SlideShare a Scribd company logo
1 of 21
Dr Jasbeer Singh
MAINTENANCE OF
• Hospital Information system is essentially a computer system that can manage all the
information to allow health care providers to do their jobs effectively.
• These systems have been around since they were first introduced in the 1960s and have
evolved with time and the modernization of healthcare facilities.
• The staff used them primarily for managing
billing and hospital inventory.
• All this has changed now, and today hospital
information systems include the integration
of all clinical, financial and administrative
applications.
• As hospital information system covers all hospital operations and management, and its
compositions contains
- Software
- Hardware
- Network and other subsystems
• Management and maintenance workload is very important
and difficult, and some of the major components of healthcare
Information system which have to be maintained periodically are:
1. Server maintenance
2. Data backup
3. User management and
4. Network security and maintenance.
I. SOFTWARE MAINTENANCE:
It stands for all the modifications and updations done after the delivery of software product. There
are number of reasons, why modifications are required, some of them are briefly mentioned below:
• Market Conditions - Policies, which changes over the time, such as taxation and newly
introduced constraints like, how to maintain bookkeeping, may trigger need for modification.
• Client Requirements - Over the time, customer may ask for new features or functions in the
software.
• Host Modifications - If any of the hardware and/or platform (such as operating system) of the
target host changes, software changes are needed to keep adaptability.
• Organization Changes - If there is any business level change at client end, such as reduction of
organization strength, acquiring another company, organization venturing into new business,
need to modify in the original software may arise.
• Types of maintenance: In a software lifetime, type of maintenance may vary based on its nature.
It may be just a routine maintenance tasks as some bug discovered by some user or it may be a
large event in itself based on maintenance size or nature. Following are some types of
maintenance based on their characteristics:
• Corrective Maintenance - This includes modifications and updations done in order to correct or
fix problems, which are either discovered by user or concluded by user error reports.
• Adaptive Maintenance - This includes modifications and updations applied to keep the software
product up-to date and tuned to the ever changing world of technology and business environment.
• Perfective Maintenance - This includes modifications and updates done in order to keep the
software usable over long period of time. It includes new features, new user requirements for
refining the software and improve its reliability and performance.
• Preventive Maintenance - This includes modifications and updations to prevent future problems
of the software. It aims to attend problems, which are not significant at this moment but may
cause serious issues in future.
COST OF
MAINTENANCEA study on estimating software maintenance found that the cost of maintenance is as high as
67% of the cost of entire software process cycle.
Factors affecting Maintenance Cost:
• The standard age of any software is considered
up to 10 to 15 years.
• Older software's, which were meant to work on
slow machines with less memory and storage
capacity cannot keep themselves challenging
against newly coming enhanced software's on
modern hardware. 67%
15%
8%
7%
3%
SOFTWARE-MAINTENANCE
Maintenance Testing Design
Implementation Requirement
• As technology advances, it becomes costly to maintain old software.
• Most maintenance engineers are newbie and use trial and error method to rectify problem.
• Often, changes made can easily hurt the original structure of the software, making it hard
for any subsequent changes.
• Changes are often left undocumented which may cause more conflicts in future.
• Maintenance Activities:
II. Hardware Maintenance:
1. Server Maintenance:
• Server maintenance focuses on software maintenance, including
regular or occasional monitoring of memory, disk space monitoring,
security access control, computer virus checking and so on.
• The network administrator usually does this, and it is crucial to the
performance of the business. Without a proper IT service plan, the
application software will never run as expected.
• Server maintenance is such a big deal. Just like you go to the
doctor for regular check-ups to make sure everything is healthy
and whole, servers also need to be regularly monitored to ensure
that all parts are working optimally.
• with regular maintenance, the business’ precious hardware
and software will have a greater chance of serving
for a long time.
• Good server maintenance also boosts server productivity
which, in turn, boosts overall business productivity.
• Routine server maintenance will keep the server functioning
at top speed. This will not only save the time, but also increase work efficiency.
• Properly monitored servers also give the assurance that if anything goes wrong,
it will be able to easily recover any lost or damaged data. This way, we can get
systems back and working before the clients even have the chance to
notice there was an issue.
2.DATA BACKUP:
• Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event.
• These day’s, there are many kinds of data backup services that help enterprises and organizations ensure that
data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of
emergency. Some of the methods of data backup are
- Disks or tape backup
- Direct-to-cloud backup
- Hybrid cloud backup
3. USER MANAGEMENT:
• User management describes the ability for administrators to manage user access to various IT resources
like systems, devices, applications, storage systems, networks, and more.
• User management is a core part to any directory service and is a basic security essential for any
organization
• User management enables admins to control user access and on-board and off-board users to and from IT
resources and maintenance requires regular updating, backup of data and maintaining privacy.
• Recent innovations in cloud technology have sparked a revolution in cloud Infrastructure-as-a-Service
(IaaS) such as Azure, and Google Cloud Platform among others. Coupled with web applications, users
have more IT resources available at their fingertips than ever before
III. NETWORK AND OTHER SUBSYSTEMS:
• Networking, also known as computer networking, is the practice of transporting and exchanging
data between nodes over a shared medium in an information system. Networking comprises not
only the design, construction and use of a network, but also the management, maintenance and
operation of the network infrastructure, software and policies
• Computer networking enables devices and endpoints to be connected to each other on a local area
network (LAN) or to a larger network, such as the internet or a private wide area network
(WAN). This is an essential function for service providers, businesses and consumers worldwide
to share resources, use or offer services, and communicate. Networking facilitates everything
from telephone calls to text messaging to streaming video to the internet of things (IoT)
TYPES OF
NETWORKS:
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number
of computers that are part of the network. Networks can cover anything from a handful of
devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
• Personal area network, or PAN
• Local area network, or LAN
• Metropolitan area network, or MAN
• Wide area network, or WAN
In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:
• Storage area network, or SAN
• Enterprise private network, or EPN
• Virtual private network, or VPN
4. NETWORK SECURITY AND MAINTENANCE:
• Network security is any activity designed to protect the usability and integrity of the
network and data.
• It includes both hardware and software technologies. Effective network security
manages access to the network. It targets a variety of threats and stops them from
entering or spreading on your network. e.g., Wiretapping, Port scanner, Encryption,
Virus, Buffer overflow, Cross site scripting, cyber attack and more
• Network security combines multiple layers of defenses at the edge and in the network. Each
network security layer implements policies and controls. Authorized users gain access to
network resources, but malicious actors are blocked from carrying out exploits and threats.
Types of network security
1. Firewalls
2. Antivirus and antimalware software
3. Spam Blocking
4. Data loss prevention
5. Content Filtering
6. Web security
7. URL filtering
DATA SECURITY COUNCIL OF INDIA (DSCI):
• Its a not-for-profit, industry body on data protection in India, setup by
NASSCOM® committed to making the cyberspace safe, secure and
trusted by establishing best practices, standards and initiatives in cyber
security and privacy.
• DSCI engages with governments and their agencies, regulators, industry
sectors, industry associations and think tanks for policy advocacy,
thought leadership, capacity building and outreach activities. Main
activities in which DSCI engages are:
>Standards and Best Practices
>Thought Leadership
>Capacity Building
>Cyber Security Industry Development
>Policies for Cyber Security
REFERENCES:
• https://www.tutorialspoint.com/software_engineering/software
_maintenance_overview.htm
• https://4quartersit.com/backup-methods-not-created-equal/
• https://study.com/academy/lesson/types-of-networks-lan-
wan-wlan-man-san-pan-epn-vpn.html
• http://www.assignmenthelp.net/assignment_help/Computer-
Networks-and-Types
THANK YOU

More Related Content

What's hot

ERP software for Doctor. Complete management software for hospital.
ERP software for Doctor.  Complete management software for hospital.ERP software for Doctor.  Complete management software for hospital.
ERP software for Doctor. Complete management software for hospital.Jyotindra Zaveri
 
Facility management of Healthcare facilities
Facility management of Healthcare facilitiesFacility management of Healthcare facilities
Facility management of Healthcare facilitiesArun Sebastian
 
HOSPITAL MANAGEMENT SYSTEM ppt
HOSPITAL MANAGEMENT SYSTEM pptHOSPITAL MANAGEMENT SYSTEM ppt
HOSPITAL MANAGEMENT SYSTEM pptPurbita Sen
 
Committes of hospital
Committes of hospitalCommittes of hospital
Committes of hospitalosmansmd
 
Hospital security services
Hospital security servicesHospital security services
Hospital security servicesNc Das
 
Nabh 5th edition introduction by Iyanar. S
Nabh  5th edition introduction by Iyanar. SNabh  5th edition introduction by Iyanar. S
Nabh 5th edition introduction by Iyanar. SIyanar Shanmugam
 
INTERNATIONAL PATIENT SAFETY
INTERNATIONAL PATIENT SAFETYINTERNATIONAL PATIENT SAFETY
INTERNATIONAL PATIENT SAFETYHarishananda KP
 
Types of committees in a hospital by Dr.Mahboob Khan Phd
Types of committees in a hospital by Dr.Mahboob Khan Phd Types of committees in a hospital by Dr.Mahboob Khan Phd
Types of committees in a hospital by Dr.Mahboob Khan Phd Healthcare consultant
 
Hospital Management System.pptx
Hospital Management System.pptxHospital Management System.pptx
Hospital Management System.pptxLakshayPanchal
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemSaurabh Tripathi
 
Hospital management system
Hospital management systemHospital management system
Hospital management systemAsmat Hayat
 
Hospital erp( ERP System for Hospitals ) an opensource erp system
Hospital erp( ERP System for Hospitals ) an opensource erp systemHospital erp( ERP System for Hospitals ) an opensource erp system
Hospital erp( ERP System for Hospitals ) an opensource erp systemArvind Kumar
 
5th ed. NABH Accreditation Standards for Hospitals April 2020
5th ed. NABH Accreditation Standards for Hospitals April 20205th ed. NABH Accreditation Standards for Hospitals April 2020
5th ed. NABH Accreditation Standards for Hospitals April 2020Dr Jitu Lal Meena
 
Hospital Management System Presentation
Hospital Management System PresentationHospital Management System Presentation
Hospital Management System PresentationSanjeev Kumar Rao
 
NABH-Nursing resource management
NABH-Nursing resource managementNABH-Nursing resource management
NABH-Nursing resource managementSiva Nanda Reddy
 
Role of information technology on health
Role of information technology on healthRole of information technology on health
Role of information technology on healthNisha Yadav
 
FINAL PROJECT OF JCI DOCUMENTATION
FINAL PROJECT OF JCI DOCUMENTATIONFINAL PROJECT OF JCI DOCUMENTATION
FINAL PROJECT OF JCI DOCUMENTATIONKaustav Deb
 

What's hot (20)

ERP software for Doctor. Complete management software for hospital.
ERP software for Doctor.  Complete management software for hospital.ERP software for Doctor.  Complete management software for hospital.
ERP software for Doctor. Complete management software for hospital.
 
Facility management of Healthcare facilities
Facility management of Healthcare facilitiesFacility management of Healthcare facilities
Facility management of Healthcare facilities
 
HOSPITAL MANAGEMENT SYSTEM ppt
HOSPITAL MANAGEMENT SYSTEM pptHOSPITAL MANAGEMENT SYSTEM ppt
HOSPITAL MANAGEMENT SYSTEM ppt
 
Committes of hospital
Committes of hospitalCommittes of hospital
Committes of hospital
 
Hospital security services
Hospital security servicesHospital security services
Hospital security services
 
Nabh 5th edition introduction by Iyanar. S
Nabh  5th edition introduction by Iyanar. SNabh  5th edition introduction by Iyanar. S
Nabh 5th edition introduction by Iyanar. S
 
INTERNATIONAL PATIENT SAFETY
INTERNATIONAL PATIENT SAFETYINTERNATIONAL PATIENT SAFETY
INTERNATIONAL PATIENT SAFETY
 
Types of committees in a hospital by Dr.Mahboob Khan Phd
Types of committees in a hospital by Dr.Mahboob Khan Phd Types of committees in a hospital by Dr.Mahboob Khan Phd
Types of committees in a hospital by Dr.Mahboob Khan Phd
 
Hospital Services & Management
Hospital Services & ManagementHospital Services & Management
Hospital Services & Management
 
Hospital Management System.pptx
Hospital Management System.pptxHospital Management System.pptx
Hospital Management System.pptx
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Facility Management System
Facility  Management System Facility  Management System
Facility Management System
 
Hospital erp( ERP System for Hospitals ) an opensource erp system
Hospital erp( ERP System for Hospitals ) an opensource erp systemHospital erp( ERP System for Hospitals ) an opensource erp system
Hospital erp( ERP System for Hospitals ) an opensource erp system
 
5th ed. NABH Accreditation Standards for Hospitals April 2020
5th ed. NABH Accreditation Standards for Hospitals April 20205th ed. NABH Accreditation Standards for Hospitals April 2020
5th ed. NABH Accreditation Standards for Hospitals April 2020
 
Hospital Management System Presentation
Hospital Management System PresentationHospital Management System Presentation
Hospital Management System Presentation
 
NABH-Nursing resource management
NABH-Nursing resource managementNABH-Nursing resource management
NABH-Nursing resource management
 
NABH
NABHNABH
NABH
 
Role of information technology on health
Role of information technology on healthRole of information technology on health
Role of information technology on health
 
FINAL PROJECT OF JCI DOCUMENTATION
FINAL PROJECT OF JCI DOCUMENTATIONFINAL PROJECT OF JCI DOCUMENTATION
FINAL PROJECT OF JCI DOCUMENTATION
 

Similar to Maintenance of Hospital Information System

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Jayesh Naik
 
Application hardening
Application hardeningApplication hardening
Application hardeningJayesh Naik
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptxJuliusECatipon
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxSakshiGawde6
 

Similar to Maintenance of Hospital Information System (20)

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptx
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 

More from Dr Jasbeer Singh

EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}Dr Jasbeer Singh
 
Malocclusion & Orthodontic Treatment
Malocclusion & Orthodontic TreatmentMalocclusion & Orthodontic Treatment
Malocclusion & Orthodontic TreatmentDr Jasbeer Singh
 
Improvement in the turn around time
Improvement in the turn around timeImprovement in the turn around time
Improvement in the turn around timeDr Jasbeer Singh
 
Skills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management pptSkills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management pptDr Jasbeer Singh
 
Laws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in HospitalsLaws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in HospitalsDr Jasbeer Singh
 
National programme for prevention and control of Deafness
National programme for prevention and control of DeafnessNational programme for prevention and control of Deafness
National programme for prevention and control of DeafnessDr Jasbeer Singh
 

More from Dr Jasbeer Singh (8)

EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
 
Malocclusion & Orthodontic Treatment
Malocclusion & Orthodontic TreatmentMalocclusion & Orthodontic Treatment
Malocclusion & Orthodontic Treatment
 
Improvement in the turn around time
Improvement in the turn around timeImprovement in the turn around time
Improvement in the turn around time
 
Dr. Jasbeer Singh Resume
Dr. Jasbeer Singh ResumeDr. Jasbeer Singh Resume
Dr. Jasbeer Singh Resume
 
Dental health education
Dental health educationDental health education
Dental health education
 
Skills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management pptSkills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management ppt
 
Laws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in HospitalsLaws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in Hospitals
 
National programme for prevention and control of Deafness
National programme for prevention and control of DeafnessNational programme for prevention and control of Deafness
National programme for prevention and control of Deafness
 

Recently uploaded

Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsCall Girls Noida
 
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...scanFOAM
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...High Profile Call Girls Chandigarh Aarushi
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy GirlsRussian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girlsddev2574
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareRommie Duckworth
 
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Menarwatsonia7
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goanarwatsonia7
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsHelenBevan4
 
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersHi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 
Call Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any TimeCall Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any Timedelhimodelshub1
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyushGupta813444
 

Recently uploaded (20)

Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
 
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
 
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service GuwahatiCall Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy GirlsRussian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
Russian Call Girls in Raipur 9873940964 Book Hot And Sexy Girls
 
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical Care
 
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
 
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service GuwahatiCall Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skills
 
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersHi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
 
Call Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any TimeCall Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any Time
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
 

Maintenance of Hospital Information System

  • 2. • Hospital Information system is essentially a computer system that can manage all the information to allow health care providers to do their jobs effectively. • These systems have been around since they were first introduced in the 1960s and have evolved with time and the modernization of healthcare facilities. • The staff used them primarily for managing billing and hospital inventory. • All this has changed now, and today hospital information systems include the integration of all clinical, financial and administrative applications.
  • 3. • As hospital information system covers all hospital operations and management, and its compositions contains - Software - Hardware - Network and other subsystems • Management and maintenance workload is very important and difficult, and some of the major components of healthcare Information system which have to be maintained periodically are: 1. Server maintenance 2. Data backup 3. User management and 4. Network security and maintenance.
  • 4. I. SOFTWARE MAINTENANCE: It stands for all the modifications and updations done after the delivery of software product. There are number of reasons, why modifications are required, some of them are briefly mentioned below: • Market Conditions - Policies, which changes over the time, such as taxation and newly introduced constraints like, how to maintain bookkeeping, may trigger need for modification. • Client Requirements - Over the time, customer may ask for new features or functions in the software. • Host Modifications - If any of the hardware and/or platform (such as operating system) of the target host changes, software changes are needed to keep adaptability. • Organization Changes - If there is any business level change at client end, such as reduction of organization strength, acquiring another company, organization venturing into new business, need to modify in the original software may arise.
  • 5. • Types of maintenance: In a software lifetime, type of maintenance may vary based on its nature. It may be just a routine maintenance tasks as some bug discovered by some user or it may be a large event in itself based on maintenance size or nature. Following are some types of maintenance based on their characteristics: • Corrective Maintenance - This includes modifications and updations done in order to correct or fix problems, which are either discovered by user or concluded by user error reports. • Adaptive Maintenance - This includes modifications and updations applied to keep the software product up-to date and tuned to the ever changing world of technology and business environment. • Perfective Maintenance - This includes modifications and updates done in order to keep the software usable over long period of time. It includes new features, new user requirements for refining the software and improve its reliability and performance. • Preventive Maintenance - This includes modifications and updations to prevent future problems of the software. It aims to attend problems, which are not significant at this moment but may cause serious issues in future.
  • 6. COST OF MAINTENANCEA study on estimating software maintenance found that the cost of maintenance is as high as 67% of the cost of entire software process cycle. Factors affecting Maintenance Cost: • The standard age of any software is considered up to 10 to 15 years. • Older software's, which were meant to work on slow machines with less memory and storage capacity cannot keep themselves challenging against newly coming enhanced software's on modern hardware. 67% 15% 8% 7% 3% SOFTWARE-MAINTENANCE Maintenance Testing Design Implementation Requirement
  • 7. • As technology advances, it becomes costly to maintain old software. • Most maintenance engineers are newbie and use trial and error method to rectify problem. • Often, changes made can easily hurt the original structure of the software, making it hard for any subsequent changes. • Changes are often left undocumented which may cause more conflicts in future. • Maintenance Activities:
  • 8. II. Hardware Maintenance: 1. Server Maintenance: • Server maintenance focuses on software maintenance, including regular or occasional monitoring of memory, disk space monitoring, security access control, computer virus checking and so on. • The network administrator usually does this, and it is crucial to the performance of the business. Without a proper IT service plan, the application software will never run as expected. • Server maintenance is such a big deal. Just like you go to the doctor for regular check-ups to make sure everything is healthy and whole, servers also need to be regularly monitored to ensure that all parts are working optimally.
  • 9. • with regular maintenance, the business’ precious hardware and software will have a greater chance of serving for a long time. • Good server maintenance also boosts server productivity which, in turn, boosts overall business productivity. • Routine server maintenance will keep the server functioning at top speed. This will not only save the time, but also increase work efficiency. • Properly monitored servers also give the assurance that if anything goes wrong, it will be able to easily recover any lost or damaged data. This way, we can get systems back and working before the clients even have the chance to notice there was an issue.
  • 10. 2.DATA BACKUP: • Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event. • These day’s, there are many kinds of data backup services that help enterprises and organizations ensure that data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of emergency. Some of the methods of data backup are - Disks or tape backup - Direct-to-cloud backup - Hybrid cloud backup
  • 11.
  • 12. 3. USER MANAGEMENT: • User management describes the ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks, and more. • User management is a core part to any directory service and is a basic security essential for any organization • User management enables admins to control user access and on-board and off-board users to and from IT resources and maintenance requires regular updating, backup of data and maintaining privacy. • Recent innovations in cloud technology have sparked a revolution in cloud Infrastructure-as-a-Service (IaaS) such as Azure, and Google Cloud Platform among others. Coupled with web applications, users have more IT resources available at their fingertips than ever before
  • 13. III. NETWORK AND OTHER SUBSYSTEMS: • Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system. Networking comprises not only the design, construction and use of a network, but also the management, maintenance and operation of the network infrastructure, software and policies • Computer networking enables devices and endpoints to be connected to each other on a local area network (LAN) or to a larger network, such as the internet or a private wide area network (WAN). This is an essential function for service providers, businesses and consumers worldwide to share resources, use or offer services, and communicate. Networking facilitates everything from telephone calls to text messaging to streaming video to the internet of things (IoT)
  • 14. TYPES OF NETWORKS: There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose. The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe. Some of the different networks based on size are: • Personal area network, or PAN • Local area network, or LAN • Metropolitan area network, or MAN • Wide area network, or WAN
  • 15. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files to a printer to accessing the Internet. Some types of networks, however, serve a very particular purpose. Some of the different networks based on their main purpose are: • Storage area network, or SAN • Enterprise private network, or EPN • Virtual private network, or VPN
  • 16. 4. NETWORK SECURITY AND MAINTENANCE: • Network security is any activity designed to protect the usability and integrity of the network and data. • It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. e.g., Wiretapping, Port scanner, Encryption, Virus, Buffer overflow, Cross site scripting, cyber attack and more
  • 17.
  • 18. • Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats. Types of network security 1. Firewalls 2. Antivirus and antimalware software 3. Spam Blocking 4. Data loss prevention 5. Content Filtering 6. Web security 7. URL filtering
  • 19. DATA SECURITY COUNCIL OF INDIA (DSCI): • Its a not-for-profit, industry body on data protection in India, setup by NASSCOM® committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. • DSCI engages with governments and their agencies, regulators, industry sectors, industry associations and think tanks for policy advocacy, thought leadership, capacity building and outreach activities. Main activities in which DSCI engages are: >Standards and Best Practices >Thought Leadership >Capacity Building >Cyber Security Industry Development >Policies for Cyber Security
  • 20. REFERENCES: • https://www.tutorialspoint.com/software_engineering/software _maintenance_overview.htm • https://4quartersit.com/backup-methods-not-created-equal/ • https://study.com/academy/lesson/types-of-networks-lan- wan-wlan-man-san-pan-epn-vpn.html • http://www.assignmenthelp.net/assignment_help/Computer- Networks-and-Types