Network Infrastructure
NantHealth, University of Utah partner on genome work to advance precision medicine for common dise…
The organizations kick off a project to recruit 1,000 people for whole genome sequencing using the NantHealth platform and the university's population health database.
Mayo Clinic, Thomas Jefferson transform telehealth and virtual care to redesign the patient experie…
HCA and OhioHealth are also among the first movers overhauling initiatives from technology-led to clinically-focused programs and already reaping early results.
The first half of 2016 has seen more healthcare organization M&A activity than the same timeframe in 2015 as providers are figuring out how to navigate rapid industry change and emerging payment models, Kaufman Hall said.
The Office of the Inspector General posted research from 2014 so there’s reason to believe the proliferation of cyberattacks and malware could create even more downtime. OIG recommended that hospitals institute and continuously update contingency plans.
Specific hospital ratings will be posted on the CMS Hospital Compare website soon.
William Yasnoff, MD, has developed a personal grid format that can prevent hackers from accessing an entire database full of patient records. Hospitals or IT vendors can use the tactic – for free – to force cybercriminals to decrypt one record at a time.
Cigna launches CareAllies IT and analytics services firm to help hospitals transition to value-base…
The insurer said its new subsidiary will work with health systems to create necessary core capabilities for alternative payment models or to hone those already in place for more effective physician alignment and clinical integration.
Cerner President Zane Burke said that Hurst, currently a senior vice president at Florida Hospital, brings both vision and operational expertise to the software vendor.
Health systems in Arizona, Colorado, Nevada and Texas are establishing small facilities with robust outpatient services to target specific regions.
Ponemon: 79 percent of security professionals lack consistent tools to identify and mitigate cybert…
The firm's new report, Security Beyond the Traditional Perimeter, found an acute need for both expertise and technology for safeguarding IT networks and protected health information.