Want to know how healthcare IT organizations can best prove their worth to the business? Optimize the 835 Remit and 837 Claim process so there are fewer rejections, clarifications, missed files and delays.
Lean IT, in its essence, is all about doing well the IT tasks the organization needs to do, while not doing things that don't really need to be done.
For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC.
Greg Mooney | | Security
If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.
Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...
A lot of people throw away a lot of otherwise fully operational electronics due to blown capacitors (caps). I've worked in IT for quite a few years and that doesn't even include my 5 years of time in the audio consumer electronics space. To put is simply, a capacitor is...
Michael O'Dwyer | | IT Insights
Whether your company has a single wireless network or multiple networks and access points, Wi-Fi interference issues are a common problem, frustrating users and IT pros alike and slowing down network traffic.
Exfiltration is a decidedly unpleasant word, and it's rarely connected with Google's benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive? Google Drive, a potentially massive repository of...
The internet is huge. So huge that humans have spent years trying to quantify the concept. As noted by Live Science, for example, a study published in Supercomputing Frontiers suggested that the internet had a storage capacity of 10^24 bytes, while tech company Cisco...
While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Aaron Kelly | | Security
An audit to review PCI compliance at a large US-based transportation company revealed a number of file transfer problems that kept them from getting a passing grade. And with the PCI 3.1 “Business as Usual” mandate, the company’s auditors stressed the importance of...
Adam Bertram | | Security
When writing large PowerShell scripts or modules, it will eventually become necessary to split up the code into modular pieces. Modularity can be achieved by using basic and advanced PowerShell functions. It also encourages good coding practices. One way to build modular...
As noted by Tech Financials, infrastructure outsourcing is now a go-to option for service providers, since it allows them to maximize their strengths while shoring up their weaknesses with third-party expertise. But what does this trend mean for companies at large? Is it...
Adam Bertram | | Security
With companies moving services to the cloud, applications offering robust APIs and a driving need for automation, we need a more mature scripting language.
Michael O'Dwyer | | IT Insights
Any discussion on the methods used to debug Bluetooth will not involve the use of soldering irons or replacement of components at a hardware level. The reason for this is quite simple — a Bluetooth radio is either on or off, with chipsets and Bluetooth stacks (the...
When a Windows server is running as expected, no one notices. But as it begins running low on resources, a system administrator typically finds out quickly just how important that server is. Performance suffers and Windows performance counters can help. It's important...
Adam Bertram | | Cloud | Security
As part of this cloud transition, it's important to realize that even though you can't see a system it still needs to be managed. Let's talk about PowerShell automation.
Adam Bertram | | Security
As an IT professional or manager, when you think of the word "script," what comes to mind? Are images of VBScript and batch files still haunting you to this day? Are you just thinking about a nice, little piece of code that automates some mundane task? If so, let's get...
Michael O'Dwyer | | IT Insights
If you require software licensing tips, don't expect your software vendors to be of any real help, given the prevalence of outsourced call centers by many of the world's global players. If you can understand the accent of your assigned contact, congratulations! You have...
Jacqueline Lee | | IT Insights
It's undeniable: the way IT fits into business operations is changing. Proving the value of information technology teams as business partners could be the difference between the outsourcing of services and outsourcing of, frankly, everyone.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.