WHITE PAPER:
Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
CASE STUDY:
When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body.
CASE STUDY:
Learn how Kalypsis, a clinical stage pharmaceutical company, is leveraging Xerox DocuShare Enterprise Content Management to control content for regulatory operations and clinical trials.
PRESENTATION:
In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
EZINE:
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
EZINE:
In this week's Computer Weekly, we look at the emerging technologies being used to improve employee experience and raise staff loyalty and motivation. The CIO of the Football Association explains how IT is changing the way the national game is administered. And we examine the growing role of AI in preventing cyber attacks. Read the issue now.
EBOOK:
Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.