Skip to main content
 

sha

Results 1 - 25 of 2437Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Sep 04, 2015
The HealthLeaders Media Physician Alignment Survey confirms there is continued deep support for clinical integration across our industry. We see some clear trends in how hospitals and health systems use clinical integration and risk sharing to work toward physician alignment and better access.
Tags : 
    
HealthLeaders Media
Published By: Spok     Published Date: May 01, 2015
Poor communication among caregivers is a leading root cause of sentinel events in hospitals. Read this eye-opening guide for four tips to improve how caregivers share information.
Tags : 
    
Spok
Published By: Truven Health Analytics     Published Date: Oct 01, 2014
The tax on high-cost health plans, which are often referred to as Cadillac plans, is expected to impact a considerable share of the plans provided by healthcare organizations for their own employees, as much as 39% by 2020. The implications are significant because the excess-benefits tax requires the employer to pay 40% on the value of the portion of the plan that exceeds thresholds set by the Patient Protection and Affordable Care Act. Employers also need to consider that the tax is measured as a direct function of plan cost, and not actuarial plan value, and that a number of factors can drive excise-tax exposure.
Tags : 
    
Truven Health Analytics
Published By: QPID Health, Inc.     Published Date: Jan 29, 2015
Partners HealthCare has implemented a program that helps surgeons and other clinicians easily apply best practice guidelines to a patient’s unique status. In this case study executives share the secret to boosting rates of appropriate use of high-cost procedures, and eliminating medical necessity reviews.
Tags : 
    
QPID Health, Inc.
Published By: Caradigm     Published Date: Feb 16, 2015
Many organizations joined the ACO program with the idea of using it as the first step in the transition to new reimbursement models. It’s a critical time for more ACOs to achieve the milestone of shared savings in order to demonstrate the ability to lower costs for an “at-risk” population. As best practices are emerging from early participants in the ACO program, ACOs have the opportunity to evolve their strategies in order to achieve more success.
Tags : 
    
Caradigm
Published By: Somnia Anesthesia     Published Date: Jun 11, 2015
Somnia’s new white paper, “Five Warning Signs of an Underperforming Anesthesia Team,” reviews hospital and ASC management challenges, identifies five warning signs of underperformance in anesthesia, and shares specific elements for high performance in anesthesia management.
Tags : 
    
Somnia Anesthesia
Published By: L.E.K. Consulting     Published Date: Apr 08, 2015
How can providers and insurers reduce costs and increase patient satisfaction? In the evolving value-based care (VBC) model, better healthcare IT is a must have. L.E.K.'s Joseph Johnson and Harsha Madannavar identify key success strategies in our latest Executive Insights.
Tags : 
    
L.E.K. Consulting
Published By: HealthLeaders Media     Published Date: Nov 07, 2014
As chief transformation officer at MemorialCare Health System in Los Angeles and Orange counties, CA, it’s Helen Macfie’s job to rethink the future of healthcare delivery. Lately, she’s been thinking a lot about healthcare reform and care redesign as the six-hospital integrated delivery system, with more than 200 care sites, focuses on growth across the Southern California region.
Tags : 
    
HealthLeaders Media
Published By: McKesson     Published Date: May 27, 2015
The shift to value-based care creates a sharp increase in healthcare organizations and networks’ need for data collection, aggregation and analysis. This white paper outlines the challenges involved with performing population-level analyses, developing cost accounting and profitability analyses across care settings, evaluating care episodes and integrating quality data. It explores the limitations of targeted software solutions to provide cross-enterprise insights. Finally, it provides advice for healthcare executives regarding how to approach gathering quality and cost-related data and how to leverage technology and analytical expertise to drive risk-based contract success.
Tags : 
    
McKesson
Published By: Cyviz APAC     Published Date: Mar 18, 2019
How organizations can navigate digital upheavals and drive disruption through innovation centers.
Tags : 
    
Cyviz APAC
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: TriNet     Published Date: Jan 17, 2013
In this report, leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
    
TriNet
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Bluecore     Published Date: Oct 23, 2018
If you’re not one of those retailers, you’re likely busy playing catch-up to them – and that’s not a position in which anyone wants to be. Since eCommerce began, a small handful of leaders have set the pace. They’ve innovated quickly and delivered incredibly valuable and convenient shopping experiences. And in doing so, they shaped consumer expectations. Take Amazon. Over a decade ago, the online giant seemingly rewrote the natural laws of retail by managing to deliver more, better, faster – all with unmatched accuracy and ease. Now, consumers expect an Amazon-like experience everywhere they shop, and anything else feels subpar.
Tags : 
email marketing, personalized email, retail marketing
    
Bluecore
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Skillsoft     Published Date: Aug 09, 2018
Compliance Training Tip: Why Should I Implement a Hearing Conservation Program in my Workplace? Excessive noise could be putting your organization at risk. Ongoing exposure to excessive noise in the workplace can lead to permanent hearing loss. It can also increase stress, reduce efficiency, interfere with concentration and cause fatigue. Excessive noise can even cause industrial accidents if employees can’t hear co-workers give them warnings or directions. Hearing loss due to excessive noise is often so gradual that employees may not realize they have a problem until it’s too late. Fortunately, there are simple steps you take to protect your employees’ hearing… Download our free paper today to learn what those steps are. You’ll also learn: • What you can do to prevent hearing loss in the workplace • The OSHA Standards for hearing conservation • How Hearing Conservation can affect the bottom line • And more
Tags : 
    
Skillsoft
Published By: Globoforce     Published Date: Nov 06, 2013
As human capital becomes the foremost challenge for companies worldwide, employee engagement has become an important strategy for success. In this report, more than 800 HR leaders and practitioners share their perspectives on innovations and technologies that are changing the way people are managed and measured.
Tags : 
    
Globoforce
Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Brent Kendrick, Regional Director APAC, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications
    
NEC
Published By: Pure Storage     Published Date: Apr 15, 2019
This year, businesses will increasingly turn to AI to power their business transformation. Machine learning and deep learning workloads are quickly becoming a mission-critical workload in the enterprise data center. As an IT leader, are you ready for the impending wave of AI applications that will demand new approaches to computing, storage and networking? Do you have the right strategy for scaling AI workload in your data center? We’ll introduce you to the IT visionaries who have made it happen. In this webinar we’ll explore how one IT leader accelerated his company’s success with an AI infrastructure strategy, sharing their best practices and insights. By watching this webinar, you'll learn: - Why it’s now critical for enterprise IT to have an AI infrastructure strategy that supports the business - Explore one IT leader’s experience developing and implementing a best-of-breed platform for scaling AI workload in the data center - Gain insights that can drive your AI infrastructur
Tags : 
    
Pure Storage
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.