Intel - eHealth2012


Published on

Published in: Health & Medicine
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Health 2.0 it´s up to youThe term '2.0' is currently being applied to many fields of endeavour: Politics 2.0,Science 2.0, Trendwatching 2.0, Education 2.0, Police 2.0, Consultancy 2.0,Civil Service 2.0, etc. Within the health and welfare sector we see the terms Health2.0, Healthcare 2.0, Care 2.0, Welfare 2.0 and Medicine 2.0, to name but a few. Allare derived from the term 'Web 2.0', which was coined by Tim O’Reilly and DaleDougherty to refer to collaboration within networks which rely on 'collective intelligence'.The more people involved, they contend, the greater the effects will be.Many definitions of the term '2.0' refer to the new generation of websites which aremore dynamic and interactive than earlier (Web 1.0) examples. Rather than a 'solitaryweb experience' such as reading an online newspaper or corporate brochure,Web 2.0 users communicate with each other, and can even determine the type andform of the information which appears on the monitor before them.A significant component of Web 2.0 is therefore 'the wisdom of crowds'. The morepeople who take part in a social network, the greater the value they create
  • Now, if you jump to the next slide, it's a representation of the data and the data flow that we're talking about. If we're talking about care coordination and data flow, then where is the data and what venues are we talking about. Well, there are four fundamental areas where you're actually looking at the data. The very first thing you have to be able to do is have is have a repository for this data. So maybe one of the first things you need to think about is gathering and storing data. Sharing the data seems like the next logical thing once it's gathered, making that data mobile so it's available anywhere, in any environment, where any of the actors are that are caring for the patients, where any of these providers are, including taking the data to the home environment. But this is a circle. Once you take the data home, you generate more data which now you want to share with more people, which now may be more mobile healthcare workers. You can start anywhere on this circle to get started. If you want to coordinate data flow, you can start by building a health exchange. You can start by building a data center. You can start by looking at your mobile environment and starting to use things as simple as cell phones and mobile clients.OR you could start with a home care program. You can start anywhere. But to realize the true cost savings, to realize the true benefit, unfortunately you have to do all four of these things. Doing one of them in isolation will get you value, will get you savings, but the message I need to deliver to you, as providers, as caregivers, is you've actually got to do all four things. And again, you can get started anywhere, but the ultimate goal is, you need to do all four. So let's jump on and look at that. Well, saying you start with where the payments are going to be, say in the United States, with meaningful use.
  • Over a three year period to 2009,Maccabi achieved the following results:
  • Customers expectations are changing – with the advent of many new devices, it has become very clear that experience is clearly what customers are really looking for. Our research has shown that customers really want to be in control of their task and do not like to wait – now, a key point to note here is that while experience is what the consumer is looking for, it needs a great package of software and hardware to deliver that experience. So, our mind set has to shift to right sizing our products to the customer expectations – with the great experience - driven by powerful hardware and software – behind the scenes.
  • Fix the full Quote
  • Time to do it again -
  • Laptoptheft is serious worldwide problem and it is getting worse all the time. As you can see from the statistics, every 12 seconds a laptop gets stolen in the U.S. According to a Dell-Ponemon study, 200,000 laptops are lost or stolen every year at European airports, 12000 laptops are stolen EVERY WEEK at US Airports. The Laptop users store valuable records, such as bank statements, or private information, such as credit card details, on their laptop. Loss of personal laptop and the data it contains can be an emotional and financial loss. Intel AT delivers peace of mind by helping lockdown lost or missing laptops.How does Intel Anti-Theft Service bring Intel AT Technology to life? What’s the difference between Intel® Anti Theft Technology and Intel Anti Theft Service? Lets take a look.
  • Partner with Intel to define and deliver value-add software marketing activities designed to build awareness and preference before the sale, add value at time of sale, and enhance the customer experience after the sale. Intel works extensively with the software ecosystem to ensure applications are ‘Enhanced for Core’. Work with your Intel representative to identify apps for gaming, digital content creation, security, and – coming soon – touch, sensor, gesture, and more. Engage with Intel, our software fellow travelers, and our creative agency to define and deliver activities in support of your Ultrabook™ marketing and sales objectives.Examples include high-value software bundles, online promotional contests, social media activities, experiential marketing, events, etc. protected data – secure transactions - rich content – new UX is what customers are looking for. Services and SW deliver that experience. Look at what is driving some of this behavior – the scarey stuff - 200k laptops stolen in European airports per year. 600k facebook ids compromised per day and the opportunity – online videos are what consumers are looking for. 1. Source: Intel market research “Voice of the Customer” - global customer survey2. Source: Dell-Ponemon Study3. Source: Intel Market Research Voice of the Customer Survey4. Source: The Guardian, October 20116. Source: Screen Digest
  • Intel - eHealth2012

    1. 1. Health 2.0 trends and threads Pavel Kubů M.D. Intel World Ahead Program, Healthcare CEE
    2. 2. The Perfect Storm is here Rising Costs of Healthcare Shortage of HealthcareAging Population Professionals New models of care forced to emerge
    3. 3. The Continuum of Care Shift Left Highest Quality of Life Lowest Cost of CareQuality of Life Health and Wellness Home Care Residential Care Acute Care Cost of Care
    4. 4. The wisdom of crowds:The more people who take part in a social network, the greater the Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Ministervalue they create. of Health, Welfare and Sport, Hague 2010
    5. 5. Health 2.0 Biomedical Research platforms Consumer/ Healthcare Patientsproffessionals Smart- Workstations/ Phones & Smart TVs Embedded Desktops Laptops Netbooks Tablets Handhelds One Architecture Across Connected Devices for Healthcare Enabling a Secure, High Performance & Consistent User Experience
    6. 6. Care Coordination: What it Takes EMR CDSS Gather & Store Comprehensive Information CPOE PHR vPro HIE TxTEmpower the Patient Share Information Across Organizations AT, AESNI Patient Family MPOC MHealth Mobilize the Data TEAM Collaboration Secure Access to Information Everywhere
    7. 7. Care Coordination Across the Continuum CPOE EMR Health MPOC Emergency CheckupSelf Check& Control Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
    8. 8. Care Coordination Across the Continuum HIE National Health Networks Emergency Checkup Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Radiology Academic Pharmacy Long term Hospital Care Research
    9. 9. Care Coordination Across the Continuum PHRs Health Emergency Checkup Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
    10. 10. Networking and Decision Support Systems are at the heart of delivering coordinated care to Maccabi members Health Checkup CDSS Emergency Personal Health RecordSelf Check& Control Data Patient-Centric Care Data Exchange Exchange Clinic Electronic Health Record Data Repository Home Community Hospital Visiting Remote Care Diagnostic Academic Pharmacy Long term Hospital Care Research
    11. 11. Coordinated Care Realizes Clinical and Economic Benefits• 17 % increase in the • the average hospital stay number of women above for cardiovascular patients age 50 who had a breast declined from 0.7 days in exam with mammography 2000-2001 to 0.5 days in• 17 % increase in the 2006 number of members over • 76,000 avoided hospital 65 who received a days resulted in a total pneumovax vaccination cost saving of $32 million USD
    12. 12. Example: Home based primary care (HBPC) in the VA • Patients with complex, chronic, disabling disease--too sick for the clinic! • Av age 76 years old, 8 chronic conditions INTEL DOING ETHNOGRAPHIC STUDY OF • Care delivered in the home by inter- HBPC TO HELP THEM SCALE disciplinary team QUALITY,COORDINATED CARE TO MORE • 24% reduction in total cost of careVETS BY IMPLEMENTING HEALTH IT TOOLS • 63% reduction in hospital days IN THEIR WORKFLOW. • 87% reduction in nursing home days
    13. 13. Threads of Virtual World Source: 2011 Internet Crime Report, Internet Crime Compliant Center
    14. 14. Romance Scams• Victims believe they are “dating” someonedecent and honest. However, the online contactis often a criminal with a well-rehearsed scriptthat scammers use repeatedly and successfully.Scammers search chat rooms, dating sites, andsocial networking sites looking for victims.Although the principal group of victims is over 40years old, divorced or widowed, disabled andoften elderly, all demographics are at risk.•Scammers use poetry, flowers and other gifts toreel in victims, while declaring “undying love.”These criminals also use stories of severe lifecircumstances, tragedies, familydeaths, personal injuries or other hardships tokeep their victims concerned and involved intheir schemes. They also ask victims to sendmoney to help overcome alleged financialhardships. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
    15. 15. Work from Home Scams• Consumers continue to lose money from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited emails or “spam,” and social networking sites advertising work-from-home “opportunities.”• Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the Source: 2011 Internet Crime Report, Internet Crime Compliant Center scammers may compromise the victim’s
    16. 16. FBI Impersonation Email Scams• The names of various government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited emails.• Complaints related to spam emails purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
    17. 17. User User Experience Experience USER Software (OS, Apps) Software (OS, Apps)EXPERIENCE Processor H/W Processor/ Hardware
    18. 18. “Don’t be encumbered by history. Go and create something wonderful.” — Robert Noyce
    19. 19. We Know How to Transform Experiences 1995 2003 2012+ Ultrabook™Multi-media Uncompromised Ultra Thin CD ROM Mobility Ultra Responsive Ultra Secure Ultra Connected
    20. 20. PCs are Stolen Frequently with Sensitive DataPeople are storing more and more personal data on their laptops “ 200,000 laptops lost or stolen every year at European airports 12,000 laptops lost or stolen every week at US airports” - Dell-Ponemon study ”
    21. 21. Security and Trust Built In Intel® Identity Protection Technology Intel® Anti-Theft Technology
    22. 22. A path to building a Service for end user… Intel® IDENTITY PROTECTION Intel® INSIDER™Security is top concern ID theft is lead consumer Users spend over 4 Worldwide 30 million for PC users1 and business concern, hours per month apps (not app followed by Malware3 viewing online video updates) are on a PC5 downloaded each 200K laptops lost or 600K Facebook* IDs day7 stolen every year at compromised every Online video marketEuropean airports/12K day4 $6.9B in 2014 (46% 1. Source: Intel market research laptops lost or stolen CAGR)6 “Voice of the Customer” - global customer survey every week at US 2. Source: Dell-Ponemon Study airports2 3. Source: Intel Market Research Voice of the Customer Survey 4. Source: The Guardian, October 2011
    23. 23. Enabling theUltrabook™ Experiencefor Ageing population
    24. 24.