Complete and fully-functional working program(s) in executable form as well as complete source code of all work done including the documentation (inline and technical documentation)
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) The programs should run from Apache Tomcat 5.5 onwards. The preferred technology is JSP as front end and MS SQL Server 2005 as backend.
Deliverables must be provided by the developer in ready-to-run condition in the specified environment.
3) Project Description:
We need a work flow engine with created using Java/JSP Technologies that can be implemented for other Java/JSP application / System. This work flow engine must be easy to customize from the date, actor and activities. This work flow engine must support the build of Applications which are able to turn business models into executable software models.
We developed a web based application based on a work flow. To give you an idea, an Application will be received by the registry department. Registry officer captures the minimum details of the application with in stipulated time (i.e. 2 days). Proposed work flow system moves the work item to registry head for approval. After approval of the work item work flow system moves to further processing person work queue.
Proposed work flow system should support the following functionality:
System should read the work queue, time frame and action from the database at regular intervals and distributes the applications accordingly to the next level based on the action. If the work item is not attended by the person by the stipulated time then system should send email notifications to the manager.
In essence we need a work flow engine to be build to support our current application.
a) No Use. Recipient agrees not to use the Confidential Information in any way, or to manufacture or test any product embodying Confidential Information, except for the purpose set forth above.
b) No Disclosure. Recipient agrees to use its best efforts to prevent and protect the Confidential Information, or any part thereof, from disclosure to any person other than Recipient's employees having a need for disclosure in connection with Recipient's authorized use of the Confidential Information.
c) Protection of Secrecy. Recipient agrees to take all steps reasonably necessary to protect the secrecy of the Confidential Information, and to prevent the Confidential Information from falling into the public domain or into the possession of unauthorized persons.
d) Scope. The scope of Confidentiality is deemed to be in all contracts present past and future with the Parties to this request.