validation

Results 176 - 200 of 213Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security, security
     Symantec
By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : symantec, malware, applications, security, code signing
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
     Symantec Corporation
By: IBM     Published Date: Mar 10, 2015
This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.
Tags : ibm, product quality, continuous engineering, continuous verification, embedded software, it management, enterprise applications
     IBM
By: Thawte     Published Date: Aug 08, 2013
Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security web browsers.
Tags : thawte, ssl, validation, visibility, authentication, security, web browsers, enterprise applications, data management
     Thawte
By: NEC     Published Date: Aug 12, 2014
As virtualization technology evolves and improves, the server performance and power requirements for supporting a virtualized data center increase. Your aging servers are struggling to meet increasing virtual workload demands. These older, lower-performing servers further tax your data center by consuming valuable space and power. You want to update, upgrade, and consolidate to a powerful new server solution that will provide an excellent virtualization platform. In this white paper, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.
Tags : consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, workload
     NEC
By: NEC     Published Date: Aug 12, 2014
We consolidated nine legacy servers into one NEC Express5800/A2040b enterprise server, and proved real benefits of doing so. In this infographic, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.
Tags : consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications
     NEC
By: IBM     Published Date: Sep 02, 2009
This webcast presents an easy to follow process that you can use to capture requirements and specify a system architecture.
Tags : modeling, embedded software, ibm, sysml, seamless transition, model execution, dr. hoffman, rational harmony
     IBM
By: Iron Speed     Published Date: Aug 21, 2009
See how Iron Speed Designer builds database forms, and reporting applications for .NET without hand-coding. Quickly create feature-complete custom applications that integrate Web pages, controls, data access, validation and security.
Tags : .net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code
     Iron Speed
By: Iron Speed     Published Date: Aug 21, 2009
This white paper explains how to quickly create feature-complete custom database applications that integrate Web pages, controls, data access, validation and security.
Tags : .net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code
     Iron Speed
By: ITI     Published Date: Aug 21, 2009
This "paradigm shift" includes a move from a predominance of physical testing for product prototype validation to simulation-led problem solving and performance validation, using Computer Aided Engineering, and Design (CAE and CAD) tools.
Tags : product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
     ITI
By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
     Ecora Software
By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix
     Netwrix
By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : security, appliance, detection, blocking, malware, threats, sandboxing, forensic reporting, websense, test, study
     Websense
By: Network Automation     Published Date: Dec 02, 2008
Accudata Technologies, provides flexible access to data validation through innovative technology and cutting-edge data transmission. Accudata serves as an access hub for validating information associated with telephone numbers, cellular numbers and IP locations while also providing line information database storage of phone numbers and corresponding information.
Tags : network automation, automate, accudata technologies, networking, it management
     Network Automation
By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
     IBM ILOG.
By: HP and Intel® Xeon® processors     Published Date: Feb 10, 2012
3cV is the combination of HP 3PAR Utility Storage with HP BladeSystem both powered by Intel® Xeon® processors and VMware virtualization solutions. Find out more now!
Tags : storage
     HP and Intel® Xeon® processors
By: IBM Corp     Published Date: Sep 23, 2011
ESG Lab Validation Report - Reducing Storage Capacity and Costs without Compromise. Even with the plethora of storage efficiency technologies-such as deduplication and thin provisioning-available in the market today, users have not been able to stem the growth. This ESG Lab report looks at how IBM Real-time Compression can be used to reduce the cost of storing primary file data without impacting performance. The results of hands-on testing of IBM Real-time Compression Appliances performed by ESG at an IBM facility is used to demonstrate the value of non-disruptive deployment, loss-less capacity savings, real-time performance, and non-stop high availability.
Tags : ibm, esg, lab validation, storage capacity, real-time compression, technology
     IBM Corp
By: IBM Corp     Published Date: Sep 23, 2011
Networked storage is being deployed in combination with server virtualization by an increasing amount of organizations interested in - consolidation, reduced costs, improved flexibility and availability of mission-critical applications. This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment. Download now to find out the results.
Tags : ibm, technology, esg, storage system, vmware, storwize v7000
     IBM Corp
By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml
     IBM Business Analytics
By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
     DataCore Software
By: Symantec     Published Date: Jun 29, 2012
Extended Validation SSL Increases Online Sales and Transactions
Tags : symantec, extended validation, ssl, phishing, e-commerce
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com