May 28, 2024

Big Data and Google

Google and other major data companies leverage their vast repositories of information to pioneer predictive models in healthcare and other related fields.   By harnessing immense datasets […]
May 21, 2024

Cybersecurity and Children

The expanding reach of the internet presents both opportunities and challenges for  children. As internet access proliferates, children are increasingly exposed to online platforms, educational resources, […]
May 14, 2024

Alzheimer’s Research

The super mamillary nucleus and stimulation in the brain in the mouse model may help with alzheimer’s disease. There are dimentia vaccines being developed in 2021 […]
May 9, 2024

Gray Matter in the Brain

“Gray Matter in the Brain” is an engaging podcast that explores the fascinating world of neuroscience. This podcast examines the changes in gray matter in the […]
May 3, 2024

Alzheimer’s Testing

2050, 52 million will have Alzheimer’s disease (AD) worldwide.  There are 5.8 million people with Alzheimer’s disease in America.  It is a common form of dimentia.  […]
May 1, 2024

Alzheimer and Robopets

In this episode, we explore the transformative role of robotic pets in Alzheimer’s care. Learn how these innovative tools offer joy and companionship to those affected […]
April 16, 2024

Cyber Security in Healthcare Part 5

In March 2024, Change Healthcare was hacked and suddenly physicians all over America could not receive payments nor bill United Healthcare.  Change Healthcare is an intermediary […]
April 11, 2024

Cyber Security in Healthcare Part 4

While small and medium physician practices are subject to cyber hacking, they are targeted less than major corporations. In fact, the hacking rate is 5.9% for […]
April 9, 2024

Cyber Security in Healthcare Part 3

Cyberawareness is important for users. People are lax with passwords and share passwords among co-workers to log into communal computers. Old software programs have haphazard software […]
April 4, 2024

Cyber Security in Healthcare Part 2

Most commonly information assets are hacked by ransomware, misconfiguration, credential stuffing, or social engineering. Watch out for phishing and emails asking for money or your login […]