System Overview 18 March 2008. I-Suite is An Automated Incident Business Information and Support Tool Written as a Portable Client/Server Application.

Slides:



Advertisements
Similar presentations
Peter Berrisford RAL – Data Management Group SRB Services.
Advertisements

Pharos Uniprint 8.3.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
NETOP REMOTE CONTROL What’s new in version 9.5? DECEMBER 09 NETOP REMOTE CONTROL1.
I-Suite Update Version 13 I-Suite General Focus Development – Minimal changes to current I-Suite – Primary Focus is e-Isuite Supporting Multiple.
Role of ICT in Business ICT in a business environment can be used for:
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
Peoplesoft Fundamentals David Lewis 10/18/02 (adapted from Psoft Training Materials)
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
…the basics….  Windows 7 Professional or Windows 2003/2008 Server  No competing http Services (Tomcat6 will provide web services on server machine)
EGEMS A Dedicated Web Based System for Ground Water Data Processing Analysis and Storage.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
FreightSupplyChain Trinity Business Solutions Limited International Freight Consolidators March 2001 Trinity Business Solutions Limited International Freight.
Technology Overview. Confidential & Proprietary Information System Unit Server Two-way Satellite network System includes units and server Units have built.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
Incident Business Update Logistics Meeting March 18, 2008.
CSCI 6962: Server-side Design and Programming Course Introduction and Overview.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Overview of SQL Server Alka Arora.
Chapter 9: Novell NetWare
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
E-ISuite Overview 05 October What is I-Suite?  Portable, Client-Server Application  Used Primarily at ICPs  Captures Incident Data Resource Check-In.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Networks QUME 185 Introduction to Computer Applications.
WITSML Service Platform - Enterprise Drilling Information
CAMP 101 THINGS TO … TRANSITION EI-SUITE/I-SUITE ADMIN MISC
Database Application Security Models Database Application Security Models 1.
I-Suite An Automated Incident Business Information and Support Tool WILDLAND FIRE HURRICANES ALL RISK ASSIGNMENTS Full Versions of these Training Materials.
2014 e-ISuite CTSP Presentation 2014 e-ISuite CTSP Presentation.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
 Next Generation of I-Suite  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever Internet.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
9 Systems Analysis and Design in a Changing World, Fourth Edition.
MOSS Design Presentation -Senior Project-. MOSS MOSS Server System 1. MOSS Application 2. Server 3. Client SIU-E Code Cop System 1. SIU-E.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
National Logistics Workshop Boise, ID – 3/1/2011.
Application Development
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Web Server.
Update National Logistics Workshop Reno, Nevada March 18.
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Overview.  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever Internet is Available 
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Citrix On Demand Services. Agenda About Citrix & the “on-demand” access infrastructure Traditional client/server via Citrix Access Infrastructure –Scalable,
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
Overview.  Next Generation of I-Suite  Browser Based Application  Accessed From:  Incident Command Post – Internet Optional  Agency Offices  Wherever.
APEL Architecture Alison Packer. Overview Grid jobs accounting tool APEL Client software - installed in sites (CEs, gLite- APEL node) APEL Server accepts.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
2nd year Computer Science & Engineer
Database System Concepts and Architecture
Amazon Storage- S3 and Glacier
Employers Internet What is it for?.
An Introduction to Computer Networking
Information Technology Ms. Abeer Helwa
Web Servers / Deployment
IBM Tivoli Storage Manager
Sending data to EUROSTAT using STATEL and STADIUM web client
Presentation transcript:

System Overview 18 March 2008

I-Suite is An Automated Incident Business Information and Support Tool Written as a Portable Client/Server Application WILDLAND FIRE HURRICANES NATIONAL DISASTERS What is I-Suite

18 Mar ISuite Functionality Track Resources  Check In  Demobilization Record Time  Produce Invoices Calculates Cost  Estimations  Actuals  Projections Track Supplies Record Injury and Illness Data Develop Incident Action Plan (IAP) Provide Reports and Data  Incident  Others

18 Mar e-ISuite Background Next Generation Version of I-Suite Project Objectives  Migrate current ISuite to web-enabled environment  Make minimal functional enhancements (1 st Release)  Provide enterprise-wide incident data  Support all incidents (i.e., IA to Close-out)  Use the remote application without an internet connection Java Based UML Modeling Approach SabiOso Located in Clearfield, Utah

18 Mar Benefits of e-ISuite Generate Invoices for Casual Hires  Training, dispatch, and cache work Install on One Computer at Site Easily Retrieve Data From Other Systems  ROSS, ICBS, IQCS, etc Incident Data Available to Other Systems Newer Technologies  MS Visual Basic is no longer supported by MS  Extend the application lifecycle Historical Data

18 Mar System Architecture Constraints System of Two Primary Components  Enterprise application at NITC  Remote, stand-alone, portable application at incident site Browser Based No Proprietary or Licensed Components (Remote Application) Enterprise Application is System of Record For e-ISuite Originated Data Accessible via Internet Accessible via Agency Intranets Remote is Usable Without Internet Connection Protect Sensitive Data From Unauthorized Disclosure Support Team Transitions and Incident Transitions

18 Mar Conceptual Architecture Agency Office(s) Intranet (or Internet) Internet Incident Site (e-ISuite Remote) ESBESB e-ISuite Enterprise Other Data Services

18 Mar 2008 Software Components Site  Small foot print  Single application  Automated component  Uses web services of enterprise Enterprise  Multiple applications  Scalable  Web application  Web services  JMS message handlers  Application monitoring

18 Mar 2008 Enterprise Components Load Balancer Tomcat Web Container(s)  Contains UI components  Contains application (business logic) components Spring for Application Management Spring-WS or Xfire for Web Services Java Server Faces for UI Oracle for Database(s) Apache ActiveMQ for JMS Broker

18 Mar 2008 Site Components Tomcat Web Container  Contains UI components  Contains application (business logic) components Spring for Application Management Quartz Scheduler for Automatic Components MySql for Database Swing Application on Server Machine to Manage application Simple Install

18 Mar Data Flow Enterprise is the Data Repository for What Happens at Incidents Multiple Input Sources  Site installation  Government offices  Other government systems (ROSS, ICBS, etc) Multiple Output Requests  Site installation  Government offices  Other government systems (ROSS, ICBS, etc)  Data warehouse New Roles Related to Data Flow  Data Transfer Role  Data Reconciliation Role

18 Mar Site and Enterprise Data Transfer Only Data Differences  Based on date-time stamp Based on Data Transfer Credentials  Entered at the Site  Authenticated on the Enterprise Data is Encrypted

18 Mar Site and Enterprise Data Transfer Based on Data Transfer Credentials  Entered on administration screen of site application  User name and password  Uniquely identifies user transferring data  Must exist on enterprise system with the data transfer role  Does NOT need to be the same as the name/password used at the site  Stored in memory at site  Must be re-entered if site server reboots  Automatically included in each transmission (send or request) from site to enterprise Data is Encrypted  Public/Private key cryptology  One set for enterprise  One set for all sites  Public keys shared, private keys held

18 Mar 2008 Transfer Mechanisms Internet at Site  Automatic (no manual intervention)  Scheduled  Frequent  Manual override (“do- it-now” button)  Via enterprise web service No Internet at Site  Manual (operator initiated)  Data to portable media  Upload to enterprise web application  Web application calls enterprise web service Internet

18 Mar 2008 Transfer Complete Send Data Frequently  Minimum of once a day (Finance requirement)  Smaller file means less time Request Data Frequently  Resource data arrives at camp before the resource  Reduces manual data input at camp  Reduces data errors  Reduce the need for reconciliation Data Reconciliation  Must have the Data Reconcile role  Can assign this new role to any user

18 Mar Questions