Skip to main content
 

resource

Results 1 - 25 of 2390Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Sep 11, 2015
As healthcare organizations ramp up the battle for specialized workers, human resources leaders are developing a new rulebook for hiring and engaging top-of-the-line talent.
Tags : 
    
HealthLeaders Media
Published By: GHX     Published Date: Jun 24, 2016
Healthcare organizations are allocating significant dollars, time and resources to the implementation of electronic health records (EHRs). While several studies have estimated the cost to purchase and install an EHR to be anywhere between $15,000 to $70,000 per provider1, real-world implementations have soared into the billions.
Tags : 
    
GHX
Published By: Kronos, Inc.     Published Date: Mar 10, 2016
As the healthcare industry shifts focus from volume to value, standardization is needed to accurately benchmark labor resource utilization. This is the premise of a survey conducted by HealthLeaders Media and sponsored by Kronos. What constitutes direct patient care? Hands-on patient assessment, administering medications, and performing procedures clearly top the list. But can other activities be considered direct care too—even those not conducted in a patient’s presence? Download the free report to get statistics and analysis from the survey questions below and much more - Which of the following actions are considered direct patient care in your organization? - Which of the following actions are considered indirect patient care in your organization? - Which of the following actions are considered neither direct nor indirect care but are categorized separately as non-patient care in your organization?
Tags : 
    
Kronos, Inc.
Published By: Greenway Health     Published Date: Oct 15, 2014
We know that primary care is challenging today, but these challenges don’t have to derail your practice’s success. This resource from Greenway takes the top three challenges in primary care and explains how specialty-specific tools can help you meet them by achieving better clinical outcomes, improving population health, lowering costs and increasing practice profitability, while still providing compassionate care to patients.
Tags : 
    
Greenway Health
Published By: McKesson     Published Date: Apr 30, 2015
Building a data-driven organization takes more than technology. And, healthcare leaders can all agree that issues facing today’s industry are daunting; determining how to react in a way that matches your organization’s strengths and vulnerabilities may be even more challenging. With the right resources in place, you can take pragmatic steps to reduce data silos and deliver efficient, coordinated care across all your settings.
Tags : 
    
McKesson
Published By: TriNet     Published Date: Jan 17, 2013
In this in depth report, readers will learn about the factors driving companies toward a human resources outsourcing model, along with the risks and advantages of outsourcing human resources functions and processes, and the approaches available.
Tags : 
    
TriNet
Published By: TriNet     Published Date: Mar 13, 2013
Establishing a startup’s business infrastructure early — that is, establishing support in the areas of legal, accounting, tax, insurance, and human resources (HR) — provides a number of critical benefits for any entrepreneur to consider. This paper discusses suggestions for management teams that will facilitate establishment of an appropriate infrastructure.
Tags : 
    
TriNet
Published By: TriNet     Published Date: Apr 08, 2013
Explore the financial benefits of contracting with a PEO based on industry best practices.
Tags : 
    
TriNet
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC & Intel
Published By: Aflac     Published Date: Mar 15, 2013
While several provisions of the new Affordable Care Act (ACA) have already gone into effect, there are several key dates business owners need to be aware of in the coming months and years. We’ve compiled a list, as well as several useful resources.
Tags : 
    
Aflac
Published By: Workday APAC     Published Date: Dec 18, 2018
"Read the whitepaper from Human Resource Executive® to learn how data-driven technology can help you: Save time by cutting down on paper-pushing tasks Renew focus on important HR strategies Use the same HR systems as Fortune 500 companies without breaking the bank"
Tags : 
    
Workday APAC
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Over the years, IBM Resilient customers have increased their IR sophistication at various levels across a spectrum of maturity. Maturity levels are often necessitated by industry, available resources, or experience, but most IBM Resilient customers continually look to evolve their IR function into a more advanced phase.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119
Published By: Forcepoint     Published Date: Jan 03, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
    
Forcepoint
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: BMC ASEAN     Published Date: Dec 18, 2018
DevOps is fast becoming a core competency required to gain competitive advantage. At its most basic level, DevOps is a team approach to drive agile modern application development and operations to deliver high quality critical digital business services. Cloud services are fundamentally changing the way applications are developed. The near ubiquitous, lowfriction access to cloud computing for developers, who can literally access powerful computing resources at the touch of a keystroke or swipe of a credit card, has fundamentally altered the software development lifecycle (SDLC).
Tags : 
    
BMC ASEAN
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson
Published By: Infosys     Published Date: Dec 03, 2018
Data is a truly inexhaustible resource for an organization. It creates endless possibilities to make data do more. As a technology partner of hundreds of organizations around the world, Infosys helps clients navigate the journey from their current state to the next. Facilitating clients’ transition into data-native enterprises is a crucial part. To understand how companies are using data analytics today and their expectations in a world of endless possibilities with data, we recently commissioned an independent survey of 1,062 senior executives from organizations with annual revenues exceeding US$ 1 billion, in the United States, Europe, Australia, and New Zealand. The respondents were from business and technology roles, who were decision makers, program managers and external consultants; represented 12 industries, grouped into seven industry clusters, such as, consumer goods, retail and logistics, energy and utilities, financial services and insurance, healthcare and life sciences, h
Tags : 
    
Infosys
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.