<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <generator>RSS Builder by B!Soft</generator>
    <title>Document Management, Medical News and Technology</title>
    <link>http://www.anl.com/index.html</link>
    <description>Keeping you up to date on Document Management, Security, Medical Office Practice Management and the latest technological breakthroughs.</description>
    <language>en-ca</language>
    <managingEditor>mjames@anl.com</managingEditor>
    <webMaster>mjames@anl.com</webMaster>
    <copyright>Copyright 2006-2010</copyright>
    <item>
      <title>October 1, 2010 Schedule of Benefits Update</title>
      <pubDate>Mon, 8 Nov 2010 13:29:59 -0500</pubDate>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[New OHIP Schedule of Benefits changes are effective as of <strong>October 1, 2010</strong>. For details on changes please visit the Ministry of Health and Long-Term care website for details or contact our A&amp;L support team for information about program changes. 
<p><FONT color=#000000><a href="http://www.anl.com/pages/ohipbul.htm">&gt;&gt; more information<br/></a></FONT><FONT color=#000000><a href="http://www.anl.com/pages/support.htm">&gt;&gt; software support </a></FONT></p>]]></description>
    </item>
    <item>
      <title>New Generic Referring Dentist OHIP Identification Number</title>
      <pubDate>Mon, 2 Aug 2010 10:03:21 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[<SPAN style="WIDOWS: 2; TEXT-TRANSFORM: none; TEXT-INDENT: 0px; BORDER-COLLAPSE: separate; FONT: medium 'Times New Roman'; WHITE-SPACE: normal; ORPHANS: 2; LETTER-SPACING: normal; COLOR: rgb(0,0,0); WORD-SPACING: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px" class=Apple-style-span><SPAN style="FONT-FAMILY: arial, verdana, helvetica, sans-serif; COLOR: rgb(102,102,102); FONT-SIZE: 13px" class=Apple-style-span><SPAN style="COLOR: rgb(51,51,51)" class=style14>Effective August 1, 2010 - New Generic Referring Dentist OHIP Identification Number for Hospital Based Dental Surgeons to Use When a Patient Referral is made from a Dentist who does not have an OHIP Number.</SPAN><SPAN class=Apple-converted-space>&nbsp;</SPAN><FONT size=2><a style="COLOR: rgb(0,0,204); FONT-SIZE: 10pt; TEXT-DECORATION: none" href="http://www.health.gov.on.ca/english/providers/program/ohip/bulletins/9000/bul9089.pdf" target=_blank>Read More</a><SPAN class=Apple-converted-space>&nbsp;</SPAN>&nbsp;</FONT></SPAN></SPAN>]]></description>
    </item>
    <item>
      <title>July 1, 2010 Schedule of Benefits and Program Update</title>
      <pubDate>Thu, 1 Jul 2010 09:59:29 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[New OHIP Schedule of Benefits changes are effective as of <strong>August 1, 2010</strong>. For details on changes please visit the Ministry of Health and Long-Term care website for details or contact our A&amp;L support team for information about program changes. 
<p><FONT color=#000000><a href="http://www.anl.com/pages/ohipbul.htm">&gt;&gt; more information<br/></a></FONT><FONT color=#000000><a href="http://www.anl.com/pages/support.htm">&gt;&gt; software support </a></FONT></p>]]></description>
    </item>
    <item>
      <title>Handwrite and Inking</title>
      <pubDate>Wed, 12 May 2010 10:01:22 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Document and Records Management</category>
      <description><![CDATA[<SPAN style="WIDOWS: 2; TEXT-TRANSFORM: none; TEXT-INDENT: 0px; BORDER-COLLAPSE: separate; FONT: medium 'Times New Roman'; WHITE-SPACE: normal; ORPHANS: 2; LETTER-SPACING: normal; COLOR: rgb(0,0,0); WORD-SPACING: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px" class=Apple-style-span><SPAN style="FONT-FAMILY: arial, verdana, helvetica, sans-serif; COLOR: rgb(51,51,51); FONT-SIZE: 13px" class=Apple-style-span>If you have any kind of Windows-based tablet computer, and you prefer to handwrite with your medical records, get Web A&amp;L Document Console today. With state-of-the-art e-health technologies A&amp;L Document Console will drastically improve the quality of care. Our application allows for traditional approaches for keeping medical data with forms with, along with advanced options that include handwriting input (or inking). Document Console works on any Windows-based Computer, Slate or Tablet PC.</SPAN></SPAN><a href="http://www.anl.com"></a>]]></description>
    </item>
    <item>
      <title>Your Data Backup is your Insurance</title>
      <pubDate>Tue, 23 Feb 2010 02:45:17 -0400</pubDate>
      <link>http://www.anl.com/pages/feature5.htm</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<SPAN style="WIDOWS: 2; TEXT-TRANSFORM: none; TEXT-INDENT: 0px; BORDER-COLLAPSE: separate; FONT: medium 'Times New Roman'; WHITE-SPACE: normal; ORPHANS: 2; LETTER-SPACING: normal; COLOR: rgb(0,0,0); WORD-SPACING: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px" class=Apple-style-span><SPAN style="FONT-FAMILY: arial, verdana, helvetica, sans-serif; COLOR: rgb(51,51,51); FONT-SIZE: 12px" class=Apple-style-span>Why is data backup important? Data is raw information written to a computer. Data can be letters, documents, pictures, reports, media, or patient information. Essentially everything that is on your computer is some form of data and it is normally stored in files and/or folders on your computer. At anytime, a disaster can wipe out crucial information on your computer permanently. This is why data backup is so important. When computers are used for data entry, data is first stored on computers, but after that, the back up needs to be stored on a different device or medium. Without proper backup you run the risk of permanent data loss. Theft, fire, water damage, computer malfunctions, viruses and other problems can cause all your hard work to suddenly vanish. As an explanation, generally backups follow the following types.<br/><br/><strong>Full Backup<SPAN class=Apple-converted-space>&nbsp;</SPAN></strong><br/>Full backup is the starting point for all other backups, and contains all the data in the folders and files that are selected to be backed up.<SPAN class=Apple-converted-space>&nbsp;</SPAN><br/><br/><strong>Incremental Backup<SPAN class=Apple-converted-space>&nbsp;</SPAN><br/></strong>Incremental backup means backing up everything that has changed since last full backup.<SPAN class=Apple-converted-space>&nbsp;</SPAN><br/><br/><strong>Network Backup</strong><SPAN class=Apple-converted-space>&nbsp;</SPAN><br/>Network backup usually means backing up a client to a backup server, this means the client sends the files to the server and the server writes them to backup medium.<SPAN class=Apple-converted-space>&nbsp;</SPAN><br/><br/><strong>Image Backup</strong><SPAN class=Apple-converted-space>&nbsp;</SPAN><br/>The whole disk partition or file system is imaged as is.<SPAN class=Apple-converted-space>&nbsp;</SPAN><br/><br/>However, for many clients the medium used for backups range from older devices to more high-tech options; offering new forms and ways of protecting your data investment. Technology waits for no one, and there are pros and cons for remaining on older forms of backup technology. However, in terms of popularity, the following types still apply to some of our clients today.
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">USB Portable external or removable hard disk drive units<?xml:namespace prefix = o /><o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Can hold large amounts of data. (now in the terabyte range). Drives are external.<SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.tigerdirect.ca/applications/category/category_tlc.asp?CatId=136&amp;name=External%20Hard%20Drives" target=_blank>Click to view an image</a></SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.tigerdirect.ca/applications/category/category_tlc.asp?CatId=136&amp;name=External%20Hard%20Drives" target=_blank></a><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">.<o:p></o:p></SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">SD, Compact Flash, Memory Stick cards or similar devices</SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Can hold large amounts of data (capacities up to 64+GB). Devices are small and normally need an external connector to read the cards. However, most computers come with slots with compatible connections.<o:p><SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://en.wikipedia.org/wiki/Memory_card" target=_blank>Memory Cards</a>.</o:p></SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">USB / Jump-drive Key<o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Can hold large amounts of data (8 / 16 GB storage devices are available, or larger). Devices are portable and easy to transport<SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://usb-flash-drive-review.toptenreviews.com/" target=_blank>USB Keys</a>.</SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Online Backup or Network Storage<o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">A remote, online, or managed backup service is a service that provides users with a system for backing up and storing computer files (I.e.<SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.bell.ca/shopping/PrsShpInt_Ext_Vault.page" target=_blank>Bell Online Vault</a>,<SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); FONT-SIZE: 9pt; BORDER-LEFT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.onlineitbackup.co.uk/disaster-recovery" target=_blank>Online IT Backup</a>, etc...)</SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">CD-RW or DVD-RW Drives</SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">These are devices that can store information on a CD-RW or DVD disc. These devices come in both External or Internal models. Generally not prone to damage from magnetic devices.<o:p></o:p></SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Tape Backup<o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Older devices that look and operate similar to a cassette tape. Drives are usually internal and a computer technician should do the installation and setup of these devices. Many are proprietary.<o:p></o:p></SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">External/Internal Iomega ZIP Drive<o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Iomega ZIP disks look similar to a 3 ½ inch floppy diskette, however they hold more information and are much more sturdy. Newer models can hold megabytes of information. However, they are not widely in use anymore.<o:p></o:p></SPAN></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><B><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Floppy Diskettes<o:p></o:p></SPAN></B></p>
<p style="MARGIN: 10px 5px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px; BACKGROUND: none transparent scroll repeat 0% 0%; COLOR: rgb(51,51,51); FONT-SIZE: 9pt" class=MsoNormal><SPAN style="FONT-FAMILY: Arial, sans-serif; FONT-SIZE: 10pt">Old 3 ½ inch floppy disk are not used as much today and hold small amounts of information.<U><o:p></o:p></U></SPAN></p>It is important to take time to understand how to protect your data.&nbsp; Please be sure to do your back up to ensure against data loss.&nbsp; If you opt to use a device or backup medium it is important to check your backup or have more than one device (best to have multiple backup copies), ensuring that you are not vulnerable and left with no back up at all. With the emergence and importance of electronic records, please don't take your back up lightly!</SPAN></SPAN>]]></description>
    </item>
    <item>
      <title>GP Focus Assessment Codes / Evening, Weekends and Holidays New Fee Schedule Codes</title>
      <pubDate>Tue, 2 Feb 2010 11:38:26 -0500</pubDate>
      <link>http://www.anl.com</link>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[<div class=box2>
<div align="left"><a href="http://www.health.gov.on.ca/en/pro/" target=_blank>MOH&amp;TLC Fact Sheets - February 1, 2010 </a>- . <SPAN class=style14><strong>GP Focus Assessment Codes</strong> / <strong>Evening, Weekends and Holidays New Fee Schedule Codes</strong>. Ministry of Health fee codes, referenced in both of these fact sheets dated February 1, 2010, were already added to the October 1, 2009 Schedule of Benefits, according to the 2008 Physicians Services Agreement.&nbsp; These codes include, A917A, A927A, A937A, A947A, A957A, A967A, A994A, A998A, B994A, B993A, Q994A, Q998A.</SPAN></div></div>]]></description>
    </item>
    <item>
      <title>Notice to users of web-based A&amp;L Document Console (Latest Firefox Update 3.6)</title>
      <pubDate>Thu, 21 Jan 2010 10:17:38 -0500</pubDate>
      <link>http://www.anl.com/pages/support.htm</link>
      <category>General</category>
      <description><![CDATA[<SPAN style="FONT-FAMILY: 'Calibri','sans-serif'; FONT-SIZE: 11pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA"><strong><U>Important Advisory:</U></strong></SPAN><SPAN style="FONT-FAMILY: 'Calibri','sans-serif'; FONT-SIZE: 11pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA"> We strongly recommend that you <U>do not update</U> to the latest Mozilla Firefox version 3.6, which was released on <B>January 21, 2010</B>. Although we have tested the newest version of the browser, there are some minor late changes that may cause issues with our web-based A&amp;L Document Console application. We recommend that you remain on your current version, or at most Firefox 3.5 until further notice. This does not apply to regular security updates, if required. </SPAN>]]></description>
    </item>
    <item>
      <title>Information for Health Care Professionals : Incorrect Premium Payment Amounts and Payment Reporting on December 2009 Remittance</title>
      <pubDate>Wed, 6 Jan 2010 10:48:44 -0500</pubDate>
      <link>http://www.health.gov.on.ca/english/providers/program/ohip/bulletins/4000/bul4506.pdf</link>
      <author>Ministry of Health and Long Term Care</author>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[<a href="http://www.health.gov.on.ca/english/providers/program/ohip/bulletins/4000/bul4506.pdf">Information for Health Care Professionals&nbsp;: Incorrect Premium Payment Amounts and Payment Reporting on December 2009 Remittance</a>&nbsp;[PDF]]]></description>
    </item>
    <item>
      <title>What is a Document Management System?</title>
      <pubDate>Wed, 23 Dec 2009 14:19:18 -0500</pubDate>
      <link>http://www.anl.com/pages/dcwebinfo.shtml</link>
      <category>Document and Records Management</category>
      <description><![CDATA[Document management systems help to store and use information properly and effectively in the workplace. Creating a paperless office has long been the goal, in the new eco-friendly world of computing. A good data management system, in place, will help to achieve these goals. Document Management is one of the most effective means of managing all kinds of information in a medical office. Any electronic document imaging software program should be customizable to your specific needs. Often offices will streamline their workflow, with the use of templates. However, even though using and creating templates is not on your agenda, it is possible to move forward should you decide to do so. One of the unique aspects of our program is how it can move you into the future. Using the electronic record during an exam and saving it immediately; no paper and no re-filing. 
<p>Many software programs come with fixed templates designed by other people/specialists that may not apply to you. With the A&amp;L Document Console, you can design and change your template and customize them at any time. Create your templates with check or drop down boxes. Your note keeping becomes much easier to read and it is stored immediately without having to produce paper. Another possibility is to introduce voice recognition from Dragon Dictate. The A&amp;L Document Console has the ability to use voice recognition in conjunction with our program. Whether you use it to enter values in our program or use it with a word processor for dictation, the A&amp;L Document Console can accommodate it. </p>
<p>Computer technology continues to evolve which in turn has created new tools. A&amp;L Document Console can save you time, space, and money, while giving you complete control of all your files. Whether you use it to simply store files or move towards a paperless office, the choice is yours. </p>]]></description>
    </item>
    <item>
      <title>Positron Emission Tomography</title>
      <pubDate>Thu, 17 Dec 2009 14:25:46 -0500</pubDate>
      <link>http://www.sciencedaily.com/articles/p/positron_emission_tomography.htm</link>
      <category>Medical Technology</category>
      <description><![CDATA[Positron emission tomography (PET) is a nuclear medicine medical imaging technique which produces a three dimensional image or map of functional processes in the body. PET is both a medical and research tool. 
<p>It is used heavily in clinical oncology (medical imaging of tumors and the search for metastases), for clinical diagnosis of brain diseases such as dementias. PET is also an important research tool to map human brain and heart function. To conduct the scan, a short-lived radioactive tracer isotope which decays by emitting a positron, and which has been chemically incorporated into a metabolically active molecule, is injected into the living subject (usually into blood circulation).</p>
<p><a href="http://www.sciencedaily.com/articles/p/positron_emission_tomography.htm" target="_blank">More</a></p>]]></description>
    </item>
    <item>
      <title>What is Phishing? </title>
      <pubDate>Fri, 4 Dec 2009 14:05:27 -0500</pubDate>
      <link>http://www.anl.com/pages/technology.htm</link>
      <category>Internet Security and Cybercrime</category>
      <description><![CDATA["essentially a trap that is set to catch you..."

Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to trick the user into surrendering private information that is used for identity theft. Unless you are a 1000% certain, don't click the links in your email. A link may look welcoming and inviting, however it could be dangerous! Help to prevent email phishing scams by reporting each and every email, and website, that appears to be suspicious.
]]></description>
    </item>
    <item>
      <title>A&amp;L HERO* Update Information (November 2009)</title>
      <pubDate>Wed, 25 Nov 2009 12:22:53 -0500</pubDate>
      <link>http://www.anl.com/pages/heroupdate2009.html</link>
      <category>General</category>
      <description><![CDATA[<p align="left">The changes to Version 7.10 are as follows:<br/><br/>1. Claims with exception code 66 are automatically archived during RA processing (for the Northern Specialist Alternate Payment Program). It is recommended that all doctors in this NS APP upgrade to HERO 7.10 BEFORE doing any further RA processing. <br/><br/>2. The basic unit fees for Assistant/Anesthetist billing have been increased from $11.40/$13.24 to $11.52/$14.54. This change will only take effect when you process a fee code update file. <br/><br/>3. When billing in the Ontario Telemedicine Network (OTN), use a Hospital # consisting of a 4-digit Master Number (or four spaces) followed by the letters "TN". Do NOT enter the "O" -- the "O" will be automatically added in the batch. It is no longer necessary to use an external utility. <br/><br/>4. Changes to the # (Quantity) field on the service item list in the Claim window. <br/><br/>5. Changes and corrections to error messages. <br/><br/>6. When saving an RA to disk, if you specify the disk drive where your HERO program is located (e.g. "C"), the RA will now be saved to the drive's ROOT folder (e.g. c:\) instead of your HERO program folder (e.g. c:\htn). <br/><br/>7. Added new error codes, exception codes, and specialty codes. <br/><br/>8. Increased reliability for storing text in notes fields (for customers using Codebase Server). <br/><br/>To update to the newest version of A&amp;L HERO, click on File, click on Transmit, click on Upgrade, click on Download. Proceed and answer prompts. The connection time may take approximately 20 mins depending on the speed of your modem (faster on <a href="http://www.anl.com/pages/heroreq.shtml">high-speed Internet VPN connection</a>s). Once the downloading is complete, exit the A&amp;L HERO* program and then go back in. As you open the application, the program will prompt you through the last step. Please follow the instructions on screen. Should you encounter any problems or if you have any questions, and you are a client of A&amp;L Software Ltd., please call the A&amp;L Support team at <strong>(905)886-8066.</strong></p>
<p align="left">NOTE: <strong>Microsoft ends support for Windows 98, Windows 98SE and Windows Me (Millenium)<br/></strong><FONT color=#666666><img alt="A&amp;L HERO" align="right" src="http://www.anl.com/pages/mslogo.gif" width=27 height=22></FONT><SPAN class=style2>Termed as “<U>end of life</U>” by Microsoft; support officially ended back on July 11, 2006 for Windows 98, 98SE and ME (Millennium), from Microsoft. Using these Operating Systems, after this date, can expose your system to security risks. </SPAN></p>
<p align="left"><SPAN class=style2>For improved security, richer functionality, and increased productivity upgrade to Windows XP / Windows Vista (32-bit) </SPAN><FONT color=#666666><em>or</em><SPAN class=style2> Windows </SPAN><em>7</em><SPAN class=style2> (32-bit) </SPAN><br/><a href="http://www.microsoft.com/windows/support/endofsupport.mspx" target=_blank>http://www.microsoft.com/windows/support/endofsupport.mspx </a></FONT></p>]]></description>
    </item>
    <item>
      <title>Microsoft Windows 7 </title>
      <pubDate>Mon, 2 Nov 2009 14:00:12 -0500</pubDate>
      <link>http://www.anl.com/pages/dc-handwriting.html</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[Windows is now simpler and easier to use. It's designed for faster and more reliable performance. However, as mentioned previously, if you are thinking of making any changes, we advise you take the ensure that your software is fully compatible with Microsoft 7. However, if you have any questions about our applications and Windows 7 support, please contact our A&L Support Team first at 905-886-8066 or view our application requirements. ]]></description>
    </item>
    <item>
      <title>October 1, 2009 Schedule of Benefits and Program Update</title>
      <pubDate>Mon, 2 Nov 2009 13:57:15 -0500</pubDate>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[New OHIP Schedule of Benefits changes are effective as of <strong>October 1, 2009</strong>. For details on changes please visit the Ministry of Health and Long-Term care website for details or contact our A&amp;L support team for information about program changes. 
<p><FONT color=#000000><a href="http://www.anl.com/pages/ohipbul.htm">&gt;&gt; more information<br/></a></FONT><FONT color=#000000><a href="http://www.anl.com/pages/support.htm">&gt;&gt; software support </a></FONT></p>]]></description>
    </item>
    <item>
      <title>July 1, 2008 program update available!</title>
      <pubDate>Fri, 3 Jul 2009 12:37:52 -0500</pubDate>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[]]></description>
    </item>
    <item>
      <title>Microsoft to officially unveil “Live Mesh”, a software plus services strategy</title>
      <pubDate>Wed, 23 Apr 2008 11:00:37 -0400</pubDate>
      <link>http://www.anl.com/pages/technology.htm</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[The service will initially provide file sharing and folder synchronization for Windows XP and Vista PCs over the web. Its new Live Mesh service, a "cloud computing" project designed to help you access and share your files from where ever you are. Microsoft hopes to bring more features to Live Mesh, including allowing customers to connect and synch all of their digital devices such as phones, games consoles, and music players.  ]]></description>
    </item>
    <item>
      <title>Windows XP SP3</title>
      <pubDate>Wed, 23 Apr 2008 09:01:40 -0400</pubDate>
      <link>http://www.anl.com/pages/technology.htm</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>According to Microsoft, Windows XP SP3 has now been released to manufacturing and will be available to OEMs and enterprise customers from April 29<SUp>th</SUp>, 2008. The release marks the last major update for Microsoft’s popular operating system ever, and includes all previous updates, security patches, bug fixes and hot-fixes. Included as well as is a range of enhancements and new features, along with enhancements for Windows 2008 Server. For more details on the new update, please visit </FONT><a href="http://www.microsoft.com/"><FONT face=Calibri color=#0000ff>http://www.microsoft.com</FONT></a><FONT face=Calibri> .</FONT></p>]]></description>
    </item>
    <item>
      <title>Protecting yourself against Identity Theft</title>
      <pubDate>Tue, 22 Apr 2008 14:35:40 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Internet Security and Cybercrime</category>
      <description><![CDATA[<p style="MARGIN: 0in 0in 10pt" class=MsoNormal><FONT face=Calibri>The Personal Information Protection and Electronic Documents Act (PIPEDA) mandates rules businesses, organizations and individuals must follow in collecting and processing data in electronic form.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>However, in Canada, identity theft is the fastest growing form of consumer fraud. Thousands of citizens, ever year, have their identity stolen and in many cases they are unaware that a crime has taken place.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Over the past year various media reports detailed instances of identity theft or of personal information being misappropriated in some fashion by retailers and businesses. </FONT></p>
<p style="MARGIN: 0in 0in 10pt" class=MsoNormal><FONT face=Calibri>While we may focus in on the after effects of information theft, we often don’t give much thought to the sequence of events that allowed it to occur in the first place. Reviewing PIPEDA, the federal governments new Personal Information Protection and Electronic Documents Act, one becomes aware of how much this law will change the way many practices manage personal information in their care. Among a host of other requirements, safeguards must be in place to protect personal data against loss or theft, unauthorized access, disclosure, copying, use or modification, regardless of the format in which it is held. PIPEDA’s key element is to build consumer and business assurance in the knowledge based economy.</FONT></p>
<p style="MARGIN: 0in 0in 10pt" class=MsoNormal><FONT face=Calibri>However, deception or misrepresentation can take place in the form of information provided under the guise of a legitimate organization. Take time to read e-mails, faxes, letters and information provided to you; ensuring that they are from a genuine business and/or person. One of the best weapons against identity theft is education. On our </FONT><a href="http://www.anl.com/"><FONT face=Calibri>website</FONT></a><FONT face=Calibri> you can learn more about internet and e-mail based scams. </FONT><a href="http://www.anl.com/pages/feature2.htm"><FONT color=#0000ff face=Calibri>Phishing</FONT></a><FONT face=Calibri>, for example, is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to defraud the user into surrendering private information that is used for identity theft. Do your utmost to protect your identity!<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Your personal information needs to be protected. </FONT></p>]]></description>
    </item>
    <item>
      <title>Microsoft Windows Server 2008 - Virtualization</title>
      <pubDate>Wed, 9 Apr 2008 15:48:43 -0400</pubDate>
      <link>http://www.anl.com/pages/technology.htm</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<SPAN class=Apple-style-span style="WORD-SPACING: 0px; FONT: 12px 'Lucida Sans Unicode'; TEXT-TRANSFORM: none; COLOR: rgb(51,51,51); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0">
<p style="PADDING-RIGHT: 10px; PADDING-LEFT: 10px; FONT-SIZE: 9pt; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN: 10px 5px; COLOR: rgb(51,51,51)">Reaching the next major milestone in virtualization development, Microsoft today made broadly available a feature-complete release candidate of Microsoft Hyper-V, the hypervisor-based virtualization software available with various versions of Windows Server 2008. A beta of Hyper-V was included with Windows Server 2008 when it launched last month, and this release candidate provides updated, near-final code.</p>
<p style="PADDING-RIGHT: 10px; PADDING-LEFT: 10px; FONT-SIZE: 9pt; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN: 10px 5px; COLOR: rgb(51,51,51)">Hyper-V provides customers with efficient and cost-effective virtualization infrastructure software. It enables customers to reduce operating costs by increasing hardware utilization, optimizing infrastructure and improving server availability.</p>
<p style="PADDING-RIGHT: 10px; PADDING-LEFT: 10px; FONT-SIZE: 9pt; BACKGROUND: none transparent scroll repeat 0% 0%; MARGIN: 10px 5px; COLOR: rgb(51,51,51)">Looking for information about<SPAN class=Apple-converted-space>&nbsp;</SPAN><strong>Windows Server 2008?</strong><SPAN class=Apple-converted-space>&nbsp;</SPAN><a style="FONT-SIZE: 9pt; COLOR: rgb(0,0,204); TEXT-DECORATION: none" href="http://www.microsoft.com/windowsserver2008/en/us/default.aspx" target=_blank>Click here</a></p></SPAN>]]></description>
    </item>
    <item>
      <title>April 1, 2008 program update available!</title>
      <pubDate>Tue, 1 Apr 2008 15:11:12 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[<SPAN class=Apple-style-span style="WORD-SPACING: 0px; FONT: 12px 'Lucida Sans Unicode'; TEXT-TRANSFORM: none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0">The new OHIP Schedule of Benefits changes are effective as of<SPAN class=Apple-converted-space>&nbsp;</SPAN><strong>April 1 2008</strong>. For details on changes please visit the Ministry of Health and Long-Term care website for details or contact our A&amp;L support team for information about program changes.<br/><a style="BORDER-TOP-WIDTH: 0px; BORDER-LEFT-WIDTH: 0px; FONT-SIZE: 9pt; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); BORDER-RIGHT-WIDTH: 0px; TEXT-DECORATION: none" href="//www.anl.com/pages/ohipbul.htm">&gt;&gt; more information</a></SPAN>]]></description>
    </item>
    <item>
      <title>Windows Vista SP1</title>
      <pubDate>Mon, 31 Mar 2008 15:34:35 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<SPAN class=Apple-style-span style="WORD-SPACING: 0px; FONT: 12px 'Lucida Sans Unicode'; TEXT-TRANSFORM: none; COLOR: rgb(51,51,51); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0">The Internet has rapidly become a part of our daily lives. It has erased borders between communities and has changed the globe by becoming a single entity. It is a significant tool offering an unconstrained quantity of information and services from around the globe. Knowledge is what keeps you surfing safely, and protecting your information, and so ignorance of the hazards is no excuse. Remember that your Windows Operating System is only as good as its last update. Windows Vista Service Pack 1 (SP1) is the complete set of Windows Vista updates Microsoft has issued over the past year plus additional enhancements to improve your PC experience.<br/><a style="BORDER-TOP-WIDTH: 0px; BORDER-LEFT-WIDTH: 0px; FONT-SIZE: 9pt; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); BORDER-RIGHT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.microsoft.com/windows/products/windowsvista/sp1.mspx" target=_blank>&gt;&gt; more information</a></SPAN>]]></description>
    </item>
    <item>
      <title>Microsoft Vista &amp; Hospital Network Software Applications</title>
      <pubDate>Mon, 11 Feb 2008 15:09:25 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Technical Information</category>
      <description><![CDATA[As a Microsoft Solutions provider, we have the privilege of testing Microsoft Vista during the beta phase. With the amount of money Microsoft has invested; it is clear that Microsoft is pushing Vista to the foreground while slipping XP in its shadow. With that in mind, it is our understanding that some hospital network software applications are still not compatible with Microsoft Windows Vista, at this time. Our A&L applications are compatible with Microsoft Vista (32-bit). However, A&L Computer Software Limited does not offer expertise with any 3rd party application. As a tip to our clients, if you are thinking of making any changes, we advise you take the time to investigate and research; ensuring that your software is fully compatible with Microsoft Vista.]]></description>
    </item>
    <item>
      <title>Microsoft ends support for Windows 98, Windows 98SE and Windows Me (Millenium)</title>
      <pubDate>Thu, 31 Jan 2008 15:36:59 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<SPAN class=Apple-style-span style="WORD-SPACING: 0px; FONT: 12px 'Lucida Sans Unicode'; TEXT-TRANSFORM: none; COLOR: rgb(51,51,51); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: normal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2; -webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0"><SPAN class=style2 style="COLOR: rgb(102,102,102); FONT-STYLE: italic">Termed as “<U>end of life</U>” by Microsoft; support officially ended back on July 11, 2006 for Windows 98, 98SE and ME (Millennium), from Microsoft. Using these Operating Systems, after this date, can expose your system to security risks. Microsoft is recommending that you upgrade to Windows XP or Windows Vista (32-bit) for improved security, richer functionality, and increased productivity.<SPAN class=Apple-converted-space>&nbsp;</SPAN></SPAN><FONT color=#666666><br/><a style="BORDER-TOP-WIDTH: 0px; BORDER-LEFT-WIDTH: 0px; FONT-SIZE: 9pt; BORDER-BOTTOM-WIDTH: 0px; COLOR: rgb(0,0,204); BORDER-RIGHT-WIDTH: 0px; TEXT-DECORATION: none" href="http://www.microsoft.com/windows/support/endofsupport.mspx" target=_blank>http://www.microsoft.com/windows/support/endofsupport.mspx<SPAN class=Apple-converted-space>&nbsp;</SPAN></a></FONT></SPAN>]]></description>
    </item>
    <item>
      <title>A&amp;L HERO* Update Information</title>
      <pubDate>Thu, 3 Jan 2008 11:09:04 -0400</pubDate>
      <link>http://www.anl.com/pages/heroupdate2008.html</link>
      <category>General</category>
      <description><![CDATA[<a href="www.anl.com/pages/heroupdate2008.html" target=_blank>A&amp;L HERO* Update Information (January 2008)</a><br/>Read details on updates &amp; changes to A&amp;L HERO* version 7.08 in our News and Information section]]></description>
    </item>
    <item>
      <title>Why choose A&amp;L Document Console?</title>
      <pubDate>Mon, 17 Dec 2007 11:15:04 -0400</pubDate>
      <link>http://www.anl.com/pages/dc-whychoose.html</link>
      <category>Medical Office Practice Management</category>
      <description><![CDATA[The A&amp;L Document Console handles all of your filing needs by taking human readable images (documents, records, graphics, photographs, etc.,) and turning them into computer readable images. It scans, files, retrieves, displays, prints and even transmits your documents while reducing your dependence on paper by reducing many of your paper intensive functions.
<p>The computer readable image created can be treated as a normal computer file. This makes it incredibly flexible, accessible and convenient to use. The Document Console becomes your information centre, while using a Graphical User Interface to keep all documents, photographs or records looking the same as they did on paper.</p>
<p><strong><FONT size=2><a href="http://www.anl.com/pages/dcwebinfo.shtml"><img height=200 alt="Click to view our Web-based Document Console" src="http://www.anl.com/images/new-dc.gif" width=148 align="right" border=0></a></FONT></strong>Every document is scanned into the Windows based filing system and can be identified by name, title, category or record number. It provides a new way of filing and a new way to handle your filing procedures. It will revolutionize your office. With computer access to all your documents, paper intensive functions are a thing of the past. Electronic routing of all records and documents is the future, available today. It will save you time, effort and space, while putting you in complete control of your filing system.<strong><FONT size=2></FONT></strong></p>
<p><strong><FONT size=2></FONT></strong>All documents can be retrieved in seconds and printed in moments (if needed). No more filing cabinets and no more searches for misplaced files. With the Document Console you will reduce your filing cabinet requirements by up to 95%, while still keeping all of your documents at your finger tips.</p>
<p>Using Document Console will not only free your staff from filing and pulling documents, it means your records will be more complete, requiring less time to maintain. At the same time it dramatically improves security procedures by restricting access to certain information by means of password protected processes that have various levels of security. This protects record details from unauthorized access and accidental disclosure. And by preventing files from becoming lost or misplaced, it further tightens the security of all your records and documents.</p>]]></description>
    </item>
    <item>
      <title>Preventative Care Bonuses</title>
      <pubDate>Tue, 2 Oct 2007 09:06:22 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Ministry of Health and Long Term Care</category>
      <description><![CDATA[To all A&L users, in reference to the ‘Preventative Care Bonuses’, please remember to check your “M.O.H. RA Messages”  for A&LHERO*, or the last pages of RA for A&L Medical System users. Payments may not necessarily show up as a line-by-line payment, but rather as a lump sum payment.  If you have any questions, please contact your claims representative at the Ministry of Health.]]></description>
    </item>
    <item>
      <title>Taking a closer look at Vista</title>
      <pubDate>Mon, 1 Oct 2007 10:57:26 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>Windows Vista contains hundreds of new and exciting features; comprising of an updated graphical user interface and visual style dubbed Windows Aero, a completely redesigned networking, audio, print, and display systems and adding, most notably, enhanced searching features. For the public, generally, there are 4 different versions of Vista, tailored to the type of hardware and needs required. <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri><SPAN style="mso-spacerun: yes">&nbsp;</SPAN>•<SPAN style="mso-tab-count: 1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN>Windows Vista Home Basic<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>•<SPAN style="mso-tab-count: 1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN>Windows Vista Home Premium<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>•<SPAN style="mso-tab-count: 1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN>Windows Vista Business<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>•<SPAN style="mso-tab-count: 1">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN>Windows Vista Ultimate<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>The primary objective has been to improve the state of security in the operating system. One common criticism has been their security vulnerabilities, susceptibility to malware and viruses. To prevent malicious programs from silently installing, Microsoft developed the UAC (User Account Control) feature for Vista, with the hopes of boosting its profile as a security minded Operating System.<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>In terms of a learning curve, just as when Windows 95 ushered in a new look and feel, Vista also changes much of the appearance and functionality of the system. Unfortunately, some of these enhancements have been Vista’s Achilles ‘heel; along with the fact that many hardware manufacturers were not ready with available drivers for Vista. Reports of problems with network speed, compatibility, and other issues prompted the usual slew of updates and patches. Microsoft announced that it is already preparing a Vista Service Pack 1 beta, only approximately 6 months after the initially releasing Vista. Although Microsoft generally delivers vast improvements via service packs, Microsoft is telling customers not to wait for Vista SP1. However with the sheer volume of additions and fixes even the experts are pondering.<o:p></o:p></FONT></p>
<p class=MsoNormal style="MARGIN: 0in 0in 10pt"><FONT face=Calibri>Its predecessor, Windows XP, has over time become a dependable and generally stable Operating System, since the installment of Service Pack 2 (SP2). With Microsoft Vista, eventually more drivers and fixes will become available; making Vista a stable OS. Even though Vista is a vastly improved security oriented OS, only time will tell if Vista becomes the XP of the future or the ‘Millennium Edition’ of the past.</FONT></p>]]></description>
    </item>
    <item>
      <title>Digital Phone Lines and EDT</title>
      <pubDate>Fri, 29 Jun 2007 11:01:20 -0400</pubDate>
      <link>http://www.anl.com/pages/whatsnew.htm</link>
      <category>General</category>
      <description><![CDATA[It is important that our clients are aware of issues that may occur with the various new types of digital phone line services available on the market today. If you are transmitting your claims using telephone dial-up modem connections, with services like ‘Rogers Home Phone’, ‘Vonage’ or any similar type of VOIP services, you may encounter data transmissions problems.

Some dial-up modems will not work with these types of digital or “degraded” phone lines. In addition, various fax machines’ actually have to operate at 9600 baud, to ensure a proper connection. VOIP services generally have critical warnings that you must read. For example, if you have a monitored security system the “alarm signal transmission cannot be guaranteed” in some scenarios.

Please take the time to check with your VOIP provider and read the “guarantees” offered, ensuring that there will be no interruption to your regular office workflow and procedures.
]]></description>
    </item>
    <item>
      <title>Understanding Spyware, Malware and Adware</title>
      <pubDate>Tue, 5 Sep 2006 16:00:13 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Internet Security and Cybercrime</category>
      <description><![CDATA[Spyware, malware and adware are programs designed to infect a computer and often hamper the owner’s activity. Spyware is often thought to solely describe a program that examines a computer user; however the implications are much greater. These stealth applications often gather information through the user's Internet connection without his or her knowledge, transmitting information in the background to someone else. As for the avoidance and elimination of spyware, there are numerous programs designed to thwart these applications.

Malware, short for malicious software, is designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. Malware includes things like spyware or adware programs, such as tracking cookies, which are used to monitor your surfing habits. It also includes more sinister items, such as keyloggers, Trojan horses, worms, and viruses. A good anti-virus application can be configured to scan for any type of malicious code, and alert you to its existence, even if it is not currently known malware. However, remember that your anti-virus software, security application or even computer operating system is only as good as its last update. To get full protection, on a regular basis you MUST update with the latest virus definition files, scanning engines, patches and fixes. They can often overlook certain types of malware. It is a good idea to run at least one anti-adware application in combination with your anti-virus software. In addition, utilizing a firewall can be helpful. While it won't keep malware out, it can help to stop such programs from accessing the internet and sending your personal information to the intended target.

Adware, while not necessarily malware, is considered to go beyond the reasonable advertising that one might expect from freeware or shareware. Typically they're designed for commercial gain and are appropriately titled as a program that routinely shows advertisements to a PC. Adware will regularly continue to produce ads even when the user is not running the originally application installed. Usually bundled into another program, adware is considered a way for many developers to recover programming costs since a program since shareware or freeware is offered at little or no costs to the user. Adware and spyware are sometimes grouped together because the computer user’s internet activity is frequently tracked, recorded and may even be sold to a third party. Software is available to help block advertisements and/or remove adware programs altogether. 

Remember to always take time to be web wise and keep informed. If spyware, malware and adware destroy nothing else, they destroy your confidence in your PC or network, which is something that is quite valuable.
]]></description>
    </item>
    <item>
      <title>Disposing of Old Equipment</title>
      <pubDate>Thu, 10 Aug 2006 15:27:33 -0400</pubDate>
      <link>http://www.anl.com</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[Keeping up with the Joneses, when it comes to computers, can be a complicated thing especially when your kids are asking to upgrade their computers because their friends have it.  On the other hand, maybe you’re always looking for the newest, latest, and greatest when it comes to hardware.

You are not alone.  Many people purchase and upgrade their computers only to have old computer equipment languishing in their offices and basements.  Landfill sites are the premature destination for the computer wasteland when many of the parts can be recycled and certain metals extracted from the equipment.  With spring in the air, maybe it’s time to do some spring-cleaning.  One of the best ways to recycle your old computer is to donate it to your local education system.  With under funded schools looking to make ends meet, what better way to help the future of tomorrow by giving them your used equipment.  Many Windows software products run in a legacy type manner where current software programs are very similar to their previous versions.  From a hardware perspective, the components of the architecture are similar.  All have motherboards, expansion slots, processors, memory, hard drives, and fans.  High schools and colleges might be able to use your hardware to teach technical aspects of the Information Technology sector.  If you decide to go this route, be sure to remove all business and personal related matter.  Remember, your office is working under the rules of the Privacy Act so please remove or delete everything first.  In addition, if you are giving away your home computer, make sure it doesn’t contain personal and financial information on you or your loved ones.  You don’t want that falling into the wrong hands especially to young, inquisitive, mischievous minds.  For those of you who are more advanced, formatting the hard drive and then reloading accompanying software might be a better idea.  Be sure to give them all operating, program disks and documentation in case they have to uninstall and re-install operating systems, drivers, or software.

If your equipment is of a vintage state, (where it can only be used as a doorstop), some municipalities have a recycling depot program where they have a depot for old electronic equipment.  Even if you are dumping your equipment, be sure to format or uninstall all personal information.  Please check with your local municipality for available recycling programs.  Many monitors and television sets contain lead, which are harmful to the environment, so it’s best to dispose of it this way.  Some of the larger business retailers also have programs to recycle old telephones and ink cartridges.  If you really want to recycle, in the past Hewlett Packard has occasional programs where they will recycle old printers, whether manufactured by them or not, at a cost, if you ship it to them.

Recycling your old equipment is good for young minds and the environment.  It will also help you clean up your office or basement.
]]></description>
    </item>
    <item>
      <title>Advantages Of Using Adobe Acrobat PDF Files</title>
      <pubDate>Tue, 4 Jul 2006 16:01:25 GMT</pubDate>
      <link>http://www.anl.com/pages/dc-pdffiles.html</link>
      <category>Document and Records Management</category>
      <description><![CDATA[<FONT face="Verdana">Adobe PDF documents can be shared, viewed, and printed by anyone, on any system, using free Adobe Reader® software — regardless of the operating system, original application, or fonts. Adobe Reader® software can be installed on every network computer or system for free and people and you can download it for free from the Internet. PDF files are an advantage to your A&amp;L Document Console system because it allows you to share documents easily with anyone with no added expenses. </FONT>
<p><FONT face="Verdana">Benefits listed are as follows: </FONT></p>
<p><FONT face="Verdana">• Documents always look exactly the same </FONT></p>
<p><FONT face="Verdana">• Documents can be distributed worldwide for almost zero cost and then be digitally printed. </FONT></p>
<p><FONT face="Verdana">• Documents can be magnified by up to 1600%, without diminishing the quality. </FONT></p>
<p><FONT face="Verdana">• The documents can be navigated by keyword search, table of contents or hyperlinks. </FONT></p>
<p><FONT face="Verdana">• The format is ideal for presentations, since PDF documents always look exactly the same on all platforms. </FONT></p>
<p><FONT face="Verdana">• The file format is very compact, so files can be sent quickly to recipients. </FONT></p>
<p><FONT face="Verdana">• Ideal for archiving, since the look and feel of documents is retained and the document size is compact </FONT></p>
<p><FONT face="Verdana">• The file format is essential for business documents like agreements and forms that must retain their exact appearance for legal reasons. </FONT></p>
<p><FONT face="Verdana">Sharing across Platforms </FONT></p>
<p><FONT face="Verdana">A PDF File is a document format that represents a document in a manner independent of the hardware, operating system and application software used to create the document. It was designed to enable documents to be transferred and shared across computer platforms. A PDF document created in one platform such as Windows can be read in another platform such as Macintosh or Unix. All these advantages translate into faster, cheaper and less complex documents, improving workflow throughout the your office or business. </FONT></p>
<p><FONT face="Verdana"><a href="http://www.anl.com" target=_blank>Learn More about A&amp;L Computer Software Limited</a> </FONT></p>]]></description>
    </item>
    <item>
      <title>Electronic Document Imaging Case Study</title>
      <pubDate>Mon, 22 May 2006 15:58:43 GMT</pubDate>
      <link>http://www.anl.com/pages/case-rosekung.htm</link>
      <category>Document and Records Management</category>
      <description><![CDATA[<FONT face="Verdana">Dr. Rose Kung - Case Study </FONT>
<p><FONT face="Verdana">"For more than three years we have enjoyed the luxury of having an office with no filing cabinets bulging with patient charts, files and documents. Yet we still have all patient information at our fingertips – or more accurately, at just a few clicks of our computer mouse.” – Dr. Rose Kung </FONT></p>
<p><FONT face="Verdana">The Headache </FONT></p>
<p><FONT face="Verdana">I operate a busy ob/gyn practice at Women’s College Hospital in Toronto. As my practice grew, the storage and retrieval of patient charts along with all the associated examination documents became a burdensome task, not to mention the cost of filing cabinets, file folders and my assistant’s time taken to access and file the relevant material for each patient’s visit. </FONT></p>
<p><FONT face="Verdana">Also, it was not uncommon for an occasional document to be misplaced or misfiled, resulting in additional time being needed to locate the missing material. </FONT></p>
<p><FONT face="Verdana">Since we were already using computers in the office to handle such administrative tasks as our billing procedures I began to consider whether a computer could also be used to speed up the process of storing, accessing and archiving all data in our patient files. ... Thus, we were introduced to A&amp;L’s Document Console. </FONT></p>
<p><FONT face="Verdana">The A&amp;L Solution </FONT></p>
<p><FONT face="Verdana">It has since proven to be a good decision. Our office efficiency has improved and there have been no adverse effects on patient care. In addition, I am happy to say that a further important benefit has been an improvement financially. For the number of patients I service, I would need two large filing cabinets to store their charts and documents in the traditional manner. With the document imaging system I have no need for filing cabinets. I also save costly floor space. Likewise, there are no hanging files or file folders to purchase. The cost saving thus realized paid for the A&amp;L Document Console software. </FONT></p>
<p><FONT face="Verdana">I can understand a physician’s reluctance to destroy hard copy patient documents. I also experienced this trepidation. But over a period of time, the reliability of the system convinced me that it was no longer necessary to save them. After all, this would defeat the purpose of having the system in the first place. Of course, our database is backed up every day by the hospital’s Information Technology department; so if something does happen to our computer system we always have a copy of our files from which the database can be easily recreated. Now our hard copy documents are regularly sent for shredding every two weeks or so... </FONT></p>
<p><FONT face="Verdana">Security of patient information is not an issue since password protection is provided by the system. Also, different types of access capabilities can be assigned to staff at the time their passwords are established. </FONT></p>
<p><FONT face="Verdana">Another advantage the system provides is the ability to send copies of patient documents to another physician anywhere in the world, directly from my computer, as long as that physician has the capability to receive information electronically. This can be done by fax or by an e-mail attachment and avoids the necessity of having to make a hard copy of a document as well as the expense incurred in mailing it. In the same manner, electronic documents can be received from other sources and easily attached to a patient’s file in my database... </FONT></p>
<p><FONT face="Verdana">The Conclusion </FONT></p>
<p><FONT face="Verdana">All in all we find the convenience and time saved by using this system to be a great advantage to our office operations. It also presents an efficient way to archive inactive patient files, and in my type of practice they are in the majority. After having used this system for over three years now, I would not want to return to the manual method for storing patient charts and files. </FONT></p>
<p><FONT face="Verdana"><a title="A&amp;L Document Console" href="http://www.anl.com" target=_blank name="A&amp;L Document Console">To find out more about the Document Console click here</a> </FONT></p>]]></description>
    </item>
    <item>
      <title>Microsoft Windows XP Tablet PC</title>
      <pubDate>Mon, 2 May 2005 15:52:38 GMT</pubDate>
      <link>http://www.anl.com/pages/dc-tabletpc.html</link>
      <category>Document and Records Management</category>
      <description><![CDATA[<FONT face="Verdana">Microsoft Windows XP Tablet PC Edition has all the capabilities of Windows XP Professional, extending the core operating system with pen, ink, and speech functions. The Tablet PC offers a more natural and intuitive mobile computing experience by integrating pen capabilities more deeply into the operating system and the programs. </FONT>
<p><FONT face="Verdana">Windows XP Tablet PC Edition enhances productivity by delivering deep pen-and-ink integration. You can share your ink documents with others—even if they are not using a Tablet PC. </FONT></p>
<p><FONT face="Verdana">Significant improvements to word and case recognition in Tablet PC Input Panel include a dynamic ink-to-text conversion process and the option to make corrections before you insert text. Using an ‘electronic’ pen to annotate over a document or template and save the file with your own handwriting, truly enhancing your paperless office solution. Let us show you how A&amp;L Document Console, in conjunction with XP Tablet Edition, can improve your office or business workflow. </FONT></p>
<p><FONT face="Verdana"><a title="Paperless Office Solutions" href="http://www.anl.com" target=_blank name="A&amp;L Document Console">A&amp;L Document Console</a></FONT> </p>]]></description>
    </item>
    <item>
      <title>Records Management and Document Imaging</title>
      <pubDate>Thu, 6 Apr 2006 13:40:57 GMT</pubDate>
      <link>http://www.anl.com/</link>
      <category>Document and Records Management</category>
      <description><![CDATA[<FONT face="Verdana">Imaging is the process of converting original (source) paper documents into electronic images. This process is accomplished by passing each document through a scanner (much like a copier), which transfers the image onto a computer. The image is then compressed and indexed. The next step is to transfer the images onto another medium, such as a Compact Disk, DVD-RW, Optical Disk, Hard Drive etc. for storage. Document Management can also include the storage and organization of various types of data. </FONT>
<p><FONT face="Verdana">Recording the image is a relatively easy step. The key however is retrieval. Once the data is stored, how do we get them back? From a software standpoint, however, you need a system that accurately indexes each piece of paper or data stored. </FONT></p>
<p><FONT face="Verdana">Some points to remember on good features for a Document Management application. </FONT></p>
<p><FONT face="Verdana">1. Robust database on which to conduct retrieval / searches </FONT><br/><FONT face="Verdana">2. An alternate storage method that replaces paper and microfilm </FONT><br/><FONT face="Verdana">3. Ease of use </FONT><br/><FONT face="Verdana">4. Built in security levels to limit access within your organization </FONT><br/><FONT face="Verdana">5. Ability to have software data encrypted so that no one from outside the system can access </FONT><br/><FONT face="Verdana">6. Can integrate into existing system/network </FONT><br/><FONT face="Verdana">7. Notes can be attached to any of the imaged documents to better know what they are for </FONT><br/><FONT face="Verdana">8. The data is portable to any storage medium</FONT> </p>
<H5><FONT face="Verdana">General cost justification for a business </FONT></H5>
<p><FONT face="Verdana">CD/DVD can hold up to 1 full filing cabinet: </FONT><br/><br/>- <FONT face="Verdana">Save on cost of file cabinets</FONT><br/>- <FONT face="Verdana">Save on floor space </FONT></p>
<p><FONT face="Verdana">Labor saving: </FONT><br/><br/><FONT face="Verdana">- Speed of retrieval greatly enhanced</FONT><br/>- <FONT face="Verdana">Negates moving overly heavy boxes</FONT><br/>- <FONT face="Verdana">No refilling of documents</FONT><br/>- <FONT face="Verdana">No searching for lost documents</FONT><br/>- <FONT face="Verdana">Reduces number of people needed to “file paper” </FONT></p>
<p><FONT face="Verdana">Security: </FONT><br/><br/><FONT face="Verdana">- No lost documents </FONT><br/>- <FONT face="Verdana">Duplicate CD/DVD or other media can act as a backup and be stored off site </FONT><br/><br/><FONT face="Verdana">Eliminates Paper: </FONT><br/><br/>- <FONT face="Verdana">Printing multiple copies unnecessary - Access can be shared </FONT><br/>- <FONT face="Verdana">Copies can be faxed or emailed directly from the computer </FONT><br/>- <FONT face="Verdana">You can cross search in seconds </FONT></p>
<p><FONT face="Verdana">Storage Space: </FONT><br/><br/>- <FONT face="Verdana">Use space for productive money making area </FONT><br/>- <FONT face="Verdana">All data in one location </FONT></p>
<p><FONT face="Verdana"><a href="http://www.anl.com/pages/dcwebinfo.shtml" target=_blank>Click here if you are looking for an Electronic Document Management Software solution</a> </FONT></p>]]></description>
    </item>
    <item>
      <title>How to become Web Wise</title>
      <pubDate>Tue, 4 Apr 2006 15:28:12 GMT</pubDate>
      <link>http://www.anl.com/pages/feature2.htm</link>
      <category>Internet Security and Cybercrime</category>
      <description><![CDATA[<FONT face="Verdana">The Internet has rapidly become a part of our daily lives. It has erased borders between communities and has changed the whole globe by becoming a single entity. It is a significant tool offering an unconstrained quantity of information and services from around the globe. By using your PC, you can read a newspapers, order books, input and process data, view pictures or listen to radio stations from around the planet, with countless Web sites and services added daily. It can be overpowering; and at times, it's difficult to find the precise information you want. Knowledge is what keeps you surfing safely, and protecting your information, and so ignorance of the hazards is no excuse. Some of these threats can take the form of Viruses, Hackers, Spyware, Malware, Worms, Trojans and new to the scene, of internet threats, Phishing. If you are not sure what they mean then you must take the time to educate yourselves and how they can affect you. </FONT>
<H5><FONT face="Verdana">Computer Viruses</FONT> </H5>
<p><FONT face="Verdana">A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Even a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. </FONT></p>
<H5><FONT face="Verdana">Hacker / Hacking</FONT> </H5>
<p><FONT face="Verdana">Hackers have an ability to bypass or override password protection and other security strategies. Hackers often work at a distance from their target computers by abusing the facilities of the internet for the purpose of gaining unauthorized access to steal and/or corrupt data. </FONT></p>
<H5><FONT face="Verdana">Spyware</FONT> </H5>
<p><FONT face="Verdana">Spyware is software that covertly gathers information through the user's Internet connection without his or her knowledge, usually for advertising. Once installed, the spyware monitors user activity on the Internet and transmits information in the background to someone else. </FONT></p>
<H5><FONT face="Verdana">Malware</FONT> </H5>
<p><FONT face="Verdana">Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. </FONT></p>
<H5><FONT face="Verdana">Worms </FONT></H5>
<p><FONT face="Verdana">A worm is a program or algorithm that replicates itself over a computer network and performs malicious actions, such as using up the computer's resources and possibly shutting the system down. </FONT></p>
<H5><FONT face="Verdana">Trojans </FONT></H5>
<p><FONT face="Verdana">A Trojan is a benign destructive program that hides as an application. One of the most dangerous types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your PC. </FONT></p>
<H5><FONT face="Verdana">Phishing </FONT></H5>
<p><FONT face="Verdana">The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to defraud the user into surrendering private information that is used for identity theft. The e-mail directs the user to visit an illegitimate Web site where they are asked to update personal information that the legitimate organization already has. The bogus Web site, however, is set up solely to steal the user’s information. </FONT></p>
<p><FONT face="Verdana">An unwanted computer virus, and/or PC problem can harm hardware, software and productivity. Learning how to browse the web safely, keeping informed and protected is always the best policy. </FONT></p>
<p><a href="http://www.anl.com/pages/softword.htm" target=_blank><FONT face="Verdana">Click here to view other Softwords publications</FONT></a><FONT face="Verdana"> </FONT></p>
<p><FONT face="Verdana">Note: All issues from the year 2000 are provided in Adobe Portable Document Format (PDF). To view these files, you need to have Adobe Acrobat® Reader installed on your computer. You can download this free software from the Adobe Web site. </FONT></p>]]></description>
    </item>
    <item>
      <title>The Efficient Handling of Patient Records</title>
      <pubDate>Fri, 31 Mar 2006 15:32:35 GMT</pubDate>
      <link>http://www.anl.com/</link>
      <category>Medical Office Practice Management</category>
      <description><![CDATA[<FONT face="Verdana">The efficient handling of patient records within a medical office can have far-reaching effects on many areas of the practice, including telephone management and physician and staff management. Few medical offices in Canada are entirely paperless, although numbers are growing annually, so it is still the majority of offices that need to tighten up their record management systems. Many years ago, I was called into an office to help improve staff telephone management. The office received numerous complaints from callers who constantly reached busy signals, or were put on hold for anywhere up to 10 or 12 minutes. Several patients transferred to other doctors because they found it impossible to get through to the office to make appointments. Other patients became no-shows when they couldn’t get through to cancel an appointment. </FONT>
<p><FONT face="Verdana">On interviewing the staff and observing what was happening at the front desk, I realized that the main culprit here was a badly managed record system rather than poor telephone management. Charts were often not where they should be – in the filing system. Completed chats sat in piles in the reception area waiting to be filed. Doctors took charts home with them to write progress notes, or left them in any one of a dozen different places within the office. Thus, when a phone call generated the need to find information from a chart, the phone lines were tied up as the staff put the caller on hold to search for the chart. Staff spent an unacceptable portion of each day hunting for charts when they should have been completing other work, and doctors’ time was wasted as they often had to delay returning telephone calls – or even seeing patients – until a chart had been found. General inefficiency pervaded every area of office productivity, and in nearly every instance this could be traced back at some level to poor chart management. I always recommend that no chart should be out of the system for more than twenty-four hours whether they have been completed or not. Physicians should get into the habit of writing or dictating their progress notes at the end of each patient visit. Not only does this help get the chart back into the system, but it takes a lot less time to write notes when the information is still fresh than it does to write notes after seeing dozens of patients. Doctors should never remove a chart from the office to complete at home without a proper tracking system in place to ensure that the whereabouts of the chart are known to staff. </FONT></p>
<p><FONT face="Verdana">Staff, too, must take their share of responsibility for ensuring charts are where they should be – in the filing system – and abide by the ‘twenty-four hour rule’ to return them. If the chart isn’t completed at the end of the day (e.g. an insurance for or medical/legal letter is needed) the chart should still be returned to its proper place on the shelf or in the cabinet, with a log kept up to date of work that has yet to be done. I have visited hundred of offices over the past 25 years as a Practice Management Consultant and unfortunately have found that there are still far too many physicians and staff who don’t afford the proper degree of importance to their charts and filing systems. Patient charts should be considered the heart of a practice, and without a high level of efficiency in this area overall office productivity suffers, and doctors are unable to provide consistently excellent patient care. </FONT></p>
<p><FONT face="Verdana">(This article first appeared in The Practice Manager, a newsletter published by Don Price &amp; Associates.) </FONT></p>
<p><FONT face="Verdana"><a href="http://www.anl.com/pages/softword.htm" target=_blank>Click here to view other Softwords publications</a> </FONT></p>
<p><FONT face="Verdana"><a href="http://www.anl.com/pages/dcwebinfo.shtml">Click here if you are looking for an Electronic Document Management Software solution</a> </FONT></p>
<p><FONT face="Verdana" color=#cccccc>Note: All issues from the year 2000 are provided in Adobe Portable Document Format (PDF). To view these files, you need to have Adobe Acrobat® Reader installed on your computer. You can download this free software from the Adobe Web site.</FONT> </p>]]></description>
    </item>
    <item>
      <title>Why Update? Why Not!</title>
      <pubDate>Thu, 30 Mar 2006 11:29:42 GMT</pubDate>
      <link>http://www.anl.com/</link>
      <category>Computer News and Technology</category>
      <description><![CDATA[<FONT face="Verdana">Technological changes in the medical industry are simply a part of life. Sometimes it’s due to security concerns and other times it’s to upgrade on the current situation. But security consists of many things. When an employee leaves the company, are locks and security codes changed? User names and passwords? These issues must be acted on and dealt with immediately and has nothing to do with the existing hardware or software. The hardware and software would work just fine if no changes had occurred with the employment status. If a disgruntled employee leaves, are they taking personal or valuable information with them that should be left in the office? With the advent of PIPEDA, otherwise known as the Privacy Act, greater care must be taken to secure information from leaking into the public domain. </FONT>
<p><FONT face="Verdana">With the computer, the public domain can be a two way street which can also be accessed through your computer if you have access to the Internet. As most of you know, “www”, stands for “World Wide Web”. You can surf the web and look for just about any information you wish. However, an astute computer “intruder” can send out signals, similar to sonar, and if they get signals back, that’s a hint that somebody out there may not be properly protected. This “intruder” may then try a number of ways to force their way into your computer and see what’s available. That’s why there are a number of companies that produce security software and peripheral hardware to prevent it. Anti-virus “Suite” programs may now include firewalls and other protectants like spam filters, incoming/outgoing e-mail scans, and script blocking. As technology forges ahead, everyone will get caught up in it’s crest and be forced to move along especially if one of the leaders like Microsoft moves forward. Working in conjunction with other leaders in the software and hardware industries, companies are constantly looking to improve their products. Security with Microsoft is no different. </FONT></p>
<p><a href="http://www.anl.com/pages/soft-pdf/March2005.pdf" target=_blank><FONT face="Verdana">Click here to read the full article in publication</FONT></a><FONT face="Verdana"> </FONT></p>
<p><a href="http://www.anl.com/pages/softword.htm" target=_blank><FONT face="Verdana">Click here to view other Softwords publications</FONT></a><FONT face="Verdana"> </FONT></p>
<p><FONT face="Verdana">Note: All issues from the year 2000 are provided in Adobe Portable Document Format (PDF). To view these files, you need to have Adobe Acrobat® Reader installed on your computer. You can download this free software from the Adobe Web site. </FONT></p>]]></description>
    </item>
    <item>
      <title>The Effects of Cybercrime</title>
      <pubDate>Fri, 20 Jan 2006 13:26:55 GMT</pubDate>
      <link>http://www.anl.com/pages/feature.htm</link>
      <category>Internet Security and Cybercrime</category>
      <description><![CDATA[<FONT face="Verdana">When you purchase a home it comes with a door and a lock. You always will make sure that the door/lock exist and that the lock is working properly. If you want you can aim to further secure your home against any threats. You may purchase a new security system, an additional lock or maybe even a pet dog for added safety. Why would you not secure your investment? Would you invite criminals to use your home to commit additional crimes wherever he/she pleases? </FONT>
<p><FONT face="Verdana">When it comes to your PC or Network, you need to ask yourself the following questions. </FONT></p>
<p><FONT face="Verdana">- Would you like to have yourself, organization or business responsible for cyber-crime, without you knowing? </FONT><br/>- <FONT face="Verdana">Would you like to be prosecuted for something you did not do? </FONT><br/>- <FONT face="Verdana">Would you like to be sued for privacy violations? </FONT><br/>- <FONT face="Verdana">Would you like to be the base of operations for major crime? </FONT><br/>- <FONT face="Verdana">Would you like to become another survey statistics? </FONT><br/>- <FONT face="Verdana">Would you like to loose clients due to lack of public confidence in your Information Technology system? </FONT><br/>- <FONT face="Verdana">Would you like to be the VICTIM? </FONT></p>
<p><FONT face="Verdana">So how are criminals committing the crimes? We have listed some of the tools of the trade below.</FONT> </p>
<p><FONT face="Verdana">•Wireless networking technology poses the biggest problem, as an unsecured network can be hacked from someone outside using a simple radio antenna, PDA or cell phone. </FONT></p>
<p><FONT face="Verdana">•Password Crackers (Software designed to decrypt passwords, so they can gain access) </FONT></p>
<p><FONT face="Verdana">•Network Scanning software that looks for open ports to gain access to a network (software or hardware based) </FONT></p>
<p><FONT face="Verdana">•Illegitimate Websites (fake URLs), to lure you into giving information over the web or even hack an un-patched (updated) system </FONT></p>
<p><FONT face="Verdana">•Spam is used to get email lists to possibly cause more damage </FONT></p>
<p><FONT face="Verdana">•Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to defraud the user into surrendering private information that is used for identity theft. </FONT></p>
<p><FONT face="Verdana">One may ask what are general reasons, for hacking, by cyber-criminals? Some are to gathering trophies, financial rewards, revenge, protest, criminal activity, identity theft, forging documents and just plain general mischief. </FONT></p>
<p><FONT face="Verdana">In the same fashion, computer viruses that can generate havoc on your PC system are just as criminal. Viruses can cost companies millions and dollars in time to repair an infected system. Recently, Microsoft went as far as to post a $250,000 bounty for the writers of the MSBlast worm and the SoBig.F virus. Organizations such as Interpol now have sections of their website devoted to cyber-crime, with other websites such as the IFCC “Internet Fraud Complaint Center” specializing in Internet Crime. </FONT></p>
<p><FONT face="Verdana">Hopefully, the information provided above will aid in protecting your PC from unwanted computer viruses, and PC problems that can harm hardware, software and productivity. The bottom line is that if you have a virus or if your computer has been hacked, you are no longer in control of your PC. If viruses, hackers or criminals destroy nothing else, they destroy your confidence in your PC or network, which is something that is quite valuable. Hopefully, the information provided above will aid in protecting your PC from unwanted computer viruses, and PC problems that can harm hardware, software and productivity. The bottom line is that if you have a virus or if your computer has been hacked, you are no longer in control of your PC. If viruses, hackers or criminals destroy nothing else, they destroy your confidence in your PC or network, which is something that is quite valuable. </FONT></p>
<p><FONT face="Verdana"><a href="http://www.anl.com/pages/softword.htm" target=_blank>Click here to view other Softwords publications</a> </FONT></p>
<p><FONT face="Verdana" color=#999999>Note: All issues from the year 2000 are provided in Adobe Portable Document Format (PDF). To view these files, you need to have Adobe Acrobat® Reader installed on your computer. You can download this free software from the Adobe Web site.</FONT> </p>]]></description>
    </item>
  </channel>
</rss>