integrity

Results 126 - 150 of 208Sort Results By: Published Date | Title | Company Name

Server Virtualization on UNIX Systems: A Comparison between HP Integrity Servers with HP-UX and IBM

Published By: HP - Intel® Itanium® processors     Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides a high-level, feature-to-feature comparison of key areas of virtualization and virtualization management as well as modular table-based comparisons. Final this paper will examine information from publicly available resources.
Tags : 
unix, virtualization, sme, virtualization management, aix
    
HP - Intel® Itanium® processors

Reduce Costs and Run Your Microsoft Exchange Server on Amazon Web Services Cloud.

Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud
    
Amazon Web Services, Inc

Close, Consolidate and Report For Dummies

Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management
    
IBM

Effective Security with a Continuous Approach to ISO 27001 Compliance

Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire

Optimizing Infrastructure Control

Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing, security, auditing
    
Tripwire

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
Tripwire

Tripwire and 21 CFR11: Ensuring Integrity and Trustworthiness of Electronic Clinical Data

Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
    
Tripwire

File Integrity Monitoring: Compliance and Security for Virtual and Physical Environments

Published By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : 
tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure, security management
    
Tripwire

Do You Deserve to be Trusted? Key considerations for building & maintaining a trusted online brand

Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe

Privacy: Building Business Success on Trust

Published By: TRUSTe     Published Date: Jun 07, 2010
This white paper will explore how marketing leaders and business decision makers like yourself can align trust, credibility and privacy processes in your organization-and your company's broader ecosystem-into a Business Integrity Strategy.
Tags : 
truste, endorsements, marks, seals, trust marks, branding, ecommerce
    
TRUSTe

Ensuring secure and compliant cloud app use with Symantec

Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec

Database Security: KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

Certify your Software Integrity with thawte Code Signing Certificates

Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket, encryption, web development, web service security
    
thawte

Defending Against Denial of Service Attacks

Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
F5 Networks Inc

The Challenge of Burdensome Recovery Processes and Long Recovery Times in the Government and Legal

Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp
    
InMage

Establishing Confidence in PDN Simulation

Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics

Measuring the Performance of Equalized Serial Data Links Across the Design Flow

Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber
    
Mentor Graphics

Power Integrity Effects of High Density Interconnect (HDI)

Published By: Mentor Graphics     Published Date: Apr 03, 2009
High Density Interconnect (HDI) is being used more often to meet the growing need for more complex designs in smaller form factors. Beyond some of the more obvious electrical effects of using smaller vias, there is also an impact to the power integrity of a board using HDI. This includes different effects of mounted inductances of decoupling capacitors, changes in plane performance due to reduction in perforation from chip pinouts, and the inherent plane-capacitance changes from using dielectrics of various thicknesses. This paper will examine and quantify these effects, using numerous design examples, including a large conventional through-hole design board that was reduced using HDI.
Tags : 
power integrity effects, mentor graphics, high density interconnect, hdi, chip pinouts, perforation, multilayer or build-up multilayer, bum
    
Mentor Graphics

The ROI of Trust: Building Business Success in an Era of Privacy and Trust Concerns

Published By: TRUSTe     Published Date: May 06, 2010
This whitepaper will explore how business leaders like yourself can align trust, credibility and privacy processes in your organization-and your company's broader ecosystem-into a Business Integrity Strategy.
Tags : 
truste, roi, privacy, trust, credibility, business integrity strategy, identity
    
TRUSTe

IBM MobileFirst: Put your business in motion. Become a mobile enterprise.

Published By: IBM     Published Date: Oct 10, 2013
IBM MobileFirst is designed to enable organizations turn their interactions into an opportunity to drive return on engagement and investment. IBM combines deep industry expertise with mobile, analytics, cloud, social and security technologies. This can help enterprises capture new markets, efficiently extend their businesses to mobile employees, customers and business partners and maintain the integrity of their assets.
Tags : 
ibm, mobilefirst, business in motion, mobile enterprise, user interactions, return on engagement, return on investment, roi
    
IBM

DDR4 Board Design and Signal Integrity Verification Challenges

Published By: Mentor Graphics     Published Date: Jan 29, 2015
This paper investigates the effects of DDR4’s Pseudo Open Drain (POD) driver on data bus signaling and describes methodologies for dynamically calculating the DRAM’s internal VrefDQ level required for data eye analysis.
Tags : 
mentor graphics, digital signal, board design, power integrity, fibre channel, server hardware, digital signal processing, embedded design
    
Mentor Graphics

Pressure Barrier Replacement of Circulating Water Piping Discharge Headers in Nuclear Power Plants

Published By: FIBRWRAP     Published Date: Jan 08, 2016
Decades of continuous service of large diameter pressure pipelines leads to deterioration that threatens the structural integrity of piping systems. This white paper highlights the project background for repairing cement mortar lined steel piping discharge headers.
Tags : 
fibrwrap, cfrp, cement damage, repairs, engineering, construction, water pipes, fibre channel
    
FIBRWRAP

Healthcare-Providers-Industry-Brief

Published By: DocuSign     Published Date: Apr 24, 2018
Moreover, more than half of Fortune 500 pharmaceutical and medical device companies are operating under corporate integrity agreements (CIA) with the U.S. government to mitigate the risks.
Tags : 
    
DocuSign

5 Most Common Critical SQL Integrity Issues

Published By: Idera     Published Date: Sep 03, 2013
Corruption and other data integrity issues can be scary to deal with, but if you follow the advice and tips provided in this whitepaper, you will limit your exposure to corruption and always be able to take the quickest route to resolution with minimal or no data loss and minimal downtime. Just remember to stay calm and walk through the steps
Tags : 
idera, sql, sql server, data validation processes, data integrity, corruption
    
Idera
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.