This 5 slide presentation covers various topics across multiple slides. It begins with an introductory slide and is followed by additional content over the next few slides before concluding on the fifth slide. The presentation covers high-level information but does not provide many details in the given document.
This 5 slide presentation covers various topics across multiple slides. It begins with an introductory slide and is followed by additional content on subsequent slides to convey information over the course of the presentation. In summary, the presentation utilizes 5 slides to communicate its message.
This 5 slide presentation covers various topics across multiple slides. It begins with an introductory slide and is followed by additional content over the next few slides before concluding on the fifth slide. The presentation covers high-level information but does not provide many details in the given document.
This 5 slide presentation covers various topics across multiple slides. It begins with an introductory slide and is followed by additional content on subsequent slides to convey information over the course of the presentation. In summary, the presentation utilizes 5 slides to communicate its message.
This document discusses man-in-the-middle attacks against cryptographic protocols. It describes two classes of man-in-the-middle attacks - passive attacks where the attacker can only monitor communications, and active attacks where the attacker can modify messages. It then gives an example of how a man-in-the-middle attack works against key exchange protocols by replacing one party's public key. Finally, it provides an example of how the Diffie-Hellman key exchange protocol allows two parties to securely generate a shared secret key to prevent such man-in-the-middle attacks.
Today we all live and work in the Internet Century, where technology is roiling the business landscape, and the pace of change is only accelerating.
In their new book How Google Works, Google Executive Chairman and ex-CEO Eric Schmidt and former SVP of Products Jonathan Rosenberg share the lessons they learned over the course of a decade running Google.
Covering topics including corporate culture, strategy, talent, decision-making, communication, innovation, and dealing with disruption, the authors illustrate management maxims with numerous insider anecdotes from Google’s history.
In an era when everything is speeding up, the best way for businesses to succeed is to attract smart-creative people and give them an environment where they can thrive at scale. How Google Works is a new book that explains how to do just that.
This is a visual preview of How Google Works. You can pick up a copy of the book at www.howgoogleworks.net
This document compares different types of marketing presentations and their costs, preparation times, and audiences. It then outlines some limitations of traditional presentations and how to turn content into action by publishing it as an interactive presentation online. Key points include:
- Seminars, conferences, and webinars vary in audience size from 10-1000 people and costs from $100 to $150,000.
- Publishing traditional slides or videos online has limitations like lack of interactivity, feedback, and lead capture abilities.
- An interactive presentation tool is described that allows capturing slides, video, and questions and automatically stitching them together for online publishing. This allows generating leads, tracking viewers, and turning content into action.
This document discusses man-in-the-middle attacks against cryptographic protocols. It describes two classes of man-in-the-middle attacks - passive attacks where the attacker can only monitor communications, and active attacks where the attacker can modify messages. It then gives an example of how a man-in-the-middle attack works against key exchange protocols by replacing one party's public key. Finally, it provides an example of how the Diffie-Hellman key exchange protocol allows two parties to securely generate a shared secret key to prevent such man-in-the-middle attacks.
Today we all live and work in the Internet Century, where technology is roiling the business landscape, and the pace of change is only accelerating.
In their new book How Google Works, Google Executive Chairman and ex-CEO Eric Schmidt and former SVP of Products Jonathan Rosenberg share the lessons they learned over the course of a decade running Google.
Covering topics including corporate culture, strategy, talent, decision-making, communication, innovation, and dealing with disruption, the authors illustrate management maxims with numerous insider anecdotes from Google’s history.
In an era when everything is speeding up, the best way for businesses to succeed is to attract smart-creative people and give them an environment where they can thrive at scale. How Google Works is a new book that explains how to do just that.
This is a visual preview of How Google Works. You can pick up a copy of the book at www.howgoogleworks.net
This document compares different types of marketing presentations and their costs, preparation times, and audiences. It then outlines some limitations of traditional presentations and how to turn content into action by publishing it as an interactive presentation online. Key points include:
- Seminars, conferences, and webinars vary in audience size from 10-1000 people and costs from $100 to $150,000.
- Publishing traditional slides or videos online has limitations like lack of interactivity, feedback, and lead capture abilities.
- An interactive presentation tool is described that allows capturing slides, video, and questions and automatically stitching them together for online publishing. This allows generating leads, tracking viewers, and turning content into action.
2. Проблема
• Пациентам тяжело соблюдать
график
• Невозможно отслеживать
соблюдение режима
• Невозможно собирать данные
3. Система ДОК
• Доктор осматривает пациента и через свой
интерфейс в Системе ДОК рекомендует
пациенту курс
• Пациент регистрируется в Системе ДОК,
привязывается к доктору
• Администратор Системы ДОК подключает
устройство пациента к системе
(поддерживаются устройства Lifetrack, Jawbone
Up, Fitbit Flex)
• Пациент выполняет курс. Каждое действие
пациента отражается в системе. Доктор
получает данные, контролирует
выполнение курса.
4. События, которые видит доктор
Для каждого упражнения:
• Тип упражнение (бег/ходьба/
вело…)
• Сколько калорий потрачено
• Интенсивность
• Как долго длилось
• Шагов пройдено
• Пройдено свыше цели
Статистика:
• Сколько времени в
активном режиме /
пассивном режиме
• Сколько калорий
потрачено
• Всего шагов
• Всего дистанция
пройдена
Кардио:
• Пульс - регулярные измерения -
под нагрузкой и без
• ЭКГ, Холтеровское
мониторирование (с Cardiwear,
cardiwear.com)
Сон:
• Когда заснул / Когда проснулся
• Сколько времени в режиме
“легкого сна”/ Сколько времени
в режиме “глубокого сна”
5. Возможности для пациента
Пациент постоянно на связи с Системой ДОК:
• Ежедневно получает задания и напоминания
выбранным способом (email, SMS, сообщение в
соцсеть, приложение Системы ДОК на смартфоне)
• Может отслеживать свой курс и совершенные
действия в системе ДОК: упражнения, сон, пульс
(при наличии устройства)
• Может вносить дополнительные данные через
приложение - например, приемы пищи, состав пищи
• Получает рекомендации от доктора выбранным
способом, может задавать вопросы и получать
ответы
6. Возможности для доктора
Доктор получает полный контроль за
действиями пациента. Он может:
• Рекомендовать курс - по шаблону или
новый (в шаблоне заданы упражнения на
каждый день курса, расписание, режим сна и
питания и т.д.)
• Отслеживать выполнение в режиме
онлайн: получать сообщения об отклонении
от курса (SMS / email / соцсети), получать
данные от устройства пациента (выполненные
упражнения, режим сна, пульс, питание)
• Вносить изменения в курс (параметры
упражнений, напоминания о задачах,
посылать сообщения и т.д.)