How natural language processing will help achieve a payback on EHRs

Information Management Resources

With almost all healthcare organizations now using electronic records, computer algorithms will increasingly mine unstructured data to help improve care. Machine learning Healthcare analytics EHR analysis EHR documentation

EVRAZ operations in North America disrupted by Ryuk ransomware

Security Affairs

Computer systems at EVRAZ, a multinational vertically integrated steel making and mining company, have been hit by Ryuk ransomware. EVRAZ is one of the world’s largest multinational vertically integrated steel making and mining companies with headquarters in London.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into. Do they go to a community night course on computers?

The City of Durham shut down its network after Ryuk Ransomware attack

Security Affairs

Once it’s inside, Ryuk can spread across network servers through file shares to individual computers,” reads a post published by SBI. The City of Durham, North Carolina, was the last victim in order of time of the infamous Ryuk ransomware that infected its systems.

Free Tool: Honey Feed

Security Affairs

Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. I am a computer security scientist with an intensive hacking background.

Could Beto O’Rourke become the first US President with a past of hacking?

Security Affairs

Mr. O’Rourke, 46, was a member of the Cult of the Dead Cow in the late 1980s when he was going online with the moniker “Psychedelic Warlord,” he also contributed to electronic magazines published online decades earlier by the hacker group. This happiness was mine by right.

Mining 100

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Google Android team found high severity flaw in Honeywell Android-based handheld computers. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. A new round of the weekly SecurityAffairs newsletter arrived!

How To Protect Yourself From Hackers

Cyber Info Veritas

Before we outline the safety hacks, let us briefly discuss why you need to protect yourself from hackers: How Safe Is Your Data: Why You Need To Protect Yourself From Hackers As the internet, computers, and connected devices (smart homes, smart appliances, etc.)

else 11/25: The Collective Hallucination of Currency

John Battelle's Searchblog

Bitcoin mining operation. A new electronic payment platform that may have significant advantages over most of the existing ones.” If this doesn’t terrify you… Google’s computers OUTWIT their humans – The Register.

To get the most from blockchain in government, a sharing mindset is needed


When I was at university earning my Masters in Computer Science, I devoted a lot of my coursework to distributed computing. The doctor’s office owns the Electronic Health Record system, but that doesn’t give the office ownership of the patient’s medical information or control over the insurance company’s payment decision. So, how do we achieve this new mindset of “what’s yours is mine and mine is yours?”.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example


This Intranet Benchmarking Forum (IBF) post about meeting the needs of hard-to-reach staff reminded me of a kiosk system that was developed on top of an electronic document and records management system at Illawarra Coal (part of BHPB Billiton ) – I was part of the team that helped to implement the system and came up with the conceptual design of the intranet publishing architecture from this system.

Turning Content Inside Out


Content is produced today by most organisations in the same way since the 1980's when personal computers were introduced and 'personal productivity' software became available. These sites provide ad hoc stores of information that can be followed, searched, and mined but even more critically, help solve information 'unknowns' by linking people together. Pilot shareable, collaboration-built-in electronic formats like Microsoft's OneNote or Google Docs and blog about the successes.

ECM 40

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Plug a keyboard and mouse into a PS3 and you have a pretty good cloud computing home workstation - we had the session schedule up and running in this format. All pretty cutting edge in the spirit of this conference which is a personal favorite of mine.