You are on page 1of 27

Century Systems Technologies Inc.

BoreHole Manager
Version 2

Century Systems
Technologies Inc.
www.centurysystems.net
info@centurysystems.net

Century Systems Technologies Inc.________________________________________________1


2. Introduction________________________________________________________________3
2.1.

Intro__________________________________________________________________________3

2.2.

What Is BHMS?________________________________________________________________3

2.3.

Features______________________________________________________________________3

2.4.

License_______________________________________________________________________4

3. Installation and Overview_____________________________________________________6


3.1.

Installing BHMS________________________________________________________________6

3.2.

Starting BHMS_________________________________________________________________7

3.3.

System Requirements___________________________________________________________7

4. Getting Started_____________________________________________________________8
4.1.

Overview______________________________________________________________________8

4.2.

Check In______________________________________________________________________8

4.3.

Check Out_____________________________________________________________________9

4.4.

Copy In______________________________________________________________________10

4.5.

Copy Out_____________________________________________________________________11

4.6.

Status_______________________________________________________________________12

5. Advanced Options_________________________________________________________14
5.1.

Unlock Central DB_____________________________________________________________14

5.2.

Who Am I_____________________________________________________________________14

5.3.

Grid Conversion_______________________________________________________________14

5.4.

Export_______________________________________________________________________15

5.5.

Refresh Lists_________________________________________________________________16

5.6.

Reports______________________________________________________________________17

5.7.

Administrator Access__________________________________________________________18

5.8.

System Administration_________________________________________________________18

5.8.1.
5.8.2.
5.8.3.
5.8.4.

User____________________________________________________________________________18
User to Profile____________________________________________________________________19
Business Units___________________________________________________________________19
User Business Units_______________________________________________________________20

6. Reference________________________________________________________________21
6.1.

Check out Process_____________________________________________________________21

6.2.

Check in Process______________________________________________________________23

6.3.

Tips and Tricks________________________________________________________________24

6.4.

Online Support________________________________________________________________24

Introduction
2.1. Intro
Welcome to the Borehole Manager, the secure data repository for geological data. With
Borehole Manager you maintain data integrity while many users are accessing your
data.
This guide is a reference that describes the benefits and functionality of Borehole
Manager. It provides instructions, tips, and examples to help you accomplish each
task.
Users should be familiar with geological exploration and be comfortable using Microsoft
Windows.

2.2. What Is BHMS?


Borehole Manager is an application that controls multi-user access to a central
database of geological information. It is a companion tool to DHLogger, the primary
data collection application for borehole information. Borehole Manager provides
DHLogger and laboratory data to the entire organization. Export routines are
included so users can work with their data in other formats such as Gemcom,
Datamine and Mapinfo or connect to them directly with ODBC (Open Database
Connectivity).

2.3. Features
Here's what BHMS can do for you:
Linking to the DHLogger database, Borehole Manager can provide data across the
corporation to many users
Access to the data is strictly controlled. If you check out a borehole, you must
check in that borehole later.
Transcription errors are virtually eliminated because data is electronically copied.
Hold all of your local, regional and corporate geological data
Provide one source for all geological data with access to reporting tools from drill
reports to Mine Modelling.

2.4. License
CENTURY SYSTEMS TECHNOLOGIES INC. SOFTWARE AGREEMENT
IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, DO NOT
INSTALL THE SOFTWARE.
1. USE
You (an entity or a person) may use the accompanying software product (the
"Software"), in the quantity purchased, subject to the terms of this agreement. In
addition you may make one (1) archival copy of the Software.
You must acquire one copy of the Software for each computer on which the Software
will be installed; you may not install the Software on a network.
Upgrades and Trade-ups
If the Software is an upgrade or a trade-up, you are authorized to use the Software only
if you are an authorized user of a qualifying product as determined by Century
Systems Technologies Inc. and provided you (i) either delete the qualifying product
or install the new product on the same computer or network as the qualifying product
and (ii) do not transfer the qualifying product to any other person.
2. RESTRICTIONS
Except as expressly authorized by this Agreement, you may not alter, merge, modify or
adapt the Software in any way including reverse engineering, disassembling or
decompiling. You may not loan, rent, lease or license the Software or any copy.
However, you may transfer the Software on a permanent basis provided you transfer
the Software, this Software agreement and all documentation and media and you do
not retain any copies. Any transfer of the Software must include the most recent
update and all prior versions. If the Software is demonstration and evaluation (D&E)
software, you may not transfer the Software for commercial purposes.
3. INTELLECTUAL PROPERTY RIGHTS
All intellectual property rights in the Software and user documentation are owned by
Century Systems Technologies Inc. or its suppliers and are protected by United
States and Canadian intellectual property laws (including patent, trademark and
copyright laws), other applicable intellectual property laws, and international treaty
provisions.
Century Systems Technologies Inc. retains all rights not expressly granted.
4. LIMITED WARRANTY
For ninety (90) days from your date of purchase, Century Systems Technologies Inc.
warrants that the Software will substantially conform to the applicable user
documentation.
Century Systems Technologies Inc. will, at its option, refund the amount you paid for the
Software or provide you with corrected items at no charge provided that the
defective item(s) is returned to Century Systems Technologies Inc. within ninety (90)
days from the date of purchase. Any misuse or unauthorized modification of the
Software will void this limited warranty.
Except as specifically provided herein, Century Systems Technologies Inc. makes no
warranty, representation, promise or guarantee, either express or implied, statutory
or otherwise, with respect to the Software, user documentation or related technical
support, including their quality, performance, merchantability or fitness for a
particular purpose.
The warranty and remedies set forth herein are exclusive and in lieu of all others, oral

or written, express or implied. No Century Systems Technologies Inc. dealer,


distributor, agent or employee is authorized to make any modification or addition to
this warranty. This warranty gives you specific legal rights, and you may also have
other rights, which vary, from country to country and within the states of the United
States of America.
5. LIMITATION OF LIABILITY
Because software is inherently complex and may not be completely free of errors, it is
your responsibility to verify your work and to make backup copies, and Century
Systems Technologies Inc. will not be responsible for your failure to do so. In no
event will Century Systems Technologies Inc. be liable for indirect, special,
incidental, tort, economic, cover or consequential damages arising out of the use of
or inability to use Century Systems Technologies Inc. products or services, including,
without limitation, damages or costs relating to the loss of profits, business, goodwill,
data or computer programs, even if advised of the possibility of such damages. In
no case shall Century Systems Technologies Inc. be liable for money damages that
exceed the amount paid by you for the Software out of which such claim arose. The
foregoing limitations shall not apply to claims relating to death or personal injury,
which arise out of products deemed to be consumer goods under applicable law.
Some states, provinces or countries do not allow the exclusion or limitation of
implied warranties or limitation of liability for incidental or consequential damages, so
the above exclusion or limitation may not apply to you.
6. U.S. GOVERNMENT RESTRICTED RIGHTS
The Software and/or user documentation is provided with RESTRICTED AND LIMITED
RIGHTS. Use, duplication or disclosure by the Government is subject to restrictions
as set forth in FAR 52.227-14 (June 1987) Alternate III (g)(3) (June 1987), FAR
52.227-19 (June 1987), or DFARS 52.227-7013 (c)(1)(ii) (June 1988), as
applicable. Contractor/Manufacturer is Century Systems Technologies Inc.
In the event the Government seeks to obtain the Software pursuant to standard
commercial practice, this software agreement, instead of the noted regulatory
clauses, shall control the terms of the Government's license.
7. More Information
Should you have any questions concerning this Agreement or Century Systems
Technologies Inc.' software use policies, write to Inside Sales, Century Systems
Technologies Inc., 866 Newgate Avenue, Sudbury, Ontario, P3A 5J9, call 1-705-5603440, fax 1-705-560-3662.

3. Installation and Overview


3.1. Installing BHMS
BHMS is installed on a Windows95/98 or NT computer from a CD-ROM. The computer
must have access to a CD-ROM drive during installation.
Install BHMS from a CD:
TIP: Century System CD's support autorun.
1.

2.
3.
4.
5.

Insert the BHMS CD-ROM in the available CDROM drive.

Click
and choose Run from the Start menu
Type E:.exe
(Substitute your CD-ROM drive letter for E:)
Click the OK button.
Install Shield will prepare your computer for installation. Follow
the instructions on your
screen.

This will load the software and place BHMS on your start menu, and place a BHMS icon
on your Windows desktop. Also, an ODBC entry will be created for BHMS by the
install routine.
Install BHMS from a Network Share:
Tip: Ask an administrator about share privileges
1.
2.
3.
4.
5.
6.

Insert the BHMS CD-ROM in the available CDROM drive.


In My Computer, click the CD drive you want to share.
On the File menu, click Properties.
Click the Sharing tab, and then click Shared As.
To add a comment about the share, type the text in Comment.
To set a User Limit other than Maximum Allowed, click Allow, and
specify a number of Users.
7.
To set share permissions, click Permissions.
8.
From the client computer access the shared CD from
Network Neighborhood
9.
Double click Setup.exe

3.2. Starting BHMS


To run BHMS:
Double click the
(or)
Click

icon on the Windows desktop

Programs, Geology Tools, BHMS.

TIP: Once the BHMS is open. Create a new map or open an existing map to begin
working.

3.3. System Requirements

Item
Operating System
Memory
Processor
Disk Space

Minimum

Recommended

Microsoft Windows 95, 98, or NT


NT
32 Mb
64 Mb
486 - 100 mhz
P2 400
25 Mb
50

4. Getting Started
4.1. Overview
The BHMS (Borehole Management System) primary task is to centralize collected data.
BHMS will copy data to and from a central database and set the hole properties to
either copy,checked in or checked out.

4.2. Check In
The check in module copies new and updated drill hole data from the DHLogger into
the central database. The list on the left displays the current drill holes on the local
database along with their project number, status, start date, end date, who entered
the hole, Azimuth, Dip, Northing, Easting and Elevation values. The textbox located
underneath this list is a status box that will inform the user of current check in
activity. You can print the status log at any time the window is open by clicking the
print icon. The window on the left lists all the holes currently flagged for check in to
the Central Database (Check In List).

To flag a hole for check in, select it's row in the local drill hole list and click the left arrow
button (<). To move all holes for check in, click the double left arrow button (<<). If
a mistake was made and the user wishes to remove one or more holes from the
Check In List, use the right arrow buttons. To begin the check-in process, click the
following check in button.

The status of the check-in process will now be displayed in the status window. This will
inform the user of any errors that may occur.
In order for a hole to be successfully checked in, the following criteria must be met:

The hole's project number must exist on the Central Database.


If the hole has sample numbers assigned to it, the sample
numbers must not already exist on the Central
database (belonging to
another hole).
If the hole already exists on the Central Database, it must be
Checked Out.
The hole must be checked in by the user who checked it out.

See The Check In Process Diagram.

4.3. Check Out


The check out module allows the user to obtain drill hole data from the Central
database and store it's information on the local DHLogger database. This enables
the user to make changes and updates to the drill hole.

The table on the right shows the user the holes that are currently available to be
checked out from the Central Database. Below this table, there is a status window
which indicates the progress of the current check out. The user may print this status
log at any time by clicking the Print icon. The table on theleft identifies the holes
from the Central Database that are currently flagged to be Checked Out (Check Out
List). To add holes to the Check Out List, select the hole from the left table and click
on the left arrow button (<), to Check Out all holes from the left click the double left
arrow button (<<). To begin the Check Out Process of the holes listed in the Check
Out List, click on the following Check Out button.

The current activity of the check out process will be displayed in the status window
along with any errors that may have occurred.
In order to successfully check out a hole, the following criteria must be met:

The hole must currently be Checked In on the Central Database


The hole must not already exist on the local DHLogger database.
Sample numbers that belong to the hole on Central must not
already exist on the local DHLogger database.
If the business unit of the original creator does not allow for data
sharing, the user checking out the hole must
be the original creator.

See The Check Out Process Diagram.

4.4. Copy In

The copy in process can be described as a backup of existing drill holes on the local
DHLogger database. An example would be if a user wishes to have the day's work
backed up on the Central Database in case something happens to their machine
and the data becomes unavailable.
The table on the right indicates the holes in the DHLogger database that are available
to be copied into the Central. Underneath this table is a status window where the
progress of the Copy In process will be displayed. On the left is the list of holes
flagged to be copied into the Central Database (Copy In List).

To flag a hole to be copied in, select the hole's row in the DHLogger table and press the
left arrow key (<). The hole number will now appear in the left window. To copy all

10

holes to the left window, use the double left arrow button (<<). Similarly, if an error
was made and the user no longer wants to copy in a hole located on the Copy In list,
use the right arrow buttons to take them off. To begin the Copy In process, click the
following Copy In button.
If the hole being copied in exists in the Central Database, it must be checked out to be
successfully copied in. If the hole being copied in does not exist on the Central
database, a copy of the hole will be created and stored on the Central database for
other users to view.

4.5. Copy Out

The Copy Out process allows the user to view existing drill holes with their DHLogger
database. It can be thought of as checking a book out from a library. After checking
out a hole, the user may make changes to it, but the changes cannot be reflected on
the Central Database (cannot check in a copied out hole). Also, if the hole is copied
out, it will still be available to other users to copy out or check out.
On the Copy Out window, the table on the right identifies the holes on the Central
Database that are available to be copied out by the user. Underneath this table is a
status window where the status of the copy out procedure will be displayed. On the
left, there is a list of holes currently flagged to be copied out (Copy Out List).

To add a hole to the flagged list, select it's row in the right table and click the left arrow
button (<). The hole number will now appear in the Copy Out list (on the left). If the
user wants to copy out all existing holes, use the double left arrow button (<<). To
take holes off of the Copy Out list (on the left), select the hole and click the right
arrow button (>), to remove all holes from the copy out list, click the double right
arrow button (>>). To begin the Copy Out procedure, click the following Copy Out
button.

11

For a hole to be successfully copied out, it must not already exist in the local DHLogger
database.

4.6. Status
The status window allows you to view a list of holes from either the Central Repository
(DHCentral) or your Local Database (DHLogger). Drill holes listed for
the Local Database represent those holes that either have been
"Checked Out" from the Central Repository or holes that are new and
were created on the Local Database through the DHLogger. Drill holes
listed on the Central Repository are those holes that have been
checked in by all users of the system.

Item
Description
Central Repository (DHCentral)
typically located on the

The Central Repository is the central database


server and treated by many users as the "master"

database.
Local database (DHLogger)
a client computer

The Local database is a remote database located on


that is typically a data collection device.

Project Number

The project that boreholes belong to.

Hole Number

Borehole number.

Start Date

Start date as stored on the borehole record.

End Date

End date as stored on the borehole record.

Logged by

Name of logger as stored on the borehole


record.

Original Creator

The name of the creator is taken from the


Users login id when the
borehole record was created.
This identifier is never changed once a hole
has
been created.

12

Current Owner

This identifies who has checked out a hole.


The name is taken from the
Users login id, required
when starting Borehole Manager. This defaults
to
"system" when the hole is checked in.

Status

Either checked in or checked out. Checked


in holes can be freely used
by any user and checked
out holes are currently being edited by a user.

To view the Status:


1.

Click Action, Status


(or)
Click the

button on the toolbar.

13

5. Advanced Options
5.1. Unlock Central DB
You must have administrative access to use this option.
This allows Administrators to restore a locked databses.

5.2. Who Am I
This will display the user login name.

5.3. Grid Conversion


Location information may be collected using a variety of grids. To compare drill holes in
an organization, it may be necessary to convert location information to a common
grid. For example, it may be required to produce a map using UTM's.

To change the current grid settings on the Central database, choose


Calculate Common Grid under the Options menu and select the desired
Grid through a drop down list. A list of grid conversion formulae is available
by selecting Grid Conversion through the Actions menu; here formulas
may be added, modified, deleted or viewed. When the Grid Settings are
changed, Borehole Manager will recalculate all drill hole coordinates in the
Central Database and convert it to a point within the new Grid selected using
the appropriate grid conversion formula.
To edit an existing Grid Conversion Formula, access the available Grid
Conversions through the Actions menu and double click on the formula to
be modified. A pop-up window will appear allowing the user to make
changes.
To create a new Grid Conversion Formula, access the Grid Conversions
through the Actions menu and click on the "New" button on the toolbar.
This will bring up a pop-up window similar to the one shown when editing a
formula where the user will enter the data relevant to the new formula. This
14

means specifying from which grid the conversion is from and specifying the
grid that it will be converted to (these fields are available as drop down lists).
The unit of measure of both grids will also be chosen from drop down lists.
The Northing, Easting, Elevation and Delta Azimuth is also collected via text
boxes for both grids involved in the conversion.

5.4. Export
Export drill hole information to use with Camp, Gemcom or Datamine. This process
copies the drill hole information into a format recognized by the software to import.
To export drill hole information, close all other windows within Borehole Manager
and select Export from the Actions menu. This will give the user the option of
selecting which type of Export to perform. Once the type of export is selected, a
window will be displayed where the user has to define the Export directory (the
directory of the export database). The user will then define whether the holes being
exported are located in the local DHLogger database or the Central Database
(through the use of the radio buttons on the top right hand corner of the window).
The window on the right displays a table of drill holes available for export. The
window below this table will act as a progress log that will display the activity of the
export process as well as any errors that may occur. The window on the left
displays the holes that are flagged to be exported (Export List). To add holes to the
Export List, select the hole in the right window and click the left arrow button (<).
The hole will now show up in the Export List. To export all holes in the right window,
click the double left arrow button (<<). If the user wishes to remove holes from the
Export list, select the hole in the list and click the right arrow button (>). Similarly if
the user wishes to empty the Export list, use the double right arrow button (>>).
When finished selecting the holes for export, click the begin button on the toolbar.
The progress will be displayed in the staus window on the lower left corner of the
window. The user may save or print this log if desired by clicking the appropriate
icon next to the status window.

15

5.5. Refresh Lists


Use this feature to transfer the latest lists / reference tables from the central database
(DHCentral) to your local database (DHLogger). Keeping your lists current is critical
when sharing drill hole records.
While your lists are refreshing, you can watch the status through the Refresh Local Lists
window.
To refresh local lists:
1.
Be sure the check in and check out windows are closed.
2.
On the Actions menu, click Refresh lists...
(or)
3.

click
On the Actions menu, click Begin
(or)
click

16

5.6. Reports

Reports allow the user to view and save a number of custom created reports. To gain
access to the reports window, click the Reports icon on the toolbar. This will bring
up a window where there is drop down list in the upper right hand corner. The user is
able to select the report they wish to view through the use of this drop down list. The
option of running the report on the Local DHLogger Database or the Central
database is selected through the use of radio buttons on the upper left hand corner
of the window. Once selected, the report will be displayed in the window and the
user has the option of searching, sorting, printing or saving the report by clicking on
the appropriate icon on the toolbar.
If the user chooses to save the report, a window will be displayed where the user can
enter the location and the name of the file that will hold the report data (in a text with
headers format). These reports are available in both the Borehole Manager and the
DHLogger applications.

17

5.7. Administrator Access


Administrator Access is where the user may make changes to a drill hole's creator,
current owner and present status (Checked-in or Checked-Out) on the local
database. This is useful when quick changes are needed before checking-in the
holes. Each editable field is provided with a drop down list (Creator, Owner, Status).

5.8. System Administration


5.8.1.User
The systems administration user dialog box is used to maintain login
information.

Enter all information possible

18

5.8.2.User to Profile
Assign each user one or more profiles.
Profiles are predefined by the Buisness Administration Manager.
Each profile controls what menu option, window and button will be shown to the
assigned user.

5.8.3.Business Units
Business units maintain security and hole information management
Units are used to maintain copy and check in/out functions

19

5.8.4.User Business Units


In this dialog box you can assign business units to login names

20

6. Reference
6.1. Check out Process

21

22

6.2. Check in Process

23

6.3. Tips and Tricks


Hole may only be deleted from Dhlogger.
Right Click on the toolbars to customize them.
The status of the Hole is marked in red on the collars tabe of DHLogger
Profiles are created with the Century Systems Business Administrator

6.4. Online Support


Century Systems Technologies Inc. has made every effort to make DHLogger intuitive;
however, if there is something you are unable to figure out, please consult the help
material. The printed user guide and on-line help provide the starting point for help
information. The on-line help contains all the information from the User's Guide.
Please ensure that the User's Guide and on-line help do not provide the answer you
need before reaching out for further help. This will always be your fastest solution.
Support plans may vary. Support options include those described in the following
sections.
Contact Century Systems directly if you have any Training, data conversion or custom
programming requirements.
The information stored within the DHLogger database can be easily exported to a
number of plotting programs (Gemcom, Prolog/Tralog, DataMine, Surpac, etc.) for
further analysis. Also, SQL reports can be generated directly from DHLogger data.
Century Systems is committed to improving the functionality of DHLogger with new
features in future software releases. Also, Century Systems offers custom reporting.
If you would like to request a new feature or discuss custom solutions, please
contact Century Systems.
Support@centurysystems.net
Info@centurysystems.net
Sales@centurysystems.net

24

Web Site
Century Systems Technologies Inc.
866 Newgate Ave.
Sudbury ON
P3A 5J9
Phone:
Fax:

(705) 560-3440
(705) 560-3662

25

3D Mine Planning Software 3

print 3
Processor 7

B
Borehole Manager 3
business decisions 3

C
CAD Software 3
CD-ROM 6
custom entry screens 3

D
DHLogger 3
Disk Space 7

S
Start Menu 7
start MineMapper 7
Support 24
System Requirements 7

T
Technical Support 24
transcription errors 3

W
Windows95/98 or NT 6

H
Help 24

I
Install 6
Install Shield 6

L
License 4

M
map geography 3
Memory 7
Mine Geologists 3
mine modeling software 3
MineMapper Icon 7

O
ODBC entry 6
Operating System 7

26

You might also like