Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
Information security professionals can continue to expect more responsibilities as online data protection evolves into a top business priority.
There are many nebulous enterprise GRC and security terms that need to be scrapped. In this #GRCChat recap, SearchCompliance followers share the lingo they can't wait to jettison this year.
This could be a big year for GRC technologies. #GRCChat-ters predict which tools and processes will continue their upward trend in 2015 and which will wane.
Learn about one approach to mobile app development that cuts the amount of resources that go into expensive software development and testing.
Application consolidation is not for the faint of heart. Among other hurdles are the users who threaten mutiny. Niel Nickolaisen offers advice on getting the deed done.
Application consolidation is never an end unto itself. It's the business benefits that matter. SearchCIO columnist Harvey Koeppel explains.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
U.S. federal agencies have been slow to adopt cloud due to security concerns, budget constraints and other factors. But that might change soon.
Google expanded its storage offerings this month with the general availability of local SSD -- a feature pegged for high-demand apps and supplementing RAM.
Google customers looking to do more around high-performance workloads got a boost with the expansion of the cloud vendor's big data ecosystem.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
With a number of new network security certifications available, knowing which one will best help your career can be confusing. Expert Kevin Beaver discusses the options.
A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.
Find out the six finalists we think offer the best storage systems of 2014, while still using ‘old-fashioned’ spinning disk.
The finalists in the storage management tools category offer analytics, monitoring and automation for physical and virtual environments.
The Law Offices of Joe Bornstein filled performance, data classification and data protection checkboxes with startup DataGravity's Discovery Series array.