Share this:

Imaging & Radiology | Wake Radiology UNC REX Healthcare

great www.rexhealth.com

Schedule today. UNC REX and Wake Radiology have partnered together to provide specialized outpatient imaging services throughout the Triangle. With convenient locations in Raleigh, Cary, Holly Springs, Fuquay-Varina, Garner, Morrisville, Smithfield, Wake Forest, Chapel Hill, Wakefield and Knightdale. All Wake county residents will have easy ...MRI‧CT Scan‧Mammography‧UNC Rex Healthcare‧Diagnostic Radiology‧Ultrasound

499 People Used
More Info ››

Diagnostic Radiology | Wake Radiology UNC REX Healthcare

new www.rexhealth.com

Visit WakeRad.com to schedule an appointment. Schedule today. Wake Radiology UNC REX Healthcare performs a wide range of outpatient diagnostic exams including general X-rays, scoliosis imaging, Sitz marker studies, metastatic bone surveys and fluoroscopy exams.

162 People Used
More Info ››

>Video result for Rex Radiology Scheduling​

UNC REX Hospital Radiology - REX Health

best www.rexhealth.com

UNC REX Hospital Radiology 4420 Lake Boone Trail Raleigh , NC 27607. Get Driving Directions. Main Phone: 919-784-3023. Alternate: 919-784-3419. Fax: 919-784-3094.

111 People Used
More Info ››

Schedule Your Imaging Appointment | Wake Rad UNC REX

new www.wakerad.com

Schedule Your Imaging Appointment | Wake Rad UNC REX. Online. Call Us. Walk In. Our friendly scheduling team can be reached at 919-232-4700 Monday - Friday. You may also request a vein consultation or a screening mammogram appointment below. Online. Phone. Walk-Ins.

491 People Used
More Info ››

Open-Bore MRI Scans | UNC REX Healthcare | Raleigh, NC

trend www.rexhealth.com

Schedule an Appointment. Visit WakeRad.com to schedule an appointment. Schedule today. Related Locations. Wake Radiology UNC REX Healthcare (Raleigh Breast Care Center) 919-784-2449. 3100 Duraleigh Road Suite 204 Raleigh, NC 27612. North Carolina Surgery - REX Breast Care Specialists (Cary)

494 People Used
More Info ››

Mammography | UNC REX Healthcare | Wake County, NC

great www.rexhealth.com

REX Hematology Oncology Associates-Raleigh. 919-784-6818. 4420 Lake Boone Trail Rex Hospital, Suite 200 Raleigh, NC 27607. REX Women's Center. 919-784-3100. 4420 Lake Boone Trail Raleigh, NC 27607. Wake Radiology UNC REX Healthcare (Raleigh Breast Care Center) 919-784-2449. 3100 Duraleigh Road Suite 204 Raleigh, NC 27612. View More

308 People Used
More Info ››

Accredited Outpatient Medical Imaging | WakeRad UNC REX

tip www.wakerad.com

Wake Radiology UNC REX Healthcare is the first outpatient radiology practice in the Triangle to adopt state-of-the-art artificial intelligence (AI) technology to aid in breast cancer detection. We're implementing iCAD's ProFound AI®, an advanced, deep-learning AI software platform, as another tool our physicians may use in the effort to ...

458 People Used
More Info ››

Schedule Your Mammogram | FDA & ACR Approved | WakeRad UNC REX

best www.wakerad.com

Schedule your mammogram. It's easy to schedule your 3D screening mammogram at Wake Rad UNC REX. Simply fill out the information below and our schedulers will call you to finalize the details. You can also call our Scheduling Team Monday-Friday 7:30am - 5:30pm to schedule your appointment at 919-232-4700. If you recently had, or are planning ...

442 People Used
More Info ››

Medical Imaging Excellence in Chapel Hill | Wake Radiology

top www.wakerad.com

Wake Radiology UNC REX Healthcare - Chapel Hill. Address: 110 S. Estes Drive, Chapel Hill, NC 27514. Hours: Mon - Fri 7:30am-5pm; Select Saturdays 8am - 1pm. PRINTABLE MAP GET DIRECTIONS 919-232-4700.

463 People Used
More Info ››

Matthew D. Miller, MD | Radiology | UNC Health

top findadoc.unchealthcare.org

Wake Radiology UNC REX Healthcare (Raleigh Breast Care Center) 3100 Duraleigh Road. Suite 204. Raleigh , NC 27612. Driving Directions. (919) 232-4700. Appointments. (919) 784-2449.

240 People Used
More Info ››

Rex Diagnostic Imaging Service in Raleigh, NC

top doctor.webmd.com

Rex Diagnostic Imaging Service is a group practice with 1 location. Currently, Rex Diagnostic Imaging Service specializes in Diagnostic Radiology, General Surgery and Radiology with 1 physician. Rex Diagnostic Imaging Service Office Locations. Rex Diagnostic Imaging Service. 11200 Governor Manly Way # 106

139 People Used
More Info ››

Imaging & Radiology | UNC Health

hot www.unchealthcare.org

Imaging & Radiology. Access high-quality radiology and diagnostic imaging services at a UNC Health imaging center near you. You'll receive timely, accurate test results from our expert radiologists. What Is a Radiologist? A radiologist is a medical professional with advanced training to diagnose conditions using the latest imaging technology.

126 People Used
More Info ››

Raj Gondalia, MD | Radiology | UNC Health

great findadoc.unchealthcare.org

Get Directions Schedule by Phone Locations About Education Practice Locations . UNC REX Hospital Radiology. UNC REX Hospital Radiology ... Wake Radiology UNC REX Healthcare (West Raleigh Interventional Services and Vein Center) 4301 Lake Boone Trail. Suite 104. Raleigh, NC 27607.

376 People Used
More Info ››

Raleigh Radiology | (919) 781-1437

hot www.raleighrad.com

Raleigh Radiology | (919) 781-1437. SCHEDULE AN APPOINTMENT 919-781-1437. WAKE FOREST NOW OPEN Schedule Today by calling 919-781-1437 At The Vein and Vascular Center, our highly-trained radiologists perform a wide range of therapies including uterine fibroid embolization, treatment for varicose veins and spider vein treatment.

311 People Used
More Info ››

Schedule Appointment - Provider Portal

tip providerportal.wakerad.com

Schedule Appointment At WakeRad UNC REX, our highly trained scheduling team can coordinate appointments directly with our referring providers or, if preferred, directly with the patient. We take the time to "custom build" each radiology appointment.

461 People Used
More Info ››

Elizabeth A. Rush, MD | Radiology | UNC Health

tip findadoc.unchealthcare.org

Get Directions Schedule by Phone Locations About ... Practice Locations . Wake Radiology UNC REX Healthcare. Wake Radiology UNC REX Healthcare (Raleigh Breast Care Center) 3100 Duraleigh Road. Suite 204. Raleigh, NC 27612. Driving Directions (919) 232-4700. Appointments (919) 784-2449.

456 People Used
More Info ››

Reports & Imaging - Provider Portal

hot providerportal.wakerad.com

Online Services for Reports. As a benefit to our referring community, WakeRad UNC REX offers referring providers and their staff access to scheduled exams and radiology reports. Users can view, print and save radiology reports in a format that is compatible with your EMR. Contact April White at 919-788-7908 or via email for more information.

260 People Used
More Info ››

David I. Schulz, MD | Radiology | UNC Health

trend findadoc.unchealthcare.org

Get Directions Schedule by Phone Locations About ... Practice Locations . Wake Radiology UNC REX Healthcare. Wake Radiology UNC REX Healthcare (Raleigh Breast Care Center) 3100 Duraleigh Road. Suite 204. Raleigh, NC 27612. Driving Directions (919) 232-4700. Appointments (919) 784-2449.

97 People Used
More Info ››

3D Mammography in Knightdale | Wake Radiology

new www.wakerad.com

Our Knightdale office, like all of our other breast imaging locations, has been designated as a Breast Imaging Center of Excellence (BICOE) by the American College of Radiology. Make an Appointment You may request a screening mammogram appointment online or by contacting our Scheduling Team at 919-232-4700.

108 People Used
More Info ››

UNC REX Hospital Radiology Hospital in Raleigh, NC 27607

best www.wellness.com

Services UNC REX Hospital Radiology is a Hospital, clinic, emergency, medicine, doctor, ER, ICU, hospital room, hospital ward, nurse, doctor, physician, treatment facility Please call UNC REX Hospital Radiology at (919) 784-3023 to schedule an appointment in Raleigh, NC or get more information.

256 People Used
More Info ››

Useful Blogs

9 Most Crucial Cyber Security Tricks for Students

Specialists from the International Digital Accountability Council viewed that 79 out of 123 tried applications offered information to outsiders. The information included names, email locations, and area information.  Over 140 outsider organizations are getting information from ed-tech applications. For instance, the application Shaw Academy, which partook in an eightfold increment since the COVID-19 lockdown, was viewed as offering clients' area information and individual identifiers to the promoting firm Web Engage. The following are eight different ways that you can refer to protecting Cyber Security on your own.  1. Secure your Online Idea Instagram, Twitter, and Facebook let you update guardians and understudies in a fun and connecting way. Be that as it may, to proceed securely, you'll need to audit the security settings of each record to ensure the protection privileges of your understudies. Realize who can perceive what and which stage is sharing what information and with whom. A couple of models:  Twitter: Set your homeroom Twitter record to 'ensured' so that the main individuals you follow can see your tweets.  Facebook: Make the record 'Noticeable to companions just' in the protection control settings.  Obscure the essence of understudies: Unless you have earlier authorization to utilize their picture in your posts, you could be abusing the protected freedoms of understudies and guardians. Utilize a free application to obscure your understudies' appearances and whatever other data that may uncover their personality.  2. Use Applications, Apparatuses, and Sites that Scramble Information Encryption gets and shields any information you send online from programmers, network busybodies, and outsiders. Use just sites with 'HTTPS in their URL and a lock symbol close to it. The ’s’ means 'secure' (scrambled), which implies that any information spilled or acquired by unapproved parties is unusable.  iOS applications implement all clients to impart through HTTPS. However, the equivalent can't be ensured for Android applications. It's ideal to either look at each apparatus's security strategy or investigate the site for an authority stamp from an information insurance association. Class time, for example, has marked the California Student Privacy Alliance arrangement. If an application or site is covered by COPPA (Children's Online Privacy Protection Act), severe information safety efforts will, as of now, be set up.  3. Have A Recuperation Plan Illuminating guardians: Mistakes occur. You may have inadvertently caught an understudy's name or address in a photograph you've posted via online media, or there may be an inescapable break of individual or delicate data. Give an unmistakable breakdown of the means taken if an information break at any point happens.  4. Utilize A VPN For all schooling-related assignments, access to the establishment's organization should require a private VPN association. It scrambles and accordingly shields your understudies' web traffic from interceptors who might need to take passwords.  5. Utilize Solid and Novel Passwords Cybercriminals sell many taken usernames and passwords on the dim web. Frail passwords can be speculated or broken in milliseconds, uncovering your understudies' delicate information. A secret phrase chief is an application that produces uncrackable passwords and auto-fills them at whatever point you want them 6. Be Careful in Regards to Phishing Tricks Schools and colleges as targets: Student data sets are a goldmine of individual understudy data. A phishing trick depends on a staff member being fooled into answering or tapping on a connection in a sham email or instant message to spread malware, take qualifications, or be more regrettable. Cybercriminals have utilized understudy messages to apply for deceitful advances, take personalities, and contaminate whole organizations, smashing them.  7. Know The Agreements At the point when you join a site, pursue a web-based media account, download an application or even utilize an application you currently own–know about the agreements you consent to by downloading as well as utilizing that application. An application you use to check your face, for instance, could share that information joined with name, perusing history, contact data, and more to address a huge security hazard for you later on.  8. Try not to Share Individual Data This one is genuinely self-evident; however, it bears rehashing: Don't share individual data or, if nothing else, know who may peruse (or at last 'discover') concerning what. It doesn't take a lot of data break an email address with a feeble secret phrase or your complete name and address–to empower somebody willing to utilize somewhat logical thinking and web search abilities to make a danger to your character, monetary security, and that's only the tip of the iceberg.  Likewise, it implies that it's perilous to impart records to companions a Netflix account, for instance.  9. Different Data Security Tips for Students and Schools Update applications and gadget working frameworks  Keep (secure) reinforcements of significant records or information bases  Try not to utilize unstable WiFi sources  Know your specific situation and 'organizations' (physical and computerized)  Conclusion Getting your data against digital robbery starts with having solid passwords. It's a basic piece of beginning guidance any educator can give to their understudies. Attempt an encoded secret word supervisor application like NordPass, made by the network protection specialists behind NordVPN.  Above are the 9 Most Crucial Cyber Security Tips that you must be interested in and learn many things to stay safe while surfing online. 
Read More

How to Remove Your Phone Number and Email from TikTok?

TikTok is perhaps the most well-known and most utilized web-based media platform to start your vocation in demonstrating and imaginative reasoning. In TikTok, you can make recordings on seems like music, voice-over, make unique substance, and play out your activity on various sounds. Before you start your excursion, initially, you need to make your record on TikTok. While you make your record, you need to exchange information utilizing your telephone number and email address. Furthermore, assuming you need it, you can likewise unlink/eliminate the telephone number and email from TikTok.  In any event, being the most well-known web-based media, the TikTok application needs to chip away at its settings for client improvement. TikTok doesn't have any inbuilt highlights to unlink or eliminate telephone numbers and messages. Notwithstanding, you can eliminate telephone numbers by revealing an issue or supplanting and changing telephone numbers and emails from TikTok.  Today, in this article, even TikTok doesn't allow you to eliminate your telephone number and email from TikTok. We will direct you on how you might report an issue on TikTok, and you might have the option to eliminate the telephone number and email from TikTok, which will be useful for you. Peruse the full article and follow bit by bit notice underneath to play out your activity.  1. Unlink Our Phone Number and Email from TikTok You may be interested in a similar inquiry more than once, why TikTok doesn't permit you to eliminate your telephone number and email. There is no enormous science behind this inquiry.  It is only my view; I figure TikTok doesn't permit you to eliminate your telephone number and email from your record because  To check your record.  To track down your record on TikTok, on the off chance that you lost your secret phrase and username.  Your telephone number and email assist you with recuperating your specific record if you failed to remember your record.  To follow, gather data on their client's conduct, and meet organization strategy.  To turn over its client back to the application.  2. Unlink or Remove Your Phone Number and Email from TikTok? The response to this inquiry is true, there is a way of supplanting your telephone number and email from TikTok, yet after you eliminate your telephone number and email, you will not have the option to get to highlights like  You can't do live streaming.  Your record won't be approved.  You can't buy or send gift vouchers.  You will not have the option to recuperate your TikTok account.  Assuming you need to eliminate your telephone number and email from your TikTok account, then, at that point, kindly follow the means referenced beneath as per its title.  3. Remove Your Phone Number from TikTok Permanently On the off chance that you lost your telephone number, you could supplant it with your new one. However, assuming you need to eliminate your telephone number, follow bit by bit referenced beneath with the picture.  Open the TikTok application on your gadget.  After opening the TikTok application, click on the "Me" with the individual’s symbol.  Presently you will see your profile; click on the three vertical spots.  You will go to the "Settings and protection," from that point forward, decide to Report an issue under "Backing."  Presently under "Input and help," select Account and Profile.  From that point onward, click on the Email and Phone Number.  You will see a message guide from TikTok, asking you, "Is your concern settled?"  Snap-on the No button. After you click on the no button, you will see a message saying, "Thank you for your input."  Presently you avoid the message and again click on the Still have an issue.  After you click on the "Still have an issue," you will see the text box for criticism.  Presently type your concern in the container, detailing that 'you don't have any admittance to your telephone number connected in your record.'  At last, click on the Report button.  4. How to Remove Your Email Address from TikTok? Go to the TikTok application on your gadget.  After you get a login to your record, click on the "Me" with the individual’s symbol.  From that point onward, you will see your profile, click on the three vertical dab  Presently, you will go to the "Settings and protection."  From that point onward, pick Report an issue  Presently, under "SELECT A TOPIC," pick Account and Profile  From that point onward, click on the Email and Phone Number  Presently, click on the Changing the Email related with a record from the subjects.  You will see a few aides, click on the No button  From that point onward, once more, you need to tap on the Still have an issue  Presently in the message box, notice your concern with email and snap on the Report button.  Conclusion By following the means referenced above, as indicated by their title, you can, without much of a stretch, eliminate your telephone number and email on TikTok. Presently, you can likewise add another telephone number and email after you eliminate the telephone number and email or on TikTok. You can likewise visit our authority site Online Help Guide, for various questions on the application, webmail, smartwatch, and some more.
Read More

Recover Your Instagram Account without Email and Phone Number with Easy Steps

Instagram is regarded as a totally famous social networking app wherein customers can proportion photographs and videos. Further, the customers also are furnished with numerous different capabilities withinside the app, making it greater attractive and interesting for the customers. Besides, developing an Instagram account is without a doubt easy, however, preserving the account may be without a doubt complicated every now and then as in a maximum of instances customers lose their get entry to their Instagram account.  Fortunately, you can recover an Instagram account without an email and phone number with the aid of using easy strategies furnished in this article. Recover Instagram Account without Phone Number This answer is appropriate for the ones customers who now do not have to get entry to healing electronic mail cope with and password. • To provoke this method, the consumer is needed to release the Instagram app. • After launching the app, the consumer wishes to click on an assist for check-in choice to get a better Instagram account without phone range.  • Then, the consumer might be furnished with numerous alternatives to get better their account. • Here, the consumer wishes to pick a log-in with a Facebook alternative. • Once the consumer faucet on that precise alternative, the consumer might be directed to the Facebook interface wherein they're required to go into their username and password. • Thereafter, the consumer is needed to faucet on the OK button to log off their Instagram account. Besides, there are numerous customers who've now not gotten entry to their Facebook account however may have to get entry to one of the healing alternatives to  recover an Instagram account without an email and phone number So, in such instances, the customers can choose a few of those easy opportunity alternatives for getting access to the Instagram account the usage of one of the healing alternatives to be had.  Using Recovery Email The ones customers who now do not have to get entry to their recovery phone range can choose this answer or attempt logging in with their Facebook account. • In order to method this procedure, the consumer is needed to release the Instagram app. • Once the app is launched, the consumer wishes to pick assist for check-in alternative. • Now, from the healing alternatives, the consumer is needed to pick get better thru electronic mail alternative. • After choosing this alternative, the consumer might be furnished with a recovery hyperlink. Further, the consumer wishes to open the precise hyperlink for verification. After the account verification, the consumer might be furnished with a choice to create a brand new password for his or her account. Recover Instagram Account without Recovery Email iD Using Recovery Phone Number This answer is apt withinside the instances wherein many people need to recover their Instagram accounts without email and phone numbers. However, one also can log in to the usage of a Facebook account. For this procedure, the consumer wishes to observe the same steps as said earlier. But, for this method, the consumer is needed to pick the healing alternative as the smartphone range as a code might be despatched to their registered range. Further, as soon as the consumer gets a code they want to offer the verification code while prompted. Once their account is verified, the consumer might be furnished with a choice to create a brand new password for his or her account. And after saving the password, the consumer can without problems get entry to their Instagram account. Besides, if a consumer nonetheless has queries, they could easily touch the assist middle for the favored help and answers for convalescing their Instagram account.  If you don’t understand the way to recover an Instagram account without an email and phone number, you then definitely should understand approximately that via the referred to steps. Steps to get better Instagram account the usage of Facebook: • First of all, you want to open the Instagram app to your smartphone or visit the respectable sign-in web page out of your browser. • Now you may click on Sign in alternative to be had subsequent to username and password. • Now you may click on the Forgot Password hyperlink subsequent to logging in. • After that, you may input your username or electronic mail cope with that is related to your Instagram account the password you want to get better. • Now you may pick the choice Instagram password Reset the usage of the Facebook alternative after which click on the Reset tab. • Now you may without problems, input the brand new password in your Instagram account after which affirm it after re-coming into it.  Conclusion Well, Instagram proffer the various easy methods that may be used to get better their account and in case you don’t understand how to make use of them to get better your Instagram account, you then definitely have to understand approximately that.  By following the above-given steps, you can understand how do I get to recover my Instagram account without an email and phone number. But in case you are nonetheless getting problems while convalescing your Instagram account, you may get assistance from the customer service crew at Instagram.
Read More

User Authentication: Understanding The Basics & Top Tips

The most important aspect of website users is the authentication of human to computer interactions. Hence, user authentication is important to understand when someone is creating a website login procedure. Therefore, whether you are looking to be up the internal security or increasing the customer acquisition, or providing a better experience for exploring your site, it is important to know about the authentication process basics. Therefore, we are presenting you with this guide. In this way, you can understand: With the help of better understanding, your organization can understand the better understanding. With the help of a better understanding, your organization can be more effective with the registration and the login processes that can go past the traditional offerings. Moreover, when you go for more different types of authentications, you can get several conventional offerings. Furthermore, when you go for more user authentications, you can get the passwords and more options with fewer alternatives. What can User Authentication Do? The authentication process is the security process that can cover the human to computer interactions that will require the login and can register there. Furthermore, simply the authentications can ask each user about "who are you?" and verifies the response. Moreover, when users can ask for the account, they must create a unique ID and the key that will allow them to access the account later. Mostly the password and username are used as the key and ID. However, the credentials that can include various types of user authentication as well. How Does the User's Authentication Work? The authentications are mostly interchangeable with two separate terms that can work together and create a secure login process. To put the user authentication, you must have three up to the mark tasks: Manage the user connection between the website user and the human user. Verify the identities of the users Decline or approve from the authentication so that the user can identify the user. Importance of User Authentication Understanding the user's authentication is important because it is the key step process that can keep unauthorized users access to every sensitive information. Moreover, they strengthen the authentication process because one user has sensitive information, and another user can only have access to that information if they want. Top User's Authentication Methods Some methods are also called the authentication factor, and for that reason, there are three types. Knowledge Factors: The foremost factor in this regard is the knowledge factor. It can be anything the password, username, and PIN. Furthermore, the challenge with such characteristics is that they can be weak in security because they can be guessed or shared. Possession Factors: Anything that the user must have to log in is the possession factor. Moreover, the one-time password tokens are sometimes the link. Furthermore, there can be physical tokens, ID cards, and possession factors. Inheritance Factors: For a person using the biological characteristics, it is known as the inheritance factor. It can be facial recognition and finger scanning. It can fall into the category. User Authentication with No Password Having the password-less login system is the authentication method that mostly does not require password authentication. Moreover, this sort of authentication has become more famous in the past years, and you are more experienced in the few. Moreover, the most common ways of password-less login in this article are the two most essential cover methods. Biometrics: Fingerprints, facial recognition, iris scanning, and other types of verification through biological characteristics fall under the category of biometrics that can be considered under the inheritance authentication factor. Email Authentication: Email authentication is the most important and password-less user authentication. It mainly because anyone with an email account can use this method. Stronger Password: We encourage you to get the improved security and the stronger vulnerabilities that they used to bring due to the insecure user-generated credentials. It can take to get the password-free online password experience. Implement SSO Authentication: If you do not know about or you can go for the single sign-on, with the authentication, it is a process that can make you logged into the account even when you. Multi-factor Authentication Strategy: Multi-factor authentication is the one that uses the identification with the help of several authentications. For instance, a user can input their password, username, which will then email the link to get the security code. Exploring the Password-less Authentication You can implement a password-less option of login to your website. Moreover, security to the passwords and the security experts can become unreliable and obsolete for user authentication. Furthermore, the password-less logins will not require anything to remember anything. Moreover, the login process is completed with the help of the biological characteristics or through another account. Way to improve user authentication To make your login process more secure, user-friendly, you should know how to create stronger passwords to improve security. As we know, that passwords are not completely safe, they have various vulnerabilities, still, migrating the entire internet to a completely password-free online experience will take your long time. The best way is to create better passwords. Conclusion All in all, this is the best way to authenticate the password to get the optimum security. If you are going to apply the above-discussed user authentications and the given tips you can secure your system.
Read More

Video result

Related News

We found a lot of relevant information for Rex Radiology Scheduling​. We provide the official link and a number of helpful pages for the login above. They are reliable sites collected by LoginNote. Please check it thoroughly!

How do you collect the data for Rex Radiology Scheduling​?

We prioritize finding the official login links for all searches. Besides that, relevant information such login instructions, requirements, and accounts may be also given.

I have an experience about Rex Radiology Scheduling​, how can I send you?

That’s great. It is certain that your login experience is very valuable for other users. We will really appreciate if you can share it with us.

Will you provide the correct login pages?

Yes. On most of the results recommended for Rex Radiology Scheduling​, we provide the official links, they tend to be on the top of the page. Please check it.

What information of Rex Radiology Scheduling​ will be provided besides the login link?

For each search from the user, besides the login link, we also provide relevant information such as register guiding, requirements, and accounts. It is similar to the search 'Rex Radiology Scheduling​'.