HIT Consultant Insightful coverage of healthcare innovation
 

safety

Results 201 - 225 of 257Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes
    
BlackBerry
Published By: Commdex     Published Date: Nov 18, 2013
Commdex will provide tips for how FirstNet Can Deploy a National Public Safety Broadband Network - Quickly and Cost Effectively.
Tags : 
    
Commdex
Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Published By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance
    
Eaton
Published By: IBM     Published Date: Feb 25, 2014
Used to manage fleet-wide operations for non-nuclear power generation and heavy manufacturing environments, learn how IBM Maximo for Nuclear Power can streamline and simplify processes as it applies a consistent and rigorous approach to operational management.
Tags : 
ibm, energy, utilities, nuclear power, nuclear energy, asset performance, safety, compliance, cost reductions, plant operations, operational management
    
IBM
Published By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : 
asset productivity, operational performance, predictive maintenance, operational costs
    
IBM
Published By: IBM     Published Date: May 11, 2015
This white paper examines key challenges to software development and discusses how companies can leverage best practices and IBM Rational solutions to more profitably and effectively develop software for safety-critical projects while complying with the DO-178C standard.
Tags : 
ibm, system engineering, do-178c, compliance, safety-critical systems, product development
    
IBM
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
ibm, agile development, product development, agile methods, safety critical systems development, project management, productivity
    
IBM
Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management, product development, productivity, qa quality assurance, testing, evidence oriented practices, software development
    
IBM
Published By: Universal Robots     Published Date: May 07, 2015
The new collaborative robots can work alongside humans without any safety caging and are easy to program and deploy. Find out more on what automation challenges the robots can solve in this whitepaper.
Tags : 
universal robots, manufacturing automation, robot arms
    
Universal Robots
Published By: DocuSign     Published Date: Apr 24, 2018
Discover Digital Transaction Management and how it can dramatically improve the real estate business. From safety and legal concerns, to financial costs and user experience improvement, each aspect of the Digital Transaction Management approach is covered in this guide.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
Discover Digital Transaction Management and how it can dramatically improve the real estate business. From safety and legal concerns, to financial costs and user experience improvement, each aspect of the Digital Transaction Management approach is covered in this guide.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges
    
IBM
Published By: Symantec     Published Date: May 02, 2014
Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
Find out why Symantec was named a “Champion” in virtual backup software.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, virtual backup
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment, virtualization
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data
    
Symantec
Published By: DocuSign     Published Date: Feb 13, 2017
In this case study, Erik Haarstad, Chief Financial Officer at REED Construction, discusses how DocuSign helps them become a more efficient company. With DocuSign, REED is able to mitigate risk and reduce costs: the company can send out a safety contract and have it signed within minutes, which frees the company of liabilities and keeps business moving forward.
Tags : 
    
DocuSign
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.