|Doctors hate doing data entry. The faster it is to put in the data, the better the system from a doc’s perspective. The rub is that the most flexible and intuitive record to use is a blank sheet of paper.
Dr. Peter Deane, as quoted in Implementing EHR technology is easy; physician buy-in can be hard
Today’s WhatIs.com Word of the Day is computerized physician order entry (CPOE)
Because data entry is the principal point of conflict, what is the best method of data entry? Despite such technologies as handwriting recognition, speech recognition, touch-screen and stylus, the traditional pairing of keyboard and mouse is still the fastest and most reliable input method…
|Part of what we want to do in the government is to not just terminate projects but make sure we turn them around so they deliver on their business cases.|
Government 2.0 could just be called Government BPM but it’s not as sexy or glittery in a headline. Also, Government BPM sounds kind of medical…blood pressure management? Although in a real sense, that’s exactly what it is. Getting information to flow throughout the government in a healthy, manageable way. The technology is just a means to an end. It also sounds a little like bowel movement though, and that’s not good. Better stick with Government 2.0 and leave everyone trying to guess what exactly it is.
The TechStat initiative brings OMB officials and agency leaders together for in-person meetings to review IT Dashboard results and feedback from citizens. After a TechStat session, OMB takes action on underperforming projects by canceling, halting or overhauling them.
I wonder if there’s any authority behind TechStat. Need to find out. Can they pull the plug on funding? Or is it just a PR move to keep citizens happy and scare IT project managers into getting their act together or pulling the plug themselves?
Today’s WhatIs.com Word of the Day is Trusted Internet Connections. The United States government would like to limit the number of public Internet connection points to 50, with each Agency having approximately two gateways.
|NASA would like to note that future guidance and configurations must keep pace with industry updates in common operating systems and applications. The FDCC technical guidance and policy releases tend to lag behind software releases. In order to remain relevant and viable, FDCC technical and policy development must advance at the pace of Federal Agency procurements of new commercial software.
Linda Cureton, Chief Information Officer, Agencies Need to Implement Federal Desktop Core Configuration Requirements
Today’s WhatIs.com Word of the Day is Federal Desktop Core Configuration (FDCC).
|“What is different is that we’re going to have comprehensive coverage across federal networks, and that all the information about potential intrusions or malicious code will flow to a central point, the U.S. Computer Emergency Readiness Team at DHS.”
Robert Jamison, as quoted in Analysis: Einstein and U.S. cybersecurity
Today’s WhatIs.com Word of the Day is EINSTEIN.
|In all the fervent testimonials to the benefits of automated and optimized medical practice, the panel seemed to be glossing over a roadblock familiar to CIOs of any industry: users who might not cotton to an automated system.|
Today’s WhatIs.com Word of the Day is Amalga
Today’s WhatIs.com Word of the Day is MultiSpeak.
WIN Energy chose MultiSpeak as the vehicle to enable a Best of Breed strategy and optimize the way the cooperative does business. WIN Energy can now select the various software technologies that are the best fit for the utility and, as long as the software packages are MultiSpeak compliant, they will function together regardless of software version upgrades. WIN Energy’s first MultiSpeak implementation between its accounting system, NISC’s CAPSXL+, and its automated field staking package, MiniMax’s StakeOut, was both highly successful and its first step towards a truly system-wide approach.
I really liked the PowerPoint on Transparency and Open Government put together by SanFrancisco’s CIO Chris Vein and CTO Blair Adams. The show is interesting visually and they do a great job documenting how the city/county of SanFrancisco is addressing challenges.
Here are their 8 Principles for Gov 2.0
– All public data are made available. Public data are not data
that are subject to valid privacy, security or privilege
– Data are collected at the source, with the finest possible
level of granularity, not in aggregate or modified forms.
– Data are made available as quickly as necessary to preserve
the value of the data
– Data are available to the widest range of users for the
widest range of purposes.
• Machine Processable
– Data are reasonably structured to allow automated processing.
–Data are available for anyone, with no requirement of
–Data are available in a format over which no entity has exclusive
–Data are not subject to any copyright, patent, trademark, or
trade secret regulation. Reasonable privacy, security and privilege
restrictions may be allowed.
Am looking at conferences to see if I can pick out trends.
e.Republic posts speaker slides from their conferences after the event is over. I think the slides provide an interesting peak behind the curtain.
GTC Southwest: The Texas Digital Government Summit 2010
California CIO Academy 2010
|You can’t telework with paper. We need to get to where we can work on documents on a screen. Did you ever see anyone on ‘Star Trek’ carrying a clipboard? We need to get to a point where there’s no need for a desk except as a place to put your lunch.
Wayne Leiss as quoted in The future of telework technology: A wish list
Wayne Leiss is chief information officer at the Treasury Department’s Office of Thrift Supervision.
Other items on the wish lists of telework managers include:
– The ability to share documents and edit jointly, and large screens to keep the documents readable.
– Better virtual private networks and more use of them.
– A wider array of options for devices, including a range of laptop computer screen sizes.
– Access to applications based on individual needs rather than enterprise-wide delivery.
Security is key. You need two-factor encryption, you need hard drive encryption