Featured Content
-
Cybersecurity And Healthcare: A Forecast For 2017
3/16/2017
Data breaches could be costing the healthcare $6.2 billion, and nearly 90 percent of the healthcare organizations covered in The Ponemon Institute’s May 2016 study endured a data breach in the past two years. By Tom Gilheany, Product Manager, Learning@Cisco
-
A (Block)chain Reaction: Legislative Update On Blockchain-Related State Law
5/31/2018
Historically, whenever new technologies — like the Internet — begin to disrupt everyday life, the federal government may be slow to establish a regulatory scheme. The regulatory efforts surrounding blockchain technology are no different. Since Bitcoin’s first appearances in national news, most of the federal regulatory debate has revolved around definitional questions, like whether cryptocurrencies should be defined as investment property (like stocks) or as currency. Now, new use cases for blockchain technology have come up in national news stories, teaching people that blockchain technology goes far beyond Bitcoin. As this understanding grows, so do the issues in the regulatory debate.
-
3 Steps To Leveraging Analytics For Revenue Cycle Improvements
5/24/2016
Now more than ever, healthcare organizations are realizing the benefits of implementing a robust BI and data analytics program. To start, with revenue cycle optimization, analytics can increase and accelerate revenue, as well as eliminate revenue cycle inefficiencies. A strong BI program can also contribute to an organization’s quest to prepare for value-based reimbursement; however, before realizing any of these benefits, organizations must develop a plan specific to its needs and positioned to attain near- and long-term results. By Jeff Wood, vice president of product management, Navicure
-
Harnessing The Power Of IoT For Efficiency In Healthcare Systems
6/22/2017
In the age of mobile applications and constant connectivity, today’s patients expect the same level of technology and on-demand information in a healthcare environment as they have at home. By Dan McGinn, director of secure power systems, Schneider Electric
-
6 Tech Trends To Watch For At HIMSS16
2/18/2016
Healthcare professionals across the country are preparing to converge upon Las Vegas for the HIMSS Annual Conference & Exhibition, the biggest healthcare information technology gathering of the year. The conference agenda is chock full of more than 300 education sessions on topics of interest from population health to business intelligence to patient engagement to privacy and security, setting the stage to discuss major 2016 trends. By Vinil Menon, Chief Technology Officer, CitiusTech
-
Harnessing The Power Of The Browser To Improve Care
7/18/2016
As mobile technology becomes engrained into almost all facets of life and business, the rise of mobile healthcare, or mHealth, is not surprising. By Ilan Paretsky, Vice President of Marketing, Ericom Software
-
Health Informatics And The Future Of Healthcare
2/7/2017
Healthcare is constantly evolving, and so are the ways physicians are handling patient information. By Scott Rhodes, Vice Provost of Enrollment, Florida Polytechnic University
-
HIT In The Exam Room: The Value Of Clinical Decision Support
5/9/2017
As we entered the era of electronic medical records (EMRs), physicians started spending a portion of their patient exam time interacting with software. By James A. Colbert, M.D., VP medical engagement at medCPU
-
Advanced Analytics Driving Healthcare Transformation
12/28/2017
The time has come … Everyone talks about Big Data’s potential to transform healthcare. They understand it’s needed to achieve the Triple Aim: improving patient outcomes, lowering cost of care, and increasing patient engagement. Yet there are very few tangible examples of organizations realizing this potential. One reason is our industry is historically slow to adopt change, even when we know what change needs to happen.
-
Increasing Cyber Security Readiness With Adaptive Threat Management
11/11/2009
Recent news reports that a foreign entity has repeatedly hacked the White House computer network are a fresh reminder of the vulnerabilities posed by the global collection of networks and systems that make up “cyberspace.” Unfriendly nations, terrorist organizations, and criminals have been implicated in cyber espionage and attacks whose goals range from theft of intelligence, technology, and money to disruption of vital services and defense systems. By Juniper Networks