Difference between revisions of "Ignacio Valdes Implementation Log"

From VistApedia
Jump to: navigation, search
m (Reverted edits by Puwok2008PTZxg (talk) to last revision by NeilArmstrong)
Line 1: Line 1:
Ignacio Valdez, a psychiatrist in Houston TX, has been charged with implementing VistA for a chain of psychiatric facilities. He has posted his progress on the Hardhats discussion group. Some of the threads are reproduced here.
+
Astronaut, LLC [http://astronautvista.com] has been charged with implementing VistA for a psychiatric hospital. Posted is the progress on the Hardhats discussion group [http://groups.google.com/group/Hardhats/topics?hl=en&start=]. Some of the threads are reproduced here.  
  
==Episode 2== [[Episode2|Multiple Sign-ons]]
+
The traditional method for implementing a new VistA instance has been likened to an old-fashioned barn-raising: at the appointed time the holders of "institutional memory" would gather and put the thing together. There was no written blueprint, yet at the end of the day there would be a solid, usable structure in place.
Ignacio Valdes 
 
 
Date: Mon, 14 Jul 2008 13:56:40 -0500
 
Subject: The Intracare Implementation Log Episode 2: How does one handle Active Directory ID's?
 
  
Greetings,
+
The ultimate goal of this is not just a new VistA instance, but also a blueprint for how to do it.
  
So we already have people with Active Directory ID's. How does one
+
Note that this page is a work in progress; see Hardhats [http://groups.google.com/group/Hardhats/topics?hl=en&start=] for logs that do not appear here.
generally manage Active Directory ID's and VistA ID's?
+
[[Category:Intracare Implementation Log]]
  
-- IV
+
==[[Episode 1|Episode 1 The Layer Cake]]==
  
I, Valdes 
+
==[[Episode2|Episode 2 Multiple Sign-ons]]==
  
I will answer for myself: There is no direct equivalent of Active
+
==[[Episode3|Episode 3 IPv4 vs. IPv6]]==
Directory Id's in VistA. While this may seem like a handicap, it is
 
also an advantage in that the system is independent of Active
 
Directory which makes it both more secure and easier in some ways to
 
roam to other workstations. -- IV
 
 
fred trotter 
 
  
Generally, if you want to integrate with Active Directory you should
+
==[[Episode4| Episode 4 Billing/Management Keane [[record~|Record]]s integration/population]]==
use LDAP. This is how unix does it.
 
  
http://onlinepill.in/order-mentat-online-en.html?q=mentat
+
==[[Episode5|Episode 5 Patient picture?]]==
  
It seems to me that you should be able to use LDAP for the VistA
+
==[[Episode 6 Implementation funding? | Episode 6 Implementation funding?]]==
authentication instead of the internal VistA user system. This is how
 
ClearHealth works.
 
  
Does VistA integrate with LDAP?
+
==[[Episode7|Episode 7 iptables and other useful port commands]]==
  
-FT
+
==[[Episode8| Episode 8 Power outage restart]]==
  
kdtop
+
==[[Episode9| Episode 9 Initial hospital configuration terminal session]]==
  
I don't understand your question.  Are you wanting to have a single
+
==[[Episode10| Episode 10 Psychiatry specific DSM Axis II-V diagnosis, precaution ordering]]==
sign-in situation?  Where the network access guarantees VistA
 
access??  I thought that Active Directory stuff had to do with access
 
to network drives, whereas VistA access has to do with access to an
 
EMR.
 
  
Aren't these separate issues?
+
==[[Episode11| Episode 11 VistA configuration Utility, KIDS Patch Install]]==
  
Kevin
+
==[[Episode12| Episode 12 How do you create a new patient?]]==
  
+
==Episode 13 Ordering Configuration == [[Episode13|Ordering Configuration]]
Steven McPhelan 
+
==Episode 14 Hardware, multi-user systems?== [[Episode14|Hardware, multi-user systems?]]
  
I disagree with the concept of single sign-on for the medical environment at
+
==Episode 15 Non-proprietary signature consenting of patients== [[Episode15|Non-proprietary signature consenting of patients.]]
this time.  At such time that all people in the world are honorable and
 
adhering to good and safe and secure computing habits, then perhaps single
 
sign-on will be feasible (think of the walk-away problem).  I do believe
 
that LDAP can still be used.  Instead of just using a specific technology
 
like LDAP, I prefer the term network authentication.  VistA should still
 
challenge the user for sign-on credentials even though the network sign-on
 
has already occurred.  Where and how they authenticate those sign-on
 
credentials is another matter that technology can address.
 
--
 
Steve
 
It's so much easier to suggest solutions when you don't know too much about
 
the problem." -- Malcolm Forbes
 
 
r...
 
  
I find that I am in agreement with Stephen.  While the Wow and convenience
+
==Episode 16 KIDs VA DHCP style login How to== [[Episode16|VA DHCP style login HowTo How to]]
factors are high, the potential for abuse is even higher.
 
 
fred trotter 
 
  
With all due respect, we are not asking if you think it is a good
+
==Episode 17 KIDs Patch Install Best Practice.== [[Episode17|KIDs Patch Install Best Practice.]]
idea. We are asking if it is possible. Is it possible to use LDAP for
 
authentication from within VistA?
 
  
To be clear, we are not asking if we can set it up so that LDAP
+
==Episode 18 Adding Locations to Hospital Location File Using Fileman.== [[Episode18|Adding Locations to Hospital Location File Using Fileman.]]
authentication of an operating system/network session can be extended
 
to have "loginless" access to VistA by passing along credentials; we
 
are asking if the VistA system can be configured to check LDAP rather
 
than its own user database when it receives the username and password
 
as it normally does.
 
  
As to whether it is a good idea: Having a single username and password
+
==Episode 19 Adding Locations to Hospital Location File Using Fileman.== [[Episode19| Adding Locations to Hospital Location File Using Fileman.]]
has nothing to do with the "walk-away problem" that is a problem in
 
any case. The issue is whether users have to remember two passwords or
 
not. If they must remember two passwords, then they will start writing
 
them down. That is a serious breach. Further, having two places to
 
administer user accounts is an administration problem. It doubles all
 
of the administration work and creates a serious risk that when an
 
employee leaves the clinic/hospital and the administrators only
 
remember to remove one of the two user accounts but not the other.
 
  
I make these points not in the hopes that I would convince you that
+
==Episode 20 Location for Current Activities Dialog Box== [[Episode20| Location for Current Activities Dialog Box]]
single sign-on is a good idea, but to point out that it is a debate,
 
and we are not foolish for wanting to have it.
 
  
For the time being, however, we would be happy to know if it were
+
==Episode 21 Little graphics in templates?== [[Episode21|Little graphics in templates?]]
possible at all.
 
--
 
Fred Trotter
 
 
rga...@tampabay.rr.com 
 
  
X.500 is not implemented in VistA, nor do I think it is possible without OS intervention.
+
==Episode 22 How to allow editing of Template Fields.== [[Episode22|How to allow editing of Template Fields.]]
 
 
Steven McPhelan 
 
  
Of course network authentication is possible with the proper modifications
+
==Episode 23 AIMS Examination template?== [[Episode23|AIMS Examination template?]]
to VistA and the proper network authorization.  When has there ever been a
 
technical problem such as this where someone could not figure out a
 
solution.  Heck who would have thought that CAV could have developed a
 
program that would convert the M based VistA system to a Java based SQL
 
compliant system (non-M)?
 
  
In my response, I am using the most common definition of single sign-on
+
==[[Episode24| Episode 24 Changing Intro Message]]==
which is a user signs in ONCE and then all single signon compliant
 
applications automatically let the user into the application which they
 
launch provided that the centralized roles and privileges authorizes that
 
user to run that application.  That is what I do not agree with.  For an
 
EMR, I want the user to "reauthenicate" for that application before letting
 
that user into that application.
 
  
The common definition for single sign-on was around before VistA pursued
+
==Episode 25 Demystifying Templating, Document Classes and Titles for Dummies.== [[Episode25|Demystifying Templating, Document Classes and Titles for Dummies. ]]
single sign-on. That is why I prefer the term network authentication versus
 
single sign-on so that the hearer does not get any false assumptions about
 
what features would and would not be available.
 
  
--
+
==Episode 26 Scheduling patients for a Clinic== [[Episode26|Scheduling patients for a Clinic]]
Steve
 
It's so much easier to suggest solutions when you don't know too much about
 
the problem." -- Malcolm Forbes
 
 
fred trotter 
 
  
You are right... there do seem to be two ways to talk, and think about
 
this. I will try to be clearer...
 
  
--  
+
==Episode 27 Suppressing WORK COPY -- NOT FOR MEDICAL [[RECORD~|Record]]== [[Episode27|Suppressing WORK COPY -- NOT FOR MEDICAL RECORD]]
Fred Trotter
 
 
kdtop
 
  
Steven,
+
==Episode 28 Easy template importing and exporting== [[Episode28|Easy template importing and exporting]]
  
As a physician, I hate multiple sign-ons. I have never had a chance
+
==Episode 29 Adding Appointment Schedule Menu to Clerk ID.== [[Episode29|Adding Appointment Schedule Menu to Clerk ID.]]
to debate this issue with anyone, so I'd like to give you an
 
opportunity to convince me.
 
  
In our hospital, I have to sign in to the network, then sign into the
+
==Episode 30 Change Access/Verify code text to UserID/Password?== [[Episode30|Change Access/Verify code text to UserID/Password?]]
client that communicates with the computers.  And to sign my charts, I
 
have to enter my password another 1-2 times.  And each of these
 
passwords expires on a different schedule.  So it is a never ending
 
round of confusion.  And I see this as a substantial barrier to
 
acceptance and use.
 
  
When I see the computers up on the hospital ward, I see nurses called
+
==Episode 31 'Cowboy' System Backup== [[Episode31|'Cowboy' System Backup]]
away from their computers all the time.  So the solution they have is
+
==Episode 32 Merge [[Record~|Record]]s?== [[Episode32|Merge Records?]]
to make windows drop to a locked screen after inactivity for about 1-2
+
==Episode 33 The Whole Enchilada Admissions Workflow== [[Episode33|The Whole Enchilada Admissions Workflow]]
minutes.  Then only that user or an administrator can unlock the
+
==Episode 34 Entering Insurance Information?== [[Episode34|Entering Insurance Information?]]
machine.  This seems to solve the walk-away problem.
 
  
So once you can be sure that random people don't walk up and start
+
==Episode 35  CPRS options, Number of Days, Default Date?== [[Episode35| CPRS options, Number of Days, Default Date?]]
using the computer, then why is it important to have to sign in
 
twice? When entering a building, we usually have one locked door.
 
Not 2-3 locked doors in succession.  Why doesn't this security model
 
work for the computer?
 
  
Kevin
+
==Episode 36 Patient movement and tracking?== [[Episode36|Patient movement and tracking?]]
+
==Episode 37 Maximum number of users already signed on to this processor == [[Episode37|Maximum number of users already signed on to this processor]]
Greg Woodhouse 
 
  
Good for you Kevin. This is a prime example of an area where debates over
+
==Episode 38 Hospital Electronic Signature Policy?== [[Episode38|Hospital Electronic Signature Policy?]]
usability and functionality are easily clouded by implementation concerns.
 
We should start out with the customer (in this case, the healthcare
 
provider) and the functionality that they want or need. In the case of
 
single-signon, it is possible that AFTER analysis, you may conclude that it
 
cannot be made secure (I am not convinced). But to dismiss it a priori is
 
like well, dismissing MUMPS (or maybe Scheme or ML!) as an implementation
 
language because we simply assume is not going to be a feasible choice.
 
  
I realize that this is a sensitive subject, so let me ask the developers and
+
==Episode 39 Patient lab reports connection== [[Episode39|Patient lab reports connection]]
analysts out there a couple of quick questions: Are you thoroughly
+
==Episode 40 Kevin Toppenberg's GUI_Config easy(er) install package.== [[Episode40|Kevin Toppenberg's GUI_Config easy(er) install package.]]
considering the requirements here and performing a full analysis, or are you
 
following accepted convention? Are you willing to try to be innovative? Have
 
you performed an analysis of physician workflow? We'd never think about
 
building a factory automation system without first trying to understand the
 
processes we are trying to automate, both through consulting with SMEs and
 
observing the process ourselves. To the physicans and other healthcare
 
professionals out there: Do the people you are working with understand your
 
work environment? Have you considered arranging a site visit? If this is not
 
possible (e.g., due to privacy concerns), what about a simulated environment
 
similar to (but expanding upon) VeHU's  virtual hospital? Developers cannot
 
build systems that meet your needs unless they first understand them.
 
 
Steven McPhelan 
 
  
Kevin, those are valid questions.  There is a difference between a small (or
+
==Episode 41 Option to [[security Key~|Security Key]] mapping, Granting of a Key or Keys, Key management menus.== [[Episode41|Option to [[security Key~|Security Key]] mapping, Granting of a Key or Keys, Key management menus.]]
single) doctor's office and a large multi-physician practice or a hospital.
 
For instance, what should be the behavior of a common terminal at a nurse's
 
station where there may be 5,10,20 people who use that terminal in a one
 
hour period.  The item mentioned here was why could not LDAP authentication
 
be used.  If network authentication is being used then the problem of
 
different passwords expiring at different times is not an issue.  Network
 
authenticating applications would all validate against a single network
 
source.  Since it is a single source, then the timing of the change of
 
password would be localized and controlled by that single system.
 
  
*There is not one solution that adequately covers every situation*.  Take
+
==Episode 42 Is there such a thing as: Introduction to programming vista with mumps?== [[Episode42|Is there such a thing as: Introduction to programming vista with mumps?]]
that hospital nursing station, is it desirable to require each user to log
+
==Episode 43 Pharmacy.== [[Episode43|Pharmacy.]]
off the network on that terminal when they are done thus requiring the next
+
==Episode 44 Editable CPRS handout for clinicians.== [[Episode44|Editable CPRS handout for clinicians.]]
user to log onto the network?  Think about how long it takes today from
+
==Episode 45 Page number printout revisited.== [[Episode45|Page number printout revisited.]]
username logon to a usable desktop. This is probably not the place to go
 
into this topic.
 
  
Until the technology is there for these common workstations to allow an
+
==Episode 46 A (Very) brief Programming VistA with MUMPS page numbering example== [[Episode46|A (Very) brief Programming VistA with MUMPS page numbering example]]
individuals to logon to their own partition in a matter of seconds, the way
 
to attempt to implement single signon will continue to be burdensome.  For
 
example, it may be the hospital policy that these common workstations have a
 
limited set of applications available to them so that individuals do not
 
have to log in and out of the network.  If this was the case, then it might
 
be prudent to require those individual applications to "reauthenicate
 
sign-on".  In other words, the app prompts for username and password and
 
authenticates against the network independent of the username that was used
 
to "Boot" the workstation to a desktop.
 
  
Remember the common understanding of single sign-on. Whoever is at that
+
==Episode 47 Slow text login problem and a resolution== [[Episode47|Slow text login problem and a resolution.]]
terminal has all the credentials and privileges of whomever signed onto the
+
==Episode 48 Updating software on a production system?== [[Episode48|Updating software on a production system?]]
network.  Obviously using locking screen savers in a private physicians
+
==Episode 49 Destination unreachable (Host administratively prohibited)== [[Episode49|Destination unreachable (Host administratively prohibited)]]
office may work but it would not work at the nurse's station.
 
  
--
+
==Episode 50 KIDs Patch Creation?== [[Episode50|KIDs Patch Creation?]]
Steve
+
==Episode 51 Extreme training/development tip with screen/cloud/Astronaut.)== [[Episode51|Extreme training/development tip with screen/cloud/Astronaut.]]
It's so much easier to suggest solutions when you don't know too much about
 
the problem." -- Malcolm Forbes
 
 
rga...
 
  
The user signs on to the computer (enter the first door), the user then is
+
==Episode 52 Death of a Patient.==
going to document personal health information (enter the second door), the
+
[[Episode52|Death of a Patient.]]
user then is going to send a secure communication requiring the inclusion of
 
PPI (enter the third door). All doors can have the same codes, like a card
 
swiped or a retina scanned.
 
  
Let's say a user authenticates on to their PC, they need to use an EHR, but
+
==Episode 53 User Roles and Permissions Management.==
the EHR needs to know who the user is, allowing the user to enter their name
+
[[Episode53 User Roles and Permissions Management|User Roles and Permissions Management.]]
is unacceptable because I can document your patients. There needs to be
 
some mechanism in place which identifies the user before they start to treat
 
the patient.
 
  
The signatures on notes, etc, is a safeguard to ensure the document is
+
==Episode 54 Discharge Summaries.==
reviewed before it becomes part of the official medical record.
+
[[Episode54 Discharge Summaries|Discharge Summaries.]]
  
Hey, it's a start...
+
==Episode 55 Consult Service.==
 +
[[Episode55 Consult Service|Consult Service.]]
  
+
==Episode 56 Same Access Code Disentangling..==
kdtop
+
[[Episode56 Same Access Code Disentangling|Same Access Code Disentangling.]]
  
Thanks all for the replies so far.
+
==Episode 57 Appropriate keys for a social worker id?==
 +
[[Episode57 Appropriate keys for a social worker id?|Appropriate keys for a social worker id?]]
  
I think the real issue here is one of verify-ability.  Right beside
+
==Episode 58 Printed Labels?==
the nurses computer station, with all it's passwords, is the paper
+
[[Episode58 Printed Labels|Printed Labels?]]
chart that has absolutely no passwords at all.  And why is this OK?
 
Well, the staff will notice if a stranger comes in and starts looking
 
at the chart.  So there is a bit of access control that might be lost
 
if the records are electronic and can be access from North Korea etc.
 
Next, every doctor has a unique handwriting.  So 5 yrs from now I
 
would be able to say with confidence in a court of law that I wrote
 
this, or didn't write that.  That's pretty much impossible with
 
ASCII.  But outside of legal debate when people get to pointing
 
fingers at each other, all this security is not so important.  We've
 
cared for many a sick patient with paper charts for more than a few
 
years now.
 
  
So here's a thought.  Why not equip the terminals with webcams and
+
==Episode 59 Linking a Template with a Title==
have them take quick pictures every 15 sec or so, and marry that image
+
[[Episode59 Linking a Template with a Title|Linking a Template with a Title]]
with the text.  Or perhaps combine it with some other technology like
 
keystroke patterns that some say are fairly unique among various
 
users.  That way let the user sign the record however they want (using
 
the honor system, as they do in the paper chart), but still have the
 
ability to very the accuracy of the claimed name etc.  I'm sure there
 
are good reasons why this wouldn't work.  But I can dream.
 
  
On a slightly different point, let me just throw one other point out
+
==Episode 60 Example of setting Institution file Station Number==
here (wearing my physician hat now).  I feel that software engineers
+
[[Episode 60 Example of setting Institution file Station Number|Example of setting Institution file Station Number]]
have a propensity to get carried away with projects.  Or perhaps it is
 
the managers that hire them.  Anyway, it seems that when a
 
technological solution is provided, it tries to do too much.  For
 
example, there is a push to replace paper prescriptions.  Well it is
 
not good enough to allow typed prescriptions.  No, while we're at it,
 
let's throw in checking for drug interactions.  And let's check with
 
their insurance to see if the drug is covered.  And lets have the
 
communication channel be bidirectional with the pharmacy.  And let's
 
make the channels to be secure.  And so on and so on.  And suddenly we
 
have an amazingly complex technology that is difficult to implement,
 
is hard to master, may disrupt workflow, and is expensive.  So
 
providers stay away in droves.  When I implemented VistA for my 15-
 
provider group, I specifically planned for allowing physicians to
 
continuing practicing exactly the way they always have.  But also I
 
explained the tool and how it could benefit them.  So used it, other's
 
stayed with a transcription module.
 
  
Anyway, thanks for the feedback on the need for multiple logins.
+
==Episode 61 Bringing CPRS, TMG-CPRS back onto the screen when it is off screen==
 +
[[Episode 61 Bringing CPRS, TMG-CPRS back onto the screen when it is off screen|Bringing CPRS, TMG-CPRS back onto the screen when it is off screen]]
  
Kevin
+
==Episode 62 Hardware Price/Performance as of 6/29/2010==
+
[[Episode 62 Hardware Price/Performance as of 6/29/2010|Hardware Price/Performance as of 6/29/2010]]
Joel 
 
  
There are ways in which silent logins can be used within VistA.  In
+
==Episode 63 Non-provider and their assistant co-signing?==
addition there were other attempts to provide this.  A Kernel patch
+
[[Episode 63 Non-provider and their assistant co-signing?|Non-provider and their assistant co-signing?]]
was set for release to implement what we then called an enterprise
 
single sign-on (at least to VistA) a number of years ago.  Just before
 
its release, we were told that OCIS would provide an enterprise single
 
sign-on and we should not release ours.  They still haven't provided
 
it.  That patch used the user's identity to Windows via an
 
authentication server known to the VistA system and that contacted the
 
VistA system to authenticate the user and match the identity with the
 
entry in the NEW PERSON file.
 
  
Auto Sign-On requires the user sign into VistA, but subsequent
+
==Episode 64 Setting user Electronic Signature Code through Text Based Interface. ==  
applications connecting are signed on as the current user
+
[[Episode 64 Setting user Electronic Signature Code through Text Based Interface.|Episode 64 Setting user Electronic Signature Code through Text Based Interface.]]
automatically.  Sites that want to can turn on the Auto Sign-On and
 
must have the client agent (clagent.exe) active on the workstations
 
(although it should not be used on clients connected to terminal
 
servers).  Some sites use this heavily, while others seem to give it
 
only to the IT staff.  This can be turned on using the DEFAULT AUTO
 
SIGN-ON field (#218) in the KERNEL SYSTEM PARAMETERS file (#8989.3).
 
The possible values are 0=NO, 1=YES, and d=DISABLED.  If YES is
 
selected, auto sign-on is turned on for all users. If DISABLED is
 
selected, auto sign-on is turned off for all users.  If NO is
 
selected, the use of auto sign-on is regulated by the AUTO SIGN-ON
 
field (#200.18) in the NEW PERSON file (#200), where the options are
 
YES and NO.
 
  
While requiring an investment in Infrastructure, but the use of CCOW
+
==Episode 65 Template title ascending sort ==
User Context provides for GUI applications, when compiled with one of
+
[[Episode 65 Template title ascending sort.|Episode 65 Template title ascending sort]]
more recent versions of the RPCBroker to use the user's identification
 
in the CCOW Vault to authenticate the user on second and subsequent
 
connections to a VistA server.  It should be noted that CPRS added
 
command line arguments which would permit this functionality to be
 
turned off in locations, such as busy clinics, where multiple
 
individuals might use the same workstation, since an individual might
 
be identified as the user currently authenticated to the VistA server.
 
  
Groups within the VA are also evaluating other mechanisms for
+
==[[Episode 66 Windows 7 TMG-CPRS formatted text printer truncation problem/solution. | Episode 66 Windows 7 TMG-CPRS formatted text printer truncation problem/solution.]]==
authentication and authorization for the future as well.
 
 
Roy Gaber 
 
  
It is not so much the developers (I may have a bias seeing how I am one) but
+
==[[Episode 67 Taskman Job Limit Exceeded.|Episode 67 Taskman Job Limit Exceeded]]==
the steering committees, or SME's that dictate the policy, it is the
 
developers job to turn those directives into code.
 
  
The bottom line is, the physician is responsible for the care and associated
+
==[[Episode 68 Provider appear on Primary Provider Selection Box? | Episode 68 Provider appear on Primary Provider Selection Box?]]==
documentation of the patient, it is my belief that they can approach the
+
 
issues surrounding HIPPA in whatever way they see fit.
+
==[[Episode 69 Aftercare Interdisciplinary note editing and signing? | Episode 69 Aftercare Interdisciplinary note editing and signing?]]==
 +
 
 +
==[[Episode 70 Listing Installed KIDS builds or patches.|Episode 70 Listing Installed KIDS builds or patches.]]==
 +
 
 +
==[[Episode 71 Deleting the WorldVistA drug file. | Episode 71 Deleting the WorldVistA drug file.]]==
 +
 
 +
==[[Episode 72 Taskman Cleanup. | Episode 72 Taskman Cleanup.]]==
 +
 
 +
==[[Episode 73 More Taskman Cleanup. | Episode 73 More Taskman Cleanup.]]==
 +
 
 +
==[[Episode 74 Medication Ordering Keys. | Episode 74 Medication Ordering Keys.]]==
 +
 
 +
==[[Episode 75 List of unsigned notes by provider. | Episode 75 List of unsigned notes by provider.]]==

Revision as of 14:36, 28 June 2012

Astronaut, LLC [1] has been charged with implementing VistA for a psychiatric hospital. Posted is the progress on the Hardhats discussion group [2]. Some of the threads are reproduced here.

The traditional method for implementing a new VistA instance has been likened to an old-fashioned barn-raising: at the appointed time the holders of "institutional memory" would gather and put the thing together. There was no written blueprint, yet at the end of the day there would be a solid, usable structure in place.

The ultimate goal of this is not just a new VistA instance, but also a blueprint for how to do it.

Note that this page is a work in progress; see Hardhats [3] for logs that do not appear here.

Contents

Episode 1 The Layer Cake

Episode 2 Multiple Sign-ons

Episode 3 IPv4 vs. IPv6

[[Episode4| Episode 4 Billing/Management Keane Records integration/population]]

Episode 5 Patient picture?

Episode 6 Implementation funding?

Episode 7 iptables and other useful port commands

Episode 8 Power outage restart

Episode 9 Initial hospital configuration terminal session

Episode 10 Psychiatry specific DSM Axis II-V diagnosis, precaution ordering

Episode 11 VistA configuration Utility, KIDS Patch Install

Episode 12 How do you create a new patient?

==Episode 13 Ordering Configuration == Ordering Configuration ==Episode 14 Hardware, multi-user systems?== Hardware, multi-user systems?

==Episode 15 Non-proprietary signature consenting of patients== Non-proprietary signature consenting of patients.

==Episode 16 KIDs VA DHCP style login How to== VA DHCP style login HowTo How to

==Episode 17 KIDs Patch Install Best Practice.== KIDs Patch Install Best Practice.

==Episode 18 Adding Locations to Hospital Location File Using Fileman.== Adding Locations to Hospital Location File Using Fileman.

==Episode 19 Adding Locations to Hospital Location File Using Fileman.== Adding Locations to Hospital Location File Using Fileman.

==Episode 20 Location for Current Activities Dialog Box== Location for Current Activities Dialog Box

==Episode 21 Little graphics in templates?== Little graphics in templates?

==Episode 22 How to allow editing of Template Fields.== How to allow editing of Template Fields.

==Episode 23 AIMS Examination template?== AIMS Examination template?

Episode 24 Changing Intro Message

==Episode 25 Demystifying Templating, Document Classes and Titles for Dummies.== Demystifying Templating, Document Classes and Titles for Dummies.

==Episode 26 Scheduling patients for a Clinic== Scheduling patients for a Clinic


==Episode 27 Suppressing WORK COPY -- NOT FOR MEDICAL Record== Suppressing WORK COPY -- NOT FOR MEDICAL RECORD

==Episode 28 Easy template importing and exporting== Easy template importing and exporting

==Episode 29 Adding Appointment Schedule Menu to Clerk ID.== Adding Appointment Schedule Menu to Clerk ID.

==Episode 30 Change Access/Verify code text to UserID/Password?== Change Access/Verify code text to UserID/Password?

==Episode 31 'Cowboy' System Backup== 'Cowboy' System Backup ==Episode 32 Merge Records?== Merge Records? ==Episode 33 The Whole Enchilada Admissions Workflow== The Whole Enchilada Admissions Workflow ==Episode 34 Entering Insurance Information?== Entering Insurance Information?

==Episode 35 CPRS options, Number of Days, Default Date?== CPRS options, Number of Days, Default Date?

==Episode 36 Patient movement and tracking?== Patient movement and tracking? ==Episode 37 Maximum number of users already signed on to this processor == Maximum number of users already signed on to this processor

==Episode 38 Hospital Electronic Signature Policy?== Hospital Electronic Signature Policy?

==Episode 39 Patient lab reports connection== Patient lab reports connection ==Episode 40 Kevin Toppenberg's GUI_Config easy(er) install package.== Kevin Toppenberg's GUI_Config easy(er) install package.

==Episode 41 Option to Security Key mapping, Granting of a Key or Keys, Key management menus.== [[Episode41|Option to Security Key mapping, Granting of a Key or Keys, Key management menus.]]

==Episode 42 Is there such a thing as: Introduction to programming vista with mumps?== Is there such a thing as: Introduction to programming vista with mumps? ==Episode 43 Pharmacy.== Pharmacy. ==Episode 44 Editable CPRS handout for clinicians.== Editable CPRS handout for clinicians. ==Episode 45 Page number printout revisited.== Page number printout revisited.

==Episode 46 A (Very) brief Programming VistA with MUMPS page numbering example== A (Very) brief Programming VistA with MUMPS page numbering example

==Episode 47 Slow text login problem and a resolution== Slow text login problem and a resolution. ==Episode 48 Updating software on a production system?== Updating software on a production system? ==Episode 49 Destination unreachable (Host administratively prohibited)== Destination unreachable (Host administratively prohibited)

==Episode 50 KIDs Patch Creation?== KIDs Patch Creation? ==Episode 51 Extreme training/development tip with screen/cloud/Astronaut.)== Extreme training/development tip with screen/cloud/Astronaut.

Episode 52 Death of a Patient.

Death of a Patient.

Episode 53 User Roles and Permissions Management.

User Roles and Permissions Management.

Episode 54 Discharge Summaries.

Discharge Summaries.

Episode 55 Consult Service.

Consult Service.

Episode 56 Same Access Code Disentangling..

Same Access Code Disentangling.

Episode 57 Appropriate keys for a social worker id?

Appropriate keys for a social worker id?

Episode 58 Printed Labels?

Printed Labels?

Episode 59 Linking a Template with a Title

Linking a Template with a Title

Episode 60 Example of setting Institution file Station Number

Example of setting Institution file Station Number

Episode 61 Bringing CPRS, TMG-CPRS back onto the screen when it is off screen

Bringing CPRS, TMG-CPRS back onto the screen when it is off screen

Episode 62 Hardware Price/Performance as of 6/29/2010

Hardware Price/Performance as of 6/29/2010

Episode 63 Non-provider and their assistant co-signing?

Non-provider and their assistant co-signing?

Episode 64 Setting user Electronic Signature Code through Text Based Interface.

Episode 64 Setting user Electronic Signature Code through Text Based Interface.

Episode 65 Template title ascending sort

Episode 65 Template title ascending sort

Episode 66 Windows 7 TMG-CPRS formatted text printer truncation problem/solution.

Episode 67 Taskman Job Limit Exceeded

Episode 68 Provider appear on Primary Provider Selection Box?

Episode 69 Aftercare Interdisciplinary note editing and signing?

Episode 70 Listing Installed KIDS builds or patches.

Episode 71 Deleting the WorldVistA drug file.

Episode 72 Taskman Cleanup.

Episode 73 More Taskman Cleanup.

Episode 74 Medication Ordering Keys.

Episode 75 List of unsigned notes by provider.