create

Results 1 - 25 of 1605Sort Results By: Published Date | Title | Company Name
By: Telehealth Solutions Limited     Published Date: Jan 06, 2011
By automating tests on blood pressure, BMI and more, a 6,000 patient practice saves 27 . hours a week of staff time, or £12,000 a year in labour costs. Instead of routine measurements and questionnaires being taken in a consultation with a GP or nurse, a patient can use the SurgeryPod to take tests as they wish Using information on the cost of general practice from the NHS Information Centre and private studies on this technology, we've created a potential cost saving estimate.
Tags : 
telehealth, primary care, it
    
Telehealth Solutions Limited
By: CRT HEALTH     Published Date: Jun 21, 2012
A desire to deliver excellent outcomes has helped one Trust create its own blueprint for success
Tags : 
healthcare management
    
CRT HEALTH
By: Dell     Published Date: Jun 16, 2014
Dell Healthcare connects people to the right technology and processes to create information-driven healthcare and accelerate innovation
Tags : 
    
Dell
By: IBM United Kingdom Limited     Published Date: May 23, 2011
A master person index1 (MPI) that links information about an individual across disparate source systems to create a single, accurate, real-time virtual patient record is widely accepted as a requirement for successful eHealth initiatives. IBM's industry-leading MPI, IBM® Initiate® Patient®, accurately identifies and links same patient records across disparate systems. IBM® Initiate® Provider®, also an MPI, relies on the same core technology to support a single accurate view of providers. Together these solutions can create a connected view of the patient and their care team to help coordinate care and facilitate population health.
Tags : 
virtual patient record, ehealth, identifies and links, primary care, acute care, mental health, workforce/hr, policy
    
IBM United Kingdom Limited
By: BigHand     Published Date: Jul 08, 2011
Wrightington, Wigan and Leigh NHS Foundation Trust is a major acute Trust. Innovative and forward thinking, the Trust is dedicated to providing the best possible healthcare for the local population. The Trust aims to continuously provide safe quality care to all patients. Over £200 million is spent each year on a diverse range of reputable general and specialist acute services. Operating across four separate sites with over 750 beds, Wrightington, Wigan and Leigh NHS Foundation Trust serves over 300,000 people in the local area with its 4,000 staff.
Tags : 
digital dictation, clinical correspondence, create, track, transcribe, manage, primary care, acute care
    
BigHand
By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within K-12 education can be a challenge with so many uses and options available. This use case guide takes into consideration the specific needs within K-12 education environments. Whether seeking the best fit devices for STEM labs, looking to create interactive learning spaces, or fulfilling the design needs of today’s interactive classrooms, the uses are varied and there is not a one size fits all approach. Download this guide to learn how the computing choices made can facilitate the teaching and learning environments via the Dell™ OptiPlex™ family of devices. Learn which solutions are recommended for different use cases within the K-12 education world.
Tags : 
    
Dell
By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
By: Google     Published Date: Jan 08, 2018
What happens when teams switch to Google Docs from Microsoft Word Online? They can share documents in nearly half the time, see real-time edits 96% faster and cut down on errors by 88%. Get more findings and how-tos in this detailed report by Principled Technologies, which compares the performance of collaboration and productivity tools included in G Suite and Microsoft Office 365. Download the report now.
Tags : 
productivity tools, collaboration tools, business software
    
Google
By: HP Inc.     Published Date: Dec 06, 2017
Welcome to a new era of 3D printing. Read how HP Jet Fusion 3D Printing is creating a world where you can think and create without limits; and propel your business forward by unlocking the full potential of 3D printing.
Tags : 
hp3d, materialise, ramping, capability, produce, end use, multi jet, fusion
    
HP Inc.
By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
    
Red Hat
By: Red Hat     Published Date: Jan 02, 2018
When Aviva plc, a multinational insurance provider group, acquired Friends Provident International (FPI), it needed to replace FPI’s costly proprietary imaging and bond management workflow system. With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster.
Tags : 
    
Red Hat
By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
More so than ever before, agility matters. A shifting competitive landscape along with heightened customer demands, technological transformations, digital disruptions and a host of other trends, combine to create distinct challenges for business operations executives. Achieving and maintaining a competitive edge in this climate requires an advanced framework for pivoting whenever needed—with minimal cost, maximum efficiency and optimal outcomes. The question for every enterprise in the current environment: Do we have the required agility to drive decision-making capabilities that will continuously sharpen our competitive edge?
Tags : 
operational agility, technological transformations, digital disruptions, decision management
    
Group M_IBM Q1'18
By: OracleSMB     Published Date: Jan 04, 2018
Customer loyalty matters. Loyal customers spend more, advocate more, and are the first to try new products or services. But how do you build a loyal customer base that drives profitable sales? The answer is a loyalty program that provides the data needed to support individualized experiences and show appreciation. And this is where technology can help. Move beyond paper punch cards and emails with personalized greetings. Quickly create an effective loyalty program that keeps your customers coming back for more.
Tags : 
    
OracleSMB
By: FICO     Published Date: Dec 04, 2017
In an era where Big Data decisions demand high-powered tools, organizations everywhere are still mired in complex spreadsheets that limit the speed and precision of their critical customer interactions. Read this fact sheet to learn how you can evolve beyond what spreadsheets alone can achieve: • Allow business users to easily create and compare “what if” scenarios, interact with compelling visualizations, and challenge, improve and build trust with stakeholders and collaborators • Rapidly deploy new optimization features and applications practically at the speed of thought – without leaning on IT – while leveraging existing investments in other analytic tools (such as R, SAS, MATLAB, and even Excel) Download Now
Tags : 
fico, optimization, modeler, industry, analytic, tool, business, solutions
    
FICO
By: Polycom     Published Date: Dec 18, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : 
skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
    
Polycom
By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft
By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
    
Frontier Communications
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.