Vertical Industries  >  

Picture Archiving and Communications Systems

RSS Feed    Add to Google    Add to My Yahoo!
Picture Archiving and Communications Systems Reports
API Management—Enabling Digital Healthcare Transformation
sponsored by CA Technologies.
WHITE PAPER: This resource explains why applications are the key to the digitization of healthcare, holding the potential to power the patient experience, fuel operational efficiencies, and enable collaboration between providers. In addition, read on to learn how the right API management solution can enable your healthcare imperatives.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

CA Technologies.

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Brian Madden and John Gobron Talk Virtualization in Healthcare
sponsored by Aventura
WEBCAST: In this webcast, independent analyst and blogger Brian Madden hosts as he discusses VDI and desktop virtualization with healthcare technology provider CEO John Gobron. Tune in and you'll also learn how to apply situational awareness to virtualized environments.
Posted: 14 Oct 2015 | Premiered: Oct 14, 2015


The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015


3 Ways a N.Y. Hospital Saw Its Workflows Reprogrammed
sponsored by McKesson Corporation
WHITE PAPER: This whitepaper considers how one New York hospital re-evaluated their communication workflows, and shares their improvements. Read on to see how software is reshaping the industry, and how your organization could see similar results.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

McKesson Corporation

Cancer Research UK Trusts Monitoring to Comtrade
sponsored by ComTrade
CASE STUDY: Access this case study to find out what solution Cancer Research UK, UK's leading cancer research charity, chose to manage and monitor the health of their XenDesktop infrastructure.
Posted: 13 Aug 2015 | Published: 31 Dec 2012


A Better Way to Deliver Comprehensive Care
sponsored by IBM
WHITE PAPER: This report highlights a holistic, collaborative, and outcome-focused approach to healthcare. Access this resource to learn how your caregivers can analyze unconnected data sources to uncover hidden insights at the point of care, and collaborate on how to keep their patients healthy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014


How Managed File Transfer Addresses HIPAA Requirements for ePHI
sponsored by Linoma Software
WHITE PAPER: How can you embrace the move to electronic health records without exposing potential privacy breaches and HIPAA violations? This white paper discusses how you can use managed file transfers to remain HIPAA compliant while embracing modernity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Linoma Software

Strategizing Connected Health with Dave Wilson
sponsored by Hitachi Data Systems
VIDEO: In this video, health strategist Dave Wilson breaks down how social innovation is driving connected health. Discover the multiple ways you and your peers can gather and analyze data to cooperatively provide better patient outcomes.
Posted: 17 Sep 2015 | Premiered: 22 Jul 2015

Hitachi Data Systems

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement