1 meteormeteor tim cameron, nchelp john gill, texas guaranteed nchelp summer institute july 14-17,...
DESCRIPTION
3 How does Meteor Work? Meteor uses the concepts of Access Providers and Data Providers. A Meteor Access Provider allows inquirers to obtain information through its web site by hosting a copy of the Meteor software, which generates the request to the Data Providers for the borrower’s information. Access providers can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.A Meteor Access Provider allows inquirers to obtain information through its web site by hosting a copy of the Meteor software, which generates the request to the Data Providers for the borrower’s information. Access providers can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.TRANSCRIPT
1
MeteorMeteorTim Cameron, NCHELP
John Gill, Texas Guaranteed
NCHELP Summer Institute July 14-17, 2002
2
Overview and Overview and Current StatusCurrent Status
3
How does Meteor Work?How does Meteor Work?Meteor uses the concepts of Meteor uses the concepts of Access Access
Providers Providers and and Data ProvidersData Providers..• A Meteor A Meteor Access ProviderAccess Provider allows allows
inquirers to obtain information through inquirers to obtain information through its web site by hosting a copy of the its web site by hosting a copy of the Meteor software, which generates the Meteor software, which generates the request to the Data Providers for the request to the Data Providers for the borrower’s information. Access providers borrower’s information. Access providers can be Schools, Guarantors, Lenders, can be Schools, Guarantors, Lenders, Servicers, or Secondary Markets.Servicers, or Secondary Markets.
4
How does Meteor Work?How does Meteor Work?
• A Meteor A Meteor Data ProviderData Provider hosts a copy hosts a copy of the Meteor software that enables of the Meteor software that enables them to respond to the Access them to respond to the Access Provider’s request for information, Provider’s request for information, supplying data from their system. Data supplying data from their system. Data Providers are typically Lenders, Providers are typically Lenders, Servicers, Guarantors, and Secondary Servicers, Guarantors, and Secondary Markets. In the future, the Dept. of ED, Markets. In the future, the Dept. of ED, State Grant authorities, Schools, and State Grant authorities, Schools, and others could become Data Providers.others could become Data Providers.
5
Simplified Meteor ProcessSimplified Meteor Process
One
Two
Access Providers
Data Providers
Financial Aid Professional/Student
Three
Index Providers
6
Meteor MaturityMeteor Maturity• With the reference implementation With the reference implementation
IM+M did a great job of proving the IM+M did a great job of proving the technologytechnology
• The past year has been spent gathering The past year has been spent gathering the business requirements and the business requirements and matching them to the appropriate matching them to the appropriate architectural solutionarchitectural solution– Usage scenariosUsage scenarios– Business rulesBusiness rules– Data/system securityData/system security– Authentication and authorizationAuthentication and authorization
7
Meteor StandardsMeteor Standards
• Business messaging using XMLBusiness messaging using XML– Collaboration with the PESC XML Collaboration with the PESC XML
Forum for EducationForum for Education– Based on IFX StandardsBased on IFX Standards– Consistent with the Department of Consistent with the Department of
Education’s Common Record and the Education’s Common Record and the current NCHELP CommonLine XML current NCHELP CommonLine XML initiativeinitiative
8
Meteor StandardsMeteor Standards
• TransportTransport– Collaboration with the Electronic Collaboration with the Electronic
Exchange Advisory Team of the Exchange Advisory Team of the NCHELP Electronic Standards NCHELP Electronic Standards CommitteeCommittee
– High Performance ChannelHigh Performance Channel
9
Meteor StandardsMeteor Standards
• AuthenticationAuthentication– Based on SAMLBased on SAML– Collaborative effort with ShibbolethCollaborative effort with Shibboleth– Industry standard doesn’t currently Industry standard doesn’t currently
exist, but will converge with exist, but will converge with “standard” when it is available“standard” when it is available
10
Meteor ArchitectureMeteor Architecture
• Meteor employs a “web services” Meteor employs a “web services” architecturearchitecture– No central data repositoryNo central data repository– Peer-to-peer communicationsPeer-to-peer communications
• Seamless aggregation of information for Seamless aggregation of information for usersusers
11
Meteor is Cutting EdgeMeteor is Cutting Edge
• In the world of web services In the world of web services applications, Meteor is leading the applications, Meteor is leading the wayway
• Meteor’s open-source web service Meteor’s open-source web service architecture can be the example architecture can be the example for student aid services, as well as for student aid services, as well as other education applications, and other education applications, and even growing into broader IT even growing into broader IT considerationsconsiderations
12
Meteor Implementation PhasesMeteor Implementation Phases
• Current PhaseCurrent Phase– Multiple data providersMultiple data providers– Multiple access providersMultiple access providers– Loan Summary & Detail InformationLoan Summary & Detail Information– Financial aid professional (school) Financial aid professional (school)
access access
13
Meteor Implementation PhasesMeteor Implementation Phases
• Next phaseNext phase– Financial aid professional Financial aid professional and and
student/borrower accessstudent/borrower access
14
The Current State of Meteor AffairsThe Current State of Meteor Affairs
• March 18-20, 2002: Tallahassee, FL March 18-20, 2002: Tallahassee, FL (OSFA)(OSFA)– Purpose was to finalize configuration Purpose was to finalize configuration
and setup of the Meteor code and its and setup of the Meteor code and its counterpart, HPCcounterpart, HPC
– Very successful, exceeded Very successful, exceeded expectations of the testing teamexpectations of the testing team
15
The Current State of Meteor AffairsThe Current State of Meteor Affairs
• April 30 2002 - May 2, 2002: Meteor April 30 2002 - May 2, 2002: Meteor Security and Authentication Security and Authentication Conference Calls Conference Calls – IntroductionIntroduction– Policy ReviewPolicy Review– Model/Process Flow ReviewModel/Process Flow Review– Technical ReviewTechnical Review
16
The Current State of Meteor AffairsThe Current State of Meteor Affairs• May 15-17, 2002: Chicago, IL (ISAC)May 15-17, 2002: Chicago, IL (ISAC)
– Simulated Network of 24 HubsSimulated Network of 24 Hubs– Simulated Registry ServerSimulated Registry Server– Tested the LDAP and SecurityTested the LDAP and Security– Populated the Registry Information Including Populated the Registry Information Including
Public and Signed KeysPublic and Signed Keys– Set Up Several Access ProvidersSet Up Several Access Providers– Set Up Several Data ProvidersSet Up Several Data Providers– Began Testing Business CasesBegan Testing Business Cases– Tested Connections, Data Retrieval and Tested Connections, Data Retrieval and
Information DisplayInformation Display– Tested Error Messages Tested Error Messages
17
The Current State of Meteor AffairsThe Current State of Meteor Affairs
• Threat AnalysisThreat Analysis• Finalizing the Access/Data Provider Finalizing the Access/Data Provider
AgreementAgreement• Finalizing development of the Finalizing development of the
Implementation GuideImplementation Guide
18
The Current State of Meteor AffairsThe Current State of Meteor Affairs• Estimated current phase public Estimated current phase public
code release set for August 1, 2002code release set for August 1, 2002• Early adopter implementation Early adopter implementation
begins at public release through the begins at public release through the end of 2002end of 2002
19
Early AdoptersEarly Adopters• AESAES• Connecticut Student Loan Connecticut Student Loan
Foundation - GAFoundation - GA• Connecticut Student Loan Connecticut Student Loan
Foundation - LenderFoundation - Lender• Florida Dept. of Florida Dept. of
Education, OSFAEducation, OSFA• Georgia Higher Education Georgia Higher Education
Assistance CorporationAssistance Corporation• Great Lakes Higher Great Lakes Higher
Education CorporationEducation Corporation
Illinois Student Illinois Student Assistance Assistance CommissionCommission
NELANELA National Student National Student
Loan ProgramLoan Program Sallie MaeSallie Mae Student Loan Student Loan
Guarantee Guarantee Foundation of Foundation of ArkansasArkansas
Texas GuaranteedTexas Guaranteed USAFundsUSAFunds
20
Meteor TechnologyMeteor Technology
21
Meteor Foundation TechnologyMeteor Foundation Technology
• SOAP, LDAP, XML, JavaSOAP, LDAP, XML, Java• These tools are freely availableThese tools are freely available
– Open Source, as well as…Open Source, as well as…– Commercially SupportedCommercially Supported
• Can run many platformsCan run many platforms– Linux, Sun Solaris, Other UnicesLinux, Sun Solaris, Other Unices– AS/400AS/400– Microsoft WindowsMicrosoft Windows
22
Meteor ArchitectureMeteor Architecture
HTTPS
Access Provider
Authenticate
XML Request
XML Response
XML Request
XML Response
DataProvider
LegacyData
Portal orWeb SiteRequest
XSLT XMLResponse
IndexProvider
CustomCode
Authenticate
Authenticate
Lightweight D
irectory A
ccess Protocol (LD
AP
)
GenericRules
Engine
Meteor System
23
Technology RequirementsTechnology Requirements
• UML Uniform Modeling Language• XML or Extensible Markup Language• JSP or Java Server Pages ,XML, XSLT • JDBC for connecting to SQL DBs• Ability to build connections to non-SQL,
legacy DBs• TCP/IP & SOAP
24
Architectural BenefitsArchitectural Benefits
• Foundation for continued growth in Foundation for continued growth in collaborative student aid servicescollaborative student aid services
• Flexibility in implementation and Flexibility in implementation and deploymentdeployment
• Low/no cost options for Low/no cost options for establishing this foundationestablishing this foundation
25
Access Provider RequirementsAccess Provider Requirements
• A web site that acts as a “portal” A web site that acts as a “portal” to launch the Meteor channelto launch the Meteor channel
• The ability to implement the The ability to implement the Meteor softwareMeteor software
• The ability to send Meteor request The ability to send Meteor request messages and deal with Meteor messages and deal with Meteor response messages (if building response messages (if building your own presentation)your own presentation)
• Abiding by the “rules of the game”Abiding by the “rules of the game”
26
Data Provider RequirementsData Provider Requirements
• Ability to respond to Meteor data Ability to respond to Meteor data requestsrequests– Connections to legacy data systemsConnections to legacy data systems– Gathering data and passing it back to Gathering data and passing it back to
the Meteor softwarethe Meteor software– Formatting or mapping the data to Formatting or mapping the data to
the Meteor XML messagethe Meteor XML message• Abiding by the “rules of the game”Abiding by the “rules of the game”
27
Meteor’s Foundation PrinciplesMeteor’s Foundation Principles
• Open SourceOpen Source• Open CollaborationOpen Collaboration• Freely AvailableFreely Available• Controlled Participation NetworkControlled Participation Network• But, do the current IT trends But, do the current IT trends
support this model?support this model?• Let’s examine similar effortsLet’s examine similar efforts
28
IT and Open SourceIT and Open Source• Linux is the most successful open source Linux is the most successful open source
efforteffort– "What's really happening in a nutshell is Linux "What's really happening in a nutshell is Linux
is becoming a dominant force in the financial is becoming a dominant force in the financial services industry" Michael Evans, Head of services industry" Michael Evans, Head of Business Development, Red HatBusiness Development, Red Hat
– Investment bank Morgan Stanley called Linux Investment bank Morgan Stanley called Linux an "important evolutionary platform" and said an "important evolutionary platform" and said Reuters' decision to support the standard was Reuters' decision to support the standard was "important to our efforts and ... strategic to "important to our efforts and ... strategic to Morgan Stanley." Morgan Stanley."
– CSFB increased performance by 20% at a CSFB increased performance by 20% at a lower cost by using open technologylower cost by using open technology
29
The Meteor NetworkThe Meteor Network
• But what about the participatory But what about the participatory network aspect of Meteor?network aspect of Meteor?– There is no good current exampleThere is no good current example
• That does not mean that the That does not mean that the approach is flawed, but just that it approach is flawed, but just that it is newis new
30
Meteor is Cutting EdgeMeteor is Cutting Edge
• In the world of web services In the world of web services applications, Meteor is leading the applications, Meteor is leading the wayway
• Meteor’s open-source web service Meteor’s open-source web service architecture can be the example architecture can be the example for student aid services, as well as for student aid services, as well as other education applications, and other education applications, and even growing into broader IT even growing into broader IT considerationsconsiderations
31
Leveraging TechnologyLeveraging Technology
• Meteor has a big upsideMeteor has a big upside– This release will have a moderate This release will have a moderate
impactimpact– Future releases will be big Future releases will be big
enhancementsenhancements• The infusion of new technology The infusion of new technology
creates opportunity for individual creates opportunity for individual agenciesagencies
32
Opportunity KnocksOpportunity Knocks
• Meteor implementation should be Meteor implementation should be viewed as an opportunity to viewed as an opportunity to enhance customer serviceenhance customer service
• Customers are demanding more Customers are demanding more real-time access to informationreal-time access to information
• Meteor can be the vehicle for Meteor can be the vehicle for providing that accessproviding that access
33
Meteor InstallationMeteor Installation
34
Meteor Out of the BoxMeteor Out of the Box
• What’s on the Meteor CD?What’s on the Meteor CD?• Installing Java or the JVMInstalling Java or the JVM• Installing the Application ServerInstalling the Application Server• Installing the Access Provider Installing the Access Provider
SoftwareSoftware• Installing the Data Provider Installing the Data Provider
SoftwareSoftware• Installing MYSQL databaseInstalling MYSQL database• Configuring the Access ProviderConfiguring the Access Provider• Configuring the Data ProviderConfiguring the Data Provider
35
What’s on the Meteor CD?What’s on the Meteor CD?• Meteor installation and configuration instructionsMeteor installation and configuration instructions• Windows platforms, Sun,IBM, Linux forWindows platforms, Sun,IBM, Linux for
– JavaJava– TomcatTomcat– MySQL DatabaseMySQL Database
• Meteor SoftwareMeteor Software– Access ProviderAccess Provider– Data ProviderData Provider– Index ProviderIndex Provider
• Meteor source codeMeteor source code• Meteor Test DataMeteor Test Data• High Performance Channel (HPC) software, code, and High Performance Channel (HPC) software, code, and
documentationdocumentation
36
Installing Java or the JVMInstalling Java or the JVM• The following examples are simulating a windows install.The following examples are simulating a windows install.• On the CD find the directoryOn the CD find the directory
– D:\Windows\Java – SunD:\Windows\Java – Sun• Double clickDouble click
– j2sdk-1_4_0-win.exej2sdk-1_4_0-win.exe• Set your Environment variablesSet your Environment variables
– Go to your control panel and click the system iconGo to your control panel and click the system icon– When the dialog box appears. Select the “Advanced” When the dialog box appears. Select the “Advanced”
tab.tab.– Click the “Environment Variables” button.Click the “Environment Variables” button.– Click the “new” button” Click the “new” button” – Add the following in the variable name Box: JAVA_HOMEAdd the following in the variable name Box: JAVA_HOME– Add the following in the variable value Box: f:\apps\java Add the following in the variable value Box: f:\apps\java
(Directory you installed java)(Directory you installed java)– Click the ok buttons until the dialogs are closed.Click the ok buttons until the dialogs are closed.
37
Installing the Application ServerInstalling the Application Server
• On the CD find the directoryOn the CD find the directory– D:\Windows\TomcatD:\Windows\Tomcat
• Double clickDouble click– jakarta-tomcat-4.0.4-b1.exejakarta-tomcat-4.0.4-b1.exe
• Set your Environment variablesSet your Environment variables– Go to your control panel and click the system iconGo to your control panel and click the system icon– When the dialog box appears. Select the “Advanced” When the dialog box appears. Select the “Advanced”
tab.tab.– Click the “Environment Variables” button.Click the “Environment Variables” button.– Click the “new” button” Click the “new” button” – Add the following in the variable name Box: Add the following in the variable name Box:
TOMCAT_HOMETOMCAT_HOME– Add the following in the variable value Box: f:\Add the following in the variable value Box: f:\
app_servers\Tomcat (Directory you installed tomcat)app_servers\Tomcat (Directory you installed tomcat)– Click the ok buttons until the dialogs are closed.Click the ok buttons until the dialogs are closed.
38
Testing the Application ServerTesting the Application Server• Start Tomcat from the menu.Start Tomcat from the menu.• Execute a web browers like Internet Execute a web browers like Internet
Explorer.Explorer.• Enter a url likeEnter a url like
– http://jdlr.com:8080/index.htmlhttp://jdlr.com:8080/index.html– http://localhost:8080/index.htmlhttp://localhost:8080/index.html
• You should see the Jakarta main page.You should see the Jakarta main page.
39
Meteor Software InstallMeteor Software Install• Stop Tomcat from the menu.Stop Tomcat from the menu.• On the CD find the directorys and filesOn the CD find the directorys and files
– D:\Meteor\AccessProvider\distD:\Meteor\AccessProvider\dist• AccessProvider.warAccessProvider.war
– D:\Meteor\DataProvider\distD:\Meteor\DataProvider\dist• DataProvider.warDataProvider.war
• Copy the war files to the Tomcat web-apps Copy the war files to the Tomcat web-apps directorydirectory
• Start TomcatStart Tomcat• Stop Tomcat (When you see that it created the Stop Tomcat (When you see that it created the
Access Provider and Data Provider directories.Access Provider and Data Provider directories.• You have just completed the meteor install.You have just completed the meteor install.
40
Installing MySQL DatabaseInstalling MySQL Database
• On the CD find the directories and filesOn the CD find the directories and files– mysql-3.23.49-win.zipmysql-3.23.49-win.zip– Unzip to a temp directoryUnzip to a temp directory– From the temp directory. Execute setup.exeFrom the temp directory. Execute setup.exe
• Go through the install.Go through the install.
41
Creating a databaseCreating a database• Go to the mysql bin directory and executeGo to the mysql bin directory and execute
– Winmysqladmin.exeWinmysqladmin.exe– A dialog of my admin should appearA dialog of my admin should appear
• Go to the “Databases” tabGo to the “Databases” tab• Right click and in the databases area. Dialog Right click and in the databases area. Dialog
should appear.should appear.– Enter MeteorEnter Meteor– Click “Create Database”Click “Create Database”
• Close all dialogs.Close all dialogs.• You have just created the databaseYou have just created the database
42
Creating your Meteor TablesCreating your Meteor Tables• On the cd findOn the cd find
– D:\Meteor\DataProvider\etcD:\Meteor\DataProvider\etc• meteor.mysql.ddlmeteor.mysql.ddl
• Go to the windows command prompt and typeGo to the windows command prompt and type– MysqlMysql
• Connect meteorConnect meteor• At the mysql prompt, type: “source At the mysql prompt, type: “source
meteor.mysql.ddl;” The database schema will meteor.mysql.ddl;” The database schema will be created. Verify this with the command be created. Verify this with the command “show tables”.“show tables”.
• You have just created the tables for meteor.You have just created the tables for meteor.
43
MySQL Setting Up a User MySQL Setting Up a User AccountAccount
– From the mysql promptFrom the mysql prompt– mysql –u root mysqlmysql –u root mysql– UPDATE USER SET UPDATE USER SET
Password=PASSWORD(‘new_password’) Password=PASSWORD(‘new_password’) WHERE USER=’root’;WHERE USER=’root’;
– FLUSH PRIVLEGESFLUSH PRIVLEGES
44
Loading some test dataLoading some test data– At the MySQL prompt runAt the MySQL prompt run– source source
c:/mysql/testdata/sbs/testcase500_load554.c:/mysql/testdata/sbs/testcase500_load554.xml.txt; <enter>xml.txt; <enter>
– To view data runTo view data run– select * from person; <enter>select * from person; <enter>
45
Configuring the Access ProviderConfiguring the Access Provider• You must now make several changes to the settings files You must now make several changes to the settings files
located in “TOMCAT_HOME\webapps\AccessProvider\located in “TOMCAT_HOME\webapps\AccessProvider\WEB-INF\classes”:WEB-INF\classes”:
• Accessprovider.propertiesAccessprovider.properties– Meteor.default.institution.idMeteor.default.institution.id– Some unique value that identifies your organization. Some unique value that identifies your organization.
• Authentication.propertiesAuthentication.properties– Authentication.signassertionAuthentication.signassertion– Authentication.identifierAuthentication.identifier
• Directory.propertiesDirectory.properties– Directory.providerurlDirectory.providerurl
Ldap://x.x.x.x:389 Ldap://x.x.x.x:389 • (some URL for the directory provider LDAP server.(some URL for the directory provider LDAP server.
– Directory.basednDirectory.basednDc=doe,dc=orgDc=doe,dc=org
46
Configuring a Data ProviderConfiguring a Data Provider• Example of database connectionExample of database connection• Modify Modify $TOMCAT_HOME\webapps\$TOMCAT_HOME\webapps\
DataProvider\WEB-INF\classes\DataProvider\WEB-INF\classes\dataprovider.propertiesdataprovider.properties
• Set the following keys to appropriate values Set the following keys to appropriate values for your particular JDBC Database.for your particular JDBC Database.– com.prioritytech.sample.JDBCClass=org.gjt.com.prioritytech.sample.JDBCClass=org.gjt.
mm.mysql.Drivermm.mysql.Driver– com.prioritytech.sample.JDBCURL=jdbc:myscom.prioritytech.sample.JDBCURL=jdbc:mys
ql://localhost:3306/meteorql://localhost:3306/meteor– com.prioritytech.sample.JDBCUserID=admincom.prioritytech.sample.JDBCUserID=admin– com.prioritytech.sample.JDBCPassword=adcom.prioritytech.sample.JDBCPassword=ad
minmin
47
Configuring a Data ProviderConfiguring a Data Provider• Example of demographic informationExample of demographic information• Set the following keys to values appropriate for your Set the following keys to values appropriate for your
organization.organization.– DataProvider.Data.Name=Priority Technologies, Inc.DataProvider.Data.Name=Priority Technologies, Inc.– DataProvider.Data.ID=ED.PTIDataProvider.Data.ID=ED.PTI– DataProvider.Data.URL=http://www.prioritytech.com/DataProvider.Data.URL=http://www.prioritytech.com/
MeteorMeteor– DataProvider.Data.Type=SBSDataProvider.Data.Type=SBS– DataProvider.Data.Contacts.PhoneNum=(402) 292-1212DataProvider.Data.Contacts.PhoneNum=(402) 292-1212– DataProvider.Data.Contacts.Email=meteor@prioritytechDataProvider.Data.Contacts.Email=meteor@prioritytech
.com.com– DataProvider.Data.Contacts.Addr=1508 J F Kennedy Dr.DataProvider.Data.Contacts.Addr=1508 J F Kennedy Dr.– DataProvider.Data.Contacts.Addr2=Suite 101DataProvider.Data.Contacts.Addr2=Suite 101– DataProvider.Data.Contacts.City=BellevueDataProvider.Data.Contacts.City=Bellevue– DataProvider.Data.Contacts.StateProv=NEDataProvider.Data.Contacts.StateProv=NE– DataProvider.Data.Contacts.PostalCd=68005DataProvider.Data.Contacts.PostalCd=68005
48
Running Meteor StandaloneRunning Meteor Standalone• For running Meteor without LDAP (demo / For running Meteor without LDAP (demo /
stand-alone mode)stand-alone mode)in directory.properties change directory.classin directory.properties change directory.classfromfrom “LDAPDirectory”“LDAPDirectory”toto “PropertiesDirectory”“PropertiesDirectory” Then populate (create file / get from CD) Then populate (create file / get from CD) directorydata.propertiesdirectorydata.propertiesThen change Then change Authentication.SignedAssertion=No Authentication.SignedAssertion=No
49
Testing the Access ProviderTesting the Access Provider• Start Tomcat from the menu.Start Tomcat from the menu.• Go to Go to http://http://localhostlocalhost:8080/:8080/AccessProviderAccessProvider//
and test the system using a known SSN. The and test the system using a known SSN. The system should return data (test SSN is often system should return data (test SSN is often 987-65-4321).987-65-4321).
• Should see the Meteor screen.Should see the Meteor screen.• This completes the testing of a meteor setup This completes the testing of a meteor setup
standalone.standalone.
50
Getting Ready for ProductionGetting Ready for Production
• Before you can test and go into production Before you can test and go into production within the Meteor network you must obtain the within the Meteor network you must obtain the following.following.– A digital certificate from a CA, like Verisign.A digital certificate from a CA, like Verisign.– You must present it to MAT to be signed.You must present it to MAT to be signed.– MAT will gather information needed to add MAT will gather information needed to add
you to the LDAP registry.you to the LDAP registry.– They will add you to the LDAP registry.They will add you to the LDAP registry.– They will provide you with information to They will provide you with information to
load your properties files.load your properties files.– You will have to comply with all Meteor You will have to comply with all Meteor
agreements.agreements.
51
Current Meteor Current Meteor ScreensScreens
52
53
54
55
56
57
58
59
60
61
62
63
64
HELP ! – Who can I call to get more HELP ! – Who can I call to get more informationinformation
• Until the RFP is awarded, you can contact the Until the RFP is awarded, you can contact the Meteor Technical team members. They are Meteor Technical team members. They are listed on a number of sites. listed on a number of sites.
• Meteor will be holding an installation seminar Meteor will be holding an installation seminar soon after the final release.soon after the final release.
• E-mail me directly or post a question to the E-mail me directly or post a question to the Yahoo Tech site. All members of the Yahoo Tech site. All members of the technology team receive the e-mails.technology team receive the e-mails.
65
SummarySummary
• The past year has been spent in The past year has been spent in making cutting-edge technology making cutting-edge technology address real business objectivesaddress real business objectives
• The Meteor architecture is The Meteor architecture is advanced technology—not only in advanced technology—not only in FFELP, but in all of ITFFELP, but in all of IT
• This advanced technology provides This advanced technology provides collateral opportunities to enhance collateral opportunities to enhance customer service. customer service.
66
Meteor Ongoing StatusMeteor Ongoing Status
For current status and updates:For current status and updates:• Meteor Project Info:Meteor Project Info:
http://www.nchelp.org/Meteor/Meteor.htm• Meteor Implementers Page: Meteor Implementers Page:
http://www.nchelp.org/Meteor/MeteorImplementorsPage.htm
• Meteor Tech Info: Meteor Tech Info: http://groups.yahoo.com/group/meteor_tech
67
QuestionsQuestions
• If you have additional questions. Please e-mail:
[email protected]@nchelp.org
[email protected]@tgslc.org