All
All

Wi-Fi Enabled Healthcare

2.2 MB | 3 files | null PDF

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

IT Download image

Chapter 6: Mobile Medical Devices

Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest health care systems in the United States, it covers the key areas associated with wireless network design, security, and support.

Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services.

This excerpt from chapter 6 looks at the use of Wi-Fi-enabled mobile medical devices in health care settings.

Excerpted with permission from the publisher, Auerbach Publications, from "Wi-Fi Enabled Healthcare" by Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke and Aaron Earle. Copyright © 2014.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • WiFiEnabledHealthcare.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Healthcare02 Health Attitude: Unraveling and Solving the Complexities of Healthcare

In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing and how technology is enabling this transition. ...  More >>

Global13 Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ...  More >>

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.