Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
Health IT Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
As 'dark data' piles up, so do its associated risks and information governance issues. In this Ask the Expert, Derek Gascon offers steps for addressing dark data's GRC complications and explains how new data classification tools can help.
The digital age complicates GRC management, and many organizations are turning to new tech to assist regulatory compliance processes. Jeffrey Ritter explains how companies can ensure these new IT investments meet the business's regulatory needs.
Join SearchCompliance Thursday, July 24, to discuss the benefits and drawbacks of regulatory compliance automation strategies, including whether GRC jobs are at stake.
Can building better relationships with cloud-based technology providers boost your IT competitive advantage? Discuss with SearchCIO Wednesday, July 30, at 3 p.m. EDT on Twitter.
Mobile app dev is the easy part. Find out how mobile application performance management software can prevent lackluster performance in the field.
In the latest CIO Decisions, CIOs and IT experts share their thoughts on infonomics -- placing a value on data assets -- and other of-the-moment IT concerns.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Docker has acquired London-based Orchard Laboratories as the much-hyped startup sets its sights on the enterprise market with improved orchestration of complex applications. The company says it has an 'aggressive roadmap' for future growth.
IBM's heavy investment in SoftLayer over the first 12 months got the attention of many IT shops. But some say IBM needs to deliver more before they can commit.
Applications are getting complicated and finding the best tools is tough. Cloud orchestration and DevOps can help, but they aren't quite the same thing.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
A recent proof of concept shines new light on the future of mobile keyloggers. Michael Cobb reviews how to keep touchscreen devices safe from attack.
Expert Kevin Beaver explains how enterprises can take a page from Facebook's ThreatData framework security analytics to boost enterprise defense.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.
DDN's high-performance computing storage systems provide Department of Energy lab with 75 GBps read/write operations and eliminates bottlenecks.
EMC spins out two new Isilon NAS models, including one for Hadoop analytics, and adds flash read cache.