How Medical Computers can Help Combat the Opioid Crisis
December 7, 2018
Prescription opioids have been in the news quite a bit lately. Congress just recently passed sweeping legislation, commonly known as the SUPPORT bill, to help combat the opioid epidemic that has been on the rise the past several years. According to studies done by the National Institute on Drug…
3 Ways to Extend the Life of Legacy Medical Devices
August 21, 2018
Legacy technology is defined as technology which is no longer produced (or in many cases even supported), but which still functions and can be used. The medical industry is filled with legacy technology, and while it eventually becomes necessary to sundown a given piece of medical tech – retiring…
Understanding the Move to Mobile and HIPAA
March 20, 2018
Five years after the Internet went live to an unsuspecting public - one that had no idea how much it would need cat videos, online shopping and binge-watching - the Health Insurance Portability and Accountability Act (HIPAA) was born in 1996. Fast forward more than 20 years and we’ve seen the…
Healthcare IT and the Impact of the Blockchain Ledger
February 20, 2018
Cryptocurrencies have been trending in the news lately because of their volatile market price, security, and popularity. Investors and money moguls alike have dumped "real" money into the cryptocurrency market, turning fiction into fortune with an intangible concept of data that holds wealth in…
EHR and it’s Evolution into CHR: A Critical Look at Cutting-Edge Technology in Healthcare
January 11, 2018
Epic CEO, Judy Faulker, recently expressed her view how Electronic Health Records are evolving into Comprehensive Health Records—a term that evaluates more than just a specific window of sampling an individual's health from doctor visits. CHR is a term that may be invented as the new EHR,…
How Two-Factor Authentication is a Small-Scale Standard for Protecting Information
October 16, 2017
This year is no stranger to cyber-security attacks. One need only to refer to the Equifax data leak to recall security mishaps or the ransomware culprit "WannaCry" that holds protected information "ransom" unless victims pay to have the compromised files released. These and other attacks hit…
How to Avoid Data Corruption in Hospitals: Prevention Starts with Awareness
October 5, 2017
Technology in any industry is always subject to Murphy's Law; if a problem can arise, it will. That's the lay of the land in tech, and there's no avoiding it. However, awareness of data corruption in hospitals and being prepared with the right hardware helps any facility combat whatever…
What The FDA’s Postmarket Management of Cybersecurity in Medical Devices Means for Manufacturers of Medical Devices
July 13, 2017
The FDA‘s guidance on “Postmarket Management of Cybersecurity in Medical Devices”[PDF] is a complementary document for the 2014’s “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices” [PDF]. The 30 pages of the guidance contain detailed recommendations, and the…
Can Your Medical Computers Run Military Genesis EHR?
June 23, 2017
MHS Genesis EHR is now a reality. After four years of planning, months of tests and delays, and a $4.3-billion contract, Department of Defense’s first electronic health records implementation is live at Fairchild Air Force Base in Washington. Military Healthcare System (MHS) Genesis is based on…
Data At Risk – BYOD vs Medical Tablets in Healthcare
April 28, 2017
You would be hard-pressed to find a healthcare worker who does not use a smartphone or tablet for work. Be it for taking notes during a phone conversation, searching for references, using medical apps, tapping out a quick email on the go, video conferencing with a patient, or signing medical image…
Sign Up
Join our 35,000+ subscriber newsletter and discover the latest in the healthcare, industrial, and enterprise technology communities.