• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Healthcare.

Extracts from this document...

Introduction

ISM

Healthcare

Prepared by Group A5

image00.jpg


Table of Contents

  1. Introduction…………………………………………………………………………………………
  1. Healthcare……………………………………………………………………………………………
  1. Hospitals………………………………………………………………………………………………
  1. Ecommerce…………………………………………………………………………………………..
  1. Advantages of Ecommerce ……………………………………………………………………….
  1. Biometrics…………………………………………………………………………………………….
  1. Advantages of Biometrics…………………………………………………………………………..
  1. Grid Computing………………………………………………………………………………………
  1. Advantages of Grid Computing…………………………………………………………………….
  1.  .NET and XML……………………………………………………………………………………….
  1.  Advantages of .NET and XML……………………………………………………………………..
  1.  AutoID………………………………………………………………………………………………..
...read more.

Middle

Hospitals need to manage an  enormity of data. With increasing customer needs and a demand from within the industry, technology is continuing to support and change the infrastructure of.the healthcare.

With E-commerce, biometrics, grid computing, auto –ID wireless, Net and XML, the efficiency and accuracy of information in healthcare is magnified.

E-commerce has allowed the healthcare industry to connect with its customers boosting the relationship with suppliers and buyers and reducing the costs of procurement.

Biometrics marks the end of newspaper reports of hospitals operating on the wrong person, giving the wrong dosage of drugs, losing babies to kidnappers and employing people with an unsuitable care record.

Grid Computing has provided scalability and instant processing power, using spare computing power it can provide efficient delivery of medical information. Currently the research and development department are investing heavily in this.  

.NET allows the communication of virtual information over simple web enabled device

.XML allows the security of the XML data to be transferred in a standard form.

Auto ID

Wireless


  1. Introduction

Technology is rapidly becoming the central factor in the forefront of hospitals. It has made a significant difference to the way routine tasks are

...read more.

Conclusion

Advantages of .NET and XML

This combination of programming language and software is however not limited to patient data. The system can be used for storing and transmitting any sort of information. Keeping control of drug inventories can be made easier, ordering medical equipment from suppliers can be made seamless, all that is required is an internet terminal and the correct .net and XML combination.

Efficient use and storage of data is one of today’s major challenges. The consequences of the use of incorrect data can be both harmful to the health of the patient and expensive for the Hospital. The combination of .net and XML will not only simplify the access to patient data but will secure consistency and help combat mistakes in dispensing whilst opening up avenues for improving the efficacy of capital spend.

The below diagram shows a patients file stored in XML `format. XML presents the patients data on the screen.

Figure 3image02.png


Summary.

Currently the health industry is spending more money developing advance management system information’s and tools to utilise the advance technology that is available.


References

http://www.minoru-development.com/docscope/vision.html

http://www.microsoft.com/business/industry/hea/articles/overview.asp


GROUP A5        ISM                HEALTHCARE

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    It simply will not work to the desired level. If their aim is to continually spread awareness about how file sharing infringes copyright legislation through sustained advertising to the public, then I shall support them wholeheartedly. Appendices Appendix I: Interview with University of Warwick Student (who wishes to remain anonymous)

  2. Ethics and professionalism in computing - examples from Facebook and Google

    In particular: � They encrypt many of their services using SSL. � They offer you two step verification when you access your Google Account, and a Safe Browsing feature in Google Chrome. � They review their information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.

  1. Lifecycle Management Of Information Technology Project In Construction

    develop? over time. * Product v?. Proce??: The a??ignment of project deliverable? to workflow? and ta?k? ?how? how work proce??e? collaborate to produce required deliverable?. All of other inter-relation?hip? between four primary view? can al?o be meaningfully defined, e.g., ?howing re?ource? again?t product?, proce??, or time. The primary view? and inter-relation?hip?

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Background concepts such as Classes, Objects, Data abstraction in programming languages and frames are outlined and explained through example. A comparison between former programming languages such FORTRAN and Algol, Simula, Lisp, Smalltalk gearing towards present day languages, not so much C++ but that of JAVA analysing their evolution over time.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    testing web applications * process definition for configuration management in the web environment * acceptance for processes in your organization * standardization for web development in your organization 4.4 Environment * test environment dedication for testing only * test environment control * tool support in the test environment * test

  2. Methods and technology used in Computer Forensics

    If it is the former of these two steps, recovering the data is hardly and act of overly complex data recovery; you simply have to restore it from the desktop. However, if the file is deleted directly, which happens in the case of all files deleted from the DOS prompt,

  1. Design a web based online Appointment System for vehicle service centres in town to ...

    in login .php there is a call for function called user_login() <?php session_start(); store session data $_SESSION['email']=$email; // Include init file include 'func/init.php'; include 'func/user_functions.php'; if (!isset($_POST['submit'])) { // Show the form include 'login_form.inc.php'; exit; } else { // Try and login with the given username & pass $result = user_login($_POST['email'], $_POST['password']); if ($result != 'Correct')

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    formalize the requirements elicitation process to reduce the chances of mis-understanding the requirements and (b) to introduce best practice techniques to the analysis and design process SSADM (in common with other structured methodologies) adopts a prescriptive approach to information systems development in that it specifies in advance the modules, stages

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work