• One part of that effort includes the use of secure messaging to share health information with patients through, say, an online portal.

    WSJ: When Email Is Part of the Doctor's Treatment

  • In a 2010 study done at Kaiser Permanente reported in Health Affairs of 35, 423 people with diabetes, hypertension, or both, the use of secure patient-physician e-mail within a two-month period was associated with a statistically significant improvement in effectiveness of care as measured by the Healthcare Effectiveness Data and Information Set (HEDIS).

    FORBES: Myth and Reality of Doctors Getting Overwhelmed by Emails

  • These included guidance on the use of restraint techniques in secure settings, the effects of detention in immigration removal centres on children and delays in welfare assessments.

    BBC: Vulnerable children's care fears

  • The certificates are important, he said, because secure use of web shops and other services revolve around interaction between the "master keys" and the lower level security credentials.

    BBC: Google detects fake website ID certificate threat

  • It was secondarily going to establish a whole family of draconian provisions to secure the safety and use of that identifier, and it set standards for transactions between different business partners.

    FORBES: Behind the Curtain of Healthcare's New CommonWell Alliance

  • The best course of action is to use some basic common sense practices of protecting your personal information, and to only use secure sites.

    FORBES: Financial Fraud Is Growing, Post Madoff

  • GeOS is a one-of-a-kind "operating system" for commercial use of OpenStreetMap, making use of the crowdsourced data intuitive, affordable and secure for developers to build services with it.

    ENGADGET: Skobbler brings maps to Nook Tablet, Color with ForeverMap 2

  • Boosting energy-efficiency and the use of renewables not only helps secure energy supplies and cuts local pollution, but also helps keep carbon emissions in check too.

    ECONOMIST: China, India and climate change

  • It can improve system integrity and enable businesses to secure and manage the use of thousands of Web 2.0 applications in the enterprise without inhibiting the flow of business.

    FORBES: The Grinch Goes Digital: Why Cyber Monday Is Hacker Heaven

  • On the other side of the spectrum, struggling Blackberry maker Research in Motion (RIMM) announced today it will offer software to companies that would open up its secure network, for use of iPhones and other mobile gadgets in the workplace.

    FORBES: Daily Wrap

  • The select committee's report has also angered Liberal Democrat MP Paul Tyler, who has led an eight-year campaign to secure a moratorium on the use of OPs until they are proved safe.

    BBC: Calls to lift sheep dip ban

  • Having used the conservative bit of his message to secure the loyalty of the party faithful, Mr Bush can now use the compassionate bit to reach out to the swing voters whose support wins elections.

    ECONOMIST: The selling of a candidate

  • He sees Akamai's global network as more reliable, smarter and more secure than P2P networks that make use of consumers' home PCs.

    FORBES: Magazine Article

  • They then use the stream of income from customers' repayments to secure debt from the capital market, even as they discount their new cars and weaken second-hand values.

    ECONOMIST: Detroit's nine lives

  • Veolia Environmental Services was the other firm fighting to run the incinerator, and whose spokesperson said it believed it was "sympathetic with the local environment and represented a unique opportunity to use the residual waste to provide a secure source of sustainable energy and heat to the neighbouring Tata Steel steelworks - a major source of employment in the area".

    BBC: Artist's impression of a Viridor plant in Cardiff

  • None of them were secure and all could be easily opened by a variety of simple techniques including the use of paper clips, straws, brass strips of metal, vibration, shock, coat hangers, and other methods that could easily be figured out by kids.

    FORBES: What's Missing In The Gun Control Debate Is Talk About Gun Safety At Home

  • He also indicated that Apple would likely continue to use its balance sheet to do partnerships to secure supplies of key components.

    FORBES: Apple Plots Move To Expand iPhone's Market Share

  • Similar to Fling for iPad, to use Fling mini, launch the game of your choice and secure Fling mini's center control over the game's directional pad.

    ENGADGET: Ten One Design's iPad joysticks set to have a mini Fling with your smartphone

  • What's more, the tech has use outside of robotics and can even be levereged for more secure e-signature verification based on speed and pressure of a user's handwriting.

    ENGADGET

  • The report accused the Department for Communities and Local Government and the Department of Health of failing to use their leverage in the market to secure the best possible deal for taxpayers.

    BBC: MPs demand better value from PFI projects

  • Mr Mandela is now trying to use his personal authority to secure a ceasefire and the withdrawal of all foreign forces from Congo.

    ECONOMIST: South Africa

  • Some Western and Afghan experts say that fifteen thousand American troops would not be enough to secure Afghanistan, particularly when it comes to the use of airpower.

    NEWYORKER: After America

  • In an interview with ABC News aired Wednesday, Yene alleged that he, Herman and Weaver entered into an agreement to use her White House influence to secure the FCC license for one of his clients.

    CNN: Herman Focus Of Influence-Peddling Probe

  • Over the past week, researchers at Finnish security company F-secure have identified what they say is the first use of Storm's massive "botnet"--a collection of hundreds of thousands of computers hijacked with hidden software--to steal users' banking information.

    FORBES: Storm For Rent

  • "The use of text-mining algorithms was critical in this endeavor and helped secure a complete picture that would not have been available using traditional market research, " says Michael Cavaretta, Ford's technical leader for predictive analytics and data mining.

    WSJ: How Big Data Is Changing the Whole Equation for Business

  • "The beauty of iZettle is that it's simple to use, totally secure and takes seconds for a transaction, " said Jacob de Geer, CEO and co-founder of iZettle, which is used by more than 75, 000 small businesses and individuals in six countries.

    ENGADGET: iZettle launches on EE, aims to let UK merchants dabble in plastic

  • As a first step, which would underpin any political process, rather than encouraging the transfer of more weapons to Syria, governments could use their influence to secure a halt to international arms transfers from all governments to any warring party in Syria.

    CNN: Syrian arms embargo: Why more weapons to Syria is a mistake

  • But so far, few changes have been implemented on the ground or in space, said Brian Weeden, a technical adviser with the Secure World Foundation, an organization dedicated to the peaceful use of outer space.

    MSN: Space Junk Hazards Force International Response

  • Once secure place that stores all of the data you have to use when you shop, buy an airline ticket, go online to your favorite social networks, etc.

    FORBES: Dashlane Is Your Secure Digital Memory

  • Mr Schneier predicts that insurance companies will start to specify what kinds of computer equipment companies should use, or charge lower premiums to insure more secure operating systems or hardware.

    ECONOMIST: Putting it all together

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定