Health IS Technology Blog

Phishing: How to Avoid The Bait

Posted on May 09, 2018
Phishing is a way of committing fraud through scamming victims into providing hackers with secure information. Have you ever received one of th...

The 5 Apps Every College Student Needs

Posted on May 03, 2018
1. Grammarly Grammarly is a free grammar checker that claims to outperform even Microsoft Word’s spell check. You can add it as a free extensio...

Coding 101 - The Evolution of Programming and Its Possible Future

Posted on April 24, 2018
These days, it seems like everyone is talking about computer programming and coding. It’s almost like the hype surrounding programming popped u...

The Rise of AI & Smart Tech

Posted on April 17, 2018
“Any sufficiently advanced technology is indistinguishable from magic.” ~ Sir Arthur C. Clarke, Esteemed Science and Science Fiction ...

What Are the Top Apps for Medical Students?

Posted on April 03, 2018
"About 88% of medical students reported owning a smart device and had medical apps installed on their smart devices. Most students reported positive p...

Password Recovery and Cybersecurity

Posted on March 27, 2018
"Hardware is easy to protect: Lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than on...

Web Development: What Two Senior Developers Think You Should Know

Posted on March 20, 2018
When you arrive at the USF College of Public Health (COPH) homepage, you’re greeted by the familiar USF green and gold, a logo you’ve lik...

What Is Website Usability & Why Is It Important?

Posted on March 13, 2018
"People want less information, they don't want more information. They want it to be easier for them to use. Easier for them to get what they want. Eas...

USF's Jihyun Kim Wins Sitecore’s MVP Award

Posted on March 06, 2018
USF Health Information Systems, your on-campus technology team, today announced that Jihyun Kim, Senior Applications Developer has been named a &ldquo...

Malicious Intentions: The Virus, Worm & Trojan

Posted on February 27, 2018
"Like the castle-dwellers of old, computer users are involved in an arms race with hackers and virus writers. This makes it imperative to understand t...