Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FDA 21 CFR 11

RSS Feed    Add to Google    Add to My Yahoo!
FDA 21 CFR 11 Reports
 
Case Study from IDC: Speeding the Cure: Kalypsys Deploys Xerox DocuShare CPX to Accelerate Drug Development
sponsored by Xerox DocuShare
CASE STUDY: Learn how Kalypsis, a clinical stage pharmaceutical company, is leveraging Xerox DocuShare Enterprise Content Management to control content for regulatory operations and clinical trials.
Posted: 08 May 2008 | Published: 01 Jan 2007

Xerox DocuShare

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation
sponsored by Univa UD
CASE STUDY: When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body.
Posted: 03 Apr 2008 | Published: 01 Apr 2008

Univa UD

FlexNet and FDA 21 CFR Part 11
sponsored by Apriso Corporation
WHITE PAPER: Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

ERP Software Acquisition in an FDA Regulated Environment
sponsored by SoftBrands, Inc.
WHITE PAPER: This white paper presents a guideline to help you select an ERP system for your FDA validation. Explore a five phase software acquisition life cycle model to help you accomplish these objectives as efficiently as possible.
Posted: 06 Nov 2008 | Published: 12 Mar 2008

SoftBrands, Inc.

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

SuccessFactors

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement