170 likes | 358 Views
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients. Authors: Avenir Cokaj , Enor Nakuci , Florian Demi, Lejdi Koci. Rich Internet Applications. Desktop Application Online Scalable Synchronizable
E N D
Secure, Scalable, Synchronizable, and Social Business orientedRich Internet Applications to reduce costs and add value to clients Authors: AvenirCokaj, EnorNakuci, Florian Demi, LejdiKoci
Rich Internet Applications • Desktop Application Online • Scalable • Synchronizable • Portable • Rich interface and functionality • Secure
What is Cloud Computing? Cloud computing allows businesses and individuals to use hardware and software as a service over a network. • The cloud services must have these essential characteristics: • on-demand, self-serve access • broad network access that accepts all devices – including: • computers, • smart phones, • game consoles, • and other network-enabled devices • resource pooling • rapid elasticity or scalability • Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service
Some concerns in cloud computing • Security of sensitive data on cloud services • In case of one-to-one relationship of business to provides the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud. • Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for: • segmentation • isolation, • governance, • service levels, • billing models for different customer.
Application Security • Computer malware is getting more complex every day. • hiring a hacker is easy and affordable • hacker proof software applications
Common techniques used by hackers • Social engineering • Phishing • Key logging • Distributed Denial of Service • Traffic sniffing
General protection rules • Basic Training for users • Update Your system Frequently • Detailed Security Levels • Physical Server and Workstation Access protection • Keep Usage and access Logs • Use Intrusion Detection Systems • Read contract terms and Service Level Agreements carefully
Scalable and Synchronizable Applications • Check and summarize the data in the peripheral sites • Centralized vs Decentralized • Transmit the data through any way of communication • optic fibers • GPRS • Etc • Get, verify and store the data in the central site • Server, database
Social Business Social Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of: • employees, • customers, • partners, • suppliers and all other components to maximize the co-created value.
Organization's inside and outside environments • Traditionally: the ideas came from inside of the organization pushed out to the markets. • Social Business: customer feedback, interaction and collaboration.
“Decision-Making” Customer • following up closely the companies updates • they feel like they have a voice • flow of ideas and indications is now reversed from the market reach into the company (outside-in)
Vertical and Horizontal collaboration dynamics • Vertical decision making(upper to lower level) • Horizontal collaboration • Quick information sharing • Friendly Readable data
Conclusion • Choose carefully you software • Security Priority • Scalable and expandable software is crucial • Social Technology