• No results found

N-Centaurus Hardware and Software Requirements

N/A
N/A
Protected

Academic year: 2021

Share "N-Centaurus Hardware and Software Requirements"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

N-Centaurus Healthcare Call Center Solution

N-Centaurus is LVM Systems’ next generation call center software solution. The synergy of Microsoft’s latest .Net platform and the LVM design allow the software to be run almost anywhere – on a single laptop, and/or by remote users. It also increases the scalability from one to more than 250 concurrent users, whether they are decentralized, telecommuting, or all in one center.

Think of the flexibility! You might have staff at a health fair, making referrals or processing risk assessments on stand-alone PCs. For example, you can simultaneously have 15 staff in your call center and another five working remotely from home via the Internet. All of them would be using the same programs, screens and data.

Individual users can run the software on a local PC at the central call center or on a remote PC using a secure, encrypted Internet connection.

For the benefit of information systems professionals: N-Centaurus is written in

Microsoft’s .NET environment using the latest C# language. It uses MS-SQL Server as the database engine and utilizes a middle tier access layer.

N-Centaurus doesn’t have the limitations of a web browser-based application. Rather, it is a feature-rich, industrial-strength call center application using the latest Microsoft-preferred C# language and the powerful MS-SQL database server. .Net technology allows for use of the application through the Internet when needed. The N-Centaurus design also allows clients to structure the application server(s) and SQL server(s) to meet desired response times and local/remote users access.

Significant LVM development resources have been invested to ensure that N-Centaurus offers the same advantages that set LVM apart from its competition:

 Ease-of-use

 Design

 Screen customization  Data flexibility

 Extensive report writing  Business rules logic

(3)

N-Centaurus N-Tier Architecture

Application:

N-Centaurus written in C#

Windows 7 operating system

.Net 3.5 sp1, 1280 X 768 screen resolution

Workstation Workstation Workstation Laptop Laptop

Intranet/Local Connection

Security/Data Access

Windows 2008 Server or later.

IIS using Port 80 and 443.

Data Storage

Windows 2008 Server of later.

SQL Server 2008 or SQL Server

2008 R2.

SSRS Reporting Services.

Internet (encrypted)

Or

Citrix

Or

Sync Routine

(4)

Recommended Hardware/Software for Centaurus

You’ve reviewed all the documents, you’ve been wowed by the demos and now you want to learn more about LVM Systems. You know that Centaurus’ capabilities are just what you need for your call center to provide increased value to your organization.

But first, you must ensure you have the IT requirements to move forward. What follows is a guideline. LVM will work with you on an individual basis to determine your compatibility .

Data Server

 SQL Server 2008 / SQL Server 2008 R2 Standard or Enterprise editions with the latest service packs. MS-SQL Server License or MS-SQL Access License for each workstation. SQL Server Reporting Services. NOTE: Reporting Services may optionally be run on a separate server with additional SQL licenses.

 Windows 2008 Server or later

 Dual core or dual processors, 2-gigahertz (GHz) or faster  Eight gigabytes of RAM (or more based upon the number

of users)

 CD ROM, NIC cards, monitor, keyboard, mouse  Two SCSI Hard Disks... 100 gigabytes or larger, based

upon needs. One hard disk will store the SQL data and the other hard disk will store the SQL log and backup files. One method to estimate the needed hard disk size is to determine the amount of data space being used in the current application and then times it by a factor of 1.5. You may also use a RAID configuration for your hard disks.)

 Power Supply - UPS

 Tape backup systems that can backup & restore MS SQL databases

Middle Server / Data Access Server:

 Windows 2008 Server or later running IIS

 SSL Certificate (self-signed if running only on an internal network, or signed by a trusted certificate issuer such as VeriSign)

 .NET 3.5 service pack 1

 Dual core or dual processors, 2-gigahertz (GHz) or faster  Eight gigabytes of RAM (or more based upon the number

of users)

 CD ROM, NIC cards, Monitor, Keyboard, Mouse  Power Supply – UPS

Server User Accounts

For each Centaurus database there needs to be at least one user account setup for Centaurus to use to update the database structure. If SQL Authentication is used. LVM recommends that three SQL Server user accounts be setup.  An “LVMAdmin” account to be used in updating the

database structure with DBO rights.

 An “LVMUser” account to be used for end-user access with data-reader/data-writer rights.

 An “LVMReader” account to be used for end-user report access with data reader rights.

Windows Vista or 7 Workstation(s):

 1.5-gigahertz (GHz) or faster processor  Four gigabytes of RAM

 Hard Disk - 80 gigabytes or larger (two gigabytes available to Centaurus application)

 MS-SQL Access License for each workstation.  .NET 3.5 service pack 1. NOTE: The

Administrator Tools (typically installed on the “Master Workstation”) require .NET 4.0.  The workstation or client will be used to store

and execute programs, screens and temporary/ work databases.

 MS-SQL Management Studio and MS-SQL Business Intelligence Development Studio to be installed on at least one “master workstation” – usually the “Super User.” These tools are necessary for any client who will create or modify reports.

 Access for LVM support on the “Master Workstation” – this should allow LogMeIn Rescue to be utilized. See https://

(5)
(6)

References

Related documents

and 2100. Map of the extent of a) extractive industries and b) tree cover loss in Central Africa between 2000 and 2015. Schematic of the flow of wildlife in the commodity

Because the encryption key itself is encrypted and doesn’t leave the drive, the data center administrator doesn’t need to change the encryption key periodically; the way a person

Data are striped across three or more drives for performance, and parity bits are used for fault tolerance. The parity bits from two drives are stored on a third drive and

Alur berita ini diawali oleh tulisan tentang penolakan terhadap potensi penyebaran paham ajaran Negara Islam Irak dan Suriah (ISIS) di Indonesia. Paragraf

In contrast to the previous case-study [BA], the interviews with management indicate that [BB] has different layers of purpose in managing and developing their

You will need hard disk low- level formatting software supplied by the hard disk manufacturer(s) to wipe out the “bad/failed disk” data written on the outer sectors of the

I establish my covenant with you, that never again shall all flesh be cut off by the waters of a flood, and never again shall there be a flood to destroy the earth.” God said,

In this case, when facing voters using majority rule, the proposer is not willing to make a high offer, but rather prefers a smaller offer accepted less often.. Since voters