FHIR and Where It Came From

Understanding FHIR and its Development! Below is an excerpt from a paper that I wrote for one of my cybersecurity and networking courses in university.             FHIR, or the Fast Healthcare Interoperability Resources, is a data exchange standard that has recently seen much implementation and adoption within the healthcare community….

Why Does Healthcare Suck at Protecting Stuff?

It’s still happening. And I don’t foresee it letting up anytime soon. It’s still happening. Despite all of the healthcare data breaches that occurred in 2015, which gave it the name of the “Year of the Healthcare Hack”… it seems that we may be looking into changing that title into a period… a time period…

Enjoying the Journey of Learning

Joy of Knowing and the Joy of Learning Real talk. Keepin’ it hunnit. This is something that I’ve wanted to write about since coming to college because I know just how relevant it can be. Although it’s been something that I have struggled with for many years now, it’s something that I think is the…

Data Lake – Differences from Data Warehouses

Comparative Differences! As I mentioned before, data lakes take in all data in its raw form. As a result, this can make it a bit more time intensive and resource consuming in perform analytics on the data in the lake, but it also increases in versatility and flexibility. Because a data warehouse essentially profiles business…

A Data Lake? They’re Getting Bigger!!!

Data Warehouse Down, Data Lake Up Next! As soon as I thought we were done, I hear of data lakes. Oh woe is data… I thought everything was good, I had wrapped up my series on data warehouses and I was slowly working on topics more foundational and basic to my knowledge so far. I…

B2B – Understanding Modems and Routers

Asking the age old question. Which box do I restart for the internet to start again? A simple explanation for a perplexing dilemma. What box do I have to power cycle? For far too long, or at least longer than I could care to admit, I never really understand the difference between a modem and…

B2B – Digital Signatures and Certificates

Understanding Digital Signatures and Certificates The second Back2Basics post, this time covering how the CIA triad is applied and what comes of it. We know of the CIA triad when it comes to security, but there are additional things that must take place to ensure that the documents came from the correct person as well….

Back2Basics (B2B) – The CIA Triad

Understanding the importance of the CIA triad If you just had to learn something, just know the letters CIA are important in information security. In all things information security, one of the most basic yet foundational concepts is the CIA triad. Now, I could go off into a pun and little short story about “No……

Oh Look! Presidential Views on Healthcare

Why isn’t healthcare coming up more among the presidential candidates? Election time is creeping closer by the day, but all talks on healthcare have basically been radio silence in comparison. What gives? With this upcoming presidential election, I was a bit confused as to why healthcare was being ignored. In the past two elections, healthcare…

Mobile Health Security – An Impending Threat

Mobile Health Platform Vulnerabilities? Still? After everything, after all of those attacks, and news outlets about data breaches. All the doodads about the need to strengthen organizational security and training users to be more educated and aware about attack vectors on computers and what not, the ball was still dropped when it came to mobile…