• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Healthcare.

Extracts from this document...

Introduction

ISM

Healthcare

Prepared by Group A5

image00.jpg


Table of Contents

  1. Introduction…………………………………………………………………………………………
  1. Healthcare……………………………………………………………………………………………
  1. Hospitals………………………………………………………………………………………………
  1. Ecommerce…………………………………………………………………………………………..
  1. Advantages of Ecommerce ……………………………………………………………………….
  1. Biometrics…………………………………………………………………………………………….
  1. Advantages of Biometrics…………………………………………………………………………..
  1. Grid Computing………………………………………………………………………………………
  1. Advantages of Grid Computing…………………………………………………………………….
  1.  .NET and XML……………………………………………………………………………………….
  1.  Advantages of .NET and XML……………………………………………………………………..
  1.  AutoID………………………………………………………………………………………………..
...read more.

Middle

Hospitals need to manage an  enormity of data. With increasing customer needs and a demand from within the industry, technology is continuing to support and change the infrastructure of.the healthcare.

With E-commerce, biometrics, grid computing, auto –ID wireless, Net and XML, the efficiency and accuracy of information in healthcare is magnified.

E-commerce has allowed the healthcare industry to connect with its customers boosting the relationship with suppliers and buyers and reducing the costs of procurement.

Biometrics marks the end of newspaper reports of hospitals operating on the wrong person, giving the wrong dosage of drugs, losing babies to kidnappers and employing people with an unsuitable care record.

Grid Computing has provided scalability and instant processing power, using spare computing power it can provide efficient delivery of medical information. Currently the research and development department are investing heavily in this.  

.NET allows the communication of virtual information over simple web enabled device

.XML allows the security of the XML data to be transferred in a standard form.

Auto ID

Wireless


  1. Introduction

Technology is rapidly becoming the central factor in the forefront of hospitals. It has made a significant difference to the way routine tasks are

...read more.

Conclusion

Advantages of .NET and XML

This combination of programming language and software is however not limited to patient data. The system can be used for storing and transmitting any sort of information. Keeping control of drug inventories can be made easier, ordering medical equipment from suppliers can be made seamless, all that is required is an internet terminal and the correct .net and XML combination.

Efficient use and storage of data is one of today’s major challenges. The consequences of the use of incorrect data can be both harmful to the health of the patient and expensive for the Hospital. The combination of .net and XML will not only simplify the access to patient data but will secure consistency and help combat mistakes in dispensing whilst opening up avenues for improving the efficacy of capital spend.

The below diagram shows a patients file stored in XML `format. XML presents the patients data on the screen.

Figure 3image02.png


Summary.

Currently the health industry is spending more money developing advance management system information’s and tools to utilise the advance technology that is available.


References

http://www.minoru-development.com/docscope/vision.html

http://www.microsoft.com/business/industry/hea/articles/overview.asp


GROUP A5        ISM                HEALTHCARE

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    It simply will not work to the desired level. If their aim is to continually spread awareness about how file sharing infringes copyright legislation through sustained advertising to the public, then I shall support them wholeheartedly. Appendices Appendix I: Interview with University of Warwick Student (who wishes to remain anonymous)

  2. Ethics and professionalism in computing - examples from Facebook and Google

    Facebook can remove any content or information that user post on Facebook if they believe that it violates this Statement. 3. Facebook will provide user with tools to help them protect your intellectual property rights. 4. If they remove your content for infringing someone else's copyright, and you believe

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    Unfortunately, e-commerce history is filled with expensive failures. Some of which could have been avoided by better testing before the site was opened to the general public (Samaroo, Allott & Hambling, 1999). 6.1 Scalability and performance Websites offer new challenges to developers, as well as testers.

  2. Lifecycle Management Of Information Technology Project In Construction

    the ?et of two-dimen?ional matrice?. Each of the?e matrice? may be quite ?imple and intuitive. For example, matrix of workflow? v?. project lifecycle form? the Gantt chart (bar chart ?chedule). Fig. 3 ?how? example? of po??ible multi-dimen?ional project view?.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Background concepts such as Classes, Objects, Data abstraction in programming languages and frames are outlined and explained through example. A comparison between former programming languages such FORTRAN and Algol, Simula, Lisp, Smalltalk gearing towards present day languages, not so much C++ but that of JAVA analysing their evolution over time.

  2. Methods and technology used in Computer Forensics

    Repairing damaged headers is the final step in recovering deleted image files, and can be done by comparing hexidecimal values between the damaged header and that of a similar image of the same format. Take JPEG for example; all images in this format will have a header value of FF

  1. The purpose of this project is to discuss the issues associated with the deployment ...

    and the associated documentation. LDS s represent Entities (things about which a business needs to record information) and Relationships (necessary associations between entities). * Data Flow Modeling This is the process of identifying, modeling and documenting how data flows around a business information system.

  2. Design a web based online Appointment System for vehicle service centres in town to ...

    This can be explain with the help of Entity Relationship Diagram SCHEMA Design Schema design is another important design for any project. The schema design explains the relationships and the relationship types between the tables in the database. And a schema design shows the overall architecture of the design STRUCTURE

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work