Search Results

= Members only

Current search

56 results.

[1] 2 3 4 5 6

Word Power: a Glossary of Software Licensing Terms

Author: AHIMA

Source: Journal of AHIMA

Publication Date: April 2006


This Software license agreement is entered into by and between Sample Software, Inc, a Delaware corporation with principal offices located at 100 Maple Lane, Chicago, Illinois 60601 ("Sample") and _________________, a corporation with principal offices located at ________________ ("Licensee") a....

Journal Q&A (1/99)

Author: AHIMA Staff

Source: AHIMA Q and A

Publication Date: January 02, 1999


Q: I hear a lot of technical terms being used lately by information systems staff and I feel like I'm not speaking their "jargon." Could you clarify the meaning of some of these terms? Specifically, they are SQL, Java, TCP/IP, and IPX.

A: SQL stands for structured query language, whi....

Watson vs. Big Data

Author: AHIMA Staff

Source: Journal of AHIMA

Publication Date: July 2015


It is the matchup of the century—the towering hulk of healthcare’s Big Data versus the super computer known as Watson. Will Watson be able to take on this lumbering, untamed mass of information and whip it into submission?


One year ago, the Journal of AHIMA reported on the IBM su....

Analytic Hierarchy Process–based Method to Rank the Critical Success Factors of Implementing a Pharmacy Barcode System

Author: Alharthi, Hana; Sultana, Nahid; Al-amoudi, Amjaad; Basudan, Afrah

Source: Perspectives in Health Information Management

Publication Date: January 2015


Abstract


Pharmacy barcode scanning is used to reduce errors during the medication dispensing process. However, this technology has rarely been used in hospital pharmacies in Saudi Arabia. This article describes the barriers to successful implementation of a barcode scanning system....

Key to Using Digital Certificates

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


This is the second article in a two-part series.
Background

For over 2,000 years, in all recorded histories and for all civilizations, sending secret messages required that both the sender and receiver share a common secret key. The key that decrypted a message was the same a....

[1] 2 3 4 5 6