Skip to main content
 

analysis

Results 1 - 25 of 1205Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Sep 03, 2015
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media Population Health Exchange in June 2015
Tags : 
    
HealthLeaders Media
Published By: HealthLeaders Media     Published Date: Sep 29, 2015
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media Population Health Exchange in June 2015
Tags : 
    
HealthLeaders Media
Published By: HealthLeaders Media     Published Date: Dec 04, 2015
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media CEO Exchange, September 30–October 2, 2015
Tags : 
    
HealthLeaders Media
Published By: HealthLeaders Media     Published Date: Jan 13, 2016
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media CEO Exchange, September 30–October 2, 2015
Tags : 
    
HealthLeaders Media
Published By: HealthLeaders Media     Published Date: Jan 19, 2016
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media CNO Exchange in November 2015
Tags : 
    
HealthLeaders Media
Published By: Truven Health Analytics     Published Date: Dec 01, 2014
The Truven Health Analytics 50 Top Cardiovascular Hospitals study identifies hospitals that achieve the best performance on a scorecard of performance measures. This year, based on comparisons between the winners and a peer group of similar high-volume hospitals that were not winners, the study found that if all cardiovascular providers performed at the level of this year’s winners, approximately 9,500 additional patients could survive, more than $1 billion could be saved, and almost 3,000 additional bypass and angioplasty patients could be complication-free. This is based on an analysis of Medicare patients; if the same standards were applied to all inpatients, the impact would be even greater.
Tags : 
    
Truven Health Analytics
Published By: Kronos, Inc.     Published Date: Mar 10, 2016
As the healthcare industry shifts focus from volume to value, standardization is needed to accurately benchmark labor resource utilization. This is the premise of a survey conducted by HealthLeaders Media and sponsored by Kronos. What constitutes direct patient care? Hands-on patient assessment, administering medications, and performing procedures clearly top the list. But can other activities be considered direct care too—even those not conducted in a patient’s presence? Download the free report to get statistics and analysis from the survey questions below and much more - Which of the following actions are considered direct patient care in your organization? - Which of the following actions are considered indirect patient care in your organization? - Which of the following actions are considered neither direct nor indirect care but are categorized separately as non-patient care in your organization?
Tags : 
    
Kronos, Inc.
Published By: Sentry Data Systems     Published Date: Sep 03, 2015
Analysis and in-depth discussion from healthcare leaders at the HealthLeaders Media Population Health Exchange in June 2015
Tags : 
    
Sentry Data Systems
Published By: Patient Safety and Quality Healthcare     Published Date: Oct 14, 2015
While we must continue to emphasize to all members of the care team that they are the front line to preventing errors, taking a systems or holistic approach will greatly assist in making adverse events rarer. Aiding in the implementation of the latter are many companies that provide incident reporting, analysis, and review systems.
Tags : 
    
Patient Safety and Quality Healthcare
Published By: S&P Dow Jones Industrial     Published Date: Jul 30, 2014
In October 2013, S&P Dow Jones Indices (S&P DJI) launched the S&P Healthcare Claims Indices (the indices). This new index series is designed to provide an independent, timely measure of the changes in healthcare expenditures and utilization for individuals enrolled in commercial health insurance plans in the United States. S&P DJI developed these new indices in conjunction with healthcare professionals at Health Index Advisors (HIA), a joint venture between the premier actuarial and consulting firms Aon Inc. and Milliman Inc. S&P DJI combined its knowledge and experience in developing leading indices with HIA’s experience in the healthcare market to develop the first index series of its kind, based on actual healthcare claims data. These indices seek to increase transparency in the healthcare market and enable the analysis and tracking of changes in healthcare expenditures.
Tags : 
    
S&P Dow Jones Industrial
Published By: McKesson     Published Date: May 27, 2015
The shift to value-based care creates a sharp increase in healthcare organizations and networks’ need for data collection, aggregation and analysis. This white paper outlines the challenges involved with performing population-level analyses, developing cost accounting and profitability analyses across care settings, evaluating care episodes and integrating quality data. It explores the limitations of targeted software solutions to provide cross-enterprise insights. Finally, it provides advice for healthcare executives regarding how to approach gathering quality and cost-related data and how to leverage technology and analytical expertise to drive risk-based contract success.
Tags : 
    
McKesson
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Gartner’s Continuous Delivery Automation Magic Quadrant (MQ) analyzes the current market solutions and their effectiveness in responding to the demands of the modern business. The MQ is created on a tool’s ‘ability to execute’ and its ‘completeness of vision.’ When assessing CA Continuous Delivery Automation, Gartner highlights its ability to ‘provide scalability, resilience, security and enterprise management connectivity.’ The analysis also goes much deeper to cover the strengths, weaknesses and various nuances of all the automation products on the market.
Tags : 
    
CA Technologies_Business_Automation
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: KPMG     Published Date: Jul 11, 2018
New technology is driving consumer expectations to new heights. Businesses that understand the value of customer experience (CX) excellence stand to capture significant revenue from this trend. Read this report to find out: • what’s really going on inside the mind of the customer • how first-movers are using new technologies to transform customer experience • what the six pillars of customer experience are and how to master them • why internal and external connectedness is an essential component of CX excellence Download the report now
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 09, 2018
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions. In search of instant analytical insights, businesses often prioritize data access and analysis over governance and quality. However, without ensuring the data is trustworthy, complete and consistent, leaders cannot be confident their decisions are rooted in facts and reality
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: AWS - ROI DNA     Published Date: Aug 09, 2018
In today's big data digital world, your organization produces large volumes of data with great velocity. Generating value from this data and guiding decision making require quick capture, analysis and action. Without strategies to turn data into insights, the data loses its value and insights become irrelevant. Real-time data inegration and analytics tools play a crucial role in harnessing your data so you can enable business and IT stakeholders to make evidence-based decisions
Tags : 
    
AWS - ROI DNA
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Adverity     Published Date: Jun 15, 2018
In this whitepaper, we take a closer look at some of the biggest challenges facing e-commerce businesses, namely understanding your data in general and, more precisely, your customer acquisition costs (CAC). It's full of inspiration, useful tips and actionable insights for you to step up your marketing game. In order to reap the fruits from your data seeds, you have to make sure you tackle these five challenges full-frontal: Knowing what data to capture Understanding customer behaviour Finding your technology solution Ensuring analysis is impartial Optimising website content - especially for your offline users
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: Virtuant Corp.     Published Date: Oct 29, 2011
A benchmark report to provide IT decision makers with a fair comparison of two of the most popular application server products on the market today.
Tags : 
    
Virtuant Corp.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.