Published By: TigerText
Published Date: Sep 14, 2015
Hospital noise, like overhead pages, is one of the chief annoyances among patients. It can affect sleep, speedy recoveries and overall patient satisfaction. But, you can go above and beyond the national standard for patient care and boost your HCAHPS with a quick and easy way to communicate.
From Ebola preparedness to leading large-scale changes, today’s master’s degree programs are producing leaders eager to tackle this generation’s most pressing challenges.
Rahul Anand, MD, is chief epidemiologist at Middlesex Hospital in Middletown, Connecticut, where he heads up all infectious disease prevention activities for the nonprofit integrated delivery network, from Ebola preparedness to hand washing. He’s also adjunct assistant professor in the department of medicine at the University of Utah, where he worked full time prior to moving to the East Coast. On top of that, he is one-third of the way through an MBA program at the University of Massachusetts Isenberg School of Management. It will take him another two years to finish the online program.
The HealthLeaders Media Council is a group of 8,600+ senior healthcare executives from the nation’s leading healthcare provider organizations. They offer insights on the shifting healthcare climate so as to inform their peers and the industry-at-large of operative strategies and existing challenges.
Intelligence Reports are the result of these insights. These reports can be used to benchmark an organization's performance and progress compared to peer organizations, as well as gather insights and advice from industry experts and leaders on a variety of critical topics.
As an underwriter of the report, take advantage of exclusively customized survey questions, and a perspective letter featuring a chief executive from your brand. Choose the topic that best aligns with your brand positioning, and benefit from this unique opportunity for lead generation.
Align your brand with the HealthLeaders Media Council. Download our asset information sheet to see the upcoming schedule of opportunit
This report reveals how a growing number of patient experience programs have moved beyond focusing primarily on training nurses to also include physicians and a host of nonclinical staff. Another sign of the degree to which organizations are embracing patient experience is the increasing number which feature a chief patient experience officer (or individual with similar responsibilities) on the senior leadership team. Complete this short form to download your FREE copy of PATIENT EXPERIENCE: Cultural Transformation to Move Beyond HCAHPS
Workforce management and the pursuit of productivity have formed a consistent pain point for hospitals for several years. The Affordable Care Act has only exacerbated the problem, increasing the demand on providers as the number of insured grows and the bar continues to rise on quality of care. According to a recent HealthLeaders Media Council survey, workforce productivity and acuity-based staffing will continue to be top priorities this year. Karlene Kerfoot, PhD, chief clinical integration officer at API Healthcare, says the survey results indicate a shift taking place as workforce management initiatives are expected to deliver more than reduced labor costs.
Even as the move to electronic health records (EHR) progresses in earnest, there are a myriad of challenges involving legacy data systems. Chief among these challenges is the cost of maintaining obsolete systems solely for the patient information they contain. When up to 70% of a typical IT budget is spent on maintaining the current IT infrastructure and application portfolio, organizations have little left to invest in much-needed innovation. According to a recent HealthLeaders Media Survey, many organizations are still adjusting after their migration to a new EHR system. Hospitals need to get a better grasp on all forms and sources of data that they have—and the data they don’t yet have—so that the right information can be delivered to the right individual, and in the right context, at the point of care.
In the rough-and-tumble world of community and rural hospitals, the phrase “innovate or get left behind” is no longer a scary suggestion thrown out by expensive consultants, but a daily reality for CEOs. Rocked by reform and big changes in areas including financing, care models, and population trends, chief executives are getting used to making bold leadership decisions on a regular basis.
As chief transformation officer at MemorialCare Health System in Los Angeles and Orange counties, CA, it’s Helen Macfie’s job to rethink the future of healthcare delivery. Lately, she’s been thinking a lot about healthcare reform and care redesign as the six-hospital integrated delivery system, with more than 200 care sites, focuses on growth across the Southern California region.
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrella as the first line of defense against threats on the internet. He shares best practices and the outcomes his team has seen using DNS-layer security to protect users wherever they access the internet. View this video to hear security best practices and lessons learned from Alan, a security veteran.
A Chief Marketing Officer's Roadmap.
In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Published By: Infosys
Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Customer and supplier portals are one of the many fruits borne from the
age of digital transformation. However, the level of accommodations that
portals provide to customers and suppliers has spawned a whole new
set of challenges that didn’t exist less than a decade ago. Chief among
these is something referred to as “portal fatigue.”
Many AR departments and CSR teams are painfully familiar with the
term, as it’s often their job to either retrieve orders from a customer portal
or submit invoices directly into customers’ AP systems. On paper, these
tasks don’t seem all that odious. But when you consider the amounts of
different portals being used, and the fact that not every user is trained
on each portal, it’s easy to see why portal fatigue is a very real and
concerning problem for today’s businesses.
Published By: Cisco EMEA
Published Date: Mar 08, 2019
And then imagine processing power strong
enough to make sense of all this data in every
language and in every dimension. Unless
you’ve achieved that digital data nirvana (and
you haven’t told the rest of us), you’re going
to have some unknowns in your world.
In the world of security, unknown threats exist
outside the enterprise in the form of malicious
actors, state-sponsored attacks and malware
that moves fast and destroys everything
it touches. The unknown exists inside the
enterprise in the form of insider threat from
rogue employees or careless contractors –
which was deemed by 24% of our survey
respondents to pose the most serious risk to
their organizations. The unknown exists in the
form of new devices, new cloud applications,
and new data. The unknown is what keeps
CISOs, what keeps you, up at night – and we
know because we asked you.
Published By: Cisco EMEA
Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once.
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world.
In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Published By: DocuSign
Published Date: Feb 13, 2017
DocuSign electronic signatures are valid and legally binding around the world. In fact, they are more enforceable than traditional handwritten signatures. Hear from DocuSign's Chief Legal Officer, Ken Moyle, and DocuSign's Founder, Tom Gonser, about how DocuSign delivers the highest levels of legal enforceability and is the only eSignature provider to warrant compliance with the Federal ESIGN Act.
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable?
MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Marketing leaders are asking their analytics teams to provide better insights
into customers, prospects and journeys, and a more accurate assessment
of the impact of marketing tactics. Use this research to find a digital
marketing analytics tool to support your needs.
This Magic Quadrant is intended for chief marketing of?cers (CMOs), marketing analytics and data
science practitioners, and other digital marketing leaders involved in the selection of systems to
support marketing analytics requirements.
The pace of change in business today is unprecedented. Consider this stark statistic tweeted by Vala Afshar, the Chief Digital Evangelist at Salesforce: Twitter only took 2 years to gain their first 50 million users1. This is only a fraction of the time compared with everyday products like the automobile and airplane, which took 62 and 68 years respectively to reach the same milestones.
Our industry has made numerous technological
advances designed to protect homeowners,
businesses and electrical workers. That makes
every fatal electrocution in the home all the
Between 2010 and 2013, the U.S. saw an estimated average of 48
electrocution fatalities associated with consumer products per year,
with large and small electric appliances chief among them1. Tragedies
like these can be avoided, especially when the ground fault circuit
interrupter (GFCI) technologies needed to prevent dangerous events
are readily available.
As the principle NEMA representative at the National Electrical Code
(NEC) Code-Making Panel Two, I saw public input asking for increased
GFCI protection for the home during the 2017 code cycle. The code
panel expanded the GFCI requirement for facilities other than dwelling
units as part of section NEC 210.8(B). However, residential standards
improvements were sidelined.
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security
investments to bridge the divide between largely siloed security systems. The focus is on reducing
the number of consoles needed to manage the security infrastructure. Network security vendors have
a significant role to play in bridging the communication gap between these systems. The creation of a
unified defense architecture enables threat data exchange between existing security systems. It helps
automate the process of raising an organization's security posture when a security infrastructure
component detects a threat.
The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security
Products program, on behalf of Fortinet's customers.
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.