Skip to main content
 

hr organizations

Results 1 - 25 of 522Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Jul 08, 2015
The 20 leaders gathered at the 2015 HealthLeaders Media Revenue Cycle Exchange in Austin, TX, tackled the challenges of clinical documentation, which they identified as the biggest threat to their organizations' revenue cycle efforts.
Tags : 
    
HealthLeaders Media
Published By: EMC     Published Date: Sep 03, 2015
Even as the move to electronic health records (EHR) progresses in earnest, there are a myriad of challenges involving legacy data systems. Chief among these challenges is the cost of maintaining obsolete systems solely for the patient information they contain. When up to 70% of a typical IT budget is spent on maintaining the current IT infrastructure and application portfolio, organizations have little left to invest in much-needed innovation. According to a recent HealthLeaders Media Survey, many organizations are still adjusting after their migration to a new EHR system. Hospitals need to get a better grasp on all forms and sources of data that they have—and the data they don’t yet have—so that the right information can be delivered to the right individual, and in the right context, at the point of care.
Tags : 
    
EMC
Published By: JATA     Published Date: Sep 30, 2015
Creating a state-of-the-art clinical documentation improvement (CDI) program isn’t just about boosting coding accuracy. It’s a key strategy in managing the transition from volume-based to value-based care, say healthcare leaders. That transition is a risky endeavor that is putting hospital and physician financial performance to the test. As hospitals participate in new care and business models aimed at improving value, leaders must ensure that their organizations are able to maintain reimbursement levels, effectively treat the chronically ill—especially in outpatient settings—and gather accurate data that will allow them to assess performance and segment their varying populations. While some organizations often believe they are leaving revenue on the table because of documentation and coding issues, CDI offers numerous opportunities for improving financial performance, finds a recent HealthLeaders Media survey of 149 healthcare executives at provider organizations.
Tags : 
    
JATA
Published By: Xtend Healthcare     Published Date: Jun 22, 2016
In many aspects of healthcare, we see indications of change, with movement toward new payment models and investments in infrastructure to support the delivery of value-based care. Cost control remains a top financial lever, but the discipline is becoming more complex. From a brute-force perspective, controlling cost has a direct effect on operating margin, which provides the classic move of cost control through cost cutting. Now, though, organizations need new command over cost factors themselves.
Tags : 
    
Xtend Healthcare
Published By: Kronos, Inc.     Published Date: Jan 07, 2015
HealthLeaders' survey on workforce management queried leaders from a cross-section of U.S. healthcare organizations, including hospitals, health systems, physician organizations, and long-term care/skilled nursing facilities. The 150 respondents represent executives across all disciplines — administration, clinical, operations, finance, marketing, and information. In the next three to five years, hospitals, health systems, and other patient service providers expect to augment their time-and-attendance and payroll systems with integrated applications that enable more sophisticated data crunching around labor analytics, acuity management, and staffing assignments. The goal? To convert the workforce from overhead to asset — a flexible, agile asset that will help organizations succeed in an increasingly demanding regulatory and competitive environment.
Tags : 
    
Kronos, Inc.
Published By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
Provision IT the way you want it, when you want it, through a platform that automates operations. That's Composable Infrastructure. Learn how it represents a key competitive advantage for organizations that want to succeed in the Idea Economy.
Tags : 
    
Hewlett Packard Enterprise
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : 
water, plant, pump
    
Schneider Electric
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Group M_IBM Q3'19     Published Date: Jun 27, 2019
Organizations continue to rush down the digital transformation path. Whether by modernizing their IT infrastructures, leveraging the cloud, or becoming data-centric and data-driven, organizations must become more agile in their business practices and within their IT infrastructure stack to effectively compete in today’s dynamic business environment. Between the speed and distributed nature of modern businesses, as well as the expectation of instantaneous access to data from everyday users, it’s not surprising that nearly one in three organizations are looking into ways to improve data analytics for real-time business intelligence and customer insight.
Tags : 
    
Group M_IBM Q3'19
Published By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and it’s deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, “The Triple A Threat,” we explore the Triple A Threat of anxiety, anger, and aggression. We’ll explain what impact these issues have on your workplace and your bottom line. You’ll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
    
MeQuilibrium
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Infosys Limited     Published Date: Aug 02, 2019
The consumer packaged goods landscape is a sum of many complex and moving parts – a demanding and ever changing customer universe, with a subset of digital natives; a complex distribution system; and legacy IT systems from internal silos and mergers. In such a dynamic environment, we help our clients accelerate growth by transforming their organization to become a thriving Live Enterprise by augmenting their core digital capabilities. The cloud is an integral part of this digital transformation ushering CPG enterprises into a new era of hyper performance. Cloud promises to deliver several significant benefits including reduced costs, increased scalability, flexibility, and agility, leading to improved business performance and therefore growth. To better understand the specifics of cloud initiatives, we surveyed 167 senior executives from organizations in the CRL industry, with over USD 1 billion in revenues across the United States, Europe, Australia and New Zealand. Download thi
Tags : 
    
Infosys Limited
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Achievers     Published Date: Aug 16, 2019
Understanding HR and Engagement Leaders’ Challenges and Opportunities How can organizations understand the gaps in employee expectations, anticipate the most pressing issues, and adopt the processes and technology that make it scalable? Achievers surveyed HR and engagement leaders’ on the front lines of engagement who understand the challenges and opportunities facing the workplace today. In this report, discover how you can address: • The most pressing engagement challenges for organizations today • The role of employee empowerment and trust in engagement success. • Technology and culture changes that can ensure success
Tags : 
    
Achievers
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Business Controls, Inc.     Published Date: Sep 26, 2012
This paper covers the 7 essential hotline features to look for in a solution, the 4 best practices for creating and maintaining an effective hotline, and the HR potential of the traditional hotline to organizations that maintain locations, agents, or contractors outside the country.
Tags : 
    
Business Controls, Inc.
Published By: Skillsoft     Published Date: Sep 25, 2013
HR execs are not finding their budgets rising at the same levels as their workforce requirements. By 2020, the global labor market faces a shortage of 38-40 million college educated workers and 45 million secondary educated workers1. Despite the change catalyst that the mounting crisis demands, many organizations have not adjusted their strategies. Why would an organization race to develop skills by investing the same portion of their budget in classroom approaches and build training that they could buy? To help organizations find a smarter way out of the talent crisis, the Director of Research at the world’s leading learning analytics firm compared the results of Skillsoft elearning to classroom and internally developed elearning benchmarks. The results were clear; Skillsoft provides a solid answer to the global talent imperative.
Tags : 
    
Skillsoft
Published By: PeopleDoc     Published Date: Apr 13, 2016
Managing talent and how that talent performs is a high-stakes arena that takes up a lot of time and resources. How are your competitors tackling these issues? Every HR department is trying to find more efficient ways to provide service to employees, from answering routine requests to dealing with complaints and whistleblowing. For efficiency, employee satisfaction, and legal compliance, it’s important to track, monitor, and respond to all these employee actions. The consequences of having complaints and allegations fall through the cracks are two-fold: employees feel ignored, and lawsuits become more likely and harder to defend. As a result, many organizations are buying or building systems to manage this important tracking process. To find out who’s doing what and what’s working in the real world, BLR conducted a Case Management Survey in February 2016. Download the summary to see the results!
Tags : 
    
PeopleDoc
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.