Recent Blog Posts

​The healthcare Internet of Things (IoT), or the Internet of Medical Things (IoMT), is attracting serious investment, with hospitals investing an esti...
Exciting advances in customer care technology are enabling all-new ways of connecting with consumers. And yet, legacy contact center facilities often ...
Higher education IT teams are tasked with a tall order these days: to deliver unsurpassed innovation while sticking to shrinking budgets. At the same ...
Benefits abound for healthcare organizations harnessing the Internet of Things (IoT), or the Medical IoT—as do the implicit risks. After all, a dizzyi...
For more than a decade I have been carrying two phones with me – a personal phone and one supplied by my employer. Quite frankly, I apprecia...
It's official: Cloud adoption is no longer an "if," but a "when." A new survey of more than 2,000 IT professionals found that more than 80 percent of ...
Ten years ago when colleges and universities started to really get serious about wireless access, it was more of a convenience than a necessity. Back ...
Joanna Robinson, Regional VP of West Coast Operations at Burwood Group, was recently named to CRN's 2017 Women of the Channel list. Each year, CRN sel...
The Millennial appetite for technology in the workplace is well-documented. But that doesn't mean their more mature colleagues don't also have high ex...
​The Internet of Things (IoT) is influencing the way we live, work, and play across all sectors—but perhaps no place more meaningfully than in healthc...
​In today's fast-changing tech world, opportunities abound to improve IT offerings—as do the challenges associated with adopting new practices and sys...
​As more organizations partner with Managed Services Providers (MSPs), more providers have entered the marketplace. Sorting through the options can be...
Over the last decade, the Internet of Things (IoT) has entered our daily lives in the form of home automation, with sensors being added to fire alarms...
Medical device and biomedical/clinical engineering (CE) teams are relying more and more on their provider's IT infrastructure department to perform jo...
As more companies learn every day, creating a "smart" connected workplace can boost employee productivity, collaboration and satisfaction, whether peo...
From patient experience to staff engagement, there is no shortage of outcomes that can be impacted improved technology. So often, however, healthcare ...
​Did you know that up to 50 percent of medication errors are caused by interruptions that occur during medication preparation and the administration p...
The term "Managed Services' has become somewhat ubiquitous when describing services provided by an outside IT agency. To some, the term is akin to 'He...
Whether you are looking for assistance monitoring your network, managing your unified communication and telephony system, or even your Citrix environm...
​I was recently making some email introductions to a handful of Chief Experience Officers (CXO) at large healthcare organizations across the country. ...
Back in 1999, data transmission rates of 1 or 2 megabytes per second on the 2.4Ghz band felt like lightning. Fast-forward to the most recent Wi-Fi sta...
An important application fails. Business comes to a halt. The phone rings off the hook with calls from frustrated end-users. Your team springs into ac...
If you want to uncover risk in your IT ecosystem, just look in the shadows—of shadow IT, that is.Don't have a shadow IT policy in place? Now is the be...
This year's National Healthcare IT Week made for some excellent Twitter conversation for anyone interested in the future of clinical communications. N...
In a world where agility is king, it's no wonder IT team leaders are angling for data center automation from the cloud. After all, cloud-based automat...
Healthcare data is a prize target for cybercriminals, who can all-too-handily monetize valuable private information like Social Security numbers and i...
Cloud services may be king across all sectors, with 93 percent of businesses already using it in some way—but that doesn't make it the only game in to...
We know that prevention is the best medicine when it comes to endpoint security. But with increasingly sophisticated, more targeted attacks, the days ...
Today’s C-suite expectations for enterprise technology are high—but their budgets are not. As IT teams struggle to keep up with insatiable customer de...
In multiple cities, a mere tap from your smart phone can now set in motion an order for one-hour delivery of virtually every kind of product. But this...
Dear Corporate America, Was it worth it? From a corporate perspective, disaster recovery and business continuity are absolute priorities and definitiv...
When Gartner released its first-ever Magic Quadrant for Disaster Recovery as a Service (DRaaS) in April 2015, it sent a clear signal that cloud-based ...
This blog post was co-written by Joanna Robinson, Regional VP, West Coast Operations at Burwood Group, Jared Jerotz, Account Executive, at Burwood Gro...
The term commissioning originates in the ship building industry. It describes the process builders go through to deem their ships ready for sea. The t...
Relentless pressure for greater data speed and agility has inspired many organizations to consider hybrid cloud management. Its allure is powerful, af...
Are your customer satisfaction surveys measuring the right attributes? Can you make business decisions based on their results? Many call centers today...
During the last week of April, more than a hundred secure text messaging vendors rejoiced at The Joint Commission’s announcement of a policy shift in ...
Flexible work environments that support anytime-anywhere working, along with collaboration, creativity and engagement, have become a requisite for tal...
Effective communication between nurses and patients is key to enhancing the patient care environment. While numerous factors combine to create a succe...
Representing a new frontier in wireless connectivity, fifth-generation (5G) broadband technology is gaining buzz for its transformative speed and stre...
Disruptive technologies and innovations abound each year at annual industry conferences and healthcare is no exception. Each year event organizers wor...
Not that long ago, endpoint protection was a simple matter of installing desktop anti-virus and anti-malware programs, and periodic software security ...
Baby Boomers and GenXers may be used to IT playing a supporting role to other C-suite functions…but the new generation of digital natives, aka Millenn...
Today, healthcare organizations cannot succeed without a dramatically different approach to business and technology infrastructure than in years past....
Nowadays, most people expect data to be available instantly. Waiting for apps to pop up is not only an inconvenience—it can be a real drag on business...
Multifactor authentication, proactive vulnerability management, advanced endpoint protection (AEP)—these will be the year’s major growth areas in secu...
As humans, our first attempts to communicate with the world were through voice. Our speech and feedback influenced the people around us, as well as ou...
Greater mobility. Lower costs. New technology. Such promise is prompting many organizations to abandon cabling and embrace a wireless-only strategy th...
In today’s rapidly evolving technology landscape, healthcare organizations are learning to constantly evolve to new challenges and opportunities for i...
This blog post was co-written by Melissa Serna, MSN, RN-BC, Senior Clinical Informatics Consultant and Ron Wheelock, Principal Consultant. I...
There’s a crisis plaguing many healthcare IT departments today. Juggling their well-intentioned tasks to “keep things running,” technology teams ...
The bar for maintaining network capacity in higher education institutions is at an all-time high—and that’s not likely to change, considering the risi...
When was the last time you conducted a security assessment? For many IT teams, this is a once-a-year job. End-users may receive software updates and s...
In this three-part series, we investigate how forward-looking technology teams are working to thwart 2016’s greatest security threats. Below-the-OS at...
The workplace as we know it has evolved dramatically over the last decade, but we haven’t seen anything yet according to Sinead Aylward, Managing Cons...
This blog post was co-written by Ron Wheelock, Principal Consultant, and Melissa Serna, MSN, RN-BC, Senior Clinical Informatics Consultant. Burwood Gr...
Does an online medical school sound too far-fetched? Today, yes. In the future—maybe not. Online learning has become standard fare in higher education...
To thrive over the next three to five years, healthcare organizations, specifically IT departments, must have a strategy and roadmap for technology in...
Imagine having the power to locate a person or a piece of equipment within a meter’s accuracy, leveraging wi-fi and Bluetooth technology to provide fa...
For a growing number of colleges and universities, championing mobility is no longer just an option, it’s a necessity. Students, faculty and administr...
There’s no doubt that doubling down on security is a top priority for today’s technology leaders, especially given the growing number of highly target...
What happens when emergency departments are filled beyond capacity? The question is becoming urgent, according to the American College of Emergency Ph...
Managing a major health information technology change — such as a clinical communications implementation, a connected care transformation or a workflo...
It’s difficult to navigate today’s world of telecommunications without coming across the acronym UC or Unified Communications. Most voice and network ...