SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Curing IT Woes:
Overcoming Healthcare’s
Three Biggest IT Issues

Article
www.novell.com

Article Reprint
Endpoint Management
Endpoint Management Article
Curing IT Woes: Overcoming Healthcare’s Three Biggest IT Issues

Overcoming Healthcare’s
Three Biggest IT Issues

Gone are the days when physicians had to memorize 1,200
page textbooks to diagnose patients, but gone too are the
policies that allowed nurses to easily access patient data
without authorization.
According to CDW’s Winter Health Tech Report of 20131, the ability
“to store, organize, analyze and access hundreds of millions of
medical records” can not only reduce operational costs but also,
“boost service levels, streamline application deployment and
integrate multiple technologies.”
Technology has made patient care more intuitive and successful,
but it has also given the IT department a persistent headache
that can’t be fixed with a doctor’s prescription. Here are three
of healthcare’s biggest IT concerns and how healthcare
organizations are solving them.

Keeping Data Secure without Limiting Access

Meeting the requirements of the Health Insurance Portability and
Accountability Act (HIPAA) is no easy task for IT. Since the introduction of HIPAA, healthcare IT departments have been working furiously
to ensure that private information remains private, while ensuring the
network is properly configured, data is backed up and—most importantly—they can demonstrate that the organization is adhering to
federal requirements.
Identity and access management solutions play the largest role in
keeping data secure through requiring proper authorization to access
information. Yet the struggle of allowing access to data while keeping
that data secure extends to every facet of an IT infrastructure.

2

BJC HealthCare Information Services, a company that works closely
with Washington University School of Medicine and runs several academic medical centers, faced the challenge of maintaining secure
email while collaborating with email systems outside of BJC’s control. With the amount of healthcare information that can flow over
email, this can be a big issue for all healthcare organizations. Using
a coexistence solution from Novell, BJC was able to ensure that its
electronic protected health information (ePHI) remained safe longterm. “Because the GroupWise® database is internally encrypted, no
one outside the system can read our email,” said operations manager
Charlie Yarnall 2. “This means ePHI is secure, as required by healthcare regulations.”

Addressing Application Growing Pains

Healthcare organizations are dealing with more and more applications. Doctors use knowledge databases and online reference tools
to quickly diagnose patients, pharmacists handle prescriptions electronically, technicians archive vital medical scans in various databases, and administrators use multiple scheduling and timesheet
programs.
__________
1 	 http://webobjects.cdw.com/webobjects/docs/PageTurner/HealthTech/
index.html?cm_re=PromoSpot2-_-Industry+View-_-HIT+Page+Turner
2 	 www.novell.com/success/stories/bjc-healthcare-information-services.
html
On top of this, CDW reported that the number of clinicians who use
smartphones, tablets and desktops will climb to 82 percent in the next
year. This means IT departments have to manage many applications
on many different platforms.
When Wyoming Medical Center’s IT department saw its four software
applications rise to an astonishing 135 and its manual workstations
reach 800, it knew it was in trouble. “It’s critical for our care givers
to access applications as fast as possible,” said Rob Pettigrew 3,
Wyoming Medical Center’s manager of technical systems and help
desk, “This means we need to ensure our workstations are up-to-date
and properly patched. With so many different applications running,
this was a real challenge.”
Wyoming Medical Center turned to Novell® ZENworks® Configuration
Management, as did Kent and Medway Health Informatics Service.
With a user base of over 30,000 individuals, Kent and Medway was
looking to automate much of its application work. As applications
proliferate, this is an important step for any healthcare IT department. Debbie Hawkes4, operations director at Kent and Medway,
said, “Novell ZENworks Configuration Management really came into
its own when the deadline for installing a time-critical NHS national
application was brought forward at the last minute. With the Novell
solution we were able to roll out the application overnight without
breaking a sweat—something which simply would not have been
possible before.”

Maintaining Reliability

How many patients can afford to wait days, even weeks, for their
lab results to be picked up from a discharge pile because no doctor
was notified that the tests were complete? How effectively can an
emergency responder treat a victim if that patient’s files aren’t loading
onto the ambulance computer?
__________
3 	 www.novell.com/success/wyoming_medical_center.html
4 	 www.novell.com/success/stories/kent-and-medway.html
5 	 www.novell.com/success/stories/lentis.html
6 	 http://arstechnica.com/information-technology/2013/03/epic-uptimeachievement-can-you-beat-16-years/
7 	 www.novell.com/success/stories/arkin.html

www.novell.com

With more and more systems becoming dependent on wireless transfers of data, computer-based protocols and electronic reports, it has
become critical that healthcare IT departments keep IT infrastructure
running at all times. As Eppe Wolfis 5, IT manager at Lentis healthcare,
explains, “It is vital for us to ensure that all of our systems are kept up
and running efficiently, in order to ensure that our staff have access to
the information they need. If a doctor or nurse cannot retrieve patient
information quickly, then it could potentially jeopardize the care that
they provide.”
Maintaining a reliable IT environment often means choosing your vendors for their dependability and enterprise experience. Though many
mobile-focused companies offer exciting options today, few can offer
16 years of uptime6 or even around-the-clock support. At Arkin, one
of the largest mental healthcare institutions in the Netherlands, IT
manager Aart van de Beek7 has found that “Novell products have
always delivered very high levels of reliability and scalability at an
extremely competitive price. With Novell solutions supporting standardized, streamlined management,” Beek continues, “…we will be
able to guarantee that Arkin continues to offer top-quality patient
care in the future.”
When a growing number of applications and an increased need for
reliable technologies are stacked on top of mandatory HIPAA regulations, it’s no surprise that healthcare IT employees are constantly
fighting to cure their headaches. However, IT relief can’t be found
through a prescription—it is achieved when the department is able
to balance responsibility and user support. Healthcare organizations require proven, effective products that allow clinicians to work
faster and smarter, and in doing so, deliver the best possible patient
outcomes.

“Novell products have always delivered very high
levels of reliability and scalability at an extremely
competitive price.”
AART VAN DE BEEK
IT Manager
Arkin

3
By engaging Novell Services for Premium
Support, Consulting or Training, we can
help you get the most of your product
i
­nvestment to suit your business needs.
Please contact us today, or contact your
local Novell Solutions Provider:
Premium Support and Consulting:
1 800 714 3400 U.S./Canada
1 801 861 4272 Worldwide
crc@novell.com
Training:
1 800 233 3382 U.S./Canada
1 801 861 3381 Worldwide
training@novell.com
Novell, Inc.
1800 South Novell Place
Provo, UT 84606 USA

www.novell.com

472-001006-001 | 02/14 | © 2014 Novell, Inc. All rights reserved. Novell, the Novell logo, GroupWise and ZENworks are registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Andere mochten auch

Vad är en novell
Vad är en novellVad är en novell
Vad är en novellfrokenlotta
 
Novellens uppbyggnad & innehåll
Novellens uppbyggnad & innehållNovellens uppbyggnad & innehåll
Novellens uppbyggnad & innehållfrokenlotta
 
Berättande texter att skriva
Berättande texter  att skrivaBerättande texter  att skriva
Berättande texter att skrivaJenny Jakobsson
 
8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRMEnbu Consulting
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits
 
Branch Banking in the 21st Century by Capital Banking Solutions
Branch Banking in the 21st Century by Capital Banking SolutionsBranch Banking in the 21st Century by Capital Banking Solutions
Branch Banking in the 21st Century by Capital Banking SolutionsCapital Banking Solutions
 
Nsauditor Web Proxy Scanner
Nsauditor Web Proxy  ScannerNsauditor Web Proxy  Scanner
Nsauditor Web Proxy ScannerNsasoft
 
How to Call A from B in Ember
How to Call A from B in EmberHow to Call A from B in Ember
How to Call A from B in EmberBen Donaldson
 
Different hats, same needs: Marketing compliance from doctor’s office to boar...
Different hats, same needs: Marketing compliance from doctor’s office to boar...Different hats, same needs: Marketing compliance from doctor’s office to boar...
Different hats, same needs: Marketing compliance from doctor’s office to boar...Prolifiq Software
 
Inbound webinar presentation
Inbound webinar presentation Inbound webinar presentation
Inbound webinar presentation Cordium
 

Andere mochten auch (13)

Vad är en novell
Vad är en novellVad är en novell
Vad är en novell
 
Texttyp debattartikel
Texttyp debattartikelTexttyp debattartikel
Texttyp debattartikel
 
Novellens uppbyggnad & innehåll
Novellens uppbyggnad & innehållNovellens uppbyggnad & innehåll
Novellens uppbyggnad & innehåll
 
Berättande texter att skriva
Berättande texter  att skrivaBerättande texter  att skriva
Berättande texter att skriva
 
8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner Program
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014
 
Branch Banking in the 21st Century by Capital Banking Solutions
Branch Banking in the 21st Century by Capital Banking SolutionsBranch Banking in the 21st Century by Capital Banking Solutions
Branch Banking in the 21st Century by Capital Banking Solutions
 
Nsauditor Web Proxy Scanner
Nsauditor Web Proxy  ScannerNsauditor Web Proxy  Scanner
Nsauditor Web Proxy Scanner
 
How to Call A from B in Ember
How to Call A from B in EmberHow to Call A from B in Ember
How to Call A from B in Ember
 
Different hats, same needs: Marketing compliance from doctor’s office to boar...
Different hats, same needs: Marketing compliance from doctor’s office to boar...Different hats, same needs: Marketing compliance from doctor’s office to boar...
Different hats, same needs: Marketing compliance from doctor’s office to boar...
 
Inbound webinar presentation
Inbound webinar presentation Inbound webinar presentation
Inbound webinar presentation
 

Mehr von Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Mehr von Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Curing IT Woes: Overcoming Healthcare's Three Biggest IT Issues

  • 1. Curing IT Woes: Overcoming Healthcare’s Three Biggest IT Issues Article www.novell.com Article Reprint Endpoint Management
  • 2. Endpoint Management Article Curing IT Woes: Overcoming Healthcare’s Three Biggest IT Issues Overcoming Healthcare’s Three Biggest IT Issues Gone are the days when physicians had to memorize 1,200 page textbooks to diagnose patients, but gone too are the policies that allowed nurses to easily access patient data without authorization. According to CDW’s Winter Health Tech Report of 20131, the ability “to store, organize, analyze and access hundreds of millions of medical records” can not only reduce operational costs but also, “boost service levels, streamline application deployment and integrate multiple technologies.” Technology has made patient care more intuitive and successful, but it has also given the IT department a persistent headache that can’t be fixed with a doctor’s prescription. Here are three of healthcare’s biggest IT concerns and how healthcare organizations are solving them. Keeping Data Secure without Limiting Access Meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA) is no easy task for IT. Since the introduction of HIPAA, healthcare IT departments have been working furiously to ensure that private information remains private, while ensuring the network is properly configured, data is backed up and—most importantly—they can demonstrate that the organization is adhering to federal requirements. Identity and access management solutions play the largest role in keeping data secure through requiring proper authorization to access information. Yet the struggle of allowing access to data while keeping that data secure extends to every facet of an IT infrastructure. 2 BJC HealthCare Information Services, a company that works closely with Washington University School of Medicine and runs several academic medical centers, faced the challenge of maintaining secure email while collaborating with email systems outside of BJC’s control. With the amount of healthcare information that can flow over email, this can be a big issue for all healthcare organizations. Using a coexistence solution from Novell, BJC was able to ensure that its electronic protected health information (ePHI) remained safe longterm. “Because the GroupWise® database is internally encrypted, no one outside the system can read our email,” said operations manager Charlie Yarnall 2. “This means ePHI is secure, as required by healthcare regulations.” Addressing Application Growing Pains Healthcare organizations are dealing with more and more applications. Doctors use knowledge databases and online reference tools to quickly diagnose patients, pharmacists handle prescriptions electronically, technicians archive vital medical scans in various databases, and administrators use multiple scheduling and timesheet programs. __________ 1 http://webobjects.cdw.com/webobjects/docs/PageTurner/HealthTech/ index.html?cm_re=PromoSpot2-_-Industry+View-_-HIT+Page+Turner 2 www.novell.com/success/stories/bjc-healthcare-information-services. html
  • 3. On top of this, CDW reported that the number of clinicians who use smartphones, tablets and desktops will climb to 82 percent in the next year. This means IT departments have to manage many applications on many different platforms. When Wyoming Medical Center’s IT department saw its four software applications rise to an astonishing 135 and its manual workstations reach 800, it knew it was in trouble. “It’s critical for our care givers to access applications as fast as possible,” said Rob Pettigrew 3, Wyoming Medical Center’s manager of technical systems and help desk, “This means we need to ensure our workstations are up-to-date and properly patched. With so many different applications running, this was a real challenge.” Wyoming Medical Center turned to Novell® ZENworks® Configuration Management, as did Kent and Medway Health Informatics Service. With a user base of over 30,000 individuals, Kent and Medway was looking to automate much of its application work. As applications proliferate, this is an important step for any healthcare IT department. Debbie Hawkes4, operations director at Kent and Medway, said, “Novell ZENworks Configuration Management really came into its own when the deadline for installing a time-critical NHS national application was brought forward at the last minute. With the Novell solution we were able to roll out the application overnight without breaking a sweat—something which simply would not have been possible before.” Maintaining Reliability How many patients can afford to wait days, even weeks, for their lab results to be picked up from a discharge pile because no doctor was notified that the tests were complete? How effectively can an emergency responder treat a victim if that patient’s files aren’t loading onto the ambulance computer? __________ 3 www.novell.com/success/wyoming_medical_center.html 4 www.novell.com/success/stories/kent-and-medway.html 5 www.novell.com/success/stories/lentis.html 6 http://arstechnica.com/information-technology/2013/03/epic-uptimeachievement-can-you-beat-16-years/ 7 www.novell.com/success/stories/arkin.html www.novell.com With more and more systems becoming dependent on wireless transfers of data, computer-based protocols and electronic reports, it has become critical that healthcare IT departments keep IT infrastructure running at all times. As Eppe Wolfis 5, IT manager at Lentis healthcare, explains, “It is vital for us to ensure that all of our systems are kept up and running efficiently, in order to ensure that our staff have access to the information they need. If a doctor or nurse cannot retrieve patient information quickly, then it could potentially jeopardize the care that they provide.” Maintaining a reliable IT environment often means choosing your vendors for their dependability and enterprise experience. Though many mobile-focused companies offer exciting options today, few can offer 16 years of uptime6 or even around-the-clock support. At Arkin, one of the largest mental healthcare institutions in the Netherlands, IT manager Aart van de Beek7 has found that “Novell products have always delivered very high levels of reliability and scalability at an extremely competitive price. With Novell solutions supporting standardized, streamlined management,” Beek continues, “…we will be able to guarantee that Arkin continues to offer top-quality patient care in the future.” When a growing number of applications and an increased need for reliable technologies are stacked on top of mandatory HIPAA regulations, it’s no surprise that healthcare IT employees are constantly fighting to cure their headaches. However, IT relief can’t be found through a prescription—it is achieved when the department is able to balance responsibility and user support. Healthcare organizations require proven, effective products that allow clinicians to work faster and smarter, and in doing so, deliver the best possible patient outcomes. “Novell products have always delivered very high levels of reliability and scalability at an extremely competitive price.” AART VAN DE BEEK IT Manager Arkin 3
  • 4. By engaging Novell Services for Premium Support, Consulting or Training, we can help you get the most of your product i ­nvestment to suit your business needs. Please contact us today, or contact your local Novell Solutions Provider: Premium Support and Consulting: 1 800 714 3400 U.S./Canada 1 801 861 4272 Worldwide crc@novell.com Training: 1 800 233 3382 U.S./Canada 1 801 861 3381 Worldwide training@novell.com Novell, Inc. 1800 South Novell Place Provo, UT 84606 USA www.novell.com 472-001006-001 | 02/14 | © 2014 Novell, Inc. All rights reserved. Novell, the Novell logo, GroupWise and ZENworks are registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.