pts

Results 326 - 350 of 353Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Oct 19, 2011
This article includes a one-page preview that quickly summarizes the key ideas and provides an overview of how the concepts work in practice along with suggestions for further reading.
Tags : 
harvard business, finance, business, analytics, data, adaptive, marketry, asset management
    
Adaptive Planning
Published By: Allscripts     Published Date: Aug 29, 2013
This single physician practice started with the need to increase efficiency and practice better care. After implementing Allscripts technology, the practice exponentially improved population health management, achieved Meaningful Use, cut two months out of their billing process—all while saving $65,000 annually.
Tags : 
allscripts, allscripts professional ehr, ehr, population health management, meaningful use, meaningful use payments, preventive health
    
Allscripts
Published By: Allscripts     Published Date: May 01, 2014
Pottstown Medical Specialists, Inc. (PMSI), is one of the earliest adopters of the Patient Centered Medical Home (PCMH). Allscripts TouchWorks enabled the organization to exceed at meeting PCMH standards, exponentially raising their level of care while receiving significant financial incentives.
Tags : 
allscripts, pottstown medical specialists, pmsi, patient care, finanicla advantages, touchworks, ehr, best practices
    
Allscripts
Published By: Allscripts     Published Date: Sep 09, 2014
Download this case study to learn how Family Medical Center in Seymour, Indiana increased revenue, patient visits and attained incentives with Allscripts.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice
    
Allscripts
Published By: Allscripts     Published Date: Feb 18, 2015
Value-based care has arrived. Does your practice have a strategy ready? Download this step-by-step guide to planning and executing a value-based care strategy that's right for your individual practice needs.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Feb 18, 2015
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Mar 11, 2015
See how Allscripts Professional EHR™ is helping Choice Medical Group raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework. Choice Medical Group is an Independent Physicians Association with 40 independent physicians spread across a 70-mile radius in the high desert. This organization must coordinate care with an additional 120 specialists and deliver quality care to an extremely rural population. Allscripts Professional EHR™ is helping the Association raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework, ensuring that geographic distance does not limit quality care availability.
Tags : 
allscripts, ehr suite, value based care, aco, accountable care organization, choice medical group
    
Allscripts
Published By: Allscripts     Published Date: Apr 23, 2015
In this paper, you will learn the challenges facing organizations using yesterday’s Practice Management systems, and discover why capitalizing on the latest technology is easier—and much more rewarding—than you might think.
Tags : 
revenue cycle, healthcare, practice management, technology, allscripts, financial processes
    
Allscripts
Published By: Asure Software     Published Date: Mar 06, 2014
Since 2005, organizations have created more workspace changes – eliminating vast (and dull) cubicle farms in favor of community spaces arranged to accomplish several goals including: • Maximize existing workspace • Foster more collaboration and teamwork • Accommodate mobile/remote employees who no longer need a dedicated space in an office building Hot desking and desk hoteling are workspace strategies that are here to stay. This executive briefing will help any real estate or facility manager understand how to leverage these concepts, adapt to trends and get a return that the finance team will appreciate.
Tags : 
    
Asure Software
Published By: Adobe     Published Date: Aug 22, 2013
With more than 1 billion smartphones in consumers' pockets at the beginning of 2013, mobile is driving a second Internet revolution that's even more profound than the first one. Mobile creates new value for consumers and businesses, alters cost structures, and disrupts ecosystems. That's why marketers must move away from tactical mobile efforts to more transformative mobile marketing strategies in 2013. This fourth annual mobile trends report revisits our 2013 mobile trends, elaborates on how they will continue to evolve in 2013, and highlights new mobile trends that we expect to see this year. New to this year's report is a list of the over-hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
mobile marketing, mobile trends, mobility
    
Adobe
Published By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : 
kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
    
Kaseya
Published By: Rovi     Published Date: Feb 07, 2013
By understanding the three key IP management concepts outlined in this paper, CEO’s can lead their teams to achieve profound business results.
Tags : 
intellectual property, knowledge management, ceo, strategy, r&d, innovation, development
    
Rovi
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco
Published By: Polycom     Published Date: Dec 02, 2014
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : 
bene, top quality, functionality, modern design, innovative technology, manufacture, sales
    
Polycom
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations
    
IBM
Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
Published By: Dell EMC     Published Date: Nov 03, 2015
This white paper outlines the principles and concepts involved in implementing an enterprise-class archive repository using EMC Isilon scale-out storage.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Broadsoft     Published Date: Apr 04, 2017
It’s easy to feel overwhelmed by information, messages and notifications from workplace apps that don’t talk to one another. This disjointed technology disrupts our workflow, and we lose our momentum.
Tags : 
    
Broadsoft
Published By: Juniper Networks     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Juniper Networks
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
    
Q2 eBanking
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library