Cloud Based Asynchronous Communication In Health Care Systems

Cloud Based Asynchronous Communication In Health Care Systems

Cloud Based Asynchronous Communication in Health Care systems

HR is a previous resource in any business and with synchronicity evaporating because of the scarcity of human resource. Medicine is no exception, especially in small to medium sized medical practices. Cloud fits perfectly in this equation where Cloud based collaboration, EMR and other such health IT systems make their way into small to medium sized practices. Cloud is already delivering tremendous value, both in terms of productivity and significant savings in cost.

Cloud based asynchronous communication has real potential in sorting out and solving the needs of the modern day healthcare systems where doctors and patients cannot collaborate instantly due to the distance or difference in time zones etc. In developing economies, the need is far greater where normally most health facilities lack reliable internet connections and mobile making it more difficult to track the patient’s location and history.  Message and storage centric systems are two important components of the modern day health care systems in which doctors can collaborate with the fellows and patients by sharing messages,  text, pictures and other useful data for factual data analysis and reporting patient progress.

Exploiting the potential of Media Synchronicity Theory (MST) is the key in turning the face of modern day health care analysis tools.  Two important tools used for health care collaborative improvement systems are conveyance processes which are used for isolated learning and convergence processes, used for sharing the understanding between medical practitioners for improved analysis. Public Clouds must be used in the hospitals for data sharing. Patients does not have to suffer the tiresome tasks of giving their tests on every station, there must be a central Cloud database server, which handles patient records using Cloud based sharing techniques. This will not only decrease the work load of doctors, the life of patients will also be at ease.

MST

(Image Source: http://istheory.byu.edu/wiki/Media_synchronicity_theory)

The proposed implementation model for MST consists of five main components which are responsible for the entire core processing in resource sharing. These components are rehearsability, reprocessability, transmission velocity, parallelism and symbols. The most important factor of them is transmission velocity which is the measure of the time required to collaborate with a patient or doctor located in remote or rural area. The recommended practice is to use hybrid cloud models for health care systems and switch in between public and private infrastructures depending upon the needs. The MST based health care systems are widely deployed in many parts of Africa due to their increased success rate.

By Salman UI Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…