Shengshi Taoyuan network storage system V.2010 version: a professional, powerful, easy-to-use, and reliable E-FILE network storage system. This system is derived from the Shengshi Taoyuan network hard disk management system and Shengshi Taoyuan general file management system of Beijing Shengshi Taoyuan Network Technology Co., Ltd. It follows the B/S+C/S mixed application model in terms of application mechanism, and mainly provides the front desk in terms of functions. Access, storage, backend management, personal center, development interface and other modules help customers achieve centralized storage, effective management and controllable application of E-FILE.
Front-end access supports simple login and traditional homepage mode. It provides automatic file disclosure mechanisms such as popular and latest files on the traditional homepage, similar to a sharing and downloading station. Storage provides the application process from file upload into management mechanism to file download or controllable application. It explains the product concept of storing the world's data and managing the value of information. The backend management provides flexible and rich configuration functions, allowing most users to apply it without secondary development.
This system uses Microsoft WIN+IIS+SQL SERVER+.NET as the operating environment. In terms of performance, it supports massive E-FILE storage, management and applications, supports multi-user online services, supports large file and folder applications, and supports TCP/IP networks. Supports distributed deployment or clustering. In terms of ease of use, this system continues to imitate the WINDOWS application mechanism. Customers who usually use a mouse can use it without training. This system implements SETUP installation and deployment, without the need for users to set up IIS.
This system is an application system that can replace FTP. It can also make up for the shortcomings of OA, email, network disk and other systems, reduce the usage of U disks, CDs and mobile hard disks, and has some information leakage prevention functions. Deploy and apply this system It will provide effective means and solutions to promote users' informatization and low-carbon office.
Ease of use: This system uses WINDOWS+SQL+IIS+.NET as the deployment and operating environment, and the deployment, application and maintenance of this environment are the easiest to use. Secondly, this system can coexist with systems with similar operating environments, and can even It runs concurrently in a SQL database and has low hardware configuration requirements. Therefore, customers can use a server with sufficient resources to host the system, or they can use a more stable ordinary PC or virtual host to host the system. In addition, this system has implemented SETUP, which saves users the trouble of configuring the operating system, IIS, SQL, etc. Under normal circumstances, the installation and deployment can be completed in a few minutes. The system provides a B/S+C/S mixed access application mechanism. The characteristics of this mechanism are: First, it is easy to use. Finally, this system is mainly aimed at internal office applications of the organization. It has extracted hundreds of rational suggestions since the company's three years of development. The system functions are more concise and easy to use, and it continues to maintain the company's product support. Users and mouse users do not need training. Ready-to-use features.
Applicability: This system has rich and flexible configuration capabilities, including whether to run user self-registration, what information to fill in when registering, what permissions you have after registration, what user role you belong to, which unit in the organization you belong to, what you can see, What functions are available, etc. What types of files can be input into this system, how to classify them, how to group and manage categories, how to describe their versions or attributes, how to share or authorize them, etc. All in all, it's all customizable, and by customizing these elements, no matter what industry you're in, what your internal structure is, how you like to describe your users or files, how you want to control system features or permissions, you can Define and easily get a system that is perfect for your application, which will be the most relevant software solution for you.
Scalability: The number of registered users of this system and the upper limit of system management file expansion are determined by the server and database performance and system version type in the system's operating environment. When the server and database performance are sufficient, this system provides the ability to expand users at any time. The configuration capability of the amount and file amount, and the storage amount needs to consider the storage capacity in the server, or after expanding the professional file server or storage device, use the method of adding storage devices to expand the system storage capacity, thereby maintaining scalability In terms of performance expansion, the commercial paid version system supports the separate deployment of WEB servers, database servers, and file services to serve more visits, while the solution version supports distributed service systems to achieve multi-level services and operational-level services. Or the performance of serving millions of users.
Security: The security foundation of this system is Microsoft MVC multi-layer architecture, because this system is built on it. This system is not responsible for the security of operating systems, databases, hardware, network access, etc., but is mainly responsible for the security of WEB and client tool software applications. On this issue, this system provides certification, restrictions, audits, tracing, Various security strategies such as logs and backups are based on micro-granular permission control by system administrators, anonymous users, and registered users. For users who implement confidentiality regulations, this system also provides the ability to turn off content obtained by search engine robots. Switch and other functions, please ask the relevant business representative of our company for specific safety instructions of this system.
Manageability: This system adopts a management mechanism of hierarchical authorization and step-by-step management by super system administrators (often the installers and deployers of the system) to control user roles, organizational structure, files or folders, permissions, storage resources, and applications. All functions provide the necessary management mechanisms for adding, deleting, modifying, and checking. For example, the permissions for folders are divided into five permissions: browsing, directory creation, uploading, downloading, and management. These functions make management very easy.
Expand