2nd Edition

 

Contractor Team Members

 

Eric Edge

Dan Sarisky

Joseph Vu

Eric Whitney

 

Client

 

Laura Duggan

 

Boss

 

David Stotts

 

 

Project Summary

 

The purpose of the TikTok project is to provide a web-based time clock for the student-employees of the UNC Computer Science Department. The format consists of a simple web form that lists the student employee's name, in/out status and a field where they can enter their current location. It will utilize ODBC technology as a standard so that future implementations are compatible. 

 

In addition to these features, this package may include authentication by querying users’ NT or UNIX passwords over an encrypted connection, and ideally, users will be able to modify their own data but not other users’. 

 

Contractor Obligations

 

The party of Eric Edge, Dan Sarisky, Joseph Vu, and J. Eric Whitney shall hereafter be collectively referred to as the "contractor." The contractor hereby agrees to design a system and provide the client with functional software that meets the specifications defined below under the heading "Primary Requirements."  The contractor further agrees that this software, hereafter referred to as the "project", shall be delivered to the client no later than 12 NOON, Monday, May 1, 2000, the "due date."

 

In addition to the project the contractor agrees to provide the client with adequate documentation. The documentation will be in hardcopy and on-line.

 

The contractor further agrees that if the project is delivered before the due date stated above, the contractor shall develop additional software that meets the specifications defined under the heading "Secondary Requirements" below. This additional software shall also be delivered to the client no later than the due date.

 

Primary Requirements

 

1)    The project must function in Unix, Windows, and Macintosh operating systems and under the latest versions of Netscape and MS Explorer.

 

 

2)    Web based administration in which administrators can add/delete user names and override data entries.

 

3)    Implement a notification feature in which the failure of a student to check in or out will generate an email to the group of administrators.

 

4)    Use of NT/Unix passwords and an encrypted connection for authentication purposes.

 

Secondary Requirements

 

1)    Implement a logging ability in which the user, the machine they used, and any changes made by that user in the system are logged.

 

2)    Generate professionally formatted html logs upon request reflecting the above logging ability requirements.

 

Client Obligations

 

The party of Laura Duggan and Bil Hays shall hereafter be referred to as the "client." The client agrees to provide the contractor with reasonable access to hardware, software, and services defined below under the heading "Resources."

 

Resources

 

1)    To provide access to passwords and encrypted connection if this specific means of authentication is to be used.

 

2)    Access to space on HTTP server.

 

3)    Microsoft Access and Coldfusion.

 

Risks

 

May not be able to get at NT/UNIX passwords

May not be able to do an encrypted connection.

May not have enough money to buy a software package which would require a scaled down version using CGI/Java.

 

 

Glossary?

 

Signatures

 

Team:

 

Eric Edge:            ____________________________

 

 

Dan Sarisky:        ____________________________ 

 

 

Joseph Vu:           ____________________________

 

 

J. Eric Whitney:   ____________________________

 

 

Client:

 

Laura Duggan:     ____________________________ 

 

Bil Hays:              ____________________________

 

 

Boss:

 

David Stotts:       ____________________________