Services Fulfilled:

Hood Memorial is an acute and specialty care hospital that exists to provide premium quality health care services including outpatient services, general surgery, and diagnostic services to residents and visitors of the tri-parish area of Tangipahoa, St. Helena, and Washington.

In January 2013, GeauxTech was engaged by Hood Memorial Hospital, after the sudden loss of the entire IT department, to provide IT support and consulting services to fill the void. After establishing the starting point, GeauxTech performed an initial assessment revealing some opportunities for the hospital to improve operational efficiencies. GeauxTech began to build a vision for the IT services at the hospital in the form of a 5-year Multi-Phase IT Strategic Plan.

Solutions GeauxTech implemented to address the found issues:

Phase 1: Infrastructure Rebuild

Design, install, and manage a new seamless partitioned network allowing uninterrupted workflow while balancing traffic and segregating data streams. Implement wireless networking allowing providers to roam throughout the facility while remaining connected to the EMR systems utilized in HMH, and allowing guest services to provide public WiFi.

Enhance the hospital’s tele-communications while driving down operational costs by replacing multiple residential DSL connections with a HIGH SPEED fiber connection supporting both data and telephone services.

Implement a robust threat management system that provides protection from threats and helps ensure data integrity and security.

Implement digital Helpdesk Support to offer more efficient response to the end user and create an auditable record of issues and timeliness of resolution.

Phase 2: VDI & VOIP

Design, install, çonfigure, and deploy a complete hospital in a box. Virtual Desktop Implementation & VOIP telephone system will over time help reduce overall operating expense due to the extremely long life cycle of the endpoint devices by reducing the number of telephone lines in the enterprise by 97%, and reduce the security risks involved with data at rest.

Phase 3-5:

To be revealed later, come back and check out the progress