Health IT

Community information
Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.
  • “You never get a second chance to make a first impression.”
    - Andrew Grant
    Research suggests that if you were a juror you would make up your mind about the accused within approximately 7 seconds. That’s before you’ve even heard a shred of evidence, and then you’d spend the remainder of the trial looking for evidence to prove you’re right.
    Whilst in the workplace, you’re not on trial, people are continually assessing and evaluating you in the context of their own experience, albeit unconsciously most of the time, and you have to be able to flourish in those conditions.
    Although you can’t change what goes on in other people’s heads, you can choose to behave in ways that have a positive effect on the people around you, and as a consequence you can achieve more of what you want to get done.

    This session will:

    •help you discover how immersing yourself ‘in the moment’ gives you a clear head and allows you to perform at your best more of the time
    •explore how ‘being your authentic self’ is the most effortless route to maximising your impact
    •give you the opportunity to take away some fresh thinking and ideas that will help you to transform the impact that you have on others.
  • The Asia Pacific is the third largest pharmaceutical market in the world after North America and Europe, with generics being the major driver for the pharmaceutical industry in this region, aided by factors such as the aging population and impending expiry of patented drugs. It is a necessity for pharmaceutical companies to be aware of the key trends in the APAC generics market and maximise the market opportunities in order to remain relevant.

    In today’s rapidly evolving business landscape, pharmaceutical companies are also starting to realise the importance of the customer experience as a key differentiator. With a gradual shift from product to the customer, the pharmaceutical industry needs to keep up with other industries in terms of providing the perfect digital customer experience. A well-executed digital strategy is essential for today’s pharmaceutical companies to better connect with their clients.

    Join us as we discuss these and other key topics.
  • System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?

    Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
  • While the economics of moving workloads to the cloud is well understood by small and medium sized businesses (SMBs), they often struggle with corresponding economics associated with these changes in security challenges. These SMBs often rely on service providers and suppliers for security, but how can they take control or have more of a hand in the security of the cloud services they are using? Join (ISC)2 and our sponsor Sophos on June 25, 2015 for our next From the Trenches where we’ll discuss cloud security and challenges SMBs face when leveraging cloud services.
  • Cell lines remain the workhorses of laboratory research, both in academic and industrial settings. This webinar will focus on best practice in selecting and maintaining cell lines for research, to ensure research outputs are relevant and reproducible. Features of cell lines that might be used in selection will be discussed. This will include monolayer or suspension culture; passage number; doubling time; immortalisation; karyotype; receptors; expression profiling and use of bioinformatics tools like the cancer cell line encyclopaedia. Using breast cancer as an exemplar, I will discuss more specifically how to choose the most relevant cell line model to address a particular research question. Finally I will describe how to use (and access) human material to help develop more clinically relevant cell culture systems to model human disease and the role that biobanks play in this process.
  • Cell lines remain the workhorses of laboratory research, both in academic and industrial settings. This webinar will focus on best practice in selecting and maintaining cell lines for research, to ensure research outputs are relevant and reproducible. Features of cell lines that might be used in selection will be discussed. This will include monolayer or suspension culture; passage number; doubling time; immortalisation; karyotype; receptors; expression profiling and use of bioinformatics tools like the cancer cell line encyclopaedia. Using breast cancer as an exemplar, I will discuss more specifically how to choose the most relevant cell line model to address a particular research question. Finally I will describe how to use (and access) human material to help develop more clinically relevant cell culture systems to model human disease and the role that biobanks play in this process.
  • Vitamin E is a powerful antioxidant, an essential nutrient needed to maintain cellular structures and functions, thus helping support health. However, intake still remains low among consumers globally. There is an ongoing discussion about the optimal vitamin E status in healthy populations and its role in maintaining liver and brain function outside of nutritional recommendations.

    New and ongoing research suggests that vitamin E at higher doses may help maintain tissue function in specific risk groups, such as age-related macular degeneration, Alzheimer’s disease and non-alcoholic fatty liver. Applications like these require the advice and supervision of health care professionals. It is important to revisit both the required doses and safety for targeted vitamin E intakes for these conditions. Further research will be required to support qualified health claims for mitigating the outcomes of these diseases.

    Join the latest webinar in our series on research related to vitamin E. Hear our speakers Prof. Jeffrey Blumberg and DSM’s Prof. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E safety and its implications on the recommended intake across different life stages and conditions.
  • The professional use of social media in healthcare is fast becoming the default way to share information, ideas, support and expertise on a global scale. Join this webinar to find out what the fuss is all about and to learn some basic tweeting skills.
  • Vitamin E is a powerful antioxidant, an essential nutrient needed to maintain cellular structures and functions, thus helping support health. However, intake still remains low among consumers globally. There is an ongoing discussion about the optimal vitamin E status in healthy populations and its role in maintaining liver and brain function outside of nutritional recommendations.

    New and ongoing research suggests that vitamin E at higher doses may help maintain tissue function in specific risk groups, such as age-related macular degeneration, Alzheimer’s disease and non-alcoholic fatty liver. Applications like these require the advice and supervision of health care professionals. It is important to revisit both the required doses and safety for targeted vitamin E intakes for these conditions. Further research will be required to support qualified health claims for mitigating the outcomes of these diseases.

    Join the latest webinar in our series on research related to vitamin E. Hear our speakers Prof. Jeffrey Blumberg and DSM’s Prof. Manfred Eggersdorfer and Jacob Bauly present their latest findings on vitamin E safety and its implications on the recommended intake across different life stages and conditions.
  • Join us on June 22nd for a special Corning-sponsored webinar presented by ATCC®.

    Abstract:
    Animal cell lines are important in vitro systems and tools for scientists in diverse disciplines such as basic cell biology, genetic mapping, gene expression and gene therapy. Cell line authentication and characterization are crucial in these activities, yet they are underappreciated by most research scientists. Over the years numerous cell lines have been shown to be misidentified due, in part, to poor techniques and inadequate verification of cell line authenticity. Technological advances have given rise to improved capabilities. Cell line authentication now requires a comprehensive strategy that employs several complementary technologies for systematic testing for morphology, microbial contaminations, cellular identity/cross-contamination as well as functionality. The validity of conclusions drawn from research data is dependent on consistent and unequivocal verification of cell line identity and function. It is estimated that the financial loss incurred by poorly characterized or misidentified cell lines is in the millions of dollars. An overview of the current technologies used to authenticate cell lines will be presented.

    Speaker Bio:
    Dr. Yvonne A. Reid joined ATCC in 1980 and during the mid-1980’s her research focused on the use of DNA hypervariable probes for the intraspecies identification of cell lines. The evolution of this work has led to the implementation of routine screening of all human cell lines by STR analysis. She co-chaired the ATCC SDO committee on the Development Consensus Standard on the Authentication of Human Cell Lines: Standardization of STR profiling. Dr. Reid has more than 30 years of experience in cell biology, immunology and molecular biology. As Collection Scientist for the Cell Biology Program for over 10 years, she was responsible for acquisition of new animal cell lines and hybridomas into the Cell Biology General Collection.
  • “If we did all the things we are capable of doing, we would literally astound ourselves.”
    - Thomas Edison
    You almost certainly have a sense of what an elite team is. There are highly visible examples in both sport and in the British Armed Forces that you’ll be very familiar with.
    As a leader in your organisation, it’s likely that achieving your objectives depends on being surrounded by the best possible people with the right skills and attitudes, so building an elite team, with superior abilities and qualities, is high on your list of priorities.
    Developing elite teams is both an art and a science. There’s an abundance of tools and techniques you can use with your teams, but also a growing body of academic research that can guide you towards the best of those tools and techniques.
    In this one hour webinar……
    •you’ll discover how an elite team thinks, feels and behaves
    •You’ll explore the 10 factors that will help you to develop an elite team, backed up by academic research
    •and you’ll take away some practical solutions to apply straightaway

    Join Bev Holden & Kate Hargreaves from The Clear Thinking Partnership and find out more.
  • Skyrocketing Oracle licensing costs, coupled with powerful feature and performance advances in the SQL Server database engine, has resulted in a growing shift towards the Microsoft database offering for those companies looking to change platforms. While SQL Server and Oracle have their place for certain uses and applications, there is a large number of scenarios where companies can choose one platform or the other. However, migrating from an existing platform to a new one is not a trivial task. Despite this complexity, we’ve seen an ever increasing number of consulting opportunities from customers migrating away from existing Oracle environments to the SQL Server equivalent. In this Webinar we will explore the reasons, potential ROI, and the initial risks and high level technical considerations that need to be made when pursuing this route.
  • Key topics:

    - Reach-Impact- Cost analysis for key online and offline channels (owned-paid-earned)
    - “Desired Frequency” analysis for key channels
    - Company appreciation scores by key therapy area (diabetes, pain, women’s health, vaccines)
    - Company appreciation scores for digital vs fieldforce vs medical vs patient support
    - Evolution over time of key parameters
    - New, flexible web-based reporting format
    - Making the data actionable
  • The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can:

    -Identify exposures
    -Investigate incidents
    -Manage compliance
    -Measure your information security program

    However, going from installation to insight with a SIEM can be a challenge. Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
  • Learn how to set your institution up for success by having the correct people, processes, and technology in place to address the serious problem of drug diversion. In this webinar you will:
    •Learn proper policies and procedures to prevent diversion across multiple areas in your facility
    •Understand common gaps in diversion management in procedural areas and pharmacy
    •Identify opportunities to collaborate with different departments to protect your patients from the harms of diversion.

    PLEASE BE SURE TO TEST YOUR SYSTEM'S COMPATIBILITY ON THE BRIGHTTALK PLATFORM PRIOR TO ATTENDING THE EVENT TO ENSURE AN OPTIMAL EXPERIENCE. SMARTPHONES MAY NOT WORK DURING THE LIVE EVENT, BUT WILL WORK IN THE RECORDED PLAYBACK MODE AFTER THE EVENT.
  • Do you purchase travel directly from the airline or hotel’s website, or does your travel experience come together from an aggregator like Priceline, Expedia, or Orbitz? HOSTING finds substantial similarity in today’s cloud marketplace with the state of the airline industry circa 2000. In the cloud context, however, aggregators are “unifying" the experience that would otherwise happen directly with each cloud provider. If the analogy is exactly accurate, the Unified Cloud providers (such as HOSTING) will be the choice of 40%+ of all IT spend!

    1.Why now is the time to explore Unified Cloud
    2.What to expect in the next 12-months
    3.Who will lead this movement, and who will not
    4.How your feedback can help shape this industry
    5.Whether your preference in travel booking will be how you buy cloud!
  • Security Briefings Part 1 - Big data analytics and Hadoop environments come with myriad benefits-but also new risks to enterprises. In the past, cyber-attackers had to search for high-value information across a wide range of systems. But with centralized data, hackers can focus on a known, single target. Even when key information is considered secure, there's still a high risk that sensitive information can be re-identified by utilizing multiple data sets. Join HP Security Voltage, MapR and (ISC)2 on June 11, 2015 at 1:00PM Eastern for 5 steps in protecting critical data and learn how to build a strategy and methodology to secure big data in Hadoop.
  • Securing your network from threats is a constantly evolving challenge, especially for education organizations where IT security resources are limited. AlienVault has helped many education organizations get the security visbility they need, on a budget.
    Join us for a special live demo of our AlienVault Unified Security Management (USM) solution, focused specifically on the needs of education organizations. You'll hear first-hand from one of your peers, Matthew J. Frederickson, from Council Rock School District, about how our USM solution has helped him improve threat detection and incident response.

    We'll also walk through a product demo to show how USM makes it easy to:
    Discover all IP-enabled assets on your network
    Identify vulnerabilities like unpatched software or insecure configurations
    Detect network scans and malware like botnets, trojans & rootkits
    Speed incident response with built-in remediation guidance for every alert
    Generate accurate reports for regulatory compliance

    Join us to learn how USM makes it easy to get the insights you need, starting on Day 1.
  • Join IBM and (ISC)2 to learn about the latest Cost of a Data Breach study and discuss the implications of the study for today's businesses.
    In this live webinar, you will learn the key findings of the Cost of a Data Breach study, including:
    -Major factors that affect the financial consequences of a data breach
    -How companies changed their operations and compliance following a breach
    -Most common cybersecurity governance challenges
    -Why companies failed to stop data breaches
  • IBM SPSS Modeler extends the value of Big Data through algorithms purpose-built for massive scale analytics, introduces geospatial analytics and continues to expand accessibility to and usability of advanced analytics.

    Join our Technical Solutions expert, Dusan Magula, for a demonstration with live Q&A and learn about:

    * SPSS Modeler Personal Edition that puts predictive power in the hands of an individual user
    * New algorithms for Big Data and Geospatial analysis
    * Predictive Extensions that bring the flexibility and power of R to SPSS Modeler users “code-free”
  • Do you run mission critical applications in the cloud? If the answer is yes, then you already know how important it is to have visibility into all aspects of your infrastructure. An alert telling you your application is down is no longer sufficient. Today’s IT managers need to be made aware of potential problems before they arise.

    Join me, Dan Waymire, Sr. Account Manager at HOSTING, for a webinar on May 28th at 3 p.m. EST to learn how Hosting can provide unprecedented visibility into your infrastructure, allowing you to be one step ahead of service impacting events. Leveraging the industry leading ScienceLogic platform, I will cover the following:
    •A demonstration of how you can build real-time dashboards showing availability, utilization, and performance of your entire IT infrastructure
    •A walk-through of an Executive dashboard showing your leadership team the application availability in real time
    •IT manager dashboards capable of showing utilization & performance of web servers, database servers, switches, and firewalls all in a single pane of glass
  • Open source software (OSS) has become pervasive in applications development and infrastructure alike. Indeed, enterprise deployment of OSS has doubled since 2010, and today 8 in 10 organizations report running their businesses on OSS. With broader deployment, both technology companies and enterprise IT have gained comfort with integrating and deploying OSS. At the same time, of the 8000-9000 IT security vulnerabilities catalogued annually, approximately 40% target open source code. The extent of this threat is underscored by critical vulnerabilities like Heartbleed, Poodle, Logjam and Venom. Join (ISC)2 and Black Duck Software on June 4, 2015 at 1:00PM Eastern for a discussion of the state of open source software security and the best ways keep your open-source based applications and infrastructure safe.
  • We recognize that your data is the core of all operational and service functions, whether it’s complying with healthcare regulations, deploying applications, or dealing with rapid growth. It must always be accessible. That’s why we developed key insights on how to maintain data integrity and availability when faced with a disaster.

    Join us June 4th and we will guide you through how to create multiple layers of protection for your data to ensure it is always available and secure.
  • The professional use of social media in healthcare is fast becoming the default way to share information ideas, support and expertise on a global scale. Join this webinar to go beyond the basics and learn how to make connecting work for you.
  • Securing change in employee behaviour, to ensure compliance with organisational policy and to reduce risk to an organisation, relies on employees making a discretionary effort with a positive security outcome. How can security leaders secure not just employee awareness but most importantly positive security behaviours to support embedding security into corporate culture?
    Moderator:
    Adrian Davis, MD (ISC)2 EMEA
    Speakers:
    Bruce Hallas, Founder, Analogies Project
    Craig Goodwin, Deputy CISO, Wolseley
    Lee Barney, Head of Information Security, Home Retail Group
  • It is often through hindsight that the value of a Board decision is judged. Years, even months after, both those affected by a decision and those who took it will sometimes ask, “Who decided that?”

    There are many factors that play into a good Board decision, including the quality of Board paper, the range of options, the quality of debate, effective challenge, corporate perspective, understanding of the context, and the ability of the Chair to effectively steer discussion and move to a decision. Boards make many fewer decisions than they think they do. In observing a Board meeting, held over 7 hours with over 650 pages of papers, there was not one paper for decision.

    This Webinar will delve into decision making as one of the key roles of the Board. We’ll look at the four levels of Board engagement in decision making: rubber stamping, probing and questioning, setting strategic direction, and shadowing. For each level we’ll explore what it means for the Board and the organisation it directs. We’ll also consider a range of related factors that influence decision making:

    • Best practice in Board papers
    • Strategic versus operational focus
    • The roles of board members
    • Corporate versus functional perspective

    We’ll use a range of models to explore Board decision making, and will draw on experience from across the NHS and beyond.

    John Deffenbaugh, a director of Frontline and an NHS non-executive director, will host this Webinar.
  • Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:

    In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn

    · How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds

    · What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others

    · How to understand and clarify overlaps and conflicts between documents in your regulatory requirements

    · How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously

    Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
  • Life sciences companies need to make better use of the insights that real world data (RWD) can provide in order to improve market access, sales and market growth strategies – and ultimately to improve the applicability of new and existing therapeutics for patients. Insights come not just from the multiple sources of RWD available, but from advanced analytics that highlight the effectiveness of a treatment by geographic area, and link healthcare providers, institutions and patients to relevant and meaningful outcomes.

    This one-hour event will take a hands-on approach – detailing how insights derived from RWD (and collaboratively with other sources) are enabling all elements of the life science industry to do things better.

    Insights experts Robin Munro and Christian Marcazzo will deliver case studies on how RWD can help life science companies in:

    Sales and Marketing – incorporate RWD and evidence into segmentation, targeting, and engagement of physicians and institutions
    Commercial Effectiveness – measure commercial campaigns, and demonstrate the impact to the healthcare system
    Medical Affairs – find and engage medical education prospects and target appropriate healthcare authorities, healthcare professionals and payers, to improve quality of care and outcomes
    Public Affairs and Market Access – develop qualitative and quantitative insights to design education, advocacy and access-related campaigns within the healthcare ecosystem

    The event will also give an exclusive look at what can be achieved from combining data sources – using Diabetes in England as a case study, Zephyr has implemented novel methods to demonstrate an evidence-based approach to improving information sharing within sales teams and to engaging accounts and payers. We explore how patient outcomes from RWD can add value to commercial strategy.
  • Charlotte Hardy works on the development and maintenance of the BREEAM (Building Research Establishment Environmental Assessment Methodology) scheme, the principles of which, the NHS are obliged to comply with under the Cabinet Office (annex C), Government Construction, Common Minimum Standards for procurement of the built environments in the public sector initiative. (https://www.gov.uk/government/publications/common-minimum-standards ). Alternative assessment methods do exist, but BREEAM is the most commonly used in the UK and the Healthcare scheme was developed by BREEAM specifically for the Department of Health and therefore the NHS generally tend to use this option..

    BREEAM is the world's foremost environmental assessment method and rating system for buildings and sets the standard for best practice in sustainable building design, construction and operation. It encourages designers, clients and others to think about low carbon and low impact design, minimising the energy demands of a building and its impact on the environment. It assesses a broad range of sustainability measures, ranging from energy to ecology. They categories covered include issues such as energy and water use, the internal environment (health and well-being), pollution, transport, materials, waste, ecology and management processes.

    This webinar will provide an overview of BREEAM and the issues it assesses, as well as exploring the benefits and value– both short term and, more importantly, the longer term benefits that it can provide to healthcare projects.
  • Government funding for health and social care over the next decade is a key concern for commissioners, providers and service users. As financial and service pressures facing the NHS and local government intensify, the need for integrated care to improve people’s experience of health and care, the outcomes achieved and the efficient use of resources will only grow. On top of facing a predicted financial crisis in the NHS and local government as austerity 2.0 comes into effect, the sectors are facing significant increases in demand which could prove all but impossible to meet. What is the long view? And to what extent can a more integrated approach to managing health deal with this dilemma?
  • Informatica and HighPoint Solutions will be co-hosting a panel discussion with leading global Pharmaceutical companies where they will discuss the challenges, solutions and most importantly, how their companies can benefit from IDMP compliance.
  • The professional use of social media in healthcare is fast becoming the default way to share information, ideas, support and expertise on a global scale. Join this webinar to go beyond the basics and learn how to build a lasting community.
  • Understanding your customers is fundamental to effective communication. Current segmentation strategies draw on ever more detailed information about how patients, physicians and payers behave through the use of open source, social media and real world data. However, segmentation still lacks clear insight into why these stakeholders behave as they do – and therefore how best to change their behaviour.
    Working with behavioural change experts Hamell, this one hour live discussion will look at why current segmentation strategies are failing, and the importance of understanding what drives patient or customer behaviour. Using case studies, speakers will explore how segmenting by behavioural drivers can create advanced, effective strategies to change patient, customer and payer behaviour.
    This event will focus on three key areas:

    •The theory behind behavioural segmentation and how it challenges the status quo
    •Benefits of behavioural segmentation communication strategies and the problems answered by behavioural segmentation strategies
    •Behavioural segmentation in action: practical application of this approach
  • The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2 on July 9, 2015 at 1:00PM Eastern for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure.
  • If you’re running production workloads on Amazon Web Services, you’ve probably seen some of the limitations to AWS’ monitoring capability. HOSTING has a great solution to this! In partnership with ScienceLogic, and as part of our Unified Cloud vision, HOSTING is pleased to offer infrastructure monitoring for AWS. Join us for a live demonstration of this comprehensive alternative to AWS monitoring. We’ll review AWS monitoring platform in terms of strengths and weaknesses, and compare it to the HOSTING offering. We’ll close with a live demonstration of our capabilities and a Q&A session.
  • This free webinar will summarise the results of the HFMA’s NHS Financial Temperature Check survey of UK finance directors and chief financial officers, published in early July. You will hear from Paul Briddock, HFMA Director of Technical and Policy, about the financial outlook for the NHS, the views of finance directors from 209 NHS organisations and what the HFMA thinks needs to happen to ensure the NHS can meet the financial challenges ahead.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.
  • Large enterprises want to use all the data they can get to earn the trust and the dollars of their customers. At the same time, they must secure this data, which is increasingly the target of sophisticated cyber-attacks. Traditional triple A (access, authentication and audit) security solutions are no longer sufficient-data-centric security must be added to the mix. In this webinar, join Stratecast | Frost & Sullivan, HP Security Voltage and (ISC)2 on July 16, 2015 at 1:00PM Eastern for an examination of ICT technology trends and business policies that have brought us to this point and how format preserving encryption can be used to protect data at rest, in motion and in use.
  • Next to performance and scalability, cost efficiency is one of the top three reasons most companies cite as their motivations for acquiring storage technology. Businesses are struggling to control the storage costs, and to reduce OPEX costs for administrative staff, infrastructure and data management, and environmental and energy. Every storage vendor, it seems, including most of the Software-defined Storage purveyors, are promising ROIs that require nothing short of a suspension of disbelief.

    In this presentation, Jon Toigo of the Data Management Institute digs out the root causes of high storage costs and sketches out a prescription for addressing them. He is joined by Ibrahim “Ibby” Rahmani of DataCore Software, who will address the specific cost efficiency advantages that are being realized by customers of Software-defined Storage.
  • Join us on July 29 for the webinar, "In vitro ADME CRO: New capabilities in transporter, enzyme inhibition, and enzyme induction evaluation."
  • Receive an overview of StatSpin Express 3 Centrifuge. Recognize first steps of safety tips and warning signs. Learn the operation of StatSpin Express 3 Centrifuge.
  • (ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.
  • “Better data is everyone’s job” is a bold statement and an audacious goal for every organization. At University of Pittsburgh Medical Center (UPMC), it is precisely what drives their data governance initiative. As the largest nongovernmental employer in Pennsylvania, UPMC is committed to delivering superior medical service to its millions of patients. To achieve that goal, every piece of data could have impact on the outcome.

    Join us to hear a refreshing dialogue between Terri Mikol, Director of Data Governance at UPMC, and Rob Karel, VP of Product Strategy and Marketing at Informatica, on the revolution (instead of evolution) of the data governance program at UPMC.

    Their conversation will reveal:

    •The business imperatives behind the data governance program
    •Secrets that inspire everyone in the organization to become a data hero
    •Key aspects of the data that need to be governed to ensure clean, connected and safe data is always available and fit for use
  • These words were calmly stated by Commander Jim Lovell on 14 April 1970, and immortalised 25 years later in the movie Apollo 13. Lovell’s phrase has become a byword for focus. For this seminar we will draw on an analysis of the letters from Monitor addressed to Chairs. These are not letters that are welcomed. Rather, they are ones that the recipient would prefer were lost in the post.

    They are sent because problems have occurred in the Foundation Trust. To paraphrase, Houston, you’ve got a problem. Having analysed these letters, we see four problem areas that Commander Lovell would wish to discuss with Chairs:

    • Level of understanding among board members about their business
    • Quality of information and intelligence available for decision making
    • Effectiveness of non-executive director challenge
    • Ability to hold executive directors to account for implementation of board decisions

    This Webinar will go into each of these inter-linked areas, to see what the problem is, its impact, and what can be done about it. We’ll use a range of models that bring theory to the practice, and will draw on experience from across the NHS.

    John Deffenbaugh, a director of Frontline and an NHS non-executive director, will host this Webinar.