Professional Documents
Culture Documents
Table Of Contents
Preface ........................................................................................................14
Trademark and Copyright Information.......................................................................................................... 14 FCC Compliance ........................................................................................................................................ 14
Safety ..........................................................................................................28
Safety Guidelines ...................................................................................................................................... 28 Hazards.................................................................................................................................................... 29 IEC 60601-1 Classification .......................................................................................................................... 30 Owner Responsibilities ............................................................................................................................... 31 User Limitations ........................................................................................................................................ 32 Safety and Maintenance Rules..................................................................................................................... 33
ii
Table Of Contents
Data Import Toolbar .............................................................................................................................. 35 Changing Data Import Tool Settings ........................................................................................................ 36 Importing Studies.................................................................................................................................. 39 User Management Admin Tool (Group)......................................................................................................... 41 LDAP........................................................................................................................................................ 41 Configuring Authentication.......................................................................................................................... 41 Logging in to the CARESTREAM PACS Admin Home Page ................................................................................ 42 From a UNIX System ............................................................................................................................. 42 From a WINDOWS OS ............................................................................................................................ 43
iii
iv
Table Of Contents
CARESTREAM PACS IS Link Software Overview ........................................................................................... 104 IS Link Software Key Concepts.............................................................................................................. 104 Using the CARESTREAM PACS IS Link Software ........................................................................................... 105 Logging in from a UNIX System................................................................................................................. 105 Logging in from a WINDOWS OS ............................................................................................................... 105 Verifying the CARESTREAM PACS IS Link Software Startup ....................................................................... 106 Shutting Down the CARESTREAM PACS IS Link Software Processes ........................................................... 107 Using the Kill Command ....................................................................................................................... 107 Verifying the CARESTREAM PACS IS Link Software Shutdown ................................................................... 107 Using the CARESTREAM PACS IS Link Admin Tool........................................................................................ 108 Opening the IS Link Admin Tool ................................................................................................................ 108 IS Link Admin Tool Window Tabs ........................................................................................................... 108 IS Link Admin Tool Window Toolbar ....................................................................................................... 108 CARESTREAM PACS IS Link Admin Tool Patients Tab................................................................................ 109 CARESTREAM PACS IS Link Admin Tool Visits Tab ................................................................................... 110 CARESTREAM PACS IS Link Admin Tool Orders Tab ................................................................................. 110 CARESTREAM PACS IS Link Admin Tool Reports Tab ................................................................................ 110 IS Link Admin Tool Window Toolbar ....................................................................................................... 111 CARESTREAM PACS IS Link Configuration ................................................................................................... 112 Mapping Mechanism............................................................................................................................. 113 Mapping Mechanism User Interface........................................................................................................ 113 Filtering Cancelled Orders..................................................................................................................... 115 Report Display Filters ............................................................................................................................... 115 Manual RIS Sync ................................................................................................................................. 115 Handling Patient IDs ............................................................................................................................ 115 Handling Multiple Patient IDs in IS Link .................................................................................................. 115 New Site ID ........................................................................................................................................ 117 Saving Observation Data ...................................................................................................................... 117 Accession Number Automatic Update ..................................................................................................... 117 HL-7 to PACS Field Mapping Set ................................................................................................................ 117 To Configure the HL to PACS Field Mapping Set ....................................................................................... 117 Dictionary Mechanism .............................................................................................................................. 119 Configuring the Simple Mapping Tables .................................................................................................. 119 Configuring the Complex Mapping Tables ............................................................................................... 119 IS Link Maintenance ................................................................................................................................ 121 Pushing Scripts ....................................................................................................................................... 121 For UNIX Systems ................................................................................................................................... 121 For WINDOWS OS ................................................................................................................................... 121 Deleting Redundant Observations .............................................................................................................. 121
Auditing .....................................................................................................122
Pre-Filtering the Audit Viewer Tool Window ................................................................................................. 123 Audit Viewer Tool Window ........................................................................................................................ 124 Archiving an Audit ................................................................................................................................... 125 Managing the Display (Audit Viewer Tool)................................................................................................... 125 Field Chooser .......................................................................................................................................... 125 Changing the Fields Appearing in the Audit Trail Viewer ............................................................................... 125 Available Fields for Display ....................................................................................................................... 125 Filtering the Display ................................................................................................................................. 126 Applying Multiple Filters to the Audit Viewer............................................................................................ 126 Applying an Individual Filter to the Audit Viewer...................................................................................... 126 Sorting the Display .................................................................................................................................. 126 Refreshing the Display ............................................................................................................................. 126 Viewing Event Details............................................................................................................................... 127
vi
Table Of Contents
Moving Studies to Another Patient (Storage Management Admin Tool) ........................................................... 159 Detaching Studies ............................................................................................................................... 161 Moving an Incorrectly Attached Study to a Newly Created Patient (Split) .................................................... 161 Split and Merge Series Pre-Fetched from External Archive(s) .................................................................... 162 Splitting a Series from One Study to Another .......................................................................................... 163 Merging a Series from One Study to Another .......................................................................................... 164 Relocating a Series from One Study to Another ....................................................................................... 165 Merging a Series from Multiple External Archives (E-SIRs)........................................................................ 166 Locating Studies (Storage Management Admin Tool)................................................................................ 167 Viewing Backup Media for Studies (Storage Management Admin Tool) ....................................................... 168 Exiting the Storage Management Admin Tool .......................................................................................... 168 Single Media Archive (SMA) .................................................................................................................. 168 Loading from Single Media Archive (SMA)............................................................................................... 169
vii
viii
Table Of Contents
Long-Term Storage Manager Admin Tool Toolbar......................................................................................... 233 Long-Term Storage Manager Admin Tool Menu Bar ...................................................................................... 234 Long-Term Storage Manager Admin Tool Window ........................................................................................ 235 Recovered Studies List Area (LTSM)........................................................................................................... 236 Pending Requests Area (LTSM).................................................................................................................. 237 Event Log Area (LTSM)......................................................................................................................... 240 Media Management Options (LTSM) ....................................................................................................... 241 Using the Long-Term Storage Manager Admin Tool ...................................................................................... 242 Managing the Display (LTSM Admin Tool) ............................................................................................... 243 Filtering the Data in the Recovered Studies List....................................................................................... 243 Sorting the Lists .................................................................................................................................. 243 Configuring Display Settings for the Recovered Studies List ...................................................................... 243 Refreshing the Recovered Studies List........................................................................................................ 244 Running NetBackup Synchronizer (LTSM Admin Tool)............................................................................... 245 Generating an Inventory Report (LTSM Admin Tool) ................................................................................ 246 Generating a Media List Report (LTSM Admin Tool) .................................................................................. 247 Generating a Drive State Report (LTSM Admin Tool) ................................................................................ 248 Importing Media into the Jukebox (LTSM Admin Tool) .............................................................................. 249 Exporting Media from the Jukebox (LTSM Admin Tool) ............................................................................. 250 Switching Media Cartridges (LTSM Admin Tool) ....................................................................................... 251 Clearing the Results Area of the Media Management Window (LTSM) ......................................................... 252 Exiting the Media Management Window (LTSM Admin Tool) ...................................................................... 253 Clearing the Long-Term Storage Manager Admin Tool Event Log ............................................................... 253 Exiting the Storage Management Admin Tool .......................................................................................... 253
Email Suite.................................................................................................254
CARESTREAM PACS Email Suite Overview................................................................................................... 254 Email Suite Lifecycle ............................................................................................................................ 254 Email Suite System Components ........................................................................................................... 254 Features and Benefits .......................................................................................................................... 254 Email Suite Lifecycle ............................................................................................................................ 254 MHTML Report Generator ......................................................................................................................... 255 Mail Component ...................................................................................................................................... 255
CD Direct ...................................................................................................261
CARESTREAM PACS CD Direct Suite Overview ............................................................................................. 261 Components ....................................................................................................................................... 261 Features............................................................................................................................................. 261 Setting CD Direct Configuration Parameters ................................................................................................ 262 Production Parameters ......................................................................................................................... 262 Directories Parameters ......................................................................................................................... 262 Labels Parameters ............................................................................................................................... 262 Application Parameters......................................................................................................................... 262
ix
RIS-PACS Synchronization.........................................................................287
Events in the RIS .................................................................................................................................... 288 Using Manual RIS-Sync ............................................................................................................................ 289 Multiple Studies....................................................................................................................................... 289 RIS-PACS Log ......................................................................................................................................... 289 Pre-Fetch ............................................................................................................................................... 289 JPEG Compression ................................................................................................................................... 291 Study Grouping ....................................................................................................................................... 292 Reverse Study Grouping........................................................................................................................... 292 Icons ..................................................................................................................................................... 292
Table Of Contents
Running a System Check from the Online Storage Management Server ...................................................... 296 Performing Routine Maintenance ............................................................................................................... 297 Root Account E-mail (UNIX).................................................................................................................. 298 Backup Verification (UNIX) ................................................................................................................... 299 Verifying the Workflow Manager Daily Backup (UNIX) .................................................................................. 300 Central Configuration Backup (UNIX) ......................................................................................................... 300 Preparing Previously Used Tape............................................................................................................. 300 ORACLE Alert File (UNIX) ..................................................................................................................... 301 Database Fitness Verification (UNIX)...................................................................................................... 302 Online Storage Management Storage Volume Check (UNIX)...................................................................... 303 Checking the Online Storage Management Storage Volume....................................................................... 303 Online Storage Management General (UNIX) .......................................................................................... 304 Viewing System Processes (UNIX) ......................................................................................................... 305 Viewing Daemon Processes....................................................................................................................... 305 Viewing Push and Conference Processes ..................................................................................................... 305 Viewing Currently Running Workflow Manager and Oracle Database Processes ................................................ 305 PreStore Backup Verification (UNIX) ...................................................................................................... 306 Long-Term Storage Manager Storage Volume Check (UNIX) ..................................................................... 307 Long-Term Storage Manager General Fitness Check (UNIX) ...................................................................... 308 Library Hardware Fitness Check (UNIX) .................................................................................................. 309 Moving Audit Logs to Offline Storage (UNIX) ........................................................................................... 310 Exporting Audit Log Files .......................................................................................................................... 310 Clearing the Audit Log.............................................................................................................................. 310 Retrieving Audit Logs ............................................................................................................................... 310 System Monitoring on a Cluster System ..................................................................................................... 311 Using the VCS Cluster Manager to Monitor the Cluster (UNIX) ................................................................... 312 Logging on to the Cluster Manager ........................................................................................................ 312 Cluster Monitor Toolbar and Menus ........................................................................................................ 313 Cluster Monitor Panels ......................................................................................................................... 314 Accessing the Cluster Explorer Window (UNIX)........................................................................................ 315 Cluster Explorer Toolbar (UNIX) ............................................................................................................ 316 Cluster Monitoring Procedures................................................................................................................... 317 Monitoring the Cluster Status (UNIX) ..................................................................................................... 318 Monitoring the Cluster Properties (UNIX) ................................................................................................ 319 Monitoring the Cluster Service Groups (UNIX) ......................................................................................... 320 Monitoring the Cluster Resources (UNIX) ................................................................................................ 321 Monitoring the Cluster Heartbeat (UNIX) ................................................................................................ 322 Viewing Messages from the Log Desk (UNIX) .......................................................................................... 322 Creating Filters for the Log Desk (UNIX)................................................................................................. 322 Switching a Service Group (UNIX) ......................................................................................................... 322 Setting up VCS Event Notification (UNIX) ................................................................................................... 322 Monitoring the Cluster from the Command Line ........................................................................................... 323 Reviewing the VERITAS Cluster Server (VCS) Error Message Logs ............................................................. 323 Engine Log ......................................................................................................................................... 323 Agent Log........................................................................................................................................... 324 VCS Monitoring and Status Commands (UNIX) ........................................................................................ 325 VCS Environmental Variables (UNIX) ..................................................................................................... 326 Common VCS Commands (UNIX) .......................................................................................................... 327 Preserving Cartridges............................................................................................................................... 328 Bar Code Scanner.................................................................................................................................... 328 Programming the Bar Code Scanner ...................................................................................................... 328 Scanning Bar Codes ............................................................................................................................. 329
xi
xii
Table Of Contents
Index .........................................................................................................361
xiii
Preface
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case users will be required to correct the interference at their own expense. P/N 8J3225 Carestream Health, Inc. 150 Verona St. Rochester, NY 14608 USA 29 June 2010
14
System Components
CARESTREAM PACS Client Overview CARESTREAM PACS Workflow Manager Overview CARESTREAM PACS CD Direct Suite Overview Info Router Overview CARESTREAM PACS IS Link Software Overview
15
16
SUPERPACS Architecture
Global Worklist in Archive Explorer From the Archive Explorer, you can create a global worklist folder which: Shows studies from all your sites. Supports seamless work planning. Eliminates the need to log in to different servers. Saves you valuable time. All studies are synchronized with the original server and are sent to your computer as quickly as possible. Push to Client You can read studies faster with Push. The Push capability allows you to transfer studies to your home PC or another remote location. Another person can push studies for you as needed, increasing the potential for collaboration between physicians within the enterprise. You can transfer, monitor, receive, and clear studies from the Archive Explorer. You can receive studies from the PowerViewer.
Volume Matching
With this new application, you can accurately compare different volumetric studies from any modality. The Volume Matching application provides: A set of predefined Display Options. Image synchronization and manipulation capabilities. Image fusion. You can use Volume Matching to: Swap between primary and secondary images. Adjust opacity. Apply a color map to show potential pathology.
PET/CT
The PET/CT application is an image viewer, a registration tool, and an analysis workstation. The application supports all features required for PET/CT reading, including the ability to: Fuse together PET and CT images. View combined current and prior images to see the progress of an area of pathology. You can use PET/CT to: Select a pre-defined Display Option to present PET, CT, and Fusion images. Apply a color map to show potential pathology. Apply measurements in Standard Uptake Values (SUV). Apply layouts to synchronize PET and CT data sets. Register and compare studies.
Enhanced 3D
The enhanced 3-D functions include:
17
Volume Rendering Quality applies a special algorithm for high resolution 3-D images. Object and Anatomy Removal Automatic Bone Removal creates a boneless VolR (below the shoulders). A menu provides new correction tools which you can use to automatically remove additional bone fragments or restore vessel segments. Automatic Scanner Bed Removal removes the scanner bed from 3-D images (VolR or MIP). MPR Double Oblique allows you to freely swivel the reference images in the MPR and Cardiac applications, and view the same anatomical region from three perpendicular orientations. Aneurysm Measurement enables stent planning, such as a stent for an aortic aneurysm.
DICOM Tunneling
Ability to query the global worklist through a regular DICOM query. The query is tunneled to the SuperPACS Data Center. This allows 3rd party PACS easy and standard access to the Global Worklist. See DICOM Tunneling for more information.
Global Priors
This feature enhances local queries for a study with an additional background query to the Data Center for all patient priors. This allows you to view the complete patient profile without changing anything in the regular working flow. See also: Enhanced Transfer Syntax Configuration Multiple Patient ID Support (PIX) in Database Administrator Tool DICOM Tunneling
18
19
The load balancing configuration allows installation of multiple servers, each running the PACS software. The work is load-balanced among the servers. Installation and Upgrades You can install and upgrade all server architecture components in a single installation. The installation/upgrade process supports the installation of all server architectures, automatically configuring the server to work in the desired configuration. The installation/upgrade process installs the components required for each architecture solution, so there it is not necessary to install each product separately. When predefined installation and upgrade scenarios are deployed, you still need to configure the system according to customer-specific requirements.
20
Components
The CD Direct Suite comprises the software and hardware, including the CD Manager Server and a CD burner, necessary to produce CDs that contain image data. CD Manager Serverthe CD Manager Server includes a DICOM server that allows the CD Direct Suite to receive images through a DICOM copy or move command issued from an external DICOM device. The CD Manager Suite prepares the content for each media disc (CD or DVD), including reports, DICOM DIR, DICOM Viewer, JPEG Lossy presentation of the images, and HTML page for quick viewing of the Lossy images. CD Burnerthe CD Direct Suite uses a CD burner (a RIMAGE CD publishing system or another CD burner set up with your system). If you use a RIMAGE CD publishing system, you can print patient information on the face of the CDs (see the RIMAGE CD publishing system user guide for information about printing).
Features
Cost-effective Eliminates the need for handling patient films. Creates CDs without the fear of ruining image data. Provides hospitals with the option to give CDs to referring physicians. Provides referring physicians with the option to give patients CDs or the option to keep CDs for their own records. Ability to burn reports to a CD. Burns CDs in DICOM part 10 format (removable media). NOTE: The CD Direct Viewer is not intended for primary diagnostic viewing. See the user documentation for the CARESTREAM PACS CD Direct Suite for more information. For information about defining the CD Direct Suite configuration parameters, see this topic: Setting CD Direct Configuration Parameters
21
The Info Router is a CARESTREAM PACS System application that facilitates the flow of data in medical image management systems. The Info Router enables the remote control of medical data routing through a standard Web browser. The routing is based on a set of configurable rules defined by the system administrator.
Info Router
The Info Router CARESTREAM PACS Workflow Manager is a configurable, rules-based automatic router, controlling image flow in a PACS/DICOM environment. The Info Router performs all the systems Pre-Fetch requests from the near-line to the online storage, based on triggers from the CARESTREAM PACS IS Link Software (for example, scheduling data for r;true Pre-Fetch) or the Workflow Manager (for example, a new image received for r;late Pre-Fetch or Post-Fetch). Pre-loading allows data to be pushed from the online storage to the local cache of specific reading stations. The Info Router rules are configurable based on image headers and can also be set according to a calendar schedule.
Intended Users
The Info Router is intended for use by system administrators as an interface for defining rules that determine when images are redirected and the destinations to which the images are sent. The system administrator needs only a network connection to control or configure the Info Router. The images and tools provided by the Info Router are intended as aids for the competent user only.
22
Converter Process
Pre-Fetch Process
23
24
25
Support
For initial support, contact your local system administrator. Otherwise: Go to www.carestreamhealth.com. In the U.S., call 1-800-328-2910. In countries outside of the U.S., contact your local representative or your usual product supplier.
26
27
Safety
Safety Guidelines
This product was designed and manufactured to ensure maximum safety of operation. It must be operated and maintained in strict compliance with the safety precautions and operating instructions described. This product must be installed, maintained and serviced according to Carestream Health, Inc.'s maintenance procedures by Carestream Health, Inc. personnel, or other qualified maintenance personnel approved in writing by Carestream Health, Inc.. The system, in whole or in any part, may not be modified in any way without prior written approval from Carestream Health, Inc. Unauthorized personnel must be prevented from accessing the system. If the system does not operate properly, or if it fails to respond to the controls described in this manual, contact the nearest Carestream Health, Inc. field service office to report the incident and await further instructions. The images and tools provided by this system are intended as tools for the competent user only. They are explicitly not to be regarded as a sole incontrovertible basis for clinical diagnoses. Operators are encouraged to study the literature and reach their own professional conclusions regarding the utility of the system. The operator must be aware of the product specifications and of the system accuracy and limitations. These limitations must be considered before making a decision based on quantitative values. When in doubt, consult the nearest Carestream Health, Inc. field service office.
28
Safety Hazards
CAUTION: To prevent serious personal injury and damage to the system, strictly follow the instructions provided in these hazard warnings. Always remain alert when operating this equipment. If a malfunction occurs, do not use the equipment until qualified personnel correct the problem. ELECTRICAL SHOCK HAZARD Do not remove or open system panels, covers or plugs. The internal system circuits use high voltages that can cause serious injury or death from electrical shock. EXPLOSION HAZARD Do not operate the equipment in the presence of flammable or explosive liquids, vapors or gases. Do not plug in or turn on the system if hazardous substances are detected in the environment. If flammable substances are detected after the system has been turned on, do not attempt to turn off the system or unplug it. Evacuate and ventilate the area before turning off the system. IMPLOSION HAZARD Do not subject the system to serious mechanical shocks, as the cathode ray tube (CRT) can explode if struck or jarred. An explosion may result in flying pieces of glass and coating that can cause serious injury. OVERHEATING Do not block the ventilation ports of the electronic equipment. Always maintain at least 6 inches (15 cm) clearance around the ventilation ports to prevent overheating and damage to the electronic hardware. EMERGENCIES Do not use the system if unsafe conditions are known to exist. In the event of hardware failure that could cause hazardous conditions (smoke, fire, and so on), turn the power OFF and unplug the power cords for both the monitor and the desktop unit. ELECTRICAL FIRES Conductive fluids that seep into the active circuit components of the system may cause short circuits that can result in an electrical fire. Therefore, do not place fluids or food on any part of the system. To avoid electrical shocks and burns caused by the use of the wrong type of fire extinguisher, ensure that the fire extinguisher at the site has been approved for use on electrical fires. POTENTIAL PACEMAKER HAZARD Although the possibility of interference with pacemakers is slight, the operator should be alert to such a potential hazard from any equipment using high-frequency electrical signals.
29
30
31
User Limitations
The software and documentation described in this manual are furnished under license and nondisclosure agreements. The software and documentation may be used or copied only in accordance with the terms of these agreements. No modifications, additions or deletions are allowed on the equipment. No operations can be performed other than those available through the applications that are described in this online Help. Carestream Health, Inc. shall be neither liable nor obligated in respect to bodily injury and property damage arising from the use of this software, if such use is not in strict compliance with the instructions contained in this manual and in all other relevant literature supplied by Carestream Health, Inc. This is in accordance with the terms of warranty and sale of this product.
32
33
The application installs automatically. When installation is complete, the Browse for Folder window appears. The main window displays the contents of the DICOMDIR grouped by patients. 2. Select a patient (all studies for the patient are selected by default) or select specific studies (for the same patient), 3. Click Import .
See these topics: Using the Data Import Tool Changing Data Import Tool Settings Importing Studies
34
See these topics: Installing the Data Import Tool Changing Data Import Tool Settings Importing Studies
35
This window contains four tabs: Import Rules: settings for importing a new patient. NOTE: If Clear Issuer is checked, then the issuer arriving with the study is cleared and the study receives the default issuer as defined by the CARESTREAM PACS server. Patient Matching: settings for automatic searching for the patient in the archive.
36
NOTE: While performing Patient Matching, use the issuer tag as defined in the study. De-Identify: De-Identify settings.
General
37
38
2. Search the archive for the selected patient. Default patient matching rules are used which are defined in the settings. You can query the archive for any patient by modifying the filter manually (empty filters are not allowed). 3. Select patient details for the selected studies: Select original patient: Import rules will also apply (patient ID and accession number modifications). Select a patient from the Archive: Patient details from the archive are applied to all images in the selected studies. 4. Click 5. Click to review the patient and study details before starting the import operation. to import the data.
To de-identify and import a study: 1. From the Data Import Tool toolbar, click De-Identify and Import The Hide Details window appears showing default values. .
39
2. Specify new details. New IUIDs will be generated for all images (study, series, and image). Other identifiers (referring physician, operator, institution, station name, etc.) are removed from the images. 3. Click 4. Click to review the patient and study details before starting the import operation. to import the data.
A patient and study details check, which includes checking the accession number, is performed before the Import operation commences. If the study already exists in the archive, all its details are taken from the archive. If a new patient was selected but the same patient ID already exists in the archive, a new patient ID is generated for the new patient. If one of the above is found, the Preview window will open before the import begins.
40
User Management Admin Tool (Group) User Management Admin Tool (Group)
User Management (UM) provides a central login mechanism that serves as an entry point to all CARESTREAM PACS applications and tools. It also provides centralized management of the system users and groups. The UM functions either with the Central Configuration for the CARESTREAM PACS System as the users/groups repository or with the Lightweight Directory Access Protocol (LDAP) as the repository.
LDAP
LDAP (Lightweight Directory Access Protocol) is an open standard protocol used to access directory servers. Some sites use a centralized directory service to administer user accounts, groups, and devices. At such sites, the CARESTREAM PACS System can be configured to rely on the directory service for user identification and authorization. Although this prevents duplication of effort, the directory service must be highly available; otherwise, users might not be able to log in. When a site uses LDAP, the user information stored within LDAP cannot be viewed using the User Management Admin Tool. In this configuration, the UM controls only parts of the group and system settings. Allowed applications are also determined only at the group level. In this case, the User Management Admin Tool functions and the graphical user interface (GUI) appear differently than in systems that are not using LDAP. For example, in the main User Management Admin window, only groups can be viewed; therefore, only the Groups tab is displayed. In systems using LDAP, when adding and editing groups and system settings, the displayed windows are also condensed versions of the standard windows. The windows are condensed because the user information is defined at the site within the directory server and only have read access to their information, and can perform any administrative functions on it. The site controls all the users, and you control only the groups that you define. NOTE: Contact Customer Service for more information about setting up this optional feature.
Configuring Authentication
When a user logs in to any CARESTREAM PACS product, the login mechanism uses a central user database to perform authentication of the user. This authentication is performed using the login name and password assigned to each user by the system administrator. Users can use this assigned information to log in, change their password, or log in without a password by answering a question correctly if the password was forgotten. The question and its correct answer must be set up in advance by an administrator. The user cannot change the question or answer. The system automatically informs users when their password has expired and prompts them to change it. The length of time that each password is valid can be configured by the administrator. In addition, the allowed system operations for each user depend on the configured access rights. See Access Control Management Tool for more information. See these topics: Logging in to the CARESTREAM PACS Admin Home Page Performing Group Management Configuration Opening the User Management Admin Tool Viewing/Editing System Settings Selecting/Changing the User Management Repository Defining New Groups
41
42
NOTE: When you log in for the first time, you are prompted to change your password. 4. In the Login field, enter your assigned login name. 5. In the Password field, enter your password. 6. Click OK to log in to the selected product.
From a WINDOWS OS
1. Select Start --> All Programs --> Carestream Solutions --> Admin. The Login window appears.
NOTE: When you log in for the first time, you are prompted to change your password. 2. In the Login field, enter your assigned login name. 3. In the Password field, enter your password. 4. Click OK to log in to the selected product. NOTE: If a license violation error occurs, the error will be displayed on the admin entry screen. See WFM Licensing Status Monitoring for more information.
43
See Access Control Management Tool for more information. NOTE: Only authorized administrators are allowed access to the User Management Admin Tool. Performing user management configuration consists of the following: Opening the User Management Admin Tool Defining New Users Viewing/Editing User Settings Deleting a User
44
Performing User Management Configuration Opening the User Management Admin Tool (User)
The User Management Admin window provides access to all the available user management functions. These functions include adding, editing, and deleting users, as well as defining all their relevant settings. Users defined in the system appear in the Users tab and can be filtered and sorted in the display. NOTE: The User Management Admin window appears differently depending on whether your system is using LDAP or not. From the CARESTREAM PACS Admin Home Page, select User Management. The User Management Admin window appears.
Users Tab
The Users tab contains list of predefined users. You can add users to the list, edit a users settings, or delete a user, as well as filter and sort the list of users. The Users tab contains the following information for each user: Column Login Name First Name Last Name Group Name E-mail Last Login Date Description The users assigned login name. The users first name. The users last name. The group to which the user is assigned by the administrator. The users e-mail address. The date that the user last logged in to the system. This is useful for determining if the user is actively using the system or not. To insert the current date, click Current Date for the relevant field. Between/and: a date option that filters users by the Last Login Date. In the Between/and field, enter the to and from dates in DD/MM/YYYY format. Previous: Enter or select the number of previous days (for example, enter 7 for the previous week). All users who have logged in during the previous [x] days appear. The age of the users password (in days). This lets you know when it is time for users to change their passwords (and remind them if necessary). It is also useful for determining if a users password is too old and should be changed for security purposes. From/To: This numeric option filters the users by the password age. Enter the required range of days (for example, from 20 to 50). The users current status, as follows: Active: The user is currently active and has access to the system. Suspend: The user has attempted to log in several times using incorrect login information and is currently blocked from accessing the system. The user remains locked until the administrator unlocks the user account. Timeout: The user has attempted to log in several times using incorrect login information and is currently blocked from accessing the system for the preconfigured timeout period. The user can either wait for the timeout period to pass or request to be unlocked by the administrator. Expired: The user can no longer access the system. This often indicates that the user was assigned a temporary role, which allowed access to the system for only a limited time. It is recommended to delete any expired user accounts from the system. NOTE: The Audit Trail uses the user's login ID when recording actions performed by this user. When a user account is removed from the system, the system administrator should keep a record (for at least six years) of the personal identity of the user, so that historical data in the Audit Trail can be related to that individual.
Password Age
Status
NOTE: A user can also be manually locked out of the system, if required. For more information, see the User Status option in Adding New Users.
45
The Set filters window appears. NOTE: To clear the filter criteria, click Clear. 2. Enter the desired filter criteria. 3. Click OK. The list of users is updated automatically and displays only the users that match the filter criteria that you specified. In addition, the criteria that the list is currently filtered by appear in gray fields above the relevant column names.
46
47
NOTE: Field names in red indicate that the information is mandatory. 3. Enter the users general details: Last Name: The users last name. First Name: The users first name. Description: (Optional) A textual description related to the user. Group: Select a group from the predefined list of the available groups. Each user must be assigned to a group. See Adding New Groups for more information. E-mail: The users e-mail address. Role: Each user must be assigned a role in the system. Select a role from the list of default roles:
48
o o
49
50
2. To let the user access the report system: Enter the required user name and password in the Report fields. Re-enter the password to confirm it. 3. To let the user access the RIS system: Enter the required user name and password in the RIS fields. Re-enter the password to confirm it. 4. Click OK.
51
52
53
Contacts are different from the standard system users since the system does not manage their credentials and permissions (i.e., they cannot log-in to the system). The Contacts tab is also enabled in the LDAP repository. The following information is kept for each contact: Field Name Contact ID Last Name First Name Email SameTime ID Description Comment A unique identifier for the contact The contact's last name The contact's first name The contact's e-mail address An ID used to establish Lotus SameTime communication in the PACS Client Additional information about the contact
54
Script Location
UNIX: /usr/algotec/um/scripts/importFromCsv.scr WINDOWS: D:\Program Files\Carestream Solutions\System5\scripts\importFromCsv.bat
Usage
Use a single script named importFromCsv with the following flags: importFromCsv <-addcontacts | -addusers> <-user> <-pass> <-inputfile > [-outputdir] [-header] addcontacts: The CSV file contains contacts. addusers: The CSV file contains users. user: User name to log into the system. pass: Password to log into the system. inputfile: CSV file that contains the data. outputdir: where to place logs of operation. Optional when not used. No logs will be written to the local log. header: Used when using addcontacts flag. Indicates that the first line contains a header.
NOTE: The first three fields are mandatory and the order is fixed. If no header is given, then these fields are used.
55
Access Control
Restrictions to Users and Groups
Users defined for the CARESTREAM PACS Client have full access to all Workflow Manager data, unless they are assigned configurable restrictions using the Access Control Management Tool. A restriction is the combination of the following two items: Tag: The type of DICOM data that is limited, for example, modality type, body part, and so on. Value: A predefined value for the specific DICOM tag. A list of the predefined values is available from your system administrators. These restrictions are assigned according to restriction levels (user, group, or node). Restrictions at the user level are configured by selecting one user at a time and adding one or multiple restrictions, as required. Each user must be assigned to a group. See these topics: Updating a Restriction Removing a Restriction
56
From the Edit menu, select Add Tag Restriction. Right-click in the Tag/Value pane and select Add Tag Restriction. The Add Tag Restriction window appears. 6. From the Tag drop-down list, select the DICOM tag of the specific Workflow Manager data that you want to restrict.
7. In the Value field, enter the predefined value for the selected tag. NOTE: You can add more than one restriction by inserting a backslash (\) between each specific value. For example, 1\2 allows the user to access studies from site 1 or 2 only. 8. Click OK. The new access control settings appear in the Tag/Value pane. 9. If required, repeat steps 5 to 8 to add additional restrictions to the same user. 10. Click Save .
When the user in the group requests Workflow Manager data, access is limited according to the restrictions that you defined.
57
See these topics: Updating a Restriction Removing a Restriction Access Control Management Tool
58
From the Edit menu, select Update Tag Restriction. Right-click in the Tag/Value pane and select Update Tag Restriction. The Update Tag Restriction window appears. 3. Do either or both of the following: From the Tag drop-down list, select the new tag of the specific Workflow Manager data that you want to restrict. In the Value field, enter the predefined value for the new tag or add an additional value for the existing tag. 4. Click OK. The updated restriction is displayed in the Tag/Value pane. 5. Click Save to save the new access control settings.
When the user in the selected group or node requests the Workflow Manager data, access is limited according to the restrictions that you defined above.
59
Removing a Restriction
You can remove a restriction from a group to enable previously limited CARESTREAM PACS Workflow Manager data to be accessed. 1. Open the Access Control window by selecting the required group. The selected group is displayed in the Access Control pane. 2. Do one of the following: From the Access Control toolbar, click Remove .
From the Edit menu, select Remove Tag Restriction. Right-click in the Tag/Value pane and select Remove Tag Restriction. The Remove Tag Confirmation message appears. 3. Click OK. The selected restriction is removed from the Tag/Value pane and is no longer applicable. 4. Click Save to save the new access control settings.
The previously restricted data is available the next time the user in the relevant group requests it.
60
Security Manager
The Security Manager is a system-wide application that controls the various permissions, access restrictions, and other permission-based features of all products in the CARESTREAM PACS System, including configuration and administration tools. The system is built using the principles described below. Group A group is an entity containing users and is attached to a specific profile. A group contains a set of parameters such as Display Protocols in CARESTREAM PACS Client or specific security settings, etc. A profile describes the functions a user has after logging in to the CARESTREAM PACS Client. A profile contains a list of features (similar to licensing). Sites cannot edit the contents of a profile. One group can only belong to one profile. However, several different groups can belong to the same profile. For example: Group A belongs to one specific profile (Profile A). Group B also belongs to one specific profile (Profile A). Users of both groups have the same set of basic features (and user interface) when they log on to the system. However, each group has its own set of permissions. A feature is a licensed permission, is not configurable, and represents a function in the system. Permissions The permissions to perform certain operations or view certain data are controlled by the Security Manager and managed by the UM. Permissions are attached by default to a specific group. Permissions can also be configured on a user level. Each group has a specific set of permissions with a 1:1 ratio (one set of permissions is available for one group and vice versa). The same theory applies to users. For example, a user belonging to a group automatically inherits the groups permissions. If a specific permission is added or removed from the user, the user has a specific set of permissions. You can configure permissions on a system, group, or user level. Each level overrides the preceding level. Certain permissions are dependent upon features. If a user does not have the feature in the profile to which the user is attached, the permission is not available to the user. The permissions mechanism must read the profile content and allow configuring permissions for the relevant features in the profile and changing the permissions. Features that are not in a specific profile do not appear in the User Management at all. Certain features of the system are included as part of the profile definition and require permission controls. The permissions mechanism allows configuring or changing permissions for the relevant features in the profile. Features that are not in a specific profile do not appear in the Security Manager. Most sites have more than one profile, so the permissions mechanism must be able to read the profile that is relevant for a specific user or group.
Profile
See these topics: Security Manager Permissions Configuration Security Manager Permissions Settings Applicable Permissions Configuring Permissions
61
Applicable Permissions
The following permissions are controlled through the Security Manager. Setting Update Data Description Permission to edit patient and study details. Should apply to any update of patient and study details, both in the Archive Explorer (editable fields) and in the Administrator tool (update, merge/split, RIS Sync, etc.). Lets the user delete images and reports. Should apply to deletion being performed from the CARESTREAM PACS Client or from the Administrator tool. Access to Foreign Archives (View/Write/Delete) Print Images Burn CDs Permission to access, save, copy, and/or delete images from any of the remote servers that are configured. Permission to print images to a network printer or a DICOM printer. Permission to send data to the CD Direct Suite. This permission does not mean that the user necessarily has copy permissions (even though the Info Router uses the copy function for this specific activity). Permission to copy images from the local archive to a foreign archive. Permission to save data to the local disk. Permission to save data to the local archive. Permission to create or delete personal and system folders, work lists, and teaching file folders. Permission to create, edit, and delete personal, group, and system display protocols (DPs) by using Save As and the DP Editor. Also allows use of the DP repair tool. Can be applied only to users who have permission to create, edit, and delete system DPs using the DP Editor. Also allows permission to save presentations for a certain study. By default, the permission to create, edit, and delete personal DPs using Save As is applied to any user defined in the Radiologists group. Similarly, by default, the permission to create personal, group, and system DPs using Save As or the DP Editor is applied to any user defined in the System Administrators group. By default, the permission to Save Presentation is applied to any user defined in the Radiologists group. URL and Action Button Permissions Permission to change a study after the URL activation was invoked (launch Archive Explorer and select a different study). NOTE: The permission to allow URL activation is included under the Application Access Permissions. Permission to activate a specific Action button that is configured on site (for example, the ORTHOVIEW action button triggering the integration with the ORTHOVIEW application). View Reports Permission to view reports. If this permission is not given, the R or O icons in the Patient Mini-Archive are disabled and the Reports button in the Archive Explorer or the Viewer is disabled. By default, this permission is applied to any user defined in the Radiologists group. This permission allows a user/group reading permissions (the ability to move studies from one status to another within the system when clicking on Done), together with the ability to lock a study. If permission is not granted, the user returns to the Archive Explorer when clicking Done and does not receive the Done dialog box. By default, this permission is applied to any user defined in the Radiologists group. If this permission is given, the relevant workflow is configured for the particular group/user. Mark Key Images Permission to mark images as key images. Only users with reading permissions can be assigned with the Mark Key Images permission. By default, this permission is applied to any user defined in the Radiologists group. NOTE: The permission to mark key images does not necessarily mean that the user has Save As permissions. Users who do not have permission to Save
Copy Images Save to Local Save to Server Folders Display Protocols and Presentations
Reading Permissions
62
Security Manager
Images to Server can still mark key images. Dictate Report Permission to dictate a report. Only users with reading permissions can be assigned the Dictate Report Permission. By default, this permission is applied to any user that is defined in the Radiologists group. Permission to save reports that have been automatically generated in CARESTREAM PACS applications such as Calcium Scoring and Vessel Analysis. Only users with reading permissions can be assigned the Save Reports permission. By default, this permission is applied to any user defined in the Radiologists group. Levels of permission for Sticky Notes: Only view Sticky Notes View and add Sticky Notes (no editing) Edit and delete user's own Sticky Notes Edit and delete other users Sticky Notes Teaching Files Levels of permission for Teaching Files: View a Teaching File View and insert a study into the Teaching File Change the content of a Teaching File (view/add/edit) View/add/edit/delete a teaching file Edit the Teaching File form Access Control Rules Similar to the Access Control rules currently in existence in the CARESTREAM PACS. Query Permissions controls whether a user or group can query certain locations. This capability is in the general Security Manager application and can be applied at group level (the permission to add/edit/delete users in your group or at system level). Resetting Users' Permissions Permission to reset user passwords. This capability is inherent today based on the role of the user such as System Operator or Group Operator. This capability is in the general Security Manager application and can be applied at group level (the permission to reset users passwords in your group or at system level). Editing Users' Permissions Permission to edit permissions. This capability is inherent based on the role of the user (System Operator or Group Operator). This capability is in the general Security Manager application can be applied at group level (the permission to grant users permission in your group or at system level). See these topics: Security Manager Security Manager Permissions Configuration Security Manager Permissions Settings Configuring Permissions
Save Reports
63
64
Security Manager
Security Manager Permissions Configuration
Permissions are accessed from the User Management application. Permissions are divided into the following categories: Image Manipulation Permissions
o o o o o o
Export Data Update Data Reading Flow Folder Creation DP Creation URL and Action Buttons
Workflow Permissions
Access to Foreign Archives Application Access Application Settings CD Monitoring User Management Settings See these topics: Security Manager Security Manager Permissions Settings Applicable Permissions Configuring Permissions
65
66
Performing Group Management Configuration Opening the User Management Admin Tool (Group)
The User Management Admin window provides access to all the available user management functions for the system, group and user levels. These functions include adding, editing, and deleting groups and users, as well as defining all their relevant settings. NOTE: The User Management Admin window appears differently depending on whether or not your system is using LDAP. From the PACS Admin Home Page, select User Management. The User Management Admin window appears. When using a system with LDAP, the User Management Admin window shows only the Groups tab.
Users Tab
The Users Tab contains a list of users defined in the system. You can add users to the list, edit user details or delete a user, as well as filter and sort the list of users.
Groups Tab
The Groups tab contains a list of predefined groups. You can add groups to the list, edit a groups settings, or delete a group, as well as filter and sort the list of groups.
Profiles Tab
The Profiles Tabs contains a list of profiles configured in the system. By clicking on each profile, the contents of each profile and the features allowed by that profile are displayed.
The Set Group Name filter window appears. NOTE: To clear the filter criteria, click Clear. 3. In the Group Name field, enter the required group name or partial group name. 4. Click OK. The list is filtered and displayed accordingly.
67
68
Performing Group Management Configuration Selecting/Changing the User Management Repository (Group)
Using the User Management Admin Tool, you can select either the Central Configuration for the CARESTREAM PACS or LDAP as the User Management repository, depending on your requirements. See these topics: Selecting the Central Configuration as the UM Repository Selecting LDAP as the UM Repository Testing the LDAP Configuration
69
The right pane displays the parameters and values for the selected folder in the configuration editor tree. Use this pane to view specific parameters and values, as well as to modify configurations. In this pane, parameters can be managed and values assigned to a selected folder. Right-click in this pane to access these options: Option Add Value Remove Copy Cut Paste Edit Value Select All Copy Path to Clipboard Description Adds a new value. Deletes an existing value. Copies a value to somewhere else. Cuts the value to somewhere else. Pastes the key to somewhere else. Lets you edit the value. Selects all values. Copies a value to the clipboard to paste somewhere else.
IMPORTANT: Select File --> Save to save your changes. Otherwise, changes will be lost. CAUTION: Exercise caution when changing the Central Configuration. Changing the wrong entries or making an incorrect entry for a setting can introduce an error that prevents the entire system from starting or working properly. Contact Systems personnel for assistance before making any changes.
70
You can open the LDAP Configuration window from a UNIX server. From the /user/algotec/um/scripts location, run the following script: run_ldap_settings.scr. You can open the LDAP Configuration window from a WINDOWS server. From the C:\Program Files\Carestream Solutions\System 5\um\admin location, run the following script: ldap_settings_ui.bat 2. Select the Central Configuration option. NOTE: When the LDAP Configuration window is expanded and you select the Central Configuration option, the window collapses. 3. Click OK. The LDAP Settings message appears. 4. Click OK to set the Central Configuration for the CARESTREAM PACS as the UM repository. 5. Return to the CARESTREAM PACS Admin Home Page. 6. Click System Monitoring. 7. Restart the system by stopping and then restarting all daemon processes.
71
72
73
74
The User Management Admin Tool lets you: add new groups to the system. add/define advanced options. NOTE: During installation, one default administrator user is defined to let the administrator start using the system with the default settings. Except for the default administrator, account users and groups initially have no privileges. The system administrator must set these before the system can be used. See these topics: Adding New Users Adding New Groups Viewing/Editing Group Settings Viewing/Editing Group Settings (without LDAP) Viewing/Editing Group Settings (with LDAP) Deleting a Group
75
o o
o o
Lock user: The user is locked and cannot access the system until the administrator unlocks the user. Suspend user. Duration in minutes: The user is locked out for the defined timeout period. In this case, the user can wait until the timeout period has passed or request to be unlocked by the administrator.
CAUTION: Unsuccessful attempts to log into the application with a valid user name but an incorrect password are not recorded in the Audit Trail. In the Edit System Settings window, go to the Password Failures Settings pane and verify that Allow number of password failures is set to 5 and Suspend user duration in minutes is set to 30. A user can be manually locked out of the system. 8. Define the access control settings, as required. See Access Control Management Tool for more information.
76
77
78
79
80
81
Examples
No assigned access level means that the user has full access to all Workflow Manager data. All users must be assigned to a group, so if neither the individual user nor the group has been assigned an access level, all users in the group have full access. A group restriction specifying a MODALITY DICOM tag and an MR value means that users in this group can only view MR images. See these topics: Opening the Access Control Management Tool Users Tab Opening the Access Control Management Tool Groups Tab
82
83
84
NOTE: All users must be assigned to a group. Users with no configured restrictions on the user or group levels are allowed full access to all Workflow Manager data.
85
From the Edit menu, select Add Tag Restriction. Right-click in the Tag/Value pane and select Add Tag Restriction. The Add Tag Restriction window appears. 6. From the Tag drop-down list, select the DICOM tag of the specific Workflow Manager data that you want to restrict.
7. In the Value field, enter the predefined value for the selected tag. NOTE: You can add more than one restriction by inserting a backslash (\) between each specific value. For example, 1\2 allows the user to access studies from site 1 or 2 only. 8. Click OK. The new access control settings appear in the Tag/Value pane. 9. If required, repeat steps 5 to 8 to add additional restrictions to the same user. 10. Click Save .
When the user in the group requests Workflow Manager data, access is limited according to the restrictions that you defined. See these topics: Updating a Restriction Removing a Restriction Access Control Management Tool
86
From the Edit menu, select Update Tag Restriction. Right-click in the Tag/Value pane and select Update Tag Restriction. The Update Tag Restriction window appears. 3. Do either or both of the following: From the Tag drop-down list, select the new tag of the specific Workflow Manager data that you want to restrict. In the Value field, enter the predefined value for the new tag or add an additional value for the existing tag. 4. Click OK. The updated restriction is displayed in the Tag/Value pane. 5. Click Save to save the new access control settings.
When the user in the selected group or node requests the Workflow Manager data, access is limited according to the restrictions that you defined above.
87
Removing a Restriction
You can remove a restriction from a group to enable previously limited CARESTREAM PACS Workflow Manager data to be accessed. 1. Open the Access Control window by selecting the required group. The selected group is displayed in the Access Control pane. 2. Do one of the following: From the Access Control toolbar, click Remove .
From the Edit menu, select Remove Tag Restriction. Right-click in the Tag/Value pane and select Remove Tag Restriction. The Remove Tag Confirmation message appears. 3. Click OK. The selected restriction is removed from the Tag/Value pane and is no longer applicable. 4. Click Save to save the new access control settings.
The previously restricted data is available the next time the user in the relevant group requests it.
88
Info Router
The Info Router CARESTREAM PACS Workflow Manager is a configurable, rules-based automatic router, controlling image flow in a PACS/DICOM environment. The Info Router performs all the systems Pre-Fetch requests from the near-line to the online storage, based on triggers from the CARESTREAM PACS IS Link Software (for example, scheduling data for r;true Pre-Fetch) or the Workflow Manager (for example, a new image received for r;late Pre-Fetch or Post-Fetch). Pre-loading allows data to be pushed from the online storage to the local cache of specific reading stations. The Info Router rules are configurable based on image headers and can also be set according to a calendar schedule.
Intended Users
The Info Router is intended for use by system administrators as an interface for defining rules that determine when images are redirected and the destinations to which the images are sent. The system administrator needs only a network connection to control or configure the Info Router. The images and tools provided by the Info Router are intended as aids for the competent user only.
89
90
3. Select System Monitor --> Processes. The Enter Network Password window appears. 4. Enter your network User Name and Password. 5. Click OK.
From a WINDOWS OS
91
1. Select Start --> All Programs --> Carestream Solutions --> Admin --> System Monitoring. The Login window appears.
NOTE: When you log in for the first time, you are prompted to change your password. 2. In the Login field, enter your assigned login name. 3. In the Password field, enter your assigned password. 4. Click OK to log in to the selected product. See these topics: Rules Configuration Screen Custom Function
92
93
The Info Router toolbar contains the following options Button Rules Insert Rule Edit Rule Delete Rule Refresh Lets you add a new rule. Lets you edit an existing rule. Lets you delete a rule. Lets you manually refresh the data that appears in the Info Router Client window tabs. When you use this option, the currently displayed tab data is refreshed. When you select another tab, the Info Router also automatically refreshes the data in that tab. Lets you save changes. Option Description
Save Alias Insert Aliasing Delete Item Select All Select None Exit the Application
Lets you define an alternate name for an item or a group of items. Deletes the selected item(s). Selects all items in the current tab. Deselects all currently selected items. Exits the Info Router application.
94
The Info Router toolbar contains the following options. Button Option Delete Command(s) Refresh Commands Filter Description Lets you delete selected commands. Lets you manually refresh the data that appears in the Info Router Client window tabs. Lets you filter the commands that appear in the Monitor tab, as described in Filtering Commands. You should filter periodically to avoid displaying an excessive number of commands. Selects all items in the current tab. Deselects all currently selected items. Exits the Info Router.
95
Filter Commands
Help
96
These panes display the status as shortcuts. To view information about each status, click the command status shortcut. The information corresponding to the shortcut appears. Screen splitter arrows between the areas enable you to resize the Command Log Information area, or to click and drag it to a new position. The number of commands displayed in the Monitoring tab can be controlled by applying filters, as described in Filtering Commands.
97
Filtering Commands
You can filter the commands that are displayed in the Command List area of the Monitor tab. You can also view the number of commands that appear in the Command List area when the filters are applied. You should apply the appropriate command filters to reduce the number of commands that appear in the Command List area of the Monitor tab. When fewer commands appear, the retrieval time is reduced. 1. Do one of the following: From the Info Router toolbar, click Filter Select View --> Commands --> Filter. The Commands Filter window appears. 2. Enter the required filter criteria: Option command ID between Description The ID of the command from which to start the display. If you leave this field blank, all commands created up to the selected command in the To ID field are displayed. The type of command (for example, Send to mail or Copy). The rule that generated the command. The name of the patient you want to display. Enter a partial name to display all the patient names that begin with that string of letters. The source of the event (for example, Copy from the Online Storage Management). The destination of the event (for example, Copy to Diagnostic Workstation). Filters the displayed commands by date: Previous: Shows all commands initiated in a predetermined number of hours. Between Dates: Shows all commands initiated between the two predetermined dates. Status Filters the displayed commands by status: Not Started: shows commands not yet started. Waiting: shows commands currently waiting to run. Running: shows commands currently running. Succeeded: shows commands that succeeded. Failed: shows commands that failed. Ignore group commands Number of commands Filters the displayed commands by type. If this box is checked, Group commands are not displayed. The number of commands that are displayed, if the filters are applied. This field is read-only. NOTE: Any change to parameters does NOT automatically update the counter. Click the Refresh Count button to update the number of commands. The button is disabled if there are no changes. 3. Click OK to apply the selected filters. 4. Close the Commands Filter window. The information in the Commands List area is updated and displayed according to the criteria that you defined. .
98
UNIX System
1. In your browser, enter the address (URL) of the server and press Enter. You are connected to the local server. The home page appears.
2. Click Administration. The PACS Admin home page appears. 3. Select System Monitor --> Processes. The Enter Network Password window appears. 4. Enter your network User Name and Password, then click OK. The System Monitoring window appears. 5. Click Info Router Processes. The Info Router Processes window appears. 6. Click Start or Stop, as required.
WINDOWS OS System
1. Select Start --> Programs --> Carestream Solutions--> Admin --> System Monitor --> Processes. The LOGIN window appears. NOTE: When you log in for the first time, you are prompted to change your password. 2. Enter your login name and password, then click OK.
99
100
101
xds_disable_pix_query
xds_pix_manager_ip xds_pix_manager_port
Submission Details
Name: A descriptive name of the submission, when document is stored it will be used as content for DICOM STUDY_DESCRIPTION. Reference: By default, the value of this field is mapped to TAMAR_MISC_STRING_2. Date Time: By default, the value is taken from the document creation date time. You can change it by setting a new date time. Documents Location: Click Add Document to add documents to be stored.
102
CARESTREAM PACS IS Link Software IMS Document Repository (XDS Document Repository)
The Document Repository is installed with the system and is responsible for the storage of documents and their registration with the appropriate Document Registry. It assigns a URI to documents for subsequent retrieval by a Document Consumer. In the XDS environment, the Document Repository stores incoming documents in the Workflow Manager by wrapping each document with a new DICOM OT STUDY.
Properties
disable_register_document This field specifies if to Register the incoming documents in the Document Registry. ------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\xds\repository\settings\disable_register_document VALUE: false ------------------------END VALUE----------------------\xds_registry_uri The URL of the Document Registry ------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\xds\repository\settings\xds_registry_uri VALUE: http://129.6.24.109:9080/axis2/services/xdsregistrya ------------------------END VALUE----------------------repository_dump_files_location_or_disabled If set with directory location the repository will dump temporary metadata files for diagnostic purpose. ------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\xds\repository\settings\repository_dump_files_location_or_disabled VALUE: /usr/algotec/medilink/resources/xds/doc_repository/output/ ------------------------END VALUE----------------------xds_repository_base_document_uri This base uri is used to update the Document Registry about each document retrieve URL. ------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\xds\repository\settings\xds_repository_base_document_uri VALUE: http://10.2.0.166/um/webapp_services/xds-rep-load?objectUID=% ------------------------END VALUE-----------------------
103
Converter Process
Pre-Fetch Process
104
CARESTREAM PACS IS Link Software Using the CARESTREAM PACS IS Link Software
The IS Link Software processes write debug messages into the TAMAR_LOG standard log file located in the /usr/tmp directory. To manage the IS Link Software log level, click the System Monitoring link in the PACS Admin Home Page. Select Logger Configuration, then select the TMR_PKG_JLog package and apply the required log level.
105
106
107
Using the CARESTREAM PACS IS Link Admin Tool Opening the IS Link Admin Tool
You can access the IS Link Admin Tool through the PACS Admin Home Page, using any supported Web browser. This is similar to all other CARESTREAM PACS products, which are accessed through this central location. 1. In your browser, type the address (URL) of the server and press Enter. You are connected to the local server. The CARESTREAM PACS home page appears. 2. Click Administration. The PACS Admin home page appears. 3. Select System Administration --> IS Link. The Enter Network Password window appears. 4. Enter your login name and password, then click OK. The Enter Filter Values window appears, which lets you filter the studies you want to load. 6. Enter the required filter criteria. See Filtering the Studies List Storage Management Admin Tool for more information about filtering the list initially, as well as filtering it further at any time. NOTE: It is important to apply filters in order to limit the list of studies to a workable size. If you do not want to apply any filters, click Clear and then OK. Filters can be applied only using the Filter window. Click the filter icon in the Admin Tool to display the Filter window. 7. Click OK. The IS Link Admin Tool window appears.
108
The View Patient Data window shows all data relating to the selected patient. The Additional Information section allows you to choose any information that is not displayed in the fields. NOTE: Click the appropriate button if you want to view the specific Visits, Orders, or Reports of the selected patient.
109
110
The IS Link Admin Tool window toolbar provides these functions: Button View Data IS Link Queues Delete Report You can change the configuration to delete reports. The default is set to enabled. See System Configuration. To change this configuration go to the Central Configuration and change the following path: PATH: imaginet\system\applications\medilink\config\admintool\ islink_configurationVALUE: true Option Description
IS Link Central Configuration Filter Refresh Exit the Application Exits the IS Link Admin Tool.
111
See these topics: Configuring a Converter and Listeners Configuring IS Link Database Values Configuring Reports and Orders Values Configuring Report Parser Values Configuring Queues and Notifications
112
113
Complex Mapping Table Dictionary Lets you define a dynamic table in which the number of fields is dynamic. Columns can be added and removed by the click of a button. The sorting of the table is performed by order of the fields in the user interface.
Enhancements to the complex mapping tables include: Support of sorting and filtering in the tables. Improved performance for launching the display of complex tables.
114
115
Mapping IDs from the CARESTREAM PACS IS Link Software to WFM can be performed in two different ways: 1. According to assigning authority. For example, a map ID with the assigning authority "ADT1" to WFM Patient ID field and the ID with the assigning authority "ADT2" to the WFM Patient Custom field. 2. According to the order of the Patient ID. For example, map only the first ID in the sequence to WFM Patient ID field and the second ID in sequence to the WFM Patient Custom field. The preferred and correct method to map IDs from the CARESTREAM PACS IS Link Software to WFM is according to Assigning Authorities. To enable this feature, you must follow these rules: 1. Ensure that each ID you want to display by either assigning authority or by sequence is mapped to a field in WFM. IMPORTANT: At least one of the IDs must be mapped to the WFM Patient ID field. 2. Ensure that the mapped WFM field used for the mapping is re-syncable. NOTE: To make a field re-syncable, see Mapping Mechanism. 3. Enable the Patient ID feature. To add patient ID mappings: 1. Go to: imaginet\system\applications\medilink\config\api\multiple_pid\ 2. Add patient_id_X entry with select c.val_id from the MDB_Rep_CX_Field c where c.current_dbid = (select max(c.current_dbid) from MDB_Rep_CX_Field c where c.column_dbid = 101 and c.dbid = %u and c.val_assign_auth_name = 'Assigning_Authority')" where the ''Assigning_Authority' is changed according to the identifier assigning authority. and Add patient_id_X_mst_map entry with the WFM field name to map as a value NOTE: X is a sequential number and can be used for each required ID (1, 2, 3 etc). Example: The following example shows how to map the Global ID shown above to the Patient ID field in WFM and the Local ID to the WFM Patient Custom field No. 1. ------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\config\api\multiple_pid\patient_id_1 VALUE: select c.val_id from MDB_Rep_CX_Field c where c.current_dbid = (select max(c.current_dbid) from MDB_Rep_CX_Field c where c.column_dbid = 101 and c.dbid = %u and c.val_assign_auth_name = 'ADT1') ------------------------END VALUE----------------------------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\config\api\multiple_pid\patient_id_1_mst_map VALUE: patient_id ------------------------END VALUE----------------------------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\config\api\multiple_pid\patient_id_2 VALUE: select c.val_id from MDB_Rep_CX_Field c where c.current_dbid = (select max(c.current_dbid) from MDB_Rep_CX_Field c where c.column_dbid = 101 and c.dbid = %u and c.val_assign_auth_name = 'ADT2') ------------------------END VALUE----------------------------------------------START VALUE----------------------PATH: imaginet\system\applications\medilink\config\api\multiple_pid\patient_id_2_mst_map VALUE: patient_custom_field_1 ------------------------END VALUE-----------------------
116
117
3. Click Choose HL7 Field. A window containing a table of all the HL-7 fields appears. 4. Select the required HL-7 field and click OK. You are returned to the first window. 5. To return to the default settings, click the Restore Default button. 6. To replace the HL-7 value using the dictionary table, check the box to enable the Edit Table button. 7. Click the Edit Table button. The Old Patient ID Table window appears. 8. Click the Add Data button to add new data. 9. Enter the field Value and add the Converted Value. 10. Edit or Delete any existing value, as required. 11. Click OK to return to the Field Configuration Window. 12. If the Enable RIS-Sync box is checked, you can update the field according to the rule appearing in the drop-down list. If the box is not checked, the options are grayed out. 13. If you want to Normalize the RIS Value, check the box. It appears under the Normalized column of the System Configuration table. 14. Click OK.
118
The window specifying the mapping tables appears. 2. Select a table. 3. Click View. To: Add data Do this: 1. Click the Add Data button. 2. Add the new value and converted value. 3. Click Save and Clear to continue adding new values, 4. Click OK when you are done. Delete a value 1. Select the value and click the Delete Data button. You are asked to confirm the deletion. 2. Select Yes. Edit a value 1. Select the value and click the Edit Data button. The Update Table Data dialog box appears. 2. Change the value. 3. Click OK. 4. Click Exit to return to the main window. Add a new Mapping Table 1. Click the Add button on the right side. The Add Simple Mapping Table dialog box appears. 2. Enter the name of the New Table. 3. Click OK. The new table is added to the list. Update a Simple Mapping Table 1. Click the Update button. The Update Simple Mapping Table dialog box appears. 2. Update the Table Name. 3. Click OK. Delete a Simple Mapping Table 1. Select the table you want to delete and click the Delete button. You are asked to confirm the deletion. 2. Click Yes.
119
The window specifying the complex mapping tables appears. 2. Select a table. 3. Click View.
120
For WINDOWS OS
C:\Program Files\Carestream Solutions\System5\medilink\admin\ send_file_loop.pl
121
Auditing
The CARESTREAM PACS System includes a comprehensive auditing function that tracks all PHI-related activities, warnings, and failures that occur in the system. Using the Audit Viewer Tool, Security Administrators can exclude events from auditing and define filters to manage information collected by the system. This information can be used to trace the source of selected changes to information in the system, as well as to detect unusual system activity. See these topics: Pre-Filtering the Audit Viewer Tool Window Audit Viewer Tool Window Archiving an Audit Managing the Display Viewing Event Details Defining General Auditing Settings Defining Audit Event Settings Updating Screen Settings Viewing History Using the Audit Trail to Export Logs to MICROSOFT EXCEL
122
Severity Filterselect the check box next to each event type to display, as follows: Informationevents related to PHI accesses, such as a data query or a login. Warningevents that could affect the system, such as major configuration changes or start/stop operations (for example, stopping the Info Router). Any changes made to the list of events that are not audited, as described in Defining Audit Event Settings, are also considered warning events. Errorevents that indicate any type of failure that affects the availability of the system. Success Auditevents such as successful logins to the system and other security-related matters. Failure Auditevents that indicate a security violation, such as an authentication failure (bad login) or an access control restriction violation attempt. Field Filter areafilters events according to information contained in selected fields, as follows:
First Namethe patients first name. NOTE: Partial entries and wildcards can be used in these fields. 3. Click OK. The selected filter criteria are applied and the Audit Viewer Tool window appears. See Audit Viewer Tool Window. NOTE: To erase all currently defined filter criteria, click Clear.
o o o o o o o
User Namethe name of the user who performed the action recorded by the event. Sourcethe source of the event, such as the Central Configuration. Locationthe server on which the event occurred. Categorythe event type, such as System Access or Account Management. Sub Categorythe event subtype, such as User Authentication or Security Alert. Last Namethe patients last name.
123
The Audit Viewer Tool window lets you perform the following actions: Managing the Display Viewing Event Details Defining General Auditing Settings Defining Audit Event Settings Updating Screen Settings Viewing History
124
Field Chooser
By default, a set of fields in the study, series, and image level are displayed. Users can change the set of displayed fields, the order in which they are displayed, and the width of each column. Field Chooser options are available by right clicking the column headings and selecting the required option. These options are described below: To: Move a column Delete a column Change the column width Add a column Remove a column Save changes Do this: Click the column header and drag the column to the right or left. Right-click the column you want to delete and select Remove Column. Click the edge between two adjacent column headings and drag to the position you want. Right-click the column header, select Field Chooser, and click Add. Select a field in the right pane, select Field Chooser, and click Remove. Right-click the column header and select Save Settings. NOTE: If you do not save the settings, changes apply only to the current session and are not saved for new sessions. Right-click any column in the right pane and select Clear All Filters. Right-click anywhere in the column header and select Set Default Settings.
125
SOURCE STUDY INSTANCE UID ADDITIONAL DEST AE LAST NAME LOG DBID PATIENT ID SRC AE SUB CATEGORY CATEGORY EVENT DATE LOCATION LOG NAME SEVERITY STUDY ACCESSION NO USER NAME
The name of the application that generated the event The unique ID number for the study instance (For future use) The node (including AE title, if any) to which the accessed data was sent The patients last name N/A The patient ID number The node (including AE title, if any) from which the accessed data was taken The event subtype The event type, such as PHI Access or System Access The event date The server that was the source of the event (For future use) The severity of the event The Study Accession number used by the RIS The name of the user who initiated the event
From the View menu, select Filter Events. The Filter Events window appears. 2. Enter one or more filter criteria.
126
4. Select one of the following field names from the pop-up menu:
127
The selected field name appears in the Field Name list. 6. Select the field name, right-click, then select Add Value from the pop-up menu. 7. In the pop-up window, enter the field value to exclude from auditing. 8. Click OK. The value appears in the Field Values list. 9. (Optional) Repeat steps 5 and 6 to define additional values for the selected field name. 10. Repeat steps 3 through 8 to define additional discard rules. 11. Click OK to save the settings. NOTE: To delete a field value, select it from the Field Values list, right-click, and select Remove Value. To delete a field name, select it from the Field Name list and click See this topic: Defining General Auditing Settings .
From the Settings menu, select Display Settings. The Update Settings window appears. 2. Select the Automatic Refresh check box to have the system automatically update the events displayed in the Audit Viewer Tool window. 3. In the Refresh Interval field, select the interval for performing automatic refresh (in seconds). 4. Click OK to save the settings.
Viewing History
The History Viewing function allows you to view audits either online or offline. Audits that are kept offline prevent the list of the Audit Trail Viewer from become overloaded. The time parameters for when events are taken offline is configurable. 1. From the View option of the menu bar, choose Select Audit Repository. 2. Choose Audit Offline. The offline Audit View trail appears. See this topic: Using the Audit Trail to Export Logs to MICROSOFT EXCEL
2. In the Export Audit to File window, select the location to save the file.
128
Workflow Management
Highly modular system design ensures scalability and easy expansion to accommodate growing and evolving needs. Open standards-based system guarantees easy integration and connectivity with other imaging and health care information systems. Unique hybrid distributed/centralized system architecture assures fault tolerance. Storage solutions range from magnetic disk/RAID-based short-term buffers to multi-layered DLT libraries, or any other library compatible with and supported by NetBackup, offering terabytes of capacity. Multiple backup features provide high redundancy and fault tolerance. Intelligent management and image compression software minimizes costs. All functions are Web enabled and Web controlled. RIS-PACS synchronization ensures that all data and images stored are always up-to-date and are the same as the hospital records. The Workflow Manager is a r;privacy-enabled system that provides tools that facilitate compliance with HIPAA regulations.
Workflow Grid
The Workflow Grid system allows for multi-site configurations to include the following capabilities: 1. Sharing studies throughout an organization. 2. Creation of a Data Center. 3. Cross-reading between hospitals. 4. The ability to perform multiple functions using one system. These capabilities provide a true "virtualization" of the reading process across various sites, regardless of the physical architecture and supporting various configurations and relationships between sites. The Workflow Grid technology supports the following key features: Global Worklistusers can access a single Worklist representing their "to do" list studies that need to be read, even if studies included in the list are stored in different physical locations. Unified Workflowusers can use the same workflow whey reading studies stored in different locations, including having all relevant study information together with updated statuses. Study Tunnelingthe system is able to select the fastest and most efficient route in certain scenarios where the user retrieves studies located on a remote server. This involves the use of streaming technology on a per-study basis. Data Integritya synchronization process between sites with a mechanism to ensure that all relevant data is synchronized correctly and to be able to recover from scenarios where the synchronization was interrupted. Since the system is flexible it supports the configuring of different levels of synchronization to balance properly between the need of updated data and database and network overloads. Supporting Unlimited ArchitectureThe "building blocks" composing the technical solution of Super PACS are designed so that they support a wide variety of configurations and can be tailored for specific use cases when required.
129
130
131
Tunneling Protocol
Tunneling is a new mechanism that enables efficient and intelligent routing of study data between any multiple servers. The main benefits of the Tunneling Protocol are: Allows a CONN-based connection between clients and remote servers, i.e. servers at other sites. Integrated support over GRID: Secured (SSL) / Non Secured and FAST/Streaming loading. Performance optimizationThe new mechanism knows the most optimized way to perform each operation. It supports the following capabilities: Querying an operation to a remote server including DICOM tags and proprietary information such as Order and Report information, Sticky Notes and Teaching Files information. Images are automatically retrieved from their fastest location. Seamlessly switching between lossless and streaming technology. Abstracting the sites infrastructurethe user can easily get data from a distant and unknown PACS, without having any connection or knowledge of that site. Enhanced speeddata is streamed through the tunneling mechanism, so there is no need to wait, a complete study travels across all nodes until it is displayed to the user.
132
The Expected Rate column indicates how fast and in which quality the requested study will arrive according to the location of the user. The values are as follows: Fast, Best Quality Slow, Best Quality Fast, Progressive Quality Slow, Progressive Quality Unavailable For studies available either on local, Online or Online2 tiers and arriving in best quality mode. For studies available nearline arriving in best quality mode (the user is physically connected on a slow network to the server on which the study is stored). For studies available either on Online or Online2 tiers and arriving in progressive quality. For studies available on nearline arriving in progressive quality. For offline studies.
NOTE: The Fast and Slow values indicated in the Expected Rate column refer to the expected rate derived by storage tieronline / nearline / offlineand not to the traditional internal referral of a fast network versus a slow network.
Priors Policy
The important parameter of the streaming policy is the location of the studies and not the login mode. The DP Streaming flag should be used as follows: The flag must always be used and not limited to specific login modes The flag determines whether to bring priors or not based on the location of the priors The behavior supported by using this flag is as follows: When set to True, the DP always retrieves priors as define in the DP rules, regardless of their location. When set to False the process is to first identify the prior studies that should be loaded based on the DP rules and then, from those studies only automatically load priors available on a fast network.
Export Operations
Export operations, such as Key Images or Saving DICOM images, are performed against the original server from which the study was retrieved. When the user is working against a Global Worklist and is loading studies from
133
different locations, then for each study the exported data is saved automat9cally to the server from which the study was retrieved from.
134
Workflow Management
Synchronized Workflow Managers The CARESTREAM PACS System allows synchronization of the Worklist between two or more remote PACS sites. Load Balancing Configuration (Distributed Architecture) The load balancing configuration allows installation of multiple servers, each running the PACS software. The work is load-balanced among the servers. Installation and Upgrades You can install and upgrade all server architecture components in a single installation. The installation/upgrade process supports the installation of all server architectures, automatically configuring the server to work in the desired configuration. The installation/upgrade process installs the components required for each architecture solution, so there it is not necessary to install each product separately. When predefined installation and upgrade scenarios are deployed, you still need to configure the system according to customer-specific requirements.
o o
On storethe DICOM server encrypts the specified tags before writing an image to disk.
135
Database Encryption
The CARESTREAM PACS system can use the ORACLE 10 Transparent Data Encryption mechanism to encrypt sensitive database columns. The encryption is almost transparent to PACS applications. During installation, specific database columns are marked as encrypted. After providing the access-password, encryption and decryption of sensitive database columns is enabled for all applications, until the database instance is shut down or the system administrator provides a lock-password:
o o
On storeeach time patient data is saved to the database, ORACLE encrypts the data before writing it to an encrypted column. On query/loadeach time a PACS application queries the sensitive data, Oracle decrypts the sensitive columns before sending data to the application.
136
Workflow Management
Database Admin Tool
See these topics: Field Chooser and User Configurations Viewing Study and Report Information Updating Series Information Merging/Splitting at Image Level Protecting/Unprotecting Studies Multiple Patient ID Support
137
138
Workflow Management
Storage Management Admin Tool Window Menu Bar
Menu File Option Refresh Exit Edit Update Patient Update Study Display Settings Edit Modality List View Filter Dialog Server Settings Description Lets you manually refresh the data that appears in the Studies List area. Lets you exit from the Storage Management Admin Tool and return to the PACS Admin Home Page. Lets you update patient details for one or more patients. Lets you update study details for one or more patients. Lets you configure the automatic refresh settings and the maximum rows of data that display in the Studies List area. Lets you update, add, or remove modalities from the configuration. Lets you filter the data that appears in the Studies List area using single or multiple filter criteria. Lets you configure server settings, such as Online Storage Management and Long-Term Storage Manager Auto Delete parameters, DICOM parsing rules, and so on. For more information, contact Customer Service. Lets you search for and view the location of one or more studies in the system. Lets you search for and view the location of the backup media for one or more studies in the system. Lets you move one or more studies that are attached to an incorrect patient to the correct patient. Lets you perform a manual synchronization between the RIS and the Online Storage Manager. Lets you move one or more studies that are attached to an incorrect patient to a newly created patient. Displays information about the current Storage Management Admin Tool software version.
Study Location Study Media Tools Merge Patient Manual RIS-Sync Split Patient Help About
139
140
Workflow Management
Field Chooser and User Configurations
The database admin tool supports the configuration and saves the column settings. By default, a set of fields in the study, series, and image level are displayed. Users can change the set of displayed fields, the order in which they are displayed, and the width of each column. The user interface to perform these changes is similar to that used in the CARESTREAM PACS Client. All changes are available at the Study, Series, and Image level. To: Move a column Delete a column Change the column width Add a column Remove a column Save changes Do this: Left-click the column header and drag the column to the right or left. Right-click the column you want to delete and select Remove Column. Left-click the edge between two adjacent column headings and drag to the position you want. Right-click anywhere on the column header, select Field Chooser, and click Add. Select a field in the right pane, select Field Chooser, and click Remove. Right-click anywhere in the column header and select Save Settings. NOTE: If you do not save the settings, changes apply only to the current session and are not saved for new sessions. Right-click any column in the right pane and select Clear All Filters. Right-click anywhere in the column header and select Set Default Settings.
To change the fields appearing in the Database Admin Tool: 1. Right-click anywhere on the column header and select Field Chooser.
The Field Chooser window appears. The left pane lists all available fields in alphabetical order.
141
2. Click the desired field. 3. Click Add. The chosen field is added to the list on the right pane, which lists the fields to be displayed. 4. To remove a displayed field, highlight a field in the right pane. 5. Click Remove. 6. Use the Move Up and Move Down buttons to change the order in which the displayed fields appear. 7. Click OK when complete.
142
Workflow Management
Viewing Study and Report Information
The Database Admin Tool provides the administrator with the ability to view the study images. To view a study from the Database Admin Tool: 1. From the Database Admin Tool, choose the study you wish to view. 2. Click View Study icon. or Right-click a study, then select View Study. 3. You can also view any report information related to the study being viewed, if available. If the decision of which study to be viewed is not unique (for example, where the study does not have an accession number), a dialog containing all relevant studies appears. Select a study and click Load or Cancel. NOTE: This operation is limited to a single study. If you do not have URL activation permissions, the View Study icon is disabled.
143
3. Complete the details in the fields. 4. Click Search Series. A list of series appears. 5. Select the series. 6. Click OK. The details are entered automatically into the Select Target Series for Merge window. 7. Click OK. A prompt appears. 8. Click OK. Splitting a Series 1. From the Image Details window of the Database Admin Tool, select an image. 2. Click Split from Series. The Select Target Study window appears.
144
Workflow Management
3. Click Search Study to find the study. The Select a Study window appears. 4. Select a study. 5. Click OK. The details of the study are entered automatically into the fields of the Select Target Study window. 6. Click OK. The Split Series window appears. 7. Complete the fields. 8. Click OK. A prompt appears. 9. Click OK.
145
146
Once the feature has been activated, a new Manage Patient ID option is added to the right-click menu when you click on study.
The Manage Patient ID option is not shown by default, you can add it through the system configuration tool: imaginet\system\applications\medistore\admintool\use_pid_manager = TRUE (default) Note: The update patient dialog will not allow changing patient ID/issuer anymore It is now possible to view, add or update a PID.
147
To delete an existing PID: All operations are synced except Delete. The Delete button is disabled by default. To change the default setting, go to: set imaginet\system\applications\medistore\admintool\allow_pid_delete = TRUE Once enabled, a Delete key appears:
148
Workflow Management
Online Storage Management Tasks
The main image repository, Online Storage Management, stores, retrieves, and loads images. It lets you access the patient and study data currently held in the system. In addition, the Online Storage Management server performs a variety of automatic operations to ensure that the system functions optimally. See these topics: Configuring Patient Matching DICOM Parameters RIS Patient Matching Patient ID Uniqueness Validation Image Resend Displaying SOP Instance UID Alerts
149
150
Workflow Management
Patient ID Uniqueness Validation
The Patient ID Uniqueness Validation process handles conflicts resulting from the Patient Matching process. If a Patient ID has been assigned to multiple patients, the system assigns a new ID number to each repetition. A new Patient ID is generated when all of the following conditions occur simultaneously: A study is stored in the Workflow Manager. The Patient Matching check detects that the study is for a new patient. A patient with the same Patient ID already exists in the Workflow Manager. A new Patient ID is generated to preserve Patient ID uniqueness, as defined in the DICOM standard for supporting the patient root model. The newly generated Patient ID is constructed from the original Patient ID, linked with $$$ to a serial number. For example, a patient with Patient ID 1234 exists in the Workflow Manager. Any new patient (according to the Patient Matching algorithm definition) with the same Patient ID is assigned Patient ID 1234$$$1, or 1234$$$2, and so on. In this way, the original Patient ID is visible to the user and it is noticeable that it was changed by the system.
151
Image Resend
The Image Resend process prevents images from being archived multiple times. It protects the database from storing duplicate images and assures that the stored image represents the latest version received by the database. Images are usually added to the database as part of a study. Individual images can later be retrieved from online storage, manipulated, and returned to storage. When the image is returned to storage, it overrides the older image. Before an individual image is added to the database, a cross-reference check is performed to determine whether an image with the same SOP instance UID already resides in the Workflow Manager database. If such an image is found, the Workflow Manager verifies that the incoming image and the stored image have the same series instance UID and study instance UID. Only after this verification does the incoming image override the older image. If a difference is found in one of the SOP instances, the image is rejected.
152
Workflow Management
Displaying SOP Instance UID Alerts
Some modalities assign the same SOP instance UID to images from different studies. When this occurs, these images are rejected. Therefore, operators of modalities should watch for rejections of images by the server and report such events to the PACS Administrator. The system administrator should also regularly review log messages for rejections (for example, at least once a day, or more frequently when there is a high volume of incoming data). If any such events are found, the system administrator should notify the PACS Administrator.
153
Studies Removal
The studies to be removed are selected as follows: To avoid any possibility of losing image data, only images that are already backed up in the long-term storage are deleted. If the system has long-term storage, the studies are removed from the disk, but the database entries remain untouched. If a removed study is requested in the future, it is retrieved from long-term storage. If the system does not have long-term storage, the studies are removed from the disk and from the database. Studies are removed according to their priority group categories, starting from the least important group and ascending hierarchically until the process is completed. Within each group, studies are sorted according to the least recently accessed rule, meaning that the least recently accessed studies are deleted first.
154
You can manage the studies displayed in the Studies List area by performing these standard functions: Filtering the Studies List Sorting the Studies List Configuring Display Settings for the Storage Management Admin Tool Refreshing the Studies List
155
Filter Types
The following types of filters can be applied to the studies list in the Storage Management Admin Tool window. String Filter A string filter is applicable to columns that display data in string format and can accept any kind of string. Each string in the column that begins with the entered filter string passes through the filter and appears in the Studies List. A date filter is applicable to columns that display data in date format. There are two ways to enter this type of filter: Between: Filters the studies list by the defined date range. Enter the to and from dates in DD/MM/YYYY format, or to insert the current date, click Current Date for the relevant field. Previous: Select/enter the number of previous days (for example, 7 for the previous week). All studies added to the archive during the previous [x] days appear. Numeric Filter A numeric filter is applicable to columns that display numbers. This type of filter enables the entering of a single number or a numeric range.
Date Filter
156
Workflow Management Sorting the Studies List (Storage Management Admin Tool)
The studies list displayed in the Storage Management Admin Tool window can be sorted by up to three columns. 1. Click a column name to activate the primary sort. Click once on a column name to perform an ascending sort and click again on the same column name to perform a descending sort. 2. Press Shift and click another column name to select a secondary sort. 3. Press Ctrl and click the third column name to perform a tertiary sort. If a column is used for a sort, a symbol is displayed next to the column name, as follows: Symbol Description First Sort Ascending Second Sort Ascending Third Sort Ascending First Sort Descending Second Sort Descending Third Sort Descending
o o o
From the Storage Management Admin Tool toolbar, click Refresh From the File menu, select Refresh.
Right-click a study in the Studies List area and select Refresh. The currently displayed studies in the Studies List area are updated and displayed according to the latest information in the archive.
157
The Update Patient Data window appears. NOTE: When updating patient details, the Patient ID field is disabled when choosing multiple studies, as the unique patient ID number for each patient cannot be updated 3. Click on Extended Details to update the phonetic or ideographic patient name details. These appear in the appropriate column in the Patient Details list. The Extended Patient Details dialog box opens. 4. Update the patient data, as required, and click OK. The Confirm Update message appears, prompting you to confirm the update operation. 5. Click Yes. The relevant patient data is updated in the archive. NOTE: When patient data is modified, the change is applied to all the studies for the patient stored in the archive.
158
159
3. Enter one or more patient criteria in the fields, as required. You can also enter a partial string in any of the fields. Start with the initial characters. The subsequent characters may be omitted. 4. Click Search Patient. The Select A Patient window appears with a list of patients matching the criteria that you defined in the previous step. 5. Select the required patient and click OK. Any missing patient details appear in the Select Target Patient For Merge window. 6. Click OK. The Merge Patient Confirmation message appears, prompting you to confirm the Merge operation. 7. Click OK. The Merge Patients Successful message appears. 8. Click OK. The incorrectly attached study merges with the selected patient information in the archive. NOTE: The Merge operation may take longer if you are merging multiple studies. In this case, an additional confirmation message appears, informing you that it will take some time and asking if you want to continue with the Merge operation. CAUTION: If the error message Error Connecting to Admin Server is received when performing either the Merge or the Split operations, you must ensure that the Admin Server process is running. To ensure that the Admin Server process is running: - In the PACS Admin Home Page, click the System Monitoring link. - In the displayed System Monitoring window, click the AdminTool Processes link. - In the displayed Storage Management Admin Tool Processes window, click Stop to stop the server. - Click Start to restart the server.
160
Workflow Management
Detaching Studies
Detaching of a study from a patient is done when a study is inserted and attached to the incorrect patient. Sometimes when you search for a patient to whom you would like to attach a study, you find that the required patient has not yet been created. The Split operation lets you create a new patient and move an individual incorrectly attached study or multiple studies to that new patient.
3. Enter the new patient data as required. NOTE: The Patient ID field is a mandatory field. When entering the birth date in the Birth Date field, it must have a specific format (for example, 1-Jan-2002). 4. Click OK. The Split Patient confirmation message appears, prompting you to confirm the Split operation. 5. Click OK. The study is attached to the newly created patient information in the archive. NOTE: The Split operation may require a longer time to perform if you are splitting multiple studies or if the selected study is comprised of numerous images.
161
162
Workflow Management
Splitting a Series from One Study to Another
1. Using the Admin Tool, locate the series to split. 2. Note the following: Patient ID Patient Name Study ID External Archive (E-SIR) where the study is located 3. Click Split from the Storage Management Admin Tool toolbar.
NOTE: You can create a new patient or select an existing patient. 4. Note the following: Patient ID Patient Name 5. Enter the Patient ID and Patient Name. 6. Note the following: Accession Number Study Name 7. Go to the WebView Contents menu on the system console of the External Archive (E-SIR), and select the DB Update Tool. 8. When the Database Query page appears, enter the information from step 2. 9. After a patient level, study level, or query is performed, the delete function appears on the resulting Patient List page, letting you delete the series. 10. Click the appropriate check box(es) in the DB Update Tool to select the item(s) to be deleted. NOTE: Up to five items can be deleted at one time. 11. Click Delete to delete the selected items.
163
164
Workflow Management
Relocating a Series from One Study to Another
1. Go to the WebView Contents menu on the system console of the External Archive (E-SIR), and select DB Update Tool. 2. Select Relocate --> Relocate Series. The DB Update Tool - Query For Series To Relocate window appears. 3. Enter the query data from Step 2 in Merging a Series from One Study to Another. 4. Click Query. When there are matching series, the DB Update Tool - Select One Series to Relocate window appears. 5. To select a series to relocate, click the appropriate button. The DB Update Tool - Query For Destination Study window appears. 6. To locate the destination study, enter the query data from step 2 in Merging a Series from One Study to Another. 7. Click Query. The DB Update Tool - Confirm Series Relocation window appears. 8. Click a radio button to select a study destination for the series. The DB Update Tool - Confirm Series Relocation window appears. This page displays the series relocation information and the following options: Click New Source to change the source. Click New Destination to change the destination. Click Relocate to confirm the relocation. 9. If the series relocation information is correct, click Relocate. If the series relocation information is incorrect, click New Source or New Destination, as required.
165
166
Workflow Management
Locating Studies (Storage Management Admin Tool)
You can search for the location of an individual study or multiple studies in the system. Each study can reside in multiple locations, as there are always at least two copies of a study in the system at all times. These copies can reside on any combination of the following locations; the Location option lets you determine where they are stored: Online Storage Management (online) Long-Term Storage Manager or Long-Term Storage Manager cache (near-line) Jukebox (offline) 1. Select a study or studies in the Studies List area. 2. Do one of the following: Click Study Location from the Storage Management Admin Tool toolbar.
From the View menu, select Study Location. Right-click the required study and select Location. The Studies Images Locations window appears, listing the exact location of all copies of the study or studies in the system, as shown in this example: /fir_fs: The study is online. /sir_fs: The study is in the Long-Term Storage Manager or the Long-Term Storage Manager cache. Backed up in Jukebox: The study is offline (in the Jukebox). Backed up in External Archive: The study is nearline on an E-SIR.
167
168
Workflow Management
Loading from Single Media Archive (SMA)
When a study resides only on the SMA, the study availability is offline. When a user tries to load the study, a message informs the user that the study is offline and displays information about the media ID where the study is burned. A pending request to move this study to online is created. The PACS Administrator inserts the requested media in the CD/DVD drive and uses the SMA Admin tool to move the study to online. Info Router copies the study from the CD/DVD to the FIR after the study is copied. The study availability changes to online and the user can load the study from the FIR for viewing. Single Media Archive (SMA) Configuration The SMA configuration is located at System --> Applications --> Medistore --> didb - enable_sma_pending_request This parameter specifies whether to add a pending request when a user loads a study that is offline. The default is True (when an SMA is installed). The SMA_migrate_field parameter indicates which column in database table didb_studies is used to mark studies during the migration process. The default is free_text6 imaginet\system\applications\medistore\admintool\auto_delete\images\exclude_templates\template12 - template 12 defines the new life cycle group template "Studies Waiting to be Burned". Use the selected column in database table didb_studies to mark studies during the migration process. The default is free_text6. You can access SMA settings dialog boxes both in the System Configuration and in the CD Direct Suite. In the CD Direct monitoring page, the SMA settings are displayed in a separate dialog box from the CD Direct settings. Single Media Archive (SMA) Admin Tool The SMA Administration Tool enables the System Administrator to respond to pending requests for studies stored on external media. The SMA Admin Tool has two tabs: Pending Requests Media The Pending Requests tab provides details to the System Administrator about the requests for studies. To move a request online: 1. From the Pending Requests tab, mark the study to be moved online. 2. Click the Move Online button. The Move Pending Requests Online dialog box opens. 3. You can: Move all pending requests from the chosen Media ID Move only the selected request NOTE: If no Pending Request is highlighted, the only option available is to move ALL pending requests. The option to move a selected request is grayed-out. 4. From the drop-down menu, select the Source AE. 5. From the drop-down menu, select the Destination AE. 6. Click OK. To remove a Pending Request: 1. From the Pending Requests tab, mark the study to be removed. 2. Click the Remove Request button. You are prompted to confirm the removal of the selected request. 3. Click OK to confirm the removal. The Media tab lists the external media and includes details such as the Media ID, creation date, status, and the number of available copies. To check a Media: 1. From the Media tab, mark a study you wish to check. 2. Click the Media Studies button. The Studies on Media: XXX window appears, which provides details about the selected media. 3. Click OK. To update a Media: 1. From the Media tab, mark a study you want to update.
169
2. Click the Update Media button. The Update Media XXX dialog box appears. 3. In the Media Status field, you can change the status from the dropdown list of options. 4. Use the arrows to change how many copies are available. 5. Click OK. NOTE: The Auto-Refresh option automatically refreshes the data in the tabs, but you can also click on the icon to refresh the list data. When there are multiple CD Direct servers installed in a system, only one CD Direct workstation can be used as the SMA. The CD Direct station used as the SMA is set during CD Direct installation, but can be changed to a different station at any time later using the SMA Settings dialog boxes. Using WADO The WADO Retrieve transaction enables an Imaging Client to access DICOM SOP Instances with a web-based service through an HTTP/HTTPS protocol. The Imaging Client issues an HTTP "Get To" request to request a specific DICOM instance from the CARESTREAM PACS Client. The CARESTREAM PACS Client receives the request and generates the response with the appropriate content and sends an HTTP response to the Imaging Client. The message semantics are defined by the DICOM Web Access to DICOM Persistent Objects (WADO), PS 3.18. The WADO Retrieve transaction is performed by the Imaging Client to send an HTTP Request-URI to the Workflow Manager. The Imaging Client generates the HTTP Request-URI to retrieve a DICOM instance. The DICOM instance is specified with its Study Instance UID, Series Instance UID and SOP Instance UID in the HTTP Request-URI. The Imaging Client must obtain the host information (e.g., web server location and script language) of the web server to perform this. The Imaging Client can map the Retrieve AE Title of the SOP Instance to the web server host information based on its local configuration. The IMS WADO URL: http://www.carestreamserver/um/webapp_services/wado The IMS WADO service supports the following fields in the HTTP request: Parameter Name requestType studyUID seriesUID objectUID contentType annotation rows region windowCenter windowWidth imageQuality transferSyntax Parameter Description Type of the HTTP request performed. It must be WADO Unique identifier of the study Unique identifier of the series Unique identifier of the object MIME type of the response Annotation of the object Number of pixel rows Region of image Window center of the image Window width of the image Image quality factor Transfer syntax UID used with DICOM image object returned in the response
Example of an HTTP Request-URI for retrieving a persistent DICOM object using WADO: http://www.carestreamserver/um/webapp_services/wado?requestType=WADO&studyUID=1.2.250.1.59.40211.1234 5678.678910& seriesUID=1.2.250.1.59.40211.789001276.14556172.67789&objectUID=1.2.250.1.59.40211.2678810.87991027.89 9772.2& contentType=application%2Fdicom This example uses a response MIME type application/DICOM to request the DICOM SOP Instance returned in the native DICOM Part 10 file format.
170
System Configuration
The System Configuration tool is divided into two sections: Application Configuration and Workflow Configuration.
Workflow Configuration
The Workflow Configuration provides a flow to define configuration parameters by providing a structured step-by-step wizard to guide the user in the process of configuring a specific flow. The Workflow Configuration tool is the flow to configure Image Storage rules.
Application Configuration
The Application Configuration section includes the various configuration parameters that are defined per Application/Component.
171
DICOM Configuration
The DICOM configuration allows you to configure servers and printers using the System Configuration.
172
All Studies
All Patients
Presentation State C-Move Policy Transfer Syntax Policy Storage Commitment Policy
173
Presentation State C-Move Policy Standard (As is) Move with Referenced Images Apply Presentation State Ignore Presentation State
Description Presentation States are moved as normal images. (Defaultshould only be changed for specific reasons) Presentation States are moved together with all referenced images, even if they were not requested. Presentation State is applied to the referenced images and this unified result is stored to the server. Presentation States are not moved to this server regardless of any prior command.
174
3. Choose a server name. 4. Click Verify to confirm the connection. A dialog box appears confirming the connection. If you are made changes to the selected server, you will be prompted to save your changes before you can continue.
175
176
Excluding an SOP class from Association The option to exclude SOP Classes is useful to overcome the maximal limit of Multiple Presentation Contexts.
177
The more you exclude, the more you can multiply. SOP Classes Excluded from Association Each marked SOP class is not requested when acting as a client, or supported when acting as a server. You can use this feature if there are too many Multiple Presentation Contexts. By removing irrelevant SOP classes, you can save Presentation Contexts. SOP Classes Added to Association You can add additional SOP classes to the association, by adding their description and UID (should be used rarely). These SOP classes are requested when acting as a client, or supported when acting as a server.
DICOM Tunneling
Use Cases
1. Transferring messages compressed in private formats (RICE) and from 3rd party archives to 3rd party clients, via the C-Move protocol, use the SVDDS service as a mediator for format conversion purposes. Note: The DICOM C-Move command has three roles participating: Move Caller, Move Provider, and Move Destination. Move Caller - the entity invoking the move command Move Provider - the entity presumed to have the data Move Destination - the entity to which the data is sent The Move Caller and the Move Destination can be different entities. 2. Forwarding stored responses between a client not directly connected to a provider, but via one or more Carestream servers. 3. Updating the DICOM messages retrieved from long term storage, with newer information stored on the servers before transferring them to the move destination.
178
System Configuration
3. There is a new device type called DDS, which is the DICOM tunneling entry point. 4. The DDSs AE title of the local server is determined upon installation or upgrade. It can be found in the Work Flow Manager section of the System Configuration. The port is the same as the port of the FIR.
179
5. Add the DDS-type AE title of all other Carestream servers in the archive section, and all 3rd party archives as well. The new AE has the same port as the FIR AE title. NOTE: This AE title cannot be queried.
180
System Configuration
181
3. Click Choose HL7 Field. A window containing a table of all the HL-7 fields appears. 4. Select the required HL-7 field and click OK. You are returned to the first window. 5. To return to the default settings, click the Restore Default button. 6. To replace the HL-7 value using the dictionary table, check the box to enable the Edit Table button. 7. Click the Edit Table button.
182
System Configuration
The Old Patient ID Table window appears. 8. Click the Add Data button to add new data. 9. Enter the field Value and add the Converted Value. 10. Edit or Delete any existing value, as required. 11. Click OK to return to the Field Configuration Window. 12. If the Enable RIS-Sync box is checked, you can update the field according to the rule appearing in the drop-down list. If the box is not checked, the options are grayed out. 13. If you want to Normalize the RIS Value, check the box. It appears under the Normalized column of the System Configuration table. 14. Click OK.
Dictionary Mechanism
The dictionary consists of: Simple Dictionary (Mapping Table): The Simple Mapping Table lets you define simple translation tables of the various codes you are using. You enter a value and receive the converted value. Complex Dictionary (Mapping Table): The Complex Mapping Table is a dynamic table in which the number of fields is dynamic. You can add or remove columns with the click of a button. The sorting of the table is determined by the order of the fields in the user interface.
The window specifying the mapping tables appears. 2. Select a table. 3. Click View. To: Add data Do this: 1. Click the Add Data button. 2. Add the new value and converted value. 3. Click Save and Clear to continue adding new values, 4. Click OK when you are done. Delete a value 1. Select the value and click the Delete Data button. You are asked to confirm the deletion. 2. Select Yes. Edit a value 1. Select the value and click the Edit Data button. The Update Table Data dialog box appears. 2. Change the value. 3. Click OK. 4. Click Exit to return to the main window. Add a new Mapping Table 1. Click the Add button on the right side. The Add Simple Mapping Table dialog box appears. 2. Enter the name of the New Table. 3. Click OK. The new table is added to the list. Update a Simple Mapping Table 1. Click the Update button. The Update Simple Mapping Table dialog box appears. 2. Update the Table Name.
183
3. Click OK. Delete a Simple Mapping Table 1. Select the table you want to delete and click the Delete button. You are asked to confirm the deletion. 2. Click Yes.
The window specifying the complex mapping tables appears. 2. Select a table. 3. Click View.
See these topics: Configuring Database Objects Auto-Delete Configuring Patient Matching DICOM Parameters Configuring Study Grouping Configuring Pre-Fetch Configuring Icons Settings Configuring Compression Settings Configuring Init Values
184
System Configuration
Tag Morphing (DICOM Parsing)
The CARESTREAM PACS Workflow Manager relies on comprehensive and accurate data from different Application Entities (AEs) to properly index and store images. Many AEs have a limited number of data fields on their input screen. The available fields are often insufficient for users to enter the image data required by the CARESTREAM PACS Workflow Manager. This can result in operators entering two descriptions/values into one field. Using a bi-directional DICOM parsing rules The Tag Morphing feature allows the archive to reference an internal library of PACS-specific tag addresses and attributes. With this capability, modification of a DICOM header may easily be applied when transmitting DICOM image data acquired on one vendor PACS for widespread access to other users. For example, a single field might contain both the study description and the patient sex. The DICOM Parsing feature alleviates this problem by enabling the CARESTREAM PACS Workflow Manager users to utilize existing DICOM fields that are either empty or partially unused to enter additional data. It can change the data fields as they are pushed into the Online Storage Management server, as well as move selected data to other fields.
In the case of an empty field, the DICOM Parsing feature enables the CARESTREAM PACS Workflow Manager to recognize that the data in one field relates to another field, by transforming the field tag without affecting the input screen. In case of a partially unused field, multiple data is entered in a single field, divided by separators, and then broken into smaller chunks of information, each forming a distinct DICOM tag. In both cases, once the images are imported into the CARESTREAM PACS Workflow Manager, they can be indexed and stored accurately and efficiently. Using the rules in a Tag Morphing scenario can provide any user the ability to replace their existing PACS system, for example, while maintaining data integrity. The parsing mechanism supports two main scenarios: Exporting data from the WFM - Query or Move Inserting data to the WFM - Store or Update tags The Rule Filter window allows you to apply the rule on export:
185
Choose Query to set the value query in DSER_PARSE_RULE_FILTER.FILTER_SCENARIOS. Choose Move and Query to set the values query and move in this column. Regular Expressions Usage The tag filter value can be set to either a tag value or regular expression. NOTE: A rule is activated only when all filters in the relevant direction are met. If other filters exist for the rule, when only one filter condition is met, this is insufficient to activate the rule The Direction column in the Parsing Rules Table indicates whether the rule has incoming, outgoing or 2-way filters.
Concatenation Rule
186
System Configuration
If it is necessary to concatenate the parsing results to an additional tag, this can be performed in the DICOM Parsing Rule Editing Panel. 1. Choose the Parsing method. 2. Add basic Parsing tag. 3. Add any prefix or suffix values. 4. Parsing result concatenation. a. No Concatenation b. Add before existing value in the To Tag c. Add after the existing value in the To Tag d. Add any separation string, if required
NOTE: Tag Morphing/DICOM Parsing is based on a number of predefined, configurable rules. These rules can be configured using the Admin Tool. Contact Customer Service for more information.
187
188
System Configuration
Configuring Patient Matching
Use the Settings button in the CARESTREAM PACS Workflow Manager Admin Tool to configure the Patient Matching parameters. 1. Select CARESTREAM PACS Workflow Manager Configuration in the left pane and then select Patient Matching. The Patient Matching Configuration window appears in the right pane of the window. 2. In the top part of the window, configure the following attributes: Patient ID First Name Last Name Birth Date For each attribute, select one of the following matching options in the drop-down window: Equalthe attributes must be equal to match. If one of the attributes is empty, the match fails. Equal or Nullthe attributes can be in one of two states, Equal or Empty, to match. No Comparethe attributes do not compare. 3. Click Save to save changes.
189
8. Click OK to return to the list of Study Grouping Rules. To remove a rule: 1. Select the rule and then click Remove. You are asked to confirm the removal. 2. Click OK. To edit an existing rule: 1. Select the rule and then click Edit. The Grouping Rules window appears. 2. Edit the rules. To rename an existing rule: 1. Select the rule and then click Rename. 2. Enter the new Rule Name and click OK. 3. To prioritize the rules, use the arrows on the left side of the window.
190
System Configuration
Configuring Pre-Fetch
Pre-Fetch is based on a number of predefined, configurable conditions and rules. These can be configured using the CARESTREAM PACS Admin Tool. 1. Click Workflow Manager Configuration in the left pane and then click Pre-Fetch. The Pre-fetch Patterns Set in Workflow Manager window appears in the right pane.
2. To add a new Pre-fetch pattern set in Workflow Manager, click Add 3. Enter the Rule Description in the field and click OK. The Pre-Fetch Conditions for <rule> dialog box appears. 4. Click inside each condition field. The Set Filter window appears. 5. Enter the Rule Parameter in the field and click OK. The Add Condition #1 dialog box appears. 6. Select the Rule Parameter from the menu. 7. Select the Rule Operator from the menu. 8. Enter the Rule Value in the field and click OK. The new rule is added to the list. 9. Click OK to return to the Pre-Fetch Patterns set list. To remove a rule: 1. Select the rule and click Remove. You are asked to confirm the removal of the rule. 2. Click OK. To edit an existing rule: 1. Select the rule you want to edit and click Edit. 2. Follow steps 4 to 9 in the procedure above to edit rule parameters. To rename an existing rule: 1. Select the rule that you want to change and click Rename.
The New Pre-fetch Rule dialog box appears. The Rule ID name can be added in the free text field.
191
The New Rule Name dialog box appears. 2. Enter the new name and click OK. The new name appears in the list. 3. To prioritize the rules use the arrows on the left side of the window. For the Pattern Studies Selection Rules: 1. Follow the procedures above for adding, removing, and editing rules. 2. Check these boxes as appropriate: Enable Late Pre-fetch Enable Pre-fetch integration with RIS (Daily Pre-fetch) Enable night Pre-fetch for the following XXX hours
192
System Configuration
Configuring Icons Settings
Each image received by the CARESTREAM PACS Workflow Manager is saved together with an icon of the image saved. This allows the user to view several images on screen without having to see the full detailed image. This is also relevant particularly for the Patient Mini-Archive. To configure icons settings: 1. Click Workflow Manager Configuration in the left pane, then select Icons Settings. A window appears in the right pane of the window. 2. Check the appropriate box for the Icons default Creation Strategy: When Storing New Images During the Night Disable Icon Creation To create a strategy for icon creation: 1. Click Add. The Icons Specific Settings for Storing AE dialog box appears. 2. Enter the AE title in the field. 3. Check the appropriate box: When Storing New Images During the Night Disable Icon Creation 4. Click OK. The AE Title and strategy are listed. To remove a strategy: 1. Select the strategy, then click Remove. You are asked to confirm the deletion. 2. Click OK. To edit an existing strategy: 1. Select the strategy, then click Edit. The Icons Specific Settings for Storing AE dialog box appears. 2. Follow steps 2 to 4 to edit the appropriate settings. 3. For advanced settings, click the Advanced button. The Icons Advanced Settings window appears. 4. Check the appropriate boxes: NOTE: If lossless or lossy is selected, create icons during the night. Uncompressed Lossless Lossless Type Lossy Lossy Type Lossy Factor 5. To save the new data, click Save. 6. To reset the new changes, click Reset Changes. 7. To restore defaults, click Restore Defaults. 8. Click Close.
193
194
195
JAVA Configuration
The JAVA Configuration GUI must be standalone (installed locally on the service PC) and not only web-based to reduce the time during a remote connection. For example: If version 11 already exists, it automatically runs System Configuration. If version 11 does not exist, the system searches on the server for the JAR files and downloads the files for System Configuration. 1. Go to Carestream --> syscfgplugin.
196
See these topics: Configuring a Converter and Listeners Configuring IS Link Database Values Configuring Reports and Orders Values Configuring Report Parser Values Configuring Queues and Notifications
197
Listeners
The listener process waits for HL-7 messages from the RIS and places them in the message queue without interpretation. This process enables the system to keep messages intact for later processing if the converter process is down for any reason. To configure listener values: Click IS Link Configuration in the left pane, then select Listeners. A window appears in the right pane of the window. To add a new listener: 1. Click Add Listener. The Add Listener window appears. 2. Complete the fields, as appropriate: Listener Name Host IP Port Number Encoding Control Port Number Control Interval (Sec) Close Connection Interval (Sec) Listener Description 3. Click OK. A dialog box appears reminding you to start the listener. 4. Click OK. To edit a listener: 1. Click Edit Listener. The Edit Listener window appears. 2. Edit the fields as required. 3. Click OK. To delete a listener: 1. Click Delete Listener. You are prompted to confirm the deletion. 2. Click Yes.
198
System Configuration
Configuring IS Link Database Values
IS Link Software receives and translates HL-7 data from the RIS or HIS. The translated data is then stored within the IS Link database. 1. Click IS Link Configuration in the left pane, then select Database. A window appears in the right pane of the window. 2. Enter data into the fields, as appropriate: Host IP Port Number Enable Trace
199
2. Select the Report Message Format. 3. In the Application Report/Order Templates section, select the application from the menu. 4. In the Templates section of the window, check the box next to the desired option, then click Edit. The Edit Record window opens for each selected option. 5. Click OK. 6. To preview the report, select the part of the report you want to view. 7. Click Preview. The Preview window opens.
200
System Configuration
Configuring Report Parser Values
1. Click IS Link Configuration in the left pane and then select Report Parser. A window appears in the right pane of the window. 2. If you want to enable the Report Parser, check the box. 3. Check the Enable box in the Search Parameters section, which lists the text that can be searched. To add a Parser: 1. Click Add Parser. The Add Parser window appears. 2. Complete the fields as appropriate: Search Text Replace Text Prefix Text Suffix Text Case Sensitive Use Original Text Enable 3. Click OK. To edit an existing parser: 1. In the Search Text list, select a parameter you want to edit. 2. Click Edit Parser. The Edit Parser window appears. 3. Edit the fields as required. 4. Click OK. To delete an existing parser: 1. Select the parameter you want to delete. 2. Click Delete Parser. You are asked to confirm the deletion of the parser. 3. Click Yes.
201
202
See these topics: Configuring General Email Values Configuring Email Properties Configuring Email Message Body Options Configuring Email Error Message Body Options Configuring Email Report Properties Configuring the Referring Physicians Email List
203
204
System Configuration
Configuring Email Report Properties
1. Click E-Mail Module Configuration in the left pane and then select Report Properties. A window appears in the right pane, displaying the header and footer text. 2. Change the text as required. 3. When complete, click Save .
205
Screen splitter arrows between the areas enable you to either resize the Rule Information area, or click and drag it to a new position. The Rule tab right-click menu also provides access to frequently used functions.
206
System Configuration
Filter Date Source Comment The names of predefined filters applied to generate the list. The date the rule was created. The name of the source to which the event applies. The automatic information message.
207
Defining/Modifying Aliases
An alias is a name defined for an item or a group of items, including devices, users, and/or other aliases. An alias can have conditions applied to it, for example, a range of dates within which the alias applies or a group of different locations to which information is to be sent. These defined conditions are required to activate the alias. For example, you can create an alias called On-Call that consists of the user, Dr. Jones. The conditions for this alias may be a range of dates: January 1, 2003 16:00 to January 2, 2003 23:00. The system recognizes Dr. Jones as the on-call physician and routes information and/or images to Dr. Jones during the specified time frame (as defined by the rules). All defined aliases, together with information about each alias, appear in a list in the Alias tab of the Info Router Client window. NOTE: See Alias Tab (Info Router) for a detailed description of the Alias tab and the information it displays for each alias. 1. Do one of the following: From the Info Router toolbar, click Insert Aliasing From the Insert menu, select Insert Aliasing. The New Alias Creation window appears. NOTE: To modify an existing alias, double-click the alias name in the Alias tab to display the Edit Alias window. Follow the remaining steps in this procedure. 2. In the Alias Name field, enter a name for the new alias, or select an existing alias from the drop-down list. 3. In the Archives area, select the archive(s) to include in the alias. 4. In the Users area, select the users to include in the alias. 5. In the Aliases area, select the existing aliases to include in the alias, if any. NOTE: Click Clear Selection at any time to clear all selected items. 6. From the Condition drop-down list, select the condition to apply to the alias. 7. From the From and To drop-down lists, select the range of dates and times for which the alias is active. NOTE: For details about creating a recurring alias, see Creating Recurring Aliases. 8. Click OK. The alias appears in the Alias tab of the Info Router Client window and begins immediate operation. .
208
System Configuration
Creating Recurring Aliases
You can define an alias to recur according to a predefined schedule. For example, you can define an alias to be active only on Saturdays and Sundays during a particular period. 1. Do one of the following: From the Info Router toolbar, click Insert Aliasing From the Insert menu, select Insert Aliasing. The New Alias Creation window appears. NOTE: To modify an existing alias, double-click the required alias in the Alias tab to display the Edit Alias window. Follow the remaining steps in this procedure. 2. In the Alias Name field, enter a name for the new alias, or select an existing alias from the drop-down list. 3. In the Archives area, select the archive(s) to include in the alias. 4. In the Users area, select the users to include in the alias. 5. In the Aliases area, select the existing aliases to include in the alias, if any. NOTE: Click Clear Selection at any time to clear all selected items. 6. From the Condition drop-down list, select the type of condition that you want to apply to the alias. 7. From the From and To drop-down lists, select the range of dates and times for which the alias is active. 8. In the New Alias Creation window, click Recurrence. The Alias Recurrence window appears. 9. Check the boxes next for the days you want the alias to be active. 10. Click OK. The New Alias Creation window appears again, detailing the recurrence schedule. 11. Click OK. The alias appears in the Alias tab of the Info Router Client window and begins immediate operation. .
209
Available Rules Automatic Printing Backup Studies Compress Incoming Study Copy Incoming Images To Sends each new image to be printed by the CARESTREAM PACS Client. Backs up images according to the defined parameters and filters. Each new study that arrives is sent by Info Router to the compression server. New images that meet the defined parameters and filters have arrived at the selected source device. Each image is copied one by one. In addition, each line in the Monitor tab data list represents an individual image; only complete studies are pushed to copy. New studies that meet the defined parameters and filters have arrived at the selected source device. When a study storing process is completed is defined in System Configuration --> Info Router --> General Parameters --> Timeout. New reports from the CARESTREAM PACS Client that meet the defined parameters and filters have arrived at the selected source device. Multiple structure reports are consolidated into one. An SR that includes the information from the RIS and CARESTREAM PACS Client is created. The consolidated SR is stored in the CARESTREAM PACS Workflow Manager. If a consolidated SR is created, the unused SR from the CARESTREAM PACS Client is deleted. New reports that meet the defined parameters and filters have arrived at the selected source device. A Structured Report (SR) is generated immediately after the radiology report is completed. It contains the radiology report, as well key images and 3D processed images. The SR is stored in the Workflow Manager. If no study yet exists, an SR is not created. The study has arrived to a report which already exists in the CARESTREAM PACS IS Link Software. An SR is created from both the study and the report. The user can define both the Event Type and the Command Type that specifies the action that is to take place when the event occurs. When you select Custom Function, the Additional Events available are: First/Additional Image Arrived and Generic Probe. The First/Additional Image Arrived event enables you to execute the command as soon as the first image arrives. The Generic Probe Event applies only to advanced and internal use only. Sends an SR by email to the referring physician. Copies images manually, according to the defined parameters and filters, and copies accordingly. Pushes images from CARESTREAM PACS Client to the client local disk, according to the defined parameters and filters, and copies accordingly. A new study has arrived and the Study Status is set to Storing. When the storing is complete, the Study Status changes to Unread. Copies the studies to a different tier according to rules defined in the Life Cycle Management. If the tier is local, the study is copied locally. If not, it is copied using DICOM. If the CD Direct Suite is used as the secondary backup device, CARESTREAM PACS Info Router uses this rule to migrate all studies to CD. Retrieves patient studies from offline storage, according to the defined parameters and filters. Click Advanced to open the Advanced Options window. Retrieves patient studies from offline storage, according to the defined parameters and filters, and forwards them to the CARESTREAM PACS PACS Client. Click Advanced to open the Advanced Options window. If SMA is used as the primary backup, Info Router burns all the studies to SMA. Synchronizes the studies between the two computers. New images that meet the defined parameters and filters have arrived at the selected source device. The Info Router modifies the DICOM tags in the images according to the configured request. A new study that meets the defined parameters and filters has arrived at the selected source device. The Info Router modifies the DICOM tags in the study
E-Mail Report Enable Copy Enable Push Enable Storage Completion Notification Migrate
SMA (Single Media Archive) Synchronize Study Tags Update DICOM tag upon Image Arrival Update DICOM tag
210
System Configuration
upon Study Arrival Run a Script Command Editing an Info Router Rule 1. Double-click a rule. The Edit Rule dialog box appears. 2. Change the rule parameters, as required. 3. Click OK. Defining a New Info Router Rule The function is a combination of an event and command to be selected from a list of combinations between events and commands. See Available Rules. For example, for the event New Image Arrived, the user was able to r;match two possible commands, Copy and Set Storing Completed. You can select Copy Incoming Images to or Update DICOM tag upon Image Arrival. Once a function is configured, you can see the Event and the Action from which the Function is composed. The Parameters pane of the New Creation Rule window varies to reflect the function that is selected and presents the applicable parameters for each selected function. 1. Click Add or Right-click on the list of rules and select Insert Rule. The New Rule Creation window appears. . according to the configured request. Lets you run any existing script, executable, and batch file according to the configured request.
2. In the Description field, enter a descriptive name to provide a clear description of the rule. The filter applied to the rule appears in the Filter field at the bottom of the window. 3. Click Edit to create or modify the rule filter. The Edit Filter window appears.
211
You can compose different filtering by matching particular criteria with an applicable condition and criteria details. 4. Click Edit. The Filter Fields Editor appears. 5. Use the Add and Remove buttons to change the filters from the general list of available tags. 6. Click OK. The Edit Filter window appears. The Scheduling field displays the scheduling defined to the particular rule, including default scheduling parameters defined during installation. Different functions have different scheduling parameters. 7. Click Edit to adjust the scheduling. The Rule Scheduling Dialog window appears.
8. Use the drop-down menus to set the times as required. 9. Click OK. The New Rule Creation window appears.
212
System Configuration
10. Change any additional parameters, as necessary. 11. Click OK.
213
Custom Function
The Custom function enables the user either to compose a new combination of Event and Acton not available under the predefined list of functions or to create a group command to allow the execution of sequential commands. To create a custom function: 1. From the Edit Rule window, choose Custom Function from the drop-down menu in the Function field. 2. In the Parameters pane, select the appropriate event and the action to be executed for that event. 3. To configure a Group command, select Group Command from the Command Type drop-down menu. The Parameters pane enables the user to add actions to the Group. 4. You can define another set of Group commands and specify whether these commands should be executed sequentially or in parallel. 5. You can use Custom Function to configure an event that triggers an executable by selecting the action Run an Executable.
214
System Configuration
General Parameters
Parameters that are general for all rules appear under General Parameters. Parameters that are specific to certain rules appear as a separate sub-entrance. General parameters include: For each action type, it is possible to configure the maximum number of actions of this type that can run simultaneously. In addition, there are a total (configurable) number of actions. This number sets the upper limit for the number of actions that can run simultaneously regardless of the specific action type. For each action type, it is possible to set its priority compared with other action types. The lower the number, the higher the priority. For example, if Dynamic Copy has a priority of 30 and Manual Push has a priority of 60, then Dynamic Copy has a higher priority than Manual Push and is executed first. Actions not defined with an explicit priority have the priority that is defined in the configurable parameter of the Default Command Priority. Priority between actions of the same name, such as several Dynamic Copy requests, is assigned according to a first-in-first-executed order. It is possible to configure whether a specific action type should be included in the Rules Configuration windows or not. The default should be set to false (the action is included). Rules-Specific Windows In addition to the General Parameters window, there are additional rules-specific windows. Backup Parameters: lets you modify the default backup configuration parameters. Pre-fetch Parameters: lets you modify the default pre-fetch configuration parameters. Push to Users Parameters: lets you modify the default push to user configuration parameters. Timeout Parameters: lets you modify the default timeout parameters.
215
2. Choose a function from the drop-down list. 3. Type a description of the function in the Description field. 4. Click OK.
216
System Configuration
Defining the Rule Parameters You can select the parameters that determine the information for the rule that has been chosen. 1. Depending upon the function chosen, complete the fields in the middle pane of the New Rule Creation window. 2. In the Filter field, click Edit. The Edit Filter window appears.
3. Make any necessary changes to the filter. 4. Click OK. See this topic: Defining the Rule Filters
217
Defining the Rule Filters You can filter the instances of events that trigger a rule. For example, you can specify that only new images arriving from a particular modality trigger that rule, or that only copy requests from a defined CARESTREAM PACS Client trigger the rule. 1. Perform steps 1 through 3 of the procedure for defining the rule event. 2. From the list in the Criteria area, select the criterion by which you want to filter the event. The possible values for the selected criterion appear in the Criterion Details area. 3. Select the filter condition from the Condition drop-down list (for example, is or is not). 4. From the list in the Criterion Details area, select the filter condition. For example, if you select Head for the Body Part criterion, then only events involving head studies trigger the rule. 5. Click Apply. The filter criterion is applied and displayed in the Filter Expression area. NOTE: The Apply button is only displayed in the Event tab. You must click Apply before you click OK to ensure that the data entered in the Event tab is saved. 6. (Optional) Click And to define another criterion that must be met in order for the rule to be triggered, or Click Or to define an alternative criterion that must be met in order for the rule to be triggered. The order of the calculation of the filter is always carried out from left to right. 7. If required, repeat steps 2 through 6 to define additional filter criteria. 8. If you wish to edit the list of Criteria in the middle pane of the screen, click Edit. The Filter Fields Editor window appears. The list on the left side represents the full list of DICOM tags and/or HL-7 fields that can be added as criteria to filter the rule. See this topic: Defining the Rule Parameters Defining the Rule Schedule
218
System Configuration
Defining the Rule Schedule You can define scheduling for commands. For example, if the execution of a command fails, you can select the frequency and/or number of retries to be performed. The scheduling information for a rule enables you to define the number of attempts that are made to execute the command if there is a failure, as well as define the period in which the command is retried. 1. From the Scheduling field of the New Rule Creation window, click Edit. The Rule Scheduling Dialog box appears.
NOTE: The scheduling options are identical for all types of events. 2. From the On failure, retry every drop-down lists, define when the command is rerun in the event of a failure (any combination of the options). 3. From the Continue retry within drop-down lists, define the period within which the command is retried in the event of failure (any combination of the options). 4. The Delay option postpones the execution of a command. Click Delay and a further field opens to enter the time of the delay. 5. Click OK. The new rule is displayed in the Rule tab of the Info Router Client window and immediately begins operation.
219
Dynamic Filters All the events in the CARESTREAM PACS Info Router may be filtered to satisfy special conditions. Each rule has its own fixed list of filters, from which the user can choose. There is a utility to use more filters, to actually filter by any DICOM tag existing in the study. To add a filter to the CARESTREAM PACS Info Router, the user must add it directly to the Central Configuration to enable the CARESTREAM PACS Info Router to obtain the required DICOM tag information. The filter is then added to the rule via the User Interface. The probes that support the tag filters are: New Study New Image Pre-fetch RIS The Info Router supports both standard and private tags. Adding Filters to CARESTREAM PACS Info Router Rules In the New Image or New Study Rule Creation window, click Edit in the Filter panel to display the list of DICOM fields. Rules with events related to RIS can also be dynamically filtered, similar to filtering the DICOM tags.
220
System Configuration
Updating CARESTREAM PACS Info Router Rules The CARESTREAM PACS Info Router rules can be updated at any time. When you update a rule, the modified rule is effective immediately. 1. To update an Info Router Rule, do one of the following: Double-click the required rule in Rule Configuration in the Info Router Client window. Select the required rule in the Rules List and click Edit on the toolbar. Right-click the required rule and select Update. 2. Update the rule event, action, or scheduling, as described in Defining New Info Router Rules.
221
222
System Configuration
Archive Configuration
The Archive Configuration window displays the storage available together with other statistics for each server. The information is displayed in cylindrical format and shows both the High Water mark and Low Water mark levels of storage space. You can configure the availability of servers and the percentages of storage space available for each server. Clicking each server name displays details and statistics for that server. See these topics: Configuring Auto Delete Configuring SIR Restore Settings
223
224
System Configuration
Configuring SIR Restore Settings
Under the Archive Configuration of the System Configuration, the SIR settings can be configured. The format is similar to that of the FIR displaying the storage availability and other statistics of the SIR. The LTSMs fields are configurable, as are the Low and High Water marks and the minimum restore space for the SIR.
Multi-tier Archiving
Multi-tier archiving has a user interface to allow easier configuration of life-cycle management rules. The user interface lets you define which objects should be included in archiving rules, such as the entire study or specific elements such as Key Images or SR, and the archiving policy for each object. This can also include how long the object is stored in each tier, and to which tier it should be moved.
225
226
The Info Router backup rule controls the migration of images from the online repositories to the RIS. When there are images that must be backed up, the Info Router backup rule initiates a request to move DICOM data (image/study) from the Online Storage Manager (WFM) location to the compatible RIS location. When a new study is stored in one of the WFMs, the Info Router backup rule initiates a checking process to detect if the study should be moved to the RIS. If the study is new, then the complete study is moved into the RIS that was preconfigured to back up that specific WFM. NOTE: The CARESTREAM PACS System can contain multiple RIS and WFM. The migration process is triggered by a prescheduled, configurable timing schedule. The Info Router backup rule can handle image migration from multiple WFM to multiple LTSMs. NOTE: The Info Router backup rule process runs at prescheduled, configurable times. See these topics: Backup to Long-Term Storage (PreStore) Clone LTSM Auto Delete Fetch from Offline Shelf Management
227
228
Shelf Management
The CARESTREAM PACS Workflow Manager assigns a Study Availability status to each study in the CARESTREAM PACS System. This status is saved in the Workflow Manager database. This enables users to know at all times where a particular study is located. Online indicates that the study is located on the CARESTREAM PACS Workflow Manager where it can be accessed quickly when needed. If the status is near-line or offline, the user knows the study must first be retrieved from the tape library managed by the RIS. Near-line indicates that the tape for the requested study is currently in the tape library. Offline indicates that the tape is not in the library and manual intervention is required. If studies are located offline, the user can cancel the request to retrieve the study if no one is available to load the required tape in the library. The Study Availability status of each study can be viewed in the Admin Tool as well as in the CARESTREAM PACS Client. The RIS Synchronizer is the automated process responsible for tracking the status of each study in the system. For example, when a tape is taken from the library, the statuses of all the studies contained on the tape are changed to online. If an offline tape is placed in the library, all the studies contained on the tape have their availability status changed to near-line and so on. The RIS Synchronizer runs once a day, at 3:00 am.
VIParchive
The Versatile Intelligent Patient Archive (VIParchive) can be used as a Long-Term Storage Manager. When using the VIParchive as the Long-Term Storage Manager, the Fetch from Offline and the Backup Rule work in the same way. However, the implementation of the VIParchive is different since it is an external archive. Therefore, the procedures detailed above regarding Pre-Store and Cloning are irrelevant when using the VIParchive. When dealing with Shelf Management in the VIParchive, the status of a study is always displayed as near line.
229
UNIX
Action Identify if the Failover Agent has been installed on the system. UNIX Command and Result # /usr/tamar.root/scripts/failover_role list Yes: Role expected by 127.0.0.1:104 for node <role name>: <server name>_active No: Roles provided by 127.0.0.1:104: None Identify if the Failover Agent is running on a satellite. # /usr/tamar.root/scripts/failover status Yes: failover service running: pid 5141 No: failover service not running Start the Failover. Stop the Failover. View the Failover Log. /usr/tamar.root/scripts/failover /usr/tamar.root/scripts/failover stop /usr/tmp/failover.pl.log
MICROSOFT WINDOWS
Action Identify if the Failover Agent has been installed on the system. Identify if the Failover Agent is running on a satellite. Start the Failover. Stop the Failover. View the Failover Log. MICROSOFT WINDOWS Command and Result perl D:\Program Files\Kodak\System5\scripts\failover_role.pl -list perl D:\Program Files\Kodak\System5\scripts\failover status Start a WINDOWS service named "Imaginet Failover Service" Stop the WINDOWS service "Imaginet Failover Service" D:\Program Files\Kodak\System5\log\failover.pl.log
230
231
From a WINDOWS OS
1. Select Start --> Programs --> Carestream Solutions --> Admin --> Workflow Manager --> Jukebox Admin. The LOGIN window appears. NOTE: When you log in for the first time, you are prompted to change your password. 2. In the Login field, enter your assigned login name. 3. In the Password field, enter your assigned password. 4. Click OK to log in to the selected product. See these topics: Long-Term Storage Manager Admin Tool Window Using the Long-Term Storage Manager Admin Tool
232
Long-Term Storage Manager Admin Tool Long-Term Storage Manager Admin Tool Toolbar
Button Option Media Management Description Lets you access the Media Management window, where you can perform functions such as generating reports, importing and exporting media to and from the Jukebox, and so on. Lets you run the Long-Term Storage Manager Backup process (PreStore). A confirmation message appears when the backup process is completed. See Backup to Long-Term Storage. Lets you run the Long-Term Storage Manager Auto Delete process. A confirmation message appears when the Long-Term Storage Manager Auto Delete process is complete. Lets you manually refresh the data that appears in the Recovered Studies List area. This option does not affect the Pending Requests area and the Event Log area. Lets you configure the automatic refresh settings for the data that appears in the Recovered Studies List area. This option does not affect the Pending Requests area and the Event Log area. Lets you run the Net Backup Synchronizer. Lets you exit from the Long-Term Storage Manager Admin Tool and return to the CARESTREAM PACS System Administration Home page.
Run Long-Term Storage Manager Backup Run Long-Term Storage Manager Auto Delete Refresh Recovered Studies Update Settings
233
Tool
Media Management
234
Long-Term Storage Manager Admin Tool Long-Term Storage Manager Admin Tool Window
The Long-Term Storage Manager Admin Tool lets you monitor the Long-Term Storage Manager processes and manage the Jukeboxes. The Long-Term Storage Manager Admin Tool also identifies and reports any malfunction in the Long-Term Storage Manager processes and provides a variety of recovery tools. The Media Management options can be accessed from the Long-Term Storage Manager Admin Tool window, as well as options to resubmit or delete pending requests. The Long-Term Storage Manager Admin Tool is also used for running Auto Delete and Long-Term Storage Manager Backup processes in the Workflow Manager. The Long-Term Storage Manager Admin Tool window displays a list of studies from the recently performed Fetch requests, as well as any currently pending requests and any Long-Term Storage Manager progress and/or error messages. The Long-Term Storage Manager Admin Tool window provides access to all Long-Term Storage Manager administration functions, including generating reports, importing and exporting media to and from the Jukebox, and so on. See Long-Term Storage Manager Admin Tool Toolbar and Long-Term Storage Manager Admin Tool Menu Bar for descriptions of each Long-Term Storage Manager Admin Tool window element. See these topics: Opening the Long-Term Storage Manager Admin Tool Using the Long-Term Storage Manager Admin Tool
235
236
NOTE: The data in the Pending Requests area can be filtered, sorted, and refreshed, as described in Managing the Display (LTSM Admin Tool).
237
Resubmitting Pending Requests 1. Import the appropriate media into the Jukebox, as described in Importing Media into the Jukebox. 2. In the Pending Requests area, select the request that you want to resubmit, right-click, and select Resubmit Request. If the correct media is found, the request is removed from the Pending Requests area, and the study status in the Recovered Studies List area is changed to DONE. If the correct media is not found, the request remains in the Pending Requests area and the study status remains as IN_PROGRESS.
238
239
The Long-Term Storage Manager Admin Tool window must be open while performing operations; otherwise, the event log cannot receive the messages. Messages appear in the event log for a limited time. When the event log is full and new messages must be displayed, old messages are deleted automatically. The data in the Event Log area can be sorted, as described in Managing the Display (LTSM Admin Tool).
240
241
242
243
244
245
246
Media ID Media Type Robot # Robot Slot Side/Face Ret Level Size KBytes Status
247
248
249
250
251
252
253
Email Suite
CARESTREAM PACS Email Suite Overview
The CARESTREAM PACS Email Suite offers automatic e-mail distribution to referring physicians. These e-mail messages are generated immediately after the radiology report is completed, and contain the radiology report, as well key images and 3D processed images. All confidential information is encrypted and can only be accessed by the referring physician by providing a password. When opened, the e-mail attachment appears. The Email Suite offers automatic e-mail distribution by combining the power of IS Link and Info Router to create an email message that contains key images marked on the PACS Client and the report received from the RIS. The Email Suite sends encrypted e-mails to selected referring physicians, with a link back to the complete study, if required. NOTE: The images and tools provided by the Email Suite are intended as aids for the competent user only.
254
Builds the HTML page according to the format rules using the report text and the JPEG images. DICOM-JPEG Converter: uses a rendition system on the images to create a raster and then to convert them to JPEG images. The JPEG image size is determined in the MHTML Report Converter.
o o o o
Receives the report and the remainder of the patient clinical data required to create the report. Receives the format rules. Activates the DICOM-JPEG Converter.
Mail Component
The mail component takes from the SR the MHTML page containing the report and sends the email to the relevant referring physician. The email address of the referring physician is retrieved from the Central Configuration. The mail encryption (DES-128 standard) and signing are performed using ALIROO PRIVAWALL, a third-party software application.
255
256
Email Suite
Email Suite Configuration General Tab
The General tab lets you configure system-level Email Suite information, such as the system administrators email address (to which error messages are sent), as well as the name of the mail server. 1. In the Email Suite Configuration Tool window, select the General tab. 2. In the Administrator E-mail field, enter the system administrators email address. 3. In the Mail Server field, enter the IP address of the email server or the encryption server. 4. In the server field, enter the IP address of the server to be used when there are links to the entire case and/or key images. 5. In the Default Device field, enter the default device to be used when there are links to the entire case and/or key images. 6. In the Web Directory field, enter the path to the directory. 7. In the DICOM Directory field, enter the path to the directory where the images are stored. 8. In the Images Directory field, enter the path to the images that appear inside the report header and footer.
257
258
Email Suite
Email Suite Configuration Report Properties Tab
The Report Properties tab lets you configure the HTML report properties of the automatically generated email messages, which include the header and the footer text. 1. In the Email Suite Configuration Tool window, select the Report Properties tab. 2. In the Header Text and/or Footer Text areas, enter the necessary HTML information.
259
260
CD Direct
CARESTREAM PACS CD Direct Suite Overview
The CARESTREAM PACS CD Direct Suite allows you to create media discs (CDs or DVDs) containing image data. If the CARESTREAM PACS IS Link Software is installed on your system, you can also burn (copy) radiology reports to the CD. The CD contains the original uncompressed DICOM image data along with a viewer, which allows anyone with a PC to view the images. All CD Direct Suite operations, including configuration of the system and monitoring burn requests, are performed from the CD Direct Suite Queue Manager window.
Components
The CD Direct Suite comprises the software and hardware, including the CD Manager Server and a CD burner, necessary to produce CDs that contain image data. CD Manager Serverthe CD Manager Server includes a DICOM server that allows the CD Direct Suite to receive images through a DICOM copy or move command issued from an external DICOM device. The CD Manager Suite prepares the content for each media disc (CD or DVD), including reports, DICOM DIR, DICOM Viewer, JPEG Lossy presentation of the images, and HTML page for quick viewing of the Lossy images. CD Burnerthe CD Direct Suite uses a CD burner (a RIMAGE CD publishing system or another CD burner set up with your system). If you use a RIMAGE CD publishing system, you can print patient information on the face of the CDs (see the RIMAGE CD publishing system user guide for information about printing).
Features
Cost-effective Eliminates the need for handling patient films. Creates CDs without the fear of ruining image data. Provides hospitals with the option to give CDs to referring physicians. Provides referring physicians with the option to give patients CDs or the option to keep CDs for their own records. Ability to burn reports to a CD. Burns CDs in DICOM part 10 format (removable media). NOTE: The CD Direct Viewer is not intended for primary diagnostic viewing. See the user documentation for the CARESTREAM PACS CD Direct Suite for more information. For information about defining the CD Direct Suite configuration parameters, see this topic: Setting CD Direct Configuration Parameters
261
Production Parameters
Parameter Summary CD Auto Burn Burn Viewer Local Burner Media Printing Smart Burning Mode Description When there are multiple CDs in a single task, check this box to create a JPEG representation of the contents of the CDs as a complementary summary CD. Check to burn a disc automatically after all images are received. Check to burn a DICOM Viewer Application with the DICOM images. Uncheck to burn only the DICOM images. Check to burn to a local CD burner instead of the RIMAGE CD burner. Selects CD-R or DVD-R media. Prints the labels on the disc in relation to the angle of the marker. Aligned printing is available only with the RIMAGE printer. Check Smart Burning Mode to force the system to wait for the entire study before beginning the burn process. Selecting this option avoids splitting studies and series over multiple CDs.
Directories Parameters
These parameters specify the destination directories for the stages of the burning process.
Labels Parameters
These parameters define the data that appears on the CD label if you are using a RIMAGE CD burner and printer. The order of the fields in the dialog box determines the order in which the labels are printed on the disc. Number of Studies, Study Date, and Study Modality are printed by default for each study.
Application Parameters
Parameter Institution Name Timeout Wait for Report(s) Description Specifies the name of the institution. Specifies the time that the CD Direct Suite waits from receipt of the last image by the server until the server recognizes that the copying process is complete. If Wait For Report is checked, a burn task without a report is not started until CD Direct receives the report is received or until the report timeout elapses. CD Direct checks for reports at the Report Refresh Interval. Check Burn With History to burn the patients history. Specify the number of studies to retrieve from the Patient History.
System Parameters
Parameter Auto Delete Media Description Specifies if burned studies are automatically deleted from the hard disk. Specifies the size of the media on which information is burned.
Priorities Parameters
You can set different priorities for tasks from specific users or referring physicians. Use Add, Edit, Delete, or change the position of an entry.
262
263
CD-Direct Auto-Delete
A scheduled task, cd_direct_auto_delete, runs nightly on the CD Direct workstation to clear CD Direct temporary folders. CD Direct Auto-Delete deletes all data of completed or cancelled tasks that passed the delete criteria: Option 1Delete According to Task Date Delete tasks that are older than a specified number of days. Option 2Delete According to Free Space Delete tasks until the cdsurf directory free-space is over a configurable limit. Option 3A Combination of the Above Delete all tasks according to date and then according to the free space. The Auto-Delete method is configured by the cfg parameter: imaginet\system\applications\cd_direct\autodelete\how_to_delete Values: 0delete by date 1delete by space 2both The free-space and days limit criteria are configured in System Configuration --> CD-Direct, under the System tab.
264
265
with a link to the external report on the CD's main HTML page. Options -->System Tab Auto Delete: Lets you specify when burned studies are automatically deleted from the hard disk. CD/DVD/BD-R Capacity: The size of the media upon which information is burned. Media ID Prefix (optional): Enter any alphanumeric character. Number of Copies: Lets you specify the number of copies of each media to burn. Lets you set higher priorities for tasks received by specific users or referring physicians. You can add, edit, delete or change the position of each entry. Lets you configure the options for Archive Mode.
266
Authentication
HIPAA requires health care organizations to have strict controls on which users can access confidential patient information. CARESTREAM PACS features the User Management Admin Tool, which manages the login mechanism that serves as the entry point to all system applications and tools. It centralizes all user management functions, enabling you to define permissions and settings at the user, group, and system levels.
Authorization
Maintaining strict control over the type of access these authenticated users have is just as important as regulating who has access to confidential PHI (protected health information). CARESTREAM PACS features the Access Control Management Tool, which ensures that users can view only the Workflow Manager data that they are authorized to view. Access control is performed by setting restrictions at the user, group, or node level, providing both role-based and context-based protection. Restrictions can be configured for different data types, according to any DICOM criteria. The Access Control Management Tool works in conjunction with the User Management Admin Tool to provide comprehensive protection of patient confidentiality.
Auditing
HIPAA regulations require an auditing system against unauthorized users that penetrate the first two levels of access control: authentication and authorization. The auditing function in the Workflow Manager logs every PHI task or operation stored in the system, such as accessing information, editing, and deleting. Each logged event can include: the operation performed, the user who performed it, the location from which it occurred, and the information affected. The auditing function permits security administrators to monitor system activity for suspicious behavior including authorized users accessing patient data for which they have no need to know and to trace the origins of any action that occurred in the system. NOTE: For more information, see Auditing.
Data Protection
HIPAA regulations apply to data that is transmitted within health care organizations within a secure domain (using firewalls), as well as over the Internet. The system supports encryption of all data passing through the system using a variety of common protocols (for example, SSL) and includes an integrity mechanism to ensure that data was not tampered with during transit. Different encryption mechanisms can be configured for different clients to allow maximum flexibility. In addition, the CARESTREAM PACS System uses the ALIROO PRIVAWALL Server, a secure email server that automatically applies end-to-end, rule-based encryption to any email and attached files routed through the email. Several different protection schemes, such as certificate-based S/MIME encryption/decryption and self-decrypting symmetric messages, are supported.
Disaster Recovery
HIPAA regulations require that health care organizations have the ability to recover confidential patient data from any situation caused by hardware or software failures. The Workflow Manager implements a multi-layered solution that includes full and incremental data backups to offline storage as well as hot/cold server backups in cases of hardware failures. All image data is automatically cloned to secondary media, which can be removed from the system library and stored in a secure location. NOTE: Contact Customer Service for more information about the Workflow Managers backup features.
267
Security Policy
Carestream Health, Inc. has established and complies with an internal security policy that applies to its Health Group products, imaging services, and repair services that are privacy-enabled. Privacy-enabled is Carestream Health Inc.'s term to identify products and services that enforce its security policy via design features or specific procedures to be followed during development, operation, or maintenance of Carestream Health products. Under this policy, Carestream Health, Inc. has undertaken to do the following: Provide privacy-enabled products with the following privacy and security features:
System integrity mechanisms to guard against unauthorized changes to data or software applications Identify a set of Customer Security Obligations that describe the duties and responsibilities of users in order to gain maximum benefit from the privacy-enabled features built-into Carestream Health products. These Customer Security Obligations are listed in Customer Security Obligations. Carestream Health, Inc. will verify and document the understanding and acceptance of these obligations via a contractual agreement. Ensure that Carestream Health, Inc. service personnel understand and commit to their security-related responsibilities when providing service for privacy-enabled Carestream Health, Inc. products. This is accomplished via service training, and a signed acknowledgment by service personnel. Provide service user identification and authentication prior to allowing access to privacy-enabled Carestream Health, Inc. products. Provide proper and secure product installation. This is accomplished by the service technician following standard Carestream Health, Inc. approved procedures for installation.
o o o o
User identification and authentication of the claimed identity Controlled access to product functions, including those that allow access to patient-identifiable information Security audit logging to enforce individual accountability of access to sensitive data and system resources
268
Clearance
269
Customers must maintain control over the topology of the privacy-enabled Carestream Health, Inc. products installed within their enterprise, including data interfaces and software versions. Customers must use the interfaces and our products for the purpose for which they were designed and in a configuration that has been approved by Carestream Health, Inc.
270
271
Security Manager
The Security Manager is a system-wide application that controls the various permissions, access restrictions, and other permission-based features of all products in the CARESTREAM PACS System, including configuration and administration tools. The system is built using the principles described below. Group A group is an entity containing users and is attached to a specific profile. A group contains a set of parameters such as Display Protocols in CARESTREAM PACS Client or specific security settings, etc. A profile describes the functions a user has after logging in to the CARESTREAM PACS Client. A profile contains a list of features (similar to licensing). Sites cannot edit the contents of a profile. One group can only belong to one profile. However, several different groups can belong to the same profile. For example: Group A belongs to one specific profile (Profile A). Group B also belongs to one specific profile (Profile A). Users of both groups have the same set of basic features (and user interface) when they log on to the system. However, each group has its own set of permissions. A feature is a licensed permission, is not configurable, and represents a function in the system. Permissions The permissions to perform certain operations or view certain data are controlled by the Security Manager and managed by the UM. Permissions are attached by default to a specific group. Permissions can also be configured on a user level. Each group has a specific set of permissions with a 1:1 ratio (one set of permissions is available for one group and vice versa). The same theory applies to users. For example, a user belonging to a group automatically inherits the groups permissions. If a specific permission is added or removed from the user, the user has a specific set of permissions. You can configure permissions on a system, group, or user level. Each level overrides the preceding level. Certain permissions are dependent upon features. If a user does not have the feature in the profile to which the user is attached, the permission is not available to the user. The permissions mechanism must read the profile content and allow configuring permissions for the relevant features in the profile and changing the permissions. Features that are not in a specific profile do not appear in the User Management at all. Certain features of the system are included as part of the profile definition and require permission controls. The permissions mechanism allows configuring or changing permissions for the relevant features in the profile. Features that are not in a specific profile do not appear in the Security Manager. Most sites have more than one profile, so the permissions mechanism must be able to read the profile that is relevant for a specific user or group.
Profile
See these topics: Security Manager Permissions Configuration Security Manager Permissions Settings Applicable Permissions Configuring Permissions
272
o o o o o o
Export Data Update Data Reading Flow Folder Creation DP Creation URL and Action Buttons
Workflow Permissions
Access to Foreign Archives Application Access Application Settings CD Monitoring User Management Settings See these topics: Security Manager Security Manager Permissions Settings Applicable Permissions Configuring Permissions
273
274
275
NOTE: By default, all networks are considered external, so SSL is enabled for every user, which affects performance. It is recommended that internal networks that are sufficiently secure be configured not to use SSL. The xx.xx.xx and yy.yy entries are examples of subnet address formats. They are ignored by the system and may be removed.
276
This script creates a new private key, a new CSR, and a temporary certificate that is used until the real one is returned from the CA. The locations of the new files are:
277
/usr/tamar.root/server_root/conf/ssl.key/server.key /usr/tamar.root/server_root/conf/ssl.csr/server.csr /usr/tamar.root/server_root/conf/ssl.crt/server.crt The new key and temporary certificate are used as soon as the server is restarted. The temporary certificate is selfsigned and valid for 10 years. As soon as the real certificate from the CA is received, copy this certificate to overwrite the temporary certificate /usr/tamar.root/server_root/conf/ssl.crt/server.crt. The private key should be placed in crt/usr/tamar.root/server_root/conf/ssl.key/server.key. To restart the server, make sure that no users, including diagnostic users, are using the system (their sessions will be aborted without warning). Also, modalities should not send images to the system during a restart (any DICOM associations will fail). Restart the server by rebooting the entire server (cannot be done using the administration tool). Login as root and type the following: /etc/rc2.d /S99MediSurf stop /etc/rc2.d /S99MediSurf start NOTE: The new key and certificate should be tested to ensure that the parameters, such as Common Name, are correct before submitting the Certificate Signing Request to the CA. CAUTION: The Security Administrator should make a secure off-line backup copy of the private key file and keep this copy in a physically safe place. A service user should never be allowed to make copies of this key, since this key is private to the customer and any unauthorized copying would compromise the key (and require revocation of the certificate and going through the process of generating a new key and buying a new certificate).
278
o o
Secure Shell (OpenSSH) as replacement for telnet, ftp, and rlogin rcp sudo, a utility that enables named users or users belonging to certain groups to execute a configurable and limited subset of commands that require root privilege (e.g., mounting/unmounting, reboot, addition/removal of packages, etc.) This places the system in Safe Mode.
NOTE: A system operating in Safe Mode still might have vulnerabilities. The purpose of this mode is to balance a reasonable balance of security, functionality, and serviceability. If stricter security is needed, contact Customer Service. If any of the disabled services are re-enabled, the system is considered to be operating in Unsafe Mode. Examples: If a software upgrade is installed locally, an X11 server, such as openwin or CDE, might need to run (since some installers use a GUI). When service must remotely access the system, but cannot use SSH, telnet and ftp must be re-enabled. If a system has seriously malfunctioned and must be brought into Unsafe Mode, the details should be recorded (time, reason, by whom, and which services were re-enabled). When operation in Unsafe Mode is no longer valid, the system should be returned to Safe Mode (this action should also be recorded). See these topics: Securing Unattended Computers General Security Practices Privacy Notice
279
280
281
282
Configuring Permissions
The permissions settings are accessed from the System/Group/User window in the User Management application. 1. From the User Admin Management window, choose the User or Group tab. 2. From the displayed list, double-click the name of the User or Group to be edited or configured. Depending on the group chosen, the group name appears at the top of the screen. 3. Click Group Permissions. The Group --> Group Name --> Permissions Settings window appears. The categories are listed in the left pane. Export Data Permissions Update Data Permissions Reading Flow Permissions Folder Creation / Deletion Permissions DP Creation Permissions URL & Action Buttons Access Permissions to Foreign Archives Application Access Permissions Application Settings Permissions CD Monitoring Permissions User Management Permissions NOTE: The CARESTREAM PACS CD Direct Suite permissions allow you to access the CD-Direct Web Monitoring interface, view users burn requests in queue, and update the users burn requests. System Configuration includes the System Configuration entry on the admin page and all the tools that are available through it. System Administration includes all the tools under the System Administration entry on the admin page, excluding Central Configuration. System Monitoring includes all the tools under the System Monitoring entry on the admin page. 4. Click OK when all configurations are done. 5. If you want to restore defaults, click Restore to Defaults. See these topics: Security Manager Security Manager Permissions Configuration Security Manager Permissions Settings Applicable Permissions
283
Applicable Permissions
The following permissions are controlled through the Security Manager. Setting Update Data Description Permission to edit patient and study details. Should apply to any update of patient and study details, both in the Archive Explorer (editable fields) and in the Administrator tool (update, merge/split, RIS Sync, etc.). Lets the user delete images and reports. Should apply to deletion being performed from the CARESTREAM PACS Client or from the Administrator tool. Access to Foreign Archives (View/Write/Delete) Print Images Burn CDs Permission to access, save, copy, and/or delete images from any of the remote servers that are configured. Permission to print images to a network printer or a DICOM printer. Permission to send data to the CD Direct Suite. This permission does not mean that the user necessarily has copy permissions (even though the Info Router uses the copy function for this specific activity). Permission to copy images from the local archive to a foreign archive. Permission to save data to the local disk. Permission to save data to the local archive. Permission to create or delete personal and system folders, work lists, and teaching file folders. Permission to create, edit, and delete personal, group, and system display protocols (DPs) by using Save As and the DP Editor. Also allows use of the DP repair tool. Can be applied only to users who have permission to create, edit, and delete system DPs using the DP Editor. Also allows permission to save presentations for a certain study. By default, the permission to create, edit, and delete personal DPs using Save As is applied to any user defined in the Radiologists group. Similarly, by default, the permission to create personal, group, and system DPs using Save As or the DP Editor is applied to any user defined in the System Administrators group. By default, the permission to Save Presentation is applied to any user defined in the Radiologists group. URL and Action Button Permissions Permission to change a study after the URL activation was invoked (launch Archive Explorer and select a different study). NOTE: The permission to allow URL activation is included under the Application Access Permissions. Permission to activate a specific Action button that is configured on site (for example, the ORTHOVIEW action button triggering the integration with the ORTHOVIEW application). View Reports Permission to view reports. If this permission is not given, the R or O icons in the Patient Mini-Archive are disabled and the Reports button in the Archive Explorer or the Viewer is disabled. By default, this permission is applied to any user defined in the Radiologists group. This permission allows a user/group reading permissions (the ability to move studies from one status to another within the system when clicking on Done), together with the ability to lock a study. If permission is not granted, the user returns to the Archive Explorer when clicking Done and does not receive the Done dialog box. By default, this permission is applied to any user defined in the Radiologists group. If this permission is given, the relevant workflow is configured for the particular group/user. Mark Key Images Permission to mark images as key images. Only users with reading permissions can be assigned with the Mark Key Images permission. By default, this permission is applied to any user defined in the Radiologists group. NOTE: The permission to mark key images does not necessarily mean that the
Copy Images Save to Local Save to Server Folders Display Protocols and Presentations
Reading Permissions
284
Save Reports
285
286
RIS-PACS Synchronization
The RIS-PACS synchronization process ensures that the patient details and ordering information in the PACS are up to date and synchronized with that in the RIS. When a patient registers at the RIS or HIS, the patients details are entered into the database and an order is issued with the relevant procedure to perform. These details are then sent to the PACS via an HL-7 interface and stored in the CARESTREAM PACS IS Link Software. After the scan is performed at the modality, the technician reenters the patient details and the body part(s) examined. As these details are manually entered, there is the risk that a typographical error or a missing field may cause this data to be different from that sent by the RIS. These details are saved in the imaging study created by the modality and stored in the CARESTREAM PACS Workflow Manager. The RIS-PACS synchronization process ensures that the details are the same in the RIS and in the PACS, and that the patient attributes stored in the Workflow Manager contain the most up-to-date details from the hospital records. If there are differences, the information in the RIS is used to update the information stored in the PACS, such as in the Workflow Manager. RIS-PACS synchronization occurs whenever a study is stored in the Workflow Manager or an event takes place in the RIS. See these topics: Using Manual RIS-Sync RIS-PACS Sync Configuration
287
o o o
Patient details are merged Whenever two sets of details for one patient are merged in the RIS, the CARESTREAM PACS Workflow Manager is notified. The patient details are then merged in the CARESTREAM PACS Workflow Manager as well. NOTE: For more information about merging patient data, see Patient Matching. A new report is created Whenever a report is created in the RIS, the CARESTREAM PACS Workflow Manager is notified. The Has report column is updated to Yes. If the CARESTREAM PACS Workflow Manager has a related study, it updates the study status to READ. This removes studies from the UNREAD worklist that were not read using CARESTREAM PACS Client. Order details are changed Whenever the details of an order, such as the date of a scan, are changed, the CARESTREAM PACS Workflow Manager is notified. A patient is admitted to the hospital Whenever a patient registers at the hospital, the Workflow Manager is notified.
288
The CARESTREAM PACS IS Link Software filter window opens. 4. Choose the fields you wish to filter. 5. Click Set Default Filter. 6. Click OK. 7. Click Manual RIS-Sync .
Multiple Studies
You can perform a manual RIS-Sync for multiple studies. 1. Choose the studies on which you will perform the manual RIS-Sync. 2. From the Admin toolbar, click Manual RIS-Sync The Manual RIS-Sync window opens. A message appears prompting you to confirm the action. 3. Click Yes. NOTE: If the accession number is not found, the RIS-Sync is carried out only at the patient level according to the Patient ID. .
RIS-PACS Log
Whenever there is a change in one or more attributes due to the RIS-PACS synchronization process, the old values and the updated values are logged in the Audit Trail log. The log can be viewed using the Audit Trail Viewer, as described in Defining Audit Event Settings.
Pre-Fetch
The Pre-Fetch process ensures smart retrieval of studies from the Long-Term Storage Manager server to the Online Storage Management server. The Pre-Fetch uses preconfigured rules to automatically decide which studies must be brought online and when, based on data received from the HIS. The list of studies is then sent to the Info Router, which issues the request to move the studies from the Long-Term Storage Manager server to the Online Storage Management server, thereby enabling fast image retrieval. For example, the RIS notifies the Workflow Manager when a patient enters the system. Pre-Fetch can then retrieve any images related to the patient that are stored on tape and bring them back online for easy access. Pre-Fetch works in two stages: Decides when the data should be brought online Decides which data should be brought online Both stages are controlled by a configurable list of patterns and rules. Pre-Fetch streamlines the lengthy process of study retrieval from the Long-Term Storage Manager server by retrieving the studies in advance, when possible, at times when there is less demand on server resources. The diagram below illustrates the stages of the Pre-Fetch process
289
Three different types of Pre-Fetch can be performed: Daily Pre-Fetch: In this instance, the CARESTREAM PACS IS Link Software informs the Workflow Manager when there is an order for a scan to be performed or when a patient is admitted to the facility. The details of the scan (for example, the body part to be scanned) are supplied to the Workflow Manager, if available. Based on this information, the appropriate studies are brought online before the new scan is performed. In order for Daily Pre-Fetch to work effectively:
A computerized, online scan scheduling system must be used diligently. Late Pre-Fetch: In this instance, the Workflow Manager receives images from an AE and queries the server for the patients history. This type of Pre-Fetch process is useful when there is no internal information system at the facility, or in case of an emergency when there is no opportunity to retrieve the patients history in advance. Night Pre-Fetch: In this instance, the CARESTREAM PACS IS Link Software informs the Workflow Manager that a patient is scheduled to come in for a specific scan. The details of the scan (for example, the body part to be scanned) are supplied to the CARESTREAM PACS Workflow Manager, if available. Based on this information, the appropriate studies are brought online the night before the patient arrives at the facility. In order for Night Pre-Fetch to work effectively:
o o o o
The CARESTREAM PACS IS Link Software must be installed at the facility. The CARESTREAM PACS IS Link Software must be able to communicate with the facilitys RIS server. The Info Router must be installed at the facility.
o o o o
The CARESTREAM PACS IS Link Software must be installed at the facility. The CARESTREAM PACS IS Link Software must be able to communicate with the facilitys RIS and HIS servers. The Info Router must be installed at the facility. A computerized, online scan scheduling system must be used diligently.
290
291
Study Grouping
Study grouping is a method for ensuring that study details are always attached to the correct group, based on their unique ID. Study grouping can be performed using the data in the Workflow Manager or using data stored in the hospital RIS server.
Icons
Each image received by the CARESTREAM PACS Workflow Manager is saved together with an icon of the image saved. This allows the user to view several images on screen without having to see the full detailed image. This is also relevant particularly for the Patient Mini-Archive.
292
Maintenance (UNIX)
See these topics: WFM Licensing Status Monitoring Database Analysis Running a System Check Performing Routine Maintenance Root Account E-mail Backup Verification Verifying the Workflow Manager Daily Backup Central Configuration Backup Preparing Previously Used Tape Database Fitness Verification Online Storage Management Storage Volume Check Online Storage Management General Viewing System Processes PreStore Backup Verification Long-Term Storage Manager Storage Volume Check Long-Term Storage Manager General Fitness Check Library Hardware Fitness Check Moving Audit Logs to Offline Storage
293
Important: The warning does not interfere with system operation. You must contact a Carestream Health representative to check or renew the license. The red warning message is a link. Click on the link to display the Licenses Log which details the license errors:
Each line states whether that type of license has a violation (or an error in the check). The percentage values quantify the amount of violation from the licensed amount. The most common license type for Archive (IMS) or a PACS is the EXAMS_YR counter, which measures the amount of studies that enter the system annually.
294
295
System Uptime
Database Utilization Database Extents Database Connections Database Analyze Database Log Number of Running DICOM Servers Jukebox Backups Long-Term Storage Manager Cache Utilization Pre-Fetch Application Check
Application Log
All the fields are configurable, and can be changed by editing using the following command: /usr/tamar.root/scripts/system_check_params
296
NOTE: The system check covers most of the routine maintenance system schedule. Carestream Health recommends running the routine maintenance procedures regularly.
297
298
Maintenance (UNIX)
Backup Verification (UNIX)
The CARESTREAM PACS Workflow Manager is configured to perform a backup of the entire database every day. Backups are usually scheduled to be performed at night. You should always verify that the previous backup was successfully completed. NOTE: These backups use the ORACLE database Recovery Manager (RMAN) and their schedules and scripts are contained within the database. Changes to the default schedule can only be made by Customer Service. The backup verification procedure should be performed manually when there is a related problem reported by the system check. The default method is a full backup, which runs every night in two phases: Full backup: a scheduled task which runs each night at 2 am Archive log backup: a scheduled task which runs each night at 5 am The backup procedure creates a log file located under ~oracle/admin/dbname/cdump where dbname is either mst1 or rc01. The name of the backup log file is back_<type>.<result>.<date-time>. where type = inc_0 for the full backup and al for an archive log result = ok for a successful backup and err for a failed backup date-time = the date and hour The log file name identifies which backup was made, whether it was successful, and when it was performed. The actual backup files are stored under /backup/oradata/mst1/backup and /backup/oradata/rc01/backup. Only the last successful backup is saved. See these topics: Verifying the Workflow Manager Daily Backup Central Configuration Backup
299
300
Maintenance (UNIX)
ORACLE Alert File (UNIX)
The ORACLE Database has a built-in Alert file, in which system alerts and important messages are registered. You should read this file at frequent intervals, to identify potential problem situations at an early stage. It is recommended to read the ORACLE Database alert file daily, along with the backup verification. 1. Look at the last section of the alert_mst1.log file. 2. Enter the following command: tail -<n> ~oracle/admin/mst1/bdump/alert_mst1.log Where n is the last n lines of the file, make sure n is large enough to show all entries since last time. NOTE: As an alternate method, after having checked an alert log, make a note of the number of lines it has for mst1. This number can be determined by typing wc -l <filename>. Next time you inspect the alert log, type tail +<n> <filename>. This shows all lines starting with line number n. When everything is OK, count and record the number of lines again. 3. Locate the past weeks dates and review the messages. Only informative messages are acceptable. For example: startup, shutdown, and changing log files. (Thread 1 advanced to log sequence) If an error exists, contact Customer Service.
301
302
Maintenance (UNIX)
Online Storage Management Storage Volume Check (UNIX)
In order to verify that your storage media is used properly, you should frequently check the utilization of your mount points. The Online Storage Management storage volume check procedure should be performed manually when there is a related problem reported by the system check.
303
304
Maintenance (UNIX)
Viewing System Processes (UNIX)
The daemon processes are the processes running on the server. You can view the log by clicking log. You can stop/start the Workflow Manager application by clicking the stop/start buttons
NOTE: The list above represents an idle stateno user is communicating with the Workflow Manager. In addition, there are a number of Oracle processes relating to database connections. When the system is idle, there might be up to 35 connections already. For each user that is logged in, additional connections are created. Oracle Database processes that have server connections can be found via the following command: ps -ef | grep oraclemst1: oracle 15474 1 8 07:58:20 ? 0:17 oraclemst1 (LOCAL=NO)
305
306
Maintenance (UNIX)
Long-Term Storage Manager Storage Volume Check (UNIX)
To verify that your Long-Term Storage Manager storage media is used properly, you should frequently check the utilization of your mount points. If one of the mount points reaches 90% usage, contact Customer Service. These mount points can be / or /export/home, the Long-Term Storage Manager cache mount (usually /sir_fs), or the NetBackup catalog mount (usually /disk02). The Long-Term Storage Manager storage volume check should be performed manually when there is a related problem reported by the system check. The df command displays the volume of disk space occupied by the mounted file systems, the volume of used and available space, and how much of the file systems total capacity is used. 1. Type: df -k 2. Press Enter. Information similar to the example below appears. Filesystem /dev/dsk/c0t0d0s0 /proc fd /dev/dsk/c0t0d0s7 /dev/dsk/c2t0d0s0 KBytes 3009594 0 0 4166854 32356792 Used 1032993 0 0 414225 5207571 Available 1916410 0 0 3710961 23913542 Capacity 36% 0% 0% 11% 18% / /proc /dev/fd /export/home /sir_fs Mounted on
3. Verify that all your systems mount points have sufficient available volume. 4. Verify that the system mount points (where the operating system is stored) and /sir_fs (which is used as a LongTerm Storage Manager cache) do not exceed 90% of usage. If you cannot resolve storage usage problems, contact Customer Service.
307
308
Maintenance (UNIX)
Library Hardware Fitness Check (UNIX)
The long-term library contains a robotic arm and drives, which are active mechanical components. Drives might occasionally need cleaning to prevent read/write errors. The Long-Term Storage Manager periodically performs drive cleaning. Nevertheless, there may be cases in which immediate cleaning should be performed. A visual check on the library front panel should be performed in order to check when immediate cleaning is required, in addition to verify that the drives are operating correctly. Perform the library hardware fitness check weekly. 1. Check the lights on the front panel of the drive. The cleaning indicator must be off, and all other indicators must be yellow or off. NOTE: For specific details about tape status indicators, refer to the relevant manufacturers manual. 2. View the library front panel to verify that the ON LINE message appears and no error messages are displayed.
309
310
311
on the desktop.
The Cluster Monitor window appears. 2. From the menu bar, select View --> Login. The Cluster login window appears. 3. In the User name field, enter the user name (root). 4. In the Password field, enter your password. 5. Click OK. The Cluster Monitor screen appears, indicating that you are logged on to cluster1. It includes status and connection information about the cluster. 6. To log on to cluster2: a. b. c. Right-click in the cluster2 panel and select Login. Enter the correct login name and password. Click OK to display connection and status information for cluster2.
312
Maintenance (UNIX)
Cluster Monitor Toolbar and Menus
From the Cluster Monitor window, use the toolbar and menus to access Cluster Manager functionality. The buttons and menu commands in the Cluster Monitor window perform these operations. Button Function New Cluster Delete Cluster Expand Collapse Stop Start Login Show Explorer Help Menu Command File --> New Cluster File --> Delete Cluster View --> Expand View --> Collapse View --> Stop View --> Start View --> Login View --> Explorer Help --> Contents Description Adds a new cluster panel to the Cluster Monitor. Removes a cluster panel from the Cluster Monitor. Expands the Cluster Monitor view. Collapses the Cluster monitor view. Pauses the cluster panel scrolling. Resumes the cluster panel scrolling. Logs on to the cluster shown in the cluster panel. Launches the Explorer view for the cluster shown in the panel. Accesses online help.
313
314
Maintenance (UNIX)
Accessing the Cluster Explorer Window (UNIX)
The Cluster Explorer is the main Cluster Manager window, from which detailed cluster status information can be obtained. There are several ways to access the Cluster Explorer screen: Click anywhere in an active Cluster Monitor panel. Right-click in the active Cluster Monitor panel and select Explorer View. Click the Show Explorer button in the Cluster Monitor toolbar. From the View menu, select Explorer. The Cluster Explorer window is divided into three panes: The top pane includes the menu and tool bars, from which the Cluster Manager operations can be initiated. The Cluster Explorer configuration tree in the left pane shows the objects within each cluster, as defined by the configuration tree tabs: Service Groups: Shows the service groups in the cluster. When expanded, the service groups show the groups resource types and resources. Systems: Shows the systems in the cluster. Resource Types: Shows the resource types in the cluster. The right pane contains a view panel with four tabs that display details for the object selected in the configuration tree. By highlighting a cluster or cluster object in the configuration tree and then selecting one of the four view tabs in the view panel, you can obtain detailed status information about the cluster or cluster object.
The following colors and symbols indicate the status of the cluster: A red slash in the panel indicates at least one object is faulted and no objects are online. A yellow slash indicates at least one object is faulted and one object is online. A gray object is offline. A locked icon indicates the object is frozen. See this topic: Cluster Explorer Toolbar
315
Show the Log Desk Launch Configuration Wizard Launch Notifier Resource Configuration Wizard Query Show Cluster Explorer Help
316
317
318
Maintenance (UNIX)
Monitoring the Cluster Properties (UNIX)
1. From the Cluster Explorer, click a cluster in the configuration tree. 2. In the View panel, select the Properties tab to open the Cluster Explorer - Properties view. 3. Use the Properties view to monitor key attributes of the object selected in the configuration tree. 4. To show all attributes associated with the selected cluster object, click Show all attributes. 5. For more information about an attribute, click the attribute name or the icon in the Help column.
319
320
Maintenance (UNIX)
Monitoring the Cluster Resources (UNIX)
1. From the Cluster Explorer, select the Service Groups tab in the configuration tree. 2. Click a service group in the configuration tree. 3. In the View panel, select the Resources tab to open the Cluster Explorer - Resources view (grp_imaginet on cluster1). 4. Use the graph in the window to monitor the dependencies between resources and the status of the service group on systems in the cluster. As in the Service Group view, a line between two resources indicates a dependency and specifies the order in which resources can be brought online or taken offline. 5. Move the cursor over a resource icon to display pop-up windows with information about the type, state, and key attributes of the resource. 6. To view the state of the resource in cluster2, click the cluster2 icon at the bottom of the screen. grp_imaginet is grayed out (offline) in cluster2.
321
322
Maintenance (UNIX)
The priority number indicates the failover sequence, with 1 denoting the first system to start after a failover. 4. Click Next. 5. On the Notifier Options dialog box: a. b. Specify the path for the Notifier resource. Click ... to view the default pathname and to edit the attribute at a local or global system level. Choose the mode of notification that must be configured. Click the check boxes to configure SNMP and/or SMTP (if applicable). Click + to create the appropriate number of fields for the SNMP consoles and severity levels. Click - to remove a field. Enter the console and click the severity level in the drop-down list box. For example, snmpserv and Information. Enter the SNMP trap port. 162 is the default value.
7. Click Next. 8. On the SMTP Configuration dialog box (if applicable): a. b. c. Enter the name of the SMTP server. Click + to create the appropriate number of fields for recipients of the notification and severity levels. Click to remove a field. Enter the recipient and click the severity level in the drop-down list box.
9. Click Next. 10. On the NIC Resource Configuration dialog box: a. Click Do not configure NIC Resource (if applicable), click Next, and proceed to the next step. or If you configure the NIC resource (as recommended by VCS), proceed to substep b. b. Enter the name of the resource. c. Click the ... in the Discover column of the table to find the MAC Address for each system. d. Click OK in the Discover dialog box. 11. Click Next. 12. Click Bring the Notifier Resource Online if desired. 13. Click Next. 14. Click Finish.
Engine Log
The engine log is located at /var/VRTSvcs/log/engine_A.log. The format of an engine log messages is: TAG | Date (yy/mm/dd) | Time | Product | Message ID | Message The following is a typical engine log entry: TAG_C 2001/12/03 18:54:58 VCS:10075:building from remote system.
323
Agent Log
The agent log is located at $VCS_HOME/log/agent_A.log. The format of agent log messages is: TAG | Date (yy/mm/dd) | Time | Product | Message ID | Agent Type |Resource Name | Entry Point | Message The following is a typical agent log entry: TAG_C 2001/12/03 19:40:01 VCS:254001:Oracle:oracle1:online:One or more attributes contain invalid values. All tag entries are written to the engine and agent logs. Tag A and B entries are also written to the system log, which can be viewed at _____________. See these topics: VCS Monitoring and Status Commands Common VCS Commands VCS Environmental Variables Preserving Cartridges
324
Maintenance (UNIX)
VCS Monitoring and Status Commands (UNIX)
The following table describes the basic UNIX commands used to monitor the cluster. Command haclus -display -modify -help hagrp -add <system group> -clear <system group> -state <service_group> -sys <system> -switch <system> to <system> -display -dep <service_group> -resources <service_group> -list hasys -add -display <system> -force -load -modify -state <system> -list -nodeid -help hares -add <service_group> -local -global -clear Clears resource faults. NOTE: When a resource faults, it stops the onlining of all dependencies. To attempt a new onlining, you must clear the faults on the resource first. Adds a resource to the service group specified. Displays the state of the system specified, or of all systems if none are specified. Displays a list of systems in the cluster. Adds a new system to the cluster. Displays information about the system specified or about all systems if none are specified. Adds a system group to the cluster. Clears the system group of faults. Displays state of service group on system. Initiates the failover of one system to the other. Displays service groups. Lists dependencies of a service group. Lists the resources in a service group. Variation Description Displays information about the cluster. Requires root permission to use.
-online -offline -modify -state <service_group> -display -display -group -dep -list -help hastatus -summary -group hamsg -help -list -info LDF Displays the status of all service groups in the cluster, including resources. Displays the status of cluster faults, including faults of service groups, resources, systems, links, and agents. Displays the status of the service group. Displays a usage list for Log Data Files (LDFs). Displays a list of available LDFs. Displays general LDF data. Displays the state of the resource specified, or of all resources if none are specified Displays information on the resources of the service group. Lists the resources dependencies. Displays a list of all resources.
325
VCS_ENABLE_LDF
Designates whether or not log data files (LDFs) are generated. If set to 1, LDFs are generated. If set to 0, they are not. Root directory for VCS executables. GAB port to which VCS connects. Timeout in milliseconds for HAD to send heartbeats to GAB.
/opt/VRTSvcs h 15000 NOTE: If the specified timeout is exceeded, GAB kills HAD, and all active service groups on the system are disabled. 0
VCS_HAD_RESTART_TIMEOUT
User must set this variable to designate the amount of time the hashadow process waits (sleep time) before restarting HAD. Root directory for log files and temporary files.
VCS_LOG
/var/VRTSvcs NOTE: If this variable is added or modified, you must reboot the system to apply the changes. vcs NOTE: The specified service should be configured before starting the VCS engine (HAD). If a service is not specified, the VCS engine starts with port 14141. /var/VRTSvcs NOTE: This directory is created in /tmp under the following conditions: - The variable is not set. - The variable is set but the directory to which it is set does not exist. - The utility hacf cannot find the default location.
VCS_SERVICE
VCS_TEMP_DIR
326
Maintenance (UNIX)
Common VCS Commands (UNIX)
The following commands are used to perform common VCS processes. Task Start VCS cold (on each node). Start VCS cold and accept system as valid (on each node). Stop VCS gracefully (on each node). Stop VCS and leave resources online. Stop VCS on all systems and leave groups online. Watch VCS logs. Force a halt/reboot to perform a failover. Command /opt/VRTSvcs/bin/hastart /opt/VRTSvcs/bin/hastart -force /opt/VRTSvcs/bin/hastop -local /opt/VRTSvcs/hastop -local -force /opt/VRTSvcs/hastop -all -force tail -f /var/VRTSvcs/log/engine.log_A /sbin/gabsync;sync;halt or /sbin/gabsync;sync;reboot /etc/VRTSvcs/conf/config /etc/VRTSvcs/conf/config/main.cf types.cf Open configuration: /opt/VRTSvcs/bin/haconf -makerw Modify Resource: /opt/VRTSvcs/bin/hares -modify <resource> <attribute> <value> Close Configuration: /opt/VRTSvcs/bin/haconf -dump -makero In the Cluster Explorer, select Open Config from the Cluster menu. Select the resource to modify and look at the attributes view. Push the little e button in the upper right corner of the attributes view. Select the attribute to change. Enter the new value in the small box. From the edit menu, select Set. The change should be reflected in the attribute view. In the Cluster Explorer, select Close Config from the Cluster menu. Open configuration: /opt/VRTSvcs/bin/haconf -makerw Change the SNMP IP to <IP Address> /opt/VRTSvcs/bin/hasnmp -modify IPAddr <IP Address> Dump the configuration and make read only: /opt/VRTSvcs/bin/haconf -dump -makero /opt/VRTSvcs/bin/hares -clear <resource> -sys <system>
Locate Configuration File. Locate Main config. Included files. Modify resource while VCS is running (CLI).
NOTE: You should clear faults because when a resource faults, it stops the onlining of all dependencies (e.g., Oracle does not online if a diskgroup faults). To attempt a new onlining, you must clear the faults on the resource first. Online a group. View summary status. View tailing status. View systems node name. Confirm that the configuration is closed. Look for the FAULTED status of a service group. Look for the FAULTED status of a system. Review logs. /opt/VRTSvcs/bin/hagrp -online <group> -sys <sys> /opt/VRTSvcs/bin/hastatus -summary /opt/VRTSvcs/bin/hastatus uname -n # /opt/VRTSvcs/bin/haconf -dump -makero # /opt/VRTSvcs/bin/hasys -display # /opt/VRTSvcs/bin/hasys -display /var/adm/messages /var/VRTSvcs/log/*
327
Preserving Cartridges
To ensure a longer life for full or new cartridges, store cartridges in a clean environment and follow these recommendations: Do not drop or bang the cartridge. This can displace the tape leader, making the cartridge unusable and possibly damaging the drive. Store the data cartridge in the plastic shipping enclosure. Do not expose tape cartridges to direct sunlight and other heat sources. If the cartridge has been exposed to extreme heat or cold, stabilize the cartridge at room temperature for the same amount of time it was exposed (up to 24 hours). Place the identification label in the slide-in slot on the front of the cartridge only. Do not attach labels anywhere on the cartridge except in the slide-in slot.
328
Maintenance (UNIX)
Scanning Bar Codes
The LED scanner is a Class 1 laser device, but emits less light and a wider spectrum of wavelengths than a laser scanner. CAUTION: Do not look directly at the LEDs. See these topics: Scanning Patient IDs Scanning Bar Code Accession Numbers Clearing the Bar Code Programming Scanning Patient IDs The LED scanner is a Class 1 laser device, but emits less light and a wider spectrum of wavelengths than a laser scanner. CAUTION: Do not look directly at the LEDs. 1. Log onto the Workstation and start the CARESTREAM PACS Client Suite. 2. Program the scanner to scan Patient IDs. 3. Double-click the server that has the studies to be tested. 4. Place each bar code on the table in front of the scanner. 5. Position the bar code parallel to the line of light from the scanner. 6. Push the bar code through the line of light with a constant rate of speed. The scanner produces an audible beep as the bar code passes under the line of light. 7. If the scanner does not beep, repeat steps 3 to 6. Scanning Bar Code Accession Numbers The LED scanner is a Class 1 laser device, but emits less light and a wider spectrum of wavelengths than a laser scanner. CAUTION: Do not look directly at the LEDs. 1. Program the scanner to scan Accession Numbers. 2. Double-click the server that has the studies to be tested. 3. Place each bar code on the table in front of the scanner. 4. Position the bar code parallel to the line of light from the scanner. 5. Push the bar code through the line of light with a constant rate of speed. The scanner produces an audible beep as the bar code passes under the line of light. 6. If the scanner does not beep, repeat steps 3 to 5. Clearing the Bar Code Programming The LED scanner is a Class 1 laser device, but emits less light and a wider spectrum of wavelengths than a laser scanner. CAUTION: Do not look directly at the LEDs. 1. Place each bar code on the table in front of the scanner. 2. Position the bar code parallel to the line of light from the scanner. 3. Push the bar code through the line of light with a constant rate of speed. The scanner produces an audible beep as the bar code passes under the line of light. 4. If the scanner does not beep, repeat steps 1 to 3.
329
330
Important: The warning does not interfere with system operation. You must contact a Carestream Health representative to check or renew the license. The red warning message is a link. Click on the link to display the Licenses Log which details the license errors:
Each line states whether that type of license has a violation (or an error in the check). The percentage values quantify the amount of violation from the licensed amount. The most common license type for Archive (IMS) or a PACS is the EXAMS_YR counter, which measures the amount of studies that enter the system annually.
331
System Uptime
Database Utilization Database Extents Database Connections Database Analyze Number of Running DICOM Servers Jukebox Backups Long-Term Storage Manager Cache Utilization Pre-Fetch
All the fields are configurable, and can be accessed for editing using the following command: C:\Program Files\Carestream Solutions\System5\scripts\system_check_params
332
Maintenance (WINDOWS OS) Daily Task: Database Tablespace Free Space (WINDOWS OS)
This script is used for automatically handling tablespace free space. By default (without any parameters), the script finds all the tablespaces with less than 15% of free space and enlarges them by 20%. The script is executed daily (via the OS scheduler) at 22:00.
Supported Options
Option log_file db_name min_percent add_percent tablespace_name enlarge_to_min_free_mb enlarge_to_min_free_percent Use to: specify a log filename (instead of the default) specify another database name (instead of the default mstore) specify the minimum free space to cause enlargement (instead of the default of 15) specify the enlargement percentage (instead of the default of 20) specify one or more tablespaces separated by a comma (the default is all tablespaces) allow enlargement to a minimum of free MB in the tablespace(s) allow enlargement to a minimum of free MB in the tablespace(s)
333
NOTE: The system check covers most of the routine maintenance system schedule. Carestream Health recommends running the routine maintenance procedures regularly.
334
Hot Backup
During a hot backup, the database is not down and users can continue to work without interruption. The hot backup procedure creates log files under the log directory: IMAGINET_ROOT\log. The backup log files are named backup_<type>.<dbname>.log where type = inc for the full backup and al for an archive log dbname = the name of the database instance: mst1 or rc01 The actual backup files and the last backup log files are stored under the IMAGINET_BACKUP_ROOT directory. Only the last successful backup is kept.
Cold Backup
During a cold backup, the database is shut down and users are unable to work until the backup is complete. The default method is a full backup, which runs every night in two phases: Full backup: the scheduled task db_backup_inc runs at 2 am. Archive log backup: the scheduled task db_backup_al runs each night at 5 am. A log file is created under the ImagiNet log directory IMAGINET_ROOT\log\backup.log. The actual backup files are stored in the IMAGINET_BACKUP_ROOT directory. Depending on the amount of available disk space, either the last one or two successful backups are saved. NOTE: You should copy the database backups to separate media, so they can be recovered in case of a disk failure. Full or partial restoration of a database from backup can only be done by Customer Service. Any attempt by unqualified personnel may result in permanent loss of patient data and/or general system malfunction. See these topics: Verifying the Workflow Manager Daily Backup Amending the Scheduled Time for the Backup Central Configuration Backup
335
336
337
338
339
340
341
Error Handling
342
343
344
345
Troubleshooting (UNIX)
Online Storage Management Software for the CARESTREAM PACS System is equipped with automatic backup and cleanup procedures. However, you might encounter problems due to very high load levels, configurations that were not adapted to changing needs, negligence in performing maintenance procedures, or hardware and software malfunctions. Below are some known problems. Click the link for information about possible causes and recommended solutions. Copying Log Files Online Storage Management Storage Failure Database Access Failure Low Rate of Performance Performance Related to Memory Leak/System Stress Recovery Procedure Related to PHI Long-Term Storage Manager General Recovery Problem Long-Term Storage Manager General Backup Failure Suspected Damaged Drive Exported Cartridge is Lost or Damaged ORACLE Error Messages Cannot Access MICROSOFT INTERNET EXPLORER Applications Archive Explorer and Viewer Icons Appear as Blue Squares JAVA Security Error Checking the Logs E-Mail Message Details NOTE: If these procedures are not sufficient, contact Customer Service.
An image sent by a modality is rejected by the server. The SOP Instance UID of the image is identical to one of an image already on the server. 1. Go to Administration --> System Monitoring & Control. 2. Click SOP Instance UID Alerts and View TAMAR_LOG. If instances of "_instance_uid" appear, notify the PACS administrator of the problem so that the modality creating the duplicate SOP instance UID can be identified.
346
Troubleshooting (UNIX)
Database Access Failure (UNIX)
Problem Cause Solution Problems occur when connecting to the DICOM server. The log file displays the message DB_Connection: Failed to connect to database. The database is not running. NOTE: Contact Customer Service before applying the solution. 1. Verify that the database is running, as described in Running a System Check. 2. If the database is not running, use the database system script to reactivate the database. 3. From the oracle user, type: setenv TAMAR_ROOT /usr/tamar.root and press Enter. 4. Type: /usr/tamar.root/scripts /DB_startup.scr dbname where dbname is either mst1 or rc01, then press Enter. Messages in green indicate a successful operation. Messages in red indicate problems that must be resolved.
347
Cause 3
348
Troubleshooting (UNIX)
The cartridge is out of the Jukebox. Storage unit unavailablethere is a SCSI disconnection between the server and the Jukebox. Solution 3 1. Raise the HSM package to Log Level 7 and ensure that the NetBackup recover request is issued. For example: DSER[1293]: ==== user root (1293) start session ===== DSER[1293]: 4 SIR_Access.C (291): OpenSend: Issue recover for Patient: <LOWANN,ADKINS>, DB_UID: <471>. DSER[1293]: 7 HSM_Cmd_Line_Executer.C (33): executing r;bprestore -C phiona -S phiona -c algotec_class -L /tmp/algotec_class_restore_log -w 0 -f /tmp/sir_study_list_1293r; DSER[1293]: 7 HSM_Cmd_Line_Executer.C (49): The return termination status is 0. phiona sir_server[1293]: ===== user root (1293) end session ===== If the Return Termination Status is not 0, the problem is with NetBackup. 2. Click Reports in the NetBackup Administration window. The Log window appears. 3. Click All Entries. All of the log entries for the server appear. 4. Look for entries whose status is not 0. 5. Right-click Status to access the NetBackup Troubleshooting Wizard and correct the error. For details, see the NetBackup Troubleshooting Manual.
349
350
Troubleshooting (UNIX)
Suspected Damaged Drive (UNIX)
Problem Cause 1 Solution 1 Cause 2 Solution 2 Cause 3 Solution 3 Storage or retrieval procedures on a specific drive fail repeatedly. Defective mediadata cannot be recovered from the cartridge. See Exported Cartridge is Lost or Damaged. The media is write-protected, or the wrong media type is being used. Verify that the media matches the drive type that you are activating. Drive failureone or more of the drives are down, or a storage unit is unavailable due to a SCSI disconnection between the server and the Jukebox. 1. Stop the NetBackup processes by running: /usr/openv/netbackup/bin/goodies/bp.kill_all exit 2. Open the Jukebox door and make sure all drives are empty. If not, unload the cartridges. 3. Make sure the SCSI cables are properly connected. 4. Reboot: -- -r. 5. Check the drives status in the Device Manager window in the NetBackup Administration Tool. 6. In the Media Management window, run Inventory Robot. 7. If drives are still DOWN or AVR, contact Customer Service or the storage vendor support.
Cause 2 Solution 2
The Mirror cartridge has been lost or physically damaged, outside of the library. Insert the Master Cartridge into the library and perform a manual Mirror Operation on the Master copy through the Jukebox Monitor. NOTE: Operations in the Jukebox Monitor are always on the Master copy.
351
352
Troubleshooting (UNIX)
JAVA Security Error in Online and Long-Term Storage Configuration or Clustering Set Up (UNIX)
Problem The JAVA applet does not load, the Administration window does not open, and r;Applet Loadingnotinitiated appears. In the JAVA console, the following error message appears: java.security.AccessControlException: access denied (java.net.SocketPermission 198.180.70.201 connect,resolve) A JAVA security error occurred. A JAVA security error can occur when you are using Long-Term Storage Manager from a Web Server client and then attempt to access the Online Storage Management server, for example, to do system administration tasks. This JAVA security error occurs because Online Storage Management and Long-Term Storage Manager have different IP addresses. The JAVA security error can also occur if clustering is used. In the JAVA .policy file, use the ORACLE IP address instead of the Online Storage Management IP address. 1. Go to the directory, C:\program files\java\ j2re1.x.x\lib\security. 2. Open the Java.policy file and add this line: permission java.net.SocketPermission r;ip-address:1521-, r;resolve,connect; where ip-address is the Online Storage Management IP address. A sample modified file excerpt is shown below where 198.180.70.201 is the Online Storage Management IP address. grant { ..... permission java.util.PropertyPermission r;java.vm.vendor, r;read; permission java.util.PropertyPermission r;java.vm.name, r;read; permission java.net.SocketPermission r;198.180.70.201:1521-, r;resolve,connect;
Cause
Solution
353
o
or
Click Start Service, Stop Service, or Restart Service from the toolbar. Select Actions --> Start, Stop, or Restart.
354
355
An image sent by a modality is rejected by the server. The SOP Instance UID of the image is identical to one of an image already on the server. 1. Check the log file IMAGINET_ROOT\log. 2. If instances of _instance_uid appear, notify the PACS administrator of the problem so that the modality creating the duplicate SOP instance UID can be identified.
A storage attempt to the Workflow Manager has failed or the system check reports tablespace free space is below limit. Run the script IMAGINET_ROOT\scripts\db_ts_fix.pl to enlarge the tablespace. The existing FIR mounts are full. Run the script: IMAGINET_ROOT\mst\admin\ AddFirMount.exe to add a new FIR mount.
356
357
Application Problems
Problem Cause Check Solution The connection to the Info Router Server failed. The Info Router Server is down. When starting the Info Router Admin Tool, check the message that appears. Restart the Info Router WINDOWS OS service.
Problem Solution
A destination device does not appear in the "copy" screen. Add the "storable" parameter in the central configuration.
Server Problems
Problem Cause Check No routing of images occurs. Copy command failed Check the Info Router monitor. Depends on the problem found. Server crashed Check the status of the Info Router WINDOWS OS service. Restart the Info Router WINDOWS OS service. Probe failed Check the Info Router logs for errors. Restart the Info Router WINDOWS OS service. Images do not satisfy filter criteria Check the relevant rules filters. Fix rule as necessary.
Solution
As soon as the Info Router starts, there are many commands in the queue. The Info Router Server was down for a long time and many commands are waiting to be executed. Check the queues size and the waiting commands sizes. Invoke sqlplus and run the following command: sqlplus> select count(*) from autorouter. ar_image_queue_ table;
358
The copy to CARESTREAM PACS Client station fails. The CARESTREAM PACS Client DSER service is down Check the DSER service status. Restart the Imaginet DICOM Server WINDOWS OS service.
Cause
Listener/Converter Failure
A failure can occur during the Listener/Converter services startup procedure or while the Listener/Converter is running. Problem Cause The IS Link Software log displays the description of an occurred exception (java.sql.SQLException). The incorrect configuration parameters were entered during the IS Link Software installation process. The database is down. Solution Restart the IS Link Software installation process from the beginning, enter the correct parameters, and verify that the installation completes successfully. Contact Customer Service to report the database failure.
359
360
Index
A
Access Control Management tool .......................... 70 Groups tab, opening ........................................ 73 opening.......................................................... 71 Users tab, opening .......................................... 72 Accessing, Cluster Explorer screen ..................... 303 Accession number automatic update .......................................... 105 bar code, scanning .................................317, 332 Activating IMS Document Agent ....................................... 89 Adding groups ........................................................... 64 prefix Patient ID ............................................ 103 referring physician......................................... 247 restrictions ..................................................... 44 to users and groups ............................... 45, 74 suffix Patient ID ............................................ 103 users ............................................................. 36 Adding contacts ................................................. 42 Admin Tools, system requirements for .................. 12 Advanced settings for users, defining.................... 38 Aliases, configuring Info Router ......................... 196 APACHE web server, installing certificate for ........ 265 Applicable permissions .................................50, 272 Application security UNIX............................................................ 263 WINDOWS OS............................................... 264 Archive configuration ........................................ 211 Assigning permissions....................................... 271 Audit archiving................................................. 113 Audit event settings, defining ............................ 115 Audit logs, moving to offline storage UNIX............................................................ 298 WINDOWS OS............................................... 326 Audit Trail ......................................................... 41 Audit Viewer Tool window.................................. 112 filtering ........................................................ 111 Auditing .......................................................... 110 Auto Delete ...................................... 138, 212, 217 Auto-Delete, configuring database objects........... 176
C
Cancelled orders, filtering.................................. 103 Cannot access MICROSOFT INTERNET EXPLORER applications (UNIX) ...................................... 340 CARESTREAM PACS overview.................................3 Cartridges, preserving ...................................... 316 CD Direct Suite overview .................................................. 9, 249 Setting Configuration Parameters .................... 250 Central configuration backup UNIX........................................................ 288 WINDOWS OS........................................... 324 selecting as UM repository ................................ 59 Central configuration editor ................................. 58 Certificate, installing for APACHE web server ....... 265 Change/set forgotten password URL, configuring.... 62 Changed ......................................................... 227 FAILED......................................................... 227 Changing Data Import tool settings ................................. 24 default ORACLE passwords UNIX........................................................ 269 WINDOWS OS........................................... 270 scheduled time for performing backup (WINDOWS OS) ......................................................... 324 User Management repository (group) ................. 57 Checking Online Storage Management storage volume UNIX........................................................ 291 WINDOWS OS........................................... 325 Clearing bar code programming ............................317, 333 Long-Term Storage Manager Admin Tool event log ............................................................... 241 Results Area of Media Management Window (LTSM) ............................................................... 240 Client window, Info Router .................................. 81 Clone.............................................................. 217 Cluster heartbeat, monitoring .................................... 310 monitoring from command line, UNIX .............. 311 monitoring procedures ................................... 305 properties, monitoring.................................... 307 resources, monitoring .................................... 309 service groups, monitoring ............................. 308 status, monitoring ......................................... 306 system, system monitoring on ........................ 299 Cluster Explorer screen, accessing .......................................... 303 toolbar ......................................................... 304 Cluster Manager Log Desk ...................................................... 310 logging on to ................................................ 300 Cluster Monitor menus ......................................................... 301 panels.......................................................... 302
B
Backup external media, WINDOWS OS ........................ 324 media for studies, viewing .............................. 156 rule, Info Router............................................ 215 to long-term storage (PreStore) ...................... 216 verification UNIX........................................................ 287 WINDOWS OS....................................323, 327 Backup flow, single media archive (SMA) ............ 156 Bar code accession numbers, scanning ...................317, 332 programming, clearing ............................317, 333 scanner .................................................316, 331 programming .....................................316, 332 scanning ...............................................317, 332
361
toolbar ......................................................... 301 Common VCS commands (UNIX)........................ 315 Complex mapping table, configuring ............107, 171 Compression settings, configuring Online Storage Manager ..................................................... 182 Compression, JPEG........................................... 279 Conference processes, viewing........................... 293 Configuration................................................... 159 Field chooser ................................................ 129 user............................................................. 129 Configuration Window ....................................... 159 Configuring change/set forgotten password URL ................... 62 complex mapping table ...........................107, 171 database objects auto-delete .......................... 176 display settings for Storage Management Admin tool ......................................................... 145 email error message options ............................... 192 message body options................................ 192 properties................................................. 192 report properties ....................................... 193 Email Suite ............................................191, 246 parameters, restarting server ..................... 248 properties................................................. 243 general email values ...................................... 192 HL-7 to PACS field mapping set ................105, 170 IMS Document Agent ....................................... 90 Info Router ................................................... 194 aliases ..................................................... 196 rules ........................................................ 194 IS Link ..................................................100, 185 converter and listeners............................... 186 database values ........................................ 187 queues and nofications............................... 190 log mechanism,WINDOWS OS......................... 343 Online Storage Manager compression settings... 182 patient matching, DICOM parameters .............. 177 permissions .................................................. 271 Pre-fetch ...................................................... 179 referring physicians email list.......................... 193 report parser values ...................................... 189 reports and order values ................................ 188 RIS-PACS synchronization .............................. 191 simple mapping table..............................107, 171 Single Media Archive (SMA) ............................ 157 SIR restore settings ....................................... 213 Workflow Manager ......................................... 172 DICOM ..................................................... 164 init values ................................................ 183 Contact information ............................................ 14 Contacts, adding ................................................ 42 Converter and listeners, configuring IS Link......... 186 Copying log files UNIX............................................................ 334 WINDOWS OS............................................... 342 Creating filters for log desk ......................................... 310 recurring aliases, Info Router .......................... 197
D
Daemon processes, viewing............................... 293 Daily maintenance checks WINDOWS OS) ........... 327 Daily tasks, WINDOWS OS backup verification ........................................ 327 disk space .................................................... 329 ORACLE Alert files ......................................... 328 scheduled tasks............................................. 327 services up and running ................................. 328 verify system check log .................................. 327 Damaged drive suspected, UNIX............................................ 339 Damaged exported cartridge ............................. 339 Dashboard ...............................................282, 319 Data Import tool installing ........................................................ 22 settings, changing ........................................... 24 using ............................................................. 23 Data observation, saving................................... 105 Database access failure UNIX........................................................ 335 WINDOWS OS........................................... 345 Admin tool.................................................... 125 analysis........................................................ 283 backup to external media verification (WINDOWS OS) ......................................................... 330 encryption .................................................... 124 fitness verification (UNIX)............................... 290 objects auto-delete, configuring ...................... 176 synchronizer (WINDOWS OS) ..................325, 330 tablespace free space..................................... 321 values, configuring IS Link.............................. 187 Default ORACLE passwords, changing UNIX............................................................ 269 WINDOWS OS............................................... 270 Defining advanced settings for users .............................. 38 aliases, Info Router ....................................... 196 audit event settings ....................................... 115 external applications for users........................... 39 general auditing settings ................................ 115 Info Router rule, new ..................................... 199 new groups..................................................... 63 new Info Router rule ...................................... 199 new Info Router rules .................................... 204 new users....................................................... 35 rule filters, Info Router................................... 206 rule function, Info Router ............................... 204 rule parameters, Info Router........................... 205 rule schedule, Info Router .............................. 207 Delete Selected.................................................. 41 Delete Selected User window ............................... 41 Delete Selected Users ......................................... 41 Deleting group............................................................. 69
362
Index
pending requests........................................... 227 redundant observations.................................. 109 user............................................................... 41 Deny Request .................................................. 227 Detaching studies............................................. 149 Details event, viewing .............................................. 115 patient, updating ........................................... 146 study, updating ............................................. 147 DICOM............................................................ 160 configuration ................................................ 160 Workflow Manager ..................................... 164 connection, verifying...................................... 163 data, importing ............................................... 23 image encryption........................................... 123 parameters patient matching, configuring...................... 177 parsing ........................................................ 173 Dictionary mechanism ...............................107, 171 Disk space, WINDOWS OS................................. 329 Display ............................................................. 41 managing ..................................................... 113 LTSM Admin Tool....................................... 231 Storage Management Admin Tool ................ 143 SOP instance UID alerts ................................. 141 Drive state report, generating............................ 236 Dynamic filters................................................. 208 Events in RIS................................................... 276 Exiting Media Management Window............................ 241 Storage Management Admin Tool .............156, 241 Expired ............................................................. 41 Exported cartridge, lost or damaged ................... 339 Exporting logs to MICROSOFT EXCEL .................. 116 Exporting media from Jukebox ........................... 238 External applications for users, defining ................ 39 External media backup, WINDOWS OS................ 324
F
FAILED ........................................................... 227 changed ....................................................... 227 Failover........................................................... 218 Start ............................................................ 218 Stop ............................................................ 218 View ............................................................ 218 Fetch from Offline ............................................ 217 Field chooser configurations .............................. 129 Filter creating for log desk ...................................... 310 dynamic ....................................................... 208 report display................................................ 103 types ........................................................... 144 Filtering Audit Viewer Tool window ............................... 111 cancelled orders ............................................ 103 studies list .................................................... 144 Filtering commands, Info Router .......................... 86 Functionality.................................................... 124
E
Editing Data Import tool settings ................................. 24 group settings................................................. 66 with LDAP................................................... 68 without LDAP .............................................. 67 Info Router rule............................................. 199 system settings, group..................................... 56 user settings................................................... 40 E-mail............................................................. 242 error message options, configuring .................. 192 message body options, configuring .................. 192 properties, configuring ................................... 192 report properties, configuring.......................... 193 Email Suite...................................................... 244 Email Suite Configuration Tool window................ 246 Email Values.................................................... 192 Encrypted Workflow Manager............................. 123 Encryption, database ........................................ 124 Encryption, DICOM image ................................. 123 Error Message Body tab, Email Suite configuration246 Error messages ORACLE UNIX........................................................ 339 WINDOWS OS........................................... 346 E-SIRs, merging series from .............................. 154 Event details, viewing ....................................... 115 Event log area, LTSM ........................................ 228 Event Viewer ................................................... 330 viewing log messages in ................................. 343
G
General auditing settings, defining .............................. 115 parameters................................................... 203 UNIX............................................................ 292 Generating drive state report .......................................... 236 inventory report ............................................ 234 media list report............................................ 235 Group adding ........................................................... 64 defining.......................................................... 63 deleting.......................................................... 69 management configuration ............................... 54 settings editing ....................................................... 66 viewing ...................................................... 66 with LDAP................................................... 68 without LDAP .............................................. 67 Grouping, studies ............................................. 178
H
Handling patient IDs ......................................... 103 Hazards ............................................................ 17 HIPAA security regulations ................................ 255 History, viewing ............................................... 116 HL-7 to PACS field mapping set, configuring .105, 170
363
I
Icons .............................................................. 181 Icons, Workflow Manager .................................. 280 ID 41 IEC-601 classification ......................................... 18 Image backup to external media verification (WINDOWS OS)........................................... 330 Image encryption, DICOM ................................. 123 Image level merging at ................................................... 131 splitting at .................................................... 131 Image resend .................................................. 140 Importing DICOM data ........................................ 23 Importing media into Jukebox............................ 237 Importing studies ............................................... 27 IMS Document Agent activating ....................................................... 89 configuring ..................................................... 90 IMS Document Agent (XDS/XDS-I Document Source) ................................................................... 88 IMS Document Repository (XDS Document Repository) ................................................... 91 Info Router........................................................ 84 application problems ...................................... 346 backup rule .................................................. 215 Client window ................................................. 81 configuration ................................................ 194 configuration toolbar........................................ 82 configuring aliases ......................................... 196 configuring rules ........................................... 194 creating recurring aliases ............................... 197 defining/modifying aliases .............................. 196 filtering commands .......................................... 86 menu bar ....................................................... 84 Monitoring tab................................................. 85 opening.......................................................... 79 overview .................................................. 10, 77 rule filters, defining ....................................... 206 rule function, defining .................................... 204 rule parameters, defining ............................... 205 rule schedule, defining ................................... 207 rules defining new ............................................. 204 updating................................................... 209 server problems ............................................ 346 starting and stopping ....................................... 87 toolbar ........................................................... 83 troubleshooting ............................................. 346 using ............................................................. 78 Info Router rule editing ......................................................... 199 new, defining ................................................ 199 Init values, configuring Workflow Manager .......... 183 Installing certificate for APACHE web server.................... 265 Data Import tool ............................................. 22 Inventory report, generating ............................. 234 IS Link Admin tool Orders tab ...................................... 98
Admin Tool Patients tab ................................... 97 Admin tool Reports tab..................................... 98 Admin tool Visits tab ........................................ 98 Admin tool window toolbar ............................... 99 configuration .........................................100, 185 configuring converter and listeners .................. 186 configuring database values............................ 187 configuring queues and notifications ................ 190 configuring report parser values ...................... 189 configuring reports and orders values .............. 188 converter failure............................................ 347 database installation failure ............................ 347 message processing failure ............................. 347 overview .................................................. 11, 92 processes, shutting down ................................. 95 shutdown, verifying ......................................... 95 startup, verifying............................................. 94 troubleshooting in ......................................... 347 using ............................................................. 93 using Admin tool ............................................. 96
J
JAVA configuration ................................................ 184 plug-in, downloading ....................................... 13 security error, UNIX clustering set up........................................ 341 online and long-term storage configuration... 341 JPEG compression ............................................ 279 Jukebox .......................................................... 227 exporting media from..................................... 238 importing media ............................................ 237
K
Kill command, using ........................................... 95
L
LDAP ................................................................ 68 configuration, testing ....................................... 61 selecting as UM repository ................................ 60 Library hardware fitness check........................... 297 Licenses Log .............................................282, 319 Life Cycle configuration ................................................ 210 management ................................................ 210 Limitations, user ................................................ 20 Listeners and converter, configuring IS Link ........ 186 Loading from Single Media Archive (SMA) ........... 157 Locating studies ............................................... 155 Log..........................................................282, 319 desk Cluster Manager ........................................ 310 creating filters for...................................... 310 exporting to MICROSOFT EXCEL ...................... 116 files, copying UNIX........................................................ 334 WINDOWS OS........................................... 342 mechanism, configuring WINDOWS OS........................................... 343 messages, viewing ........................................ 310
364
Index
WINDOWS OS........................................... 343 Logging in to PACS Admin home page................... 30 Logging on to Cluster Manager........................... 300 Login ................................................................ 30 Long-term storage (PreStore), backing up to ....... 216 Long-Term Storage Manager (LTSM) .................. 214 functionality.................................................. 214 general backup failure (UNIX) ......................... 338 general fitness check (UNIX)........................... 296 general recovery problem (UNIX) .................... 336 storage volume check (UNIX) ......................... 295 Long-Term Storage Manager Admin Tool............. 219 display, managing ......................................... 231 event log, clearing ......................................... 241 menu bar ..................................................... 222 opening........................................................ 220 toolbar ......................................................... 221 using ........................................................... 230 window ........................................................ 223 Lost exported cartridge ..................................... 339 Low performance UNIX............................................................ 335 WINDOWS OS............................................... 345 LTSM (Long-Term Storage Manager) .................. 214 Auto Delete .................................................. 217 event log area............................................... 228 functionality.................................................. 214 general backup failure (UNIX) ......................... 338 general fitness check (UNIX)........................... 296 general recovery problem (UNIX) .................... 336 media management options............................ 229 Pending Requests area ................................... 225 storage volume check (UNIX) ......................... 295 list report, generating .................................... 235 management options, LTSM............................ 229 Media Management Window, exiting ................... 241 Memory leak, UNIX .......................................... 336 Menu bar, Info Router......................................... 84 Menus, Cluster Monitor ..................................... 301 Merging at Image Level .............................................. 131 series from multiple external archives (E-SIRs) . 154 series from one study to another ..................... 152 Message Body tab, Email Suite configuration ....... 246 Messages, viewing log ...................................... 310 WINDOWS OS............................................... 343 MHTML report generator ................................... 243 MICROSOFT EXCEL, exporting logs to ................. 116 MICROSOFT INTERNET EXPLORER applications cannot access, UNIX ...................................... 340 Migration device, single media archive (SMA) ...... 156 Modifying aliases, Info Router ....................................... 196 Monitoring cluster ............................................ 305 heartbeat ..................................................... 310 properties..................................................... 307 resources ..................................................... 309 service groups .............................................. 308 status .......................................................... 306 UNIX from command line.................................... 311 PACS WINDOWS operating system services .. 342 Monitoring tab, Info Router ................................. 85 Moving audit logs to offline storage UNIX........................................................ 298 WINDOWS OS........................................... 326 studies to another patient............................... 147 Multiple external archives (E-SIRs), merging series from........................................................... 154 Multiple patient IDs .......................................... 103 Multi-tier archiving ........................................... 213
M
Mail component ............................................... 243 Maintenance checks (WINDOWS OS) daily ........................................................ 327 database backup to external media verification ........................................................... 330 database synchronizer ............................... 330 Event Viewer ............................................ 330 image backup to external media verification . 330 weekly ..................................................... 329 performing routine (WINDOWS OS) ................. 322 rules .............................................................. 21 UNIX............................................................ 281 WINDOWS OS............................................... 318 Managing display ............................................. 113 LTSM Admin Tool........................................... 231 Storage Management Admin Tool .................... 143 Manual RIS-Sync.............................................. 103 using ........................................................... 277 Mapping mechanism ......................................... 101 Media ............................................................. 227 cartridges, switching ...................................... 239 exporting from Jukebox.................................. 238 importing into Jukebox................................... 237
N
NetBackup synchronizer LTSM Admin Tool, running .............................. 233 New Info Router rules, defining .............................. 204 Site ID ......................................................... 105 tape, external media backup preparation WINDOWS OS........................................... 324 New Info Router rule defining........................................................ 199 NOTE ................................................................ 41
O
Observation data, saving................................... 105 Observations, deleting redundant ....................... 109 Offline, fetch from ............................................ 217 OK 41 Online Storage Management.............................. 124 Auto Delete .................................................. 138
365
Functionality ................................................. 124 storage failure UNIX........................................................ 334 WINDOWS OS........................................... 344 Storage Volume Check UNIX........................................................ 291 WINDOWS OS........................................... 325 tasks ........................................................... 137 Online Storage Manager, configuring compression settings ...................................................... 182 Opening Access Control management tool....................... 71 Access Control Management Tool Groups tab ...... 73 Access Control Management Tool Users tab ........ 72 Info Router ..................................................... 79 Long-Term Storage Manager Admin Tool .......... 220 Storage Management Admin Tool .................... 142 User Management Admin Tool group......................................................... 55 user........................................................... 33 ORACLE Alert file UNIX........................................................ 289 WINDOWS OS....................................324, 328 Database Listener check, WINDOWS OS........... 346 Database processes, viewing currently running . 293 error messages UNIX........................................................ 339 WINDOWS OS........................................... 346 passwords, changing default UNIX........................................................ 269 WINDOWS OS........................................... 270 server general fitness check (WINDOWS OS) .... 325 Overview CARESTREAM PACS ...........................................3 CARESTREAM PACS Client ..................................4 CD Direct Suite ......................................... 9, 249 Email Suite ................................................... 242 Info Router ............................................... 10, 77 IS Link Software........................................ 11, 92 Storage Management Admin Tool .................... 142 Workflow Manager ..................................... 7, 122 Owner responsibilities ......................................... 19
matching DICOM parameters, configuring .................. 177 RIS.......................................................... 191 Patients tab, IS Link Admin Tool........................... 97 Pending requests deleting........................................................ 227 resubmitting ................................................. 226 Pending Requests area, LTSM ............................ 225 Performance low UNIX........................................................ 335 WINDOWS OS........................................... 345 related to memory leak/system stress (UNIX) ... 336 Performing group management configuration ...................... 54 routine maintenance ...............................285, 322 user management configuration ........................ 32 Permissions ....................................................... 41 applicable ................................................50, 272 assigning...................................................... 271 configuring ................................................... 271 Security Manager .................................53, 261 settings, Security Manager ........................52, 262 PHI, recovery procedure related to (UNIX) .......... 336 Pre-Fetch ........................................................ 277 configuration ................................................ 179 Preparing previously used tape .......................... 288 Preserving cartridges ........................................ 316 PreStore ......................................................... 216 backup verification ........................................ 294 Previously used tape preparation, WINDOWS OS . 324 Privacy notice .................................................. 271 Processes, restarting ........................................ 160 Programming bar code scanner...................316, 332 Protecting studies............................................. 134 Push processes, viewing.................................... 293 Pushing scripts................................................. 109
Q
Questions.......................................................... 14 Queues and notifications, configuring IS Link....... 190
R
Recovered Studies List ...................................... 227 Recovered studies list area (LTSM) ..................... 224 Recovery procedure related to PHI (UNIX)........... 336 Recurring aliases, creating Info Router................ 197 Redundant observations, deleting....................... 109 Referring physician adding ......................................................... 247 removing...................................................... 247 searching for................................................. 247 updating....................................................... 247 Referring Physicians email list, configuring .......... 193 Referring Physicians List tab, Email Suite configuration ............................................... 247 Refreshing studies list, Storage Management Admin Tool ... 145 Regulatory information ....................................... 15 Relocating series from one study to another ........ 153
P
PACS Admin home page, logging in to .................. 30 PACS WINDOWS operating system services, monitoring .................................................. 342 Panels, Cluster Monitor ..................................... 302 Parameters, general ......................................... 203 Parsing, DICOM................................................ 173 Patient details, updating ........................................... 146 ID adding prefix to......................................... 103 adding suffix to ......................................... 103 multiple.................................................... 103 scanning ...........................................317, 332 uniqueness validation................................. 139
366
Index
Removing referring physician......................................... 247 restriction................................................. 48, 76 studies ......................................................... 142 Report display filters ................................................ 103 generator, MHTML ......................................... 243 information, viewing ...................................... 131 parser values, configuring .............................. 189 Report Properties tab, Email Suite configuration... 247 Reports and orders values, configuring ............... 188 Requests deleting pending............................................ 227 pending, resubmitting .................................... 226 Responsibilities, owner........................................ 19 Restarting processes ..................................................... 160 services........................................................ 160 Restarting server after configuring Email Suite parameters ................................................. 248 Restriction adding ........................................................... 44 to users and groups ............................... 45, 74 removing.................................................. 48, 76 updating................................................... 47, 75 Resubmitting pending requests .......................... 226 Results Area of Media Management Window (LTSM), clearing ...................................................... 240 Reverse study grouping .................................... 280 RIS events in ...................................................... 276 patient matching ........................................... 191 RIS-PACS log 277 sync configuration ......................................... 191 synchronization ............................................. 275 RIS-Sync, manual ............................................ 103 using ........................................................... 277 Root account e-mail.......................................... 286 Routine maintenance .................................285, 322 Rule ............................................................... 198 configuration screen ...................................... 197 configuring Info Router .................................. 194 Rule filters Info Router, defining...................................... 206 Rule function Info Router, defining...................................... 204 Rule parameters Info Router, defining...................................... 205 Rule schedule Info Router, defining...................................... 207 Running NetBackup synchronizer, LTSM Admin Tool ....... 233 system check UNIX........................................................ 284 WINDOWS OS........................................... 320 SA (Security Administrator) ............................... 259 Safe mode....................................................... 267 Safety............................................................... 17 guidelines....................................................... 16 rules .............................................................. 21 Saving observation data.................................... 105 Scanning bar code accession numbers ....................317, 332 bar codes ..............................................317, 332 patient IDs ............................................317, 332 Scheduled tasks, WINDOWS OS ......................... 327 Scheduled time for performing backup (WINDOWS OS), amending ............................................ 324 Screen settings, updating.................................. 116 Scripts, pushing ............................................... 109 Searching for referring physician ........................ 247 Security customer obligations...................................... 257 general practices ........................................... 268 policy........................................................... 256 regulations, HIPAA......................................... 255 responsibilities .............................................. 259 Security Administrator (SA) ............................... 259 Security Manager ........................................49, 260 permissions configuration ..........................53, 261 permissions settings .................................52, 262 Service Configuration..................................... 274 user interface................................................ 271 Selecting central configuration as UM repository ............... 59 LDAP as UM repository ..................................... 60 User Management repository (group) ................. 57 Series information, updating .................................... 131 splitting from one study to another .................. 151 Server, restarting after configuring Email Suite parameters ................................................. 248 Service Configuration, Security Manager ............. 274 Service group, switching ................................... 310 Services restarting ..................................................... 160 up and running, WINDOWS OS ....................... 328 Setting CD Direct configuration parameters ......... 250 Setting up VCS event notification, UNIX .............. 310 Settings, screen updating....................................................... 116 Shelf management ........................................... 217 Shutting down IS Link Software processes ............ 95 Simple mapping table, configuring...............107, 171 Single Media Archive (SMA) Admin tool.................................................... 157 backup flow .................................................. 156 configuration ................................................ 157 loading from ................................................. 157 SIR restore settings, configuring ........................ 213 SOP instance UID alerts, displaying ........................ 141 Sorting studies list ........................................... 145
S
SA 41
367
Split and merge series pre-fetched from external archives) .................................................... 150 Splitting at Image Level .................................... 131 Splitting series from one study to another ........... 151 Starting Info Router ........................................... 87 Stopping Info Router .......................................... 87 Storage failure, Online Storage Management UNIX............................................................ 334 WINDOWS OS............................................... 344 Storage Management Admin tool configuring display settings for........................ 145 display, managing ......................................... 143 exiting ..................................................156, 241 menu bar ..................................................... 127 opening........................................................ 142 overview ...................................................... 142 right-click menu ............................................ 128 toolbar ......................................................... 126 window, using ............................................... 143 Storage volume check, Online Storage Management UNIX............................................................ 291 WINDOWS OS............................................... 325 Studies ........................................................... 227 detaching ..................................................... 149 details, updating ........................................... 147 grouping ...................................................... 178 importing ....................................................... 27 information, viewing ...................................... 131 list filtering .................................................... 144 refreshing, Storage Management Admin Tool 145 sorting ..................................................... 145 locating ........................................................ 155 moving to another patient .............................. 147 protecting..................................................... 134 removing...................................................... 142 unprotecting ................................................. 134 Study grouping reverse ........................................................ 280 Workflow Manager ......................................... 280 Super PACS ..................................................... 118 SUPERPACS Building Blocks ............................... 118 Support ............................................................ 14 Suspected damaged drive, UNIX ........................ 339 Switching media cartridges ........................................... 239 service group ................................................ 310 Synchronization, RIS-PACS................................ 275 System ......................................................41, 227 check, running UNIX........................................................ 284 WINDOWS OS........................................... 320 monitoring on cluster system .......................... 299 processes, viewing UNIX........................................................ 293 requirements for Admin Tools ........................................... 12 settings, group editing ....................................................... 56
viewing ...................................................... 56 stress, UNIX ................................................. 336 System Configuration tool ................................. 159
T
Tablespace free space....................................... 321 Tape............................................................... 288 new, external media backup preparation WINDOWS OS........................................... 324 previously used preparation WINDOWS OS........................................... 324 Testing LDAP configuration .................................. 61 Time for performing backup (WINDOWS OS), amending ................................................... 324 Toolbar ............................................................. 41 Cluster Explorer ............................................ 304 Cluster Monitor ............................................. 301 Info Router ............................................... 82, 83 IS Link Admin tool window................................ 99 Tools menu ....................................................... 41 Troubleshooting ................................................. 14 Info Router ................................................... 346 IS Link Software............................................ 347 UNIX............................................................ 334 WINDOWS OS............................................... 342 Tunneling Protocol............................................ 120
U
UM repository selecting central configuration as....................... 59 selecting LDAP as ............................................ 60 Uniqueness validation, patient ID ....................... 139 UNIX application security .................................. 263 UNIX maintenance ........................................... 281 Unprotecting studies......................................... 134 Unsafe mode ................................................... 267 Updating Info Router rules ........................................... 209 patient details ............................................... 146 referring physician......................................... 247 restriction................................................. 47, 75 screen settings.............................................. 116 series information.......................................... 131 study details ................................................. 147 User adding ........................................................... 36 configurations ............................................... 129 defining.......................................................... 35 external applications for ............................... 39 deleting.......................................................... 41 interface, Security Manager ............................ 271 limitations ...................................................... 20 management configuration ............................... 32 settings editing ....................................................... 40 viewing ...................................................... 40 User Management Admin Tool group............................................................. 29 opening group......................................................... 55
368
Index
user........................................................... 33 User Management Admin tool (Contacts)............... 42 User Management Admin window ......................... 41 User Management Import tool ............................. 43 User Management repository changing (group)............................................. 57 selecting (group) ............................................. 57 User Management toolbar ................................... 41 User settings ..................................................... 40 View/edit........................................................ 40 Using Audit Trail to export logs to MICROSOFT EXCEL. 116 Data Import tool ............................................. 23 Info Router ..................................................... 78 IS Link Admin tool ........................................... 96 IS Link Software.............................................. 93 kill command .................................................. 95 Long-Term Storage Manager Admin Tool .......... 230 manual RIS-Sync .......................................... 277 Storage Management Admin Tool window......... 143 VCS Cluster Manager to monitor cluster ........... 300 WADO .......................................................... 158 without LDAP .............................................. 67 history ......................................................... 116 log messages ................................................ 310 WINDOWS OS........................................... 343 log messages in Event Viewer ......................... 343 push processes ............................................. 293 report information ......................................... 131 study information .......................................... 131 system processes (UNIX) ...................................... 293 settings, group............................................ 56 user settings................................................... 40 Workflow Manager backup server process......... 293 Viewing/Editing User Settings .............................. 40 VIParchive....................................................... 217
W
WADO, using ................................................... 158 Weekly maintenance checks, WINDOWS OS ........ 329 database backup to external media verification . 330 database synchronizer ................................... 330 Event Viewer ................................................ 330 image backup to external media verification ..... 330 Weekly tasks, WINDOWS OS database backup to external media verification . 330 database synchronizer ................................... 330 Event Viewer ................................................ 330 image backup to external media verification ..... 330 WFM Licensing Status Monitoring ................282, 319 WINDOWS OS application security........................................ 264 backup verification ........................................ 327 daily maintenance checks ............................... 327 disk space .................................................... 329 maintenance ................................................. 318 ORACLE Alert files ......................................... 328 scheduled tasks............................................. 327 services PACS, monitoring ...................................... 342 up and running ......................................... 328 verify system check log .................................. 327 Workflow management ..................................... 117 Workflow Manager backup server process, viewing ....................... 293 configuration ................................................ 172 configuring init values .................................... 183 daily backup, verifying UNIX........................................................ 288 WINDOWS OS........................................... 324 DICOM configuration...................................... 164 encrypted ..................................................... 123 icons............................................................ 280 overview .................................................. 7, 122 processes, viewing currently running ............... 293 study grouping.............................................. 280
V
Validation uniqueness, patient ID ....................... 139 VCS Cluster Manager, using to monitor cluster......... 300 common commands, UNIX ............................. 315 environmental variables ................................. 314 monitoring commands.................................... 313 status commands .......................................... 313 VCS event notification setting up, UNIX........................................ 310 Verify system check log, WINDOWS OS .............. 327 Verifying backup UNIX........................................................ 287 WINDOWS OS........................................... 323 DICOM Connection ........................................ 163 IS Link Software shutdown ................................................... 95 startup ....................................................... 94 Workflow Manager daily backup UNIX........................................................ 288 WINDOWS OS........................................... 324 View/edit .......................................................... 40 user settings................................................... 40 Viewing backup media for studies................................ 156 conference processes ..................................... 293 currently running ORACLE Database processes.. 293 currently running Workflow Manager processes . 293 daemon processes ......................................... 293 event details ................................................. 115 group settings................................................. 66 with LDAP................................................... 68
369
CARESTREAM is a trademark of Carestream Health, Inc. The Kodak trademark and trade dress are used under license from Kodak.
370