This program trialed at a Markle workshop in 2010 was designed to stimulate development of products by public and private organizations to make health information more usable and meaningful for patients.


- "Data challenge"
- Personal health record
- "Download Data"
- "Blue Button"


- "Blue Button"

Computer Science & Information Technology

You might also like to view...

Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?

A. Telnet does not have a common TCP port assignment, SSH does. B. SSH uses much less bandwidth to perform the same functions as Telnet. C. SSH is a secure, encrypted alternative to Telnet. D. Telnet is not available for use by Linux systems.

Computer Science & Information Technology

Management information systems (MIS) provide reports called ________ reports, which show conditions that are unusual or need attention from users of the system

A) summary B) exception C) expert D) detail

Computer Science & Information Technology

A resume should be written in active voice instead of passive voice

Indicate whether the statement is true or false

Computer Science & Information Technology

Some threats can manifest in multiple ways, yielding multiple vulnerabilities for an asset-threat pair.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology