Skip to main content

Numeroom for business..

One of the coolest aspects of the Numeroom collaboration services is the ability for the service to be encapsulated into a securely accessible and brandable portal for user accounts that have one of the site management service plans active on their account. Site management is made possible by one of the important underlying attributes of the AgilEntity platform, multi-tenency. A multi-tenant architecture is one that cordoned off access to particular application or system functions in such a way that many simultaneous users can make use of those functions with limited awareness of the existence of those other users.

When I designed the permissions system of the AgilEntity platform , the use of fine grained action oriented permissions for all instances of any managed Entity ensures that multi-tenancy would be a natural outcome of a permission based security API. All that remained was for the user interface elements of the applications built on the platform to use the permissions system as a guide for conditional display of elements. The web site is merely a UI front end to the back end collaboration API of a running AgilEntity cluster. The services provided by numeroom in the form of secure, real time chat and share "rooms" are all managed on one "site" created on that cluster. "Site" is itself a managed entity type on the system and as such is subject to all the advantages of action oriented workflows and fine grained controls that all Entities enjoy. This "primary site" is the site that all the Users that sign up for the Numeroom services for individually managed rooms are associated with, however some user accounts are associated with other "sites" these are the Business focused site management plans. When a User upgrades their account from the default service plan or from a paid multi-room management plan to a Site Management plan they now have the ability to manage not just a room but all the rooms created on their "site". They can brand their site, create Users for their site and determine if their site conference portal is public or private to the internet. Many elements of site management that the Numeroom administrators wield over the commercial site are granted to the User accounts that upgrade to Site Management plans.

This allows the Users to delegate their own dashboard agents, create their own workflows for delegation of actions such as User edit or create actions or other actions that can not be done under non site managed plans. Businesses that want to get going with a secure , global network of real time chat spaces for their employees and customers to converse in can license one of these plans and get going immediately. The branding and management then allows them to tie the numeroom services into their existing blogs and company site pages.

The video tutorial below shows a site management plan in action:

this video shows how to create new categories for a site, these categories are independent for each site managed on the cluster. On the main numeroom site, the categories seen on the main page are associated with the primary site on that public cluster. Since the commercial site is for general use the categories are generalized. However, Site management plan holders can create their own categories to conform to the real time collaboration needs of their entire organization. For example a bank can have categories specific to department or projects. The users then created on the site would be free to move their rooms from category to category when seeking coworkers or clients or customers to engage in those areas. Permission to perform Create, Edit , Delete and other actions on categories can be managed by any Users designated by the original plan creator, no code changes necessary.

Another of the numeroom services that has a site management context is the TimeLine. TimeLines are near real time feeds of events posted by Users who are contacts on the main numeroom site. For site management plans they perform this function AND also enable site managers to send time line events to a superset of all the Users on their Site. This allows the site managers to send time line events with e-mail notification and thus creating instant newsletters for the entire Site. Since timelines also allow immediate attachment of files on the table of the current numeroom of the sender, the notifications can contain actual files. If the file being delivered is sensitive to the business and should not be routed to the public internet the files can be attached using table to table file transfer, thus content can be shared while preserving the sensitivity of business documents but still by using the public internet. The following video shows this in action:

Another unique feature to site management plans is the guest dashboard agent function. This allows a site manager to delegate Users as dashboard agents and thus giving them access to a dashboard of real time guests requesting assistance via a link added to any of the organizations pages (business or product or service sites, blogs) The dashboard then can be used by these agents to field requests for assistance in real time. This service allows line of business employees to serve as a customer service force for particular business functions that they are responsible for. This allows the business to run more efficiently by allowing customers or potential customers to interface directly with the employees that can best help them in real time. Since the activity of the agents is reported to an xml based report, managers can later determine which agents are most effective, what times have the greatest number of requests and other metrics that can be used to improve response time to addressing guest questions. Watch these videos to see this in action: (part 1) (part 2)


Popular posts from this blog

Highly targeted Cpg vaccine immunotherapy for a range of cancer


This will surely go down as a seminal advance in cancer therapy. It reads like magic:

So this new approach looks for the specific proteins that are associated with a given tumors resistance to attack by the body's T cells, it then adjusts those T cells to be hyper sensitive to the specific oncogenic proteins targeted. These cells become essentially The Terminator​ T cells in the specific tumor AND have the multiplied effect of traveling along the immune pathway of spreading that the cancer many have metastasized. This is huge squared because it means you can essentially use targeting one tumor to identify and eliminate distal tumors that you many not even realize exist.

This allows the therapy for treating cancer to, for the first time; end the "wack a mole" problem that has frustrated traditional shot gun methods of treatment involving radiation and chemotherapy ...which by their nature unfortunately damage parts of the body that are not cancer laden but …

Engineers versus Programmers

I have found as more non formally trained people enter the coding space, the quality of code that results varies in an interesting way.

The formalities of learning to code in a structured course at University involve often strong focus on "correctness" and efficiency in the form of big O representations for the algorithms created.

Much less focus tends to be placed on what I'll call practical programming, which is the type of code that engineers (note I didn't use "programmers" on purpose) must learn to write.

Programmers are what Universities create, students that can take a defined development environment and within in write an algorithm for computing some sequence or traversing a tree or encoding and decoding a string. Efficiency and invariant rules are guiding development missions. Execution time for creating the solution is often a week or more depending on the professor and their style of teaching code and giving out problems. This type of coding is devo…

AgilEntity Architecture: Action Oriented Workflow

Permissions, fine grained versus management headache
The usual method for determining which users can perform a given function on a given object in a managed system, employs providing those Users with specific access rights via the use of permissions. Often these permissions are also able to be granted to collections called Groups, to which Users are added. The combination of Permissions and Groups provides the ability to provide as atomic a dissemination of rights across the User space as possible. However, this granularity comes at the price of reduced efficiency for managing the created permissions and more importantly the Groups that collect Users designated to perform sets of actions. Essentially the Groups serve as access control lists in many systems, which for the variable and often changing environment of business applications means a need to constantly update the ACL’s (groups) in order to add or remove individuals based on their ability to perform certain actions. Also, the…