Www.SierraSystems.com FA 2 Handheld Project Fruit & Vegetables Program Commodity Inspection Division Washington State Dept. of Agriculture.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

P2 – Describe the purpose of different types of computer systems
1 iPAQ Accessories & Options Top Five HP iPAQ Extended Battery Extends the life of your iPAQ between charges. Always have a spare battery and never be.
Next Generation DECT R4 for Integral Enterprise Jörg Richter.
Which server is right for you? Get in Contact with us
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
Client Lunch & Learn (12:15). Association for Information & Image Management Nov Research Scanner Utilization.
Meraki Mobile Device Management
Personal Digital Assistants Palm Pilots and Beyond: A Brief Overview David V. Bloniarz USDA Forest Service Northeast Center for Urban & Community Forestry.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
1 The Wireless Network. 2 Agenda Brief Introduction A list of the products and solutions Why Sprint Next Steps / Q & A.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
A Guide to major network components
PRODUCT OVERVIEW MTC100 TETRA PDA. Bearer of choice for mission critical communications Same level of security, reliability & availability as on all TETRA.
1 Integrating ISA Server and Exchange Server. 2 How works.
A+ Certification Guide Chapter 10 Mobile Devices.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
NSBE – Houston Space Chapter Professional Toolkit Series: PDA Choosing the Right PDA Professional Toolkit Series NSBE – Houston Space Chapter.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
 Computer News  Office for the Ipad  July & August no meeting  Sept 19th  One meeting a month (3rd Wednesday)  Website & 
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
More than You Want to Know About Pocket PC’s. What is a Pocket PC?
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Mobile Computing: Security Issue Group 4 Members: 黃昱翔 梁振堃 郭雅恬 劉俊宏 王雋為 王瓊儀 李晏榕 黃筱涵 許椀淇.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Deploying and Managing Mobile Devices in the Enterprise.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Security Planning and Administrative Delegation Lesson 6.
Wireless Networks and the NetSentron By: Darren Critchley.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
An exploration on the use of Pocket PC and Wireless Network in Education Wong Wai Leung Wah Yan College, Kowloon.
Introduction to Computer and Computer Networking: Part I Xiangming Mu 9/16/2004.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
WEB SERVER SOFTWARE FEATURE SETS
Introduction TO Network Administration
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
User and Device Management
Windows Small Business Server 2003 R2 Powering Small Businesses.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Mobile/Web Enabled Project Management Ideas Do It Yourself Projects: MBProject Lite mbprojectweb.com.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Basharat Institute of Higher Education
Computer Information Systems
UNIT 19 Data Security 2.
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Unit 27: Network Operating Systems
Module 6 Information Sharing and Communication
LO3 – Understand Business IT Systems
Copyright 2005 Prentice- Hall, Inc.
6. Application Software Security
Presentation transcript:

FA 2 Handheld Project Fruit & Vegetables Program Commodity Inspection Division Washington State Dept. of Agriculture

Page 2 About Sierra Systems  Sierra Systems Group—36 year old firm  System Integration and Consulting Specialists  Offices in 15 Cities Across North America  900 (+) Employees  Market Segment Focus Electronic Government Healthcare Justice Enterprise Solutions

FA 2 System Overview

Page 4 Forms Admin & Financial Accounting System (FA 2 )  Expands on previous Certificate of Compliance and Permits Project (C 2 P 2 )  Focuses on data capture of invoicing information from remaining commodity inspection program and general forms used by WSDA  Internet and Intranet driven system  Provides online access to data  Includes project to develop remote data entry device for inspectors in the field

Page 5

Page 6 HD Project Scope  Remote data entry device development  Simulate the existing forms, including data validation  Inspection results “on the fly”  Ensure security of the document & system  Local print function  Communication/synchronization with FA 2 system (db)  Parallel Design/Development  Test  Device Deployment

System Security

Page 8 HD Security

Page 9 HD Security  Built in levels of security – Device is secured by a password—loss of control of the password may result in HD being wiped – The application is secured by a password – The application database on the Handheld is encrypted using a strong password – The application connects to the central SQL Server using a hidden password (obfuscated in the code) – The application connects to the central database over an encrypted connection using a public key – The application connects across a firewall directly behind the WAP – The WAP firewall blocks access to any web server except the intended target machine – Restricted routing prevents hackers from attacking web servers behind the firewall – A gateway firewall protects the internal network

The Handheld Device

Page 11 Compaq iPaq 3870 Slim and Powerful - TFT screen with 65,000+ colors, increased battery life, fastest available processor in a sleek, award-winning design Wireless–enabled – Integrated Bluetooth for wireless link to Bluetooth phones, printers, and PCs. Expandable – Wireless Packs, Expansion Packs, internal SD memory slot; expand with anything from wireless to multimedia to GPS and more Industry-leading handheld capabilities for enterprise - Ultra- mobile presentation tools, Voice Command and Control, iPAQ File Store, data encryption tool, Java virtual machine, and Pocket PC 2002

Page 12 Rugged Case The Rugged Case provides: Increased durability of the iPAQ Pocket PC in drops from up to four feet Compliance with IP54 standards for water and dust resistance Access to iPAQ Pocket PC jacks, ports, and Expansion Pack slots A clear, hard plastic window that prevents screen damage and allows use of touchscreen and buttons Removable belt clip

Page 13 PC Card Expansion Pack With a PC Card Expansion Pack, you can purchase cards* that will: Increase the file storage space on your iPAQ Pocket PC. Access your company's wireless network (WLAN) for and Web browsing. Access the Internet wirelessly through the cellular phone system. It also includes an integrated screen protector and a rechargeable, removable Slim Battery to run your PC Cards or to extend the life of your iPAQ Pocket PC between charges.

Questions