Artificial Intelligence is called the new nervous system of the healthcare domain. Application of Artificial Intelligence in Health information comprises of training databases for health data, medical data exchange clinical decision support system, creation, and use of knowledge. Medical data and healthcare statistics have now evolved as a separate domain called Health Informatics. Technology aids …
Category Archives: CIO Coverage
Understanding Cyber Risk- Cyber Security
All modern organizations face some degree of cyber risk. Cyber attacks over the last several years have been steadily increasing, and have increased in both count and severity very recently. New technology and its implementation has become a common task for business small and large. Only recently have small and mid-size businesses realized the importance of securing …
Cloud Computing Security
Cloud computing has quickly become a relevant technology within the information technology field over the past few years. This technology is powerful and useful but is a dual edge sword as security can become an issue quickly when placing data on web based storage servers. Information security is open broken up into C.I.A. (confidentiality, integrity, …
Should a retail #CBDC infrastructure be based on #DLT or conventional technology? And should it involve digital #tokens inspired by #cryptocurrencies?
The below graph maps out the possible combinations. Conventional database often achieve hashtag#resilience by storing data over multiple physical nodes, but all are controlled by a top node. By contrast, in many DLT-based systems, the ledger is jointly managed by all nodes. The communication needed to achieve hashtag#consensus between these nodes is the main reason …
Do you really need a CTMS system?
In the not too distant past, if you were running clinical trials, we would never have expected this question to be posed: “do we really need a Clinical Trials Management System (CTMS)?” You needed to have a system that would capture and report out information related to the operational progress of your trials, without question. But, …
CTMS Implementation Success: Top Five Steps to Keep You On Track
CTMS implementation success might seem not that easy, especially when utilizing this kind of software for the first time. In this case it is important to have a very well sketched plan that will help you with the initial steps to get everything in place. The beginning is the toughest part and this is the …
Continue reading “CTMS Implementation Success: Top Five Steps to Keep You On Track”
Voltron: Disrupting DoD Cybersecurity With Artificial Intelligence
There is no greater maxim than speed is decisive in war. However, cyber warfare today is a mostly manual process. Humans scour code to find vulnerabilities and fix problems with patches. Humans evaluate whether a patch will maintain overall system functionality, and whether a patch is performant. Human attackers exploit unpatched systems or vulnerabilities that, …
Continue reading “Voltron: Disrupting DoD Cybersecurity With Artificial Intelligence”
In healthcare, big data alone isn’t enough
Healthcare organizations have mastered the art of data collection. But in order to be forward-looking, they need to focus on how to turn their data into valuable information. For what it’s worth, most hospitals and health systems have realized the value in investing in big data. They’re eagerly raking in a plethora of data, focusing …
Continue reading “In healthcare, big data alone isn’t enough”
When it comes to the internet of things (IoT), small things make a big impact.
Recent studies predict that by 2025 there may be as many as 100 billion IoT devices deployed worldwide. That’s roughly 14 connected devices or sensors for every person on Earth. My good friend Rob Mesirow and I have been spending a lot of time talking about the most practical ways to integrate “smart” technology into …
Continue reading “When it comes to the internet of things (IoT), small things make a big impact.”
Artificial Intelligence: The Shifting Battlefield in the Cybersecurity Arms Race
Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining …
Continue reading “Artificial Intelligence: The Shifting Battlefield in the Cybersecurity Arms Race”