Blog

June 23, 2017

8 reasons why you should strengthen your iOS passcode today

By |June 23rd, 2017

Every enterprise IT manager knows the ghastly truth: the biggest security weaknesses in any system are the humans using it. So, if you are one of the nearly one-in-ten iOS users (or even the one-in-three Android users) who don’t use a passcode, if you happen to be one of the many who use the […]

Care coordination dashboards to boost Rhode Island population health program

By |June 23rd, 2017

Rhode Island Quality Institute and Integra Community Care Network harness data to prevent emergency department readmissions and manage chronic conditions. …read more

September 8, 2016

IDG Contributor Network: AppDirect scores ‘major milestone’ partnership with Canadian telco

By |September 8th, 2016

A decade or so ago I was involved in a consulting project with a large telco that wanted to “smart the dumb pipes” and add extra services to its regular phone and tolls packages.
The theory went, back then, that since regular tolls and phone line services were being disrupted by Voice over IP (VoIP) […]

Quantum computing has the cybersecurity world white-knuckled

By |September 7th, 2016

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today’s cybersecurity technologies useless. Earlier this year the U.S. National Institute of Standards and Technology issued a call for help on the matter, and this week the Global Risk Institute added its voice to the mix.
Because of […]

Azure Roundup: New high-performance compute instances and more

By |September 6th, 2016

August was a slow month for tech news, but Microsoft continued to update its Azure cloud platform with a variety of new features, including a new type of instance for high-performance computing. Here’s the breakdown of all the features you need to know about:A new instance type powered by Nvidia Tesla GPUs

Microsoft announced the […]

Sophos’ false positive ruins the weekend for some Windows users

By |September 5th, 2016

A bad malware signature caused Sophos antivirus products to detect a critical Windows file as malicious on Sunday, preventing some users from accessing their computers.The false positive detection flagged winlogon.exe, an important component of the Windows Login subsystem, as a Trojan program called Troj/FarFli-CT. Because the file was blocked, some users who attempted to […]

March 23, 2016

NIH and ONC Launch the Sync for Science (S4S) Pilot: Enabling Individual Health Data Access and Donation

By |March 23rd, 2016

S4S pilots are coming! On February 25, 2016, the National Institutes of Health (NIH), in collaboration with the Office of the National Coordinator for Health IT (ONC), announced the launch of Sync for Science (S4S), a pilot to allow individuals to access their health data and send it to researchers in support […]

Google’s awful Inbox By Gmail gets slightly less awful, with this feature

By |March 16th, 2016

Google’s Inbox by Gmail gets the Smart Reply feature on the Web version, finally. But that’s not enough to get your humble blogwatcher to want to use this badly-thought-out excuse for a science experiment.Hopefully, Inbox will be on the next list of failed projects that Google decides to sunset. In IT Blogwatch, bloggers keep […]

Mobile apps emerging as essential population health tools

By |March 15th, 2016

While mobile apps are new enough on the care delivery scene that many providers have only begun dabbling, consumers are sending a strong message that forward-thinking hospital executives can translate into an opportunity for improving population health management programs. …read more

February 25, 2016

The Real HIPAA: Quality Assessment/Quality Improvement and Population-Based Activities Examples

By |February 25th, 2016

Welcome to the fourth and final blog post in our series on how HIPAA supports interoperability. In the previous installments, we provided practical examples and illustrations that show how Health Care Operations Permitted Uses and Disclosures apply to covered entities. In this post, we pick up where we left off and provide examples […]