How To Build A Vodka System On A Microsoft Vodkasa.Org (A Microsoft Microsoft) System On Microsoft.Org On A Linux Computer (Ahemos) On A Macbook 2.5 (

Size: px
Start display at page:

Download "How To Build A Vodka System On A Microsoft Vodkasa.Org (A Microsoft Microsoft) System On Microsoft.Org On A Linux Computer (Ahemos) On A Macbook 2.5 ("

Transcription

1 Software Design Description for VODKA Version 1.0 Approved April 18, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University

2 Revision History Name Date Reason for Changes Version Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi 17 Jan 2007 Initial Version 1.0 i

3 Contents 1 Introduction Purpose Scope Definitions, Acronyms, and Abbreviations Context Diagram Architecture Overview Three-Tier Architecture Oriented Architecture Survey of Technologies Used Data Layer Business Layer Presentation Layer Presentation Layer Components Financial Account Servlet Login Servlet Notification Servlet Report Servlet Search Servlet Summary Servlet Servlet History Servlet User Account Servlet View Account Servlet Business Layer Components Attach File Login Logout Report Revert Session Trend Data Layer Components Financial Account Notification User Account External Components Authentication Login Data Source SMS Design Features Login External Authentication User Account Creation User Account Modification User Account Deactivation Financial Account Creation Financial Account Modification ii

4 3.8 Financial Account Deactivation Temporary Deactivation of Financial Account Creation Modification Deactivation Revert Recover Deactivated Comment on Create Label View Account Summary View Financial s Sort Financial s Search s Generate Report Configure Account Balance Trigger Lost User Name Lost Password Lost Password Database Design Account Label Notification Permission History User Summary Advantages of Design Disadvantages of Design Design Rationale A Requirements Traceability Matrix 63 A.1 Traceability by Requirement Numbers A.2 Traceability by Design Component iii

5 1 Introduction 1.1 Purpose This document specifies the entire software architecture and design for the VODKA financial management system. These design decisions directly relate to the functionalities, performances, constraints, attributes, and interfaces of the system. VODKA is a tool to manage the financial accounts of student organizations within a schoool or university. There are two primary goals of the VODKAsystem. The first goal is to allow students to manage the financial accounts of their student organizations in a simple and reliable manner. And the second goal is to provide a centralized tool by which the parent school may audit the student organizations. In order to provide these two goals, the system focuses on simplicity, flexibility, security, accessibility, and scalability. For further detail, refer to the VODKA Software Requirements Specification [1]. 1.2 Scope This document describes the software architecture and design for the initial release of VODKA, version 1.0. The intended audience of this document exclusively includes the designers, the developers, and the testers of the VODKA software system. 1.3 Definitions, Acronyms, and Abbreviations AJAX A new emerging standard for web applications for dynamic content. AJAX communicates with a server to dynamically update only the necessary portions of a web page; this allows results to appear almost instantly and additionally cuts down on network traffic. Most frameworks for web application development use AJAX and are written in a higher level language such as Java or ASP.NET to avoid browser compatibility problems with handwriting Javascript. Audit An audit is an assessment of the accuracy by which a student organization s financial statements are presented. Check Request A check request is a request for the parent school or university to issue a check for a specified amount to a specified recipient. Communications Protocol A communications protocol defines the rules for sending data in a network. Each protocol may include information such as data representation, error detection, authentication and other information. Deactivation Deactivation of a user account in the VODKA system may mean one of two scenarios. Deactivation includes deletion and disabling of user accounts. Deleting of a user account is only possible if there is no prior history associated with the account. In the case of a user account having prior history, only disabling is possible. Finance Manager The Finance Manager is a user whose user account has priveleges to create, to edit, to delete, and to view all comments, financial accounts, transactions, and user accounts of every organization within the VODKAsystem. Financial Account Each financial account is an independent collection of transactions and their histories. A financial account is uniquely identified with an associated account number. HyperText Markup Language (HTML) The HyperText Markup Language is the predominant language used for the creation of web pages. HyperText Transfer Protocol (HTTP) The HyperText Transfer Protocol is the de facto standard protocol communications protocol for World Wide Web applications. Internet The Internet is a publicly accessible network of interconnected computer networks. 1

6 Internet Protocol (IP) The Internet Protocol is the standard communications protocol to distinguish computers connected over a network and to send data across the Internet. Network A computer network is the interconnection of multiple computers using a telecommunications system, which allows for the communication and sharing of resources. Non-Volatile Storage Non-volatile storage is the type of computer memory does not lose its stored information when powered off. Organization Advisor An Organization Advisor is a special user account provided for each organization with the privileges to create, to edit, to delete, and to view all comments, transactions, and user accounts of the particular organization to which the advisor belongs. Each organization must have at least, but not limited to, one advisor account. Privilege The VODKAsoftware system limits user accounts from performing certain actions; whether a user account can or cannot perform these actions is called the user s privileges. Priveleges are to create, edit, delete, and view; each action the user can take upon the system must be classified as one of these categories. User privileges are specific to different parts of the software system. -Oriented Architecture (SOA) A software architecture that uses software services as its main components. Simple Mail Transfer Protocol (SMTP) The Simple Mail Transfer Protocol is the de facto standard communications protocol for transmission over a network. Student Organization Officer Training (SOOT) At Drexel University, officers of student organizations must attend annual training sessions, called Student Organization Officer Training, that explain the policies and procedures involved in running student organizations. These policies and procedures include those regarding the management of financial accounts owned by the student organizations. System Administrator The system administrator is a special user whose user account has all the possible privileges available to any other user account as well as direct access to the underlying VODKAsoftware processes and server(s). This person(s) should be the one(s) permitted to access the physical machines running the VODKAsoftware system. The role of the system administrator is to perform system maintenance and configuration. A transaction is any entry into a financial account that documents financial accounting practives (e.g. recording a bank account deposit or pending check request). Transmission Control Protocol (TCP) The Transmission Control Protocol is a very commonly used communications protocol that guarantees transmission integrity over a network. Transport Layer Security (TLS) The Transport Layer Security is a set of communication encryption protocols that guarantee privacy and data integrity over a network. User A user is a person who interacts with the VODKAsoftware system. User Account A user account is an independent collection of user information that the VODKAsoftware system uses to recognize individual users. Each user account is uniquely identified by a user name and allows the software to track individual user privileges. Volatile Storage Volatile storage is a type of computer memory that requires power to retain the stored information. When volatile storage is powered off, all the stored information is lost. Web Browser A web browser is a software that allows users to view and interact with graphical and textual web sites on the World Wide Web. World Wide Web (WWW) The World Wide Web is network of interconnected documents on the Internet. 2

7 1.4 Context Diagram The context diagram shown in figure 1.4 shows how the main components of the VODKA system fits into context with its external components. Each external component is distinguished by a shaded box. Web Browser VODKA Web Server External Application External Authentication System SMS System VODKA Database Figure 1: Context Diagram VODKA s business layer interacts directly with the external authentication system, system, and SMS system. External application can be built that use the services provided by the VODKA business layer. 3

8 2 Architecture User Presentation Layer Login Servlet Trans History Servlet Summary Servlet Report Servlet User Acct Servlet Search Servlet Fin Acct Servlet Notification Servlet View Acct Servlet Servlet Business Layer Revert Attach File Trend Report Logout Login Session Authentication Login Data Source Data Layer Fin Acct User Acct Database Triggers Notification DB DB SMS Figure 2: Architecture Diagram 2.1 Overview The general architecture of VODKA is a combination of the three-tiered and service-oriented architectures. This hybrid style allows for clear separation of concerns and creates loosly-coupled, reusable components. The architectural model showing the tiered separation and components of the system is in figure 2. s are divided among the tiers to reduce dependencies and increase modularity in the design. 2.2 Three-Tier Architecture Many traditional web-based enterprise software systems have used the three-tier architecture since the 1990s. This client/server architecture model promotes the separation of responsibilities into three distinct layers. Each layer of the system depends only on the layer directly below it; layers may not depend on layers above them. The tiers, as shown in figure 2, are the presentation layer, business layer, and data layer. Components in the presentation layer handle interacting with the user, validating input data, and localization of data to display. Business layer components provide business logic and processing of data. Data layer components provide access to the database. 4

9 Benefits of using this architectural style include increased performance, flexibility, maintainability, reusability, and scalability [2]. Since the software is expected to be deployed for use by hundred of student organizations, scalability is an important consideration Oriented Architecture s in service-oriented architecture allow for loose-coupling in software design. This promotes reusability and flexibility to replace service components with new ones without impact on clients. Using service-oriented architecture also allows external applications to use services provided by the VODKA system. -oriented architecture aids VODKA s flexibility for integration with other external components, such as external authenitcation systems. 2.4 Survey of Technologies Used Data Layer The data layer of the VODKA financial system has to fullfill various non-functional besides the obvious functional ones. These non-functional requirements include Robustness ANSI-SQL compatibility Scalable Cost Taking these non-functional requirements in mind we surveyed the following databases Oracle 8i MySQL PostgreSQL 8.2 In each relational database system we looked for robustness of the architecture, and scalability. But what we valued most for this system was something that was cheap to setup and use, and standards compliant. Keeping these factors in mind the choice was made to go with PostgreSQL 8.2 which features unmatched standards compliance, cost effectiveness. MySQL had similar attributes, it lacked in standards compliance, and Oracle lost out in cost of setup and maintaining the system Business Layer The business layer runs Sun Microsystem s GlassFish v1 web server using Java EE 5.0 and Java SE 6.0 as the primary environment and programming language. The choice for programming language was decided based on Java s success in commercial enterprise systems. Alternative langauges considered were Ruby, PHP, C#, and ASP. Ruby on Rails was not chosen due to lack of knowledge among the team members, and the lack of large scale commercial products using it. PHP was not chosen over Java since the Java environment allows for better modularity and easier code maintainence. C# using ASP.NET was not chosen because of it requires using Microsoft IIS and Microsoft Windows. The Java environment has an advantage here because most Java-enabled web servers are freely available and can be run on freely available operating systems. ASP was not chosen because it is a legacy framework, which Microsoft is phasing out. Overall, the Java language and framework is one in which there exists a sufficient knowledge base without our team members, and it can be deployed onto many different environments (web servers and operating systems). For the development purposes, GlassFish is chosen to be the web server since it is the refernce implementation for Java EE 5.0. Other web servers considered were Apache Tomcat and JBoss. The current stable versions of both JBoss and Apache Tomcat do not fully support Java EE 5.0; Apache Tomcat has a 5

10 beta version that supports it but the beta version may contain undocumented bugs. Therefore, GlassFish was chosen but the system is designed such that different web servers may be substituted upon deployment. GlassFish supports both Java EE 5.0 and WS-* standards [4, 3] for ease of development. Java EE 5.0 was chosen because of its simplified implementation of web services over Java2 EE 1.4 and its support for the Java SE 6.0 programming language. The WS-* set of standards were chosen for its enhanced security and interoperability over prior web service standards Presentation Layer The presentation layer of VODKA must fulfill several system requirements. VODKA was envisioned as a thin client that is accessible by potentially any computer that can communicate with the server. Users must be able to quickly and securely access pertinent data with very short load times. Additionally, changes to the system can be easily made without forcing users to upgrade; simply refreshing the browser will update the client system for the clients. There are many ways the presentation layer can be implemented. Traditionally static webpages were generated by an application on the server. Communication between the client and the server was performed through HTML POST operations which relay response data to the serving application. Though this approach is certainly feasible and straightforward to implement it does not feel natural because it does not allow for dynamic content. That is, a new page must be reloaded after each operation; a dynamic client would seemingly respond instantaneously to the user as only the necessary portions of the client are updated. Static webpages, however, are very generic and thus almost every web browser should interpret the pages correct. 1.3 based webpages are much simpler and cleaner from coding and interactivity standpoints. Additionally, many frameworks exist to allow for AJAX pages to be easily generated. Of these frameworks, a few Java based frameworks seemed useful. The Google Web Toolkit (GWT) is one of the more successful and better known web toolkits. The toolkit provides not only a dynamic user interface but also ways to easily manage history, cookies, and remote procedure calls. The code is written in a subset of Java 1.4 and is translated to Javascript using the GWT Compiler. The GWT Compiler handles differences in Javascript implementations, allowing the code to run on different web browsers. GWT is designed in Java using a layout style similar to Java Swing. Additionally, it provides JUnit integration and Java debugging. However, one of the problems with GWT is that it does not rely on lazy loading because it sends the entire system to the user on the initial load. An alternative to GWT is Potix Corporation s ZK framework released under the GNU Public License. ZK is designed with a clear separation between the presentation layer and the business layer. ZK relies on an XML based renderer to generate dynamic webpages to the user from descriptions of the user interface. Though ZK does not have as much corporate support as GWT, it s clear separation of concerns between the model, view, and control components of the MVC paradigm is very clean. Because of its focus on separation of logics, VODKA uses Potix Corporation s the ZK Framework to assist in presenting information to the user. 2.5 Presentation Layer Components Financial Account Servlet Requirements Satisfied: 0580, 0590, 0600, 0605, 0610, 0615, 0620, 0630, 0640, 0650, 0655, 0660, 0660, 0665, 0670, 0680, 0690, 0700, 0710, 0715, 0720, 0730, 0740, 0750, 0760, 0770, 0780, 0790, 0800, 0810, 0820, 0830, 0840, 0850, 0860, 0870, 0880, 0890, 0895, 0900, 0905 The Financial Account Servlet manages the movement of data to and from the client software module. This includes checking for valid input and output Login Servlet Requirements Satisfied: 0470, 0480, 0490, 0500, 0510, 1390, 1400, 1410, 1420, 1430, 1440, 1450 The Login Servlet is responsible for providing and validating the authentication of user accounts in a robust manner. This includes checking for correct authentication formatting and passing the web browser to the welcome page. 6

11 2.5.3 Notification Servlet Requirements Satisfied: 1220, 1230, 1240, 1245, 1250, 1260, 1270 The Notification Servlet provides an interface for the user client to configure notifications for their Financial Accounts. This servlet is responsible to validate input and output to the client Report Servlet Requirements Satisfied: 1170, 1180, 1190, 1200, 1210 The Report servlet is responsible for marrying the user client with the Reports. It passes the messages and data between the two to provide VODKAgenerated reports for the user Search Servlet Requirements Satisfied: 1150 The search servlet is responsible for messages and data sent between the user client and the Financial Accounts. The servlet checks the format of the data Summary Servlet Requirements Satisfied: 1160 The Summary Servlet is responsible for gathering and formatting the data for the summary page for the user client Servlet Requirements Satisfied: 0910, 0920, 0930, 0935, 0940, 0950, 0960, 0965, 0970, 0975, 0980, 0985, 0990, 0995, 1000, 1005, 1010, 1020, 1025, 1030, 1040, 1050, 1060, 1070, 1080, 1090, 1100, 1110, 1120, 1130, 1140, 1150 The Servlet is responsible for providing the interface for the user client to view, sort, and modify transactions. It interfaces with the Financial Account and the User Account History Servlet Requirements Satisfied: 1090, 1100, 1110 The History Servlet is responsible for handling the messages and actions to view transaction history. It interfaces with the Financial Account User Account Servlet Requirements Satisfied: 0180, 0190, 0200, 0205, 0210, 0215, 0220, 0230, 0240, 0250, 0260, 0270, 0280, 0290, 0300, 0310, 0320, 0330, 0340, 0350, 0360, 0370, 0380, 0390, 0395, 0400, 0420, 0430, 0440, 0450, 0455, 0460, 0530, 0540, 0550, 0560, 0570 The User Account Servlet passes messages between the user client and other servlets to the User Account. It is responsible for checking for valid requests and responses View Account Servlet Requirements Satisfied: 0910, 0920, 0930, 0935, 0940, 0950, 0960, 0965, 0970, 0975, 0980, 0985, 0990, 0995, 1000, 1005, 1010, 1020, 1025, 1030, 1040, 1050, 1060, 1070, 1080, 1090, 1100, 1110, 1120, 1130, 1140, 1150 The View Account Servlet is responsible for sending and retrieving data between the user client and the Financial Account. It also validates the data and format of messages. 7

12 2.6 Business Layer Components Attach File Requirements Satisfied: 1060 The Attach File provides a method for attaching files to transactions. This service interactes with the to attach the files if the user s session is active and has the correct permissions to modify the transaction Login Requirements Satisfied: 0470, 0480, 0490, 0500, 0510, 1280, 1290, 1300, 1310, 1320, 1330, 1340, 1350, 1390, 1400, 1410, 1420, 1430, 1440, 1450 The Login provides all the methods and actions for the VODKAsystem to validate a user in the VODKAsystem. This service interacts with the User Account and External Authentication. It provides the following actions: security warnings to administrators via , authenticating user password, and validating user as a VODKAuser Logout Requirements Satisfied: 1450 The Logout provides VODKAwith the methods and actions to initiate the process of user account logout. It interfaces specifically with the Session Report Requirements Satisfied: 1170, 1180, 1190, 1200, 1210 The Report is used to generated financial reports and graphs for the specified Financial Account. The Report generates report information on transactions in an easy to read format. Additionally, it generates graphs that represent current transactions and formats data from the Trend into a graph Revert Requirements Satisfied: 1110 The Revert provides the software interface for the VODKAsystem to modify transactions to a state in the transaction history. It also deactivated transactions to be re-activated Session Requirements Satisfied: 1390, 1400, 1410, 1420, 1430, 1440, 1450 The Session handles the active sessions for the system. It tracks the users currently on the system and stores permissions and other persistent data for each user. It also handles the creation and deletion of sessions, which can only be performed by the Login and Logout s. It also automatically logs out inactive users Trend Requirements Satisfied: 1200, 1210 The Trend is used to predict trends for a specific Financial Account. The service analyzes previous transactions, and based on this, generates a prediction of trends for upcoming time periods. 2.7 Data Layer Components Financial Account Requirements Satisfied: 0580, 0590, 0600, 0605, 0610, 0615, 0620, 0630, 0640, 0650, 0655, 0660, 0660, 0665, 0670, 0680, 0690, 0700, 0710, 0715, 0720, 0730, 0740, 0750, 0760, 0770, 0780, 0790, 0800, 0810, 0820, 0830, 0840, 0850, 0860, 0870, 0880, 0890, 0895, 0900,

13 The Financial Account handles all actions related to financial accounts in the VODKAsystem. This includes creation, modification and deactivation of financial accounts. It also provides information related to a financial account such as account balance, and related transactions of a financial account Notification Requirements Satisfied: 1220, 1230, 1240, 1245, 1250, 1260, 1270 The Notification handles all the notifications that are sent to the users of the VODKAsystem. It is also used to save database triggers which can be set by users. The can also be configured to notify users of account activity like posting of new transactions, posting of new comments to transactions, etc Requirements Satisfied: 0910, 0920, 0930, 0935, 0940, 0950, 0960, 0965, 0970, 0975, 0980, 0985, 0990, 0995, 1000, 1005, 1010, 1020, 1025, 1030, 1040, 1050, 1060, 1070, 1080, 1090, 1100, 1110, 1120, 1130, 1140, 1150 The service is responsible for querying the database to retreive all transactions related to a specific financial account. It is also responsible for creation, modification and deletion of transactions. It also handles labelling transactions and posting comments to transactions. The is also called when information on a particular transaction is required User Account Requirements Satisfied: 0180, 0190, 0200, 0205, 0210, 0215, 0220, 0230, 0240, 0250, 0260, 0270, 0280, 0290, 0300, 0310, 0320, 0330, 0340, 0350, 0360, 0370, 0380, 0390, 0395, 0400, 0420, 0430, 0440, 0450, 0455, 0460, 0470, 0480, 0490, 0500, 0510, 0520, 0530, 0540, 0550, 0560, 0570 The User Account handles all the actions related to user accounts in the VODKAsystem. It is resposible for creation, modification, and deactivation of user accounts. It interacts directly with the database to provide data to all servlets that request it. 2.8 External Components Authentication Requirements Satisfied: 0140, 0150, 0160, 0170 The Authentication provides a method of authenticating users with an external system. This service interacts with the Login Data Source to accept or reject usernames and passwords Requirements Satisfied: 0100, 0110, 0120, 0130, 1230, 1380 The provides methods for sending messages to a user if certain events are triggered. Events can include, for example, funds in an account falling below a specific threshold Login Data Source Requirements Satisfied: 0140, 0150, 0160, 0170 The Login Data Source is an external system for user authentication. Some more common examples of authentication sources are databases or LDAP or PAM based systems SMS Requirements Satisfied: 1230 The SMS provides methods for sending text messages to a user if certain events are triggered. Events can include, for example, funds in an account falling below a specific threshold. 9

14 3 Design Features 3.1 Login The Login feature allows a user to login providing a valid username and password combination. It also prevents deactivated users from logging in to the system. User Presentation Layer Login Servlet Business Layer Login Session Authentication Login Data Source Data Layer User Acct DB DB Figure 3: Login - Vertical Slice The Login process first takes the username entered by the user and checks to make sure it is a valid username. If it is, the username and password combination is passed over to the Authenticate. On successful authentication, the Login gets the user privilege type from the User Account. It then proceeds to create a new unique session for the user using the Session. 10

15 alt alt User Web Browser <<servlet>> Login Login UserAcct Authenticate Login Data Source Session click login button login(user, password) login(user, password) check valid user name [invalid user name] deny login render page deny login [else] login(user, password) get login info authenticate [authentication failed] deny login deny login render page deny login [else] approve login get user privileges create-session(user, priveleges) approve login redirect to welcome page Figure 4: Login - Sequence Diagram 11

16 3.2 External Authentication The External Authentication Feature autheticates a VODKAuser with an external database. This is used when the default VODKAauthetication system is not used and all users are verified using an external authentication system. Authentication Login Data Source DB Figure 5: External Authentication - Vertical Slice The login service encrypts the user s username and password information and transfers it to the external authentication system. The external authentication system uses its own verification service to autheticate the user against its own database. The result is then passed back to the VODKALogin and the user is informed of success or failure. 12

17 Client Authenticate Login Data Source Database login(user, password) encrypt password get user record get user record compare user, password login result Figure 6: External Authentication - Sequence Diagram 13

18 3.3 User Account Creation The User Account Creation feature allows for the creation of a new User Account. A new User Account may only be created by users with specific privileges. Creating a new user account requires the following information: Username Password Name Address User Account Type Accessible Financial Accounts Financial Account Privileges User Presentation Layer User Acct Servlet Business Layer Session Data Layer User Acct DB Figure 7: User Account Creation - Vertical Slice The Create User Account GUI extracts all the information entered for creating a new user account and sends it to the User Account Servlet. The Servlet checks the data for consistency and checks the user account for the required privileges. The data is then passed over to the User Account which interacts with the database to create the new user account. 14

19 User eb Browser <<servlet>> UserAcct Session UserAcct load get session check permissions [invalid session or privileges] redirect to login page alt [else] render page enter account info click confirm button create account get session check permissions [invalid session or privileges] redirect to login page [else] create account ref alt external create user account redirect to welcome page Figure 8: User Account Creation - Sequence Diagram 15

20 3.4 User Account Modification The system allows the modification of any attribute of a user account. A user can change the user account attributes for his own user account. A Finance Manager and Organization Advisor can also change the user account of the users in the financial accounts User Presentation Layer User Acct Servlet Business Layer Session Data Layer User Acct DB Figure 9: Modify User Account - Vertical Slice A user of the system can modify only his own user account settings like name, etc. On the Preferences page when the user submits his new information for his user account, the web browser sends the request to modify the user account information to the UserAcct Servlet. The UserAcct Servlet checks to see the if the client making the request has a valid session id and privileges. If that is the case, the UserAcct Servlet requests the UserAcct to modify the given user account s information in the database. The UserAcct modifies the transaction in the database an returns a status on if the modification was successful. Based on this the UserAcct Servlet updates the user s webpage if the modification was successful. 16

21 User Web Browser <<servlet>> UserAcct UserAcct Database modify user account modify user account ref check user permissions & session id modify user account modify user account successstatus [successful?] show operation confirmation alt [else] show error message Figure 10: Modify User Account - Sequence Diagram 17

22 3.5 User Account Deactivation Users with Finance Manager & Organization Advisor privleges can deactivate a user account. Deactivation doesn t lead to complete deletion. This is so that the user accounts can be re-activated in the future. User Presentation Layer User Acct Servlet Business Layer Session Data Layer User Acct DB Figure 11: User Account Deactivation - Vertical Slice A Finance Manager or a Organization Advisor can select a user s account to deactivate. The web browser sends the request to deactivate to the UserAcct Servlet. The UserAcct Servlet first checks the session id and permissions of the client making the request for deactivation, to make sure if its valid. If so, the UserAcct checks the number of transactions created by the user account to be deactivated. If the number of transactions created by the user account to be deactivated is 0, the user accout is deleted. Otherwise, the UserAcct Servlet requests the UserAcct to deactivate the user account. The UserAcct notifies the UserAcct Servlet if the deactivation was successful or not. The UserAcct Servlet accordingly updates the user s web page to display if the deactivation was successful or not, and if the user account was deactivated or deleted. 18

23 User eb Browser <<servlet>> Login Database UserAcct Session Authenticate Data Source load get session check permissions [invalid session or privileges] redirect to login page alt [else] render page click delete delete account get session check permissions [invalid session or privileges] redirect to login page [else] delete account get transactions by user [no transactions] delete user alt delete user alt delete user disable user Figure 12: User Account Deactivation - Sequence Diagram 19

24 3.6 Financial Account Creation Financial Account Creation feature allows a user to create a new financial account. Only users with sufficient privileges in the VODKAsystem are allowed to use this feature. Each new financial account has a unique account number that defines it. Creating a new financial account asks a user to enter the following information: Account Number Account Name Comments/Description Associated Student Organization User Presentation Layer Fin Acct Servlet Business Layer Session Data Layer Fin Acct DB Figure 13: Financial Account Creation - Vertical Slice To create a new financial account, a user must have Finance Manager or System Administrator privileges. The Financial Account Creation GUI takes the required data to create a new financial account and transfers it to the Financial Account Servlet. The Servlet checks to confirm if the user has sufficient privileges. The Servlet checks the data for consistency and formatting and checks for Account Number and Account Name as they are mandatory fields. If everything is consistent and passes checks, the data is transfered to the Financial Account. The interacts with the Database and creates the new account. 20

25 Web FinAcct Session FinAcct Database load get session check permissions [invalid session or privileges] redirect to login page alt [else] render page enter account info click confirm button create account get session check permissions [invalid session or privileges] redirect to login page [else] create account alt create account redirect to welcome page Figure 14: Financial Account Creation - Sequence Diagram 21

26 3.7 Financial Account Modification The Financial Account Modification feature allows users to modify the properties related to an existing financial account. These include: Account Name Comments/Description Associated Student Organization The Account Number associated with an existing financial account is not modifiable. A user must have sufficient privileges to make any modifications to an existing financial account. User Presentation Layer Fin Acct Servlet Business Layer Session Data Layer Fin Acct DB Figure 15: Financial Account Modification - Vertical Slice To modify a financial account, a user must have Finance Manager or System Administrator privileges. While modifying a financial account the following properties cannot be left blank and are required to have a proper formatted value: Account Name The Modify Financial Account GUI extracts the modified data and transfers it to the Financial Account Servlet. The Servlet checks to make sure that the user has the required privileges. If the privileges meet the requirements, the data is checked for consistency and is passed on to the Financial Account. The interacts with the database and makes the modifications needed. 22

27 FinancialManager Web Browser <<servlet>> FinAcct FinAcct Database user request fin acct editing page user submits new data for fin acct submit new fin acct data ref check user permissions & session id change fin acct data change fin acct data success or failure [successfull?] show confirmation alt [else] show reason for no modification Figure 16: Financial Account Creation - Sequence Diagram 23

28 3.8 Financial Account Deactivation The Financial Account Deactivation feature allows a user with sufficient privileges to deactivate a financial account. Deactivation of a financial account includes the deletion and the disabling of a financial account. Deletion of a financial account is done when it has no history of usage associated with it. If an account has history associated with it, it is only disabled and never deleted. User Presentation Layer Fin Acct Servlet Business Layer Session Data Layer Fin Acct DB Figure 17: Financial Account Deactivation - Vertical Slice The Financial Account Deactivation GUI sends the user s request to deactivate an existing financial account to the Financial Account Servlet. The Financial Account Servlet makes sure the user permission requirements are met. It then requests a transaction history from the Financial Account for the requested financial account. If the returns a transaction history for the financial account then it is disabled by calling the Financial Account. On the other hand if there is no history returned, the financial account is deleted. 24

29 FinancialManager Web Browser <<servlet>> FinAcct FinAcct selects fin account name to be deactivated fin account to be deactivated check user permissions & session id alt ref get transaction for fin acct [no trasnactions] delete fin acct [else] disable show confimation message Figure 18: Financial Account Deactivation - Sequence Diagram 25

30 3.9 Temporary Deactivation of Financial Account The Temporary Deactivation of Financial Account feature is used to temporarily disable a financial account in the case of a violation of the university s policies. Only users with sufficient privileges are allowed to use this feature. User Presentation Layer View Acct Servlet Business Layer Session Data Layer Fin Acct DB Figure 19: Temporary Deactivation of Financial Account - Vertical Slice The Temporary Deactivation GUI sends the user s request to deactivate an existing financial account to the Financial Account Servlet. The Financial Account Servlet makes sure the user permission requirements are met. It then proceeds to call the Financial Account to disable the financial account. 26

31 FinancialManager Web Browser <<servlet>> FinAcct FinAcct selects fin account name to be deactivated fin account to be deactivated check user permissions & session id alt ref get transaction for fin acct [no trasnactions] delete fin acct [else] disable show confimation message Figure 20: Temporary Deactivation of Financial Account - Sequence Diagram 27

32 3.10 Creation The system allows the creation of new transaction. Any user with account modification privileges can create transactions. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 21: Create Financial s - Vertical Slice Any user with account modification privelges can create transactions. The user must enter all nonoptional attributes of a new transaction. After the user clicks the submission button on the page, the data entered is sent by the Web Browser to the Servlet. The Servlet checks the session id and if the user has account modification privileges. If it is so, the Servlet tells the to add the new transaction to the database. The adds the transaction to the database and returns a operation status. If the transaction creation is successful, the Servlet updates the web page tell the user the transaction was created and adds it to the list of transactions on the Account s Summary page. If the transaction creation is not successful, the user is given an error message explaining why the transaction creation was unsuccessful 28

33 Web Browser <<ser user enters transaction information on the page create new transaction ref check user permissions & session id create new transaction success or failure [successful?] show user confirmation alt [else] show user error message why Figure 22: Create Financial s - Sequence Diagram 29

34 3.11 Modification The system allows the modification of any attribute of a transaction. Only users with account modification privileges can modify transactions. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 23: Modify Financial s - Vertical Slice The user is presented with a list of all the transactions of a given account on the Account s Page. The user can click the modify button for a transaction to modify it. The browser then send the request to modify the transaction to the Servlet. The Servlet checks if the client making the request for details of the transaction has account modification privileges. The Servlet then forwards the request to the to modify the transaction. The modifyies the transaction in the database and returns a status on if the modification was successful. Based on this the Servlet updates the user s webpage if the modification was successful. 30

35 e <<servlet>> Database modify transaction modify transaction ref check user permissions & session id modify transaction modify transaction successstatus [successful?] show operation confirmation alt [else] show error message Figure 24: Modify Financial s - Sequence Diagram 31

36 3.12 Deactivation The system allows for the deactivation of a transaction. Any user with account modification privileges can deactivate a transaction. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 25: Deactivate Financial s - Vertical Slice The user is presented with a list of all the transactions of a given account on the Account s Page. The user can click the deactivate button for a transaction to deactivate it. The browser then send the request to deactivate the transaction to the Servlet. The Servlet checks if the client making the request for details of the transaction has account modification privileges. The Servlet then forwards the request to the to deactivate the transaction. The deactivates the transaction in the database and returns a status on if the deactivation was successful. Based on this the Servlet updates the user s webpage if the deactivation was successful. 32

37 User Web Browser <<servlet>> Database deactivate transaction deactivate transaction ref check user permissions & session id deactivate transaction deactivate transaction successstatus [successful?] show operation confirmation alt [else] show error message Figure 26: Deactivate Financial s - Sequence Diagram 33

38 3.13 Revert The system allows to revert a modified transaction to its previous form. Only users with account modification privileges can revert transactions. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 27: Revert Financial s - Vertical Slice The user is presented with a list of all the changes made to a transaction of a given account. The user can click the revert button on a specific history to become the current one. The browser then send the request to revert the transaction to the Servlet. The Servlet checks if the client making the request to revert the transaction has account modification privileges. The Servlet then forwards the request to the to revert the transaction. The reverts the transaction in the database and returns a status on the operation. Based on this the Servlet updates the user s webpage if the transaction was reverted. 34

39 User Web Browser <<servlet>> Database revert transaction revert transaction ref check user permissions & session id revert transaction revert transaction successstatus [successful?] show operation confirmation alt [else] show error message Figure 28: Revert Financial s - Sequence Diagram 35

40 3.14 Recover Deactivated The system allows to revert a deactivated transaction. Only users with account modification privileges can revert transactions. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 29: Revert Deactivated Financial s - Vertical Slice The user is presented with a list of all the deactivate transaction when the user requests it. The user can then ask for reverting a deactivated transaction The browser then sends the request to revert the deleted transaction to the Servlet. The Servlet checks if the client making the request to revert the deleted transaction has account modification privileges. The Servlet then forwards the request to the to revert the transaction. The reverts the transaction in the database and returns a status on the operation. Based on this the Servlet updates the user s webpage if the deleted transaction was reverted. 36

41 User Web Browser <<servlet>> Database revert deactivated transaction revert deactivated transaction ref check user permissions & session id revert deactivated transaction revert deactivated transaction successstatus [successful?] show operation confirmation alt [else] show error message Figure 30: Revert Deactivated Financial s - Sequence Diagram 37

42 3.15 Comment on The system allows the modification of any attribute of a transaction. Only users with account modification privileges can comment-on transactions. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 31: Comment On Financial s - Vertical Slice The user is presented with a list of all the transactions of a given account on the Account s Page. The user can edit a transaction to comment on it. The browser then sends the request to comment on the transaction to the Servlet. The Servlet checks if the client making the request for details of the transaction has account modification privileges. The Servlet then forwards the request to the to comment on the transaction. The comment on the transaction in the database and returns a status on if the modification was successful. Based on this the Servlet updates the user s webpage if the modification was successful. 38

43 User Web Browser <<servlet>> Database comment on transaction comment on transaction ref check user permissions & session id comment on transaction comment on transaction successstatus [successful?] show operation confirmation alt [else] show error message Figure 32: Comment On Financial s - Sequence Diagram 39

44 3.16 Create Label The Create Label feature allows a user to create labels for transactions which can be then used to categorize transactions. Each transaction can have multiple labels applied to it. User Presentation Layer Servlet Data Layer Business Layer DB Figure 33: Create a Label for s - Vertical Slice The user submits a label to be applied to a transaction which calls the Servlet. The transaction servlet checks for a valid session and then calls the transaction service to save the label to the related transaction. The user is notified of success or failure. 40

45 User Web Browser <<servlet>> user submits label for transactions save the label for transaction ref check user permissions & session id save the label for transaction success or failure [successful?] notify added alt [else] notify not added with reason Figure 34: Create a Label for s - Sequence Diagram 41

46 3.17 View Account Summary The View Account Summary feature is used to display a summary of all the financial accounts that a user account has access to. It allows the user to view all the balances associated with each financial account also. User Presentation Layer Summary Servlet Business Layer Session Data Layer Fin Acct DB Figure 35: View Account Summary - Vertical Slice On successful login, the Login calls the Summary Servlet as it needs to display all the financial accounts associated with the user account. The Summary Servlet passes the user account information to the User Account. The User Account interacts with the database and returns the list of financial accounts that the user has access to. This list of accounts is then passed to the Financial Account which retreives the Account Balance field related to each of them. This summary is then displayed as the main page on user login. 42

47 User Web Browser <<servlet>> Summary Session FinAcct load get session check permissions get accounts alltheaccounts show account summary page Figure 36: View Account Summary - Sequence Diagram 43

48 3.18 View Financial s The system allows the viewing of all the details of all transactions. Any user with sufficient viewing privileges can view all the details of a transaction. User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 37: View Financial s - Vertical Slice The user is presented with a list of all the transactions of a given account on the Account s Page. The list of transaction shows only the most relevant details of each transaction. The user can click a transaction to obtain all the details of the transaction. When the user clicks a transaction the web browser sends a request to the Servlet to get all the details of the given transaction. The Servlet checks if the client making the request for details of the transaction has viewing privileges and then returns the transaction s details. The Servlet gets the transaction details, and returns it to the Web Browser to display all the transaction details. 44

49 User Web Browser <<servlet>> Session click a transaction request transaction details get session check permissions & session id request details for transaction transaction details transaction details update page Figure 38: View Financial s - Sequence Diagram 45

50 3.19 Sort Financial s The system allows for sorting of transactions. Any user of the system with viewing privileges can search for transactions. The sorting of all the tranactions can be based on any of the attributes saved for a transaction (as described in the SRS). User Presentation Layer Servlet Business Layer Session Data Layer DB Figure 39: Sort Financial s - Vertical Slice The user is presented with a list of all the transactions of a given account on the Account s Page. The list of transaction shows only the most relevant details of each transaction. The user can click a column of the list of transactions as per which the list of transactions should be sorted. All the sorting is done client side by the page s programming in the Web Browser. 46

51 User Web Browser user clicks the column header by which to sort sort transactions Figure 40: Sort Financial s - Sequence Diagram 47

52 3.20 Search s The system allows for searching of transactions. Any user of the system with viewing privileges can search for transactions. The search can be based on any of the attributes saved for a transaction (as described in the SRS). User Presentation Layer Search Servlet Business Layer Session Data Layer DB Figure 41: Search s - Vertical Slice On the Account s Summary page, the user is provided with a text field to input search criteria for transactions. As the user enters the search criteria in the field, the transaction list is updated with only the relevant transactions. The Search Servlet is given the search criterion entered by the user. The search servlet checks the privileges of the user to make sure the search request is from a valid user with viewing permissions. It then contacts the to give a list of transactions matching the given search criterion. The searches the database for all transactions matching the search criterion, and returns it to the the Search Servlet. The Search Servlet returns the transactions to the Web Browser which displays it to the user. 48

53 User Web Browser <<servlet>> Search Session submits search criteria search term get session check permissions get transactions matching search criteria transactions matching search criteria subset of transactions show short listed transactions Figure 42: Search s - Sequence Diagram 49

54 3.21 Generate Report The Generate Report feature allows a user to generate reports based on a time period that can be selected from the Report Generation GUI. The report generation also includes creation of graphs as well as reports. User Presentation Layer Report Servlet Business Layer Report Trend Data Layer DB Figure 43: Generate Report - Vertical Slice The Report Generation GUI allows a user to select the time period for which the user needs reports generated. The Report Servlet makes sure the session is valid and then requests the Reports for a report generation for the specified time period. The Reports in turn calls the to return all the transactions for the given time period. The Trend is then called to generate the data and calculations needed to perform for the report generation. The Reports then generates the entire report and graphs based on template report format. 50

55 User Web Browser <<servlet>> Report Session Reports Trends asks for a report get reports page get session check permissions show reports page request report for a period generate report for period get session check permissions request report generation for period get transactions for period transactions for given period generate report for transactions generated report generated report show generated reports Figure 44: Generate Report - Sequence Diagram 51

56 3.22 Configure Account Balance Trigger The Configure Account Balance Trigger feature allows a user to create an automatic trigger in case of Account Balance dropping below a certain limit. The database triggers a notification to be sent to the user to inform him in case the account balance drops. User Web Browser <<servlet>> Notification Trigger Notification user submits notification trigger information notification trigger information ref check user permissions & session id save trigger information success or failure [successful?] show confirmation msg alt [else] show error msg dispatch trigger Figure 45: Configure Account Balance Trigger - Sequence Diagram The Configure Account Balance Trigger GUI allows a certain balance amount to be set below which a trigger will be activated. This information is saved by calling the Notification which interacts with the database and sets the specific trigger. In case of the account balance dropping below the specified limit the database triggers the Notification which informs the user. 52

57 3.23 Lost User Name The system allows for the recovery of lost username based on registered address. Any user requesting his username is ed his username on his registered . User Presentation Layer Login Servlet Business Layer Data Layer Login User Acct Authentication Login Data Source DB DB Figure 46: Lost Username - Vertical Slice The user is presented with a link on the login page to request his username if he forgets it. The user clicks the appropriate link and the system notifies the user that the is sent. The browser meanwhile requests the Login Servlet to send the for the given . The Login Servlet then requests the Login to the lost username on the registered for the given address. The Login access the user account information in the database, and s the username to the user s registered address. 53

58 User Web Browser <<servlet>> Login Login UserAcct Database user requests lost username request lost username ref check user permissions & session id request sending lost username request sending lost username get username for notification sent Figure 47: Lost Username - Sequence Diagram 54

59 3.24 Lost Password The system allows for the recovery of lost password based on registered address. Any user requesting his password is ed his password on his registered . User Presentation Layer Login Servlet Business Layer Data Layer Login User Acct Authentication Login Data Source DB DB Figure 48: Lost Password - Vertical Slice The user is presented with a link on the login page to request his password if he forgets it. The user clicks the appropriate link and the system notifies the user that the is sent. The browser meanwhile requests the Login Servlet to send the for the given . The Login Servlet then requests the Login to the lost password on the registered for the given address. The Login access the user account information in the database, and s the password to the user s registered address Lost Password 55

60 User Web Browser <<servlet>> Login Login UserAcct ExternalDatabase user requests lost password request lost password ref check user permissions & session id request sending lost password request sending lost password send password reset for username notification sent message displayed Figure 49: Lost Password - Sequence Diagram 56

61 4 Database Design Comment associated with has History associated with FileAttachments has has Notification for Account has Label has applies to User has Permission related to Login Figure 50: Entity Relation Diagram The Entity Relation Diagram is a model of all the data that is kept in the database to satisfy all Priority 1 requirements of the system. This includes keeping records of all user acounts, financial accounts, the privileges for each user account to a corresponding financial account. The system keeps track of all transactions and all versions of each transaction. It also keeps data on registered notifications. 4.1 Account CREATE TABLE account ( id SERIAL PRIMARY KEY, ); name TEXT NOT NULL, account_number INTEGER NOT NULL, organization_name TEXT NOT NULL, description TEXT, -- optional is_active BOOLEAN NOT NULL 57

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007 Software Requirements Specification for VODKA Version 1.1 Approved April 24, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University Revision History

More information

SYSTEM DEVELOPMENT AND IMPLEMENTATION

SYSTEM DEVELOPMENT AND IMPLEMENTATION CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

Bijlage1. Software Requirements Specification CIS. For. Version 1.0 final. Prepared by Saidou Diallo. HvA/Inaxion. November 2009

Bijlage1. Software Requirements Specification CIS. For. Version 1.0 final. Prepared by Saidou Diallo. HvA/Inaxion. November 2009 Bijlage1 Software Requirements Specification For CIS Version 1.0 final Prepared by Saidou Diallo HvA/Inaxion November 2009 Copyright 2009/2010 Inaxion BV. Table of Contents 1. Introduction...3 1.1 Purpose...

More information

Unified University Inventory System (UUIS) Software Requirements Specifications

Unified University Inventory System (UUIS) Software Requirements Specifications Unified University Inventory System (UUIS) Software Requirements Specifications Copyright COMP5541 Team III 2010 Authors Ahmed Daoudi David Zerkler Gay Hazan Isabelle Toutant Mariano Diaz René Toutant

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

WHITE PAPER. Domo Advanced Architecture

WHITE PAPER. Domo Advanced Architecture WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

1. Introduction 1.1 Methodology

1. Introduction 1.1 Methodology Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web

More information

Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led

Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5

More information

Web Cloud Architecture

Web Cloud Architecture Web Cloud Architecture Introduction to Software Architecture Jay Urbain, Ph.D. urbain@msoe.edu Credits: Ganesh Prasad, Rajat Taneja, Vikrant Todankar, How to Build Application Front-ends in a Service-Oriented

More information

Dimension Technology Solutions Team 2

Dimension Technology Solutions Team 2 Dimension Technology Solutions Team 2 emesa Web Service Extension and iphone Interface 6 weeks, 3 phases, 2 products, 1 client, design, implement - Presentation Date: Thursday June 18 - Authors: Mark Barkmeier

More information

State of New Jersey Shared IT Architecture

State of New Jersey Shared IT Architecture J2EE Deployment Policy State of New Jersey Shared IT Architecture J2EE Application Deployment Policy and Procedures July 2007 J2EE Deployment Policy Table of Contents Overview 3 Key Roles and Responsibilities.

More information

PROJECT MANAGEMENT SYSTEM

PROJECT MANAGEMENT SYSTEM Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU

More information

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, apons@miami.edu ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection

More information

Dr. Pat Mirenda. Software Design Specification Document

Dr. Pat Mirenda. Software Design Specification Document CPSC 319 Team 2 Dr. Pat Mirenda Software Design Specification Document Version: 1.2 Date: (03/17/2006) 2Communicate SDS Revisions Version Primary Author(s) Description of Version Date Completed 1.0 Wei

More information

Link Analysis Tool Design Description Final Version

Link Analysis Tool Design Description Final Version Link Analysis Tool Design Description Final Version Doc. No.: Revision History Date Version Description Author 2010-10-08 1.0 Initial Draft Hassan Aziz Khan 2010-11-06 1.1 2 nd Draft Hassan Aziz Khan

More information

StreamServe Persuasion SP5 Control Center

StreamServe Persuasion SP5 Control Center StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Software Requirements Specification For Real Estate Web Site

Software Requirements Specification For Real Estate Web Site Software Requirements Specification For Real Estate Web Site Brent Cross 7 February 2011 Page 1 Table of Contents 1. Introduction...3 1.1. Purpose...3 1.2. Scope...3 1.3. Definitions, Acronyms, and Abbreviations...3

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

IBM Information Server

IBM Information Server IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

AutoMate BPA Server 10 Installation Guide

AutoMate BPA Server 10 Installation Guide AutoMate BPA Server 10 Installation Guide AutoMate BPA Server follows the client/server model of computing where one or more servers are hosts that share their resources with multiple clients. Since data

More information

Online College Magazine

Online College Magazine Software Requirement Specification Chennai Campus Vandalur-Kelambakkam Road, Chennai 600048 Ciphers Online College Magazine IBM TGMC-2011 Version 1.0 Team Members : Mentor: Prof. B. Sathis Kumar 1. Aanchal

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

Section 1: Requirements ( Beta Release on Phase 5)

Section 1: Requirements ( Beta Release on Phase 5) RUMActive Phase 2: Description and Requirements Professor: Amirhossein Chinaei Team Members: Charlie Castro Soto, Jose A. Abreu Delgado, José Francisco Rodríguez Zayas Project Description Web and Mobile

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service http://docs.oracle.com Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service Configuration Guide 2015 Oracle Corporation. All rights reserved 05/11/2015 Contents 1 HIPAA 3 1.0.1 What is HIPAA?

More information

Software Requirements Specification for POS_Connect Page 1. Software Requirements Specification. for. POS_Connect. Version 1.0

Software Requirements Specification for POS_Connect Page 1. Software Requirements Specification. for. POS_Connect. Version 1.0 Page 1 Software Requirements Specification for POS_Connect Version 1.0 1/9/2013 Page 2 Table of Contents Table of Contents Revision History 1. Introduction 1.1 Purpose 1.2 Document Conventions 1.3 Intended

More information

RemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms

RemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms RemoteTM Web Server User Guide Copyright 2008-2014 Maxprograms Contents 3 Contents Introduction...5 Requirements...5 Installation...7 Email Server Configuration...7 Users Management...8 Create User...8

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

LICENSE4J LICENSE MANAGER USER GUIDE

LICENSE4J LICENSE MANAGER USER GUIDE LICENSE4J LICENSE MANAGER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 4 Managing Products... 6 Create Product... 6 Edit Product... 7 Refresh, Delete Product...

More information

Introduction. Connection security

Introduction. Connection security SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information

More information

SWITCH Resource Registry Guide

SWITCH Resource Registry Guide AAI Resource Registry Guide Authors: LH, TL AAI web page: http://www.switch.ch/ Contact: aai@switch.ch This guide is aimed at users of the SWITCH Resource Registry and is intended to serve as a complimentary

More information

Team: May15-17 Advisor: Dr. Mitra. Lighthouse Project Plan Client: Workiva Version 2.1

Team: May15-17 Advisor: Dr. Mitra. Lighthouse Project Plan Client: Workiva Version 2.1 Team: May15-17 Advisor: Dr. Mitra Lighthouse Project Plan Client: Workiva Version 2.1 Caleb Brose, Chris Fogerty, Nick Miller, Rob Sheehy, Zach Taylor November 11, 2014 Contents 1 Problem Statement...

More information

Software Requirements Specification

Software Requirements Specification CSL740 Software Engineering Course, IIT Delhi Software Requirements Specification Submitted By Abhishek Srivastava (2011EEY7511) Anil Kumar (2009CS10180) Jagjeet Singh Dhaliwal (2008CS50212) Ierum Shanaya

More information

Administrator Operations Guide

Administrator Operations Guide Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance

More information

GenericServ, a Generic Server for Web Application Development

GenericServ, a Generic Server for Web Application Development EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student tawbi@irit.fr Bilal CHEBARO Assistant professor bchebaro@ul.edu.lb Abstract

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web:

More information

Budget Event Management Design Document

Budget Event Management Design Document Budget Event Management Design Document Team 4 Yifan Yin(TL), Jiangnan Shangguan, Yuan Xia, Di Xu, Xuan Xu, Long Zhen 1 Purpose Summary List of Functional Requirements General Priorities Usability Accessibility

More information

Solar energy e-learning laboratory - Remote experimentation over the Internet

Solar energy e-learning laboratory - Remote experimentation over the Internet Solar energy e-learning laboratory - Remote experimentation over the Internet Ioannis Michaelides, Polyvios Eleftheriou, Kypros Economides Department of Mechanical Engineering Higher Technical Institute,

More information

Customer Bank Account Management System Technical Specification Document

Customer Bank Account Management System Technical Specification Document Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6

More information

IBM i Version 7.2. Systems management Advanced job scheduler

IBM i Version 7.2. Systems management Advanced job scheduler IBM i Version 7.2 Systems management Advanced job scheduler IBM i Version 7.2 Systems management Advanced job scheduler Note Before using this information and the product it supports, read the information

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

How to make a good Software Requirement Specification(SRS)

How to make a good Software Requirement Specification(SRS) Information Management Software Information Management Software How to make a good Software Requirement Specification(SRS) Click to add text TGMC 2011 Phases Registration SRS Submission Project Submission

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

A Monitored Student Testing Application Using Cloud Computing

A Monitored Student Testing Application Using Cloud Computing A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA r.mullapudi@spartans.nsu.edu, ghsieh@nsu.edu

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Safewhere*Identify 3.4. Release Notes

Safewhere*Identify 3.4. Release Notes Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: bhatsneh@gmail.com 1, pawar.trishala@gmail.com

More information

Business Bill Pay. Help Guide

Business Bill Pay. Help Guide Business Bill Pay Help Guide TABLE OF CONTENTS PAYMENTS...3 1.1 Make Payments...3 1.2 Manage Payees...4 1.3 Manage Payments...5 1.4 Payment History...6 ADMIN TOOLS...7 4.1 Manage Users...7 4.2 Manage Bank

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Implementing a Web-based Transportation Data Management System

Implementing a Web-based Transportation Data Management System Presentation for the ITE District 6 Annual Meeting, June 2006, Honolulu 1 Implementing a Web-based Transportation Data Management System Tim Welch 1, Kristin Tufte 2, Ransford S. McCourt 3, Robert L. Bertini

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Web Development Frameworks

Web Development Frameworks COMS E6125 Web-enHanced Information Management (WHIM) Web Development Frameworks Swapneel Sheth swapneel@cs.columbia.edu @swapneel Spring 2012 1 Topic 1 History and Background of Web Application Development

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

Integrating Online Banking and Top-up Card into Payment Gateway

Integrating Online Banking and Top-up Card into Payment Gateway Internship Report Master of Software Engineering (2012-2014) Integrating Online Banking and Top-up Card into Payment Gateway Author: DAO Nguyen Vu Supervisor: HO Hoang Thuong January 11, 2015 Acknowledgment

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

CS587 Project final report

CS587 Project final report 6. Each mobile user will be identified with their Gmail account, which will show up next to the Tastes. View/Delete/Edit Tastes 1. Users can access a list of all of their Tastes. 2. Users can edit/delete

More information

This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012.

This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012. MOBILE PHONE SYSTEMS Tim Ward, Brett Ward Limited, 11/4/2012 This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012. Details of some work for the security industry are omitted.

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Sports Management Information Systems. Camilo Rostoker November 22, 2002

Sports Management Information Systems. Camilo Rostoker November 22, 2002 Sports Management Information Systems Camilo Rostoker November 22, 2002 Introduction We are in the information age The availability of technology has brought forth a new problem domain how do we manage

More information

How To Build A Web App

How To Build A Web App UNCLASSIFIED Next Gen Web Architecture for the Cloud Era Chief Scientist, Raytheon Saturn 2013 28 Apr - 3 May Copyright (2013) Raytheon Agenda Existing Web Application Architecture SOFEA Lessons learned

More information

Software Requirements Specification. Human Resource Management System. Sponsored by Siemens Enterprise Communication. Prepared by InnovaSoft

Software Requirements Specification. Human Resource Management System. Sponsored by Siemens Enterprise Communication. Prepared by InnovaSoft Software Requirements Specification Human Resource Management System Sponsored by Siemens Enterprise Communication Prepared by InnovaSoft Cansu Hekim - 1630888 Bekir Doğru - 1560085 Zaman Safari - 1572254

More information

ECOMMERCE SITE LIKE- GRAINGER.COM

ECOMMERCE SITE LIKE- GRAINGER.COM 12/19/2012 ITFLEXSOLUTIONS ECOMMERCE SITE LIKE- GRAINGER.COM Developed by : IT Flex Solutions www.itflexsolutions.com *Please note that this is not a final proposal only an estimate of the time and type

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools

More information

mywcb Online User Guide

mywcb Online User Guide WCB REV NOVEMBER, 2014 mywcb Online User Guide for Employers ebusiness Support Team Phone: 780-498-7688 Fax: 780-498-7866 Email: ebusiness.support@wcb.ab.ca Hours: 8:00 a.m. to 4:30 p.m., Monday through

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

POINT OF SALES SYSTEM (POSS) USER MANUAL

POINT OF SALES SYSTEM (POSS) USER MANUAL Page 1 of 24 POINT OF SALES SYSTEM (POSS) USER MANUAL System Name : POSI-RAD System Release Version No. : V4.0 Total pages including this covering : 23 Page 2 of 24 Table of Contents 1 INTRODUCTION...

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

End User Guide The guide for email/ftp account owner

End User Guide The guide for email/ftp account owner End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4

More information

Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang

Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Software Requirement Specification Employee Tracking System Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Team Members Seung Yang, Nathan Scheck, Ernie Rosales Page 1 Software Requirements

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

QliqDIRECT Active Directory Guide

QliqDIRECT Active Directory Guide QliqDIRECT Active Directory Guide QliqDIRECT is a Windows Service with Active Directory Interface. QliqDIRECT resides in your network/server and communicates with Qliq cloud servers securely. QliqDIRECT

More information