HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 601 - 625 of 943Sort Results By: Published Date | Title | Company Name
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Fiberlink     Published Date: Feb 08, 2007
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Tags : 
business continuity, mobile workers, mobile computing, disaster planning, pandemics, fiberlink, disaster plan
    
Fiberlink
Published By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : 
office 365, email security, cloud, cloud security, email infrastructure
    
Mimecast
Published By: HP     Published Date: Apr 13, 2014
Deliver game-changing uptime. Read how Playtech, the world’s largest publicly-traded online gaming software supplier, achieves 99.999% uptime and detects and fixes issues in minutes versus hours with comprehensive IT monitoring tools.
Tags : 
bpm, bsm, business process monitor, business service management, hp it performance suite, it case study, it infrastructure, omi, operations manager i, playtech, sha, service health analyzer, business continuity, online gaming, visibility
    
HP
Published By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : 
firewall traversal, polycom, unified communications, security solutions, uc devices
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
The days are gone when health issues would be treated clinically in isolation from the many other factors that affect the wellbeing of individuals and communities. Today, the rising costs of health care, an aging population and increasingly complex chronic health problems are driving greater focus and attention on population health — the health outcomes of a group of individuals within a population. Indeed, these days more proactive approaches to health care and care delivery are identifying the social determinants of health for various populations such as environmental conditions, economic status, and access to resources and support.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains some of the causes of stranded power, cooling, and space capacity in colocation data centers and explains how high-density rack power distribution, air containment, and other practices improve availability and efficiency. Examples of acceptable use policies that address these issues are provided.
Tags : 
    
Schneider Electric
Published By: Raritan Inc.     Published Date: Feb 23, 2009
This white paper explores the challenges of increasing computing power in resource-constrained physical spaces and data centers experiencing high growth. We also explore how intelligent rack PDUs can meet these challenges and address critical uptime and capacity planning issues.
Tags : 
raritan, power, processing, instrumentation, green, green computing, efficiency, power load, it equipment, pts, datacenter, cooling
    
Raritan Inc.
Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management, finance, financial records, audit, auditing, regulatory compliance, ecora
    
Ecora Software
Published By: Riverbed     Published Date: Nov 02, 2016
"Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code. However, that slowness is often not the root cause, but rather a symptom of an underlying infrastructural issue hidden from view. Examine common, yet elusive application performance problems that reveal themselves only when you look at them from the right vantage point. Get the field guide today!"
Tags : 
    
Riverbed
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught
    
IBM
Published By: Senn Delaney     Published Date: Aug 19, 2008
Successful health care leaders are treating ailing systems with a healthy dose of innovative solutions. Senn Delaney CEO and President Jim Hart discusses key issues facing health care leaders today, innovative solutions for dealing with them, and provides a series of thought-provoking questions to help you gauge the health of your organization's culture.
Tags : 
senn delaney, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security, regulatory compliance, net iq, netiq
    
NetIQ Corporation
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: Harvard Business School     Published Date: Mar 05, 2015
Capital abundance, low interest rates, and high volatility are creating new challenges and opportunities in equity markets. To succeed in this crowded and complex global landscape, you must take your investment expertise to a new level. The Private Equity and Venture Capital program at Harvard Business School explores cutting-edge industry models and related issues—from venture capital, growth equity, and buyouts to industry infrastructure, portfolio strategies, and decision-making processes.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management, asset management, financial strategy, investment opportunities, competitive advantage
    
Harvard Business School
Published By: Harvard Business School Executive Education     Published Date: Mar 09, 2015
Capital abundance, low interest rates, and high volatility are creating new challenges and opportunities in equity markets. To succeed in this crowded and complex global landscape, you must take your investment expertise to a new level. The Private Equity and Venture Capital program at Harvard Business School explores cutting-edge industry models and related issues—from venture capital, growth equity, and buyouts to industry infrastructure, portfolio strategies, and decision-making processes.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management, asset management, financial strategy, investment opportunities, competitive advantage
    
Harvard Business School Executive Education
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
    
Entrust Datacard
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum
    
NETIQ
Published By: Riverbed     Published Date: Jul 17, 2013
See exactly how applications and new technology are performing on your network. Download our Cascade Family brochure. Then watch a short 6-minute animated demo that shows primary business issues Cascade can help you conquer.
Tags : 
network, performance, network performance, cascade, riverbed, cascade family
    
Riverbed
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.