FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE
|
|
- Randolf Warner
- 6 years ago
- Views:
Transcription
1 FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE Table of Contents Introduction... 2 Architecture Overview... 2 Supported Browser Versions and Technologies... 3 Firewalls and Login Sessions... 3 Hosted vs. On-Premise... 4 Data Security and Privacy... 4 API Access... 4 Conclusion... 5 Abstract This document details the technical architecture of Firefly. It covers the backend infrastructure, serverclient connection methods, software delivery methods, API access details, security, reliability, and more. Product Information: Sales Inquiries: product@usefirefly.com sales@usefirefly.com (213) Address: 3720 Spruce Street #212 Philadelphia, PA Copyright 2013 North, Inc. Page 1
2 Introduction Firefly is a lightweight but powerful co-browsing application that allows an agent to view a single tab of a customer s browser in real-time. The product does not require any downloads, installations, Flash, or Java for either the viewer or presenter. It runs entirely on JavaScript within the web browser, is secure and reliable, and transmits page updates instantly. Firefly runs in the cloud on Amazon Web Services (AWS) using Elastic Cloud Compute (EC2) for server processing and Elastic Block Store for permanent data storage. The architecture autoscales past multiple EC2 instances to meet variable load demand and ensures automatic failover at each point of the data flow journey in order to provide a guaranteed >99.99% uptime. Architecture Overview A Firefly co-browsing session involves the following flow: 1. A presenter initiates a session from their web browser. 2. The presenter s browser establishes a persistent connection with the application server. 3. The presenter requests a unique session code that is generated by the database and returned to the presenter. 4. A viewer enters the session code from the dashboard on their account or visits the appropriate URL. 5. The viewer s browser establishes a persistent connection with the application server. 6. The server checks to ensure the existence of a session connected to the entered session code. 7. If such a session exists, the server requests the initial state of the web page from the presenter browser and relays it to the viewer. 8. The presenter is notified of the viewer s connection. 9. The presenter s browser listens for page updates and relays them instantly to the viewer through our application server. Firefly s server architecture is hosted on Amazon Web Services. The service employs high-cpu Elastic Cloud Compute instances, and the architecture is scalable to multiple app and database instances through real-time server provisioning. Multiple application servers sit behind several HAProxy load balancers to efficiently distribute load and ensure automatic failover in the case of a server outage. Application servers utilize dedicated Redis instances for publish/subscribe functionality to maintain state across multiple server instances. This configuration enables a customer s client and an agent s client to connect to two separate servers, despite connecting to the same session. Redis serves as the backend bridge between servers, playing a critical role in the relaying of data between multiple clients in a cobrowsing session. This setup grants the load balancer the most flexibility in distributing client requests to application servers. The primary database resides in Amazon s Elastic Block Store and therefore lives independently from the life of the database server. The database is in a RAID 10 configuration for improved throughput via blocklevel data striping as well as protection from faulty hardware via data mirroring. Redis and our primary database are both configured with master-slave replication. This setup provides scalability for database reads and for publishing to data subscriptions. It also provides a source from which to continuously create database snapshots to ensure the safety of our data. All types of server instances (load balancers, application servers, primary database, Redis) are distributed evenly across AWS Availability Zones for protection against a single datacenter failure. Databases are in a master-slave configuration for multiple availability at the Slave level. All servers are continuously Copyright 2013 North, Inc. Page 2
3 monitored to ensure uptime, and should a server be detected as being down, a new server is automatically spun up. At the event of a Master database failure, a Slave is promoted to Master, and a new Slave database is subsequently provisioned. In the case of a server outage or code deployment for a particular application server, all sessions in progress are appropriately maintained with zero downtime. Clients connected to the unavailable server are notified of the disconnection and automatically reconnect to an available application server via the load balancer. Clients maintain the session code in memory and bind to this session code on the server, ensuring the connection between the presenter and viewer is maintained. There will be a brief pause in the session, but the session resumes in a matter of milliseconds. Firefly s deployment process relies on rolling deployment to ensure the availability of a minimum number of servers at any given time. Application instances rely on Node.js to handle server requests and responses and to communicate with the database. The open source Socket.io library is used to facilitate persistent connections between the server and client. The library uses WebSockets when natively supported in browsers and falls back to JSONP polling in the case that WebSockets are not supported. The application architecture is currently being modified to allow fallback to Flash Sockets before resorting to the JSONP polling transport. Firefly s JavaScript library must be loaded into every web page where co-browsing is desired. This file is about 205KB in size at the time of the publication of this document and is loaded into the page asynchronously so as not to block the loading of any other HTML content. The library does not leak any global variables onto the window namespace to remove any risk of variable conflict, except for the FireflyAPI object that is used to scope Firefly s JavaScript API. Supported Browser Versions and Technologies It does not make a difference if the presenter is using a different browser from that of the viewer. We support the following browsers on both the agent and customer side: All Chrome versions All Firefox versions All Safari versions Internet Explorer 8 and above IE7 support is on the 2013 roadmap (but can be prioritized based on customer needs) The following browser technologies are supported: Standard DOM nodes and any JavaScript permutations to these DOM nodes Same-domain iframes and any JavaScript permutations inside these iframes The initial state of a cross-domain iframe HTML5 Canvas and updates to a Canvas element Doctypes Images Firewalls and Login Sessions Firefly works seamlessly behind all firewalls and login walls. The JavaScript library communicates via port 80 for unencrypted requests and port 443 for encrypted requests. Copyright 2013 North, Inc. Page 3
4 Hosted vs. On-Premise Hosted Delivery Firefly s hosted version provides co-browsing functionality without the need to host code on your own servers. Integration is as simple as pasting and deploying a snippet of JavaScript code provided by Firefly into every page where co-browsing is desired. A web page must have the Firefly JavaScript library to enable co-browsing, and it is recommended to place the snippet of code as high up in the HEAD tag as possible. The agent dashboard from which the agent connects to a session is accessed via an account on the usefirefly.com domain. On-Premise Delivery Firefly also offers an on-premise solution for those that would like to bring Firefly in-house. The solution is set up by running bash scripts provided by Firefly for the application server and the database server. These scripts fetch and build any required open source libraries as well as Firefly s custom server-side code libraries. Additionally, Firefly provides the client-side JavaScript files that are modified to point to a domain and use custom logo assets. Data Security and Privacy All communications, either between the customer and the server or between the agent and the server, are encrypted via 256-bit SSL. The connection is encrypted using AES_256_CBC, with SHA1 for message authentication and RSA as the key exchange mechanism. Limited session information and zero HTML data is stored in the database. Data stored includes Timestamps for sessions URL s of the pages that the session was conducted on User agent string of the customer User agent string of the rep The session code All of this information is saved either for analytics reporting or for internal debugging. Firefly has the ability to detect HTML elements that are marked as sensitive so that this information never touches the application servers nor does the agent ever see this information. To mark an element as sensitive, add an HTML class of firefly-sensitive-data to the element. This feature works with any DOM node, including form inputs and textareas. API Access Firefly exposes 4 main APIs: the JavaScript API, the Event API, the Form Masking API, and the RESTful HTTP API. JavaScript API The JavaScript API can be used to initiate a co-browsing session from inside of your application. Many of our customers use this API to activate Firefly from inside of a chat application, inside of a click-to call application, or from a custom drop down. When called, the Firefly API generates a URL that allows an agent to connect to the session and view the customer s browser tab. It can also be used to set various other options, including styling themes and a custom pop-up message for the customer. For more information and documentation, please visit our online API documentation: Copyright 2013 North, Inc. Page 4
5 Event API Firefly s Event API allows your application to hook into events in the Firefly cobrowsing lifecycle. This API allows your application to subscribe to events and receive notifications in real-time when actions occurs, such as when the customer or agent leaves the call or when the call ends. For more information and documentation, please reach out and request our white paper Firefly API Documentation: Event and Form Masking API. Form Masking API Firefly s Masking API allows you to redact sensitive elements and form fields on the customer s page. Content in redacted elements and forms will never be transported to our servers and will never reach the agent s browser, enabling you and your clients to maintain PCI and HIPPA compliance. This API works by adding a specific CSS class selector to all sensitive elements or calling the Masking API. For more information and documentation, please reach out and request our white paper Firefly API Documentation: Event and Form Masking API. RESTful HTTP API The RESTful HTTP API exposes access to permanently stored information about past cobrowsing sessions in a JSON format. This information includes the session code, the browser of the customer, the session duration, the pages on which the session traversed, and more. For more information and documentation, please reach out and request our white paper Firefly API Documentation: RESTful HTTP API. Conclusion Firefly s architecture is robust, reliable, secure and scalable. It is very well suited for even the most privacy and security conscious organizations and can be trusted to handle the co-browsing activities of the largest organizations in the world. For technical inquiries, please contact product@usefirefly.com For sales inquiries, please contact sales@usefirefly.com Copyright 2013 North, Inc. Page 5
Alteryx Technical Overview
Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...
More informationMASTERS COURSE IN FULL STACK WEB APPLICATION DEVELOPMENT W W W. W E B S T A C K A C A D E M Y. C O M
MASTERS COURSE IN FULL STACK WEB APPLICATION DEVELOPMENT W W W. W E B S T A C K A C A D E M Y. C O M COURSE OBJECTIVES Enable participants to develop a complete web application from the scratch that includes
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationSecuring Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.
Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new
More informationStreamSets Control Hub Installation Guide
StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in
More informationWhat is new in unblu 3.5?
Release Annoucement, June 2015 What is new in unblu 3.5? www.unblu.com Phone: +41 41 511 2711 Email: info@unblu.com 1 what is new in unblu 3.5 Copyright 2015 unblu inc. All rights reserved www.unblu.com
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationDecision on opposition
Decision on opposition Opposition No. 2017-700545 Tokyo, Japan Patent Holder Saitama, Japan Patent Attorney Kanagawa, Japan Opponent MEDIALINK.CO., LTD. EMURA, Yoshihiko TAKAHASHI, Yoko The case of opposition
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationScaling DreamFactory
Scaling DreamFactory This white paper is designed to provide information to enterprise customers about how to scale a DreamFactory Instance. The sections below talk about horizontal, vertical, and cloud
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationHigh Availability Distributed (Micro-)services. Clemens Vasters Microsoft
High Availability Distributed (Micro-)services Clemens Vasters Microsoft Azure @clemensv ice Microsoft Azure services I work(-ed) on. Notification Hubs Service Bus Event Hubs Event Grid IoT Hub Relay Mobile
More informationEtanova Enterprise Solutions
Etanova Enterprise Solutions Front End Development» 2018-09-23 http://www.etanova.com/technologies/front-end-development Contents HTML 5... 6 Rich Internet Applications... 6 Web Browser Hardware Acceleration...
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationAmazon Web Services (AWS) Solutions Architect Intermediate Level Course Content
Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Introduction to Cloud Computing A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction
More informationCPM. Quick Start Guide V2.4.0
CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...
More informationAlliance Key Manager AKM for AWS Quick Start Guide. Software version: Documentation version:
Alliance Key Manager AKM for AWS Quick Start Guide Software version: 4.0.0 Documentation version: 4.0.0.002 Townsend Security www.townsendsecurity.com 800.357.1019 +1 360.359.4400 Alliance Key Manager
More informationPRO, PRO+, and SERVER
AliveChat Overview PRO, PRO+, and SERVER Version 1.2 Page 1 Introducing AliveChat 4. Our Latest Release for 2008! Mac, Windows, or Linux - All You Need is a Web Browser Access AliveChat anywhere you have
More informationMindLink Desktop. Technical Overview. Version 17.3
Desktop Technical Overview Version 17.3 Table of Contents 1 Overview... 3 1.1 Browser Support... 3 1.2 High-level Architecture... 3 2 lication Lifecycle... 4 2.1 Configuration Bootstrapping... 4 2.2 Logging
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More informationAt Course Completion Prepares you as per certification requirements for AWS Developer Associate.
[AWS-DAW]: AWS Cloud Developer Associate Workshop Length Delivery Method : 4 days : Instructor-led (Classroom) At Course Completion Prepares you as per certification requirements for AWS Developer Associate.
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationfor Multi-Services Gateways
KURA an OSGi-basedApplication Framework for Multi-Services Gateways Introduction & Technical Overview Pierre Pitiot Grenoble 19 février 2014 Multi-Service Gateway Approach ESF / Increasing Value / Minimizing
More informationSecurity Guide Zoom Video Communications Inc.
Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless
More informationDocker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications
Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,
More informationDevelop and test your Mobile App faster on AWS
Develop and test your Mobile App faster on AWS Carlos Sanchiz, Solutions Architect @xcarlosx26 #AWSSummit 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The best mobile apps are
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationBraindumpsQA. IT Exam Study materials / Braindumps
BraindumpsQA http://www.braindumpsqa.com IT Exam Study materials / Braindumps Exam : 70-532 Title : Developing Microsoft Azure Solutions Vendor : Microsoft Version : DEMO Get Latest & Valid 70-532 Exam's
More informationThe Now Platform Reference Guide
The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service
More informationAmazon Web Services Training. Training Topics:
Amazon Web Services Training Training Topics: SECTION1: INTRODUCTION TO CLOUD COMPUTING A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction to Cloud Computing
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationLoad Balancing RSA Authentication Manager. Deployment Guide v Copyright Loadbalancer.org, Inc
Load Balancing RSA Authentication Manager Deployment Guide v1.2.2 Copyright 2002 2017 Loadbalancer.org, Inc Table of Contents 1. About this Guide...3 2. Loadbalancer.org Appliances Supported...3 3. Loadbalancer.org
More informationFive9 Plus Adapter for Agent Desktop Toolkit
Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center
More informationVMWARE ENTERPRISE PKS
DATASHEET AT A GLANCE VMware Enterprise PKS is a productiongrade Kubernetes-based container solution equipped with advanced networking, a private container registry, and full lifecycle management. VMware
More informationLiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017
LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017 Contents Introduction... 3 Supported Platforms... 3 Protecting Data in Transit... 3 Protecting Data at Rest... 3 Encryption...
More informationAmazon Web Services (AWS) Training Course Content
Amazon Web Services (AWS) Training Course Content SECTION 1: CLOUD COMPUTING INTRODUCTION History of Cloud Computing Concept of Client Server Computing Distributed Computing and it s Challenges What is
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation
More informationRed Hat OpenStack Platform 10 Product Guide
Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team Red Hat OpenStack Platform 10 Product Guide Overview of Red Hat OpenStack Platform OpenStack Team rhos-docs@redhat.com
More informationargusoft A66, Sector 25, GIDC Electronic Estate, Gandhinagar, Gujarat , India Dumbarton Court, Newark, CA 94560, USA
ROOBROO DESKTOP COLLABORATION PLATFORM ARCHITECTURAL OVERVIEW AND CONFIGURATION HIGHLIGHTS PRESENTED BY: argusoft A66, Sector 25, GIDC Electronic Estate, Gandhinagar, Gujarat 382016, India 35463 Dumbarton
More informationDelivering Large Scale WebRTC. Richard Tworek Principal WebRTC Strategies Twitter: rmtworek. WebRTC STRATEGIES 11/25/2013
11/25/2013 1 Delivering Large Scale WebRTC Richard Tworek Principal WebRTC Strategies rtworek@webrtcstrategies.com Twitter: rmtworek 11/25/2013 WebRTC STRATEGIES 2 Panelists Michal Raz Vice President,
More informationReactive Microservices Architecture on AWS
Reactive Microservices Architecture on AWS Sascha Möllering Solutions Architect, @sascha242, Amazon Web Services Germany GmbH Why are we here today? https://secure.flickr.com/photos/mgifford/4525333972
More informationSIEBEL 15 RELEASE & UPGRADE SUMMARY
SIEBEL 15 RELEASE & UPGRADE SUMMARY Eagle Creek Software Services H UPGRADING SIEBEL WITHOUT SKIPPING A BEAT UPGRADING SIEBEL WITHOUT SKIPPING A BEAT Siebel 15 Release and Upgrade Summary IP2015, also
More informationQlik Analytics Platform
Technical Brief Qlik Analytics Platform Building Engaging Visual Analytics October, 2015 qlik.com Table of Contents Introduction 3 Introducing Qlik Analytics Platform 3 Integration Capabilities 4 Architecture
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationHow the Cloud is Enabling the Disruption of the Construction Industry. AWS Case Study Construction Industry. Abstract
Case Study Construction Industry How the Cloud is Enabling the Disruption of the Construction Industry Abstract A Minfy-architected cloud solution is helping iquippo, a digital marketplace for the construction
More informationDelivers cost savings, high definition display, and supercharged sharing
TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise
More informationTableau Server - 101
Tableau Server - 101 Prepared By: Ojoswi Basu Certified Tableau Consultant LinkedIn: https://ca.linkedin.com/in/ojoswibasu Introduction Tableau Software was founded on the idea that data analysis and subsequent
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Technical White Paper Gladinet, Inc. 1/20/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table of Contents
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Multi-Zone Deployment Guide Gladinet, Inc. 4/5/2015 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2015 Gladinet, Inc. Table
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation
More informationVlad Vinogradsky
Vlad Vinogradsky vladvino@microsoft.com http://twitter.com/vladvino Commercially available cloud platform offering Billing starts on 02/01/2010 A set of cloud computing services Services can be used together
More information<Insert Picture Here> WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs
WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs Messaging Basics Built-in Best-of-Breed Messaging (JMS) Engine Years of hardening. Strong performance.
More information20480C: Programming in HTML5 with JavaScript and CSS3. Course Code: 20480C; Duration: 5 days; Instructor-led. JavaScript code.
20480C: Programming in HTML5 with JavaScript and CSS3 Course Code: 20480C; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides an introduction to HTML5, CSS3, and JavaScript. This
More informationLesson 5 Nimbits. Chapter-6 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 Nimbits 1 Cloud IoT cloud-based Service Using Server at the Edges A server can be deployed at the edges (device nodes) which communicates the feeds to the cloud service. The server also provisions
More informationHello everyone. My name is Kundan Singh and today I will describe a project we did at Avaya Labs.
Hello everyone. My name is Kundan Singh and today I will describe a project we did at Avaya Labs. 1 Let me start by saying that people often forget the importance of separating data from the application
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationSAP Vora - AWS Marketplace Production Edition Reference Guide
SAP Vora - AWS Marketplace Production Edition Reference Guide 1. Introduction 2 1.1. SAP Vora 2 1.2. SAP Vora Production Edition in Amazon Web Services 2 1.2.1. Vora Cluster Composition 3 1.2.2. Ambari
More informationOracle Responsys. Release 18B. New Feature Summary ORACLE
Oracle Responsys Release 18B New Feature Summary ORACLE TABLE OF CONTENTS Revision History 4 Overview 4 APIs 4 New Throttling Limits for Web Services APIs 4 New Asynchronous Web Services APIs 5 New REST
More informationNirvana A Technical Introduction
Nirvana A Technical Introduction Cyril PODER, ingénieur avant-vente June 18, 2013 2 Agenda Product Overview Client Delivery Modes Realm Features Management and Administration Clustering & HA Scalability
More informationHOSTED CONTACT CENTRE
HOSTED CONTACT CENTRE CO-BROWSING 9.4 Version 1.1 Hosted Contact Centre Co-browsing Confidentiality and Proprietary Statement This document is SaskTel s property and it is strictly confidential. Without
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationAmazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India
(AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationCogniFit Technical Security Details
Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................
More informationService Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction
Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and
More informationBOMGAR.COM BOMGAR VS. WEBEX UPDATED: 2/28/2017
.COM VS. WEBEX UPDATED: 2/28/2017 Bomgar VS. Support Center LICENSING & DEPLOYMENT The proliferation of solutions has undoubtedly provided certain advantages for organizations seeking alternatives to traditional
More informationEnterprise print management in VMware Horizon
Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable
More informationLeverage the Oracle Data Integration Platform Inside Azure and Amazon Cloud
Leverage the Oracle Data Integration Platform Inside Azure and Amazon Cloud WHITE PAPER / AUGUST 8, 2018 DISCLAIMER The following is intended to outline our general product direction. It is intended for
More informationBack-end architecture
Back-end architecture Tiberiu Vilcu Prepared for EECS 411 Sugih Jamin 2 January 2018 https://education.github.com/pack 1 2 Outline HTTP 1. HTTP and useful web tools 2. Designing APIs 3. Back-end services
More informationTechNote AltitudeCDN Multicast+ and OmniCache Support for Citrix
TechNote AltitudeCDN Multicast+ and OmniCache Support for Citrix Version 1.0 AltitudeCDN TM Multicast+ and AltitudeCDN OmniCache TM have been certified as Citrix Ready for Citrix platforms that support
More informationSecure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS)
Technical Overview Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) Copyright 2017 by Bluetooth SIG, Inc. The Bluetooth word mark and logos are owned
More informationLet s say that hosting a cloudbased application is like car ownership
Let s say that hosting a cloudbased application is like car ownership Azure App Service App Service Features & Capabilities All features and capabilities are shared across all of App Service application
More informationGoogle on BeyondCorp: Empowering employees with security for the cloud era
SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise
More informationDeploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3
Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationTIBCO Cloud Integration Security Overview
TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized
More informationComet and WebSocket Web Applications How to Scale Server-Side Event-Driven Scenarios
Comet and WebSocket Web Applications How to Scale Server-Side Event-Driven Scenarios Simone Bordet sbordet@intalio.com 1 Agenda What are Comet web applications? Impacts of Comet web applications WebSocket
More informationPublic Wallet Interface for Ripple
CS 795 Blockchain Technologies CS 795 Authors: May 15, 2017 Contents 1 Abstract 2 2 Introduction 3 3 Program Design Architecture 6 4 Functionality 7 5 Preview 10 6 In-comparison with other wallets 13 7
More informationARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS
ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI
More informationOracle Communications WebRTC Session Controller
Oracle Communications WebRTC Session Controller Concepts Release 7.0 E40976-01 November 2013 Oracle Communications WebRTC Session Controller Concepts, Release 7.0 E40976-01 Copyright 2013, Oracle and/or
More informationApp Orchestration 2.0
App Orchestration 2.0 Getting Started with Citrix App Orchestration 2.0 Prepared by: Jenny Berger Commissioning Editor: Erin Smith Version: 1.0 Last Updated: April 4, 2014 Page 1 Contents Welcome to App
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationINTERNET ENGINEERING. HTTP Protocol. Sadegh Aliakbary
INTERNET ENGINEERING HTTP Protocol Sadegh Aliakbary Agenda HTTP Protocol HTTP Methods HTTP Request and Response State in HTTP Internet Engineering 2 HTTP HTTP Hyper-Text Transfer Protocol (HTTP) The fundamental
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationTechnical Brief. Adding Zadara Storage to VMware Cloud on AWS
Technical Brief Adding Zadara Storage to VMware Cloud on AWS Revision History Row Version Date Description 1 1.0 26 Nov 2018 Initial release 2 1.1 15 Jan 2019 Updates for VMware style guide compliance,
More informationScaling for the Enterprise
White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND
ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND Agenda Welcome & Introduction to ArcGIS Enterprise Portal for ArcGIS - Basic Configuration - Advanced Configuration - Deploying Apps
More informationAtlas Technology White Paper
Atlas Technology White Paper 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationSecurity from the Inside
Security from the Inside Detect, Record, and Eliminate Malicious User Behavior 24/7 live screen recording & playback Automatically allow or block any activity Real-time user activity tracking Rule-based
More informationXignite CloudStreaming overview
Xignite CloudStreaming overview Objectives Terminology Zero footprint Easy to implement Open standards Sample code Simple javascript implementation Handling patch messages Including error handling Using
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationReal-Time SignalR. Overview
Real-Time SignalR Overview Real-time Web applications feature the ability to push server-side content to the connected clients as it happens, in real-time. For ASP.NET developers, ASP.NET SignalR is a
More information