SlideShare a Scribd company logo
1 of 3
Download to read offline
Customer
Testimonials
Formoreinformation,contact us :
+33 (0)1 39 02 70 29
geraldine.dussain@k-inside.com
You can use arKItect too !
©KnowledgeInside
Copy&diffusionnot allowed
Gilles Deleuze - EDF
Management ofIndustrilas Risks
www.edf.fr
We made an experiment with Knowledge Inside about the
compliance between the arKItect platform and our safety
engineering tools.
During this research we really appreciated the availability,
responsiveness and most of all the skills of the people with
whom we’ve worked. In fact, their expertise in the safety field
is combined with remarkable programming proficiency which
allowed us to swiftly progress and reach an operational,
innovative and promising prototype.
© Knowledge Inside
Tel.+33(0)1 3902 7029
www.k-inside.com ©KnowledgeInside
Copy&diffusionnot allowed
I interfere with the WG24 workgroup affiliated to the ISO/JTC1/SC7
and the INCOSE’s workgroup named “Systems Engineering for VMSEs”. These
groups are interested in creating system engineering and management
processes for Very Small Entities according to the ISO 29110
standards.
Gauthier Fanmuy
ExpertSystemsEngineering
Design of system engineering processes fulfilling the requirements of
clarity and consistency of different levels of the system:
Our job is to describe the activities and deliverables associated with
them. We use arKItect for graphical presentations of these processes.
If the use of arKItect stands foremost in the context of modeling in
order to highlight inconsistencies within interfaces; it allows you to
design (via graphical
presentations) system engineering processes meeting clarity
and consistency requirements.
Highlighting inconsistencies:
An essential feature of arKItect : Immediately highlighting interface
inconsistencies on the graphical presentation, such as unproduced
inputs, (ex: lack of output data related to an upstream activity,
naming error, multiple producers...) or an unconsumed output.
We also used arKItect to design System Engineering processes in
accordance with INCOSE’s framework as described in the “Systems
Engineering Handbook”. This model will be used for the preparation of
the ASEP and CSEP certifications of INCOSE.
Tel.+33(0)1 3902 7029
www.k-inside.com ©KnowledgeInside
Copy&diffusionnot allowed

More Related Content

Similar to Customer testimonials

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijosBaltimax
 
Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation LetterDinesh Pal
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Aggregage
 
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...Thorne & Derrick International
 
Development of a Multi-eID access control system.
Development of a Multi-eID access control system.   Development of a Multi-eID access control system.
Development of a Multi-eID access control system. ePractice.eu
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
 
F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013Janne Järvinen
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryGilles Sgro
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Executive Leaders Network
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out SecurityFresche Solutions
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 

Similar to Customer testimonials (20)

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Svarbiausios ESET technologijos
Svarbiausios ESET technologijosSvarbiausios ESET technologijos
Svarbiausios ESET technologijos
 
Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation Letter
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
 
b-alien4cloud-en1_web
b-alien4cloud-en1_webb-alien4cloud-en1_web
b-alien4cloud-en1_web
 
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...
Ecom Instruments Hazardous Area Atex Mobile Devices - Phones, Laptops, Radios...
 
Development of a Multi-eID access control system.
Development of a Multi-eID access control system.   Development of a Multi-eID access control system.
Development of a Multi-eID access control system.
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013F-Secure Cloud Software icgse2013
F-Secure Cloud Software icgse2013
 
Validy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summaryValidy netinc nsa_ops1_ops2_executive summary
Validy netinc nsa_ops1_ops2_executive summary
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
La Bretagne au Milipol 2017
La Bretagne au Milipol 2017La Bretagne au Milipol 2017
La Bretagne au Milipol 2017
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 

Customer testimonials

  • 1. Customer Testimonials Formoreinformation,contact us : +33 (0)1 39 02 70 29 geraldine.dussain@k-inside.com You can use arKItect too ! ©KnowledgeInside Copy&diffusionnot allowed
  • 2. Gilles Deleuze - EDF Management ofIndustrilas Risks www.edf.fr We made an experiment with Knowledge Inside about the compliance between the arKItect platform and our safety engineering tools. During this research we really appreciated the availability, responsiveness and most of all the skills of the people with whom we’ve worked. In fact, their expertise in the safety field is combined with remarkable programming proficiency which allowed us to swiftly progress and reach an operational, innovative and promising prototype. © Knowledge Inside Tel.+33(0)1 3902 7029 www.k-inside.com ©KnowledgeInside Copy&diffusionnot allowed
  • 3. I interfere with the WG24 workgroup affiliated to the ISO/JTC1/SC7 and the INCOSE’s workgroup named “Systems Engineering for VMSEs”. These groups are interested in creating system engineering and management processes for Very Small Entities according to the ISO 29110 standards. Gauthier Fanmuy ExpertSystemsEngineering Design of system engineering processes fulfilling the requirements of clarity and consistency of different levels of the system: Our job is to describe the activities and deliverables associated with them. We use arKItect for graphical presentations of these processes. If the use of arKItect stands foremost in the context of modeling in order to highlight inconsistencies within interfaces; it allows you to design (via graphical presentations) system engineering processes meeting clarity and consistency requirements. Highlighting inconsistencies: An essential feature of arKItect : Immediately highlighting interface inconsistencies on the graphical presentation, such as unproduced inputs, (ex: lack of output data related to an upstream activity, naming error, multiple producers...) or an unconsumed output. We also used arKItect to design System Engineering processes in accordance with INCOSE’s framework as described in the “Systems Engineering Handbook”. This model will be used for the preparation of the ASEP and CSEP certifications of INCOSE. Tel.+33(0)1 3902 7029 www.k-inside.com ©KnowledgeInside Copy&diffusionnot allowed