1 / 28

Introduction to Information and Computer Science

Introduction to Information and Computer Science. The Future of Computing. Lecture b.

december
Download Presentation

Introduction to Information and Computer Science

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Information and Computer Science The Future of Computing Lecture b This material (Comp4_Unit10b) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015.

  2. The Future of ComputingIntroduction – Lecture b • Describe the latest advances in technology (Lecture a, b) • Discuss the implications of advances in technology for healthcare systems, including potential risks (Lecture a, b) Introduction to Information and Computer Science The Future of Computing Lecture b

  3. Cloud Computing Introduction to Information and Computer Science The Future of Computing Lecture b "Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.“ (NIST, 2011)

  4. Distributed Computing Introduction to Information and Computer Science The Future of Computing Lecture b • Sharing the processing workload between connected computer systems • SETI@home • examines radio telescope data for signs of intelligence using computers connected over the Internet • volunteer computing resources

  5. Cloud Computing Characteristics Introduction to Information and Computer Science The Future of Computing Lecture b On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service

  6. Cloud Computing Service Models Introduction to Information and Computer Science The Future of Computing Lecture b Cloud Software as a Service (SaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS)

  7. Deployment Models Introduction to Information and Computer Science The Future of Computing Lecture b Private cloud Community cloud Public cloud Hybrid cloud

  8. Virtualization Introduction to Information and Computer Science The Future of Computing Lecture b Multiple virtual computer systems running on a single physical system Component of cloud computing Not a new idea; IBM’s Virtual Machine Facility/370 released in 1972 Each user appeared to have a dedicated system

  9. Hypervisor Introduction to Information and Computer Science The Future of Computing Lecture b Virtual systems do not have to be the same operating system or instruction set as the physical hardware Virtual systems are managed on the physical system by a hypervisor The hypervisor emulates the instruction set of the virtual hardware Available through open-source software and commercial vendors

  10. Cloud Computing Issues Introduction to Information and Computer Science The Future of Computing Lecture b Access Security

  11. Social Implications Introduction to Information and Computer Science The Future of Computing Lecture b • Computers have changed the way people communicate • E-mail • Instant messaging • VoIP • Video • SMS • Social networks • Local based services • Personal health records • Privacy

  12. E-mail Introduction to Information and Computer Science The Future of Computing Lecture b Most individuals in the United States now have an e-mail address Initially limited to text Multi-media capabilities added Easy to “spoof” sender address 90% of all e-mail is estimated to be spam Rejected by ISPs or mail servers

  13. Instant Messaging Introduction to Information and Computer Science The Future of Computing Lecture b Initially used to communicate to computer mainframe operators Could communicate between users on same system Can now be used to send text between users over global Internet

  14. Video and Voice-Over IP Introduction to Information and Computer Science The Future of Computing Lecture b Makes calls over the internet to another VoIP phone VoIP only phones available from commercial vendors Soft phones available which use computer microphone and speakers Commercial voice and video services, often at no cost to users

  15. Short Message Service Introduction to Information and Computer Science The Future of Computing Lecture b • Text messaging • Shorthand language • Emoticons

  16. Social Networks Introduction to Information and Computer Science The Future of Computing Lecture b SixDegrees (1997) Friendster (2002) LinkedIn, MySpace (2003) Facebook, Twitter (2006)

  17. Location Based Services Introduction to Information and Computer Science The Future of Computing Lecture b GPS in many mobile devices Can identify local services Can also provide information on an individual’s location to others Extends to social networking services

  18. Personal Health Records Introduction to Information and Computer Science The Future of Computing Lecture b • May be stored on a personal computer • May be on personal storage device • Moving towards web-based services • Microsoft HealthVault

  19. Privacy Introduction to Information and Computer Science The Future of Computing Lecture b • Increasing on-line presence • Increases in customized content delivery • Individual reputation over time • The internet is forever • Privacy of medical records • HHS breach list

  20. Ubiquitous Computing Introduction to Information and Computer Science The Future of Computing Lecture b Computers have become portable Laptops since the 1990s Netbooks since the early 2000s Personal Digital Assistants (PDAs) Computers are everywhere Cars TVs Home appliances

  21. Personal Area Networks (PANs) Introduction to Information and Computer Science The Future of Computing Lecture b Bluetooth Wireless connection 1 to 100 meter range connection radius Used for mice, keyboards, headsets, etc.

  22. Implications For Healthcare Introduction to Information and Computer Science The Future of Computing Lecture b • Telemedicine • Brings the doctor to the patient • Uses • Internet • Integrated audio and video capabilities • Clinical decision support • Elder care monitoring • Individualized health care

  23. Risks of Technology in Healthcare Introduction to Information and Computer Science The Future of Computing Lecture b Side effects of using new technology – example: radiology Potential for more false positive test results Higher healthcare costs Intended and unintended consequences of technology implementations

  24. The Future of ComputingSummary – Lecture b • Cloud computing • Social implications • Ubiquitous computing • Affect on healthcare systems Introduction to Information and Computer Science The Future of Computing Lecture b

  25. The Future of ComputingSummary Introduction to Information and Computer Science The Future of Computing Lecture b • Decrease in system size and increase in system performance • Increasing options for system control • Movement to network applications • Changes in our society • Pervasiveness of computer technology • Futures: • Wearable systems? • Elimination of the keyboard? • Societal changes? • Changes in home health care?

  26. Future of ComputingReferences – Lecture b References AHIMA (2012). “Choose a PHR”. http://www.myphr.com/resources/choose.aspx. Retrieved January 2012, from AHIMA website: http://www.ahima.org/. Alfonsi, Sharyn and Hutchison, Courtney. More Americans Using High-Tech Medicine, CDC Finds. (2010 February 17). Retrieved Jan 2012 from the ABC News website: http://abcnews.go.com/Health/Wellness/technology-medicine/story?id=9864930#.Tx-xgYGwVmp. Boyd, D. M. and Ellison, N. B. (2008), Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13: 210–230. doi: 10.1111/j.1083-6101.2007.00393.x. Bulling, Andreas; Gellersen, Hans (Oct.-Dec. 2010). Toward Mobile Eye-Based Human-Computer Interaction,  Pervasive Computing, IEEE , vol.9, no.4, pp.8-12, doi: 10.1109/MPRV.2010.86.Retrieved Jan 2012 from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5586690&isnumber=5586685. Chapman, C.; Emmerich, W.; Marquez, F.G.; Clayman, S.; Galis, A.. (2011, April). The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology. Elastic Service Definition in Computational Clouds, 327 -334. Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP. doi:10.1109/NOMSW.2010.5486555. Retrieved Jan 2012 from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5486555&isnumber=5486527. Crocker, D. (1982, August 13). STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES ( RFC # 822). Dept. of Electrical Engineering, University of Delaware. Retrieved Jan 2012 from RFC Editor website: http://www.rfc-editor.org/rfc/rfc822.txt. Faust O, Shetty R, Sree SV, Acharya S, Acharya U R, Ng EY, Poo CK, Suri J., Towards the Systematic Development of Medical Networking Technology. (2010, January 6). J Med Syst. Fusco, SJ: Michael, K.; Michael, MG. "Exploring the Social Implications of Location Based Social Networking: An inquiry into the perceived positive and negative impacts of using LBSN between friends" 9th IEEE International Conference on Mobile Business. Ed. George Giaglis. Athens, Greece: IEEE, 2010. Introduction to Information and Computer Science The Future of Computing Lecture b

  27. Future of ComputingReferences – Lecture b (continued) References General Motors (September 2010). OnStar Relaunches Its Brand with Focus on “Responsible Connectivity”. Retrieved Jan 2012 from: http://media.gm.com/content/media/us/en/onstar/news.detail.html/content/Pages/news/us/en/2010/Sept/0915_onstar. Goozner, Merrill. Rise of the Machine. (2010 February 11). Retrieved Jan 2012 from the Fiscal Times website: http://www.thefiscaltimes.com/Articles/2010/02/11/Rise-Of-The-Machines.aspx#page1. Gum, P. H. 1983. System/370 extended architecture: facilities for virtual machines. IBM J. Res. Dev. 27, 6 (Nov. 1983), 530-544. DOI= http://dx.doi.org/10.1147/rd.276.0530. Han, Y. Y., Carcillo JA, Venkataraman ST, Clark RS, Watson RS, Nguyen TC, Bayir H, Orr RA (2005, December). Unexpected Increased Mortality After Implementation of a Commercially Sold Computerized Physician Order Entry System. Pediatrics, 116(6):1506-12. doi:10.1542/peds.2005-1287. IBM Systems and Technology (February 2011). Watson--A System Designed for Answers. Retrieved Jan 2012 from the IBM Corporation website: http://public.dhe.ibm.com/common/ssi/ecm/en/pow03061usen/POW03061USEN.PDF. International Consumer Electronics Show (CES) (2012). Retrieved Jan 2012 from: http://www.cesweb.org/. International Telecommunication Union (ITC) (2010). Measuring the Information Society Retrieved Jan 2012 from: http://www.itu.int/ITU-D/ict/publications/idi/2010/Material/MIS_2010_Summary_E.pdf. Lee, J. (2009, January 19). Is That an Emoticon in 1862? The New York Times. Retrieved from http://cityroom.blogs.nytimes.com Microsoft HealthVault (nd.). http://www.microsoft.com/en-us/healthvault/, accessed Jan 2012. Miriam Webster Dictionary (2012, nd.). Definition of Ubiquitous. Retrieved Jan 2012 from: http://www.merriam-webster.com/dictionary/ubiquitous. Neo, R. L. and Skoric, M. M. (2009), Problematic Instant Messaging Use. Journal of Computer-Mediated Communication, 14: 627–657. doi: 10.1111/j.1083-6101.2009.01456.x. Introduction to Information and Computer Science The Future of Computing Lecture b

  28. Future of ComputingReferences – Lecture b (continued) References NIST: Mell; Grance. (2011, September). The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology. NIST Institute of Standards and Technology: US Dept. of Commerce, SP 800(145), 2. Retrieved Jan 2012 from http://csrc.nist.gov/publications/PubsSPs.html#800-145. Oikarinen, J.; Reed, D. (1993 May) UNIX For Beginners, Bell Laboratories internal memorandum. Internet Relay Chat Protocol, RFC 1459. Retrieved Jan 2012 from RFC Editor website: http://www.rfc-editor.org/rfc/rfc1459.txt. Pavel, M.; Hayes, T.L.; Adami, A.; Jimison, H.; Kaye, J. (2006, August 30). Unobtrusive Assessment of Mobility. Engineering in Medicine and Biology Society, 6277-6280. doi:10.1109/IEMBS.2006.260301. Retrieved Jan 2012 from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4463244&isnumber=4461641. Rodrigues, J. P.; Oliveira, M.; Vaidya, B. (2010). New Trends on Ubiquitous Mobile Multimedia Applications. EURASIP Journal on Wireless Communications and Networking, 2010, doi:10.1155/2010/689517 SETI@home (nd).http://setiathome.berkeley.edu/index.php. Retrieved January 2012, from University of California, Berkeley website: http://www.berkeley.edu. Simon, Stephanie (2011 March 28). Medicine on the Move: Mobile devices help improve treatment. Retrieved Jan 2012 from the Wall Street Journal website: http://online.wsj.com/article/SB10001424052748703559604576174842490398186.html. The New Scientist, (2010, February 24). 205(2749), 44-45. nest / Welcome Home. (2012). Retrieved January 2012, from nest website: http://www.nest.com. US Department of Health and Human Services (2012). Breaches Affecting 500 or More Individuals. http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html. Retrieved January 2012, from US Department of Health and Human Services (HHS) website: http://www.hhs.gov. Introduction to Information and Computer Science The Future of Computing Lecture b

More Related