1 / 16

Authors: Avenir Cokaj , Enor Nakuci , Florian Demi, Lejdi Koci

Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients. Authors: Avenir Cokaj , Enor Nakuci , Florian Demi, Lejdi Koci. Rich Internet Applications. Desktop Application Online Scalable Synchronizable

monte
Download Presentation

Authors: Avenir Cokaj , Enor Nakuci , Florian Demi, Lejdi Koci

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure, Scalable, Synchronizable, and Social Business orientedRich Internet Applications to reduce costs and add value to clients Authors: AvenirCokaj, EnorNakuci, Florian Demi, LejdiKoci

  2. Rich Internet Applications • Desktop Application Online • Scalable • Synchronizable • Portable • Rich interface and functionality • Secure

  3. What is Cloud Computing? Cloud computing allows businesses and individuals to use hardware and software as a service over a network. • The cloud services must have these essential characteristics: • on-demand, self-serve access • broad network access that accepts all devices – including: • computers, • smart phones, • game consoles, • and other network-enabled devices • resource pooling • rapid elasticity or scalability • Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service

  4. The types of Cloud Deployments

  5. Some concerns in cloud computing • Security of sensitive data on cloud services • In case of one-to-one relationship of business to provides the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud. • Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for: • segmentation • isolation, • governance, • service levels, • billing models for different customer.

  6. Application Security • Computer malware is getting more complex every day. • hiring a hacker is easy and affordable • hacker proof software applications

  7. Common techniques used by hackers • Social engineering • Phishing • Key logging • Distributed Denial of Service • Traffic sniffing

  8. General protection rules • Basic Training for users • Update Your system Frequently • Detailed Security Levels • Physical Server and Workstation Access protection • Keep Usage and access Logs • Use Intrusion Detection Systems • Read contract terms and Service Level Agreements carefully

  9. Scalable and Synchronizable Applications

  10. Scalable and Synchronizable Applications • Check and summarize the data in the peripheral sites • Centralized vs Decentralized • Transmit the data through any way of communication • optic fibers • GPRS • Etc • Get, verify and store the data in the central site • Server, database

  11. Social Business Social Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of: • employees, • customers, • partners, • suppliers and all other components to maximize the co-created value.

  12. Organization's inside and outside environments • Traditionally: the ideas came from inside of the organization pushed out to the markets. • Social Business: customer feedback, interaction and collaboration.

  13. “Decision-Making” Customer • following up closely the companies updates • they feel like they have a voice • flow of ideas and indications is now reversed from the market reach into the company (outside-in)

  14. Vertical and Horizontal collaboration dynamics • Vertical decision making(upper to lower level) • Horizontal collaboration • Quick information sharing • Friendly Readable data

  15. Conclusion • Choose carefully you software • Security Priority • Scalable and expandable software is crucial • Social Technology

More Related