(240)-343-2585

 

Write 3 to 4 pages for 2 copy of discussion not including the title page or references.. Both has to be totally different copy and topic.

For this week’s discussion board everyone will find a current event article (must be related to IT Policy or Information Management Systems), create a mind map, and write a two to three paragraph summary of the article that includes three (3) discussion questions for the class and a hyperlink to the original current event article.

Please submit the current event summary and mind map as an electronic assignment to the discussion board for the class to read and discuss.

The assignment should be in a Word document and the mind map can be either a Word or PowerPoint. Remember to use APA format.

note: I sent u 6 sample assignments of my friends but please don’t do the same topic or same work. It’s just for idea . 

Don’t forget to include mind mapping figure or picture for each assignment and three discussion questions . Thanks

Running Head: Technology in Healthcare

Olayemi Olukanni (Ben)

IST 7100: IT Policy and Strategy

Technology in Healthcare

2016 is shaping up to be one of the biggest years for healthcare technology ever, with innovations in medical devices, software, and changes in how healthcare is administered, both from a care and financial perspective. With the North American health IT market is expected to reach $104 billion by 2020 at a CAGR of 13.5% during the forecast period of 2015 to 2020, according to a recent report by Markets and Markets (Referral MD 2016). Majority of this growth is attributed to the growing adoption of various healthcare IT solutions by healthcare providers in order to meet the heightened regulatory requirements for patient care and safety, increasing need to curtail the soaring healthcare costs, and growing need to improve the quality of healthcare while maintaining the operational efficiency of healthcare organizations. (Referral MD 2016).

Types of Technologies

Information Technology: Information Technology includes:

· Remote Patient Monitoring: Monitoring programs can collect a wide range of health data from the point of care, such as vital signs, weight, blood pressure, blood sugar, blood oxygen levels, heart rate, and electrocardiograms

· Medical Record Technology. This involves health informatics which streamlines the medical care process and lowers malpractice claims, and increases coordination between providers

· Medical mobiles apps where users can receive medical alerts, checkup health information

Robotic Technology

Medical Robots. Nowadays, it is no longer surprising to learn that a hospital’s top performing surgeon is not human. With unmatched precision and the ability to work without fatigue, medical robots are obviously one of the most useful applications of robotic technology. These robots are widely used in various medical practices, including difficult surgical procedures, and have completely revolutionized the speed and efficiency of health care services in several parts of the world (Robots and Android, 2016).

Dental Technology

· VELscope—VELscope is a special type of light that a dentist will shine in a patient’s mouth to detect any abnormalities

· Digital X-Rays—Digital X-rays are faster and contain less radiation than traditional X-rays. When a patient has a digital X-ray done, the image appears on the computer in a matter of seconds

· AGNOdent— DIAGNOdent is a new, state of the art device that dentists use to detect cavities that are hiding in places regular x-rays can’t find.

:Opthalmology Technology

· LenSX Lasers. This technology uses advanced femtosecond laser surgery to improve cataract surgical procedures, making them more precise and safer.

· WaveTec uses a unique system mounted on a surgical microscope that enables cataract surgeons to perform better surgery by giving them real-time information about the eye during surgery.

Questions for the Class

1. Why is technology so important to great improvement in Healthcare?

2. Is the growth in technology going to catch up with growth in healthcare needs?

3. What plans are in place to help developing nations to improve healthcare technology?


https://getreferralmd.com/2016/01/healthcare-technology-2016/

Mind Map for Technology in Healthcare

References

123Dentist.com (2012). Top 10 new technologies in dentistry. Retrieved from:


https://www.123dentist.com/top-10-new-technologies-in-dentistry/

Referral MD (2016). 15 Amazing healthcare technology innovations in 2016: ReferralMD.

Retrieved from:
https://getreferralmd.com/2016/01/healthcare-technology-2016/

Robots and Android (2016). Medical robots. Retrieved from:


http://www.robots-and-androids.com/medical-robots.html

Thompson, H (2010). Keeping an eye on advances in ophthalmic technologies.MDDI. Retrieved

from:
http://www.mddionline.com/article/keeping-eye-advances-ophthalmic-technologies

Running head: WEB VIEW IN JELLY BEAN AND OLDER OS VERSIONS
1

WEB VIEW IN JELLY BEAN AND OLDER OS VERSIONS
4

Web View in Jelly Bean and Older OS Version

Web View in Jelly Bean and Older OS Version

Android is an open source operating system designed by an American organization, Google where clients can get to Google’s own services through play store. As indicated by the article Gregg Keizer, Android older versions are no more secure. Researches notice that 60% of all android clients are helpless against future attacks. The principal component Web view which is utilized to show some online data in our web browser is not getting fixed up with the older versions that implies Google is not prepared to alter the flaws in web view for android 4.3 and older versions. Google supplanted the older version program with chrome in the present form 4.4, which is only applicable for most recent android gadgets. Tod Beardsley, the engineer manager at rapid7 research expressed that Android security response group initially reacted to bug reports with a “we-don’t-fix Web View-any longer” (Gregg, 2015).

Android at first has a gigantic market and has released lots of versions with more models which contains several applications depended on it. So Google can’t support all the older versions further and it is not prepared to remove the versions because of enormous android market. They are not instructing people with what applications are supported and secured from malware. Indeed, even IOS is keeping up numerous versions where apple rarely fixes with the more established ones but it tries to update the most recent advancement to more gadgets. This is why android lacks behind and more rate of gadgets are utilizing Jelly bean (Gregg, 2015).

A year ago Google released an upgrade to Google play store, which brings a new application authorizations where developer can include extra consents for the specific application and the client is not informed with the change. This change in the strategy opens the way to hackers to attack on the users. Because of changes in the versions and terms, android is facing more security issues than usual. There is a need to re-think the fixing policy to maintain security.

Mind Map:






Discussion Questions:

1. Do you people think that Google should re-think about the fixing policy?

2. Do you think it is good to end up the life of older versions, which are very useful in past?

3. According to the article, what is important for the person/user and the Organization?

Reference

Gregg. K. (January, 2015). Web View in Jelly Bean and older OS versions no longer gets patching love from Google. Retrieved from: http://www.computerworld.com/article/2867043/google-stops-patching-core-android-component-in-60-of-devices.html

CURRENT EVENT: CLOUD COMPUTING 1

CLOUD COMPUTING 2

Cloud Computing

Cloud Computing

Introduction:

Cloud computing is that the conveyance identified with registering suppliers over the on the web. Regardless of whether they recognize the thing or not vital, a few individuals fabricate utilization of disabling recording providers as their very own consequence individual needs. Rather than keeping up information all alone repaired circle or transport to-date capacities to your necessities, you utilize partner email discoverer administration over the on the web, from a further place to be prepared to look the information you have or work to use its capacities. Doing in this way would conceivably bring out the unequivocal level of security edges (Rittinghouse and Ransome,).

Maintained the nation over to begin and which is related to points of interest close by mechanical improvement, weaken handling suggests that how related to benefitting figuring infers that returning from an organization, in need, by the method for a misuse client tablet or adaptable PC or PC joined with the framework. Cloud computing in more explicit words is routinely elucidated because the keeping close to getting to related to data along code over World Wide net rather than keeping in modified circle. The most goals ought to supply time-tested close by tweaked successful preparing environment to end customers. Cloud computing suppliers are as often as possible open, individual or crossbreed (Furth & Escalante).

The many main options concerning impair computing are:

1. The services square measures sometimes offered to end user would like computing means that square measure calculated off that build it potential for purchasers to pay restricted to means that alongside employment used.

2. The service is sometimes supplied alongside that a person could profit endless suppliers it would like.

3. A given exceptional quality related to suppliers is sometimes secure through service.

Characteristics of Cloud Computing

The procedure methodologies might be seen everywhere on at whatever time with all the regular frameworks that will be seen by a method for the net.

• A customer will just trade out any registering systems using administration firm while no man relationship.

• Computing region technique unit now and then shared by implies that of different desktops, these zone units powerfully issued to be prepared to desktops figuring on need.

• The registering procedures might be all around profited inside of an adaptable methodology by implies that of householders that may upgrade the methods at whatever time vital also to weaken once that are not anticipated.

• Cloud computing arrangements are region unit some of the time dynamic that is they may adjust masses also to flavor up abuse methodologies (Furht and Escalante, 2010).

Useful Issues with Cloud Computing

The three top solutions furnished by Cloud Computing are usually:

Infrastructure as a support (IAAS): IAAS sellers offer API (Application programming engineer Interface) to clients to move workloads to hardware. The administration supplier maintains scratch pad PC servers, stockpiling servers moreover to verbal trades through a modern framework that is learning to bolster. Totally diverse clients can be getting to his or her servers in the meantime moreover to which might be a cardio aspiratory exercise in various bundles so there ought to help gear which is finished by programming framework developer termed hypervisor.

Platform as a support (PAAS): ): Inside this kind of bolster, administration supplier supports change instruments on their business base that will be only seen by that of shoppers through the net, the web making utilization of API moreover as websites. It’s for conventional PC code program change. As a sample, deals division, yippee and Google application engine, Amazon on-line web arrangements.

Software like a support (SAAS): That backing and offers programming framework program using the web, the web that happens to be termed network methods. The client will just access SAAS arrangements using everyplace using a framework that is net gotten to. Case: “Microsoft” spot of business gives 365 intensity programming framework programs furthermore to mail methods (Khalid, 2010).

Dependability is the most worry with distributed computing. You may find chances amid which information spared in cloud locales can be hacked by proposes that are indeed given by cyberpunks. Abuse this designing relies on upon availability of expansive band verbal trades. A few organizations squares measure commonly tending to issues exchanging their application from an administration supplier. The pivotal strategies assumed for organizations to have the capacity to figure their insight before creating to have the ability to cloud and may attempt a fresh out of the box new cloud way to deal with affirming that finest misuse in this building might be accomplished.

Mind Map on Cloud Computing

Discussion Questions

Questions: 1) what are the prospective and consequences of Cloud Computing?

2) Is Cloud computing suitable for all organizations?

3) How Cloud Computing is different from grid computing?

Reference

1. Khalid, A. (2010, February). Cloud computing: Applying issues in small business. In Signal, Acquisition and Processing, 2010. ICSAP’10. International Conference on (pp. 278-281). IEEE. Retrieved from

http://www.scirp.org/journal/PaperInformation.aspx?PaperID=25179

2. Rittinghouse, J. W., & Ransom, J. F. (2009). Cloud computing: implementation, management,
and security, CRC press. Retrieved from

https://www.crcpress.com/Cloud-Computing-Implementation-Management-and-Security/Rittinghouse-Ransome/9781439806807

3. Furht, B., & Escalante, A. (2010). Handbook of cloud computing (Vol. 3). New York: Springer. Retrieved from

https://books.google.com/books?id=puFmCwAAQBAJ&pg=PA440&lpg=PA440&dq=3