SlideShare a Scribd company logo
1 of 12
Cloud Application Development Environment
       (Web & Mobile)




Turanto US                                     Toll Free : 1.866.591.5909
5388 Twin Hickory Rd Glen Allen VA 23059       Phone (US): 1.866.591.5906
                                               Phone (India): +91-0731-2570820
Turanto India                                  Fax: 866.591.5906
216, Orbit Mall Scheme No. 54, PU 3            Email: info@turanto.com
A.B. Road, Indore - 452010
Step:1 Define Your Application
   Example: Asset
    Management
    Application
   Tracks & manages
    assets, financial
    data associated
    with asset, location,
    persons/owner

   Provide details of
    Application
    Name(Display
    name), version,
    Browser Access
    URL name(user
    defined)
Step:2 Define Your Entities

   An entity is a single
    person, place, or
    thing about which
    data can be stored

   In our example
    application main
    entities can be
    Asset, Asset type,
    Location, Person,
    Maintenance record
Step:3 Define Your Properties

   Properties are the
    different attributes
    about the entity.

   In our example
    application ,for
    entity Asset
    properties can be
    Asset name, Asset
    Number, Acquisition
    date, Disposal date

   Another example:
    For entity Person
    properties can be
    Name,EmpID,SSN,
    Photo
Step:4 Define Your Associations

   Associations are
    the relationship
    between two or
    more entities
   Common types of
    associations: 1 to
    Many, Many to
    Many, One to One

   E.g. One Hospital
    Has Many Nurses,

   E.g. In In our
    example application
    Many Assets can
    have Many Owners
Step:5 Launch your Application

   You have
    completed steps to
    add basic building
    blocks for your
    application like:
    entities, properties
    and associations
   Click Launch &
    Deploy button
   Your generated
    application login
    screen is displayed
Using Generated Application
   Login to the
    generated
    application

   Use the same
    Turanto login
    credentials

   You have full admin
    rights –
    edit/update/delete/
    add users
Create Users
   To create new
    users click Admin
    link
   On the Admin page
    navigate to Security
    Settings
   Click on user, Role
    and Permission
    link
   Click on Quick Add
    to add users for
    your application.
   You can assign
    role/permission like
    viewonly, canedit
Add Data in Your Application
   Data/Records can
    be added in 3 ways
   Quick Add
   Add new
   Add new wizard

   Enter data in fields
    and click on Save
    option.
Declare Go Live!!!
   Your application is
    now ready to Go
    Live!!!

   Access URL is
    same as you
    defined in the
    Application URL
    Name (step:1)
   For more details - login and look at the more
    detailed Turanto Getting Started Guide.
   To get to turanto trial

More Related Content

Viewers also liked

Expectation Meeting
Expectation MeetingExpectation Meeting
Expectation MeetingAIESECGreece
 
홍익대학교 벤처창업론 - 태교신기
홍익대학교 벤처창업론 - 태교신기홍익대학교 벤처창업론 - 태교신기
홍익대학교 벤처창업론 - 태교신기담 이
 
Glider kit webinar presentation
Glider kit webinar presentationGlider kit webinar presentation
Glider kit webinar presentationmktruck
 
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.Geoffrey Dorne
 
Persilangan monohibrid
Persilangan monohibridPersilangan monohibrid
Persilangan monohibriddefiyandini
 
Viral List Crusher Review
Viral List Crusher ReviewViral List Crusher Review
Viral List Crusher Reviewecashmarketing
 
Domino's Digital Strategy
Domino's Digital StrategyDomino's Digital Strategy
Domino's Digital Strategyhoekst44
 
Explore Entrepreneurship Spring 2013 | AIESEC Greece
Explore Entrepreneurship Spring 2013 | AIESEC GreeceExplore Entrepreneurship Spring 2013 | AIESEC Greece
Explore Entrepreneurship Spring 2013 | AIESEC GreeceAIESECGreece
 
Welcome to britain
Welcome to britainWelcome to britain
Welcome to britainkruzhochekkk
 
Presentation for professor
Presentation for professorPresentation for professor
Presentation for professorAIESECGreece
 
Blogger Slideshare
Blogger SlideshareBlogger Slideshare
Blogger SlideshareMarietta1030
 
Ep interview flow training
Ep interview flow trainingEp interview flow training
Ep interview flow trainingAIESECGreece
 
Factory farming human planning project
Factory farming human planning projectFactory farming human planning project
Factory farming human planning projectwheelingw08
 

Viewers also liked (20)

Expectation Meeting
Expectation MeetingExpectation Meeting
Expectation Meeting
 
TOUR8 MIDTERM CHAPTER: I managing supply issues in tourist transport
TOUR8 MIDTERM CHAPTER: I managing supply issues in tourist transportTOUR8 MIDTERM CHAPTER: I managing supply issues in tourist transport
TOUR8 MIDTERM CHAPTER: I managing supply issues in tourist transport
 
TOUR09 MIDTERM ChAPTER 07
TOUR09 MIDTERM ChAPTER 07TOUR09 MIDTERM ChAPTER 07
TOUR09 MIDTERM ChAPTER 07
 
Tour9Chapter04
Tour9Chapter04Tour9Chapter04
Tour9Chapter04
 
홍익대학교 벤처창업론 - 태교신기
홍익대학교 벤처창업론 - 태교신기홍익대학교 벤처창업론 - 태교신기
홍익대학교 벤처창업론 - 태교신기
 
Glider kit webinar presentation
Glider kit webinar presentationGlider kit webinar presentation
Glider kit webinar presentation
 
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.
Découvrez les "Creative Awards" : de grandes créations pour de grandes causes.
 
Persilangan monohibrid
Persilangan monohibridPersilangan monohibrid
Persilangan monohibrid
 
Our Way
Our WayOur Way
Our Way
 
Viral List Crusher Review
Viral List Crusher ReviewViral List Crusher Review
Viral List Crusher Review
 
Domino's Digital Strategy
Domino's Digital StrategyDomino's Digital Strategy
Domino's Digital Strategy
 
Explore Entrepreneurship Spring 2013 | AIESEC Greece
Explore Entrepreneurship Spring 2013 | AIESEC GreeceExplore Entrepreneurship Spring 2013 | AIESEC Greece
Explore Entrepreneurship Spring 2013 | AIESEC Greece
 
Welcome to britain
Welcome to britainWelcome to britain
Welcome to britain
 
Presentation for professor
Presentation for professorPresentation for professor
Presentation for professor
 
Reflex~1
Reflex~1Reflex~1
Reflex~1
 
Blogger Slideshare
Blogger SlideshareBlogger Slideshare
Blogger Slideshare
 
Ep interview flow training
Ep interview flow trainingEp interview flow training
Ep interview flow training
 
HRO4A: Front Office Finals 01 folio plus manual
HRO4A: Front Office Finals 01 folio plus manual HRO4A: Front Office Finals 01 folio plus manual
HRO4A: Front Office Finals 01 folio plus manual
 
FRONT OFFICE OPERATIONS
FRONT OFFICE OPERATIONSFRONT OFFICE OPERATIONS
FRONT OFFICE OPERATIONS
 
Factory farming human planning project
Factory farming human planning projectFactory farming human planning project
Factory farming human planning project
 

Similar to Turanto Quick Start Presentation

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network IntergrationDinesh Kumar
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay ExamplesBrenda Lopez
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.Ashley Hernandez
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
HeirList Premium Services Description
HeirList Premium Services DescriptionHeirList Premium Services Description
HeirList Premium Services DescriptionChief Innovation
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET Journal
 
Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMKumari Warsha Goel
 
Unstoppable Domains Workshop
Unstoppable Domains WorkshopUnstoppable Domains Workshop
Unstoppable Domains WorkshopTinaBregovi
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission SetsConfigero
 
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksAnita Miller
 

Similar to Turanto Quick Start Presentation (20)

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay Examples
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.
 
Agile: Scrum Presentation
Agile: Scrum PresentationAgile: Scrum Presentation
Agile: Scrum Presentation
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
HeirList Premium Services Description
HeirList Premium Services DescriptionHeirList Premium Services Description
HeirList Premium Services Description
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 
Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRM
 
Unstoppable Domains Workshop
Unstoppable Domains WorkshopUnstoppable Domains Workshop
Unstoppable Domains Workshop
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
 

Turanto Quick Start Presentation

  • 1. Cloud Application Development Environment (Web & Mobile) Turanto US Toll Free : 1.866.591.5909 5388 Twin Hickory Rd Glen Allen VA 23059 Phone (US): 1.866.591.5906 Phone (India): +91-0731-2570820 Turanto India Fax: 866.591.5906 216, Orbit Mall Scheme No. 54, PU 3 Email: info@turanto.com A.B. Road, Indore - 452010
  • 2. Step:1 Define Your Application  Example: Asset Management Application  Tracks & manages assets, financial data associated with asset, location, persons/owner  Provide details of Application Name(Display name), version, Browser Access URL name(user defined)
  • 3. Step:2 Define Your Entities  An entity is a single person, place, or thing about which data can be stored  In our example application main entities can be Asset, Asset type, Location, Person, Maintenance record
  • 4. Step:3 Define Your Properties  Properties are the different attributes about the entity.  In our example application ,for entity Asset properties can be Asset name, Asset Number, Acquisition date, Disposal date  Another example: For entity Person properties can be Name,EmpID,SSN, Photo
  • 5. Step:4 Define Your Associations  Associations are the relationship between two or more entities  Common types of associations: 1 to Many, Many to Many, One to One  E.g. One Hospital Has Many Nurses,  E.g. In In our example application Many Assets can have Many Owners
  • 6. Step:5 Launch your Application  You have completed steps to add basic building blocks for your application like: entities, properties and associations  Click Launch & Deploy button  Your generated application login screen is displayed
  • 7. Using Generated Application  Login to the generated application  Use the same Turanto login credentials  You have full admin rights – edit/update/delete/ add users
  • 8. Create Users  To create new users click Admin link  On the Admin page navigate to Security Settings  Click on user, Role and Permission link  Click on Quick Add to add users for your application.  You can assign role/permission like viewonly, canedit
  • 9. Add Data in Your Application  Data/Records can be added in 3 ways  Quick Add  Add new  Add new wizard  Enter data in fields and click on Save option.
  • 10. Declare Go Live!!!  Your application is now ready to Go Live!!!  Access URL is same as you defined in the Application URL Name (step:1)
  • 11. For more details - login and look at the more detailed Turanto Getting Started Guide.
  • 12. To get to turanto trial