Health Service Seminar:

Managing Your Health Service Intranet

Are You Prepared for Year 2000

Wednesday 4th June, 1997 - London Zoo, Regents Park, London

09.00 - Registration & Refreshments

09.45 - Year 2000 and the NHS

10.10 - Data Recovery and the Year 2000

10.45 - INTRANETS - The New Global Access Model

11.20 - Refreshments

11.35 - Printer Management Within Health Service Intranets

12.10 - The Application of Virtual Reality over Your Intranet

12.45 - Lunch & Exhibition

13.45 - Building Your Intranet

14.20 - Managing Your Healthy Intranet - "How to Achieve Dynamic Sites using a Web-Repository"

14.55 - JAVA Insecurity - Hostile Applets, Holes and Breaches.

15.35 - Finish - And time to Visit The Zoo

EXHIBITION

Virtual Reality - Virtual Exhibitions Ltd

Networking Hardware - Cisco Systems Ltd

Colour Laser Printers - Lexmark International Ltd.

Database Software - Computer Associates Plc

Data Security - Reflex Magnetics Ltd

Data Recovery - Ontrack Data Recovery

Projection Equipment - Reflex



T.O.S.C.A., Unit 1B, Station Buildings, Station Road, Gobowen, Oswestry, Shropshire SY11 3LX Telephone: 01691 670543 Fax: 01691 670868



Synopses of Presentations - Wednesday 4th June, 1997

"YEAR 2000 AND THE NHS"

Mr Michael Power - Corporate Purchasing Manager - NHS Supplies will discuss the Year 2000 and its implications for NHS staff.

DATA RECOVERY AND THE YEAR 2000

Modern business processes are dependent upon computers and necessarily more and more critical data is being stored and processed on systems. Data is susceptible to numerous risks and for myriad reasons it can be rendered inaccessible. Professional data recovery services can recover this data and also provide a valuable service in respect to the year 2000 problems.

INTRANETS - THE NEW GLOBAL ACCESS MODEL

As network user communities are spread more thinly across an ever-increasing number of sites, both large and small, the challenges of realising and managing this infrastructure become more complex. A variety of techniques are available to build such 'intranets', using the best combination of public Internet and private connections.

PRINTER MANAGEMENT WITHIN HEALTH SERVICE INTRANETS

Lexmark will discuss how emerging Intranet technologies can be exploited to rationalise printing requirements whilst bringing significant improvements in service to both end users and IT staff. Investing in the latest printer technology from Lexmark can bring real cost savings in printer consumables, a simpler approach for end users and substantial results in time spent by IT staff resolving problems and managing the printer inventory. Legacy and new client/server systems can all be addressed across high-speed hybrid networks with printer performance to match.

THE APPLICATION OF VIRTUAL REALITY OVER YOUR INTRANET

Health Service Intranets can now be managed using Real Time visualisation of the System using 3D techniques.

BUILDING YOUR INTRANET

Cisco Systems will give a view on some of the issues involved in designing, building and operating an Intranet.

MANAGING YOUR HEALTHY INTRANET - "HOW TO ACHIEVE DYNAMIC SITES USING A WEB-REPOSITORY".

It is essential to ensure that your Intranet is up to date, easy to use and attractive if your organisation to reap real benefit from it. Web-sites in general, Intranets in particular, grow very rapidly with many links and much new information. The average page is often a complex structure containing images, animation video and sound in addition to the text. It may also need to interface into your existing business systems (for example, your help desk system). Changing and updating a site can become an unpleasant grind but by utilising database technology as an Intelligent repository even updates or wholesale changes in style can be applied in a manageable manner.

JAVA INSECURITY - HOSTILE APPLETS, HOLES AND BREACHES.

It is estimated that 90% of web users are using JAVA enabled browsers such as Netscape and Internet Explorer. The impact of this statement is that the majority of users are blindly surfing the net and picking up other peoples code and running it untested on their own, or your systems. JAVA code is unique in that it does not require user intervention to permit its automatic download. There are many hostile applets available on the Net, ranging from being a nuisance to causing complete denial of systems resources. This presentation will demonstrate the extent of JAVA insecurity and the ease with which hackers using JAVA code can gain access to your system.