DemandCaster is a cloud based application that resides on dedicated servers that Cadent Resources manages. These servers are not shared with any other application and are continually backed up, updated with the latest security patches, and optimized for performance.
The life blood of DemandCaster is data. To that end, DemandCaster is built with an integrated data management service that securely extracts, transforms, and loads data from virtually any ERP system or data source to the DemandCaster application located on our secure servers.
There are three primary components to DemandCaster’s automated Data Management process:
- Data Connector: Connects to any application or data source.
- Data Hub: Data transformation and load into DemandCaster and when applicable load data back to on-premise or cloud application.
- API: Allows us to connect, retrieve, and post data to and from a multitude of sources.
Most on-premise applications are typically kept behind a firewall, with no direct access via the Internet. To handle this requirement, the DemandCaster Data Connector is a lightweight 75 MB package which consists of a Java Virtual Machine, various JDBC drivers, a JDBC-ODBC bridge driver, and the actual Java based Data Connector application. It runs as a windows service on a workstation or your server and serves as the communication link between your application and DemandCaster. No changes to the firewall are required. The Data Connector supports a full bi-directional movement of data in a normalized XML format between your data sources and DemandCaster.
Prior to installing the Data Connector, your IT personal or our support staff enters the integration related information into the DemandCaster Data Hub. Once entered, your passwords are invisible and encrypted to everyone including our authorized support staff. The Data Connector is then downloaded to the location where it will reside, installed, and started.
Upon completion of the Data Connector installation, our support staff is only able to work through the data connector via SQL queries that are written and stored in the Data Hub. We will not be able to log into your server or gain access to your network without the assistance from your personnel.
As a further security measure, you can limit the Data Connector to read only and provide it access to only certain data tables. This can be controlled via the database login credentials you provide. Blackout periods may also be included to prevent the Data Connector from communicating with the Data Hub during certain times when maintenance processes are running for example.
Finally, numerous data connectors may be installed across your extended supply chain to promote end to end supply chain planning and collaboration.