Technical Requirements

GEHRIMED is a web-based software service using the enhanced security and cost effective scalability of cloud deployments. A small installation of software onto a client device manages access to the service. This installation detects the client software environment and performs access security validation and optimization based on its environment.

Customer Supplied Software and Hardware

Access to GEHRIMED requires a client-based software installation on a desktop, laptop, or iPad, with current third-party software requirements and hardware recommendations defined in Table 1. Both the web-based software and client software are frequently upgraded to align with evolving software architecture and security standards, and may require updates to customer devices to reserve adequate security and HIPAA compliance. If these requirements change, notification to the Practice is provided as quickly as possible so that customer-supplied software and hardware may be upgraded. If a GEHRIMED problem is isolated to the area of third-party software or hardware, the customer is expected to consult a third-party service for additional support and service.

Table 1: Customer Supplied Software and Hardware Requirements

OPERATING SYSTEM REQUIRED SOFTWARE REQUIRED* HARDWARE
/ SERVICE REQUIRED*
Windows (PC) Windows 7, 8, 8.1, or 10
  • Internet Connection
  • 2.4 GHz Dual Core Processor
  • 4 GB System Memory (RAM)
  • 1 GB Free Hard Disk Space
  • 2 MB Processor Cache
iOS (iPad) iOS 10 or later
  • Internet Connection
  • iPad, 4th generation (2012)
  • iPad Mini 2 (2013)
  • iPad Mini 3 (2014)
  • iPad Mini 4 (2015)
  • iPad Air 1 (2013)
  • iPad Air 2 (2014)
  • iPad Pro (2015)
MacOS Sierra or later
  • Internet Connection
  • iMac: Late 2009 or newer
  • MacBook and MacBook Retina: Late 2009 or newer
  • MacBook Pro: Mid 2010 or newer
  • MacBook Air: Late 2010 or newer
  • MacBook Pro: 2010 or newer
  • Mac Mini: Mid 2010 or newer

*Required for Optimal Performance and Functionality of the GEHRIMED App. In the event that a User experiences technical difficulties with GEHRIMED and the required hardware/software specifications are not met, GEHRIMED Technical Support may recommend the User make Hardware upgrades in order to receive full functionality of the GEHRIMED software.

Internet Service

GEHRIMED requires internet connectivity to remain active, although occasional short disconnections are tolerated. Internet connectivity may be via a wired (for Windows) or wireless network or through a Cellular network card. We do not recommend using a “hot spot” for connectivity, due to the inconsistency of the connection. For providers using the monthly subscription to speech recognition, we recommend a high speed Wireless or 4G LTE connection. If a GEHRIMED problem is isolated to the area of Internet Connectivity, the customer is expected to consult a third-party service for additional support and service.

Dragon 360 Compatible Microphones

Dragon Medical SpeechKit requires a microphone which records audio data with a bit depth of 16-bit and a sampling rate of at least 16 kHz. We recommend testing the microphones that your users will work with before you deploy Dragon Medical SpeechKit. Microphones that have been tested by Nuance are listed below.

.NET and COM editions

Microsoft Windows

For more information on configuring Nuance and Philips USB microphones, see the .NET edition Help and COM edition Help.

Virtualized environments

Dragon Medical SpeechKit can be deployed in a Citrix XenApp/Desktop, Microsoft RDS or VMware Horizon View environment.
To ensure high-quality audio support, download and install the corresponding Nuance virtual extension from the .NET SDK section of the Nuance Healthcare Developer Platform (https://www.nuancehealthcaredeveloper.com); click Download Citrix and Windows Terminal Server drivers.
For more information, see the documentation delivered with your download.

Citrix XenApp and XenDesktop

To enable microphone buttons and other controls, contact your device vendor for drivers with support for Citrix XenApp/XenDesktop environments.
For more information on supported microphones and Nuance virtual extensions, see: Deployment and Configuration for Citrix Environments.

Microsoft RDS

To enable microphone buttons and other controls, contact your device vendor for drivers with support for Microsoft RDS environments.
For more information on supported microphones and Nuance virtual extensions, see: Deployment and Configuration for Microsoft RDS Environments.

VMware Horizon View

To enable button controls in a VMware Horizon View environment, configure USB device splitting. For more information, see the VMware Knowledge Base:
https://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=206844

For more information on supported microphones and Nuance virtual extensions, see: Deployment and Configuration for VMware Horizon View Environments.

Browser edition

macOS and Microsoft Windows

For more information on button control support and configuration for virtualized environments, see the release notes delivered with the product.

iOS edition

Tests have been performed with the built-in microphones and the packaged cable-based headsets for all supported iOS-based devices for both phones and tablets.
Bluetooth microphones are currently not supported.

Android edition

Tests have been performed with the built-in microphones and the packaged cable-based headsets of all the
major Android device vendors for both phones and tablets.

Security

GEHRIMED assumes that customers use encrypted hard drives to protect all PHI.  Data downloaded to customer devices is encrypted by password entry.  All GEHRIMED user accounts are password protected and each user account has a set of specifically configured access rights.  In addition, double authentication is used to ensure that the user’s access has not been compromised. Authentication methods used for double authentication are SMS messaging and encrypted keys on detached USB drives.  Automatic session timeouts are implemented to help protect the equipment from unauthorized access.