Superb Internet Facebook Superb Internet Twitter Superb Internet Google Plus Superb Internet printerest Subscribe to Superb Internet's blog RSS feed

7 Strengths of Technology That Will Improve Healthcare

  • Technology

Health Care Tech

  • How our Healthcare Measures Up
  • Ability to Understand Large Datasets
  • Access
  • Education
  • Popularity
  • Sophisticated Incentives
  • Reframing Insurance
  • Meaningful Innovation
  • Your HIPAA-Compliant Partner

To put it mildly, the American healthcare system is not in good shape. Analysis published last year by the Commonwealth Fund showed the US coming up dead last for the 11th straight year when pitted against the quality of healthcare in 10 other developed countries. The nations ranked as follows:

  1. United Kingdom
  2. Switzerland
  3. Sweden
  4. Australia
  5. Germany
  6. The Netherlands
  7. New Zealand
  8. Norway
  9. France
  10. Canada
  11. United States.

Even though the quality of care in the United States isn’t keeping up with the rest of the world, each of us spends more on average than people in most of those other countries do. For comparison purposes with the above, here is the top 11 countries in terms of the amount per capita spent on healthcare:

  1. Norway – $9715
  2. Switzerland – $9276
  3. United States – $9146
  4. Luxembourg – $7981
  5. Monaco – $6993
  6. Denmark – $6270
  7. The Netherlands – $6145
  8. Australia – $6110
  9. Canada – $5718
  10. Sweden – $5680
  11. Austria – $5427

Despite all the spending, many Americans are unhealthy – with the CDC estimating that the majority of us suffer from chronic illnesses.

What can technology do to change these trends and bolster the quality of US healthcare? Or should we all move to Sweden?

Strength #1 – Ability to Understand Large Datasets

Many providers and other healthcare companies are aggressively strategizing in the area of big data. “[I]t’s key to every stage of the system — from research and development, to disease monitoring and treatment, to patient care,” says health writer Lyndsey Gilpin. “With IoT technology, sensors, and real-time analytics, doctors and researchers can more accurately understand their patients and better customize care.”

Strength #2 – Access

Access has long been considered a weakness of the American healthcare system. Telemedicine such as videoconferencing will allow people to get access to doctors regardless where they are, getting the professional expertise they need for ongoing treatment with no need to drive to the practice.

Strength #3 – Education

The way that medical school is organized in the United States is that doctors are trained for four years, two of that scholarly and the other two in a residency. The academic model has not kept pace with the technological innovations of the healthcare industry.

Now in 2015, though, education is in the process of rapid transition. “[T]he American Medical Association’s Accelerating Change in Medical Education is funding $1 million to each of 11 different schools to help fund new programs,” explains Gilpin. “Some schools are offering classes that use tech to look at disparities in access to care or how tech can help physicians give patient care.”

Strength #4 – Popularity

A 2013 study from Deloitte found that 73% of doctors think IT will bolster care quality. As physicians and hospitals are investing in more IT services, more people are being hired in the health IT field, with the job market expected to rise 20% by 2018. With more providers using EHRs, doctors are also better able to share information. In fact, one study found that primary-specialist consultations are the top use of videoconferencing telemedicine apps.

Strength #5 – Sophisticated Incentives

An extraordinary proportion of Americans are obese: 1 out of every 3 adults, and 1 out of every 5 kids. As those numbers have skyrocketed, employers now spend $6 billion annually on workplace wellness initiatives.

Although the obesity figures are disturbing, technology could create the perfect storm to combat it. Growth of the corporate wellness industry “comes at a time when fitness trackers and health apps are extremely popular with consumers,” says Gilpin. “It’s creating an ecosystem that can hopefully lower obesity rates, preventable diseases, and potentially the costs of healthcare.”

Strength #6 – Reframing Insurance

While Obamacare is certainly not universally loved, it has had one effect that seems to be objectively positive: the uninsured population dove from 22% to 15% in 2014.

Many people (some of whom don’t sell insurance for a living) are still concerned about that uninsured population. One example is the creators of an app called Oscar. The developers created an environment in which consumers can input their symptoms, discuss them with a physician, and track their medical data over time. Insurance quoting is integrated with the system.

Strength #7 – Meaningful Innovation

Many of the general technologies that are being designed are games and other entertaining gimmicks. In the area of healthcare, though, innovators have the power to actually save lives.

Two organizations are allowing IT specialists to perform work for the greater good. Significant Labs creates an environment in which people with strong technological skills can use them to provide assistance to the poor, while Not Impossible Labs create applications with open-source software to solve real-world problems.

“The ideas behind these organizations are key to creating better solutions that can really impact people,” says Gilpin.

Your HIPAA-Compliant Partner

For good reason, no healthcare company wants to work with a tech provider that isn’t fully compliant with both HIPAA and HITECH. Our multi-layered security platform, combined with an enterprise-grade hosting environment, helps protect your PHI data and allows your hardware, software, and databases comprehensive security. View our certifications.

By Kent Roberts

The Insight-Driven Animal House [Big Data Cheat-Sheet]

  • Business Talk

Animal House

  • SMB’s Investing More in Big Data
  • Now, Just How Big is this Data?
  • Is it a Warm Pool or a Scary Data Dump?
  • The Insight-Driven Animal House
  • Big Data Cheat-Sheet
  • Accelerate & Engage with True 100% HA Cloud

SMB’S Investing More in Big Data

According to analyst outfits the SMB Group, less than 1 in 5 small businesses (18%) and a slight majority of midsize firms (57%) benefit from what many consider to be the biggest fruits of cloud computing, big data analytic insights.

What is going on with the businesses that are not adopting this technology? Are they making a wise choice not to invest until the industry is better established, or are they falling dangerously far behind their competition? Well, as you get more granular, it’s obvious that refined, laser-sharp intelligence is more critical in certain industries than others. Plus, even though cloud computing has made sophisticated solutions more accessible, small companies may not feel they have the money available for a test project. Others might not feel that they have adequate expertise or additional funds for consultants.

There’s a common misconception held by many small business owners and managers that big data is too technologically sophisticated or expensive for the organization. However, it is not really as complicated as it first seems, and the reward can be a significant competitive advantage.

Now, Just How Big is this Data?

There are 17 officially recognized sectors within the United States market. Already back in 2011, in 15 of those 17, large enterprises retained an average of 235 TB of information – more than the entirety of the US Library of Congress. Let me repeat that: already a few years ago, the average American company with a staff of 1000+ individually possessed more data than the organization established by the federal government to retain all critical knowledge – the largest library in the world.

“Reams of data still flow from financial transactions and customer interactions but also cascade in at unparalleled rates from new devices and multiple points along the value chain,” explains a 2011 McKinsey report. “[S]ensors embedded in process machinery may be collecting operations data, while marketers scan social media or use location data from smartphones to understand teens’ buying quirks.”

Fast-forward to today, and we see that despite the reluctance from many smaller firms and a fair portion of midsize ones, investment in data projects averages $7.4 million for 2015, with enterprises alotting $13.8 million and SMBs spending $1.6 million on average.

Is it a Warm Pool or a Scary Data Dump?

How accessible has big data become? Some tools are now free. Obviously you can invest more and get more sophisticated, but this field is far from impenetrable.

What if you were to take all of your available data and use it to guide decisions made by your employees as they go about daily business?

By using these tools, says technologist John Mason, “smaller businesses can take advantage of their speed and customer proximity and, combined with new data insights, really be game [changers].”

As of 2013, especially since the third platform has developed, with mobile and the Internet of Things propelled forward by cloud computing, the IT systems across the planet are creating over 2.5 billion GB of information daily.

That data may be better growth fuel than anything else. Your data can be structured (database info) or unstructured (live chat transcripts, Facebook interaction). In order to make your data actionable, you need analytics – whether developed by a data scientist specifically for your organization or using analytics programs produced by vendors.

The Insight-Driven Animal House

A great example of data analytics working at a firm with under 100 employees is the success of the Point Defiance Zoo & Aquarium of Tacoma, Washington.

“The zoo used big-data analytics to uncover patterns and trends in its data to help drive its ticket sales and enhance visitor experiences,” notes Mason. “As a result, Point Defiance Zoo’s online ticket sales grew more than 700 percent in one year.”

Big Data Cheat-Sheet for SMBs

If you want to build a system to analyze big data using a cloud computing virtual machine, here is a quick cheat-sheet:

  • Set a plan. What resources do you have, what do you need, and what are your objectives, both broad and granular?
  • Get an overview of your info. You want to figure out what you have. Assessment is key. List everything. You just want an inventory.
  • Categorize in terms of value. What data could give you the most important insight?  Pay special attention to the notion of engagement.When diving into your data,” Mason advises, “think about  how to drive top-line revenue growth by using data to find new customers and partners and deliver  real-time value to them in unique and unexpected ways.”
  • Look at options. The tools you choose, such as the cloud hosting provider, will be essential – especially regarding speed and true 100% HA (see below).

Accelerate & Engage with Rrue 100% HA Cloud

Why do you specifically need Superb Internet for your cloud hosting solution to drive your big data analytics? We don’t just deliver insights. We deliver them with benefits of local disk I/O that only distributed storage combined with Infiniband can bring.

Fact: our true 100% HA cloud machines scores actual performance metrics that are typically 4 times better than AWS and SoftLayer for similar VM specs.

By Kent Roberts

The Greatest Vulnerability in your Network: Users

  • Network
  • Security

vulnerability

The most thorough firewalls are useless against oblivious users, who are duped into inviting malware and spyware onto secure networks. Users are, more often than not, the biggest weakness in your network’s security, and hackers are increasingly using social engineering to gain access to secure data.

Human Hacking

Social engineering, much like classic hacking, takes note of unintentional patterns and finds openings in otherwise secure environments. Human-hacking takes advantage of our unconscious decision making patterns to gain access to secure networks.

Trojan Horses

Hackers take advantage of our assumptions about what kinds of devices and hard media are “safe.” Even air-gapped networks are vulnerable to these trojan horses. For example, hackers will leave USBs with reconnaissance software on a reception desk or in the parking lot of a business, trusting that some good samaritan will plug it into a secure computer, to see if they can identify the owner. Meanwhile, the device is taking note of the network map and transmitting that information as soon as it is plugged into a networked computer. And of course, any company with a bring-your own-device policy is highly vulnerable. Even when personal devices for work use are prohibited, in air-gapped offices, employees itching for that email or Facebook fix often turn their cell phone into a hotspot to connect work devices, however briefly, to the internet.

Malware can also be hidden within files that appear to be legitimate communication. One famous hack involved a hacker posing as a conference photographer, taking pictures of attendees during social functions, and then sending out the photos with malicious code embedded in the images.

Clever Disguises

Some USBs are programmed to appear to the computer as another kind of external device, such as a keyboard, so they can enter malicious commands. CDs and DVDs of all kinds can also hide malware and spyware. Sophisticated hackers have even intercepted shipments of software CDs, hard disk drives and other devices, installed malware, rewrapped it–reproducing shrink wrapping, packaging,  etc.– and sent it along to be installed by unsuspecting IT pros. This malware infects the firmware of hard disk drives prior to the OS load, creating a secret storage vault that survives military-grade disk wiping, formatting, and encryption. Vendors that were impacted by this type of hack include Maxtor, Samsung, IBM, Toshiba, and others.

Another example of infiltration disguised as innocuous activity are viruses that impersonate a device’s network interface card so that when the user searches for password protected sites, it can redirect to a dummy site that records the password.

Prevention: User Policies

Given the variety of ways hackers exploit users, what can IT professionals do to keep a network secure? First, a strong, highly-enforceable acceptable-use policy is a must.  Include policies that govern email, websites, and social media usage. Consider disallowing external devices. Tie compliance with this policy to promotion, advancement, or pay raises. Some highly secure organizations terminate employees for breaching these policies.

To discourage employees from visiting dangerous sites, you can send out an email every week with a recording of their web usage. They’re likely to be more careful when they know they’re being watched.

Prevention: Admin Policies 

On the admin side, IT departments should insist on user-access control and never make average users admins. Limiting their access also limits the chaos unleashed by their lapses in judgement.

Finally, all network equipment that comes into the office, from hard disk drives to network interface cards, must got through the IT department. IT pros should look carefully to make sure tamper-proof packaging is intact, to help prevent compromised devices from accessing your data.

Byline: Leslie Rutberg is a tech and IT industry blogger for CBT Nuggets. This article was based on their recent webinar “10 Tips for Locking Down End-User Security.”

Spotlight on the FISMA Risk Management Framework (RMF)

  • Security

Check Mark

  • RMF Definition & Foundation
  • Framing Security in Terms of Risk – 6 Steps
  • The Amorphous Nature of the RMF
  • RMF Supporting Documents
  • Taking the Pain Out of FISMA Compliance

RMF Definition & Foundation

Risk Management Framework (RMF) is the name for a structured approach to implementing high security on any IT system used by the federal government, including those of hosting providers. An effort to better standardize best practices within the public sector, the RMF is an update of the Certification and Accreditation (C & A) model used previously by federal agencies, security contractors, and the Pentagon.

The Risk Management Framework is a crucial component to meeting the requirements of the Federal Information Security Management Act (FISMA compliance). Its core tenets are derived from reports issued by the Committee on National Security Systems (CNSS) and the National Institute of Standards and Technology (NIST).

“The selection and specification of security controls for an information system is accomplished as part of an organization-wide information security program that involves the management of organizational risk,” explains NIST, defining that term as “the risk to the organization or to individuals associated with the operation of an information system.”

Risk management is critical to security. The framework makes determining appropriate controls more efficient …, enhancing consistency (though modulated by specific attributes of individual systems) throughout the federal infrastructure.

Framing Security in Terms of Risk – 6 Steps

As its name suggests, the RMF positions understanding risk as central to establishing security. The framework follows a basic step-by-step process which is usable with newly adopted systems as well as anything currently in operation:

1. Determine the category

Via an impact analysis, figure out the risk category to which a system and its data belongs. “The security categories are based on the potential impact on an organization should certain events occur which jeopardize the information and information systems needed by the organization,” says NIST. “Security categories are to be used in conjunction with vulnerability and threat information in assessing the risk.”

2. Choose controls

The category tells you what security mechanisms are needed at a minimum. Adjust and bolster the controls as appropriate.

3. Adopt the new tools

Install the tools, keeping records of everything that you do.

4. Analyze

Analyze the controls to make sure that they have been installed adequately and are successfully performing the function for which they were selected.

5. Confirm

Confirm that the risk presented by the environment, with all security mechanisms installed, is acceptable for authorized use.

6. Continually monitor

Monitor the system as time goes on (with assessments, analyses, and notations of changes).

The Amorphous Nature of the RMF

The National Institute of Standards and Technology notes that the six core principles or steps of the RMF provide a nutshell understanding, while the specific rules and standards issued by NIST offer a more granular view on assessments and controls.

Like risk itself, the RMF is a bit amorphous – especially true of the supporting materials. Because of that, NIST notes that sometimes one paper will reference language in another paper that has been replaced with a new version.

RMF Supporting Documents

Here are the three major categories of general supporting materials, which point to more thorough reports:

  1. FAQ

The frequently asked questions take information from numerous papers to advise on the six core concepts. The FAQ questions all fit into one of four categories, according to NIST: “general information …, fundamental knowledge needed to understand and implement the activities …, guidance to help organizations prepare for and implement the step, and step-by-step guidance [for] applying the step to individual information systems.”

  1. Roles and Responsibilities Charts

These charts establish what’s happening with your people, identifying who is taking charge of certain aspects.

3. Quick Start Guides

Just like a brief, to-the-point manual that comes along with a new printer or shredder, these NIST publications are nugget overviews of the reports pertaining to each RMF step. There are multiple guides for all of the steps – one from a management perspective and others directed toward the main people who will be putting systems into place.

Standardly the entities that handle categorization (step 1), for instance, are the owners of the data and the office that handles IT security. To accommodate those different audiences, advice is provided to both party types in that literature.

While these brief manuals are intended to be helpful, they are limited in scope. “The Quick Start Guides provide implementation guidance and examples on how to plan for, conduct, and document the results,” says NIST. “While the guides provide examples and sample documentation, they are not mandatory nor do they prescribe required formats.”

Taking the Pain Out of FISMA Compliance

Do you need a FISMA-compliant partner? One way to reduce your risk is to work with Superb Internet. Our team of engineers and security technicians are available every day, all day, for consultations and assistance – working with you to secure your environment and to apply appropriate FISMA security controls.

By Kent Roberts

Some People Think Gamification is Dead

  • Business Talk
  • Marketing and PR

Gamification

Was gamification a trend that was overhyped? Some people now say it’s dead. What they really mean is that some companies never figured out how to apply it.

  • The Early Promise of Gamification
  • Gamification Over for Many Businesses
  • Big Game Successes
  • How To Do It Right

The Early Promise of Gamification

Gamification is the process of essentially turning everything into a game – applying the principles and structures of games to non-game contexts. In 2011, major analyst groups forecast that the gamification market was set to explode: M2 Research predicted that the industry would expand from $100 million to gamified application by 2014. Another group said that 7 out of 10 Global 2000 companies would deploy a gamified application by 2014.

These research groups were actually correct that the market would grow enormously: more than 350 high-profile projects of this type were launched between 2010 and 2014. However, many of these initiatives were unsuccessful. They simply weren’t strategized well.

Market penetration, explained Heather Clancy in 2014, was under 10%. “The pioneeers have applied these platforms to all manner of challenges, from encouraging consumers to use a new product or service more liberally to reshaping employee behavior or processes,” she said. “But without well-grounded goals, some high-profile early efforts have floundered.”

In other words, many enterprises backed off from investing in gamification, either botching a project themselves or skeptical after seeing the mistakes of others. Clancy thinks that gamification was overhyped, and certainly developers might have been too excited about turning everything into graphically rendered virtual-reality scenarios. However, gamification is still a way that some companies have outdone their competition.

Gamification Over for Many Businesses

One example of a gamification project gone wrong was an effort by Marriott Hotel Group. The company was excited about developing a knockoff of Farmville for employee training. The idea when that game was launched was to follow it up with numerous other gamified versions of apps, but that never happened.

In fact, Gartner forecast in 2012 that 8 out of every 10 game-inspired projects would be halted by 2013. It didn’t end up being that much of a mass exodus, said Gartner’s Brian Burke, but organizations are definitely reworking their strategies.

“[W]ith gamification today only a minority of projects can declare that the business objectives were achieved,” said Burke. “There are many reasons for this, starting with the lack of clearly defined business objectives, or focusing on the organization goals rather than the player goals.”

Big Game Successes

It’s easy to point at all of the missteps by organizations and define gamification in terms of its failures. The fact is that for many companies, turning applications into games worked out well. A prominent example of a successful project is Nike+, which allows anyone to save their fitness figures and measure them against their objectives. As of 2014, the site had almost 29 million users.

Notice what I emphasized in the last paragraph – the reason that this gamification effort worked so well is that it was fundamentally centered on user rather than organizational goals.

These applications haven’t just proven successful with consumers, though. When tech company Bluewolf decided they wanted their specialists to be more open with their knowledge and enhance branding via blogging and social media, they used gamification for enticement. Those who take part are also incentivized with a point system that can save them money on hotels and other services. The firm’s CMO, Corinne Sklar, said that it had succeeded incredibly:

  • 57% better internal sharing of information
  • 68% more social media views
  • 153% more blog articles.

How To Do It Right

You need the right strategy if you want gamification to succeed. What is that strategy? For starters, carefully define your business goals, consider various user profiles, and determine how to reach them (i.e., typically through sites or apps). “ The key component, though, is that the service or product you are promoting with the game is strong.

“You can’t have good gamification on average products and expect to get results,” said Badgeville CMO Chandar Pattabhiram. “Good icing can’t save an average cake.”

Some firms have realized that they can leverage gamification to better manage business-to-business interactions. WestJet created a game environment in order to better manage expenses. Similarly, American Express designed a game-enhanced system to allow businesses to better organize their travel.

By using games, both WestJet and AmEx are steering users toward preferred, discounted flights and lodging.

“You are starting to see travelers make their own decisions and not follow policies,” said American Express VP Alicia Tillman. “How do you take the very best elements of social media and mold a solution around those elements and attach it to a corporate goal?”

The answer, of course, is games. As you can see, it’s hasty to say that gamification is dead. Certainly many early adopters were ill-advised or otherwise didn’t plan their game projects correctly.

Today, the development of 100% true high-availability cloud makes it easier than ever to get your game off the ground. With the right networking technology and architectural design – InfiniBand and distributed storage – you can experience performance that is usually 300% faster than AWS and SoftLayer. Game over? No, game on.

By Kent Roberts

Travoltify Your Site: NYT, Time & Slate

  • Marketing and PR

John Travolta

  • Gamification – Definition & Stats
  • Travolta Misstep Turns Laser Toward Successful Game Strategies
  • Historical News Games & Becoming Carlos Danger
  • All Aboard the Game Train
  • True HA IaaS Cloud to Serve Games

The New York Times revealed in 2014 that content gamification had resulted in unprecedented traffic for three major news sites: the Times, Slate, and Time. The word Travoltify was coined by the NYT that day, a truly proud moment in journalism history – but this trait is exciting in many ways since it utilizes the Web’s interactive potential.

Gamification – Definition & Stats

According to the Engagement Alliance, gamification is a technological approach that uses the structure and mentality of games out of the traditional game scenario in order to “engage users and to solve problems”, adding that it “leverages game design, loyalty program design and behavioral economics to create the optimal context for behavior change and successful outcomes.”

Analyst firm statistics are strong for the gamification market: M2 Research forecast that it would hit $2.8 billion by 2016, while Markets & Markets predicted that it would achieve $5.5 billion by 2018.

Travolta Misstep Turns Laser Toward Successful Game Strategies

Sure, John Travolta may not be used to speaking in public… Oh wait, he’s an actor. It’s no wonder that everyone pounced on Travolta when he walked onstage at the 2014 Academy Awards completely unprepared, not knowing how to pronounce the name of singer Idina Menzel. Like Dan Quayle with potato (or is it potatoe?) before him, Travolta’s snafu was ultimately responsible for an incredibly widely shared Slate feature.

Similarly effective and also record-breaking were a Time game called “How Much Time Have You Wasted on Facebook?” and a quiz/map combo from the Times called “How Y’all, Youse and You Guys Talk.”

The Time Facebook game was the biggest attention-getter ever for the magazine, sparking 3.8 million unique visits in the 30 days following its release (January 2014). The NYT interactive feature, which tells you where you live in the United States based on how you refer to a group of people in the second person, was accessed and emailed more than anything else on its site in 2013 (posted in December). Finally, the Slate game, which would mangle your name in a similar manner to what Travolta did with Menzel’s, scored the highest traffic ever seen by Slate in 18 years online – 9.5 million unique visitors in its first 48 hours (March 2014).

Slate editor David Plotz told the Times that while the Travolta game made him feel “ambivalent” and “bemused” for outperforming the site’s more sophisticated content, it highlighted the diverse expectations of its users. “Readers will go high or low with us,” he said. “It was off the news and it was fun and shareable. All publications are aspiring to that direct connection to their audience.”

Historical News Games & Becoming Carlos Danger

Connection between games and the news has a long history. Everyone is familiar with the unapologetically impossible New York Times crossword puzzle, which has appeared in the print edition since 1942. Many hard-copy papers feature sudoku and acrostics, as well as comics.

What’s remarkable about the Internet is the interactive potential, which gives steroids to people’s ability to design games in compelling and user-friendly formats. What’s especially simple about the idea of Travoltification, said the Times’ Leslie Kaufman, is that you’re simply allowing people to put themselves into an entertaining context. “If users can put their own name and information into a template and come out with an amusing answer,” she suggested, “it often prompts them to share it with others through social media, contributing to the holy grail of virality.”

Quizzes (whether on their own or incorporated into broader games) have been around for years on the Internet. In fact, the Slate feature was a knockoff of its previous effort that allowed users to create assumed names in the spirit of Carlos Danger (which arrived soon after it was revealed that Anthony Weiner had used that name when he hired ladies of the night). Quizzes, like games, allow everyone to inject themselves into the news, in a way.

All Aboard the Game Train

Time actually has had its own dedicated “digital interactive graphics editor,” essentially another name for a news gamification director, since 2013. Schlock-peddlers are onboard as well, with BuzzFeed adding a quiz template to its click-bait formula in 2012.

The question for journalism companies that take themselves seriously is in what way to make news and games distinct so the entire enterprise doesn’t become a vague sort of infotainment mechanism. Plenty of media sites have realized how much traffic quizzes, regardless of their news value, can generate. Since traffic is critical for sites to bring in revenue, we end up with stupid quizzes such as letting you know which Downtown Abbey character is the most similar to you (mine is Lady Sybil Crawley, because we are both strikingly attractive).

Nonetheless, interactive games don’t have to be pointless, argued news gamification author Ian Bogost. “The really interesting thing about games is they can depict how things work and systemic issues that underlay stories, that we can look at in another way,” he said.

An example is Dollars for Docs on the nonprofit ProPublica site, which allows you to find out if your physician is receiving payments from drug manufacturers (2010 release, 7 million views to date).

True HA IaaS Cloud to Serve Games

Have you gamified your site, or have you reviewed your gamification strategy lately?

If so, you obviously want your site to be fast. Cloud can often be faster than supercomputers, but you need the right networking technology and architectural design – InfiniBand and distributed storage. Superb’s Cloud gives you true 100% high-availability to optimize the viral potential of your game.

By Kent Roberts