Proposal for Comprehensive SINERGY Surveillance System. Group 12 John Kurlak Robert Pero Aleksi White

Size: px
Start display at page:

Download "Proposal for Comprehensive SINERGY Surveillance System. Group 12 John Kurlak Robert Pero Aleksi White"

Transcription

1 Proposal for Comprehensive SINERGY Surveillance System Group 12 John Kurlak Robert Pero Aleksi White Architectural Model and Complete Design Specification April 27, 2012

2 1. Introduction Diverse incidents (such as acts of violence, gas leaks, and earthquakes) take place on campuses across the United States every day. To manage such incidents effectively, a comprehensive system is necessary. SINERGY (campus situational awareness and Emergency Response management system) is a Service-Oriented Architecture (SOA)-based network-centric system of systems, which offers a comprehensive, institution-wide, software-based solution for balancing safety and openness on any campus environment. 1 In this document, we propose an Architectural Model and Complete Design Specification for a Comprehensive SINERGY Surveillance System. The Architectural Model provides an overall picture of the system and its workings. The Complete Design Specification covers the details of the system by discussing the structure, organization, interactions, workflow, and sequencing. Our proposed architecture is modeled on the Microsoft.NET Platform and is designed to handle three major components: manual surveillance, automated surveillance, and situational awareness management. Each major component has been incorporated into our system using a Client- Server Architecture. Section 2 of this document describes the specifics of how our design works. Included in Section 2 is a detailed diagram of our network-centric system architecture, broken up into logical layers. Our proposed Complete Design Specification is detailed through numerous UML diagrams in Section 3. Section 3.1 covers the overall design of the system in terms of software classes and their relationships through a series of Class Diagrams. All aspects of the system are covered in this section. Section 3.2 uses a Component Diagram to show the organization and dependencies of the various SINERGY components in our system. Section 3.3 shows the devices and connections of our system in a Deployment Diagram. It shows where all surveillance systems reside and where all of the databases are deployed. Section 3.4 uses Statechart Diagrams to provide an overview of the possible states for different aspects of our system (such as user states, command center states, situational awareness states, etc.). Section 3.5 describes the workflow behavior of our system through a collection of Activity Diagrams. More specifically, it shows how operators can issue alerts and view surveillance as well as how campus constituents can report incidents. Section 3.6 provides a series of Sequence Diagrams to show the time-based object interactions for controlling, recording, and managing surveillance as well as for raising situational awareness. Next, Section 3.7 uses Collaboration Diagrams to detail how objects link together and how they send messages to each other in order to perform surveillance, accept reports, and raise situational awareness. Finally, Section 3.8 organizes the components of the system into related groups using a set of Package Diagrams. It groups the surveillance aspects of our system together, and it groups the command center aspects of our system together. Finally, Section 4 of our proposal offers concluding remarks regarding the entire system as a whole. If you have any concerns about our product, see Section 4. ii

3 Table of Contents 1. Introduction... ii 2. Network-Centric System Architecture Object-Oriented Software Design with UML Class Diagrams Manual Surveillance System Class Diagram Online Report Class Diagram Phone Report Class Diagram Mobile Message Report Class Diagram Visual Situational Awareness Class Diagram Audible Situational Awareness Class Diagram Noise Player System Class Diagram Monitor Surveillance Class Diagram Automated Surveillance Class Diagram Support Classes Class Diagram Mobile Message Sender Class Diagram Online Message Sender Class Diagram Component Diagram Overall System Component Diagram Deployment Diagram Surveillance System Deployment Diagram Statechart Diagrams Login Statechart Diagram Command Center Statechart Diagram User Access Statechart Diagram Command Center Options Statechart Diagram Raise Situational Awareness Statechart Diagram Activity Diagrams Operator Surveillance Activity Diagram Constituent Report Activity Diagram Operator Automated Alert Activity Diagram Operator Manual Report Activity Diagram Operator Issue Alert Activity Diagram Sequence Diagrams iii

4 Control Surveillance Sequence Diagram Monitor Surveillance Sequence Diagram Audible Situational Awareness Sequence Diagram Visual Situational Awareness Sequence Diagram Automatic Surveillance Sequence Diagram Collaboration Diagrams Report Incident Collaboration Diagram Raise Visual and Audible Situational Awareness Collaboration Diagram Surveillance Settings Collaboration Diagram Operator Surveillance Collaboration Diagram Send Electronic Message Collaboration Diagram Package Diagrams Surveillance Package Diagram Command Center Package Diagram Concluding Remarks References Appendix A: Meeting Minutes, Attendance, and Project Management Related Information Appendix B: Percentages of Contribution (with Signatures) iv

5 2. Network-Centric System Architecture Microsoft SQL Server Manual Surveillance Database Automated Surveillance Database ADO.NET A) Save/Retrieve Surveillance B) Change/Retrieve Surveillance Settings C) Activate/Deactivate Indicator Lights/Noise Playing System A) ViewSurveillance.aspx A) ViewManualSurveillance.aspx A) ViewAutomatedSurveillance.aspx B) UpdateSurveillanceSettings.aspx C) ControlIndicatorLights.aspx C) ControlNoiseSystem.aspx ASP.NET D) Post Mobile/ /Desktop/Social Media/LAN/Website Message E) Record/Play/Stop Audio Alerts F) Register/Login User D) PostMobileMessage.aspx D) Post Message.aspx D) PostDesktopMessage.aspx D) PostSocialMediaMessage.aspx D) PostLANMessage.aspx D) PostWebsiteMessage.aspx F) Login.aspx F) Register.aspx Index.aspx Common Language Runtime Engine Windows Server Operating System Server Request IIS Response Network (TCP/IP, HTTP, HTTPS) Client HTML CSS JavaScript JSON Web Forms Manual Surveillance System; Operator Automated Surveillance System User 1 User 2 User N Desktop, Laptop, Tablet, PDA, Smart Phone, Feature Phone, Landline Phone Node 1 Node 2 Node N Sound Sensors, Video Cameras, Door Security System, Weather Sensors 1

6 Our architecture is modeled on the Microsoft.NET platform. The inputs to our system are split between the automated surveillance systems, the manual surveillance systems, and the operator access devices. The automated surveillance system includes various automated sensors and cameras, while the manual surveillance system relies on campus constituents using various devices (phones, laptops, etc.) to report incidents. Inputs from the automated and manual systems are processed through centralized servers, and information is stored in the relational database management system, SQL Server. The operators also interact with the same server and can control surveillance system settings and incident indicators. First, we will consider the automated surveillance system. The automated surveillance system includes sound sensors, video cameras, weather sensors, and the door access security system. As these systems gather surveillance data, they send requests over the network to the IIS server. The IIS server then invokes the appropriate managed components in the business logic layer. These components are used to save the surveillance data to the database. This happens through interactions with ADO.NET, which maps data between the business logic layer and the data source layer, allowing the surveillance data to be stored in the SQL Server database. After the surveillance data is saved to the SQL Server database, the managed components then query the SQL Server database for the current surveillance settings. ASP.NET is used to relay this data back through the network as a JSON response to the client. The sensors, cameras, and security systems can then process that data locally and react according to the settings in case any changes were detected (such as a change in camera angle). Next, we will consider the manual surveillance system. The manual surveillance system consists of various campus constituents (students, faculty, staff, administrators, emergency response personnel) using various devices (mobile devices, computers, etc.) to report incidents. When a campus constituent makes a surveillance report, it is sent as a request over the network to the IIS server. The IIS server then invokes the appropriate managed components in the business logic layer to save the data to the database. This happens through interactions with ADO.NET, which maps data between the business logic layer and the data source layer, allowing the surveillance data to be stored in the SQL Server database. Furthermore, any Web Form necessary components from the.net Framework Component Class Library are rendered according to the request. ASP.NET is used to generate the dynamic response that is sent back through the network to the campus constituents indicating that the incident report has been saved. The data response is sent through the network to the client as HTML, CSS, JavaScript, and Web Forms. Finally, we will consider the command center operations. An operator can view the surveillance, change the surveillance settings, and raise situational awareness. To do this, he or she uses a device, such as a desktop computer, to make network requests to the IIS server. If the operator is trying to view the surveillance, the managed components in the business logic layer will query the database using ADO.NET. The surveillance data will then be sent through ASP.NET to the operator over the network as video, audio, images, HTML, CSS, and JavaScript. If the operator is trying to change the surveillance settings or activate situation indicators, the managed components in the business logic layer will send the new settings to the database using ADO.NET. The result of those changes will be sent through ASP.NET to the operator over the network as HTML, CSS, and JavaScript. If the operator is trying to raise online situational awareness, the managed components in the business logic layer will send out mobile messages, s, desktop messages, social media messages, LAN messages, and website messages. The 2

7 result of sending those messages will be reported back to the operator over the network via ASP.NET. The results will be sent as HTML, CSS, and JavaScript. We chose this client-server based system architecture running on the.net Framework because it is highly maintainable. The hardest and most expensive aspect of any software system is maintainability. By using a service-oriented architecture with client-server interactions, we can offer a system that is extremely easy to maintain and modify. Furthermore, our system architecture uses the Model-View-Controller (MVC) design pattern. MVC effectively allows us to separate the concerns of our system, making it easier to specialize and reuse the various components of our system. Due to these advantages, we believe that our system architecture is superior to the options offered by our competitors. 3

8 3. Object-Oriented Software Design with UML 3.1 Class Diagrams Manual Surveillance System Class Diagram Figure Manual Surveillance System Class Diagram The Class Diagram in Figure provides an overview of the classes involved when a campus constituent reports an incident manually. The campus constituent, represented as a User, files a Report. If the user files a report online, an OnlineReport is created. If the user 4

9 files a report via a landline phone, a PhoneReport is created. If the user files a report via text message, a MobileMessageReport is created. 5

10 Online Report Class Diagram Figure Online Report Class Diagram The Class Diagram in Figure describes how an online report is represented in our system. The PerpDescription class provides a set of fields for describing a perpetrator if one was present. The InputValidator assists in validating user input from the online report form. The DatabaseWrapper makes it easy to store the report form data in the database. 6

11 Phone Report Class Diagram Figure Phone Report Class Diagram The Class Diagram in Figure describes how a landline phone report is represented in our system. The PerpDescription class provides a set of fields for describing a perpetrator if one was present. The InputValidator assists in validating user input from the online report form. The DatabaseWrapper (which uses ADO.NET) makes it easy to store the phone report data in the database. 7

12 Mobile Message Report Class Diagram Figure Mobile Message Report Class Diagram The Class Diagram in Figure describes how a mobile phone report is represented in our system. The TextMessage class can parse incoming text messages and can send text message. It is used to retrieve incoming text message reports and to send out Thank You messages. The DatabaseWrapper (which uses ADO.NET) makes it easy to store the report data in the database. 8

13 Visual Situational Awareness Class Diagram Figure Visual Situational Awareness Class Diagram The Class Diagram in Figure shows how an operator can raise visual situational awareness. An operator can use the VisualSituationalAwarenessRaiser class to control the IndicatorLightSystem. The IndicatorLightSystem provides a number of control options as methods. The InputValidator is used to validate settings that the user selects. The DatabaseWrapper (which uses ADO.NET) makes it easy to store the indicator light settings in the database. 9

14 Audible Situational Awareness Class Diagram Figure Audible Situational Awareness Class Diagram The Class Diagram in Figure shows how an operator can raise audible situational awareness. An operator can use the AudibleSituationalAwarenessRaiser class to control the NoisePlayerSystem. The NoisePlayerSystem provides a number of audio control options as methods. The InputValidator is used to validate settings that the user selects. The DatabaseWrapper (which uses ADO.NET) makes it easy to store the audio settings in the database. 10

15 Noise Player System Class Diagram Figure Noise Player System Class Diagram The Class Diagram in Figure describes how the NoisePlayerSystem works. An audio file can be played or stopped across campus speakers using the NoisePlayerSystem class. The NoisePlayerSystem class is broken into two systems: the RecordedSpeechPlayerSystem and the AlertNoisePlayerSystem. The RecordedSpeechPlayerSystem allows an operator to record a piece of audio or select a prerecorded piece of audio and then play it. The AlertNoisePlayerSystem allows an operator to select the type of incident on campus and then play an alert sound corresponding to that incident. 11

16 Monitor Surveillance Class Diagram Figure Monitor Surveillance Class Diagram The Class Diagram in Figure shows the association between the SurveillanceMonitor and the DatabaseWrapper, as well as the SurveillanceMonitor and its subclasses, SurveillanceController and SurveillanceViewer. Each of these subclasses inherit the methods from their parent, as well as use the DatabaseWrapper (which uses ADO.NET) to connect to the surveillance database. 12

17 Automated Surveillance Class Diagram Figure Automated Surveillance Class Diagram The Class Diagram in Figure shows all the constituent parts of the automated surveillance system (its subsystems), as well as the system s association with the DatabaseWrapper (which uses ADO.NET). The wrapper is used to record results from the subsystems into the database. 13

18 Support Classes Class Diagram Figure Support Classes Class Diagram The Class Diagram in Figure shows the association between various support classes and their association with three of the subsystems of the automated surveillance system. The support classes define elements identified by the automated surveillance system. 14

19 Mobile Message Sender Class Diagram Figure Mobile Message Sender Class Diagram The Class Diagram in Figure describes how a mobile message is sent to users of the alert system. TextMessage is used to specify the sender and recipient of the text message, which also includes a subject and message body. InputValidator validates the selections made by the user. DatabaseWrapper (which uses ADO.NET) makes it easy for the user to store text message settings. 15

20 Online Message Sender Class Diagram Figure Online Message Sender Class Diagram The Class Diagram in Figure describes how an online message is sent to users of the alert system. MessageType is used to specify the type of message a user wants to send along with a customized message. InputValidator validates the selections made by the user. DatabaseWrapper (which uses ADO.NET) makes it easy for the user to store mobile message settings. 16

21 3.2 Component Diagram Overall System Component Diagram Figure Overall System Component Diagram The Component Diagram in Figure gives an overall picture of the system components and their interfaces. The CommandCenterInterface is at the core of the system. It can be used to view and control surveillance as well as to raise situational awareness. The surveillance system depends on the SurveillanceDB (a SQL Server Database), which it uses to store surveillance data. 17

22 3.3 Deployment Diagram Surveillance System Deployment Diagram Figure Surveillance System Deployment Diagram The Deployment Diagram in Figure shows the locations of all aspects of the automated surveillance system. All surveillance devices, as well as the command center, are located on or around campus. The database resides at a secure location in Nova Scotia, at coordinates [information redacted]. 18

23 3.4 Statechart Diagrams Login Statechart Diagram Figure Login Statechart Diagram The Statechart Diagram in Figure describes a specific behavior showing different states within the Distress alert system. The initial state provides No Access to the operator until the proper credentials are entered. Once acceptable credentials are entered, an operator will receive Access to the system and may proceed with a Command. If the system is idle, an operator s current session may time out, unless the operator decides to logout beforehand. 19

24 Command Center Statechart Diagram Figure Command Center Statechart Diagram The Statechart Diagram in Figure describes a specific behavior showing different states within the Distress alert system; in this case, a general view of the system. The initial state provides an operator with a Login prompt. Once logged in, the system is unlocked to the operator, providing access to the Command center. From this point, the operator is presented with a set of Options, allowing for different commands to be assigned. 20

25 User Access Statechart Diagram Figure User Access Statechart Diagram The Statechart Diagram in Figure describes a specific behavior showing different states within the Distress alert system; in this case, a look at the level of access provided to specific users of the system. The initial state commences with Restricted Access to all users, unless the user using the system is one of the following: an Operator, Administrator, Message Dispatcher, and/or Security Provider. Depending on the user accessing the system, they are provided either Limited or Unlimited access to the Command Center. 21

26 Command Center Options Statechart Diagram Figure Command Center Options Statechart Diagram The Statechart Diagram in Figure describes a specific behavior showing different states within the Distress alert system; in this case, a broader look of the systems options. The initial state begins with the Command Center providing two types of options. Once an option is selected, Feedback is collected and reported back to the Command Center. 22

27 Raise Situational Awareness Statechart Diagram Figure Raise Situational Awareness Statechart Diagram The Statechart Diagram in Figure describes a specific behavior showing different states within the Distress alert system; in this case, showing the intricacies of Raise Situational Awareness. The initial state begins with the Command Center, where an operator selects to Raise Situational Awareness. Upon selection, the operator is presented with three options: Visual Situational Awareness, Audible Situational Awareness, and Electronic Message. The operator can select one, two, or all three of these options. Once all viable options are selected, their actions are sent, thus finishing the selection process, and returning the operator back to the initial state of the Command Center. 23

28 3.5 Activity Diagrams Operator Surveillance Activity Diagram Figure Operator Surveillance Activity Diagram 24

29 The Activity Diagram in Figure shows what happens when the operator logs in to either view or control certain devices of the surveillance monitor. The operator can either view or control the surveillance system, and each of these accesses is recorded to the database. 25

30 Constituent Report Activity Diagram Figure Constituent Report Activity Diagram The Activity Diagram in Figure shows the various ways that a campus constituent can report an incident that he or she sees. This can be done online, over the phone, or via a text message. 26

31 Operator Automated Alert Activity Diagram Figure Operator Automated Alert Activity Diagram 27

32 The Activity Diagram in Figure shows what happens when the operator is issued an alert by the automated surveillance system. The alert can either be ignored and cleared as a false positive, or acted upon. In the latter case, the appropriate parties are notified. 28

33 Operator Manual Report Activity Diagram Figure Operator Manual Report Activity Diagram 29

34 The Activity Diagram in Figure shows what happens when the operator receives a report from the manual surveillance system. The report can either be ignored and cleared as a false positive, or acted upon. In the latter case, the appropriate parties are notified. 30

35 Operator Issue Alert Activity Diagram Figure Operator Issue Alert Activity Diagram The Activity Diagram in Figure elaborates on what happens when an operator issues an alert. Aside from notifying first responders and police, the campus administrators are notified. If the threat is immediate, the warning sirens are activated. If it is a future threat, then , text, and online reports are made available. 31

36 3.6 Sequence Diagrams Control Surveillance Sequence Diagram Figure Control Surveillance Sequence Diagram The Sequence Diagram in Figure shows the time-based sequence of events that go on in our system when an Operator tries to control the surveillance system. The Operator first logs in into the CommandCenter. Then, upon accessing the Control Surveillance page, the system retrieves the surveillance settings from the SurveillanceViewer. The Operator then can change any of the existing surveillance settings from his or her control panel. When the Operator goes to save the changes, the system sends the changes to the SurveillanceController, which saves them in the database. The result of the change is sent back to the Operator. 32

37 Monitor Surveillance Sequence Diagram Figure Monitor Surveillance Sequence Diagram The Sequence Diagram in Figure shows the time-based sequence of events that go on in our system when an Operator tries to monitor the surveillance. The Operator first logs in into the CommandCenter. Then, upon accessing the Monitor Surveillance page, the system retrieves the surveillance data from the SurveillanceViewer and relays it back to the Operator. The Operator can make additional requests for surveillance data as necessary. 33

38 Audible Situational Awareness Sequence Diagram Figure Audible Situational Awareness Sequence Diagram The Sequence Diagram in Figure shows the time-based sequence of events that go on in our system when an Operator tries to raise audible situational awareness. The Operator first has the option of using the AudioRecorder to record an audio message. Next, the Operator selects the audio file to play over the SpeakerSystem. The Operator then can play and stop the audio file as necessary to raise audible situational awareness. 34

39 Visual Situational Awareness Sequence Diagram Figure Visual Situational Awareness Sequence Diagram The Sequence Diagram in Figure shows the time-based sequence of events that go on in our system when an Operator tries to raise visual situational awareness. The Operator first selects the type of incident for the IndicatorLightSystem. Then the Operator can activate the indicator lights in the IndicatorLightSystem. After the lights are on, the Operator can change the indicator light color or pulsate frequency. When the incident subsides, the Operator can deactivate the indicator lights. 35

40 Automatic Surveillance Sequence Diagram Figure Automatic Surveillance Sequence Diagram The Sequence Diagram in Figure shows the time-based sequence of events that go on in our system when automatic surveillance is performed. The system starts by connecting to the database through the DatabaseWrapper (which uses ADO.NET). When the connection is authenticated, SurveillanceDevices can begin to send surveillance data to the AutomatedSurveillanceSystem. The AutomatedSurveillanceSystem then inserts the surveillance data into the database through the DatabaseWrapper. The DatabaseWrapper then sends the device s latest surveillance settings back to the AutomatedSurveillanceSystem. The AutomatedSurveillanceSystem then forwards the settings to the SurveillanceDevice. The SurveillanceDevice reads in the settings and then performs any appropriate actions, such as changing the viewing angle. 36

41 3.7 Collaboration Diagrams Report Incident Collaboration Diagram Figure Report Incident Collaboration Diagram The Collaboration Diagram in Figure shows how Report objects are sent through the ReportSystem to the ManualSurveillanceDB (a SQL Server Database). It also shows how an Operator can send a message to the ReportSystem to retrieve all of the manual surveillance reports that have been filed. 37

42 Raise Visual and Audible Situational Awareness Collaboration Diagram Figure Raise Visual and Audible Situational Awareness Collaboration Diagram The Collaboration Diagram in Figure shows how an Operator can raise visual and audible situational awareness. The Operator can send messages to either the IndicatorLightSystem or the NoisePlayer system. The IndicatorLightSystem can then forward the appropriate messages on to the IndicatorLights. Similarly, the NoisePlayerSystem can forward the appropriate messages on to the Speakers/Intercoms. 38

43 Surveillance Settings Collaboration Diagram Figure Surveillance Settings Collaboration Diagram The Collaboration Diagram in Figure shows the process by which a surveillance device interacts with the database. It saves all its information to the database, and receives new settings if they are available. The automated surveillance system acts as the mediator. 39

44 Operator Surveillance Collaboration Diagram Figure Operator Surveillance Collaboration Diagram The Collaboration Diagram in Figure shows how an operator controls the automated surveillance database. New settings are saved in the database, which are uploaded to the automated surveillance system. The system will in turn send its new results back to the operator through the database. 40

45 Send Electronic Message Collaboration Diagram Figure Send Electronic Message Collaboration Diagram The Collaboration Diagram in Figure shows the order of messages implemented within the Distress alert system. An Operator in this particular instance assesses a situation and selects an Electronic Message as a means of alerting system participants. The interaction between the objects consists of selecting an option in the command center, sending a message, and returning back to the command center; waiting for the next command from the Operator. 41

46 3.8 Package Diagrams Surveillance Package Diagram Figure Surveillance Package Diagram The Package Diagram in Figure shows how the surveillance system can be broken up into two generic packages: the manual surveillance system and the automated surveillance system. The diagram then describes the packages that make up both the automated surveillance system and the manual surveillance system. 42

47 Command Center Package Diagram Figure Command Center Package Diagram The Package Diagram in Figure shows the logical path an Operator may take when deciding how to perform in an emergency situation. Two of the major components will either collect data through Monitor Surveillance On-Demand and/or alert system participants. The parallel structure conveys the parallel roles of each package. 43

48 4. Concluding Remarks Our Architectural Model and Complete Design Specification successfully implement SINERGY in a way that you can trust. Supported by the.net Framework and a client-server architecture, our system is robust and easy to manage. Due to the service-oriented nature of our design, it is easy to integrate additional security systems into our solution. This means that you can always stay up to date on the newest security and surveillance technologies without having to buy a completely new system. We expect our Architectural Model and Complete Design Specification to be relevant for many years to come. If you have any questions or concerns, please contact our Sales Department. 44

49 References [1] [2] [3] 20Framework%20Overview.pdf [4] Tutorial.pdf [5] 0System%20Modeling.pdf [6] [7] [8] tbn0.google.com/images?q=tbn:and9gcsbbykp00ljculifl1pf84zmsdtwpu0zexu0umrlg-- QbylS-E9 [9] cctv-camera.jpg [10] 45

50 Appendix A: Meeting Minutes, Attendance, and Project Management Related Information Date Time Attendance Summary April 11 5:15 5:20pm John, Aleksi, Robert Decided when and where to meet April 17 9:30 12:00pm John, Aleksi, Robert Read over project requirements; worked on Architecture Design April 19 11:30 11:45 am John, Robert Showed Architecture Design to Dr. Chigani April 24 9:30 10:00 am John Setup document structure April 24 10:00 12:30 pm John, Aleksi, Robert Worked on Class Diagrams April 24 7:00 9:00 pm John Wrote Introduction; revised Architecture Design April :15 pm 1:00 am Aleksi Worked on Class Diagrams April 26 11:00 4:30 pm John, Aleksi, Robert Created remaining diagrams April 26 8:30 9:00 pm Aleksi Worked on remaining diagrams April 26 6:00 pm 4 am Robert Worked on remaining diagrams April :00 pm 2 am John Compiled diagrams into document and wrote descriptions for each diagram April 27 9:00 am 10:45 am John Compiled document April 27 2:00 pm 3:30 pm John Compiled document 46

51 Appendix B: Percentages of Contribution (with Signatures) John Kurlak: % Aleksi White: % Robert Pero: % 47

Design and Functional Specification

Design and Functional Specification 2010 Design and Functional Specification Corpus eready Solutions pvt. Ltd. 3/17/2010 1. Introduction 1.1 Purpose This document records functional specifications for Science Technology English Math (STEM)

More information

Social Media in the Process Automation Industry

Social Media in the Process Automation Industry Social Media in the Process Automation Industry Distributed Software Development Design Document Version 0.1 In co-operation with: Title: Social Media in the Process Automation Industry Product name: ABBConnect

More information

Client Requirement. Why SharePoint

Client Requirement. Why SharePoint Client Requirement Client wanted a sharepoint system that could meet their document and record management needs. It should also improve client s information management systems. To support existing and

More information

This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud.

This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud. Module 1: Overview of service and cloud technologies This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud. Key Components of

More information

MEALS2SHARE Neighborhood Home Cooked Food Sharing Web Application

MEALS2SHARE Neighborhood Home Cooked Food Sharing Web Application Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2015 MEALS2SHARE Neighborhood Home Cooked Food Sharing Web Application Isha Singh Grand Valley

More information

Microsoft SQL Server 2012 - Review

Microsoft SQL Server 2012 - Review Microsoft Cert Kit Catalogue 1 Microsoft Cert Kit Page 3 Windows Page 4 Server 2012 and 2008 Page 5 SQL Server 2012 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Cloud Messaging Communication SharePoint

More information

AppDev OnDemand Microsoft Development Learning Library

AppDev OnDemand Microsoft Development Learning Library AppDev OnDemand Microsoft Development Learning Library A full year of access to our Microsoft Develoment courses, plus future course releases included free! Whether you want to learn Visual Studio, SharePoint,

More information

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information.

Please contact Cyber and Technology Training at (410)777-1333/technologytraining@aacc.edu for registration and pricing information. Course Name Start Date End Date Start Time End Time Active Directory Services with Windows Server 8/31/2015 9/4/2015 9:00 AM 5:00 PM Active Directory Services with Windows Server 9/28/2015 10/2/2015 9:00

More information

Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT

Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT AGENDA 1. Introduction to Web Applications and ASP.net 1.1 History of Web Development 1.2 Basic ASP.net processing (ASP

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Architecture Design Version1.0. Architecture Design CUSTOMER RELATION MANAGEMENT SYSTEM Version 1.0

Architecture Design Version1.0. Architecture Design CUSTOMER RELATION MANAGEMENT SYSTEM Version 1.0 Architecture Design CUSTOMER RELATION MANAGEMENT SYSTEM Version 1.0 Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering CIS 895 MSE Project Kansas State

More information

Analytics Configuration Reference

Analytics Configuration Reference Sitecore Online Marketing Suite 1 Analytics Configuration Reference Rev: 2009-10-26 Sitecore Online Marketing Suite 1 Analytics Configuration Reference A Conceptual Overview for Developers and Administrators

More information

ResPAK Internet Module

ResPAK Internet Module ResPAK Internet Module This document provides an overview of the ResPAK Internet Module which consists of the RNI Web Services application and the optional ASP.NET Reservations web site. The RNI Application

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! ITDUMPS QUESTION & ANSWER Accurate study guides, High passing rate! IT dumps provides update free of charge in one year! HTTP://WWW.ITDUMPS.COM Exam : 70-549(C++) Title : PRO:Design & Develop Enterprise

More information

MOC 20487 DEVELOPING WINDOWS AZURE AND WEB SERVICES

MOC 20487 DEVELOPING WINDOWS AZURE AND WEB SERVICES ONE STEP AHEAD. MOC 20487 DEVELOPING WINDOWS AZURE AND WEB SERVICES Length: 5 Days Level: 300 Technology: Microsoft Visual Studio 2012 Delivery Method: Instructor-led (classroom) COURSE OUTLINE Module

More information

Online Vulnerability Scanner Quick Start Guide

Online Vulnerability Scanner Quick Start Guide Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

NetWrix File Server Change Reporter. Quick Start Guide

NetWrix File Server Change Reporter. Quick Start Guide NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Catálogo de cursos plataforma elearning Microsoft Imagine Academy: Microsoft SQL Server y Visual Studio

Catálogo de cursos plataforma elearning Microsoft Imagine Academy: Microsoft SQL Server y Visual Studio Catálogo de cursos plataforma elearning Microsoft Imagine Academy: Microsoft SQL Server y Visual Studio Academic Visual Studio Library Curso Nombre del curso Idioma 2263 Clinic 2263: Exam Preparation for

More information

Microsoft Training and Certification Guide. Current as of December 31, 2013

Microsoft Training and Certification Guide. Current as of December 31, 2013 Microsoft Training and Certification Guide Current as of December 31, 2013 Welcome to the Microsoft Training and Certification Guide. This device is intended to provide a quick, comprehensive view of our

More information

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012 Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

VisiCount Installation. Revised: 8/28/2012

VisiCount Installation. Revised: 8/28/2012 VisiCount Installation Revised: 8/28/2012 Introduction... 4 Requirements... 4 General... 4 Server Software... 4 Server Hardware... 4 Fulfilling Server Software Requirements... 5 Installation of Microsoft

More information

Chapter 6 Essentials of Design and the Design Activities

Chapter 6 Essentials of Design and the Design Activities Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports

More information

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...

More information

ASP.NET Using C# (VS2012)

ASP.NET Using C# (VS2012) ASP.NET Using C# (VS2012) This five-day course provides a comprehensive and practical hands-on introduction to developing applications using ASP.NET 4.5 and C#. It includes an introduction to ASP.NET MVC,

More information

http://msdn.microsoft.com/en-us/library/4w3ex9c2.aspx

http://msdn.microsoft.com/en-us/library/4w3ex9c2.aspx ASP.NET Overview.NET Framework 4 ASP.NET is a unified Web development model that includes the services necessary for you to build enterprise-class Web applications with a minimum of coding. ASP.NET is

More information

Deliverable: 2.1 VoteCal System Requirements Specification

Deliverable: 2.1 VoteCal System Requirements Specification Deliverable: 2.1 VoteCal System Requirements Specification VoteCal Statewide Voter Registration System Project State of California, Secretary of State (SOS) Work Product Acceptance Catalyst Consulting

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET

ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Mobile optimized user experience Simplified access to

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Page 1. Overview of System Architecture

Page 1. Overview of System Architecture Page 1 Contents Introduction to the HR.net Enterprise Framework 1 HR.net Enterprise Administrator Console 3 HR.net Enterprise Document Explorer 4 HR.net Enterprise Server Application 4 HR.net Enterprise

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

ORACLE ADF MOBILE DATA SHEET

ORACLE ADF MOBILE DATA SHEET ORACLE ADF MOBILE DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Java technology enables cross-platform business logic Mobile optimized

More information

This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications.

This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications. 20486B: Developing ASP.NET MVC 4 Web Applications Course Overview This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications. Course Introduction Course Introduction

More information

24-Hour Road Service Mobile Apps

24-Hour Road Service Mobile Apps 24-Hour Road Service Mobile Apps Project Plan Fall 2011 Michigan State University Computer Science and Engineering Capstone Team Members: Paul Fritschen Justin Hammack Lingyong Wang Contents 1. Auto-Owners

More information

Visual COBOL ASP.NET Shopping Cart Demonstration

Visual COBOL ASP.NET Shopping Cart Demonstration Visual COBOL ASP.NET Shopping Cart Demonstration Overview: The original application that was used as the model for this demonstration was the ASP.NET Commerce Starter Kit (CSVS) demo from Microsoft. The

More information

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service

More information

CATALOG OF CLASSES IT and Technical Courses

CATALOG OF CLASSES IT and Technical Courses CATALOG OF CLASSES IT and Technical Courses Table of Contents CATALOG OF CLASSES... 1 Microsoft... 1 10135BC... 1 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2...

More information

NetWrix SQL Server Change Reporter. Quick Start Guide

NetWrix SQL Server Change Reporter. Quick Start Guide NetWrix SQL Server Change Reporter Quick Start Guide NetWrix SQL Server Change Reporter Quick Start Guide Contents Introduction...3 Product Features...3 Licensing...4 How It Works...5 Getting Started...6

More information

Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Design of the Course

Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Design of the Course Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions 1 Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions

More information

Restaurant and Bar Order Managing System

Restaurant and Bar Order Managing System Restaurant and Bar Order Managing System By Andrey Chapovskiy Submitted to The Faculty of the Department of Information Technology In Partial Fulfillment of the Requirements for The Degree of Bachelor

More information

NetWrix SQL Server Change Reporter

NetWrix SQL Server Change Reporter NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Advanced Web Application Development using Microsoft ASP.NET

Advanced Web Application Development using Microsoft ASP.NET Course Outline Other Information MS2311 Days 3 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Advanced Web Application Development using Microsoft ASP.NET Course

More information

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2

More information

A Modular Approach to Teaching Mobile APPS Development

A Modular Approach to Teaching Mobile APPS Development 2014 Hawaii University International Conferences Science, Technology, Engineering, Math & Education June 16, 17, & 18 2014 Ala Moana Hotel, Honolulu, Hawaii A Modular Approach to Teaching Mobile APPS Development

More information

Software Architecture Document

Software Architecture Document COMPREHENSIVE WATERSHED MANAGEMENT WATER USE TRACKING PROJECT Southwest Florida Water Management District 2379 Broad Street Brooksville, FL 34604-6899 Date Revision Description Author Table of Contents

More information

Computer Science Course Descriptions Page 1

Computer Science Course Descriptions Page 1 CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,

More information

XTendTraders.com Trading room simulator

XTendTraders.com Trading room simulator 2011 2012 XTendTraders.com Trading room simulator BELGHITI ALAOUI Mohammed IMAFA BEN HAMOUDA Ahmed IMAFA EL FERACHI Anas AL EL HAJJI Khalil AL Polytech Nice Sophia Antipolis SI4 AL/IMAFA 2011 2012 1 CONTENTS

More information

Getting Started with the Ed-Fi ODS and Ed-Fi ODS API

Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Ed-Fi ODS and Ed-Fi ODS API Version 2.0 - Technical Preview October 2014 2014 Ed-Fi Alliance, LLC. All rights reserved. Ed-Fi is a registered trademark

More information

Java Application Developer Certificate Program Competencies

Java Application Developer Certificate Program Competencies Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle

More information

Automate Your BI Administration to Save Millions with Command Manager and System Manager

Automate Your BI Administration to Save Millions with Command Manager and System Manager Automate Your BI Administration to Save Millions with Command Manager and System Manager Presented by: Dennis Liao Sr. Sales Engineer Date: 27 th January, 2015 Session 2 This Session is Part of MicroStrategy

More information

HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011

HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011 HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...

More information

Quick Start Guide. Installation and Setup

Quick Start Guide. Installation and Setup Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology

More information

Dimension Technology Solutions Team 2

Dimension Technology Solutions Team 2 Dimension Technology Solutions Team 2 emesa Web Service Extension and iphone Interface 6 weeks, 3 phases, 2 products, 1 client, design, implement - Presentation Date: Thursday June 18 - Authors: Mark Barkmeier

More information

INTERNET PROGRAMMING AND DEVELOPMENT AEC LEA.BN Course Descriptions & Outcome Competency

INTERNET PROGRAMMING AND DEVELOPMENT AEC LEA.BN Course Descriptions & Outcome Competency INTERNET PROGRAMMING AND DEVELOPMENT AEC LEA.BN Course Descriptions & Outcome Competency 1. 420-PA3-AB Introduction to Computers, the Internet, and the Web This course is an introduction to the computer,

More information

Software Architecture for Paychex Out of Office Application

Software Architecture for Paychex Out of Office Application Software Architecture for Paychex Out of Office Application Version 2.3 Prepared by: Ian Dann Tom Eiffert Elysia Haight Rochester Institute of Technology Paychex March 10, 2013 Revision History Version

More information

General principles and architecture of Adlib and Adlib API. Petra Otten Manager Customer Support

General principles and architecture of Adlib and Adlib API. Petra Otten Manager Customer Support General principles and architecture of Adlib and Adlib API Petra Otten Manager Customer Support Adlib Database management program, mainly for libraries, museums and archives 1600 customers in app. 30 countries

More information

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd. Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

Building Integration System (BIS)

Building Integration System (BIS) Building Integration System (BIS) The Bosch Building Integration System (BIS) is an open PC-based system that applies the best elements of security system technology with the advantages of the latest information

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

Installing OneStop Reporting Products

Installing OneStop Reporting Products Installing OneStop Reporting Products Contents 1 Introduction 2 Product Overview 3 System Requirements 4 Deployment 5 Installation 6 Appendix 2010 OneStop Reporting http://www.onestopreporting.com support@onestopreporting.com

More information

Intranet Website Solution Based on Microsoft SharePoint Server Foundation 2010

Intranet Website Solution Based on Microsoft SharePoint Server Foundation 2010 December 14, 2012 Authors: Wilmer Entena 128809 Supervisor: Henrik Kronborg Pedersen VIA University College, Horsens Denmark ICT Engineering Department Table of Contents List of Figures and Tables... 3

More information

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Management Center. Installation and Upgrade Guide. Version 8 FR4

Management Center. Installation and Upgrade Guide. Version 8 FR4 Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced

More information

Net Developer Role Description Responsibilities Qualifications

Net Developer Role Description Responsibilities Qualifications Net Developer We are seeking a skilled ASP.NET/VB.NET developer with a background in building scalable, predictable, high-quality and high-performance web applications on the Microsoft technology stack.

More information

4D Deployment Options for Wide Area Networks

4D Deployment Options for Wide Area Networks 4D Deployment Options for Wide Area Networks By Jason T. Slack, Technical Support Engineer, 4D Inc. Technical Note 07-32 Abstract 4 th Dimension is a highly flexible tool for creating and deploying powerful

More information

Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014

Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014 Team Quicken Loans: Mobile RFID Inventory Tracking System Project Plan Spring Michigan State University Student Team Josh Rasor Jacob Riesser Keyur Patel Quicken Loans Professional Team Jim Brzuch Patrick

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Law College Computer and Technology Information

Law College Computer and Technology Information Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow

More information

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal e-gateway SOLUTION OVERVIEW In an effort to manage mission critical information better, perform their daily tasks more efficiently, share information to key stakeholders more effectively, and ensure that

More information

Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard. Airport Expertise. Holistic Approach to IT Solutions Automation Intelligence

Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard. Airport Expertise. Holistic Approach to IT Solutions Automation Intelligence Presentation: May 15 th 2013 Location: Saskatoon Speaker: Robert Picard Airport Expertise Holistic Approach to IT Solutions Automation Intelligence Agenda Automation Intelligence (AI) Concept Responding

More information

Unified Meeting 5 User guide for MAC

Unified Meeting 5 User guide for MAC Unified Meeting 5 User guide for MAC Unified Meeting 5 is a web based tool that puts you in complete control of all aspects of your meeting including scheduling, managing and securing your meetings.. Whether

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Web Design and Implementation for Online Registration at University of Diyala

Web Design and Implementation for Online Registration at University of Diyala International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 8 No. 1 Sep. 2014, pp. 261-270 2014 Innovative Space of Scientific Research Journals http://www.ijias.issr-journals.org/ Web

More information

Ad Hoc Transfer Plug-in for Outlook Installation Guide

Ad Hoc Transfer Plug-in for Outlook Installation Guide IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3

More information

Power Update - Documentation Power Update Manager

Power Update - Documentation Power Update Manager Power Update - Documentation Power Update Manager In the PU Manager screen you can create New Tasks, Delete and Edit settings for your current Tasks. Note: When making a lot of changes or installing updates,

More information

Engagement Analytics Configuration Reference Guide

Engagement Analytics Configuration Reference Guide Engagement Analytics Configuration Reference Guide Rev: 17 June 2013 Sitecore CMS & DMS 6.6 or later Engagement Analytics Configuration Reference Guide A conceptual overview for developers and administrators

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1 Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Testing Tools using Visual Studio Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Plan REQUIREMENTS BACKLOG Monitor + Learn Development Collaboration Production Develop + Test Release

More information

Getting started with your AppDev Microsoft Development Library

Getting started with your AppDev Microsoft Development Library Getting started with your AppDev Microsoft Development Library Learning Roadmaps AppDev s comprehensive Microsoft Development learning library allows you or your team to have access to in-depth courses

More information