MRBS

PHPApacheMRBSWeb Application

Please feel free to contact us

Go
img

About

MRBS is a Meeting Room Booking System which is used by numerous organizations for the management of meetings in the available rooms. Rooms are arranged by building/area and appears in side-by-side view.

MIRI Infotech is launching a product which will configure and publish MRBS embedded pre-configured tool with LAMP and ready-to-launch AMI on Amazon EC2 that contains MRBS, Apache, MySQL, Linux, PHP (LAMP).

Features:

  • Web/Intranet based – Accessible from any workstation via a Browser.
  • Simple to follow, Web based options and instinctive presentation
  • Flexible Repeating Bookings.
  • Authentication with your existing user database (eg Netware, NT Domain, NIS etc.).
  • Assure that clashing entries cannot be entered.
  • Reporting option.
  • Selectable Day / Week / Month views.
  • Different auth levels (read-only, user, admin).
  • Support for bookings by time or period – perfect for use in schools.
  • Room administrator can be informed of appointments by email.
  • Supports various languages (can be translated to Catalan, Czech, Chinese, Danish, Dutch, Finnish, French, German, Greek, Italian, Japanese, Korean, Norwegian, Portuguese, Slovenian, Spanish, Swedish, Turkish).
  • Stable, thus being used at numerous organizations.
  • Supports MySQL and Postgres

You can subscribe to MRBS, an AWS Marketplace product and launch an instance from the product’s AMI using the Amazon EC2 launch wizard.

To launch an instance from the AWS Marketplace using the launch wizard

  • Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
  • From the Amazon EC2 dashboard, choose Launch Instance.
    On the Choose an Amazon Machine Image (AMI) page, choose the AWS Marketplace category on the left. Find a suitable AMI by browsing the categories, or using the search functionality. Choose Select to choose your product.
  • A dialog displays an overview of the product you’ve selected. You can view the pricing information, as well as any other information that the vendor has provided. When you’re ready, choose Continue.
  • On the Choose an Instance Type page, select the hardware configuration and size of the instance to launch. When you’re done, choose Next: Configure Instance Details.
  • On the next pages of the wizard, you can configure your instance, add storage, and add tags. For more information about the different options you can configure, see Launching an Instance. Choose Next until you reach the Configure Security Group page.
  • The wizard creates a new security group according to the vendor’s specifications for the product. The security group may include rules that allow all IP addresses (0.0.0.0/0) access on SSH (port 22) on Linux or RDP (port 3389) on Windows. We recommend that you adjust these rules to allow only a specific address or range of addresses to access your instance over those ports.
  • When you are ready, choose Review and Launch.
  • On the Review Instance Launch page, check the details of the AMI from which you’re about to launch the instance, as well as the other configuration details you set up in the wizard. When you’re ready, choose Launch to select or create a key pair, and launch your instance.
  • Depending on the product you’ve subscribed to, the instance may take a few minutes or more to launch. You are first subscribed to the product before your instance can launch. If there are any problems with your credit card details, you will be asked to update your account details. When the launch confirmation page displays

Usage/Deployment Instruction

Step 1: Open the URL: http://<instance ip address>

<instance ip address> : IP address of the running EC2 instance.


Step 2: Primary authentication form will be displayed here. You have to fill this form with the instructions provided below on the form.


Step 3: Click on the User list link, present at the right hand top corner and then fill the admin form for new admin. You have to fill the Name and password fields here as per your choise.


Step 4: Login with the above created admin credentials and then use the system.


Step 5: Connect with putty

  • Open Putty >> <instance ip address> >>
  • Open SSH From Left side.
  • Click On Auth
  • Click on Browse Button from Right Side.
  • Select your ppk file.
  • At the end clicks on open.
  • Now your putty is open.

SSH using root user is disabled. ec2-user is the sudo user with root privileges with access using the key pair created during launching the instance.

MYSQL can be accessed only with SSH

MYSQL User : root

Password : <instanceID>


Note : You are not supposed to change it.

All your queries are important to us. Please feel free to connect.

24X7 support provided for all the customers.

We are happy to help you.

Submit your Queryhttps://miritech.com/contact-us/

Contact Numbers:

Contact E-mail:

Submit Your Request





    Input this code: captcha

    The Apache Hadoop software library allows for the distributed processing of large data sets across clusters of computers using a simple programming model. The software library is designed to scale from single servers to thousands of machines; each server using local computation and storage. Instead of relying on hardware to deliver high-availability, the library itself handles failures at the application layer. As a result, the impact of failures is minimized by delivering a highly-available service on top of a cluster of computers.

    Hadoop, as a scalable system for parallel data processing, is useful for analyzing large data sets. Examples are search algorithms, market risk analysis, data mining on online retail data, and analytics on user behavior data.

    Add the words “information security” (or “cybersecurity” if you like) before the term “data sets” in the definition above. Security and IT operations tools spit out an avalanche of data like logs, events, packets, flow data, asset data, configuration data, and assortment of other things on a daily basis. Security professionals need to be able to access and analyze this data in real-time in order to mitigate risk, detect incidents, and respond to breaches. These tasks have come to the point where they are “difficult to process using on-hand data management tools or traditional (security) data processing applications.”

    The Hadoop JDBC driver can be used to pull data out of Hadoop and then use the DataDirect JDBC Driver to bulk load the data into Oracle, DB2, SQL Server, Sybase, and other relational databases.

    Front-end use of AI technologies to enable Intelligent Assistants for customer care is certainly key, but there are many other applications. One that I think is particularly interesting is the application of AI to directly support — rather than replace — contact center agents. Technologies such as natural language understanding and speech recognition can be used live during a customer service interaction with a human agent to look up relevant information and make suggestions about how to respond. AI technologies also have an important role in analytics. They can be used to provide an overview of activities within a call center, in addition to providing valuable business insights from customer activity.

    There are many machine learning algorithms in use today, but the most popular ones are:

    • Decision Trees
    • Naive Bayes Classification
    • Ordinary Least Squares Regression
    • Logistic Regression
    • Support vector machines
    • Ensemble Methods
    • Clustering Algorithms
    • Principal Component Analysis
    • Singular Value Decomposition
    • Independent Component Analysis

    Highlights

    • icon

      Flexible Repeat Bookings

    • icon

      Room administrator can be informed of appointments by email.

    • icon

      Selectable Day / Week / Month views.

    Application Installed

    • icon MRBS
    • icon apache
    • icon linux
    • icon hadoop