FDA 21 CFR 11 Reports

FlexNet and FDA 21 CFR Part 11
sponsored by Apriso Corporation
WHITE PAPER: Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation
sponsored by Univa UD
CASE STUDY: When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body.
Posted: 03 Apr 2008 | Published: 01 Apr 2008

Univa UD

Case Study from IDC: Speeding the Cure: Kalypsys Deploys Xerox DocuShare CPX to Accelerate Drug Development
sponsored by Xerox DocuShare
CASE STUDY: Learn how Kalypsis, a clinical stage pharmaceutical company, is leveraging Xerox DocuShare Enterprise Content Management to control content for regulatory operations and clinical trials.
Posted: 08 May 2008 | Published: 01 Jan 2007

Xerox DocuShare

The gender pay gap
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
Posted: 08 Feb 2021 | Published: 26 Apr 2017

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

CW500: Key trends for IT leaders in 2017 – technology trends
sponsored by TechTarget ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Spencer Izard, chief analyst in the enterprise advisory team at Ovum, discussing the major technology trends for this year.
Posted: 08 Feb 2021 | Published: 07 Feb 2017

TechTarget ComputerWeekly.com

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security