The FDA recalled 60 medical devices last year, and the running total for this year is 56. The good news is that there’s a startup working to make future totals lower. The startup, named Ketryx, ...
Early-stage development in technology usually follows a “fail fast” philosophy: build something simple, observe outcomes, and ...
Many medical device companies develop software using a traditional waterfall methodology in which each step is taken in sequence: requirements, design, implementation, verification, and validation ...
Discover how software developers for medical-device OEMs are balancing innovation and safety, and the challenges they face in making it happen. The medical-device industry is rapidly advancing, from ...
The International Electrotechnical Commission (IEC) and the International Organization for Standards (ISO) recently published a cybersecurity standard that has received limited press but may have a ...
Software in the healthcare industry has come a long way over the past 20 years. Medical device companies, like most life sciences companies, were a bit hesitant to incorporate software and automation ...
Medical software is the backbone of modern healthcare, supporting electronic health records (EHRs), diagnostic systems, imaging technologies and embedded software in medical devices like pacemakers ...
In-house and private practice counsel set out the challenges and opportunities of protecting software in medical devices and software as a medical device Medical device manufacturers have been ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
When the Federal Drug Administration (FDA) updated the provisions for medical device cybersecurity, one of those required the development of a software bill of materials (SBOM). It’s now mandatory for ...
Hacking pacemakers and insulin pumps is mostly hype; thankfully the scary stories are just that, scary possibilities that could supposedly happen if attackers were to target vulnerable devices. Some ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results