Thursday, May 22, 2014

Zane Pollard: The Bureaucrat Sitting on Your Doctor's Shoulder - WSJ.com

Zane Pollard: The Bureaucrat Sitting on Your Doctor's Shoulder - WSJ.com

The Bureaucrat Sitting on Your Doctor's Shoulder

The bond of trust between patient and physician has always been the essential ingredient in medicine, assuring that the patient receives individual attention and the best possible medical care. Yet often lost in the seemingly endless debate over the Affordable Care Act is how the health-care bureaucracy, with its rigid procedures and regulations, undermines trust and degrades care. In my pediatric ophthalmology practice, I have experienced firsthand how government limits a doctor's options and threatens the traditional doctor-patient bond.

I recently operated on a child with strabismus (crossed eyes). This child was covered by Medicaid. I was required to obtain surgical pre-authorization using a Current Procedural Terminology, or CPT, 2475.TW +1.12% code for medical identification and billing purposes. The CPT code identified the particular procedure to be performed. Medicaid approved my surgical plan, and the surgery was scheduled.

During the surgery, I discovered the need to change my plan to accommodate findings resulting from a previous surgery by another physician. Armed with new information, I chose to operate on different muscles from the ones noted on the pre-approved plan. The revised surgery was successful, and the patient obtained straight eyes.

However, because I filed for payment using the different CPT code for the surgery I actually performed, Medicaid was not willing to adjust its protocol. The government denied all payment. Ironically, the code-listed payment for the procedure I ultimately performed was an amount 40% less than the amount approved for the initially authorized surgery. For over a year, I challenged Medicaid about its decision to deny payment. I wrote numerous letters and spoke to many Medicaid employees explaining the predicament. Eventually I gave up fighting what had obviously become a losing battle.

Every surgeon must have the option to modify and change a surgical plan according to actual anatomical findings that only become apparent during surgery. For example, if a general surgeon operates on a patient with a suspected acute appendicitis and finds that the patient is actually suffering from an ovarian cyst, that doctor must be free to change the plan and do what is best for the patient. The physician should not be denied payment simply because of a rigid government requirement to follow only the pre-approved plan.

We all expect that doctors will do what is best for us according to their best judgment. This is part of the oath that doctors take when they graduate from medical school. When the government interferes with the doctor's right to select the treatment course and perform a necessary procedure, the integrity of the entire health-delivery system is compromised.

This same rigidity affects the dispensing of medications. I recently had to contend with a pharmacist's unwillingness to go against Medicaid rules and dispense a prescription for an eye drop medication for my patient, a teenager with glaucoma. This disease, involving high intraocular pressure, threatens sight if it is not controlled by medication.

My patient's glaucoma had been well controlled by a particular eye drop dispensed in a bottle available only in one size containing a dosage that would last for two months. Medicaid regulations only allowed the pharmacy to fill a prescription for a one-month supply. Medicaid did not want to approve my prescription.

The pharmacist asked me if I would change the prescription to order another Medicaid-approved medication that would satisfy the one-month-only supply policy. I refused because my patient's ocular pressure was well controlled by the particular medicine I had requested. Her vision was preserved because of that drug's effectiveness. Only after numerous contentious calls with the pharmacist and Medicaid was I able to obtain the prescription. Why should a physician have to struggle with the government for the most effective care for a patient?

Another example involved a life-threatening situation. I examined a 14-month-old child with the symptoms of Horner's Syndrome, a condition that can be caused by a neuroblastoma (a malignant tumor). I ordered a CT scan of the neck and chest, as these are the two most common sites where this tumor appears. Medicaid approved a CT scan of the chest only. I spent several hours on the telephone pressuring my state's Medicaid officials before I received permission to have both the chest and neck scanned. The scan of the chest was negative, but the scan of the neck revealed a malignant tumor. A pediatric surgeon removed the tumor and the child is doing well.

Had I accepted Medicaid's protocol and only obtained a scan of the chest, that child might not be alive today. Is that battle with government bureaucracy one that you are comfortable having your doctor fight when your child's life is at stake?

People of means, as well as those who need substantial financial assistance, must be able to trust their doctors. When government sets up rigid protocols that control the surgical procedures a doctor may perform, that limit the medicines approved for treatment, and that deny a critical diagnostic scan that may save a patient's life, the bond of trust is broken.

Dr. Pollard, a pediatric ophthalmologist with 40 years of experience, is director of the James Hall Fellowship in Pediatric Ophthalmology at Scottish Rite Children's Medical Center in Atlanta.



Stuart Don Levy

Tuesday, May 13, 2014

Restriction on Links Displayed on Google Searches

This is a very surprising ruling. It opens a can of worms. In the case of the plastic surgeon who was sued for malpractice don't the doctors prospective patients have the right to see information that is publicly available? Is it not a form of restriction of speech? Who resolves disputes over what should and should not be displayed? The internet is a tool. Restriction of search results is like trying to prevent people from being cut by the knives that they use.

Stuart Don Levy

Friday, May 2, 2014

How Equinix Is Productizing Flash Trading Computing Architecture - Forbes

How Equinix Is Productizing Flash Trading Computing Architecture - Forbes
High speed computer networks compete in advertising and in online trading of securities. 
http://www.forbes.com/sites/danwoods/2014/04/16/how-equinix-is-productizing-flash-trading-computing-architecture/?partner=yahootix

How Equinix Is Productizing Flash Trading Computing Architecture

In his new book, Flash Boys, Michael Lewis directs his gleeful analytic spotlight on flash trading. True to form, Lewis tells a heroic story, in this case about how a team from Royal Bank of Canada found a defense for fair play against a mysterious group of traders who seemed to be gaming the system.

But Lewis gives short shrift to one of the real stars of the story: the data center and the people who run it. The forces that the flash traders have taken advantage of are creating a new type of data center, one in which many companies seek to cluster together in one location so they can communicate faster. The phenomenon is called proximity co-location.

It is not just in finance that this is happening. The digital advertising industry in which massive amount of advertising dollars are spend through auctions that take milliseconds also has clusters of companies hosting together in one data center. So do companies who uses lots of cloud resources.

Lightning over Pentagon City in Arlington, Vir... Lightning over Pentagon City in Arlington, Virginia. (Photo credit: Wikipedia)

Equinix, the global data center and computing infrastructure supplier, is making a business out of productizing this architecture. So far, Equinix has become important hub for finance and advertising, providing companies with the ability to host their computers, connect with each other, and take advantage of other services depending on their need.

This seems like the beginning of a network effect. As Equinix accelerates the development of real time infrastructure in new industries that are seeking to imitate what happens in finance and advertising, it will become the default choice. It is time for business leaders who are waking up to the power of real time information to transform business processes to take a closer look at what is happening. Your industry may be the next to employ proximity co-location to support an innovation like flash trading or advertising exchanges.

Physics is the Law

One of the fascinating aspects of the tale Lewis tells is the role that the architecture of the data center and network plays in altering the speed of trading. A transaction that starts on a trading floor in mid-town Manhattan, may travel to Brooklyn, New Jersey, and many other destinations on its way to being delivered to an exchange.

While the virtual world of cyberspace is a set of beautiful abstractions, the implementation is a birds nest of hardware and network connections. Seemingly outmoded concepts like the physical distance matter a lot. Even with lots of high-speed connections and ultra high-powered computers, if you want really fast performance when two computers are going to talk to each other, they need to be physically near each other.

"Physics isn't just a good idea, it's the law!" said Mark Uhrmacher, founding CTO of ideeli, the pioneer in flash sales that required a hyper-scalable server infrastructure, who is currently a consultant specializing in fixing both architecture and technology leadership challenges.

The effects of this law are that many of the companies that engage in program trading and flash trading and advertising auctions attempt to locate their servers physically near the exchanges and the other companies they deal with. If you can shave milliseconds off of your response time, it can be a big deal.

"As long as there are marketplaces, like advertising exchanges, that have financial incentives to minimize latency these hubs will make sense," said Uhrmacher. "By reducing distances and switching points the same software/hardware will be able to perform better enabling more transactions and better business performance. In fact, I'm surprised someone isn't using these hubs for competitive differentiation in the IaaS/PaaS space against AWS."

Finance and Advertising are First

In the first two massive real time data processing infrastructures, program trading and advertising technology, Equinix has become the dominant hub for proximate co-location of the infrastructure, raising three interesting questions:

  • Why does proximity co-location matter for such infrastructure?
  • How long will it matter?
  • Does Equinix have an insurmountable lead for hosting future proximity co-location hubs as more industries adopt real time computing for high value business processes?

Why does Promixity Co-location Matter?

As John Battelle, search guru and opiner on technology, points out in his November article the creation of real time technology for delivering advertisements is one of the greatest achievements of the modern era. The broad story of the development of this infrastructure is fascinating and there are many victories that have been achieved including creation of:

  • A liquid market for on-line advertising inventory.
  • Online advertising auctions take place in less than 100 milliseconds and are conducted whilst the reader is waiting for her web or mobile page to load in her browser.
  • A incredibly effective data supply chain that combines usage data, demographics, and many other forms of data that is processed both in batch and real time to provide a huge amount of information for evaluating the value of a page view, and, importantly the fleeting value of the reader.
  • Massively scalable databases for accessing huge repositories in real time.
  • Advanced products such as re-targeting so that ads follow high value buyers around the web.

Proximity co-location is needed because once performance under 100 milliseconds is required, the system must be optimized from end to end. Google, Facebook, Amazon, Twitter, Netflix all have Byzantine distributed architectures that combine massive centralized data centers, distributed systems for processing, caching, highly optimized networks, into a massive systems that deliver high performance to users around the globe.

The proximity co-location hubs Equinix has created are a different animal from Google, Facebook and the others because they are open systems. Both ad tech and program trading follow the same pattern. There are many players who each are offering a service such as analytics, settlement/clearing, hosting, storage, compute, etc. that must be as fast as possible. Each player may provide a service that supplies or use services from another player and also must communicate at high speed with people requesting ads from all over the Internet. In addition, the services are sometimes competing with each other, and sometimes cooperation. Usually, a few big players are enforcing rules, usually informally, to make sure everyone gets along. For example, in the ad exhanges, Google has a lot to say about how things work but there is no strong governance framework like in the finance industry.



Stuart Don Levy

Attackers Use Microsoft Security Hole Against Energy, Defense, Finance Targets - NYTimes.com - NYTimes.com

Attackers Use Microsoft Security Hole Against Energy, Defense, Finance Targets - NYTimes.com - NYTimes.com
What is the obligation of software manufacturers to keep the software safe from hackers going forward... Microsoft Windows XP.
Who measures how bulletproof software is to hackers?
Which company has the lead in profiting from cybersecurity... Cisco, Intel, Microsoft, Symantec, Fireeye?
http://bits.blogs.nytimes.com/2014/05/01/attackers-use-microsoft-security-hole-against-energy-defense-finance-targets/?ref=technology

Attackers Use Microsoft Security Hole Against Energy, Defense, Finance Targets

A security vulnerability that affected all versions of Microsoft's Internet Explorer browser took on added urgency because the company had stopped supporting its Windows XP operating system.A security vulnerability that affected all versions of Microsoft's Internet Explorer browser took on added urgency because the company had stopped supporting its Windows XP operating system.

SAN FRANCISCO — By the time Microsoft warned customers of a nasty security hole in its web browser Saturday, a sophisticated group of attackers were already using the vulnerability against defense and energy companies, according to FireEye, the security company.

Things went from bad to worse over the weekend. FireEye's researchers watched as the attackers shared their exploit with a separate attack group, which began using the vulnerability to target companies in the financial services industry, according to Darien Kindlund, the director of threat intelligence at FireEye.

Even after Microsoft issued its advisory on Saturday, Mr. Kindlund said, "There was a notable increase in proliferation."

Soon, the attackers were using the vulnerability for so-called watering hole attacks, in which hackers infect a popular website with malware, then wait for victims to click to the site and infect their computers.

Mr. Kindlund said FireEye believed the two attack groups were nation-state sponsored. While he said the company did not yet have conclusive evidence, based on the groups' previous campaigns it was believed they were operating from China.

The vulnerability affected all versions of Microsoft's Internet Explorer web browser. Only those who had configured their browsers to run in enhanced protection mode were protected.

The situation took on added urgency because Microsoft stopped supporting its Windows XP operating system last month, meaning that any devices running Windows XP would be permanently vulnerable to attack.

Typically in its regular upgrade cycle, Microsoft waits to issue security fixes on the first Tuesday of every month — what system administrators call "Patch Tuesday." But given the gravity of the hole, Microsoft raced to issue a patch Thursday and decided to update Windows XP systems as well.

"The security of our products is something we take incredibly seriously," Adrienne Hall, the general manager of Microsoft's Trustworthy Computing project, said in a statement on Thursday. "When we saw the first reports about this vulnerability we decided to fix it, fix it fast, and fix it for all customers."

The timing of FireEye's discovery was fortuitous for the company, whose stock has tumbled 40 percent since a finding last month by NSS Labs, an independent research company, that FireEye's breach-detection systems underperformed similar offerings by Cisco Systems, Trend Micro and General Dynamics. NSS Labs actually issued a grade of "caution" to customers using FireEye's web and email malware protection systems.

The findings set off an unusual back-and-forth online between NSS Labs and FireEye. Responding to the report in a blog post, Manish Gupta, FireEye's senior vice president for products, said NSS Labs' test environment did not match the real threat landscape. NSS Labs' researchers responded in a blog post of their own — titled "Don't Shoot the Messenger." 

FireEye's stock, which had been trading at $65 before the NSS Labs report was released, has been tumbling and closed near $40 Thursday.

Mr. Kindlund, of FireEye, said this week's discovery of the security hole in Internet Explorer was proof that isolated tests did not reflect real-world threats. A separate finding by NSS Labs released in March had found that Internet Explorer was more secure than Google's Chrome and Apple's Safari browser.

"Look, we're focused on protecting and defending against real-world attacks," Mr. Kindlund said. "It's hard to model and test for that in any controlled way. Clearly, there's a disconnect between what's happening in the real world and what's currently being tested."



Stuart Don Levy