Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce...
Transcript of Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce...
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications
to reduce costs and add value to clients
Authors:Avenir Cokaj, Enor Nakuci, Florian Demi, Lejdi Koci
Rich Internet Applications
• Desktop Application Online• Scalable• Synchronizable• Portable• Rich interface and functionality• Secure
What is Cloud Computing?Cloud computing allows businesses and individuals to use hardware and software as a service over a network.
The cloud services must have these essential characteristics:•on-demand, self-serve access•broad network access that accepts all devices – including:
• computers,• smart phones, • game consoles, • and other network-enabled
devices•resource pooling•rapid elasticity or scalability•Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service
The types of Cloud Deployments
Some concerns in cloud computing
• Security of sensitive data on cloud services• In case of one-to-one relationship of business to provides
the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud.
• Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for:
– segmentation – isolation, – governance, – service levels, – billing models for different customer.
Application Security
• Computer malware is getting more complex every day.
• hiring a hacker is easy and affordable
• hacker proof software applications
Common techniques used by hackers
• Social engineering• Phishing• Key logging• Distributed Denial of Service • Traffic sniffing
General protection rules
• Basic Training for users • Update Your system Frequently• Detailed Security Levels • Physical Server and Workstation Access
protection • Keep Usage and access Logs • Use Intrusion Detection Systems• Read contract terms and Service Level
Agreements carefully
Scalable and Synchronizable Applications
Scalable and Synchronizable Applications
• Check and summarize the data in the peripheral sites– Centralized vs Decentralized
• Transmit the data through any way of communication– optic fibers– GPRS – Etc
• Get, verify and store the data in the central site– Server, database
Social BusinessSocial Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of:
• employees, • customers, • partners, • suppliers
and all other components to maximize the co-created value.
Organization's inside and outside environments
• Traditionally: the ideas came from inside of the organization pushed out to the markets.
• Social Business: customer feedback, interaction and collaboration.
“Decision-Making” Customer
• following up closely the companies updates• they feel like they have a voice• flow of ideas and indications is now reversed from the
market reach into the company (outside-in)
Vertical and Horizontal collaboration dynamics
• Vertical decision making (upper to lower level)• Horizontal collaboration • Quick information sharing• Friendly Readable data
Conclusion
• Choose carefully you software• Security Priority• Scalable and expandable software is crucial• Social Technology