November 2011- The health care industry is undergoing a transformation - spurred by an unsustainable reimbursement model that rewards volume rather than outcome. Many alternatives are being considered, including pay for performance, accountable care organizations (ACOs), medical homes and bundled payments. Although the destination is not certain, it's clear that providers, payers, employers and patients are interested in a health care ecosystem that is connected, intelligent and aligned. Such sustainable health communities represent an innovative yet practical ...
June 2010- This technology brief highlights how implementing M+Archive as an integral part of an e-mail platform migration ensures a faster, easier, and more cost-effective solution and eliminates the need to deploy a third-party, single-use migration tool to migrate mail systems. Designed to work in multiple e-mail environments, M+Archive is an interoperable e-mail archiving and migration solution that helps organizations migrate and archive data and assists with user provisioning. M+Archive also adds value to ...
June 2010- The common definition of Interoperability is that of "the functional testing of a product against another product according to a set of test specifications." Unfortunately, this definition does not meet RFID requirements. The primary reason for it is that RFID implementations consist of a system of hardware, data, and software. RFID tags communicate with readers and exchange data using air interface protocols. Software facilities communications between readers, RFID middleware, and enterprise applications such as ERPs ...
December 2009- Capture, index, access. It sounds easy, and with proper planning, it is. This article shares tips you need to know in order to capture information correctly, index it thoroughly, and store it in a useful format for the maximum benefit to your enterprise.
August 2009- Few managers realize the security and management risks that have blossomed in their organization with the prevalent use of FTP. This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
January 2008- Milton Keynes General has been identified as an early adopter in the National Programme for IT (NPfIT), which aims to transform the way UK healthcare is delivered through online access to health records. With its local area network unable to provide the capacity needed to achieve NPfIT performance targets, the Trust required a complete overhaul of its existing IT platform. To give the Trust a highly resilient VPN that would support NPfIT applications. Nortel provided: ...
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services