assurance

Results 151 - 175 of 199Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 01, 2015
This white paper discusses how organizations can benefit from implementing collaboration and analytics processes in the three core areas
Tags : 
healthcare analytics, analytics technology, quality assurance, wellness monitoring, performance analysis, patient self-management
    
IBM
Published By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : 
critical security controls, csc adoption, enterprise information assurance, cybersecurity, security
    
Qualys
Published By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
    
Melissa Data Corp.
Published By: Melissa Data Corp.     Published Date: Nov 18, 2008
What are the long-term costs of bad data? This white paper gives you the answers and tells you how to fix it.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
    
Melissa Data Corp.
Published By: Electric Cloud     Published Date: Oct 13, 2009
In this whitepaper I argue that the person most affected by the introduction of agile or extreme programming techniques is not the software or quality assurance engineer, but the build manager. And the build manager can no longer make do with home grown tools; software production automation tools are required to make agile development a build reality.
Tags : 
electric cloud, agile development, coding, testing, code, software development, build, automation
    
Electric Cloud
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance, qradar, security, data management
    
IBM
Published By: thawte     Published Date: Aug 27, 2008
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, secure socket, authentication, identity management, identification
    
thawte
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
    
VeriSign Incorp.
Published By: Mentor Graphics     Published Date: Aug 20, 2009
Interest in DO-254 first occurred in Europe and has since spread to the US commercial aircraft industry. If you are being asked about your company's DO-254 direction and compliance, but have been overwhelmed with information on the subject, then this article is for you.
Tags : 
demystifying do-254, mentor graphics, airborne electronic hardware, hardware design assurance strategy, configuration management process, eda tools
    
Mentor Graphics
Published By: IBM     Published Date: Oct 17, 2013
In this Solution Spotlight, QA and test managers learn more about how they can be change agents to help ensure a smooth transition to Agile for their test teams, as well as tips on fitting testing into the development lifecycle.
Tags : 
ibm, solution spotlight, test, test managers, agile, agile testing, development, development lifecycle
    
IBM
Published By: IBM     Published Date: Oct 17, 2013
How do I determine the potential return on investment for improving my application development capabilities? If you have ever asked that question, this study, "The Total Economic Impact of The IBM Rational solution for Collaborative Lifecycle Management (CLM)", can help. IBM commissioned Forrester Consulting to interview IBM CLM clients and examine the potential return on investment (ROI) an organization may realize by deploying the solution for CLM in order to increase communication process efficiencies and time savings.
Tags : 
forrester report, ibm, ibm rational solution, collaborative lifecycle, collaboration, clm, collaborative lifecycle mangement, economic impact
    
IBM
Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management, product development, productivity, qa quality assurance
    
IBM
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper highlights securing business-critical transactions with digital transaction management.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign
Published By: Business-Software     Published Date: Apr 02, 2009
With help desk automation, companies can increase collaboration and information-sharing among the various departments that play a role in customer satisfaction, including customer service, product development, and quality assurance, as well as field consultants and support staff. Additionally, help desk automation can tightly integrate both internal and external support processes. Learn more today!
Tags : 
itil, itsm, service management, help desk, automation, customer satisfaction, loyalty, retention
    
Business-Software
Published By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : 
earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
EarthLink Business
Published By: HP     Published Date: Apr 13, 2014
Read the Lufthansa customer case study and learn how a Quality Center SaaS model enabled the airline to cut IT cost while providing 24 hour a day service.
Tags : 
compliance, cost-efficiency, hp quality center, it-governance, software as a service (saas), software development, software quality assurance, test management
    
HP
Published By: IBM     Published Date: Jan 10, 2014
Discover service virtualization and how it fits into the big picture of software quality.  In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost.
Tags : 
ibm, service virtualization, testing, development, test automation, user interface, quality assurance, architecture
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.
Tags : 
ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild". This loop of continuous delivery and continuous feedback is how the best mobile apps keep their users engaged and also produce the most compelling apps in the market. Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Featured Speaker: Leigh Williamson - IBM Distinguished Engineer You don't have to wait to get started...Start your free trial on Bluemix today! Or build something else in the Bluemix sandbox today!
Tags : 
mobile quality, mobile solutions, mobile apps, mobile development, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 26, 2015
Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development.
Tags : 
mobile quality assurance, mobile apps, time-to-feedback, mobile trends, it management, enterprise applications, data management, business technology
    
IBM
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware, software development
    
Symantec Corporation
Published By: Thawte     Published Date: Aug 08, 2013
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : 
thawte, ssl, validation, visibility, authentication, security, web browsers, enterprise applications
    
Thawte
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee