• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • CCSS Picked by Hospital Serving Mississippi’s ‘Golden Triangle’

    June 7, 2011 Alex Woodie

    Mississippi’s OCH Regional Medical Center has picked CCSS to provide IBM i systems management tools, the software company announced last month. The software will be employed in the management of critical information systems used by the hospital, which serves a seven-county area known as Mississippi’s Golden Triangle.

    Based in Starkville, the Oktibbeha County Hospital (OCH) Regional Medical Center serves a seven-county area of northeastern Mississippi known as the Golden Triangle. While the area is largely rural, the OCH Medical Center prides itself on being a progressive hospital. For example, many of its 100 staff physicians are board certified, according to the 96-bed hospital’s website. Also, it offers 12 different medical specialties, and uses advanced medical technology, such as MRIs and laparoscopic Nissen fundoplication machines.

    Behind the advanced degrees and machines with fancy names is a System i Model 720 that keeps the business side of the hospital running smoothly. The IBM i platform is central to OCH Medical Center’s operations, and runs the computerized physician order entry (CPOE), financials, pharmacy, and laboratory applications used by the hospital’s 400 staff members.

    Keeping the System i server running smooth is critical to the hospital’s success, and is the ultimate responsibility of Chamath N. Wijewardane, OCH’s chief information technology officer. Wijewardane says his team looked at several solutions before selecting the CCSS systems management tools, including QSystem Monitor and QMessage Monitor.

    Wijewardane and his team of four IT professionals use the CCSS tools to monitor the Model 720 and make sure that any issues–such as a looping job, low DASD, or other error messages–are quickly identified and responded to.

    The CCSS tools are an “excellent match for our needs,” Wijewardane says. “QSystem Monitor and QMessage Monitor allow us to not only keep on top of any issues but actually stay one step ahead. I’d say the CCSS solutions are the best I’ve ever seen and I’ve been very impressed with CCSS, not just in terms of the products but also by the level of support offered.”

    RELATED STORIES

    CCSS Takes Aim at IBM i Availability in New Guide

    CCSS Targets Security Issues in ‘Best Practices’ Guide

    CCSS Digs Deeper Into the Audit Journal to Yield Clues

    CCSS Goes ’12 for 12′ with IBM i Monitoring Solution

    CCSS Offers Flexible Pricing for Service Providers

    CCSS Keeps an Eye on State of Backups with New BRMS Monitors

    CCSS Cracks Down on Long-Running Jobs

    CCSS Enhances System i Disk Monitoring with Utility



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  FREE Webinar: RPG Open Access and Rich Display Files. June 9
    SEQUEL Software:  View the recorded Webinar: 10 Ways SEQUEL Makes Developers More Productive
    RJS Software Systems:  Go paperless, automate business process and save money

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    IBM Adds SupportLine for Power Systems Blades ILE: Decisions, Decisions, Part 1

    Leave a Reply Cancel reply

Volume 11, Number 20 -- June 7, 2011
THIS ISSUE SPONSORED BY:

ASNA
PowerTech
ManageEngine
Computer Keyes
VAULT400

Table of Contents

  • Zend Server for IBM i 5.1 Introduces New Toolkit
  • Visual LANSA Apps Now Deploy to Mobile Devices
  • Agilysys to Sell Server and Services Biz, Focus on Software
  • Real Vision Delivers iPad App for IBM i Imaging System
  • IBM Patches WebSphere Portal XSS Vulnerability
  • PowerTech’s IBM i Security Conference Slated for September
  • Bytware Releases Japanese Versions of Messaging Products
  • Maintec Launches ‘Graveyard Shift’ Outsourcing Service
  • CCSS Picked by Hospital Serving Mississippi’s ‘Golden Triangle’
  • MyEclipse Blue Edition 9.0 Offers RAD Alternative

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power10 Entry Machines: The Power S1024 And Power L1024
  • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
  • Big Blue Unveils New Scalable VTL For IBM i
  • As I See It: Thank God It’s Thursday
  • IBM i PTF Guide, Volume 24, Number 32
  • JD Edwards Customers Face Support Decisions
  • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says
  • Cleo and SrinSoft in Integration-Modernization Link Up
  • Four Hundred Monitor, August 3
  • IBM i PTF Guide, Volume 24, Number 31

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.