× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Rick,

Given you've charted the workflow it now seems you are at stage where
data elements can be mapped to a database (existing or to be created).
Once that is done you can decide on user interface - GUI or green
screen.  

With GUI there is the choice of browser or writing your own fat client.
If you don't have the in-house expertise, or money to experiment some,
GUI is probably a phase 2 project.

With a green screen approach you get something in place rather quickly.
The remote sites would need an emulator though.  It can always be
GUIized at a later time.  Separating business logic and database
updating from of presentation logic will start you on the road to having
the application ready for your GUI project.  


-----Original Message-----
From: rick.baird@xxxxxxxxxxxxxxx [mailto:rick.baird@xxxxxxxxxxxxxxx] 
Sent: Tuesday, November 25, 2003 1:51 PM
To: Midrange Systems Technical Discussion
Subject: RE: Where would you start?



Gary,

good suggestions all - in fact most of this is already spec'd out.

The workflow has already been charted, and I could implement 5 or 6
things
to improve the existing process in short order, but my fears (and those
of
management) are that these would only be patches, rather than a
strategic
long solutions, and any half-a** attempt at shoring up the existing
system
would be throwing good money after bad.  The other fear is that we could
get ourselves into a quagmire of just-learned technologies and
techniques
that won't work as thought or advertised - more good money after bad.

The stores are already on a vpn, in fact they can get nowhere except our
network, and specific sites of our choosing.

I guess what I'm looking for is the actual design/programming platforms
that would lend themselves to our requirements.

thanks,

Rick

---original message-----------
Rick,

It may be you are looking at job security, perceived data security, and
CYA issues.  I'd start by doing a work flow diagram of your existing
process.  You'd be surprised at what jumps out at you.  Then I'd start
asking questions and looking for ways to streamline the process.  One
thing that stands out in the process you describe is the paper trail
generated by both sides.  Says to me some form of change control
mechanism to satisfy both sides needs to be part of the solution.

I'd also look at the ROI of my proposed solutions.  If I'm going to a
more computerized solution SSL or VPN will probably play into the mix.
Will you need more equipment, personnel, etc. to implement the solution?
And so on.


_______________________________________________
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.