The RAHN™ architecture uses e-mail and spreadsheets in truly remarkable ways that accelerate value by:
This page briefly describes how the RAHN™ architecture works and lists its unique set of benefits and advantages.
The RAHN™ architecture consists of next-generation desktop applications (apps) that exchange data across the Internet through networks of desktop nodes.
RAHN™ Desktop Apps: Data File Production, Consumption and Presentation
RAHN™ desktop apps use a proprietary method to collect, analyze and store unlimited amounts of health data in each patient record. The apps obtain and integrate any types of data in any formats from any sources and perform all required of data analytics. They organize this information in report-ready data files, which they store locally. Upon request, RAHN™ apps retrieve and transform these data files—immediately, anywhere and anytime—into dynamic/interactive personalized reports; they can also export data from any data files to databases and other data stores. They do all this offline using local computer resources.
RAHN™ apps leverage our patented CP Split™ software method (see the CP Split™ technology site
). This underlying technology uses automated spreadsheet templates to produce, consume and render (format & present) the data files.
RAHN™ Desktop Nodes: Enabling Asynchronous, Pub/Sub, Email-based Communications
To transmit the data files from place to place, the RAHN™ architecture utilizes desktop nodes. Each node is a software program residing in a computer (including computerized devices) that manages data file transmission. The nodes communicate asynchronously through publisher/subscriber (pub/sub) connections using e-mail.
RAHN™ publishing nodes automatically encrypt data files produced by RAHN™ apps, attach the files to e-mails addressed to their authorized subscribing nodes, send e-mails and track their delivery. When the RAHN™ subscribing nodes receive the data files, they automatically store them locally in a predetermined folder.
Using e-mail to transport RAHN™ data files over the Internet via e-mail requires authorization and authentication of the connected nodes. At one end of the connection, the publishing node must authorize the information transfer by authenticating that the subscribing node is allowed to receive the information. At the other end of the connection, each subscribing node must allow the publishing node to deposit the information in an accessible place.
The result is a long list of benefits and advantages presented at this link