top of page
Log In
Home
Next events
SOFTWARE
LIFE SCIENCES
Previously on N'Tech
About Nalys
Blog
More
Use tab to navigate through the menu items.
Next Web Apps events
The benefits of the CI/CD approach in DevOps
Wed 16 Dec
Webinar
Details
Discover the power of Docker!
Wed 25 Nov
Webinar
Details
Discover more of our technical talks :
Play Video
Play Video
45:23
Revision of annex 1 of Eudralex – Practical case | N'tech
Since 2015, the EMEA has been working on the revision of Annex 1 of Volume 4 of Eudralex, which deals with the manufacture of sterile medicinal products. This revision was under call for comments until July 2020. To date, there are no details on when and how the revision will be implemented, however operators are starting to prepare for its arrival. In this video, an expert presents a field experience of how to implement improvements in order to meet the requirements. This webinar was given in French by Jean-François accompanied by Gabriel. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here other videos on: - The application of ultra-filtration in the pharmaceutical industry: https://youtu.be/HR4ejC2-PaI - Risk Analysis: https://youtu.be/ttOyhKU5CRI #annexe1 #annexe1eudralex
Play Video
Play Video
58:03
RISC V - Towards a new processor family | N’tech
Risc-V is a quite recent Open Source standard for processors. From micro controllers to general purpose ones, this architecture is gaining interest in the industry. During this webinar, they presented what it is, why it is interesting and what are the stakes for the embedded computing world. They talked about chip makers, boards and tools for this surging phenomena that is Risc-V. The webinar was given in English by Olivier and Benoit, Innovative software experts. 00:00 Webinar start 0:27 Presentation of Nalys 3:47 Introduction on RISC V 24:00 Instructions set 35:35 Why create the RISC V 39:04 Chipmakers 43:18 Software tooling 47:28 Conclusion 51:08 Q&A If you are interested in technical exchanges go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here two other presentations on: - The importance of cyber security: https://youtu.be/mElVAzEhcx4 - Applying DevOps in embedded systems: https://youtu.be/e394QrALckU #processor #riscV #microchip
Play Video
Play Video
57:28
Rust: a safe and carefree language
In the past six years, #Rust has become popular as a language that can achieve memory safety and thread safety without introducing a garbage collector. While not having to rely on a garbage collector is indeed extremely useful in embedded software, that topic has been covered many times by many presentations already. Instead, in addition to explaining the techniques that help with memory safety, this presentation focuses on how those techniques also help developers to build abstractions, wrappers and libraries that are difficult to misuse. “Rust is excellent for creating large programs while not having to worry about mistakes such as memory mismanagement, data races, or even misusing a library and causing logic bugs.” The presentation was made by Gerwin and Tim, Embedded software developers. If you are interested in technical exchanges go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here two other presentations on: - C++ in embedded applications: https://youtu.be/2yqAMX5WFj8 - C++ throughout the ages: https://youtu.be/zFqdFNnXvyc #embeddedsoftware
Play Video
Play Video
55:48
First step in problem solving: the Root Cause Analysis method | N’tech
In this video (in French), you will be presented with the RCA (Root Cause Analysis) approach based on a sequence of several simple tools that allows to find and then eliminate the cause of most quality, production... and even everyday problems. This presentation is illustrated by an example of a root cause investigation of a quality complaint. Just like for a police investigation, where you have to find evidence, determine suspects, check alibis and finally find the culprit, in the RCA method, the most obvious suspects are not necessarily the culprits. From the Ishikawa diagram and the 5M to the 5 Why, this method enables to get to the roots of any problem. This presentation was given by Anne, Life Sciences engineer. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here a webinar on Improvement tools for better CAPA coordination https://youtu.be/jPJzjEY6b5k #Rootcauseanalysis #problemsolving #assurancequalité
Play Video
Play Video
50:07
Ultra-filtration: applications in the pharmaceutical industry
In this video (in French), you will see the main principles of #ultrafiltration, how it works and the parameters influencing the quality of the product. The presentation then focuses on the application in the pharmaceutical industry. Through this illustration, the notions of CPV (Continued Process Verification), maintenance and process steps are addressed. The webinar was a real discussion between the speakers and participants who could ask their questions directly during the presentation. This webinar was given in French by Nicolas and Yves. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here a webinar on data integrity and its application to CSV https://youtu.be/r_4ax-dL1ms
Play Video
Play Video
56:13
The importance of cyber security | N’tech
In this video you will discover exactly what is the scope of cyber security, what is its impact, who are the actors in the field, what can go wrong and how to technically prevent it. Ethical l and non-ethical hackers, cryptography and how your computer is secured… all these topics are covered here. This presentation was given by Benoit, #Cybersecurity expert. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here a webinar on Machine Learning and Artificial Intelligence https://youtu.be/W194qbONm3g #cryptography #bitcoin
Play Video
Play Video
50:36
Introduction to data integrity and its application to CSV | N'tech
In this video (in French) you will be presented with the principles to be applied in terms of data integrity, how to translate them into requirements for software and finally you will have a look at the APIC method to do a risk analysis. The webinar will be divided into 3 parts: - Explanation of the ALCOA+ principles - Application to the CSV domain - Risk analysis of systems This presentation will be given in French by Sébastien, Senior Validation Engineer and Mathias, Qualification Validation Engineer. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check the webinar on "Risk analysis: the key point of the qualification process": https://youtu.be/ttOyhKU5CRI #dataintegrity #csv #metadata
Play Video
Play Video
56:51
Project management methods: PRINCE II and PMP | N’tech
In this video (in French) you will have the opportunity to learn more about the two project management methods PRINCE II and PMP. You will discover their main principles as well as the advantages and disadvantages of each of these methods. This is not an official training from the PRINCE II or PMP certifications. This webinar was hosted by Christophe Monseu, Senior Project consultant and Loic Marouteau PMP certified engineer. If you are interested in technical webinars go to N'tech, the platform creating a network of experts through events: www.ntech-events.com Check here a webinar on Improvement tools for better CAPA coordination https://youtu.be/jPJzjEY6b5k #projectmanagement #prince2 #pmp
bottom of page