StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

An Integrated Engine That Has An Inbuilt System - Term Paper Example

Cite this document
Summary
The reporter describes an interface engine as an integrated engine that has an inbuilt system, which connects legacy system and allows message transfer and delivery by use of a type of protocol called, standard messaging protocol…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
An Integrated Engine That Has An Inbuilt System
Read Text Preview

Extract of sample "An Integrated Engine That Has An Inbuilt System"

Networking final 1. a) Interface engine – this is an integrated engine that has an inbuilt system, which connects legacy systems, and allow message transfer and delivery by use of a type of protocol called, standard messaging protocol. Specifically in a healthcare industry, the software allows communication between different systems that offer different services, by integration, available framework for the process and allow retrieval and sharing of electronic information and available resources in the health services. (Keith, 2011) It works as a middleware between the system, and it operates with various standards like, application standards, document standards, conceptual standard and messaging standards. b) Specification document – this is the document that creates an abstract, and an overview of the system. It is the outline format used to demonstrate the system. Therefore, this document presents the plan or the scope of the system. The document in the healthcare industry is to display description of the system, its functions, constraint, and performance, requirement met by the system in the HL7, the systems architecture, and the interaction of the subsystems. 2. HL7v2 I. It is not a “plug and play”. This means that the system provides 80% of the framework and the interface, and 20% is left to be negotiated between the interfaces. II. In general, this version provides compatibility potential between 2.X versions III. It is built in an ad hoc method, (communications between directly connected wireless devices) IV. Uses messaging-based standards, which are built upon hat encoding and pipes. V. Most people think HL7 is HL7v2 HL7v3 I. In this version, it uses more of documents than messaging adoption. II. Work towards “plug and play” approach. III. It is not compatible with version 2, which is under. IV. Uses model-based standard which are created using Reference Information Model (RIM). V. Most people think that Clinical Document Architecture (CDA) is the HL7v3. (Keith, 2011) 3. I. Patient admission – sick patient. II. Patient registration – pay registration fee III. Patient transfer – change of existing information IV. Patient update – change in patients’ health V. Patient merge – if the patient already exists in the databases 4. Message Header Patient identification Common order Pharmacy description order Pharmacy route Observation 5. Pharmacogenomics clinical workflow. It is triggered by inpatient prescription of medication in the hospital 6. PID- this is the Patient Identification segment. In this segment, all the information about the patient is found in all types of ADT messaging. It constitutes 30 fields’ e.g. patient’s sex, patient’s age, patient’s ID number, patient’s address, and patient’s marital status. The PID segments contain the necessary information that majorly aid in communication of identity and the demographic information of the patient between the systems. Information in this segment is not regularly altered or change due to the complexity nature if this information.(Keith, 2011) a. PV1- this is the Patient Visit Information. This segment allows a visitor to submit information of a patient being visited and the visitor’s personal information. It contains 52 fields, for example, patient class, admission type, attending doctor, set ID – PV1, visit number, financial class, and contract period.(Keith, 2011) This information assists in identifying the patient visited, information about the visitor, time and the financial status of the patient. Therefore, making it easier to communicate between the involved systems, and sharing information. In this segment, the ADT messaging is also in use. 7. I. Segment PV1 – Patient Visit II. Segment NK1 – Next of Kin III. Segment OBX – Observation IV. Segment NPU – Bed Status Update. 8. Segment NPU – Bed Status Update Sequence Length Datatype Optionality 1 12 ZL 2 1 ID Segment OBX- Observation Sequence Length Datatype Optionality 1 4 SI 2 2 ID r 3 80 CE r 4 20 ST c 5 ID 6 60 CE 7 60 ST 8 10 ID 9 5 NM 10 5 ID 11 2 ID r 12 26 TS 13 20 ST 14 26 TS 15 60 CE 16 60 CN Segment NK1- Next Of Kin Sequence Length Datatype Optionality 1 4 SI r 2 48 PN 3 60 CE 63 4 106 AD 5 40 TN y/3 6 40 TN 7 60 CE 131 8 8 DT 9 8 DT 10 60 ST 11 20 CM 12 20 ST 13 60 ST Segment PV1 – Patient Visit Sequence Length Datatypes Optionality 1 4 SI 2 1 ID r 3 12 ZL 4 2 ID 5 20 ST 6 12 ZL 7 60 CN 8 60 CN 9 60 CN y 10 3 ID 11 12 ZL 12 2 ID 13 2 ID 14 3 ID 15 2 ID y 16 2 ID 17 60 CN y/4 18 2 ID 19 15 CK 20 50 CM 21 2 ID 22 2 ID 23 2 ID 24 2 ID y 25 8 DT y 26 12 NM y 27 3 NM y 28 2 ID 29 1 ID 30 8 DT 31 10 ID 32 12 NM 33 12 NM 34 1 ID 35 8 DT 36 3 ID 37 25 CK 38 2 ID 39 2 ID 40 1 ID 41 2 ID 42 12 ZL 43 12 ZL 44 26 TS 45 26 TS 46 12 NM 47 12 NM 48 12 NM 49 12 NM 50 20 CM 9. I. A01: Admit patient – patient is being allocated a room and bed. II. A04: patient registration notification – start of an outpatient encounter. III. A08: update patient information notification – changes in the demographic data of a patient IV. A03: Discharge A Patient – ending of a given encounter V. A09: Patient Departure – close of an encounter. VI. A02: Transfer a Patient – moving a patient from one location to another. VII. A28: Add Person Information –additional of an individual file. VIII. A31: Update Personal Information – additional of further information on an existing file. IX. A24: Link Patient Information – connect patients’ information with each other. X. A10: Patient Arriving – creating a new encounter XI. A18: Merge Patient Information – merging of new information with existing one. XII. A21: Leave Of Absence -Out – a staff member is absent for a leave. XIII. A16: Pending Discharge – the encounter is about to end. XIV. A34: Merge Patient Information- Patient ID Only – merging of patients using their identification names. XV. A37: Unlink Patient Information – cut the links between two data files.(Keith, 2011) 10. Virtualization- this is creation of a non-actual version of something. It involves construction of virtually designed substances that create a sense of being real and true, such as servers, network resources, and operating systems. This is the backbone of information technology evolution, whose purpose is to centralize task administration, in order to meliorate scalability, and improving workload. It can be viewed as a general mechanism that describes the autonomic computing in IT. Virtualization has made significant impacts in information technology, these key areas include; I. Network virtualization – involves the combination of available network resources, then splitting then into manageable part. II. Server virtualization- this involves the process of masking of the available server resources from the server users. III. Storage virtualization – involves combining or sharing of physical storage Medias from multiple storage devices in a network to appear as one large storage device that is centrally managed. In an enterprise, the virtualization is useful significantly in storage of data in the form of storage virtualization; it is also used in a network connection around the enterprise by enabling sharing of virtually created network resources and information. Virtualization also allows creation of the interconnection of devices in the system. 11. a. Virtual machine monitor – a virtual machine is the platform on which the operating system is installed and run, therefore, implementing the software. Monitor is the media. Virtual machine monitor is used to display translated requests to the structural or underlying physical computer hardware like monitor by the virtualization layer. Most of the processes displayed are not aware that they are running and working on a virtual platform controlled by the virtualization layer. b. Hypervisor is a system that allows different operating systems to access and share a given hardware host. It is also known as virtual machine manager. So the hypervisor controls the resources and the host processor. Here, the operating systems appear to possess the host’s memory, processor, and other available resources, but in the real sense, it is the hypervisor that is in control. 12. Cloud computing – this is a technology that creates hosts, delivers information and applications, over the internet to the hosts, from central, remote servers created to manage and maintain the resources. It is broken down into manageable segments, which are; connectivity, storage and application, which bring about the three categories, these are; I. Software-as-a-Service (SaaS) II. Infrastructure-as-a-Service (IaaS) III. Platform-as-a-Service (PaaS) The word cloud comes from the usual use of a cloud to represent the internet in diagrams. A cloud is either public or private cloud. 13. Types of cloud computing I. Hybrid cloud II. Public cloud III. Community cloud 14) PHI is Protected Health Information. It helps to protect an individuals’ or any patients’ health information and there demographic information. PHI identifies the disease, procedure, diagnosis, prognosis or the current conditions of the patient. HIPAA (Health Insurance Portability and Accountability Act) is a restricted file, whose main purpose is to give individuals ability to protect their confidentiality, keeping their health insurance and the security of the healthcare information, which assist greatly in the control administrative costs of the healthcare industry. Patients’ rights are under the privacy rule in HIPAA, which assign rights to the patient. Rights include, getting a copy of PHI, complain, given special consideration and many more. A healthcare provider is allowed to disclose a patient’s PHI without the patient’s consent. 15) In UNIX environments, users should know the full name of the intended computer. Then on the UNIX shell prompt use this command. nslookup machine-name.domain.name computer address. The computer address contains the host name, and dig machine name, so the command will be nslookup machine-name. host machine-name. dig machine name. The represent the domain.name of the network. Some new versions of UNIX do not comply with this command, some use dig or host instead of nslookup, while others just need a direct command on an already connected device. These commands are; $ ifconfig -a, and $ ifconfig lan1, if u are a super use, otherwise run hostname -i. 16. Security controls are means that a company uses to protect its intangible assets from unauthorized users. Before any measures are taken to protect the company assets, it is wise to contact an attorney who is fully exposed on intangible assets related issues. Then consider the following measures; I. Create employment agreement, which prohibit disclosure of company confidential information to anyone unauthorized to poses the information. II. Data backups, which back up valuable information of the company on servers that are located different locations. III. Copyrights, trademarks, and patents. These are legally binding of an available asset, and creation of ownership ability on the property. IV. Usage of safes and locked up cabinets, use of computer passwords, encryption the information, authentication of documents and avoiding access to proprietary information. V. Introduction of nondisclosure, and confidentiality agreements. VI. Have risk management measures. 17. I. Confidentiality- this is a right that allows protection of individual’s information, giving him or her rights to choose which information to disclose to the public. Data protection is a law that regulates the disclosure and processing of information, giving the access rights to the individual involved. II. Integrity- this is the ability of assuring users that the given information is complete and authenticated. The information must be reliable and accurate for consumption and fit for the intended purpose. Information during storage should remain unchanged. Integrity data or information creates confidence between the sources and users. III. Availability- this is the ability that the system will provide the necessary information when it is required. This will include coordination between both reliability and maintainability elements of the available information. 18. True. 19. False. 20. False. References Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(An Integrated Engine That Has An Inbuilt System Term Paper, n.d.)
An Integrated Engine That Has An Inbuilt System Term Paper. Retrieved from https://studentshare.org/information-technology/1773699-networking-final
(An Integrated Engine That Has An Inbuilt System Term Paper)
An Integrated Engine That Has An Inbuilt System Term Paper. https://studentshare.org/information-technology/1773699-networking-final.
“An Integrated Engine That Has An Inbuilt System Term Paper”, n.d. https://studentshare.org/information-technology/1773699-networking-final.
  • Cited: 0 times

CHECK THESE SAMPLES OF An Integrated Engine That Has An Inbuilt System

Extranets and External IT

The application written for a browser can be read on nearly any computer irrespective of the installed operating system (Elaine 50).... The need to maintain data security and confidentiality across the internet has resulted in the rise of intranets and extranets (Paswan 40).... hellip; Managed hosting is a term that refers to operations in which a company (search engine) owns and rents servers as a service.... The server is an IT engine....
6 Pages (1500 words) Essay

Informatics decision support

Detection & Response (Security)  Medium an inbuilt reporting system can track any security breach.... For example, the ERP can be hosted virtually Communications Architecture  Medium  Supports various architecture Database Architecture Medium Information and data stored in a database that has ordered access and information retrieval.... ? deDombal has designed a sound ERP system with a view to meet the high demand by clients and to manage the competitive restaurant business....
3 Pages (750 words) Assignment

Software Comparison Based on Requisite Functionality

As can be seen, MS Office has the highest overall score.... Since the organization has not yet decided which applications it wishes to use for generic things such as client relationship management and diary management, I have indicated that they could use either a spreadsheet, database, electronic diary manager built into the email function, or in some cases a simple list in a Word Processed document.... MS Office has all the functionality they require, but one must first establish what applications they had used before, and focus on similarity to graphical user interface, ease of use and the amount of intuitive automation available....
6 Pages (1500 words) Essay

Enterprise Resource Planning Process

Enterprise Resource Planning (or more commonly known as ERP) is defined by Webopedia as "a business management system that integrates all facets of the business, including planning, manufacturing, sales, and marketing" (Webopedia).... The aim of an ERP is to integrate all departments and functions (some of which are mentioned above) of a business into just one system that controls and manages all other different departments.... hellip; ERPs have such a wide scope that even the suppliers and the customers are sometimes connected to the single computer system to provide what is required....
3 Pages (750 words) Essay

A Methodology for the Development of a Visual Programming Language

abView Professional Development system has let the development of independent executables and the resulting code be distributed any number of times.... To execute the commands provided by the user, the syntax has to be interpreted and compiled.... The run-time engine in the LabView contains precompiled codes that combine with the executable files to perform the commands.... The run-time engine serves as the link to all the other systems....
5 Pages (1250 words) Term Paper

Water Filled Radiator for Domestic Heating

The radiator has a system of coiled pipes that emit heat as water moves within them thereby cooling the water while heating the environment.... As soon as the room has reached the preferred room temperature the radiator stops drawing electricity.... … Water Filled Radiator for Domestic HeatingIntroductionRadiators are of heat exchangers that transfer heat energy between various media at different temperatures....
6 Pages (1500 words) Assignment

All About Dune Buggy

The style is referred to as The Boston-Murphy and considerations are based on a vehicle that has proved strong on age, hard use, and in case of accidents (Brandt, 2012).... It weighs several thousand pounds with a highly advanced transmission and suspension system.... The Volkswagen Beetle has also many advantages such as low price, a robust front suspension and has sizeable spare parts from VW Beetles and Microbus.... Steel tubing is often preferable since it is superior in strength and has a consistent wall thickness....
9 Pages (2250 words) Essay

Web Development Tools

s that has a relation with a directory path, locals, and callback signatures.... 2015): Atpl JUST Walrus(website) Htmling Mustache The MVC patterns working in almost every application are mostly built on the MVC pattern, it means each application has a controller that is responsible for controlling the entire application.... Given below is a list of the template engine, which is supported by express.... If there is a template that cannot be integrated with the express....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us