Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
Health IT Research Library Copyright © 1998-2013 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
In this video, filmed at the 2013 ISSA International Conference, three security professionals share their information security plan the year to come.
In this Ask the Expert video, security guru Eric Cowperthwaite explains predictive security intelligence and how to leverage it in the enterprise.
Data governance expert Jeffrey Ritter discusses how incorporating modern information management best practices can improve overall business processes.
Join SearchCIO and CIO expert Harvey Koeppel for a tweet jam Dec. 18 to discuss your top New Year's IT resolutions.
In Searchlight, smart machines are all over the news and eyeballing human jobs. Plus: Apple gets social, a lot of passwords get stolen, and more.
After finding success with cloud-based IT Service Management, the University of Miami is emboldened to carry out a cloud-first approach to IT needs.
In this Ask the Expert video, attorney Randy Sabett discusses the complications and legal limitations of an active cyberdefense strategy.
IT budgeting, purchasing and cost cutting are constant SMB concerns. As the year winds down, CIOs must consider what's hot and what's not for 2014.
Social gamification is proving its worth in organizations large and small. In this Q&A, Sonya Barry, a community manager at Java.net, explains how.
The Platform as a Service market could heat up next year, but what is PaaS, exactly? And will it eventually be subsumed under other cloud categories?
Cloud projects don't always maximize the potential benefits -- even after a launch. These sure-fire ways take advantage of a cloud migration.
Free Visual Studio Online tools give Azure developers source-code control and application lifecycle management capabilities.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
Expert Nick Lewis explains how attackers are taking advantage of proxy auto-config capabilities in browsers and what mitigations can be put in place.
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
With the CISO role being a new addition for many executive teams, expert Joe Granneman says there are several challenges facing security execs.
These six storage technologies are ready to take their place -- and have an impact -- in your data center in 2014.
There's more to managing storage than ensuring performance and scalability. New architectures are doing a better job of managing storage resources.
Wikibon CTO predicts object-based systems will be popular as big data storage solutions; advises tape for long-form video files, disk for short clips.