Many questions were asked on the HIMSS12 tradeshow floor. The common theme, according to Dr. Andrew Litt, Medical Director at Dell, was about how to put separate technologies together in order to make a seamless health IT solution.


At the Dell booth, we caught up with Dr. Litt, who talked about the trends he heard during the show, which included: an end to end solution for an EHR implementation that transforms a culture, improves workflow and boosts storage capability; cloud computing; moving data into a centralized format, and putting all the pieces together.


Watch the video below for more thoughts from Dr. Litt. What questions do you have?


In our next conversation from HIMSS, John Tempesco, chief marketing officer for Informatics Corporation of America, outlines the health IT trends he saw on the HIMSS12 show floor. This year’s HIMSS12 event was all about big data, cloud computing and storage needs, he said, and witnessing a transformation with data. Health IT professionals want to know not only how to exchange data, but capture data correctly and then utilize that data for better patient outcomes.


Watch the video below and let me know what questions you have.


Healthcare workers are under cost reduction and time pressure, working to deliver improved patient care with less time and resources.

Privacy and security are generally recognized by healthcare workers as important, especially with increasing regulations and breach notification rules at national and state / province levels, the devastating impacts breaches can have, and the alarming frequency of breaches affecting all types and sizes ofhealthcare organizations. Such breaches are very damaging and costly, averaging over $5M US per breach even in 2011. Such costs can also drive up the cost of healthcare. Breaches and other security incidents can also significantly degrade the quality of patient care, as patients suffer psychological and financial impacts in the event of a breach. These impacts work against the key goals of reducing the cost and improving the quality of healthcare.

However, privacy and security are generally not the primary goals of the healthcare worker, which are centered on delivering great patient healthcare. If cumbersome security controls get in the way of healthcare workers delivering great patient healthcare, they can be motivated to seek alternatives that can lead to compliance issues and increased risk. With the explosion of mobile devices, apps and services, healthcare workers have many alternatives to get the job done, including personal devices such as smartphones and tablets, and capabilities that can range from USB keys, to personal email and file transfer services. These alternatives often represent compliance violations with the healthcare organizations privacy and security policy, and may introduce significant new risks of security incidents like breaches. For example, full disk encryption on a corporate mobile device that has significant negative impact on performance and the healthcare workers user experience, and perceived as an impediment to delivering great patient care, can motivate them to use an alternative, perhaps a personal smartphone or tablet, without encryption. This can lead to non-compliance of healthcare workers with privacy and security policy of the healthcare organization, and increased risk to the organization of security incidents such as breaches as sensitive healthcare data may be stored or transmitted unencrypted.

Challenges to implementing much needed strong security controls, while maintaining great performance and user experience, include limited compute power on mobile devices, and the surge of sensitive healthcare data to protect on servers and the cloud. Hardware assisted security technologies can accelerate and harden technical security controls, and enable strong safeguards in healthcare, together with a great healthcare worker user experience, in turn enabling improved compliance and minimal risk. An example of this is Advanced Encryption Standard – New Instructions (AES-NI) that accelerates encryption and decryption, and improve robustness by handling the core processing at the hardware level where it is less visible and vulnerable to side channel attacks. Hardware assisted security technologies can also embed capabilities that used to be separate. A great example is Intel Identity Protection Technology (IPT) that conceptually implements the capability of a separate hardware token for 2-factor authentication within a PC or Ultrabook, enabling improved user experience, support and Total Cost of Ownership (TCO).

Intel is very focused on delivering hardware assisted security technologies across the compute continuum including smartphones, tablets, laptops and Ultrabooks, through to backend servers.

When Intel hardware assisted security technologies are vertically integrated with security software and services, this provides a great technical security control solution that is both performant and robust, and enables a great healthcare worker user experience, improved compliance, and minimal risk. An example of this is McAfee Endpoint Encryption that is vertically integrated with Intel AES-NI.

When these strong, performant technical safeguards are combined with a holistic approach to privacy and security, including the use of policy, risk management, and administrative, physical and technical safeguards, together with training of healthcare workers, this delivers robust privacy and security for healthcare. This in turn minimizes risk of privacy and security incidents, and enables improved quality and reduced cost of patient healthcare.


For more insight into the health IT user experience, watch the below video clip from my presentation with McAfee during an Intel workshop at HIMSS12. What questions do you have?


Cloud computing in health IT was a hot topic again this year at HIMSS12. We caught up with John Danahy, vice president at Peake Healthcare Innovations, a new joint venture company between Harris Corporation and Johns Hopkins Medicine, and spoke with him about how his company provides image management solutions in the healthcare cloud, and how VMware and Intel have helped play a role to support the application so that it offers better performance, speed and security to healthcare IT professionals.


Watch the video below on Peake and let us know what questions you have about cloud computing.


HIMSS12 was a great opportunity to discover the latest trends in the health IT market, and what products and services leading health IT companies are introducing to advance patient care and streamline workflow.

Today, we kick off our series of interviews conducted at HIMSS12 with a conversation with Motion Computing Vice President of Marketing Mike Stinson, who explains the latest health IT trends in tablet PCs. Mike talks about mobility, Big Data, and the products and features that nurses want in tablets in order to provide the best patient care. Also, you can see the latest tablets introduced during HIMSS12 and the new elements that make tablets ideal for bedside and mobile point-of-care.

What questions do you have about tablets and health IT?


Filter Blog

By date:
By tag: