Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
TechFire Conference Cloud Made Simple - Dispelling the Hype. Brian Larkin Operations Director Digital Planet Brian Larkin Operations Director Digital Planet.
ICS 434 Advanced Database Systems
Which server is right for you? Get in Contact with us
Thought Leadership Portals: Drive for Transparency NAW Large Company Technology Networking Conference June 17, 2008 NAW Large Company Technology Networking.
Cloud Computing From Different Perspective. but first, What is cloud? Why is it called cloud?
By Adam Balla & Wachiu Siu
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
CLOUD COMPUTING.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
Plan Introduction What is Cloud Computing?
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Cloud Computing.
The Internetworked E-Business Enterprise
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Intranet, Extranet, Firewall. Intranet and Extranet.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
CIS 321—IS Analysis & Design Chapter 1: The World of the Modern Systems Analyst.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BUSINESS B1 Information Security.
Database Design – Lecture 16
Computer Science and Engineering 1 Cloud ComputingSecurity.
Cloud Computing.
Cloud Computing By: Carley Paxton. What is Cloud Computing? CloudCloud computing is the next stage in the Internet's evolution, providing the means through.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Chapter 2 Securing Network Server and User Workstations.
Marketing Channels and Supply Chain Management Chapter 12.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Web Technologies Lecture 13 Introduction to cloud computing.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
A Seminar On. What is Cloud Computing? Distributed computing on internet Or delivery of computing service over the internet. Eg: Yahoo!, GMail, Hotmail-
Computers Are Your Future Twelfth Edition
Avenues International Inc.
Introduction to Cloud Computing
The Future? Or the Past and Present?
The Future? Or the Past and Present?
Computers Are Your Future Twelfth Edition
Cloud Computing By P.Mahesh
Introduction to Cloud Computing
Cloud Computing.
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Computing.
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Systems Analysis and Design in a Changing World, 6th Edition
Computer Science and Engineering
Copyright 2005 Prentice- Hall, Inc.
Basics of Cloud Computing
Lecture 03.5: Cloud Computing ( SAAS )
Presentation transcript:

Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj, Enor Nakuci, Florian Demi, Lejdi Koci

Rich Internet Applications Desktop Application Online Scalable Synchronizable Portable Rich interface and functionality Secure

What is Cloud Computing? Cloud computing allows businesses and individuals to use hardware and software as a service over a network. The cloud services must have these essential characteristics: on-demand, self-serve access broad network access that accepts all devices – including: computers, smart phones, game consoles, and other network-enabled devices resource pooling rapid elasticity or scalability Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service

The types of Cloud Deployments

Some concerns in cloud computing Security of sensitive data on cloud services In case of one-to-one relationship of business to provides the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud. Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for: – segmentation – isolation, – governance, – service levels, – billing models for different customer.

Application Security Computer malware is getting more complex every day. hiring a hacker is easy and affordable hacker proof software applications

Common techniques used by hackers Social engineering Phishing Key logging Distributed Denial of Service Traffic sniffing

General protection rules Basic Training for users Update Your system Frequently Detailed Security Levels Physical Server and Workstation Access protection Keep Usage and access Logs Use Intrusion Detection Systems Read contract terms and Service Level Agreements carefully

Scalable and Synchronizable Applications

Check and summarize the data in the peripheral sites – Centralized vs Decentralized Transmit the data through any way of communication – optic fibers – GPRS – Etc Get, verify and store the data in the central site – Server, database

Social Business Social Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of: employees, customers, partners, suppliers and all other components to maximize the co-created value.

Organization's inside and outside environments Traditionally: the ideas came from inside of the organization pushed out to the markets. Social Business: customer feedback, interaction and collaboration.

Decision-Making Customer following up closely the companies updates they feel like they have a voice flow of ideas and indications is now reversed from the market reach into the company (outside-in)

Vertical and Horizontal collaboration dynamics Vertical decision making (upper to lower level) Horizontal collaboration Quick information sharing Friendly Readable data

Conclusion Choose carefully you software Security Priority Scalable and expandable software is crucial Social Technology