Week 1: System Overview Project Description AIOcloud File Manager is a PC and mobile app will allow the sync, transfer and editing of document, photos, music and so on between multiple clouds services, i.e., Google Drive, Microsoft SkyDrive, Dropbox, F.T.P and company owned cloud server that has an application-programming interface (API) support. Project Organization Structure The project is organization conform to the principles of Agile-Scrum. Scrum consist of three core roles Product Owner, Scrum Master and the Development Team. The diagram below will show the structure in more detail. Product Owners Senior Product Owner The SPO is responsible for gathering inputs from external stakeholder, end-users, and customers. …show more content…
For security aspect, first you must sign up on our website and purchase the program. After the purchase it completed, it will bring up a user control panel. This is where you log into your individual cloud accounts. Each cloud account will be provide its own unique Token and SHA1 hash for the software authentication. Sync could only be done using the provide software and the token/SHA1 has is provided once. If it was not written down or entered into the software, a new one need to be generated from our webpage user control panel (Krawczyk and Bellare et al., 1997). To measure hash password is to setup a brute force cracker without the salt and if it find the password, some part of the coding is wrong and have to be remedy. Assumptions and Constraints Since with an Agile-Scrum approach, even after each sprint cycle, the product backlog continues to grow with new idea and features. Instead of a traditional use case, Scrum uses User Stories for modelling. The user story usually follow a simple template: As a , I want , So that I can . If the acceptance criteria was not well written it could throw off the project into a different direction altogether (Gayatr and Pammi, 2013). If the API authentication server is down, will there be a temporary authentication server with the real database of private key/hash strings. Would each sprint last one week or two and if a potentially working
2. Digest Authentication- This type of authentication mechanism requires the username and password to be hashed using MD5 and then they are compared with the SQL server.
Strong password policies will be enforced for all users. Passwords will require at least 8 characters, both numbers and letters as well as special characters. The passwords cannot be reused, and must be changed every 90 days. Tokens will be issued to users with certain levels of access to confidential information for an added measure of security.
username and password. A security protocol requires the password to be changed every 30 days. All computers
25. What are the merits of outsourcing the performance of certain value chain activities as opposed to performing them in-house? Under what circumstances does outsourcing make good strategic sense?
Outsourcing is the lifeblood of IT. The prevailing theory is that outsourcing saves companies money and enables them to engage a broader pool of IT skills and talent than they could in-house.
Willowbrook School, a 20 year-old nonprofit educational institution, is committed to providing a high quality, cost effective, safe and culturally progressive education to families with children ranging from preschool age through grade six.
The agile methodology with scrum-based approach has worked effectively for our organization because it is flexible and iterative with continuous feedback and constant communication and favored by frequent and short delivery schedules (Chang, 2010). This approach brings about a high level of competence and high level of motivation to work. It also instills discipline and respect for time by
Outsourcing, especially offshore outsourcing, is not a new topic, but a continuing controversial global trends for the industry of manufacturing, and information technology. As Corbett said, outsourcing is the practice of transferring non-core competitiveness jobs to other suppliers rather than doing it self. Many experts are arguing that offshore outsourcing will harm the U.S. economy than it will benefit the American people in the long run, while advocates can also list a bunch of benefits over adverse. However, the practice of offshore outsourcing has been going on for decades, and it wasn’t resulting as opponents’ claimed. Instead,
User can store their data on cloud and reveal from the local data storage and its maintenance. Cloud is in a distributive in nature includes shared pool of configuring resources both in hardware and software. As an increasing number of clients who store their
Outsourcing is nothing new. It is a difficult issue to handle and tackle, supporters and detractors agree on one thing. That outsourcing will not be eliminated to a complete. That is why I wrote on what is outsourcing, how it affect the economy, and can it be stop.
This issue facing my organization is outsourcing. Outsourcing, the corporate buzzword of the nineteen-nineties through today, is a popular business approach utilized by companies focused on lowering their cost structure, gain entrance to new markets, and expand and build capabilities. Defined as, the strategic use of outside resources to perform activities traditionally handled by internal staff and resources [Handfleld, R, 2006]. Initially, outsourcing targeted non-critical and non-core activities such as facility maintenance and cleaning and security. Later the industry focus began to include the core processes of manufacturing, logistics, and back office support functions. In my experience, the term outsourcing strikes fear into the minds of employees and managers and represents dollar signs to executives and investors. Open communication during change is critical and to eliminate disconnects and misunderstandings. The objective of this paper is to describe both sides, delve into the communication middle ground, and expose the avoidable hidden costs that exist and provide possible solutions to reduce or avoid these hidden costs in value, human capital, and knowledge.
“Cloud” computing is the fanciest buzzword in the computer industry, currently surpassing the last big term “web 2.0”. Every big player in the computer industry launched a cloud service last year. Notable examples are iCloud by Apple, (Apple 2012) or Microsoft Cloud Services (Microsoft 2011), copying various innovators like Google or Dropbox, who offer similar services since much longer. The latter is the most successful
Though outsourcing offers many potential benefits for product development as it may be used to speed up processes and reduce staffing costs; these benefits are speculated and not always certain. As a result, organizations must not overlook the possibilities of failure due to outsourcing. Because of the inherent nature of outsourcing, vital jobs are extremely distant from central headquarters, and control is essentially being shared and sometimes completely transferred to a third party (Rozet, 2009). Some innovation risks associated with outsourcing product development include loss of confidentiality, possible losses of technological core competencies, loss of managerial control, loss of control of outsourced activities, and hidden costs
Many people imagine only enormous Fortune 500 companies as moving production and jobs overseas. However, in today's weakened economy, even smaller businesses are now opting for outsourcing more and more to keep costs low. Even smaller companies have to deal with complex issues that are normally thought to be dealt with by larger Fortune 500 companies. Yet, despite benefits, there are also high risks involved in outsourcing, risks that go far beyond the boundary of the single organization in questions.
Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. This Paper provides different authentication techniques and algorithms for cloud security.