Medical device security trends
Hot spots for medical device software security I think that 2011 is going to be an exciting year for medical device security as the FDA gets more involved in the approval and clearance process with software-intensive medical device vendors. Considering how much data is exchanged between medical devices and customer service centers/care givers/primary clinical care teams and […]
The security of open source software
A conversation with a client this morning revolved around software development tool alternatives in an environment of Web Socket. Why not use Flash on the client and AMF on the server side?, the client asked. I hesitated for a moment and answered – because Adobe is proprietary and closed source and the only developers looking […]
Imperfect knowledge security
Keeping the organization robust in a highly dynamic threat environment Our capacity to predict will be confined to . . . general characteristics of the events to be expected and not include the capacity for predicting particular individual events. . .Yet the danger of which I want to warn is precisely the belief that in […]
Open source trumps closed access
The comparison between an open source collaborative recommender system and a closed access research effort is revealing – the open source project is already implementing production grade systems and the closed source research project can allow us to read their article for a fee. The Apache Mahout/Taste version 0.1 open source software project is being […]
Data discovery and organization
The problem is that you know where you start, you don’t know where you finish and you will always have trouble organizing the useful references you collect on the way. After a call with a client, I started investigating how to provide high value scientific data in a social network for doctors and medical representatives […]
Open Access publishing
The GM of a prospect recently asked me how to control disclosure of internal research documents prior to publication. It had come as a revelation to him that anyone can post on a blog without permission from a central secretariat. I asked him how they control face-to-face information exchange with colleagues or competitors outside the […]
BizSpark
I just got an invite to Bizspark from thefunded.com “Microsoft® BizSpark™ is a global program designed to help accelerate the success of early stage startups by providing key resources “; basically free development software and a hook into a community of potential investors. A lot of the comments on techcrunch were of a religious nature, calling […]
Social networks, not branded networks
Apparently people in a social network like Facebook don’t mind the ads but they would not join a branded group according to this article Social network users reluctant to join branded groups Less than one third of social network users would be willing to join a brand’s group even with the offer of exclusive or […]
A great year for data thieves
The Verizon Business Report on data breaches 2009 was released – the data breach investigations report headlines with 285 million data records breached in 2008: 91% of attackers were organized crime 74% of attacks by malicious outsiders 67% of vulnerabilities due to system defects 32% implicated business partners The report must be particularly disturbing to […]
Changes in pharma sales
Poland is leading the way in Europe with a new law enacted as of December 1, 2008 that prohibits medical representatives from visiting doctors during business hours. Reps are a good source of spoon-fed science for docs, not to mention the free samples and perks at conferences. However – over 90,000 doctors in Poland have […]