RSS feed Get our RSS feed

News by Topic

data validation

Results 1 - 25 of 35Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
     CA Technologies
By: DataFlux     Published Date: Jan 07, 2011
This white paper addresses data profiling techniques that can help the analyst understand the empirical truth associated with enterprise data.
Tags : dataflux, data profiling, enterprise data, analyst, data rule validation, metadata compliance
     DataFlux
By: Datastax     Published Date: Aug 03, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 15, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 28, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Fiserv     Published Date: Nov 07, 2017
Learn how loan onboarding can become more efficient and accurate by eliminating manual data validation with automation technology that is poised to transform mortgage servicing. From end-to-end, tools can simplify workflow processes, driving time and cost efficiencies. Trained staff can be deployed to greater effect and can be crucial to eliminating servicing errors. In the process, servicers improve data quality, save time and money, and deliver a better borrower experience.
Tags : loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, lending efficiency
     Fiserv
By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity
     IBM ILOG.
By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
     IBM ILOG.
By: Idera     Published Date: Sep 03, 2013
Corruption and other data integrity issues can be scary to deal with, but if you follow the advice and tips provided in this whitepaper, you will limit your exposure to corruption and always be able to take the quickest route to resolution with minimal or no data loss and minimal downtime. Just remember to stay calm and walk through the steps
Tags : idera, sql, sql server, data validation processes, data integrity, corruption
     Idera
By: Idera     Published Date: Jan 08, 2014
Download this whitepaper to learn the 5 Most Common Critical SQL Integrity Issues.
Tags : idera, sql, integrity sql, data typing, data validation, physical consistency, data storage
     Idera
By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls
     Imperva
By: Iron Speed     Published Date: Aug 21, 2009
See how Iron Speed Designer builds database forms, and reporting applications for .NET without hand-coding. Quickly create feature-complete custom applications that integrate Web pages, controls, data access, validation and security.
Tags : .net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications
     Iron Speed
By: Iron Speed     Published Date: Aug 21, 2009
This white paper explains how to quickly create feature-complete custom database applications that integrate Web pages, controls, data access, validation and security.
Tags : .net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications
     Iron Speed
By: Janrain, Inc.     Published Date: Jan 07, 2013
This paper covers establishing best practices in implementing user registration, and strategies for collecting more and better user data without sacrificing conversion rates. Topics include social login, progressive profiling, CAPTCHA, SSL, and more.
Tags : online registration, data management, unified data, data validation, ssl, progressive profiling, social media, marketing research
     Janrain, Inc.
By: Lookout     Published Date: Mar 28, 2017
The data that you’ll see throughout this book is the result of a survey commissioned by Lookout and conducted by Enterprise Strategy Group, an integrated IT research, analyst, strategy, and validation firm.
Tags : enterprise, mobile, security, survey, commission, lookout
     Lookout
By: Melissa Data     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
What are the long-term costs of bad data? This white paper gives you the answers and tells you how to fix it.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: Melissa Data Corp.     Published Date: Nov 18, 2008
What are the long-term costs of bad data? This white paper gives you the answers and tells you how to fix it.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
     Mentor Graphics
By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber
     Mentor Graphics
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics