New Search

Can't find what you're looking for? Try another search!

752 search results for:

1Blog Post

Ramping Up Security to Meet Operational Resilience Rules

Ramping Up Security to Meet Operational Resilience Rules Philip Pearson, Field Chief Information Security Officer at Aqua Security, discusses how meeting operational resilience targets is crucial for effective cybersecurity measures. Operational resilience is the ability to prevent, withstand, recover, adapt and learn in the face of disruption, including cyber events. Currently, it represents a far-reaching […]

2Blog Post

[Webinar Recap] Leveraging Jira & Jama Connect® for Enhanced Requirements Management

Leveraging Jira & Jama Connect® for Enhanced Requirements Management Is it time to scale up your requirements management? Many companies developing software try to manage requirements using a combination of Word and Jira. However, for all the effort that goes into documenting requirements, teams who rely on Word and Jira alone often struggle with a […]

3Blog Post

Critical Alignment for Security, Safety, & Product Teams in Automotive Development

Critical Alignment for Security, Safety, & Product Teams in Automotive Development As automotive product development becomes increasingly complex with multiple standards for compliance, alignment between different teams is more critical than ever. Yet in many organizations, specialized teams such as cybersecurity, safety, product development, and even project management work separately. In other cases, teams may […]

5Blog Post

[Webinar Recap] Concurrent Engineering in Aerospace and Live Traceability™

Concurrent Engineering in Aerospace and Live Traceability™ In this webinar, you will gain an understanding of the essential components of concurrent engineering, which include: The process itself Forming a team with members from different disciplines Utilizing a unified design model Collaborating in a shared workspace Implementing a software tool infrastructure Model-Based-Systems-Engineering (MBSE) and Live Traceability™ […]

6Blog Post

G2® Once Again Names Jama Connect® the Overall Leader for Requirements Management Software for Spring 2024

G2® Once Again Names Jama Connect® the Overall Leader for Requirements Management Software for Spring 2024 In the competitive landscape of requirements management solutions, Jama Connect® has once again emerged as the overall leader in the Spring 2024 G2 Grid® Report for Requirements Management Software. G2 rates products and sellers based on reviews gathered from […]

7Blog Post

FDA Outlines its Approach to Artificial Intelligence Regulation

FDA Outlines its Approach to Artificial Intelligence Regulation   “Artificial Intelligence and Medical Products: How CBER, CDER, CDRH, and OCP are Working Together” outlines how FDA’s medical product centers plan to address regulation of AI used in medical products and their development. U.S. regulation of artificial intelligence (AI) in medical devices will involve cooperative work […]

9Blog Post

Manage by Exception: Data-Driven Practices to Improve Product, Systems, and Software Quality

Manage by Exception: Data-Driven Practices to Improve Product, Systems, and Software Quality Requirement errors in product development cost time and money and create potential liabilities. The expense of these errors can make up between 70% and 85% of all rework costs. When leaders don’t have data related to the execution process, teams aren’t tracing requirements […]

10Blog Post

Understanding ISO/IEC 27001: A Guide to Information Security Management

Understanding ISO/IEC 27001: A Guide to Information Security Management In today’s interconnected world, the importance of securing sensitive information cannot be overstated. Organizations face numerous threats to their information assets, ranging from cyberattacks to data breaches. To address these challenges, many businesses turn to internationally recognized standards for information security management, with ISO/IEC 27001 standing […]