SlideShare uma empresa Scribd logo
1 de 26
Enabling Software Technologies
              for
 Mobile Healthcare Solutions


                          September 15, 2012
                              Russ Hertzberg
                                          Vice
                        President, Technology
                                     Solutions
Agenda

▪ Security Services and Technologies

▪ Mobile Device Management

▪ Rich User Interface on Small Form Factor Mobile
  Devices

▪ Web Services; HL7; Performance Considerations

▪ Mini Case Study

▪ Conclusions; Q and A
Security Services and Technologies

▪ The Compliance Domain:
  – Protected Health
    Information (PHI)
  – What PHI Exactly to Protect

▪ How to Protect It

▪ Tools, Techniques, Tips
PHI is:
▪   Names
▪   All geographical identifiers smaller than a state
▪   Dates (other than year) directly related to an individual
▪   Phone numbers
▪   Fax numbers
▪   Email addresses
▪   Social Security numbers
▪   Medical record numbers
▪   Health insurance beneficiary numbers
▪   Account numbers
▪   Certificate/license numbers
▪   Vehicle identifiers and serial numbers, including license plate numbers;
▪   Device identifiers and serial numbers;
▪   Web Uniform Resource Locators (URLs)
▪   Internet Protocol (IP) address numbers
▪   Biometric identifiers, including finger, retinal and voice prints
▪   Full face photographic images and any comparable images
▪   Any other unique identifying number, characteristic, or code except the unique code
    assigned by the investigator to code the data
What PHI to Protect…Abstract or
           Complex Cases
▪ “Any other unique identifying
  number, characteristic, or code
  except the unique code assigned
  by the investigator to code the
  data”

   – External application identifiers
   – Legacy application identifiers
   – Medical Device generated
     identifiers
   – Others?

▪ Better Safe than Sorry
Known/Measured Breaches in
           Summary…2005-2011




http://www.healthcarefinancenews.com/news/top-10-data-security-breaches-2012)
How to Protect: Encryption

▪ http://en.wikipedia.org/wiki/Encryption

▪ In cryptography, encryption is the process of
  transforming information (referred to as plaintext) using
  an algorithm (called a cipher) to make it unreadable to anyone
  except those possessing special knowledge, usually referred to
  as a key. The result of the process is encrypted information (in
  cryptography, referred to as ciphertext). The reverse
  process, i.e., to make the encrypted information readable
  again, is referred to as decryption (i.e., to make it
  unencrypted)

▪ HIPAA doesn't strictly require that PHI be encrypted "at rest"
  (aka on disk/storage) but unless you have a very good
  reason, it is highly recommended you do so.
How to Protect: Encryption

▪ HIPAA and Encryption:
   – Notification for PHI Breach
      Without Encryption
   – No Notification With
      Encryption Used for Storage
      (at Rest) and Transmission
      (over Networks)
▪ Common Key Types
  (Algorithms):
   – RSA
   – AES
   – DES
   – 3DES
   – Others
▪ Key Types: Public/Private; Secret
What to Protect (Physician Practice)

▪ Practice Management
  System

▪ Electronic Medical Records

▪ Claims Documents

▪ Scanned Images

▪ Email
Encryption on Strategic Mobile
           Device Platforms
▪ Data At Rest iOS/Apple = Yes
  (Hardware)
▪ Data At Rest Android/Google
  = No (3rd party solutions or
  components)
▪ Data In Motion = Integration
  Services Often Required

▪ Developing Multi-Platform
  and Targeting In Motion?

  – Re-useable Tools and
    Components Can Save a Lot
    of Time and Meet The
    Complex Requirements
Mobile Authentication

▪ Strong Passwords on
  Mobile Devices…Pain!

▪ Biometric….Promise (2D in
  next iOS Release??...
  9/12/2012, AuthenTec
  Deal)

▪ Complexity…Larger Scale
  Identity Management
  Solutions such as OAuth
  2.0
Mobile Audit Considerations

▪ KPMG HIPAA Audits in 2012 on Behalf
  of HHS OCR (150 proposed to 115 as
  of summer 2012)
▪ The Mass General, Cignet, and UCLA
  Examples (Fines)
▪ Expected Focus:
   –   Inadequate security of wireless networks
   –   Lack of adequate updates to software
       and operating systems
   –   Access log recordkeeping
   –   Insufficient incident detection and
       response procedures
   –   Inadequate user access controls and
       password management controls
   –   Risk of theft or loss of mobile devices
   –   Information access
       management, including role-based
       access

▪ Mobile Security Implementation or
  Remediation…Sooner or Later
Mobile Device Management
▪ BYOD Will Not Go Away, But
  Markets Are Trending
  Towards Greater
  Organizational Funding
▪ A Combination Business and
  Personal Use
  Device…Common Practice
▪ How to Meet MDM
  Requirements:
  –   Data Storage and Segregation
  –   Lost Device
  –   Remote cleaning
  –   Access control
Mobile Device Management
                                               Local Data   Block          Track        Disable

▪ Bifurcated Solution                          Cleanse      Access         Device       Device


  Marketplace:
                                   Practice
                                   Mgmt

  – Do it themselves ISVs
                                   EMR
  – 3rd Party Solution Platforms
▪ Define Specific Use Cases        Claims


▪ Build a Matrix of Mobile         Doc

  Apps, MDM Use
                                   Images


  Cases, and Potential             Password Management
  Solutions                        Simple Pswd Value                 Maximum Password Age

                                   Alphanumeric Value Required       Maximum # Failed Attempts

                                   Enforce Min Length                Enforce Min # Complex
                                                                     Characters
Rich User Interface on Small Form
        Factor Mobile Devices
▪ Complex Patient Data and
  Small Screens
▪ Slower Wireless Networks
▪ Native Apps
▪ Mobile Web
▪ Hybrid Native and Mobile
  Web
Rich User Interface on Small Form
        Factor Mobile Devices
▪ Persona Elaboration

▪ Simplified Use Cases

▪ HTML 5; Native App UI
  Objects

▪ 3rd Party Tools and
  Components
Rich User Interface on Small Form
        Factor Mobile Devices
Creative Solutions for Rich
Healthcare Data:

  – Sparkline's




  – Push Notification for Patient
    Monitoring
Thinking About Web Services, HL
          7, and Performance
▪ HL7…An XML Based
  Standard for Exchanging
  Information Between Medical
  Applications
▪ The Good:
  – Standard Data Exchange over
    TCP/IP
  – EDI Like Formatting Allowed
    for Development of
    Successful Parsers
  – HL7 Standards for Many
    Healthcare Data Types
  – Great Resources for
    Healthcare IT
The Case for JSON, Especially on
                 Mobile
▪ Speed Over Networks

▪ Data Model Change
  Flexibility

▪ RESTful

▪ Does not Require One
  Truth Reference Data
  Modeling
HL7 and JSON: A Future of Détente??

▪ Clinical Document
  Architecture with HL7

▪ Rich Data Models within
  Healthcare Organizations

▪ Data Exchange moving
  Towards JSON

▪ Data Exchange Between
  Organizations Based on
  Common Data Model
  Elements

▪ Translation Middleware
Mini Case Study




▪   A SOLUTION FOR HOME
    HEALTHCARE AND HOSPICE
    AGENCIES
▪ TECHNOLOGIES: WINDOWS PHONE
    7, VS2010 / EXPRESSION BLEND
    4, WCF, SILVERLIGHT, MVVM, NINJECT, NI
    NJA DATABASE
    PRO, SSL, AUTOMAPPER, STRUCTUREMAP,
    NUNIT, NHIBERNATE, RHINO.MOCKS, LOG4
    NET
Carefully Designed UI/UX for
     Windows Phone 7
Architecture - Communication
                                                 Web



                                                       Phone
           Homecare
DB          Services     WCF



                               Mobile Services
                                                 WCF

             Security
Security   Framework    Web service
  DB
Architecture - Phone

                                               Web



                          Providers
            Common UI
Views
           (ViewModels)




                                      Facade
                           Domain



             Local
             cache         Cache
                          Manager
Mapping, GPS, and Office
            Productivity
▪ BING Maps and GPS for Routing From
  Patient to Patient

 – Track and Audit Patient Visits
 – Track and Control Mileage Expenses
 – Optimize Travel Routing
 – Submit Daily Reports Instantly. Roll Up Patient
   Data Instantly and Daily. Eliminate Clinician
   Reporting Work and Errors
Contacts and Questions?
US Headquarters                     Europe Headquarters
12800 University Drive, Suite 250   52 V. Velykoho Str.
Fort Myers, FL 33907, USA
                                    Lviv 79053, Ukraine

Main Tel: 239-690-3111
Main Fax: 239-690-3116
                                    Tel: +380-32-240-9090
                                    Fax: +380-32-240-9080

E-mail: rhert@softserveinc.com
                                    E-mail: info@softserveinc.com




 Thank You!

Mais conteúdo relacionado

Mais procurados

Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]ISS
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Source Conference
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Rob Robinson
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMImperva
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 

Mais procurados (20)

Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
2012 DBIR
2012 DBIR2012 DBIR
2012 DBIR
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Ace Bryan Eugenio
Ace Bryan EugenioAce Bryan Eugenio
Ace Bryan Eugenio
 
How to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAMHow to Secure Your Files with DLP and FAM
How to Secure Your Files with DLP and FAM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
IAM
IAMIAM
IAM
 

Semelhante a Enabling Software Technologies for Mobile Healthcare Solutions

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Intersection of Business Intelligence and CRM vsr12
Intersection of Business Intelligence and CRM vsr12Intersection of Business Intelligence and CRM vsr12
Intersection of Business Intelligence and CRM vsr12David J Rosenthal
 

Semelhante a Enabling Software Technologies for Mobile Healthcare Solutions (20)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Information Security
Information SecurityInformation Security
Information Security
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Intersection of Business Intelligence and CRM vsr12
Intersection of Business Intelligence and CRM vsr12Intersection of Business Intelligence and CRM vsr12
Intersection of Business Intelligence and CRM vsr12
 

Mais de SoftServe

Approaching Quality in Digital Era
Approaching Quality in Digital EraApproaching Quality in Digital Era
Approaching Quality in Digital EraSoftServe
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Testing Tools and Tips
Testing Tools and TipsTesting Tools and Tips
Testing Tools and TipsSoftServe
 
Android Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, ToolsAndroid Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, ToolsSoftServe
 
Android Mobile Application Testing: Specific Functional, Performance, Device ...
Android Mobile Application Testing: Specific Functional, Performance, Device ...Android Mobile Application Testing: Specific Functional, Performance, Device ...
Android Mobile Application Testing: Specific Functional, Performance, Device ...SoftServe
 
How to Reduce Time to Market Using Microsoft DevOps Solutions
How to Reduce Time to Market Using Microsoft DevOps SolutionsHow to Reduce Time to Market Using Microsoft DevOps Solutions
How to Reduce Time to Market Using Microsoft DevOps SolutionsSoftServe
 
Containerization: The DevOps Revolution
Containerization: The DevOps Revolution Containerization: The DevOps Revolution
Containerization: The DevOps Revolution SoftServe
 
Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist SoftServe
 
Rapid Prototyping for Big Data with AWS
Rapid Prototyping for Big Data with AWS Rapid Prototyping for Big Data with AWS
Rapid Prototyping for Big Data with AWS SoftServe
 
Implementing Test Automation: What a Manager Should Know
Implementing Test Automation: What a Manager Should KnowImplementing Test Automation: What a Manager Should Know
Implementing Test Automation: What a Manager Should KnowSoftServe
 
Using AWS Lambda for Infrastructure Automation and Beyond
Using AWS Lambda for Infrastructure Automation and BeyondUsing AWS Lambda for Infrastructure Automation and Beyond
Using AWS Lambda for Infrastructure Automation and BeyondSoftServe
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseSoftServe
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachSoftServe
 
Big Data as a Service: A Neo-Metropolis Model Approach for Innovation
Big Data as a Service: A Neo-Metropolis Model Approach for InnovationBig Data as a Service: A Neo-Metropolis Model Approach for Innovation
Big Data as a Service: A Neo-Metropolis Model Approach for InnovationSoftServe
 
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...SoftServe
 
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...SoftServe
 
Managing Requirements with Word and TFS by Max Markov
Managing Requirements with Word and TFS by Max MarkovManaging Requirements with Word and TFS by Max Markov
Managing Requirements with Word and TFS by Max MarkovSoftServe
 
How to Implement Hybrid Cloud Solutions Successfully
How to Implement Hybrid Cloud Solutions SuccessfullyHow to Implement Hybrid Cloud Solutions Successfully
How to Implement Hybrid Cloud Solutions SuccessfullySoftServe
 
Designing Big Data Systems Like a Pro
Designing Big Data Systems Like a ProDesigning Big Data Systems Like a Pro
Designing Big Data Systems Like a ProSoftServe
 
Product Management in Outsourcing by Roman Kolodchak and Roman Pavlyuk
Product Management in Outsourcing by Roman Kolodchak and Roman PavlyukProduct Management in Outsourcing by Roman Kolodchak and Roman Pavlyuk
Product Management in Outsourcing by Roman Kolodchak and Roman PavlyukSoftServe
 

Mais de SoftServe (20)

Approaching Quality in Digital Era
Approaching Quality in Digital EraApproaching Quality in Digital Era
Approaching Quality in Digital Era
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Testing Tools and Tips
Testing Tools and TipsTesting Tools and Tips
Testing Tools and Tips
 
Android Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, ToolsAndroid Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, Tools
 
Android Mobile Application Testing: Specific Functional, Performance, Device ...
Android Mobile Application Testing: Specific Functional, Performance, Device ...Android Mobile Application Testing: Specific Functional, Performance, Device ...
Android Mobile Application Testing: Specific Functional, Performance, Device ...
 
How to Reduce Time to Market Using Microsoft DevOps Solutions
How to Reduce Time to Market Using Microsoft DevOps SolutionsHow to Reduce Time to Market Using Microsoft DevOps Solutions
How to Reduce Time to Market Using Microsoft DevOps Solutions
 
Containerization: The DevOps Revolution
Containerization: The DevOps Revolution Containerization: The DevOps Revolution
Containerization: The DevOps Revolution
 
Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist Essential Data Engineering for Data Scientist
Essential Data Engineering for Data Scientist
 
Rapid Prototyping for Big Data with AWS
Rapid Prototyping for Big Data with AWS Rapid Prototyping for Big Data with AWS
Rapid Prototyping for Big Data with AWS
 
Implementing Test Automation: What a Manager Should Know
Implementing Test Automation: What a Manager Should KnowImplementing Test Automation: What a Manager Should Know
Implementing Test Automation: What a Manager Should Know
 
Using AWS Lambda for Infrastructure Automation and Beyond
Using AWS Lambda for Infrastructure Automation and BeyondUsing AWS Lambda for Infrastructure Automation and Beyond
Using AWS Lambda for Infrastructure Automation and Beyond
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
 
Agile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric ApproachAgile Big Data Analytics Development: An Architecture-Centric Approach
Agile Big Data Analytics Development: An Architecture-Centric Approach
 
Big Data as a Service: A Neo-Metropolis Model Approach for Innovation
Big Data as a Service: A Neo-Metropolis Model Approach for InnovationBig Data as a Service: A Neo-Metropolis Model Approach for Innovation
Big Data as a Service: A Neo-Metropolis Model Approach for Innovation
 
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...
Personalized Medicine in a Contemporary World by Eugene Borukhovich, SVP Heal...
 
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...
Health 2.0 WinterTech: Will Artificial Intelligence change healthcare? by Eug...
 
Managing Requirements with Word and TFS by Max Markov
Managing Requirements with Word and TFS by Max MarkovManaging Requirements with Word and TFS by Max Markov
Managing Requirements with Word and TFS by Max Markov
 
How to Implement Hybrid Cloud Solutions Successfully
How to Implement Hybrid Cloud Solutions SuccessfullyHow to Implement Hybrid Cloud Solutions Successfully
How to Implement Hybrid Cloud Solutions Successfully
 
Designing Big Data Systems Like a Pro
Designing Big Data Systems Like a ProDesigning Big Data Systems Like a Pro
Designing Big Data Systems Like a Pro
 
Product Management in Outsourcing by Roman Kolodchak and Roman Pavlyuk
Product Management in Outsourcing by Roman Kolodchak and Roman PavlyukProduct Management in Outsourcing by Roman Kolodchak and Roman Pavlyuk
Product Management in Outsourcing by Roman Kolodchak and Roman Pavlyuk
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Enabling Software Technologies for Mobile Healthcare Solutions

  • 1. Enabling Software Technologies for Mobile Healthcare Solutions September 15, 2012 Russ Hertzberg Vice President, Technology Solutions
  • 2. Agenda ▪ Security Services and Technologies ▪ Mobile Device Management ▪ Rich User Interface on Small Form Factor Mobile Devices ▪ Web Services; HL7; Performance Considerations ▪ Mini Case Study ▪ Conclusions; Q and A
  • 3. Security Services and Technologies ▪ The Compliance Domain: – Protected Health Information (PHI) – What PHI Exactly to Protect ▪ How to Protect It ▪ Tools, Techniques, Tips
  • 4. PHI is: ▪ Names ▪ All geographical identifiers smaller than a state ▪ Dates (other than year) directly related to an individual ▪ Phone numbers ▪ Fax numbers ▪ Email addresses ▪ Social Security numbers ▪ Medical record numbers ▪ Health insurance beneficiary numbers ▪ Account numbers ▪ Certificate/license numbers ▪ Vehicle identifiers and serial numbers, including license plate numbers; ▪ Device identifiers and serial numbers; ▪ Web Uniform Resource Locators (URLs) ▪ Internet Protocol (IP) address numbers ▪ Biometric identifiers, including finger, retinal and voice prints ▪ Full face photographic images and any comparable images ▪ Any other unique identifying number, characteristic, or code except the unique code assigned by the investigator to code the data
  • 5. What PHI to Protect…Abstract or Complex Cases ▪ “Any other unique identifying number, characteristic, or code except the unique code assigned by the investigator to code the data” – External application identifiers – Legacy application identifiers – Medical Device generated identifiers – Others? ▪ Better Safe than Sorry
  • 6. Known/Measured Breaches in Summary…2005-2011 http://www.healthcarefinancenews.com/news/top-10-data-security-breaches-2012)
  • 7. How to Protect: Encryption ▪ http://en.wikipedia.org/wiki/Encryption ▪ In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted) ▪ HIPAA doesn't strictly require that PHI be encrypted "at rest" (aka on disk/storage) but unless you have a very good reason, it is highly recommended you do so.
  • 8. How to Protect: Encryption ▪ HIPAA and Encryption: – Notification for PHI Breach Without Encryption – No Notification With Encryption Used for Storage (at Rest) and Transmission (over Networks) ▪ Common Key Types (Algorithms): – RSA – AES – DES – 3DES – Others ▪ Key Types: Public/Private; Secret
  • 9. What to Protect (Physician Practice) ▪ Practice Management System ▪ Electronic Medical Records ▪ Claims Documents ▪ Scanned Images ▪ Email
  • 10. Encryption on Strategic Mobile Device Platforms ▪ Data At Rest iOS/Apple = Yes (Hardware) ▪ Data At Rest Android/Google = No (3rd party solutions or components) ▪ Data In Motion = Integration Services Often Required ▪ Developing Multi-Platform and Targeting In Motion? – Re-useable Tools and Components Can Save a Lot of Time and Meet The Complex Requirements
  • 11. Mobile Authentication ▪ Strong Passwords on Mobile Devices…Pain! ▪ Biometric….Promise (2D in next iOS Release??... 9/12/2012, AuthenTec Deal) ▪ Complexity…Larger Scale Identity Management Solutions such as OAuth 2.0
  • 12. Mobile Audit Considerations ▪ KPMG HIPAA Audits in 2012 on Behalf of HHS OCR (150 proposed to 115 as of summer 2012) ▪ The Mass General, Cignet, and UCLA Examples (Fines) ▪ Expected Focus: – Inadequate security of wireless networks – Lack of adequate updates to software and operating systems – Access log recordkeeping – Insufficient incident detection and response procedures – Inadequate user access controls and password management controls – Risk of theft or loss of mobile devices – Information access management, including role-based access ▪ Mobile Security Implementation or Remediation…Sooner or Later
  • 13. Mobile Device Management ▪ BYOD Will Not Go Away, But Markets Are Trending Towards Greater Organizational Funding ▪ A Combination Business and Personal Use Device…Common Practice ▪ How to Meet MDM Requirements: – Data Storage and Segregation – Lost Device – Remote cleaning – Access control
  • 14. Mobile Device Management Local Data Block Track Disable ▪ Bifurcated Solution Cleanse Access Device Device Marketplace: Practice Mgmt – Do it themselves ISVs EMR – 3rd Party Solution Platforms ▪ Define Specific Use Cases Claims ▪ Build a Matrix of Mobile Doc Apps, MDM Use Images Cases, and Potential Password Management Solutions Simple Pswd Value Maximum Password Age Alphanumeric Value Required Maximum # Failed Attempts Enforce Min Length Enforce Min # Complex Characters
  • 15. Rich User Interface on Small Form Factor Mobile Devices ▪ Complex Patient Data and Small Screens ▪ Slower Wireless Networks ▪ Native Apps ▪ Mobile Web ▪ Hybrid Native and Mobile Web
  • 16. Rich User Interface on Small Form Factor Mobile Devices ▪ Persona Elaboration ▪ Simplified Use Cases ▪ HTML 5; Native App UI Objects ▪ 3rd Party Tools and Components
  • 17. Rich User Interface on Small Form Factor Mobile Devices Creative Solutions for Rich Healthcare Data: – Sparkline's – Push Notification for Patient Monitoring
  • 18. Thinking About Web Services, HL 7, and Performance ▪ HL7…An XML Based Standard for Exchanging Information Between Medical Applications ▪ The Good: – Standard Data Exchange over TCP/IP – EDI Like Formatting Allowed for Development of Successful Parsers – HL7 Standards for Many Healthcare Data Types – Great Resources for Healthcare IT
  • 19. The Case for JSON, Especially on Mobile ▪ Speed Over Networks ▪ Data Model Change Flexibility ▪ RESTful ▪ Does not Require One Truth Reference Data Modeling
  • 20. HL7 and JSON: A Future of Détente?? ▪ Clinical Document Architecture with HL7 ▪ Rich Data Models within Healthcare Organizations ▪ Data Exchange moving Towards JSON ▪ Data Exchange Between Organizations Based on Common Data Model Elements ▪ Translation Middleware
  • 21. Mini Case Study ▪ A SOLUTION FOR HOME HEALTHCARE AND HOSPICE AGENCIES ▪ TECHNOLOGIES: WINDOWS PHONE 7, VS2010 / EXPRESSION BLEND 4, WCF, SILVERLIGHT, MVVM, NINJECT, NI NJA DATABASE PRO, SSL, AUTOMAPPER, STRUCTUREMAP, NUNIT, NHIBERNATE, RHINO.MOCKS, LOG4 NET
  • 22. Carefully Designed UI/UX for Windows Phone 7
  • 23. Architecture - Communication Web Phone Homecare DB Services WCF Mobile Services WCF Security Security Framework Web service DB
  • 24. Architecture - Phone Web Providers Common UI Views (ViewModels) Facade Domain Local cache Cache Manager
  • 25. Mapping, GPS, and Office Productivity ▪ BING Maps and GPS for Routing From Patient to Patient – Track and Audit Patient Visits – Track and Control Mileage Expenses – Optimize Travel Routing – Submit Daily Reports Instantly. Roll Up Patient Data Instantly and Daily. Eliminate Clinician Reporting Work and Errors
  • 26. Contacts and Questions? US Headquarters Europe Headquarters 12800 University Drive, Suite 250 52 V. Velykoho Str. Fort Myers, FL 33907, USA Lviv 79053, Ukraine Main Tel: 239-690-3111 Main Fax: 239-690-3116 Tel: +380-32-240-9090 Fax: +380-32-240-9080 E-mail: rhert@softserveinc.com E-mail: info@softserveinc.com Thank You!