Given that up to 50 percent of hospitalized patients are malnourished or at risk of malnutrition, the importance of identifying and addressing nutritional status is clear.
The White House and many Americans have pinned their hopes for defeating the COVID-19 pandemic on a vaccine being developed at “warp speed.” But some scientific experts warn they’re all expecting too much, too soon.
Physicians would be prudent to understand the National Practitioner Data Bank (NPBD) reporting procedures. This knowledge and understanding will help physicians participate in peer review and will reduce the likelihood of a physician being a subject ...
As COVID-19 took hold in March, U.S. doctors limited in-person appointments — and many patients avoided them — for fear of infection. The result was a huge increase in the volume of remote medical and behavioral health visits.
Medical practices face a variety of risks related to staff misconduct. The authors explore the potential risk areas and provides recommendations for minimizing them.
Given that up to 50 percent of hospitalized patients are malnourished or at risk of malnutrition, the importance of identifying and addressing nutritional status is clear. The authors highlight two innovative strategies.
The authors describe an abrupt and significant increase in out-of-hospital cardiac arrests seen by their hospital system-based EMS service during the COVID-19 pandemic.
This article discusses three elements—access to care, compassion, and transparency—that will result in significant changes in the near future and will allow medical care to continue even with the transformations taking place.
Despite the evolving business model of medicine, physicians must demand abundant time to educate, counsel, and share decisions with patients. The constellation of abundant time, true partnership, and sharing in decisions is the panacea to preventing ...
Health information technology provides critical life-saving functions and consists of connected, networked systems that leverages wireless technologies, which in turn leave such systems more vulnerable to cyber-attacks.