Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture, PACS
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications, Population health management , Clinical documentation
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting, HIPAA , ACO
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
What can IT professionals learn from Bitcoin and other cipher block chaining technologies about improving the value of digital information?
Information governance expert Jeffrey Ritter discusses how companies can successfully align GRC automation with existing data governance processes.
#GRCChat participants discuss how cybersecurity legislation could hurt data privacy and what personal information protections should be included in the new rules.
How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.
Is data monetization the new gold rush? CEOs and boards of directors think so, and they are looking to CIOs to strike it rich.
Chief data officers make the case why organizations need them; watch out CIOs: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Enterprises are interested in OpenStack, but can't find enough IT pros with open source cloud expertise. Rackspace and Intel hope to change that.
As software development cycles accelerate, IT must more rapidly test cloud-based applications. The right tools and services can help pick up the pace.
The cloud computing market is brimming with opportunity for IT pros -- and especially those with open source and PaaS expertise.
Enterprise users who want to be freed from their PC but maintain that functionality can turn to the burgeoning 2-in-1 market.
Developing mobile apps can be costly. MADPs ease the burden by giving developers everything they need to build apps in one place.
Companies wrestle with the security concern of using consumer cloud storage, but there are enterprise file sync-and-share options out there that users and IT can both love.
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services.
Swiss research group modzero disclosed a vulnerability that enabled remote attacks on Xceedium's Xsuite privileged access manager.
Although software-defined storage and object storage can work in similar ways, there are significant differences between the two.
Savage IO's SavageStor is a software-agnostic brick of storage, servers and controllers that leaves storage management and data protection to open software.
X-IO Technologies adds a SAN controller to give its ISE storage blocks the management and data protection customers want in traditional arrays.