Skip to main content
 

hr management

Results 1 - 25 of 982Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Jun 12, 2015
From Ebola preparedness to leading large-scale changes, today’s master’s degree programs are producing leaders eager to tackle this generation’s most pressing challenges. Rahul Anand, MD, is chief epidemiologist at Middlesex Hospital in Middletown, Connecticut, where he heads up all infectious disease prevention activities for the nonprofit integrated delivery network, from Ebola preparedness to hand washing. He’s also adjunct assistant professor in the department of medicine at the University of Utah, where he worked full time prior to moving to the East Coast. On top of that, he is one-third of the way through an MBA program at the University of Massachusetts Isenberg School of Management. It will take him another two years to finish the online program. Sponsored material.
Tags : 
    
HealthLeaders Media
Published By: API Healthcare     Published Date: Apr 24, 2015
Workforce management and the pursuit of productivity have formed a consistent pain point for hospitals for several years. The Affordable Care Act has only exacerbated the problem, increasing the demand on providers as the number of insured grows and the bar continues to rise on quality of care. According to a recent HealthLeaders Media Council survey, workforce productivity and acuity-based staffing will continue to be top priorities this year. Karlene Kerfoot, PhD, chief clinical integration officer at API Healthcare, says the survey results indicate a shift taking place as workforce management initiatives are expected to deliver more than reduced labor costs.
Tags : 
    
API Healthcare
Published By: Greenway Health     Published Date: Oct 15, 2014
Provider organizations can realize tremendous gains in financial performance by integrating electronic health record (EHR) and revenue cycle management (RCM) systems. Especially in the face of the transition to ICD-10, results include optimizing revenue streams directly at the point of care, maximizing and speeding reimbursement, minimizing denials and streamlining the collection process.
Tags : 
    
Greenway Health
Published By: GHX     Published Date: Nov 25, 2014
Electronic health record (EHR) system implementation is one of the largest IT investments most healthcare systems have ever made but it’s success is largely dependent upon the data which feeds it. One the main data sources for the EHR is the item master, which drives not only supply chain processes but also a broad range of clinical and financial functions. Only with a clean, accurate and complete item master can a healthcare organization trust the outputs generated from its EHRs – from evaluating the clinical effectiveness of products to securing reimbursements. Learn how to execute a master data management strategy to derive the greatest value from your EHR investment.
Tags : 
    
GHX
Published By: Kronos, Inc.     Published Date: Jan 07, 2015
HealthLeaders' survey on workforce management queried leaders from a cross-section of U.S. healthcare organizations, including hospitals, health systems, physician organizations, and long-term care/skilled nursing facilities. The 150 respondents represent executives across all disciplines — administration, clinical, operations, finance, marketing, and information. In the next three to five years, hospitals, health systems, and other patient service providers expect to augment their time-and-attendance and payroll systems with integrated applications that enable more sophisticated data crunching around labor analytics, acuity management, and staffing assignments. The goal? To convert the workforce from overhead to asset — a flexible, agile asset that will help organizations succeed in an increasingly demanding regulatory and competitive environment.
Tags : 
    
Kronos, Inc.
Published By: McKesson     Published Date: Oct 03, 2014
To achieve population health success, providers must identify high-risk patient populations, apply evidence-based care plans and interventions, and engage patients in their own care. Learn how.
Tags : 
    
McKesson
Published By: McKesson - Population Health & Risk Management     Published Date: Oct 03, 2014
To achieve population health success, providers must identify high-risk patient populations, apply evidence-based care plans and interventions, and engage patients in their own care. Learn how.
Tags : 
    
McKesson - Population Health & Risk Management
Published By: Sage     Published Date: Apr 19, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses are facing challenges specific to growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for the all-important slice of budget, which makes it vital to build the strongest business case for technology investment. This guide is intended to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and the likely return on investment. • Positioning HR as a driver of change throughout your business. • Ensuring your HR vision aligns with the business strategy. • Getting management and key stakeholders to buy in. • Building the strongest business case pos
Tags : 
    
Sage
Published By: TriNet     Published Date: Mar 13, 2013
Establishing a startup’s business infrastructure early — that is, establishing support in the areas of legal, accounting, tax, insurance, and human resources (HR) — provides a number of critical benefits for any entrepreneur to consider. This paper discusses suggestions for management teams that will facilitate establishment of an appropriate infrastructure.
Tags : 
    
TriNet
Published By: Red Hat     Published Date: Feb 22, 2019
Dieser Analysten-Bericht von IDC befasst sich mit der Herausforderung, vor der Kunden heute stehen: Sie müssen ein Gleichgewicht zwischen ihren Investitionen in die bestehende Infrastruktur sowie dem Ziel der Effizienzsteigerung und Modernisierung ihres Rechenzentrums finden. Gleichzeitig müssen sie neue technologische Entwicklungen und Bereitstellungstechniken nutzen, die erhebliche Verbesserungen der Entwicklerproduktivität und der betrieblichen Agilität sowie ein kostengünstigeres Lebenszyklusmanagement versprechen. IDC beschreibt die Möglichkeiten, die Kunden im Hinblick auf beide Ziele offenstehen: die Nutzung einer Infrastruktur, die bestehende und zukünftige Workloads unterstützt, und die Rolle, die Standardisierung und Modernisierung bei der erfolgreichen Betriebsoptimierung spielen.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Genesys     Published Date: Dec 20, 2018
Companies across the world are innovating with artificial intelligence (AI) to improve customer experience and forge deeper relationships with customers. Through surveys and interviews with 599 executives, from large and mid-sized companies across the globe, this MIT report reveals that most customer-centric firms have already deployed AI extensively in their customer-facing operations and customer experience management processes. Get the global report and regional spotlights on North America, Latin America, Europe and Asia to access complete results. Key insights include: • Nearly 90% of respondents report measurable improvements in the speed of complaint resolution; 80% note enhanced call volume processing using AI • 80% of respondents report measurable improvements in customer satisfaction, service delivery and contact center performance • In North America, 60% of the respondents believe they will deliver a 10% or more increase in customer lifetime value in the next year • Europe
Tags : 
    
Genesys
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.