SlideShare a Scribd company logo
Dr Jasbeer Singh
MAINTENANCE OF
• Hospital Information system is essentially a computer system that can manage all the
information to allow health care providers to do their jobs effectively.
• These systems have been around since they were first introduced in the 1960s and have
evolved with time and the modernization of healthcare facilities.
• The staff used them primarily for managing
billing and hospital inventory.
• All this has changed now, and today hospital
information systems include the integration
of all clinical, financial and administrative
applications.
• As hospital information system covers all hospital operations and management, and its
compositions contains
- Software
- Hardware
- Network and other subsystems
• Management and maintenance workload is very important
and difficult, and some of the major components of healthcare
Information system which have to be maintained periodically are:
1. Server maintenance
2. Data backup
3. User management and
4. Network security and maintenance.
I. SOFTWARE MAINTENANCE:
It stands for all the modifications and updations done after the delivery of software product. There
are number of reasons, why modifications are required, some of them are briefly mentioned below:
• Market Conditions - Policies, which changes over the time, such as taxation and newly
introduced constraints like, how to maintain bookkeeping, may trigger need for modification.
• Client Requirements - Over the time, customer may ask for new features or functions in the
software.
• Host Modifications - If any of the hardware and/or platform (such as operating system) of the
target host changes, software changes are needed to keep adaptability.
• Organization Changes - If there is any business level change at client end, such as reduction of
organization strength, acquiring another company, organization venturing into new business,
need to modify in the original software may arise.
• Types of maintenance: In a software lifetime, type of maintenance may vary based on its nature.
It may be just a routine maintenance tasks as some bug discovered by some user or it may be a
large event in itself based on maintenance size or nature. Following are some types of
maintenance based on their characteristics:
• Corrective Maintenance - This includes modifications and updations done in order to correct or
fix problems, which are either discovered by user or concluded by user error reports.
• Adaptive Maintenance - This includes modifications and updations applied to keep the software
product up-to date and tuned to the ever changing world of technology and business environment.
• Perfective Maintenance - This includes modifications and updates done in order to keep the
software usable over long period of time. It includes new features, new user requirements for
refining the software and improve its reliability and performance.
• Preventive Maintenance - This includes modifications and updations to prevent future problems
of the software. It aims to attend problems, which are not significant at this moment but may
cause serious issues in future.
COST OF
MAINTENANCEA study on estimating software maintenance found that the cost of maintenance is as high as
67% of the cost of entire software process cycle.
Factors affecting Maintenance Cost:
• The standard age of any software is considered
up to 10 to 15 years.
• Older software's, which were meant to work on
slow machines with less memory and storage
capacity cannot keep themselves challenging
against newly coming enhanced software's on
modern hardware. 67%
15%
8%
7%
3%
SOFTWARE-MAINTENANCE
Maintenance Testing Design
Implementation Requirement
• As technology advances, it becomes costly to maintain old software.
• Most maintenance engineers are newbie and use trial and error method to rectify problem.
• Often, changes made can easily hurt the original structure of the software, making it hard
for any subsequent changes.
• Changes are often left undocumented which may cause more conflicts in future.
• Maintenance Activities:
II. Hardware Maintenance:
1. Server Maintenance:
• Server maintenance focuses on software maintenance, including
regular or occasional monitoring of memory, disk space monitoring,
security access control, computer virus checking and so on.
• The network administrator usually does this, and it is crucial to the
performance of the business. Without a proper IT service plan, the
application software will never run as expected.
• Server maintenance is such a big deal. Just like you go to the
doctor for regular check-ups to make sure everything is healthy
and whole, servers also need to be regularly monitored to ensure
that all parts are working optimally.
• with regular maintenance, the business’ precious hardware
and software will have a greater chance of serving
for a long time.
• Good server maintenance also boosts server productivity
which, in turn, boosts overall business productivity.
• Routine server maintenance will keep the server functioning
at top speed. This will not only save the time, but also increase work efficiency.
• Properly monitored servers also give the assurance that if anything goes wrong,
it will be able to easily recover any lost or damaged data. This way, we can get
systems back and working before the clients even have the chance to
notice there was an issue.
2.DATA BACKUP:
• Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event.
• These day’s, there are many kinds of data backup services that help enterprises and organizations ensure that
data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of
emergency. Some of the methods of data backup are
- Disks or tape backup
- Direct-to-cloud backup
- Hybrid cloud backup
3. USER MANAGEMENT:
• User management describes the ability for administrators to manage user access to various IT resources
like systems, devices, applications, storage systems, networks, and more.
• User management is a core part to any directory service and is a basic security essential for any
organization
• User management enables admins to control user access and on-board and off-board users to and from IT
resources and maintenance requires regular updating, backup of data and maintaining privacy.
• Recent innovations in cloud technology have sparked a revolution in cloud Infrastructure-as-a-Service
(IaaS) such as Azure, and Google Cloud Platform among others. Coupled with web applications, users
have more IT resources available at their fingertips than ever before
III. NETWORK AND OTHER SUBSYSTEMS:
• Networking, also known as computer networking, is the practice of transporting and exchanging
data between nodes over a shared medium in an information system. Networking comprises not
only the design, construction and use of a network, but also the management, maintenance and
operation of the network infrastructure, software and policies
• Computer networking enables devices and endpoints to be connected to each other on a local area
network (LAN) or to a larger network, such as the internet or a private wide area network
(WAN). This is an essential function for service providers, businesses and consumers worldwide
to share resources, use or offer services, and communicate. Networking facilitates everything
from telephone calls to text messaging to streaming video to the internet of things (IoT)
TYPES OF
NETWORKS:
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number
of computers that are part of the network. Networks can cover anything from a handful of
devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
• Personal area network, or PAN
• Local area network, or LAN
• Metropolitan area network, or MAN
• Wide area network, or WAN
In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:
• Storage area network, or SAN
• Enterprise private network, or EPN
• Virtual private network, or VPN
4. NETWORK SECURITY AND MAINTENANCE:
• Network security is any activity designed to protect the usability and integrity of the
network and data.
• It includes both hardware and software technologies. Effective network security
manages access to the network. It targets a variety of threats and stops them from
entering or spreading on your network. e.g., Wiretapping, Port scanner, Encryption,
Virus, Buffer overflow, Cross site scripting, cyber attack and more
• Network security combines multiple layers of defenses at the edge and in the network. Each
network security layer implements policies and controls. Authorized users gain access to
network resources, but malicious actors are blocked from carrying out exploits and threats.
Types of network security
1. Firewalls
2. Antivirus and antimalware software
3. Spam Blocking
4. Data loss prevention
5. Content Filtering
6. Web security
7. URL filtering
DATA SECURITY COUNCIL OF INDIA (DSCI):
• Its a not-for-profit, industry body on data protection in India, setup by
NASSCOM® committed to making the cyberspace safe, secure and
trusted by establishing best practices, standards and initiatives in cyber
security and privacy.
• DSCI engages with governments and their agencies, regulators, industry
sectors, industry associations and think tanks for policy advocacy,
thought leadership, capacity building and outreach activities. Main
activities in which DSCI engages are:
>Standards and Best Practices
>Thought Leadership
>Capacity Building
>Cyber Security Industry Development
>Policies for Cyber Security
REFERENCES:
• https://www.tutorialspoint.com/software_engineering/software
_maintenance_overview.htm
• https://4quartersit.com/backup-methods-not-created-equal/
• https://study.com/academy/lesson/types-of-networks-lan-
wan-wlan-man-san-pan-epn-vpn.html
• http://www.assignmenthelp.net/assignment_help/Computer-
Networks-and-Types
THANK YOU

More Related Content

What's hot

medical records department
medical records departmentmedical records department
medical records department
AnkurAnkit3
 
Information Technology in Hospitals
Information Technology in HospitalsInformation Technology in Hospitals
Information Technology in Hospitals
Vijay Raj Yanamala
 
Hospital IT
Hospital ITHospital IT
Hospital IT
drsandeeptiss
 
NABH
NABHNABH
Medical record
Medical recordMedical record
Medical record
Mahmoud Albadrawy
 
Quality Management of Hospital Services
Quality Management of Hospital ServicesQuality Management of Hospital Services
Quality Management of Hospital Services
Zulfiquer Ahmed Amin
 
Simple steps to NABH Accreditation
Simple steps to NABH AccreditationSimple steps to NABH Accreditation
Simple steps to NABH Accreditation
Lallu Joseph
 
Disharge process
Disharge processDisharge process
Disharge process
AnkurAnkit3
 
To study the process of patient discharge in corporate hospital
To study the process of patient discharge in corporate hospitalTo study the process of patient discharge in corporate hospital
To study the process of patient discharge in corporate hospital
Rameez Shah
 
Hospital management nabh
Hospital management nabh  Hospital management nabh
Hospital management nabh Anvita Bhargava
 
Medical Records Department
Medical Records DepartmentMedical Records Department
Medical Records Department
VarugheseDaniel_1968
 
Organization management of medical records department part-1
Organization management of medical records department  part-1Organization management of medical records department  part-1
Organization management of medical records department part-1T.Keshavarao
 
Credentialing & privileging
Credentialing & privilegingCredentialing & privileging
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
Healthcare consultant
 
Patient safety culture
Patient safety culturePatient safety culture
Managerial activities for effective hospital functioning
Managerial activities for effective hospital functioningManagerial activities for effective hospital functioning
Managerial activities for effective hospital functioning
Sandeep Singh
 
Nabh 5th edition introduction by Iyanar. S
Nabh  5th edition introduction by Iyanar. SNabh  5th edition introduction by Iyanar. S
Nabh 5th edition introduction by Iyanar. S
Iyanar Shanmugam
 
Credentialing and privileging of clinicians
Credentialing  and privileging of cliniciansCredentialing  and privileging of clinicians
Credentialing and privileging of clinicians
Joven Botin Bilbao
 

What's hot (20)

medical records department
medical records departmentmedical records department
medical records department
 
Information Technology in Hospitals
Information Technology in HospitalsInformation Technology in Hospitals
Information Technology in Hospitals
 
Hospital IT
Hospital ITHospital IT
Hospital IT
 
NABH
NABHNABH
NABH
 
Medical record
Medical recordMedical record
Medical record
 
Quality Management of Hospital Services
Quality Management of Hospital ServicesQuality Management of Hospital Services
Quality Management of Hospital Services
 
Simple steps to NABH Accreditation
Simple steps to NABH AccreditationSimple steps to NABH Accreditation
Simple steps to NABH Accreditation
 
JCIA PRESENTATION
JCIA PRESENTATIONJCIA PRESENTATION
JCIA PRESENTATION
 
Disharge process
Disharge processDisharge process
Disharge process
 
To study the process of patient discharge in corporate hospital
To study the process of patient discharge in corporate hospitalTo study the process of patient discharge in corporate hospital
To study the process of patient discharge in corporate hospital
 
Hospital management nabh
Hospital management nabh  Hospital management nabh
Hospital management nabh
 
Medical Records Department
Medical Records DepartmentMedical Records Department
Medical Records Department
 
Organization management of medical records department part-1
Organization management of medical records department  part-1Organization management of medical records department  part-1
Organization management of medical records department part-1
 
Credentialing & privileging
Credentialing & privilegingCredentialing & privileging
Credentialing & privileging
 
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
IMPORTANT COMMITTEE LIST for a hospital going for NABH /JCI by Dr.Mahboob ali...
 
Patient safety culture
Patient safety culturePatient safety culture
Patient safety culture
 
Managerial activities for effective hospital functioning
Managerial activities for effective hospital functioningManagerial activities for effective hospital functioning
Managerial activities for effective hospital functioning
 
Nabh 5th edition introduction by Iyanar. S
Nabh  5th edition introduction by Iyanar. SNabh  5th edition introduction by Iyanar. S
Nabh 5th edition introduction by Iyanar. S
 
Credentialing and privileging of clinicians
Credentialing  and privileging of cliniciansCredentialing  and privileging of clinicians
Credentialing and privileging of clinicians
 
Medical recored
Medical recoredMedical recored
Medical recored
 

Similar to Maintenance of Hospital Information System

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
BLACKSPAROW
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
samadhanshinde27
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
VijaySathappan
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
lavanya marichamy
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
Dinesh Kumar
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
Konverge Technologies Pvt. Ltd.
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
Application hardening
Application hardeningApplication hardening
Application hardeningJayesh Naik
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Jayesh Naik
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptx
JuliusECatipon
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
SakshiGawde6
 

Similar to Maintenance of Hospital Information System (20)

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Network Administration and Maintenace.pptx
Network Administration and Maintenace.pptxNetwork Administration and Maintenace.pptx
Network Administration and Maintenace.pptx
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 

More from Dr Jasbeer Singh

EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
Dr Jasbeer Singh
 
Malocclusion & Orthodontic Treatment
Malocclusion & Orthodontic TreatmentMalocclusion & Orthodontic Treatment
Malocclusion & Orthodontic Treatment
Dr Jasbeer Singh
 
Improvement in the turn around time
Improvement in the turn around timeImprovement in the turn around time
Improvement in the turn around time
Dr Jasbeer Singh
 
Dr. Jasbeer Singh Resume
Dr. Jasbeer Singh ResumeDr. Jasbeer Singh Resume
Dr. Jasbeer Singh Resume
Dr Jasbeer Singh
 
Dental health education
Dental health educationDental health education
Dental health education
Dr Jasbeer Singh
 
Skills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management pptSkills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management ppt
Dr Jasbeer Singh
 
Laws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in HospitalsLaws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in Hospitals
Dr Jasbeer Singh
 
National programme for prevention and control of Deafness
National programme for prevention and control of DeafnessNational programme for prevention and control of Deafness
National programme for prevention and control of Deafness
Dr Jasbeer Singh
 

More from Dr Jasbeer Singh (8)

EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
EXTENDED TOTALLY EXTRA-PERITONEAL REPAIR {eTEP}
 
Malocclusion & Orthodontic Treatment
Malocclusion & Orthodontic TreatmentMalocclusion & Orthodontic Treatment
Malocclusion & Orthodontic Treatment
 
Improvement in the turn around time
Improvement in the turn around timeImprovement in the turn around time
Improvement in the turn around time
 
Dr. Jasbeer Singh Resume
Dr. Jasbeer Singh ResumeDr. Jasbeer Singh Resume
Dr. Jasbeer Singh Resume
 
Dental health education
Dental health educationDental health education
Dental health education
 
Skills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management pptSkills Required for Supply Chain Management ppt
Skills Required for Supply Chain Management ppt
 
Laws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in HospitalsLaws & Guidelines related to occupational Hazards in Hospitals
Laws & Guidelines related to occupational Hazards in Hospitals
 
National programme for prevention and control of Deafness
National programme for prevention and control of DeafnessNational programme for prevention and control of Deafness
National programme for prevention and control of Deafness
 

Recently uploaded

Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.pptNursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Rommel Luis III Israel
 
Health Education on prevention of hypertension
Health Education on prevention of hypertensionHealth Education on prevention of hypertension
Health Education on prevention of hypertension
Radhika kulvi
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
Care Coordinations
 
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
preciousstephanie75
 
ABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROMEABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROME
Rommel Luis III Israel
 
Roti bank chennai PPT [Autosaved].pptx1
Roti bank  chennai PPT [Autosaved].pptx1Roti bank  chennai PPT [Autosaved].pptx1
Roti bank chennai PPT [Autosaved].pptx1
roti bank
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
Iris Thiele Isip-Tan
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Guillermo Rivera
 
the IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meetingthe IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meeting
ssuser787e5c1
 
Yemen National Tuberculosis Program .ppt
Yemen National Tuberculosis Program .pptYemen National Tuberculosis Program .ppt
Yemen National Tuberculosis Program .ppt
Esam43
 
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
ranishasharma67
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Health Catalyst
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
pchutichetpong
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
Naeemshahzad51
 
10 Ideas for Enhancing Your Meeting Experience
10 Ideas for Enhancing Your Meeting Experience10 Ideas for Enhancing Your Meeting Experience
10 Ideas for Enhancing Your Meeting Experience
ranishasharma67
 
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
samahesh1
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
AnushriSrivastav
 
The Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdfThe Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdf
AD Healthcare
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
The Harvest Clinic
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cell
 

Recently uploaded (20)

Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.pptNursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
 
Health Education on prevention of hypertension
Health Education on prevention of hypertensionHealth Education on prevention of hypertension
Health Education on prevention of hypertension
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
 
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
Surgery-Mini-OSCE-All-Past-Years-Questions-Modified.
 
ABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROMEABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROME
 
Roti bank chennai PPT [Autosaved].pptx1
Roti bank  chennai PPT [Autosaved].pptx1Roti bank  chennai PPT [Autosaved].pptx1
Roti bank chennai PPT [Autosaved].pptx1
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
 
the IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meetingthe IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meeting
 
Yemen National Tuberculosis Program .ppt
Yemen National Tuberculosis Program .pptYemen National Tuberculosis Program .ppt
Yemen National Tuberculosis Program .ppt
 
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
Contact ME {89011**83002} Haridwar ℂall Girls By Full Service Call Girl In Ha...
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
 
10 Ideas for Enhancing Your Meeting Experience
10 Ideas for Enhancing Your Meeting Experience10 Ideas for Enhancing Your Meeting Experience
10 Ideas for Enhancing Your Meeting Experience
 
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
.Metabolic.disordersYYSSSFFSSSSSSSSSSDDD
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
 
The Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdfThe Importance of Community Nursing Care.pdf
The Importance of Community Nursing Care.pdf
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
 

Maintenance of Hospital Information System

  • 2. • Hospital Information system is essentially a computer system that can manage all the information to allow health care providers to do their jobs effectively. • These systems have been around since they were first introduced in the 1960s and have evolved with time and the modernization of healthcare facilities. • The staff used them primarily for managing billing and hospital inventory. • All this has changed now, and today hospital information systems include the integration of all clinical, financial and administrative applications.
  • 3. • As hospital information system covers all hospital operations and management, and its compositions contains - Software - Hardware - Network and other subsystems • Management and maintenance workload is very important and difficult, and some of the major components of healthcare Information system which have to be maintained periodically are: 1. Server maintenance 2. Data backup 3. User management and 4. Network security and maintenance.
  • 4. I. SOFTWARE MAINTENANCE: It stands for all the modifications and updations done after the delivery of software product. There are number of reasons, why modifications are required, some of them are briefly mentioned below: • Market Conditions - Policies, which changes over the time, such as taxation and newly introduced constraints like, how to maintain bookkeeping, may trigger need for modification. • Client Requirements - Over the time, customer may ask for new features or functions in the software. • Host Modifications - If any of the hardware and/or platform (such as operating system) of the target host changes, software changes are needed to keep adaptability. • Organization Changes - If there is any business level change at client end, such as reduction of organization strength, acquiring another company, organization venturing into new business, need to modify in the original software may arise.
  • 5. • Types of maintenance: In a software lifetime, type of maintenance may vary based on its nature. It may be just a routine maintenance tasks as some bug discovered by some user or it may be a large event in itself based on maintenance size or nature. Following are some types of maintenance based on their characteristics: • Corrective Maintenance - This includes modifications and updations done in order to correct or fix problems, which are either discovered by user or concluded by user error reports. • Adaptive Maintenance - This includes modifications and updations applied to keep the software product up-to date and tuned to the ever changing world of technology and business environment. • Perfective Maintenance - This includes modifications and updates done in order to keep the software usable over long period of time. It includes new features, new user requirements for refining the software and improve its reliability and performance. • Preventive Maintenance - This includes modifications and updations to prevent future problems of the software. It aims to attend problems, which are not significant at this moment but may cause serious issues in future.
  • 6. COST OF MAINTENANCEA study on estimating software maintenance found that the cost of maintenance is as high as 67% of the cost of entire software process cycle. Factors affecting Maintenance Cost: • The standard age of any software is considered up to 10 to 15 years. • Older software's, which were meant to work on slow machines with less memory and storage capacity cannot keep themselves challenging against newly coming enhanced software's on modern hardware. 67% 15% 8% 7% 3% SOFTWARE-MAINTENANCE Maintenance Testing Design Implementation Requirement
  • 7. • As technology advances, it becomes costly to maintain old software. • Most maintenance engineers are newbie and use trial and error method to rectify problem. • Often, changes made can easily hurt the original structure of the software, making it hard for any subsequent changes. • Changes are often left undocumented which may cause more conflicts in future. • Maintenance Activities:
  • 8. II. Hardware Maintenance: 1. Server Maintenance: • Server maintenance focuses on software maintenance, including regular or occasional monitoring of memory, disk space monitoring, security access control, computer virus checking and so on. • The network administrator usually does this, and it is crucial to the performance of the business. Without a proper IT service plan, the application software will never run as expected. • Server maintenance is such a big deal. Just like you go to the doctor for regular check-ups to make sure everything is healthy and whole, servers also need to be regularly monitored to ensure that all parts are working optimally.
  • 9. • with regular maintenance, the business’ precious hardware and software will have a greater chance of serving for a long time. • Good server maintenance also boosts server productivity which, in turn, boosts overall business productivity. • Routine server maintenance will keep the server functioning at top speed. This will not only save the time, but also increase work efficiency. • Properly monitored servers also give the assurance that if anything goes wrong, it will be able to easily recover any lost or damaged data. This way, we can get systems back and working before the clients even have the chance to notice there was an issue.
  • 10. 2.DATA BACKUP: • Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event. • These day’s, there are many kinds of data backup services that help enterprises and organizations ensure that data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of emergency. Some of the methods of data backup are - Disks or tape backup - Direct-to-cloud backup - Hybrid cloud backup
  • 11.
  • 12. 3. USER MANAGEMENT: • User management describes the ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks, and more. • User management is a core part to any directory service and is a basic security essential for any organization • User management enables admins to control user access and on-board and off-board users to and from IT resources and maintenance requires regular updating, backup of data and maintaining privacy. • Recent innovations in cloud technology have sparked a revolution in cloud Infrastructure-as-a-Service (IaaS) such as Azure, and Google Cloud Platform among others. Coupled with web applications, users have more IT resources available at their fingertips than ever before
  • 13. III. NETWORK AND OTHER SUBSYSTEMS: • Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system. Networking comprises not only the design, construction and use of a network, but also the management, maintenance and operation of the network infrastructure, software and policies • Computer networking enables devices and endpoints to be connected to each other on a local area network (LAN) or to a larger network, such as the internet or a private wide area network (WAN). This is an essential function for service providers, businesses and consumers worldwide to share resources, use or offer services, and communicate. Networking facilitates everything from telephone calls to text messaging to streaming video to the internet of things (IoT)
  • 14. TYPES OF NETWORKS: There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose. The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe. Some of the different networks based on size are: • Personal area network, or PAN • Local area network, or LAN • Metropolitan area network, or MAN • Wide area network, or WAN
  • 15. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files to a printer to accessing the Internet. Some types of networks, however, serve a very particular purpose. Some of the different networks based on their main purpose are: • Storage area network, or SAN • Enterprise private network, or EPN • Virtual private network, or VPN
  • 16. 4. NETWORK SECURITY AND MAINTENANCE: • Network security is any activity designed to protect the usability and integrity of the network and data. • It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. e.g., Wiretapping, Port scanner, Encryption, Virus, Buffer overflow, Cross site scripting, cyber attack and more
  • 17.
  • 18. • Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats. Types of network security 1. Firewalls 2. Antivirus and antimalware software 3. Spam Blocking 4. Data loss prevention 5. Content Filtering 6. Web security 7. URL filtering
  • 19. DATA SECURITY COUNCIL OF INDIA (DSCI): • Its a not-for-profit, industry body on data protection in India, setup by NASSCOM® committed to making the cyberspace safe, secure and trusted by establishing best practices, standards and initiatives in cyber security and privacy. • DSCI engages with governments and their agencies, regulators, industry sectors, industry associations and think tanks for policy advocacy, thought leadership, capacity building and outreach activities. Main activities in which DSCI engages are: >Standards and Best Practices >Thought Leadership >Capacity Building >Cyber Security Industry Development >Policies for Cyber Security
  • 20. REFERENCES: • https://www.tutorialspoint.com/software_engineering/software _maintenance_overview.htm • https://4quartersit.com/backup-methods-not-created-equal/ • https://study.com/academy/lesson/types-of-networks-lan- wan-wlan-man-san-pan-epn-vpn.html • http://www.assignmenthelp.net/assignment_help/Computer- Networks-and-Types