SlideShare a Scribd company logo
Salesforce -  Introduction to Security & Access
Introduction To
Salesforce
2
Handy Tools We Use over the
Evolutional Periods In History
3
Is it safe to play with your computer,
when you are naked and vulnerable ?
4
Top 10 Technologies for 2010
Web 2.0, Clouds, and Internet of Things
5
HPC: High-
Performance
HTC: High-
Throughput
P2P:
Peer to Peer
MPP:
Massively
Parallel
Processors
Public, Private and Hybrid Clouds
6
7
Cloud Computing as A Service
[9]
8
Cloud Providers, Services and Security Measures
9
Amazon Virtual Private Cloud VPC
10
vSphere 4 : An OS for Cloud Platform
11
Cloud Services Stack
Network
Cloud Services
Co-Location
Cloud Services
Compute & Storage
Cloud Services
Platform
Cloud Services
Application
Cloud Services
12
Top 8 Cloud Computing Companies
1313
XEx =' XEx =' XEx ='
 Protecting datacenters must first secure cloud resources and uphold
user privacy and data integrity.
 Trust overlay networks could be applied to build reputation systems
for establishing the trust among interactive datacenters.
 A watermarking technique is suggested to protect shared data objects
and massively distributed software modules.
 These techniques safeguard user authentication and tighten the data
access-control in public clouds.
Security and Trust Crisis in Cloud
Computing
14
Trusted Zones for VM Insulation
Virtual Infrastructure
Virtual Infrastructure
Tenant
#1
Insulate
information
from cloud
providers’
employees
Tenant
#2
APP
OS
APP
OS
Physical
Infrastructure
Cloud Provider
APP
OS
APP
OS
Insulate
information
from other
tenants
Insulate
infrastructure from
Malware, Trojans
and cybercriminals
Segregate and
control user
access
Control and
isolate VM in
the virtual
infrastructure
Federate
identities with
public clouds
Identity
federation
Virtual
network
security
Access
Mgmt
Cybercrime
intelligence
Strong
authentication
Data loss
prevention
Encryption & key
mgmt
Tokenization
Enable end to end view of security events and compliance across
infrastructures
Security Info. &
Event Mgmt
GRC
Anti-malware
15
Data Security and Copyright Protectionin A Trusted
Cloud Platform
16
Security Protection Mechanisms for Public Clouds
16
Mechanism Brief Description
Trust delegation
and Negotiation
Cross certificates must be used to delegate trust across different
PKI domains. Trust negotiation among different CSPs demands
resolution of policy conflicts.
Worm
containment and
DDoS Defense
Internet worm containment and distributed defense against
DDoS attacks are necessary to secure all datacenters and cloud
platforms .
Reputation
System Over
Resource Sites
Reputation system could be built with P2P technology. One can
build a hierarchy of reputation systems from datacenters to
distributed file systems .
Fine-grain
access control
This refers to fine-grain access control at the file or object level.
This adds up the security protection beyond firewalls and
intrusion detection systems .
Collusive Piracy
prevention
Piracy prevention achieved with peer collusion detection and
content poisoning techniques .
17
Cloud Service Models and Their Security Demands
18
Trust Management for Protecting Cloud Resources
and Safeguard Datacenter Operations [3]
PowerTrust Built over A Trust Overlay Network
Look-ahead Random Walk Distributed Ranking Module
vn
............v3
v2
v1
Global Reputation Scores V
Regular Random Walk
Initial Reputation
Aggregation
Reputation Updating
Local Trust Scores
Power
Nodes
Trust Overlay Network
19
20
Distributed Defense against
DDoS Attacks over Multiple
Network Domains
(Chen, Hwang,
and Ku, IEEE
Trans. on Parallel and
Distributed Systems, Dec. 2007 )
21
Data Coloring via Watermarking
22
Color Matching To Authenticate Data Owners and
Cloud Service Providers
The Internet of Things
23
Internet
Clouds
Internet
Clouds
Internet of
Things (IOT)
Internet of
Things (IOT)
The Internet
The Internet
Smart Earth
Smart
Earth:
An
IBM
Dream
Opportunities of IOT in 3 Dimensions
24
Architecture of The Internet of Things
25
Merchandise
Tracking
Environment
Protection
Intelligent
Search
Tele-
medicine
Intelligent
Traffic
Cloud Computing
Platform
Smart
Home
Mobile
Telecom
Network
The
Internet
Information
Network
RFID
RFID Label
Sensor
Network
Sensor Nodes
GPS
Road Mapper
Sensing
Layer
Network
Layer
Application
Layer
26
Supply Chain Management supported by the
Internet of Things.
27
Smart Power Grid
28
Mobility Support and Security Measures for Mobile Cloud Computing
Cloud
Service
Models
Mobility Support and
Data Protection Methods
Hardware and Software
Measures for Cloud Security
Infrastructure
Cloud
(The IaaS
Model)
 Special air interfaces
 Mobile API design
 File/Log access control
 Data coloring
 Hardware/software root of trust,
 Provisioning of virtual machines,
 Software watermarking
 Host-based firewalls and IDS
Platform
Cloud
(The PaaS
Model)
 Wireless PKI ,
 User authentication,
 Copyright protection
 Disaster recovery
 Network-based firewalls
and IDS
 Trust overlay network
 Reputation system
 OS patch management
Service-Oriented Cloud of Clouds (Intercloud or Mashup)
29
Database
S
S
S
S
S
S
S
S
S
S
S
S
Sensor or Data
Interchange
Service
Another
Grid
Raw Data  Data  Information  Knowledge  Wisdom  Decisions
S
S
S
S
Another
Service
S
SAnother
Grid S
S
Another
Grid
SS
SS
SS
SS
SS
SS
SS
Storage
Cloud
Compute
Cloud
S
S
S
S
S
S
S
S
Filter
Cloud
Filter
Cloud
Filter
Cloud
Discovery
Cloud
Discovery
Cloud
Filter
Service
fsfs
fs fs
fs fs
Filter
Service
fsfs
fs fs
fs fs
Filter
Service
fsfs
fs fs
fs fs
Filter
Cloud
Filter
Cloud
Filter
Cloud
Filter
Service
fsfs
fs fs
fs fs
Traditional Grid
with exposed
services
Cloud of clouds -- from Raw Data to Wisdom. SS =Sensor service, fs = filter services
Conclusions:
30
 Computing clouds are changing the whole IT , service industry, and
global economy. Clearly, cloud computing demands ubiquity,
efficiency, security, and trustworthiness.
 Cloud computing has become a common practice in business,
government, education, and entertainment leveraging 50 millions
of servers globally installed at thousands of datacenters today.
 Private clouds will become widespread in addition to using a few
public clouds, that are under heavy competition among Google, MS,
Amazon, Intel, EMC, IBM, SGI, VMWare, Saleforce.com, etc.
31
SGI Cyclone HPC cloud for enabling SaaS and IaaS applications
32
Nebula Cloud Developed by NASA
33
Cloud Computing – Service Provider Priorities
 Ensure confidentiality, integrity, and
availability in a multi-tenant environment.
 Effectively meet the advertised SLA,
while optimizing cloud resource
utilization.
 Offer tenants capabilities for self-service,
and achieve scaling through automation
and simplification.
34
Google App Engine Platform for PaaS Operations
35
Cloud Security Responsibilities by Providers and Users
Table 1:
36
Concept of Virtual Clusters
Thank You !!!
For More Information click below link:
Follow Us on:
http://vibranttechnologies.co.in/salesforce-classes-in-mumbai.html

More Related Content

PDF
Cloud Security Best Practices - Part 1
PDF
Dn35636640
PDF
An Auditing Protocol for Protected Data Storage in Cloud Computing
PDF
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
PDF
Cloud Computing - Fundamentals and Applications
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Thesis writing service
Cloud Security Best Practices - Part 1
Dn35636640
An Auditing Protocol for Protected Data Storage in Cloud Computing
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Cloud Computing - Fundamentals and Applications
Ensuring data security in cloud computing. - Anusha Tuke
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Thesis writing service

What's hot (20)

PDF
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
PPT
Unit 3 -Data storage and cloud computing
PDF
PDF
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
PDF
Smart, Secure and Efficient Data Sharing in IoT
PDF
The Data Distribution Service
PPT
Features of cloud
PDF
A Study of Data Storage Security Issues in Cloud Computing
PDF
Bn4301364368
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
PDF
A Collaborative Intrusion Detection System for Cloud Computing
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
PDF
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
PDF
Cloud Computing Using Encryption and Intrusion Detection
PPT
htcia-5-2015
PDF
The Security and Privacy Threats to Cloud Computing
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
Unit 3 -Data storage and cloud computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Smart, Secure and Efficient Data Sharing in IoT
The Data Distribution Service
Features of cloud
A Study of Data Storage Security Issues in Cloud Computing
Bn4301364368
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
A Collaborative Intrusion Detection System for Cloud Computing
Secure data sharing in cloud computing using revocable storage identity-based...
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Cloud Computing Using Encryption and Intrusion Detection
htcia-5-2015
The Security and Privacy Threats to Cloud Computing
Improving Data Storage Security in Cloud using Hadoop
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Ad

Viewers also liked (14)

PPT
Data ware housing- Introduction to olap .
PPT
SQL- Introduction to SQL database
PPT
Teradata a z
PPT
Buisness analyst business analysis overview ppt 5
PPT
Datastage Introduction To Data Warehousing
PPT
Sql server select queries ppt 18
PDF
PPT
Data ware housing - Introduction to data ware housing process.
PPT
Datastage database design and data modeling ppt 4
PPT
datastage training | datastage online training | datastage training videos | ...
PPT
QTP Training by INFOTECH
PDF
data stage-material
PPT
Data ware housing- Introduction to data ware housing
PPTX
Data ware housing- Introduction to olap .
SQL- Introduction to SQL database
Teradata a z
Buisness analyst business analysis overview ppt 5
Datastage Introduction To Data Warehousing
Sql server select queries ppt 18
Data ware housing - Introduction to data ware housing process.
Datastage database design and data modeling ppt 4
datastage training | datastage online training | datastage training videos | ...
QTP Training by INFOTECH
data stage-material
Data ware housing- Introduction to data ware housing
Ad

Similar to Salesforce - Introduction to Security & Access (20)

PDF
Securing The Journey To The Cloud
PPTX
Chapter 2 Cloud Computing and Databases.pptx
PPTX
Cloud Security
PPTX
Cloud Security
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PPTX
Cloud Computing
PPTX
Cloud Computing
PPT
4831586.ppt
PDF
R1. John W. RittinghouseCloud Computing Implementation, Management, and Secur...
PPT
Cloud Security Alliance's GRC Stack Overview
PPT
Cloud computing seminar
PPTX
Cloudhnologysstecociat
PDF
Cc unit 1 updated
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PPTX
Cloud Computing Presentation
PPT
Introduction to Cloud Computing
PPTX
Why the cloud is more secure than your existing systems
PDF
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
PPT
cloud computing
PPTX
Presentation on cloud computing
Securing The Journey To The Cloud
Chapter 2 Cloud Computing and Databases.pptx
Cloud Security
Cloud Security
talk6securingcloudamarprusty-191030091632.pptx
Cloud Computing
Cloud Computing
4831586.ppt
R1. John W. RittinghouseCloud Computing Implementation, Management, and Secur...
Cloud Security Alliance's GRC Stack Overview
Cloud computing seminar
Cloudhnologysstecociat
Cc unit 1 updated
INFORMATION SECURITY IN CLOUD COMPUTING
Cloud Computing Presentation
Introduction to Cloud Computing
Why the cloud is more secure than your existing systems
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
cloud computing
Presentation on cloud computing

More from Vibrant Technologies & Computers (20)

PPT
SQL Introduction to displaying data from multiple tables
PPT
SQL- Introduction to MySQL
PPT
ITIL - introduction to ITIL
PPT
Salesforce - classification of cloud computing
PPT
Salesforce - cloud computing fundamental
PPT
SQL- Introduction to PL/SQL
PPT
SQL- Introduction to advanced sql concepts
PPT
SQL Inteoduction to SQL manipulating of data
PPT
SQL- Introduction to SQL Set Operations
PPT
Sas - Introduction to designing the data mart
PPT
Sas - Introduction to working under change management
PPT
SAS - overview of SAS
PPT
Teradata - Architecture of Teradata
PPT
Teradata - Restoring Data
PPT
Datastage Introduction To Data Warehousing
PPT
Sql server T-sql basics ppt-3
PPT
Sql server building a database ppt 12
PPT
Sql server introduction to sql server
PPT
websphere - Understanding web sphere performance
PPT
Websphere - Introduction to SSL part 1
SQL Introduction to displaying data from multiple tables
SQL- Introduction to MySQL
ITIL - introduction to ITIL
Salesforce - classification of cloud computing
Salesforce - cloud computing fundamental
SQL- Introduction to PL/SQL
SQL- Introduction to advanced sql concepts
SQL Inteoduction to SQL manipulating of data
SQL- Introduction to SQL Set Operations
Sas - Introduction to designing the data mart
Sas - Introduction to working under change management
SAS - overview of SAS
Teradata - Architecture of Teradata
Teradata - Restoring Data
Datastage Introduction To Data Warehousing
Sql server T-sql basics ppt-3
Sql server building a database ppt 12
Sql server introduction to sql server
websphere - Understanding web sphere performance
Websphere - Introduction to SSL part 1

Recently uploaded (20)

PDF
REPORT: Heating appliances market in Poland 2024
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
PDF
Dell Pro 14 Plus: Be better prepared for what’s coming
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
PPTX
How Much Does It Cost to Build a Train Ticket App like Trenitalia in Italy.pptx
PDF
SparkLabs Primer on Artificial Intelligence 2025
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
This slide provides an overview Technology
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
Chapter 2 Digital Image Fundamentals.pdf
REPORT: Heating appliances market in Poland 2024
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Dell Pro 14 Plus: Be better prepared for what’s coming
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Understanding_Digital_Forensics_Presentation.pptx
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
How Much Does It Cost to Build a Train Ticket App like Trenitalia in Italy.pptx
SparkLabs Primer on Artificial Intelligence 2025
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
This slide provides an overview Technology
Revolutionize Operations with Intelligent IoT Monitoring and Control
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
CroxyProxy Instagram Access id login.pptx
Chapter 2 Digital Image Fundamentals.pdf

Salesforce - Introduction to Security & Access

  • 3. Handy Tools We Use over the Evolutional Periods In History 3 Is it safe to play with your computer, when you are naked and vulnerable ?
  • 5. Web 2.0, Clouds, and Internet of Things 5 HPC: High- Performance HTC: High- Throughput P2P: Peer to Peer MPP: Massively Parallel Processors
  • 6. Public, Private and Hybrid Clouds 6
  • 7. 7 Cloud Computing as A Service [9]
  • 8. 8 Cloud Providers, Services and Security Measures
  • 10. 10 vSphere 4 : An OS for Cloud Platform
  • 11. 11 Cloud Services Stack Network Cloud Services Co-Location Cloud Services Compute & Storage Cloud Services Platform Cloud Services Application Cloud Services
  • 12. 12 Top 8 Cloud Computing Companies
  • 13. 1313 XEx =' XEx =' XEx ='  Protecting datacenters must first secure cloud resources and uphold user privacy and data integrity.  Trust overlay networks could be applied to build reputation systems for establishing the trust among interactive datacenters.  A watermarking technique is suggested to protect shared data objects and massively distributed software modules.  These techniques safeguard user authentication and tighten the data access-control in public clouds. Security and Trust Crisis in Cloud Computing
  • 14. 14 Trusted Zones for VM Insulation Virtual Infrastructure Virtual Infrastructure Tenant #1 Insulate information from cloud providers’ employees Tenant #2 APP OS APP OS Physical Infrastructure Cloud Provider APP OS APP OS Insulate information from other tenants Insulate infrastructure from Malware, Trojans and cybercriminals Segregate and control user access Control and isolate VM in the virtual infrastructure Federate identities with public clouds Identity federation Virtual network security Access Mgmt Cybercrime intelligence Strong authentication Data loss prevention Encryption & key mgmt Tokenization Enable end to end view of security events and compliance across infrastructures Security Info. & Event Mgmt GRC Anti-malware
  • 15. 15 Data Security and Copyright Protectionin A Trusted Cloud Platform
  • 16. 16 Security Protection Mechanisms for Public Clouds 16 Mechanism Brief Description Trust delegation and Negotiation Cross certificates must be used to delegate trust across different PKI domains. Trust negotiation among different CSPs demands resolution of policy conflicts. Worm containment and DDoS Defense Internet worm containment and distributed defense against DDoS attacks are necessary to secure all datacenters and cloud platforms . Reputation System Over Resource Sites Reputation system could be built with P2P technology. One can build a hierarchy of reputation systems from datacenters to distributed file systems . Fine-grain access control This refers to fine-grain access control at the file or object level. This adds up the security protection beyond firewalls and intrusion detection systems . Collusive Piracy prevention Piracy prevention achieved with peer collusion detection and content poisoning techniques .
  • 17. 17 Cloud Service Models and Their Security Demands
  • 18. 18 Trust Management for Protecting Cloud Resources and Safeguard Datacenter Operations [3]
  • 19. PowerTrust Built over A Trust Overlay Network Look-ahead Random Walk Distributed Ranking Module vn ............v3 v2 v1 Global Reputation Scores V Regular Random Walk Initial Reputation Aggregation Reputation Updating Local Trust Scores Power Nodes Trust Overlay Network 19
  • 20. 20 Distributed Defense against DDoS Attacks over Multiple Network Domains (Chen, Hwang, and Ku, IEEE Trans. on Parallel and Distributed Systems, Dec. 2007 )
  • 21. 21 Data Coloring via Watermarking
  • 22. 22 Color Matching To Authenticate Data Owners and Cloud Service Providers
  • 23. The Internet of Things 23 Internet Clouds Internet Clouds Internet of Things (IOT) Internet of Things (IOT) The Internet The Internet Smart Earth Smart Earth: An IBM Dream
  • 24. Opportunities of IOT in 3 Dimensions 24
  • 25. Architecture of The Internet of Things 25 Merchandise Tracking Environment Protection Intelligent Search Tele- medicine Intelligent Traffic Cloud Computing Platform Smart Home Mobile Telecom Network The Internet Information Network RFID RFID Label Sensor Network Sensor Nodes GPS Road Mapper Sensing Layer Network Layer Application Layer
  • 26. 26 Supply Chain Management supported by the Internet of Things.
  • 28. 28 Mobility Support and Security Measures for Mobile Cloud Computing Cloud Service Models Mobility Support and Data Protection Methods Hardware and Software Measures for Cloud Security Infrastructure Cloud (The IaaS Model)  Special air interfaces  Mobile API design  File/Log access control  Data coloring  Hardware/software root of trust,  Provisioning of virtual machines,  Software watermarking  Host-based firewalls and IDS Platform Cloud (The PaaS Model)  Wireless PKI ,  User authentication,  Copyright protection  Disaster recovery  Network-based firewalls and IDS  Trust overlay network  Reputation system  OS patch management
  • 29. Service-Oriented Cloud of Clouds (Intercloud or Mashup) 29 Database S S S S S S S S S S S S Sensor or Data Interchange Service Another Grid Raw Data  Data  Information  Knowledge  Wisdom  Decisions S S S S Another Service S SAnother Grid S S Another Grid SS SS SS SS SS SS SS Storage Cloud Compute Cloud S S S S S S S S Filter Cloud Filter Cloud Filter Cloud Discovery Cloud Discovery Cloud Filter Service fsfs fs fs fs fs Filter Service fsfs fs fs fs fs Filter Service fsfs fs fs fs fs Filter Cloud Filter Cloud Filter Cloud Filter Service fsfs fs fs fs fs Traditional Grid with exposed services Cloud of clouds -- from Raw Data to Wisdom. SS =Sensor service, fs = filter services
  • 30. Conclusions: 30  Computing clouds are changing the whole IT , service industry, and global economy. Clearly, cloud computing demands ubiquity, efficiency, security, and trustworthiness.  Cloud computing has become a common practice in business, government, education, and entertainment leveraging 50 millions of servers globally installed at thousands of datacenters today.  Private clouds will become widespread in addition to using a few public clouds, that are under heavy competition among Google, MS, Amazon, Intel, EMC, IBM, SGI, VMWare, Saleforce.com, etc.
  • 31. 31 SGI Cyclone HPC cloud for enabling SaaS and IaaS applications
  • 33. 33 Cloud Computing – Service Provider Priorities  Ensure confidentiality, integrity, and availability in a multi-tenant environment.  Effectively meet the advertised SLA, while optimizing cloud resource utilization.  Offer tenants capabilities for self-service, and achieve scaling through automation and simplification.
  • 34. 34 Google App Engine Platform for PaaS Operations
  • 35. 35 Cloud Security Responsibilities by Providers and Users Table 1:
  • 37. Thank You !!! For More Information click below link: Follow Us on: http://vibranttechnologies.co.in/salesforce-classes-in-mumbai.html

Editor's Notes

  • #10: 通过Force.com云服务免费建立你的网站 译言 于 2009-6-15,22:09 评论 (1)  今天Salesforce.com已经通过Force.com把企业云计算服务提升到了一个新高度。 该网站允许任何用户通过salesforce提供的云服务构架搭建一个全功能网站。也就是说,用户通过Force.com就可以搭建一个综合网站,自己只需通过HTML, JavaScript, Flex 和CSS设计用户界面。 同样的云服务,崭新的方法Force.com是一个领先的平台, 开发者可以在上面开发应用产品。以前网页只是该公司的补充内容。但毫无疑问,后台服务可以为网站建设提供强大支持。从今年二月份起,Force.com网站一直处在开发者预览阶段,为Salesforce.com的一些大客户网站提供了支持,其中包括 红十字会, Crocs, Dell, FICO, Juniper网络公司, NJ TRANSIT, Seagate, 和星巴克。用户只需自己开发前端,该网站使用了非常简单的Visualforce界面。Salesforce.com把自己的新服务看成Java和.NET的备选方案。对于那些最想减少软件和硬件支出的人来说这是个好消息。 Salesforce.com和Nucleus Research进行的一项独立评估认为在Force.com上开发网站比传统方法更加快捷,让用户把精力放在用户体验和内容上。 一个可定制网站,100个用户,永远100%免费 为了鼓励新用户,Force.com允许任何人创建一个有100个用户的网站,永久免费,但很多用户已经超过了这个限制。但这种免费增值商业模式(freemium)可以让那些小公司也可以使用Force.com的服务。
  • #13: 通过Force.com云服务免费建立你的网站 译言 于 2009-6-15,22:09 评论 (1)  今天Salesforce.com已经通过Force.com把企业云计算服务提升到了一个新高度。 该网站允许任何用户通过salesforce提供的云服务构架搭建一个全功能网站。也就是说,用户通过Force.com就可以搭建一个综合网站,自己只需通过HTML, JavaScript, Flex 和CSS设计用户界面。 同样的云服务,崭新的方法Force.com是一个领先的平台, 开发者可以在上面开发应用产品。以前网页只是该公司的补充内容。但毫无疑问,后台服务可以为网站建设提供强大支持。从今年二月份起,Force.com网站一直处在开发者预览阶段,为Salesforce.com的一些大客户网站提供了支持,其中包括 红十字会, Crocs, Dell, FICO, Juniper网络公司, NJ TRANSIT, Seagate, 和星巴克。用户只需自己开发前端,该网站使用了非常简单的Visualforce界面。Salesforce.com把自己的新服务看成Java和.NET的备选方案。对于那些最想减少软件和硬件支出的人来说这是个好消息。 Salesforce.com和Nucleus Research进行的一项独立评估认为在Force.com上开发网站比传统方法更加快捷,让用户把精力放在用户体验和内容上。 一个可定制网站,100个用户,永远100%免费 为了鼓励新用户,Force.com允许任何人创建一个有100个用户的网站,永久免费,但很多用户已经超过了这个限制。但这种免费增值商业模式(freemium)可以让那些小公司也可以使用Force.com的服务。
  • #21: A managed integration service that can radically reduce the complexity, time to deploy and the total cost of ownership of enabling demanding business solutions. Target deployment scenarios Operating across geographically distributed locations, with requirement to connect, distribute and provide insight on business data Low risk approach to incremental SOA investment and development Reducing the operational complexity and improving the flexibility of integration infrastructure Connecting business units with key customers and partners Implementing message intensive technologies, such as RFID
  • #32: 通过Force.com云服务免费建立你的网站 译言 于 2009-6-15,22:09 评论 (1)  今天Salesforce.com已经通过Force.com把企业云计算服务提升到了一个新高度。 该网站允许任何用户通过salesforce提供的云服务构架搭建一个全功能网站。也就是说,用户通过Force.com就可以搭建一个综合网站,自己只需通过HTML, JavaScript, Flex 和CSS设计用户界面。 同样的云服务,崭新的方法Force.com是一个领先的平台, 开发者可以在上面开发应用产品。以前网页只是该公司的补充内容。但毫无疑问,后台服务可以为网站建设提供强大支持。从今年二月份起,Force.com网站一直处在开发者预览阶段,为Salesforce.com的一些大客户网站提供了支持,其中包括 红十字会, Crocs, Dell, FICO, Juniper网络公司, NJ TRANSIT, Seagate, 和星巴克。用户只需自己开发前端,该网站使用了非常简单的Visualforce界面。Salesforce.com把自己的新服务看成Java和.NET的备选方案。对于那些最想减少软件和硬件支出的人来说这是个好消息。 Salesforce.com和Nucleus Research进行的一项独立评估认为在Force.com上开发网站比传统方法更加快捷,让用户把精力放在用户体验和内容上。 一个可定制网站,100个用户,永远100%免费 为了鼓励新用户,Force.com允许任何人创建一个有100个用户的网站,永久免费,但很多用户已经超过了这个限制。但这种免费增值商业模式(freemium)可以让那些小公司也可以使用Force.com的服务。
  • #33: 通过Force.com云服务免费建立你的网站 译言 于 2009-6-15,22:09 评论 (1)  今天Salesforce.com已经通过Force.com把企业云计算服务提升到了一个新高度。 该网站允许任何用户通过salesforce提供的云服务构架搭建一个全功能网站。也就是说,用户通过Force.com就可以搭建一个综合网站,自己只需通过HTML, JavaScript, Flex 和CSS设计用户界面。 同样的云服务,崭新的方法Force.com是一个领先的平台, 开发者可以在上面开发应用产品。以前网页只是该公司的补充内容。但毫无疑问,后台服务可以为网站建设提供强大支持。从今年二月份起,Force.com网站一直处在开发者预览阶段,为Salesforce.com的一些大客户网站提供了支持,其中包括 红十字会, Crocs, Dell, FICO, Juniper网络公司, NJ TRANSIT, Seagate, 和星巴克。用户只需自己开发前端,该网站使用了非常简单的Visualforce界面。Salesforce.com把自己的新服务看成Java和.NET的备选方案。对于那些最想减少软件和硬件支出的人来说这是个好消息。 Salesforce.com和Nucleus Research进行的一项独立评估认为在Force.com上开发网站比传统方法更加快捷,让用户把精力放在用户体验和内容上。 一个可定制网站,100个用户,永远100%免费 为了鼓励新用户,Force.com允许任何人创建一个有100个用户的网站,永久免费,但很多用户已经超过了这个限制。但这种免费增值商业模式(freemium)可以让那些小公司也可以使用Force.com的服务。
  • #35: 通过Force.com云服务免费建立你的网站 译言 于 2009-6-15,22:09 评论 (1)  今天Salesforce.com已经通过Force.com把企业云计算服务提升到了一个新高度。 该网站允许任何用户通过salesforce提供的云服务构架搭建一个全功能网站。也就是说,用户通过Force.com就可以搭建一个综合网站,自己只需通过HTML, JavaScript, Flex 和CSS设计用户界面。 同样的云服务,崭新的方法Force.com是一个领先的平台, 开发者可以在上面开发应用产品。以前网页只是该公司的补充内容。但毫无疑问,后台服务可以为网站建设提供强大支持。从今年二月份起,Force.com网站一直处在开发者预览阶段,为Salesforce.com的一些大客户网站提供了支持,其中包括 红十字会, Crocs, Dell, FICO, Juniper网络公司, NJ TRANSIT, Seagate, 和星巴克。用户只需自己开发前端,该网站使用了非常简单的Visualforce界面。Salesforce.com把自己的新服务看成Java和.NET的备选方案。对于那些最想减少软件和硬件支出的人来说这是个好消息。 Salesforce.com和Nucleus Research进行的一项独立评估认为在Force.com上开发网站比传统方法更加快捷,让用户把精力放在用户体验和内容上。 一个可定制网站,100个用户,永远100%免费 为了鼓励新用户,Force.com允许任何人创建一个有100个用户的网站,永久免费,但很多用户已经超过了这个限制。但这种免费增值商业模式(freemium)可以让那些小公司也可以使用Force.com的服务。