data

Results 1 - 25 of 12837Sort Results By: Published Date | Title | Company Name
Published By: Intel Mashery     Published Date: Jun 18, 2015
The rapid rise and ongoing proliferation of mobile devices, coupled with expectations of ubiquitous information availability, are transforming the health, wellness, and fitness industries. As more data becomes available and the demand for better health and fitness information increases, it’s clear that a solid API strategy is needed to integrate these disparate sources while protecting sensitive data.
Tags : 
    
Intel Mashery
Published By: Citrix     Published Date: Jun 25, 2015
Data security in the healthcare industry is vital. Healthcare practices must ensure the privacy and security of protected health information (PHI) and electronic protected health information (ePHI) as defined by the Health Insurance Portability and Accountability Act (HIPAA), and they may face punitive consequences if they don’t. Read this whitepaper to learn how to securely exchange sensitive data, while staying compliant.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
When you need to exchange medical records with referring practices, patients or insurance providers or allow a doctor to have secure mobile access to patient files, you need a trusted solution. ShareFile is affordable, easy to use and secure — customers that handle PHI can sign a BAA with ShareFile and have all data placed in a community cloud dedicated only to our healthcare customers called the ShareFile Cloud for Healthcare. Read this eBook to learn more!
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
The 21st century is facing an uphill battle for better data security, and the healthcare industry is at the front lines. Healthcare providers deal with tremendous amounts of sensitive, legally protected data labeled protected health information (PHI), which requires certain security measures as defined by the Health Insurance Portability and Accountability Act (HIPAA). Mid-sized healthcare practices, face the difficult task of ensuring that all PHI is handled, transferred and stored properly. Read this whitepaper to learn how.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
Citrix ShareFile is the easiest way to send and receive sensitive patient data — all with the tools you need to support your HIPAA compliance — so you can save time and improve security in your healthcare practice. Read this whitepaper to learn more!
Tags : 
    
Citrix
Published By: iDashboards     Published Date: Jun 18, 2015
Boone Hospital needed a solution that would give them the ability to centralize all of their critical data into one location and drilldown into key metrics. With iDashboards, they are now able to identify patterns or trends impacting operations, allowing them to make better business decisions.
Tags : 
    
iDashboards
Published By: MarkLogic     Published Date: Mar 17, 2015
See how Marklogic has approached patient-centered care that is based on leveraging a complete understanding of patients, from various pedestrian –and off-the-beaten-path – perspectives.
Tags : 
    
MarkLogic
Published By: ZirMed     Published Date: Mar 18, 2015
Welcome to the world of prescriptive analytics—the data science that goes one step beyond predictive.
Tags : 
    
ZirMed
Published By: Health Language     Published Date: Mar 12, 2015
Why normalizing your clinical and claims-based data into standard terminologies is critical in supporting forward-thinking initiatives such as big data analytics, population health management, and semantic interoperability among systems.
Tags : 
    
Health Language
Published By: PC Connection     Published Date: Jul 01, 2015
EMC XtremIO is an all-flash scale-out enterprise storage array that provides substantial improvements to I/O performance. Purpose-built to leverage flash media, XtremIO delivers new levels of real-world performance, administrative ease, and advanced data services for applications. Listen to Ted Basile, XtremIO Partner Development, Strategy and Marketing, discuss EMC XtremIO. He shares how XtremIO delivers consistent performance and service levels, while providing operational efficiency and business process improvements at the application layer.
Tags : 
    
PC Connection
Published By: Health Data Management     Published Date: May 13, 2015
The recent Anthem Health data breach provided a jarring alarm-clock like jolt to the healthcare industry. Learn what healthcare companies are doing to prevent such breaches and how they are protecting themselves.
Tags : 
    
Health Data Management
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-Identification 101, your first steps into understanding the need and use of de-identified data for secondary purposes. Learn how to unlock PHI safely and securely.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-identification 201 builds on the fundamentals of health data de-identification, including: understanding the risk in a dataset, and major differences between masking and de-identification.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
Re-identification attacks pose serious risks not only for the organizations that have been attacked but also for the individuals whose personal information has been compromised.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
The answer to re-identification risk is not to limit the sharing of data; rather, it is to apply the science and use methods that ensure data is reliably de-identified.
Tags : 
    
Privacy Analytics
Published By: Mach7 Technologies     Published Date: Apr 22, 2015
Healthcare organizations are defining organization-specific strategies to gain control of patient data access, sharing and management.
Tags : 
    
Mach7 Technologies
Published By: Tableau     Published Date: May 17, 2012
When times are tough and budgets tight, healthcare organizations of all sizes need to use their resources wisely and produce value quickly.
Tags : 
    
Tableau
Published By: Tableau     Published Date: May 17, 2012
3 ways healthcare providers are transforming data from information to insight
Tags : 
    
Tableau
Published By: Proofpoint     Published Date: May 22, 2012
Here's what you need to know about the latest security, privacy and data breach regulations that apply to private healthcare information.
Tags : 
    
Proofpoint
Published By: Imation     Published Date: May 17, 2012
Protecting data is a critical challenge for hospitals facing a daunting array of regulatory and compliance requirements for medical records and images. Learn how one small hospital solved their long-term data retention challenges.
Tags : 
    
Imation
Published By: Imation     Published Date: May 22, 2012
Learn how scalable, tiered storage can simplify the management and protection of data while reducing the expense of long-term retention.
Tags : 
    
Imation
Published By: CommVault     Published Date: Jun 18, 2012
This paper examines modern and adaptable strategies for the retention lifecycle of information that frees healthcare providers from the complexities of retaining and accessing data for the long term, while radically lowering business risk.
Tags : 
practice management, electronic health records, cloud computing, document imaging, business intelligence
    
CommVault
Published By: Elsevier     Published Date: Jul 27, 2012
Now Evolving Rapidly, Readmission Risk Tools Help Hospitals and Health Systems to Reduce Admissions that Negatively Affect Reimbursements and Quality
Tags : 
information technology
    
Elsevier
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.