Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

trustworthy time

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Unionís General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their usersí data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, thereís a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the userís expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Workday Nordics     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
workday, workday technology, digital strategy, workday finance, hr cloud solutions
    
Workday Nordics
Published By: Workday UK     Published Date: Sep 18, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday UK
Published By: Workday     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
cloud-based system, data analytics, real time
    
Workday
Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutionsí time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM
Published By: Workday     Published Date: Sep 17, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoftís security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, itís Java thatís causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that Iím amazed it hasnít been done before! Weíll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: TRUSTe     Published Date: Aug 31, 2009
TRUSTe works to advance privacy and trust for a networked world. TRUSTe Privacy Seals help consumers click with confidence by guiding them to trustworthy Web sites. Thousands of Web sites rely on TRUSTe industry best practices to help them make the right decisions about privacy and protecting confidential user information. Most of the top fifty Web sites are certified to TRUSTe's leading practices, including Yahoo, Facebook, MSN, eBay, AOL, Disney, New York Times, Comcast and Apple. To learn more about internet privacy visit www.truste.com.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions
    
TRUSTe
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Workday France     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday France
Published By: Workday Italy     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday Italy
Published By: Workday Netherlands     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday Netherlands
Published By: Workday Spain     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in todayís business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data thatís trustworthy, actionable, and available in real time.
Tags : 
    
Workday Spain
Search