Skip to main content
 

safe

Results 1 - 25 of 998Sort Results By: Published Date | Title | Company Name
Published By: Huron Healthcare     Published Date: May 17, 2016
Physicians and advanced practice providers are crucial to every performance, quality, safety, care utilization and patient satisfaction goals. These factors significantly affect an organization's financial viability, which is why providers' compensation must be aligned with them.
Tags : 
    
Huron Healthcare
Published By: Boston Software Systems, Inc.     Published Date: May 25, 2016
All phases of an EHR migration require planning and an understanding of what data is needed to provide a complete EHR that supports clinical adoption, patient care, safety and satisfaction. This white paper examines the strategic considerations and challenges encountered when migrating data to a new system.
Tags : 
    
Boston Software Systems, Inc.
Published By: Health Catalyst     Published Date: May 19, 2014
All healthcare delivery organizations will need to transform themselves in order to meet the quality, safety and cost challenges confronting healthcare. In this free ebook, Healthcare: a Better Way, you'll discover a strategic framework and a practical roadmap for developing a healthcare analytics approach for sustaining quality improvement. Download to learn more about navigating the challenges confronting healthcare today.
Tags : 
    
Health Catalyst
Published By: IntelliCentrics, Inc.     Published Date: Jan 08, 2015
Discover how the Saint Joseph Mercy Health System used the ReptraxTM vendor credentialing service to improve the compliance of commercial visitors, resulting in a safer and more secure environment for patients.
Tags : 
    
IntelliCentrics, Inc.
Published By: Truven Health Analytics     Published Date: Aug 01, 2015
The Truven Health 15 Top Health Systems study annually identifies those health system leadership teams that have most effectively aligned outstanding performance across their organizations, and achieved more reliable outcomes in every member hospital. Truven Health Analytics measures U.S. health systems based on a balanced scorecard across a range of performance factors: care quality, patient safety, use of evidence-based medicine, operational efficiency, and customer perception of care.
Tags : 
    
Truven Health Analytics
Published By: Truven Health Analytics     Published Date: Nov 17, 2015
The Agency for Healthcare Research and Quality’s Patient Safety Indicators (PSI) are a set of metrics that provide information on the potential for inpatient hospital complications and adverse events following surgeries, procedures, and childbirth. PSIs can be used to help hospitals identify potential adverse events that might need further evaluation, provide the opportunity to assess the incidence of adverse events and complications, and understand patient safety events on a broader level.
Tags : 
    
Truven Health Analytics
Published By: Patient Safety and Quality Healthcare     Published Date: Oct 14, 2015
While we must continue to emphasize to all members of the care team that they are the front line to preventing errors, taking a systems or holistic approach will greatly assist in making adverse events rarer. Aiding in the implementation of the latter are many companies that provide incident reporting, analysis, and review systems.
Tags : 
    
Patient Safety and Quality Healthcare
Published By: Capella University     Published Date: Oct 23, 2015
Registered nurses, with targeted training, are the secret weapon in the race for comprehensive care coordination. Accountable care organizations. Patient-centered medical homes. Value-based reimbursements. Bundled payments. Healthcare is experiencing a revolution brought on by the Patient Protection and Affordable Care Act that aims to put patients squarely in the middle of all their clini­cal and financial decisions. Payers, including government agencies and insurers, are tying the quality and safety of patient care to reimbursements, making patient-centered care a necessity in all settings.
Tags : 
    
Capella University
Published By: Privacy Analytics     Published Date: Jul 01, 2015
Learn the right way to responsibly safeguard PHI - while unlocking its potential for secondary purposes - in this Privacy Analytics white paper.
Tags : 
    
Privacy Analytics
Published By: IntelliCentrics, Inc.     Published Date: Oct 24, 2014
Industry leaders are striving to create a culture of safety within their organizations that extends to all employees, according to an Intelligence Buzz Survey conducted recently by HealthLeaders Media.
Tags : 
    
IntelliCentrics, Inc.
Published By: IntelliCentrics, Inc.     Published Date: Nov 10, 2014
What does it take to improve population safety? The safest hospitals maintain the vigilant attitude needed to prevent hazards at their facilities. And it starts at the top.
Tags : 
    
IntelliCentrics, Inc.
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: Bowen EHS, Inc.     Published Date: Oct 24, 2012
Bowen EHS, Inc. is here to help. We provide personal, effective, and guaranteed professional development for health and safety professionals. Learn more about how Bowen can help with this free information.
Tags : 
    
Bowen EHS, Inc.
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Published By: Blackline GPS     Published Date: Mar 05, 2013
Are you taking the proper precautions in identifying hazards for lone workers and reducing their risk for injury? If not, your workers could suffer delays in emergency response or medical assistance. Stay in compliance and help keep your employees safe with this Free Best Practices Report.
Tags : 
safety, lone workers, remote workers, compliance, best practices, white paper, blackline gps
    
Blackline GPS
Published By: Creative Safety Supply     Published Date: Jul 30, 2013
Why 5S? Because it's a system many companies simply can't afford not to execute in their production process. The bottom line benefits are a given, but the improved well being of the company and employees is what makes 5S so valuable to your organization.
Tags : 
    
Creative Safety Supply
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.