INT..
‹#›. Introduction. “There are decades where nothing happens; and there are weeks when decades happens”.
‹#›. Agenda. Business Intelligence Advanced Analytics Computer Vision Textual Intelligence.
Digital Engineering. Full Stack Digital Services.
INT. RAD Modelling > Prototyping > Orchestration.
Digital Engineering.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
Our Experience in Technology Holistic View. DevOps.
API Observability. API Observability. M Metrics • Prometheus and Grafana.
Observability. Observability is understanding a system from the outside.
Digital Engineering - Development Process.
Static Code Analysis [SonarQube] Functional Code Review Version control Unit Testing [Junit, Mocha & Chai] Code Optimization[] Code Refactoring[] DEVELOP.
Code Management Security. - Awareness Training on the Security and Privacy Attributes - Software Usage Restrictions - Development Process, Standards, ard Tools - Information Spillage Response and DCT protection - Developer prcwided Training on Security Function Isolation - Protection of Information at Rest - Malicious Code Scan & Protection - Account Management, Access Enforcement along with Least Privilege - Baseline Configuration - Software Usage Restrictions & System Backup - Event Logging - Public Access Protections - Regular Threat Awareness Program - Malicious Code Protection and Vulnerability Monitoring and Scanning - Public Access Protections and Public Key Infrastructure Certificates - Software-enforced Separation and Policy Enforcement Developer Workstations - -Internal I Partner - - - Secrets Management Code Remove credentials from code and reference in Secret Management Code Management git Pipelines ogs Private Repository Client Repository - Access Enforcement & Separation of Outies - Supervision and Review - Access Control - Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening - Security Alerts, Advisories, and Directives - Information input Validation - Monitoring for Information Disclosure - Cross-organizational Audit Logging - Access Agreements - Access Enforcement & Separation of Duties - Supervision and Review - Access Control Security and Privacy Attributes - Event Logging - Incident Monitoring & Handling - Insider Threat Program and Personnel Screening Security Alerts, Advisories, and Directives - Information input Validation - Supervision and Static/Dynamic Code Review - Event Logging - Content of Audit Records - External Malicious Code Identification - Identified vulnerabilities trigger - Remediated vulnerabilities committed.
Development Methodologies. abstract.
Why? Frequent downtime and conspicuous bugs could result in your revenue taking a hit..
Microservice Architecture. Microservice Architecture.
Architecture. Software Architectures. Other Architectures.
Tes rs Mostly API Gateway Test He re d ddb d Database.
Architecture. Software Architectures. Other Architectures.
Architecture. Software Architectures. Other Architectures.
FUNCTi0NAL REQuiREMENTS he webSi+e Will have a homepage the website Will s+ore cuskomer data website cusfomers can log into +heir accoun+S The website Will all.uagg_ be available to cuS+omerS can access websites on *heir phones examples of N0N-FUNCTioNAL REQUiREMENTS he homepage should O load Wi\hin 4.5 seconds o QQ customer data Will be encrypted level IF encryption standards {he website has capacitg for sooo logged-in users at any one *ime khe WebSite nave a 99.7•/._ Ohe website Will be compahble 1Jlth iOS 12.8 and above.
Architecture. NFRs in Development. Availability TAP1.
Case. Studies. DIGITAL ENGINEERING. Our works speaks louder than that.
Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.
Business Challenges 1. Ensure seamless QuickBook integrations and handling a large number of simultaneous transactions 2. Processing and maintaining a high volume of vendor bills from multiple customers, vendors 3. Secure transmission of customer invoices and financial information to prevent unauthorized access 4. Providing real-time negotiation capabilities 5. Integration with multiple payment channels, e.g VISA Direct, Check, Virtual Cards, ACH, Wire Payments 6. Accurate and secure reconciliation of payments and transactions across different accounts.
Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.
Business Challenges 1. Ensuring secure transmission of sensitive financial information (credit/debit card details, personal identification) during the purchase process to prevent fraud and data breaches 2. Catering to the unique needs and regulations of non-resident customers, including currency conversion, compliance, and documentation 3. Providing a smooth and seamless user experience, including quick order processing and real-time exchange rate updates 4. Ensuring secure access and data transfer for non-resident customers, who may be accessing the platform from different regions and networks.
Business Challenges 1. Content sharing with the doctor for brand promotion without visiting them. 2. Call report submission post the call with the doctors and TM/ASM/RSM 3. Seamless meeting with the doctors with participants and presenter doctors along with guests. 4. Accurate meeting summary post the meeting ends along with meeting recording..
Digital Engineering - Deployment Process.
Deployment - Best Practices. End 1 1 N etm& Cluster.
1 Network Router End user Green Server Cluster Blue Server Cluster Version I Green DB Blue DB.
Canary Release Old Version (V 1.0) Request Traffic users 10% of Request Traffic New Version (V 1.1).
State O The Original applications were deployed in containers, the upgrade can tackle one container at a time State 1 Each container is modifiedto download the latest htage from the app vendor's site State 2.
A/B Testing 50% visitors see variation A 21% conversion visitors see variation 3 38% conversion.
Digital Engineering - Cloud & DevOps.
DIGITAL ENGINEERING - DevOps Tools and Technologies.
DIGITAL ENGINEERING - Cloud compute service decision tree.
DIGITAL ENGINEERING - AWS / GCP compute service decision tree.
DIGITAL ENGINEERING - Azure /AWS Migration service decision tree.