Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
The MIT Sloan School of Management has launched a consortium that touts interdisciplinary research and cooperation as keys to improving cybersecurity.
In this tip, learn digital information management strategies to take advantage of the growing data as currency movement.
Aflac CISO Tim Callahan discusses the extensive planning required for the insurance giant to successfully roll out GRC automation processes.
"Crossing the Chasm" author Geoffrey Moore has developed a framework on how to talk digital investments with the business: The Data Mill reports.
The Apple Watch offers nuggets of data that could drive employee productivity. We asked our readers to weigh in on the potential usefulness of the Apple Watch for business.
The platform business model develops and derives value from the ecosystem of users it connects. CIOs need to be in on it.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Many organizations move to the cloud with dollar signs in their eyes. However, cloud cost savings aren't guaranteed for every enterprise app.
The cloud market continues to evolve, with many moves and developments. And as 2015 hits the halfway mark, here are five tips to brace for the future.
As cloud computing evolves, users won't just move their apps to the cloud -- they'll design them to take advantage of cloud's scale and resiliency.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.
Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done.
Red Hat's roadmap for Ceph and Gluster products includes a unified management console, support for containers and protocol/interface expansion.
Condusiv adds an analytical engine to its V-locity software that boosts I/O performance in Microsoft environments.
DataDirect Networks announces plans for a hyper-converged system that can scale to petabytes, along with capacity improvements for its WOS platform.