877-991-1991

Healthcare IT Blog

Sustaining Healthcare IT

87 articles in total.

Media Reuse and Disposal – The Burning Question...

Published on 12/11/2012 by Ashini Surati
Category: Compliance

A typical healthcare organization allocates between 1 to 3% of the total budget for IT.  The IT staff is responsible for delivering technology that meets the expectations of savvy physicians, employees, and trendy patients.  IT departments are always looking for ways to save money and work to balance risk vs. cost wherever possible.  In this blog, I am bringing to light the one of the burning questions that many IT departments still face - the reuse ...

Keep Your Head In the Clouds

Published on 12/06/2012 by Matt Donahue
Category: Cloud Computing

While sitting at home this past weekend watching my 3 year old and 6 year old running around having light saber duels and continuing the epic battle between the Jedi and the Sith, (yes we here at Park Place do have a special place in our hearts for Star Wars), I started to recall my own childhood.  Do you remember the days when we were all children?  They seem like so long ago now, but I would ...

Content vs. Technology

Published on 12/03/2012 by Jim Fitzgerald
Category: Healthcare IT

In reflecting on the purchase of most of the assets of LucasFilm, Ltd. including the beloved Star Wars space opera by The Walt Disney Company, (http://www.rollingstone.com/movies/news/disney-buys-stars-wars-plans-new-film-20121031) I find myself pondering the conundrum between content and technology. Content is what made us fall in love with the original Star Wars Trilogy:  Episode IV: A New Hope; Episode V: The Empire Strikes Back; and Episode VI: The Return of the Jedi. Sure there were, for the time, dazzling ...

YOU and the Expanded Incident Lifecycle...

Published on 11/29/2012 by Mark Middleton
Category: ITIL

There’s nothing like grabbing a cup of hot cocoa on a cold blustery day during the festive month of December and curling up with some reading on ITIL theory courtesy of the IT Infrastructure Library.  Bah, humbug?  It would be more fun to string up a hundred strands of half burned-out Christmas lights during an ice storm on a three story house with a 13/12 pitch roof, you say?   Well…take a step back ...

EBP Block Conversions - Preparation Is The Key

Published on 11/27/2012 by Mike Wheeler
Category: MEDITECH MAGIC

As the demands for storage increase, due to a number of factors, the need to expand LUN sizes also increases.   In the MEDITECH MAGIC environment, this has typically been done through the MAGIC Block Conversion utility.   With the advent of EBP (Extended Block Pointer) the need for future block conversions has been removed.   However, for those still operating in a non-EBP MAGIC environment, it may at some point become desirable to convert to ...

VDI - Know Before You Go

Published on 11/21/2012 by Mike Donahue
Category: Virtualization

Over the past few years, virtualization has become a widely adopted technology to deploy within the data center, and for good reason.  It’s no surprise that the natural progression would be to extend virtualization outside of traditional data center applications toward the desktop.  Just think about all of the time that is spent running around from desktop to desktop trying to resolve this issue, or adding that new application.  How many hours could be saved ...

It’s STILL the Network.

Published on 11/15/2012 by Joe Kelly
Category: Networks

This is an interesting industry in which we work.  Some of the people in it can be pretty demanding and awfully precise.   My previous post generated some interesting responses.  Some folks reached out personally to provide correction.  Things like, “You know Joe, in a year there are 8,765.81 hours.  Therefore, 99.99% works out to be 52.594 minutes, not an hour.  Besides, we design for 99.999% availability”....

Security in Health Care, It Ain’t Just An IT Thing.

Published on 11/13/2012 by Thom Daley
Category: Security

When one thinks about security, what typically comes to mind is an image of a hacker sitting in a dark room in front of a bunch monitors furiously plugging away at the keyboard and gaining access to any system they want.  While mitigating the risk of unauthorized access is definitely important to security, it is only a small part of it.  What’s of equal importance is that your organization is aware of the fact that security ...

Erosion, part Duh

Published on 11/08/2012 by Clay Sides
Category: Disaster Recovery

After reading our CTO's blog on "Erosion", I began to reflect on my own Hurricane Sandy experience. In short, I lost power for three days, started getting water intrusion in my basement around the well pipe, took a stick through the back window of my car and, last but not least, when executing my superbly conceived "Disaster Plan”, started my generator, which instantly incinerated my cable modem, router and furnace controls.Now, after assessing the overall ...

It’s the Network–Still.

Published on 11/06/2012 by Joe Kelly
Category: Networks

I’ve been involved with technology consulting in the MEDITECH space for a solid 15 years.   Prior to that, I served as either a Technology Consultant or Engineer for an additional 18 years in a variety of industries ranging from hi-tech to high finance.  Most of that time has been spent one way or another on planning, designing, assessing, and implementing networks.    All kinds of networks:  voice, data, video, analog, digital, wired or ...

123456789
top