With all the recent talk about data and privacy intrusion, I thought it might be worthwhile to consider areas that are not related to personal information but where big data can yield big results. CIO recently ran an in-depth study on weather predictability models that utilize big data processing.[1] The ability to collect and analyze […]
Service and Speed in the Healthcare IT Cloud

“Imagine the day when H1N1 detection is automated because it’s passively discovered in the cloud,” says John D. Halamka, MD and CIO at Beth Israel Deaconess Medical Center (BIDMC). A respected leader in the healthcare technology, Halamka sees great potential for the cloud to play a vital role in improving healthcare delivery through shared resources […]
Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]
BYOD and Containerization

Some organizations are turning to containerization as way of managing personal wireless devices that interact with company networks. When the University Hospitals Health System in Shaker Heights, Ohio introduced BYOD, they needed a robust MDM solution. Ryan Terry, division CIO and chief security officer, saw problems with many traditional MDM options because he felt that […]
Integrating Analytics in Healthcare

How can healthcare data analysis evolve from crawling to walking (with hopes of running some day)? Dan Reber guest blogged over at The Healthcare IT Guy recently with some helpful suggestions centered on three ways “steps” toward walking. These steps involve rethinking the types of reports generated, the team dedicated to analysis, and the quality […]
Importance of Changing Passwords

Weak Passwords If a user has a weak password that is based on a simple pattern, then a password-cracking device may parse through a list of words and word variations quickly guessing that password. Some examples of weak passwords include (list below is adapted from Wikipedia): Default passwords like “password.” Words found in the dictionary. […]
Data Breaches: 20 Critical Security Controls

The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]
Challenges for the Future of Healthcare Networks

Medical facilities face the challenge of upgrading their healthcare networks and providing comprehensive support for the growing demands of digitized information according to a recent report by HIMSS Analytics. In a recent study, “Healthcare Provider Network Solutions, Barriers and Challenges” HIMSS reports that “As health care organizations implement information technology solutions including components of the […]
Tuning IT to Help Drive Business Strategy

As IT shifts from technology maintenance to business strategy, it becomes more valuable throughout the organization. How can an IT team or director facilitate shifting to more strategic actions? Nigel Fenwick at Forrestor offers four steps that can help IT leaders manage the shifting demands on time, projects, and company goals. The heart of Fenwick’s […]
Enterprise Architecture for SMBs

Though the name implies large corporations, the disciplined process of enterprise architecture benefits businesses of all sizes. Strategic planning and implementation needs the comprehensive picture of enterprise architecture combined with the agility of adaptive technologies. IT leaders can help manage the opposing pressure of architecture stability and the drive for an agile organization. In his […]
