cat

Results 1 - 25 of 12464Sort Results By: Published Date | Title | Company Name
Published By: Imprivata     Published Date: Mar 06, 2015
This whitepaper details ten ways Imprivata Cortext helps organizations meet all of the standards laid out for electronic communication of PHI.
Tags : 
    
Imprivata
Published By: Spok     Published Date: Jun 18, 2015
On-call schedules, patient monitors, diverse mobile devices and healthcare IT systems all contribute to a web of information that is difficult to navigate and manage. This eBrief offers nine tips to bring order and improve patient care.
Tags : 
    
Spok
Published By: Citrix     Published Date: Jun 25, 2015
When you need to exchange medical records with referring practices, patients or insurance providers or allow a doctor to have secure mobile access to patient files, you need a trusted solution. ShareFile is affordable, easy to use and secure — customers that handle PHI can sign a BAA with ShareFile and have all data placed in a community cloud dedicated only to our healthcare customers called the ShareFile Cloud for Healthcare. Read this eBook to learn more!
Tags : 
    
Citrix
Published By: iDashboards     Published Date: Jun 18, 2015
Boone Hospital needed a solution that would give them the ability to centralize all of their critical data into one location and drilldown into key metrics. With iDashboards, they are now able to identify patterns or trends impacting operations, allowing them to make better business decisions.
Tags : 
    
iDashboards
Published By: Health Language     Published Date: Mar 12, 2015
A Guide for EHR Product Managers
Tags : 
    
Health Language
Published By: PC Connection     Published Date: Jul 01, 2015
EMC XtremIO is an all-flash scale-out enterprise storage array that provides substantial improvements to I/O performance. Purpose-built to leverage flash media, XtremIO delivers new levels of real-world performance, administrative ease, and advanced data services for applications. Listen to Ted Basile, XtremIO Partner Development, Strategy and Marketing, discuss EMC XtremIO. He shares how XtremIO delivers consistent performance and service levels, while providing operational efficiency and business process improvements at the application layer.
Tags : 
    
PC Connection
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-Identification 101, your first steps into understanding the need and use of de-identified data for secondary purposes. Learn how to unlock PHI safely and securely.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-identification 201 builds on the fundamentals of health data de-identification, including: understanding the risk in a dataset, and major differences between masking and de-identification.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
Re-identification attacks pose serious risks not only for the organizations that have been attacked but also for the individuals whose personal information has been compromised.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
The answer to re-identification risk is not to limit the sharing of data; rather, it is to apply the science and use methods that ensure data is reliably de-identified.
Tags : 
    
Privacy Analytics
Published By: Ascom     Published Date: May 17, 2012
Unite is Ascom's vital communication platform that links systems with sophisticated, Mission-Critical working processes.
Tags : 
    
Ascom
Published By: Proofpoint     Published Date: May 17, 2012
This white paper discusses key security issues focused on email, Web and other communication and collaboration systems.
Tags : 
    
Proofpoint
Published By: Kronos     Published Date: May 22, 2012
Hospitals and Health Systems are becoming more reliant on the cloud as they look to third parties for infrastructure and application support.
Tags : 
    
Kronos
Published By: Interactions     Published Date: Oct 29, 2019
We all know that the customer experience is a big deal. By 2020, customer experience will overtake price and product as the key differentiator. But due to the complicated nature of integrating a large-scale, customer-facing technology like an IVA, many companies don’t know where to start or how to ensure they are creating the best possible virtual assistant. We’ve compiled some key technologies and features that should be top of mind when assessing internal expertise or selecting an external vendor.
Tags : 
    
Interactions
Published By: SADA     Published Date: Oct 25, 2019
Google commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying G Suite. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of G Suite on their organizations. Google G Suite offers a set of work applications that help organizations transform their businesses. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed eight enterprise customers with years of experience using G Suite.
Tags : 
    
SADA
Published By: Kindred Hospital Rehabilitation Services     Published Date: Aug 26, 2019
Research has demonstrated enhanced technology can improve communication between patients, families and care providers, improve motivation, and has the potential to effect better outcomes and higher levels of patient satisfaction. Additionally, better technology also makes the workplace more appealing to employees. With the investment and complexity involved, how can health systems utilize technology in the most efficient and effective ways to drive business results?
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: SendBird     Published Date: Nov 14, 2019
On-demand businesses can use this guide to design and plan user-to-user messaging to drive more engagement and gross transaction value
Tags : 
    
SendBird
Published By: SendBird     Published Date: Nov 14, 2019
Media brands are beginning to see that while their content generates excitement, all of their audience engagement takes place on external platforms. As a result, companies such as Facebook and Twitter control the audience’s experience — and reap the many benefits of hosting conversations and interactions surrounding content they did not create. For customers, this fragmented landscape creates a disjointed user experience because they’re forced to constantly switch between applications and risk missing the action in the process. They use one app to consume content, another app to discuss with friends, and yet another app to chat with the broader community.
Tags : 
    
SendBird
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
De performance en manier van aanbieden van applicaties zijn veranderd. Moet uw netwerk ook veranderen? De cloud verandert hoe IT-teams applicaties aanbieden en de performance van die applicaties beheren. Applicaties komen steeds verder van de gebruikers af te staan en bevinden zich dan in netwerken waarover de eigen IT-afdeling geen rechtstreekse controle meer heeft. Veel apps staan niet meer in het datacenter van de organisatie, maar in een openbare of hybride cloudomgeving. Er bestaan tegenwoordige applicaties die zijn gebouwd op microservices en containers.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Met Citrix Networking en Google Cloud samen pakt u diverse uitdagingen aan met betrekking tot uw application delivery en beheer.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Riskified     Published Date: Nov 04, 2019
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We’ve identified six key ‘sub-seasons’ and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season. This report explores how merchants can stay competitive and boost revenue, while meeting the sophisticated expectations of holiday shoppers. What you will get from this report: 1. Tools to enable more cross-border eCommerce: Get insights to help you capitalize on the holiday season’s opportunities 2. Fraud trends for different segments of the holiday season: Better manage risk during the most lucrative quarter for eCommerce merchants 3. Insights on six key holiday sub-seasons: Identify unique consumer preferences to boost revenue
Tags : 
    
Riskified
Published By: Corrigo     Published Date: Nov 01, 2019
Think about all the ways your life today is different than it was ten years ago. Think about how you shop, how you get around, how you plan travel, and how you stay in touch. So many things that used to be a hassle are now almost effortless. If your life feels different, it’s because you’re living in a new era – what experts are calling the 4th Industrial Revolution. You’ve probably heard some of the more catch-phrased components – big data, artificial intelligence, deep analytics. Some of these still seem like science fiction, but they are very real, very active, and crucial parts of what we at Corrigo call the Intelligence Economy. In the Intelligence Economy, data is collected, crunched, and activated to solve problems and create greater value for customers, partners, and employees. It’s the information, insights, and automations that enhance experiences, predict needs, strengthen connections, and deliver the right info or action at the right time, in the right way. And the Intellig
Tags : 
    
Corrigo
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.