Author Archives: Kelly Brown

About Kelly Brown

An IT practitioner by education and trade and an educator by good fortune.

Sick of All This Data!

Stethoscope on laptopIt appears that there is a gap between the available information technology within healthcare and the adoption of that technology. What is behind this gap? Are health care professionals simply too busy to take advantage of new technology or are the current healthcare privacy laws preventing us from using networked information tools to their fullest?

History

We have been applying technology to healthcare and disease prevention for centuries but it is only in the last fifty years that we have applied technology to healthcare information collection and dissemination. The pace of introduction and adoption is accelerating and that is causing problems with healthcare professionals and healthcare IT professionals. On the one hand, the introduction of sophisticated healthcare record management applications brings a welcome relief to an industry facing increasing privacy and record management regulations but, at the same time, it is coming on top of an already full workload. How is a healthcare professional supposed to find the time to learn and master the new systems? What is the role of the healthcare IT professional? Are we doing all we can to simplify systems and interfaces in order to accelerate adoption?

Electronic Health Records

According to the Health Information and Management Systems Society, “The Electronic Health Record (EHR) is a longitudinal electronic record of patient health information generated by one or more encounters in any care delivery setting.” This includes information on past interactions with healthcare providers as well as current and past medication history. The aim is to make this information available through an electronic interface to any healthcare provider, whether a patient is seeing their primary provider or whether they become ill while vacationing in a foreign land. With great information, however, comes great responsibility, and thus legislation such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). This creates the tension of providing available medical records through a secure and responsible infrastructure to strained healthcare providers who don’t have additional bandwidth to learn new systems and interfaces.

Interoperability of Health Care Records

Health IT will not achieve the predicted savings and efficiency until technology is more widespread and readily adopted according to a new Health Affairs report. Part of the issue of full adoption has to do with interoperability of health records. Right now, there is not a single standard for sharing health information, and vendors do not have a strong incentive to create a standard. If we couple difficult-to-use technology with the fact that a provider cannot see the full patient history across various health interactions, it is no wonder that health care professionals are reluctant to jump on board and embrace this exciting yet uncertain future.

The question then becomes: what can we do to accelerate the adoption rate of new healthcare technology and systems in order to make record keeping and retrieval easier for everyone?

 

About Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.

Am I in Heaven Yet?

shutterstock_127066418Cloud computing has been a buzz-word for a number of years now. Perhaps because it is such a nebulous/ethereal term (cloud?) that has been used to describe a number of different configurations and scenarios. You are most likely using some sort of cloud computing already but it is worth asking the hard questions to make sure you have the basics covered.

History

Cloud computing refers simply to the fact that your application or data is no longer on a computer that you can touch. It is hosted in a remote computer room in another city, another, state, or another country. In the “cloud”. What brought about this change, and why haven’t we always done it this way? One of the big reasons is the rising abundance and speed of networking. It used to be that your computer or terminal was tied directly to the computer in the computer room. Through better networking technology, the machine in the computer room and the computer in your hands became further and further separated until it was no longer necessary to have a dedicated room in every building. Better network security schemes has also increased this geographic gap.

Is cloud computing all tea and roses or are there still some lingering concerns? Think about these issues when creating or expanding your cloud computing strategy:

Security

If you contract with a large service provider such as Google or Amazon or IBM to host your application or data, your confidential information will be sitting in the same data center as another customer or perhaps even your competitor. Is the “wall” around your data secure enough to keep your information confidential. When your information is traveling to and from the data center over the network, is it secure? Has it been encrypted for the trip? Do you trust all of your information to the cloud or just the non-critical pieces?

Scale

Is your application and data usage large enough to warrant cloud computing? If you are a small company or non-profit agency, the setup for hosting your applications and data may swamp your entire IT budget. Some application service providers only cater to large customers with millions of transactions per month. If you don’t fall into that category then perhaps your IT person is just what you need. At the other end of the scale, some small companies or agencies use free services such as Dropbox or Google Docs. If this is the case, then check your assumptions about security.

Applications

Some applications such as customer relationship management (CRM) or simple e-mail or backups may be easily offloaded to another provider. Other applications may be complex or proprietary to the point where it makes more sense to keep them closer to the vest. They might still be a candidate in the future as you peel back the layers of legacy and move toward standard applications.

These are all questions to consider when formulating your cloud computing strategy. It can be a real cost savings to offload your computing to another provider but without careful consideration, it can become a complexity you did not bargain for. What keeps you up at night in terms of your cloud computing strategy?

 

About Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.

To BYOD or not to BYOD

shutterstock_128593868Bring Your Own Device or BYOD is a hot topic these days, but what’s the big deal? It seems that everyone has their own smartphone/pocket computer. We learned to deal with the Blackberry years ago. Why not blur the lines between consumer technology and business technology? Can’t we all just get along? While it may seem that your IT department is the very embodiment of Dilbert’s Mordac, The Preventer of Information Services, there is a very good reason why they are cautious and you should be too.

Security

The device belongs to the employee but the data belongs to the company. Mobile devices are great for extending our workflow, our workday, and for keeping us in constant contact. In the midst of all of this work, wherever it may happen, an employee will most likely pass company data through their mobile device, either for viewing, editing or storing. Company confidential information is worrisome enough but what about personally identifiable information (PII) belonging to your customers? Is every mobile device protected by a PIN? Is data encrypted on your device while at rest? Is data always encrypted while transiting over the network? How are employees sharing data? Over the cloud? Whose cloud? There is a lot to think about when deciding on a BYOD policy and deciding whether to allow personal devices to access your network. Bill Ho, president of Biscom has created a list of security items to consider when creating a BYOD security policy.

Platform

As the number of IT personnel has shrunk through cost cutting and rightsizing, the number of smart devices and platforms has exploded. Blackberry used to be the only game in town, but now we have Apple iOS, Android, Windows Phone, WebOS and other platforms with fun version names like Ice Cream Sandwich and Jellybean. Further up the stack, there are apps that have their own security issues. The sheer combinatorics of it all would cause any IT professional to run screaming for the network closet. To do justice to a solid BYOD policy, an organization would need at least one full time person to monitor platforms and applications that are accessing the enterprise systems. Do you have that kind of manpower? Is there a middle ground without compromising information security mentioned above?

Compatibility

Another consideration is the compatibility of all of these different devices and platforms and mobile applications and your corporate applications. Will X always talk to Y? Does it cause the IT department to scramble to get your unique permutation working for you? Is it worth the effort for your personal productivity?

Good News

There is a lot to consider when deciding to embrace BYOD. On the upside, it can extend the productivity of employees as long as security and compatibility concerns are adequately addressed. The good news is that there are tools available to help you manage mobile devices. You can find solutions from IT service providers such as IBM and Dell or from security providers such as Symantec and others. These applications can help you reach the right level of availability, convenience, and security in order for your employees to maximize their productivity and help you sleep at night.

Do you have a comprehensive BYOD plan? Is it working? What keeps you up at night?

 

About Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.

The Dilemma of the Capable

shutterstock_11794999I read an article recently by Greg McKeown—The #1 Career Mistake Capable People Make—about our inability to prioritize our work in order to maximize our contribution. His premise is that when capable people shine, they are noticed and sought after and put on a LOT of different projects but then their effort gets diluted, because they are capable, and they fail to realize their highest point of contribution.

It made me think of my own life and career and I wonder if I fall into the same trap? I shared an object lesson around time priorities at a recent graduation. If you consider your time as an empty jar, you can fill that time with family, friends, career, school, faith, personal fitness, etc., as represented by large rocks filling the jar. Now, it may appear as if the jar is full, but in truth there are still some pockets that could be filled by smaller rocks representing less important things in our lives such as hobbies, leisure activities, volunteer activities, etc. Again, it appears that the jar now is full but there is room still for some even less important activities such as games, reading, shopping, etc., represented by sand, or even water.

It seems that no matter how much we fill our lives and our time, there seems to be room for more, but should we really take on that seemingly unimportant task, just because we are capable? Or should we instead focus on our “big rocks” and strengthen our career and our personal life. On any given evening or weekend, my “small rocks” seem to conflict with each other. This may be a sign that I am trying to fit too much in my jar and not focusing on the few important things that can help keep me moving forward. I have heard it said that you can go broad or you can go deep but not both. You have to choose.

Do you ever feel you are not reaching your highest contribution, just because you are that capable person that everyone wants on their team, on their project, on their committee or board? How do you focus on those important things that can make you stand out and make your life and career fulfilling?

What is important in your jar? What is it that makes you stand out? What strategies have you found to help you focus on those things? Share your thoughts.

 

About Kelly Brown

Kelly Brown is an IT professional, adjunct faculty for the University of Oregon, and academic director of the UO Applied Information Management Master’s Degree Program. He writes about IT topics that keep him up at night.