Skip to main content
 

end use

Results 1 - 25 of 1476Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Sep 04, 2015
The HealthLeaders Media Physician Alignment Survey confirms there is continued deep support for clinical integration across our industry. We see some clear trends in how hospitals and health systems use clinical integration and risk sharing to work toward physician alignment and better access.
Tags : 
    
HealthLeaders Media
Published By: Spok     Published Date: Dec 18, 2015
Hospital communications used to be a lot simpler. If you needed to find a doctor, you could dial 0 and the operators would connect you or send a page on your behalf. People communicated through paper charts, wrote key phone numbers on grease boards, and kept on-call schedules in binders. Some of this still happens today, but communications across healthcare have become progressively more convoluted. The use of diverse mobile devices (smartphones, tablets, pagers, Wi-Fi phones, etc.), and the rise in care complexity necessitating care team coordination mean more sophisticated communication technology is required.
Tags : 
    
Spok
Published By: Truven Health Analytics     Published Date: Sep 01, 2015
Spending on supplies and pharmaceutical services varies among U.S. hospitals. It is not uncommon for hospitals with similar types of patients, including case mix and severity, to have significant differences in purchasing intensity for certain clinical services. Even small changes in efficiency can make a difference for hospitals and health systems, because supply-chain spending typically accounts for hospitals’ biggest spend after labor costs. Costs totaled about $74 billion in 2012, according to the Healthcare Supply Chain Association.
Tags : 
    
Truven Health Analytics
Published By: JATA     Published Date: Sep 30, 2015
Creating a state-of-the-art clinical documentation improvement (CDI) program isn’t just about boosting coding accuracy. It’s a key strategy in managing the transition from volume-based to value-based care, say healthcare leaders. That transition is a risky endeavor that is putting hospital and physician financial performance to the test. As hospitals participate in new care and business models aimed at improving value, leaders must ensure that their organizations are able to maintain reimbursement levels, effectively treat the chronically ill—especially in outpatient settings—and gather accurate data that will allow them to assess performance and segment their varying populations. While some organizations often believe they are leaving revenue on the table because of documentation and coding issues, CDI offers numerous opportunities for improving financial performance, finds a recent HealthLeaders Media survey of 149 healthcare executives at provider organizations.
Tags : 
    
JATA
Published By: HealthLeaders Media     Published Date: Sep 13, 2014
In the rough-and-tumble world of community and rural hospitals, the phrase “innovate or get left behind” is no longer a scary suggestion thrown out by expensive consultants, but a daily reality for CEOs. Rocked by reform and big changes in areas including financing, care models, and population trends, chief executives are getting used to making bold leadership decisions on a regular basis. Sponsored material.
Tags : 
    
HealthLeaders Media
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.
Published By: Dell     Published Date: Jun 13, 2018
We expend so much energy trying to make each minute count in many areas of our life – why wouldn’t we take the same approach to our computing experience? Time stuck waiting on a system could be better spent solving problems, working, or even playing. Download this research study to learn more about how you could be saving time that is lost on slow end user computing systems. Find out how Intel® Optane™ memory with Dell OptiPlex 7050 Micro provides a simple way to improve system responsiveness in several key areas to give users a way to reclaim precious time and become more efficient.
Tags : 
    
Dell
Published By: Dell     Published Date: May 04, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. Download this executive summary to learn ways to best upgrade PCs efficiently with effective solutions to meet the needs of the emerging workforce. Organizations who find this balance can turn their workforce into a strategic asset and gain a competitive advantage while freeing up IT resources to invest in other aspects of digital transformation. Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. Powerful Productivity Outside. The following trademark line should be used on the landing pages for this asset: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: May 22, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. On this video meetup we discuss the logistics, both operational and security that you’ll need to consider when managing your organization’s PC lifecycle, as well as how Dell can help get you there. This panel includes, Ian Haynes, Product Marketing Manager for Dell EMC and Jason Christensen, Dell EMC Product Development Manager. Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: DigiCert     Published Date: Jun 19, 2018
Are you spending too much time managing SSL/TLS certificates? Can you scan and report on your entire certificate estate? Have you seen a service go offline because of an expired certificate? Do you have to update certificates manually? If the answer to any of these questions is ‘yes’ then it’s time to invest in an automated certificate management tool. Download this whitepaper to find out more.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Oracle APAC     Published Date: May 24, 2018
Container technologies have substantial benefits especially given the need to isolate applications to increase service levels. Linux Containers (LXC) and Docker containers can be your best choice, depending on your use case.
Tags : 
    
Oracle APAC
Published By: HP Inc.     Published Date: Jun 13, 2018
Belgium-based Materialise was an early convert to the thinking that 3D printing could deliver end-use parts efficiently while easing the environmental impact of traditional manufacturing. Learn why Materialise is embracing HP Multi Jet Fusion technology to realize its longtime 3D vision of business growth that’s also easy on the Earth. Read the case study
Tags : 
    
HP Inc.
Published By: Workday     Published Date: Mar 02, 2018
Workday Student is an end-to-end student and faculty lifecycle information system that works seamlessly with Workday Financial Management, Workday Human Capital Management, and Workday Grants Management to unite the entire campus under one current, configurable, easy-to-use application.
Tags : 
    
Workday
Published By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Published By: Genesys     Published Date: Feb 21, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
forrester, artificial intelligence, consulting, customer experience
    
Genesys
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Wave: Translytical Data Platforms, Q4 2017 report reviews companies that offer “translytical data platforms”, which Forrester defines as an “emerging technology” that delivers “faster access to business data to support various workloads and use cases.” Download the report if you want to learn: -Why Forrester named DataStax a leader among 12 companies it identifies as “the most significant translytical vendors. -What constitutes a “translytical data platform” and why translytical data platforms are so critical for enterprise data strategies today. Why performance, scale, security, and use-case support are the key differentiators."
Tags : 
    
Datastax
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: Genesys     Published Date: Jun 13, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
artificial intelligence, customer service, agent productivity, recommendations
    
Genesys
Published By: HireVue     Published Date: May 18, 2018
Recruiting and selecting talented people has become a top HR priority. To support this priority, many organizations are leveraging assessment tools and processes to find, hire, and select the best candidates. To better understand both the use and value of modern assessments, HR.com and its partner, HireVue, launched The State of Assessments survey. The investigation covered the following topics: • The biggest challenges to hiring the best talent • Primary benefits and uses of assessments • Features that HR professionals want most from assessment tools • Most commonly used components of assessments • Time-to-completion and completion rates associated with assessments • The role of video interviewing in the assessment process • Future investments in pre-hiring assessments • And, finally, the ways that high-performing organizations tend to differ from other organizations in terms of how they use these tools
Tags : 
    
HireVue
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
    
Google Chrome Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.