Professional Documents
Culture Documents
Definition of eGov
It can be defined as the civil and political conduct of government, including service provision, using information and communication technologies.
Transactions
Government Government
Citizens
e-Gov solution
Overview of Presentation Part 1 : Content Manager Part 2 : Audit Trails in Distributed Databases
A Major challenge in eGov : Data Management E.g. Land Records , Citizen Database etc. Content Manager : a Possible Solution
What is Content Manager ? Content Manager (a product from IBM) is a scalable solution for storing and retrieving documents of various types.
Content Manager
Brief Overview of the features of CM
1. Lets you store content regardless of format. ( Unstructured data )
E.g. text documents, scanned images, audio, video, forms any binary object
2. Stores data on distributed servers and provides single point access. 3. Provides many sophisticated features like Access control Storage management Archiving , Purging , Migration User management Automated Workflow Enterprise wide search from Internet or intranet clients. Streaming audio and video.
Provides an introduction to a layman about Content Manager Covers essential topics of CM Relevant Figures to explain important concepts All discusses development of Client Application for CM Useful Appendices with extra info like installation, references etc.
Benefits Makes it very easy to perform operations on the CM Database Encapsulates the complexity of CM API Object Oriented Approach allows easy integration into new apps Speeds up Application Development Time
Application
Extensibility : Acts like a new layer on top of CM New layers like Custom Access Control , Audit Layer can be added
A Prototype Application
Defining the problem Proposed a prototype solution Developed an Application in Visual C++ on top of Content Manager Demonstrates use of our new API with additional layers
Workflow Security Layer Audit Layer
OR
RESIDENTSHIP
Security Layer
Main Screen
Workflow in CM
Individual Accountability: track individual actions to facilitate audit. Reconstructing Events: reconstruct events as and when required. Problem Monitoring: online tools to help monitor problems Intrusion Detection: identifying attempts to penetrate a system and gain unauthorized access.
Application
M I D D L E W A R E
Isolates logical view of data storage available to the application developer from the physical placement
Data Virtualizer
Database
Database
Database
Database