Wednesday, June 22, 2011

How to get your work noticed at your job

This article is to give some tips to get your work noticed by your boss.
Imagine you have joined a new company and of course your team leader,project leader, manager everybody will be noticing how well you are performing.In a fast paced corporate environment,after a while,we are not sure whether our work are being noticed by our next level bosses.It is really important to put some efforts to boost your individual status and personal kudos for your work.

The best way is to step outside normal working routine.For example,if you have to process "X" number of transactions each day- and so does everyone else-then processing more wont  do you that much good.
If you submit a report to your boss of how everyone could process more transactions , then you will get noticed.That makes you to stand out from the crowd.Also you should send the report occasionally and sticking to some rules.
Never stand still:
Most people go to work daily thinking about to return back to home at the magic time.Most of them think about next coffee breaks.But you should be busy in planning and executing next maneuver.Doing the job is not an end game for you-it is merely a means to an end. And the end is promotion,success, learning,more money, more contacts and experience.
Volunteer carefully:
A lot of people think that if they say "Yes" to everything , they will get praised, noticed.Not true.A clever manager will use this"i will do it" mentality and at last you will end up with more work.Before you put your hand up to volunteer for anything,think very carefully.Ask yourself various questions.
Carve out a Niche for yourself:
Carving out niche means spotting a useful area that no else does. It might be as simple as spreadsheets,report writing,company software,budgets or understanding the system.This makes you to stand out from herd and gives you independence and a superior quality.
Under promise and over deliver:
If you know you can do it by Wednesday,always say Friday. This is not dishonest,merely prudent.But don't be too blatant when you do this , it should be pleasant surprise not a frequently used tactic.

DNN for website design

Do you want to redesign or create a new  website? You do not need any programming skills to host or administrate your website.
Now creating website is not a tedious process . Also you can frequently change the skins and add/delete the module to make your website lively using DotNetNuke.

What is DNN?
DNN is a CMS platform that can be extended with modules to achieve desired functions in your website.It is like the operating system on your computer it really doesn't do much until you install programs on it.

DNN Design and Development:
DotNetNuke is a program that runs on Microsoft ASP.NET. It is also a framework, meaning, it is a program that is designed to be extended. One of the ways you extend the framework is to create modules. These modules are installed inside a DotNetNuke installation and when they run in that DotNetNuke installation they extend the framework to create a DotNetNuke website also called a portal.
What is CMS?
CMS is a content management system (CMS) is the collection of procedures used to manage work flow in a collaborative environment. These procedures can be manual or computer-based. The procedures are designed to do the following:
Allow  authorised people to contribute to and share stored data
Control access to data, based on user roles (defining which information users or user groups can view, edit, publish, etc.)
Aid in easy storage and retrieval of data
Reduce repetitive duplicate input
Improve the ease of report writing
Improve communication between users
CMSs are frequently used for storing, controlling, enriching, and publishing documentation.
Uses:
Using DNN we were able to save considerable development time. With DNN content management a number of tasks can be performed in moments. It has multi-lingual support and provides a user friendly admin interface. 
Numerous pre-installed Dot Net Nuke modules allow you creating an interesting, original and dynamic website absolutely free of charge.
 These are just a few things of what you can easily do with a DNN-based website:

Manage site content: add announcements, events, blogs, feedback and contact forms etc.
Enrich your site with text, tables, pictures, links and more
Assign membership roles and security levels
Send bulk emails and submit the website to search engines
Set up banner advertising and customize page appearance

Contact us mail@perfeitosoftware.com to get a DotNetNuke Development Quote 
If you need a robust, highly scalable and unique solution, our dedicated team of DotNetNuke developers is ready to implement your idea. We can provide programming services for new modules and exclusive skins and integrate them into the existing CMS.

Monday, June 20, 2011

Key Differences between Azure and EC2


At the time of application design decision on Cloud , most of us get into this discussion at some point of time, “The Key differences between Windows Azure and Amazon EC2.
I thought of listing down the key differences of the both.Following comparison might be helpful.
Basic
Azure can be classified as Platform as a Service (PaaS): a cloud model that offers hardware, operating systems and application-support, effectively offering a virtual server on which to load software, which can be accessed and managed through a Web browser.
 Amazon Web Services (AWS) EC2 allows users to rent virtual computers on which to run their own computer applications.Amazon EC2’s simple web service interface allows  to obtain and configure capacity with minimal friction. 

Application Support
Amazon EC2 running Microsoft Windows Server® (available in 2003 R2, 2008 or 2008 R2 editions) is a fast and dependable environment for deploying applications using the Microsoft Web Platform, including ASP.NET, ASP.NET AJAX, Silverlight™, and Internet Information Server (IIS). Amazon EC2 enables you to run any compatible Windows-based solution on AWS’ high-performance, reliable, cost-effective, cloud computing platform. 
Microsoft Azure on the other hand is purely a Windows environment with Windows Server 2008 the primary environment and all languages/applications that are available on Windows Server is supported. It supports other languages like Java, PHP and Ruby to run on Azure.

Scalability
By using Windows Azure, we can quickly scale up to handle the heavy computational and storage needs it has for its online video platform. Whereas scaling up with Amazon EC2 required the company to add more virtual servers and manage its own scaling logic.

Pricing
 Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Azure require no up-front expenses, no long term commitment, and enable you to pay only for the resources you use.

Deployment/Setup Complexity
Setup for Amazon EC2 involves setting up an image and configuring a virtual instance of the instance to include the Operating System/Application. The setup and deployment activities are similar in nature to setup a virtualized environment. Amazon provides command line tools which would help support this.Azure provides an integrated approach of deployment directly from Visual Studio which would directly allow you to deploy the solution on Azure.


Monday, June 13, 2011

CRM and Social Media for Business


There's no doubt that social media and social networking have changed the way people connect and communicate. As these technologies are being adopted by people of all ages, all over the world, a whole new audience is able to be reached by anyone with Internet access and an E-mail address. For businesses especially, social networking has changed the way they communicate with their customers - and find new ones.

Providers of Web-based customer relationship management (CRM) applications have worked hard to incorporate these new networks and technologies into their services, utilizing the power of the cloud to connect and integrate regular CRM tools with sites like Twitter, Facebook and LinkedIn; creating what has come to be known as social CRM. On the site, you'll find more in-depth information regarding social networks and how they can help you to grow your business, including:
  • How you can use social networking to track your leads
  • The right approach to doing business online
  • What cloud computing is and how it relates to CRM
  • Social CRM for small businesses
  • How you can maximize sales using the Internet and social networks


    Social Networks & CRM
    Social Networks & CRM

    Customers are key to businesses' success. Customer relationship management (CRM) systems offer businesses a way to keep current customers satisfied, as well as a way of finding new customers. Social networking can play a huge role in both these endeavors.
    Many companies incorporate CRM systems in order to manage and organize all the contact it has with both existing and prospective customers, through software or Web-based approach that supports these ventures. For example, customer data and interactions can be entered, stored, and accessed by personnel based on several categories. The data then can be used to encourage better customer service with comprehensive information, and to improve targeted marketing. Social networking offers yet another channel to accomplish both of these goals.
    Social Media & Business
    Social Media & Business

    Social media has revolutionized the way people communicate. At the onset of the social media craze, it was usually thought that only young people and those who knew their way around a computer could use these tools. However, businesses and individuals of all kinds have jumped on the social media bandwagon to find new and innovative ways to use these tools.
    For businesses, social media presents a whole new way of connecting and building relationships with customers. From a Facebook wall post to a friendly Twitter reply, you can now create personalized conversations with individual customers over the Internet. 
    Sales & CRM
    Sales & CRM
    Do you treat your customers as your top priority? If not, you should! Customer relationships are reliant on sales management and the forecasting of sales by representatives who derive their client knowledge from experience and what is provided to them. Sales management is a means by which all sales are tracked and organized in a variety of ways. Sales management is there to ensure that sales force goals are achieved by individual sales personnel and the sales team, as a whole.
    Customer Support Software
    Customer Support Software
    Companies today are incorporating customer relationship management (CRM) programs that place the emphasis on satisfying customers and finding new clients. In order to keep existing customers happy, companies must find ways to be innovative in connecting with them. Businesses are finding ways to utilize social media to reach customers in effective and convenient ways.
    Social networking allows customers to be an interactive part of the business process. Though social media customers can share suggestions, ideas, ask questions, inquire about other products, and communicate about countless other topics. 
    The Cloud Computing Revolution
    The Cloud Computing Revolution
    Cloud computing is one of those buzzwords that everyone seems to be bandying about these days, but no one seems to agree on a definition. If you have been hearing about cloud-based this and cloud computing that, and are wondering how these concepts might apply to your business, pull up a chair. We have got some good, solid answers for you.
    At its most basic, cloud computing is a network-based model for supercomputing over the Internet, instead of using on-premises software, hardware and servers. In fact, you are probably already using consumer cloud computing applications. If you have ever uploaded a video to YouTube, or photographs to Flickr or Snapfish for your friends and relatives to view; if you have ever opened a Web-based email account through Yahoo!, Gmail or Hotmail; or if you are a member of a social networking site such as Facebook or Twitter, then you have used cloud computing.

    Enterprise cloud computing takes the concept to a corporate level. With cloud-based business applications, a company can access information technology resources from a shared data center. The cloud aims to provide tens of trillions of computations per second – compared to the most powerful desktop PCs, which process only a few billion computations per second – by networking large groups of servers that often use low-cost consumer technology and utilizing specialized connections to enable them to complete the large-scale data-processing chores.
    Cloud computing is billed either on a utility model, like electricity, or on a subscription model, whereby the company pays a monthly fee. Either way, the company pays for only the resources it uses. 
    It is important to understand that cloud computing is still a developing paradigm, just as the Internet itself was ten years ago and continues to be today. As consumer tastes and trends change, and workforces evolve, cloud computing will adapt in response. Yet, it is already clear that cloud computing is no flash in the pan, but a technological concept worth learning more about.

    Thursday, June 9, 2011

    Running IT as a business

    Seven steps to aligning IT with the business

    The massive growth in IT over the past decade has moved it from being a backoffice support function to a critical business unit. IT now ranks among the top five expenditures of most companies.CIOs have to show how the money is spent, the returns they are getting for their investments, and how IT is driving corporate performance. This increased role requires focus, vision and, above all, transparency – into services, costs, demand, processes and impact on corporate performance.

    The benefits of aligning IT with the business
    Improve management control.
    Understand and communicate the financial and non-financial value of each IT project and operation.
    Comply with legislative requirements.
    Reallocate IT resources to projects of most importance to the business.
    Facilitate the elimination of IT projects that are not delivering.

    Cost management and transparency
    For the CIO to compete for resources, the IT function needs to operate as a business within a business – providing valuable services to the rest of the organization. The CIO must effectively educate the organization and provide clearly articulated and relevant cost information.

    A detailed understanding of the cost within the IT business provides clear and positive advantages to the CIO and the wider organization:
    Ensuring optimal resource allocation to areas of greatest value.
    More effective allocation of resources to “areas of need.”
    Reducing complexity within IT and simplifying internal processes.
    More informed budgeting (capital and operating) and pricing of new projects.
    Greater understanding of IT capacity and ability for delivery.
    Ability to link IT investments to overall organizational benefits.
    Facilitating practices and tools such as total cost of ownership (TCO) and  return on investment (ROI).
    The importance of chargeback

    It is difficult to maximize returns from IT when the product appears to be free to customers. Ideally, IT operates as a service provider with a catalog of products and services that are aligned with customer needs and corporate goals. For this, IT needs:
    Accurate pricing for its services that reflects the cost to provide them.
    An understanding of what drives both demand and cost.
    An equitable, repeatable and accurate method to track and invoice customers based on their usage of
    the services.
    To encourage end-user accountability for the return on investments.Cost control is the greatest benefit that comes from IT chargeback.Chargeback gives clear transparency into the benefits and the value that IT brings, and the impact on the bottom line means better relationships with the rest of the organization.

    Budgeting and planning
    IT financial management processes are often resource-intensive, involving the manual collection of financial data that is scattered across the enterprise. With a lack of data to support accurate forecasts, the resulting budget is often based on political biases.This reduces the time and effort involved while increasing the accuracy of forecasts and simulations, and forms the basis for the financial budget, aligning organizational objectives, requirements, volume and cost.

    Resource optimization
    To maximize returns from new and existing infrastructure, IT needs a consolidated, end-to-end view of use of its applications and infrastructure, both physical and virtual, to understand  how all IT components interact. IT organizations have made substantial cost savings through re-purposing underused infrastructure and combining server workloads.

    Summary
    Managing IT as a business is now an imperative. No longer can IT be seen as a technology supplier – it must be seen to be adding value to the organization and providing corporate strategic capability. IT business performance allows IT to change the focus from technology and production to customers and services. It enables IT to become service-oriented, aligning itself with the organization to provide customer-driven solutions to business problems







    Monday, May 30, 2011

    Unruly USB: Devices Expose Networks to Malware


    The news today is chock full of stories about sensitive information being carried out the institutional perimeter on ‘simple’ USB devices. These powerful portable drives rightfully worry IT as a means for devastating data loss at the hands of malicious insiders. But it’s pretty easy for organizations to get so wrapped up about what goes out on USB drives that they forget to protect against what comes in their environments via 
    USB.And with attacks inflicting increasingly greater damage following uncontrolled connection, it’s time that organizations got serious about this threat.Recently the US Army admitted that an infected USB stick was responsible for causing one of the biggest cybersecurity breaches in military history.

    In order to keep organizations secure from threats, IT departments must bring greater scrutiny and control over how the network is exposed to potentially infected portable payloads.  But let’s get real: they can’t do so by gluing USB ports shut. Portable devices as business tools are here to stay. IT leaders who refuse to recognize that fact will be seen throughout their organizations as inhibitors to success. The key to USB 
    security is balancing productivity with protection. 
    It’s Not Just USB

    While we’ve focused much of our attention on the ubiquitous USB flash drive, organizations need to 
    think about threats that extend from all forms of removable media in use today. These include:
    » CD drives
    » DVD drives
    » Blu-ray drives 
    » FireWire 
    » eSATA connected devices
    » Consumer products such as picture frames

    Evolution of USB as an Attack Vector

    The more users depend on USB and portable devices to store and move data, the more tantalizing a target these devices become for hackers looking for an easy way to infect a large number of machines. And as the USB format becomes more complex with a greater number of features to exploit, the bad guys are finding increasingly creative ways to use USB against their victims.
    USB Security Best Practices

    So what exactly does it take to change our trust models? It starts with smart policy development. 
    Some key policies that organizations should consider to reduce their risks right off the bat include:
    » Ensuring common PC and laptop configurations have AutoRun features disabled, limiting the efficacy of USB malware that depends on this feature to run and to propagate.
    » Requiring timely installation of security updates 
    In order to minimize the risk of USB-borne malware taking advantage of unpatched endpoint vulnerabilities.
    » Limiting access of USB and portable devices to registered devices only, enabling better control over who, when and how devices are being utilized.
    » Preventing the initiation of some or all executables from portable devices, blocking malware from running in the first place.
    » Requiring strong passwords (and not allowing the use of default passwords) throughout your infrastructure to prevent worms such as Stuxnet from working their way further into systems.
    » Requiring proper, up-to-date AV and firewall usage to prevent malware from gaining a foothold within the endpoint and spreading to other systems in the network.
    Enforcement: Putting Teeth in Policies

    By enforcing usage policies for removable devices such as USB flash drives and other removable media such as CDs / DVDs, you can control the flow of inbound and outbound data from your endpoints. 
    Devices that are not authorized should simply not be allowed to execute. Ideally, organizations should look for tools and develop processes that enable them to quickly establish and enforce device control policies as simply and as methodically as possible. Policies should be manageable by user or user group as well as by computer, and organizations should look for capabilities that enable user groups to be immediately associated with devices “on-the-fly.” The goal is to dramatically simplify the management of endpoint device resources through improved tracking of who, when and how devices are being used. By validating removable devices as they are used within the enterprise, you can prevent malware from being introduced into the network. This includes assigning permissions for authorized removable devices and media to individual users or user groups and controlling the uploading of unknown or unwanted files from removable devices.
    By developing policies and implementing solutions that enable a more flexible but easily trackable 
    environment, IT departments become partners in security and business success rather than technology mall 


    cops to be disregarded at all costs. Enterprises with such forward-looking technology decision-makers will 
    gain a decisive productivity advantage while protecting their organizational endpoints.






    Tuesday, May 17, 2011

    Customer Service Management


    The explosion of social media has changed the business-to-consumer landscape. A couple of points will elucidate this fact. 34% bloggers post opinions on brands and products on their blogs and 78% consumers believe them. It’s a fact that Facebook knows more about your customers than you do.
    So, what are you doing about it? If customers are talking about your brand on social networks, shouldn’t you be listening to them carefully?

    Customer support management in the new age is all about being proactive and creating cases for quick resolve. There are four clear steps for proactive online social customer support.


    1. Keep an ear to the ground and listen to what they say and wherever they say.
    2. Address customer’s problems using data captured and collected through various sources and analyze it using data analytics technique. Salesforce.com CRM provides resources like dashboards and real time service reports which provide these insights.
    3. Relate if the problem is regarding the product, service or end user support.
    4. Act, if possibly, real time and through the social networking medium of the customer’s preference.

    Benefits

    • Track customer satisfaction in real time in order to address problems immediately and enable better customer retention
    • Provide support teams anytime, anywhere access to customer information—ideal for remote support employees
    • Link sales, service and fulfillment organizations to drive more revenue
    • Accelerate case resolution times by providing support reps with complete customer visibility
    • Increase response accuracy and reduce response times with an integrated knowledge base
    • Use case escalation rules to ensure that your most valued customers always receive the proper levels of support

      Key Features

      • Case Management

        • Cut costs and improve workflow by automating the business processes associated with customer support case assignment, management and escalation
        • Route cases intelligently, enabling fast, efficient prioritization
        • Respond to customer cases across a variety of mediums, including e-mail, phone and fax
        • Log and analyze e-mail communications in order to better serve current and future customers
        • Route and track support cases according to product, issue, case type, partner or customer, giving customers a specialist in each area to address their concerns
        • Enable online case creation and self-service case updates.
      • Knowledge Base Software

        • Build an effective online knowledge base to help customers get the answers they need, when they need them
        • Give customers and partners 24/7 access to customer service at a much lower cost than staffing your phone lines around the clock
        • Organize and publish information into different types and levels of topics and solutions
        • Give service reps access to a complete knowledge base, enabling them to respond faster to customer issues and reducing the learning curve when bringing on new reps.
      • Customer Portal

        • Give customers real-time access to such data as order status, order status tracking and return authorizations
        • Drive more return visits and greater customer loyalty
        • Give customers the ability to enter trouble tickets online 
        • Customize content to create a true one-to-one marketing platform, letting you publish information to specific prospects, customers or entire groups.
      • Time Tracking

        • Automate and streamline the time tracking process, consolidating it quickly for reporting and billing
        • Keep accurate customer records by managing time within your CRM system rather than in separate systems
        • Get complete visibility into how your service and support teams are apportioning their time
        • Track time more accurately and use real-time metrics to improve time management practices.

    E-Learning- Is it a substitute?


    With the rapid pace of technological advancements, the field of education also could not remain untouched and unaffected. The technology had cast a revolutionary impact on the way education could be imparted and also made available to the millions of students across the globe.
    E learning is considered the next big revolution and IT holds a big promise in the way education can be made available to a large number people, thereby overcoming the barriers of language, nationality, distance and time.

    With better study material, better teaching techniques, efficient and cost effective means of imparting education, e learning is fast catching pace. More and more nations are investing in technology to significantly increase the rate of Literacy and provide more avenues to people to enhance the knowledge base and skill sets. IT companies are investing in softwares and more and more focus is given to make people competent to learn the basics of computers and harness the benefits of IT.

    E learning no doubt has been fast catching pace with growing sections of society but my opinion is that the real time class room education can never be substituted with e learning. The one to one interaction with the teacher and interactive class room sessions with peers, go way beyond in influencing the over all growth and development of an individual. The chanellizing of ideas and direction given by a teacher is incomparable to any IT solution that can be provided. Even in the words of Henry Brooks Adams- A teacher affects eternity; he can never tell, where his influence stops.The type of atmosphere that is provided by the regular teaching and the exchange of ideas and inculcation of values and team work that happen, go way beyond in shaping the personality and intellect of a person.

    In my opinion e learning can be a supplement to teaching and to an extent, a necessity for the ones for whom education is a distant dream, but it can never be a substitute for regular education. Some argue that present day teaching is below standards and class room sessions are boring, but this does not effectively substantiate the argument in favor of IT learning.Even today the very first option should always be regular class room teaching and efforts should be made to improve the standards of teaching.

    Tuesday, May 3, 2011

    Desktop virtualization

    Desktop virtualization (sometimes called client virtualization), as a concept, separates a personal computer desktop environment from a physical machine using a client–server model of computing. The model stores the resulting "virtualized" desktop on a remote central server, instead of on the local storage of a remote client; thus, when users work from their remote desktop client, all of the programs, applications, processes, and data used are kept and run centrally. This scenario allows users to access their desktops on any capable device, such as a traditional personal computer, notebook computer, smart phone, or thin client. In simple terms, virtual machines are running on the server (for each client) and clients can connect to their "computers" using remote desktop software.
    Virtual desktop infrastructure sometimes referred to as virtual desktop interface. (VDI) is the server computing model enabling desktop virtualization, encompassing the hardware and software systems required to support the virtualized environment.

    VDI
    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. VDI is a variation on the client/server computing model, sometimes referred to as server-based computing (SBC). The term was coined by VMware Inc.

    Advantages and disadvantages
    The shared resources model inherent in desktop virtualization offers advantages over the traditional model, in which every computer operates as a completely self-contained unit with its own operating system, peripherals, and application programs. Overall hardware expenses may diminish as users can share resources allocated to them on an as-needed basis. Virtualization potentially improves the data integrity of user information because all data can be maintained and backed-up in the data center. Other potential advantages include:
    • simpler provisioning of new desktops
    • reduced downtime in the event of server or client hardware-failures
    • lower cost of deploying new applications
    • desktop image-management capabilities
    • longer refresh cycle for client desktop infrastructure
    • secure remote access to an enterprise desktop environment
    Limitations of desktop virtualization include:
    • potential security risks if the network is not properly managed
    • some loss of user autonomy and privacy
    • challenges in setting up and maintaining drivers for printers and other peripherals
    • difficulty in running certain complex applications (such as multimedia)
    • increased downtime in the event of network failures, which can be prevented by the use of a clustered file system
    • reliance on connectivity to corporate or public network
    • complexity and high costs of VDI deployment and management

    Monday, May 2, 2011

    Emerging Tech



    Thumbnail image for Intel-Announced-the-Availability-of-Thunderbolt-technology-a-new-high-speed-PC-connection-technology-that-runs-at-10Gbps_.jpgIntel may have just released the first generation Thunderbolt this spring, but Intel is already planning it for long term. Intel is already working on the Thunderbolt's successor, even before the original really takes off. Here is what the director of Intel Research labs had to say:

    We see them as complementary. It's the evolution of these connectors and protocols as they move forward. 

[Besides], Thunderbolt is more than a cable. It's a router chip that aggregates DisplayPort and PCI-Express.
    No reason was given for the upgrades being developed so early on. Somecompanies outside of Apple have shown interest, but by no means have we seen anything big for it yet. Intel appears to be living more in a dream than a reality.
    Via TG Daily
    Pepsi - Social Vending Machine
    You're out at a concert and you're about to buy a drink from a vending machine. You think about your friend who couldn't make it, and want to send them a quick text to let them know you're thinking of them and wish they were there. 

    With Pepsi's new social vending machines, you can not only send them a message, but you can buy them a drink at the same time. 

    Pepsi's new machines come with a fancy touch-screen UI that makes selecting a frosty beverage a more technical experience than perhaps it needs to be, but also include a social component that will take your friend's name and cell phone number and send them a text message with a code they can redeem for a free drink. 

    The code has to be redeemed at one of the new social machines. If you want, you can also give a random customer a gift at the vending machine through what Pepsi calls a "random act of refreshment," meaning someone will walk up, select their drink, try to pay, and be told that they're getting their drink for free. You can even record a quick video message to include with your free drink so the recipient knows who just made their day. 

    Pepsi has no plans for a rollout of the new machines; the current model is just a prototype. Still, it'll be on display at the National Automatic Merchandising Association Show in Chicago at the end of the month for everyone to see. Check out a video of the machine behind the jump.



    3dairlines.jpg

    Perhaps one day watching movies on an airline won't be a completely disappointing experience. A company called MasterImage 3D is leading the charge to bring 3D displays to airlines around the world.

    MasterImage also wants glasses-free 3D technology to come to in-car entertainment systems. In other words, it will become a ubiquitous medium for when you don't really want to watch TV but have nothing better to do because you're stuck in a vehicle of some sort.

    "We weren't looking at (airlines and car makers) initially. We were focusing on smartphones and tablets, but there turned out to be strong interest," said company VP Roy Taylor.
    dark-money.jpg

    A Florida judge has ruled in favor of plaintiff Melanie Beacham in a harassment lawsuit against debt collector MarkOne Financial. In it, Beacham says she received 23 phone calls per day about a debt she owed, and then at one point MarkOne was able to track her down on Facebook. Representatives then not only sent online messages to her but also to everyone on her friend list.

    In a preliminary ruling, the judge declared MarkOne is barred from contacting Beacham or any of her friends on any social networking site.

    The legal order is the first of its kind, and a big victory for Beacham's lawyer Bill Howard. Howard, who focuses on consumer protection cases at firm Morgan & Morgan, said a ruling against using social networking to harass debt owners is "something we've been fighting for, and we finally got a court ruling on that."

    Beacham's case remains ongoing, but some could say she already scored a victory

    5 Things you need to know about videoconferencing


    1. Your office is now optional. A recent study from Infonetics Research projects that enterprises will spend $5 billion on videoconferencing and telepresence by 2015. To accommodate the need for instant connectivity and information sharing at the office, CIOs need to coordinate IT investments with physical space. Vendors like Polycom and Steelcase are teaming up to integrate audio, video and file sharing using multiple ports and display screens at office meeting tables. KKR, a private equity firm, has been using HD videoconferencing for four years among its 14 global offices. "We prefer to do a video call because it adds another layer of interaction," says CIO Ed Brandman. "You have everyone's undivided attention."
    2. One window shows all your applications. Companies are using unified communications (UC) platforms like Microsoft Lync and Avaya Flare as videoconferencing catchalls. These platforms consolidate all the windows workers have on their computer screens at any time, including videoconferences. They also integrate social media, so employees can video chat with anyone from their social networks. The trade-off, experts say, is that users must abandon preferred chat clients and adapt to using UC for everything.
    3. You can access video on the go. FaceTime on the iPhone 4 offers only one-on-one chat, and you may have to sacrifice quality with other free options, like Tango. Skype Mobile, which works with Wi-Fi and 3G, can handle multiple parties at once, but the connection can be unreliable and not all smartphones support video calls. Until more sophisticated networks are introduced, such services are best suited for informal calls.
    4. Free options offer limited quality. Free solutions like Skype and Google are not always suitable for the enterprise-you don't want to be fussing with the connection at an important board meeting. Many chat clients have video options, so for one-on-one conversations, free video chat may work fine. But a recent Forrester report by analyst TJ Keitt says 72 percent of workers still don't want desktop videoconferencing, adding that companies need a clear idea of what they will use video for: "Businesses distribute it with no sense of how it should be used."
    5. Live feeds are the next frontier. Live streaming can be a helpful tool for sharing events with people who can't attend or who want to watch them later. Applications such as Video Center from LifeSize or free downloads like Ustream let users upload a videoconference so they can watch it anywhere. The United Kingdom's National Health Service is planning to use a live-feed video application to broadcast surgeries to new doctors.