SlideShare a Scribd company logo
1 of 12
Cloud Application Development Environment
        (Web & Mobile)




Turanto US                                          Toll Free : 1.866.591.5909
5388 Twin Hickory Rd Glen Allen VA 23059            Phone (US): 1.866.591.5906
                                                    Phone (India): +91-0731-2570820
Turanto India                                       Fax: 866.591.5906
216, Orbit Mall Scheme No. 54, PU 3                 Email: info@turanto.com
A.B. Road, Indore - 452010
Step:1 Define Your Application
   Example: Asset
    Management
    Application
   Tracks & manages
    assets, financial
    data associated
    with
    asset, location, per
    sons/owner

   Provide details of
    Application
    Name(Display
    name), version, Bro
    wser Access URL
    name(user defined)
Step:2 Define Your Entities

   An entity is a single
    person, place, or
    thing about which
    data can be stored

   In our example
    application main
    entities can be
    Asset, Asset
    type, Location, Pers
    on, Maintenance
    record
Step:3 Define Your Properties

   Properties are the
    different attributes
    about the entity.

   In our example
    application ,for
    entity Asset
    properties can be
    Asset name, Asset
    Number, Acquisition
    date, Disposal date

   Another example:
    For entity Person
    properties can be
    Name,EmpID,SSN,
    Photo
Step:4 Define Your Associations

   Associations are
    the relationship
    between two or
    more entities
   Common types of
    associations: 1 to
    Many, Many to
    Many, One to One

   E.g. One Hospital
    Has Many Nurses,

   E.g. In In our
    example application
    Many Assets can
    have Many Owners
Step:5 Launch your Application

   You have
    completed steps to
    add basic building
    blocks for your
    application like:
    entities, properties
    and associations
   Click Launch &
    Deploy button
   Your generated
    application login
    screen is displayed
Using Generated Application
   Login to the
    generated
    application

   Use the same
    Turanto login
    credentials

   You have full admin
    rights –
    edit/update/delete/
    add users
Create Users
   To create new
    users click Admin
    link
   On the Admin page
    navigate to Security
    Settings
   Click on user, Role
    and Permission
    link
   Click on Quick Add
    to add users for
    your application.
   You can assign
    role/permission like
    viewonly, canedit
Add Data in Your Application
   Data/Records can
    be added in 3 ways
   Quick Add
   Add new
   Add new wizard

   Enter data in fields
    and click on Save
    option.
Declare Go Live!!!
   Your application is
    now ready to Go
    Live!!!

   Access URL is
    same as you
    defined in the
    Application URL
    Name (step:1)
   For more details - login and look at the more
    detailed Turanto Getting Started Guide.
    Go to Turanto trial




Jun 19, 2012               12

More Related Content

Similar to Turanto quick start presentation

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network IntergrationDinesh Kumar
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay ExamplesBrenda Lopez
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.Ashley Hernandez
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET Journal
 
HeirList Premium Services Description
HeirList Premium Services DescriptionHeirList Premium Services Description
HeirList Premium Services DescriptionChief Innovation
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overviewericsachs
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
IRJET- Privacy & Security Settings: A Review
IRJET- 	  Privacy & Security Settings: A ReviewIRJET- 	  Privacy & Security Settings: A Review
IRJET- Privacy & Security Settings: A ReviewIRJET Journal
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionPeter Coffee
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET Journal
 

Similar to Turanto quick start presentation (20)

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay Examples
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
HeirList Premium Services Description
HeirList Premium Services DescriptionHeirList Premium Services Description
HeirList Premium Services Description
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Agile: Scrum Presentation
Agile: Scrum PresentationAgile: Scrum Presentation
Agile: Scrum Presentation
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Street conf overview
Street conf overviewStreet conf overview
Street conf overview
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
IRJET- Privacy & Security Settings: A Review
IRJET- 	  Privacy & Security Settings: A ReviewIRJET- 	  Privacy & Security Settings: A Review
IRJET- Privacy & Security Settings: A Review
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Social Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; RevolutionSocial Enterprise: Trust; Vision; Revolution
Social Enterprise: Trust; Vision; Revolution
 
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 

Turanto quick start presentation

  • 1. Cloud Application Development Environment (Web & Mobile) Turanto US Toll Free : 1.866.591.5909 5388 Twin Hickory Rd Glen Allen VA 23059 Phone (US): 1.866.591.5906 Phone (India): +91-0731-2570820 Turanto India Fax: 866.591.5906 216, Orbit Mall Scheme No. 54, PU 3 Email: info@turanto.com A.B. Road, Indore - 452010
  • 2. Step:1 Define Your Application  Example: Asset Management Application  Tracks & manages assets, financial data associated with asset, location, per sons/owner  Provide details of Application Name(Display name), version, Bro wser Access URL name(user defined)
  • 3. Step:2 Define Your Entities  An entity is a single person, place, or thing about which data can be stored  In our example application main entities can be Asset, Asset type, Location, Pers on, Maintenance record
  • 4. Step:3 Define Your Properties  Properties are the different attributes about the entity.  In our example application ,for entity Asset properties can be Asset name, Asset Number, Acquisition date, Disposal date  Another example: For entity Person properties can be Name,EmpID,SSN, Photo
  • 5. Step:4 Define Your Associations  Associations are the relationship between two or more entities  Common types of associations: 1 to Many, Many to Many, One to One  E.g. One Hospital Has Many Nurses,  E.g. In In our example application Many Assets can have Many Owners
  • 6. Step:5 Launch your Application  You have completed steps to add basic building blocks for your application like: entities, properties and associations  Click Launch & Deploy button  Your generated application login screen is displayed
  • 7. Using Generated Application  Login to the generated application  Use the same Turanto login credentials  You have full admin rights – edit/update/delete/ add users
  • 8. Create Users  To create new users click Admin link  On the Admin page navigate to Security Settings  Click on user, Role and Permission link  Click on Quick Add to add users for your application.  You can assign role/permission like viewonly, canedit
  • 9. Add Data in Your Application  Data/Records can be added in 3 ways  Quick Add  Add new  Add new wizard  Enter data in fields and click on Save option.
  • 10. Declare Go Live!!!  Your application is now ready to Go Live!!!  Access URL is same as you defined in the Application URL Name (step:1)
  • 11. For more details - login and look at the more detailed Turanto Getting Started Guide.
  • 12. Go to Turanto trial Jun 19, 2012 12