Browse Definitions :

Word of the Day

telestroke (telestroke services)

Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital. In its most basic form, a telestroke system requires a neurologist and attending nurse to have a high-speed Internet connection and videoconferencing capabilities through a phone, laptop, tablet or desktop computer.See More

Word of the Day Archive

Newest and Updated Terms

This Content Component encountered an error

Buzzword Alert

telepathology

Telepathology is the area of telemedicine involving the transmission of pathological specimen images for remote study and diagnosis of disease.

Read More

Know-IT-All

Essential Knowledge

Consumer health products can be a boon to providers, patients

As the consumerization of healthcare continues, new products displayed at CES 2019 -- like the first wearable blood pressure cuff -- can be ...

Remote patient monitoring technology major focus of new AMA guide

The American Medical Association created the Digital Health Implementation Playbook, which provides a step-by-step guide to technology implementation...

Mobile device security in healthcare must become a priority

As mobile devices become more common in healthcare, cybercriminals are taking advantage of the increased attack surface. Health IT must be diligent ...

Digital voice assistants seek their place in healthcare

At their respective conferences this spring, Microsoft and Google unveiled new features for their digital assistants that may help them gain adoption...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close