The annual update to the
GS1 General Specifications has arrived and there are some healthcare-related changes.
We have released VeriLite 2.0, the first major update of our cloud-based solution, immediately boosting Doctors, Pharmacists & Wholesalers fight against fake medicines across Europe.
One of the main drivers for the adoption of closed-loop medicine (CLM) administration in the acute sector is the adoption of EMRAM. Closing that loop presents a challenge that needs facing.
Medicine safety is a central concern in modern healthcare. Ensuring that healthcare practitioners administer the right medicine to the right patient is crucial. A falsified medicine deliberately or fraudulently misrepresents its identity, composition or source.
Microsoft Azure supports 4 different replication services, locally-redundant storage, zone-redundant storage, geo-redundant storage and read-access geo-redundant storage (also known as LRS, ZRS, GRS and RA-GRS respectively.)
Microsoft Azure Service fabric makes use of many new service application methods to allow new ways to develop code in a better, more efficient and more rounded way.
This blog will look into Microsoft Azure's certificate thumbprint as being the unique identifier of the certificate in the form of a hash value computed over the complete certificate.
In this article we the benefits of Microsoft Azure Active Directory B2C component which provides out of the box functionality for identity management. This eases the development and maintenance of applications that require login functionality and credentials management
Are you developing APIs and want to manage their full lifecycle? Concerned about usage, security and scaling your APIs? Azure API Management provides turkey solution to manage these concerns. Use the API Management portal in Azure to secure, publish and monitor your API Program.
In this article we cover the benefits of the Blockchain, how it works and how it achieves security and transparency of information.
In this article, we discuss look at 6 questions to ask if you are considering extending your data integration into the cloud.
Are you thinking of developing an API and want to host it in the Cloud? Azure API Apps will meet your requirements. You can develop and deploy your API using multiple languages (C#, PHP, Java) and Web Frameworks (Node, ASP.net) . Harness features of App Services such as deployment slots, auto scaling and authentication with Azure AD and OAuth.
In this article we explore the myths of uncertainty that are stopping businesses from embracing the cloud, and why you should not let them hold you back.
In this article, we discuss how to convert of Datetime value from UTC to local time zone or from local to UTC or from one local time zone to another local time zone.
Rotating access keys on a regular basis is good security practice. This post looks at how to simplify the task of updating Azure Service Bus shared access keys in BizTalk Send Ports and Receive Locations.
In this article we discuss Serverless computing suing Azure Functions which enables you to build applications without the worry of maintaining or provisioning Virtual Machines in the Cloud
In this post, we discuss the functioning of OAuth and how it has been able to provide a more secure authorisation than giving out passwords.
In this article, we discuss the benefits of Microservices and how Microsoft Service Fabric simplifies the building and deploying of microservices-based applications.
This blog post explores SOAP and REST, what they consist of and how they are used. It also gives guidance on what to look out for when making a decision on which to use in order to meet requirement.
Want to build Microservices on the Cloud? With Azure Service Fabric and Azure Container Service, Microsoft now provides you the choice to build Microservices with a Paas plaform using .Net or alternatively.
High-profile cyber-attacks have been making the news recently. In this article, we will look at the benefits of using Azure Security Centre to secure your cloud based solution and protect it from threats.