Blog

By Liz Hyde 11:57 am July 14, 2022
Oklahoma Cancer Specialists and Research Institute offers a case study in selecting and implementing information technology for the Radiation Oncology Alternative Payment Model.
By Paddy Padmanabhan 12:36 pm July 11, 2022
Smart health systems are realizing that they must think about their sustainable growth strategies in terms of end-to-end user experience.
By Chirag Shah 10:26 am July 05, 2022
For artificial intelligence to demonstrate true sentience, it would have to go beyond using natural language, and show thinking, perception and feeling.
By Carol Robinson 08:00 am June 28, 2022
With the door now opened for medical data to be weaponized, HIPAA protections are insufficient for current times.
By David Chou 01:02 pm June 17, 2022
Health IT leaders and federal officials have spent years attempting to solve the challenges Larry Ellison says his company can fix. Many experts are skeptical. But if Oracle can make it happen, it would be a major achievement for healthcare.
By Paddy Padmanabhan 01:03 pm May 20, 2022
As a high-flying startup ecosystem comes back down to earth, health systems with the financial resources will be able to double down on their digital transformation efforts.
By Kevin Vigilante 10:48 am May 09, 2022
Too often, people think narrowly about integration, viewing it only in terms of making sure one system can talk to another. It must be far more than that.
By Paul J. Williams 03:27 pm May 03, 2022
While we can't afford to have redundancy in every situation due to budgets and application architectures, we can partner to understand the core technology needs and design to minimize downtime for business and clinical units.
By Rachel McArthur 06:44 am April 19, 2022
While it feels like it was only yesterday that Expo 2020 Dubai opened its doors, the first World Expo in the MEASA region concluded last month. Dubai-based Rachel McArthur asks whether we will follow through on the lessons learned in healthcare from the event.
By Seth Fogie 02:43 pm April 15, 2022
When employees say yes to unsolicited push notifications, they effectively allow a malicious actor to bypass the controls offered by two-factor authentication – and open a new vulnerability for phishing attacks, or "phushing."