14-09-2023 - DRAFT__ INT - Solution & Tech Capabilities (1)

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 2 (18s)

‹#›. Introduction. “There are decades where nothing happens; and there are weeks when decades happens”.

Page 3 (27s)

‹#›. Agenda. Business Intelligence Advanced Analytics Computer Vision Textual Intelligence.

Page 4 (43s)

Digital Engineering. Full Stack Digital Services.

Page 5 (53s)

INT. RAD Modelling > Prototyping > Orchestration.

Page 6 (1m 12s)

Digital Engineering.

Page 7 (1m 17s)

Our Experience in Technology Holistic View. DevOps.

Page 8 (1m 38s)

Our Experience in Technology Holistic View. DevOps.

Page 9 (1m 55s)

Our Experience in Technology Holistic View. DevOps.

Page 10 (2m 9s)

Our Experience in Technology Holistic View. DevOps.

Page 11 (2m 23s)

Our Experience in Technology Holistic View. DevOps.

Page 12 (2m 37s)

Our Experience in Technology Holistic View. DevOps.

Page 13 (2m 51s)

Our Experience in Technology Holistic View. DevOps.

Page 14 (3m 5s)

Our Experience in Technology Holistic View. DevOps.

Page 15 (3m 19s)

Our Experience in Technology Holistic View. DevOps.

Page 16 (3m 33s)

Our Experience in Technology Holistic View. DevOps.

Page 17 (3m 48s)

Our Experience in Technology Holistic View. DevOps.

Page 18 (4m 2s)

Our Experience in Technology Holistic View. DevOps.

Page 19 (4m 16s)

Our Experience in Technology Holistic View. DevOps.

Page 20 (4m 31s)

API Observability. API Observability. M Metrics • Prometheus and Grafana.

Page 21 (5m 7s)

Observability. Observability is understanding a system from the outside.

Page 22 (6m 4s)

Digital Engineering - Development Process.

Page 23 (6m 10s)

Static Code Analysis [SonarQube] Functional Code Review Version control Unit Testing [Junit, Mocha & Chai] Code Optimization[] Code Refactoring[] DEVELOP.

Page 24 (6m 35s)

Code Management Security. - Awareness Training on the Security and Privacy Attributes - Software Usage Restrictions - Development Process, Standards, ard Tools - Information Spillage Response and DCT protection - Developer prcwided Training on Security Function Isolation - Protection of Information at Rest - Malicious Code Scan & Protection - Account Management, Access Enforcement along with Least Privilege - Baseline Configuration - Software Usage Restrictions & System Backup - Event Logging - Public Access Protections - Regular Threat Awareness Program - Malicious Code Protection and Vulnerability Monitoring and Scanning - Public Access Protections and Public Key Infrastructure Certificates - Software-enforced Separation and Policy Enforcement Developer Workstations - -Internal I Partner - - - Secrets Management Code Remove credentials from code and reference in Secret Management Code Management git Pipelines ogs Private Repository Client Repository - Access Enforcement & Separation of Outies - Supervision and Review - Access Control - Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening - Security Alerts, Advisories, and Directives - Information input Validation - Monitoring for Information Disclosure - Cross-organizational Audit Logging - Access Agreements - Access Enforcement & Separation of Duties - Supervision and Review - Access Control Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening Security Alerts, Advisories, and Directives - Information input Validation - Supervision and Static/Dynamic Code Review - Event Logging - Content of Audit Records - External Malicious Code Identification - Identified vulnerabilities trigger - Remediated vulnerabilities committed.

Page 25 (7m 21s)

Development Methodologies. abstract.

Page 26 (7m 37s)

Why? Frequent downtime and conspicuous bugs could result in your revenue taking a hit..

Page 27 (7m 54s)

Microservice Architecture. Microservice Architecture.

Page 28 (8m 8s)

Architecture. Software Architectures. Other Architectures.

Page 29 (8m 25s)

Tes rs Mostly API Gateway Test He re d ddb d Database.

Page 30 (8m 50s)

Architecture. Software Architectures. Other Architectures.

Page 31 (9m 12s)

Architecture. Software Architectures. Other Architectures.

Page 32 (9m 36s)

FUNCTi0NAL REQuiREMENTS he webSi+e Will have a homepage the website Will s+ore cuskomer data website cusfomers can log into +heir accoun+S The website Will all.uagg_ be available to cuS+omerS can access websites on *heir phones examples of N0N-FUNCTioNAL REQUiREMENTS he homepage should O load Wi\hin 4.5 seconds o QQ customer data Will be encrypted level IF encryption standards {he website has capacitg for sooo logged-in users at any one *ime khe WebSite nave a 99.7•/._ Ohe website Will be compahble 1Jlth iOS 12.8 and above.

Page 33 (9m 56s)

Architecture. NFRs in Development. Availability TAP1.

Page 34 (10m 39s)

Case. Studies. DIGITAL ENGINEERING. Our works speaks louder than that.

Page 35 (10m 47s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Page 36 (11m 30s)

Business Challenges 1. Ensure seamless QuickBook integrations and handling a large number of simultaneous transactions 2. Processing and maintaining a high volume of vendor bills from multiple customers, vendors 3. Secure transmission of customer invoices and financial information to prevent unauthorized access 4. Providing real-time negotiation capabilities 5. Integration with multiple payment channels, e.g VISA Direct, Check, Virtual Cards, ACH, Wire Payments 6. Accurate and secure reconciliation of payments and transactions across different accounts.

Page 37 (12m 14s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Page 38 (12m 58s)

Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.

Page 39 (13m 42s)

Business Challenges 1. Content sharing with the doctor for brand promotion without visiting them. 2. Call report submission post the call with the doctors and TM/ASM/RSM 3. Seamless meeting with the doctors with participants and presenter doctors along with guests. 4. Accurate meeting summary post the meeting ends along with meeting recording..

Page 40 (14m 37s)

Digital Engineering - Deployment Process.

Page 41 (14m 43s)

Deployment - Best Practices. End 1 1 N etm& Cluster.

Page 42 (14m 59s)

1 Network Router End user Green Server Cluster Blue Server Cluster Version I Green DB Blue DB.

Page 43 (15m 23s)

Canary Release Old Version (V 1.0) Request Traffic users 10% of Request Traffic New Version (V 1.1).

Page 44 (15m 50s)

State O The Original applications were deployed in containers, the upgrade can tackle one container at a time State 1 Each container is modifiedto download the latest htage from the app vendor's site State 2.

Page 45 (16m 19s)

A/B Testing 50% visitors see variation A 21% conversion visitors see variation 3 38% conversion.

Page 46 (16m 39s)

Digital Engineering - Cloud & DevOps.

Page 47 (16m 46s)

DIGITAL ENGINEERING - DevOps Tools and Technologies.

Page 48 (17m 2s)

DIGITAL ENGINEERING - Cloud compute service decision tree.

Page 49 (17m 14s)

DIGITAL ENGINEERING - AWS / GCP compute service decision tree.

Page 50 (17m 24s)

DIGITAL ENGINEERING - Azure /AWS Migration service decision tree.