What began as a straightforward software contract with Epic resulted this week in the U.S. Coast Guard starting its entire EHR acquisition process over some seven years after it began. EHR implementations are notorious budget-busters often fraught with missed deadlines and other unforeseen complications, but for an organization to abandon the project altogether and embark on a new beginning is uncommon.read more
Cybercriminals use sophisticated technology to rake in millions of dollars in scammed and stolen money across the globe, and cost their victims millions more to clean up the messes they leave behind. When police try to break up these online rings, they find a whole set of obstacles that are different from crimefighting in the physical world. Cybersecurity researchers Frank Cilluffo and Alec Nadeau, along with Europol Director Rob Wainwright, reviewed the multinational effort to take down a massive cybercrime network. What they learned is both surprising and immediately useful.read more
Net-A-Porter didn’t know how much money it was leaving on the table when the Web site failed to keep up with traffic. New microservices captured it.
Luxury fashion might seem to be an unlikely space to suffer from sudden onslaughts of high traffic, given the non-mass marketing approach that luxury by definition implies. If millions of consumers are involved, then how luxurious can it beread more
The first mistake companies make while trying to protect their digital assets is to believe they can be secure. “Forget aspiring to full protection. Hacking is black magic engaged in by a ton of bad guys from Russia to Romania whose citizens do not necessarily view them as the bad guys,” Eric Cornelius shared at Fusion 2017.read more
The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.read more
Wearables are now a significant part of corporate wellness and remote patient monitoring programs. However, long-term investment from seniors remains a challenge, despite an increasing need for seniors to have better healthcare options.
Garmin and Tactio Health Group, two major companies involved in telehealth and wearable technology, are combining forces to provide a telehealth solution specially designed to monitor the daily health and well-being of seniors.read more
A couple of weeks ago I met with the email management and security vendor Retarus. While I was unfamiliar with the company (and it had a reasonably standard portfolio, I thought at first glance), my interest was piqued because it was German, and the country is very particular about such questions as personal data, privacy and so on.read more
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.read more
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.read more
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.read more
The rapid advancement of mobility in the enterprise has often outpaced the development of mobile data security best practices, and this obstacle is made more complicated by the fact that mobile devices now include emerging technology such as the internet of things. The trend has left companies — and their IT leaders — scrambling to develop mitigating mobile security technology and processes necessary to protect data.read more
Chinese internet giant Baidu has said it will share much of the technology it has created for its self-driving cars.
The firm predicted that the move would help drive the development of autonomous vehicles.
Called Apollo, the project will make a range of software, hardware and data services available to others, especially carmakers.read more
Facebook on Wednesday pulled aside the curtain on a secretive unit headed by a former chief of the Pentagon’s research arm, disclosing that the social media company is studying ways for people to communicate by thought and touch.read more
Researchers are training artificial intelligence to identify tuberculosis on chest X-rays, an initiative that could help screening and evaluation efforts in TB-prevalent areas lacking access to radiologists.
The findings are part of a study published online in the journal Radiology.
“An artificial intelligence solution that could interpret radiographs for the presence of TB in a cost-effective way could expand the reach of early identification and treatment in developing nations,”read more
Blockchain networks tend to support principles, like open access and permissionless use, that should be familiar to proponents of the early internet. To protect this vision from political pressure and regulatory interference, blockchain networks rely on a decentralized infrastructure that can’t be controlled by any one person or group. Unlike political regulation, blockchain governance is not emergent from the community. Rather, it is ex ante, encoded in the protocols and processes as an integral part of the original network architecture. To be a part of a community supporting a blockchain is to accept the rules of the network as they were originally established.read more