CS411 Software Architecture Design Final Project Group 10 Customer Relationship Management System
|
|
|
- Nelson George Newman
- 10 years ago
- Views:
Transcription
1 CS411 Software Architecture Design Final Project Group 10 Customer Relationship Management System Ali Ozcan Fuat Basik M. Yusuf Ertekin M. Emre Nevayeshirazi Customer Relationship Management System
2 Table of Contents Table of Figures Introduction Case Description Software Architecture Design Process Requirement Analysis Stakeholders Textual Requirements Use Cases Textual Use Cases Architectural Scenarios Prototypes Technical Problem Analysis Stakeholder Requirements Computer Science Problems Mathematical Problems Quality Requirements Problem Representation for Important Problems Domain Analysis Software Architecture Design Top Level Context Diagram Module Views Decomposition View Decomposition View Context Diagram Decomposition View for Mezgit CRM Uses View Uses View Context Diagram Uses View for Mezgit CRM Generalization View Layer View and Context Diagram for Layer View Aspect View Data Model View Component and Connector Styles Blackboard View
3 10.2. Three Tier View Pipes and Filters View Cloud View Allocation Views Deployment View Deployment View Context Diagram Deployment View for Mezgit CRM Install View Work Allocation View Software Architecture Evaluation Scenario Based Architecture Analysis Method Description of the Candidate Architecture Development and Prioritization of Scenarios Scenario Evolution Reveal Scenario Interactions Overall Evaluation Architecture Trade-off Analysis Method Conclusion References
4 Table of Figures Figure 1 Use Case Diagram Figure 2 Use Case Diagram of Administrator Figure 3 Use Case Diagram of Company User Figure 4 Use Case Diagram of Customer Figure 5 Use Case Diagram of Moderator Figure 6 Main Screen Mockup Figure 7 Opportunities Screen Mockup Figure 8 Reports Screen Mockup Figure 9 Software Architecture Design Figure 10 Top Level Context Diagram Figure 11 Decomposition View Context Diagram Figure 12 Decomposition View Figure 13 Context Diagram for Uses View Figure 14 Uses View Figure 15 Generalization View Figure 16 Layer View and Context Diagram for Layer View Figure 17 Aspect View Figure 18 Data Model Style Figure 19 Blackboard View Figure 20 Three Tier View Figure 21 Pipes and Filters View Figure 22 Cloud View Figure 23 Context Diagram for Deployment View Figure 24 Deployment View Figure 25 Install View Figure 26 Work Allocation View Figure 27 Candidate Architecture
5 List of Tables Table 1 Sub-Problem Table Table 2 Overall Knowledge Sources Table 3 Overall Knowledge Source Evaluations Table 4 Security Knowledge Source Table 5 Security Knowledge Sources Evaluation Table 6 User Interface Sources Table 7 User Interface Sources Evaluation Table 8 Data Storage Sources Table 9 Data Storage Sources Evaluation Table 10 Cloud Computing Sources Table 11 Cloud Computing Sources Evaluation Table 12 Business Forecasting Sources Table 13 Business Forecasting Sources Evaluation Table 14 Reliability Sources Table 15 Reliability Sources Evaluation Table 16 Consistency Sources Table 17 Consistency Sources Evaluation Table 18 Solution Domain Concepts Table 19 Uses View Matrix Representation Table 20 Developments and Prioritization of Scenarios Table 21 Scenario Evolution Table 22 Reveal Scenario Interactions Part Table 23 Reveal Scenario Interactions Part Table 24 Utility Table
6 1. Introduction Customer Relationship Management (CRM) software solutions allow a company to manage the relationships company have with its customers, using a combination of people, processes and technology.[2] It helps companies to learn more about their customers and customers behavior so they can develop stronger relationships that last longer with the customers. Key stability in today s dynamic marketplace is to attain and retain customers. As it is in the past, companies cannot hold in the market by only offering some product or service to their customers. In addition to these, companies must have good relationship with their customers in order to have long-term relationships with them. Besides, while keeping existing customers, getting new customers is an essential issue in today s business world. Therefore, satisfying customer needs become a vital issue for companies. In order to solve this problem, Customer Relationship Management strategy must be adapted by companies. Customer Relationship Management is a company strategy that is essential for companies to reduce costs and increase efficiency while having good relationships with customers. The CRM approach can be automated as CRM computer software. CRM software should be able to aid companies in terms of marketing, sales, customer support and technical support. To provide these features CRM software brings information from all data sources within an organization and sometimes even from outside the organization [1]. This is essential for companies, since according to these data correct decisions can be taken to meet customer needs. This helps companies to develop stronger relationships with customers. Remaining parts of document focuses on the case description, software architecture design process, requirement analysis, technical problem analysis, domain analysis, top level context diagram, module views, component and connector views, allocation views and evolution of software architecture. 6
7 2. Case Description Increasing technology has caused an exponential rate growth by 2003 and total amount of commerce conducted over web had top $3 trillium [3]. Thanks to electronics business, merchants can get to market faster with new products and services. This fastening at the marketing has increased number of customer and also it increased complexity of customer relationships. This complexity not only changed also way of companies to market their products/services but also created new problems for the companies waiting to be solved. Customer Relationship Management (CRM) systems are mainly designed for the companies, therefore, system is designed to solve companies problems and provide solutions to their needs. To have a single problem statement, it will be good to mention most common problems that companies face in this manner. These problems can be listed as: Having products or services but having problems to reaching to target market. Not having a particular way to market products or service to the prospect customers. Unsatisfied customers who not buy service or products from same company again. [3] Following need of the companies also created the need of the CRM systems: Need to simplicity and ease of integration. Need to remote access to company data. Need to mobile access to company data. Need to integrated analytics. Need to list of data management. Need to flexibility and customization. Need to leading generation and following up tracking. Problems and needs listed above describe the current situation of the market and companies and they show why we need CRM systems. 7
8 3. Software Architecture Design Process Software architecture design process consists of three essential parts. These are Technical Problem Analysis, Solution Domain Analysis and Alternative Space Analysis. To combine these three with the Mezgit, it is good to mention these steps one by one. Technical Problem Analysis: Technical problem analysis is a systematic process that is conducted to define what the essential problems of the system are. After finding the essential needs of the system, it will be possible to define problems, identify subproblems, specify sub-problems and prioritize them. So we can say that, technical problem analysis will create a link from requirements to the technical problems. In the Mezgit to analyze problems technically, analyze of the domain is a necessity. Since CRM systems requires knowledge at marketing and business areas, technical problem analysis of these system will be depend on mostly on the domain analysis. During these analysis steps, our problem description and sub-problems will help to define our domain scope and domain analyze will help to define problem and sub-problem descriptions. There will be iteration between these two steps and at the end of the technical problem analysis technical problems and sub-problems of the project will be defined. Solution Domain Analysis: Solution domain analysis is the systematic activity of collecting, organizing and storing domain knowledge. It will include a solution concept independent from the requirements. After the technical problem analysis, in other words after reaching technical problem definition and also technical subproblems, for each of these problems domain scope will be defined. With the help of this scope domain knowledge sources will also defined. In the Jobs Project these sources will be mainly domain literature and existing systems. For the each subproblem solution domains will be defined and prioritized, for each domain knowledge source will identified and prioritized, from each knowledge source domain concepts will be extracted and solution domain concepts will structure and refined. In other words all the technical problems and sub-problems will be mapped to the domain. Alternate Space Analysis: While doing domain analysis, alternate solutions also will be determined and in the case using one solution creates a conflict with any of other solutions, alternative solution will be used. Not any extra work will be done for this part but during the domain analysis, alternate space analysis also will be taken into account. 8
9 4. Requirement Analysis 4.1. Stakeholders End Users System Administrator: Responsible for general usage of the system. Shapes the CRM system through its life with no permissions. Moderator: Is an instance of system administrator. Responsible for general usage of the system but with lower permission. Company User: Responsible for general usage of the system. CRM Customer: Responsible for general usage of the system. Customer: Pays for the system and ensures its delivery. Developers Database Administrator: Involved in many aspects of the data stores, including database design, data analysis, data modeling and optimization, installing of the database software, and monitoring and administration of database security. Implementer: Responsible for the development of specific elements according to designs, requirements, and the architecture. Integrator: Responsible for taking individual components and integrating them according to the architecture and system designs. System Engineer: Responsible for design and development of system components in which software plays a role. Tester: Responsible for the test and verification of the system or its elements against the formal requirements and the architecture. Architect: Responsible for the development of the architecture and its documentation. Conformance Checker: Responsible for assuring conformance to standards and processes to provide confidence in CRM Products suitability. Deployer: Responsible for accepting the completed system from the development effort and deploying it, making it operational, and fulfilling its allocated business function. Designer: Responsible for systems and design downstream of the architecture, applying the architecture to meet specific requirements of the parts for which they are responsible. 9
10 Evaluator: Responsible for conducting a formal evaluation of the architecture against some clearly defined criteria. Maintainer: Responsible for fixing bugs and providing enhancements to the system throughout its life. Project Manager: Responsible for planning, sequencing, scheduling and allocating resources to develop software components and deliver components to integration and test activities Textual Requirements System Administrator System should be able to allow administrator to add new users to the system. System should be able to allow administrator to remove users from system. System should be able to allow administrator to modify existing users. System should be able to allow administrator to create new users groups to the system. System should be able to allow administrator to assign moderators to user groups. System should be able to allow administrator to set permission of groups. System should be able to allow administrator to change permission of groups. System should be able to allow administrator to remove moderators from user group. System should be able to allow administrator to add new products to the system. Moderator System should be able to allow administrator to remove products from system. System should be able to allow administrator to modify product information. System should be able to allow administrator to create goals for company. System should be able to allow administrator to modify existing goals. System should be able to allow administrator to delete existing goals. System should be able to allow administrator to assign goals to moderators. System should be able to allow moderators to add users to their own group. System should be able to allow moderators to remove users from their own group. 10
11 System should be able to allow moderators to modify users from their own group. System should be able to allow moderators to assign goals to users under their control. Company User System should be able to allow company users to should be able to create new contacts. System should be able to allow company users to modify contacts created by them. System should be able to allow company users to delete contacts created by them. System should be able to allow company users to view data about contacts created by them or other users. System should be able to allow company users to create opportunities from their contacts. System should be able to allow company users to send individual to their or other user s contacts. System should be able to allow company users to send mass to their or other user s contacts. System should be able to allow company users to create accounts on system for their contacts. System should be able to allow company users to delete accounts of contacts that are added system by them. System should be able to allow company users to export contacts as an Excel file. System should be able to allow company users to create new leads. System should be able to allow company users to modify leads created by them. System should be able to allow company users to delete leads created by them. System should be able to allow company users to view data about leads created by them or other users. 11
12 System should be able to allow company users to convert their leads to contacts. System should be able to allow company users to create opportunities from their leads. System should be able to allow company users to send individual to their or other user s leads. System should be able to allow company users to send mass to their or other user s leads. System should be able to allow company users to export leads as an Excel file. System should be able to allow company users to create appointments on Calendar. System should be able to allow company users to delete appointments on Calendar. System should be able to allow company users to modify appointments on Calendar. System should be able to allow company users to comment on their appointments or other company user s appointments. System should be able to allow company users to add activities to the system. System should be able to allow company users to remove activities from the system. System should be able to allow company users to modify their activities. System should be able to allow company users to view activities that are created by them or by other company users. System should be able to allow company users to comment on activities that are created by them or by other company users. System should be able to allow company users to create folders. System should be able to allow company users to delete folders. System should be able to allow company users to modify folders information. System should be able to allow company users to add documents to system. System should be able to allow company users to remove their documents. System should be able to allow company users to assign their documents to folders. 12
13 System should be able to allow company users to associate documents with their contacts if contact has system account. System should be able to allow company users to share their documents with other users. System should be able to allow company users to view and download documents that are created by them or other users. System should be able to allow company users to create opportunities. System should be able to allow company users to remove opportunities created by them. System should be able to allow company users to modify opportunities created by them. System should be able to allow company users to export opportunities as Excel File. Contact Accounts System should be able to allow contacts to view and download the documents associated with them. System should be able to allow contacts to comment on documents associated with them. System should be able to allow contacts to delete their comments from documents associated with them. System should be able to allow contacts to add comments about product. System should be able to allow contacts to modify comments about product. System should be able to allow contacts to delete their comments about product. System should be able to allow contacts to enter their request to the system by filling request form. System should be able to allow contacts to enter their complaints to the system about product by filling complaint form. 13
14 4.3. Use Cases In a CRM system, system administrator has the highest authorization among all stakeholders. Moderator is an instance of system administrator; it has a bit less authorization. Company user is an ordinary user which has rarely no permissions among them. Among these users, user capabilities go up from company user to system administrator. Therefore, instead of drawing use-case diagrams separately from user to user. It is shown that in a single figure. In the following page Use Case Diagram can be found. 14
15 Figure 1 Use Case Diagram 15
16 Here are the separate use case diagrams for each user. Figure 2 Use Case Diagram of Administrator Administrators have the cardinal rights on Mezgit system. They are responsible base operations about all Mezgit s users. They manage existence of users and determine user groups and their permissions according to user information. They determine goals and assign them to moderators. Administrators have important roles on Mezgit because they have permission to do all operations in system. 16
17 Figure 3 Use Case Diagram of Company User Company users are mostly interested with contacts and their operations. In addition, they are responsible to analyze leads and get possible opportunities from leads. They manage activities on the system and manage contacts with workers by managing appointment and documents. 17
18 Figure 4 Use Case Diagram of Customer Customers are highly interested with products information and their qualities. They have right to make complain about a product to inform company to fix it. In addition, they can request for a new product so that company can get feedback from the field. They check out related documents and make comment on them. 18
19 Figure 5 Use Case Diagram of Moderator Moderators are highly responsible on their groups that are assigned them by administrator. They can manage all operations related with their group. Although, moderator seems likely be to do only two operations, they can do also company user, and customer operations because of prioritization feature of Mezgit Textual Use Cases Use Case Name: Assign moderator to user group. Participating Actors: Administrator: Actor who has most permission to use system. Entry Condition: Administrator right clicks on a user group and selects Assign moderator. Flow of Events: 1-The end user right clicks on a user group. 2-Options related to user group shows up. 3-He selects Assign moderator. 4-List of existing moderators will appear. 5-He selects moderator that he wants to assign for user group. Exit Condition: The use case is terminated when administrator clicks Apply. Special Requirements: At least one moderator should exist in system. 19
20 Use Case Name: Assign goals to moderator. Participating Actors: Administrator: Actor who has most permission to use system. Entry Condition: Administrator right clicks on one moderator. Flow of Events: 1-Administrator right clicks on one moderator. 2-Options related to moderator show up. 3-He selects Assign goal. 4-List of existing goals will appear. 5-He selects goal that he wants to assign for moderator. Exit Condition: This use case ends when administrator clicks Apply. Special Requirements: There should be at least one goal in system. Use Case Name: Assign goals to group member. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Entry Condition: User right clicks on one group member. Flow of Events: 1-User right clicks on one group member. 2-Options related to group member show up. 3-He selects Assign goal. 4-List of existing goals will appear. 5-He selects goal that he wants to assign for group member. Exit Condition: This use case ends when user clicks Apply. Special Requirements: There should be at least one goal in system. Use Case Name: Convert lead to contact. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Entry Condition: User opens list of leads (possible contacts). 20
21 Flow of Events: 1-User opens list of all leads. 2-He right clicks on lead that he wants to convert to contact. 3-Options related to lead show up. 4-He selects Convert it to contact. 5-Selected lead automatically moves to contact list. Exit Condition: This use case ends when user clicks Convert it to contact. Special Requirements: There should be at least one lead in system. Use Case Name: Create opportunity from lead. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Entry Condition: User opens list of leads. Flow of Events: 1-User opens list of all leads. 2-He right clicks on lead that he wants to create opportunity related to it. 3-Options related to lead show up. 4-He selects Create opportunity. 5-A form shows up. 6-He fills up the form with required information about opportunity. 7-New opportunity related to lead is added to opportunity list. Exit Condition: This use case ends when user clicks Apply on form. Special Requirements: There should be at least one lead in system. Required fields of the form must be filled. Use Case Name: Export contact list as an Excel file. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Entry Condition: User right clicks on empty space of contact list. 21
22 Flow of Events: 1-User opens list of contacts. 2-He right clicks on empty space of contact list. 3-Options related to contact list show up. 4-He selects Export contact list. 5-He selects Excel option. 6-Directory selection screen shows up. 7-He enters directory that he wants to save excel file. Exit Condition: This use case ends when user clicks Save. Special Requirements: There should be free space on directory that user wants to save on. There should be at least one contact. Use Case Name: Associate document with contact. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Entry Condition: User creates new document. User right clicks on existing document. Flow of Events: 1-User selects Add new document 2-A form shows up. 3-User fill require fields of form. 4-If he prefers to associate document with contact at the creation time, he clicks Associate with contact option. 5-Contact list shows up. 6-He selects contact that he wants to associate document with. 7-User right clicks on existing document. 8-Options related to document show up. 9-He selects Associate with contact. 10-Contact list shows up. 11-He selects contact that he wants to associate document with. Exit Condition: This use case ends when user clicks Apply. Special Requirements: There should be at least one contact in system. 22
23 Use Case Name: Send mass to contacts. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Entry Condition: User clicks send . Flow of Events: 1-User clicks send screen shows up. 3-He selects all contacts for receiver. 4-He writes subject. 5-He writes mail. Exit Condition: This use case ends when user clicks Send. Special Requirements: There should be at least one contact in system. Use Case Name: Make request for a product. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Customer: Actor who has account on system as a contact. Entry Condition: User clicks on Make request. Flow of Events: 1-User clicks on Make request. 2-Request form shows up. 3-He writes subject of the request. 4-He writes name of the product that he request. 5-He writes description of product. Exit Condition: This use case ends when user clicks Send. 23
24 Use Case Name: Make complaint about product. Participating Actors: Administrator: Actor who has most permission to use system. Moderator: Actor who is responsible for a specific group. Company user: Actor who is an ordinary company employee. Customer: Actor who has account on system as a contact. Entry Condition: User clicks on Make complaint. Flow of Events: 1-User clicks on Make complaint. 2-Complaint form shows up. 3-He writes name of the product that he wants to complaint about it. 4-He writes reasons of the complaint. Exit Condition: This use case ends when user clicks Send Architectural Scenarios Adding a new employee to CRM Berk Arslan is recent employee of a company. His CRM account is going to be open. System administrator Abidin Berkay Simsek will open a CRM account for Berk. Abidin opens a web browser, then types the Mezgit CRM web service. He login to the system with user-id and password. He creates a new account. Then, administrator fills the required fields including name, surname, date of birth, date of graduation, level of education and password according to Berk s information. Then he finishes to adding Berk to the system. Adding new employee to a group: The company has a new employee named Berk Arslan. He is assigned to a software group. The group has a CRM group and Berk needs a membership to put his works to group. System administrator System administrator Okan Cetin will open a CRM account for Berk. Okan opens a web browser, and then types the Mezgit CRM web service. He login to the system with user-id and password. Okan Cetin goes to group tab and selects the group that Berk will be involved. After that, Berk Arslan gets his membership in that group. 24
25 New goal is assigned to Berk Arslan: Berk Arslan s group leader Yagiz Salor assigns him a new goal. Technical Requirement Analysis report needs to be done and group leader need to assign it. Yagiz opens a web browser, and then types the Mezgit CRM web service. He login to the system with user-id and password. He adds a new goal by using appropriate tabs at user interface. After that, he fills the goal description, deadline and selects Berk from employee list. 25
26 4.6. Prototypes Figure 6 Main Screen Mockup Figure 6 Main Screen Mockup is the main screen of Mezgit CRM system. There is a dashboard which shows the recent graphs about the company including users logged in, completed activities and information added to the company. In below of these graphs, Task segment appear. In task segment, there exists no overdue task right now. Existing tasks can be seen by selecting type of showing them in combo box. In addition, new task can be assigned to the company just by hitting the add task button. Below task segment, calendar appears. In calendar segment, user can see events and meetings. By selecting scheduled meetings and requested meetings, user can do appropriate work that is needed. Hitting the new event button, user can add new 26
27 events or requested meetings to the system. Of course, selecting new meeting date from calendar picker is necessary. Figure 7 Opportunities Screen Mockup Figure 7 Opportunities Screen Mockup company users can see existing opportunities. In this figure, opportunities are only auctions which are open some government based companies and Intel and IBM corporations. For each opportunity, there exist opportunity owner, opportunity name, and opportunity closing date, stage of opportunities and lastly, probability of getting a specific auction. Appropriate user can add new opportunities to the system. 27
28 Figure 8 Reports Screen Mockup Figure 8 Reports Screen Mockup shows the report tab of the Mezgit CRM system. In this tab, reports that are added by users can be seen. On the left side, folders group reports exist. On the right hand side, for a specific folder, written reports can be seen. User can sort these reports according to its name and date. 28
29 5. Technical Problem Analysis 5.1. Stakeholder Requirements Problem 1: How to do manage different user types? Problem 1.1: How to do authorization: Users of the system should be able to login and authorize into system. That is an essential technical problem that needs to be solver for our system. Problem 1.2: How to define access rights with respect to user types? 5.2. Computer Science Problems Problem 1: How to Store Data? Problem 1.1: How to store textual data: Most of the data that is going to be stored in our application is a textual data such as contacts, their properties and so on. This data is very crucial for our system and effective way to store such data should be investigated. Problem 1.2: How to store information persistently: Problem 1.3: How to store files: In addition to textual data, files need to be kept in our system. Effective and easy way for to do so. Problem 2: How to design user interface? Problem 2.1: How to define ergonomic user interface: The CRM System that we are designing has lots of important features and properties. Therefore, to be easy to use and provide effectiveness to program users, the user interface must be ergonomic enough. Problem 2.2: How to define different user interfaces for different user types? Problem 2.3: How to display data asynchronously? Problem 3: How to provide security? Problem 3.1: How to protect user data from being stolen? Problem 3.2: How to provide security of communication and private data? 5.3. Mathematical Problems Problem 1: How the CRM system optimization should be? Problem 2: What is the expected cost for the system? Problem 3: How to analyze data for forecasts? 29
30 5.4. Quality Requirements Problem 1: How to achieve consistency? Problem 2: How to provide reliability? Problem 3: How to provide security? Problem 4: How to provide safety? Problem 5: How to provide reliability? Problem 6: What should be the robustness of the system? Problem 7: What are the performance requirements? Problem 8: What are the concepts used to increase reusability? Problem 9: What are the priorities? 5.5. Problem Representation for Important Problems Name: How to design architecture for an Internet based application, which can store and exchange information between end users in network environment? Description: Mezgit CRM software will be a web based database application. Unlike desktop applications there are many different and important concerns in web application. Web applications provide better way to exchange information between to end-users of the system. Hence, good architecture is needed for Mezgit System to cope with problems. Initial state: The Mezgit can best be compared with CRM sites of today like Microsoft dynamic CRM online. The storage capacity is not as large as it will be for the Mezgit the same can be said for the connectivity aspects, initial systems are only compatible with computers. Desired state: The Mezgit will be connectable in-home, at-office, on-the-move, that can be used any environment like mobiles, tablets which user can be online. Therefore, Mezgit will make use of cloud computing services. Urgency/Priority: Very crucial. (1) Type of Problem: Stakeholder Requirement Solution Domain: Cloud Computing Name: How to store content? Description: CRM systems are all about storing data and using this data effectively to provide better way to cope with today s business problems. Therefore, this technical problem needs to be analyzed and solved in Mezgit CRM System. 30
31 Initial state: Most of the today s CRM systems use classical client/server architecture. However, deployment, maintaining and administration of this classical approach are important problems in today s IT world. Desired state: The Mezgit will use cloud database services to store its content. This will enable developers to focus on application itself instead of building, administering and maintaining databases. Through cloud database Mezgit will be easily adjustable in terms of storage. Urgency/Priority: Very crucial. (1) Type of Problem: Computer Science Problem Solution Domain: Storage Name: How to display data asynchronously? Description: HTTP protocol is designed in a request/response manner. Therefore, if data is not transferred between client and server asynchronously, the whole web page need to be refreshed and updated. This causes traffic in network and which is a problem for huge systems. Besides, for use friendly interface, refreshing whole page is not a good idea. Hence, asynchronous transfer needs to be used as much as possible. Initial state: Although most of the CRM solutions try to display data like regular desktop application, they need to be improved. Desired state: The Mezgit will use AJAX technology as much as possible to provide asynchronous communication with database. This will make Mezgit user- friendly and easy to use. Therefore, using AJAX will reduce the unrequired information exchange between end-user and server. Urgency/Priority: Important but system can run without it. (2) Type of Problem: Computer Science Problem Solution Domain: Data Transfer Name: How to design user interface? Description: User interface is important for any web application. Good user interface is required for end-users to use system effectively. 31
32 Initial state: Today s CRM systems try to make use of newest technologies such as CSS 3.0 and HTML 5 to provide better user interface to users. However, there are some problems that need to be solved. For instance, Microsoft Dynamics CRM runs on Internet Explorer only. Desired state: To cope with user interface problems, Mezgit will be designed and optimized for common web browsers such as Safari, Firefox, Chrome and Internet Explorer. Mezgit will make use of newest technologies such as CSS 3.0 and HTML 5. Urgency/Priority: System can run live without it. (2) Type of Problem: Computer Science Problem Solution Domain: User Interface Name: How to do manage different user types? Description: System administrator, moderator and company user are the different user types which can interact with the Mezgit CRM. These user types have all different authorization levels and capabilities. Mezgit CRM system should handle this change appropriately. Initial State: Current CRM systems have one different type of user which is only end user. However, it is difficult to use CRMs with single user type. Desired State: Mezgit CRM system will have four different types of users which are system administrator, moderator, customer and company user. These all are have different privileges. Urgency/Priority: Priority of this problem is crucial. Since four user types can access to the system. Managing user types must be done in early phases. (1) Type of Problem: Stakeholder, Computer Science Sub-Problems: How to do authorization How to define access rights with respect to user types? Solution Domain: Authorization Name: How to provide security? Description: In order to serve system with no problem, security issues should be solved. In addition to this, there exist some features like instant messaging and 32
33 ing; therefore, user privacy should be protected. Therefore, Mezgit CRM systems reliability will be very high. Initial State: It is possible to break security systems of CRM machines because the system is very complex and a crank might occur at sometime. For instance, web browsers allow people to write and run JavaScript code to address bar. It might lead some security problems. Desired State: Mezgit CRM system provides existing security protocols. In addition to this, Mezgit CRM will prevent some web browser based injections. Urgency/Priority: Priority of this problem is crucial. (1) Type of Problem: Computer Science Problem, Mathematical Problem Sub-Problems: How to protect user data from being stolen? How to provide security of communication and private data? Solution Domain: Security Name: How to define different user interfaces for different user types? Description: Mezgit CRM system has four different type of users. Each user has different privileges. Therefore, appropriate interface should be shown for each user. Initial state: While Mezgit CRM system provides different user interfaces for different users, it should be effective and ergonomic. However, cost of this design should not be high. Desired state: Mezgit CRM system will make use of role based authorization management. This role based authorization will also be used for determining what to display. Urgency/Priority: Important but not urgent (2). Type of Problem: Stakeholder Requirement, Computer Science Problem Solution Domain: User Interface 33
34 Name: How to forecast content? Description: Business forecasting is very important in todays marketing strategies. The reason is that patterns such as seasonality and trend play crucial role for companies. Besides, analyzing existing data is helpful for sales and marketing, which are the main concerns of CRM. Initial State: It is possible to compose a CRM system which stores only the detailed work information of the company. The system can also provide some graphical information about work done. Desired State: CRM system should provide necessary information to company and lead company to shape its future works. By looking at the works the company done and by analyzing them, CRM system should offer the optimal solution for a future work. Urgency/Priority: Priority of this problem is moderate. (2) Type of Problem: Computer Science Problem, Mathematical Problem Solution Domain: Business Forecasting 34
35 6. Domain Analysis Sub Problem Solution Domain Priority How to do authorization? Security 1 How to define access rights? Authorization 2 How to define ergonomic user interface? User Interface 2 How to define different users interfaces for different user types? User Interface 2 How to display data asynchronously? User Interface 3 How to protect user data from being stolen? Security 1 How to provide security of communication and private data? Security 1 How to store textual data? Data Storage 1 How to store information persistantly? Data Storage 1 How to store files? Data Storage 1 How to analyze data for forecasts? Business Forecasting 2 How to provide reliability? Reliability 1 How to achieve consisteny? Consistency 2 Table 1 Sub-Problem Table Overall Knowledge Sources ID Knowledge Source Form KS1 Microsoft Dynamics CRM 4.0 Existing System KS2 Salesforce CRM Existing System KS3 The CRM Handbook : A Business Guide to CRM Book KS4 CRM Fundamentals Book Table 2 Overall Knowledge Sources Overall Knowledge Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 Medium High Medium KS2 Medium High Medium KS3 High High High KS4 High High High Table 3 Overall Knowledge Source Evaluations 35
36 Security Knowledge Sources ID Knowledge Source Form KS1 Web Application Security, A Beginner s Guide Book KS2 Taking Steps to Ensure CRM Data Security Article KS3 Secure Communications: Applications and Management Book Table 4 Security Knowledge Source Security Knowledge Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High Medium Medium KS2 High High High KS3 High Medium Medium Table 5 Security Knowledge Sources Evaluation User Interface Sources ID Knowledge Source Form KS1 Tolga Çapın Domain Expert KS2 Designing Interfaces Book KS3 The Essential Guide to User Interface Design Book Table 6 User Interface Sources User Interface Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 Medium High Medium KS3 High Medium Medium Table 7 User Interface Sources Evaluation Data Storage Sources ID Knowledge Source Form KS1 Fazlı Can Domain Expert KS2 Microsoft SQL Azure Enterprise Application Book Development KS3 Information Storage and Management Book Table 8 Data Storage Sources 36
37 Data Storage Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 High High High KS3 High Medium Medium Table 9 Data Storage Sources Evaluation Cloud Computing Sources ID Knowledge Source Form KS1 Cloud Computing Architectures Book KS2 The Computing Storage HandBook Book Table 10 Cloud Computing Sources Cloud Computing Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 High High High Business Forecasting Sources Table 11 Cloud Computing Sources Evaluation ID Knowledge Source Form KS1 Cemal Deniz Yenigün Doman Expert KS2 Business Forecasting Book KS3 Successful Business Forecasting Article Table 12 Business Forecasting Sources Business Forecasting Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 High High High KS3 Medium High High Table 13 Business Forecasting Sources Evaluation 37
38 Reliability Sources ID Knowledge Source Form KS1 Software Reliability Methods Book KS2 Optimal Structure of Fault Tolerant Software Systems Article KS3 System Software Reliability Book Table 14 Reliability Sources Reliability Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 High High High KS3 High Medium Medium Table 15 Reliability Sources Evaluation Consistency Sources ID Knowledge Source Form KS1 Consistency in Software System Development Article KS2 Consistency is Key in Web Self-Service Article Table 16 Consistency Sources Consistency Sources Evaluation Source Objectivity Relevance Abstraction Quality KS1 High High High KS2 High High High Table 17 Consistency Sources Evaluation 38
39 Solution Domain Concepts Solution Domain Solution Domain Concepts Security Authorization User Interface Data Storage Data Process Cloud Computing Business Forecasting Reliability Consistency Encryption Manager Authorization Manager Web UI Services, Mobile UI Services Content Manager Transaction Manager Platform as a Service, Database as a Service, Software as a Service Forecast Manager Backup System Backup System Table 18 Solution Domain Concepts 39
40 7. Software Architecture Design Figure 9 Software Architecture Design The software architecture design can be also thought as a subsystem decomposition diagram. All the packages are stands for subsystem that have to be implemented. Among these subsystems, Backup System is designed to provide reliability and consistency. To understand Service Manager, we have to take it into account with database. Since Mezgit is a web-based project for the data processing cloud computing necessities should be included. Service Manager and Database are the concepts to provide cloud computing. Business Logic is the main part of the architecture. It can be thought as brain of the all system that makes calculations, provides communication and also manages the all other modules. Forecast Manager, is the part of the architecture to provide business forecasting with the help of the Business Logic. Authorization Manager is the part of the architecture that helps to define authorization for the different user types. UI Manager uses it to decide what type of user entered to the system and it will change the user interface accordingly this type. Encryption Manager is the security guard of the system. Since, mainly the companies will use the project; security and privacy are the most important topics of the system. 40
41 8. Top Level Context Diagram Figure 10 Top Level Context Diagram Top level context diagram of the system includes four other internal systems which are Business Logic, Web Services, Data Access Platform and Data Access Components. In addition to these, there are four external entities which interact with the system itself. These external entities are: Moderator is one of the external entities that interact with the system. System gives reports about moderator s group and moderator controls the users under their group through the system functions. Customer is also an external entity who views related reports and products through system. They get feedback and report from the system. Administrator controls the overall system as a external entity and system gives reports about overall system to administrator. Company User is also an external entity that controls their contacts and gets reports from the system about their contacts and so on. 41
42 9. Module Views 9.1. Decomposition View Decomposition View Context Diagram Figure 11 Decomposition View Context Diagram Decomposition view context diagram shows the environment of the Mezgit CRM system. Mezgit CRM has interactions with Customer, Company User, Moderator and Administrator. Following diagram shows the decomposition view of the context diagram independent from the environment. 42
43 Decomposition View for Mezgit CRM Figure 12 Decomposition View Decomposition view shows the is-part of relationship between the modules. Main motivation to use decomposition view is to apply divide and conquer approach to the architecture. In the decomposition view of the Mezgit, there are 9 different modules. The relationship between modules (i.e. uses, generalization...) is not the concern of the decomposition view but roles of the individual modules are. User Interface Module is the module that provides the user interface to the system. Encryption Module is designed to encrypt the data to provide privacy. Role of the web services is to provide communication between the underlying platform layers. Business Logic is the main module is the system, that process data, manages the other modules and provides the communication between database and the web services. Forecasting module is the main data processer which analyzes existing data and forecasts about the future products/services of the system with respect to collected data. Reporting module reports the data taken from business logic and forecast manager. Security is used to provide security to avoid unauthorized accesses. Transaction manager manages the transaction to improve performance and database module is the main database of the system. 43
44 9.2. Uses View Uses View Context Diagram Figure 13 Context Diagram for Uses View Context diagram for the uses view shows the uses relationship of the system with the environment. Since the external entities are the users, Mezgit CRM does not use any external entity but they use it. With this relationship, Mezgit interacts with the environment. 44
45 Uses View for Mezgit CRM Figure 14 Uses View The uses style shows the relationships between modules and sub-modules. This view is very helpful for implementing, integrating and testing the system. User Interface Services are related only interface. However, interface is not stable in Mezgit. UI changes depending on the user type. Therefore it uses Authorization Manager to change UI according to the user type. It also uses Business Logic to show business related context in UI. Business Logic plays a vital role in Mezgit. Therefore, it uses forecast manager to evaluate data for future forecasting. It also uses encryption manager to encrypt data that are instant messaging and ing. Business logic also uses database. It evaluates the data and provides it to other services. Backup system uses database in order to satisfy crash recovery. Database manager uses transaction manager because in Mezgit, there are significant amount of users. To handle users request stable transaction manager is necessary. 45
46 Authorization Manager UI Services Encryption Manager Forecast Manager Business Logic Service Manager Transaction Manager Database Backup System Table 19 Uses View Matrix Representation Authorization Manager UI Services Encryption Manager Forecast Manager Business Logic Service Manager Transaction Manager Database Backup System Design structure matrix also shows the uses relations among modules. Note that key 1 means module in row uses module in column. 46
47 9.3. Generalization View Figure 15 Generalization View Generalization view is used to show is-a relation between the entities. In other words we can define which entity inherits from the other one. Role is the entity showing the users of the system. There are 4 different roles at the Mezgit, Company User, Customer, Moderator and Administrator. Within these roles, Company user and Customer have the least significance and also they have the most limited authorization. But Moderator, which generalizes the Company User can perform every action that Company User can and also more. Likely, Administrator can perform every action that Moderator can do and more. Therefore there are the relationships Company User inherits from Role, Moderator inherits from Company User and Administrator inherits from Moderator. 47
48 9.4. Layer View and Context Diagram for Layer View Figure 16 Layer View and Context Diagram for Layer View Layered views is used to show allowed to use relationship between the layers. Layer is a collection of the software units, modules in the Mezgit. Figure 16 Layer View and Context Diagram for Layer View show the layer view of the Mezgit CRM and also environment. Since the only interaction with the 48
49 environment is with the users and users can only interact with presentation view, environment is at the top of the top level layer of the Mezgit CRM system. Mezgit project has 4 different layers. Top most one is the user interface layer, none of the other layers can use User Interface layer but it can use the Web Service Layer. Web Service layer contains web services logic and it can use the Application Layer. Application Layer contains the Encryption Manager module, Business Logic module and Forecasting Manager module. It uses the database layer. Down-most layer is the database layer which does not use any layer but used by Application Layer Aspect View Figure 17 Aspect View Aspect View is used for showing crosscutting of the system. Mezgit contains two aspects one of them is Transaction Manager which crosscut for any operation within a web annotation and the other one is Authorization which is crosscut for any method with annotation. 49
50 9.6. Data Model View Figure 18 Data Model Style There are four main user groups in our database. There are Customer, Employee, Moderator and Administrator. However, Employee, Moderator and Administrator are part of the company itself. Therefore, they are inherited from Company User entity. Besides, Company User entity and Customer entity are derived from User entity which holds the common attributes for all users of the system. Any user of the system can send messages to other users. Customers can buy products. Company Users can create Products. Employees are part of Group. Moderators own single Group. 50
51 Moderators are controlled by Administrator. Administrator can create other Company Users. Company Users of the system can create Documents. Company Users can create Opportunities. Users have Documents associated with them and they can edit these documents. These are the relations in our system. Type of the relationships such as one to many, many to many can be seen on the figure itself. 51
52 10. Component and Connector Styles Blackboard View Figure 19 Blackboard View Central data is stored in our database and it is the Blackboard component of the view. Two knowledge sources Forecast Manager and Reporting Manager gets data from Blackboard and solves different problems. Forecast Manager uses the existing data and information for making future forecasts for different problems. Reporting Manager uses data that creates reports and results from existing data such as sales and marketing information. As a result of their process, they update the blackboard. While these are happening our controller component constantly monitor blackboard. 52
53 10.2. Three Tier View Figure 20 Three Tier View Mezgit CRM is a project that runs as a web application. At the most of the web applications, three tier approach is applied. Therefore, in the architectural document of this project, three tier view is required. Mezgit CRM has three tiers, front-end, logic and back-end. Since the layers can be mapped to the tier, we have shown that view with the layers as well. Front-end tier contains presentation layer which is user interface services. Logic tier contains web service and application layer and back-end layer contains database layer. 53
54 10.3. Pipes and Filters View Figure 21 Pipes and Filters View Pipes and Filter view is used to show the data processing. In the Mezgit Project, company specific data is filtered by the business filter and output of that process is given to forecasting filter. With respect to product specific data, forecasting filter outputs the prediction for the future products of the system (for example it can guess expected sales for a future product that is considered to implement). This data is the input of reporting filter which converts it into an appropriate report Cloud View Figure 22 Cloud View Cloud View is a viewpoint that has been defined neither at the course slides nor in the course book. But since Mezgit CRM uses the cloud computing, we thought that it should be shown in the architectural document. Therefore, with respect to existing 54
55 viewpoints and features of the cloud computing, we have defined a new candidate viewpoint which is named as cloud view. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a metered service over a network. [4] To describe with the existing systems, we can say that every client at the system are publishers and subscribers as well. Therefore, we can say that cloud computing is a combination of peer to peer approach and also publish-subscribe approach. Figure 22 Cloud View shows the cloud-computing instance that named Azure and the client machine. Relation between these two is publishing and subscribing. Client machine can interact with the web front-end and this interaction stored at the cloud storage. 55
56 11. Allocation Views Deployment View Deployment View Context Diagram Figure 23 Context Diagram for Deployment View Context diagram for deployment view shows the external hardware to the Mezgit system. Normally users personal computers and mobile devices are taken into account but since the hardware of the different user type are not relevant to the implementation of the Mezgit CRM, it has shown as external nodes Deployment View for Mezgit CRM Figure 24 Deployment View Mezgit CRM consists of three hardware nodes which are Microsoft Azure Platform, Web Client Machine and Client Mobile Machine. Our main application and all 56
57 important modules run on Microsoft Azure Platform. This platform provides both a platform to run application and storage the store data. In addition to these, end users need to use computers the access the functionality of program. However, since our application is hosted on cloud, no software needs to be installed on user machine. Any web browser would be sufficient to access application. Lastly, user mobile devices can be used to access application Install View Figure 25 Install View Mezgit CRM is a web application and will be developed in Java Programming Language. Our install view has a Java Web Achieve file that manifests other Artifacts. External frameworks will be used during the development. Therefore, additional.jar files will be included in final install view..html files and other images together can be considered as separate artifact. 57
58 11.3. Work Allocation View Figure 26 Work Allocation View There are four development teams and two test teams allocated to work on Mezgit CRM project. User Interface will be designed by Design Team. Web Service modules, Encryption Manager and Security modules will be developed by Development Team B. Data related modules; Database and Transaction Manager will be developed by Database Team. Business Logic, Forecasting and Reporting modules will be developed by Development Team C. User Interface, Web Services, Encryption Manager, Security will be tested by Test Team A. Business Logic, Forecasting, Reporting, Database and Transaction Manager will be tested by Test Team B. 58
59 12. Software Architecture Evaluation In order to evaluate Mezgit CRM architecture, scenario-based analysis evaluation techniques are used. Mezgit CRM architecture are evaluated with scenario-based architecture analysis method and architecture trade-off analysis method Scenario Based Architecture Analysis Method To assess the impact of anticipated future changes, scenario based architecture analysis method is used Description of the Candidate Architecture Candidate architecture of Mezgit CRM is described below. Figure 27 Candidate Architecture Figure 27 Candidate Architecture shows the architecture of the system with respect to its domain model. 59
60 Development and Prioritization of Scenarios Priority Scenario Stakeholder 1 S1. Create a new bid starting on Jan 2012 Company User 2 S2. Change existing groups permissions System Administrator 3 S3. Consistent UI on different web Maintainer browsers 4 S4. Avoid unnecessary http request Maintainer 5 S5. Importing an external contact list to the End User, Company User system 6 S6. Export existing contacts to other End User, Company User products such as Outlook. 7 S7. Make minor modifications to the user End User, Company User interface 8 S8. Generate reports and forecasts End User, Company User documents that support Spreadsheet and Word 9 S9. Monitor activities of user System Administrator 10 S10. Port system to mobile-based devices Maintainer 11 S11. System recovery Maintainer 12 S12. System availability 24/7 System Engineer, End User Table 20 Developments and Prioritization of Scenarios Table 20 captures the scenarios that system must support according to their priorities. These scenarios represent tasks relevant to all stakeholders. 60
61 Scenario Evolution Scenario Description Direct/ Change Required Indirect 1 Create a new bid starting on Jan Direct Change an existing groups Indirect Database tables, Business Logic and permissions Authorization Manager components must be modified for supporting evolution. 3 Consistent UI on different web Indirect UI Services must be reorganized and browsers covered additional web browser support 4 Avoid unnecessary http requests Indirect AJAX support must be added to UI Services 5 Importing external contact list to Indirect This requires to changes to Business the system Logic 6 Export existing contacts to other Direct products such as Outlook 7 Make minor modifications to the Direct user interface 8 Generate reports and forecasts Direct documents that support Spreadsheet and Word 9 Monitor activities of user Indirect This requires to changes to Database and UI Services 10 Port system to mobile-based devices Direct 11 System recovery Direct 12 System availability 24/7 Direct Table 21 Scenario Evolution 61
62 Reveal Scenario Interactions Module Number of Changes Business Logic 2 Authorization Manager 1 UI Services 3 Database 2 Forecast Manager 0 Service Manager 0 Backup Manager 0 Table 22 Reveal Scenario Interactions Part 1 Component Direct Scenarios Indirect Scenarios Business Logic S1, S6 S2 Authorization Manager S2 UI Services S7, S10 S9, S3, S4, S5, S9 Database S1, S6, S8, S12 S2, S5, S9 Forecast Manager S8 S5 Service Manager S8 S5 Backup Manager S11 Table 23 Reveal Scenario Interactions Part 2 As it is seen in tables 22 and 23, semantically related scenarios affect the same architectural components. Scenario 5 and 9 affects the UI Services and Database. Therefore, cohesive component performs only one concern Overall Evaluation Most of the architectural problems are related to UI management in Mezgit CRM. CRM systems are used for lots of users. Therefore, reducing the HTTP requests is very crucial. In addition, to provide a simple system, consistent UI is very important. Therefore UI Services should robust. UI services should also provide allowing users to make minor modifications on UI. Therefore, it should be flexible. To provide all of these, an MVC pattern might be injected to UI Services. There might also some 62
63 database related problems may occur. Depending on the scenarios 2,5 and 9 ER diagrams and table structure might change. 63
64 12.2. Architecture Trade-off Analysis Method Architecture trade-off analysis method is used to understand consequences of architectural decision based on multiple attribute requirements. In addition, ATAM is used in order to understand the interaction between those quality attributes. Quality Attribute Scenarios Attribute Refinement Performance Transaction An administrator updates a company s response time information while the system is under peak load, and the transaction completes in less than 0.5 seconds. (H,M) An administrator updates a company s information while the system is under peak load, and the transaction completes in less than 0.5 seconds. (L,M) Throughput At peak load, the system is able to complete 400 normalized transactions per second. (H,M) Generating reports A user requests a report from the system which includes forecasting reports for company IBM in March 2013 while the system is under peak load, and report generating completes in less then 1.75 seconds (H,L) Data Latency Reduce storage latency on customer database to less than 200ms (H,H) Modifiability New Product No scenarios suggested Categories Change Cots Change web user interface in < 4 person-weeks (H,L) Availability H/W Failure Restart after disk failure in < 5 minutes (M,M) Network failure detected and recovered in < 1.5 minutes (H,M) 64
65 Quality Attribute Security Attribute Refinement Data Confidentiality Data Integrity Scenarios Customer database authorization works 99.9% of the time (L,H) Instant message and encryptions are secure 99.9% of the time (L,H) No scenarios suggested Table 24 Utility Table 65
66 13. Conclusion In this report, a Customer Relationship Manager named Mezgit has introduced. To do this, firstly, an introduction to CRM system has been written. After these problem of the current situation has mentioned and need for a CRM system explained. After that followed steps of the software architecture design process are explained. As the fourth step requirements of the system explained and with respect to them use cases, scenarios and prototypes are defined. Then, technical problem analysis and with the help of it domain analysis conducted. With the outcome of domain analyses, concepts defined, conceptual software architecture design model drawn. During these steps, most important lesson has learned is the importance of the technical problem analysis and domain analysis. Without having proper analysis of technical problem, it is understood that having a domain is impossible and after domain analysis, it is realized that redefining technical problem analysis is needed. So that it can be said that, there is an important iteration between technical problem analysis and domain analysis. And after having proper analysis and defining domain concepts, modeling the architecture is a clear process. In this project, after having collaboration between the project members, we thought that we can go through software architecture design before domain analysis. Then, we realized that is impossible to draw a correct model without domain analysis. Then we started domain analysis but with the leak of the technical problem analysis, we again could not do it. Then after spending long times at the technical problem analysis and domain analysis, we have figured out how to model software architecture. After modeling conceptual software architecture, starting with the top level concept diagram, module views, component and connecter views and allocation views have been defined, After then, by using Scenario Based Architecture Analysis and Architecture Trade-off Analysis Method, we have evaluated our architectural views and defined which changes should made at the architecture with the their prioritizations and also feasibility. At the end, this report became a complete software architectural document including conceptual architecture, top level context diagram, architectural views and also evaluation of it.
67 14. References [1] aspx [2]: crmarchitecture_whitepaperhpc.pdf [3] [4] 67
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
HP Business Process Monitor
HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal
This Deployment Guide is intended for administrators in charge of planning, implementing and
YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment
PROJECT MANAGEMENT SYSTEM
Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Results CRM 2012 User Manual
Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
BlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
branddocs Technology edocument Solutions V.1.0.2013 V.11.0.2013
branddocs Technology V.1.0.2013 V.11.0.2013 edocument Solutions Contents 1.- Branddocs' Development Technology 03 2.- Development Technology Features 04 3.- Technical Architecture 05 4.- Description of
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
AN CRM GUIDEBOOK. The complete guide to CRM & Officetrax
AN CRM GUIDEBOOK The complete guide to CRM & Officetrax Streamline your workflow. Work faster than ever before. Table of Contents 02 What is CRM? 03 Does your business need it? 04 Why Officetrax? 05 Vital
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
How is it helping? PragmatiQa XOData : Overview with an Example. P a g e 1 12. Doc Version : 1.3
XOData is a light-weight, practical, easily accessible and generic OData API visualizer / data explorer that is useful to developers as well as business users, business-process-experts, Architects etc.
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Embraiz CRM System User Guide
Embraiz CRM System User Guide Version Date Prepared By Remark V 1.0 2008-10-6 Lok shu V 2.0 2008-10-9 Yolanda Tang V 3.0 2008-12-11 Yolanda Tang Contents Preface... 4 About this user guide... 4 Audience...
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Custom Software Development Approach
Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
Anchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Software Requirement Specification for Web Based Integrated Development Environment. DEVCLOUD Web Based Integrated Development Environment.
Software Requirement Specification for Web Based Integrated Development Environment DEVCLOUD Web Based Integrated Development Environment TinTin Alican Güçlükol Anıl Paçacı Meriç Taze Serbay Arslanhan
Fixes for CrossTec ResQDesk
Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
1. Cloud Computer... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 4. Management... 5. 4.1. New Cloud computer...
Contents 1. Cloud Computer... 1 2. Login to ICT Marketplace Portal... 1 3. Dashboard... 2 4. Management... 5 4.1. New Cloud computer... 5 4.2. SMS authentication... 6 4.3. Remove Cloud computers... 7 4.4.
Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997
1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
Software Update Bulletin
Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking
FOREFRONT IDENTITY MANAGEMENT
FOREFRONT IDENTITY MANAGEMENT March 13, 2015 Page 2 Module One... 6 User Creation And Synchronization Process... 6 Agency Roles And Responsibilities... 7 Logging Into Forefront Identity Manager Portal
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
File Share Navigator Online 1
File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
SYSTEM REQUIREMENTS...
Contents INTRODUCTION... 1 BillQuick Online Setup Checklist... 3 SYSTEM REQUIREMENTS... 4 Hardware Requirements... 4 Software Requirements... 4 START-UP... 5 BILLQUICK ONLINE ACCOUNT... 5 BILLQUICK ONLINE
Software Architecture Document
Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural
Chapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
HP Business Service Management
HP Business Service Management Software Version: 9.25 BPM Monitoring Solutions - Best Practices Document Release Date: January 2015 Software Release Date: January 2015 Legal Notices Warranty The only warranties
HP Quality Center. Software Version: 10.00. Microsoft Word Add-in Guide
HP Quality Center Software Version: 10.00 Microsoft Word Add-in Guide Document Release Date: February 2012 Software Release Date: January 2009 Legal Notices Warranty The only warranties for HP products
ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...
TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...
BillQuick Web i Time and Expense User Guide
BillQuick Web i Time and Expense User Guide BQE Software Inc. 1852 Lomita Boulevard Lomita, California 90717 USA http://www.bqe.com Table of Contents INTRODUCTION TO BILLQUICK... 3 INTRODUCTION TO BILLQUICK
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Secure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
Please contact Cyber and Technology Training at (410)777-1333/[email protected] for registration and pricing information.
Course Name Start Date End Date Start Time End Time Active Directory Services with Windows Server 8/31/2015 9/4/2015 9:00 AM 5:00 PM Active Directory Services with Windows Server 9/28/2015 10/2/2015 9:00
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
MassTransit vs. FTP Comparison
MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Microsoft Dynamics CRM 2013 Applications Introduction Training Material Version 2.0
Microsoft Dynamics CRM 2013 Applications Introduction Training Material Version 2.0 www.firebrandtraining.com Course content Module 0 Course Content and Plan... 4 Objectives... 4 Course Plan... 4 Course
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Create e-commerce website Opencart. Prepared by : Reth Chantharoth Facebook : https://www.facebook.com/tharothchan.ubee E-mail : rtharoth@yahoo.
Create e-commerce website Opencart Prepared by : Reth Chantharoth Facebook : https://www.facebook.com/tharothchan.ubee E-mail : [email protected] Create e-commerce website Opencart What is opencart? Opencart
Desktop and Plugins from Vonage Business
Desktop and Plugins from Vonage Business Installation and User Guide The Vonage Business Desktop reinvents the way you interact with your phone service, giving you extra control and convenience to manage
Software Design Specification
GROUP 7 SEVEN SOFTWARE PROJECT: ONLINE SCHEDULING SYSTEM COMPANY: VIA MAGNA GOTHENBURG SWEDEN GROUP MEMBERS: IBRAHIM KRVAVAC ALI BAHALOO HORE SEYED SAMAD GHASEMI KUHAN LOH DANIEL ASOVIC Software Design
Advanced Digital Imaging
Asset Management System User Interface Cabin River Web Solutions Overview The ADI Asset Management System allows customers and ADI to share digital assets (images and files) in a controlled environment.
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services
Hands on Lab: Building a Virtual Machine and Uploading VM Images to the Cloud using Windows Azure Infrastructure Services Windows Azure Infrastructure Services provides cloud based storage, virtual networks
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
FileMaker Server 10 Help
FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo
Sage CRM. Sage CRM 2016 R1 Mobile Guide
Sage CRM Sage CRM 2016 R1 Mobile Guide Contents Chapter 1: Introduction to Sage CRM Mobile Solutions 1 Chapter 2: Setting up Sage CRM Mobile Apps 2 Prerequisites for Sage CRM mobile apps 3 Enabling users
The Role of the Software Architect
IBM Software Group The Role of the Software Architect Peter Eeles [email protected] 2004 IBM Corporation Agenda Architecture Architect Architecting Requirements Analysis and design Implementation
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
GARDEN STATE APARTMENTS LLC. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (FINAL MILESTONE)
GARDEN STATE APARTMENTS LLC. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (FINAL MILESTONE) GROUP #7: James Edward Bell Mark Dudek Michael DiCroce Curtis Hammell December 13, 2013 1 Table of Contents SECTION
Framework as a master tool in modern web development
Framework as a master tool in modern web development PETR DO, VOJTECH ONDRYHAL Communication and Information Systems Department University of Defence Kounicova 65, Brno, 662 10 CZECH REPUBLIC [email protected],
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
ScrumDesk Quick Start
Quick Start 2008 2 What is ScrumDesk ScrumDesk is project management tool supporting Scrum agile project management method. ScrumDesk demo is provided as hosted application where user has ScrumDesk installed
Polar Help Desk 4.1. User s Guide
Polar Help Desk 4.1 User s Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
One step login. Solutions:
Many Lotus customers use Lotus messaging and/or applications on Windows and manage Microsoft server/client environment via Microsoft Active Directory. There are two important business requirements in this
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Web Testing. Main Concepts of Web Testing. Software Quality Assurance Telerik Software Academy http://academy.telerik.com
Web Testing Main Concepts of Web Testing Software Quality Assurance Telerik Software Academy http://academy.telerik.com The Lectors Snejina Lazarova Product Manager Business Services Team Dimo Mitev QA
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
WatchGuard Dimension v1.1 Update 1 Release Notes
WatchGuard Dimension v1.1 Update 1 Release Notes Build Number 442674 Revision Date March 25, 2014 WatchGuard Dimension is the next-generation cloud-ready visibility solution for our Unified Threat Management
Redpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
Planning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
FileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
Intranet Website Solution Based on Microsoft SharePoint Server Foundation 2010
December 14, 2012 Authors: Wilmer Entena 128809 Supervisor: Henrik Kronborg Pedersen VIA University College, Horsens Denmark ICT Engineering Department Table of Contents List of Figures and Tables... 3
Izenda & SQL Server Reporting Services
Izenda & SQL Server Reporting Services Comparing an IT-Centric Reporting Tool and a Self-Service Embedded BI Platform vv Izenda & SQL Server Reporting Services The reporting tools that come with the relational
2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment Browser
User Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Bullet Proof: A Guide to Tableau Server Security
Bullet Proof: A Guide to Tableau Server Security PDF Guide Tableau Conference 2014 Bryan Naden & Ray Randall Tableau Server Security Hands On To begin the exercise we are going to start off fresh by restoring
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
ADMINISTRATOR GUIDE VERSION
ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
