Scan Monthly No. 009November 2003 |
|
<< Other Issues of Scan Monthly |
Download this Scan™ Monthly (PDF) |
Health-Care Applications of Pervasive-Computing Technologies | View summary |
D03-2450 | Download this Insight |
With some parts of the worldwide health-care industry about to go on life support because of high costs and demand for newly available services, health-care organizations are keen to cut costs and pursue efficiencies. Pervasive-computing technologies hold great potential for helping to achieve these goals. Pervasive-computing health-care applications fall roughly into two categories: technologies that enhance the handling of data, information, and knowledge and technologies that play an integral role in medical diagnosis and treatment processes. This study describes academic and corporate efforts to design and implement pervasive-computing health-care environments. Most efforts combine existing technologies, such as sensors, radio-frequency identification tags, wireless local-area networks, and handheld-computing devices to create interactive, context-aware environments. Although some people believe that the market for pervasive computing in a health-care setting is poised for dramatic rapid growth, developers have yet to address completely the issues of wireless data-transmission interference, security, battery life, data overload, privacy, and physician resistance to change. Author: Greg Powell. 7 pages. Index Keywords: Aging Population; Biotechnology; Computer Networks; Health Care; Information Technology; Research and Development; Sensors. |
|
Strategies for Privacy-Related Business Issues | View summary |
D03-2451 | Download this Insight |
This study highlights approximately 40 of the most interesting data points that the Scan process has identified in the past several months in the area of privacy. The study deals with the data points in five categories that constitute an integrated privacy strategy for any business. The first category deals with the establishment of a coherent and consistent internal privacy policy by the organization. The second involves transparent implementation of planned privacy-threatening technologies: Customers and employees need to know exactly what the organization will and will not use particular technologies for. The third category has to do with the creation of provisions for an organization's own privacy—or its security. The fourth category involves the hard bargain that customers are increasingly striking in any exchange of information— customers are demanding real and tangible benefits in exchange for private information. The fifth category deals with the pros and cons of allowing customers to opt out of revealing private information whenever possible. Author: Martin Schwirn. 12 pages. Index Keywords: Business Ethics; Consumer Behavior; Information Technology; Security Industry; Social Trends. |
|
Business Perspectives on Emergence | View summary |
D03-2452 | Download this Insight |
Emergence is the term that researchers use to describe the appearance of sophisticated or complex behavior patterns from the confluence of uncoordinated actions of large numbers of independent agents. Emergence is attracting interest in the business community in several ways. First, companies are using a growing understanding of emergence to characterize better complex systems that they encounter in the business environment in which they must function and grow. An understanding of emergence provides them with new perspectives on everything from the global economy to an individual consumer's purchase-decision process and from how buzz marketing rips through a population to the dynamics of the company's own organizational structure. Second, researchers are currently experimenting with applying the concepts of emergence for entertainment and business applications. Will Wright's Sim City game is an example in the entertainment arena, and Southwest Airline's freight-routing system is an example in the business arena. Third, emergence is a prominent trait of complex adaptive systems in the natural world, so companies are interested in studying which characteristics of emergence might help organizations become more adaptive to the turbulent commercial environment. The traditional command-and-control organizational structures and planning processes have their limits, and the complex adaptive systems of nature may shed light on alternatives. Author: Kermit M. Patton. 7 pages. Index Keywords: Computer Software; Consumer Behavior. |
|
Prospects for Ultrawideband Communications | View summary |
D03-2453 | Download this Insight |
During recent years, spread-spectrum technologies enabled companies to increase wireless data rates, reduce power consumption, and control interference by spreading the energy of radiated emissions over a wide range of frequencies. Taking this principle to the next step, ultrawideband (UWB) technologies can spread energy out over a range of frequencies even wider than that of spread-spectrum techniques, promising to increase the usable data rate of wireless technology dramatically while minimizing interference with conventional sources. UWB is a revolutionary technology and thus faces many challenges in becoming accepted by regulators, suppliers, and end users. Only start-up companies such as XtremeSpectrum are wagering their business strategy on the success of UWB. Larger companies such as Intel, Motorola, and Texas Instruments are maintaining active development efforts but do not rely on UWB's becoming part of their core business—in contrast to the existing 802.11 variants, which are indeed now part of core business for those companies. This study, developed with SRI Consulting Business Intelligence's Digital Futures program, examines applications, industry developments, and business-development issues for this promising but controversial technology. Author: Michael Gold. 6 pages. Index Keywords: Communications; Computer Networks, Consumer Electronics; Information Technology; Telecommunications. |