EMR, Outsourced IT, and all points in between
EMR, Outsourced IT, and all points in between
Over 114,000 Accounts Revealed To “Hackers” Due To Security Breach. Last week Goatse Security was able to access over 100,000 iPad user e-mail addresses using AT&T’s customer website. Using an exploit involving the generation of fake SIM card serial numbers, they brought the flaw to AT&T’s attention. In an official e-mail […]
Continue Reading »Building a company app can open up all sorts of doors for you. It can lead to new marketing frontiers, provide better and more up to the minute information to your customers, provide information tailored to your customers based on their purchase histories, and provide you with more detailed and […]
Continue Reading »You’ve probably been hearing about it. There’s a bug…a security hole on the internet in the secure socket layer called “Heartbleed.” You may not understand some of the words I just typed. You may not think it matters, but this one matters. This one matters very much indeed. Read on […]
Continue Reading »Once upon a time, the adult attention span was twelve minutes. An average adult could stay focused on a task for twelve minutes without becoming distracted. In today’s modern, 24/7, always-on world, the average adult attention span is down to five minutes. Five minutes, and the decrease has occurred within […]
Continue Reading »Biometric technology is a technology of the now. It’s already fairly well developed and advanced. Not to say that additional advances aren’t coming, but you won’t have to wait five or ten years, or longer, to see how it is already shaping business. It’s an idea whose time has arrived. […]
Continue Reading »There are some in management, not many, but some, who live and breathe the notion of the Mission Statement. These people tend to be almost evangelical about it, preaching the gospel and importance of having one. More than that, they let everyone who will listen know what their company’s Mission […]
Continue Reading »