Difference between revisions of "How Apps Are Built"

From CNM Wiki
Jump to: navigation, search
(Script)
(Script)
Line 16: Line 16:
 
:Every [[CNM app]] must communicate with [[WorldOpp Middleware]] using [[LDAP|Lightweight Directory Access Protocol]] ([[LDAP]]). If the ''COTS application'' lacks the ''LDAP'', ''API'', or other functionalities that [[CNM Cloud]] needs, an additional module or plugin is installed.
 
:Every [[CNM app]] must communicate with [[WorldOpp Middleware]] using [[LDAP|Lightweight Directory Access Protocol]] ([[LDAP]]). If the ''COTS application'' lacks the ''LDAP'', ''API'', or other functionalities that [[CNM Cloud]] needs, an additional module or plugin is installed.
  
:With regard to their ownership, all the ''COTS solutions'' such as core applications, modules, and plugins are divided in proprietary and [[open-source]]. ''Proprietary applications'' are owned privately; their code is closed. All [[CNM app]]s are [[open-source]]. That means that these ''applications'' are community-owned. Their code is open; any contributor may review and, if needed, modify it for special purposes.
+
:With regard to their ownership, all the ''COTS solutions'' such as core applications, modules, and plugins are divided in proprietary and [[open-source]]. ''Proprietary applications'' are owned privately; their code is closed. All [[CNM app]]s are [[open-source]]. That means that these ''applications'' are community-owned. Their code is open; any contributor may review and, if needed, modify it for specific purposes.
  
 
:Finally, ''COTS applications'' tend to be living projects; they are updated frequently, often, twice a year. [[CNM Cyber Team]] strives to update all [[CNM app]]s to last stable versions of the ''COTS applications'' that they use. The ''Team'' also makes best efforts to implement [[cyber-security]] patches and recommendations.
 
:Finally, ''COTS applications'' tend to be living projects; they are updated frequently, often, twice a year. [[CNM Cyber Team]] strives to update all [[CNM app]]s to last stable versions of the ''COTS applications'' that they use. The ''Team'' also makes best efforts to implement [[cyber-security]] patches and recommendations.

Revision as of 17:24, 14 September 2020

How Apps Are Built (hereinafter, the Lectio) is the lesson part of the Soft behind CNM Cloud lesson that introduces its participants to CNM Cloud. This lesson belongs to the Introduction to CNM Cloud session of the CNM Cyber Orientation.


Content

The successor predecessor lectio is Engines and Organizers.

Key terms

Script

Every CNM app consists of one or more end-user applications. Consequently, those applications consist of many software blocks such as customer data organizers, task work organizers, and wiki engines. Some applications are modular -- their blocks are separate modules plugged to the application's core.
The overwhelming majority of the applications that CNM Cloud uses are commercial off-the-shell (COTS). Before being included in CNM Cloud, these applications were already available on the market to be installed and used.
If any CNM app uses more than one end-user application, these applications are interconnected through application programming interfaces (APIs) to function as one CNM app.
Every CNM app must communicate with WorldOpp Middleware using Lightweight Directory Access Protocol (LDAP). If the COTS application lacks the LDAP, API, or other functionalities that CNM Cloud needs, an additional module or plugin is installed.
With regard to their ownership, all the COTS solutions such as core applications, modules, and plugins are divided in proprietary and open-source. Proprietary applications are owned privately; their code is closed. All CNM apps are open-source. That means that these applications are community-owned. Their code is open; any contributor may review and, if needed, modify it for specific purposes.
Finally, COTS applications tend to be living projects; they are updated frequently, often, twice a year. CNM Cyber Team strives to update all CNM apps to last stable versions of the COTS applications that they use. The Team also makes best efforts to implement cyber-security patches and recommendations.

Available vs Custom Code is the successor lectio.

Questions

Lectio quiz

The answer is recorded for the lectio completion purpose:

Placement entrance exam

True/False questions

Fill-in-blanks (short answer) questions