Skip to main content
 

apt

Results 1 - 25 of 1504Sort Results By: Published Date | Title | Company Name
Published By: TruBridge     Published Date: Apr 01, 2015
Rolling Plains Memorial Hospital achieved a substantial $438,000 reimbursement improvement in just 3 months by taking advantage of TruBridge’s Clinical Documentation Improvement (CDI) Training. Rolling Plains Memorial Hospital is an 85 bed community hospital located in Sweetwater, TX with annual revenue of $42 million. As the executives at this facility noticed a discrepancy in patients’ charts and the level of care the patients received, they knew something needed to change. TruBridge was able to make a dramatic difference in clinical documentation and capture the earned reimbursements.
Tags : 
    
TruBridge
Published By: HealthLeaders Media     Published Date: Mar 14, 2016
The Custom Research Brief is a concise digital solution that allows for capturing data, customer feedback and sponsor thought leadership. • Make a statement in the marketplace as a solution provider • Highlight your customers and their outcomes • Create one-to-one marketing tools for existing customers and prospects • Extend the value of your marketing message with an in-depth content-rich reader experience • Ensure delivery of your message in a way that PR placements can’t guarantee and advertising can’t accommodate Partner with HealthLeaders Media to gain greater credibility and traction from our targeted data and intelligence solutions. Download the information sheet now to discover what innovative engagement we offer.
Tags : 
    
HealthLeaders Media
Published By: Truven Health Analytics     Published Date: May 01, 2015
The annual Truven Health 100 Top Hospitals® identifies U.S. hospitals with the best overall performance across multiple organizational metrics, including clinical, operational, and financial. The ability of some hospitals to adapt as the industry is changing demonstrates leadership as the winners set the standards their peers seek to achieve. Study projections indicate that if the new national benchmarks of high performance were achieved by all hospitals in the United States, nearly 126,500 additional lives could be saved, almost 109,000 additional patients could be complication-free, and $1.8 billion in inpatient costs could be saved.
Tags : 
    
Truven Health Analytics
Published By: Truven Health Analytics     Published Date: Mar 28, 2016
The annual Truven Health AnalyticsTM 100 Top Hospitals® identifies U.S. hospitals with the best overall performance across multiple organizational metrics, including clinical, operational, and financial. The ability of some hospitals to adapt as the industry is changing demonstrates leadership as the winners set the standards their peers seek to achieve. The study revealed that the nation’s best hospitals had a lower mortality index, considering patient severity; had fewer patient complications; followed accepted care protocols; had lower 30-day mortality and 30-day readmission rates; sent patients home sooner; provided more timely emergency care; kept expenses low, both in-hospital and through the aftercare process; and scored better on patient surveys of hospital experience
Tags : 
    
Truven Health Analytics
Published By: Community Hospital Corporation     Published Date: Nov 11, 2014
Learn how Oak Tree Hospital, a struggling LTACH in rural Kentucky, was transformed into ContinueCARE Hospital at Baptist Health Corbin, a model of success.
Tags : 
    
Community Hospital Corporation
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Location3     Published Date: Feb 07, 2019
In our experience as franchise marketers, Local Ad Fund dollars provide a solid foundation for paid search campaigns that drive consistent, high quality-low cost, leads. However many franchisees and local business owners could be doing more to support established corporate search marketing campaigns, ultimately capturing the maximum search interest for their services within their markets, driving increased local revenue.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local store revenue, franchise paid search
    
Location3
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Workday     Published Date: Mar 26, 2019
Changing student demographics can pose big challenges to higher education institutions. The ability to adapt is key to creating a place where everyone can succeed. This report from Inside Higher Ed dives deep into what these changes mean for your campus and how technology can help you meet the needs of a new generation of students.
Tags : 
    
Workday
Published By: gyro     Published Date: Feb 01, 2019
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
advertising, humor, qualitative research, quantitative research, b2b advertising
    
gyro
Published By: Gameffective     Published Date: Feb 26, 2019
How to drive employee motivation and learning with gamification and feedback Digital engagement provides an exciting new way of breaking away from old paradigms to generate motivation, proficiency and engagement. In this white paper we will: * Provide ways to rethink call center agent motivation by using techniques like feedback, competition, adaptive learning and goals. * Take a look at what digital motivation looks like in the contact center from the point of view of a call center agent and his manager Using gamification can do much more than drive quality and performance. It also provides agents with much needed engagement, transparency, feedback and optimal use of best practices training.
Tags : 
    
Gameffective
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Ultimate Software     Published Date: Feb 12, 2014
Talent management is evolving, and HR professionals must adapt for the future. Competition remains fierce to acquire the best talent from the largest candidate pool in history, while the traditional performance review cycle is no longer sufficient for evaluating the functions and needs of your people. Executives must ensure that managers are not only able to find the right individual for the job, but also retain, engage, and prepare top performers for leadership roles in a proactive way.
Tags : 
    
Ultimate Software
Published By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management'
    
Extensis
Published By: AdaptivCOOL     Published Date: Jan 11, 2012
The Effects of Real-time Airflow & Cooling Management
Tags : 
    
AdaptivCOOL
Published By: Precision Fiber Products     Published Date: Sep 19, 2012
Global Supplier of quality fiber optic products: PM connectors, optical attenuators, adapters, ferrules, MIC patch cords & cable assemblies, polishing film, fixtures, Miller tool kits & more.
Tags : 
    
Precision Fiber Products
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.