Top

Blog

Driven TechnologyBlog (Page 35)

Tips for successful EMR implementation

Buying quality hardware, hiring external assistance, and getting buy-in from practice staff are key steps to a successful electronic medical record (EMR) system implementation, according to primary care physicians. That information comes from a recent Medical Economics survey, in which 30 doctors were asked to identify...

Ever wondered what mobile encryption is?

Security is a hot button issue, with nearly every company focusing on some form of security and many focusing on security related to the technology they use. This ensures company networks are secure from attack, and businesses often have drafted usage policies for employees to...

Do you know your essential passwords?

Superstorm Sandy, the recent storm that pummeled the Eastern US, brought with it a lot of lessons for all affected. For those in the IT industry the most important lesson was that their disaster preparedness may not be as robust as they thought. Many businesses...

Sick of spam? So are we. But what is it?

Who likes Spam? There's Spam and eggs (a classic), Spam and bacon and eggs, eggs bacon and Spam, or even Spam, Spam, Spam, Spam, baked beans, Spam, Spam and Spam. Sound like a bit too much Spam? Monty Python thought so in their 1970 comedy...

Risks of unrestricted access to Internet

Freedom is something many take for granted, especially when it comes to the Internet. We tend to think that countries that block certain sites on the Internet, like China and their 'great firewall' are infringing on basic rights. While blocking sites and access might seem...

6 things to help form effective policies

One of the more important elements of a successful business is a well defined direction and set of policies that give employees a form of direction and a guide on how they should conduct themselves. Many companies without basic policies often struggle with employees who...

Windows 8 breaks common security issues

Security issues seem to follow cycles. An exploit or security weakness is found in an operating system and all of a sudden, there's tons of hackers taking advantage of it. Then, the OS developers and security companies develop and implement a fix and things die...

Will the election impact health-care IT?

The outcome of the presidential election is not expected to change the strength of the health-care IT sector, according to a new study by Mercom Capital Group. Because health-care IT touches virtually everybody in some way, it's become a large market that piqued the interest of...

How the cloud is transforming health care

Cloud computing is still a relatively new information technology concept, but it's already beginning to be relevant in health care - because it utilizes economies of scale to provide massive computing power and storage to users who sign up for the service. Here are five...