, Root Cause Failure Analysis (RCFA), Design of Experiments, and Industrial Statistics, besides an overview course on Reliability Engineering.
This paper presents a methodology for identifying and eliminating problem root causes, and specifically, the root causes of complex systems failures.
Related Courses :
This article describes a cluster bomb failure and outlines steps required to find and correct the failure’s root cause.
Related Courses :
Technical and Project Management
The other day, a colleague of mine asked me if I could sum up the benefits of Project Management in 10 words or less. “Pay me now or pay me later,” I said. Looking quizzical, he asked me to explain.
Related Courses :
EMV is a balance of probability and its impact over the range of possible scenarios. If you have to make a decision between two scenarios, which one will provide the greater potential payoff?
Related Courses :
There are many possible roles in a project. The obvious ones include the project sponsor who pays for the project, the project manager (PM) who directs the project, and various project team members who perform project work.
Related Courses :
This curriculum includes nearly two dozen courses on technical management, project management (including courses that meet the PMI certification requirements), engineering economics, cost reduction, and related management topics.
Powered by the expansion of connectivity fueled by IPv6, the Internet is quickly morphing from a ‘network of computers’ into a ‘network of things’, and this technology is developing at a much faster pace than other such technologies of the past. Smart phones, cars, homes, buildings, wearable computing devices, unseen but ubiquitous sensors embedded into appliances, equipment and infrastructure, and many other “things” (including living things such as cattle and wildlife) are all getting linked up into a vast and pervasive Internet of Things (IoT)! It’s a disruptive technology that — though largely invisible to consumers — will have profound impact on our everyday lives, how businesses operate, and on the world economy as a whole (multi-trillion dollars) — all in as little as five to 10 years.
Nearly every industry vertical stands to be transformed by the coming IoT revolution. The IoT technology is creating enormous opportunities for new services as well as more efficient delivery of existing services. The rapid pace at which this technology is evolving is also giving rise to major privacy/security risks for individuals, institutions, and public infrastructure — creating new vulnerabilities and giving rise to not-as-yet-thought-of attack modalities, including those of remotely engineered death and destruction. Yet, many businesses and government agencies wonder if this is all passing hype — which it is not — and many do not know how the IoT should fit into their organizational strategy.
So is your organization positioned correctly to benefit from this coming Internet of Things (IoT) revolution? Starting with this issue of the Eogogics Quarterly, we will be publishing a series of articles, courses, and research publications to help our readers better understand the underlying technologies, business and societal impact, potential, and market landscape of the Internet of Things (IoT). Featured in this issue are an article on distributed computing for the IoT and an update on the new courses and research publications on IoT that have been recently added to our product line-up. Are there IoT issues you’re interested in that are not covered by our courses and research publications? Call us (+1 703 345-4375) or drop us a line at [email protected]. We may be able to help.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Error: Contact form not found.