Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
ISSA International Chair Stefano Zanero discusses how expanding threats force security pros to take a more proactive approach to data protection.
The increased use of consumer-centric devices in the workplace forces IT governance teams to re-examine new technology deployment strategies.
Even if your company is PCI DSS-compliant, it could still fall prey to hackers seeking to exploit customer info. Discuss how to keep data safe in this month's #GRCchat.
IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.
Is your enterprise mobile app development strategy download-worthy? Discuss mobile app dev in our SearchCIO tweet chat Wednesday, Oct. 29, at 3 p.m. EDT.
Break out the champagne -- 2014 was a good year for IT executive pay, according to the latest TechTarget IT salary survey. Those on the receiving end say they had it coming.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
IBM joins forces with Microsoft to support the other’s cloud platforms with their respective enterprise apps. Whether the software gains can cover IBM’s hardware losses remains to be seen.
DIY is good for remodeling a house, but it might not be right for your enterprise. Answering five questions can prevent your cloud from a DIY disaster.
VMware will offer a SaaS version of its vRealize management suite as the company looks to bolster its hybrid cloud services.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies.
The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.
Brocade adds Fibre Channel SAN extension switch and denser 16 Gbps card for its backbone director switch with an eye on moving data across distances.
IBM bundles Elastic Storage -- based on GPFS and Watson -- on its Power8 server and supports System z mainframes.
Red Hat's new Storage Server 3 software update adds support for snapshots and hot-button capabilities such as petabyte-scale capacity, SSDs and Hadoop.