Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
ISSA International Conference organizers explain why InfoSec professionals have had to redefine their role as cyberdefense has become a business priority.
Cloud providers have made big information security strides, but their corporate customers still have to play their part in cloud data loss prevention.
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance.
The duality of failure, IBM's bet on cognitive computing, and the difference between a data officer and an analytics officer: The Data Mill reports.
Dell-EMC deal: In the wake of the largest technology acquisition ever, CIOs ponder their digital strategies, vendor relationships and the future of IT.
IoT has joined the long and ever-growing list of acronyms IT professionals love to invoke when talking shop. The difference with this acronym is that -- despite its techie ring -- it stands for business transformation.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Microservices-based architectures can provide greater flexibility to IT organizations and developers. But how exactly do microservices work?
The EU high court's decision to strike down the Safe Harbor agreement shouldn't hurt large cloud companies or their users, but long-term questions about data privacy remain.
The DevOps model is taking off as cloud adoption grows. But what exactly are the key responsibilities of a DevOps team in the enterprise?
More and more beacons are infiltrating our daily lives, and it's becoming clearer how beacon technology will affect enterprise IT.
Microsoft's first Windows laptop, the Surface Book, takes on Apple's MacBook Pro and its two new Lumia phones may give Blackberry more trouble.
Email is here to stay, but its functionality could soon be folded into collaboration software, social media and unified communications tools.
Microsoft's October 2015 Patch Tuesday has the fewest number of bulletins of any release this year and also is the first of the year to feature no patches related to zero day exploits.
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise.
China's government has reportedly arrested a number of Chinese hackers suspected of involvement with attacks on the US, but one expert is unsure this will lead to more cooperation between nations.
When the Dell-EMC deal is complete, EMC CEO Joe Tucci will step away after 15 years on the job -- leaving Michael Dell and others to carry on his legacy.
Dell’s buyout of storage giant EMC and virtualization specialist VMware is expected to close in mid-2016, but other companies have 60 days to make a better offer.
The EMC Isilon HD400 is a midrange NAS array designed specifically for environments that require deep-archive storage and faster access times than tape systems.