Identity-Powered Healthcare

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

Jul 24, 2014
7:39 pm
Reads:
15,430
Score:
5

    Let’s face it, Healthcare has much to be gained by going digital with medical and health records and sharing of information. The Federal Government has allocated $24B in funding as of March 2014 to promote the use of Electronic Health Records (EHRs) and yet the US still falls behind other countries in the…

+ read more

Jul 21, 2014
5:12 pm
Reads:
2,383
Score:
5

A recent article in InformationWeek’s HealthCare section, Health IT’s True Mission: Baptist Health CIO Speaks, is a good example of the topics of technology driving innovation and efficiency for healthcare providers. There are so many manual processes, non-integrated systems and access to shared information that can drive a higher quality of care in most healthcare organizations. While when…

+ read more

Jun 6, 2014
12:35 pm
Reads:
3,209
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
57,767
Score:
Unrated

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,944
Score:
5

I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and…

+ read more

Oct 10, 2012
8:32 am
Reads:
3,894
Score:
Unrated

Funny things happen when you’ve had a long day of work at a security software company and then go home and read “The Cat in the Hat” to the kids at bedtime. After I’ve been chatting all day with beleaguered IT managers about their pains and challenges, Dr. Seuss’ tale of a mischievous Cat who…

+ read more

Renee Bradshaw
Aug 29, 2012
12:56 pm
Reads:
3,529
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow