4 More Surprising Uses For Industrial RFID Technology
February 3, 2022
Radio Frequency Identification, or RFID, is the scanning of special tags with radio waves. These tags can be affixed on items from boxes to wrist bands, and can contain information like the item’s name, SKU number, to even a picture. That information is then scanned and stored by using RFID…
What is Right to Repair and How Does it Affect Medical Devices?
February 1, 2022
Right to Repair (RtR, R2R) is a movement by consumers and repair shops to have Original Equipment Manufacturers (OEM) make available normally proprietary information of their products, as well as provide any necessary tools and spare parts. That way, product owners or such shops can make repairs or…
How Fax Machines Hinder EMR (And How to Solve It)
January 25, 2022
Want to see if time-travel is real? Simply walk into any doctor’s office or a hospital and ask to use their fax machine. This everyday device, whose heyday was back in the late 1980s, is still lumbering along in a world of telemedicine, medical computers, and artificial intelligence. Nearly 90…
3 Approaches to Protecting Your Networks on Computer Security Day
November 30, 2021
November 30th, 1988, should be marked as a day of infamy for our modern, connected times. During that month, researchers at Cornell University discovered an unknown virus lurking in their computer systems. This so-called “Morris worm” would quickly spread to other connected university systems. If…
How the Right Computer Can Help Disaster Recovery
July 28, 2021
When people think of disaster recovery, they usually think of things like cleaning up rubble and rebuilding cities after massive natural disasters like fires, earthquakes, and hurricanes. But beyond the damage to physical infrastructure, businesses can sustain another kind of damage that can be…
Securing Healthcare Information in a Digital World
June 4, 2021
While the rapid advancements in telehealth and digital healthcare that have been spurred on by the COVID-19 pandemic promise to deliver more care to more people more affordably, they have also opened up new avenues for bad actors to access sensitive information like patient data. It’s no secret…
Industrial Cybersecurity Beyond the Firewall
May 11, 2021
Given that businesses across nearly all industries have been using computers for several decades now, you would think that Cybersecurity would be a non-issue. It is natural to assume that companies would, by default, have robust systems in place to deal with the threats they face after all this…
4 Ways Medical Computers Empower Legacy Healthcare Applications
February 11, 2021
You would think the healthcare industry would be at the forefront of technological adaptation and development, or at least be interested in replacing obsolete and outdated hardware or software. That is not usually the case and for good reason. Legacy products ﹘ outdated software, hardware, or both…
6 Manufacturing Trends Sure to Pick Up (More) Steam in 2021
December 22, 2020
It took some doing and a whole lot of adapting, but we’ve finally managed to make it to the other end of 2020. Though many manufacturers can’t say they aren’t worse for wear for the experience, they were able to draw quite a few insights as a result of having their status quo challenged and…
What Are the New 21st Century Cures Act Interoperability and Information Blocking Laws?
December 1, 2020
Healthcare has recently been rife with policy changes and a “status quo” that has been anything but. And as we try to backwards engineer a new form of healthcare that can meet today’s pandemic-conscious patient’s needs, we’ve seen all manner of new policies ranging from the shutdown of elective…
Sign Up
Join our 35,000+ subscriber newsletter and discover the latest in the healthcare, industrial, and enterprise technology communities.