Virtualized Disaster Recovery Model for Large Scale Hospital and Healthcare Systems

Author(s):  
Olivia F. Lee ◽  
Dennis Guster

Healthcare organizations face rising costs in effective management of hospital information systems. Adding to this burden is the Joint Commission’s mandate for disaster preparedness, which demands restoring access to information after unexpected catastrophes. Disaster recovery within healthcare organizations is essential because of its inherent critical nature and the possible losses’ impact on patients’ lives. This paper presents a virtualized disaster recovery model and presents steps for setting up the recovery environment and implementing the virtualized plan across multiple network systems. A large scale hospital and healthcare system in Minnesota participated in this study, and results indicate that the virtual model can provide acceptable performance when a limited number of client workstations are functioning. However, its performance is not as good as the traditional physical model, and its workload performance decays much quicker. Future research is suggested that tests more sophisticated models and incorporates finer granularity in the tabular distribution methodology.

Author(s):  
Olivia F. Lee ◽  
Dennis C. Guster

Healthcare organizations face rising costs in effective management of hospital information systems. Adding to this burden is the Joint Commission’s mandate for disaster preparedness, which demands restoring access to information after unexpected catastrophes. Disaster recovery within healthcare organizations is essential because of its inherent critical nature and the possible losses’ impact on patients’ lives. This paper presents a virtualized disaster recovery model and presents steps for setting up the recovery environment and implementing the virtualized plan across multiple network systems. A large scale hospital and healthcare system in Minnesota participated in this study, and results indicate that the virtual model can provide acceptable performance when a limited number of client workstations are functioning. However, its performance is not as good as the traditional physical model, and its workload performance decays much quicker. Future research is suggested that tests more sophisticated models and incorporates finer granularity in the tabular distribution methodology.


2017 ◽  
Vol 5 (1) ◽  
pp. 70-82
Author(s):  
Soumi Paul ◽  
Paola Peretti ◽  
Saroj Kumar Datta

Building customer relationships and customer equity is the prime concern in today’s business decisions. The emergence of internet, especially social media like Facebook and Twitter, changed traditional marketing thought to a great extent. The importance of customer orientation is reflected in the axiom, “The customer is the king”. A good number of organizations are engaging customers in their new product development activities via social media platforms. Co-creation, a new perspective in which customers are active co-creators of the products they buy and use, is currently challenging the traditional paradigm. The concept of co-creation involving the customer’s knowledge, creativity and judgment to generate value is considered not only an upcoming trend that introduces new products or services but also fitting their need and increasing value for money. Knowledge and innovation are inseparable. Knowledge management competencies and capacities are essential to any organization that aspires to be distinguished and innovative. The present work is an attempt to identify the change in value creation procedure along with one area of business, where co-creation can return significant dividends. It is on extending the brand or brand category through brand extension or line extension. This article, through an in depth literature review analysis, identifies the changes in every perspective of this paradigm shift and it presents a conceptual model of company-customer-brand-based co-creation activity via social media. The main objective is offering an agenda for future research of this emerging trend and ensuring the way to move from theory to practice. The paper acts as a proposal; it allows the organization to go for this change in a large scale and obtain early feedback on the idea presented. 


Author(s):  
Xu Pei-Zhen ◽  
Lu Yong-Geng ◽  
Cao Xi-Min

Background: Over the past few years, the subsynchronous oscillation (SSO) caused by the grid-connected wind farm had a bad influence on the stable operation of the system and has now become a bottleneck factor restricting the efficient utilization of wind power. How to mitigate and suppress the phenomenon of SSO of wind farms has become the focus of power system research. Methods: This paper first analyzes the SSO of different types of wind turbines, including squirrelcage induction generator based wind turbine (SCIG-WT), permanent magnet synchronous generator- based wind turbine (PMSG-WT), and doubly-fed induction generator based wind turbine (DFIG-WT). Then, the mechanisms of different types of SSO are proposed with the aim to better understand SSO in large-scale wind integrated power systems, and the main analytical methods suitable for studying the SSO of wind farms are summarized. Results: On the basis of results, using additional damping control suppression methods to solve SSO caused by the flexible power transmission devices and the wind turbine converter is recommended. Conclusion: The current development direction of the SSO of large-scale wind farm grid-connected systems is summarized and the current challenges and recommendations for future research and development are discussed.


2020 ◽  
Author(s):  
Pranav C

UNSTRUCTURED The word blockchain elicits thoughts of cryptocurrency much of the time, which does disservice to this disruptive new technology. Agreed, bitcoin launched in 2011 was the first large scale implementation of blockchain technology. Also, Bitcoin’s success has triggered the establishment of nearly 1000 new cryptocurrencies. This again lead to the delusion that the only application of blockchain technology is for the creation of cryptocurrency. However, the blockchain technology is capable of a lot more than just cryptocurrency creation and may support such things as transactions that require personal identification, peer review, elections and other types of democratic decision-making and audit trails. Blockchain exists with real world implementations beyond cryptocurrencies and these solutions deliver powerful benefits to healthcare organizations, bankers, retailers and consumers among others. One of the areas where blockchain technology can be used effectively is healthcare industry. Proper application of this technology in healthcare will not only save billions of money but also will contribute to the growth in research. This review paper briefly defines blockchain and deals in detail the applications of blockchain in various areas particularly in healthcare industry.


Author(s):  
Matilda A. Haas ◽  
Harriet Teare ◽  
Megan Prictor ◽  
Gabi Ceregra ◽  
Miranda E. Vidgen ◽  
...  

AbstractThe complexities of the informed consent process for participating in research in genomic medicine are well-documented. Inspired by the potential for Dynamic Consent to increase participant choice and autonomy in decision-making, as well as the opportunities for ongoing participant engagement it affords, we wanted to trial Dynamic Consent and to do so developed our own web-based application (web app) called CTRL (control). This paper documents the design and development of CTRL, for use in the Australian Genomics study: a health services research project building evidence to inform the integration of genomic medicine into mainstream healthcare. Australian Genomics brought together a multi-disciplinary team to develop CTRL. The design and development process considered user experience; security and privacy; the application of international standards in data sharing; IT, operational and ethical issues. The CTRL tool is now being offered to participants in the study, who can use CTRL to keep personal and contact details up to date; make consent choices (including indicate preferences for return of results and future research use of biological samples, genomic and health data); follow their progress through the study; complete surveys, contact the researchers and access study news and information. While there are remaining challenges to implementing Dynamic Consent in genomic research, this study demonstrates the feasibility of building such a tool, and its ongoing use will provide evidence about the value of Dynamic Consent in large-scale genomic research programs.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1670
Author(s):  
Waheeb Abu-Ulbeh ◽  
Maryam Altalhi ◽  
Laith Abualigah ◽  
Abdulwahab Ali Almazroi ◽  
Putra Sumari ◽  
...  

Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention from the paper community. This paper attempts to address this gap and develop a model to understand and estimate the prevalence of cyberstalking victimization. The model of this paper is produced using routine activities and lifestyle exposure theories and includes eight hypotheses. The data of this paper is collected from the 757 respondents in Jordanian universities. This review paper utilizes a quantitative approach and uses structural equation modeling for data analysis. The results revealed a modest prevalence range is more dependent on the cyberstalking type. The results also indicated that proximity to motivated offenders, suitable targets, and digital guardians significantly influences cyberstalking victimization. The outcome from moderation hypothesis testing demonstrated that age and residence have a significant effect on cyberstalking victimization. The proposed model is an essential element for assessing cyberstalking victimization among societies, which provides a valuable understanding of the prevalence of cyberstalking victimization. This can assist the researchers and practitioners for future research in the context of cyberstalking victimization.


2021 ◽  
Vol 44 (3) ◽  
pp. 260-267
Author(s):  
Morgan M. Millar ◽  
Hilary A. Hewes ◽  
Andrea L. Genovesi ◽  
Michael Ely ◽  
Braden Green ◽  
...  

Survey response is higher when the request comes from a familiar entity compared to an unknown sender. Little is known about how sender influences response to surveys of organizations. We assessed whether familiarity of the sender influences response outcomes in a survey of emergency medical services agencies. Emergency medical services agencies in one U.S. state were randomly assigned to receive survey emails from either a familiar or unfamiliar sender. Both deployment approaches were subsequently used nationwide, with each state selecting one of the two contact methods. Experimental results showed that requests from the familiar sender achieved higher survey response (54.3%) compared to requests from the unfamiliar sender (36.9%; OR: 2.03; 95% CI: 1.23, 3.33). Similar results were observed in the subsequent nationwide survey; in states where the familiar sender deployed the survey, 62.0% of agencies responded, compared to 51.0% when the survey was sent by the unfamiliar sender (OR: 1.57; 95% CI: 1.47, 1.67). The response difference resulted in nearly 60 additional hours of staff time needed to perform telephone follow-up to nonrespondents. When surveying healthcare organizations, surveyors should recognize that it is more challenging to obtain responses without a pre-established relationship with the organizations.


Healthcare ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 528
Author(s):  
Cristian Lieneck ◽  
Brooke Herzog ◽  
Raven Krips

The delivery of routine health care during the COVID-19 global pandemic continues to be challenged as public health guidelines and other local/regional/state and other policies are enforced to help prevent the spread of the virus. The objective of this systematic review is to identify the facilitators and barriers affecting the delivery of routine health care services during the pandemic to provide a framework for future research. In total, 32 articles were identified for common themes surrounding facilitators of routine care during COVID-19. Identified constructed in the literature include enhanced education initiatives for parents/patients regarding routine vaccinations, an importance of routine vaccinations as compared to the risk of COVID-19 infection, an enhanced use of telehealth resources (including diagnostic imagery) and identified patient throughput/PPE initiatives. Reviewers identified the following barriers to the delivery of routine care: conservation of medical providers and PPE for non-routine (acute) care delivery needs, specific routine care services incongruent the telehealth care delivery methods, and job-loss/food insecurity. Review results can assist healthcare organizations with process-related challenges related to current and/or future delivery of routine care and support future research initiatives as the global pandemic continues.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 461
Author(s):  
Yongbin Yim ◽  
Euisin Lee ◽  
Seungmin Oh

Recently, the demand for monitoring a certain object covering large and dynamic scopes such as wildfires, glaciers, and radioactive contaminations, called large-scale fluid objects (LFOs), is coming to the fore due to disasters and catastrophes that lately happened. This article provides an analytic comparison of such LFOs and typical individual mobile objects (IMOs), namely animals, humans, vehicles, etc., to figure out inherent characteristics of LFOs. Since energy-efficient monitoring of IMOs has been intensively researched so far, but such inherent properties of LFOs hinder the direct adaptation of legacy technologies for IMOs, this article surveys technological evolution and advances of LFOs along with ones of IMOs. Based on the communication cost perspective correlated to energy efficiency, three technological phases, namely concentration, integration, and abbreviation, are defined in this article. By reviewing various methods and strategies employed by existing works with the three phases, this article concludes that LFO monitoring should achieve not only decoupling from node density and network structure but also trading off quantitative reduction against qualitative loss as architectural principles of energy-efficient communication to break through inherent properties of LFOs. Future research challenges related to this topic are also discussed.


Sign in / Sign up

Export Citation Format

Share Document