Search Results

= Members only

Current search

56 results.

1 2 [3] 4 5 6

Perils of Customization

Author: Rollins, Gina

Source: Journal of AHIMA

Publication Date: June 2006


Increasingly, providers are resisting the temptation to customize software. Many have learned the hard way that unique modifications lead to unique costs and unique complications.
We all like to think we’re special. But when it comes to implementing software, providers are usually b....

Medical Device Security: Hollywood vs. Reality

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 2015




When former Vice President Dick Cheney revealed in 2013 that his heart surgeons modified the settings on his pacemaker to reduce the chances the device could be hacked by terrorists, the headlines were predictably alarmist. Fans of the Showtime hit “Homeland” immediately recognized th....

Key to Using Digital Certificates

Author: Barnett, David H.

Source: In Confidence (newsletter)

Publication Date: April 02, 2002


This is the second article in a two-part series.
Background

For over 2,000 years, in all recorded histories and for all civilizations, sending secret messages required that both the sender and receiver share a common secret key. The key that decrypted a message was the same a....

1 2 [3] 4 5 6