SlideShare a Scribd company logo
1 of 12
Technical Brief v1.0
Communication tools that broadcast visual content
           directly onto the screens of computers,
              using multiple channels and formats




                                                INFO FOR YOU….INFO FOR Y




  Easy to install. Easy and quick to use.
Measure delivery, click-throughs, responses.
Communication Tools
In a nutshell SnapComms…
  •   is an HTTP based Client / Server pull technology.
  •   has Clients for Windows, MAC, iOS and Android.
  •   uses HTTP/HTTPS on customizable ports.
  •   supports WAN links, VPNs & Proxies.
  •   has SnapComms Hosted & local installation options.
  •   is constantly tested and monitored for intrusion prevention
  •   provides a high degree of data security
  •   has one point of contact for support
  •   is using brand able templates for content display
The SnapComms Server…
 •   is necessary for local installation only
 •   is built with ASP.NET.
 •   provides access to clients via a web service framework.
 •   is supported on Win 2003 or higher.
 •   works with SQL Server 2005 or higher.
 •   requires IIS6 or higher.
 •   comes with detailed installation documentation for
     applications and database.
 •   includes extensive logging capabilities.
 •   integrates Windows or Forms Authentication.
 •   has detailed but easy to manage access control.
The SnapComms Windows client…

 •   is simple to deploy with MSI enabled
     deployment tools.
 •   is supported on Windows XP / IE6 and higher.
 •   encrypts it’s data storage.
 •   integrates into Thin-Client environments like
     Citrix.
 •   integrates with Active Directory.
 •   has a minimal user Interface to minimize
     support.
The Smartphone clients…

 •   will be available Q2 2012
 •   work on iOS 3 / Android 2.1/ Blackberry 6 or
     higher
 •   use a web service based API to access the
     server
 •   support optional / additional push notifications
 •   provide a simple, fully touch enabled UI
 •   are fully brandable
 •   can be easily pre-configured
 •   install directly from the application market
     places
The Network Connectivity…
 •   is from ground up designed to be minimal.
 •   ensures message content (including
     screensavers) is only downloaded once and
     cached (encrypted) on the client.
 •   uses standard HTTP protocols.
 •   works through all standard compliant proxies.
 •   is secured through data encryption via HTTPS.
 •   is routed through a single, configurable port to
     make it easy to pass firewalls.
 •   works perfectly with VPN and WAN link setups.
Active Directory Integration…
 •   makes user, machine and group integration easy.
 •   works fully transparent.
 •   takes place on client side using standardized
     ADSI API.
 •   doesn’t need to access to AD from the server
 •   supports multiple domains/forests and nested
     groups.
 •   collects only clearly specified attributes.
 •   synchronizes the data periodically (6 hours
     default).
 •   is cached encrypted on the client.
 •   encrypts it’s data exchange with the server.
SnapComms Security…
•   is a key policy.
•   has strong authentication and authorization
    processes.
•   includes secure data storage and data transfer.
•   is ensured by constant on going testing.
•   is tested with industry standard tools.
•   includes extensive intrusion testing.
•   minimizes the points of attack.
•   has well defined processes for quick escalation
    and counter measures.
SnapComms Support & Monitoring…

 •   operates 24 x 7.
 •   provides one single point of contact for all enquiries.
 •   has call escalation policies.
 •   bases on clear and easy to understand SLA
     agreements.
 •   works with industry standard support management
     tools.
 •   has well defined issue escalation procedures and
     paths.
 •   guarantees service availability for the hosted solution.
 •   provides a guaranteed response time.
 •   makes your life easier.
References…
 •   Overview of the SnapComms Architecture
 •   SnapComms Client Deployment Overview
 •   Thin Client Implementation
 •   Integration with Active Directory
 •   Assessment & Implementation of the Hosted Solution
 •   Security Overview
 •   Template Guidelines
 •   Assessment & Implementation of a local installation
 •   System Requirements for the locally installed solution
 •   Implementation Tips

More Related Content

What's hot

APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...apidays
 
Going outside the application
Going outside the applicationGoing outside the application
Going outside the applicationMatthew Saltzman
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemRuncy Oommen
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAmazon Web Services
 
PCI 3.0 and penetration testing
PCI 3.0 and penetration testingPCI 3.0 and penetration testing
PCI 3.0 and penetration testingMarcus Dempsey
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAmazon Web Services
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationPrecisely
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and UsLee Saferite
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Projectwsolomoniv
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016Qrator Labs
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtechAlfons Tanujaya
 
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"MobileMonday Estonia
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksCloudflare
 

What's hot (20)

APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
 
Going outside the application
Going outside the applicationGoing outside the application
Going outside the application
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
 
PCI 3.0 and penetration testing
PCI 3.0 and penetration testingPCI 3.0 and penetration testing
PCI 3.0 and penetration testing
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security Keynote
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and Us
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Project
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtech
 
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 

Viewers also liked

Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01JuirleyLopezZambrano
 
Social Media For Business 2013
Social Media For Business 2013Social Media For Business 2013
Social Media For Business 2013Gummy Industries
 
Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Gummy Industries
 
Social media for product and furniture design
Social media for product and furniture designSocial media for product and furniture design
Social media for product and furniture designGummy Industries
 
How our heart works2
How our heart works2How our heart works2
How our heart works2saiydam
 
Actividad 2 emprendimiento
Actividad 2 emprendimientoActividad 2 emprendimiento
Actividad 2 emprendimientovanevico
 
Softengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияSoftengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияAlisa Kyryliuk
 
Le lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksLe lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksGummy Industries
 
Le lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneLe lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneGummy Industries
 
Social network per le istituzioni culturali
Social network per le istituzioni culturaliSocial network per le istituzioni culturali
Social network per le istituzioni culturaliGummy Industries
 

Viewers also liked (20)

Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01
 
MSTS Softengi
MSTS SoftengiMSTS Softengi
MSTS Softengi
 
Social Media For Business 2013
Social Media For Business 2013Social Media For Business 2013
Social Media For Business 2013
 
Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014
 
Social media for product and furniture design
Social media for product and furniture designSocial media for product and furniture design
Social media for product and furniture design
 
How our heart works2
How our heart works2How our heart works2
How our heart works2
 
Proyecto Yulian Ingles
Proyecto Yulian InglesProyecto Yulian Ingles
Proyecto Yulian Ingles
 
Expo retie
Expo retieExpo retie
Expo retie
 
Actividad 2 emprendimiento
Actividad 2 emprendimientoActividad 2 emprendimiento
Actividad 2 emprendimiento
 
04 typography
04 typography04 typography
04 typography
 
Expo retie
Expo retieExpo retie
Expo retie
 
Softengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияSoftengi тестирование программного обеспечения
Softengi тестирование программного обеспечения
 
Graphic Design Fields
Graphic Design FieldsGraphic Design Fields
Graphic Design Fields
 
U5_T2_AA1_Emmanuel Otamendi
U5_T2_AA1_Emmanuel OtamendiU5_T2_AA1_Emmanuel Otamendi
U5_T2_AA1_Emmanuel Otamendi
 
03 - meme - Abadir
03 - meme - Abadir03 - meme - Abadir
03 - meme - Abadir
 
Manual windows 8
Manual windows 8Manual windows 8
Manual windows 8
 
U7_T2_AA2_Emmanuel Otamendi
U7_T2_AA2_Emmanuel OtamendiU7_T2_AA2_Emmanuel Otamendi
U7_T2_AA2_Emmanuel Otamendi
 
Le lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksLe lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networks
 
Le lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneLe lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - Propagazione
 
Social network per le istituzioni culturali
Social network per le istituzioni culturaliSocial network per le istituzioni culturali
Social network per le istituzioni culturali
 

Similar to SnapComms Technical Overview

AdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)APPSeCONNECT
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGSoftware AG South Africa
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Mike Taylor
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 

Similar to SnapComms Technical Overview (20)

AdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic Product Portfolio
AdroitLogic Product Portfolio
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Vp ns
Vp nsVp ns
Vp ns
 
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Chapter08
Chapter08Chapter08
Chapter08
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft Azure
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

SnapComms Technical Overview

  • 2. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats INFO FOR YOU….INFO FOR Y Easy to install. Easy and quick to use. Measure delivery, click-throughs, responses.
  • 4. In a nutshell SnapComms… • is an HTTP based Client / Server pull technology. • has Clients for Windows, MAC, iOS and Android. • uses HTTP/HTTPS on customizable ports. • supports WAN links, VPNs & Proxies. • has SnapComms Hosted & local installation options. • is constantly tested and monitored for intrusion prevention • provides a high degree of data security • has one point of contact for support • is using brand able templates for content display
  • 5. The SnapComms Server… • is necessary for local installation only • is built with ASP.NET. • provides access to clients via a web service framework. • is supported on Win 2003 or higher. • works with SQL Server 2005 or higher. • requires IIS6 or higher. • comes with detailed installation documentation for applications and database. • includes extensive logging capabilities. • integrates Windows or Forms Authentication. • has detailed but easy to manage access control.
  • 6. The SnapComms Windows client… • is simple to deploy with MSI enabled deployment tools. • is supported on Windows XP / IE6 and higher. • encrypts it’s data storage. • integrates into Thin-Client environments like Citrix. • integrates with Active Directory. • has a minimal user Interface to minimize support.
  • 7. The Smartphone clients… • will be available Q2 2012 • work on iOS 3 / Android 2.1/ Blackberry 6 or higher • use a web service based API to access the server • support optional / additional push notifications • provide a simple, fully touch enabled UI • are fully brandable • can be easily pre-configured • install directly from the application market places
  • 8. The Network Connectivity… • is from ground up designed to be minimal. • ensures message content (including screensavers) is only downloaded once and cached (encrypted) on the client. • uses standard HTTP protocols. • works through all standard compliant proxies. • is secured through data encryption via HTTPS. • is routed through a single, configurable port to make it easy to pass firewalls. • works perfectly with VPN and WAN link setups.
  • 9. Active Directory Integration… • makes user, machine and group integration easy. • works fully transparent. • takes place on client side using standardized ADSI API. • doesn’t need to access to AD from the server • supports multiple domains/forests and nested groups. • collects only clearly specified attributes. • synchronizes the data periodically (6 hours default). • is cached encrypted on the client. • encrypts it’s data exchange with the server.
  • 10. SnapComms Security… • is a key policy. • has strong authentication and authorization processes. • includes secure data storage and data transfer. • is ensured by constant on going testing. • is tested with industry standard tools. • includes extensive intrusion testing. • minimizes the points of attack. • has well defined processes for quick escalation and counter measures.
  • 11. SnapComms Support & Monitoring… • operates 24 x 7. • provides one single point of contact for all enquiries. • has call escalation policies. • bases on clear and easy to understand SLA agreements. • works with industry standard support management tools. • has well defined issue escalation procedures and paths. • guarantees service availability for the hosted solution. • provides a guaranteed response time. • makes your life easier.
  • 12. References… • Overview of the SnapComms Architecture • SnapComms Client Deployment Overview • Thin Client Implementation • Integration with Active Directory • Assessment & Implementation of the Hosted Solution • Security Overview • Template Guidelines • Assessment & Implementation of a local installation • System Requirements for the locally installed solution • Implementation Tips