Slow Healthcare Costs by Digitizing Healthcare
The United States spends around 17-18% of its GDP on healthcare every year.
When you put this into dollar numbers, it is a mind-boggling $2.9 trillion.
Unfortunately, that spending will grow at a faster rate now due to baby
boomers becoming an aging population, and they are the largest demographic in
the U.S. (Baby boomers are about 76 million, which accounts for 25% of the
population of the U.S.). The healthcare related spending is expected to grow
at a faster pace than the under 5% annual rate it grew over the last decade.
Unless the U.S. gets this spiraling healthcare spending under control, in a
few short years we will be spending almost 25% of our entire GDP in
healthcare trying to fix people’s failing health, instead of spending it
somewhere else where it is desperately needed. Obviously, we can’t stop the
aging po... (more)
If you missed my Part 1 of this article, you can read it here when you get a
As a continuation to part 1, where I discussed the issues with Data
Protection, we will explore how to solve some of those issues in this
People tend to forget that hackers are attacking your systems for one reason
only – DATA. You can spin that any way you want, but at the end of the
day, they are not attacking your systems to see how you configured your
workflow or how efficiently you processed your orders. They could care less.
They are looking for the golden nuggets of info... (more)
Nowadays every single CIO, CTO, or business executive that I speak to is
captivated by these three new technologies: Big Data, API management and IoTs
(Internet of Things). Every single organizational executive that I speak with
confirms that they either have current projects that are actively using these
technologies, or they are in the planning stages and are about to embark on
the mission soon.
Though the underlying need and purpose served are unique to each of these
technologies, they all have one thing common: they all necessitate newer
security models and security tools to... (more)
By Andy Thurai (Twitter: @AndyThurai)
(Original version of this blog appeared on ProgrammableWeb)
As promised in my last blog “Big Data, API, and IoT …..Newer technologies
protected by older security” here is a deep dive on Big Data security and
how to effortlessly secure Big Data effectively.
Like many other open source models, Hadoop has followed a path that hasn’t
focused much on security. In order to effectively use Big Data, it needs to
be secured properly. However if you try to force fit into an older security
model, you might end up compromising more than you think. But if... (more)
Kin Lane recently wrote a couple of blogs about why copyrighting an API is
not common. I couldn’t agree more that copyrighting APIs is uncommon. First
of all, the API definition is just an interface (It is the implementation
detail that is important, and needs to be guarded), so it doesn’t make any
sense to copyright an interface. (It is almost like copyrighting a pretty
face ). Secondly, the whole idea of exposing an API is you are looking for
others to finish the work you started by just providing the plumbing work.
Why would anyone want to get involved with a copyrighted API a... (more)