Medical Imaging Cloud Scenario White Paper Prefacepreface

Total Page:16

File Type:pdf, Size:1020Kb

Medical Imaging Cloud Scenario White Paper Prefacepreface Medical Imaging Cloud Scenario White Paper PrefacePreface Medical imagingMedical refers imaging to non-intrusively refers to non-intrusively obtaining internalobtaining images internal of imagesa human of body a human or body body part or forbody medical part for medical treatment ortreatment research. or research. Medical imagingMedical is imagingarguably is the arguably most important the most clinicalimportant diagnosis clinical anddiagnosis differential and differential diagnosis methoddiagnosis in methodmodern in modern medicine. medicine.It is one of It the is onemost of important the most phasesimportant in phasesthe medical in the process. medical Currently, process. Currently,70% of clinical 70% diagnosisof clinical reliesdiagnosis relies on medicalon imaging, medical and imaging, image and data image accounts data foraccounts 80% to for 90% 80% of allto 90%hospital of all data. hospital data. Medical dataMedical is growing data israpidly, growing and rapidly, hospitals and must hospitals invest must enormously invest enormously to expand tothe expand storage the capacity storage of capacity their data of their data centers everycenters year. every In addition, year. In most addition, hospitals most still hospitals use images still use within images their within local theirarea localnetwork area (LAN). network The (LAN). data The data volume is large,volume the is transmissionlarge, the transmission speed is low, speed and is the low, data and is the not data shared. is not As shared. a result, As this a result, important this dataimportant source data is source is not used effectivelynot used effectivelyand becomes and liabilitybecomes rather liability than rather asset. than How asset. to store, How retrieve, to store, and retrieve, fully apply and fullythe massiveapply the massive image dataimage is a challenge data is a challengefacing each facing medical each service medical organization. service organization. The applicationThe application of cloud computing of cloud computing in the medical in the industry medical will industry bring it will into bring the datait into technology the data technology (DT) era. Medical(DT) era. Medical data in thedata cloud in canthe cloudnow be can shared now beacross shared regions across and regions medical and institutions, medical institutions, allowing more allowing patients more to patients obtain the to obtain the medical resourcesmedical resourcesthey need. they After need. medical After images medical are images uploaded are touploaded the cloud, to thecloud cloud, computing cloud computing and cloud andstorage cloud storage technologiestechnologies can provide can rapid provide data rapidretrieving, data retrieving,network data network sharing, data and sharing, application and application expansion. expansion. This not only This not only provides doctorsprovides with doctors more withconvenient more convenient clinical image clinical data image services, data but services, also supports but also big supports data, Internet big data, of InternetThings of Things (IoT), and (IoT),artificial and intelligence artificial intelligence (AI), bringing (AI), wider bringing application wider application space and space value. and value. Medical imagingMedical cloud imaging has cloudbecome has an become important an fieldimportant of cloud field computing. of cloud computing. Chinese and Chinese international and international Internet giants Internet giants including Alibaba,including Tencent, Alibaba, Huawei, Tencent, Amazon, Huawei, and Amazon, Microsoft and areMicrosoft working are with working traditional with traditionalmedical equipment medical equipment and and imaging companiesimaging companies including GE, including Philips, GE, Siemens, Philips, Carestream,Siemens, Carestream, and United and Imaging United to Imaging explore toand explore innovate. and innovate. This white Thispaper white describes paper describesrecent developments, recent developments, business opportunities, business opportunities, and network and SLA network requirements SLA requirements of five of five applicationapplication scenarios scenariosbased on theirbased current on their development current development status and status national and policies. national It policies.introduces It introduces these sce these sce narios andnarios explores and their explores development their development background background and value, and providing value, analysisproviding and analysis suggestions and suggestions for future medicalfor future medical imaging cloudimaging services cloud development. services development. Finally, thisFinally, white paperthis white serves paper as servesa reference as a forreference the medical for the imaging medical cloud imaging industry cloud and industry contributes and contributes to its to its development.development. Huawei iLab Huawei is willing iLab to is team willing up to with team partners up with in partners the healthcare in the healthcare ecosystem ecosystem to promote to the promote the developmentdevelopment of the medical of the imaging medical services. imaging services. ContentsContents MedicalMedical Imaging Imaging CloudCloud Overview Overview 1 1 0202 1.1 Background1.1 Background Information Information1 1 1.2 Solution1.2 Solution Overview Overview 2 2 1.3 Solution1.3 Solution Benefit Benefit 2 2 1.4 Application1.4 Application Scenario Scenario3 3 MedicalMedical Imaging Imaging Cloud Cloud DevelopmentDevelopment Trends Trends4 4 0101 ApplicationApplication Scenarios Scenarios of of MedicalMedical Imaging Imaging Clouds Clouds6 6 3.1 Cloud3.1 Image Cloud Storage Image Storage 6 6 3.2 Imaging3.2 Imaging Cloud Application Cloud Application12 12 3.2.1 Imaging3.2.1 Cloud Imaging PACS: Cloud The Eventual PACS: The Form Eventual of PACS Form of PACS 3.2.2 Cloud Image3.2.2 CloudReading: Image Making Reading: Diagnosis Making More Diagnosis Efficient More Efficient 0404 3.2.3 Mobile 3.2.3Imaging Mobile Cloud: Imaging Viewing Cloud: Images Viewing Anytime Images and AnytimeAnywhere and Anywhere 3.3 Cloud-based3.3 Cloud-based Medical MedicalCollaboration Collaboration24 24 3.3.1 Regional3.3.1 Imaging Regional Centers: Imaging Imaging Centers: Resource Imaging Sharing Resource and Sharing and Hierarchical DiagnosisHierarchical and Diagnosis Treatment and Treatment SummarySummary of Medical of Medical 3.3.2 Remote3.3.2 Imaging Remote Consultation Imaging ConsultationCenter: Optimizing Center: Connections Optimizing Connections ImagingImaging Cloud Cloud and Improvingand Medical Improving Quality Medical Quality ScenariosScenarios 51 51 3.4 Cloud-based3.4 Cloud-based Medical MedicalEducation Education38 38 3.4.1 Imaging3.4.1 Cloud Imaging Teaching: Cloud Most Teaching: Widespread Most Widespread Medical Medical ApplicationsApplications 3.5 Cloud-based3.5 Cloud-based Health Management Health Management48 480505 MedicalMedical Imaging Imaging Cloud Cloud 0303 RequirementsRequirements for for NetworksNetworks 53 53 0606 AppendixAppendix 55 55 AcronymsAcronyms and Abbreviations and Abbreviations55 55 Medical MedicalImaging Imaging Cloud Ecosystems Cloud Ecosystems56 56 01 Medical Imaging Cloud Overview 1.1 Background Information Driven by factors such as medical requirements, national policies, and the applications and maturity of cloud computing, the medical industry is entering a "cloud era". Policy drive: The "Healthy China" national strategy is a core driver of the medical imaging cloud market. National medical policies require implementing regional collaboration and hierarchical diagnosis and treatment, including the integration of medical resources, mutual recognition of medical examinations, and medical image sharing. A region's imaging center, ECG center, and pathology center can now collaborate to implement remote image diagnosis, driving the development of medical imaging. China's State Council issued the Opinions of Promoting the Development of "Internet + Healthcare", accelerating the pace of medical cloud development. Industry trends: Continuing to develop medical imaging cloud technology is inevitable. Some important applications include sharing of medical image data from the hospital level to the regional level, rapid retrieval and sharing of image data, and extended image applications. Hospital requirements: Medical imaging plays an important role in clinical diagnosis. However, there are many problems in clinical applications; for example, diagnosis results being not mutually recognized, repeated radiography for referral, the lack of historical image data, low efficiency and accuracy of image diagnosis, and difficulty of sharing and using image data. Patients face the following problems: difficult and expensive medical treatment, excessive number of examinations, repeated radiography for referral, image consultation difficulties, and high misdiagnosis rate. Doctors face the following problems: heavy workload, low diagnosis efficiency and accuracy, difficult service communication, and insufficient educational materials. Hospitals face the following problems: difficult image management, low accuracy and efficiency of image diagnosis, poor patient 1 experience, and many medical disputes. Uneven distribution of medical resources in the medical management department requires that hospitals explore the value of image data and improve the medical level. Modern hospitals have established a Picture Archiving and Communication System (PACS), Clinical Information System (CIS), Hospital Information System (HIS), and Electronic Medical Record (EMR). In modern hospitals,
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Download Report
    cover_final_02:Layout 1 20/3/14 13:26 Page 1 Internet Watch Foundation Suite 7310 First Floor Building 7300 INTERNET Cambridge Research Park Waterbeach Cambridge WATCH CB25 9TN United Kingdom FOUNDATION E: [email protected] T: +44 (0) 1223 20 30 30 ANNUAL F: +44 (0) 1223 86 12 15 & CHARITY iwf.org.uk Facebook: Internet Watch Foundation REPORT Twitter: @IWFhotline. 2013 Internet Watch Foundation Charity number: 1112 398 Company number: 3426 366 Internet Watch Limited Company number: 3257 438 Design and print sponsored by cover_final_02:Layout 1 20/3/14 13:26 Page 2 OUR VISION: TO ELIMINATE ONLINE CHILD SEXUAL ABUSE IMAGES AND VIDEOS To help us achieve this goal we work with the following operational partners: OUR MEMBERS: Our Members help us remove and disrupt the distribution of online images and videos of child sexual abuse. It is with thanks to our Members for their support that we are able to do this work. As at December 2013 we had 110 Members, largely from the online industry. These include ISPs, mobile network operators, filtering providers, search providers, content providers, and the financial sector. POLICE: In the UK we work closely with the “This has been a hugely important year for National Crime Agency CEOP child safety online and the IWF have played a Command. This partnership allows us vital role in progress made. to take action quickly against UK-hosted criminal content. We also Thanks to the efforts of the IWF and their close work with international law working with industry and the NCA, enforcement agencies to take action against child sexual abuse content hosted anywhere in the world.
    [Show full text]
  • UNIT -III Computer Network Overview Computer Networking Or Data
    UNIT -III Computer Network Overview Computer networking or data communication is a most important part of the information technology. Today every business in the world needs a computer network for smooth operations, flexibly, instant communication and data access. Just imagine if there is no network communication in the university campuses, hospitals, multinational organizations and educational institutes then how difficult are to communicate with each other. In this article you will learn the basic overview of a computer network. The targeted audience of this article is the people who want to know about the network communication system, network standards and types. A computer network is comprised of connectivity devices and components. To share data and resources between two or more computers is known as networking. There are different types of a computer network such as LAN, MAN, WAN and wireless network. The key devices involved that make the infrastructure of a computer network are Hub, Switch, Router, Modem, Access point, LAN card and network cables. LAN stands for local area network and a network in a room, in a building or a network over small distance is known as a LAN. MAN stands for Metropolitan area network and it covers the networking between two offices within the city. WAN stands for wide area network and it cover the networking between two or more computers between two cities, two countries or two continents. There are different topologies of a computer network. A topology defines the physical layout or a design of a network. These topologies are star topology, bus topology, mesh topology, star bus topology etc.
    [Show full text]
  • Event Detection from Image Hosting Services by Slightly-Supervised Multi-Span Context Models
    Event Detection from Image Hosting Services by Slightly-supervised Multi-span Context Models Mohamed Morchid, Richard Dufour, Georges Linares` University of Avignon Laboratoire d’Informatique d’Avignon Avignon, France mohamed.morchid, richard.dufour, georges.linares @univ-avignon.fr f g Abstract—We present a method to detect social events in a set LDA is a statistical model that considers a text document of pictures from an image hosting service (Flickr). This method as a mixture of latent topics. One of the main problem of relies on the analysis of user-generated tags, by using statistical LDA representation lies in the choice of the topic-space di- models trained on both a small set of manually annotated mensionality N, that is priorly fixed before the model estimate. data and a large data set collected from the Internet. Social Indeed, the model granularity is directly dependent from N: event modeling relies on multi-span topic model based on LDA (Latent Dirichlet Allocation). Experiments are conducted in the a low value leads to estimate coarse classes, that may be experimental setup of MediaEval’2011 evaluation campaign. The viewed as domain or thematic models. On the other side, a high proposed system outperforms significantly the best system of this dimensionality leads to narrow classes that may represent fine benchmark, reaching a F-measure score of about 71%. topics or concepts. Therefore, the choice of N determines the model granularity that should depend on the task objectives. I. INTRODUCTION This problem was addressed in many previous works, that mainly focused on the search of the optimal model granular- The image hosting platforms such as Picasa, Flickr or ity; some of them proposed multi-granularity approaches, by Drawin allow users to easily share pictures or to browse image hierarchical LDA modeling [6], bag of multimodal models [7] galleries.
    [Show full text]
  • The Web ICT Systems for Business Networking Vito Morreale
    ICT Systems for Business Networking Vito Morreale The Web ICT Systems for Business Networking Vito Morreale Note. The content of this document is mainly drawn from Wikipedia [www.wikipedia.org] and follows GNU Free Documentation License (GFDL), the license through which Wikipedia's articles are made available. The GNU Free Documentation License (GFDL) permits the redistribution, creation of derivative works, and commercial use of content provided its authors are attributed and this content remains available under the GFDL. Material on Wikipedia (and this document too) may thus be distributed multilingually to, or incorporated from, resources which also use this license. Table of contents 1 INTRODUCTION ................................................................................................................................................ 3 2 HOW THE WEB WORKS .................................................................................................................................. 4 2.1 PUBLISHING WEB PAGES ....................................................................................................................................... 4 2.2 SOCIOLOGICAL IMPLICATIONS ................................................................................................................................ 5 3 UNIFORM RESOURCE IDENTIFIER (URI) ................................................................................................. 5 4 HYPERTEXT TRANSFER PROTOCOL (HTTP) ........................................................................................
    [Show full text]
  • Furnizarea De Servicii Hosting – La Limita Dintre Content Şi Comunicaţii Electronice
    Furnizarea de servicii hosting – la limita dintre content şi comunicaţii electronice Monica Adriana Banu – Consilier Juridic Octombrie 2007 La întrebarea ce înseamnă „hosting” se răspunde de cele mai multe ori „găzduire site- uri”, termenul „hosting” devenind generic pentru ceea ce înseamnă web hosting sau web site hosting. Un studiu adecvat a detaliilor tehnice specifice acestui serviciu va demonstra că serviciul prin care sunt găzduite, deservite şi menţinute fişiere pe mai multe website-uri (webhosting-ul), reprezintă doar o categorie a hosting – ului, una dintre modalităţile de furnizare a acestui tip de serviciu. O altă confuzie care se creează în legătură cu hostingul provine de asemenea de la conexiunea acestuia cu conţinutul informaţional găzduit, furnizorul de hosting fiind confundat de cele mai multe ori cu un „content provider” adica „furnizor de conţinut” (conţinut informaţional). Studiul de faţă va identifica în primă fază webhostingul ca fiind doar una dintre posibilităţile de furnizare a serviciilor de hosting, urmând să fie demonstrat în continuare că ceea ce înseamnă webhosting nu coincide cu furnizarea de conţinut informaţional fiind mai degrabă un serviciu de comunicaţii electronice astfel cum este definit de Ordonanţa Guvernului nr.34/2002 privind accesul la reţelele publice de comunicaţii electronice şi la infrastructura asociată, precum şi la interconectarea acesteia, cu modificările şi completările ulterioare. 1. Serviciile de hosting – detalii tehnice/categorii Serviciile de hosting se împart în următoarele categorii: servicii complete de hosting, servicii de webhosting, servicii de hosting fişiere, servicii de game hosting (servicii de găzduire jocuri), servicii remote backup, servicii DNS şi servicii de e-mail hosting. O companie poate furniza în acelaşi timp servicii complete de hosting cât şi servicii de webhosting sau email hosting, şi acest lucru este destul de întâlnit, o astfel de afacere urmărind să acopere toate necesităţile clienţilor (toată cererea de pe piaţă) prin furnizarea unui număr cât mai mare şi complet de servicii.
    [Show full text]
  • Infrastructure for Secure Medical Image Sharing Between Distributed
    Infrastructure for Secure Medical Image Sharing between Distributed PACS and DI-r systems Infrastructure for Secure Medical Image Sharing between Distributed PACS and DI-r systems By Krupa Anna Kuriakose, B.Tech. A Thesis Submitted to the School of Graduate Studies in Partial Fulfilment of the Requirements for the Degree of Master of Applied Science in Electrical and Computer Engineering University of Ontario Institute of Technology Copyright c by Krupa Anna Kuriakose, 2013 Master of Applied Science University of Ontario Institute of Technology, Oshawa, Ontario TITLE: Infrastructure for Secure Medical Image Sharing between Distributed PACS and DI-r systems AUTHOR: Krupa Anna Kuriakose, B.Tech. SUPERVISOR: Dr. Kamran Sartipi NUMBER OF PAGES: ix, 114 ii Abstract Recent developments in information and communication technologies and their incor- poration into the medical domain have opened doors for the enhancement of health care services and thereby increasing the work flow at a reasonable rate. However, to implement such services, current medical system needs to be flexible enough to support integration with other systems. This integration should be achieved in a secure manner and the resultant service should be made available to all health professionals and patients. This thesis proposes a new infrastructure for secure medical image sharing between legacy PACS and DI-r. The solution employs OpenID standard for user authentication, OAuth service to grant authorization and IHE XDS-I profiles to store and retrieve medical im- ages and associated meta data. In the proposed infrastructure cooperative agents are employed to provide a user action, patient consent and system policy based access con- trol mechanism to securely share medical images.
    [Show full text]
  • Download Report
    Design and print sponsored by 2014 AT A GLANCE Since 1996: SimSimpleple 5 ststepep onlineonline 2014 vs 2013 repreportingorting 141,000 URLs removed globally ffoormrm Total Over 500,000 reports assessed 80,000 Public 2014 74,119 Proactive 2014 70,000 137% Public 2013 1. increase on 2013 IWF receives reports from 60,000 Total the public and proactively 51,186 searches for criminal content 50,000 50,587 in order to remove it. 100% 9% both In 2014 IWF was able, for the 40,000 Total Reports first time, to proactively search 9% boys 31,266 for child sexual abuse content 80% 30,000 resulting in 137% increase in 2. 9,133 criminal URLs found. IWF assesses all reports 20,000 Total strictly against UK law. 30% 13,182 60% Assessments include B 23,532 10,000 22,133 age, gender and abuse 80% 80% category levels. ≤10 girls 40% 0 Reports Child Child Reports PORTS processed sexual processed sexual E 43% abuse abuse . R 2 URLs URLs 1 . A 20% A S S E S 4% ≤2 S 0 All UK child sexual abuse URLs M Abuse Age Gender were removed within 4 days NT E category (years) E N 84% of URLs hosted T levels 5. T outside the UK are removed N REPORTING IWF works with the police O within 10 days C 100% and internet content hosts . PROCESS 90% to remove criminal content 5 wherever it is hosted in SPEED IS 80% the world. 70% EVERYTHING 3. 60% This ensures: G IWF traces the content N to its hosting location 50% • Prevention of abuse I investigations 4 C and contacts the sts police hildren 40% victims’ images being .
    [Show full text]
  • Welcome to the ALAI Questionnaire on Online Practices of Author-Identification!
    Welcome to the ALAI questionnaire on online practices of author-identification! The purpose of this questionnaire is to ascertain what author-identification practices are commonly used in ALAI National group countries when works are disseminated online. The results will be used to determine what it means for the name of the author "to appear on the work in the usual manner" (Berne Convention, art. 15) when the work is disseminated over online media. 1. Name and surname of the respondent: Stefanía Landaeta and Yecid Ríos 2. E-mail address: [email protected] 3. Which ALAI National group do you represent? CECOLDA (Colombia) 4. If your responses relate to more countries, please list them here: Colombia Photography and Visual Arts 5. Who are the most prominent photo/visual art sharing platforms or visual content providers in your region? On what other sites (including the authors’ own) do photographs and other works of visual art appear? Flickr: This is a webside of image hosting service and video hosting service. The images that the photographers upload to Flickr go into their sequential presentation of photos, the basis of a Flickr account. All the list or presentation of photos can be displayed as a justified view, of the achieve details. It’s available at: www.flickr.com Instagram: Is Platform to support several types of apps and services. The users of the website can to share their own content with apps or services. The Instagram Platform help broadcasters and publishers discover content, get digital rights to media, and share media using web embeds. It`s available at: www.instagram.com 1 Facebook: This is a social network that allows users to add other users as "friends", exchange messages, post status updates, share photos, videos and links, use various software applications (applications) and receive notifications of the activity of other users.
    [Show full text]
  • Driving Positive Change in Healthcare an Effective Enterprise Imaging Strategy Is a Key to Meaningful Use Table of Contents
    A Logicalis Healthcare Solutions eBook Driving Positive Change in Healthcare An Effective Enterprise Imaging Strategy is a Key to Meaningful Use Table of Contents The purpose of this eBook is to explore the six elements of a solid enterprise imaging strategy, and to highlight the most important considerations for healthcare organizations that are preparing to embark on this journey. Introduction: Putting Medical Images into the Right Hands...........................................................................................3 Governance: Establishing a Roadmap to Image Utilization...........................................................................................4 Storage: Native or Standardized? That is the Question...........................................................................................6 Acquisition: Shareability Starts before the Image is Captured....................................................................................8 Access and Visualization: Seeing Things Differently...........................................................................................................................10 Image Exchange: CDs: Acceptable, but Not Exceptional....................................................................................................12 Analytics: The Cornerstone of Meaningful Use........................................................................................................14 2 Introduction Putting Medical Images into the Right Hands Managing the mountains of images flowing into
    [Show full text]
  • Technical Challenges of Enterprise Imaging: HIMSS-SIIM Collaborative White Paper
    J Digit Imaging (2016) 29:583–614 DOI 10.1007/s10278-016-9899-4 REVIEW PAPER Technical Challenges of Enterprise Imaging: HIMSS-SIIM Collaborative White Paper David A. Clunie1 & Don K. Dennison2 & Dawn Cram3 & Kenneth R. Persons4 & Mark D. Bronkalla5 & Henri “Rik” Primo6 Published online: 30 August 2016 # The Author(s) 2016. This article is published with open access at Springerlink.com Abstract This white paper explores the technical challenges Enterprise imaging . Enterprise imaging platform . Enterprise and solutions for acquiring (capturing) and managing enter- Image Repository . Enterprise PACS . EXIF . FHIR . Image prise images, particularly those involving visible light appli- file format . Integrating the Healthcare Enterprise (IHE) . cations. The types of acquisition devices used for various Image compression . Image distribution . Interoperability . general-purpose photography and specialized applications in- Medical image sharing . Metadata . Migration . Multimedia . cluding dermatology, endoscopy, and anatomic pathology are PACS . PACS implementation . Photography . Vendor neutral reviewed. The formats and standards used, and the associated archive (VNA) . Visible light . Whole slide imaging . XDS . metadata requirements and communication protocols for XDS-I transfer and workflow are considered. Particular emphasis is placed on the importance of metadata capture in both order- and encounter-based workflow. The benefits of using DICOM to provide a standard means of recording and accessing both Scope metadata and image and video data are considered, as is the role of IHE and FHIR. This paper is one of a series of white papers on Enterprise Imaging developed by HIMSS-SIIM workgroups [1–6]. It focuses on describing and solving the technical challenges Keywords Anatomic pathology . Archive . Dermatology . of enterprise imaging, and does not dwell on the rationale Digital image management .
    [Show full text]
  • Stealthwatch V7.0 Default Applications Definitions
    Cisco Stealthwatch Default Applications Definitions 7.0 Stealthwatch® v7.0 Default Applications Definitions Stealthwatch® v7.0 Default Applications Definitions The table in this document lists the default Stealthwatch applications defined on the Custom Applications page in the SMC Web App. The intended audience for this document includes users who want a clearer understanding of what com- prises a default application that Stealthwatch monitors. In the table below, the number in parentheses after the application name is a unique identifier (UID). Application Criteria Name Description Stealthwatch Classification Port/Protocol Registered with IANA on port 629 3com AMP3 3com AMP3 (719) TCP/UDP. Registered with IANA on port 106 3com TSMUX 3com TSMUX (720) TCP/UDP. The Application Configuration Access Pro- tocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally ACAP ACAP (722) developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in sync across all clients. AccessBuilder (Access Builder) is a family AccessBuilder AccessBuilder (724) Copyright © 2018 Cisco Systems, Inc. All rights reserved. - 2 - Stealthwatch® v7.0 Default Applications Definitions Application Criteria Name Description Stealthwatch Classification Port/Protocol of dial-in remote access servers that give mobile computer users and remote office workers full access to workgroup, depart- mental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, net- work operating systems, and protocols to fit a variety of network environments.
    [Show full text]