Skip to main content

News

Workforce
By Kat Jercich | 12:34 pm | November 17, 2020
At the American Medical Informatics Association virtual annual symposium this week, Dr. Anthony Fauci raised the possibility of registries to track which patients had received which vaccine doses.
By Bill Siwicki | 12:30 pm | November 17, 2020
Nurses at Florida’s Lakewood Ranch Medical Center have reduced the stress and worry of patients and their loved ones with a secure, easy-to-use messaging app called EASE.
By Kat Jercich | 10:15 am | November 17, 2020
But at the AMIA virtual symposium this week, health IT professionals said they still see the potential of app-based ecosystems.
By Tammy Lovell | 07:05 am | November 17, 2020
The draft report leaked to HSJ examines how doctors and pharmacists can be supported to review prescriptions. 
By Dean Koh | 02:00 am | November 17, 2020
Currently available for travelers in Singapore, individuals are able to pre-book their appointments for the COVID-19 PCR tests and head to any of the 36 RafflesMedical clinics in the Group’s extensive network island wide for the test.
Workforce
By Mallory Hackett | 06:19 pm | November 16, 2020
Experts say that designing technology for everyone and creating customization features for smaller populations are key in making better solutions for seniors.
By Mike Miliard | 04:46 pm | November 16, 2020
Social Determinants of Health Analytics is meant as a resource to help health systems plan for and implement community programs as part of their population health management efforts.
By Kat Jercich | 02:12 pm | November 16, 2020
Clinicians struggle with connectivity, integration and system failures, according to a new report from SOTI.
By Bill Siwicki | 12:04 pm | November 16, 2020
With telehealth, the health system was able to reduce time to caregiver from 20 minutes to just five – and also significantly reduce length of stay.
By Kat Jercich | 10:58 am | November 16, 2020
The data comes amidst new reports that cybercriminals are using industry-standard encryption methods to enact attacks that bypass detection.