act

Results 1 - 25 of 14004Sort Results By: Published Date | Title | Company Name
Published By: Intel Mashery     Published Date: Jun 18, 2015
Learn how to overcome challenges facing the healthcare industry today, deliver impactful mobile health experiences, and leverage ecosystem elements needed to drive results.
Tags : 
    
Intel Mashery
Published By: Citrix     Published Date: Jun 25, 2015
Data security in the healthcare industry is vital. Healthcare practices must ensure the privacy and security of protected health information (PHI) and electronic protected health information (ePHI) as defined by the Health Insurance Portability and Accountability Act (HIPAA), and they may face punitive consequences if they don’t. Read this whitepaper to learn how to securely exchange sensitive data, while staying compliant.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
When you need to exchange medical records with referring practices, patients or insurance providers or allow a doctor to have secure mobile access to patient files, you need a trusted solution. ShareFile is affordable, easy to use and secure — customers that handle PHI can sign a BAA with ShareFile and have all data placed in a community cloud dedicated only to our healthcare customers called the ShareFile Cloud for Healthcare. Read this eBook to learn more!
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
The 21st century is facing an uphill battle for better data security, and the healthcare industry is at the front lines. Healthcare providers deal with tremendous amounts of sensitive, legally protected data labeled protected health information (PHI), which requires certain security measures as defined by the Health Insurance Portability and Accountability Act (HIPAA). Mid-sized healthcare practices, face the difficult task of ensuring that all PHI is handled, transferred and stored properly. Read this whitepaper to learn how.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
Citrix ShareFile is the easiest way to send and receive sensitive patient data — all with the tools you need to support your HIPAA compliance — so you can save time and improve security in your healthcare practice. Read this whitepaper to learn more!
Tags : 
    
Citrix
Published By: iDashboards     Published Date: Jun 18, 2015
Boone Hospital needed a solution that would give them the ability to centralize all of their critical data into one location and drilldown into key metrics. With iDashboards, they are now able to identify patterns or trends impacting operations, allowing them to make better business decisions.
Tags : 
    
iDashboards
Published By: Health Language     Published Date: Apr 25, 2015
Download the ICD-10 Readiness Check List, a core set of activities to ensure a successful transition.
Tags : 
    
Health Language
Published By: GE Healthcare     Published Date: Jun 29, 2015
The financial environment in which healthcare providers operate has dramatically shifted with the passage of the Patient Protection and Affordable Care Act (ACA) and the associated market transformations in coverage, care delivery and reimbursement. Importantly, providers are taking on higher levels of risk. They are managing existing fee-for-service arrangements, a growing number of risk-based arrangements, care coordination with community partners, and quality reporting. The complex and changing landscape of how care is organized, measured and reimbursed is forcing financial leaders to seek out new approaches and tools to help them meet and adapt to healthcare reform. This paper will explore some of the market dynamics driving the financial volatility in healthcare and will explore how advanced analytics, with the right IT backbone and organizational competencies, can help organizations successfully identify ways to manage revenue cycle profitability.
Tags : 
    
GE Healthcare
Published By: Innotas     Published Date: May 22, 2012
This whitepaper presents CIOs and IT executives with best practices and real-world examples of how companies are using Project Portfolio Management and IT Governance solutions to help drive innovations within their IT organization.
Tags : 
    
Innotas
Published By: Greenway     Published Date: Apr 22, 2015
The role technology plays in transitioning your practice to ICD-10 can’t be overstated. Getting the right technology is the first step in a three-part process designed to help make your transition to ICD-10 successful.
Tags : 
    
Greenway
Published By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
A mobile, flexible work experience doesn’t just help you attract the best employees—it also helps your organization become more productive and innovative. Read this ebook to find out how Citrix Workspace can help you: • Empower employees and teams anywhere, on any device • Simplify and improve both security and endpoint management • Adopt new technologies more quickly and effectively
Tags : 
    
Citrix ShareFile
Published By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in today’s data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Research’s “Data Security and Privacy Maturity Assessment” to gauge your brand’s competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Research’s recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Infinidat EMEA     Published Date: May 15, 2019
Las soluciones de almacenamiento empresarial de INFINIDAT® se basan en la arquitectura de almacenamiento única y patentada de INFINIDAT: un conjunto totalmente abstracto de funciones de almacenamiento de?nido por software (SDS) integradas con lo mejor del hardware de consumo disponible para la venta. Al unir su software a una plataforma de referencia de hardware altamente probada, INFINIDAT presenta la primera solución real de almacenamiento de?nido por software de clase empresarial.
Tags : 
    
Infinidat EMEA
Published By: HERE Technologies     Published Date: Jul 15, 2019
As a supply chain technology leader in this era of rapid digitization, you are constantly inundated with trends. How do you ignore the hype and employ the best tech innovations for your supply chain? In the latest Gartner Inc. report entitled The 2019 Top Supply Chain Technology Trends You Can’t Ignore you will discover the latest solutions in the supply chain landscape and how to differentiate and prioritize your unique needs in such a dynamic marketplace. Discover how to optimize your unique supply chain through: An in-depth analysis of the trends you can’t ignore Specific use-case examples The impacts of new and innovative technologies and Next step recommendations
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: ETQ     Published Date: Jul 10, 2019
The FDA has announced plans to transition to standard ISO 13485:2016 for medical devices in 2019. In addition, the Medical Device Single Audit Program, MDSAP, has gained traction with full implementation set for 2019. Download this paper to learn more about these two changes from the U.S. Food and Drug Administration’s proposal to harmonize and modernize its Quality System Regulation (QSR).
Tags : 
    
ETQ
Published By: ETQ     Published Date: Jul 10, 2019
Product recalls cost food and beverage companies millions of dollars each year, but 56% of last year's recalls across the US, UK and Ireland were preventable. With compliance challenges becoming more complex and public scrutiny exponentially greater, one recall can cause a world of trouble. The new US Food Safety Modernization Act (FSMA) seeks to encourage a more proactive and predictive approach to food safety. Learn how automation can help you comply with this new regulation by 2020 and avoid a costly product recall.
Tags : 
    
ETQ
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.