Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,

Similar presentations


Presentation on theme: "Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,"— Presentation transcript:

1

2 Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj, Enor Nakuci, Florian Demi, Lejdi Koci

3 Rich Internet Applications Desktop Application Online Scalable Synchronizable Portable Rich interface and functionality Secure

4 What is Cloud Computing? Cloud computing allows businesses and individuals to use hardware and software as a service over a network. The cloud services must have these essential characteristics: on-demand, self-serve access broad network access that accepts all devices – including: computers, smart phones, game consoles, and other network-enabled devices resource pooling rapid elasticity or scalability Measured service optimization so that usage can be monitored, controlled, reported, providing transparency for both the provider and consumer of the utilized service

5 The types of Cloud Deployments

6 Some concerns in cloud computing Security of sensitive data on cloud services In case of one-to-one relationship of business to provides the responsibility and the security level are higher. The complexity is in the case of public cloud and hybrid cloud. Multi-tenancy is as well an important characteristic of cloud services. This element requires that the provider implies policies for: – segmentation – isolation, – governance, – service levels, – billing models for different customer.

7 Application Security Computer malware is getting more complex every day. hiring a hacker is easy and affordable hacker proof software applications

8 Common techniques used by hackers Social engineering Phishing Key logging Distributed Denial of Service Traffic sniffing

9 General protection rules Basic Training for users Update Your system Frequently Detailed Security Levels Physical Server and Workstation Access protection Keep Usage and access Logs Use Intrusion Detection Systems Read contract terms and Service Level Agreements carefully

10 Scalable and Synchronizable Applications

11 Check and summarize the data in the peripheral sites – Centralized vs Decentralized Transmit the data through any way of communication – optic fibers – GPRS – Etc Get, verify and store the data in the central site – Server, database

12 Social Business Social Business is the setup of strategies, technologies and procedures to involve regularly and in a systematic order everyone in its ecosystem of: employees, customers, partners, suppliers and all other components to maximize the co-created value.

13 Organization's inside and outside environments Traditionally: the ideas came from inside of the organization pushed out to the markets. Social Business: customer feedback, interaction and collaboration.

14 Decision-Making Customer following up closely the companies updates they feel like they have a voice flow of ideas and indications is now reversed from the market reach into the company (outside-in)

15 Vertical and Horizontal collaboration dynamics Vertical decision making (upper to lower level) Horizontal collaboration Quick information sharing Friendly Readable data

16 Conclusion Choose carefully you software Security Priority Scalable and expandable software is crucial Social Technology


Download ppt "Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,"

Similar presentations


Ads by Google