Mobile
If patient-driven healthcare spending has arrived does that mean we're ready for digital health or healthcare insurance retail stores?
The speed at which technology is pervading the healthcare and life sciences industries means a patient-centric ecosystem of connected care is well within sight.
(SPONSORED) As timing and accuracy of data are key components to the efficiency, speed, and therefore overall costs of operating a clinical trial, consumer wearables offer an unparalleled opportunity to remedy these issues.
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
For seven years, MobiHealthNews has been a go-to site for news, commentary, online events and research. Now it is the newest member of the HIMSS Media family -- the leading source of digital health news.
Broadly defined, software as a medical device is any app used by providers to make clinical decisions. An increasing number of those are now officially designated as FDA-regulated devices. Is it worth it to pursue this classification for your own software?
For years, manufacturers of medical devices depended on the "kindness of stranger," assuming that devices would never be targeted by bad actors. Hospitals must do their best to isolate medical devices from the internet and from other computing devices that could infect them.
(SPONSORED) The following emerging trends are transforming the utilization of digital devices from a fad to a meaningful movement that can actually result in improved health.
Back in the old days -- say, a whole 10 years ago -- thieves had to be physically inside a healthcare facility to steal patient information. How times have changed.
Ponemon's recently published 2015 Study on Privacy & Data Security of Healthcare Data makes one point crystal clear: healthcare organizations must do more to protect sensitive patient information from the wide variety of data breach threats.