The field we call Knowledge Management (or KM for short) deals with the creation, acquisition and communication of knowledge. This process is not new in any way, however only in the last 20 years has it evolved into it’s distinct field. Purposeful use of KM can yield great benefits for any organization dealing in knowledge based services.
Before using any sort of KMS (Knowledge Management System), first one must understand what knowledge is. There are many definitions on this subjects, however for the sake of KM, we can look at knowledge as information, which we are able to apply in our activities. There are several categories to it, but the two most important ones are “tacit” (which comes from personal past experiences and is near impossible to articulate) and “explicit” (which can be written down or articulated).
The purpose of any KMS system is to store, extend, update the explicit knowledge the organization owns. Furthermore it allows employees to increase their experience and encourages collaboration.
Following the recent trends, cloud based solutions have become a cornerstone of this field as well. Several SaaS solutions providing KM support are available, knowing why, which and when to use can be imperative. For more information on this subject, I recommend the following sources:
Diagnosis and Classification of 17 Diseases from 1404 Subjects via Pattern Analysis of Exhaled Molecules
Authors: Morad K. NakhlehHaitham AmalRaneen JeriesYoav Y. BrozaManal AboudAlaa GharraHodaya IvgiSalam KhatibShifaa BadarnehLior Har-ShaiLea Glass-MarmorIzabella LejbkowiczAriel MillerSamih BadarnyRaz WinerJohn FinbergSylvia Cohen-KaminskyFrédéric PerrosDavid MontaniBarbara GirerdGilles GarciaGérald SimonneauFarid NakhoulShira BaramRaed SalimMarwan HakimMaayan GruberOhad RonenTal MarshakIlana DoweckOfer NativZaher BahouthDa-you ShiWei ZhangQing-ling HuaYue-yin PanLi TaoHu LiuAmir KarbanEduard KoifmanTova RainisRoberts SkaparsArmands SivinsGuntis AncansInta Liepniece-KareleIlze KikusteIeva LasinaIvars TolmanisDouglas JohnsonStuart Z. MillstoneJennifer FultonJohn W. WellsLarry H. WilfMarc HumbertMarcis LejaNir PeledHossam Haick
This paper presents a new method to identify 17 different diseases (cancerous, inflammatory and neurological ones) with high accuracy from human’s exhaled breath. An artificially intelligent nanoarray has been built consisting of organic and inorganic sensors to detect volatile organic compounds (VOCs) from breath and transform them to electrical parameters. Each disease has its unique volatile molecular print based on different amounts of 13 components in the breath. An overall probability of 86% was achieved for the accuracy during the clinical trials.
Experiments were carried out in 5 countries at 9 clinical facilities on a total of 1404 patients. 813 patients were suffering from either of the 17 mentioned diseases, the others were healthy. Two breath samples were taken from each patient, one was captured and processed by the nanoarray, the other was analysed by mass spectrometry for validation purposes. The results were blinded, so researchers did not know which condition the participants had. It was possible to obtain that the results became independent from several factors, like gender, age, smoking habits and geographic location. It is also very important to mention that one disease did not prevent the detection of the others.
This new method can be a base of developing inexpensive portable diagnostic devices to identify several human diseases in advance, even at home.
Read the original article here: ACS Publications
„Medical robots do not only exist in sci-fi movies and the distant future, they are coming to healthcare and all stakeholders must prepare for them. Robots can support, assist and extend the service health workers are offering. In jobs with repetitive and monotonous functions they might even obtain the capacity to completely replace humans.”
- The Xenex robot works by pulsing xenon, an inert gas, at high intensity in xenon ultraviolet flashlamp. The robot’s light destroys viruses, bacteria and bacterial spores in just 4-10 minutes per room (for example: patients rooms, operating rooms, public areas). By using this robot infections and viruses caused death is reduced significantly.
- The Pepper robots is taking up reception duties at two Belgian hospitals. Pepper (standing 140 centimeters and equipped with wheels under his white frame) can recognise the human voice in 20 languages and detect if he is talking to a man, women or child. The robot has a screen (10.1-inch touch display) on his chest and a round head.
- Spread of robotic surgery due to several technological improvements, such as a three-dimensional (3D) view of the operating field, a seven-degrees-of-freedom motion with wristed instruments, the absence of fulcrum effect and surgeon tremor and greater ergonomics.
- Expansion of InTouch Health or Telemedicine which enables physicians to cross physical barriers, instantly eliminate distance, and facilitate vital communication between medical staff and patients. Through secure, high-speed Internet, and the use of state-of-the-art technologies, a medical specialist can be located virtually anywhere on the planet, and can diagnose a patient in an emergency or critical care situation.
- TUG robot who is able to carry around medical tools up to 453 kilograms. The TUG uses smart autonomous navigation. The robot is sent or requested using a touch screen interface.
- Robear, a Robot for Interactive Body Assistance is built in japan to lift patients and gently transfer them between beds and wheelchairs. Robear has mechanical arms that are able to carry up to 80kg of weight and also has roller legs that can extend and retract from a base as necessary when bending to lift a patient or when manoeuvring through tight spaces like doorways.
- The microbots, which are less than one millimeter in size which travel throughout the human bloodstream to deliver drugs to specific targets or seek out and destroy tumors, blood clots, and infections that can’t be easily accessed in other ways.
- Veebot’s robot technician draws blood from patient quickly and higher accuracy. The robotic medical technician then uses ultrasound and infrared light to search for veins before aligning and inserting a needle.
- PARO robot is an advanced interactive therapeutic robot designed to stimulate patients with Dementia, Alzheimer’s, and other cognition disorders. The PARO therapeutic robot looks, feels and sounds like a baby seal and responds to petting by moving its tail and opening and closing its eyes. Paro also responds to sounds and can learn names, including its own. It can simulate emotions such as surprise, happiness and anger. Just like animals used in pet therapy, Paro can help relieve depression and anxiety—but it never needs to be fed and doesn’t die.
Check the original article here: The Medical Futurist
The following article was written by Mike MacCana, founder at CertSimple. It explains that HTTPS can provide identity, SEO, access to HTML5 powerful features and even keep network carriers from messing with your site’s content. Read on for how or see the original article here: CertSimple
You know this, but let’s recap with a practical example:
Alice needs to send a message to Bob, privately. Someone – let’s call them Malory – sets up a wifi access point in Alice’s favorite cafe, Malory can happily reconstruct all the HTTP traffic between Alice and Bob. Malory runs
apt-get install driftnet
on her Linux laptop and enjoys a flat white while everyone else’s HTTP browsing appears on her screen in realtime.
Except HTTPS traffic won’t show up on Malory’s screen: things encrypted with a website’s public key can only be decrypted with the website’s private key. Because the website’s private key is (hopefully) only available to the website, Malory can’t decrypt the traffic.
1. Ownership attestation
Making sure Alice is actually talking to Bob. There are different levels of validation: domain validated certificates prove control of a domain, but don’t assert any particular entity controls the certificate – even if the domain is similar to a well known company.
The EV certificates you see at banks, online wallets and other high trust websites check the company applying for the certificate is who they say they are, so you know whose key you’re encrypting with. The browser displays the company name and where the company is registered, but you can check the full details inside the certificate:
2. Search engines use HTTPS as a ranking signal
You’ll need to set up HTTPS for your whole site rather than using something like a ‘billing’ subdomain. This also gives you flexibility to make previously static content interactive. Want to let users give you their contact details on a blog post? You’ve already set up HTTPS so you can do that securely.
3. Ability to use HTML5 ‘powerful features’
- Video and Microphone
- Device motion / orientation
- Pointer locking
- Encrypted Media Extensions (aka DRM)
This has already started in the current version of Canary, with geolocation being made HTTPS only since Chrome 50. If you run Canary – and soon for all Chrome users – you’ll need HTTPS for geolocation. Otherwise
navigator.geolocation.getCurrentPosition() will fail with:
4. Not having your content modified by carriers
Carriers are awful:
- Comcast adds advertisements
- AT&T adds tracking
- Verizon adds tracking and sells access to advertisers
- T-Mobile re-encodes videos, degrading quality
- The Chinese government makes your users attack GitHub.
The only thing that’s stopping them? HTTPS. If the carrier can’t decrypt the packets passing through their network (because they don’t have the site’s private key) they can’t inject their own content.
This is effective enough to the point where nefarious carriers have asked users to install configuration profiles to add the carrier’s root certificates, which are used to modify and inspect what should be private traffic. Thankfully you have control over what your browser trusts.
5. Ability to send passwords in newer browsers
Current Firefox nightlies, and soon Firefox stable, add warnings to pages that use
password type inputs without HTTPS. Here’s what it looks like:
If you’re not already considering HTTPS a standard part of your web app development cycle, you should be.
If you want an EV certificate, visit CertSimple.