Skip to main content
 

medical

Results 276 - 282 of 282Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations
    
IBM
Published By: Care360 by Quest Diagnostics     Published Date: Sep 01, 2015
This white paper discusses key strategies for Revenue Cycle Management (RCM) success in your medical practice.
Tags : 
revenue cycle management, rcm, care360, regulations, reimbursement, medical practice, information technology, practice management
    
Care360 by Quest Diagnostics
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
State University of New York Upstate Medical University faces the same challenges as many other hospital organizations—increased pressure to improve efficiency and preserve capital. Read this case study to learn how SUNY Upstate increases efficiency and reduces costs with STANLEY Healthcare’s AeroScout® Solutions, making every second and dollar count for patient care.
Tags : 
efficiency, cost reduction, patient care, healthcare, medicine, hospital organizations, wi-fi, asset management, information technology, practice management
    
STANLEY Healthcare
Published By: LogRhythm     Published Date: Feb 07, 2017
In February 2016, the computer network at Hollywood Presbyterian Medical Center (HPMC) was down for more than a week as the Southern California hospital worked to recover from a ransomware attack. Hospital administrators declared an internal emergency as staff struggled to access patient records and computer systems critical for patient care.
Tags : 
    
LogRhythm
Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America ist der führende Anbieter erstklassiger Gesundheitsleistungen für Patienten mit Nieren- und anderen chronischen Beschwerden. In den USA leben 640.000 Personen mit Nierenerkrankungen im Endstadium. Mehr als drei Millionen Menschen weltweit leiden an chronischem Nierenversagen. Über das branchenführende Netzwerk von 2.200 Dialysezentren in den USA, ambulanten Herz- und Gefäßlaboren und Notversorgungszentren – sowie Nordamerikas größtes Angebot an Krankenhaus- und Postakut-Versorgungsanbietern – sorgt Fresenius Medical Care North America für die koordinierte Behandlung für mehr als 180.000 US-amerikanischen Patienten.
Tags : 
    
Dell PC Lifecycle
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.