SlideShare a Scribd company logo
1 of 24
Download to read offline
Health 2.0 trends and threads:
Ultrabook™ based services to minimize risks
and maximize benefits of web 2.0 for end users

                             Pavel Kubů M.D.
               Intel World Ahead Program, Healthcare and Education
Web 2.0 is changing patient – care giver relationship
Critical mass is networking online
The wisdom of crowds:
The more people who take part in a social network, the greater the
                   Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister
value they create. of Health, Welfare and Sport, Hague 2010
Example: Home based primary care (HBPC) in the VA




                                                    • Patients with complex, chronic,
                                                      disabling disease--too sick for the clinic!
                                                    • Av age 76 years old, 8 chronic conditions
INTEL DOING ETHNOGRAPHIC STUDY OF HBPC TO HELP      • Care delivered in the home by inter-
 THEM SCALE QUALITY,COORDINATED CARE TO MORE          disciplinary team
  VETS BY IMPLEMENTING HEALTH I.T. TOOLS IN THEIR   • 24% reduction in total cost of care
                  WORKFLOW.                         • 63% reduction in hospital days
                                                    • 87% reduction in nursing home days
Threads of Virtual World




               Source: 2011 Internet Crime Report, Internet Crime Compliant Center
Auto - Auction Fraud
• In fraudulent vehicle sales, criminals
attempt to sell vehicles they do not own.
Criminals create an attractive deal by
advertising vehicles for sale at prices below
book value. Often the sellers claim they
must sell the vehicle because they are
moving for work or being deployed for the
military. Because of the alleged pending
move, criminals refuse to meet in person or
allow inspection of the vehicle, and they
often attempt to rush the sale.
•To make the deal appear legitimate, the
criminal instructs the victim to send full or
partial payment to a third-party agent via a
wire transfer payment service and to fax
their payment receipt to the seller as proof
of payment. The criminal pockets the
payment but does not deliver the vehicle.       Source: 2011 Internet Crime Report, Internet Crime Compliant Center
Romance Scams
• Victims believe they are “dating” someone
decent and honest. However, the online contact
is often a criminal with a well-rehearsed script
that scammers use repeatedly and successfully.
Scammers search chat rooms, dating sites, and
social networking sites looking for victims.
Although the principal group of victims is over 40
years old, divorced or widowed, disabled and
often elderly, all demographics are at risk.
•Scammers use poetry, flowers and other gifts to
reel in victims, while declaring “undying love.”
These criminals also use stories of severe life
circumstances, tragedies, family deaths,
personal injuries or other hardships to keep their
victims concerned and involved in their schemes.
They also ask victims to send money to help
overcome alleged financial hardships.
                                                     Source: 2011 Internet Crime Report, Internet Crime Compliant Center
Work from Home Scams
• Consumers continue to lose money from
  work-from-home scams that cyber
  criminals use to move stolen funds.
  Regrettably, due to their participation,
  these individuals may face criminal
  charges. Organized cyber criminals
  recruit their victims through newspaper
  ads, online employment services,
  unsolicited emails or “spam,” and social
  networking sites advertising work-from-
  home “opportunities.”
• Participating with a legitimate business,
  the consumer becomes a “mule” for
  criminals who use the consumer’s or
  other victim’s accounts to steal and
  launder money. In addition, the
                                              Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  scammers may compromise the victim’s
Loan Intimidation Scams
•   In these scams, a caller claims that the victim is delinquent
    in a payday loan and must repay the loan to avoid legal
    consequences. The callers purport to be representatives of
    the FBI, Federal Legislative Department, various law firms
    or other legitimate-sounding agencies. They claim to be
    collecting debts for various companies.
•   One of the most insidious aspects of this scam is that the
    callers have accurate information about the victims,
    including Social Security numbers, dates of birth,
    addresses, employer information, bank account numbers,
    and names and telephone numbers of relatives and friends.
    The method by which the fraudsters obtained the personal
    information is unclear, but victims often relay that they had
    completed online applications for other loans or credit cards
    before the calls began.
•   The fraudsters relentlessly call the victims’ homes, cell
    phones and places of employment. They refuse to provide
    the victims any details of the alleged payday loans and
    become abusive when questioned. The callers threaten
    victims with legal actions, arrests, and in some cases
    physical violence if they refuse to pay. In many cases, the
    callers even resort to harassment of the victims’ relatives,    Source: 2011 Internet Crime Report, Internet Crime Compliant Center
FBI Impersonation Email Scams
• The names of various government
  agencies and high-ranking
  government officials have been
  used in spam attacks in an attempt
  to defraud consumers. Government
  agencies do not send unsolicited
  emails.
• Complaints related to spam emails
  purportedly sent from the FBI
  continued to be reported with high
  frequency to IC3. In 2011, IC3
  received about 39 complaints per
  day of this type.

                                       Source: 2011 Internet Crime Report, Internet Crime Compliant Center
2B+                                                                       247,000,000,000
               Worldwide Internet Users                                                                                    Emails Sent Every Day




                                              2B                                                                                2.5B
                  Videos Viewed per Day                                                                            Images Uploaded to Facebook per Month



Source: joaogeraldes.wordpress.com/2010/09/05/31-infographic-explores-internet-facts-figures-history-statistics/
Source: worldometers.com
User
                  User      Experience
               Experience



  USER          Software
               (OS, Apps)
                               Software
                              (OS, Apps)

EXPERIENCE
                              Processor
                                 H/W
             Processor/
             Hardware
“Don’t be encumbered
  by history. Go and
  create something
     wonderful.”

  — Robert Noyce
We Know How to Transform Experiences
  1995           2003            2012+



                              Ultrabook™
Multi-media
              Uncompromised       Ultra Thin
 CD ROM
                 Mobility      Ultra Responsive
                                 Ultra Secure
                               Ultra Connected
The Ultrabook™
                              Beyond Thin and Light




               PERFORMANCE   RESPONSIVE       SECURE   POWER / BATTERY LIFE




Projected Features
MEDIA



                                                                      Intel® Quick Sync Video
                                                                      TECHNOLOGY
                                                                       Ultrabook™ devices deliver outstanding media
                                                                                      experiences

Other brands and names are the property of their respective owners.
Intel®
                Smart Response
                  Technology
      Enabling SSD-like performance with HDD capacity


                          Intel®
                 Smart Connect
                  Technology
Content continuously updated while the notebook is asleep!


                          Intel®
                    Rapid Start
                    Technology
            ~7 seconds to wake from hibernate!
No need to shut down the PC – Days, not hours of battery life.
PCs are Stolen Frequently with Sensitive Data




People are storing
 more and more personal data
 on their laptops
                               “   200,000
                                   laptops lost or stolen every year
                                   at European airports
                                   12,000 laptops lost or stolen
                                     every week at US airports”


                                                 - Dell-Ponemon study
                                                                        ”
Security and Trust Built In

                    Intel®
             Identity Protection
                Technology



                   Intel®
                Anti-Theft
               Technology
A path to building a Service for end user…


                          Intel® IDENTITY PROTECTION    Intel® INSIDER™


Security is top concern   ID theft is lead consumer    Users spend over 4       Worldwide 30 million
    for PC users1          and business concern,         hours per month          apps (not app
                            followed by Malware3       viewing online video         updates) are
                                                            on a PC5             downloaded each
 200K laptops lost or        600K Facebook* IDs                                        day7
 stolen every year at        compromised every         Online video market
European airports/12K               day4               $6.9B in 2014 (46%     1. Source: Intel market research
 laptops lost or stolen                                      CAGR)6           “Voice of the Customer” - global
                                                                              customer survey
   every week at US                                                           2. Source: Dell-Ponemon Study
       airports2                                                              3. Source: Intel Market
                                                                              Research Voice of the Customer
                                                                              Survey
                                                                              4. Source: The Guardian,
                                                                              October 2011
Enabling the
Ultrabook™ Experience
for Ageing population
“The best way to predict the future
 is to invent it.”

 — Alan Kay
Computing Pioneer
pavel.kubu@intel.com

More Related Content

What's hot

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iotLuigi Atzori
 
White paper: Why It Pays to Use Electronic Signatures
White paper: Why It Pays to Use Electronic SignaturesWhite paper: Why It Pays to Use Electronic Signatures
White paper: Why It Pays to Use Electronic SignaturesDocuSign, Inc.
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillanceYavuz Paksoy
 
Mobile Real-time Physical and Web Interactions
Mobile Real-time Physical and Web InteractionsMobile Real-time Physical and Web Interactions
Mobile Real-time Physical and Web InteractionsCarlos Enrique Ortiz
 
iPodolatry And Crackberries
iPodolatry And CrackberriesiPodolatry And Crackberries
iPodolatry And CrackberriesRandy Connolly
 
Digital Natives
Digital NativesDigital Natives
Digital Nativesjmpoole
 
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...Carlos Enrique Ortiz
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Analysing predicted technology trends for the year 2012 through text mining...
Analysing predicted technology trends for the year 2012 through text mining...Analysing predicted technology trends for the year 2012 through text mining...
Analysing predicted technology trends for the year 2012 through text mining...invenQ Insight
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkDarren Kuropatwa
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Hkd2 london demystifying digital_candace kuss_h&k
Hkd2 london demystifying digital_candace kuss_h&kHkd2 london demystifying digital_candace kuss_h&k
Hkd2 london demystifying digital_candace kuss_h&kH&K Demystifying Digital
 
Ten Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsTen Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsCisco Services
 
Contextual Voice/Communications as an App or App Feature (on Android)
Contextual Voice/Communications as an App or App Feature (on Android)Contextual Voice/Communications as an App or App Feature (on Android)
Contextual Voice/Communications as an App or App Feature (on Android)Carlos Enrique Ortiz
 

What's hot (20)

OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iot
 
Dct chapter 2
Dct chapter 2Dct chapter 2
Dct chapter 2
 
White paper: Why It Pays to Use Electronic Signatures
White paper: Why It Pays to Use Electronic SignaturesWhite paper: Why It Pays to Use Electronic Signatures
White paper: Why It Pays to Use Electronic Signatures
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillance
 
Mobile Real-time Physical and Web Interactions
Mobile Real-time Physical and Web InteractionsMobile Real-time Physical and Web Interactions
Mobile Real-time Physical and Web Interactions
 
iPodolatry And Crackberries
iPodolatry And CrackberriesiPodolatry And Crackberries
iPodolatry And Crackberries
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Pdf1
Pdf1Pdf1
Pdf1
 
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...
Concepts And Technologies Behind Real-Time Demand Data - A Consumer, Mobile, ...
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Analysing predicted technology trends for the year 2012 through text mining...
Analysing predicted technology trends for the year 2012 through text mining...Analysing predicted technology trends for the year 2012 through text mining...
Analysing predicted technology trends for the year 2012 through text mining...
 
User-testing results2
User-testing results2User-testing results2
User-testing results2
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Ict And Society
Ict And SocietyIct And Society
Ict And Society
 
Hkd2 london demystifying digital_candace kuss_h&k
Hkd2 london demystifying digital_candace kuss_h&kHkd2 london demystifying digital_candace kuss_h&k
Hkd2 london demystifying digital_candace kuss_h&k
 
Ten Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsTen Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten Years
 
Contextual Voice/Communications as an App or App Feature (on Android)
Contextual Voice/Communications as an App or App Feature (on Android)Contextual Voice/Communications as an App or App Feature (on Android)
Contextual Voice/Communications as an App or App Feature (on Android)
 

Viewers also liked

Be inspired campaign prague may 2012 final
Be inspired campaign   prague may 2012 finalBe inspired campaign   prague may 2012 final
Be inspired campaign prague may 2012 finalifa2012
 
Maria irene carvalho 29.05.2012
Maria irene carvalho  29.05.2012Maria irene carvalho  29.05.2012
Maria irene carvalho 29.05.2012ifa2012
 
4,5 presentatie openingsdag ifa congres final pres vers
4,5 presentatie openingsdag ifa congres final pres vers4,5 presentatie openingsdag ifa congres final pres vers
4,5 presentatie openingsdag ifa congres final pres versifa2012
 
Alex kalache slideshow
Alex kalache slideshowAlex kalache slideshow
Alex kalache slideshowifa2012
 
Ifa telehealth presentation may 2012
Ifa telehealth presentation may 2012Ifa telehealth presentation may 2012
Ifa telehealth presentation may 2012ifa2012
 
Ifa prague 2012 telescope
Ifa prague 2012 telescopeIfa prague 2012 telescope
Ifa prague 2012 telescopeifa2012
 
Presentations ifa office
Presentations ifa officePresentations ifa office
Presentations ifa officeifa2012
 

Viewers also liked (8)

Be inspired campaign prague may 2012 final
Be inspired campaign   prague may 2012 finalBe inspired campaign   prague may 2012 final
Be inspired campaign prague may 2012 final
 
Maria irene carvalho 29.05.2012
Maria irene carvalho  29.05.2012Maria irene carvalho  29.05.2012
Maria irene carvalho 29.05.2012
 
4,5 presentatie openingsdag ifa congres final pres vers
4,5 presentatie openingsdag ifa congres final pres vers4,5 presentatie openingsdag ifa congres final pres vers
4,5 presentatie openingsdag ifa congres final pres vers
 
Alex kalache slideshow
Alex kalache slideshowAlex kalache slideshow
Alex kalache slideshow
 
Ind
IndInd
Ind
 
Ifa telehealth presentation may 2012
Ifa telehealth presentation may 2012Ifa telehealth presentation may 2012
Ifa telehealth presentation may 2012
 
Ifa prague 2012 telescope
Ifa prague 2012 telescopeIfa prague 2012 telescope
Ifa prague 2012 telescope
 
Presentations ifa office
Presentations ifa officePresentations ifa office
Presentations ifa office
 

Similar to Health 2 0 & ultrabook services

Accessibility Means Business
Accessibility Means BusinessAccessibility Means Business
Accessibility Means BusinessIrene Walker
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Designing Content for Multiple Devices
Designing Content for Multiple DevicesDesigning Content for Multiple Devices
Designing Content for Multiple DevicesBrandon Carson
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of EverythingShubham Vyas
 
Maximizing the Value of Real-Time: The Importance of Authenticity
Maximizing the Value of Real-Time: The Importance of AuthenticityMaximizing the Value of Real-Time: The Importance of Authenticity
Maximizing the Value of Real-Time: The Importance of AuthenticityJulie Epstein
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationOWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationuisgslide
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
The Digital Divide in the United States and WorldwideThe gap bet.docx
The Digital Divide in the United States and WorldwideThe gap bet.docxThe Digital Divide in the United States and WorldwideThe gap bet.docx
The Digital Divide in the United States and WorldwideThe gap bet.docxarnoldmeredith47041
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptxjaspreetkaur908049
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNetkingsBSD
 

Similar to Health 2 0 & ultrabook services (20)

Accessibility Means Business
Accessibility Means BusinessAccessibility Means Business
Accessibility Means Business
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Designing Content for Multiple Devices
Designing Content for Multiple DevicesDesigning Content for Multiple Devices
Designing Content for Multiple Devices
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
 
Maximizing the Value of Real-Time: The Importance of Authenticity
Maximizing the Value of Real-Time: The Importance of AuthenticityMaximizing the Value of Real-Time: The Importance of Authenticity
Maximizing the Value of Real-Time: The Importance of Authenticity
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationOWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
The Digital Divide in the United States and WorldwideThe gap bet.docx
The Digital Divide in the United States and WorldwideThe gap bet.docxThe Digital Divide in the United States and WorldwideThe gap bet.docx
The Digital Divide in the United States and WorldwideThe gap bet.docx
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNet
 

More from ifa2012

120526 prezentace open
120526 prezentace open120526 prezentace open
120526 prezentace openifa2012
 
2012 05-29 global challenges-ageing and shrinking lf_final rm
2012 05-29 global challenges-ageing and shrinking lf_final rm2012 05-29 global challenges-ageing and shrinking lf_final rm
2012 05-29 global challenges-ageing and shrinking lf_final rmifa2012
 
6 shamam ifa housing 29 may 2012
6 shamam ifa housing 29 may 20126 shamam ifa housing 29 may 2012
6 shamam ifa housing 29 may 2012ifa2012
 
6 m.stolt-stolt prague-2012
6 m.stolt-stolt prague-20126 m.stolt-stolt prague-2012
6 m.stolt-stolt prague-2012ifa2012
 
6 kalache-prague-setting the scene
6 kalache-prague-setting the scene6 kalache-prague-setting the scene
6 kalache-prague-setting the sceneifa2012
 
6 brady power point handouts 06 19 07
6 brady power point handouts 06 19 076 brady power point handouts 06 19 07
6 brady power point handouts 06 19 07ifa2012
 
5 tinios gender ifa-tinios-2012
5 tinios gender ifa-tinios-20125 tinios gender ifa-tinios-2012
5 tinios gender ifa-tinios-2012ifa2012
 
5 tarrant-global conf on aging presentation
5 tarrant-global conf on aging presentation5 tarrant-global conf on aging presentation
5 tarrant-global conf on aging presentationifa2012
 
5 pizzi-praga--
5 pizzi-praga--5 pizzi-praga--
5 pizzi-praga--ifa2012
 
5 o´ryan-a phenomenological exploration of aging 5.25.12
5 o´ryan-a phenomenological exploration of aging 5.25.125 o´ryan-a phenomenological exploration of aging 5.25.12
5 o´ryan-a phenomenological exploration of aging 5.25.12ifa2012
 
5 chan-afc-prague 2004-2007
5 chan-afc-prague 2004-20075 chan-afc-prague 2004-2007
5 chan-afc-prague 2004-2007ifa2012
 
4 troisi-prague 2012 ifa
4 troisi-prague 2012 ifa4 troisi-prague 2012 ifa
4 troisi-prague 2012 ifaifa2012
 
4 tidhar see care-ifa2012_tidhar
4 tidhar see care-ifa2012_tidhar4 tidhar see care-ifa2012_tidhar
4 tidhar see care-ifa2012_tidharifa2012
 
4 subasi ehome-ifa-prague-v03 short
4 subasi ehome-ifa-prague-v03 short4 subasi ehome-ifa-prague-v03 short
4 subasi ehome-ifa-prague-v03 shortifa2012
 
4 scharlach-ifa 2012- village model
4 scharlach-ifa 2012- village model4 scharlach-ifa 2012- village model
4 scharlach-ifa 2012- village modelifa2012
 
4 prague rural and remote
4 prague rural and remote4 prague rural and remote
4 prague rural and remoteifa2012
 
4 nikmat-qol of dementia patients in malaysia 09052012
4 nikmat-qol of dementia patients in malaysia 090520124 nikmat-qol of dementia patients in malaysia 09052012
4 nikmat-qol of dementia patients in malaysia 09052012ifa2012
 
4 klemencic-presentation id983
4 klemencic-presentation id9834 klemencic-presentation id983
4 klemencic-presentation id983ifa2012
 
4 kay-integrating planning for an ageing population final
4 kay-integrating planning for an ageing population final4 kay-integrating planning for an ageing population final
4 kay-integrating planning for an ageing population finalifa2012
 
4 kavkova-ifa
4 kavkova-ifa4 kavkova-ifa
4 kavkova-ifaifa2012
 

More from ifa2012 (20)

120526 prezentace open
120526 prezentace open120526 prezentace open
120526 prezentace open
 
2012 05-29 global challenges-ageing and shrinking lf_final rm
2012 05-29 global challenges-ageing and shrinking lf_final rm2012 05-29 global challenges-ageing and shrinking lf_final rm
2012 05-29 global challenges-ageing and shrinking lf_final rm
 
6 shamam ifa housing 29 may 2012
6 shamam ifa housing 29 may 20126 shamam ifa housing 29 may 2012
6 shamam ifa housing 29 may 2012
 
6 m.stolt-stolt prague-2012
6 m.stolt-stolt prague-20126 m.stolt-stolt prague-2012
6 m.stolt-stolt prague-2012
 
6 kalache-prague-setting the scene
6 kalache-prague-setting the scene6 kalache-prague-setting the scene
6 kalache-prague-setting the scene
 
6 brady power point handouts 06 19 07
6 brady power point handouts 06 19 076 brady power point handouts 06 19 07
6 brady power point handouts 06 19 07
 
5 tinios gender ifa-tinios-2012
5 tinios gender ifa-tinios-20125 tinios gender ifa-tinios-2012
5 tinios gender ifa-tinios-2012
 
5 tarrant-global conf on aging presentation
5 tarrant-global conf on aging presentation5 tarrant-global conf on aging presentation
5 tarrant-global conf on aging presentation
 
5 pizzi-praga--
5 pizzi-praga--5 pizzi-praga--
5 pizzi-praga--
 
5 o´ryan-a phenomenological exploration of aging 5.25.12
5 o´ryan-a phenomenological exploration of aging 5.25.125 o´ryan-a phenomenological exploration of aging 5.25.12
5 o´ryan-a phenomenological exploration of aging 5.25.12
 
5 chan-afc-prague 2004-2007
5 chan-afc-prague 2004-20075 chan-afc-prague 2004-2007
5 chan-afc-prague 2004-2007
 
4 troisi-prague 2012 ifa
4 troisi-prague 2012 ifa4 troisi-prague 2012 ifa
4 troisi-prague 2012 ifa
 
4 tidhar see care-ifa2012_tidhar
4 tidhar see care-ifa2012_tidhar4 tidhar see care-ifa2012_tidhar
4 tidhar see care-ifa2012_tidhar
 
4 subasi ehome-ifa-prague-v03 short
4 subasi ehome-ifa-prague-v03 short4 subasi ehome-ifa-prague-v03 short
4 subasi ehome-ifa-prague-v03 short
 
4 scharlach-ifa 2012- village model
4 scharlach-ifa 2012- village model4 scharlach-ifa 2012- village model
4 scharlach-ifa 2012- village model
 
4 prague rural and remote
4 prague rural and remote4 prague rural and remote
4 prague rural and remote
 
4 nikmat-qol of dementia patients in malaysia 09052012
4 nikmat-qol of dementia patients in malaysia 090520124 nikmat-qol of dementia patients in malaysia 09052012
4 nikmat-qol of dementia patients in malaysia 09052012
 
4 klemencic-presentation id983
4 klemencic-presentation id9834 klemencic-presentation id983
4 klemencic-presentation id983
 
4 kay-integrating planning for an ageing population final
4 kay-integrating planning for an ageing population final4 kay-integrating planning for an ageing population final
4 kay-integrating planning for an ageing population final
 
4 kavkova-ifa
4 kavkova-ifa4 kavkova-ifa
4 kavkova-ifa
 

Health 2 0 & ultrabook services

  • 1. Health 2.0 trends and threads: Ultrabook™ based services to minimize risks and maximize benefits of web 2.0 for end users Pavel Kubů M.D. Intel World Ahead Program, Healthcare and Education
  • 2. Web 2.0 is changing patient – care giver relationship
  • 3. Critical mass is networking online
  • 4. The wisdom of crowds: The more people who take part in a social network, the greater the Source: Health 2.0 It’s up to you, Council for Public Health and Health Care for the Minister value they create. of Health, Welfare and Sport, Hague 2010
  • 5. Example: Home based primary care (HBPC) in the VA • Patients with complex, chronic, disabling disease--too sick for the clinic! • Av age 76 years old, 8 chronic conditions INTEL DOING ETHNOGRAPHIC STUDY OF HBPC TO HELP • Care delivered in the home by inter- THEM SCALE QUALITY,COORDINATED CARE TO MORE disciplinary team VETS BY IMPLEMENTING HEALTH I.T. TOOLS IN THEIR • 24% reduction in total cost of care WORKFLOW. • 63% reduction in hospital days • 87% reduction in nursing home days
  • 6. Threads of Virtual World Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  • 7. Auto - Auction Fraud • In fraudulent vehicle sales, criminals attempt to sell vehicles they do not own. Criminals create an attractive deal by advertising vehicles for sale at prices below book value. Often the sellers claim they must sell the vehicle because they are moving for work or being deployed for the military. Because of the alleged pending move, criminals refuse to meet in person or allow inspection of the vehicle, and they often attempt to rush the sale. •To make the deal appear legitimate, the criminal instructs the victim to send full or partial payment to a third-party agent via a wire transfer payment service and to fax their payment receipt to the seller as proof of payment. The criminal pockets the payment but does not deliver the vehicle. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  • 8. Romance Scams • Victims believe they are “dating” someone decent and honest. However, the online contact is often a criminal with a well-rehearsed script that scammers use repeatedly and successfully. Scammers search chat rooms, dating sites, and social networking sites looking for victims. Although the principal group of victims is over 40 years old, divorced or widowed, disabled and often elderly, all demographics are at risk. •Scammers use poetry, flowers and other gifts to reel in victims, while declaring “undying love.” These criminals also use stories of severe life circumstances, tragedies, family deaths, personal injuries or other hardships to keep their victims concerned and involved in their schemes. They also ask victims to send money to help overcome alleged financial hardships. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  • 9. Work from Home Scams • Consumers continue to lose money from work-from-home scams that cyber criminals use to move stolen funds. Regrettably, due to their participation, these individuals may face criminal charges. Organized cyber criminals recruit their victims through newspaper ads, online employment services, unsolicited emails or “spam,” and social networking sites advertising work-from- home “opportunities.” • Participating with a legitimate business, the consumer becomes a “mule” for criminals who use the consumer’s or other victim’s accounts to steal and launder money. In addition, the Source: 2011 Internet Crime Report, Internet Crime Compliant Center scammers may compromise the victim’s
  • 10. Loan Intimidation Scams • In these scams, a caller claims that the victim is delinquent in a payday loan and must repay the loan to avoid legal consequences. The callers purport to be representatives of the FBI, Federal Legislative Department, various law firms or other legitimate-sounding agencies. They claim to be collecting debts for various companies. • One of the most insidious aspects of this scam is that the callers have accurate information about the victims, including Social Security numbers, dates of birth, addresses, employer information, bank account numbers, and names and telephone numbers of relatives and friends. The method by which the fraudsters obtained the personal information is unclear, but victims often relay that they had completed online applications for other loans or credit cards before the calls began. • The fraudsters relentlessly call the victims’ homes, cell phones and places of employment. They refuse to provide the victims any details of the alleged payday loans and become abusive when questioned. The callers threaten victims with legal actions, arrests, and in some cases physical violence if they refuse to pay. In many cases, the callers even resort to harassment of the victims’ relatives, Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  • 11. FBI Impersonation Email Scams • The names of various government agencies and high-ranking government officials have been used in spam attacks in an attempt to defraud consumers. Government agencies do not send unsolicited emails. • Complaints related to spam emails purportedly sent from the FBI continued to be reported with high frequency to IC3. In 2011, IC3 received about 39 complaints per day of this type. Source: 2011 Internet Crime Report, Internet Crime Compliant Center
  • 12. 2B+ 247,000,000,000 Worldwide Internet Users Emails Sent Every Day 2B 2.5B Videos Viewed per Day Images Uploaded to Facebook per Month Source: joaogeraldes.wordpress.com/2010/09/05/31-infographic-explores-internet-facts-figures-history-statistics/ Source: worldometers.com
  • 13. User User Experience Experience USER Software (OS, Apps) Software (OS, Apps) EXPERIENCE Processor H/W Processor/ Hardware
  • 14. “Don’t be encumbered by history. Go and create something wonderful.” — Robert Noyce
  • 15. We Know How to Transform Experiences 1995 2003 2012+ Ultrabook™ Multi-media Uncompromised Ultra Thin CD ROM Mobility Ultra Responsive Ultra Secure Ultra Connected
  • 16. The Ultrabook™ Beyond Thin and Light PERFORMANCE RESPONSIVE SECURE POWER / BATTERY LIFE Projected Features
  • 17. MEDIA Intel® Quick Sync Video TECHNOLOGY Ultrabook™ devices deliver outstanding media experiences Other brands and names are the property of their respective owners.
  • 18. Intel® Smart Response Technology Enabling SSD-like performance with HDD capacity Intel® Smart Connect Technology Content continuously updated while the notebook is asleep! Intel® Rapid Start Technology ~7 seconds to wake from hibernate! No need to shut down the PC – Days, not hours of battery life.
  • 19. PCs are Stolen Frequently with Sensitive Data People are storing more and more personal data on their laptops “ 200,000 laptops lost or stolen every year at European airports 12,000 laptops lost or stolen every week at US airports” - Dell-Ponemon study ”
  • 20. Security and Trust Built In Intel® Identity Protection Technology Intel® Anti-Theft Technology
  • 21. A path to building a Service for end user… Intel® IDENTITY PROTECTION Intel® INSIDER™ Security is top concern ID theft is lead consumer Users spend over 4 Worldwide 30 million for PC users1 and business concern, hours per month apps (not app followed by Malware3 viewing online video updates) are on a PC5 downloaded each 200K laptops lost or 600K Facebook* IDs day7 stolen every year at compromised every Online video market European airports/12K day4 $6.9B in 2014 (46% 1. Source: Intel market research laptops lost or stolen CAGR)6 “Voice of the Customer” - global customer survey every week at US 2. Source: Dell-Ponemon Study airports2 3. Source: Intel Market Research Voice of the Customer Survey 4. Source: The Guardian, October 2011
  • 23. “The best way to predict the future is to invent it.” — Alan Kay Computing Pioneer