In 2003, Keith Rabois, a longtime Silicon Valley investor and executive, had an ambitious idea: He wanted to start a website that would instantly offer a fair price for your home. If you accepted the offer, the site would agree to buy your house immediately, closing the deal in a matter of days.read more
Tech companies and app developers everywhere are breathing a sigh of relief after Monday’s major Supreme Court ruling on a topic that’s close to their hearts: patents. More specifically, patent lawsuits — a rising number of which analysts say are bogus and threaten to strangle new start-ups and inventions before they have a chance to succeed.read more
The internet of things is real, and it’s a real part of the cloud. A key challenge is how you can get data processed from so many devices. Cisco Systems predicts that cloud traffic is likely to rise nearly fourfold by 2020, increasing 3.9 zettabytes (ZB) per year in 2015 (the latest full year for which data is available) to 14.1ZB per year by 2020.
As a result, we could have the cloud computing perfect storm from the growth of IoT. After all, IoT is about processing device-generated data that is meaningful, and cloud computing is about using data from centralized computing and storage. Growth rates of both can easily become unmanageableread more
On the EHR world stage, InterSystems and Epic won more new hospital contracts in 2016 than any of their rivals, according to a new KLAS report: “Global EMR Market Share 2017.”
The two companies broke ahead of both their multiregional and regional competitors.
“In addition to cost, many other factors were important in providers’ decisions,” said KLAS, which added that many EHR vendors recorded strong years.
InterSystems’ strong 2016 sales across Europe, Asia and the Middle East included new contracts with several multi-hospital organizations in the U.K. and China.read more
Lines of business want services fast; IT will need an investment budget that allows it to try to achieve desired solutions and sometimes fail.
It used to be that every IT technology project needed to be a business — to have a business justification. Now, every new business project “needs to be a technology,” noted Mark Tonsetic, analyst with the CEB unit of Gartner.read more
There are some specific steps Wisconsin policymakers can – and should – take to improve its business startup rate, which once again anchored the bottom of the Ewing Marion Kauffman Foundation’s annual index. The real reasons for Wisconsin’s quasi-permanent status as a Kauffman bottom-feeder, however, likely have more to do with who we are as a people versus what state or local government can do.read more
Wisconsin Governor Scott Walker issued an executive order on Thursday to create a steering committee, which will look into autonomous cars and connected vehicles.
The committee will research and evaluate all aspects of autonomous cars and submit policy recommendations to the Governor’s office by the summer of 2018.read more
Blockchain technology has immense potential to streamline business transactions and processes, but the technology isn’t devoid of limitations, according to Pramod Achanta, partner, financial services blockchain practice leader at IBM North America. Achanta spoke with SearchCIO at the recent Fusion CEO-CIO Symposium, produced by WTN Media. In this video, Achanta enumerates the myths, benefits and challenges associated with implementing blockchain technology. He also offers pointers on how to find the right use cases for the evolving technology and explains how blockchain can complement cybersecurity.read more
In healthcare, machine learning may yield fast, accurate insights. But humans are still better able to detect ridiculous anomalies and discover problems that machines have not yet learned to detect.
Artificial intelligence applied to the right tasks can reveal insights that wouldn’t otherwise be surfaced, and do it faster than manual human efforts. But there are still some tasks that humans perform better than machines.
Robert Gren was working from home on Friday when, all of a sudden, his laptop stopped working.
What he initially thought was just a kink in his computer’s software was in fact part of a global ransomware attack that has affected more than 200,000 computers and caused untold havoc from China to Britain.read more
The free and open internet as we know it is at risk.
Tomorrow, the Federal Communications Commission (FCC) will vote to initiate a process to repeal the strong net neutrality rules that have been in place since 2015.
These rules protect the internet as an open, decentralized, and level playing field, free from content discrimination. They ensure that you—not your internet service provider (usually your cable or phone company)—control what you can access online.read more
Electronic health record system conversions are one of the largest undertakings an organization can undertake, and Epic go-lives are famous for sometimes going wrong.
However, Kevin Johnson, MD, thinks that doesn’t have to be the case.
“Every EHR install tests the entire structure of an organization, such as governance, accountability and communication skills,” said Johnson, who is vice president for health IT and chief informatics officer at Nashville-based Vanderbilt University Medical Center.read more
LinkedIn is bringing its Today’s Job Matches feature to mobile job seekers in an upcoming update.
LinkedIn is rolling out new tools aimed at helping job seekers find new work and recruiters hunt down better matches for open positions.read more
The global ransomware attack called “WannaCry,” which began last week and continues today, could have been avoided, or at least made much less serious, if people (and companies) kept their computer software up to date. The attack’s spread demonstrates how hundreds of thousands of computers in more than 150 countries are running outdated software that leaves them vulnerable. The victims include Britain’s National Health Service, logistics giant FedEx, Spanish telecom powerhouse Telefonica and even the Russian Interior Ministry.read more
When the National Security Agency began using a new hacking tool called EternalBlue, those entrusted with deploying it marveled at both its uncommon power and the widespread havoc it could wreak if it ever got loose.read more