Menu
Home Page

Tapestry

Image result for tapestry learning journal

 

Click on the icon above to go directly to the Tapestry log on page

 

 

The Tapestry App

 

 

For all apple mac based products such as an iphone/ipad/ipad mini etc you can visit the app store on the itunes website. To download the free app click here

 

We're very pleased to let you know that the Android App for Tapestry is now out of beta and available on the Google Play store for you to download. Please be aware that the app is only useful for Tapestry subscribers, so it is not useable as a standalone application.To download, just open your android device and go to the play store, click here

Tapestry Security

 

This is an overview from the makers of Tapestry regarding its online security

 

Physical security
 

  • Hosted on dedicated servers in a high security data centre in the UK (just north of London). Knowing that the data (and backups) are not stored in other jurisdictions means that we can be confident that all data is governed by UK law.
  •  
  • These servers are backed up four times daily, to an off-site datacentre 20 miles from our main datacentre, so that in the event of a major disaster, recovery of entire servers is still possible within a couple of hours.
  • The servers are proactively managed 24 hours a day, including regular updates and patches for security vulnerabilities.
  •  
  • Additionally our servers conform to very high environmental standards, being audited and certified to ISO 14001 (Environment Management) standards.
  •  

Application Security
 

  • The Tapestry accounts and code are held on a secure server (https and the padlock on the address bar) as is usual for sites requiring extra security.
  •  
  • Each Tapestry account has its own database - a setting's information is not held in a larger database with other accounts.
  •  
  • The code itself is developed using hack resistant techniques such as CSRF (Cross Site Request Forgery) protection via form keys, and input fields checked and stripped for XSS (Cross Site Scripting) data and characters
  • Filenames are encoded for uploaded photos, video and images. Log in passwords are never stored but are instead salted and then hashed
  •  
  • The framework is well tested and developed by a programmer experienced in the field of web applications subject to hacking attempts
Top