{"componentChunkName":"component---src-templates-blog-post-js","path":"/blog/shared-transparency-is-the-product/","result":{"data":{"post":{"childMarkdownRemark":{"html":"<p>The phrase I keep coming back to is shared transparency.</p>\n<p>Not radical transparency. Not everyone seeing everything — that would be unsafe, and it would also be useless, because more information that no one can act on is just more noise. Shared transparency means the right people see the right information at the right time, with consent, identity, role, context and auditability sitting underneath. Quietly. Reliably. Every time.</p>\n<p>That is exactly where Regenemm's hub-and-spoke model earns its keep.</p>\n<p>In the current architecture, Regenemm Voice acts as the Hub — the system of record and the enforcement point for identity, consent, audit, secrets, key rotation, exports and evidence. The Spokes are specialist applications. They capture context. They support workflows. They present information beautifully to the user in front of them. What they don't do is own privileged capabilities or persist data on their own terms. The Hub holds those.</p>\n<p>Clinically, this matches how care actually happens.</p>\n<p>Take a perioperative patient. The anaesthetist sits with them before surgery and surfaces airway concerns, allergies, comorbidities, ASA score, STOP-BANG risk, and a medication list that needs reconciling. The surgeon adds clinical notes, imaging, consent and operative detail. Nurses capture wound checks, handover concerns, observations, and the unresolved tasks that always sit on a sticky note somewhere. A perioperative physician may add medical optimisation. The GP needs a coherent letter so they can pick up care on the other side. The patient needs a clear explanation in language they actually use. The EMR needs structured data it can store and surface again later.</p>\n<p>Without a shared model, that turns into a mess of disconnected notes and lost context. Which is, currently, what it is.</p>\n<p>The Hospital Hub design describes this flow directly: anaesthetic summaries, operation reports, nursing handovers, discharge summaries, GP communication, patient summaries, FHIR posting, and downstream rehabilitation monitoring once the patient is home. It also names the gap that nobody talks about often enough — distribution. A spoke can generate excellent content. The Hub has to own the fan-out, so the right entitled recipients actually receive what they need, in the format they need it, on time.</p>\n<p>That is the right architecture. A spoke shouldn't grow into its own empire. A hospital workflow shouldn't quietly become another data silo. Beautifully generated clinical documentation shouldn't die in the wrong system.</p>\n<p>The Hub gives the system coherence. The spokes give the system clinical specificity.</p>\n<p>This distinction matters more than it sounds. A surgeon's workflow is not a nurse's workflow. A rehabilitation pathway is not a billing workflow. A patient-facing summary is not an operative report — it shouldn't be, ever. But all of them need to share enough context to keep the patient safe across handovers, across settings, and across time.</p>\n<p>Healthcare has been fragmented for decades. The reason is not malice or incompetence. It is that each system was optimised for its own user, its own billing model, its own database, and its own procurement history. Nobody designed the fragmentation; everybody built one piece of it.</p>\n<p>AI gives us a chance to do better. Only if we build the architecture correctly. Otherwise we just generate prettier silos faster.</p>\n<p>Shared transparency is not a feature on a roadmap. It is the product.</p>\n<p>That is what we are actually building.</p>\n<hr>\n<p><em>CTI is the AI-native parent company behind Regenemm Healthcare.</em></p>","frontmatter":{"title":"Hub and Spoke Healthcare: Why Shared Transparency Is the Real Product","summary":"The Regenemm Hub gives clinical workflows coherence while spokes preserve the specificity of real care.","date":"2026-02-15T14:00:00.000Z","category":"CTI Research Series","author":{"frontmatter":{"name":"Dr. Brendan O'Brien","image":{"childImageSharp":{"fixed":{"base64":"data:image/jpeg;base64,/9j/2wBDAAoHBwgHBgoICAgLCgoLDhgQDg0NDh0VFhEYIx8lJCIfIiEmKzcvJik0KSEiMEExNDk7Pj4+JS5ESUM8SDc9Pjv/2wBDAQoLCw4NDhwQEBw7KCIoOzs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozv/wgARCAAUABQDASIAAhEBAxEB/8QAFwABAQEBAAAAAAAAAAAAAAAAAAQFBv/EABcBAQEBAQAAAAAAAAAAAAAAAAMBAgT/2gAMAwEAAhADEAAAAd7DpySXrEqTg7zoK0Fv/8QAGxABAQACAwEAAAAAAAAAAAAAAwIBBAASIhP/2gAIAQEAAQUCuupi6fXm1vSME+Dolwx3n3q+j0kqR//EABURAQEAAAAAAAAAAAAAAAAAAAEg/9oACAEDAQE/ARI//8QAFxEBAQEBAAAAAAAAAAAAAAAAAQAQEv/aAAgBAgEBPwHlwm//xAAgEAACAQQBBQAAAAAAAAAAAAABAgADERIxECJBQmGx/9oACAEBAAY/AmI7CIu7nghep/kFXHIWgddGN7MqIdWhAPlP/8QAHRAAAgIDAAMAAAAAAAAAAAAAAAERMSFBYZHR4f/aAAgBAQABPyF1iY0ZddmSSLVGOC5ZZpr6T99NDH0Z8m5FkiOQvRH/2gAMAwEAAgADAAAAEKjHQf/EABcRAQEBAQAAAAAAAAAAAAAAAAEAMRD/2gAIAQMBAT8QGI7xjL//xAAXEQEBAQEAAAAAAAAAAAAAAAABABEx/9oACAECAQE/EBDSTLu6v//EAB8QAQACAgICAwAAAAAAAAAAAAEAESExQVEQYXGRof/aAAgBAQABPxAGlCAtsIJRqLLsdu/HifSORxl7OoFSO5YaK/RN2YKGUNIw7Wxfs2j4eE8KI19EpBCQ+WZ//9k=","width":40,"height":40,"src":"/static/bc607af343b0c089694f03ab050ab4b9/f0a3b/dr-brendan-obrien.jpg","srcSet":"/static/bc607af343b0c089694f03ab050ab4b9/f0a3b/dr-brendan-obrien.jpg 1x"}}}}},"metaImage":{"childImageSharp":{"fluid":{"src":"/static/e9143b6805a1f9a6510d3537e2303545/5d2fb/cyber-security.jpg"}}},"image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.5,"src":"/static/e9143b6805a1f9a6510d3537e2303545/485bc/cyber-security.jpg","srcSet":"/static/e9143b6805a1f9a6510d3537e2303545/14a2e/cyber-security.jpg 228w,\n/static/e9143b6805a1f9a6510d3537e2303545/ded98/cyber-security.jpg 455w,\n/static/e9143b6805a1f9a6510d3537e2303545/485bc/cyber-security.jpg 910w,\n/static/e9143b6805a1f9a6510d3537e2303545/2e09e/cyber-security.jpg 1365w,\n/static/e9143b6805a1f9a6510d3537e2303545/e857d/cyber-security.jpg 1820w,\n/static/e9143b6805a1f9a6510d3537e2303545/1d4c5/cyber-security.jpg 5000w","sizes":"(max-width: 910px) 100vw, 910px"}}}}}},"register":{"childMarkdownRemark":{"html":"<p>CTI are launching digital solutions, backed by machine learning, to help reduce stress and improve performance.</p>\n<p>If you would like to <strong>be one of the first 500</strong> individuals to get access to these products please complete the form.</p>","frontmatter":{"title":"Early access for beta testing"}}}},"pageContext":{"name":"shared-transparency-is-the-product","previous":"role-of-universities-role-of-researchers-in-successfully-commercialising-research-projects","next":"signing-progressive-ip-rights-and-source-code-from-an-outsourced-it-company-to-the-client-when-is-best"}},"staticQueryHashes":["1216909356","185262695","2831923220"]}