HIT Consultant Insightful coverage of healthcare innovation
 

electronic ph

Results 1 - 25 of 46Sort Results By: Published Date | Title | Company Name
Published By: Accelrys     Published Date: Feb 08, 2012
In this 18-page Scientific Computing eBook, Bennett Lass Ph.D. PMP shares best practices based on his experiences planning and managing ELN deployments in large and small pharmaceutical and biotechnology research organizations.
Tags : 
accelrys, eln, symyx, scientific computing, electronic lab notebook, electronic, notebooks, lass, eln deployments, pharmaceutical, pharm, biotech, biotechnology, research, compliance
    
Accelrys
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: Allscripts     Published Date: Sep 16, 2014
Download this ebook to understand the basic foundation that every practice needs in an EHR moving in to 2015 and beyond. Use the easy to follow checklist of criteria to ensure the vendor meets your individual practice’s needs as well.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice, ehr strategy, ehr needs, ehr, practice management, practice management solution, icd-10, meaningful use, mu2, improved outcomes, measuring quality outcomes, population health, fqhc ehr
    
Allscripts
Published By: Allscripts     Published Date: Sep 16, 2014
Download this case study to learn how a network of Federally Qualified Health Centers (FQHCs) partners with Allscripts to improve overall clinical results, meet Meaningful Use and earn an estimated $6.3 million in incentive funding.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice, ehr strategy, ehr needs, ehr, practice management, practice management solution, icd-10, meaningful use, mu2, improved outcomes, measuring quality outcomes, population health, fqhc ehr
    
Allscripts
Published By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
This document contains Confidential, Proprietary and Trade Secret Information (“Confidential Information”) of Radiant Advisors. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Radiant Advisors. While every attempt has been made to ensure that the information in this document is accurate and complete, some typographical errors or technical inaccuracies may exist. Radiant Advisors does not accept responsibility for any kind of loss resulting from the use of information contained in this document. The information contained in this document is subject to change without notice.
Tags : 
    
Cisco
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues
    
Code42
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical, records, reconciliation, safety, pharmacy, doctor, history, medication, ehr, providers, prescription, workflow, accuracy, electronic health records
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
For hospitals, medication reconciliation is critical to quality patient care. Obtaining a complete and accurate list of the patient’s medications sets the cornerstone for good patient care during the hospital stay, informing doctors about treatments in progress, and arming them to prevent potentially harmful drug interactions.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical records, reconciliation, safety, pharmacy, doctor, history, medication, ehr, providers, prescription, workflow, accuracy, efficiency, discharge
    
DrFirst
Published By: EchoSign     Published Date: Jun 21, 2010
Register for this live event: Date: Wednesday, August 4th, 2010 Time: 2:00pm EDT / 11:00am PDT Leading companies are signing contracts electronically because there is no faster, easier or more secure way to get agreements signed. Join our webinar, see a live product demo, and learn how electronic signatures make it easy for : •your customers can easily sign your agreements so it's easier to do business with you •your customers can quickly sign your agreements on a smart phone (i.e. Blackberry, iPhone) -- which means they can sign your agreements on the weekend or when they are out of the office •you can track and manage the status of all your agreements online •you can decrease post sale paperwork by 50% •you can make an document a signable contract by adding initial and signature fields on the fly
Tags : 
echosign
    
EchoSign
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
    
ElcomSoft
Published By: Equinix EMEA     Published Date: Mar 21, 2019
Globally, payments are going digital—whether they are cash moving to cards, QR codes at point of sale (POS), purchases moving from physical to online stores with electronic forms of payment, or payments becoming seamless with in-app experiences. This phenomenon is not new, but does appear to be accelerating. This increased speed of adoption is driven by multiple factors, including an abundance of new electronic payment methods—many of which are layered on top of existing payment methods— focused on convenience, speed and the overall consumer experience. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: Fujitsu Healthcare     Published Date: Nov 04, 2013
In 2010, Queens Pediatrics began evaluating Electronic Health Record (EHR) solutions to improve access to patient records. The practice’s affiliation with North Shore LIJ prompted it to evaluate solutions from Allscripts. North Shore LIJ is the largest user of Allscripts system and provides a financial subsidy to its affiliated practices that adopt the solutions. The challenge for Queens Pediatrics was the small size of its offices, which didn’t provide enough room for multiple workstations or to move mobile computer carts through the hallways. “There were only two options. The physicians either had to use a laptop or we had to have a PC in each room, and that doesn’t work well in a pediatric office,” said Janette Finn, the Practice Manager at Queens Pediatrics. Download this Case Study to find out the Solution to the challenges Queens Pediatrics faced.
Tags : 
electronic health record, ehr, best practices, solutions, medical mobility, case study, electronic health records
    
Fujitsu Healthcare
Published By: GE Healthcare     Published Date: Jun 04, 2014
The central theme of industry wide adoption of EHRs is based on the concept of “meaningful use,” which by design is a metric that will connect all the moving parts of this complicated initiative into a system that communicates and delivers high-grade electronic healthcare services. To qualify as a “meaningful user,” eligible providers must demonstrate use of a “qualified EHR” in a “meaningful manner.” It is a lofty and worthwhile goal. This white paper examines the total cost of ownership for “meaningful” EHR adoption in a physician practice.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it, information technology, practice management
    
GE Healthcare
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Hyper-complex production meets cognitive computing. Electronics manufacturing is surrounded by continuous complexity. Executives face rising resource costs in traditionally low-cost production markets. They must address increasing customization, shorter lead times, frequently changing requirements and shrinking order sizes – all while managing a sophisticated supply network. They need to examine automation potential and maintain critical institutional knowledge. Thinner margins and increased competition threaten consistent quality, risk greater downtime and reduce desired flexibility. Investments in new equipment and automation systems are increasing the amount of data available from the shop floor, but most is not used to its full potential. Now, cognitive manufacturing is transforming production to address such complexity.
Tags : 
cognitive manufacuring, electronics manufacturing, production transformation, automation systems, manufacturing
    
Group M_IBM Q1'18
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep, web portal
    
IBM
Published By: IBM     Published Date: Jan 12, 2009
Cardiff University was faced with the challenge of modernizing its work environment. By utilizing IBM WebSphere Portal software, they have streamlined their business processes with electronic forms and role-based portal applications. This webcast explains how you can reap the benefits of IBM portals and Web 2.0 in your own environment.
Tags : 
ibm, ibm portals, electronic forms, cardiff university, ibm websphere portal, streamline business processes, portal applications
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
PTC, the Product Development Company® today announced that Samsung Electronics Co., LTD (SEC), a leading digital products manufacturer of mobile phones, televisions, and semiconductors, has selected PTC Windchill as its digital product development data repository to manage an integrated BOM of mechanical, electrical and software data across its globally distributed product development environment. Windchill is the standard enterprise PLM solution at SEC because of its powerful, Web-based support of key product development processes on a single technology architecture and execution environment.
Tags : 
ibm, telelogic, samsung, ptc windchill, press release, electronics industry, product development, global bom, product lifecycle management, content management, dynamic publishing
    
IBM
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.