|“Advocate Health Care tackled prevention of central-line infections by setting up an electronic intensive care unit in which nurses remotely monitored camera feeds from three of its hospital ICUs during central-line insertion…When monitors gathered their data and fed findings to the ICUs on how to improve protocol adherence, central-line infections dropped.” — Don Fluckinger|
|“In-memory database caching technology holds information within random access memory (RAM) where it is more easily accessed by applications. The technology leads to increased speed and greater scalability because applications spend less time reading data stored on disks.” — Mark Brunelli|
Today’s WhatIs.com Word of the Day is in-memory database, a database whose data is stored in main memory to facilitate faster query response times.
|“Your call list should have designated backups for each key individual and multiple contact information for them as well. If you are using a call tree, make sure that you have a loop back so that the last person on the list will confirm that the call was made.” — Harvey Betan|
Today’s WhatIs.com Word of the day is call tree. A call tree — sometimes referred to a phone tree, call list, phone chain or text chain — is a telecommunications chain for sharing news. In the enterprise, a call tree can be carried out with software that automatically attempts to reach individuals on the contact list. If the call tree is done manually, the last person on the list should contact the first person on the list to complete the chain.
|“It is inevitable people will use these apps for personal and business use. The challenge for enterprise IT departments is balancing the productivity gains of BYOA with the security and business continuity risks,” — Rodney Gedda|
|“Exchange 2013 appears to be more evolutionary than revolutionary…The new features seem to specifically address the shortcomings of Exchange 2010 and should make life easier for administrators and users alike..” — Brian Posey|
Today’s WhatIs.com Word of the Day is Microsoft Exchange Server 2013. It’s currently available in preview mode.
|“The core CSIRT team can include representatives from major operating system groups, a network engineer and a member from the application group, for example. Ad hoc team members could be a person from the specific group involved in the potential data breach.” — Nick Lewis|
Today’s WhatIs.com Word of the Day is CSIRT (pronounced “see-sert”). The acronym stands for Computer Security Incident Response Team, an organizational group composed of IT, legal, human resources and corporate management.
CSIRT members usually have high security clearances within the organization and getting that clearance for “the right people” can be a big pain point. The solution? Get your core CSIRT team certified and waiting in the wings — and then pull in everyone else you need on an “ad-hoc” basis when the you-know-what hits the fan.
|“A successful DR test will have highlighted flaws in the plan and help move it to the next level of maturity. Even if the entire recovery procedure fails, having identified that failure denotes a successful test.” — Pierre Dorion|
|“Retina screens are just a marketing concept, but there exists real science behind the nomenclature. It has to do with how your eye works and how you use your specific device. You hold a phone closer than a tablet, and you’ll probably hold a tablet closer to you than you would your laptop.” —J.R. Nelson|
By the way, if you’re curious about what our definition for laptop looks like in Serbo-Croatian, Jovana Milutinovich recently posted a translation. Jovana is currently studing Computer Science at the University of Belgrade,Serbia. We wish her the best of luck in her studies!
|“LevelUp participating merchants don’t have to pay credit card companies’ nasty payment processing fees — that range between 3% and 6% of each transaction.” — Peter Cohan|
|“At first glance, the Internet of Things concept can appear as yet another vendor attempt to get end users to install more products they may not really need in the hopes of achieving some kind of business acceleration nirvana. In reality, it’s the end users who are driving vendors down this road to adopt an Internet of Things way of thinking.” — David Greenfield|
Today’s WhatIs.com Word of the Day is Internet of Things, a scenario in which every single thing you can think of has a unique identifier and the ability to communicate over the Internet or a similar wide-area network (WAN).
The concept has been around for about ten years when it was first associated with RFID tags, bar codes and supply chain management. Today, IoT is a hot buzzword used in city planning, big data analytics, automobile manufacturing — and just about any other industry you can think of.
I get it. Internet of Things is another name for machine-to-machine (M2M) communicaiton. Pervasive computing. “Smart” everything. It’s especially a hot topic for privacy advocates. They don’t like the idea one bit.
My smart car sends data to my phone to tell me I have half a tank of gas left. My smart electric meter can send usage data to the power company and my son will never get a job as a meter reader.
But I didn’t REALLY get the concept of Internet of Things until I saw a foal being born three months ago.
You see, this particular foal was bred to be a show horse. Her birth required a lot of help from the Internet and this little filly is one of the “things” in the Internet of Things. She’s not a machine, she’s a real live horse. But her parents each have a unique identifier — she has a unique identifier — and without the Internet, machine-to-machine communication and real-time analytics, she would never have been born.
The horse that just gave birth in the picture above is a brood mare — a surrogate. The filly’s real mother is a show horse worth tens and tens of thousands of dollars.
The people who own the show horse wanted to breed her — but decided to have a surrogate carry the foal. Horses carry their young for 11 months — that’s a year off the show circuit, which translates into a financial loss. And if something went wrong during the pregnancy and the mare died, the owner would lose any chance for future income from the horse. For similar risk-management reasons, the filly’s dad is a sperm donor. Yep, show horses are an investment.
So far, this story is kind of “old school.” The scenario above could have taken place on any horse breeding farm in the 1970’s. The only technology involved is maybe a telephone. There’s no Internet of Things. It’s just another artificial insemination story. Yawn.
To paraphrase that old radio host Paul Harvey… “And now for the REST of the story.”
After the show mare’s owners decided to bred their award-winning mare, they needed to find a surrogate whose breeding cycle matched their own mare’s.
They used the Internet and a distributed database, not a telephone, to find a compatible mare. The information in the database is captured in real time from equine veterinary records around the world and the records contain real-time data sent by enhanced RFID chips implanted in the horses.
The brood mare just happened to be out in Wyoming running with a herd, so a helicopter equipped with an RFID scanner found her and separated her from the rest of the herd.
Then a vet in Wyoming used PACS and telepatholgy to share images and other data with the vet in New York to make sure the mares were in sync — and the egg from the show horse in New York was removed and flown to Wyoming. (The owners used another database registry on the Internet to search for the right sire. His sperm was captured and also sent to Wyoming.)
Timing was everything and it couldn’t have happened without the Internet. The logistics were coordinated with the help of UPS so the egg and sperm would arrive at exactly the same time and the brood mare could be impregnated.
Once the vet in Wyoming determined there was a viable pregnancy, the brood mare was returned to her herd and monitored by the GPS in her chip and satellite imaging. Her vet monitored her remotely; heart rate and temperature were just a mouse away.
Seven months later, the helicopter went out and culled the brood mare from the herd again so she could be flown to Ravena, New York, where the trainer took charge of the brood mare and awaited the foal’s birth.Three months after that, the show horse’s filly was born, healthy and beautiful.
The filly was chipped with an even more enhanced RFID technology than her parents have. When she grows up, she’ll have a tag on her halter that automates how much grain she receives. Her water trough will know when it’s low and automatically refill itself. Sensors in her stall will regulate the temperature by turning on fans or turning on the heat. Her trainers can use desktop, iPad or iPad apps to monitor the filly’s heath and report on whether she’s in a stall or out grazing in a pasture.
When I heard this whole story about the helicopter scanner using the mare’s RFID tag to locate the right horse, it finally clicked. This filly, who is about the size of a llama now — and puts everything in her mouth just as every baby does — is a walking, grass-eating member of the Internet of Things. And if we humans work out the privacy issues that surround the concept, so will we be some day.
The filly doesn’t have a name yet. I’m voting for IoT.