Skip to main content

Cloud Computing

By Lynne Minion | 09:47 pm | March 06, 2022
The hospital has achieved a score of 308/400.
By Nathan Eddy | 04:52 pm | March 04, 2022
At HIMSS22, an infosec leader from Visiting Nurse Services of New York will describe the special risk mitigation efforts it has deployed as it undergoes organizational change and builds a secure IT system for the future.
By Nathan Eddy | 04:43 pm | March 03, 2022
During HIMSS22 Digital, an economist will explain how, with XaaS migrations ever more common in healthcare, many health system leaders still need a better grasp of pricing, ROI and how their multi-cloud strategy will enable cost efficiencies.
By HIMSS TV | 07:00 am | February 28, 2022
Healthcare can be revolutionized by democratizing care by harnessing expertise and technology, using a diverse mindset, according Dr. Nadine Hachach-Haram, founder of Proximie.
By Adam Ang | 12:50 am | February 22, 2022
A report published yesterday by AWS Institute and ACCESS Health identifies the enablers and barriers to cloud adoption in the region.
SPONSORED
By Mobile Heartbeat | 11:40 am | February 21, 2022
Join Mobile Heartbeat VP of Product Management Bill Reid as he provides insights into the development of clinical collaboration technology.
SPONSORED
By Microsoft | Microsoft | 09:52 am | February 16, 2022
In an ever-changing landscape of cyberthreats, here are some ways CISOs can bring teams together and establish a culture of security.
By Bill Siwicki | 11:28 am | February 11, 2022
The vendor will also be discussing its healthcare information search technology, EHR documentation, practice management, patient engagement and population health.
By Mike Miliard | 11:51 am | February 08, 2022
The go-forward prospects could be "very interesting overseas," and voice is a "huge frontier," says IDC Research Director Mutaz Shegewi. But ensuring the complex merger comes off cleanly is essential.
By Mike Miliard | 10:41 am | February 03, 2022
As risk levels increase, health systems have "significant challenges to overcome," according to the 13th annual report – including suboptimal security spending, vulnerable legacy tech and weak-link human factors.