Read this eBook to find out the nine pillars to help medical device companies overcome barriers to excellence.
How to overcome challenges and boost results in the medical devices industry
How to choose the right suppliers, service providers and sub-tier suppliers, and how to monitor them to ensure FDA compliance.
Managing your Medical Device suppliers – Tips for ensuring they are truly FDA compliant
Read this eBook to find out the eight pillars to help life sciences companies overcome barriers to excellence.
How to achieve Operational Excellence in the Life Sciences Industry
Read this eBook and learn about 8 cornerstones that help in overcoming obstacles on the journey to Industry 4.0.
Building a digital company: 8 cornerstones for success in Industry 4.0
Read this article and find out more on how a Document Control System may help companies to ensure regulatory compliance.
Why my electronic “Document Control System” may only be a “Document Management System”
Software that enables medical device companies to continuously analyze and improve the efficiency of operations through a single solution.
This webinar will show you the benefits of adopting ISO 20000 as an IT service provision validation mechanism for ITIL implementations.
ITIL and ISO 20000: Fundamentals and necessary compliance synergies
Device Master Records and Medical Device files are FDA requirements. How do they compare?
Device Master Records and Medical Device Files – How Do They Compare?
In this White Paper, Rick Leopoldi discusses the what are service level agreements (SLAs), their importance, what they require and how to develop a plan to start SLA's.
IT Services Management – A Description of Service Level Agreements
In this White Paper, Rick Leopoldi discusses incident and problem management methods, along with best practices for service desk implementation.
ITSM Incident and Problem Management Methods
In this white paper, PECB discusses the main clauses of ISO 27001, its links with other standards and guidelines and more.
ISO 27001 – Information Technology Security Management
Overview of how effective and accurate creation of personas for business end users could act as a catalyst for value provisioning of IT services.