electronic

Results 201 - 225 of 451Sort Results By: Published Date | Title | Company Name

How High Bandwith, Low Latency Ethernet Communications is Changing the Practice of Medicine

Published By: Comcast Business     Published Date: Mar 24, 2015
New research findings, new technologies, and the evermore urgent needs for speed and cost-efficiency are converging to drive a revolution in medicine. Supporting this convergence are high-speed secure telecommunications networks, enabling unprecedented teamwork among institutions, researchers, practitioners and patients to create a new paradigm: telemedicine, the exchange of medical information via electronic communications among dispersed facilities and patients to improve patient health. Download this white paper to learn more about telemedicine.
Tags : 
bandwith, ethernet communications, medicine, telemedicine, telecommunications, healthcare technology, networking, it management, wireless
    
Comcast Business

Enabling Better Patient Care Through Mobility: Insights for Healthcare Organizations

Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security, it management, wireless
    
Comcast Business

2014 eInvoicing Benchmarks

Published By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : 
einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing, enterprise applications
    
Coupa Software

Laying a Strong Foundation: Building your Legal Hold Process with Code42 CrashPlan

Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42

Data Security and Financial Services

Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, financial services, client data protection, security risk
    
Citrix ShareFile

Data Security And Financial Services

Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security
    
Citrix ShareFile

Data Security And Financial Services

Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security, anti virus
    
Citrix ShareFile

Healthcare Document Security At A Glance: Stats, Risks, And More

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America

The 5 Pillars of Healthcare Data Security

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America

The Value of Blending eServices and the Contact Center

Published By: Interactive Intelligence     Published Date: Dec 02, 2010
How a contact center deploys and manages eServices - non-voice interaction channels such as email, chat, SMS and social media - is the key to offering electronic services that attract modern tech-savvy customers. Learn about eServices best practices from Sheila McGee-Smith, founder of McGee-Smith Analytics, and Tim Passios, Director of Solutions Marketing at Interactive Intelligence, and how three diverse companies successfully utilize eServices to their advantage.
Tags : 
interactive intelligence, sms, media channel, short message service, wireless, mobile communications, gsm, social media, wireless communications, wireless messaging
    
Interactive Intelligence

IT Compliance Perspectives & Best Practices

Published By: Mainline Information Systems     Published Date: Oct 20, 2009
In this webcast, you will hear from an attorney specializing in Information Technology Law and a technology specialist who can help you sort through different solutions in the marketplace. You will learn how to adapt to the number of compliance regulations, data privacy laws, and court orders relating to electronic records.
Tags : 
it compliance, mainline information systems, information technology law, data privacy laws, government regulations, industry best practices, compliance, best practices
    
Mainline Information Systems

New Intel Xeon Processor 5500 Series boosts speed and performance

Published By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, (eda) applications, quad-core processors, 64-bit intel® xeon® processor, pre-silicon verification, automation, global design team and collaboration, simulation synthesis, layout versus schematic
    
IBM

High-end processors deliver high-end value

Published By: IBM     Published Date: May 04, 2009
Even with increased start-up costs, higher-end processors can offer a lower TCO thanks to better performance. This white paper shows detailed comparisons between higher- and lower-end servers with surprising results—including a 42% lower TCO and 87% faster performance for the higher-end processor.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, total cost of ownership, tco, electronic design automation, eda, next-generation intel, return on investment, roi
    
IBM

Case Study-The Austin Diagnostic Clinic recovers critical data in less than an hour with IBM Tivoli

Published By: IBM     Published Date: Oct 21, 2009
The Austin Diagnostic Clinic recovers critical data in less than an hour with IBM Tivoli Storage Manager FastBack software. ADC reduced backup window for electronic medical records from two hours to five minutes; were able to restore many services in under an hour; reduced time and cost of server consolidation initiative and achieved up to 75% reduction in testing times.
Tags : 
tivoli, ibm, austin diagnostic clinic, data recovery, storage, data protection, data recovery, it environment, backup and recovery, storage management
    
IBM

The Future of B2B Leaders: The Transition from Operations to Business Value Drivers

Published By: Inovis     Published Date: Aug 06, 2007
This white paper provides an overview of the growing opportunities for EDI managers and coordinators. It highlights how their role can change from being responsible for implementation of technologies for operational activities to being infrastructure leaders. It shows how they can deliver increased efficiencies and velocity for value chain automation, which increases visibility, control and agility for a business.
Tags : 
edi, electronic data interchange, electronic data, inovis, supply chain, manufacturing, productivity, infrastructure, bpm, bpa, business process, roi, spend management, cost control, xml, data management, business process automation, business process management, enterprise resource planning, return on investment
    
Inovis

Migration Made Easy: Switching VAN Providers Without the Fire Drills

Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm, supply chain, migration, inovis, tco, total cost of ownership, business metrics, vendor selection, best practices, return on investment, supply chain management, collaborative commerce, spend management
    
Inovis

Achieving the Perfect Order: Improving Supply Chain Communication

Published By: Inovis     Published Date: Aug 06, 2007
No enterprise is an island. Goods and services flow in from suppliers. When you include suppliers of wares for raw material extractors, along with recyclers that turn consumer and commercial waste into new raw materials and finished goods, it is a supply chain with no beginning and no end.
Tags : 
supply chain management, scm, supply chain, supplier, vendor management, vendor selection, communication, collaboration, manufacturing, business process management, business process automation, business process, bpm, bpa, van, vans, edi, electronic data, roi, inovis
    
Inovis

24/7 Uptime for Electronic Health Records

Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies

Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security, secure instant messaging, web service security, mobile data systems, wireless messaging, data protection
    
Proofpoint

Email Archiving: A Proactive Approach to e-Discovery

Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages, email security, messaging, search and retrieval
    
Proofpoint

Email Archiving: Understanding the Reasons, Risks and Rewards

Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security, backup and recovery, email security, data protection, search and retrieval
    
Proofpoint

Flexible Solutions for the New World of Work

Published By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : 
microsoft, office, office suites 2007, enterprise applications, platforms, data management, windows
    
Microsoft Office

Encryption is not enough for DRM

Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.
Tags : 
digital rights management, locklizard, key management, time limitations enforcement, security, it management, knowledge management, enterprise applications
    
LockLizard

Building a Highly Reliable SAN

Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid, storage, iscsi, storage management
    
Dell Storage
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.