Monday, October 25, 2010

Quicktime send live streaming media RTP / RTSP


QuickTime streaming is to use real-time transport protocol (RTP, Real-Time Transport Protocol). RTP and HTTP, and FTP familiar file transfer protocol similar to, but it stresses the special needs of real-time stream.

And the difference is that HTTP and FTP, RTP does not need to download the complete video to the client computer. Instead of the small "lessons," a steady and continuous stream of data transmission lazy to ensure real-time playback (again first time, and data into the buffer needs HandShaking). Transferred to a minute of video data stream, will play a minute precision. If the connection has enough bandwidth to handle data streams, video will be played. After the data is displayed over, it will be immediately removed. If you want to look at the audience broadcast streaming services only to apply again.



Support streaming media network protocol

Real-time Transport Protocol RTP and RTCp

RTP (Real-time Transport Protocol) is used for Internet multimedia data streams on a transmission protocol. RTP is defined as the transmission in-one or one to many work situations. The aim is to provide time information and achieve synchronous flow. However, RTP is usually used to send UDP data. However, RTP can also be TCP or ATM and other protocols on top of work. When an application starts a RTP session will use two ports: one for a given RTP RTCP. RTP itself does not transmit data packets in order to access and provide a reliable delivery mechanism. Does not provide flow control or congestion control. It relies on RTCP to provide these services. RTP algorithm is usually not as an independent network layer to achieve. But as part of the application code. Real-time Transport Control Protocol RTCP.RTCP (Real-time Transport Control Protocol) and RTP to provide flow control and congestion control. In the RTP session, the participants periodically send RTCP packets. RTCP packet sent contains the number of packets, the number of lost packets and other statistics. Therefore, the server can use this information to dynamically change the transmission rate, even change the payload type. RTP and RTCP with use, they can effectively minimize the overhead of feedback and optimize the transmission efficiency. Therefore particularly suitable for real-time data transmitted online.

Real Time Streaming Protocol RTSP

Real Time Streaming Protocol RTSP (Real-time Streaming Protocol) by Real Networks and Netscape co-presented. The agreement defines a one to many applications how to effectively transmit multimedia data through the lP network. RTSP architecture located in the RTP and RTCP on top. It uses TCP or RTP for data transmission. HTTP and RTSP compared. HTTP send HTML. The RTP is a multimedia data transmission. HTTP request sent by the client, server response; use RTSP, the client and server can request that the RTSP can be both ways.






The following steps need to prepare for streaming:

* Makes the film a self-contained pre-recorded video for it, you need to decide whether to allow streaming video or video data itself contains contains possessions. His films include the film contains all the information. Video own territories included in the media orbit of other films, these films must be on the server. Its very easy to control that contains the video, should only be considered a file.

* Tip video streaming pre-recorded and live QuickTime video must be prompt. This means that each media track in the film prompted the establishment of a channel (in addition to QuickTime VR and Flash tracks, they are not streaming). Hint tracks with video, audio and other tracks are stored in the track with the film. QuickTime streaming service available to the needed software as a service to send packets of information ---- the size, the most effective protocol used, and how the video data to the entire network.

* Name the film
In order to have a good shuttle platform compatibility, identify a file to your system not the client's system files, or your browser's videos naming conflict.
Do not in its file name with spaces: "MyMovie.mov," not "My Movie.mov".
Some systems were feeling on the case. Make sure you name the movie with the correct URL link. Do not connect to the "MyMovie.mov" and to "mymovie.mov".
Often combined. Mov (QuickTime movie) file suffix to the movie name.

* Save Settings

Determine the user's settings are stored in the QuickTime movie in. You can use these settings to control certain aspects of video display. The following settings are in the QuickTime Player and QuickTime plug-in at work:
Half the size.
Double in size. Is the video with Sorenson or H.263 video decoder, the size of compressed video, which is a good movie in increasing the display size without increasing the data rate and file size.
Auto Play. In the QuickTime Player window to set this. Select the movie track from the top of the track, and automatically play. And the point of playing an effective monitoring.
The advantages of stream
* The only way to solve the live broadcast
* Can be broadcast or multicast transmissions (a data stream, many of the audience)
鈥?You can pre-recorded video random access
* Almost no hard drive to the audience
* Never be higher than the bandwidth demand
* Will not be left in the audience hard copy film
* Can be any of a streaming server in the streaming video sent into orbit
Stream have shortcomings
* Need a streaming server and / or transmission equipment
When the video data transfer rate is greater than the connection speed will be a continuous film.
* Missing data will not be recovered, often lost video data (often in the Internet on the dissemination of data will be lost, and in the local area network (Lan) will not be lost on the basic propagation)
* Get QuickTime can play some media types, such as QuickTime VR, Flash the wizard does not support streaming
* Because of firewall or NAT issues pause






相关链接:



Directory Dial Up And Connection Tools



Image Format headquarters



Shop Dictionaries Education



New accounting standards and tax law Differences on how to coordinate



OGM to AVI



Storage Games And Entertainment



RECOMMEND Puzzle And Word Games



MPG to AVI



[Death Spy: decision time] menu option to translate



Streaming Media Based On: What Is Streaming Media



"Nobunaga's Ambition 13 Heaven," the enemy in depth and around point reinforcements, waste Chaim



Source of value, the value of thinking small tree



oracle10g r2 emca command and examples of The



Fireworks 4.0 Zhezhao Daquan ---- Lesson region Zhe Zhao



QuickTime to MPG



XP And The Internet Can Not Solve The Time Synchronization



Wednesday, October 20, 2010

VBScript Month function



Month function

Between 1 to 12 return a integer (including 1 and 12), representing a month of the year.

Month (date)

date argument is any expression that can represent a date. If the date parameter contains Null, it returns Null.

Explain
The following examples use Month function returns the current month:

Dim MyVarMyVar = Month (Now)''MyVar contains the number corresponding to the current month.








Recommended links:



Do they only quick Ctrl + Alt + End defects more quickly shutdown



Picked Games CARD



Foxconn employees to work for a PERIOD of sudden death



5 bills PAID to foreign fixed up on the boss



Good Automation Tools



Pocket Electronic Translator As Our Assistant



Icons Shop



Younger's Quickstep



RM to AVI



First Financial Weekly: direct supply in the Shadow Of Digital China



MKV to PSP



Premier Religion



Jack Gao, became President of Autodesk China



AVI to FLV



Hong Kong Dollar 76 Million A Formal Decision To Auction 3G Licenses



Mr. Ma, please do not anger me



Wednesday, October 6, 2010

"Tomato Garden" case of first instance pronounced loss of Chengdu, a total of over 10 million soft



Ignited controversy last year, the "tomato garden" Internet piracy cases that come to an end. Reporter learned yesterday from Microsoft China, Suzhou City, Suzhou New District People's Court on the tomato garden to make first-instance ruling copyright infringement case, and the case Xiangguan Tomato Garden in Chengdu, a total of four soft Network Technology Co., Ltd. and the crime of copyright infringement related to the defendant to be punished section and held criminally responsible. Among them, the former station chief of tomato garden Hong Lei was sentenced to three and a half years and fined one million yuan, Chengdu, was sentenced to a total of Soft Networks confiscate the illegal gains and fines totaling more than 10 million yuan.

Pronounced: Chengdu were damaged network is not a small soft

One year later, the case of the first trial of tomato garden formal sentencing. Tomato Garden station in operation in the overall planning and control of business operations Sun Xianzhong tomato garden, was sentenced to three and a half years and fined 1 million yuan; original Tomato Garden station Hong Lei was sentenced to three and a half years, and fined one million yuan. The case of the other two defendants Tianping, Zhuo Yong Liang were sentenced to imprisonment for 2 years and fined 100,000 yuan.

Meanwhile, with the case were related to the soft network Technology Co., Ltd. Chengdu, was sentenced to 292 million yuan of illegal income confiscated and impose a fine of three times the illegal income, about 8.77 million yuan. Yesterday, the reporters on this matter and common software relevant persons, the other party that the current inconvenience to comment on the matter.

Sun Xianzhong one case the defendant, that the original soft-Network Technology Co., Ltd. Chengdu, president of Sun Yu, Tian-Ping Zhang and another defendant, it is soft and common office in the same floor with an office in Chengdu, red berries and Technology Corporation. It is understood, Chengdu were soft by the impact of Tomato Garden case, development was not a small effect. Previously, Sun led the implementation of soft rain and optimization of M & A master development team, which was once were the soft target fixed on the market, but now these have been shelved.

Guess: Microsoft To deter piracy win7

Last year, Microsoft launched in China within the large-scale anti-piracy operation, first chose a tomato garden "surgery." August 2008, in Microsoft's reported, the local public security department had seized the site, and the related suspects were arrested, has created a stir in the industry. Microsoft subsequently launched a series of anti-piracy measures, including a greater impact was the "black" event and so on.

The first instance sentenced the tomato garden, Microsoft will position it as "a declaration of China's largest Internet software piracy group's demise, is the network of China's crackdown on software piracy as a milestone." However, the case for sentencing tomato garden time, the industry has not less speculation. It is reported that Microsoft's next-generation operating system, Windows 7 will be officially listed in October this year, but the time recently on the market there have been pirated Windows 7 CD-ROM software. Some industry insiders believe Microsoft hopes the case's decision to deter those who will operate win7 the pirates.

The first response from the successful large-scale anti-piracy case

Yesterday, for the case of the verdict, the Business Software Alliance believes that this is China's first large-scale network software piracy against the success of the criminal case.

Shanghai Bar Association and Deputy Director of Intellectual Property Rights Committee Min key tour that reveals the Tomato Garden case of piracy, a new industrial chain, the chain in this industry, many companies parasitic on pirated software, pirated software through the download, use, direct marketing its software or services, such parasitic acts not only harm the interest of copyright owner also deprived the user rights of their choice related services so that users were forced to become a particular advertisement audience of piracy steel makers, and made huge illegal interests.

Background

Hong Lei exposes: how rogue software bundled with a monthly income of 100 000

Tomato Garden version of Windows XP on Hong Lei as the "tomato door" after imprisonment, Hong Lei a chat with friends online exposure recording, Hong Lei talking about the tomato garden in which the development process, relying on detailed analysis of the tomato garden rogue software bundled monthly income of more than 10 million profit model, and to disclose a modified version of XP operating system, many industry insider. Hong Lei said in the recording information, Tomato Garden's profit model has three types: a tomato garden Wang Zhan of the clicks on the ad; 2, Hong Lei through their web site provides landscaping package including XP, including software downloads, Zhe Xie a rogue software in the Kun Bang Software, Hong Lei, therefore two or three million profit per month; 3, through the pre-installed version of the rogue software, tomato garden, bring traffic to advertisers or registered users, more than 10 million profit this month.

Sound

Tomato Garden case

Confrontation and Law test of Chinese Internet users

After being detained in Hong Lei, Sina.com has launched a special investigation, more than 150,000 voters have 91.39 percent said "have used the" tomato garden or a similar modified version of the operating system; the answer "on your tomato garden regarding the detained attitude ", the support of tomato garden to 79.88%.

"About Bacheng of respondents support the tomato garden, can not say that they are right. Because Internet users with emotional factors, there are some people, on the understanding and awareness of intellectual property law is a superficial or even wrong." China University of Political Science Civil and Commercial Law Intellectual Property Law Institute Economic PhD supervisor, Professor Intellectual said.

It is understood that the price of a genuine Windows XP is over 1000 yuan, while a modified version of Tomato Garden CD prices, selling prices in major cities in five yuan to 10 yuan.

1 User message: "We strongly support the Hong Lei are, not because they are pirated Windows XP, but because we are stuck with Windows XP depth, Microsoft this' dealer 'too dark, in order to maximize their own interests, to the high prices to' deprived of 'mortal, and the poor in the cyber world' right to life '. "

An Internet celebrities think that the reason why Tomato Garden has been widespread interest because for many years Microsoft has not really against piracy, but the use of pirated software market share against competitors, "let you steal, etc. After you become addicted the future, we will come to collect the money. "

The "tomato" incident, Chinese Academy of Sciences Ni Guangnan author pointed out that no matter what Microsoft is for the purpose, we should all learn a lesson from this incident, to accelerate the licensed software. Software piracy on its own is far greater than the dangers the dangers of transnational software company. Although piracy reduced the income of multinational corporations, but also help them to maintain a monopoly position. China Youth Daily

Tomato Garden website

Is a on May 11, 2004 for domain name registration, the main provider of pirated software downloads, somewhat famous site in the country. Website of the allegedly infringing products cover a variety of domestic and foreign well-known software vendor, including the Business Software Alliance member companies of the products. According to unofficial estimates, Tomato Garden version of pirated Windows XP software installed capacity more than 10 million, so the group and the website also has been regarded as piracy Microsoft representative.







Recommended links:



Free movie downloads are they a scam



New UMPC Make Waves



Motorola recall: a beautiful MISTAKE



Easy to use Terminal And Telnet Clients



AWS Express, Turned Out To Yanhuang PCC Writing A New Chapter In BPM



Pipeline



Yuan Meng: Ubuntu 9.10 new version of the debut



FLV to PSP



To expose the fraud: WinRAR to compress 775MB 13.4MB



OGM to MP4



ADSL Slow Down And Eliminate The Causes For Eight Summary



Premier XML OR CSS Tools



Wizard Adventure And Roleplay



GIS work?



OGM To MKV



Struts framework in the Session object to create and Control



Saturday, September 25, 2010

Reflector decompilation tools



Reflector is a more powerful anti-compilation tools, I believe many of my friends have used it, but the reflector itself has many limitations, such as only one view of a method, but fortunately reflector support plug-in feature is online, many plug-reflector I took two applications to find a wide range, and the critically acclaimed plug-ins: Reflector.FileDisassembler and Reflector.FileGenerator and Reflector for the integration, on a compressed package, you can start using after decompression, which is not readily available on the Internet FileGenerator dll, I will remove it compile, on a compressed package, has been struggling to find a friend of this can be brought directly used:)

Click to download Reflector integrated compressed

The compressed package Reflector.exe has been upgraded to the latest 5.0 version, the specific use will not talk much, only a brief use of the steps in this archive:

First download and unzip the archive, run one of the Reflector.exe (main program), first run error dialog box will pop up, because the two plug-in DLL is referenced in accordance with the actual situation in my local configuration, so you need to the actual situation of your new profile look, very simple, we do get a quote FileGenerator.dll example

First of all, tell us Filegenerator, FileGenerator plug role: According to the dll file, the contents of the source file to export into a file, do not lead out of the file in addition to comments, variable names have changed, others can be said is no different. For some of the better control, if not open source, can exported into a file, and then add their own comments, a few amendments, well used up. (Not open source dll, is not at ease with them ah)

Specific initialization setting method: click on View-> Add-Ins ..., pop up a window, then click Add-> select the folder inside: "FileGenerator.dll", click close.

Then return to Reflector window, Tool-> Generator File (s) ... the right plug-ins appeared in the window, select the left side of the dll file, click on the right side of the export file, the source code to all the lead out!







Recommended links:



AVI to MPEG4



A flash drive to buy the real experience



South China Sea Hammer Properties Limited



BDA: FTTH can Not be placed on IPTV



CAD selection of an error in the orientation: emphasis on three-dimensional modeling, two-dimensiona



Baidu Xing, Tencent death?



Premier Vehicles - Screen Savers



Premier Search Or Lookup Tools



The Problem is with Chinese characters - five-stroke input



Wizard Icon Tools



Nokia's enemies



Brief Server Applications



VBScript CLng function



MPG to Flash



Tim color Preserved fragrance venosa



VOB to Flash



firewall can not replace the intrusion Detection



Thursday, September 16, 2010

Understanding of EIP



Great variety of online activities and a variety of online way to make our lives more convenient, more colorful, but the enterprise, this change brings the work in the convenience, while still more and more more pressures: on the one hand customers the products and services to enterprises put forward higher requirements, on the other competitors are developing rapidly through the network, try to re-divide the market. At the same time, due to the development of Internet, the emergence of new markets has triggered a new "enclosure movement." Famous Chinese web portal Sohu CEO Charles Zhang companies established in the past two years, he asked about the most prominent feeling, Charles Zhang answered only 4 words: "worry."

This can be summed up in 4 words seem to global business in recent years, the survival and development in the common feeling. If the emergence of computers and networks only for enterprises with more advanced means of production, then the popularization and development of Internet fundamentally changed the business from survival, competition and development of the overall environment. Internet has come a shock wave is so strong that no business can survive on. The disintegration of the past two years the global corporate, restructuring, mergers and acquisitions have closed down and, while a large number of new businesses springing up as fast through the Internet, such as the emergence, rapid impact and occupation of the new and original are the traditional large enterprise market. As the steam engine invented 200 years ago led to mass production society characterized by the Industrial Revolution, today at the turn of the millennium the Internet is creating a major development characterized by a highly interconnected living environment, and new corporate mode of operation. Internet is increasingly global business, customers, suppliers and cooperation partners closely linked, with a new Fu Wu, coordination and operation of creating the new business economy. This new business economy, is the world's leading database provider Sybase products and solutions company called "Internet Economy (ConnectedEconomy)".

Referring to bring about a major event, people often quote a poem by the Tang poet Xu Hun: "Rain Comes from Wind." Now is not the "atmosphere of" time. Online bookseller Amazon.com leap up in the red within a year, PC makers Dell direct sales through online personal PC has been ranked the world's second-largest maker of digital ... successful example at hand. The other side of success is a failure, more and more enterprises in the "worry" attitude in a positive adjustment, waiting in the wings, to prevent being squeezed "out."

Most businesses have recognized the importance of Internet, see the Internet age and even the arrival of Internet economy. Business Internet access, e-commerce, online marketing, the popularity of the concept proves this point. Although there are still online authentication, network security and electronic transactions such as the development of the obstacle, but large number of enterprises active preparations, exploring the way forward in 绮剧 is absolutely correct.

However, there are very real difficulties, but also a large number. Online authentication, network security and online transactions more obvious imperfections are just a few examples, more important is the network size and popularity remains to be greatly improved, the cost to be further reduced. But time waits for no business problems now is that when the barriers one by one were excluded, the Internet economy to full-depth avalanche potential to come, companies are doing well prepared?

The answer is very simple, that is, seize the time, the first practice, "Strength", that is quickly establishing and improving the enterprise information portal (EnterpriseInformationPortal, called EIP).

Enterprise Information Portal Sybase, this concept is strongly advocated. Sybase, noted that the current business should the various existing enterprise systems and integrate resources, to an enterprise private enterprise portal site in the form of all employees, customers, suppliers and partners all the information necessary from and services.

To do so for three reasons:

First, while e-commerce features to the overall Internet economy take some time before the arrival, but the popularity of Internet and business competition has made into the business than service, more than speed, than the quality of the new customer-focused period, while the use of enterprise information portal can business and customers, business partners and suppliers and closely linked to fully tap the business potential and lower operating costs, providing the enterprise's market competitiveness.

Second, most of today's enterprise information system have already experienced from the office automation (OA), enterprise local area network (LAN), enterprise wide area network (WAN), management information systems (MIS) to the enterprise Internet and set up a business Web site, stage, information systems within the enterprise has complete basic development, to integrate them in some way, and unity is "ripe", but also a priority.

Third, Sybase, led a series of enterprise applications and solutions have been or will soon launch a large number of enterprise information portal to help companies build products and solutions, enterprise information portal has been established that there are no technical difficulties, such as Sybadse company recently introduced ybaseAdaptiveServerEnterprise (ASE) 120EnterpriseEventBroker is one of the two "portal-ready (PortalReady)" products.

Since the establishment of enterprise information portal is ripe, the world's many companies have started or are preparing to set up their own enterprise information portal. American consulting firm DelphiGroup recently told the Global 800 enterprises in the survey, found that 55% of the surveyed enterprises have already started the construction of enterprise information portal, 18% of the companies Zheng Zaizuo Zaoqi the preparatory work while 16 percent of enterprises enterprise information portal has been put to use.

DelphiGroup survey showed that companies build enterprise information portals climax is coming, and the world's largest financial management and advisory firm MerrillLynch more to the construction of enterprise information portal to enterprise information technology to improve the construction and investment direction of a high up. MerrillLynch forecast in a report, business investment in information technology, construction and the next high tide will appear in the enterprise information portal, to 2002, global business in this total investment will reach 14.8 billion U.S. dollars.

Internet economy at hand, and enterprise information portal is the door to enter the Internet economy. Let us grasp the opportunity, in the turn of the millennium opened the enterprise information portal that the door to the future fan, proudly into the future.

EIP Enterprise Information Portal:

Enterprise Information Portal EIP As the network economy, are increasingly focusing on timely delivery of information and internal, external direct communication, but also faced this problem: employees, between companies and between all partners and customers need more forms of information exchange, how the simplest way to provide information internally and externally? The company of many different departments and employees have a large amount of data, how to know the different characteristics of their data and appropriate information to those most in need? Enterprise information portal is set up to solve this problem.

EIP is an enterprise of all applications and data into an information management platform and a unified user interface to the user, so that enterprises can quickly build business to business and enterprise information portal for internal employees. EIP is a Web-based system, it provides the distribution of users throughout the business information to help users manage, organize, and query and enterprises and departments related information. Internal and external users only need to use the browser can get the data they need, analysis reports and business decision support information. The emergence of EIP is to meet the growing demand for business if you need more efficient use of corporate resources and information Zi Chan Shu Ju must ensure Neibu and Waibu of Mei Dunengfangwen a user to information.

With the enterprise using a variety of applications, enterprise data began to grow at geometric progression. These data are usually sealed in the enterprise database, host, file server, only a small number of licensed users access to see the data. The emergence of the Internet company to face a flood of information, and to derive some value. Therefore, enterprises need now is an offer for the business organization, search and access valuable information real solution. EIP will enable enterprises of all types of users, including internal employees, partners, suppliers and customers to provide personalized information search, access and analysis capabilities, to help them through effective use of enterprise information assets to make the best business analysis and decision making.

Enterprise Information Portal has the following characteristics:

1. Unified information access channels: through various internal and external independent information relative dispersion to form a unified whole, so that users can access from a single channel of the information they need to optimize business operations and achieve the purpose of increasing productivity .

2. Uninterrupted service: reliable network and security mechanisms so that users at any time, anywhere can access corporate information and applications to ensure the business operation of enterprises will never stop, the network advantages of operating at the extremes.

3. A powerful content management capabilities: the ability of enterprises of all types of information processing EIP supports almost all kinds of structured and unstructured data, can identify more than 90 kinds of relational and OLAP data in a database and can search and process documents in various formats.

4. Personalized applications: data and application information portal can be set for each individual's requirements and offer customized a personalized application portal, improved staff productivity, enhance customer affinity and attraction .

5.'s Integration with existing systems: can the existing enterprise data and applications seamlessly integrated together, without the need to re-development, protection of the original investment.

6. A high degree of scalability: to adapt to the new company and sector adjustment changes, restructuring and expansion to meet enterprise business requirements, IT departments to solve business and technical needs can not be solved within a short time.

7. Safe and reliable security: The security mechanism to ensure data confidentiality and integrity, to protect the normal operation of their business. EIP can provide security mechanisms including authentication, role assignments, user and group privileges, user action monitoring, and specialized B2B security server to establish a secure channel and so on. EIP security mechanisms can be applied to the financial sector, judicial system and business enterprises.

From the above we can see, enterprise information portals on the one hand can increase the efficiency of internal work and reduce unnecessary costs and resource use, enabling businesses to focus on new business development. On the other hand the enterprise and external exchanges and cooperation more efficient, with customers and partners to build a better interaction, resulting in fast-paced, competitive environment to maintain a leading competitive edge.







相关链接:



Introduction Games And Entertainment



e-cology in the Pan Micro Series 29



Striving to be China's "Shipbuilding City", on the shipbuilding industry along the Yangtze River



Hot Standby knowledge



what IS rmvb



Using warm and intimate small music prompted the fish that you're familiar with the music fish



Avi ps3



Low back not JUST a cheap PC



Quicktime for iphone 3g



jsp, servlet talk about Chinese ISSUES



Three anti-monopoly law enforcement departments, year introduced several new deal soon



CCO another year Fruitful



Shop Languages Education



psp M4V



Wednesday, August 4, 2010

"Two-way referral" good medical care recovery mode



The current health care sector parties generally agreed that community hospitals to address "medical treatment is difficult and expensive," the issues. The use of information technology to strengthen community health care management, promote large-scale hospitals and community hospitals between the "two-way referral" is an effective way to improve service levels and useful exploration. Now emerged around the country are many large hospitals and community hospitals between the "two-way referral" model which "restoration mode" is especially noteworthy. Rehabilitation hospitals also received from so many countries to visit the medical profession and the exchange of experience. So, rehabilitation hospitals, "two-way referral" model in the end how? How is the management? IT tools in which what role play? With these questions, head of China's Information Network reporter recently visited the Renaissance Hospital Information Centre Song Yan.

"Renaissance mode" to benefit the 13 million people

Beijing Fuxing Hospital and community health centers on the altar of service constitute the 130,000 residents of the community health service network. Currently, the community has basically realized the "minor illness in the community, serious illness to hospitals, rehabilitation back to the community" for residents to provide medical treatment and health management convenience.

Yuetan Community Health Center is a subsidiary body of Beijing Fuxing Hospital, consists of 10 community health service centers, covering an area of 4.14 square kilometers. 10 community health service stations are small, some large with three general practitioners and three general nurses, while a small two doctors and two nurses with.

Each service station are equipped with doctors and community health management system workstations, the current health service stations of different data-sharing also can not be achieved, but the station has achieved health records and electronic prescriptions. Under a doctor's prescription after the charge office and the pharmacy can check the patient's medical record number to the prescription of the content. Technically, patient payments, obtaining medicine are paperless.

In fact, doctors still have to be equipped with a printer to print out prescriptions, and paid even after the seal. "This is mainly because there is no legal validity of electronic signatures." Yan Song explained: "The patients need a prescription as a medication guide."

Many years behind the success of

Song Yan believes that hospital information must serve the business needs of the hospital to better serve patients, clinicians provide better service and technical support, such as patient data collection for medical research, clinical services provided technical support.

Rehabilitation hospital information construction also experienced a long period of development, according to Yan Song presentation of information from the rehabilitation hospital to start planning for information technology by the end of 1994 - Construction of HIS system. Prior to this, more decentralized management of rehabilitation hospitals, and insufficient use of information technology for clinical and research services.

The end of 1994, started the whole hospital information system demonstration, and made an overall design scheme, building an information platform. After six months of system development, in the July 1, 1995, including hospitalization Department official running, nurses stations, drug stores and charges in the number of subsystems, or the DOS system was used. After two years of debugging, running, in 1997, the system has been recognized by experts in various fields.

From the time point of view, the cost of patient information to achieve the network management. Directly to the network received a single ward, and an access is 26 wards of view, Beijing Fuxing Hospital is the first.

In 2000, the Hospital of the DOS system was upgraded, and the system has further expanded its capabilities, from development to management of patients on the outpatient management. In 2001, the system from DOS to upgrade to the Windows operating platforms. At this point, considering the hospital's internal accounting (all aspects of income), statistical functions have gradually entered the system, and includes the Health Bureau and other higher authorities asked the network reported also connected to the system.

In addition, the health insurance management at this time also gradually embedded in the system. Medicare's "Sharu" HIS system to increase the number of workload. Because they do not simply see a doctor, also includes paid health insurance, hospital information center staff to actively consider the adoption of information systems to meet the medical insurance management system, including increased monitoring, statistics, tips and other functions, greatly facilitates the accuracy of medical advice nurse input .

As the rehabilitation hospital medical insurance management use of information technology work, Bao Zheng the management of timely and accurate, Medicare Zhongxin Beijing 2005 Zuzhi 16 hospitals to rehabilitation hospitals Shen Guan, Chongfenxuexi reference information Jitongruhe Peigeyiliao Bao Xian Jin Xing management of work experience. The management and monitoring rehabilitation hospital information system is more distinctive construction of a module is developed independently by the hospital, the cost of real-time monitor the occurrence of subjects, including the ratio of the current drugs, the average hospitalization costs and other information.

In addition, another more unique hospital infection control module can monitor the situation of hospital infection, including infection, infection and drug susceptibility testing and infection information. Doctors through information technology can directly access the patient from the system information, observing the patient's drug sensitivity, and then under the control of the target, using computers to analyze the data, thus solving the original record of the inconvenience of manual greatly increase the work efficiency.

"Minor illness into the community, serious illness to hospitals, serious illness out of the hospital to return to community" planning ideas, the following main advantages: on the one hand to take advantage of modern network technology, communication technology, control technology and some medical equipment terminal , will extend services into medical and family, personal, maximum expression of these services in a timely manner, at any time, interactive, so that the inhabitants from the time, geographical constraints, can fully enjoy the medical and health services; second, convenient and standard method of collecting patient data, and through higher hospital electronic medical records and interoperability, to share patient data for the next clinic to provide help; Third, support and other remote systems such as transmission between electronic library, preventive use of data for research, and timely detection of cases.

Digital hospital is the most advanced IT technology fully used in the healthcare industry, the core is around access to health services for each person, the whole community health resources and a variety of medical services, such as hospitals, specialists, community health care so connected, integrated into a complete system, to improve the community health service efficiency, reduce operating costs, better serve the community. Rehabilitation hospitals, community-based medical services building, making every community residents really enjoy the digital hospital convenient to them.

Further improve the policy support needed

Song Yan believes that the construction of hospital information services in promoting health care quality and level of enhanced policies and legal systems need to support levels. For example, the promotion of electronic medical records issue is not only to electronic medical records electronic medical records, but also to monitor the quality of medical services, but also from the perspective of the patient, but that patients can learn from the electronic medical records in a number of relevant information in order to better serve patients.

However, the existing legal and institutional lags far behind the application of new technologies, such as electronic patient medical records in the event of a dispute do not have the force of law, hospitals have to secure, in the electronic process must also be parallel with the paper records. To some extent, restricted the application of electronic medical records in depth.







Recommended links:



Interpretation Serv-U user attributes "Account"



Dell's Earnings Report Late Three Times Or Face Nasdaq Delisting



First Financial Weekly: direct supply in the Shadow of Digital China



Haier to Beijing and then become suddenly troubled PC Business



Flac To Mp3



.mkv files



mp4 3gp video converter



Mkv



JSF to pass parameters via URL



Top RELIGION



CorelDRAW BASED cartoon series (2)



My favorite Animation Tools



Recommend Graphic



Learning Centers: RHCE exam on the 30 main directions



China's auto parts face "External and Internal" situation



Monday, July 12, 2010

"Festival" behind the plot


Festivals are always worth the wait value. For children, it means a gift; for adults, it may mean to relax and reunite with their families; for computer viruses, it means waiting for the opportunity to deliberate, because during the holiday season, is the virus attack the good old days were quiet ... ...

1. Happy New Year virus - heavy "red packets"
Happy New Year! Close family friend, the dealings with business partners will take advantage of each other a happy New Year. Who would have thought, however, this sentimental exchanges will be breeding grounds for viruses? Every New Year period, one called "Happy New Year" of the virus will be rampant everywhere, carrying the virus e-mail to "Happy New Year!" As the theme, and contains a file named "happynewyear.txt.vbs" Annex . Once the attachment is opened, the virus will enter the user's computer system, in the system to open a "back door." Infected computer will automatically e-mail software to Microsoft Outlook address book to send all the e-mail borne viruses.
Another Reeezak virus belongs to Zacker virus family. It is also to "Happy new year (Happy New Year)" for the e-mail name, attachment to
"Christmas.exe". Carry the message of this virus looks like a holiday blessing card, but when you open this card, your Windows system will have been a fatal blow.

2. Valentine's Day virus - "love" you not discussing
During last year's Valentine's Day, a tennis star Anna Kournikova posing as electronic photo rampant virus in North America and Europe. The virus can be spread themselves so that companies e-mail server to its knees. The virus usually is based on the form of Outlook e-mail attachments. Attachment name is "Annakournikova.jpg.vbs". Contains the information: "Hi: Check this!". When your message appears in one of the following three topics should be alert: "here you have"; "here you are"; "here you go".
There is also a game disguised as Valentine's Day virus, called "Guessgame", which allow users to holiday, lightly, that is the game, the result of a run would be infected. Carry this virus of the message subject is usually "Are you my valentine?" Annex "GuessGame.html" or "GuessGame.vbe".
Valentine's Day really is a festival of particular concern, because before and after the festival, from the Japanese "White Day" virus will be rampant. Virus Name W32.FBound.gen @ mm. Subject of the message is random, usually some Japanese idioms, or the subject is "Important" (important). Annex called "PATCH.EXE".

3. Virus greetings - the devil angel face killer
Called "laughing", the new virus (Worm.Shoho.110592, alias "w32.Shoho.a @ mm" or "w32/Welyah.A @ mm") is usually a nice picture as a stepping stone, but also Complimentary sweet holiday greetings. To deal with this way, "beautiful flower" and "vicious heart," the e-mail, or to be extra careful.
There is also a happy holiday and so on to the theme of the virus is everyone scared of the "cover letter" virus in Chinese. The information in this virus is Chinese, for Chinese users are more seductive. Virus by 163.com, 163.net, 263.net, sina.com, china.com, citiz.net's mail server to send mail, e-mail addresses randomly generated by the virus. Messages with a. Exe or. Vbs file. . Exe file that the virus itself,. Vbs script virus, which is included. E-mail title is usually "I love you!", "Hello", "Congratulations!", "Happy holidays" and "You won the lottery," "your friend", "reunion", "Happy Birthday to You" "Your friend sent you a greeting card" and so on. HIV virus with the script file changes the browser home page for a university website, and the next generation in the Windows directory called Win32Dll.vbs and MSKernel.vbs two virus files, so next time you start your computer can automatically load this script virus. At the same time, the virus can automatically find the local drives and network drives, all. Exe,. Dll,. Dat,. Mp3,. Doc files for deletion.

4. Party photo virus - like braving the "danger" to see Why?
It is always dull evening social and recreational life of the festival. To see party photos, right? Do you think you can see is that exciting moments, actually, you probably have got this, life and life infected with the virus! The virus called "W32.Myparty @ mm", the theme of "new photos from my party!" Annex "www.myparty.yahoo.com".


5. Merry Christmas virus - Happy Terminator
Christmas is the end of the year, but do not let "Christmas" virus to all your end. "Santa Claus" virus is prepared by the North American Spanish, is a worm. "Christmas" virus "navidad.exe" as an attachment through Microsoft's Outlook software as an attachment in the form of communication, then all of the inbox marked as "unread" e-mail sender to send mail. Repeat forward, resulting in a wider spread, once the attachment is executed, the virus attack. Computer infected with virus, the virus will modify the registry and Windows system directory under the executable program, cause the computer system can not run most programs.
Beautiful lies to the festival covered with shadow, loss regardless of size sufficient to give holiday cheer gone. In a relaxed holiday mood to wait for people, ah, the face of e-mail, but should be alert twelfth!

Beijing high







Recommand Link:



X-Cloner Blackberry Converter



Youtube To PDA Suite



.mkv file



Easy To Use News Servers



Video to 3GP Converter Free DOWNLOAD



matroska video file



Swift ASF AVI MPEG to DVD



PC Satellite TV Pro



Converting mov to wmv



Happiness MPG to AVI



Review Flash Tools



Youtube FLV to EPOC Platinum



Avi to mp4 converter



Top Clipboard Tools