verification

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
     3D Systems
By: Amacai     Published Date: Oct 03, 2008
Data is at the core of your business. And yet, complete and accurate data is harder and harder to come by these days. Traditionally, the White Pages and Directory Assistance have been the main source of marketing data, whether it's direct marketing lists, base-file compilations or database verification and enhancement.
Tags : targusinfo, whitepapers, lead generation, whitepages, voip, wireless service
     Amacai
By: AWS     Published Date: Jun 11, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
     AWS
By: Background Direct     Published Date: Feb 16, 2015
Know who you are hiring with these important background check stats and tips from Background Direct™.
Tags : background checks, background direct, retention rates, employment screening, brand reputation, employment verification, first advantage
     Background Direct
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, data management
     Dell Software
By: DocuSign     Published Date: Feb 13, 2017
Watch this on-demand webinar for an overview of the latest trends and practices regarding the adoption, use, and verification of digital and electronic signatures for 2016 and beyond.
Tags : 
     DocuSign
By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates, erp, security verification, authentication
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : verification, ev certificates, identification, extended validation ssl certificates, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates, erp, security verification, authentication
     Entrust Datacard
By: Experian QAS     Published Date: Feb 25, 2013
Gain insight into the data quality trends as represented by the top e-commerce and m-commerce performers. Download the 2013 benchmark report to find the continued and emerging trends around address and email verification.
Tags : e-commerce, m-commerce, data quality, customer data verification
     Experian QAS
By: FICO - APAC     Published Date: Sep 19, 2017
The world is swiftly moving towards global tax transparency, new pillars to set the standards dominate reporting and compliance procedures. However, in this transition, businesses might be struggling with complying with new and changing reporting standards, and the efficiencies achieved as a result of the change. But thankfully there is this one simple solution available that nails the complexities of two reporting standards – FATCA and CRS.
Tags : identification process, standard, unified verification, case management, reports, fico, tonebeller, fatca, crs
     FICO - APAC
By: Freescale Semiconductor     Published Date: Jun 02, 2011
Aspects of functional verification of power aware security architecture
Tags : power, system on chip, security
     Freescale Semiconductor
By: Freescale Semiconductor     Published Date: Jun 02, 2011
Managing SOC verification database by synchronizing system calls
Tags : tesbench, soc, systemcall, system call
     Freescale Semiconductor
By: Freescale Semiconductor     Published Date: Jul 07, 2011
An outline of the steps required to reach parallel test execution
Tags : soc parallel verification
     Freescale Semiconductor
By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: HireRight     Published Date: May 01, 2013
Employee screening is a critical capability for organizations today. No longer just a part of the hiring process, employee background checks, eligibility verification and even tax credit screening are increasingly part of the ongoing talent life cycle. Aberdeen Group’s latest survey on talent acquisition strategies looked at the practices of over 480 organizations for best practices used and results delivered through the use of employee screening tools and solutions.
Tags : employee screening strategies, human resources, hireright
     HireRight
By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, (eda) applications, quad-core processors, 64-bit intel® xeon® processor, pre-silicon verification, automation, global design team and collaboration, simulation synthesis, layout versus schematic
     IBM
By: IBM     Published Date: Sep 02, 2009
This webcast presents an easy to follow process that you can use to capture requirements and specify a system architecture.
Tags : modeling, embedded software, ibm, sysml, seamless transition, model execution, dr. hoffman, rational harmony
     IBM
By: IBM     Published Date: Mar 10, 2015
This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.
Tags : ibm, product quality, continuous engineering, continuous verification, embedded software, it management, enterprise applications
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
     IBM
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping, software development, it management, enterprise applications, data management
     IBM
By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : ibm, gartner, cloud, cloud security, casb, ciso, security
     IBM
By: InsideUpbg     Published Date: May 12, 2015
Recruiting the right individuals is essential to a company’s success. It can be challenging, however, to work employment verification into an already full schedule when hiring new employees. That is why applicant tracking and employment verification services have become a must-have for any company with an ongoing need for qualified employees. These services are now widely used to help businesses ensure they are hiring the right person for the job.
Tags : 
     InsideUpbg
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com