Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
Health IT Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
In the second part of this Q&A, Jeffrey Ritter concludes his discussion on data management myths by explaining common misconceptions about storage costs and information governance training.
Increasingly complicated compliance mandates have led some businesses to implement automated processes to save resources. Participants in July's #GRCChat said compliance automation can assist data management, but also warned of unintended consequences.
In this two-part Q&A, Jeffrey Ritter identifies five common, persistent 21st century information governance myths and explains why adapting data management processes to the digital age is not as radical as some think.
On-the-spot decision making and in-the-field analysis are but two mobile business intelligence benefits that it a worthy investment.
The best enterprise social networks are fine-tuned to corporate culture. Using gamification to spur employee adoption of ESNs will depend on your workforce and industry regulations.
For the San Jose Sharks, employee morale and back-end integration factored heavily into choosing an enterprise social network tool but, as SearchCIO discovers, every company has its own reason for upping its ESN game.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Database technology is soaring into its next evolution and heading to the cloud. What impact, if any, will it have on big data and Hadoop?
Cloud monitoring can collect a range of performance data, but a crucial piece of the puzzle, networking, often falls short. A third-party network monitoring tool is essential to keep your cloud running up to par.
Windows Azure carries a reputation of being difficult to manage, but with Microsoft and third parties stepping up with several management tools, it can be difficult to sort through your options.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat.
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
Developing a compliance awareness training program is key to preventing accidental internal compliance breaches. Expert Mike Chapple explains the steps to follow when starting such a program.
Cisco says it remains committed to Fibre Channel with its new 16 Gbps FC MDS 9706 Director and MDS 9148S department switch, plus Fibre Channel over Ethernet (FCoE) line card.
Advances to object technology and accelerating growth of unstructured data make object storage valuable for on-premises data, despite their start as a cloud play.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.