base

Results 1 - 25 of 4849Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 16, 2015
How far along are health plans and providers in designing and implementing value-based models for care delivery and reimbursements?
Tags : 
    
SAS
Published By: MarkLogic     Published Date: Mar 17, 2015
See how Marklogic has approached patient-centered care that is based on leveraging a complete understanding of patients, from various pedestrian –and off-the-beaten-path – perspectives.
Tags : 
    
MarkLogic
Published By: Health Language     Published Date: Mar 12, 2015
Why normalizing your clinical and claims-based data into standard terminologies is critical in supporting forward-thinking initiatives such as big data analytics, population health management, and semantic interoperability among systems.
Tags : 
    
Health Language
Published By: GE Healthcare     Published Date: Jun 29, 2015
The financial environment in which healthcare providers operate has dramatically shifted with the passage of the Patient Protection and Affordable Care Act (ACA) and the associated market transformations in coverage, care delivery and reimbursement. Importantly, providers are taking on higher levels of risk. They are managing existing fee-for-service arrangements, a growing number of risk-based arrangements, care coordination with community partners, and quality reporting. The complex and changing landscape of how care is organized, measured and reimbursed is forcing financial leaders to seek out new approaches and tools to help them meet and adapt to healthcare reform. This paper will explore some of the market dynamics driving the financial volatility in healthcare and will explore how advanced analytics, with the right IT backbone and organizational competencies, can help organizations successfully identify ways to manage revenue cycle profitability.
Tags : 
    
GE Healthcare
Published By: Proofpoint     Published Date: May 17, 2012
This white paper discusses key security issues focused on email, Web and other communication and collaboration systems.
Tags : 
    
Proofpoint
Published By: Biamp     Published Date: Jul 18, 2012
5 Ways Network-based Paging is Improving Hospital Operations
Tags : 
practice management, electronic health records, cloud computing, document imaging, business intelligence, enterprise content management, data warehousing
    
Biamp
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: Dell SB     Published Date: Jul 31, 2019
Take back control of your infrastructure projects and build the business case using your own data with Dell EMC’s Live Optics. We can help create a defensible proposal, unique to your environment, using your Live Optics data. Take the guess work out of your projects and build a new infrastructure based on your actual needs. When can we set up a call to discuss?
Tags : 
    
Dell SB
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYER’S GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.
Tags : 
    
BeyondTrust
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: HERE Technologies     Published Date: Sep 26, 2019
There are many challenging tasks when developing autonomous driving features to cope with the various changes to the environment. Often lane markings are faded or are covered with snow or dirt and can be difficult for a camera-based detection system. In this report, VSI addresses the application of HD map assets to improve the safety and performance of automated vehicle features within the context of lane keeping and trajectories. VSI has been examining applications of HD maps in our test vehicle. In a previous report, we discussed map-based Adaptive Cruise Control (ACC) using the advised speed attributes from HERE’s HD map data. In this report, we apply HERE’s HD map data to a lane keeping application and examine performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
A utomobile manufacturers find meeting the requirements of a just - in - time supply chain one of their biggest challenges , but with advances in location technology manufacturers can meet even the strictest shipping deadlines . With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to p repar e your supply chain for the future wit h the application of location intelligence to: ? Gain location - based insights to help optimize processes and inform decision making ? Set accurate ETAs with reliable real - time information ? Use real - time visibility to proactively solve problems ( like bottlenecks ) as they occur ? Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: BillingPlatform     Published Date: Jul 30, 2019
Organization leaders and companies of all sizes are leveraging digital transformation in their industry, market, and business using a myriad of disruptive technologies like connectivity, the Internet of Things, blockchain, business intelligence and big data. CFOs who manage to get in front of these technologies will lead their businesses to greater success. This eBook illustrates how cloud-based billing management offers the quickest path toward this transformation. Download this eBook to explore how the right solution can help you: • Monetize IoT and increase revenue • Launch product innovations quickly • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today.
Tags : 
    
BillingPlatform
Published By: BillingPlatform     Published Date: Jul 30, 2019
Discover How Cloud-based Billing Delivers Transformation Enterprise leaders and companies of all sizes are leveraging digital transformation through disruptive technologies like the Internet of Things, AI, business intelligence and big data. This eBook demonstrates 5 strategies for leading the charge for change within your business. Discover how to quickly leverage digital transformation in your technology stack and monetize it quickly with cloud-based billing. Download this eBook to explore how the right solution can help you: • Launch product innovations quickly • Monetize IoT and increase revenue • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today!
Tags : 
    
BillingPlatform
Published By: BillingPlatform     Published Date: Jul 30, 2019
See How BillingPlatform Mediates IoT Devices for Global Success Read this case study to see how a global transportation provider utilized cloud-based billing to make the most of their Internet of Things devices and overcome regional taxation issues. This ClearChannel subsidiary needed to enable a complex, IoT-based business model and chose BillingPlatform for its superior data and monetization capabilities.
Tags : 
    
BillingPlatform
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.