1) The document discusses a presentation about exploring digital and wireless applications in healthcare. It covers introductions and definitions of terms, scholarships sponsored by Epocrates to review literature on handheld computers, and experiences using different mobile devices at VCU Health System.
2) It describes how scholarships are awarded to students to review literature and publish summaries to avoid past mistakes. Recipients included doctors and candidates from around the world.
3) VCU Health System initially struggled using PDAs and Palm OS smartphones but found success using Treo smartphones running PatientKeeper and connecting to their EMR system, which increased charges and timeliness.
Here are the basic steps to find that information using PubMed:
1. Go to www.pubmed.gov
2. In the search box, type "epilepsy after stroke"
3. Click the "Search" button
4. You will see a list of results. The abstracts will summarize each paper's findings. Read through a few to find percentages reported.
5. You can also filter your results by clicking "Clinical Queries" on the left and choosing "Therapy - Narrow" to focus on papers reporting treatment outcomes.
6. Make sure to write down the PMID (PubMed ID number) of any papers you want to reference in your response to your professor.
Let
The document discusses the use of mobile computing in healthcare, specifically focusing on how the NHS is mobilizing clinicians through tools like PDA pagers, SMS appointments, and SMS test results. It provides examples of software and pilots using these mobile technologies to improve mobility, accountability, control, convenience, privacy, and public health outcomes. The document also announces an international scholarship program to review literature on mobile medical computing and publish summaries in a new peer-reviewed journal.
This document discusses a new system that allows general practitioners (GPs) and specialists like nurses or carers to instantly invite local GPs to view patient data, with the goal of improving collaboration and ensuring smoother transfers of care between providers like Great Ormond Street Hospital and St Mark's Hospital. It also mentions scanning and uploading past patient x-rays as well as working with charities.
1) The document discusses a presentation about exploring digital and wireless applications in healthcare. It covers introductions and definitions of terms, scholarships sponsored by Epocrates to review literature on handheld computers, and experiences using different mobile devices at VCU Health System.
2) It describes how scholarships are awarded to students to review literature and publish summaries to avoid past mistakes. Recipients included doctors and candidates from around the world.
3) VCU Health System initially struggled using PDAs and Palm OS smartphones but found success using Treo smartphones running PatientKeeper and connecting to their EMR system, which increased charges and timeliness.
Here are the basic steps to find that information using PubMed:
1. Go to www.pubmed.gov
2. In the search box, type "epilepsy after stroke"
3. Click the "Search" button
4. You will see a list of results. The abstracts will summarize each paper's findings. Read through a few to find percentages reported.
5. You can also filter your results by clicking "Clinical Queries" on the left and choosing "Therapy - Narrow" to focus on papers reporting treatment outcomes.
6. Make sure to write down the PMID (PubMed ID number) of any papers you want to reference in your response to your professor.
Let
The document discusses the use of mobile computing in healthcare, specifically focusing on how the NHS is mobilizing clinicians through tools like PDA pagers, SMS appointments, and SMS test results. It provides examples of software and pilots using these mobile technologies to improve mobility, accountability, control, convenience, privacy, and public health outcomes. The document also announces an international scholarship program to review literature on mobile medical computing and publish summaries in a new peer-reviewed journal.
This document discusses a new system that allows general practitioners (GPs) and specialists like nurses or carers to instantly invite local GPs to view patient data, with the goal of improving collaboration and ensuring smoother transfers of care between providers like Great Ormond Street Hospital and St Mark's Hospital. It also mentions scanning and uploading past patient x-rays as well as working with charities.
Wrangling OWASP Top10 data at BSides Pittsburgh PGHBrian Glas
Gain insight into some of the details of the OWASP Top 10 Call for Data and industry survey, and what we were attempting to learn. Hear about was learned from collecting and analyzing widely varying industry data and attempts to build a dataset for comparison and analysis. This talk will discuss tips and common pitfalls for structuring vulnerability data and the subsequent analysis. Learn what the data can tell us and what questions are still left unanswered. Uncover some of the differences in collecting metrics in different stages of the software lifecycle and recommendations for handling them.
This document discusses validation of preservation methodologies using Representation Information (RepInfo). It presents RepInfo as a way to validate that future users can understand and reuse preserved data. It also describes creating formal, machine-readable RepInfo that defines data structures and semantics to enable validation and reuse of preserved data by new software over time. A variety of tools are presented for creating RepInfo, including formal description languages for defining data structures and semantics.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
The document discusses the history and future of the Vaadin framework. It outlines how Vaadin has evolved from GWT-based widgets to modern web components using the Polymer library. It describes how Vaadin 10 introduces Vaadin Components that are built as reusable web components, allowing developers to create user interfaces with modern APIs and structure. The talk also covers how Vaadin now uses functional data binding with its Binder class to simplify editing and validation of business objects.
Spreadmart To Data Mart BISIG PresentationDan English
Presentation at the North Central BI Special Interest Group (BISIG) going over a case study of converting an Excel Spreadmart solution to a SSAS data mart solution
This document summarizes how to develop a HealthVault application. HealthVault allows users to store health records and grant access to applications. Applications can access specific data types to read, write, and update user health information. The document outlines authentication and authorization processes, data models for common data types like measurements and codable values, relationships between data items, and options for storing additional application data. Resources for HealthVault developers include the online developer center, blogs, and forums.
Discover the Hidden Gems in Webtrends AnalyticsWebtrends
This document summarizes a presentation about hidden gems and recent updates in Webtrends Analytics. The presentation covered updates to page view determination, report export options, WebTrends Connect, and calculated measures. It also provided tips on useful features for report users and administrators, including bookmarks, preferences, and accessing data through Excel. Finally, it discussed new capabilities in Tag Builder 3.0 for mobile analytics and a beta release of new Web Services APIs.
Discover the Hidden Gems in Webtrends AnalyticsWebtrends
This document summarizes a presentation about hidden gems and recent updates in Webtrends Analytics. The presentation covered updates to page view determination, report export options, WebTrends Connect, and calculated measures. It also provided tips on useful report features from an analytics director and highlighted the new Tag Builder 3.0, mobile analytics capabilities, and a beta release of new Web Services APIs.
Neo4j Demo: Using Knowledge Graphs to Classify Diabetes Patients (GlaxoSmithK...Neo4j
This document discusses using Neo4j's graph data science capabilities to classify diabetes patients based on transcriptomics data and connect patients to knowledge graphs. It demonstrates loading patient data containing transcripts measured for each patient, generating graph embeddings to represent the data while preserving topology, training a node classification model to predict diabetes status, and performing community detection for subphenotyping. The goal is to transform heterogeneous clinical data into an integrated graph representation to power machine learning and connect insights to existing domain knowledge.
Software Architecture and Predictive Models in RHarlan Harris
This document discusses software architecture considerations for predictive modeling applications built in R. It addresses questions around whether the application is a data product, the number of users, how models are fit and scored, how predictions are stored and delivered, and testing procedures. Case studies are presented around annotating data hourly and fitting many models annually for scoring. The key decisions involve technologies, boundaries, responsibilities, performance, and operational complexity.
This document summarizes a presentation about the benefits of using semantic standards and technologies to make reference data more meaningful. It discusses how semantic models can extend industry standards to meet enterprise needs, and how integrating metadata and reference data through these models can achieve data harmonization. The overall approach taken is to leverage standards as much as possible through semantic representations of models, metadata, and reference data.
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Cambridge Semantics
Only with a rich and interactive semantic layer can your data and analytics stack deliver true on-demand access to data, answers and insights - weaving data together from across the enterprise into an information fabric. In this webinar we introduce Anzo Smart Data Lake 4.0, which provides that rich and interactive semantic layer to your data.
Industry - Relating Developers' Concepts and Artefact Vocabulary in a Financ...ICSM 2011
Paper: Relating Developers' Concepts and Artefact Vocabulary in a Financial
Software Module
Authors: Tezcan Dilshener and Michel Wermelinger
Session: Industry Track 2 - Reverse Engineering
The document discusses the benefits of using social media for businesses, noting that social media sites are often included in online searches and that time spent on social networking sites has surged 73% in the last year. It provides tips for businesses to get started on social media platforms like Facebook, LinkedIn, and Twitter, such as creating a complete profile, posting regular status updates, and strategically building a balanced network.
The document discusses the concepts of VPEC-T (values, policies, events, content, and trust) as drivers of innovation and how they change and evolve across different containers including human brains, applications and databases, organizations, and web communities. It also examines how barriers between these containers are dissolving as content becomes more externalized and accessible on the web.
This document provides an introduction to single sign-on (SSO) and how it has evolved. It discusses how SSO solves the problem of users having too many usernames and passwords across different applications by allowing authentication with an identity provider. SSO uses standards like SAML and OAuth to issue signed security tokens containing user claims that multiple applications can trust, eliminating separate logins. This federated authentication process is demonstrated with code. The benefits of SSO are illustrated through a healthcare case study showing significant time and cost savings when clinicians only need one set of credentials.
David Renton presented on creating a microservices chassis using JHipster. He discussed common cross-cutting concerns in microservices and considered frameworks like Finagle and Spring Boot. The presentation covered installing required software, creating sample microservices and a local registry using JHipster. It also discussed deploying the microservices to the cloud and setting up a cloud registry. Key steps included generating a microservice for managing car data, creating an API gateway, and testing the system locally and observing the services register with the local Eureka server.
DDD and Microservices: Like Peanut Butter and Jelly - Matt StineVMware Tanzu
This document discusses domain-driven design (DDD) and microservices. It covers topics like bounded contexts, the ubiquitous language, aggregates, events, and hexagonal architecture. It argues that DDD concepts like bounded contexts should guide how microservices are decomposed. Microservices should be aligned to aggregates and bounded contexts to achieve high cohesion and loose coupling. The optimal size for a microservice is between one aggregate and one bounded context.
The document discusses key concepts in .NET including value types, reference types, classes, inheritance, interfaces, generics, boxing and unboxing, exceptions, events and delegates.
It explains that value types like integers store data directly while reference types store references to data on the heap. Common reference types include strings, arrays and streams. Classes can inherit from other classes and implement interfaces. Generics allow types to be parameterized. Events and delegates are used for asynchronous notification. Explicit conversion is needed between non-compatible types.
This review by the National Data Guardian for Health and Care (NDG), Dame Fiona Caldicott, makes recommendations to the Secretary of State for Health. These are aimed at strengthening the safeguards for keeping health and care information secure and ensuring the public can make informed choices about how their data is used.
The NDG proposes new data security standards for the NHS and social care, a method for testing compliance against the standards, and a new opt-out to make clear how people’s health and care information will be used and in what circumstances they can opt out.
Dame Fiona’s report argues that the public should be engaged about how their information is used and safeguarded, and the benefits of data sharing, with a wide-ranging consultation on her proposals as a first step.
A letter from Dame Fiona Caldicott and David Behan, Care Quality Commission Chief Executive, to the Health Secretary outlines the common themes between the NDG review and a review of data security in the NHS carried out by the CQC.
The Global Social Impact Investment Steering Group (GSG) was established in August 2015 as the successor to the Social Impact Investment Taskforce, established by G8. The GSG is continuing the work of the Taskforce in catalysing a global social impact investment market across a wider membership. Its members include 13 countries plus the EU, as well as active observers from government and from leading network organisations supportive of impact investment.
Across the world, attitudes are changing. Old certainties about tightly defined roles for government, civil society and business are dissolving. Social sector organisations are becoming more business-like, and business is looking ever more to delivering sustainable value.
Wrangling OWASP Top10 data at BSides Pittsburgh PGHBrian Glas
Gain insight into some of the details of the OWASP Top 10 Call for Data and industry survey, and what we were attempting to learn. Hear about was learned from collecting and analyzing widely varying industry data and attempts to build a dataset for comparison and analysis. This talk will discuss tips and common pitfalls for structuring vulnerability data and the subsequent analysis. Learn what the data can tell us and what questions are still left unanswered. Uncover some of the differences in collecting metrics in different stages of the software lifecycle and recommendations for handling them.
This document discusses validation of preservation methodologies using Representation Information (RepInfo). It presents RepInfo as a way to validate that future users can understand and reuse preserved data. It also describes creating formal, machine-readable RepInfo that defines data structures and semantics to enable validation and reuse of preserved data by new software over time. A variety of tools are presented for creating RepInfo, including formal description languages for defining data structures and semantics.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
The document discusses the history and future of the Vaadin framework. It outlines how Vaadin has evolved from GWT-based widgets to modern web components using the Polymer library. It describes how Vaadin 10 introduces Vaadin Components that are built as reusable web components, allowing developers to create user interfaces with modern APIs and structure. The talk also covers how Vaadin now uses functional data binding with its Binder class to simplify editing and validation of business objects.
Spreadmart To Data Mart BISIG PresentationDan English
Presentation at the North Central BI Special Interest Group (BISIG) going over a case study of converting an Excel Spreadmart solution to a SSAS data mart solution
This document summarizes how to develop a HealthVault application. HealthVault allows users to store health records and grant access to applications. Applications can access specific data types to read, write, and update user health information. The document outlines authentication and authorization processes, data models for common data types like measurements and codable values, relationships between data items, and options for storing additional application data. Resources for HealthVault developers include the online developer center, blogs, and forums.
Discover the Hidden Gems in Webtrends AnalyticsWebtrends
This document summarizes a presentation about hidden gems and recent updates in Webtrends Analytics. The presentation covered updates to page view determination, report export options, WebTrends Connect, and calculated measures. It also provided tips on useful features for report users and administrators, including bookmarks, preferences, and accessing data through Excel. Finally, it discussed new capabilities in Tag Builder 3.0 for mobile analytics and a beta release of new Web Services APIs.
Discover the Hidden Gems in Webtrends AnalyticsWebtrends
This document summarizes a presentation about hidden gems and recent updates in Webtrends Analytics. The presentation covered updates to page view determination, report export options, WebTrends Connect, and calculated measures. It also provided tips on useful report features from an analytics director and highlighted the new Tag Builder 3.0, mobile analytics capabilities, and a beta release of new Web Services APIs.
Neo4j Demo: Using Knowledge Graphs to Classify Diabetes Patients (GlaxoSmithK...Neo4j
This document discusses using Neo4j's graph data science capabilities to classify diabetes patients based on transcriptomics data and connect patients to knowledge graphs. It demonstrates loading patient data containing transcripts measured for each patient, generating graph embeddings to represent the data while preserving topology, training a node classification model to predict diabetes status, and performing community detection for subphenotyping. The goal is to transform heterogeneous clinical data into an integrated graph representation to power machine learning and connect insights to existing domain knowledge.
Software Architecture and Predictive Models in RHarlan Harris
This document discusses software architecture considerations for predictive modeling applications built in R. It addresses questions around whether the application is a data product, the number of users, how models are fit and scored, how predictions are stored and delivered, and testing procedures. Case studies are presented around annotating data hourly and fitting many models annually for scoring. The key decisions involve technologies, boundaries, responsibilities, performance, and operational complexity.
This document summarizes a presentation about the benefits of using semantic standards and technologies to make reference data more meaningful. It discusses how semantic models can extend industry standards to meet enterprise needs, and how integrating metadata and reference data through these models can achieve data harmonization. The overall approach taken is to leverage standards as much as possible through semantic representations of models, metadata, and reference data.
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Cambridge Semantics
Only with a rich and interactive semantic layer can your data and analytics stack deliver true on-demand access to data, answers and insights - weaving data together from across the enterprise into an information fabric. In this webinar we introduce Anzo Smart Data Lake 4.0, which provides that rich and interactive semantic layer to your data.
Industry - Relating Developers' Concepts and Artefact Vocabulary in a Financ...ICSM 2011
Paper: Relating Developers' Concepts and Artefact Vocabulary in a Financial
Software Module
Authors: Tezcan Dilshener and Michel Wermelinger
Session: Industry Track 2 - Reverse Engineering
The document discusses the benefits of using social media for businesses, noting that social media sites are often included in online searches and that time spent on social networking sites has surged 73% in the last year. It provides tips for businesses to get started on social media platforms like Facebook, LinkedIn, and Twitter, such as creating a complete profile, posting regular status updates, and strategically building a balanced network.
The document discusses the concepts of VPEC-T (values, policies, events, content, and trust) as drivers of innovation and how they change and evolve across different containers including human brains, applications and databases, organizations, and web communities. It also examines how barriers between these containers are dissolving as content becomes more externalized and accessible on the web.
This document provides an introduction to single sign-on (SSO) and how it has evolved. It discusses how SSO solves the problem of users having too many usernames and passwords across different applications by allowing authentication with an identity provider. SSO uses standards like SAML and OAuth to issue signed security tokens containing user claims that multiple applications can trust, eliminating separate logins. This federated authentication process is demonstrated with code. The benefits of SSO are illustrated through a healthcare case study showing significant time and cost savings when clinicians only need one set of credentials.
David Renton presented on creating a microservices chassis using JHipster. He discussed common cross-cutting concerns in microservices and considered frameworks like Finagle and Spring Boot. The presentation covered installing required software, creating sample microservices and a local registry using JHipster. It also discussed deploying the microservices to the cloud and setting up a cloud registry. Key steps included generating a microservice for managing car data, creating an API gateway, and testing the system locally and observing the services register with the local Eureka server.
DDD and Microservices: Like Peanut Butter and Jelly - Matt StineVMware Tanzu
This document discusses domain-driven design (DDD) and microservices. It covers topics like bounded contexts, the ubiquitous language, aggregates, events, and hexagonal architecture. It argues that DDD concepts like bounded contexts should guide how microservices are decomposed. Microservices should be aligned to aggregates and bounded contexts to achieve high cohesion and loose coupling. The optimal size for a microservice is between one aggregate and one bounded context.
The document discusses key concepts in .NET including value types, reference types, classes, inheritance, interfaces, generics, boxing and unboxing, exceptions, events and delegates.
It explains that value types like integers store data directly while reference types store references to data on the heap. Common reference types include strings, arrays and streams. Classes can inherit from other classes and implement interfaces. Generics allow types to be parameterized. Events and delegates are used for asynchronous notification. Explicit conversion is needed between non-compatible types.
This review by the National Data Guardian for Health and Care (NDG), Dame Fiona Caldicott, makes recommendations to the Secretary of State for Health. These are aimed at strengthening the safeguards for keeping health and care information secure and ensuring the public can make informed choices about how their data is used.
The NDG proposes new data security standards for the NHS and social care, a method for testing compliance against the standards, and a new opt-out to make clear how people’s health and care information will be used and in what circumstances they can opt out.
Dame Fiona’s report argues that the public should be engaged about how their information is used and safeguarded, and the benefits of data sharing, with a wide-ranging consultation on her proposals as a first step.
A letter from Dame Fiona Caldicott and David Behan, Care Quality Commission Chief Executive, to the Health Secretary outlines the common themes between the NDG review and a review of data security in the NHS carried out by the CQC.
The Global Social Impact Investment Steering Group (GSG) was established in August 2015 as the successor to the Social Impact Investment Taskforce, established by G8. The GSG is continuing the work of the Taskforce in catalysing a global social impact investment market across a wider membership. Its members include 13 countries plus the EU, as well as active observers from government and from leading network organisations supportive of impact investment.
Across the world, attitudes are changing. Old certainties about tightly defined roles for government, civil society and business are dissolving. Social sector organisations are becoming more business-like, and business is looking ever more to delivering sustainable value.
Using a Shared Electronic Patient Record to Develop and Assess e-Consultation...Mohammad Al-Ubaydli
The document discusses a study where medical and pharmacy students communicated electronically with volunteer patients to develop e-consultation skills. Students quickly adapted to communicating online and behaved professionally. The permanent online record of interactions provided valuable feedback on students' consultation skills. More work is needed to identify key skills for effective online communication with patients.
This document discusses patient access to medical records and the effects of increased access. It finds that there is a lack of clear evidence on how increased access affects outcomes and that there are competing rationales for and against greater access. The document also examines how healthcare is being impacted by the information revolution, including how it may change relationships between patients and providers and impact quality of care, professional responsibilities, privacy, health inequalities, and the roles of alternative providers and the private sector. Overcoming barriers will require interventions to realize the potential benefits of increased access to medical records.
This document discusses tips for clinicians working with patients online, including definitions of key terms like personal health records and patient portals. It recommends that clinicians only work with patients they know, assume all communications could be publicly read, respond promptly to patient access requests, apologize and express gratitude to patients, learn from patient experiences, protect patient privacy but involve family/caregivers when appropriate, develop basic computer skills, consider asking patients to help cover costs, and use available software tools to facilitate online care. The document concludes by thanking the audience and inviting questions.
Personal health records presentation at Cambridge RefreshMohammad Al-Ubaydli
The document discusses personal health records and communicating about chronic diseases online. It notes that while the internet is great for communication, many people are not using it to communicate about chronic illnesses due to genuine security concerns, confusing consent with security, only considering one aspect of security, and not knowing how or that they can communicate online. It provides examples of security risks and privacy issues but also resources that people can use to communicate about their health online in a private and secure manner.
Meeting healthcare challenges: what are the challenges and what is the role o...Mohammad Al-Ubaydli
The document discusses the challenges facing healthcare systems and the role that e-health can play in addressing these challenges. The major challenges are quality and safety, access, responsiveness, and affordability. E-health can help by providing access to electronic patient records, reducing complexity, optimizing information processing, and increasing efficiency. It can also help with navigation through the healthcare system and engaging patients in their own health. The document advocates for free access to research information and using data to identify at-risk patients in need of care.
Patients Know Best is a company that created the world's first patient-controlled medical records website to give patients access to and control over their own health records. Their system provides a complete electronic health record that can store any medical data while complying with various privacy regulations. Several UK healthcare organizations have already implemented the system, including the NHS, Bupa, and Great Ormond Street Hospital, allowing for online consultations, prescribing, and saving clinician's time by providing detailed explanations directly to patients.
Long Term Conditions: Long Term Conditions What’s wrong and what do we need?Mohammad Al-Ubaydli
This document discusses challenges facing long-term condition (LTC) care in the NHS East of England region. It notes that funding cuts are projected, while demand is increasing. Current LTC care is seen as too medicalized and not personalized enough. Variation in services and costs between areas is also a problem. To address these issues, the document advocates for a more personalized, integrated approach centered around self-care and personal health planning. It proposes alternative payment models, like a "pathway hub" provider managing entire care pathways and budgets. The overall vision is to empower patients and provide the right care at the right time in a sustainable way.
Darren Umbers (UK Sales Director, Philips Respironics) (pictured)
Darren will talk about both devices and support services Philips is offering in the UK for sleep apnoea patients. This will include CPAP devices to aid breathing and nebulizers able to report compliance. He will also talk about “back office” support for these devices. Darren will therefore pick up on the references that Steve will make to monitoring devices and treatment and cover patient support to some extent.
Home health care & long-term conditions: How to succeed with personal health ...Mohammad Al-Ubaydli
Dr Mohammad Al-Ubaydli (CEO of Patients Know Best)
Dr Al-Ubaydli is author of the book "Personal health records: A guide for clinicians", in which he surveyed the different ways in which patients can work with their clinical team using software. A new generation of tools allows patients to manage their health and Mohammad will cover some of these in his talk, including products by large US companies like Google and Microsoft, as well as the UK software industry. He will also describe the experiences of his own company, Patients Know Best, which integrates its patient-controlled medical records platform into the NHS secure network.
The document discusses how clinicians can leverage online communities to better connect with key stakeholders. It describes 8 types of online communities and provides statistics on social media usage. It then outlines a 6 phase relationship cycle for using communities as a relationship building tool, including researching needs, setting goals, developing a community plan, acquiring members, measuring results, and maintaining engagement. The key is using communities for transparent, engaged, consistent collaboration and celebrating successes to build trusted relationships.
1) The document provides information on various direct-to-consumer genomics companies and their offerings, including 23andMe, deCODEme, Navigenics, and others.
2) It discusses the declining prices of whole genome sequencing from $99,500 down to $48,000.
3) The document also briefly describes next-generation DNA sequencing technologies like Pacific Biosciences that can read DNA in real time.
The document discusses patient access to medical records and the effects of increased access. It finds that there are different drivers for increased access, and a lack of clear evidence on how access affects outcomes. It also discusses how healthcare is changing with new information technologies and relationships between patients and providers. Some issues that need further focus are ensuring public and private health, quality healthcare, professional cultures, privacy, addressing inequalities, and the roles of alternative providers and the private sector.
The NHS Number Programme aims to improve patient safety by minimizing clinical risks caused by misallocation of patient information and resolving barriers to safely sharing information across healthcare settings. Incidents of patient confusion and errors due to reliance on local hospital number systems have endangered patient safety. Priority settings for implementing the NHS Number include general practice, secondary care, ambulance services, and social care. Current projects include developing published standards for general practice and secondary care, as well as social care standard development and a public awareness campaign.
The document discusses enabling patients to access their electronic health records. It notes that doing so can help rebuild trust after a high-profile murder case, as patients are able to verify their records. It describes building partnerships with patients by giving them online access to records, appointments, and medical information through a patient portal. Studies show patient record access improves communication, patient outcomes and satisfaction. The document advocates a blended approach combining patient access with tools like HealthSpace and Google Health.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
3. Session Topics
Understanding the data model
• Data Types
• Vocabularies
• Transforms
• Versioning
Working with the data model
• Approaches
• Tools & Resources
• Discovery & investigation
• Mapping
– Extending data types
– Creating custom data types
– Request updates
Supporting Your Success in Health
6. Data Type Design Principles
• Consumer-centric
– Data that is useful for customers
• Small atomic types
– Easier to create and update
• Interoperable
– Interoperate with industry standards in actual use
• Inclusive
– Support fully structured data and unstructured information
• Just in Time
– Create types as we work with partners fluent in specific domains
• Independent
– Allow expression of connections but never rely on their existence
Supporting Your Success in Health
6
7. Exploring a data type
• Understanding family-history-person
– Describes a relative
• Inlaws and outlaws (mom, dad, sister, brother, aunt
uncle)
– Stores the following information
• Relative name
• Relationship of relative
• Date of birth
• Date of death
– Used in conjunction with family-history-condition
• Stores information about relative’s conditions
Supporting Your Success in Health
8. family-health-person Schema
t:person
<element name=quot;relative-namequot; type=quot;t:personquot;>
<annotation>
<documentation>
t:codable-value
<summary>
The name and other information about the relative.
</summary>
</documentation>
</annotation>
</element> d:approx-date
Supporting Your Success in Health d:approx-date
9. t:person
• Base data types are intended to be
used across multiple thing types
• Examples
– Person
– Dates
– Measurements
– Etc.
Supporting Your Success in Health
10. .NET Wrappers
PersonItem RelativeName
t:person
CodableValue Relationship
class FamilyHistoryPerson t:codable-
value
ApproximateDate DateOfBirth
d:approx-date
ApproximateDate DateOfDeath
d:approx-date
Supporting Your Success in Health
11. .NET Wrapper Classes
• Each schema type has an analogous .net class
– Thing types are derived from HealthRecordItem
– Base types are derived from HealthRecordItemData
• Some types predate our naming convention
– t:person base type wrapper is PersonItem
– t:approxDate wrapper is ApproximateDate
• We are considering some wrapper class renaming to fix a few issues in
this area, and will be asking for your feedback
Supporting Your Success in Health
12. Codable Value
PersonItem RelativeName
t:person
CodableValue Relationship
class FamilyHistoryPerson t:codable-
value
ApproximateDate DateOfBirth
d:approx-date
ApproximateDate DateOfDeath
d:approx-date
Supporting Your Success in Health
13. Codable Value
• Many fields have two uses
• A user-entered string
• An application-understandable code
• Often tied to a specific vocabulary
• Example
• Medication codes
• Aerobic exercise types
• CodableValue combines both uses
Supporting Your Success in Health
14. Codable Value
Family History Person Relationship
Text: Grandmother
Code Vocabulary
GMt personal-relationship personal-relationship vocabulary
GMt-M
Key Display Text
Bro Brother
GMt Grandmother
Csn Cousin
Mth Mother
Supporting Your Success in Health
15. Data Transforms
• Platform-implemented transforms from thing xml to a
different format
• mtt – summarize instance values
• stt – important columns from the instance
• These transforms are used by the
HealthRecordItemDataGrid
Supporting Your Success in Health
16. Form transform
• Html version of the data
• Not supported for all types – changes coming in the future
Supporting Your Success in Health
17. Updating data types… Health Record
.NET SDK V2 Encounter
V2
Encounter
Application Instance
V2
(new fields)
Missing New
require fields
d fields
.NET SDK V1
Application Encounter
V1 Encounter
V1
Instance
Supporting Your Success in Health
18. With Versioning… Health Record
.NET SDK V2 Encounter
V2
Encounter
Application Instance
V2
(new fields) Encounter Transfor
V2 m
XML
Encounter Transfor
.NET SDK V1 V1 m
XML
Application Encounter
V1 Encounter
V1
Instance
Supporting Your Success in Health
19. Versioning details
• Limitations
– Can’t perform updates across versions
– Only works instance to instance
• Can’t transform to multiple instances
• Will be released in PB6
– Some recent types hand-versioned
• Encounter / EncounterOld
• These will become one type after versioning is
deployed
Supporting Your Success in Health
20. Big types vs multiple small types
• Big types:
– More likely to require modifications
– Modifications require versioning
– Harder to understand
• Multiple small types
– Less likely to require versioning
– Modify through adding new types
• Multiple smaller types are better
– How do you relate them together?
Supporting Your Success in Health
21. Related Items
Weight Aerobic Session
Key = <X> Key =<Y>
<Y>
Related Items Blood Pressure
Key =<Z>
<Z>
• Applications must follow the links themselves
• Referential integrity is not enforced
– Applications must deal with links to items that don’t
exist
• Links are one-way
Supporting Your Success in Health
24. Where to start?
Should I start by understanding everything about things?
HealthVault? , I though t they were
CD Item Types
g as a C
e verythin
st store
Ca n’t we ju We already
database s have a MTT se
o can we ju ems lik
st e an ea
I’m alre give you o sy way
ady usi ur structure to start…
ng indu ?
should stry sta
I start th ndards,
ere?
Maybe I’ll w
an ait to start a
t fter the next
ust inser version of th
ould I j e data…
Here’s our suggested approach…
C
STT and
be d on
e?
I a lr e Easy, Where should I go to see all the
ady d the an
Healt o swer m HealthVault vocabularies?
hVau CCR out ust be
to star
lt d o p
the r ut, can t with
the XM
est? L…
Wouldn’t it be best to st Wait, now what was that base thing
art
with building a list of al type again?
l
related data?
in st the
data aga You menti
dating my oned trans
forms, is th
rt by vali data? ere already
I kno w, I’ll sta one for my
XSD…
Supporting Your Success in Health
25. Start with a Data Inventory
Integrating an existing application?
Make a list of what you have now
Creating a new application?
Make a list of what you plan to have
Blood Pressure Readings
Is it appropriate to store in HealthVault?
As a general rule, if it provides value to the Medications
consumer’s health record, it’s appropriate
Patient Information
to store in HealthVault. It becomes even
more valuable when it can be reused Bank Account Info
across systems.
Extended Health Info
Super-Secret Company Info
Supporting Your Success in Health
26. Discover the HealthVault Data Types
Now that you have your data inventory…
Time to learn about the HealthVault data
types
Tools to make this easier:
MSDN
Online Library
Data Type Reference
Blogs
Community Forum
Utilities
.NET SDK
Supporting Your Success in Health
27. Discover where data type matches exist
You’ve done your data inventory and reviewed the HealthVault data type.
Now it’s time to map your data between the systems
Start by identifying the set of matching data types
Condition
Body Composition
Medication
Demographics Medication
Condition
Personal Demographic Information
Basic Demographic Information
Supporting Your Success in Health
28. Map fields across data types
You have the set of matched data types.
Next step is to see how each field compares between the systems
Example 1 - the 100% match
Supporting Your Success in Health
29. Mapping fields across multiple data types
What to do when there isn’t a 100% match to a single data type
Look across other similar data types
Example 2 - the 100% match across multiple data types
Supporting Your Success in Health
30. Mapping fields across multiple data types
What to do when there isn’t a 100% match to a single data type
Look across other similar data types
Example 2 - the 100% match across multiple data types
Supporting Your Success in Health
31. What to do when there are missing fields
Some fields may not map to any fields in HealthVault
Determine if they should be part of HealthVault or if they are proprietary
Example 3 - the partial match with some new and proprietary fields
What about these?
Supporting Your Success in Health
32. What to do when there are missing fields
Some fields may not map to any fields in HealthVault
Determine if they should be part of HealthVault or if they are proprietary
Example 3 - the partial match with some new and proprietary fields
These are calculated values or measurements and
are excellent candidates for HealthVault additions
These two provide value to the consumer’s health
record but may not be easily shared across
applications.
Supporting Your Success in Health
34. HealthVault Data Type Updates
Requesting an update
Requesting an update
Please include:
Please include:
What you’re trying to accomplish
What you’re trying to accomplish
Consumer and system use of the data
Consumer and system use of the data
Samples of existing data
Samples of existing data
What we do:
What we do:
–Review the request
–Review the request
–Post a Request for Interest to the blog
–Post a Request for Interest to the blog
What we ask of you:
What we ask of you:
Unblock your development
Unblock your development
–Use a data type extension
–Use a data type extension
–Use a custom data type
–Use a custom data type
Supporting Your Success in Health
35. HealthVault Data Type Updates
Research & Design
Research & Design
What we do:
What we do:
Review all collected materials
Review all collected materials
–Is it right for HealthVault
–Is it right for HealthVault
–Are there other types that would satisfy?
–Are there other types that would satisfy?
–Should this be a new data type?
–Should this be a new data type?
–Ask a lot of questions
–Ask a lot of questions
Pull in domain experts as needed
Pull in domain experts as needed
Find similarities across existing data types
Find similarities across existing data types
Document standards and vocabularies
Document standards and vocabularies
Create the draft design
Create the draft design
Supporting Your Success in Health
36. HealthVault Data Type Updates
Reviewing the draft design
Reviewing the draft design
What we do:
What we do:
Post a Request for Review on the blog
Post a Request for Review on the blog
–Design write-up
–Design write-up
–May include a graphical representation
–May include a graphical representation
Hold internal reviews
Hold internal reviews
What we ask of you:
What we ask of you:
Review the design
Review the design
Provide comments
Provide comments
Supporting Your Success in Health
37. HealthVault Data Type Updates
Releasing the update
Releasing the update
What we do:
What we do:
Review and incorporate all feedback
Review and incorporate all feedback
Create appropriate transforms
Create appropriate transforms
Create .NET SDK
Create .NET SDK
Deploy to platform and MSDN
Deploy to platform and MSDN
What we ask of you:
What we ask of you:
Download new SDK
Download new SDK
Update applications to use new data types
Update applications to use new data types
Supporting Your Success in Health
38. Learn More About The HealthVault Data Model
HealthVault Developer Center on MSDN
http://msdn.microsoft.com/healthvault
– Getting Started Guide
– Online Libraries
– Go-Live Guide
– HealthVault SDK & DDK
– Blogs & Forum
HealthVault Data Types blog
http://blogs.msdn.com/healthvaultdatatypes/default.aspx
– Latest data type information available
Supporting Your Success in Health
39. Need Help?
These companies have built HealthVault-compatible applications or device drivers
and are eager to help you:
Supporting Your Success in Health