Download presentation
Presentation is loading. Please wait.
Published byNeil Joseph Modified over 8 years ago
1
© 2002 United Security Applications ERM USA A web Reporting tool for Legacy Databases. © 2003 United Security Applications.
2
Need for a Web Reporting tool for legacy System zMost of the archival but important data is many a times on Legacy systems. zThough this data is important the reporting tools available today are mainly client server type. zThere is a need to have a web reporting tool so as to make it available throughout the enterprise. © 2002 United Security Applications
3
Limitations of some of the other tools zMost of the tools allow you to create a static report and hence the user can not make any intelligent search by changing parameters. zIt is a skilled job to create those reports using some available tools like Crystal Reports etc. © 2002 United Security Applications
4
ERM – a Web Reporting tool zERM overcomes this problem by creating a Schema which is specific to your needs. zIt allows you to attach the labels that are relevant to your need. zA parameter driven search can be fired hence the user can twist the searches to suite his/her needs. © 2002 United Security Applications.
5
Configurator – Schema Definition zSchema is that set of information from the legacy database which is relevant to your specific needs. zConfigurator program makes connection to your legacy database and allows you to choose only those tables and fields which are relevant to you. zIt also allows you to specify the labels you would like to use to describe these fields. zYou can specify the relation between the databases. zYou can also specify various display formats in which you would like to view the information. © 2002 United Security Applications
6
Web Interface zWeb interface would first make a connection to the schema which is on the local machine. zIt would use the information within the schema for its own interface. zIt would then fire the searches on the legacy databases using the information in the schema. © 2002 United Security Applications
7
Technical Limitations zThis software can work on the legacy system which can be connected through the ODBC connection. © 2003 United Security Applications.
8
Example of a SMS System zSMS is a SQL database which has a complex structure of data about the hardware in the Enterprise. zUsing the configurator we have chosen only those fields we wish to fire queries. zWe have set up the display labels for the same. zWe have also set the display formats. © 2003 United Security Applications.
11
User Information User Information System Information System Information Hardware Hardware Software Software SMS Status SMS Status User Login User Login Precreated Queries Precreated Queries Boolean Search Boolean Search Precreated Queries Precreated Queries Search a specific Product Search a specific Product Product on a specific Machine Product on a specific Machine Last 100 messages for a specific site code Last 100 messages for a specific site code Frequent Errors in last 24 hours Frequent Errors in last 24 hours Functionality Description © 2003 United Security Applications.
12
Thank You © 2003 United Security Applications. United Security Applications
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.