Monitoring Electronic Medical Records systems using Care Systems Analytics

posted

Downtime in healthcare costs on average nearly $10,000 per minute.  Event correlation in Electronic Medical Records EMR, systems prevents downtime, saving money, and providing a better patient experience.  Healthcare IT professionals must understand the total cost of downtime for the EMR systems they support.  Measuring and understanding these costs prevents outages, in turn preventing costly Read more...

VMworld 2016 Session Voting open May 3 – May 24

posted

Working in healthcare IT we often do things a little bit different.  We may not create monstrous development environments, and our application deployments may happen less often on average than our counterparts in manufacturing, but our applications are often on the front lines of patient care.  Since joining VMware as a Healthcare IT professional I Read more...

Improve Reliability by Shrinking Datacenter Fault Domains with Software

posted

Security and Reliability are the primary objectives of all Healthcare infrastructure. Reliability is a complex emergent property of all of the underlying required components. Today, Blade Chassis and Shared Storage represent large Fault Domains that are no longer necessary, and it’s time to take a good hard look at our datacenter design decisions because we Read more...

Healthcare Security and Storage: Transformation Better Together

posted

We recently polled our Healthcare CIOs as part of our CHIME membership. Their top two priorities for 2016 align perfectly to our security and storage offerings: ‘Security and Compliance’ and ‘Reducing Costs/Financial Restraints’. The pivot from traditional infrastructure to software-defined security and storage addresses the top two priorities exquisitely, allowing Healthcare providers to reduce the Read more...

Securing and Simplifying M&A with NSX

posted

Securing and Simplifying Mergers and Acquisitions with NSX You have just been pulled into the planning process for the most recent M&A.  Hundreds of items need to be addressed… The first question is always “when will the new executive team have access to email and critical corporate business systems?”  Followed quickly by “how long will Read more...

IT is the Foundation, not the Point of Healthcare Information Technology

posted

Four key themes continue to resonate with healthcare provider CIOs in almost every meeting that I’ve had this year: Empowered Clinicians – Right information, right device, right time Engaged Patients – Enable patients to manage their own care Support a Community – Scale to support a community not just a hospital Secure Patient Information, Persistent Availability – Intrinsic security, stability, Read more...

Hands on with Secure Healthcare Desktops

posted

        Security breaches cost healthcare companies millions of dollars every year.  We continue to become more innovative with our security, but often times focus on the server and perimeter networks.  When it comes to the desktop, security is all to often a small piece of a larger design, something focused only on Read more...

Introducing the Digital Clinical Workspace

posted

You may be reading this blog post (please, let somebody be reading this blog post) on your: work computer (this is research) tablet device while sitting having breakfast (assuming you’re single) cell phone while driving on a bus or a train You may be using a browser, or a mobile app. Collectively, being able to Read more...

Healthcare M&A, the New Norm

posted

Mergers and Acquisitions (M&A) are happening more routinely and quicker than ever in healthcare.  These events are extremely complex and challenging for people, process and technology.  With the right foundation and operational models in place IT can greatly reduce the risk, cost and complexity of these changes.  Executing on a Software Defined Data Center (SDDC) Read more...

The Healthcare Security Conundrum

posted

It seems like ages ago the HIPAA guidelines were adopted. It got a bit more complex as the HITECH requirements and financial implications increased. Following that, Meaningful Use Stage 2, encryption and the like is creating some additional technical challenges. Protecting patient data and secure it using best practices that your organization can muster has Read more...