it systems

Results 1 - 25 of 2553Sort Results By: Published Date | Title | Company Name
By: Imprivata     Published Date: Sep 13, 2010
East Kent Hospitals University NHS Foundation Trust is one of the largest hospital trusts in England, with five hospitals and several outpatient facilities across East Kent and Medway. The Trust provides a wide range of services within both hospital and community settings and employs more than 7,500 staff who require access to a variety of healthcare applications and support systems.
Tags : 
clinical access, it
    
Imprivata
By: IBM     Published Date: Feb 15, 2012
Healthcare providers across the UK are being asked to respond to a number of challenges resulting from the wider social, political and economic climate that currently exists in the country.
Tags : 
    
IBM
By: GE Healthcare     Published Date: Dec 10, 2012
Centricity Clinical Archive solution1 is a multi-ology, multi-site vendor-neutral solution that transforms rigid departmental silos into fluid information sharing systems. Centricity Clinical Archive offers healthcare enterprises
Tags : 
healthcare management
    
GE Healthcare
By: IBM United Kingdom Limited     Published Date: May 23, 2011
A fundamental issue facing healthcare worldwide is tying fragmented information and data silos together to increase intelligence. This truth is self-evident to healthcare leaders worldwide. The costs of providing healthcare are increasing at an unsustainable rate. Healthcare systems everywhere are under enormous pressure to improve care quality while operating with reduced budgets. The increased competition in healthcare requires health information exchange solutions that include master indexes at the core to provide an improved understanding of patients, physicians, business partners and the relationships between them.
Tags : 
healthcare, improve care quality, reduced budgets, information, health systems, intelligent middleware, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
IBM United Kingdom Limited
By: IBM United Kingdom Limited     Published Date: May 23, 2011
A master person index1 (MPI) that links information about an individual across disparate source systems to create a single, accurate, real-time virtual patient record is widely accepted as a requirement for successful eHealth initiatives. IBM's industry-leading MPI, IBM® Initiate® Patient®, accurately identifies and links same patient records across disparate systems. IBM® Initiate® Provider®, also an MPI, relies on the same core technology to support a single accurate view of providers. Together these solutions can create a connected view of the patient and their care team to help coordinate care and facilitate population health.
Tags : 
virtual patient record, ehealth, identifies and links, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
IBM United Kingdom Limited
By: IBM United Kingdom Limited     Published Date: May 24, 2011
There is a problem in the healthcare market today. For improved quality of care, increased efficiencies and to meet Meaningful Use requirements, providers of healthcare services (health systems, hospitals, clinics, doctors) want to share health information with one another electronically. Because these providers operate in heterogeneous technology and data environments, it is challenging to physically connect their systems and disparate representations of patients, providers, organizations, and locations.
Tags : 
improved quality of care, increased efficiencies, proactively improve the health, patient-centric, improved quality, health information exchange, hie, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
IBM United Kingdom Limited
By: Vanguard Healthcare Solutions Ltd     Published Date: Mar 16, 2011
It is universally agreed that innovation must be the driving force behind the reconfiguration and evolution of the NHS. Innovation and innovative thinking, however, take many forms, and it is important that the pursuit of innovation does not focus solely on that which is new and high tech. In fact, it is often simple and accessible solutions - solutions which have been proven successful in practice - that provide an answer when a new challenge presents itself. Shifting delivery of services from hospitals to community settings is one of the biggest challenges that has faced the NHS in living memory, and one that will require no small measure of innovative thinking to overcome. The answer, however, will not be found in high tech IT systems, or process management, or any new medical gadgets - these are a given in such a complex sector. In its simplest form, the problem is about being able to provide a suitable clinical environment in a local setting, quickly, safely and cost-effectively. This video demonstrates the ways in which mobile healthcare facilities can be used to tackle the issues facing the modern NHS, and deliver the accessible and affordable innovation that NHS organisations need in this era of cost-saving and efficiency.
Tags : 
mobile surgical units, nhs, high tech, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Vanguard Healthcare Solutions Ltd
By: Net App     Published Date: Jun 02, 2010
Find out how Nottinghamshire Healthcare NHS Trust reduced their IT maintenance time from 70% to 11%. Having had a complex IT infrastructure which required separate systems with individual back up windows, see how NetApp made the processes more simple, cost effective and easy to manage, reducing overall time and increasing productivity
Tags : 
netapp, it
    
Net App
By: Dell     Published Date: Mar 27, 2014
Locala wanted to improve healthcare by integrating technology more deeply into the provision of services. A key goal was boosting caregiver access to real-time patient data while in the field. The healthcare provider chose a private cloud solution with single-service desk from Dell. Clinicians also gained Dell Latitude laptops to connect to their cloud-based systems and for web conferencing.
Tags : 
    
Dell
By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “personalized customer service”, “personalized customer support”, “personalized customer experience”, “customer support insights”, “customer service personalization”, “customer support personalization”, “customer experience personalization”
    
Kustomer
By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
By: Workday APAC     Published Date: Oct 07, 2019
Limited visibility into the talents of the workforce made HR transformation difficult. The company has been relying on multiple legacy systems as a result of multiple mergers and acquisitions, and multiple HR departments. That's where Workday comes in.
Tags : 
    
Workday APAC
By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
    
Avetta
By: IBM APAC     Published Date: Sep 30, 2019
Companies that are undergoing a technology-enabled business strategy such as digital transformation urgently need modern infrastructure solutions. The solutions should be capable of supporting extreme performance and scalability, uncompromised data-serving capabilities and pervasive security and encryption. According to IDC, IBM’s LinuxONE combines the advantages of both commercial (IBM Z) and opensource (Linux)systems with security capabilities unmatched by any other offering and scalability for systems-of-record workloads. The report also adds LinuxONE will be a good fit for enterprises as well as managed and cloud service provider firms. Read more about the benefits of LinuxONE in this IDC Whitepaper.
Tags : 
    
IBM APAC
By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Every company markets to consumers differently. From call centers to emails to apps and aggregator sites, orchestrating a relationship marketing strategy requires a bespoke collection of marketing technologies. Marketers have the budgets to spend on CRM, email, mobile and data management, but fitting these capabilities together and ensuring they work with legacy business systems is not easy.
Tags : 
    
Selligent Marketing Cloud
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.