HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 526 - 550 of 901Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Jun 25, 2015
One of the most important strategic issues IT decisionmakers face is how to best leverage the rapidly evolving cloud resources available today.
Tags : 
migration, enterprise, cloud, applications
    
CDW
Published By: Sage     Published Date: Oct 14, 2014
The Patient Protection and Affordable Care Act (PPACA), signed into law by President Obama on March 23, 2010, and the amendments made by the Healthcare and Reconciliation Act of 2010 (together, known as the Affordable Care Act), have significant employment tax and information reporting implications. This survival guide will address the changes facing employers. You’ll find explanations of compliance issues, checklists of what your company should be doing, and a calendar of important effective dates.
Tags : 
sage, healthcare reform, ppaca, affordable care act, compliance, employment tax, practice management
    
Sage
Published By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
compliance, noncompliance, employer compliance, hr manager, employment laws
    
Sage
Published By: McAfee     Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
McAfee
Published By: VMTurbo     Published Date: Aug 15, 2013
This whitepaper explores the challenges and best practices of virtualizing business critical applications. It examines key issues and identifies major practical barriers that organizations face in this task, concluding with advice for implementing an effective solution.
Tags : 
virtualize, business critical applications, effective solution
    
VMTurbo
Published By: VMTurbo     Published Date: Dec 09, 2013
Learn about the 3 major challenges of virtualization management and how overcoming these issues will improve the efficiency of your IT infrastructure and application performance while simultaneously reducing IT costs.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo
Published By: Polycom     Published Date: Apr 30, 2013
One of the simplest, most effective ways to bring healthcare to the community level is through video collaboration. When video technology is enabled through a standards-based, scalable platform, community members can all join a multipoint video call to collaborate and work together with professionals and even with groups of similarly afflicted, empathetic peers to address health issues. Patients benefit from more regular evaluations and better access to specialty support. They participate in live or recorded education sessions—regardless of location or ability to travel. And with today’s move to ubiquitous video, you cannot only do one-to-one video sessions, but groups can meet over video to share ideas and best practices.
Tags : 
healthcare, re-hospitalization, video collaboration, collaboration, video conferencing, video platform, telepresence
    
Polycom
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver, protection, reputation, human resources
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : 
navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix, training programs, compliant culture, risk assessment, qualified third parties
    
NAVEX Global
Published By: NEC     Published Date: Nov 26, 2013
This paper exposes—and debunks—the top 10 DaaS myths, which range from supposed cost, user experience and security issues, to ease of use, licensing and integration limitations. It shows how, by consuming virtual desktops as a cloud-hosted service, businesses can deliver high-performing desktops to users on any device in minutes, easing IT management burdens and reducing the total cost of desktop ownership.
Tags : 
nec, daas, cloud, cloud computing, desktop myths, desktops as a service
    
NEC
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: Skillsoft     Published Date: Mar 05, 2014
This paper explains how embedding 7 key skills within your IT team can keep your organisation’s data safe and its employees productive.
Tags : 
it skills, data storage, data management, it issues
    
Skillsoft
Published By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : 
asset management, dam, rich media, metadata issues
    
Adobe
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Box     Published Date: Jan 16, 2015
Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.
Tags : 
nexgen, flash, la metro, vdi, vmware, vdi
    
Box
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model
    
ARMA
Published By: AppDynamics     Published Date: Dec 10, 2014
Learn the top 10 most common java performance problems and how your organization can avoid them in order to get the most out of your application performance.
Tags : 
java performance, reliance on technology, it team, employee productivity, prevent issues
    
AppDynamics
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers
    
Duo Security - Nethawk
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers
    
Duo Security - Nethawk
Published By: ESV Digital     Published Date: Feb 10, 2015
The multiplication of marketing channels and devices concerning consumers has greatly increased the complexity faced by brands in their marketing efforts. This white paper aims to explain the issues, the principal attribution models used and the related challenges.
Tags : 
esv digital, algorithms, interactions, point of contact, nurturing, marketing data, marketing analytics
    
ESV Digital
Published By: CDW-Lenovo     Published Date: Oct 15, 2015
This Report examines and compares the reliability of 14 major server platforms, 18 server operating system distributions and 11 server hardware virtualization layers. It also explores the underlying issues that positively or negatively influence the inherent reliability of servers and operating systems. And it delves into the external elements that directly impact planned and unplanned system downtime.
Tags : 
    
CDW-Lenovo
Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense
    
LogicNow
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.