Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data.
Despite an increased focus on data security protection, mobile application vulnerabilities are still often overlooked by both businesses and consumers.
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
Aiming for organizational agility? Prepare to change how you scope work, structure teams, develop talent, practice leadership, and deliver and sell your products.
Our 2015 IT salaries survey reveals the average pay for IT pros in the U.S., broken down by role and region of the country, job aspirations, optimism levels, and key tech projects.
As senior IT leaders sought to adapt IT strategies to a rapidly changing, digitally connected marketplace, one thing that didn't change in 2015 was their pay.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
Microsoft added new capabilities to its Enterprise Mobility Suite that may give IT shops paying for other EMM platforms reason to make a switch.
With built-in Office and a keyboard, Microsoft's Surface tablet is geared toward the enterprise. Now, the Apple iPad Pro stands up to the latest version of Microsoft's device, the Surface Pro 4.
With some new iOS 9 features, Apple has centered its attention on the enterprise, offering better application and device management through the VPP and DEP.
Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes.
The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies.
EMC and Dell storage customers shared their thoughts and concerns on Dell's proposed $67 billion deal to acquire EMC during a series of interviews at Dell World 2015.
Oracle ZFS Storage uses mechanical and flash storage. The ZS3-2 and ZS4-4 models offer a variety of software for storage management, encryption and security.
The Hewlett Packard Enterprise StoreEasy 1000 Storage family -- formerly HP StoreEasy 1000 Storage -- has four mid-level NAS models, management tools and BitLocker Drive Encryption support.