mobile strategy for healthcare

Four Motivations for Implementing a Mobile Strategy in Healthcare Settings

Before you even get a chance to open your medicine cabinet, you receive a text alert from your pharmacy that your refill prescription is ready for pickup. You are in the emergency room at some unforsaken hour and are grateful you can access your medical records from your mobile device. Because let’s face it, at this moment “thinking clearly” under distress is pretty challenging. Gaining reassurance while sitting in your…

Read More >>
wannacry healthcare

WannaCry OutBreak Raises Concern for U.S. Healthcare Cybersecurity

Wannacry was a warning to the U.S. Healthcare community, the chaos that ensued in the U.K. is a cautionary tale of the effects and severity of healthcare breaches. Over 300,000 companies across 150 countries were impacted by WannaCry ransomware, with the U.K. National Health Serivce (NHS) getting hit particularly hard causing thousands of operations and appointments to be canceled. An interesting note is that the NHS wasn’t targeted specifically, but…

Read More >>
vdi-mobility

Virtual Desktop Infrastructures (VDIs) is a catalyst for Enterprise Mobility adoption

There are some significant stumbling blocks when it comes to implementing mobile strategies in businesses. One of these is implementing legacy and net-new applications in the remote and mobile workforce. IT departments need to consider how these applications can be implemented into a mobile medium while adhering to strict security policies and keeping costs under control. One of the technologies that can assist with the mobile transformation movement is Virtual…

Read More >>
data analytics iot

Data Analytics and IoT Innovation Buzzing This Spring

May was a busy month for Data Analytics and IoT with conferences including IoT World, IBM Vision, Informatica World and SAP Sapphire.  As industry leaders descended upon California and Florida, Tech Data was onsite to press the flesh, talk to customers, and gain a deeper understanding of business needs and use cases. To kick off the week of conferences, our Data Analytics and IoT Strategic Business Unit “took over” our…

Read More >>
healthcare tech

Connecting technology and healthcare to improve patient care

Applications of technology are everywhere.  Industries globally are embracing the use of improved technologies, data migration and analytics, instant communication, and other applied uses for daily operation.  We have seen changes in customer focused industries such as kiosks at fast food restaurants and hotel check-ins or IoT applications where a code is sent to your smartphone for entry into your hotel room.  While these applications of technology are in some…

Read More >>
dell-emc-world-aviation

Tech Data at Dell EMC World 2017 – You Are Now Free to Move about Technology

Tech Data / Technology Solutions’ booth display at this month’s Dell EMC World 2017 had a decidedly aviation-esque theme. As a self-anointed airplane aficionado, the cutaway jet fuselage was one of my favorite event displays in recent memory. Our onsite “cabin crew” offered discussions and demonstrations focused on software-defined storage solutions and the journey to the hybrid-cloud and software-defined data center. Tech Data was a gold-level sponsor of Dell EMC…

Read More >>
healthcare IT

Tech Data’s Commitment to Helping You Succeed in Healthcare IT is Highlighted by Top 25 Ranking from IDC

The reseller community has to confront many challenges on a continual basis but it also has a unique view to see firsthand the kinds of issues and pain points that end customers face daily in the healthcare industry. It’s one thing for partners to talk with customers in the comfort of their offices to determine these issues, but it’s a whole other thing for partners to be right there in…

Read More >>
vulnerability assessment

Vulnerability Assessments vs. Penetrating Testing. Is there really a difference?

Puzzled on Services? Fit the pieces together with vulnerability assessments and penetration testing. Growing businesses come with more opportunities for security breaches, the need for your customers’ to understand the differences between a vulnerability assessment and a penetration test becomes a necessity.  Some will say that there is an overlap and similarities between these, however, the opposite could not prove to be truer. To put it simply, a vulnerability assessment…

Read More >>
IoT Conversation

How to Have an IoT Conversation with Promising Return

As our world of physical devices and data exchange becomes more and more connected, business processes are rapidly changing.  We are entering a new era of computing technology called the Internet of Things (IoT.) Like many of the disrupters of the past such as virtualization and cloud computing, IoT presents many challenges to both end-user customers as well as the channel.  It shifts the players and standard conversations of Information…

Read More >>
bdaas data analytics

BDaaS: Not just another “As a Service” for Cloud and Data Analytics

The popularity of “as a service” offerings continues to grow, and it seems like you can pretty much find anything as a service—there’s almost an “aaS” for every letter of the alphabet. One you may know in theory but not necessarily by name is “BDaaS,” or Big Data as a Service also considered to be data analytics managed services. While Big Data continues to flourish in the global market, solution…

Read More >>
mobility for financial services

Leveraging Mobility and Connectivity to Change the Financial Landscape

The evolution of financial services is moving toward a digital strategy for customer engagement, transactions and customer services. There is a growing pressure for financial institutions to enhance their mobile capabilities as consumers increasingly adopt mobile banking and payments. When it comes to payments, I’m sure many of us are already experiencing the convenience of scanning our phone at the register to pay for our Starbucks instead of digging for…

Read More >>
data analytics

Data is the New Currency. Are You Prepared to Invest?

Data is, and will continue to be, at the core of our digital world.  Considering data as a currency not only validates the importance of data, but strategically shows a smarter use for it.  Actionable insights from unified data are key for advancing digital experiences and improving business decisions.  However, critical data is often found outside a company’s firewall or sometimes lost within an organization’s internal silos. It’s as if…

Read More >>
Application Programming Interfaces

The A-B-C’s of Application Programming Interfaces (API) and why you should take notice

Spurred by innovation in mobility, cloud and big data, a business without a mobile footprint can be left “in the dust”. Every application that touches a person will need to be available on a mobile device. Application Programming Interfaces (API’s) have become the route to gain more adoption from developers and services from outside the company. But what exactly is an API? A more textbook definition of an API is…

Read More >>
digital transformation in retail

The digital transformation of retail drives opportunity

Retail’s “Big Show” (the National Retail Federation Conference 2017) has come and gone.  Having attended the show a dozen plus times in the past 20+ years, it’s been amazing to see the transformation in the show as retail itself has transformed.  My early NRF memories were of point of sale and supply chain vendors exhibiting products to support store and warehouse processes.   Mobile bar code scanners in the warehouse and…

Read More >>
data archiving

The difference between backing up and archiving data – and why it matters to your customers

As your customers’ businesses continue to grow and accrue new data, they must also address the need for long-term storage that’s secure and efficient. Many organizations will look to backup certain files, but it’s important to note that backups are ideally used to address short-term (less than 90 day) needs. Backups provide copies of data files in the event of system failures and disasters. Most systems create multiple copies of…

Read More >>