The world has rapidly moved to a paperless environment with the advent of the computer and now the cyber world is taking over where individuals, groups and corporate have recognized the internet as the next big thing. The advent of Web 2. 0 technologies has been instrumental in the shift away from standalone desktops and workstations to a virtual platform that exists In cyberspace. This shift has given rise to a virtual space for users to get connected, develop applications and share information.In this report we wish to elaborate on our efforts to provide a company, namely Foreshore, with an online platform to interact with its partners and everyone associated with it.
To give a brief outline, Foreshore is a non-profit organization providing charities with quality food that would otherwise have been wasted by big retail outlets and super markets. The organization aims to tackle two major issues namely food poverty and food waste, by spreading the slogan “no good food shall be wasted. ” Problem Identification: Foreshore Is spread across sixteen locations In the U. K. We visited the office In Birmingham, where we discussed with Mr.
.Clive Litchis, the Administration Officer at Birmingham, the working of the organization. The Birmingham Office had tied up with over fifty charities based in Birmingham and provided them with food, on demand provided they had stock. On the supply side, they tied up with Kingsbury, a well known mega retail store that agreed to provide free food, a week or two before the “expiry date” which would otherwise head for landfill.
Now the problem we identified here was that being a small organization, Mr. Clive was required to take inventory of the stock and personally feed It into his system every morning.Then the rest of his morning went In calling these charities and reading out the entire inventory and taking the order for every single item. The order was then passed onto the delivery guys who would take the items from the warehouses and drive the vans full of food to the charities. The delivery guys were mostly volunteers who had to sign up In person at the office every morning. This seemed more Like the Job of a waiter at a diner than an official in charge. The above process, according to us was cumbersome for everyone involved.
Mr.. Clive spends hours calling each charity to take the orders.Each call lasts a good twenty minutes. Charities have to call and listen to all the Items available. Volunteers signing up for delivery have to go in person to sign up for deliveries without knowing where they would be required to go. These issues, we believe can be solved with the help of some Web 2.
0 tools by incorporating cloud computing into the processes followed at Foreshore to make them smoother and much more efficient. Thus the task at hand for us Is to provide the said company with an online Infrastructure to increase efficiency and reduce costs in the long run at a minimal cost applying AAAS of Web 2. 0 and cloudTools in Aid – “Web 2. 0, Cloud Computing and AAAS” Web 2. 0, according to us is a revolutionary way of using the web. The whole ideology behind Web 2.
0 is to showcase how powerful the web is and how rapidly there has been a shift in the utility that the internet provides. Web 2. 0 is a category of new Internet tools and technologies created around the idea that the people who consume media, access the Internet, and use the Web shouldn’t passively absorb what’s available; rather, they should be active contributors, helping customize media and technology for their own purposes, as well as those of their communities.
It is the beginning of a new era in technology ? one that promises to help nonprofits operate more efficiently, generate more funding, and affect more lives (Teachers. Com). Web 2.
0 uses web as a platform for harnessing collective intelligence using data from different sources. Web 2. 0 provides users a rich browsing experience by constantly updating the application based on users past experiences (Reilly, 2005).
Cloud computing, a phenomenon surrounding the internet is rapidly growing to be the next big thing. Internet usage has taken the world to a whole new level with the entry of loud computing.Cloud computing is a cheap alternative for software developers and aspiring businessmen looking to make use of the internet as part of their core business. “Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased.Developers with innovative ideas for new Internet services no longer require the large capital outlays in hardware to deploy their service or the human expense to operate it. Armrest et al, 2009) AAAS forms the platforms for businesses wanting to explore opportunities at low costs with minimal infrastructure and reasonable know how.
Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggressors and integrators are already emerging.Thus the Cloud and the AAAS go hand in hand and work in sync with each other at all times. (Informed. Com) Why AAAS as a solution? Before going into details, it would be good to Justify why choosing a Web 2.
AAAS approach as a solution to overcome problems in this case? What are the benefits that the business could gain by switching their traditional daily-bases work to online software driven solution? Recall that a core aspect of Web 2. 0 has to do with web applications that facilitate interactive information sharing, interoperability, user- centered design, and collaboration on the Web. Therefore, restructuring the business work flow to an online Web 2. 0 AAAS solution is preferable for several reasons: 1.Collaboration: information is shared and fed by all stakeholders how are involved in the business processes and are granted an access to the system rather than the rotational way where every piece of details is handled by the auditor (I. E.
Systems portable; where a user can view, edit, or even delete information from any Internet access machine anywhere in the world with a 2417 accessibility.3. Robustness: where applications and database are kept at a robust service provider such as Google, this help keeping the data & applications safe from system crashing, hacking, viruses, and other issues that might cause risks to data if kept at home.4. Hazard free: since data is saved at the cloud which might exist in several ego- locations, this peps it safe from different causes of hazards that could cause harm to it such as environmental hazards (earthquakes, fire, hurricanes, etc).5. Security & administration: rather than depending on personal/employees skills and spending money on required training, it is better to hand it to the specialists in their field who would guarantee a 100% secure and well administrated data/applications.
Our Approach: In order to build the system, work was separated into three stages: analysis of process requirements, design of system architecture (blue-print), and the implementation of the system online.
1. Processes Analysis
The main processes involved within the business needed to be clarified in order to be handled correctly.
By looking at the actual daily-work, four types of processes usually occur:A. Supply process: where the person in charge receive a call from the supplier regarding an available amount of supplies to be picked up from the stores’ warehouse.B. Order process: where charities (customers) are contacted by phone and given information regarding the available goods. Types and amounts of goods are taken to be scheduled for delivery.C. Delivery process: where delivery Jobs are assign to volunteers how deliver the requested amount of goods to the customer. D.
Join in process: this has to deal with suppliers, customers, ad delivery volunteers who wish to Join in the company.
2. System design
Next stage was to design an adequate system that adopt and provide all the previous processes in the new form. As a software solution, various components needed to be taken into consideration.A.
AAAS: the actual software that needed to be built, which will handle the daily processes. The application will be hosted online and will revive adequate access to information and resources and will allow users to carryout daily processes according to their privileges.B. Database: where a relational form of database will be needed to hold the system data.C. Access methods: in addition to usual online access, other ways of accessing might be required as in the case of deliverers where having the ability to access information via their mobiles would be a better portable way.
D. Security: providing a login service which attach every user to his privileged access rights and help maintain security for information not to be exposed to others.
To implement the system online, several services had to be chosen to help in development, and hosting the system online.A.
AAAS as a software was developed using [email protected] DID.A key advantage of using it was that it has a plug-in for Google App Engine provides a secure data connector called Tussahs which control access to data via the protocol.After the system was fully built it was published under the address: http://ambassadors. Passport. Com. Another advantage of using Neatens is the mobile programming capabilities that helped developing the mobile application seed by deliverers.
An extra add-on was made for deliverers by embedding an address locator functionality using Google Maps, where a climbable link appear next to each delivery Job to give a clearer direction for the destination.B. Database was built using Google Spreadsheet as its backbend.
The system’s database was represented by a spreadsheet called Footwear. Two separate spreadsheets were built for supplies and orders and these are reflected into worksheets within Footwear. Also, separate spreadsheets were built for each type of the Join-in candidates (suppliers, charities, and deliverers). In general, there were six spreadsheets that represent the whole database.C. Security handling was one of the biggest issues.
Users had to be authorized & authenticated before granted access to critical information.One approach provided by Google was the Tussahs. To maintain a high level of security, the Tussahs interface enables the application on behalf of the user to grant an access right to the specific sheets.
Thus, login process is completed and the system would be ready for use. New System Scenarios: After building and publishing online, the new system offers four different scenarios ACH of which is applicable to one of the stakeholders.1.
Suppliers Scenario:A. A supplier enters the main page and click on the suppliers’ linkB. Using Google Tussahs technique, the link redirect him to Google login page where he has to provide an eligible login user in order to access suppliers’ page.C. After login in, he will be redirected to suppliers’ page were he can look up a live stock table view and accordingly he can fill up a supply form by types and amount of goods he wishes to supply.D.
After submitting his form, the user could easily logo by closing the page.2. Charities Scenario:Charities scenario is almost alike the previous one, where the charities would login to their page and according to available stocks shown, they could place their order in the provided form.This scenario could be carried out in either Website view, or via the mobile access program.
A. Again, user needs to log in, in order to be redirected to the appropriate page.B. At the Deliverers’ page, the user will see a table of standing orders made by charities available to be chosen. The order status will be “Pending” in red color.C. The user can look up the address location for every delivery Job and chooses the referable one by appending his ID number at the provided field; the status of the order will change to “Processing” in yellow color automatically.
D. After the goods has been delivered, the user would update the status to “done” which will change then to green stating the end of that Job.4. Join in Scenario: A. Where the user will be referred (directly) to the Join in page; there he will choose the type of Joining (either as a supplier, a charity, or a deliverer) and fill the required form accordingly.B.
The information is revised by the company and candidate will be intact rather he will be accepted or not. If so, he will be added the appropriate system user table.