Oracle Supports Cerner Cloud Services

Oracle Supports Cerner Cloud Services

Global health care company Cerner is using Oracle Enterprise Manager to launch new private and public cloud services to increase IT efficiency and optimize business value.

Cerner was experiencing a growing client base and aimed to leverage its operational knowledge within a cloud infrastructure to support its 9,000 facilities across the world.

In addition to eliminating error, the company wanted to eliminate waste for health care providers and to generate additional revenue. Cerner gradually built its existing managed service offerings with new cloud based services supported by Oracle Enterprise Manager, and thus reduced capital investments by $9.5 million.

This strategic move has also enabled Cerner to offer its clients a new suite of on-demand infrastructure and software including messaging, storage and virtual desktop capabilities.

Oracle Enterprise Manager also provides integrated application-to-disk management capabilities for public and private clouds. This has improved the ROI on Cerner’s existing IT infrastructure and enabled it to pursue new business opportunities without incurring incremental IT costs.

To help optimize processes for health care organizations around the world, we are always looking at new ways to expand and refine our services,” said Kent Scheuler, senior vice president of Managed Services with Cerner.

With Skybox DB Central utilizing Oracle Enterprise Manager, we have been able to eliminate the management and maintenance challenges that would traditionally be associated with introducing a new suite of on-demand infrastructure and software services. This has created a sizable new business opportunity for us, while also allowing our clients to benefit from reduced IT costs and increased performance.”

Oracle Enterprise Manager also supports the new Cerner Skybox public cloud solutions and also allows the company to monitor and manage the experience of its clients, their business transactions and application interactions from one management console.

By Anuradha Shukla

Sorry, comments are closed for this post.

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…