Feeds

NHS N3 network over hurdles

Claims Granger

HP ProLiant Gen8: Integrated lifecycle automation

The head of Connecting for Health has said that the NHS broadband network is now over its delivery problems.

Richard Granger was speaking at the Healthcare Computing conference on 21 March 2006.

In his update of progress on the NHS National Programme for IT he cited the installation of the N3 broadband network as one of the success stories to date.

There have been severe difficulties with the provision of the network with broadband connections often too slow for clinicians to access data and the Connecting for Health (CfH) programme issuing penalty charges to supplier BT.

But in his keynote address, Granger told delegates that the system has now been widely installed and is running successfully.

"It has happened quietly," he said. "We've gone from having big delivery problems with N3 to most GP practices having a connection.

"The job did get done very quickly. It is the largest virtual private network deployed in Europe and has been a quiet success. There were some service outages and things to deal with but it has become a high availability and in some cases ubiquitous network."

Granger also claimed successes in early implementation of the Choose and Book system for GP referrals to secondary care. He said that it is now being used for about 4,000 bookings per day and that the figure is growing.

"Despite the perception, most of the NHS has some inventory loaded onto the system and users can access it and make bookings," he said.

He also claimed notable progress in the e-prescriptions system with 279 active locations and approximately 558,000 prescriptions transmitted.

Granger acknowledged that there have been several problems in the development of Picture Archiving Systems (PACs) but said it has been successfully deployed through much of the southern cluster and that he hopes this will soon be translated to other regions. Overall, he said one PACs system is being installed each week.

Looking forward Granger said CfH will spend the next year looking at speeding up the internal reporting and publicising of installations.

"Over the next year we want a measure that is more near real time of what is going on with installations. Data on this is currently a week or two old."

This story was originally published at Kablenet

Kablenet logo

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.