Professional Documents
Culture Documents
Borehole Manager: Century Systems Technologies Inc
Borehole Manager: Century Systems Technologies Inc
BoreHole Manager
Version 2
Century Systems
Technologies Inc.
www.centurysystems.net
info@centurysystems.net
Intro__________________________________________________________________________3
2.2.
What Is BHMS?________________________________________________________________3
2.3.
Features______________________________________________________________________3
2.4.
License_______________________________________________________________________4
Installing BHMS________________________________________________________________6
3.2.
Starting BHMS_________________________________________________________________7
3.3.
System Requirements___________________________________________________________7
4. Getting Started_____________________________________________________________8
4.1.
Overview______________________________________________________________________8
4.2.
Check In______________________________________________________________________8
4.3.
Check Out_____________________________________________________________________9
4.4.
Copy In______________________________________________________________________10
4.5.
Copy Out_____________________________________________________________________11
4.6.
Status_______________________________________________________________________12
5. Advanced Options_________________________________________________________14
5.1.
5.2.
Who Am I_____________________________________________________________________14
5.3.
Grid Conversion_______________________________________________________________14
5.4.
Export_______________________________________________________________________15
5.5.
Refresh Lists_________________________________________________________________16
5.6.
Reports______________________________________________________________________17
5.7.
Administrator Access__________________________________________________________18
5.8.
System Administration_________________________________________________________18
5.8.1.
5.8.2.
5.8.3.
5.8.4.
User____________________________________________________________________________18
User to Profile____________________________________________________________________19
Business Units___________________________________________________________________19
User Business Units_______________________________________________________________20
6. Reference________________________________________________________________21
6.1.
6.2.
Check in Process______________________________________________________________23
6.3.
6.4.
Online Support________________________________________________________________24
Introduction
2.1. Intro
Welcome to the Borehole Manager, the secure data repository for geological data. With
Borehole Manager you maintain data integrity while many users are accessing your
data.
This guide is a reference that describes the benefits and functionality of Borehole
Manager. It provides instructions, tips, and examples to help you accomplish each
task.
Users should be familiar with geological exploration and be comfortable using Microsoft
Windows.
2.3. Features
Here's what BHMS can do for you:
Linking to the DHLogger database, Borehole Manager can provide data across the
corporation to many users
Access to the data is strictly controlled. If you check out a borehole, you must
check in that borehole later.
Transcription errors are virtually eliminated because data is electronically copied.
Hold all of your local, regional and corporate geological data
Provide one source for all geological data with access to reporting tools from drill
reports to Mine Modelling.
2.4. License
CENTURY SYSTEMS TECHNOLOGIES INC. SOFTWARE AGREEMENT
IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, DO NOT
INSTALL THE SOFTWARE.
1. USE
You (an entity or a person) may use the accompanying software product (the
"Software"), in the quantity purchased, subject to the terms of this agreement. In
addition you may make one (1) archival copy of the Software.
You must acquire one copy of the Software for each computer on which the Software
will be installed; you may not install the Software on a network.
Upgrades and Trade-ups
If the Software is an upgrade or a trade-up, you are authorized to use the Software only
if you are an authorized user of a qualifying product as determined by Century
Systems Technologies Inc. and provided you (i) either delete the qualifying product
or install the new product on the same computer or network as the qualifying product
and (ii) do not transfer the qualifying product to any other person.
2. RESTRICTIONS
Except as expressly authorized by this Agreement, you may not alter, merge, modify or
adapt the Software in any way including reverse engineering, disassembling or
decompiling. You may not loan, rent, lease or license the Software or any copy.
However, you may transfer the Software on a permanent basis provided you transfer
the Software, this Software agreement and all documentation and media and you do
not retain any copies. Any transfer of the Software must include the most recent
update and all prior versions. If the Software is demonstration and evaluation (D&E)
software, you may not transfer the Software for commercial purposes.
3. INTELLECTUAL PROPERTY RIGHTS
All intellectual property rights in the Software and user documentation are owned by
Century Systems Technologies Inc. or its suppliers and are protected by United
States and Canadian intellectual property laws (including patent, trademark and
copyright laws), other applicable intellectual property laws, and international treaty
provisions.
Century Systems Technologies Inc. retains all rights not expressly granted.
4. LIMITED WARRANTY
For ninety (90) days from your date of purchase, Century Systems Technologies Inc.
warrants that the Software will substantially conform to the applicable user
documentation.
Century Systems Technologies Inc. will, at its option, refund the amount you paid for the
Software or provide you with corrected items at no charge provided that the
defective item(s) is returned to Century Systems Technologies Inc. within ninety (90)
days from the date of purchase. Any misuse or unauthorized modification of the
Software will void this limited warranty.
Except as specifically provided herein, Century Systems Technologies Inc. makes no
warranty, representation, promise or guarantee, either express or implied, statutory
or otherwise, with respect to the Software, user documentation or related technical
support, including their quality, performance, merchantability or fitness for a
particular purpose.
The warranty and remedies set forth herein are exclusive and in lieu of all others, oral
2.
3.
4.
5.
Click
and choose Run from the Start menu
Type E:.exe
(Substitute your CD-ROM drive letter for E:)
Click the OK button.
Install Shield will prepare your computer for installation. Follow
the instructions on your
screen.
This will load the software and place BHMS on your start menu, and place a BHMS icon
on your Windows desktop. Also, an ODBC entry will be created for BHMS by the
install routine.
Install BHMS from a Network Share:
Tip: Ask an administrator about share privileges
1.
2.
3.
4.
5.
6.
TIP: Once the BHMS is open. Create a new map or open an existing map to begin
working.
Item
Operating System
Memory
Processor
Disk Space
Minimum
Recommended
4. Getting Started
4.1. Overview
The BHMS (Borehole Management System) primary task is to centralize collected data.
BHMS will copy data to and from a central database and set the hole properties to
either copy,checked in or checked out.
4.2. Check In
The check in module copies new and updated drill hole data from the DHLogger into
the central database. The list on the left displays the current drill holes on the local
database along with their project number, status, start date, end date, who entered
the hole, Azimuth, Dip, Northing, Easting and Elevation values. The textbox located
underneath this list is a status box that will inform the user of current check in
activity. You can print the status log at any time the window is open by clicking the
print icon. The window on the left lists all the holes currently flagged for check in to
the Central Database (Check In List).
To flag a hole for check in, select it's row in the local drill hole list and click the left arrow
button (<). To move all holes for check in, click the double left arrow button (<<). If
a mistake was made and the user wishes to remove one or more holes from the
Check In List, use the right arrow buttons. To begin the check-in process, click the
following check in button.
The status of the check-in process will now be displayed in the status window. This will
inform the user of any errors that may occur.
In order for a hole to be successfully checked in, the following criteria must be met:
The table on the right shows the user the holes that are currently available to be
checked out from the Central Database. Below this table, there is a status window
which indicates the progress of the current check out. The user may print this status
log at any time by clicking the Print icon. The table on theleft identifies the holes
from the Central Database that are currently flagged to be Checked Out (Check Out
List). To add holes to the Check Out List, select the hole from the left table and click
on the left arrow button (<), to Check Out all holes from the left click the double left
arrow button (<<). To begin the Check Out Process of the holes listed in the Check
Out List, click on the following Check Out button.
The current activity of the check out process will be displayed in the status window
along with any errors that may have occurred.
In order to successfully check out a hole, the following criteria must be met:
4.4. Copy In
The copy in process can be described as a backup of existing drill holes on the local
DHLogger database. An example would be if a user wishes to have the day's work
backed up on the Central Database in case something happens to their machine
and the data becomes unavailable.
The table on the right indicates the holes in the DHLogger database that are available
to be copied into the Central. Underneath this table is a status window where the
progress of the Copy In process will be displayed. On the left is the list of holes
flagged to be copied into the Central Database (Copy In List).
To flag a hole to be copied in, select the hole's row in the DHLogger table and press the
left arrow key (<). The hole number will now appear in the left window. To copy all
10
holes to the left window, use the double left arrow button (<<). Similarly, if an error
was made and the user no longer wants to copy in a hole located on the Copy In list,
use the right arrow buttons to take them off. To begin the Copy In process, click the
following Copy In button.
If the hole being copied in exists in the Central Database, it must be checked out to be
successfully copied in. If the hole being copied in does not exist on the Central
database, a copy of the hole will be created and stored on the Central database for
other users to view.
The Copy Out process allows the user to view existing drill holes with their DHLogger
database. It can be thought of as checking a book out from a library. After checking
out a hole, the user may make changes to it, but the changes cannot be reflected on
the Central Database (cannot check in a copied out hole). Also, if the hole is copied
out, it will still be available to other users to copy out or check out.
On the Copy Out window, the table on the right identifies the holes on the Central
Database that are available to be copied out by the user. Underneath this table is a
status window where the status of the copy out procedure will be displayed. On the
left, there is a list of holes currently flagged to be copied out (Copy Out List).
To add a hole to the flagged list, select it's row in the right table and click the left arrow
button (<). The hole number will now appear in the Copy Out list (on the left). If the
user wants to copy out all existing holes, use the double left arrow button (<<). To
take holes off of the Copy Out list (on the left), select the hole and click the right
arrow button (>), to remove all holes from the copy out list, click the double right
arrow button (>>). To begin the Copy Out procedure, click the following Copy Out
button.
11
For a hole to be successfully copied out, it must not already exist in the local DHLogger
database.
4.6. Status
The status window allows you to view a list of holes from either the Central Repository
(DHCentral) or your Local Database (DHLogger). Drill holes listed for
the Local Database represent those holes that either have been
"Checked Out" from the Central Repository or holes that are new and
were created on the Local Database through the DHLogger. Drill holes
listed on the Central Repository are those holes that have been
checked in by all users of the system.
Item
Description
Central Repository (DHCentral)
typically located on the
database.
Local database (DHLogger)
a client computer
Project Number
Hole Number
Borehole number.
Start Date
End Date
Logged by
Original Creator
12
Current Owner
Status
13
5. Advanced Options
5.1. Unlock Central DB
You must have administrative access to use this option.
This allows Administrators to restore a locked databses.
5.2. Who Am I
This will display the user login name.
means specifying from which grid the conversion is from and specifying the
grid that it will be converted to (these fields are available as drop down lists).
The unit of measure of both grids will also be chosen from drop down lists.
The Northing, Easting, Elevation and Delta Azimuth is also collected via text
boxes for both grids involved in the conversion.
5.4. Export
Export drill hole information to use with Camp, Gemcom or Datamine. This process
copies the drill hole information into a format recognized by the software to import.
To export drill hole information, close all other windows within Borehole Manager
and select Export from the Actions menu. This will give the user the option of
selecting which type of Export to perform. Once the type of export is selected, a
window will be displayed where the user has to define the Export directory (the
directory of the export database). The user will then define whether the holes being
exported are located in the local DHLogger database or the Central Database
(through the use of the radio buttons on the top right hand corner of the window).
The window on the right displays a table of drill holes available for export. The
window below this table will act as a progress log that will display the activity of the
export process as well as any errors that may occur. The window on the left
displays the holes that are flagged to be exported (Export List). To add holes to the
Export List, select the hole in the right window and click the left arrow button (<).
The hole will now show up in the Export List. To export all holes in the right window,
click the double left arrow button (<<). If the user wishes to remove holes from the
Export list, select the hole in the list and click the right arrow button (>). Similarly if
the user wishes to empty the Export list, use the double right arrow button (>>).
When finished selecting the holes for export, click the begin button on the toolbar.
The progress will be displayed in the staus window on the lower left corner of the
window. The user may save or print this log if desired by clicking the appropriate
icon next to the status window.
15
click
On the Actions menu, click Begin
(or)
click
16
5.6. Reports
Reports allow the user to view and save a number of custom created reports. To gain
access to the reports window, click the Reports icon on the toolbar. This will bring
up a window where there is drop down list in the upper right hand corner. The user is
able to select the report they wish to view through the use of this drop down list. The
option of running the report on the Local DHLogger Database or the Central
database is selected through the use of radio buttons on the upper left hand corner
of the window. Once selected, the report will be displayed in the window and the
user has the option of searching, sorting, printing or saving the report by clicking on
the appropriate icon on the toolbar.
If the user chooses to save the report, a window will be displayed where the user can
enter the location and the name of the file that will hold the report data (in a text with
headers format). These reports are available in both the Borehole Manager and the
DHLogger applications.
17
18
5.8.2.User to Profile
Assign each user one or more profiles.
Profiles are predefined by the Buisness Administration Manager.
Each profile controls what menu option, window and button will be shown to the
assigned user.
5.8.3.Business Units
Business units maintain security and hole information management
Units are used to maintain copy and check in/out functions
19
20
6. Reference
6.1. Check out Process
21
22
23
24
Web Site
Century Systems Technologies Inc.
866 Newgate Ave.
Sudbury ON
P3A 5J9
Phone:
Fax:
(705) 560-3440
(705) 560-3662
25
print 3
Processor 7
B
Borehole Manager 3
business decisions 3
C
CAD Software 3
CD-ROM 6
custom entry screens 3
D
DHLogger 3
Disk Space 7
S
Start Menu 7
start MineMapper 7
Support 24
System Requirements 7
T
Technical Support 24
transcription errors 3
W
Windows95/98 or NT 6
H
Help 24
I
Install 6
Install Shield 6
L
License 4
M
map geography 3
Memory 7
Mine Geologists 3
mine modeling software 3
MineMapper Icon 7
O
ODBC entry 6
Operating System 7
26