K/Compute (Private) Limited Web:

Similar documents
DOCUMENT MANAGEMENT GLOSSARY

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

EMC ApplicationXtender Reports Management 6.0

Salesforce CRM Content Implementation Guide

Laserfiche 8.1 New Features Quick Reference. White Paper

Content Services for SAP User Guide for Scanner Operators

Salesforce CRM Content Implementation Guide

Technical Note. Introduction

Using PDF Files in CONTENTdm

Using PDF Files in CONTENTdm

About the integration of IBM Content Collector with IBM Classification Module

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

Database Management System Fall Introduction to Information and Communication Technologies CSD 102

DefendX Software Control-Audit for Hitachi Installation Guide

Cisco Prime Network Client Overview

SOFTOLOGY LIMITED

SILWOOD TECHNOLOGY LTD. Safyr Metadata Discovery Software. Safyr Getting Started Guide

Creating Searchable PDFs with Adobe Acrobat XI - Quick Start Guide

Oracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide. Release February 2016 E

Creating Compound Objects (Documents, Monographs Postcards, and Picture Cubes)

Enterprise Surveillance Manager. Version Installation Manual

docalpha 5.0 Server Configuration Utility User Guide

City of Bartlett. Request for Information. Document Management Solution

Revised: March 8 th, 2017 for Firefox 52.0

Oracle Transparent Gateways

Product Documentation. ER/Studio Portal. User Guide. Version Published February 21, 2012

Perceptive Intelligent Capture Visibility

AccuRoute Web Client v2.0 installation and configuration guide

User s Guide: Advanced Functions

GVP Deployment Guide. Installing GVP with the Deployment Wizard

Stabilix e-business Platform (CloudEx.net) Overview

DOWNLOAD OR READ : THE DECRYPTER AND THE MIND HACKER A CALLA CRESS TECHNO THRILLER CALLA CRESS TECHNO THRILLER SERIES PDF EBOOK EPUB MOBI

NETWRIX WINDOWS SERVER CHANGE REPORTER

Appeon Installation Guide for WebLogic

IBM i Version 7.2. Connecting to your system Connecting to Your system with IBM Navigator for i IBM

Enterprise Guide Version 2.0 for Windows

OrgPublisher 10 Architecture Overview

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd.

Ascent 6.06 Release Script for Hummingbird DM Release Notes

Manual Asp Net Pdf Viewer Control Without

Export out report results in multiple formats like PDF, Excel, Print, , etc.

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp

Suite Hardware and Software Requirements - V4.00

NTP Software File Auditor for Hitachi

Perceptive Nolij Web. Technical Specifications. Version:

Scanning to SkyDrive with ccscan Document Capture to the Cloud

USING IDENTITY FINDER

Laserfiche Product Suite 2011

User Addendum User Box Scan support on the Fiery E C-KM Color Server, version 1.1

Business Process Testing

Symantec ediscovery Platform

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies

Technical product documentation

VPN Connection to HFM Server at Poltrona FrauSite Below it is described how to connect You to Poltronafrau.it domain through a VPN connection.

docalpha 5.0 Recognition Station User Guide

PDF: Accessible Manual

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

The Veritext Vault. User Guide. Veritext s Secure Online Depository. THE VAULT USER GUIDE Updated 8/24/16 1

Silk Performance Manager Installation and Setup Help

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER

AccessData AD Lab Release Notes

GlobalSearch Security Definition Guide

System Requirements EDT 6.0. discoveredt.com

Perceptive Nolij Web. Technical Specifications. Version: 6.8.x

Products Registered: Batch OCR, Production Document Imaging (Kofax or TWAIN), Workstation Client

NETWRIX GROUP POLICY CHANGE REPORTER

The DMS provides a web browser, a desktop client and a mobile browser as standard features.

Ahmed Samir Bibliotheca Alexandrina El Shatby Alexandria, Egypt

ORACLE USER PRODUCTIVITY KIT V3.1.7 (REVISION 1) FREQUENTLY ASKED QUESTIONS

WebsitePanel User Guide

Oracle Application Express: Administration 1-2

For the Windows, Oracle Enterprise Linux, Red Hat Enterprise Linux, and SUSE Linux Enterprise operating systems Software Version: 10.01, CP 12.

Performance Benchmark and Capacity Planning. Version: 7.3

SAS Enterprise Guide 3.0 for Windows

The InfoLibrarian Metadata Appliance Automated Cataloging System for your IT infrastructure.

WinAutomation Version 8 Release Notes

USER S GUIDE Software/Hardware Module: ADOBE ACROBAT 7

ImageSilo Free Trial Tutorial for Government Agencies

docalpha Installation Guide

Windows Remote Agent Console Version Release Notes

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

AvePoint RevIM Installation and Configuration Guide. Issued May AvePoint RevIM Installation and Configuration Guide

SUREedge MIGRATOR INSTALLATION GUIDE FOR HYPERV

Scanshare Sales Guide V1.2

SUREedge MIGRATOR INSTALLATION GUIDE FOR NUTANIX ACROPOLIS

System Architecture Overview. Version 1.1.1

DiskBoss DATA MANAGEMENT

WHITE PAPER. The Architecture and Security of Title SAS Marketing Operations Management

ProClarity Analytics Platform Business Intelligence (BI)

Introduction to Autodesk MapGuide EnterpriseChapter1:

Novell ZENworks Asset Management 7

Introduction to Autodesk MapGuide EnterpriseChapter1:

ScanSoft, Inc. 9 Centennial Drive Peabody, Massachusetts 01960

EMC Captiva Capture. System Overview. Version 7.5. EMC Corporation Corporate Headquarters Hopkinton, MA

Addendum 1. APPENDIX B - Technical Information / Requirements Records Management Solution Capabilities. Questions. Number

Oracle Database 10g: New Features for Release 2 Overview Seminar

ER/Studio Enterprise Portal User Guide

FCSLA PRODUCER GATEWAY

Appeon Installation Guide for WebSphere

Transcription:

K/Compute (Private) Limited Email: info@kcompute.com Web: www.kcompute.com Document Repository v 3.0 Copyright 2012, KCompute (Private) Limited

1.0 Product Brief 1.1 Introduction (KDR ) is an enterprise solution for document management and archiving. KDR system is capable of scanning, uploading & retrieving business documents / manuals stored on a centralized document depository server. KDR system has been designed to cater the needs of large organizations with various computer users to restrict viewing or editing internal and restricted documents. KDR system is fully secure and hacker safe, it restricts distribution and extraction of document once it is secured and hosted. 1.2 Storing Documents The system provides a powerful interface for storing both electronic and un-scanned documents. The system makes no exception in maintaining, searching, and securing any form of document. Each document can be categorized, classified and assigned keywords to enable searching of that document. 1.3 Scanning Documents KDR TWAIN Plug-in provides the document-scanning interface to the existing KDR software. This plug-in enhances the KDR File Maintenance Wizard by enabling it to scan and place documents in the archive all by a one-click operation. KDR Explorer displays the scanned document as well as the other electronic documents in the same manner, in its file list view (the right pane). On opening the document, the Document Viewer downloads the scanned document from the KDR server and displays it for the user. Group 1.4 Document Organization Considering a corporate organization structure, KDR allows the organization of documents in a very flexible and comprehensive manner. Documents can be organized in any form of folders similar to any standard electronic file system. The hierarchy of folders is user definable and any number of folders can be defined. 1.5 Security User User User User Uploads Document Assign Rights Retrieve and View Document kcompute.com Page: 1

Starting from the creation of a new document, documents moving in KDR shell from server to client and vice-versa follow a very tight security mechanism. Every document is encrypted with standard 128-bit encryption algorithm with multiple levels of internal security checks, both at the client and server side. 1.6 User Management and Rights Assignment The KDR s User Maintenance Utility allows administrators to: Add, Edit or Delete User s Functional Group Add, Edit or Delete User Assign Rights of Viewing Document Assign Rights of Uploading/Scanning Document Assign Rights of Printing Document Users will be maintained hierarchically under each Functional Group. The user who has the right of Uploading documents will be considered as the Document Owner. The Document Owner will be allowed to Update and Delete the same document and will be allowed to Assign Rights to Users for Viewing. 1.7 Searching KDR File Finder helps you in searching your documents from virtually any perspective. Documents can be searched by providing any or all values in subject, name, document placement, modification dates, category and classification of the document. The definition of multiple keywords also comes in handy when content based searching is required. 1.8 Optical Character Recognition All scanned documents are also parsed through KDR Text Recognition tool using OCR technology. The text is stored with the document and is available for searching and retrieving documents. kcompute.com Page: 2

Scanning and OCR Model kcompute.com Page: 3

Scanning and OCR Workflow kcompute.com Page: 4

System Requirements 1.9.1 Main Server Operating System: Microsoft Windows 2003 Web Server: IIS Scripting Support: AJAX and JavaScript RDBMS Support: Oracle 9i / 10g or SQL Server 2005 Database Connectivity: OLE DB Securing Documents: Adobe Acrobat 7.0 Document Server: 1.9.2 Client Web Browser: Internet Explorer 6.0 compatible ActiveX support Scanning Interface: TWAIN Plug-in Document Security: KCompute PDF Secure Plug-in kcompute.com Page: 5

2.0 Core Benefits The interface is password protected and provides only authorized users to access the documents. Document Owners of KDR can provide privileges to different set of KDR users who can accordingly perform functions on the documents independently. Different groups or sections can be created to distinguish KDR users and their defined paths through an easy automated setup. The documents are stored using 128-bit encryption after compression at KDR server. The KDR system has been designed with a purpose to save the network bandwidth so to make effective download and upload of files over intranet. Caches are built with each KDR client that checks for the requested file in the local cache and downloads if obsoletes. Highly Scalable and Powerful System Architecture kcompute.com Page: 6

3.0 Why KDR? A Password protected single interface to handle and monitor your files. A centralized server to secure your files. An effective mechanism of working over LAN. A simple method to allocate users to retrieve, view or edit files. A systemize gateway that controls and manage users activities accordingly thus securing data abuse and allow users tracking. A system that even carries structured hierarchy of users and their documents department and category wise. kcompute.com Page: 7