Having been in this industry for 30+years and only recently left it to start my own training company the new IT manager sounds like a 20-something who can use all these new-fangled words and wants to have a system that uses them while having little idea why. I could be wrong but it feels like it. Who uses the term Web 2.0 anymore? #5 is nonsense as you said and that was my clue.
I would be careful and make sure the system he is asking for is funded or has any legitimate purpose. #6 made me laugh. Given that it is Afghanistan, is SSL the only security concerns that exists!! LOL We have been asked to run some training courses in Afghanist and and Pakistan. we declined! Cheers! -----Original Message----- From: ProFox [mailto:[email protected]] On Behalf Of Sytze de Boer Sent: Tuesday, 8 July 2014 5:23 AM To: profox Subject: Opportunity maybe Over time, I have developed specific applications which are used to record and monitor financial information for AID projects. These aid projects are usually financed by the World Bank and the National Government, such as Afghanistan and Papua New Guinea I completed one such program for Afghanistan in 2006. This project was extended in 2012 and the software was updated at that time. In other words, it is a well established, bug free system. It is a simple multi-user system. A dozen or so free standing dbf files. About the only complexity is the reporting system where the reports are very specific to both the National Government and strict WB standards. Now they have a a new IT manager and he has asked me to price an alteration to the software. He has asked for 1. Web based access based on web 2.0 2. Central database system (SQL, MySQL, or Oracle backend systems). 3. The software should have a user tracking system that each user logs in all the activities should be logged. 4. Backup system inside the software to backup the database no the whole software. 5. The software should support email services to send and receive emails automatically 6. The software should support SSL Certificates to secure end users data access. I do not know how to implement items 1, 2, and 6 Item 3 and 4 is simple. Item 5 is nonsense. Is anyone interested in supporting me in this venture, and if so, how do you propose we go about it. -- Kind regards, Sytze de Boer Kiss Software --- StripMime Report -- processed MIME parts --- multipart/alternative text/plain (text body -- kept) text/html --- [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[email protected] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

