Network Infrastructure
Wes Wright, chief information officer of Seattle Children's Hospital, had a couple big reasons for embracing a virtual desktop infrastructure strategy for the 323-bed tertiary care facility. "Speed and ubiquity," he says. But soon he found a bonus.
Providers have begun to make targeted use of leading-edge technologies to optimize their electronic medical records, but the vast majority don't yet have the IT capacity to make full use of advancements such as big data and the cloud.
The University of Pittsburgh Medical Center is exporting its knowledge and management services around the world, to countries like China and Lithuania expanding healthcare for emerging middle class populations.
It's official. The Louisiana-based health system has become the first Epic EHR shop to integrate its electronic health record with Apple's HealthKit, making for seamless data exchange between clinicians and their patients.
Will hospitals be forced to buy HP desktops, laptops and printers from one group and the servers that connect them from another?
With the recent news that four more participants in CMS's Pioneer ACO program are dropping out, the future of this important piece of the Patient Protection and Affordable Care Act is in doubt, now that just half of the original 32 sites remain.
Wes Wright, chief information officer at Seattle Children's Hospital, says a new analytics tool that unobtrusively monitors the performance of his HL7 transactions "gives me peace of mind."
An overarching theme from a vendor's first analytics conference is similar to something that EHR vendors have been saying for years: workflow and organizational culture are at least as important as the technology itself when it comes to healing healthcare through IT.
Now in its eighth year, the annual Health 2.0 Fall Conference has evolved from a showcase for not-ready-for-prime-time apps that wouldn't exist a year later to a self-congratulatory Silicon Valley pep rally to a more mature event that seems to be addressing real-world healthcare problems.
"Just by having an app on your device, (a cybercriminal) can determine your call history, take your contact list info, if they choose to." That's how vulnerable smartphones, tablets and their mobile ilk actually are, Jim Routh said, and it's not just the devices that chief information security officers like him have to worry about.