artificial intelligence
Understanding what customers need is critical to the venture capital firm for AI, medical apps and the next generation of wearables, according to Menlo Ventures Partner Greg Yap.
        
        
          Clinical engagement is key to an effective digital transformation, says Chris Brice, Hyland account manager for Europe and Middle East.
        
        
          Dr. Eyal Zimlichman, Sheba's CIO and CMO, discusses the hospital’s mission of "sustainable innovation" at the MEdinIsrael conference in Tel Aviv.
        
        
          Healthcare is at a turning point when it comes to using data analytics; AI is no longer just a "nice to have" competency, says Tushar Mehrotra, senior vice president of analytics at Optum.
        
        
          Rohit Ghosh, an AI scientist and founding member of Qure.ai, discusses how AI and deep learning are improving healthcare, giving an example of how they are advancing radiology.
        
        
          Microsoft Chief Medical Officer Simon Kos says health systems are still stuck in the 20th century so the software giant is focusing its efforts on AI, population health, public cloud, precision medicine, virtual services and more.
        
        
          Nathan Wenzler, senior director of cybersecurity at Moss Adams, says the idea that AI needs no management simply isn’t true; instead, smart people are needed to make decisions about the data and findings.
        
        
          Andrew Pendergast, VP of product at ThreatConnect, explains the value of external threat intelligence and why he is skeptical about AI but not machine learning.
        
        
          His Excellency Awadh Seghayer Al Ketbi, Assistant Undersecretary for Support Services at Ministry of Health & Prevention in the UAE, describes how the government is using AI to improve outcome for patients and clinical staff.
        
        
          Vade Secure Chief Solutions Architect Adrien Gendre talks about the biggest threats to email security, AI-originated phishing attacks and why users are no longer the weakest link in the security chain.
        
        
           
 
 
 
 
 
 
 
 
