Database Management Systems [COP5725] Project Deliverable 2. SaferDC. Submitted By: Group 1
|
|
|
- Madison Watkins
- 10 years ago
- Views:
Transcription
1 Database Management Systems [COP5725] Project Deliverable 2 SaferDC Submitted By: Group 1 Armando Leon [UF ID: ] Nitin Agrahara [UF ID: ] Neeraj Rao [UF ID: ] Rahul Bhoopalam [UF ID: ] Page 1 of 8
2 This project is a web-based application called SaferDC, which helps analyzing crimes committed in Washington, DC and at later stages can be implemented for other cities as well. SaferDC can be used for describing a given area in terms of public safety and related variables. The user will be able to extrapolate information from the crime records stored in the database based on easyto-understand charts and graphs. This document contains an overview of the UI Design followed by the conceptual database design (ER diagram). Text in italics refers to web pages in the UI. UI Design 1. Login/Registration page: This page allows registered users to login to the website or unregistered users to sign up. Each time a new user signs up to the website, an Oracle database user with appropriate permissions is created. New users are not given admin permissions by default, although these permissions may be granted by existing admins later on. Every time an existing user enters his/her credentials in the Login/Registration webpage, the JavaScript internally interacts with the USER table in the Oracle database and authenticates the user. Based on the role of the logged-in user (the USER_TYPE attribute -- either admin or regular user), he is redirected to the corresponding start page (either Admin Page or Start Page; see below). 2. Admin Page: If the logged-in user is an admin, he/she is redirected to the admin s webpage. The admin may choose to: a. Delete users or manage user permissions: This redirects the admin to the Manage Users web page. See below for more details. b. Manage crime data: This redirects the admin to the Manage Crimes webpage. See below for more details. c. Manage preset queries: This redirects the admin to the Manage Preset Queries webpage. See below for more details. d. Run raw SQL commands directly to interact with the database: This redirects the admin to the Run SQL Commands webpage. See below for more details. e. Go to the Regular Interface: This option redirects the admin to the Start Page used by regular users. This is in case the admin also wishes to run queries on the database like a normal user. See below for more details. f. Logout: Choosing this option will log the admin out of the system and redirect the browser back to the Login/Registration page. 3. Start Page: Page 2 of 8
3 This is the page normally presented to a regular user once he logs in. This page consists of the following components: a. Map: This is a map that allows the user to visualize the geographical distribution of crime in various areas of the city. The map is populated with data depending on parameters selected by the user using dropdown boxes on this page. b. Graph: The user can also visualize crime information depending on parameters that he selects in a graphical form. Parameters can be selected using the dropdown boxes on this page. c. Dropdown boxes: These boxes allow users to filter crime data based on various parameters e.g., range of years, type of crime etc. There is a dropdown box for each selectable parameter. Once the user selects a given set of parameters, the JavaScript constructs the corresponding SQL query string and executes the query on the database. Fetched results are then passed on to the JavaScript graph API to create the graph as well as the map so that results can be displayed on the map. d. Logout: Choosing this option will log the user out of the system and redirect the browser back to the Login/Registration page. e. Account Manager: Choosing this option takes the user to the Manage Account page. See below for more details. 4. Manage Account: This page allows regular users to manage their personal profile information like address, password, name etc. It consists of text fields for each of these modifiable parameters and a confirm button to update the data in the USER table of the User Database. 5. Manage Users: This page allows the admin to manage users using the UI. The admin can i. View existing users ii. Grant/revoke user permissions iii. Remove users Choosing any of these actions, will add, update or delete rows from the USER table. Note that the admin cannot change or access user passwords or user profile details. There is also a link that will take the admin back to the Admin Page. 6. Manage Crimes: This page allows the admin to manage crime data using the UI. The admin can iv. View existing crimes v. Add crimes vi. Remove crimes Choosing any of these actions, will add, update or delete rows from the CRIME table. There is also a link that will take the admin back to the Admin Page. Page 3 of 8
4 7. Manage Preset Queries: This page allows the admin to manage preset queries using the UI. The admin can i. View existing preset queries ii. Add preset queries iii. Remove preset queries Choosing any of these actions, will add, update or delete rows from the corresponding table. There is also a link that will take the admin back to the Admin Page. 8. Run SQL Commands: This page allows an admin to interact with the database using SQL commands. The commands are entered in the text area provided. The UI JavaScript internally passes on these queries to the Oracle database and the results will be shown in another text area on the same page. There is also a link that will take the admin back to the Admin Page. Page 4 of 8
5 Figure 1: UI Design Flow. Shaded boxes are used to show UI buttons. Page 5 of 8
6 ER Diagram Description SaferDC enables users to track crimes which occurred in various areas of Washington DC. Users of SaferDC may query information about crimes by location, date, type of crime, and other related attributes. Users may also query information correlating instances of crime with demographic factors such as income distribution. SaferDC allows users to log in to the system and make various queries using the components of the UI. Once the user selects parameters in the UI, his choices are translated into a corresponding SQL query string. The query string is passed on to JavaScript which issues the actual query to the database. The query is also stored in the database so that the user may see it in his history later on. As part of implementing SaferDC, we intend to store the following two independent categories of information: 1. Information related to crimes that were committed in Washington DC 2. Information related to users of SaferDC. We intend to store this information in our database so that we can keep a history of the queries issued by individual users. To model this, we intend to have two separate databases the User Database and the Crime Database. The User Database has the following entities: USER: This entity models SaferDC s users. It stores user details such as the name, , user type and address. The user s address is used as the primary key. The user type specifies whether the user is an administrator or a regular user (so as to present the user with appropriate graphic interface and privileges to query information). REQUEST: This entity stores actual requests issued by a user (by selecting various attributes for data that the user wishes to fetch). Requests are stored so that a user may see the history of his/her requests (the last x requests made). REQUEST is a weak entity that is identified by the user s address as well as the time the request was made. It stores attributes such as time, query and description. Query is the query string that will be composed based on parameters selected by the user in the UI. This query string is then passed on to JavaScript which will issue the actual query to the database. The description attribute is used to store any user annotation for the query to easily identify it later on. Since a single user may issue multiple requests, the cardinality of the relation between USER and REQUEST is 1:n. The Crime Database has the following entities: CRIME: This entity stores details of crimes such as report time, call number, location and offense type. The call number is the primary key used to identify a given crime. Location is a composite attribute that stores the latitude, longitude and block address the crime occurred in. In Page 6 of 8
7 order to understand how crimes relate to demographic factors such as income distribution, poverty rate, etc. on the Ward and the PSA level, this entity also stores the Ward and PSA the crime occurred in (see WARD and PSA below). Wards are recorded using Ward_Id as a foreign key and PSAs are stored using PSA_Id as a foreign key. Crimes and PSAs have a n:1 relationship. However, a given PSA can be part of more than one Ward. Hence, the same crime can be considered to have occurred in more than one Ward. Thus the cardinality of the relation between CRIME and WARD is n:m. WARD: This entity models the ward a given crime occurs in. The attributes of this entity are Ward_id, Average_family_income, Average_Poverty_Rate and Average_Unemployment_Rate. Ward_Id is the primary key that is used as a foreign key in the CRIME entity. PSA: This entity models the PSA a given crime occurs in. The attributes of this entity are PSA_Id, Average_Family_Income, Average_Poverty_Rate and Average_Unemployment_Rate. PSA_Id is the primary key that is used as a foreign key in the CRIME entity. Page 7 of 8
8 Figure 2: ER Diagram Page 8 of 8
Web Work Module 11.6. User s Guide
Web Work Module 11.6 User s Guide COPYRIGHT Copyright 2000 2005 MainSaver Software. All rights reserved. No part of this document may be copied or distributed, transmitted, transcribed, stored in a retrieval
9. Database Management Utility
Overview 9.1 Overview 9. Database Management Utility The Compass2.0 database contains information about configuration details for the intrusion control panel. It is essential that a backup of the information
Cloudfinder for Office 365 User Guide. November 2013
1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside
Role Based Access Control. Using PHP Sessions
Role Based Access Control Using PHP Sessions Session Developed in PHP to store client data on the web server, but keep a single session ID on the client machine (cookie) The session ID : identifies the
A. Grouping to Obtain Counts
Revised 03/07/2011 Pasco STAR v4 Student Information Area: Working With Data Sets (Grouping, Filtering, and Exporting) Skills Discussed in this Document Are: Grouping, Filtering, and Exporting From Inside
2/24/2010 ClassApps.com
SelectSurvey.NET Training Manual This document is intended to be a simple visual guide for non technical users to help with basic survey creation, management and deployment. 2/24/2010 ClassApps.com Getting
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati
Integrating Webalo with LDAP or Active Directory
Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with
User Guide. The AMF's File Transfer Service (FTS)
User Guide The AMF's File Transfer Service (FTS) TABLE OF CONTENTS 1 INTENDED USERS... 3 2 SCOPE OF GUIDE... 3 3 BACKGROUND... 3 4 REQUIRED CONFIGURATION... 3 5 CONTACT INFORMATION FOR SUPPORT... 4 6 SECURITY...
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection
Lenovo Partner Access - Overview
Table of Contents: Lenovo Partner Access Overview How to Access the Lenovo Partner Access Portal Registration Process and Account Activation First time login Accepting the T s & C s and Selecting Challenge
Quick Start SAP Sybase IQ 16.0
Quick Start SAP Sybase IQ 16.0 UNIX/Linux DOCUMENT ID: DC01687-01-1600-01 LAST REVISED: February 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and
SPEECH REPOSITORY 2.0. Registration procedure
EUROPEAN COMMISSION DIRECTORATE GENERAL FOR INTERPRETATION Provision of Interpretation Multilingualism and interpreter training support SPEECH REPOSITORY 2.0 Registration procedure Date: 26/09/2014 Version:
Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5
Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...
The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.
1. Introduction TC Monitor is easy to use Windows application for monitoring and control of some Teracom Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B- CM,
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Software Design Specification
GROUP 7 SEVEN SOFTWARE PROJECT: ONLINE SCHEDULING SYSTEM COMPANY: VIA MAGNA GOTHENBURG SWEDEN GROUP MEMBERS: IBRAHIM KRVAVAC ALI BAHALOO HORE SEYED SAMAD GHASEMI KUHAN LOH DANIEL ASOVIC Software Design
Web Application Development Using UML
Web Application Development Using UML Dilip Kothamasu West Chester University West Chester, PA - 19382 [email protected] Zhen Jiang Department of Computer Science Information Assurance Center West Chester
Online shopping store
Online shopping store 1. Research projects: A physical shop can only serves the people locally. An online shopping store can resolve the geometrical boundary faced by the physical shop. It has other advantages,
Introduction to IBM Digital Analytics Michigan.gov
Introduction to IBM Digital Analytics Michigan.gov Revised: October 17, 2013 Table of Contents Overview... 3 Accessing Digital Analytics... 3 System Requirements... 3 Main Page... 3 Top Navigation... 4
Kiwi Syslog Web Access. 2010 SolarWinds, Inc.
TM I Table of Contents Part I Welcome 1 1 What is Kiwi Syslog... Web Access? 1 2 Configuration... 1 Part II Login Gateway 2 1 Overview... 2 2 Pass-through... Authentication 3 Part III Events 3 1 Overview...
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
CloudAmp Analytics Dashboards. Documentation
CloudAmp Analytics Dashboards for Salesforce & Google Analytics Documentation Last Updated: October 5, 2015 Table of Contents 1. About the App 2. Technical Support 3. Requirements 4. Installation a. Click
LIBRARY MANAGEMENT SYSTEM PHASE II
LIBRARY MANAGEMENT SYSTEM PHASE II Prepared for: Markus Schneider, Instructor COP5725 Database Management Systems Prepared by: Group 6 Helia Zandi Manas Gupta Rishi Pathak Yugansh Arora 21 st February,
DesInventar Disaster Inventory System. DesInventar User's Guide Data Entry Module. Version 8.1.9 2009
DesInventar Disaster Inventory System DesInventar User's Guide Data Entry Module Version 8.1.9 2009 http://www.osso.org.co http://www.desenredando.org DesInventar Project http://www.desinventar.org 2009-09-03
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
How to pull content from the PMP into Core Publisher
How to pull content from the PMP into Core Publisher Below you will find step-by-step instructions on how to set up pulling or retrieving content from the Public Media Platform, or PMP, and publish it
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
Deleting the User Personalization done on Enterprise Portal
Deleting the User Personalization done on Enterprise Portal Applies to: SRM 7.0 with EP 6.0. For more information, visit the Supplier Relationship Management homepage Summary This document explains the
91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai
91.527 - Human Computer Interaction Final Project Tutorial Hardware Inventory Management System (HIMS) By Table of Contents Introduction... 3 Running HIMS... 3 Successful Login to HIMS... 4 HIMS Main Screen...
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
Adeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures...
AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures... 8 Step 2: Import Tables into BI Admin.... 9 Step 3: Creating
TeamViewer 9 Manual Management Console
TeamViewer 9 Manual Management Console Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About the TeamViewer Management Console... 4 1.1 About the
NYC Common Online Charter School Application
NYC Common Online Charter School Application Admin Guide In this guide, you will find information about the following features: How to log in How to view or export basic data 1. Application index How to
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013
TIBCO Spotfire Metrics Modeler User s Guide Software Release 6.0 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
Vision Document Airline Reservation System
Vision Document Airline Reservation System Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering Kaavya Kuppa CIS 895 MSE Project Department of Computing
ShoreTel Communicator for Web
Introduction Introduction is a browser-based interface that provides access to ShoreTel Communicator configuration options from any computer using the ShoreTel system. is supported for the Safari 4.0,
Hatco Lead Management System: http://hatco.scangroup.net/
Hatco Lead Management System User Guide General Notes: The Hatco Lead Management System (HLMS) is designed to work with modern web browsers, such as Internet Explorer 9 or newer, Firefox, Chrome & Safari.
AREA RICERCA Ufficio Dottorati di Ricerca Nazionali ed Internazionali
REGISTRATION Note: former students can skip the registration process and log in using their account (id123456) 1.1 HOW TO REGISTER: please, go to web page www.univr.it/applicationphd2015 and select the
Getting Started Guide
Cove r Business-Oriented Network Management Solution Getting Started Guide (UPM 4.1) Copyright 2015 Colasoft LLC. All rights reserved. 0 UPM Activation Input the IP address of UPM server in the address
SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature
Publishing Reports in Tableau
Requesting Tableau System Access... 2 Terms and Definitions... 2 License Levels... 2 User Rights... 2 Permissions... 2 Viewer... 3 Interactor... 3 Editor... 3 Publisher... 3 Project Leader... 4 Custom...
Customer Management Services (CMS)
Customer Management Services (CMS) Customer User Manual Version 1.2 April 2009 Page 1 of 23 Table of Contents 1 AN INTRODUCTION TO CMS... 3 2 GETTING STARTED WITH CMS... 4 ONLINE HELP... 4 ACCESSING CMS...
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Working with Indicee Elements
Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
e-signature What is e-signature? Setup
e-signature What is e-signature? TaxWise e-signature gives your clients the ability to electronically sign tax documents, even when they are not in your office. This makes finalizing the return more convenient
Register Manufacturer: Click on Register Manufacturer radio button, choose the State name and click on Login Button. The following screen appears:
USER MANUAL Click on the Internet Explorer icon on the Computer. Type http://farmer.gov.in/dealers/login.aspx on the address bar of Internet Explorer Window. The following screen will appear. Choose the
In this topic we will cover the security functionality provided with SAP Business One.
In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape
INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
CSc 230 Software System Engineering FINAL REPORT. Project Management System. Prof.: Doan Nguyen. Submitted By: Parita Shah Ajinkya Ladkhedkar
CSc 230 Software System Engineering FINAL REPORT Project Management System Prof.: Doan Nguyen Submitted By: Parita Shah Ajinkya Ladkhedkar Spring 2015 1 Table of Content Title Page No 1. Customer Statement
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
Broker Portal Tutorial Broker Portal Basics
Broker Portal Tutorial Broker Portal Basics Create Agent Connect Link Forgotten Password Change Your Broker Portal Password Delegate View Application Status Create Agent Connect Link Log in to your Producer
Welcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Online Statements. About this guide. Important information
Online Statements About this guide This guide shows you how to: View online statements, including CommBiz Activity Statements (Billing summaries) and online statements for Transaction Accounts, Credit
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
USER S MANUAL. ArboWebForest
USER S MANUAL ArboWebForest i USER'S MANUAL TABLE OF CONTENTS Page # 1.0 GENERAL INFORMATION... 1-1 1.1 System Overview... 1-1 1.2 Organization of the Manual... 1-1 2.0 SYSTEM SUMMARY... 2-1 2.1 System
Terminal Four. Content Management System. Moderator Access
Terminal Four Content Management System Moderator Access Terminal Four is a content management system that will easily allow users to manage their college web pages at anytime, anywhere. The system is
How is it helping? PragmatiQa XOData : Overview with an Example. P a g e 1 12. Doc Version : 1.3
XOData is a light-weight, practical, easily accessible and generic OData API visualizer / data explorer that is useful to developers as well as business users, business-process-experts, Architects etc.
Creating and Modifying PVAAS Accounts for Your School District
District Admin Account Holder Has full access to all reports for the district level and below (ex: access to all district, school, and student reports) Has the ability to create the following types of
Actian Vortex Express 3.0
Actian Vortex Express 3.0 Quick Start Guide AH-3-QS-09 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Actian Corporation ("Actian") at
MicroStrategy Quick Guide: Running the PI Report ITU Data Mart Support Group Go to reporting.gmu.edu and click on Login to Microstrategy
MicroStrategy Quick Guide: Running the PI Report ITU Data Mart Support Group Go to reporting.gmu.edu and click on Login to Microstrategy ACTION Enter User name and Password. Keep default selection of LDAP
How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
Using IBM dashdb With IBM Embeddable Reporting Service
What this tutorial is about In today's mobile age, companies have access to a wealth of data, stored in JSON format. Leading edge companies are making key decision based on that data but the challenge
1 Introduction. 2.1 Logging In 1. Visit our website http://www.bocionline.com and click Futures A/C Login button. 2 Login
1 Introduction BOCI Securities Limited X5 Futures and Options Trading System provides a platform for customers to place orders, review portfolio and acquire market data information. This document demonstrates
Exercise Safe Commands and Audit Trail
Exercise Safe Commands and Audit Trail Table of Contents Exercise 1: Secure Objects with Safe Commands...2 Exercise 2: Record User Actions in the Audit Trail... 13 3.1 Setting up the SQL Server for Audit
INsight Call Center Users Guide
INsight Call Center Users Guide Table of Contents 1 INsight...1 1.1 Application Overview...1 1.2 Product Prerequisites...1 2 INsight Supervisor...2 2.1 Login...2 2.2 Call Queues...2 2.3 Agents Participating
LearningServer Portal Manager
Overview LearningServer Portal Manager Portal Manager is a web-based, add-on module to LearningServer that allows organizations to create multiple LearningServer web sites. Each site services different
BroadSoft BroadWorks ver. 17 SIP Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with BroadSoft s BroadWorks hosted SIP server. The Valcom device is defined as a Generic SIP Phone in the BroadWorks system. Authentication
Document From MAXIMUM BUSINESS INFORMATION TECHNOLOGY ON A. OwnCloud User Manual. TO I Cafe`
Document From MAXIMUM BUSINESS INFORMATION TECHNOLOGY ON A OwnCloud User Manual TO I Cafe` DATED 20 Sep 2014 User Manual Guid For Owncloud I. Accessing the owncloud Web Interface To access the owncloud
Eztrial Programming - Patient Management Basics
TR-IIS-10-005 User Guide of the eztrial (beta) Clinical Trial Information Management System Yi-Ru Cian, Chung-Tsuo Lin, Hong-Yi Chen, Chia-Hui Chang, Yi-Fang Lee, and Chun-Nan Hsu June, 15 2010 Technical
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
FACULTY STUDENT MENTORSHIP PROGRAM. A Thesis. Presented to the. Faculty of. San Diego State University. In Partial Fulfillment
FACULTY STUDENT MENTORSHIP PROGRAM A Thesis Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Pooja
Managing User Accounts and User Groups
Managing User Accounts and User Groups Contents Managing User Accounts and User Groups...2 About User Accounts and User Groups... 2 Managing User Groups...3 Adding User Groups... 3 Managing Group Membership...
PRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
Work with PassKey Manager
Work with PassKey Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and logos of Blackboard, Inc. All other
Social Media in the Process Automation Industry
Social Media in the Process Automation Industry Distributed Software Development Design Document Version 0.1 In co-operation with: Title: Social Media in the Process Automation Industry Product name: ABBConnect
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Oracle Fusion Middleware User s Guide for Oracle Approval Management for Microsoft Excel 11gRelease 1 (11.1.1.7.2)
Oracle Fusion Middleware User s Guide for Oracle Approval Management for Microsoft Excel 11gRelease 1 (11.1.1.7.2) July 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Disclaimer
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
Core Filtering Admin Guide
Core Filtering Admin Guide 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com Table of Contents Login... 3 Overview... 3 Quarantine...
Introduction to HP ArcSight ESM Web Services APIs
Introduction to HP ArcSight ESM Web Services APIs Shivdev Kalambi Software Development Manager (Correlation Team) #HPProtect Agenda Overview Some applications of APIs ESM Web Services APIs Login Service
APEX ONLINE TRADING. Online.ail-bd.com:8080. User Manual
APEX ONLINE TRADING User Manual This manual is a guide book for the users who want to use Online Market Order system for share trading. Through this web application software, users can submit their desired
Getting started. What you need
Welcome to the Lectora LMS Express Publisher Information Center This Information Center was designed so that you can quickly find the information you need and continue adding and completing content. The
IBM Information Server
IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
SelectSurvey.NET User Manual
SelectSurvey.NET User Manual Creating Surveys 2 Designing Surveys 2 Templates 3 Libraries 4 Item Types 4 Scored Surveys 5 Page Conditions 5 Piping Answers 6 Previewing Surveys 7 Managing Surveys 7 Survey
