14-09-2023 - DRAFT__ INT - Solution & Tech Capabilities (1)

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 2 (18s)

‹#›. Introduction. “There are decades where nothing happens; and there are weeks when decades happens”.

Scene 3 (27s)

‹#›. Agenda. Business Intelligence Advanced Analytics Computer Vision Textual Intelligence.

Scene 4 (43s)

Digital Engineering. Full Stack Digital Services.

Scene 5 (53s)

INT. RAD Modelling > Prototyping > Orchestration.

Scene 6 (1m 12s)

Digital Engineering.

Scene 7 (1m 17s)

Our Experience in Technology Holistic View. DevOps.

Scene 8 (1m 38s)

Our Experience in Technology Holistic View. DevOps.

Scene 9 (1m 55s)

Our Experience in Technology Holistic View. DevOps.

Scene 10 (2m 9s)

Our Experience in Technology Holistic View. DevOps.

Scene 11 (2m 23s)

Our Experience in Technology Holistic View. DevOps.

Scene 12 (2m 37s)

Our Experience in Technology Holistic View. DevOps.

Scene 13 (2m 51s)

Our Experience in Technology Holistic View. DevOps.

Scene 14 (3m 5s)

Our Experience in Technology Holistic View. DevOps.

Scene 15 (3m 19s)

Our Experience in Technology Holistic View. DevOps.

Scene 16 (3m 33s)

Our Experience in Technology Holistic View. DevOps.

Scene 17 (3m 48s)

Our Experience in Technology Holistic View. DevOps.

Scene 18 (4m 2s)

Our Experience in Technology Holistic View. DevOps.

Scene 19 (4m 16s)

Our Experience in Technology Holistic View. DevOps.

Scene 20 (4m 31s)

API Observability. API Observability. M Metrics • Prometheus and Grafana.

Scene 21 (5m 7s)

Observability. Observability is understanding a system from the outside.

Scene 22 (6m 4s)

Digital Engineering - Development Process.

Scene 23 (6m 10s)

Static Code Analysis [SonarQube] Functional Code Review Version control Unit Testing [Junit, Mocha & Chai] Code Optimization[] Code Refactoring[] DEVELOP.

Scene 24 (6m 35s)

Code Management Security. - Awareness Training on the Security and Privacy Attributes - Software Usage Restrictions - Development Process, Standards, ard Tools - Information Spillage Response and DCT protection - Developer prcwided Training on Security Function Isolation - Protection of Information at Rest - Malicious Code Scan & Protection - Account Management, Access Enforcement along with Least Privilege - Baseline Configuration - Software Usage Restrictions & System Backup - Event Logging - Public Access Protections - Regular Threat Awareness Program - Malicious Code Protection and Vulnerability Monitoring and Scanning - Public Access Protections and Public Key Infrastructure Certificates - Software-enforced Separation and Policy Enforcement Developer Workstations - -Internal I Partner - - - Secrets Management Code Remove credentials from code and reference in Secret Management Code Management git Pipelines ogs Private Repository Client Repository - Access Enforcement & Separation of Outies - Supervision and Review - Access Control - Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening - Security Alerts, Advisories, and Directives - Information input Validation - Monitoring for Information Disclosure - Cross-organizational Audit Logging - Access Agreements - Access Enforcement & Separation of Duties - Supervision and Review - Access Control Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening Security Alerts, Advisories, and Directives - Information input Validation - Supervision and Static/Dynamic Code Review - Event Logging - Content of Audit Records - External Malicious Code Identification - Identified vulnerabilities trigger - Remediated vulnerabilities committed.

Scene 25 (7m 21s)

Development Methodologies. abstract.

Scene 26 (7m 37s)

Why? Frequent downtime and conspicuous bugs could result in your revenue taking a hit..

Scene 27 (7m 54s)

Microservice Architecture. Microservice Architecture.

Scene 28 (8m 8s)

Architecture. Software Architectures. Other Architectures.

Scene 29 (8m 25s)

Tes rs Mostly API Gateway Test He re d ddb d Database.

Scene 30 (8m 50s)

Architecture. Software Architectures. Other Architectures.

Scene 31 (9m 12s)

Architecture. Software Architectures. Other Architectures.

Scene 32 (9m 36s)

FUNCTi0NAL REQuiREMENTS he webSi+e Will have a homepage the website Will s+ore cuskomer data website cusfomers can log into +heir accoun+S The website Will all.uagg_ be available to cuS+omerS can access websites on *heir phones examples of N0N-FUNCTioNAL REQUiREMENTS he homepage should O load Wi\hin 4.5 seconds o QQ customer data Will be encrypted level IF encryption standards {he website has capacitg for sooo logged-in users at any one *ime khe WebSite nave a 99.7•/._ Ohe website Will be compahble 1Jlth iOS 12.8 and above.

Scene 33 (9m 56s)

Architecture. NFRs in Development. Availability TAP1.

Scene 34 (10m 39s)

Case. Studies. DIGITAL ENGINEERING. Our works speaks louder than that.

Scene 35 (10m 47s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Scene 36 (11m 30s)

Business Challenges 1. Ensure seamless QuickBook integrations and handling a large number of simultaneous transactions 2. Processing and maintaining a high volume of vendor bills from multiple customers, vendors 3. Secure transmission of customer invoices and financial information to prevent unauthorized access 4. Providing real-time negotiation capabilities 5. Integration with multiple payment channels, e.g VISA Direct, Check, Virtual Cards, ACH, Wire Payments 6. Accurate and secure reconciliation of payments and transactions across different accounts.

Scene 37 (12m 14s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Scene 38 (12m 58s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Scene 39 (13m 42s)

Business Challenges 1. Content sharing with the doctor for brand promotion without visiting them. 2. Call report submission post the call with the doctors and TM/ASM/RSM 3. Seamless meeting with the doctors with participants and presenter doctors along with guests. 4. Accurate meeting summary post the meeting ends along with meeting recording..

Scene 40 (14m 37s)

Digital Engineering - Deployment Process.

Scene 41 (14m 43s)

Deployment - Best Practices. End 1 1 N etm& Cluster.

Scene 42 (14m 59s)

1 Network Router End user Green Server Cluster Blue Server Cluster Version I Green DB Blue DB.

Scene 43 (15m 23s)

Canary Release Old Version (V 1.0) Request Traffic users 10% of Request Traffic New Version (V 1.1).

Scene 44 (15m 50s)

State O The Original applications were deployed in containers, the upgrade can tackle one container at a time State 1 Each container is modifiedto download the latest htage from the app vendor's site State 2.

Scene 45 (16m 19s)

A/B Testing 50% visitors see variation A 21% conversion visitors see variation 3 38% conversion.

Scene 46 (16m 39s)

Digital Engineering - Cloud & DevOps.

Scene 47 (16m 46s)

DIGITAL ENGINEERING - DevOps Tools and Technologies.

Scene 48 (17m 2s)

DIGITAL ENGINEERING - Cloud compute service decision tree.

Scene 49 (17m 14s)

DIGITAL ENGINEERING - AWS / GCP compute service decision tree.

Scene 50 (17m 24s)

DIGITAL ENGINEERING - Azure /AWS Migration service decision tree.