DocuCrunch.com » Latest News & Views

Lytec MD


October 12, 2011 by Melissa Pardo

Lytec MD is a combination of an electronic health record and a practice management solution (Lytec 2010).  It is housed on the practice’s server and is intended for practices that already use Lytec 2010 and want to use both EMR and PM features in one package. More…

Intivia InSync


September 21, 2011 by Melissa Pardo

Intivia InSync is electronic medical record software that allows for doctors and staff to coordinate patient care while reducing paper records and time-consuming administrative tasks. More…

Meditab Intelligent Medical Software (IMS)


September 1, 2011 by Melissa Pardo

Meditab’s Intelligent Medical Software (IMS) combine features of both electronic medical records (EMR) and practice management (PM) into one package, a so-called “electronic medical office.” More…

iSalus Healthcare OfficeEMR


August 17, 2011 by Melissa Pardo

iSalus Healthcare OfficeEMR is a web-based solution that combines electronic medical record features with practice management functions. It is hosted on iSalus’ servers so medical practices do not need to purchase any servers, software, or other relevant expenditures. More…

Noteworthy NetPractice EHRweb


August 15, 2011 by Melissa Pardo

Noteworthy’s NetPractice EHRweb is web-based electronic health software that can be used by any practice, regardless of size and specialty.  Its Version 7.02.0 has received the ONC-ATCB 2011-2012 designation for Stage 1 meaningful use (which is set by the feds for reimbursement for physicians adopting EMR for their offices). More…

MicroMD EMR


August 9, 2011 by Melissa Pardo

MicroMD EMR is an electronic medical record (EMR) solution that is not only appropriate for larger practices but for smaller (even solo) practices as well. It combines electronic records and practice management into one system, and is geared toward numerous specialties, such as family practice, pediatrics, internal medicine, and obstetrics and gynecology. More…

Allscripts MyWay


August 4, 2011 by Melissa Pardo

Allscripts MyWay combines electronic medical records (EMR) with practice management and claims management solutions. It is intended for smaller or solo practices that do not have IT staff or do not wish to spend a lot of money on EMRs. MyWay can also be integrated with an office’s current practice management software. Currently, MyWay is offered for family practices, internal medicine, pediatrics, and urgent care, but that list will continue to grow. More…

NextGen: Patient Portal


August 1, 2011 by Melissa Pardo

The NextGen Patient Portal is a Web-based electronic health record (EHR) system that allows patients to be more proactive about their health and physician visits. It also is intended to help busy medical offices, especially smaller practices, cut down on administrative tasks, increase revenue, and provide better quality of care. More…

McKesson: Medisoft Clinical


July 27, 2011 by Melissa Pardo

McKesson’s Medisoft Clinical software is a combination of both a practice management (via the Medisoft version 17 system) and electronic medical record (EMR) solution. It is intended for small practices with some limited staff that have a need to reduce time-consuming administrative tasks and still provide quality care to patients. More…

3 Key Benefits of Enterprise Software


July 15, 2011 by Staff

When running a large business, it is sometimes hard to service and manage a large amount of users, networks and clients through individual departments. Computer or network issues may arise throughout the company’s network as a whole rather than by individual sectors, making problem solving that much more complex. Systems like enterprise software and hardware help to eliminate these problems and are widely implemented throughout many mid-to-large sized companies because they provide many benefits. Enterprise software has gained popularity in the areas of electronic medical billing (EMR), enterprise resource planning (ERP), customer relationship management (CRM), and supply chain management because of these proven benefits.

More…

Symantec, Snoop Dogg team up to sell cybersecurity


September 7, 2010 by Sam Narisi

What’s it take to sell the kind of security software that’ll keep a computer safe? A good rap hook might do the trick. At least that’s the thinking over at Symantec, maker of Norton anti-virus software. More…

Experts warn: Most passwords are too short


September 3, 2010 by Sam Narisi

As computers get more powerful, so do password cracking tools. Many businesses and users haven’t been keeping up. More…

Digital phones: Is someone listening in?


September 2, 2010 by Steve Hannaford

Internet-based telephony (known as VOIP, or voice over Internet Protocol) is being adopted in businesses across the country, thanks to its promise of lower monthly costs and easier administration, along with a set of productive software features (such as FollowMe call routing, voice mail e-mailing and phone number portability). More…

How to talk to execs about security funding


September 1, 2010 by Sam Narisi

Keeping company networks secure is a big part of IT’s job. But these days, departments often don’t get the funding they need to stay on top of the latest threats. More…

25% of malware spread by this overlooked threat


August 31, 2010 by Sam Narisi

It’s not just malicious websites and e-mail attachments anymore. These days, cybercriminals are using another method to spread malware: More…

Brother app supports printing from mobile devices


August 31, 2010 by Sam Narisi

As smartphones and other mobile devices become more popular, more vendors are looking for ways to let users print on the go. More…

Lack of policies leads to paper waste


August 30, 2010 by Sam Narisi

Recent research shows that, despite increased environmental awareness, most employees aren’t ready to change their printing habits. More…

Case study: Digital pens cut down on paperwork


August 27, 2010 by Sam Narisi

Businesses that need employees to report data on the go often turn to smartphones, tablet PCs or other mobile computing devices. But there’s another tool that may be a better fit: More…

Lexmark sues 24 cartridge makers


August 26, 2010 by Sam Narisi

It could soon get harder for businesses and consumers to find low-priced, third-party ink and toner cartridges. More…

Intel buys McAfee: Will it dominate the Cloud?


August 25, 2010 by Steve Hannaford

Chipmaker Intel just snapped up major security software company McAfee, in a $7.68 billion deal. More…

New Web 2.0 threat: Add-ons and widgets


August 24, 2010 by Steve Hannaford

Employees aren’t getting the IT security messages. That’s the conclusion of a recent study of 2,100+ data security administrators from five countries conducted by the Ponemon Institute for Check Point software. More…

Help for mobile printing woes


August 24, 2010 by Steve Hannaford

You make some last minute changes to a spreadsheet or a presentation in the airplane or the hotel room. The problem: How do you print out a new revised copy? More…

Portable protection for road warriors


August 23, 2010 by Steve Hannaford

With so much work being done now by telecommuters and laptop-toting road warriors, data security problems have become all the more complicated. There’s a real need for remote workers to log into their company’s data center without opening new opportunities for data loss and malicious attacks. More…

New tool helps convert handwritten docs to digital files


August 20, 2010 by Steve Hannaford

OCR (optical character recognition) has become a surprisingly reliable tool for all kinds of businesses. Converting printed text into a digitally readable and searchable format is now commonplace enough to be included in even the least expensive scanners and multifunctionals. More…

Security beyond printers and copiers


August 19, 2010 by Sam Narisi

While security issues involving printers and copiers have gotten a lot of press lately, there are other devices companies would be wise to consider when revamping security plans. More…

Sex scandal lands Hewlett-Packard in turmoil


August 18, 2010 by Steve Hannaford

Hewlett-Packard’s latest woes have nothing to do with its technology prowess or market position. But a shakeup in the world’s largest printer manufacturer and PC maker certainly has caught the attention of the industry. More…

Security firm: The bad guys are winning


August 17, 2010 by Sam Narisi

Folks in charge of protecting IT security will often vent that they’re fighting a losing battle. But when a company that sells security products says it, it means a lot. More…

New drives enhance copier-MFP security


August 17, 2010 by Steve Hannaford

Disks on multifunctionals have been in the news lately. It’s become clear that data thieves can target drives on used computers, which often contain data from caching printed pages. More…

Study: Antivirus programs can’t be trusted


August 16, 2010 by Sam Narisi

All businesses use antivirus software to keep malicious programs off the company network. But a study shows why those applications should just be one part of an over-all security strategy. More…

5 tools for browser security testing


August 13, 2010 by Sam Narisi

A secure browser is often the first line of defense for a company’s network security. Here are some tools that can help find and fix security holes. More…


advertisement


Whitepapers

  • How to Select a Web Host
    November 27, 2011 by marketing

    Creating a new website?  Not sure how to choose from among all the options?  Need shared hosting, small business hosting, or VPS hosting?  Lots of email accounts? 5-star reliability rating? Fortunately, there’s information available to help. The Best Web Hosts is great resource that will help you select the best web hosting company. It features reviews, rankings, and definitions that can help make your job of selecting a new web host more effective.

  • SMART Steps Towards Workload Automation
    January 19, 2010 by Luke Marchie

    Consolidating job scheduling into a single, comprehensive workload automation solution is a critical first step to effective Workload Automation (WLA).

    Download the free whitepaper here! More…

  • Identifying and Thwarting Malicious Intrusions
    January 12, 2010 by Luke Marchie

    Identifying and Thwarting Malicious Intrusions

    The phenomenal growth in social media has opened the door for all new malicious intrusions from gangs of cyber criminals. Utilizing the trusted relationships in social networking and benefiting from immature security and content controls, hackers are seeing increased performance in their attacks.

    Download the free whitepaper here More…

  • The Security Issues with Web 2.0
    January 12, 2010 by Luke Marchie

    The collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. With these technologies come new types of attack vectors.

    Download the free whitepaper here

    More…

  • Network-Critical Physical Infrastructure: Optimizing Business Value
    December 29, 2009 by Luke Marchie

    To stay competitive in today’s rapidly changing business world, companies must update the way they view the value of their investment in Network-Critical Physical Infrastructure (NCPI). No longer are simple availability and upfront costs sufficient to make adequate business decisions. Agility, or business flexibility, and low total cost of ownership have become equally important to companies that will succeed in a global, ever-changing marketplace.

    Download the free whitepaper here! More…

  • The New World of eCrime: Targeted Brand Attacks and How to Combat Them
    December 26, 2009 by Luke Marchie

    Nothing is more valuable to a business than its reputation. That is why brand attacks, which leverage a company’s valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they’re being launched with new and rapidly evolving exploits, including phishing and—most recently—malware.

    Download the free whitepaper here! More…

  • DDoS: The Mother of All Cyber Threats
    December 16, 2009 by Luke Marchie

    DDoS: The Mother of All Cyber Threats

    Don’t wait until your business is targeted. A Forrester Consulting study commissioned by VeriSign revealed that nearly 75 percent of the 400 study respondents have experienced one or more DDoS attacks in the past year. Yet, most e-commerce businesses are not prepared for a large-scale DDoS attack. Could your business afford three or more hours of downtime? Avoid that revenue loss by registering for this free white paper

    Click here to download the free white paper More…

  • View more offers


    Quick Vote

    • Does your office have a color printer or copier?

      View Results

      Loading ... Loading ...

  • advertisement