Skip to main content
 

it strategy

Results 1 - 25 of 1572Sort Results By: Published Date | Title | Company Name
Published By: JATA     Published Date: Sep 30, 2015
Creating a state-of-the-art clinical documentation improvement (CDI) program isn’t just about boosting coding accuracy. It’s a key strategy in managing the transition from volume-based to value-based care, say healthcare leaders. That transition is a risky endeavor that is putting hospital and physician financial performance to the test. As hospitals participate in new care and business models aimed at improving value, leaders must ensure that their organizations are able to maintain reimbursement levels, effectively treat the chronically ill—especially in outpatient settings—and gather accurate data that will allow them to assess performance and segment their varying populations. While some organizations often believe they are leaving revenue on the table because of documentation and coding issues, CDI offers numerous opportunities for improving financial performance, finds a recent HealthLeaders Media survey of 149 healthcare executives at provider organizations.
Tags : 
    
JATA
Published By: Zix corp     Published Date: May 11, 2016
Email is the most used communication tool in business. It's so easy to click that seemingly innocent 'Send' button that you may not realize the risk. Find out your next steps to an implementing an effective secure email strategy.
Tags : 
    
Zix corp
Published By: GHX     Published Date: Nov 25, 2014
Electronic health record (EHR) system implementation is one of the largest IT investments most healthcare systems have ever made but it’s success is largely dependent upon the data which feeds it. One the main data sources for the EHR is the item master, which drives not only supply chain processes but also a broad range of clinical and financial functions. Only with a clean, accurate and complete item master can a healthcare organization trust the outputs generated from its EHRs – from evaluating the clinical effectiveness of products to securing reimbursements. Learn how to execute a master data management strategy to derive the greatest value from your EHR investment.
Tags : 
    
GHX
Published By: Oracle     Published Date: Jan 08, 2018
Data is a driver of growth and change that is quickly becoming the world's most valuable resource. As such, finance leaders face increased pressure to value data as an asset on their balance sheets and use it to drive business strategy. To capitalize on the power of data, learn how to pinpoint where you are today. what steps you can take to reach your goals and how to measure success.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
There is no doubt that enterprise cloud is a new and improved IT strategy. Cloud services have proven to improve organizational agility and reduce the burden of IT infrastructure and cost. Moving to the cloud is no longer a question of “if” but “when” and “how.” Most enterprises we interviewed are moving to cloud in phases over time and matching workloads to their perceptions of a vendor’s cloud capabilities that will best support their objectives. Many will require the ability and flexibility to support multivendor cloud and multiple deployment choices (e.g., public cloud, private cloud, and hybrid cloud).
Tags : 
cloud, enterprise, scale, infrastructure
    
Oracle
Published By: Workday Nordics     Published Date: Mar 06, 2018
The hype around cloud computing has been tremendous. It’s also proven to be justified. In fact, most organisations are already operating with some element of a cloud service as part of their IT infrastructure. While onpremise software becomes obsolete and hybrid solutions fall short, cloud applications enable new ways of delivering innovative solutions. These solutions are practical, and they are easy to use and manage. The cloud now provides the fundamental infrastructure on which innovative organisations can run their businesses.
Tags : 
    
Workday Nordics
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server powered by Intel® Xeon® Platinum processor systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Optimizely     Published Date: Apr 06, 2018
Optimizely helps companies better understand and serve their customers. Every touchpoint with a customer is an opportunity to win that customer’s heart, make them great, and make them better. By experimenting everywhere, businesses have a powerful strategy for reorienting towards their customer as the true north, striving to iterate quickly, make improvements, and deliver customer experiences that are delightful and fuel growth. Optimizely enables you to experiment everywhere—both across the organization and across every interaction you have with a customer. In a company that experiments everywhere, everyone from Marketing to Product Management, Design, Engineering, and the C-Suite can inform their decisions with experiments that engage customers for their reactions.
Tags : 
    
Optimizely
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: Genesys     Published Date: Feb 27, 2018
Modern contact centers support a variety of digital channels—email, chat, co-browsing, social, video—over multiple digital touchpoints (web or mobile devices). What they lack is the ability to link interactions in a step-by-step journey to provide a personal, contextual experience for each customer. Download this eBook. Learn how you can: • Design a successful digital customer engagement strategy • Provide agents with a 360-degree view of the customer across all digital channels and voice • Deliver omnichannel experiences that are personalized, context-based, and low-effort
Tags : 
digital customer service, contact center, digital channel, ebook
    
Genesys
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Published By: OracleSMB     Published Date: Jan 04, 2018
Growing companies need to hire and retain great employees. Survey after survey attributes keeping the right people in the right jobs with company longevity and profitability. However, with limited resources and low brand recognition, small and medium-sized businesses find it hard to compete. And they can’t afford hiring missteps or high levels of turnover. Therefore, you need act—now—to start adding value with every hire. Technology can help you recruit and retain the right way.
Tags : 
    
OracleSMB
Published By: Trustpilot     Published Date: Apr 11, 2018
In a survey of over 900 US and UK companies, Trustpilot compiled results from finance companies among the respondents to learn which initiatives they consider most important, what their 2018 priorities are, and whether or not trust plays a role in their business strategy. Trustpilot also conducted a global consumer poll throughout the month of January 2018 on Trustpilot.com to learn more about customers’ expectations when it comes to the finance industry, receiving over 15,000 responses. Those survey results provided a more detailed understanding of whether finance companies’ priorities are aligned with consumer expectations, while also getting a clearer picture of how trust and reputation should be approached. At the end of this report, in addition to the findings, recommendations are provided to finance companies based on the survey findings and analysis.
Tags : 
trustpilot, finance, consumer expectations, business strategy, brand management, online reputation, consumer loyalty
    
Trustpilot
Published By: Avi Networks     Published Date: Mar 06, 2018
Can your current ADC solution elastically scale load balancers and application servers? Does it provide real-time insights and visibility into traffic? There is a lot to consider when it comes to the future of your load balancing strategy. Download our free e-book today!
Tags : 
    
Avi Networks
Published By: LogMeIn     Published Date: Feb 27, 2018
The North Face rigorously tested several providers and quickly realized that Bold360 hit all the marks. After the initial implementation, The North Face entered into a 3-month professional services engagement to take their chat strategy to the next level. The Bold360 professional services team helped The North Face implement strategic new chat features and tactics, including adaptive canned messages, proactive chat, dual monitors and layered chat, and provided additional development support as needed. To maximize the impact of its chat strategy, The North Face also created an 11-person core chat team, with reps chosen for their skills and product knowledge. Empowered with the capabilities of Bold360, these dedicated agents can now provide truly in-depth product support.
Tags : 
north face, online, customer, products, engagement, professional
    
LogMeIn
Published By: Workday     Published Date: Feb 27, 2018
Businesses often come up with great ideas; when auditors come in six months later, they find that some tasks were done incorrectly. Auditing forward means addressing compliance and internal controls as part of the system and process design of a project or new strategy in order to identify potential holes and weaknesses where mistakes, omissions, or even fraud could happen. The Workday technology platform instantiates internal controls in business processes. These business processes are configurable without expensive IT coding and the overhead of the associated process. Therefore, considering, designing, and implementing real-time auditing integrated into the business processes allows the business to audit forward.
Tags : 
audit, enterprise, software, finance, business, operations, optimization
    
Workday
Published By: Microsoft Azure     Published Date: Apr 05, 2018
Securing data and systems is a top priority for organizations. But meeting this challenge gets more difficult every day as attacks grow more sophisticated, employees use a wider array of devices and applications, and data flows into and out of your business in more ways
Tags : 
    
Microsoft Azure
Published By: IBM APAC     Published Date: Mar 19, 2018
Did you know that more than 77.1% of AI adopters have hit limitations with their on-premise server infrastructure? AI and deep learning are extremely demanding on server infrastructure. Unfortunately, not all servers are cut out for AI tasks. Read this white paper from IDC to find out: • What should be your server strategy when developing AI capabilities • Approaches for small to medium-sized AI initiatives, larger AI initiatives, choosing On-Premise or Cloud and the use of Accelerators Download this white paper to know why server infrastructure is crucial to your AI plans.
Tags : 
    
IBM APAC
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Globoforce     Published Date: Nov 06, 2013
As human capital becomes the foremost challenge for companies worldwide, employee engagement has become an important strategy for success. In this report, more than 800 HR leaders and practitioners share their perspectives on innovations and technologies that are changing the way people are managed and measured.
Tags : 
    
Globoforce
Published By: Anaplan     Published Date: Mar 29, 2018
Finance has a mandate to become a strategic business partner. Integrated business planning offers organizations the ability to align operations and sales strategy with the company’s continuous financial performance. An increasing number of organizations have shown that even small steps toward integrated business planning have helped them deliver immediate benefits to the business, including light-touch forecasts, rapid “what-if” analyses, and more accurate budgets. Improved collaboration between departments, driving more awareness and shared understanding of potential issues, allows the business to take the prompt and incisive actions needed to keep performance on track. The question to consider is not “When are we going to do this?” but “Why don’t we start now?” because time is ticking away.
Tags : 
finance, business, planning, integration, strategy, company
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.