Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data.
Despite an increased focus on data security protection, mobile application vulnerabilities are still often overlooked by both businesses and consumers.
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
Harvey Koeppel understands how hard it deliver ITSM support for a digital business world. Here are seven ways to ensure you can follow the new ITSM roadmap.
Traditional ITSM support doesn't cut it in a digitally enabled and digitally disrupted marketplace. In part one, Harvey Koeppel describes the problem. Go to part two for the remedy.
Audio equipment maker Bose's CIO plus members of the development team offer up five tips for making the move from the Waterfall development methodology to Agile.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
Microsoft added new capabilities to its Enterprise Mobility Suite that may give IT shops paying for other EMM platforms reason to make a switch.
With built-in Office and a keyboard, Microsoft's Surface tablet is geared toward the enterprise. Now, the Apple iPad Pro stands up to the latest version of Microsoft's device, the Surface Pro 4.
With some new iOS 9 features, Apple has centered its attention on the enterprise, offering better application and device management through the VPP and DEP.
Samy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept.
The latest version of Google's mobile operating system addresses some key enterprise security concerns. Expert Michael Cobb explains what's new in Android M.
The NIST has changed its recommendations on random number generation for cryptographic keys. Expert Michael Cobb outlines the changes and explains why they were made.
EMC and Dell storage customers shared their thoughts and concerns on Dell's proposed $67 billion deal to acquire EMC during a series of interviews at Dell World 2015.
Oracle ZFS Storage uses mechanical and flash storage. The ZS3-2 and ZS4-4 models offer a variety of software for storage management, encryption and security.
The Hewlett Packard Enterprise StoreEasy 1000 Storage family -- formerly HP StoreEasy 1000 Storage -- has four mid-level NAS models, management tools and BitLocker Drive Encryption support.