Loving in Lavita
Personal Blogs
When designing web-applications
Project Development Plan
By using an architectural approach, the complexities involved in designing web-applications like any other computational software system, can be broken down into a set of procedural processes.
Good Project Management plays an important role in developing successful quality assured products, that also fulfill requirements of the clients.
Careful organisation and planning of the step-by-step design processes ...
By initially gathering business requirements from clients, developers can begin the design process by putting together rough drafts. Firstly drawn with pencil and paper offering a basic diagrammatical form of lines and boxes, representing the various system components to help further along communications between clients and developers.
Wireframing enables a transition from the initial ideas of the clients, tweaked and adapted with the knowledge, skills and resources of the website developers.
Rough drafts often do not convey a large amount of information, because they leave out detail, actual content, images and any thing that could cause a distraction away from concentrating upon the overall organisation of webpages, page elements and the Web-application itself.
Moving a long a bit but still in the early stages of design and development, wireframing techniques are used to create a mock up or prototype of the currents business requirements. By using a creative design software tool called Pencil Evolus, with its interactive features and tool box of objects; these objects are representative to the standards webpage elements such as text box, button, window frame, image container....
Using these tools and objects webpages can be created in a very basic way, to create a conceptual model of the whole website, that also allows for the implementation of interactive features like testing navigation and hyperlinks; allowing developers to bring back to the table for further discussions with clients, a visual design approach enabling clients realise more clearly what may be developed in the future from their own initial requirements. At this stage there is time for making decisions and addressing concerns, developers can share their own ideas with clients, especially drawing attention to the many standard features and elements that in these modern times, the majority of websites include.
This is a cost effective and faster way to bring a design model to clients, before moving further along in the production stages, because changes things later on becomes more difficult, times consuming and costly.
Other bits:
Managing the complexities of computational Software Systems an architectural approach, built upon well organised development project
[ ] Understanding a software system in regards to its environment
[ ] Happens early on
[ ] Especially (expensive and) hard to change components
[ ] Started with.... Focusing on have to right elements
[ ] Design issues considered
[ ] A set of architectural design decisions....
[ ] A set of various models and structures along the way, including the decisions analysed or considered and the rationale about those decisions that lead to the next step in design
[ ] Insight into decisions and rationale behind them has helped Software system research and development
[ ] Knowledge management?
[ ] "Chain of intentionality" from high-level to low-level
@abstractdistraxtions Instagram
Abstract Distraxtions Facebook
http://www.abstractdistraxtions.blogspot.com
Love everyone stay safe and take care all
Today is quite a good day
Who knows what tomorrow will bring
When it comes to security and privacy of the web application....
Security
Problems occur if trying to serve pages via HTTPS if they include HTTP resources this is known as mixed content
Constant upgrades, required major for security, to ensure things work as intended
Number of log in attempts
automatic session time-out
Log-in monitoring / administration
Passwords strength strong, Validation of user
User id credentials kept separate, hashing and salting in stage to obscure
Using components with little known vulnerabilities
Avoid cross scripting
Security misconfiguration
Privacy
(protection responsibility)
Cookies regular clear
Short expiry date
localStorage....
File system API?
Saving sensitive user id add 1 every time
Notifications notify user of data collection, storage,
Consent for major explicit permissions
Snap a picture button; implicitly giving permission for camera-app
Minimisation of data collection
User rights to Access to view, update or delete from history
Geolocation is potentially most privacy invading concerns:
[ ] Disclose collection of data
[ ] Protect data
Implementation of....
[ ] DoNotTrack privacy.
To prevent Tracking by other unknown parties.
Geolocation API
Involves third party API, device-APIs
Captured images may contain Geotagged images
Because client by using mobile Camera device to capture image pressing Snap button they are giving implicit consent.
...Media-Device-API
Use HTTPS by default......
For both security and privacy of personal data from third party websites, hackers, men in the middle,
Transfer and exchange data on web applications, using HTTPS for Secure,
This process entails
Certificate, SSL,TLS,
Key for
Authentication
Encryption
Decryption
HTTP headers
Convert all internal /external web application files like CSS JS with links to HTTPS
Redirects over HTTPS
<!DOCTYPE html>
<html lang="en">
<head>
<title>Emotional Poet and Artist
</title>
<meta charset="UTF-8">
<meta name="description" content="Artist and Poet">
<meta name="keywords" content="poetry, poems, art, emotion, life, love, motivational, ambition, happiness">
<meta name="author" content="Toni Cairns">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body style="background-color: lavender;">
<div style="color: indigo;">
<h1 style="color: indigo; text-align: left;">
How is your luck?</h1>
<p style="color: indigo;" ><strong> A poem written by Toni Cairns Copyright 2019.</strong>
A young unpublished author and a great lover of poetry</p>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-YtAxtGLuzTQ/XeRO8Apem6I/AAAAAAAAmvM/UL1tbC1Y51o7Wt86u9uTEZ9zMq1FaHqMgCLcBGAsYHQ/s1600/How%2527s-Poem-How's-Your-Luck-Toni-Cairns.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a>
<img src="https://3.bp.blogspot.com/-YtAxtGLuzTQ/XeRO8Apem6I/AAAAAAAAmvM/UL1tbC1Y51o7Wt86u9uTEZ9zMq1FaHqMgCLcBGAsYHQ/s320/How%2527s-Poem-How's-Your-Luck-Toni-Cairns.jpg" alt="a poem called How's Your Luck?" border="0" data-original-height="1550" data-original-width="1267" height="1267px" width="1550px" longdesc="a poem called how's your luck? and it goes like this
I tell myself I'm lucky
when I know I have no luck,
I tell myself I'm lucky
when no one gives a fuck.
I tell myself I'm lucky
that no one else is there
I tell myself I'm lucky
fore, if they were they might just care.
I tell myself I'm lucky
every time I take a drink,
I tell myself I'm lucky
turning the taps upon my sink.
Fore, as I turn those taps
my mind begins to think,
of little children dying
because they have no drink.
So, I tell myself I'm lucky
every time I feel alone
and I tell myself I'm lucky
I'm not yet beneath that stone.
I tell myself I'm lucky
when all I have is bad luck,
I tell myself I'm lucky
because any luck is luck." />
</div>
<div style="color: indigo;">
<h2 style="color: indigo;">
How's Your Luck? is a poem about...</h2>
<p style="color: indigo;" >A poem I wrote about addressing the way I look at where my luck lies, which I myself believes to be on a kind of continuum; also I believe we have available to us the opportunity to choose how we assess our own level of luck, and this is through our eyes, the eyes of the beholder.
I always say <strong><em>A lot more other than just beauty, lies in the eyes of the beholder</em></strong></p>
</div>
<div>
<footer>
<p style="color: indigo;" >By Toni Cairns Copyright 2019. Contact information: </p>
<a href="mailto:toni.cairns@hotmail.co.uk">Email: toni.cairns@hotmail.co.uk</a>
<a href="mailto:abstractdistraxtions@gmail.com">Email: abstractdistraxtions@gmail.com</a>
<a href="https://www.instagram.com/abstractdistraxtions/">Instagram: @abstractdistraxtions</a>
<a href="https://www.facebook.com/abstractdistraxtions/">Facebook: @abstractdistraxtions</a>
</footer>
</div>
</body>
</html>
Domestic Violence I wonder Why?
Written curiously wondering by Toni Cairns Copyright 2019.
A young unpublished author and a great lover of poetry
I am way to weak to kill myself since facing a few rather harsh oh fuck me moments, because they do have a dramatic affect upon you, that time, I was strangled until I passed out, I couldn't breath I thought I would die, after all this invention was to kill me, after the flash moment of oh fuck I have in, fore I couldn't take in no air, there was no choice, I couldn't even take a last breath because he had taken it, sucked my life from within me, I think i felt a sensation of flopping relaxation, a relief it was over, then I woke up on the floor and he was still there and I was still trapped.... I have had some crazy psychologically very harmful fucked up nightmares, but there's not much that can prepare you for such moments..... The hurt the confusion, the shock, the disbelief, he is my love he is my soul partner, he is my everything, why? I don't understand?
By Toni Cairns Copyright 2019. Contact information:
Email: toni.cairns@hotmail.co.uk Email: abstractdistraxtions@gmail.com Instagram: @abstractdistraxtions Facebook: @abstractdistraxtions My bloghttps://abstractdistraxtions.blogspot.comWhat do you see as the benefits and
potential problems of using Cloud architecture?
Cloud Computing AWS
Julie Bort (Business Insider, 14th Mar 2016) reported online that 'Amazon's cloud computing powerhouse Amazon Web Services (AWS) has transformed the tech world in just ten years' and that '... everybody in tech knows what cloud computing is, and AWS is the undisputed leader.'
[Online]. Available at http://www.businessinsider.com (Accessed 24th November 2019).
Bort further reported AWS cloud offers clients over 165 fully featured services; boasting agility, elasticity, cost saving, deploying globally in minutes.
Jordan Novet (CNBC, 22nd April 2019) reported 'In 2018, AWS delivered $25.66 billion in revenue, or 11 percent of Amazon's total annual revenue, and nearly 59 percent of Amazon's operating income.'
[Online]. Available at https://www.cnbc.com/2019/04/22/apple-spends-more-than-30-million-on-amazon-web-services-a-month.html (Accessed 24th November 2019).
Advantages and Disadvantages of Cloud Computing
- Hosted web technologies with greater capabilities, regularly maintained and updated centrally·
- Availability of services across platforms
- ·Scalability of services across devices
- Companies become more globally interconnected, potential of business growth
- Flexibility of working hours and working from home
- Data accessibility from anywhere*
- *Network connection dependency; must always have network provider to connect to the internet in order to send and retrieve files from to the cloud
- Reliability of internet connection, bandwidth and speed for consistency
- Network outages for example due to storms, disasters and other issues concerning physical components of a network; functionality of business in the event of prolonged outages?
- Business losses may be incurred in the event of down-time, data loss with no backup, disaster recovery plans
- Terms and conditions apply; relative so read carefully
What’s the real cost to a business?
Migration from in-house data centres with fixed cost rates to cloud services with on-demand pay-as-you-go utility rates;
Most small to medium businesses save money on IT expenditure; lower cost of in-house web technologies, hardware and storage, by using pay-as-you-go cost efficient on-demand utility service
Businesses gain not having data centres with large capital expenditure, but changing to cloud services, brings about significant changes to expenditure in other areas
Businesses need to plan, budget and forecast cloud consumption, poor cloud financial management costs money
Some
businesses have difficulties managing cloud computing use and budget; and so may
incur unexpected charges such as for data transfer costs (over basic monthly
allowance)
Deciding upon which cloud host provider to trust?
· Is your business being supplied the right type of cloud service and plan, in order to optimise expenditure and meet business requirements;
· Does your cloud host provider efficiently help and support business decisions in selecting services and finalising agreements that will maximise business profit, by offering only required resources and no more, for example level of storage options
· Loss
of centralised control, lack of infrastructure visibility, trusting your
provider to be standard-compliant, meet regulations, ensure governance, revise
licence agreements, protect your data through privacy and security
Usability of services:
· Ease-of-use having reliable and consistent 24/7 Support available, increases a clients level of service usability
· Poor customer service; are all of your the cloud providers staff adequately or more than adequately trained to the IT skills levels, that are needed in order to consistently support a client’s needs
· Fixing technical issues will need to be carried out by cloud provider opposed to in-house
· Cost of host migration: inflexibility of some cloud applications, when migrating from one cloud host provider to another; do applications and data formats allow easy transfer of information into other systems, like custom developed in-house software
· Cloud based software applications SaaS, do they include all the features of the in-house software licence and suit your needs; desktop software is cheaper in the long run with a one-time fee
· Cloud computing for small businesses; not suitable for performance intensive applications; like graphic design that require high-performance desktop computers
Security concerns; is your information safe?
Some cloud security issues; Cloud hacking cases, cyber attacks, leakage of your sensitive data, data breach, malicious insiders, account hijacking, disgruntled employees and carelessness use with username and password security credentials
Gartner says about cloud security, ‘security concerns have become counterproductive, distracting CIO’s and CISO’s from establishing organisational, security and governance processes that prevent cloud security and compliance mistakes’, pointing out that cloud service providers have ‘huge market incentives to place higher priority on security than the typical end user organisations’, but that they are not entirely responsible for their customers security.
Also Gartner predicts ‘that through 2020, 95 percent of cloud service failures will be the customer’s fault’, and so therefore organisations need to take a strategic approach to cloud security themselves.
Gartner [Online]. Available at www.gartner.com (Accessed 24th November 2019).
I believe security and privacy are two particular concerns which need to be carefully addressed from within each business; alongside having IT specialists who are able to address many areas such as keeping up to date with governance issues, standard-compliance, listening for announcements from host providers and immediately carrying out any suggested changes.
Businesses need to maximise opportunities for productivity and profitability, and be sure the benefits of cloud computing services outweigh the challenges
Understanding migration from in-house to cloud services, changes in IT infrastructure; have you organised a migration strategy or an approach to ensure the stability of your company whilst you change over; qualified IT specialists and management service tools in place to carry out fine tuning and financial optimisation; monitoring performance and resource utilisation, to identify unused resources quickly; continuously optimise cloud spending by map spending data, know where every penny goes, to proactively detect and solve issues before they turn into costly problems.
Interesting Articles Considering Where is your Cloud Data Now?
Business Telegraph online reported the headline 'Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services', a pair of customers who entrusted Apple with their personal data, have filed class action complaints against them for failing to disclose its iCloud storage practices with third party vendors. Complaint 'charges Apple is guilty of breach of contract, false advertising and violating California’s Unfair Competition Law';
Business Telegraph [Online]. Available at http://www.businesstelegraph.co.uk
(Accessed 24th November 2019).
Jordan Novet (CNBC, 22nd April 2019) reported online that 'Apple spends more
than $30 million a month on Amazon Web Services.’ Apple's cloud expenditure
as one of the biggest AWS customer’s, reflects it's determination to deliver
fast and reliable online services like iCloud, 'even if it must depend on a
rival like Amazon to do so.'
CNBC [Online]. Available at https://www.cnbc.com/2019/04/22/apple-spends-more-than-30-million-on-amazon-web-services-a-month.html
(Accssed 24th November 2019).
Are you, or the organisation that you work for, using Cloud services?
As a disabled student at the Open University, I have no experience working for any organisation using Cloud services, however I have a Netflix account, and I also use Google Apps. When it comes to Microsoft Office I refuse to pay a monthly subscription fee for Microsoft office 365 on my tablet, when I have paid for the Microsoft Office 2007 and 2010 Software Application on disk, each of these include three Licences, I am able to use this software on my laptop and desktop computer, but I am unable to use it on my tablet. I prefer the cheaper non-subscription software, since this software still functions well in 2019.
Further thoughts:
Cloud offers a vast array of cloud management service tools online which I have no personal experience of using, if I were to be a small business wishing to build a website, then I believe it’s important to gain some knowledge of the additional services a cloud provider may or may not offer, to minimise legal mitigation against my business; for example:
· Understanding and deciding upon the various types cloud computing services, private, public, hybrid, keep some in-house, multi cloud, mix and matching
·
Extra
Data backup (in-house)
Cloud management tools, automation and orchestration platforms; automate tasks
to request, change or deploy standardised cloud services, and orchestrate
execution of tasks across a range of platforms.
·
Virtualization
Management Tools, traditional management systems may not be able to address
unique virtualization performance problems.
· Security responsibility, insecure APIs use penetration testing, patch and system updates to quickly uncover weaknesses
· IoT Security Foundation
[Online]. Available at https://www.iotsecurityfoundation.org (Accessed 24th November 20119).
· Adopting a Cloud-native enterprise security application: Repair, Repave and Rotate
·
[Online].
Available at http://www.pivotal.io/cloud-native-security
(Accessed 24th November 20119).
·
Better
understand Open Source Licensing Obligations, if left unmanaged can introduce
legal and compliance issues: OWASP (2019) 'Free for Open Source Application Security Tools' [Online]. Available
at http://www.owasp.org (Accessed 24th November 20119). 'OWASP's
mission is to help the world improve the security of its Software': lists
automated vulnerability detection tools:
Application Security Testing
Static-AST, Dynamic-AST, Interactive-AST,
· Client based monitoring
tools, performance visibility,
Governance tools, perform integrity monitoring and log inspection for locating
changes or finding threats,
Network perimeter tools, secure network and provide the client with network
visibility.
<!DOCTYPE html>
<html lang="en">
<head>
<title>Crazy Lady Poet and Artist
</title>
<meta charset="UTF-8">
<meta name="description" content="Crazy Artist and Poet">
<meta name="keywords" content="HTML, poem, art, poetry, mental health, depression, artist, writer, author, selfharm, bipolar">
<meta name="author" content="Toni Cairns">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body>
<div>
<h1>Poetry
</h1>
<p>
<a href="://www.abstractdistraxtions.blogspot.com">Abstract Distraxtions Art and Poetry</a>
://www.abstractdistraxtions.blogspot.com
</div>
<div>
<p>You look in the mirror
and what do you see
a little bit of someone
and a little bit of me,
you can't remember yesterday
you don't know where you are from.
</p>
<p>
Then you look in the mirror
and what do you see
a pair of eyes lost entranced
Glancing careless unawares
and you don't even notice
that no ones there to care.
</p>
</div>
<div>
<p>
When a person is truly destroyed, if they make it through alive, they find an appreciation for life, that they never used to have, fore they had previously taken their life for granted, until they survived an attempted murder.
</p>
</div>
<div>
<img src="sadness_and_lonely.jpg" alt="a poem" longdesc="When a person is truly destroyed, if they make it through alive, they find an appreciation for life, that they never used to have, fore they had previously taken their life for granted, until they survived an attempted murder." height="1080px" width="1509px">
</div>
<div>
<ul>Today's Emotions
</ul>
<li>confused</li>
<li>lonely</li>
<li>fed up</li>
<li>bored</li>
</ul>
</div>
</body>
</html>
This blog might contain posts that are only visible to logged-in users, or where only logged-in users can comment. If you have an account on the system, please log in for full access.