04:07 pm March 01, 2016
While big numbers of attendees headed to exhibitor booths and special areas like the Intelligent Health Pavilion, hundreds also filled education sessions. See some of the top scenes from Day Two.
03:37 am March 01, 2016
Elvis makes an appearance at the CIO Forum, Todd Dunn speaks at RCSS, and Empowering Women in HIT holds first event.
09:41 am February 18, 2016
HIMSS Annual Conference has changed through the years but the one constant has been large crowds, cutting-edge technology and innovation. Browse the slideshow for some pictures of HIMSS of yesteryears.
07:00 pm January 31, 2016
Keep up to date with the changing roles and faces in the world of healthcare IT with this regularly updated gallery.
07:00 pm January 27, 2016
As the the health IT market consolidates and evolves, keep up with industry movers and shakers with this regularly-updated list.
10:15 am December 29, 2015
From accountable care to precision medicine, data analytics to interoperability, this running list keeps track of the profusion of IT startups leading the way toward big changes across healthcare.
11:16 am December 23, 2015
Patient-centered care is changing how providers prioritize their technology resources and shape their engagement strategies. We look back on a year of insights and advice from those most committed to connected care and population health.
11:02 am December 22, 2015
2015 was the year of the healthcare data breach. It was also the year where those in charge of protecting data found their moment in the spotlight. As some of the most in-demand professionals around, chief information security officers are on the front lines of a challenging new era.
12:37 pm December 11, 2015
We combed the Healthcare IT News website to come up with some of our favorite -- most interesting -- pieces on interoperability we could find. Did we miss something?
03:02 pm December 10, 2015
Whether small, large or, in some cases, astronomical, healthcare security breaches ran the gamut in 2015. Not only in size and expense, but also in the variety of ways hackers, employees, insiders and outsiders manage to get at personal health information.