Team Quicken Loans: Mobile RFID Inventory Tracking System. Project Plan. Spring 2014
|
|
|
- Arlene Stewart
- 10 years ago
- Views:
Transcription
1 Team Quicken Loans: Mobile RFID Inventory Tracking System Project Plan Spring Michigan State University Student Team Josh Rasor Jacob Riesser Keyur Patel Quicken Loans Professional Team Jim Brzuch Patrick Hartford Sarah Kindinger Christina Mathes Bryan Wisner Breanna Perrett Channing Pritchett Xulu Zhang
2 TABLE OF CONTENTS Mobile RFID Inventory Tracking System Executive Summary... 3 Functional Specifications... 4 Example Use Case For Employee... 4 Example Use Case #1 For Administrator... 4 Example Use Case #2 for Administrator... 4 Specifications... 5 Design Specifications... 6 Web Application... 6 RFID Reader... 8 Sequencing... 9 Technical Specifications System Architecture Badge Scanner RFID Scanner Badge Scanner Cabinet Guard Web Application Web Service Database Locking Mechanism RISKS Badge Scanner Physical Locking Device RFID Reader Web API Timetable Additional Information Point of Contact Acknowledgements
3 EXECUTIVE SUMMARY The RFID mobile device tracking system automates the process of checking mobile devices in and out of a secure lockbox. The mobile device testing group at Quicken Loans had been using manual logging to keep track of who had what mobile device checked out at any given time. This caused issues such as devices missing for extended periods of time, thus the team decided that an automated process would be more desirable. The RFID mobile device tracking system utilizes RFID tagging of the mobile devices in conjunction with in-place RFID scanners and employee authentication to automate the process. Each device will have a unique RFID tag affixed to it that will identify the device. The in-place RFID scanner is responsible for detecting which tagged devices are present in the cabinet. Lastly, employees may access the storage area by authenticating themselves with their company assigned badge. A front-end web application replaces the manual logging. This application allows employees to view current inventory and check-out history. The front-end also has administrator interfaces to notify employees in possession of checked-out devices, as well as providing management functionality for devices and information pertaining to the devices. 3
4 FUNCTIONAL SPECIFICATIONS Mobile RFID Inventory Tracking System The following information regards the functional aspects of the RFID mobile device tracking system. EXAMPLE USE CASE FOR EMPLOYEE Bob Jones needs to test some new code on a mobile test device. Bob logs into the web application in order to determine if there is a device that meets his needs in the Mobile Device Cabinet. He approaches the Mobile Device Cabinet and swipes his security badge using the badge scanner on the cabinet. The system authenticates Bob s security badge, immediately takes a snapshot of all the devices currently in the cabinet using RFID technology, and records this data. The cabinet door then unlocks, and he is free to take any device he chooses. Bob grabs a Samsung Galaxy S3 running Android version 4.3, closes the cabinet door, and scans his badge. The system then takes another snapshot of all devices in the cabinet, and determines which device has been removed. The data is recorded in a database and available to be viewed and reported on via an internal webpage. When Bob finishes his testing, he returns to the cabinet and swipes his badge to open the cabinet. The system takes a snapshot using RFID technology of all devices currently in the cabinet. Bob places the device back into the cabinet and closes the door. The system takes another snapshot and determines what devices have been placed back into the cabinet, and records the data. The system sends s to both Bob and the Mobile Development QA team when a device is checked in or out. EXAMPLE USE CASE #1 FOR ADMINISTRATOR Sally Admin is in charge of managing the devices in the Mobile Device Cabinet. She receives a shipment of new devices for testing purposes. Sally logs into the front-end web application and selects the option to add a new device. She enters the information for each new device on the web application and confirms that each device was added. She then tags each device with a new RFID tag, scans her ID to open the cabinet, and places the devices inside. When the cabinet closes, the RFID reader reads the new devices and marks them as checked in. EXAMPLE USE CASE #2 FOR ADMINISTRATOR Tom Boss is also an administrator in charge of tracking the mobile devices in the cabinet. He receives a complaint from Norah Smith in the mobile device testing team that the mobile device she needs to test on has been missing for a while. When Tom logs into the front-end application to view the device inventory, he confirms that the Samsung Galaxy S3 running Android version 4.3 that Norah Smith is requesting has been checked out by Bob Smith for a year. Tom chooses the administrator option to notify and selects the option to notify the current possessor. The front-end notifies the back-end web service, and the back-end web service sends out an to Bob Smith notifying him that the device is needed and that he has had it for too long. Bob Smith receives the and returns the phone the next day. 4
5 SPECIFICATIONS The Mobile RFID Inventory Tracking System conforms to the functional specifications described herein. 1. The system automatically checks devices in or out for employees; employees interact with the system only by scanning their identification badge. 2. The system authenticates users attempting to access the Mobile Device Cabinet. 3. The system can determine the states of all registered devices at any time: to whom devices have been checked out or if devices are physically present in the Mobile Device Cabinet. 4. A web application is available to review current inventory information, device history, and user history. 5. Furthermore, the web application can manage inventory information, such as registering new mobile devices. 6. For mobile devices, the system maintains the RFID tag ID, device type, device name, device manufacturer, device operating system, and device operating system version. 7. For users, the system maintains that user s security badge number, common ID, first name, last name, and extension number. 8. When users check devices in or out, the system will maintain the device check in and out date and time. 9. The system will send to both the user and the Mobile Development Quality Assurance team providing information regarding the date and time the device was checked in or out, and details about which devices were checked in or out. 5
6 DESIGN SPECIFICATIONS Mobile RFID Inventory Tracking System The following are the design specifications. These include front-end mock-ups and a systems diagram. WEB APPLICATION The web application is built on the.net MVC framework and is styled using the Twitter Bootstrap. The Quicken Loans styling guide provides visual consistency with other Quicken Loans products and solutions. The web application contains pages for device inventory, device history, and user history, as shown in the below three figures. Figure 1: Web Application Device Inventory Page As shown in figure 1, the web application displays the list of all registered devices with their current status and information. This design will draw on the web services to obtain the data. 6
7 Figure 2: User History Page Figure 2 shows the web application s view of all known sessions in which that user checked a device out and checked it back in. Each user s history is accessible and recorded. The web service provides the list of all known users and their histories. Figure 3: Device History Page 7
8 Figure 3 displays the web application s device history view. A device s history consists of all known sessions in which any user checked that device out and later checked it back in. Each device has its corresponding history tracked and can be viewed via the web application. RFID READER The RFID reader must be able to take a snapshot of the mobile device inventory. The reader is equipped with an antenna which will monitor the Mobile Device cabinet. The antenna, shown on the right in figure 4, must be placed such that all devices in the cabinet can be scanned by the reader. Figure 4: The Speedway Revolution reader with antenna The RFID scanner can scan multiple tags simultaneously without requiring line-of-sight to each device. Multiple antennae can be connected to the RFID scanner to handle larger cabinets. 8
9 SEQUENCING Figure 5: Sequence Diagram for employee use case As shown in figure 5, the user only interacts with the tracking system by scanning their identification and by receiving notifications. The locking device, RFID scanner, and badge scanner all communicate only to the cabinet guard, which in turn communicates with the web service; the web service is equipped to handle requests from the inventory tracking system, the web application, and possible future presentation-layer developments. 9
10 TECHNICAL SPECIFICATIONS Mobile RFID Inventory Tracking System SYSTEM ARCHITECTURE The Mobile RFID Inventory Tracking System consists of several sub-systems. The system involves a locked cabinet, an RFID reader, a badge scanner, a database, a web service, and a web application. The database, web service, and web application form a three-tier architecture, with business logic isolated in the web services layer. This architecture allows the presentation layer, where the web application resides, to be extended. Figure 6: The system architecture of the RFID Tracking system As shown in figure 6, the three-tier architecture interfaces with the RFID reader and badge scanner at the business logic layer. Separating the web application from the web service allows the web service to be interfaced with possible future applications. BADGE SCANNER The badge scanner allows users to interact with the tracking system. The badge scanner is accessible outside of the Mobile Device cabinet, and communicates with both the web service and the locking device. When a badge is scanned, the cabinet unlocks and device inventory changes are attributed to the badge s owner via the web service. 10
11 RFID SCANNER The RFID scanning technology present in this system is the Impinj Speedway Revolution R420 RFID Reader. The reader is equipped with Speedway Connect software. The reader communicates with the Mobile RFID Inventory System via HTTP post with the following variables defined: BADGE SCANNER The badge scanning technology present in this system is the RFIDeas RDR-6081AKU NFC Badge Reader. The reader runs without proprietary middleware. The badge scanner requires a channel to communicate with the locking system and the web services. The scanner deposits text to a connected device as a human-input-device. The connected device communicates with the web service to identify users. CABINET GUARD The cabinet guard integrates the services of the RFID Scanner, Badge Scanner, Locking Mechanisms, and sends their information to the web service. The cabinet guard is a Windows Forms application, and runs on a device near the cabinet. WEB APPLICATION The front end web application uses.net MVC 4.5. The web application is the top layer of the three-tier architecture. The application is styled using the Twitter bootstrap and follows the Quicken Loans style guidelines for visual consistency. It communicates to the web service via HTTP POST, GET, PUT, and DELETE. WEB SERVICE The web services use Web API 2.0. This is the second layer of the three-tier architecture. This layer enforces business logic, and should be accessible for future top-layer applications. This layer provides the interface for the RFID scanner to modify the database based on snapshot readings. The service uses Entity Framework to interface with the database. DATABASE The backend database is built using Microsoft SQL. It is the bottom layer of the three-tier architecture. LOCKING MECHANISM The locking mechanism is a specialized lock solution for individual cabinets. The Cabinet Guard is designed to integrate with potential locking solutions. Because cabinets may be so specialized with integrated locks, the Mobile RFID Inventory Tracking System does not contain its own lock. 11
12 RISKS BADGE SCANNER This system authenticates Quicken Loans employee to access the cabinet of devices and then unlock the cabinet for device retrieval. Not receiving employee badge information in a useable form means that the system cannot properly track devices. Mitigation: The badge scanner inputs as a keyboard, and connects via USB; configuration and use is designed for simplicity. PHYSICAL LOCKING DEVICE Locking devices are highly specialized to cabinets; it is not feasible to develop a solution only for particular systems. Mitigation: Add abstraction in Cabinet Guard to interface with highly specialized locking solutions. RFID READER Must receive information from RFID Reader, which exists on a network independently of computers running Cabinet Guard Mitigation: Speedway Connect software handles the RFID reader s output, allowing the Cabinet Guard to read from a port on the RFID reader. WEB API 2.1 Front end for the website should reply on a backend API. Mitigation: Implementation of API resembles that of.net MVC and basics of communication are broken down into simple components. Unified services to handle JSON communication. 12
13 TIMETABLE Week 1 (1/6/14 1/10/14) Received project description First conference call with Quicken Loans Team Week 2 (1/13/14 1/17/14) Configured Team Computers Installed & Configured Windows 7 Installed & Configured Visual Studio 12 Installed & Configured Windows Server 2008 R2 Installed SQL Server Management Studio 14 Set-up GIT Repository Created a Skelton for Front End Mockups of Front End Week 3 (1/20/14 1/24/14) Status Report Presentations January 22 nd Configured SQL Server Management Studio 14 Activated IIS Installed Middleware on RFID Speedway Revolution Designed and implemented database schemas Implemented a Skeleton for web service Work on and complete Project Plan Document & PowerPoint Week 4 (1/27/14 1/31/14) Project Plan Presentation January 27 th Host prototype website on IIS Configure RFID reader to communicate with preliminary Cabinet Guard designs Week 5 (2/3/14 2/7/14) Implement web service functionality Store and retrieve data from database Integrate badge scanner with Cabinet Guard Week 6 (2/10/14 2/14/14) Implement simple front end website Prepare for alpha presentation, with complete check-in/check-out Week 7 (2/17/14 2/21/14) Alpha Presentation February 17 th Continued development on front-end and web service functionality Week 8 (2/24/14 2/28/14) Usability tweaks to front-end Continue front-end and web service functionality 13
14 Week 9 (3/10/14 3/14/14) Configure windows authentication Upgrade Cabinet Guard to Windows Forms application Week 10 (3/17/14 3/21/14) Finalize usability constraints and definitions Implement all notification systems Week 11 (3/24/14 3/28/14) Prepare for presentations Develop API usability Finalize implementation of front-end CRUD operations Week 12 (3/31/14 4/4/14) Beta Presentations March 31 st Finalization of all features use-case and administration functional and usable Documentation development Front-end niceties Week 13 (4/7/14 4/11/14) Record audio and record screen for project video Finalize source code Develop manuals Week 14 (4/14/14 4/18/14) Time cushion plan for this time to be taken by emergencies and unforeseen problems Edit project video Develop manuals Week 15 (4/21/14 4/25/14) Project Videos April 21 st Submit All Deliverables April 23 rd Design Day Setup April 24 th Design Day April 25 th 14
15 ADDITIONAL INFORMATION POINT OF CONTACT For further information regarding this document and project, please contact Dr. Wayne Dyksen at Michigan State University. All materials in this document have been sanitized for proprietary data. The students and the instructor gratefully acknowledge the participation of our industrial collaborators. ACKNOWLEDGEMENTS We would like to acknowledge the Quicken Loans team for their contribution and working with us on the Senior Design Program at Michigan State University. Moreover we would specially like to thank Breanna Perrett, Bryan Wisner, Channing Pritchett, Christina Mathes, Sarah Kindinger, Patrick Hartford, Jim Brzuch, Xulu Zhang as well as any other persons we neglected to include. Additionally, we would like to thank Michigan State University Department of Computer Science, Malcom Doering, Dr. Wayne Dyksen in preparing us for the real world. 15
Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual
Team Quicken Loans: Mobile RFID Inventory Tracking System Administrator Manual TABLE OF CONTENTS Mobile RFID Inventory Tracking System Admin Manual What s the Mobile RFID Inventory Tracking System?...
Michigan State University. Team Meijer. Tablet-Based Point-of-Sale System. Project Plan. Fall 2011
Michigan State University Team Meijer Tablet-Based Point-of-Sale System Project Plan Fall 2011 Meijer Contacts: Scott Pallas Murali Rajagopalan Team Members: Riti Adhi Peter Rifel Andrew Rockwell Mark
Medications Shortages Dashboard
Medications Shortages Dashboard Project Plan Spring 2014 Spectrum Health Contact Jeff McConnell Team Members Alex Lockwood Alex Seling Cameron Keif 1 Table of Contents 1. Project Overview 3 2. Functional
Project Plan Log Monitoring Compliance
Project Plan Log Monitoring Compliance The Capstone Experience Team Spectrum Health Kathryn Bonnen Collin Lotus Will Seeger Wayne Stiles Department of Computer Science and Engineering Michigan State University
zen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
Equipment Room Database and Web-Based Inventory Management
Equipment Room Database and Web-Based Inventory Management Project Proposal Sean M. DonCarlos Ryan Learned Advisors: Dr. James H. Irwin Dr. Aleksander Malinowski December 12, 2002 TABLE OF CONTENTS Project
Texas Criminal Defense Lawyers Association
Texas Criminal Defense Lawyers Association Website Network Expert Database Design ISQS 4349 Information Systems Design Final Project Report Spring Semester 2011 Prepared by Team 5 Kyle Jones Lorenzo Valdez
About the Authors About the Technical Reviewer
About the Authors p. xiii About the Technical Reviewer p. xv Introduction p. xvii Starting an E-Commerce Site p. 1 Deciding Whether to Go Online p. 1 Getting More Customers p. 2 Making Customers Spend
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
MarkLogic Server. Reference Application Architecture Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Reference Application Architecture Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Integration of Visitor Management with Access Control Systems
Easy Lobby White Pap er Integration of Visitor Management with Access Control Systems Bringing them Together Introduction Why You Need It This white paper provides a description of the integration process
General principles and architecture of Adlib and Adlib API. Petra Otten Manager Customer Support
General principles and architecture of Adlib and Adlib API Petra Otten Manager Customer Support Adlib Database management program, mainly for libraries, museums and archives 1600 customers in app. 30 countries
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Basic Software Setup Guide. www.easyclocking.com
1 Basic Software Setup Guide www.easyclocking.com 2 Table of Contents Software registration 3 How to connect the time clock.. 5 How to turn the time clock on 5 Defining the type of connection... 5 TCP/IP
CSC340S Asst3 Information System Design Detailed Marking Scheme
CSC340S Asst3 Information System Design Detailed Marking Scheme Marker: Team: Total Marks: /101 Marks for this assignment depend on the factors listed below. A: Global Architecture (20%). Description and
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting
Cisco Physical Access Manager
Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used
Social Media in the Process Automation Industry
Social Media in the Process Automation Industry Distributed Software Development Design Document Version 0.1 In co-operation with: Title: Social Media in the Process Automation Industry Product name: ABBConnect
Day-Care Environment Communication and Database
Day-Care Environment Communication and Database Michael Christenson, Nicole Cullen, Zach Lensing, Eric Lund Problem Statement Create an information tracking app to be used by a day care Keep track of Daily
A Monitored Student Testing Application Using Cloud Computing
A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA [email protected], [email protected]
RFID Tracking System Installation
RFID Tracking System Installation Installation Guide Version 3.x 3M Track and Trace Solutions 3M Center, Building 225-4N-14 St. Paul, Minnesota 55144-1000 78-8123-9919-0, Rev. E 2003-2009, 3M. All rights
SyncThru Database Migration
SyncThru Database Migration Overview Database Migration for SyncThru application is an intuitive tool that enables the data stored in the database of an older version of SyncThru, to be moved to the database
Customer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Administering Team Foundation Server 2013
Course Code: QATFS13 Vendor: Microsoft Course Overview Duration: 3 RRP: 2,039 Administering Team Foundation Server 2013 Overview This three-day, instructor-led course provides delegates with the knowledge
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
HAI Access Control. The HAI Access Control Card Reader can be used for:
HAI Access Control HAI Access Control allows you to access doors by opening an electric or magnetic lock, arm and disarm the security system, and achieve many home automation functions such as controlling
Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015
Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document
JOB DESCRIPTION APPLICATION LEAD
JOB DESCRIPTION APPLICATION LEAD The Application Lead will provide functional support and to expand capabilities in the area of systems configuration. This function provides the initial step in the process
Client Overview. Engagement Situation
Client Overview Our client is a key provider of software solutions for ensuring safety and quality standards of the supply chain of consumable goods manufacturers. Client's dedicated software platform
Access Control, Integrated
Access Control, Integrated An essential guide to integration of your security systems and the benefits that can bring Duncan Gooch Product Manager Copyright 2011 Time and Data Systems International Limited
Google Trusted Stores Setup in Magento
Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
SmartCart Design Description
SmartCart Design Description Version 1.0 Revision History Date Version Description Author 2011-10-20 0.1 Initial draft SmartCart Team 2011-24-10 0.8 Revised draft SmartCartTeam 2011-27-10 0.9 Revised draft
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
Public Works Authority in Qatar adopts RFID-enabled ASSET TRACKING SYSTEM
Public Works Authority in Qatar adopts RFID-enabled ASSET TRACKING SYSTEM Efficient organization and tracking of assets Optimized location-wise asset management Easy hand-held device application with Wi-Fi
System Architecture & Configuration Beginner Level John Tappero, Software Engineer Ed Simmerson, Director of Product Development
System Architecture & Configuration Beginner Level John Tappero, Software Engineer Ed Simmerson, Director of Product Development Class Objectives Overview of the Siriusware system architecture. To introduce
Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper
Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
Document Capture and Distribution
Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM
Symantec Mobile Management 7.2 SP3 MR1 Release Notes
Mobile Management 7.2 SP3 MR1 Release Notes Mobile Management 7.2 SP3 MR1 Release Notes This document includes the following topics: About What's new in 7.2 SP3 MR1 Fixed issues in 7.2 SP3 MR1 Known issues
This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud.
Module 1: Overview of service and cloud technologies This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud. Key Components of
Database FAQs - SQL Server
Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license
Terrace Consulting Services
Terrace Consulting Services Overview: Every project will require some degree of Planning before Implementation can begin. Analysis and Planning are essential in order to confirm requirements, define the
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
MarkLogic 8: Samplestack
MarkLogic 8: Samplestack Kasey Alderete, Justin Makeig, Charles Greer, Daphne Maddox January 2015 MarkLogic 8 Feature Presentations Topics Developer Experience: Samplestack and Reference Architecture Product
Setting Up Sharp MX-Color Imagers To Scan To Email
Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
126 SW 148 th Street Suite C-100, #105 Seattle, WA 98166 Tel: 877-795-9372 Fax: 866-417-6192 www.seattlepro.com
SharePoint 2010 Bootcamp This five-day course is designed to equip Systems Administrators, Integrators and Developers with a strong foundation for implementing solutions on Microsoft SharePoint 2010. Attendees
Xerox PrintSafe Software
Software Version 1.0 Version 1.0 702P03957 Xerox PrintSafe Software Information Assurance Disclosure Xerox PrintSafe Software Copyright 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design,
Laila TECHNICAL SKILLS
PROFESSIONAL SUMMARY Diversified experience in the field of Information Technology in the financial domain. In depth knowledge of RUP, Agile, waterfall Software Development Life Cycle (SDLC) processes.
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
Team Collaboration, Version Management, Audit Trails
Team Collaboration, Version Management, Audit Trails Best Practices for Successful Project Delivery with VoiceObjects May 2008 www.voiceobjects.com 2 Team Collaboration, Version Management, Audit Trails
KonyOne Server Prerequisites _ MS SQL Server
KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights
WEB-BASED STUDENT MANAGEMENT SYSTEM USING RFID
UNIVERSITY OF BORDEAUX 1 FINAL REPORT MASTER OF SOFTWARE ENGINEERING (2011 2013) WEB-BASED STUDENT MANAGEMENT SYSTEM USING RFID Author LE Huong Sao Mai Supervisor LE Dinh Viet Hai December, 2013. Acknowledgement
Edge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
DottsConnected SHAREPOINT 2010 ADMIN TRAINING. Exercise 1: Create Dedicated Service Accounts in Active Directory
DottsConnected SHAREPOINT 2010 ADMIN TRAINING Module 1 - Getting started with SharePoint 2010 This introductory module introduces students to the fundamental terminology and architecture of SharePoint
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications.
20486B: Developing ASP.NET MVC 4 Web Applications Course Overview This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications. Course Introduction Course Introduction
GROUPWARE. Ifeoluwa Idowu
GROUPWARE Ifeoluwa Idowu GROUPWARE What is Groupware? Definitions of Groupware Computer-based systems that support groups of people engaged in a common task (or goal) and that provide an interface to a
Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation
Qualys API Limits July 10, 2014 Overview The Qualys API enforces limits on the API calls a customer can make based on their subscription settings, starting with Qualys version 6.5. The limits apply to
Note: This documentation was written using the Samsung Galaxy S5 and Android version 5.0. Configuration may be slightly different.
University Information Technology Services Training, Outreach, Learning Technologies & Video Production HallPass Instructions for Connecting to PC with an Android Device Note: This documentation was written
Tracking the Consignment Transportation in Ship via Online
Tracking the Consignment Transportation in Ship via Online Dr.T.Arumuga Maria Devi, D.Christen Jeba Raj Assistant Professor, M.Tech Scholar Centre for Information Technology and Engineering, Manonmaniam
www.excellium.ca Tel. : 514.798.8899 Fax. : 514.798.8898 Toll Free : 1.888.381.2457 Equipmentperfect Controlperfect IDperfect Keyperfect Reportperfect
Controlperfect Equipmentperfect With its unique approach, Controlperfect is the first software suite to integrate, in a complete and interactive whole, the numerous daily tasks related to the management
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
AppDev OnDemand Microsoft Development Learning Library
AppDev OnDemand Microsoft Development Learning Library A full year of access to our Microsoft Develoment courses, plus future course releases included free! Whether you want to learn Visual Studio, SharePoint,
A Case Study in the Design of a Restaurant Management System
A Case Study in the Design of a Restaurant Management System Wesley Williams, Devon M. Simmonds Department of Computer Science University of North Carolina Wilmington {waw5709, simmondsd}@uncw.edu Abstract
MS 10978A Introduction to Azure for Developers
MS 10978A Introduction to Azure for Developers Description: Days: 5 Prerequisites: This course offers students the opportunity to learn about Microsoft Azure development by taking an existing ASP.NET MVC
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Microsoft Outlook 2013 & 2010. Microsoft Outlook 2007. Microsoft Outlook 2003. Windows Live Mail 2012 & 2011. MAC Mail. Mozilla Thunderbird
How to configure your WorldPath email address in various mail applications Microsoft Outlook 2013 & 2010 Microsoft Outlook 2007 Microsoft Outlook 2003 Windows Live Mail 2012 & 2011 MAC Mail Mozilla Thunderbird
EVERYTHING YOU NEED FOR BRANDING ON MULTIPLE CHANNELS
EVERYTHING YOU NEED FOR BRANDING ON MULTIPLE CHANNELS Manage all you rich media content and customer experience simultaneously with DAM for Sitecore EXECUTE YOUR MULTICHANNEL STRATEGY Apps Adobe Adaptive
Developer Tutorial Version 1. 0 February 2015
Developer Tutorial Version 1. 0 Contents Introduction... 3 What is the Mapzania SDK?... 3 Features of Mapzania SDK... 4 Mapzania Applications... 5 Architecture... 6 Front-end application components...
The Jeff's Ticket Tracking System
TheJeffsTicketTracker.thejeffapproves.com The Jeff's Ticket Tracking System [email protected] Jeff Denton A.K.A The Jeff 15 Contents About The Jeff... 4 Project Summary and Requirements...
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Active RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
Grid-In-Hand Mobile Grid Revised 1/27/15
Grid-In-Hand Mobile Grid Revised 1/27/15 Grid-In-Hand provides a mobile solution framework by coupling your mobile scanner to your ios or Android device. Use Mobile Grid for inventory, asset management,
Course Scheduling Support System
Course Scheduling Support System Roy Levow, Jawad Khan, and Sam Hsu Department of Computer Science and Engineering, Florida Atlantic University Boca Raton, FL 33431 {levow, jkhan, samh}@fau.edu Abstract
Activity 1 Workflow Model and API
INFO-445: Advanced Database Design, Management, and Maintenance 1 6 Activity 1 Workflow Model and API Please note: You may do this activity alone or in groups of two. Objective The goal of this activity
