eu data

Results 176 - 200 of 204Sort Results By: Published Date | Title | Company Name
Published By: iboss     Published Date: Jan 22, 2018
When the General Data Protection Regulation (GDPR) replaces the European Union’s Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.
Tags : 
iboss, gdpr, gdpr compliance, compliance, general data protection regulation
    
iboss
Published By: IBM     Published Date: Sep 10, 2013
This white paper will discuss how big data analytics, coupled with the right facilities and asset management software, can provide next-generation opportunities to improve facilities and asset management processes and reutnrs. It will examine how different organizations successfully use big data generated by their facilities and assets to help increase revenue, power operational efficiency, ensure service availability and mitigate risk. Most importantly, this white paper will reveal how your organization can leverage big data analytics to achieve similar benefits and transform the management of your organization's facilities and assets-and ultimately, your business.
Tags : 
big data, smarter infrastructures, big data, ibm, power operational, leverage big data, analytics, harnessing the power of data
    
IBM
Published By: PassGo     Published Date: Aug 21, 2009
The law in the United Kingdom has various influences on organizational information security policy. As well as protecting the rights of individuals and organizations, it also imposes many duties and responsibilities. For organizations to meet their legal obligations a number of technical controls can be put in place.
Tags : 
information security, europe, security policies, policy based management, compliance, united kingdom, european, database security, data security, passgo, pass go
    
PassGo
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: SchemaLogic     Published Date: Jun 11, 2008
In the Life Sciences industry, information is the source of innovation. Vast varieties of content and information sources feed the development pipeline. The ability to create, share, navigate, find and protect essential information is critical to research and development groups, clinicians, regulatory agencies, marketing teams, and those who benefit the most - customers.
Tags : 
pharm, pharmaceutical, pharmaceuticals, medicine, life science, chemistry, chemical, biological, metadata, mdm, metadata management, schemalogic
    
SchemaLogic
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration
    
Prodiance Corp.
Published By: SAS     Published Date: Apr 16, 2015
ITS technology is a general term. Two common and related forms of ITS communication technology using event stream processing are referred to as vehicle-to-vehicle (V2V) and vehicle to-infrastructure (V2X) in the US, and car-to-infrastructure (Car2X) in Europe. The two types of connected-car research and development programs often overlap and can be integrated. Car2X enables vehicle communication with the road transportation infrastructure and provides the ability to send or receive local information about traffic conditions, geo-markers (e.g. to identify pothole locations), road hazards, alerts, safety vehicles, etc. V2V focuses on connected-car technology and the anonymous communication of sensor data continuously transmitted to and from cars. Using event stream processing, this streaming data enables the real-time synthesis of information to communicate what will improve and promote driver safety, reduce crashes, and improve vehicle transportation efficiency.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 27, 2019
In the quest to understand how a therapeutic intervention performs in actual use – in real medical practice outside the controlled environment of clinical trials – many life sciences organizations are stymied. They rely on one-off processes, disconnected tools, costly and redundant data stores, and ad hoc discovery methods. It’s time to standardize real-world data and analytics platforms – to establish much-needed consistency, governance, repeatability, sharing and reuse. The organizations that achieve these goals will formalize their knowledge base and make it scalable, while significantly reducing turnaround times, resources and cost. Learn the seven key components for putting that structure to real-world evidence – and four ways to take it to the next level.
Tags : 
    
SAS
Published By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : 
trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity, reusable data quality, application optimization
    
Trillium Software
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees
    
HP and Intel ®
Published By: Oracle     Published Date: Mar 22, 2018
Paris Lodron University Salzburg is the biggest educational institution in the Salzburg region of Austria. The university undertakes innovative research and sees itself as an internationally networked knowledge hub at the heart of Europe. An Oracle Exadata Database Machine was deployed for these applications in 2012. The objectives pursued at the time—uninterrupted operation, resource conservation, and reduction of the CO2 footprint—were fully achieved. Facing increasing growth and with the undertaking of specialized projects, Paris Lodron University was faced with the task of adapting its IT infrastructure to new requirements.
Tags : 
    
Oracle
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Intel® Xeon® Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE
Published By: HotSchedules     Published Date: Sep 11, 2018
The cost of labor can be managed effectively when restaurateurs are equipped with the right training, tools and processes. Traditional methods for capturing critical forecasting data and formulating labor plans & budgets are incomplete and often inaccurate, rarely accounting for menu pricing changes or current economic conditions. Even when the best practices of forecasting are employed, the information isn’t always available to the store managers who are attempting to manage the cost of labor. This ebook will walk you through the ins and outs of labor forecasting and best practices to build efficiency, grow revenue, and positively impact your restaurant’s bottom line.
Tags : 
    
HotSchedules
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Organisationen müssen heute mit immer größeren Datenmengen zurechtkommen, die aus mehr Datenquellen stammen und mehr Datentypen enthalten als jemals zuvor. Angesichts massiver, heterogener Datenmengen stellen viele Organisationen fest, dass sie eine Datenspeicher- und Analyselösung benötigen, die höhere Geschwindigkeit und mehr Flexibilität als ältere Systeme bietet, um rechtzeitig geschäftliche Erkenntnisse liefern zu können. Ein Data Lake ist eine neue und zunehmend populäre Möglichkeit zur Speicherung und Analyse von Daten, die viele dieser Herausforderungen meistert, indem sie es einer Organisation ermöglicht, alle Daten in einem zentralen Repository zu speichern. Da Daten in ihrem ursprünglichen Format gespeichert werden können, besteht kein Bedarf, sie vor der Übernahme in ein vordefiniertes Schema zu konvertieren, wodurch Sie die Möglichkeit erhalten, all Ihre Daten, sowohl strukturiert als auch unstrukturiert, mit minimaler Vorlaufzeit zu speichern.
Tags : 
    
Amazon Web Services
Published By: Juniper Networks     Published Date: Jun 29, 2017
The bank wanted to modernize its global data center core and edge networks to move to the next stage of its private cloud journey. The bank has long recognized the advantages of server virtualization, and it wanted to move more aggressively to a software-defined data center. The bank was virtualizing all services, including compute, storage, and network, to gain greater business flexibility and deliver cost savings. But first, it needed an elastic, flexible, and production ready network to connect its data centers. The bank wanted a dynamically scalable network to interconnect its data centers in Europe, Asia, and North America, so that it could move toward a fully automated, self provisioned cloud. The global network needed to deliver performance at scale for the company’s highly virtualized resources, while also supporting integration of legacy assets into its software-defined data centers.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Juniper Networks
Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifi cally to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI). With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artificial intelligence within the Financial Services industry, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to analyze and action data using artificial intelligence (AI). Financial services companies can greatly benefit from this leap forward in technology that enables unique insights into all aspects of the industry. With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists now have the ability to tackle complex problems and find credible and profitable solutions.
Tags : 
    
Pure Storage
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.