Digital Library

Our Digital Library Can Be Customized for Your Entity

The Digital Library is a custom-developed software that is designed and developed for the to serve as information-sharing hub for anyone interested in research and information gathering.

The software is developed considering UI (User Interface) and UX (User Experience) designs. Our team aims to drive user adoption and satisfaction with an eye for future development. We have performed user-centric analysis to align the overall experience with the Library goals and user needs.

To ensure information quality and integrity, and to prevent unauthorized manipulation or uploading of data, the e-Library has been developed with a two -level data processing schema that accounts for the System User and System Administrator.

Modes of Operation

The Resource Center’s e-Library is a browser-based application with capabilities of work on LAN, WAN or the Internet without having to do any major configuration. With robust processing speed, it uses less computer resources, making it suitable to function on an android powered smartphones or the mobile devices such as iPhone and Tablets.
This App has three modes of operation: Desktop, Mobile Mode and Web/Internet.

Desktop Mode:
When installed on a LAN/WAN, it functions offline and can be reached by all computers connected to that LAN. This type of connectivity enables users across the network to process data based on their user credentials without the need of Internet connection.

Mobile Mode:
This mode of operation makes the software compatible with mobile devices such as Android-powered smartphones, iPhone, Tablets, etc. In the absence of computers, mobile devices can also be used to access information on the platform from anywhere in the world.

Internet/Web Mode:
The Internet mode enables registered online users to connect directly to the web version of the software and access information they desire.
Other Possibilities:
Even in Desktop Mode, when enabled, data processed can be synchronized with the web backup version to enable Administrators process and generate reports from any geographical location.

Type of Users:
There are mainly four types of users: System User, System Administrator, Super Administrator and Subscribers.

System User
The System User is the first in the data processing and validation chain. He is basically the Data Entry User with the right to input, delete or modify data in the system. However, he can only perform these functions on the data he himself inputted into the system.

System Administrator
The System Administrator has the credential to create users for the software, assign their privileges, review and verify all data inputted into the system, and reject or validate same as appropriate. The System Administrator will be able configure the application where necessary. He will be able also to publish resource materials on the local and the online servers of the App. He can also generate and print filtered reports.

Super Administrator
The user with this credential will mainly be able to review the audit trails of all other users. Apart from inputting data into the system, the Super Administrator can virtually perform any other function in the system.
Security Features:
The following security features are integrated into this software.

This user does not need approval for use the plaftform.  This user logs to the platform and registers with a valid email.  After the registering the user valides his subscription and can log in and access the materials on the platform.

  • The system has encrypted password protection for secure information upload
  • User access and permission are configured by the System Admin.
  • A user will have to fill in a Security Code in which the system will automatically generate and assign before access is granted.
  • After 24 hours, the system will automatically terminate any account opening process that has not been activated and delete the pending account.
  • User registration information is also encrypted from end-to-end. Even a Super Administrator will not have the right to read or view such information.
  • All users can change their passwords at any time of their choosing.
  • Every user has a separate login credential and screen.
  • The system can track all Audit Trails of users
  • The system provides SSL (Secure Sockets Layer) encryption.

For Reference: