Healthcare IT News Blog

August 04, 2015 | Chuck Webster, MD
To truly grasp what the industry is up against, we must understand where we're trying to go. And task interoperability is a key piece of the puzzle. I describe task... More

Recent Posts

August 04, 2015 | Carl Natale
Let's look at one disease state to understand what that term really means. More
August 03, 2015 | Sid Nair
EHR vendors don't really have a strong incentive to make their products interoperable. But putting those standards in the hands of the government also isn't... More
August 03, 2015 | Chuck Webster, MD
Interoperability just might be the thorniest problem in healthcare today. And while much of the conversation treats it as if interoperability is one issue, in reality... More
July 31, 2015 | Scott Rea
Back in the old days -- say, a whole 10 years ago -- thieves had to be physically inside a health care facility to steal patient information. How times have changed. More
July 30, 2015 | Mahmood Sher-Jan, Rick Kam
The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate... More

Featured Bloggers

COO, HIMSS Analytics

HIMSS Analytics

Medicity

Editor, ICD10Watch

Christina's Considerations

Medsphere Systems Corporation

Contributing Writer

Beth Israel Deaconess Medical Center

Chilmark Research

Director, Center for Connected Health

Healthcare Standards

CISO, FireHost

June 18, 2015 | Jon Elion, MD
After decades using ICD-9, we've learned to manage its quirks, says Jon Elion, MD, but we don't yet have that comfort level with ICD-10. He's not as... More
June 17, 2015 | Christy Erickson
With the Oct. 1, 2015, deadline fast-approaching, is your organization ready for ICD-10? Here's a quick readiness assessment to benchmark where you are -- and where... More
June 15, 2015 | Steve Reinecke
Electronic health records are altering nearly every aspect of the caregiver-patient relationship -- not to mention changing caregivers' workflows with omnipresent... More
June 11, 2015 | Irv Lichtenwald
Looking to dupe urbanite travelers, bartenders and bar owners in rural Western taverns sometimes fasten antelope horns to the head of a large jackrabbit, and mount it... More
June 10, 2015 | Scott Rea
Securing patient data starts with encryption, but equally important is the use of strong identity authentication. Authentication guarantees that the sender and recipient... More