MicroMed

PUsing Technology to track and maintain your health.
Cloud Computing
Using Cloud technology to allow you the patient to communicate with your Doctor in real time. To have the ability to ask questions and update them on your vital information.
Security
We use secure programming and security technology to protect your medcial records and all your personal information. We follow tight HIPPA laws and keep your information safe.
Mobility
The mobile section of the app is designed to keep you updated while on the go. You can stay in contact with your doctor though text, email or skpe while on the move.







1. Managed HealthIT Apps
2. Track vital signs
3. Cloud Computing & connectivity
Helping you manage your healthcare.
No longer would the doctor have to take your word for your readings when he could pull them up himself. Before appointments you now have the ability to send all data to the doctor’s office before you get there even updated medications and lab work. The purpose of this project is to provide out patients with a way to communicate with their doctors, track their medical records and provide their doctors with important vial sign information without an office visit and the patient paying a co pay.
Mobility

Cloud Computing


Security

Health IT connecting patients and doctors through technology.
​
​Mobility This system can be used with your cell phone or smartphone to update your physician of all your vital signs in real time. Every function that can be used from computer can be used from smartphone over the cloud.
Cloud Computing Network-based services, which appear to be provided by real server hardware and are in fact served up by virtual hardware simulated by software running on one or more real machines, are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object.
Security Network security starts with authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name, the password this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used, an ATM card, or a mobile phone; and with three-factor authentication, something the user 'is' is also used a fingerprint or retinal scan. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis.