New Capabilities of the Web Enabled User Interfaces

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

ADABAS to RDBMS UsingNatQuery. The following session will provide a high-level overview of NatQuerys ability to automatically extract ADABAS data from.
Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
CCNA 2 v3.1 Module 2.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Implementing High Availability
1 Chapter Overview Transferring and Transforming Data Introducing Microsoft Data Transformation Services (DTS) Transferring and Transforming Data with.
Remote access and file transfer Getting files on and off Bio-Linux.
February 2006Colby College ITS Using FTP. February 2006Colby College ITS Topics FTP Options at Colby For Mac Users For Windows Users.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
WinSCP  Tool for accessing files on beaglebone system.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Configuring and Deploying Web Applications Lesson 7.
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
Horizon Photo-mote. ability to access photographs and images stored online, with the aid of a wireless remote remote enables the user to identify and.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure services Unit-IV CHAP-1
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Ssh: secure shell.
HP LIM 3.0 Installation & Initialization process
Nicholas Hsiao Critical Log Review Checklist for Security Incidents – By ArcSight Logger For template guidelines or applying this.
Project Center Use Cases
Client/Server Databases and the Oracle 10g Relational Database
Module Overview Installing and Configuring a Network Policy Server
Uploading Files to the Remote Server Using Win_SCP Portable
Module 4 Remote Login.
Part 3 – Remote Connection, File Transfer, Remote Environments
Chapter 5: Switch Configuration
XWN740 X-Windows Configuring and Using Remote Access
Bomgar Remote support software
1Z0-477 VCE Questions
File Transfer Olivia Irving and Cameron Foss
Telnet/SSH Connecting to Hosts Internet Technology.
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Chapter 5: Switch Configuration
Multi-host Internet Access Portal (MIAP) Enhancement Guide
Routing and Switching Essentials v6.0
MODULE 7 Microsoft Access 2010
An Introduction to Computer Networking
JTLS-MSEL (MIL/MEL) John Ruck March 2008
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Chapter 5: Switch Configuration
Managing a Web Server and Files
Radoslaw Jedynak, PhD Poland, Technical University of Radom
JTLS 5.0 JTLS – Global Operations
IMovie sits at the center of the iLife suite, integrating iTunes, iPhoto, and iDVD to help create professional-looking films with music, titles, and effects. 
Presentation transcript:

New Capabilities of the Web Enabled User Interfaces John Ruck ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Agenda Automatic Supply Calculation. (5.0.1) Move Squadrons with Airbase. (5.0.1) Copy Orders Between Servers. (5.0.1) Information Assurance Changes. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Automatic Supply Calculations Re-implemented the stand-alone ASC as part of the DDS. Why? Reduce the amount of developer provided data. Eliminate having to do a download and upload Allow selecting which SUPs/TUPs to calculate. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Overview of Usage User can select units or prototypes from the tables. Calculations are performed. Results written back to the database. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Input Data (TUP/SUP) Tool calculates the basic load and then scales the reorder and stock object amounts. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Calculations (TUP/SUP) Combat system issuance. Daily normal consumption. Daily combat consumption. Maximum daily movement consumption. Normal ammunition usage Attack ammunition usage Normal fuel consumption. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Calculations (TUP/SUP) (cont.) Attack fuel consumption. Movement fuel consumption. One stock objective per day of combat for prototype owned SAM/AAA Make sure each prototype owned SSM has at least one weapon to fire. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Calculations (TUP/SUP) After calculation is complete Basic Load and Bring to Theater are set to the calculated value. Reorder Level and Stockage Objective are set based on the user input scale factors. The wet and dry carry and storage is increased if needed to ensure sufficient capacity. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Use of Unit Data Although units do not hold their own consumption data, chain of support and Unit owned targets can effect consumption. When multiple selected Units have the same prototype, the first unit is used. The assumption is that units with the same prototype will be in a similar level in the supply chain and have similar targets. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Input Data (Units) Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Additional Unit Calculations One stock objective per day of combat for unit owned/associated SAM/AAA Associated unit if any has priority One stock objective per day of combat for unit owned/associated SSM Associated unit if any has priority. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Additional Unit Calculations Home based squadron fuel. If Squadron has home base, the calculation is for the home base, otherwise for the Squadron. Full distance maximum sorties per day. Home base squadron weapon loads. Enough to support each load for the maximum sorties per day. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Additional Unit Calculations Supported units supply requirements for the days of support. For initial support units, add the bring to theater amounts. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

DDS – Automatic Squadron Moves. When moving a FARP, Airbase, or Naval Unit all Squadrons are moved to the same location. Any existing offsets are lost. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

New Tech Tool Copy Features Jose M. Torres ROLANDS & ASSOCIATES Corporation

Order Group And Map Slide Copy Tools Each copy utility is separated in its own tab of the Tech Tool Securely copy WHIP Order Groups and Map Slides over a network between scenarios Local host and remote host copying User interface allows simple gestures to perform copy Copy across single or multiple network file systems (NFS) Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Under The Hood Remote copies performed via Secure Shelling (SSH) Secure Copy (SCP) and secure file transfer protocol (SFTP) must be enabled on hosts (usually enabled by default when SSH is available) Local copies performed via standard copy command to improve copy speed – no need for remote connection Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation User Interface The two new copy utilities have a similar user interface Reads local scenarios and displays Order Groups and Map Slides on Tech Tool start Connection credentials only required when connecting to a remote host Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Executing Copy Copies executed via drag-n-drop gestures and via copy-n-paste keys Allows for single and multiple selection copy Can perform copies from left to right and right to left Tech Tool start scenario Drop-down list of available scenarios Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Copy Features Order Group Copy Can copy Order Groups to any WHIP of the same side Copies only permitted for similar base scenarios with equivalent Force Sides Map Slide Copy Can perform copy to any scenario Slides have an associated side but they can be shared from the copied-to WHIP Synapse and WHIP restart required after copies complete when they are running during the copy Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Copy Features Cont. Warning dialog provided when copying existing Order Groups or Map Slides Copying existing Order Groups or Map Slides will overwrite the existing files Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Error Handling Credential fields turn red to indicate entry is missing on connection attempt Messages pane displays message warnings and errors Authentication failure during remote host connection Unknown host provided File does not exist And other warnings and errors encountered during copy Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Information Assurance Changes Optional secure tunneling among services. Public Key Infrastructure login. (US CAC) Apache server status password. Apache access logging. Apache FIPS mode. (Federal Information Processing Standards) Ensure approved cryptology is used. Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation

Copyright 2017, ROLANDS & ASSOCIATES Corporation Questions Aug 2017 Copyright 2017, ROLANDS & ASSOCIATES Corporation