Analyze the following case taking a con approach to their

Assignment Help Management Information Sys
Reference no: EM13358132

Analyze the following case taking a con approach to their practices.

Mayo Clinic Turns to Game Processor to Save Lives

The Mayo Clinic and IBM have partnered in a venture to improve medical imaging technology. The clinic's current technologies aren't keeping up with the intense processing demands required to analyze digital medical images such as x-rays, CT scans, and MRIs.

You've learned in this chapter that transistor densities on a chip double roughly every two years, a rule of thumb referred to as Moore's Law. Bradley Erickson, chairman of radiology at the Rochester-based Mayo Clinic, was quoted in Computerworld as saying, "We are facing significant problems in medical imaging because the number of images produced in CT scanners basically tracks Moore's Law. My eyes and brain can't keep up. I see more and more images I have to interment....The innovation here is to take computer chips and extract the information in these increasing number of images and help present it usefully to the radiologist."

This is a case of technology outpacing the human ability to mange the information it produces. In such cases, we turn to technology for solutions. For doctors and radiologists at the Mayo Clinic, a standard computer processor cannot keep up with their need to analyze digital images. So they are turning to the Cell processor from IBM in hopes that it will provide a solution. The Cell processor is the chip that makes Sony's Play Station video-game consule the most powerful console in the industry, according to many game enthusiasts. The Cell processor was created in a joint effort by IBM, Sony, and Toshiba, with an architecture that is specially designed to accelerate graphics processing. Researchers at IBM and Mayo believe that it could turn a 10-minute CT image analysis into a four second job.

One of the tasks in which the Cell processor could be useful is in comparing scan images of a patient over time. For example, to track the progression or regression of cancer in a patient, physicians compare CT scans of the tumor over time to look for change. Changes are often too subtle for the human eye to notice, so software that implements a complex algorithm is used to analyze the photos. Using a standard PC processor, the algorithm may take several minutes to complete. While this may not sound like much, typically a physician needs to run several analyses in sequence, consuming significant amounts of time. The process of transforming 2-D images into 3-D something the Cell processor was designed for also requires significant time using traditional processors. With the Cell processor, these tasks might be completed in a matter of seconds.

Mayo Clinic and its effort to speed up the analysis of image scanning illustrate the importance of time when it comes to processing. Whether it's working to save a life, to finish design specifications for a new product, or to analyze stock market trends, the difference between a minute and a second can mean success or failure. For professionals in most industries, having the best processor for the task at hand, and matching it with the best hardware and software, provides them with a winning solution.

Reference no: EM13358132

Questions Cloud

Important information about information technologywhat does : important information about information technologywhat does the future look like for hcit in terms of software
Cad technology versus drafting techniqueswhat kind of : cad technology versus drafting techniqueswhat kind of benefits are marine companies achieving by using cad technology
Secondary informationresearch must thus be in line with : secondary informationresearch must thus be in line with company goals and aspirations at all times. testing may be good
About the relationship between drugs and crime : What are two conclusions that researchers have reached in recent years about the relationship between drugs and crime.
Analyze the following case taking a con approach to their : analyze the following case taking a con approach to their practices.mayo clinic turns to game processor to save
Successful deployment of digital dashboardslist and : successful deployment of digital dashboardslist and describe three strategies for successful deployment of digital
Question about computer crime challenges and security : question about computer crime challenges and security issuescomputer crime has become a serious matter. can you help me
Data collection technologydo you think with the advent of : data collection technologydo you think with the advent of todays data collection technology that we can have too much
Discuss a good way to make strategic information or any : discuss a good way to make strategic information or any market information available to the internal stakeholder groups

Reviews

Write a Review

Management Information Sys Questions & Answers

  Areas of technology risk management

What are the best practices in the areas of technology risk management

  Design and development for accountants

Update customer form created and update project form created - Information Systems Design and Development for Accountants

  Information systems and software applicationsresearch

information systems and software applicationsresearch software applications and information systems available for the

  What is understand by the human factor

What is understand by "the human factor", and why is this important

  Should information on the internet be unrestricted and why

Important information about Should information on the Internet be unrestricted - Should information on the Internet be unrestricted? Why or why not?

  Documentationin terms of software development and sdlc how

documentationin terms of software development and sdlc how important is documentation? how much of a system should be

  1 using the jobs characteristics approach how motivating do

1 using the jobs characteristics approach how motivating do you think the job of a typical employee is in this

  Information security is an expensive and difficult

Draw the line on what is sufficient and what steps do you take to determine where that line is? Explain

  Biggest hesitations to e-business

One of the biggest hesitations to E-business is the potential security threats. As an IT-manager what steps would you take to ensure your businesses online system was safe for customers to use

  Post addresses web 20 technology and related issuesdescribe

post addresses web 2.0 technology and related issues.describe where term web 2.0 or web 2.0 technology originated and

  Have organizations prepared for the baby boomer exodus

Have organizations prepared for the baby boomer exodus - How would you describe the organizational readiness for this baby boomer exodus within an organization

  Packets routers and ip addresses

Packets, Routers and Private vs Public IP Addresses - The solution shows packets, routers and IP addresses. In terms of security, private IP address is favored over public IP address. However, Public IP addresses is favored in terms of commercial b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd