Unisys Voter Registration and Managing Access to the Vote Dr. Barry Lurie March 30, 2001.

Slides:



Advertisements
Similar presentations
ICS 434 Advanced Database Systems
Advertisements

RSS 2000 v3 Product Presentation Live Recording and Streaming.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Virtual Ticketing Agents using Web Services and J2EE Advisor: Dr. Chung-E-Wang Date: 05/06/03 Naveen Repala.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
02/12/00 E-Business Architecture
Chapter 13 Physical Architecture Layer Design
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Data Storage and Data Processing Architectures The difficulty is in the choice George Moore, 1900.
Systems Integration IT 490
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Client/Server Architecture
Tiered architectures 1 to N tiers. 2 An architectural history of computing 1 tier architecture – monolithic Information Systems – Presentation / frontend,
Chapter 4 Database Management Systems. Chapter 4Slide 2 What is a Database Management System (DBMS)?  Database An organized collection of related data.
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Persistent Digital Archives and Library System (PeDALS) A Guide for Wisconsin State Agencies.
Data Processing Architectures The difficulty is in the choice George Moore, 1900.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Paul Wormeli Vice President, Business Development Criminal Justice and Intelligence Solutions PEC Solutions, Inc. Avoiding Obsolescence.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
Introduction to distributed systems Dr. S. Indran 23 January 2004.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Persistent Digital Archives and Library System (PeDALS) SC Department of Archives and History.
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 13: Physical Architecture Layer Design Alan Dennis,
Web-based E-commerce Architecture
IT Infrastructure for Business
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
Chapter 2: System Models. Objectives To provide students with conceptual models to support their study of distributed systems. To motivate the study of.
A Study of Wireless Virtual Network Computing Kiran Erra.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Cole David Ronnie Julio. Introduction Globus is A community of users and developers who collaborate on the use and development of open source software,
CIS 210 Systems Analysis and Development Week 8 Part II Designing Distributed and Internet Systems,
AIRLINES REVAMP 10/29/2013. Executive Summary Business Problem: The Airlines application is primarily used to sell, distribute and collect revenues for.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Chapter 13Oracle9i DBA II: Backup/Recovery and Network Administration 1 Chapter 13 Network Administration and Server-side Configuration.
Middleware IS 8030 – Integrated Computing Environments Dr. Hoganson Middleware What is middleware? A software interface glue that resides between the operating.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Web Services. Web Service: Simple definition : “ Service Offered On the Web “ Technically : “ A Web Service is a programmable application component that.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Elections - The ultimate time constrained project Marie Gregoire, PMP 1.
A Study of Wireless Virtual Network Computing
Living in a Network Centric World
Living in a Network Centric World
Systems Analysis and Design With UML 2
RSS 2000 v3 Product Presentation
Living in a Network Centric World
الانترنت والبريد الإلكتروني
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
LM 7. Mobile Network Overview
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Unisys Voter Registration and Managing Access to the Vote Dr. Barry Lurie March 30, 2001

Unisys Voter Registration The Voter Registration Activity needs to be able to do three things: Add people eligible to vote to the Voter Registration Rolls Remove people ineligable to vote from the Voter Registration Rolls – Felons, dead people, those who have moved away, etc. Manage the information on the active voters This is a database problem!

Unisys Today’s Voter Registration Technology Voter Registration Software Client Relationship Management Software Database Management and Replication Software – Data management security and data integrity Middleware Messaging (shared data across organizations) – Integration/exchange with DMV, DPH, ICJIS, etc. Networks (statewide), Distributed Connectivity, Internet Authentication techniques: Various Biometrics, Digital Certificates, etc.

Unisys Today’s Voter Registration Technology (con’t) Standards Requirements – Standard database with standard interfaces – Networking Standards – Etc. Architecture Requirements – N-tier – GUI interfaces Ease of Access – OCR/ICR, IVR, Data Entry, Web Access

Unisys Technology Barriers? Most important barriers are other than technology: Organizational barriers, money, time, integrated operational approaches Must address migration/integration requirements with legacy systems Must address Security - Accurate registration, verification of voters, confidence in protection of devices, networks Must address Connectivity - Access where it is needed (same day registration, open/early voting)

Unisys Technology Barriers? (con’t) Must address Capacity - Right number of systems at right place, network capacity for those dependent on network. Must address Redundancy - Internet, Increases in technological dependency creates redundancy risk Must address Cost – The system has to be affordable With enough planning, risk mitigation, and funding, technology barriers are not the major issues