Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce...
Transcript of Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce...
![Page 1: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/1.jpg)
![Page 2: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/2.jpg)
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications
to reduce costs and add value to clients
Authors:Avenir Cokaj, Enor Nakuci, Florian Demi, Lejdi Koci
![Page 3: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/3.jpg)
Rich Internet Applications
• Desktop Application Online• Scalable• Synchronizable• Portable• Rich interface and functionality• Secure
![Page 4: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/4.jpg)
What is Cloud Computing?Cloud computing allows businesses and individuals to use hardware and software as a service over a network.
The cloud services must have these essential characteristics:•on-demand, self-serve access•broad network access that accepts all devices – including:
• computers,• smart phones, • game consoles, • and other network-enabled
devices•resource pooling•rapid elasticity or scalability•Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service
![Page 5: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/5.jpg)
The types of Cloud Deployments
![Page 6: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/6.jpg)
Some concerns in cloud computing
• Security of sensitive data on cloud services• In case of one-to-one relationship of business to provides
the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud.
• Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for:
– segmentation – isolation, – governance, – service levels, – billing models for different customer.
![Page 7: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/7.jpg)
Application Security
• Computer malware is getting more complex every day.
• hiring a hacker is easy and affordable
• hacker proof software applications
![Page 8: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/8.jpg)
Common techniques used by hackers
• Social engineering• Phishing• Key logging• Distributed Denial of Service • Traffic sniffing
![Page 9: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/9.jpg)
General protection rules
• Basic Training for users • Update Your system Frequently• Detailed Security Levels • Physical Server and Workstation Access
protection • Keep Usage and access Logs • Use Intrusion Detection Systems• Read contract terms and Service Level
Agreements carefully
![Page 10: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/10.jpg)
Scalable and Synchronizable Applications
![Page 11: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/11.jpg)
Scalable and Synchronizable Applications
• Check and summarize the data in the peripheral sites– Centralized vs Decentralized
• Transmit the data through any way of communication– optic fibers– GPRS – Etc
• Get, verify and store the data in the central site– Server, database
![Page 12: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/12.jpg)
Social BusinessSocial Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of:
• employees, • customers, • partners, • suppliers
and all other components to maximize the co-created value.
![Page 13: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/13.jpg)
Organization's inside and outside environments
• Traditionally: the ideas came from inside of the organization pushed out to the markets.
• Social Business: customer feedback, interaction and collaboration.
![Page 14: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/14.jpg)
“Decision-Making” Customer
• following up closely the companies updates• they feel like they have a voice• flow of ideas and indications is now reversed from the
market reach into the company (outside-in)
![Page 15: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/15.jpg)
Vertical and Horizontal collaboration dynamics
• Vertical decision making (upper to lower level)• Horizontal collaboration • Quick information sharing• Friendly Readable data
![Page 16: Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,](https://reader036.fdocuments.us/reader036/viewer/2022062511/55140df5550346d8488b4f1e/html5/thumbnails/16.jpg)
Conclusion
• Choose carefully you software• Security Priority• Scalable and expandable software is crucial• Social Technology