1 / 14

Introduction

Isis Secure Room Booking Isis Secure Room Booking is an add on module to the latest version of the Sentry Access Control System. It is primarily intended to handle the booking of (and controlled access to) such areas as group study and resource rooms in universities and colleges. Introduction.

solada
Télécharger la présentation

Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Isis Secure Room Booking Isis Secure Room Booking is an add on module to the latest version of the Sentry Access Control System. It is primarily intended to handle the booking of (and controlled access to) such areas as group study and resource rooms in universities and colleges. Introduction

  2. Web enabled advance booking at users’ convenience • Instant room booking at the door • Improved user experience Benefits for your users

  3. Provides extra security • Maximises room usage • Avoids staff involvement with management of keys • Comprehensive usage reports • Monitors failure to take up room bookings Benefits To the library

  4. Online booking User logs into (or simply visits) a Room Booking web page, selects the time they wish to book and requests an availability search. Isis Secure Room Booking will return a result and if a room is available, will ask the user to confirm by entering their borrower barcode number. Methods of booking rooms

  5. Instantly at the door A user who has not made an online booking can book a room instantly dependent on availability. The display on each TACIM2 wallbox will present a scrolling message which will either say “Room Available until HHMM” or “Room Booked from HHMM”. Methods of booking rooms

  6. Isis Secure Room Booking will consist of extra tables added to the existing Sentry MySQL database. These will hold a record for each room available with timeslots of ½ hour. The Library will define the rules such as limiting the length of any booking, limiting the times rooms are available (could be 24/7) and disqualifying users due to failure to take up previous bookings etc. Room Booking System Defined

  7. TACIM 2 TACIM 2 System Schematic Room 1 Door Controller Room 2 Door Controller Sentry/Room Booking Database Web Server for Bookings Application PC Running Main Application

  8. Room Booking - Remote

  9. Room Booking at the door • Display scrolls room’s availability • Allows user to book any available room at the door

  10. Extra Sentry reports would show room usage and actual take up of bookings by users, e.g. • How many users fail to take advantage of their booking • The general level of bookings made and analysis of popular times of the day, days of the week Reports

  11. Email warnings sent to users who do not take advantage of their booking • Email reminders sent the day before the booking due date, to try to maximise usage • Optional text reminders Warnings and reminders

  12. A Functional/Technical Specification is available on request. Further Information

  13. Thank You

More Related