Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.
1. The kidney proximal tubule is the primary site of drug-induced nephrotoxicity. I will describe the development of a 3-dimensional flow-directed proximal tubule microphysiological system (MPS). The kidney MPS recapitulates the synthetic, metabolic and transport activities of kidney proximal tubule cells. This MPS is as an ideal platform for ex vivo modeling of nephrotoxicity. Towards this goal, we have evaluated nephrotoxicity in response to challenge with multiple toxicants, including the heavy metal pollutant cadmium, antisense oligonucleotides, the antibiotic polymyxin B and the Chinese herbal product aristolochic acid. We believe that MPS technologies will have major impacts on predictive toxicity testing and human risk assessment. Animal and in vitro systems do not always faithfully recapitulate drug and xenobiotic responses in the clinic or occupational/environmental exposures, respectively. MPS technologies will refine safety assessment and reduce our need for surrogate animal testing. An ultimate goal is to create integrated human MPS organ systems that could replace animal models.
2. Nortis has developed a technology that is used to recapitulate functional units of human organs in microfluidic devices (chips). Such organ models include vasculature, kidney, and liver models for toxicology studies, blood-brain barrier models for drug transport studies, and vascularized tumor microenvironment models for drug efficacy studies.
2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.
In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.
Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
Join us to find out about the results of the 2017 Multichannel Maturometer. The ninth version of this industry-renowned survey illuminates some of the big changes sweeping through the Pharma industry, as well as highlighting some trends which are still lagging.
Questions which will be answered include:
• Is senior leadership still on the fence for digital?
• Marketing budgets – how are they changing?
• How satisfactory are those in the industry finding digital offerings?
Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.
Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
The importance and value of continuous bioprocessing, both upstream and downstream has economic and sustainability advantages and due to the modular nature of continuous bioprocesses means that industry is able to adapt more rapidly to changing market demands. Continuous biopharmaceutical manufacturing in the context of other industries that have already successfully adopted continuous processing. Factor other than scientific ones, are the barriers to change from batch to continuous production. an excellent example of the manufacturing strategies of the steel industry in the 20th century, when this industrial sector incrementally switched from batch to continuous operations. biopharmaceutical industry has reached a stage that requires a change in the production paradigm. For a certain class of biopharmaceutical products upstream continuous manufacturing has always been applied: for example, unstable proteins that rapidly degrade in the culture broth. In order to obtain a high quality product, the residence time in the reactor must be minimized. This can only be achieved with continuous cultivation and preferably with perfusion reactors. a brief overview on the types of cell retention devices currently used in biopharmaceutical industry.
Furthermore, this is a universal production platform that can be extended to other classes of products, such as antibodies, which are relatively stable molecules. continuous manufacturing is as productive and with a much smaller footprint of the manufacturing plant, avoiding multiple non-value added unit operations. In essence, the investment for a continuous plant is much smaller compared to a batch-operated one.
Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.
USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.
Join us for this webcast to learn:
-What security orchestration means, and why it has become essential for fast, efficient incident response
-How USM Anywhere can automate incident response activities, saving valuable time
-How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
We will be hosting a roundtable discussion with multiple thought leaders who have contributed to the ASHP Guidelines on Preventing Diversion of Controlled Substances. The guidelines are aimed at helping healthcare organizations develop a controlled substance diversion prevention program.
Presented by the following thought leaders:
• JoAnne Myhre, CPhT, Allina Health
• Kimberly Dove, PharmD, Pharmacy Consultant, Omnicell
• Kimberly New, JD, BSN, RN, Principal Consultant, Diversion Specialists
• Toni Fera, PharmD, Independent Healthcare Consultant
• William Churchill, MS, FMSHP, Brigham and Women’s Healthcare
Moderated by Juliana Linsdell, Nurse Consultant, Omnicell
We look forward to having you join our discussion!
The mandate for digital transformation in healthcare is clear. The question that IT leaders must answer is not "if" but rather "how?"
In particular, how should healthcare organizations delivering a digital experience for patients? How should they think about balancing existing HL7 point-to-point interfaces with emerging FHIR-based API approaches? How should they think about security? And how should they think about re-use to drive greater agility and increase time to market?
Drawing on its work with 3 of the top-7 US hospitals, MuleSoft has developed Catalyst Accelerator for Healthcare, a set of API designs and supporting reference implementations, that codify integration best practices.
Join this webinar to:
- See a demo of the Catalyst Accelerator solution in action, powering web and mobile channels
- Understand how an API-led connectivity approach can increase speed and agility by driving re-use of API assets
- Learn how Anypoint Platform supports the design, development and management of APIs through a single, unified platform
Solid phase microexatraction or SPME is a green method for extraction of analytes out of a sample. Since SPME is a non-exhaustive extraction technique, some analysts believe that SPME is not quantifiable. This presentation will provide basic information for developing a method to extract and quantify analytes using SPME. Examples will be given on the extraction and quantification of analytes out of various matrices, and SPME will be compared to other extraction techniques such as QuEChERS and SPE. In this webinar, we will discuss some new SPME technologies such as SPME-OC (over-coated) fibers and BioSPME that help to isolate and quantify analytes from interfering compounds in the matrix. Guidelines will be provided for enhancement of precision using SPME.
Connected medical devices are playing a fundamental role in transforming patient care quality and experience and healthcare providers efficiency.
But as the number and the variety of devices grow within the organization, medical devices and the broader IoT ecosystem become more complex to manage, impacting patient safety, information security, compliance and financial performance.
In this webinar IDC Health Insights will share its research findings and provide guidance to health executives that want to start harnessing the real value of medical devices, by implementing a evidence based, consistent, controlled and efficient IoT management approach
About the speaker: Silvia Piai is Senior Research Manager within IDC Health Insights for Europe Middle East and Africa.
She is responsible for analyzing key trends related to IT strategies and spending in European healthcare organizations, and global Public Health institutions. She advises healthcare organizations and ICT vendors on planning and implementing effective digital health transformation initiatives to drive business innovation.
Silvia Piai has a more than 10 year experience in healthcare IT research. She started her career as public sector analyst, for then specializing in healthcare and becoming the lead analyst for the European healthcare market for IDC Health Insights. In her role, she focuses on the impact of digital transformation of healthcare and the role of technology in key industry trends as personalization and integration of care.
Her analysis offers in-depth coverage of the technologies that provide the most clinical value in terms of quality, cost, time, and agility and are transforming pre-care, point of care (POC), and post-care today. Analyzing the adoption and the investment plans of healthcare organizations, Silvia describes the evolution of healthcare IT and gives key insight on primary factors shaping the industry and the implications for the coming year future.
When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.
But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.
Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization called WhatMatrix. In this webinar, we will cover the:
- Criteria to evaluate these products
- Pros and cons of different vendors’ products
2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.
In this webinar, we will cover the first 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.
Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware.
Erich will cover these topics:
- What new scary ransomware strains are in the wild?
- Am I infected?
- I’m infected, now what?
- Proven methods of protecting your organization
- How to create a “human firewall”
The benefits of three dimensional (3D) cell culture are widely appreciated. More cell-based technologies are now becoming available that enable researchers to preserve the native 3D structure of cells in vitro. These can be broadly divided into three areas: aggregate-based methods; hydrogels and extra-cellular matrices; and inert scaffold-based technologies. Each has strengths and weaknesses and there is no one technology that satisfies all applications. Tissues in the body are mostly composed of different cell types that are often highly organized in relation to each other. Often cells are arranged in distinct layers that enable signalling and cell-to-cell interactions. Alternatively in tumours, cancer cells form aggregates and tissue masses composed of different cell types. Recreation of these types of architecture will significantly evolve 3D cell culture to a new level where real tissue-like structures can be generated in vitro.
This webinar will review the alternative approaches available to researchers and provide an overview of their capabilities and example applications. More sophisticated models are developing as 3D cell culture technology becomes established and accepted as a means of creating more physiologically relevant cell-based assays. Methods that are relatively straightforward to use and that recreate the organized structure of real tissues will become valuable research tools for use in discovery, validation studies, and modelling disease.
Key areas covered:
• 2D vs 3D cell culture debate
• Review of alternative approaches and the development of new technologies
• Challenges facing 3D culture methods, in terms of technologies available and methods used
• Showcase applications where 3D technology makes a difference
• Future perspective for 3D cell culture technology and further development
Most organizations understand strong authentication is a necessary part of a good security practice. But because organizations have much less control over the devices, services, and people in their environment today, identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments.
Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture.
Dermatology is a complex clinical specialty comprising hundreds of procedure codes for surgical services related to lesion removals, biopsies and excisions. This session will familiarize investigators with dermatology’s complex clinical coding issues by reviewing accurate reporting requirements and specific sections of the National Correct Coding Initiative, or NCCI. Our experts will also demonstrate applicable data mining techniques.
Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
How confident are you about successfully using Hadoop for your data management needs? Despite 60-80% of organizations experimenting with new big data technologies, only a few have been able to successfully extract value sustainably.
In this webinar, Navin Parmar, a highly experienced healthcare data management leader and longtime Informatica PowerCenter customer, will share the best practices he has gathered across multiple projects from modernizing data environments beyond traditional data warehousing and successfully leveraging big data technologies. Learn real world lessons from an experienced industry practitioner who has delivered compelling healthcare analytics outcomes, while ensuring regulatory compliance with completely trusted data.
With a wealth of market and regulatory changes impacting the medtech sector, it’s time for digital technology to steer the direction of your future business. This expert webinar will evaluate how to strategically embed digital within your own organisation and explore the challenges and the opportunities for transforming customer relationships, driving commercial outcomes.
– Respond to the changing regulatory environment: how technology empowers your business
– Build a business case for digital transformation and gain organisational support
– Strengthen your customer relationships and improve engagement in a diverse payer landscape
– Learn from pharma (and other industries) to find opportunities and avoid pitfalls
– Measure impact and return on investment from digital engagement
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals.
Attendees will learn:
- What are the obstacles getting in the way of achieving digital transformation?
- Strategies to end the misalignment of business and IT on digital initiatives
- A roadmap to closing the IT delivery gap
As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.
Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.
Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.
What the AlienVault Labs security research team has uncovered about this threat
How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading
While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.
Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this live webinar “Best Practices and Future Direction of Security Awareness Training”. We will discuss emerging industry trends and provide the actionable information you need to train your last line of defense, your employees.
Perry will cover these topics:
- Practical security awareness and behavior management tips
- Outline how and where tools are helpful
- Discuss emerging industry trends
- How to create a “human firewall”
The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
Storage and infrastructure are going through a lot of changes. With technologies like Software-defined Storage as well as new infrastructure like Hyper-converged, there is a lot for IT admins to consider.
Join us in this webinar where we’ll cover Software-defined Storage, Flash, Hyper-converged and Cloud Storage. You learn why these technologies and infrastructure models are or aren't being utilized by companies and the areas where they have not lived up to their promises.
Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.
In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.
If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
This session will familiarize investigators with the connection between healthcare fraud schemes and financial crimes, and fraud’s increasing importance in organized crime. This webinar will examine case study examples and provide effective techniques for detecting, preventing and responding to healthcare fraud, as well as practical advice for leveraging law enforcement partnerships in support of identification and recovery of misappropriated assets.
U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.
About the speaker:
Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.
During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.
About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
Next-generation sequencing (NGS) has emerged as a key technology to deliver the next level of healthcare solutions. While the $1,000 genome was achieved in 2015, Frost & Sullivan predicts the $100 genome to be possible by 2024. The significant dip in cost of extracting genetic data has led to the creation of massive genomic data volumes that are expected to be some of the largest data sets globally by 2025, exceeding data generated by YouTube and Twitter.
Network threats and data breaches continue to grow in number, sophistication and speed, overwhelming current defensive capabilities. Security teams, limited in staff, resources and time, suffer from diminished effectiveness and enterprise protection. To stay ahead, organizations must create an adaptive ecosystem of network defenses; much like the body leverages its immune system. A Defense Lifecycle Model speeds threat identification and mitigation by incorporating machine learning and artificial intelligence into these security processes. Join Gigamon and (ISC)2 on August 10, 2017 at 1:00PM Eastern for a discussion on automated prevention, detection, prediction and containment and how it can help to fortify your defense.
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.
What core security capabilities you need to demonstrate compliance
The top challenges in meeting and maintaining compliance with PCI DSS
Best practices to help you plan and prepare for an audit
How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
Gene editing has become a firmly established technology within the discovery sciences arena. With the advent of CRISPR/Cas9 systems, the researcher's ability to find an active nuclease for nearly any region of any genome is now a reality. With even better nucleases available, those who routinely use gene editing tools to manipulate cell lines encounter other significant challenges that pose a barrier to building the "correct" cell line model. This presentation will highlight some of those challenges, and methods that we at Merck KGaA, Darmstadt, Germany have developed and/or implemented to circumvent them. A summary of the various formats of CRISPR/Cas9 tools, and recommendations for when to use each will also be presented.
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be, without encountering firewall issues accessing their desktop.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
The Geisinger Health Plan cares for over 500,000 members in Northeast and Central Pennsylvania. During this webinar, you’ll learn how their team uses the Informatica Platform to build enterprise solutions for data quality and data governance while also broadly supporting their journey to modernizing their data management competencies. You’ll discover both strategic and tactical considerations for leveraging capabilities from the Informatica Intelligent Data Platform to meet your goals, including discussion of industry best practices, design concepts for governance organizations and the development of core technical competencies. You’ll also hear about lessons learned and innovative approaches directly from the experts at Geisinger.