Hippogriffs and HIPAA: Securing Data in Healthcare Applications
One of the best parts of science fiction and fantasy stories is the travel. When you climb into the Millenium Falcon, a retrofitted Delorean, or even on a flying “hippogriff” in Harry Potter, you can’t help but wonder, What will travel be like in the future? (Ok, the hippogriff might be a stretch). Yet for... Continue reading
Password Management: 5 Best Practices for Compliant Environments
Good security habits can sometimes feel like extra work – like when you have to jump out of bed to ensure your doors are locked, two seconds after you’ve clicked off the light. Why do you do it? Because you know the little extra effort isn’t too high a price for keeping an intruder out,... Continue reading
Snapshots and Business Continuity
The third in our series on business continuity for healthcare. by Stephen Trout On the old adage, “a picture is worth a thousand words,” there seems to be a thousand variations on a theme. Take the Russian writer, Ivan Turgenev: “The drawing shows me at one glance what might be spread over ten pages in... Continue reading
Titanic Disasters, Business Continuity, and Kubernetes!
The second in our series on business continuity for healthcare. by Stephen Trout When the ill-fated passengers of the Titanic agreed to an exciting ocean voyage, we understand how they might’ve taken a few things for granted – business continuity-wise. They’d been hearing, after all, that this new colossus of a ship was “unsinkable” –... Continue reading

