Wine Matrix Software Overview | ||||||||||
|
Software Overware Web Based. The Wine Matrix system is 100% web based. It is browser based. This means any device that has a browser and has access to the web can be used. Just about any PC, Laptop, Notebook, phone, or palm top. It is transparent to the operating system. Use Linux, Unix, Mac OSX, even windows systems. You have access anytime anwhere in the world. Subscription based. You don't need to buy a system. No up front money. No maintenance fees. You pay as you go and quit when you want. Being web based, as modules are added or changed, you have access immediately. No distribution cycles. Hardware Cost Use just about any hardware. Even a cheap $200 computer will work. If you want to set up a server so your entire organization has access from anywhere, this can be done for about $40 per year. NO-IP is one possibility. Data Security Data security is important. The system uses user login. You assign access to what systems a user can see and/or update. To protect from a hijecked system, the IP, browser, and OS is compared to make sure you password was not stolen. Place the DB anywhere you like. You can place the DB on your personal PC, server, or even palm tops. For absolute security build your own firewall. You can also set up the system to do replication. Replication is better than backup. It requires 2 machines. Remember machines are only about $200. As you update one PC the other is replicated with the same data. Therefore your data is always backed up. If the main machine failes. It fails-over to the replicated machine, co you don't even know there was a probelm. Bring the main machine back and it syncs itself back. Or you can use the a backup system and backup on a daily basis. Access Security. Only users with a user name and password can access your data. The system assigns a session id when you log in. The SID is a 64 byte one way encrypted field. We record the SID along with your IP address, browser type, operating system and other data. Each time you access the system this data is checked against the SID. Therefore, even if it were possible for someone to hijack your SID, the other data would not match. When this happens the system immediately logs you off. Even within your winery you control what data users have access to. You create groups such as the Cellar group that only has access to cellar systems. As you create your user base, you assign the groups they can use. Since you can have any number of sites, the user only has access to one sites information. |