IBS implements new generation cargo terminal operations system for Emirates

Written by Pradeep P. Suthan


IBS implements new generation cargo terminal operations system for Emirates Largest IT system implementation

Trivandrum - September 13, 2004 - IBS Software Services (IBS) has developed and successfully implemented Chameleon, a sophisticated new-generation, cargo terminal operations system forrepparttar Emirates Group.

IBS has designed Chameleon to handle end-to-end management and monitoring of cargo consignments, fromrepparttar 133469 time a consignment is delivered torepparttar 133470 airline till its delivery atrepparttar 133471 destination airport. IBS has delivered arguably one ofrepparttar 133472 largest and most complex systems using new generation technologies forrepparttar 133473 airline cargo industry.

Chameleon enables a ground handler to manage all cargo terminal operations from reserving an air waybill to manifestingrepparttar 133474 shipment on a flight onrepparttar 133475 export/air side and to receiverepparttar 133476 cargo fromrepparttar 133477 airline and deliverrepparttar 133478 shipment torepparttar 133479 consignee onrepparttar 133480 import/land side. Chameleon also supports radio communications through hand held terminals and improves productivity and service levels by defining flexible workflows and monitoringrepparttar 133481 performance ofrepparttar 133482 different business processes. Thus, Emirates SkyCargo and Dnata Cargo are currently operating withrepparttar 133483 most advanced Cargo Ground Handling and Warehouse Management IT system inrepparttar 133484 aviation industry today, providing Emirates withrepparttar 133485 tools that are needed to achieve its goals of efficiency, profitability and service quality.

Mr. V K Mathews, IBS Chairman and Managing Director said, "Emirates had a very aggressive time schedule for completion, and we are quite delighted that we were able to cut over two large terminal operators from existing systems torepparttar 133486 new system with minimal interruptions to their operations. The success of both system development and implementation is a demonstration of our commitment, competence and determination to succeed even underrepparttar 133487 most challenging circumstances".

"Chameleon is one ofrepparttar 133488 largest IT system implementations whichrepparttar 133489 Emirates Group has undertaken in recent times, andrepparttar 133490 project is strategically important forrepparttar 133491 Group. Understandably, Chameleon was a big challenge, and I truly appreciate and thank IBS for their professionalism, competence and commitment in making Chameleon a great success", added Mr. Joshua Koshy, Senior VP-IT, Emirates Group.

Access Control List in .NET Framework

Written by Balaji


Access Control List in .NET Framework

Once you complete developing a web application, you need to secure it. This is whenrepparttar aspect of security comes into picture. There will be some portions of your application which need to be secured from users. Securing an application may need extra hardware to build complex multi-layer systems with firewalls, and also some highly secure features. Security enables you to provide access to a specified user afterrepparttar 133468 user is authenticated and authorized to accessrepparttar 133469 resources in your web application. The Access Control List is used inrepparttar 133470 authorization process.

The basic concepts of security are Authentication, Authorization, Impersonation and Data or functional security. Authentication isrepparttar 133471 process that enables to identify a user, so that only that user is provided access torepparttar 133472 resources. Authorization isrepparttar 133473 process that enables to determine whether a particular user can be given access torepparttar 133474 resources thatrepparttar 133475 user requests. Impersonation isrepparttar 133476 process that provides access to resources requested by a user under a different identity. Data or functional security isrepparttar 133477 process of securing a system physically, updatingrepparttar 133478 operating system and using robust software.

Some elements of an operating system,repparttar 133479 Internet Information Server (IIS), andrepparttar 133480 .NET Framework work in coordination to providerepparttar 133481 features required to executerepparttar 133482 security concepts mentioned above. For example, Windows 2000 uses its own list of user accounts for identifying and authenticating users. IIS identifiesrepparttar 133483 users based onrepparttar 133484 information provided by Windows, whenrepparttar 133485 users access a web site. IIS after identification ofrepparttar 133486 users, passes this information to ASP.NET. Thenrepparttar 133487 user information is checked for authorization.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use