How Networking Is Transforming Healthcare
Network World (07/20/09) Marsan, Carolyn Duffy
High-speed computer networks have the potential to transform the healthcare industry, according to Mike McGill, program director for Internet2's Health Sciences Initiative. Internet2's Health Network Initiative is a project to help medical researchers, educators, and clinicians see the possibilities of network applications in a medical setting. McGill notes, for instance, that Internet2 has demonstrated the ability to put a patient up on a telepresence environment with a remote psychiatrist, which would go a long way toward fulfilling the U.S. Department of Veterans Affairs' mandate to provide care for wounded soldiers, who often reside in rural areas but are assigned psychiatrists based in urban areas. McGill points out that 120 of the 125 medical schools in the United States are Internet2 members, and he says that Internet2 is the designated national backbone for the Federal Communications Commission's Rural Health Care Pilot Program. Groups that the Health Network Initiative has spawned include those focusing on security, the technical aspects, network resources, and education. McGill says the Obama administration is currently pushing "for electronic health records with very limited capability," and notes that the Health Sciences Initiative is "working on electronic health records that are backed up by lab tests and images, and that's a whole lot richer of an environment than just the textual record." Another project the initiative is focused on is the creation of a cancer biomedical informatics grid that is linking all U.S. cancer centers so that the research environment can be unified to exchange data. McGill describes the last mile and cultural challenges as the key networking challenges in terms of electronic health information sharing.
Monday, July 20, 2009
Blog: How Networking Is Transforming Healthcare
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
▼
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
-
▼
July 2009
(14)
- Blog: Behaviour of Building Block of Nature Could ...
- Blog: How Wolfram Alpha Could Change Software
- Blog: A Better Way to Shoot Down Spam
- Blog: Scale-Free Networks: A Decade and Beyond
- Blog: Moore's Law Hits Economic Limits
- Blog: Yale Researchers Create Database-Hadoop Hybrid
- Blog: How Networking Is Transforming Healthcare
- Blog: Can Pen and Paper Help Make Electronic Medic...
- Blog: Can Computers Decipher a 5,000-Year-Old Lang...
- Blog: New Technology to Make Digital Data Self-Des...
- Blog: What Is Google App Engine?
- Blog: Researchers to Spotlight Darknets at Black Hat
- Blog: Memristor Minds: The Future of Artificial In...
- Blog: Twente Researcher Develops Self-Learning Sec...
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
►
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment