Subscribe to Events Feeds

218 Results Found

Seminar on Using Statistics in Compensation By David Wudyka
8/28/2014 9:00 AM - 8/29/2014 6:00 PM
Hilton Grand Vacations Suites at the Flamingo Las Vegas, Nevada United States
Event Listing
Summary:

Overview:

Compensation professionals use "descriptive statistics" to convey the characteristics of data used in the development and management of pay programs. In this webinar, David J. Wudyka will describe a series of statistical concepts used by Compensation practitioners. The concepts to be covered include ideas such as pay structure development; "control points" in pay ranges, including minimums, midpoints and maximums; weighted and unweighted averages; means, medians and modes; weighted and unweighted averages; regression and correlation analysis; standard deviations, variance and data ranges; compa-ratios, and independent and dependent variables; and more.

All of these concepts will be explained in the context of their application in pay programs, including building a pay structure (i.e. sets of pay ranges), analyzing pay survey data, predicting

Executive base pay rates and total compensation from one or more independent variables, making associations in pay data between independent and dependent variables, and using comp ratios in merit pay programs and their budgeting.

Ways to Limit Your HIPAA Vulnerability and Liability Webinar By MentorHealth
8/28/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: Although there are many presentations, courses and services now available to help health care organizations to become HIPAA compliant, the real issue for the health care organization is to determine the most cost effective ways to understand their risks and to minimize the vulnerability to a breach and their liability when a breach does occur. This presentation focuses on understanding the responsibilities of the health care organization, the liabilities resulting from those responsibilities and the penalties that can be assessed as a result of a breach of patient protected health information.

The presentation addresses several issues relevant to both the vulnerability and the liability issues. First, the presentation describes how the health care organization can assess its HIPAA breach risk. The presentation discusses what a risk assessment is, why it is important and how to perform the risk assessment.

Based on the results of the risk assessment, the presentation takes the participants through how to mitigate these risks. This includes:

Issues that need to be addressed with the health care organization's software and hardware vendor(s)

The risks of a breach resulting from organizational members using social media, both inside the organization and at home; and,

The risks of a breach resulting from organizational members using mobile devices to access and store patient protected health information

The presentation also provides information regarding how the health care organization can use insurance to share the risk and how to keep insurance premiums to a minimum. At the conclusion of the presentation, the participant will have a checklist of items that can be used to understand and ways to limit the health care organizations HIPAA liabilities.

Why should you attend: There are so many ways a breach can occur - whether by accident, carelessness or or by intended actions. As a result, it is a common axiom that it is not if a health care organization will experience a breach, but when the health care organization will experience a breach.

The penalties for a HIPAA breach of a patient's protected health information can be severe. This includes monetary penalties as well as having to publicize your breach. We have all seen the newspaper articles and TV reports of large unauthorized disclosures of patient health information. If a disclosure includes the health information for 500 or more names, the health care organization must notify the Secretary of the Department of Health and Human Services (and this goes on the Office of Civil Rights web site for all to see) and notify local media (TV, Radio and newspapers).

Based on the Omnibus Rule, all business associates and agents of business associates have the same risk as the health care covered entities. Therefore, it is equally important for all business associates and agents of business associates to be cognizant of their vulnerabilities and liabilities.

This topic can be invaluable for an health care organization trying to understand their HIPAA vulnerability of a breach occurring and their liability when a breach does occur and looking for ways to minimize that vulnerability and liability. In discussing this topic, the presentation addresses opportunities for the health care organization to perform their risk assessments, as directed by the HIPAA regulations, how to mitigate the risks found in the assessment and some of the potential "safe harbors" that can reduce their risk.

The topic also spends considerable time reviewing the risks inherent in the traditional health care environment and provides references for the participant to address newer HIPAA breach risks resulting from the modern use of social media and the use of mobile devices.

Areas Covered in the Session:

Discuss what is a risk assessment and why it is important

Discuss how to assess the health care organization's risk and the vulnerability of a breach occurring

What is health care organization's liability when a breach occurs - including monetary penalties

The impact of the use of social media on the health care organization's HIPAA breach risk

The impact of the use of mobile devices on the health car organization's HIPAA breach risk

HIPAA's description of how to reduce the risk of a breach of electronic health information

The opportunities for acquiring HIPAA breach insurance

Who Will Benefit:

Chief Executive Officer

Chief Operating Officer

Managing Partner

Chief Financial Officer

Office Manager

Chief Risk Manager

IT Manager

Health Care Software Vendors wanting to ensure successful implementation

Jim Wener has over 40 years of experience in assisting health care organizations – both providers and payers- in identifying their automation requirements and helping these organizations select and successfully implement the automation most applicable for their needs. His systems and processes background and his experience in working with health care data has given Mr. Wener a unique perspective regarding the issues related to implementing new health care models and how they affect all of the stakeholders in the health care system.

Public Clouds Myths and Realities
8/28/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: To correctly understand the benefits and issues surrounding public clouds, we first need to go back to the definition of "cloud." Different organizations (like NIST), vendors, and consultants have produced definitions that are often too verbose or address only one key characteristic of the cloud. It is important to identify the key concepts that differentiate the cloud from prior ways to procure and deliver computing resources.

It is useful to examine the hype surrounding the concept, propagated by a number of public cloud providers. While this is often anecdotal, this discussion helps customers challenge salespeople who recite marketing points without substance. It is also quite educational to see how certain vendors have changed their story as the new model emerged.

The next thing potential adopters need to know is what the categories of issues that cause all the fears about cloud computing are. Some of these fears are exaggerated: for example, availability issues, while they create a lot of adverse publicity, are not in fact as serious as people often fear, and there are good reasons for that. On the other hand, other issues are actually often understated (e.g., the problem of data residency in applications that manipulate data associated with some form of national interest or in highly regulated industry sectors).

After considering both extremes of this ongoing debate, a customer needs to develop a balanced vire - not only of the technology, but also of the sourcing and governance issues that can make a project fail. In support of this evaluation, it helps to understand the evolution of multi-tenant computing solutions from the start of timesharing 50 years ago, to the current types of offerings. There are common principles, but the cloud does bring something genuinely new compared to the initial IBM offerings of the 1960s. It is also important to read or listen to case studies, of which there are now a good number. Some of them are public, while others are shared in conferences and consortia. Vendor-published stories should be considered suspect. Finally, it is also important to understand the full scope of services that can be procured in the cloud: it is not just CRM applications, Web sites, or disk space, but it includes many more types of communication and collaboration capabilities, and this provides an opportunity to "start small" and get familiar with the issues while starting to save some money and decrease cycle times.

Once all this is understood, an organization needs to proceed in a pragmatic manner. Key steps of this journey have been documented in particular by the Cloud Standards Customer Council, which has published them in three successive guides, including a 9-step "Practical Guide to Cloud Computing" and two guides related to Cloud Service Agreements.

Why should you attend: Since the Cloud Computing model started taking off around 2007, the vendors have been promising miraculous benefits, and the naysayers have been raising the specter of major disruptions to performance and security.

Without a neutral source of information and a balanced perspective on the advantages and risks of public clouds, CIOs and IT sourcing managers will easily make the wtong decisions. If you adopt a cloud solution that is not well-suited to your needs, under a Service Level Agreement that is biased toward the vendor, you could indeed be faced with disruptions about which you will have ver little control. On the other hand, if you do not adopt any cloud solutions out of fear, your competitors may become more agile and your customers or users will ultimately find that you cannot deploy new capabilities fast enough. You will also continue to pay upfront for a fixed amount of software or hardware that you need to amortize over several years, instead of taking advantage of the cloud’s elasticity and its ability to replace capital investments with operating expenses.

The emergence of the cloud also changes the relationship between IT and the business. If IT cannot deliver new services fast enough, the business will start procuring those services on its own in the cloud. Ultimately, this can make IT irrelevant, and will lead the business to make poor choices in terms of redundant solutions, lack of integration, uneven security, etc. The business needs to understand what’s at stake, and IT needs to use clouds wisely in order to maintain its role as a partner to the business.

Areas Covered in the Session:

Introduction

Back to Basics: Defining "Cloud"

The Hype

The Fears

The Reality

Cloud Computing Use Cases

Cloud Computing, or "Cloud Whatever"

Pragmatics

Service Level Agreements

Conclusions

Who Will Benefit:

CIO

IT Manager (reports to CIO)

CFO

Sourcing Manager

Cloud Providers

Senior IT Consultants

Public Clouds Myths and Realities
8/28/2014 10:00 AM - 11:30 AM
Online seminar Fremont, California United States
Event Listing
Summary:

Overview: To correctly understand the benefits and issues surrounding public clouds, we first need to go back to the definition of "cloud." Different organizations (like NIST), vendors, and consultants have produced definitions that are often too verbose or address only one key characteristic of the cloud. It is important to identify the key concepts that differentiate the cloud from prior ways to procure and deliver computing resources.

It is useful to examine the hype surrounding the concept, propagated by a number of public cloud providers. While this is often anecdotal, this discussion helps customers challenge salespeople who recite marketing points without substance. It is also quite educational to see how certain vendors have changed their story as the new model emerged.

The next thing potential adopters need to know is what the categories of issues that cause all the fears about cloud computing are. Some of these fears are exaggerated: for example, availability issues, while they create a lot of adverse publicity, are not in fact as serious as people often fear, and there are good reasons for that. On the other hand, other issues are actually often understated (e.g., the problem of data residency in applications that manipulate data associated with some form of national interest or in highly regulated industry sectors).

After considering both extremes of this ongoing debate, a customer needs to develop a balanced vire - not only of the technology, but also of the sourcing and governance issues that can make a project fail. In support of this evaluation, it helps to understand the evolution of multi-tenant computing solutions from the start of timesharing 50 years ago, to the current types of offerings. There are common principles, but the cloud does bring something genuinely new compared to the initial IBM offerings of the 1960s. It is also important to read or listen to case studies, of which there are now a good number. Some of them are public, while others are shared in conferences and consortia. Vendor-published stories should be considered suspect. Finally, it is also important to understand the full scope of services that can be procured in the cloud: it is not just CRM applications, Web sites, or disk space, but it includes many more types of communication and collaboration capabilities, and this provides an opportunity to "start small" and get familiar with the issues while starting to save some money and decrease cycle times.

Once all this is understood, an organization needs to proceed in a pragmatic manner. Key steps of this journey have been documented in particular by the Cloud Standards Customer Council, which has published them in three successive guides, including a 9-step "Practical Guide to Cloud Computing" and two guides related to Cloud Service Agreements.

Why should you attend: Since the Cloud Computing model started taking off around 2007, the vendors have been promising miraculous benefits, and the naysayers have been raising the specter of major disruptions to performance and security.

Without a neutral source of information and a balanced perspective on the advantages and risks of public clouds, CIOs and IT sourcing managers will easily make the wtong decisions. If you adopt a cloud solution that is not well-suited to your needs, under a Service Level Agreement that is biased toward the vendor, you could indeed be faced with disruptions about which you will have ver little control. On the other hand, if you do not adopt any cloud solutions out of fear, your competitors may become more agile and your customers or users will ultimately find that you cannot deploy new capabilities fast enough. You will also continue to pay upfront for a fixed amount of software or hardware that you need to amortize over several years, instead of taking advantage of the cloud’s elasticity and its ability to replace capital investments with operating expenses.

The emergence of the cloud also changes the relationship between IT and the business. If IT cannot deliver new services fast enough, the business will start procuring those services on its own in the cloud. Ultimately, this can make IT irrelevant, and will lead the business to make poor choices in terms of redundant solutions, lack of integration, uneven security, etc. The business needs to understand what’s at stake, and IT needs to use clouds wisely in order to maintain its role as a partner to the business.

Areas Covered in the Session:

Introduction

Back to Basics: Defining "Cloud"

The Hype

The Fears

The Reality

Cloud Computing Use Cases

Cloud Computing, or "Cloud Whatever"

Pragmatics

Service Level Agreements

Conclusions

Who Will Benefit:

CIO

IT Manager (reports to CIO)

CFO

Sourcing Manager

Cloud Providers

Senior IT Consultants

Lunch and Launch Art of The Pitch
8/28/2014 12:00 PM - 1:00 PM
Innovate New Albany New Albany, Ohio United States
Event Listing
Summary:

Join TechColumbus’ Rick Coplin and author of Pitch Your Best as he takes you through how to create an effective pitch for your business.

Perth Starters
8/28/2014 6:00 PM - 7:30 PM
Windsor Hotel, South Perth South Perth Australia
Event Listing
Summary:

We are a group of founders (developers, marketers, business people etc.) who meet weekly to support each other in our efforts to build lean startups using customer development and agile software development.

SunDown RunDown Business Pitch Event Series Canton
8/28/2014 6:00 PM - 8:00 PM
The Fox and Hound Canton, Ohio United States
Event Listing
Summary:

Northeast Ohio is full of great entrepreneurial talent.

If you have an idea and you want to make it happen, SunDown RunDown Canton is the best place to showcase your idea and grab a beer while you’re there.

Make Lehigh Valley Open Hack
8/28/2014 6:30 PM - 9:30 PM
Makerspace of Hive 4A Allentown, Pennsylvania United States
Event Listing
Summary:

Open Hack Nights provide an opportunity for folks who are interested in learning more about Make Lehigh Valley and the Hive4A MakerSpace to come on out and join in the fun! FAQ for first-time hackers.

Downtown Podcast
8/28/2014 9:00 PM - 10:00 PM
Ogden Las Vegas, Nevada United States
Event Listing
Summary:

Want to know what’s happening in Downtown Vegas and #VegasTech? Come see the Downtown Podcast team tape the weekly podcast LIVE!

SunDown RunDown Business Pitch Event Series Columbus
8/29/2014 6:00 PM - 8:00 PM
The Varsity Club Columbus, Ohio United States
Event Listing
Summary:

Central Ohio is full of great entrepreneurial talent.

If you have an idea and you want to make it happen, SunDown RunDown is the best place to showcase your idea and grab a beer while you’re there.

Events Map