form validation

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name

Software in Silicon: What It Does and Why

Published By: Oracle CX     Published Date: Oct 19, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle CX

Nutanix Presents Industry’s First Validated Reference Architecture for VMware Horizon Suite

Published By: Nutanix, Inc.     Published Date: May 07, 2013
This document makes recommendations for the design, optimization and scaling of VMware Horizon Workspace and Horizon View deployments on Nutanix. It shows the scalability of the Nutanix Complete Cluster and provides detailed performance and configuration information on the scale-out capabilities of the cluster when leveraged for Horizon deployments. Extensive testing has been performed in collaboration with VMware to simulate real real-world workload and conditions of operating a Horizon Workspace environment. Sizing and recommendations have been made after multiple testing iterations and joint validation. The solution and testing provided in this document was completed with VMware Horizon Workspace deployed on VMware vSphere on the Nutanix Complete Cluster.
Tags : 
vmware, workspace, horizon, nutanix, deployment, cluster, performance, design, optimization, backup and recovery, clustering, storage management, application integration, application performance management, best practices, enterprise software, return on investment, virtualization
    
Nutanix, Inc.

ESG: Performance Validation on HP VirtualSystem for VMware 2.0, optimized for VMware vSphere 5

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of HP VirtualSystem for VMware 2.0, optimized for VMware vSphere 5.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors

Check Yourself Before You "Rec" Yourself

Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine

Software in Silicon: What It Does and Why

Published By: Oracle     Published Date: Oct 20, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle

Taneja-Transforming Resiliency and TCO with Riverbed SteelFusion

Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
Riverbed SteelFusion, as the first converged infrastructure solution purpose-built for the branch, promises to transform branch IT through the stateless “projection” of data, applications, and VMs actually stored in the datacenter. In this Taneja Group Technology Validation we found that SteelFusion truly can transform branch IT by reducing complexity, injecting powerful capabilities and making the branch resilient, protected, and recoverable.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations, technology challenges, it management, data management
    
Riverbed Technology, Inc.

The Financial Close Optimizing Performance and Driving Financial Excellence

Published By: SAP     Published Date: Jun 23, 2009
Learn why the requirement to close books quickly and with quality is emerging again as an important project for today's global finance function.
Tags : 
optimization, financial, performance, sap, global, globalization, businessobjects, sox, sarbanes-oxley, stakeholders, internal stakeholders, regulatory landscape, financial reporting standards, investor relations, audit trails, accounting, peer-to-peer, erp, enterprise resource planning, general ledger
    
SAP

Establishing Confidence in PDN Simulation

Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics

Measuring the Performance of Equalized Serial Data Links Across the Design Flow

Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics

8 Quick Steps to Double B2B Conversions

Published By: Pardot     Published Date: Apr 29, 2009
You've laid the groundwork and attracted the visitors, now conversion is key. As a B2B marketer, you typically have a very limited window to prove your value proposition. Learn eight simple techniques, including progressive profiling, form validation and multivariate testing, that will help you fine tune your landing pages and increase conversion rates.
Tags : 
pardot, b2b conversions, double b2b conversions, b2b marketer, groundwork, landing pages, conversion rates, ctr, click-thru, form validation, multivariate testing, b2c, website caller id, jigsaw, whois, prospect, suspect, lead source, error messages, drop off
    
Pardot

Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust

SSL 101: A Guide to Fundamental Website Security

Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust

Build .NET Applications Without Hand-Coding

Published By: Iron Speed     Published Date: Aug 21, 2009
See how Iron Speed Designer builds database forms, and reporting applications for .NET without hand-coding. Quickly create feature-complete custom applications that integrate Web pages, controls, data access, validation and security.
Tags : 
.net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code, application integration, web development, web services, web service management
    
Iron Speed

The New Product Development Paradigm Led by Simulation and Testing

Published By: ITI     Published Date: Aug 21, 2009
This "paradigm shift" includes a move from a predominance of physical testing for product prototype validation to simulation-led problem solving and performance validation, using Computer Aided Engineering, and Design (CAE and CAD) tools.
Tags : 
product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti, enterprise resource planning, performance testing, product lifecycle management, simulation software
    
ITI

Discover the value of focusing on intelligent capture

Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
Search      

Add Research

Get your company's research in the hands of targeted business professionals.