Healthcare Informatics 100 - 2017 Submission Form

Feb. 12, 2018

The Healthcare Informatics 100 ranks the top vendors with the highest revenues derived from healthcare IT (HIT) products and services earned in the U.S. This year we are also asking each vendor to estimate the percentage of revenue earned in all of their product segments. View the 2016 list.

As a reminder, HIT revenue:

  • Does include income derived from the sale of computer hardware, software and related services to healthcare providers-- including hospitals, ambulatory clinics, and physician practices--as well as in the payer, health information management, employer, and vendor-to-vendor market.
     
  • Does NOT include non-computer-based equipment nor health and wellness content publishers, including those for patient and professional education, whether books or electronic media.
With questions, contact Healthcare Informatics Managing Editor Rajiv Leventhal: [email protected]
Submission deadline: April 21, 2017
The submission process is now closed.Stay tuned for the release of the Healthcare Informatics 100 starting May 22nd.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...