HIT Consultant Insightful coverage of healthcare innovation
 

citizen

Results 26 - 50 of 100Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Jul 19, 2018
A growing urban population is putting increasing pressure on infrastructures – and creating a bigger challenge for governments to meet their safety, road performance and cost saving targets. Modern location mapping platforms are growing in accuracy and capabilities – giving governments a way to provide real-time, personalized and integrated mobility services to citizens. In Ovum’s Location Platform Index, 2H17, HERE has been ranked a leader based on overall reach and completeness – and the leader for platform completeness. In this report, you can see exactly how we measure up in the market against some of the leading competition.
Tags : 
    
HERE Technologies
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking
    
Cisco
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
The General Data Protection Regulation(GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Tags : 
data security, data protection, risk reduction, security regulation, data breach
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
After developing the blockbuster video games Wing Commander and Freelancer, Chris Roberts spent 10 years in Hollywood making movies. In 2012, Roberts founded Cloud Imperium Games (CIG) and launched development of Star Citizen using crowd funding from fans eager to participate in shaping the new game. To facilitate Roberts' disruptive model for video game development, CIG needed ultra high-speed Internet connectivity. Read this case study to learn how CIG leverages blazing Internet speeds and capacity to engage players directly in creating the movie-quality gaming world of Star Citizen.
Tags : 
    
Spectrum Enterprise
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Amazon Web Services EMEA     Published Date: Apr 16, 2019
By placing the future of transportation in the cloud, governments can improve the performance of technology infrastructure and focus on delivering innovative services to citizens, without increasing costs. You can start that journey today. In this eBook, you will learn about: • Life-saving digital initiatives on US streets • Valuable data insights across UK airports • Scalable ticketing services for Turkey’s Istanbul Deniz Otobüsleri ferry passengers • Cost savings for Singapore’s Land Transport Agency • Scalable, secure innovation at speed
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: IBM     Published Date: Jul 12, 2016
This video provides an overview as to how governments can provide better services to citizens with IBM Case & Capture. Watch to learn more.
Tags : 
ibm, ecm, analytics, government, big data, ibm case and capture
    
IBM
Published By: Oracle     Published Date: Jan 15, 2014
Supporting Healthcare Organizations and Citizens in the Transformation from Episodic to Longitudinal Care.
Tags : 
oracle, healthcare, health management platform, organizations, citizens, health management platform (hmp), information technology, practice management
    
Oracle
Published By: ServiceNow     Published Date: Mar 24, 2015
IT departments and the organizations they serve can reap dramatic benefits by codifying and automating unique processes through the development of custom applications. These applications can lower costs, improve agility, quicken time to value, give IT greater control,and bolster productivity throughout IT and among enterprise users. In fact, with the right tools in place, organizations can enable a new class of “citizen developers” who work either in or with IT to create applications and services that are highly responsive to business needs. A platform to enable this type of innovation is not only available, cost efficient and simple to deploy, but it may already be part of your IT environment.
Tags : 
codifying and automating, custom applications, it control, applications and services, business needs, cost efficient, it environment
    
ServiceNow
Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
ibm, ecm, analytics, smarter content, ecm for government
    
IBM
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q3'19
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: iCompass Technologies     Published Date: Feb 06, 2015
You know every tax dollar counts: The post-recession drop in funding coupled with mounting financial commitments and legislative demands for improved access to information leave no choice but to make operations more efficient. Agenda automation software eliminates manual tasks associated with creating, distributing, and publishing agendas, reduces the prep time (by as much as 50% or more) and associated costs of meetings while introducing a flexibility that makes tight deadlines easier to manage. The impact is far reaching, from improved transparency to freeing up staff time to work on other priorities. It not only pays for itself in paper savings, it brings money back into the budget—from $300 to $1000 per meeting, depending on the size of the organization. Learn more about how easy it can be to automate your meeting agendas, and what you can get back as a result.
Tags : 
agenda management, meeting management, meeting management software, records management, records management software, paperless document management, local government transparency, agenda automation
    
iCompass Technologies
Published By: TIBCO Software     Published Date: Feb 26, 2019
Digital Transformation of America's largest family controlled financial services institution with a history dating back to three generations. Learn how the role of data changed at the bank during a continued evolution of customer experience. First Citizens Bank has been using TIBCO's integration and advanced analytics technology to provide a seamless, consistent, customer self-service experience, to tackle fraud, or to provide more accurate and proactive financial services.
Tags : 
financial services, digital transformation, banking, fraud
    
TIBCO Software
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.