Staff

About Staff

This author has not yet filled in any details.
So far Staff has created 22 blog entries.

IBM sees blockchain as ready for government use

By |February 17th, 2018|Categories: INFORMATION TECHNOLOGY||0 Comments

IBM sees blockchain as much more than the foundation for cryptocurrencies like Bitcoin and wants the government to consider embracing it as a way of saving time, cost and risk.IBM is among a growing number of vendors offering blockchain as a service (BaaS), which allows enterprises to pilot the technology without massive capital expenditures […]

ST17-001: Securing the Internet of Things

By |February 16th, 2018|Categories: TIPS OF THE DAY||0 Comments

Original release date: November 16, 2017 | Last revised: November 17, 2017

The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with […]

Hype to Reality: How Artificial Intelligence (AI) Can Transform Health and Healthcare

By |February 16th, 2018|Categories: HEALTHCARE IT NEWS||0 Comments

Artificial intelligence (AI) – the ability of computers to learn human-like functions or tasks – has shown great promise. What was previously considered the sole domain of human cognition is already being leveraged successfully across many industries. Now, the technology sector is witnessing what appears to be important new advances in AI that are […]

Microsoft is distributing security patches through insecure HTTP links

By |February 16th, 2018|Categories: IT SECURITY||0 Comments

The Microsoft Update Catalog uses insecure HTTP links – not HTTPS links – on the download buttons, so patches you download from the Update Catalog are subject to all of the security problems that dog HTTP links, including man-in-the-middle attacks.Security researcher Stefan Kanthak, writing on Seclist’s Bugtraq mailing list, elaborates:
Even if you browse the […]

HHS plan for the opioid crisis: Track prescribing patterns with Medicaid data

By |February 16th, 2018|Categories: HEALTHCARE IT NEWS||0 Comments

As part of its FY19 budget request, the agency is looking into how to leverage PDMPs to track prescribing histories, as well as reporting suspected abuse to the DEA. …read more

Covenant Health adds telemedicine services at 4 skilled nursing facilities

By |October 9th, 2017|Categories: HEALTHCARE IT NEWS||0 Comments

TripleCare’s telemedicine-based approach allows physicians to differentiate patients who require a hospital transfer from those who can be treated in Covenant’s facilities. …read more

IDG Contributor Network: AppDirect scores ‘major milestone’ partnership with Canadian telco

By |September 8th, 2016|Categories: INFORMATION TECHNOLOGY||0 Comments

A decade or so ago I was involved in a consulting project with a large telco that wanted to “smart the dumb pipes” and add extra services to its regular phone and tolls packages.
The theory went, back then, that since regular tolls and phone line services were being disrupted by Voice over IP (VoIP) […]

Quantum computing has the cybersecurity world white-knuckled

By |September 7th, 2016|Categories: IT SECURITY||0 Comments

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today’s cybersecurity technologies useless. Earlier this year the U.S. National Institute of Standards and Technology issued a call for help on the matter, and this week the Global Risk Institute added its voice to the mix.
Because of […]

Azure Roundup: New high-performance compute instances and more

By |September 6th, 2016|Categories: INFORMATION TECHNOLOGY||0 Comments

August was a slow month for tech news, but Microsoft continued to update its Azure cloud platform with a variety of new features, including a new type of instance for high-performance computing. Here’s the breakdown of all the features you need to know about:A new instance type powered by Nvidia Tesla GPUs

Microsoft announced the […]

Sophos’ false positive ruins the weekend for some Windows users

By |September 5th, 2016|Categories: IT SECURITY||0 Comments

A bad malware signature caused Sophos antivirus products to detect a critical Windows file as malicious on Sunday, preventing some users from accessing their computers.The false positive detection flagged winlogon.exe, an important component of the Windows Login subsystem, as a Trojan program called Troj/FarFli-CT. Because the file was blocked, some users who attempted to […]