HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 226 - 250 of 944Sort Results By: Published Date | Title | Company Name
Published By: DigiCert     Published Date: Jun 19, 2018
Your organizationís websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isnít added to the ecommerce site, if the mobility platform isnít improved, if the network and compute back end arenít upgraded, if storage and database performance isnít accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms canít assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an ďagile-cloudĒ Ė an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : 
virtual, data, centers, services
    
dinCloud
Published By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isnít added to the ecommerce site, if the mobility platform isnít improved, if the network and compute back end arenít upgraded, if storage and database performance isnít accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms canít assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an ďagile-cloudĒ Ė an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : 
empowered, it< tech, ecommerce
    
dinCloud
Published By: dinCloud     Published Date: Jun 19, 2018
DermaTran Health Solutions is a national group of compounding pharmacies. Central to its operations is the Compounder application, which DermaTran needed to deploy multiple instances of simultaneously. When issues with its former app virtualization solution Ė XenApp Ė persisted, DermaTran evaluated alternatives, ultimately migrating to a turn-key cloud-based application publishing service.
Tags : 
healthcare, provider, cloud, operations
    
dinCloud
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence
    
Diskeeper Corporation
Published By: DNN Corp.     Published Date: Sep 03, 2014
It is important to understand how to select an online community platform that best addresses your organizationís business needs and feature requirements. This guide is designed to help your organization gain a better understanding of these issues and select the online community platform best suited to your needs.
Tags : 
online community platforms, community software needs, dnn corporation
    
DNN Corp.
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals Ė how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Domino     Published Date: Oct 05, 2018
Industry 4.0 promises a whole host of benefits to food manufacturers ó from reduced errors and more uptime to unprecedented visibility into operations at every step in the process. But for many food manufacturers out there, this is uncharted territory. Getting machines of various vintages connected and communicating seamlessly with each other and with existing control systems can seem like an expensive and difficult proposition. Coding and marking is a great place to start for many companies, since SKU proliferation is putting greater demands on packaging lines and introducing additional opportunities for human error. In this brief white paper, Domino examines five key issues with integrating coding and marking systems that often present challenges for food manufacturers along the road to Industry 4.0.
Tags : 
    
Domino
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response, electronic health records, cloud computing, meaningful use, mobile / wireless, business intelligence
    
DrFirst
Published By: Drillinginfo     Published Date: Nov 06, 2015
In the DI Expert series, we cover a broad range of topics to appeal to the working interests of oil and gas professionals around the globe. From a piece inspired by a Mud Loggerís ďAsk Me AnythingĒ on Reddit, to an article that explores the frustrations and issues surrounding most oil and gas software, this edition introduces analyses that are sure to stimulate great discussion points among colleagues in all disciplines of the industry. We also reveal the greatest driver of oilfield innovation and value in the 21st Century, and highlight the prolific counties that account for over half of all oil and natural gas production in the U.S.
Tags : 
oil and gas, oil and gas software, oilfield innovation, drillinginfo
    
Drillinginfo
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers
    
Duo Security - Nethawk
Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Securityís free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers
    
Duo Security - Nethawk
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Eaton     Published Date: Jan 26, 2016
This white paper discusses the issues making data center cooling more challenging than ever and explains why starting the data center design process with the racks rather than the room can help businesses reduce energy consumption, increase capacity and optimize floor space utilization.
Tags : 
eaton, data center design, data center cooling, floor space utilization, data center solutions
    
Eaton
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
There are many difficult issues related to WAN complexity, cost, and performance. However, many of these issues can be solved through device consolidation. Download this white paper to learn how to achieve efficiencies and competitive advantages through affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management, finance, financial records, audit, auditing, regulatory compliance, ecora
    
Ecora Software
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions
    
eFax
Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization
    
eG Innovations
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Here’s a test: Can you list all the issues your software team is working on now? Can you sort them by severity, priority, features affected, and other criteria such as whether the issue is a bug, customer request, or product enhancement? Can you show the histories of all related comments and actions? Can you distribute this information easily to concerned individuals — showing only the information relevant to them?
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, software testing, quality assurance, quality control, elementool
    
Elementool Inc.
Published By: Elementool Inc.     Published Date: Jan 28, 2008
A help desk is a very helpful customer service tool for businesses operating a website online. Doing business online creates a distance between the business and the customer. Customers are not dealing with a person face-to-face anymore. This makes being quick to respond to customer issues very important and that is where a help desk comes in.
Tags : 
customer service, help desk, helpdesk, customer satisfaction, online help, customer support, support desk, elementool
    
Elementool Inc.
Published By: EMC     Published Date: Oct 12, 2015
This white paper highlights the extended collaboration issues commonly experienced companies in the energy and engineering industries.
Tags : 
collaboration, security risk, public cloud architecture, share documents, supplier exchange, saas, emc supplier exchange
    
EMC
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.