The annual Truven Health AnalyticsTM 100 Top Hospitals® identifies U.S. hospitals with the best overall performance across multiple organizational metrics, including clinical, operational, and financial. The ability of some hospitals to adapt as the industry is changing demonstrates leadership as the winners set the standards their peers seek to achieve. The study revealed that the nation’s best hospitals had a lower mortality index, considering patient severity; had fewer patient complications; followed accepted care protocols; had lower 30-day mortality and 30-day readmission rates; sent patients home sooner; provided more timely emergency care; kept expenses low, both in-hospital and through the aftercare process; and scored better on patient surveys of hospital experience
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings.
It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.*
So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
In the beginning of 2019, a National Safety Council (NSC) study revealed that for the first time in US recorded history, the odds of dying from an opioid overdose (1:96) surpassed those of dying in an auto accident (1:103).
As a result, opioid overdoses are now the number one cause of preventable injury deaths in the United States.
The growing trend of opioid-related workplace incidents is a major concern for supply chains across the world. In fact, a recent study by Massachusetts Department of Public Health shows higher opioid overdose incidents occurring in industries that have a higher chance of worker-related injury. Among these, construction and manufacturing are the two industries most heavily affected.
This whitepaper discusses tips for dealing with the opioid epidemic and gives clarity around OSHA drug testing regulations.
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Published By: Commvault
Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach.
This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses.
Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Managing risk has never been so important for businesses, nor has it been so difficult. New globalresearch commissioned by SAP has revealed that an increasingly complex business and risk environment is severely challenging companies.
Published By: ShoreTel
Published Date: Oct 26, 2012
This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution.
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape.
We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals.
The survey revealed that:
• It’s the war for talent, again. The greatest challenges for growing companies are winning the war for talent, growing productivity and improving workforce visibility.
• Fast-growth companies share common traits in the way they manage and engage their people—we call this being a People Company.
• There’s a disconnect between managers and employees in terms of what being a People Company means.
• Becoming a People Company is a journey, with many organisations some way from embracing all aspects.
• People Science is a thing: there’s an appetite to leverage people data and analytics, but there are blockers in the way.
Published By: HP Inc.
Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone.
But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Keas surveyed more than 100 Human Resource Executives across the United States via an online survey between July 31 and August 16, 2013. This survey tracked HR executive opinions on HR topics and plans and priorities for the 2014 calendar year. The survey revealed health and wellness programs are taking center stage in employee engagement and retention. With healthcare costs and obesity-related diseases on the rise and wellness incentives baked into the Affordable Care Act (ACA), this will be the first year health will play a major role in health benefits as organizations integrate preventative care programs to manage costs.
Sage, the market leader in cloud business management launched an independent study by Forrester that has revealed the significant savings made by business in three major industries after they implemented Sage Business Cloud Enterprise Management. The research found that as well as receiving significant ROI within a short amount of time, businesses found savings in labour, inventory levels, and improved productivity resulting in thousands of hours saved globally.
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Published By: Staples
Published Date: Jun 01, 2017
Watch this on-demand webinar to hear senior research director Patrick Connaughton from the Hackett Group review the latest research on supplier segmentation and stratification strategies. You’ll also get practical advice on implementing these best practices at your organization.
Aberdeen’s Content Marketing survey revealed that while 95% of marketers are using or considering using a content marketing strategy, there are some distinct differences between those using content well and those just using content. The Best-in-Class are not only creating content at volume, they are taking a much more data-driven approach to their content marketing strategy — and it’s paying off. Find out how.
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Published By: Lookout
Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT
managers have lost sleep over the thought of an employee device, loaded
with sensitive company data, falling into the wrong hands. Lookout
commissioned Forrester Consulting to conduct a national survey of IT
managers in the Fall of 2013 that uncovered substantial security concerns
related to mobile devices, especially around malware and data loss.
Ultimately, the survey revealed that IT managers do not believe existing
security solutions can adequately address the mobile security challenges
faced by businesses today.