People who are the victim of stalkers have a startlingly different cybersecurity risk profile. I heard the idea articulated.
Cyber Principles for the Victims of Stalkers

Healthcare Data Journalist
People who are the victim of stalkers have a startlingly different cybersecurity risk profile. I heard the idea articulated.
Please forgive my use of a four-letter word. But it is central to my overall point, as I hope.
So I wrote a post supporting the notion that Facebook could do some good by integrating with hospital data..
(Update May 2019.) Publishing this article was part of what started my recent investigation into Facebook’s cybersecurity and privacy.
I have not been able to find simple plain-language descriptions of what the Cascading Configuration Design Pattern is. And.
This week I went to the Harris Health Ben Taub ED because I was passing a kidney stone. I.
Here are my thoughts on how self-driving cars related to healthcare. In no particular order. First, it is very.
(Update: Less than four hours after tweeting out this blog post, we got our access turned back on. So.
I just realized that my somewhat infamous question at the ONC annual meeting is recorded on video! The background.
Libel, like copyright, is one of the central legal frameworks for governing online activities. It sets the bounds for.