SlideShare a Scribd company logo
1 of 42
 
 
 
 
 
cataract
cataract
 
Referral GP or Optometrist TIMARU EYE CLINIC Appt Book Mirror Surgical List FU appts DHB Mirror Appt Book Booking Office Surgical List Operating Theatre Prioritize FSA Pre Assessment Clinic report CPAC Prioritize
 
 
Coloured Lens Implant
Phaco emulsification
 
London Bills of Mortality every Thursday from 1603 until the 1830s
The Catastrophe Theory Metaphor for the Process of Text Generation: The Predator Prey Cycle The Process of Human Interaction
process meeting parting The Record Meeting Process Parting Applied to EHR, the building, process and record are one!
The basic medical input template ,[object Object],[object Object]
 
The long and winding road ….
Disease Course Assessment Objects Management Objects Conceptual Model for Standards NZ work group 1997: Encounters in Two Episodes, One Disease Course Episode of Care Episode of Care
The Health Event Summary (HES) and the CDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSL SOAP security SOAP Envelope Digital signature Public key certificate SOAP encryption Role-base access control SSL SSL Regional (SOAP) Server Data store Regional (SOAP) Server Data store Requestor Data store Provider (originating Organization) Secure Socket  Layer (SSL) Security Cleint/Server authentication Supporting SOAP encryption 2  CDA   request in SOAP envelope 3  Route request to  neigbour if necessary 3  Get complete CDA from  Provider if request and access role matched 1  Request to neighbour server CDA Document in SOAP Envelop SOAP Security
THE IMMUNOLOGICAL MODEL FOR ACCESS CONTROL TO CDA Mike Mair and Stephen Chu New Zealand  Acupulco 22.10.2004
The CDA and the HL7 RIM ,[object Object]
CDA Advanced Tutorial Version 3 – Data Types ,[object Object]
CDA Release 2.0 Data Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CDA Release 2.0 Data Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concept Descriptor
Alternatives to the RIM ,[object Object],[object Object],[object Object],[object Object],[object Object]
Draft for Discussion April 2010
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UK National Data Set
 
 
 
01/01/09 – 15/08/09
01/01/09 – 15/08/09
Thanks for listening

More Related Content

Viewers also liked

Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppteyetech
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002eyetech
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05eyetech
 
Timeless
TimelessTimeless
Timelesseyetech
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workfloweyetech
 
Access standard
Access standardAccess standard
Access standardeyetech
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)eyetech
 
The empty box
The empty boxThe empty box
The empty boxeyetech
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generatoreyetech
 

Viewers also liked (9)

Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppt
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05
 
Timeless
TimelessTimeless
Timeless
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workflow
 
Access standard
Access standardAccess standard
Access standard
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)
 
The empty box
The empty boxThe empty box
The empty box
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generator
 

Similar to April2010cataract audit

Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3eyetech
 
The Logical Model Designer - Binding Information Models to Terminology
The Logical Model Designer - Binding Information Models to TerminologyThe Logical Model Designer - Binding Information Models to Terminology
The Logical Model Designer - Binding Information Models to TerminologySnow Owl
 
Deriving an ICU Subset of SNOMED CT from Clinical Notes
Deriving an ICU Subset of SNOMED CT from Clinical NotesDeriving an ICU Subset of SNOMED CT from Clinical Notes
Deriving an ICU Subset of SNOMED CT from Clinical NotesHealth Informatics New Zealand
 
Duncan Allen :: Supporting Healthcare Systems Interoperability
Duncan Allen :: Supporting Healthcare Systems InteroperabilityDuncan Allen :: Supporting Healthcare Systems Interoperability
Duncan Allen :: Supporting Healthcare Systems Interoperabilitygeorge.james
 
Fire and Ice - SNOMED for CORE strength - John Fountain
Fire and Ice - SNOMED for CORE strength - John FountainFire and Ice - SNOMED for CORE strength - John Fountain
Fire and Ice - SNOMED for CORE strength - John FountainHL7 New Zealand
 
Personalizing Treatment using Oracle TRC, OpenWorld 2014
Personalizing Treatment using Oracle TRC, OpenWorld 2014Personalizing Treatment using Oracle TRC, OpenWorld 2014
Personalizing Treatment using Oracle TRC, OpenWorld 2014René Kuipers
 
Enhancing the Quality of ImmPort Data
Enhancing the Quality of ImmPort DataEnhancing the Quality of ImmPort Data
Enhancing the Quality of ImmPort DataBarry Smith
 
Lessons Learned from the DICOM Standardization Effort Lessons Learned from ...
Lessons Learned from the DICOM Standardization Effort 	 Lessons Learned from ...Lessons Learned from the DICOM Standardization Effort 	 Lessons Learned from ...
Lessons Learned from the DICOM Standardization Effort Lessons Learned from ...MedicineAndDermatology
 
Quantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability TrendsQuantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability Trendsamiable_indian
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...oxwocs
 
Presentation 2010 mMD EMR\\EHR
Presentation 2010 mMD EMR\\EHRPresentation 2010 mMD EMR\\EHR
Presentation 2010 mMD EMR\\EHRedwardabrown3
 
Rescuing Data from Decaying and Moribund Clinical Information Systems
Rescuing Data from Decaying and Moribund Clinical Information SystemsRescuing Data from Decaying and Moribund Clinical Information Systems
Rescuing Data from Decaying and Moribund Clinical Information SystemsHealth Informatics New Zealand
 
ALA 2010 -- Jabin White
ALA 2010 -- Jabin WhiteALA 2010 -- Jabin White
ALA 2010 -- Jabin Whitebisg
 
Universal Domain Common observation 20080808
Universal Domain Common observation 20080808Universal Domain Common observation 20080808
Universal Domain Common observation 20080808ash84
 
fhir and loinc
fhir and loincfhir and loinc
fhir and loincDevDays
 
Driving Deep Semantics in Middleware and Networks: What, why and how?
Driving Deep Semantics in Middleware and Networks: What, why and how?Driving Deep Semantics in Middleware and Networks: What, why and how?
Driving Deep Semantics in Middleware and Networks: What, why and how?Amit Sheth
 

Similar to April2010cataract audit (20)

Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3
 
The Logical Model Designer - Binding Information Models to Terminology
The Logical Model Designer - Binding Information Models to TerminologyThe Logical Model Designer - Binding Information Models to Terminology
The Logical Model Designer - Binding Information Models to Terminology
 
Deriving an ICU Subset of SNOMED CT from Clinical Notes
Deriving an ICU Subset of SNOMED CT from Clinical NotesDeriving an ICU Subset of SNOMED CT from Clinical Notes
Deriving an ICU Subset of SNOMED CT from Clinical Notes
 
Duncan Allen :: Supporting Healthcare Systems Interoperability
Duncan Allen :: Supporting Healthcare Systems InteroperabilityDuncan Allen :: Supporting Healthcare Systems Interoperability
Duncan Allen :: Supporting Healthcare Systems Interoperability
 
Fire and Ice - SNOMED for CORE strength - John Fountain
Fire and Ice - SNOMED for CORE strength - John FountainFire and Ice - SNOMED for CORE strength - John Fountain
Fire and Ice - SNOMED for CORE strength - John Fountain
 
0 An Introduction To Snomed Ct1
0 An Introduction To Snomed Ct10 An Introduction To Snomed Ct1
0 An Introduction To Snomed Ct1
 
Personalizing Treatment using Oracle TRC, OpenWorld 2014
Personalizing Treatment using Oracle TRC, OpenWorld 2014Personalizing Treatment using Oracle TRC, OpenWorld 2014
Personalizing Treatment using Oracle TRC, OpenWorld 2014
 
Enhancing the Quality of ImmPort Data
Enhancing the Quality of ImmPort DataEnhancing the Quality of ImmPort Data
Enhancing the Quality of ImmPort Data
 
Lessons Learned from the DICOM Standardization Effort Lessons Learned from ...
Lessons Learned from the DICOM Standardization Effort 	 Lessons Learned from ...Lessons Learned from the DICOM Standardization Effort 	 Lessons Learned from ...
Lessons Learned from the DICOM Standardization Effort Lessons Learned from ...
 
Quantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability TrendsQuantitive Time Series Analysis of Malware and Vulnerability Trends
Quantitive Time Series Analysis of Malware and Vulnerability Trends
 
HL7 101
HL7 101 HL7 101
HL7 101
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...
 
Presentation 2010 mMD EMR\\EHR
Presentation 2010 mMD EMR\\EHRPresentation 2010 mMD EMR\\EHR
Presentation 2010 mMD EMR\\EHR
 
Wcre12b.ppt
Wcre12b.pptWcre12b.ppt
Wcre12b.ppt
 
Rescuing Data from Decaying and Moribund Clinical Information Systems
Rescuing Data from Decaying and Moribund Clinical Information SystemsRescuing Data from Decaying and Moribund Clinical Information Systems
Rescuing Data from Decaying and Moribund Clinical Information Systems
 
ALA 2010 -- Jabin White
ALA 2010 -- Jabin WhiteALA 2010 -- Jabin White
ALA 2010 -- Jabin White
 
Universal Domain Common observation 20080808
Universal Domain Common observation 20080808Universal Domain Common observation 20080808
Universal Domain Common observation 20080808
 
Clinical Models - What Are They Good For?
Clinical Models - What Are They Good For?Clinical Models - What Are They Good For?
Clinical Models - What Are They Good For?
 
fhir and loinc
fhir and loincfhir and loinc
fhir and loinc
 
Driving Deep Semantics in Middleware and Networks: What, why and how?
Driving Deep Semantics in Middleware and Networks: What, why and how?Driving Deep Semantics in Middleware and Networks: What, why and how?
Driving Deep Semantics in Middleware and Networks: What, why and how?
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

April2010cataract audit