




Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
practicals of amity university
Typology: Assignments
1 / 8
This page cannot be seen from the preview
Don't miss anything!
A social network is a hosted site gathering communities of users who are connected by specific types of relationship, such as friendship, kinship, common interest, financial exchange, or relationships of beliefs, knowledge. Common Features : blog, discussion forum, chat space, file sharing , video, posting running lists of current activities and so on. Examples of social network sites : Facebook : www.facebook.com MySpace : www.myspace.com Benefits: Share documents,files ,photos and videos Free to use Enough functionality Unnecessary IT support Ease to join and use expand the scale of friend circle Groupware is collaboration software for workgroups to communicate and manage their group projects without the constraints of location Features: File and document uploading and sharing Web calendar Task/project manager Message boards Text-based chat rooms / instant messaging Wiki-like collaborative pages Blogs social network is useful to communicate but is not enough to manage group projects Gathering all group communications in one place , better cost control Much easier to communicate ,reduce numbers of meetings and conferences calls ,email traffic Increase group’s and individual efficiency Increased competion and complexity in products and business produres Some popular online groupware applications AirSet: www.airset.com ContactOffice : www.contactoffice.com Google Sites: sites.google.com Huddle: www.handle.net Nexo : www.nexo.com OpenTeams: www.openteams.com
ProjectSpaces: www.projectspaces.com Teamspace: www.teamspace.com Examples of two non-web conferencing tools are zoom and ms teams ZOOM ->Zoom proved that modern companies could communicate through video just as naturally as through audio and chat – and they could do it without the glitches of previous solutions. Zoom Meetings became the core product of the portfolio, delivering an incredible combination of HD video and audio, as well as things like transcripts of calls and intelligent features too. To make the Zoom solution even more impressive, the company even implemented it’s own free tier, so that team members can start connecting without paying anything at all. Today, we can access Zoom for everything from online webinars and training sessions, to state-of-the-art calls and even instant chat. Some of the most exciting features of Zoom Meetings include: Easy adoption with WebRTC technology Join from anywhere on any device Access robust security solutions throughout Built-in tools for screen sharing HD video and audio calls Support for up to 1,000 video participants and 49 videos Meet securely with role-based user permissions Streamlined calendaring services with Outlook and Google Built-in recording and transcripts Team chat both for groups and one-on-one messaging Access to extra features like webinars, chat, and phone Ms Teams-> Microsoft’s flagship collaboration and communication hub, Microsoft Teams, is the toolset to replace Skype for Business in the office environment. Released on the 2nd^ of November 2016 during an event in New York City, Teams emerged as an exciting new chat-based workspace. According to Microsoft, the platform was built to support the emerging popularity of communication and collaboration products within a world of increasingly mobile workforces.Teams is a platform which aims to make communication more streamlined for business groups. Current features at the time of writing include: Threaded conversations Instant messaging/Chat Video and voice conferencing Team chat and private messaging Virtual assistant bots Customisation features for each team Open API for integrations Conversation search and contact search Real-time chat history across devices Customisable alerts File and document sharing Multi-factor authentication Internal and external communication In-Field scheduling support
3) task management Whatever tool we use to manage our tasks, whether a simple to-do list or a comprehensive task management tool, the most important aspect of task management is prioritization. Say we are running behind schedule for a construction project and one of the pending tasks is a required safety inspection. Since the outcome of inspection will directly affect our project's future, prioritizing promotional activities for our project at this point isn't a good use of time and resources. Another interesting way to manage tasks can be by categorizing them on a deadline or priority matrix with "schedule" and "priority" as the axes. With this structure, necessary work that needs to be done immediately should be placed high on both priority and schedule, while necessary work that isn't needed immediately should be placed high on priority but low on schedule. A team generally works on tasks that contribute towards its organization's goal. While working in teams usually means more work gets done, keeping team members in sync can be difficult. Task management software for teams can help us keep our team connected. FEATURES OF ACE PROJECT-> Project Tracking and Task Management – Ace project has comprehensive interactive Gantt chart that is helping users visually manage tasks, and set dependencies between tasks. It has project portfolio management, allowing users to view and monitor the work progress across multiple projects using custom task reports. You can set up recurrent tasks, or start new projects using templates. Timesheet Reporting and Expense Tracking – Ace Project has an integrated time management solution that allows users to track time of resources across all projects. It has a built-in time clock and a time approval workflow that automates the business process and ensures accurate time entries and usage across the organization. Users are also able to track expenses and use an expense approval process to help them stay in control of their project expenses. The application can then generate advanced expense reports, making use of numerous criteria and filters to provide relevant information. Document Sharing, Mobile Access, API and more – Users can attach, view and manage all their task and project documents within the software, confident that these are secured and searchable when needed. It has versioning features to keep track of changes, as well as locking to prevent anyone from editing or deleting a file. FEATURES OF BASE CAMP CLOUD->
earlier version can be restored too. These documents can be opened in the mobile version as well.
Various socio-economic challenges of adopting cloud computing:-> Security and Privacy -> Because cloud computing represents a new computing model, there is a great deal of uncertainty about how security at all levels (e.g., network, host, application, and data levels) can be achieved. That uncertainty has consistently led information executives to state that security is their number one concern with cloud computing. Connectivity and Open Access -> The full potential of cloud computing depends on the availability of high-speed access to all. Such connectivity, rather like electricity availability, globally opens the possibility for industry and a new range of consumer products. Reliability-> Enterprise applications are now so critical that they must be reliable and available to support 24/7 operations. In the event of failure or outages, contingency plans must take effect smoothly, and for disastrous or catastrophic failure, recovery plans must begin with minimum disruption. Interoperability ->The interoperability and portability of information between private clouds and public clouds are critical enablers for broad adoption of cloud computing by the enterprise. Many companies have made considerable progress toward standardizing their processes, data, and systems through implementation of ERPs. Economic Value-> The growth of cloud computing is predicated on the return on investment that accrues. It seems intuitive that by sharing resources to smooth out peaks, paying only for what is used, and cutting upfront capital investment in deploying IT solutions, the economic value will be there. Various security risks for an organization using cloud services->
Reliability Reliability is an equally important issue to consider in cloud storage. A reliable cloud storage is one that the user can be sure of its availability at all times, and one that assures users that their data will always be secure from any forms of attack or interference. Security Cloud storage can be located anywhere in the world where fast enough Internet connections are available to provide user access. In each location, physical access controls, unencrypted networking and handling of media which contains or contained the data (for example, backup media or failed disk drives) could all expose data. If the data is, for example, confidential or proprietary information, a security failure would be tantamount to placing the materials in an open dumpster. User-error This threat means mistakes made by users of the system. Infrastructure providers have designed their system to be automated and there is hardly any human intervention, however they have no control over how users from enterprise or broker may use the system. Privacy We don’t want anybody to access our data unless we allow them to. This is easy enough to maintain when we store data on-site, because our data is stored elsewhere, it might be impossible to know just how closed off it is. When we migrate sensitive data to the cloud, we should be aware that we might be losing essential privacy controls. Access problems Most of the security threats and risks to an organization are the result of inadequate and improper access control. Poor access control can expose the organization to unauthorized access of data and programs, fraud, or the shutdown of computer services.
We already know that moving enterprise applications to the cloud can help our organization cut information technology (IT) costs and improve responsiveness. Along with the usual security concerns, however, another issue is how to secure and monitor user entitlements and access activities within the cloud environment, especially privileged accounts. Privileged identity management (PIM) is one security component we won’t want to overlook when designing and implementing your own cloud infrastructure. Cloud computing requires a delicate balance between the desire to share online resources with multiple user populations and the need to protect those resources from unauthorized access, data leakage and other exposures. When those users have the elevated access powers of the typical system administrator or other privileged account, the security risk is even higher. It just takes one malicious or careless privileged insider to take over our enterprise or steal precious data. To reduce the risk of these insider threats, we must be able to control, monitor and report on who is accessing sensitive resources within the cloud and for what purpose.
Access can be granted free (e.g., Google Docs) or via subscription models (e.g., DropBox for file synchronization or SmugMug for photo management). The cloud consumer has little control over the way the cloud software runs and the security of the data it accesses. The cloud software provider takes all the administrative burden. A software provider will either host the application and related data using its own servers, databases, networking and computing resources, or it may be an ISV that contracts a cloud provider to host the application in the provider's data center. The application will be accessible to any device with a network connection.