Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
Health IT Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
A new study has that found data protection laws and state secrecy rules have created legal obstacles for businesses conducting operations in Asia.
Join SearchCompliance Sept. 18 to discuss the state of enterprise mobile security and how to adapt BYOD policies to best protect company data.
Participants in the latest #GRCchat discuss how to overcome the legal discovery challenges presented by vendor management and social media data.
In this Q&A, a data scientist explains why he combines objective data with human critiques to assess risk in Gilt's pre-emptive shipping program.
In this Q&A, Igor Elbert describes Gilt's pre-emptive shipping program, which leans on his expertise in machine learning and predictive modeling.
Is your organization better suited to build, buy or blend its big data architecture? Discuss with SearchCIO during #CIOChat Wednesday, Sept. 24, at 3 p.m. EDT.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Rackspace CTO John Engates talks Amazon, niche markets and all the reassuring the company had to do as outsiders debated the company's future.
With all the hype around hybrid cloud, many companies say they're using the model when they're really just using both public and private cloud. What makes it a true hybrid cloud?
Take it from the experts: Migrating an application to the cloud doesn't have to be as hard as it seems. But that doesn't mean you can jump in without proper planning and forethought.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
In this all-new CISSP Essentials Security School lesson featuring a two-part video tutorial, learn about the CBK section covering access control.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.
Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.
Permabit puts data reduction on its add-on appliance, but which vendors will sign on to sell it?
Learn how different scale-out architectures can be good options for providing high availability and easy growth.
HGST embraces NVMe spec for flash while boosting capacity of its helium-filled hard drives in rollout of HDD and solid-state storage products.