HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 151 - 175 of 599Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: Jul 07, 2013
While the concept of big data is nothing new, the tools and technology and now in place for companies of all types and sizes to take full advantage. Enterprises in industries such as media, entertainment, and research and development have long been dealing with data in large volumes and unstructured formats - data that changes in near real time. However, extracting meaning from this data has been prohibitive, often requiring custom-built, expensive technology. Now, thanks to advancements in storage and analytics, all organizations can leverage big data to gain the insight needed to make their businesses more agile, innovative, and competitive.
Tags : 
big data, emc, technology, storage, analytics, data management
    
EMC Corporation
Published By: VersaSuite     Published Date: Aug 13, 2013
Healthcare providers do not have to live with functionality interruptions and budget strains created by an EHR that does not fit the facility. VersaSuite delivers a customizable EHR/HIS system to streamline the entire range of healthcare business processes.
Tags : 
ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology, ent, cardiology, otolaryngology, cardiovascular, versasuite, practice management, pacs, hospital information system, his, budget, revenue cycle management, cpoe
    
VersaSuite
Published By: McAfee     Published Date: Jan 20, 2015
When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
McAfee
Published By: OpenDNS     Published Date: Mar 31, 2015
"Security solutions are getting more sophisticated, but so are the advanced threats that you are up against. While businesses have the power to gather more intelligence from more sources, it can be difficult to share that intelligence and apply enforcement on any device, anywhere, anytime."
Tags : 
    
OpenDNS
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Published By: Mitel     Published Date: Mar 30, 2017
It's no secret that mobile technology has revolutionized the way consumers conduct their lives. Mobile technology has become ubiquitous, influencing the business workplace and workforce. Last year, IDC predicted that 75% of the US and nearly 40% of the global workforce would be mobile and signs indicate that the rate of mobile growth is only being accelerated by the advancement of cloud technology, improved security, and more reliable network access.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Vous pourriez penser que dans une ère où tout le monde est connecté il serait plus facile de voir le travail réalisé. Vous travaillez plus que jamais (chez vous, en déplacement et même dans votre voiture). Il vous semble malgré tout impossible d’accomplir l’ensemble des tâches au quotidien. À vrai dire, mobilité et productivité ne riment pas. Alors qu’avec accessibilité, oui ça rime.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
L'expérience client est un facteur clé de différenciation dans l'environnement ultraconcurrentiel actuel. Plus que jamais, cette expérience est façonnée et proposée via des interactions numériques. Bien que la majorité des communications se font toujours par téléphone, les consommateurs comptent maintenant davantage sur les méthodes numériques, telles que le courrier électronique, les SMS, le chat en ligne et les réseaux sociaux. Les consommateurs se sont habitués au confort de pouvoir contacter l'entreprise par le média qui leur convient, où qu'ils soient. Ils s'attendent également à pouvoir basculer sans difficulté d'un moyen de communication à l'autre lorsqu'ils sont en déplacement.
Tags : 
    
Mitel
Published By: Mitel     Published Date: May 22, 2017
À quand remonte la dernière fois que tous vos employés étaient au bureau le même jour ? Difficile de répondre ? Entre les déplacements et réunions à l’extérieur, les collaborateurs travaillant à distance et en télétravail, la souplesse des horaires et les arrêts maladie, la présence de l’ensemble des collaborateurs au bureau au même moment devient de plus en plus rare.
Tags : 
    
Mitel
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Vorresti creare innovazione, accelerare la release delle applicazioni e approfittare di nuove opportunità: ma le applicazioni e le infrastrutture legacy ti ostacolano. Passa ad un'architettura moderna scomponendo applicazioni monolitiche in microservizi agile, creati, gestiti e ridimensionati in modo indipendente. Il tuo business potrà muoversi più velocemente e gli sviluppatori apprezzeranno la semplicità di accesso alle API, che consentirà loro di concentrarsi sulla customer experience.
Tags : 
ca technologies, innovazione, microservices, microservizi, api, customer experience
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures, financial action task force, fincen, financial crimes enforcement network, eu aml directive
    
Fiserv
Published By: Fiserv     Published Date: Oct 27, 2017
With the recent Financial Accounting Standards Board vote to proceed and the final Accounting Standards Update now published, the Current Expected Credit Loss (CECL) standards remain top of mind for the C-suite in financial institutions. Even though the official adoption deadline has been pushed back to after December 2019, financial institutions should take actions today to help prepare for the new rules. Data is a great place to start.
Tags : 
cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve, alll, allowance for loan and lease loss, loan segmentation, loan pooling credit loss trends, loan reserve
    
Fiserv
Published By: Wasabi     Published Date: Nov 13, 2018
As cams and digital video become more critical to law enforcement, their success will be in large part dependent on the ability to efficiently store and access that data. In this case study we look at Novus Insight, a leading integrator of managed video storage for law enforcement agencies, and their decision to use Wasabi Hot Cloud Storage. Novus is tasked with helping law enforcement manage the massive volumes of digital video evidence that body and dash cams are creating. Not a simple proposition for these budget and resource constrained public agencies. After surveying the available options Novus found going with Wasabi an easy choice. Wasabi’s revolutionary storage technology allows for an unprecedented combination of speed, affordability and security. It not only brings Novus the instantly scalable cloud solution they need, it dramatically improves performance and economics at the same time. To learn more about how Novus and Wasabi are helping enable better policing through bette
Tags : 
    
Wasabi
Published By: Wasabi     Published Date: Nov 13, 2018
In this case study, read about how one major broadcaster discovered a whole new solution for accessing their archived content and saved a lot of money in the process. Needing on-demand access to archived promotional content this broadcaster was using both on-premise storage and off-promise tape storage with disappointing results. Seeking an alternative they looked to the cloud and Amazon S3. But before they could pull the trigger their media management company Acembly introduced them to Wasabi. It was a game changer. Wasabi’s Hot Cloud Storage is 80% cheaper and 6x the speed of even Amazon’s fastest offering. Plus, there’s free unlimited egress which is crucial for companies with unpredictable content needs. Download the case study to see how Wasabi’s revolutionary cloud storage technology is changing the possibilities for broadcasters and how they access their content.
Tags : 
    
Wasabi
Published By: Cohesity     Published Date: Apr 24, 2018
As organizational needs change and workloads become increasingly distributed, a key realization is emerging: traditional approaches to backup and recovery may no longer be sufficient for many organizations. These companies may have discovered that their existing tools are not keeping pace with other advancements in their computing environments, such as scale-out storage systems and hyperconverged systems, which seek to reduce data center complexity and help manage surging storage costs.
Tags : 
    
Cohesity
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: Microsoft     Published Date: Nov 23, 2016
Egal, In Welchem Teil Der Welt Sie Sich Befinden, Eines Ist Sicher: Die Erwartungen In Bezug Auf Den Kundenservice Sind In Den Letzten Jahren Gestiegen. Das Betrifft Einfachheit, Schnelligkeit, Fachwissen Des Servicemitarbeiter Und Vor Allem Verfügbarkeit Der Kanäle Und Digitale Transformation.
Tags : 
customer service, digital transformation, customer experience management
    
Microsoft
Published By: Drillinginfo     Published Date: Nov 18, 2015
The Bakken is a very large hydrocarbon-bearing subsurface rock formation underneath a large portion of the Williston Basin in North Dakota, Montana, Saskatchewan and Winnepeg. The Bakken has been the scene of many advancements in drilling technology – horizontal drilling, pad drilling and downspacing, to name a few. This first Edition of the DI Expert eBook by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, is a collection of articles posted by our staff of engineers, analysts and geologists about the Bakken over the past year.
Tags : 
geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: Drillinginfo     Published Date: Nov 18, 2015
The Permian basin, a long time oil and gas producing region nestled in west Texas and southeastern New Mexico was once believe to have reached “Peak Oil” extraction levels. A significantly larger play than the booming Eagle Ford Shale, the Permian Basin has reemerged as a production pillar for the US, thanks to advancements in horizontal drilling and hydraulic fracturing. Although still in early stages of new production, the Permian has already transformed the local economies surrounding the play, adding to the energy security of the U.S. In this issue of the DI Expert eBook, by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, our expert analysts have delved into the complexities of the geology in the Permian, highlighted the successes of operators in the region and provided in-depth analyses on the play’s re-emergence.
Tags : 
basin, permian, peak oil, extraction, energy security, geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: IBM     Published Date: Feb 02, 2016
Energy firms should build and nurture a customer-centric culture delighting clients while maximizing operational and financial results. In doing so, we’ll highlight the crucial role analytics plays in helping energy firms ensure operational efficiency and customer satisfaction.
Tags : 
ibm, energy, analytics, utility, customer experience, data, customer satisfaction
    
IBM
Published By: IBM     Published Date: Apr 20, 2016
Energy firms should build and nurture a customer-centric culture delighting clients while maximizing operational and financial results. In doing so, we’ll highlight the crucial role analytics plays in helping energy firms ensure operational efficiency and customer satisfaction.
Tags : 
ibm, customer experience management, cem, energy, utilities, energy sector, aberdeen group
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.