OU blog

Personal Blogs

Bio-Art

Changing Media Device Reported by Ofcom

Visible to anyone in the world
Edited by Toni Cairns, Friday, 24 Apr 2020, 19:03

Loving in Lavita 

Permalink
Share post
Bio-Art

When designing Web-applications

Visible to anyone in the world

When designing web-applications

Project Development Plan


By using an architectural approach, the complexities involved in designing web-applications like any other computational software system, can be broken down into a set of procedural processes.

Good Project Management plays an important role in developing successful quality assured products, that also fulfill requirements of the clients.

Careful organisation and planning of the step-by-step design processes ...

By initially gathering business requirements from clients, developers can begin the design process by putting together rough drafts. Firstly drawn with pencil and paper offering a basic diagrammatical form of lines and boxes, representing the various system components to help further along communications between clients and developers.

Wireframing enables a transition from the initial ideas of the clients, tweaked and adapted with the knowledge, skills and resources of the website developers.

Rough drafts often do not convey a large amount of information, because they leave out detail, actual content, images and any thing that could cause a distraction away from concentrating upon the overall organisation of webpages, page elements and the Web-application itself.

Moving a long a bit but still in the early stages of design and development, wireframing techniques are used to create a mock up or prototype of the currents business requirements. By using a creative design software tool called Pencil Evolus, with its interactive features and tool box of objects; these objects are representative to the standards webpage elements such as text box, button, window frame, image container....

Using these tools and objects webpages can be created in a very basic way, to create a conceptual model of the whole website, that also allows for the implementation of interactive features like testing navigation and hyperlinks; allowing developers to bring back to the table for further discussions with clients, a visual design approach enabling clients realise more clearly what may be developed in the future from their own initial requirements. At this stage there is time for making decisions and addressing concerns, developers can share their own ideas with clients, especially drawing attention to the many standard features and elements that in these modern times, the majority of websites include.

This is a cost effective and faster way to bring a design model to clients, before moving further along in the production stages, because changes things later on becomes more difficult, times consuming and costly.

Other bits:

Managing the complexities of computational Software Systems an architectural approach, built upon well organised development project
[ ] Understanding a software system in regards to its environment
[ ] Happens early on
[ ] Especially (expensive and) hard to change components
[ ] Started with.... Focusing on have to right elements
[ ] Design issues considered
[ ] A set of architectural design decisions....
[ ] A set of various models and structures along the way, including the decisions analysed or considered and the rationale about those decisions that lead to the next step in design
[ ] Insight into decisions and rationale behind them has helped Software system research and development
[ ] Knowledge management?
[ ] "Chain of intentionality" from high-level to low-level




My other blog 

@abstractdistraxtions Instagram

Abstract Distraxtions Facebook

http://www.abstractdistraxtions.blogspot.com


Love everyone stay safe and take care all

Today is quite a good day

Who knows what tomorrow will bring

smile


Permalink
Share post
Bio-Art

New blog post

Visible to anyone in the world

When it comes to security and privacy of the web application....

Security

Problems occur if trying to serve pages via HTTPS if they include HTTP resources this is known as mixed content

Constant upgrades, required major for security, to ensure things work as intended

Number of log in attempts

automatic session time-out

Log-in monitoring / administration

Passwords strength strong, Validation of user

User id credentials kept separate, hashing and salting in stage to obscure

Using components with little known vulnerabilities

Avoid cross scripting

Security misconfiguration


Privacy

(protection responsibility)

Cookies regular clear

Short expiry date

localStorage....

File system API?

Saving sensitive user id add 1 every time

Notifications notify user of data collection, storage,

Consent for major explicit permissions

Snap a picture button; implicitly giving permission for camera-app

Minimisation of data collection

User rights to Access to view, update or delete from history

Geolocation is potentially most privacy invading concerns:

[ ] Disclose collection of data

[ ] Protect data

Implementation of....

[ ] DoNotTrack privacy.

To prevent Tracking by other unknown parties.

Geolocation API

Involves third party API, device-APIs

Captured images may contain Geotagged images

Because client by using mobile Camera device to capture image pressing Snap button they are giving implicit consent.

...Media-Device-API

Use HTTPS by default......

For both security and privacy of personal data from third party websites, hackers, men in the middle,

Transfer and exchange data on web applications, using HTTPS for Secure,

This process entails

Certificate, SSL,TLS,

Key for

Authentication

Encryption

Decryption

HTTP headers

Convert all internal /external web application files like CSS JS with links to HTTPS

Redirects over HTTPS


My other blog

Permalink
Share post
Bio-Art

Another try at HTML

Visible to anyone in the world

<!DOCTYPE html>
<html lang="en">
<head>
<title>Emotional Poet and Artist
</title>
  <meta charset="UTF-8">
  <meta name="description" content="Artist and Poet">
  <meta name="keywords" content="poetry, poems, art, emotion, life, love, motivational, ambition, happiness">
  <meta name="author" content="Toni Cairns">
  <meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body style="background-color: lavender;">
<div style="color: indigo;">
<h1 style="color: indigo; text-align: left;">
How is your luck?</h1>
<p style="color: indigo;" ><strong> A poem written by Toni Cairns Copyright 2019.</strong>
A young unpublished author and a great lover of poetry</p>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-YtAxtGLuzTQ/XeRO8Apem6I/AAAAAAAAmvM/UL1tbC1Y51o7Wt86u9uTEZ9zMq1FaHqMgCLcBGAsYHQ/s1600/How%2527s-Poem-How's-Your-Luck-Toni-Cairns.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a>
<img src="https://3.bp.blogspot.com/-YtAxtGLuzTQ/XeRO8Apem6I/AAAAAAAAmvM/UL1tbC1Y51o7Wt86u9uTEZ9zMq1FaHqMgCLcBGAsYHQ/s320/How%2527s-Poem-How's-Your-Luck-Toni-Cairns.jpg" alt="a poem called How's Your Luck?" border="0" data-original-height="1550" data-original-width="1267" height="1267px" width="1550px" longdesc="a poem called how's your luck? and it goes like this
I tell myself I'm lucky
when I know I have no luck,
I tell myself I'm lucky
when no one gives a fuck.
I tell myself I'm lucky
that no one else is there
I tell myself I'm lucky
fore, if they were they might just care.
I tell myself I'm lucky
every time I take a drink,
I tell myself I'm lucky
turning the taps upon my sink.
Fore, as I turn those taps
my mind begins to think,
of little children dying
because they have no drink.
So, I tell myself I'm lucky
every time I feel alone
and I tell myself I'm lucky
I'm not yet beneath that stone.
I tell myself I'm lucky
when all I have is bad luck,
I tell myself I'm lucky
because any luck is luck." />
</div>
<div style="color: indigo;">
<h2 style="color: indigo;">
How's Your Luck? is a poem about...</h2>
<p style="color: indigo;" >A poem I wrote about addressing the way I look at where my luck lies, which I myself believes to be on a kind of continuum; also I believe we have available to us the opportunity to choose how we assess our own level of luck, and this is through our eyes, the eyes of the beholder.
I always say <strong><em>A lot more other than just beauty, lies in the eyes of the beholder</em></strong></p>
</div>
<div>
<footer>
<p style="color: indigo;" >By Toni Cairns Copyright 2019. Contact information: </p>
<a href="mailto:toni.cairns@hotmail.co.uk">Email: toni.cairns@hotmail.co.uk</a>
<a href="mailto:abstractdistraxtions@gmail.com">Email: abstractdistraxtions@gmail.com</a>
<a href="https://www.instagram.com/abstractdistraxtions/">Instagram: @abstractdistraxtions</a>
<a href="https://www.facebook.com/abstractdistraxtions/">Facebook: @abstractdistraxtions</a>
</footer>
</div>
</body>
</html>


Permalink
Share post
Bio-Art

Wondering

Visible to anyone in the world


Domestic Violence I wonder Why?

Written curiously wondering by Toni Cairns Copyright 2019. 

A young unpublished author and a great lover of poetry

I am way to weak to kill myself since facing a few rather harsh oh fuck me moments, because they do have a dramatic affect upon you, that time, I was strangled until I passed out, I couldn't breath I thought I would die, after all this invention was to kill me, after the flash moment of oh fuck I have in, fore I couldn't take in no air, there was no choice, I couldn't even take a last breath because he had taken it, sucked my life from within me, I think i felt a sensation of flopping relaxation, a relief it was over, then I woke up on the floor and he was still there and I was still trapped.... I have had some crazy psychologically very harmful fucked up nightmares, but there's not much that can prepare you for such moments..... The hurt the confusion, the shock, the disbelief, he is my love he is my soul partner, he is my everything, why? I don't understand?


Permalink
Share post
Bio-Art

Cloud Computing Advantages and Disadvantages Block 2 part 1

Visible to anyone in the world

What do you see as the benefits and potential problems of using Cloud architecture?

Cloud Computing AWS

Julie Bort (Business Insider, 14th Mar 2016) reported online that 'Amazon's cloud computing powerhouse Amazon Web Services (AWS) has transformed the tech world in just ten years' and that '... everybody in tech knows what cloud computing is, and AWS is the undisputed leader.'

[Online]. Available at http://www.businessinsider.com (Accessed 24th November 2019).

Bort further reported AWS cloud offers clients over 165 fully featured services; boasting agility, elasticity, cost saving, deploying globally in minutes.

Jordan Novet (CNBC, 22nd April 2019) reported 'In 2018, AWS delivered $25.66 billion in revenue, or 11 percent of Amazon's total annual revenue, and nearly 59 percent of Amazon's operating income.'

[Online]. Available at https://www.cnbc.com/2019/04/22/apple-spends-more-than-30-million-on-amazon-web-services-a-month.html (Accessed 24th November 2019).

Advantages and Disadvantages of Cloud Computing

  • Hosted web technologies with greater capabilities, regularly maintained and updated centrally·      
  • Availability of services across platforms
  • ·Scalability of services across devices
  • Companies become more globally interconnected, potential of business growth
  • Flexibility of working hours and working from home
  • Data accessibility from anywhere*
  • *Network connection dependency; must always have network provider to connect to the internet in order to send and retrieve files from to the cloud 
  • Reliability of internet connection, bandwidth and speed for consistency
  • Network outages for example due to storms, disasters and other issues concerning physical components of a network; functionality of business in the event of prolonged outages?
  • Business losses may be incurred in the event of down-time, data loss with no backup, disaster recovery plans
  • Terms and conditions apply; relative so read carefully


What’s the real cost to a business?

Migration from in-house data centres with fixed cost rates to cloud services with on-demand pay-as-you-go utility rates;

Most small to medium businesses save money on IT expenditure; lower cost of in-house web technologies, hardware and storage, by using pay-as-you-go cost efficient on-demand utility service

Businesses gain not having data centres with large capital expenditure, but changing to cloud services, brings about significant changes to expenditure in other areas

Businesses need to plan, budget and forecast cloud consumption, poor cloud financial management costs money

Some businesses have difficulties managing cloud computing use and budget; and so may incur unexpected charges such as for data transfer costs (over basic monthly allowance)

 Deciding upon which cloud host provider to trust?

 

·       Is your business being supplied the right type of cloud service and plan, in order to optimise expenditure and meet business requirements;

 

·       Does your cloud host provider efficiently help and support business decisions in selecting services and finalising agreements that will maximise business profit, by offering only required resources and no more, for example level of storage options

 

·       Loss of centralised control, lack of infrastructure visibility, trusting your provider to be standard-compliant, meet regulations, ensure governance, revise licence agreements, protect your data through privacy and security

Usability of services:

 

·       Ease-of-use having reliable and consistent 24/7 Support available, increases a clients level of service usability

 

·       Poor customer service; are all of your the cloud providers staff adequately or more than adequately trained to the IT skills levels, that are needed in order to consistently support a client’s needs

 

·       Fixing technical issues will need to be carried out by cloud provider opposed to in-house

 

·       Cost of host migration: inflexibility of some cloud applications, when migrating from one cloud host provider to another; do applications and data formats allow easy transfer of information into other systems, like custom developed in-house software

 

·       Cloud based software applications SaaS, do they include all the features of the in-house software licence and suit your needs; desktop software is cheaper in the long run with a one-time fee

 

·       Cloud computing for small businesses; not suitable for performance intensive applications; like graphic design that require high-performance desktop computers

 

 Security concerns; is your information safe?

 

Some cloud security issues; Cloud hacking cases, cyber attacks, leakage of your sensitive data, data breach, malicious insiders, account hijacking, disgruntled employees and carelessness use with username and password security credentials

Gartner says about cloud security, ‘security concerns have become counterproductive, distracting CIO’s and CISO’s from establishing organisational, security and governance processes that prevent cloud security and compliance mistakes’, pointing out that cloud service providers have ‘huge market incentives to place higher priority on security than the typical end user organisations’, but that they are not entirely responsible for their customers security.

Also Gartner predicts ‘that through 2020, 95 percent of cloud service failures will be the customer’s fault’, and so therefore organisations need to take a strategic approach to cloud security themselves.

 Gartner [Online]. Available at www.gartner.com (Accessed 24th November 2019).

 

I believe security and privacy are two particular concerns which need to be carefully addressed from within each business; alongside having IT specialists who are able to address many areas such as keeping up to date with governance issues, standard-compliance, listening for announcements from host providers and immediately carrying out any suggested changes.

 

Businesses need to maximise opportunities for productivity and profitability, and be sure the benefits of cloud computing services outweigh the challenges

Understanding migration from in-house to cloud services, changes in IT infrastructure; have you organised a migration strategy or an approach to ensure the stability of your company whilst you change over; qualified IT specialists and management service tools in place to carry out fine tuning and financial optimisation; monitoring performance and resource utilisation, to identify unused resources quickly; continuously optimise cloud spending by map spending data, know where every penny goes, to proactively detect and solve issues before they turn into costly problems.


Interesting Articles Considering Where is your Cloud Data Now?

Business Telegraph online reported the headline 'Apple sued for not disclosing that 'iCloud storage' relies on third-party cloud services', a pair of customers who entrusted Apple with their personal data, have filed class action complaints against them for failing to disclose its iCloud storage practices with third party vendors. Complaint 'charges Apple is guilty of breach of contract, false advertising and violating California’s Unfair Competition Law';

Business Telegraph [Online]. Available at http://www.businesstelegraph.co.uk  (Accessed 24th November 2019).

Jordan Novet (CNBC, 22nd April 2019) reported online that 'Apple spends more than $30 million a month on Amazon Web Services.’ Apple's cloud expenditure as one of the biggest AWS customer’s, reflects it's determination to deliver fast and reliable online services like iCloud, 'even if it must depend on a rival like Amazon to do so.'

CNBC [Online]. Available at https://www.cnbc.com/2019/04/22/apple-spends-more-than-30-million-on-amazon-web-services-a-month.html (Accssed 24th November 2019).


Are you, or the organisation that you work for, using Cloud services?

As a disabled student at the Open University, I have no experience working for any organisation using Cloud services, however I have a Netflix account, and I also use Google Apps. When it comes to Microsoft Office I refuse to pay a monthly subscription fee for Microsoft office 365 on my tablet, when I have paid for the Microsoft Office 2007 and 2010 Software Application on disk, each of these include three Licences, I am able to use this software on my laptop and desktop computer, but I am unable to use it on my tablet. I prefer the cheaper non-subscription software, since this software still functions well in 2019.

 Further thoughts:

 

Cloud offers a vast array of cloud management service tools online which I have no personal experience of using, if I were to be a small business wishing to build a website, then I believe it’s important to gain some knowledge of the additional services a cloud provider may or may not offer, to minimise legal mitigation against my business; for example:

·       Understanding and deciding upon the various types cloud computing services, private, public, hybrid, keep some in-house, multi cloud, mix and matching

·       Extra Data backup (in-house)

Cloud management tools, automation and orchestration platforms; automate tasks to request, change or deploy standardised cloud services, and orchestrate execution of tasks across a range of platforms.

·       Virtualization Management Tools, traditional management systems may not be able to address unique virtualization performance problems.

·       Security responsibility, insecure APIs use penetration testing, patch and system updates to quickly uncover weaknesses 

·       IoT Security Foundation

[Online]. Available at https://www.iotsecurityfoundation.org  (Accessed 24th November 20119). 

·       Adopting a Cloud-native enterprise security application: Repair, Repave and Rotate

·       [Online]. Available at  http://www.pivotal.io/cloud-native-security  (Accessed 24th November 20119).

·       Better understand Open Source Licensing Obligations, if left unmanaged can introduce legal and compliance issues: OWASP (2019) 'Free for Open Source Application Security Tools' [Online]. Available at http://www.owasp.org  (Accessed 24th November 20119). 'OWASP's mission is to help the world improve the security of its Software': lists automated vulnerability detection tools:
Application Security Testing
Static-AST, Dynamic-AST, Interactive-AST,

·      Client based monitoring tools, performance visibility,
Governance tools, perform integrity monitoring and log inspection for locating changes or finding threats,
Network perimeter tools, secure network and provide the client with network visibility.



 

 


Permalink
Share post
Bio-Art

Html

Visible to anyone in the world
Edited by Toni Cairns, Sunday, 17 Nov 2019, 22:30

<!DOCTYPE html>
<html lang="en">
<head>
<title>Crazy Lady Poet and Artist
</title>
  <meta charset="UTF-8">
  <meta name="description" content="Crazy Artist and Poet">
  <meta name="keywords" content="HTML, poem, art, poetry, mental health, depression, artist, writer, author, selfharm, bipolar">
  <meta name="author" content="Toni Cairns">
  <meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body>
<div>
<h1>Poetry
</h1>

<p>

<a href="://www.abstractdistraxtions.blogspot.com">Abstract Distraxtions Art and Poetry</a>

://www.abstractdistraxtions.blogspot.com
</div>

<div>
<p>You look in the mirror
and what do you see
a little bit of someone
and a little bit of me,
you can't remember yesterday
you don't know where you are from.
</p>
<p>
Then you look in the mirror
and what do you see
a pair of eyes lost entranced
Glancing careless unawares
and you don't even notice
that no ones there to care.
</p>
</div>
<div>
<p>
When a person is truly destroyed, if they make it through alive, they find an appreciation for life, that they never used to have, fore they had previously taken their life for granted, until they survived an attempted murder.
</p>
</div>
<div>

A poem that says When a person is truly destroyed, if they make it through alive, they find an appreciation for life, that they never used to have, fore they had previously taken their life for granted, until they survived an attempted murder.
<img src="sadness_and_lonely.jpg" alt="a poem" longdesc="When a person is truly destroyed, if they make it through alive, they find an appreciation for life, that they never used to have, fore they had previously taken their life for granted, until they survived an attempted murder." height="1080px" width="1509px">
</div>
<div>
<ul>Today's Emotions
</ul>
<li>confused</li>
<li>lonely</li>
<li>fed up</li>
<li>bored</li>
</ul>
</div>
</body>
</html>



Permalink
Share post

This blog might contain posts that are only visible to logged-in users, or where only logged-in users can comment. If you have an account on the system, please log in for full access.

Total visits to this blog: 1960