Salesforce.com was founded in March 1999 by former Oracle executive Marc Benioff, Parker Harris, Dave Moellenhoff, and Frank Dominguez as a company specializing in software as a service (SaaS).
Salesforce.com is headquartered in San Francisco, California.
Products and Services
Customer Relationship Management
Salesforce.com's CRM solution is broken down into several broad categories: Sales Cloud[28], Service Cloud[29], Data Cloud[30](including Jigsaw), Collaboration Cloud[31] (including Chatter) and Custom Cloud (including Force.com).
The Sales Cloud
This application runs in the cloud, so the user can access it anywhere through an Internet-enabled mobile device or a connected computer. The Sales Cloud includes a real-time sales collaborative tool called Chatter, provides sales representatives with a complete customer profile and account history, allows the user to manage marketing campaign spending and performance across a variety of channels from a single application, tracks all opportunity-related data including milestones, decision makers, customer communications, and any other information unique to the company's sales process. Automatic email reminders can be scheduled to keep teams up to date on the latest information.
Other activities can be done on the Salesforce cloud. These include using the Jigsaw business data to access over 20 million complete and current business contacts from right inside Salesforce CRM, and designing and automating any process in Salesforce CRM.
Outlook Integration
Salesforce.com provides an integration component for Microsoft Outlook called Salesforce for Outlook supporting Outlook 2007 (32-bit), Outlook 2010 (32-bit), Windows XP (32-bit), Windows Vista (32-bit) and Windows 7 (32-bit and 64-bit).[32] The Salesforce release notes, however, suggest that only Windows 7 32-bit is supported as of v1.2.148.[33]
Salesforce for Outlook replaces the older Outlook Connector. Unlike previous versions of Outlook Connector which run as Outlook add-ins the new software also has a system tray configuration component. Email support is still available with the Outlook Connector but no longer in all editions when using Salesforce for Outlook and Microsoft Office 2010.
The Service Cloud
The Service Cloud provides companies with a call center-like view that enables companies to create and track cases coming in from every channel, and automatically route and escalate what’s important. The Salesforce CRM-powered customer portal provides customers the ability to track their own cases 24 hours a day, includes a social networking plugin that enables the user to join the conversation about their company on social networking websites, provides analytical tools and other services including email services, chatting tools, Google search, and access to customers' entitlement and contracts.
Force.com platform
Salesforce.com's Platform-as-a-Service product is known as the Force.com Platform. The platform allows external developers to create add-on applications that integrate into the main salesforce.com application and are hosted on salesforce.com's infrastructure.
These applications are built using Apex (a proprietary Java-like programming language for the Force.com Platform) and Visualforce (an XML-like syntax for building user interfaces in HTML, AJAX or Flex).
Chatter
Chatter, released in June 2010,[37] is a real-time collaboration platform that brings together people and data in a secure, private social environment. It was designed to be the "Facebook for the enterprise." Rather than making people search for the data and documents they need to do their job, information is proactively fed to them via a real-time news stream. Users can follow coworkers and important data to receive broadcasted updates about, for example, the status of an important sale or what a coworker is working on. Additionally, users can form groups and post messages on each others' profiles to collaborate on projects.
AppExchange
Launched in 2005, AppExchange is a marketplace for cloud computing applications built for the salesforce.com community and delivered by partners or by third-party developers, which users can purchase and add to their salesforce.com environment. As of October 2010, there are over 900 applications available from over 450 independent software vendors.All salesforce.com partners can distribute applications and solutions on the AppExchange. Applications created on the Force.com platform are installed by salesforce.com customers.
Customization
Salesforce users can customize their CRM application. In the system, there are tabs such as "Contacts", "Reports", and "Accounts". Each tab contains associated information. For example, "Contacts" has standard fields like First Name, Last Name, and Email. Customization can be done on each tab, by adding user-defined custom fields.
Customization can also be done at the "platform" level by adding customized applications to a Salesforce instance, that is adding sets of customized / novel tabs for specific vertical- or function-level (Finance, Human Resources, etc.) features.
Web services
In addition to the web interface, salesforce.com offers a SOAP Web service API that enables integration with other systems.
Mobile support
In April 2009, salesforce.com released a slimmed down version of their application for subscribers with BlackBerry, iPhone, and Windows Mobile devices.In January 2010, salesforce.com started to promote the use of 2D Barcodes (SPARQCode) for exporting contact information to mobile handsets.
Languages
The Salesforce application, along with online help and training documentation, are available in sixteen languages: English, Dutch, Spanish, German, French, Finnish, Swedish, Japanese, Italian, Portuguese, Korean, Russian, Thai, Danish, Simplified Chinese and Traditional Chinese.
Also, end user languages available are Hungarian, Czech, Turkish, Polish, Lithuanian, Latvian and Estonian.
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions
Thursday, February 24, 2011
Tuesday, February 22, 2011
Windows 7 Service Pack 1 Available Today to the Common Man
Microsoft Announces Windows Kinect SDK For Spring Release.
Microsoft released a new version of the Bing Bar for IE7, IE8, and IE9 that includes Facebook integration.
Google hit with new antitrust complaint in Europe.
IBM Rochester Making Super Computer.
Wipro Technologies inaugurated a new office in Mississauga,as part of an expansion plan for its Canadian operations.
IT biggies set sight on mobile apps business.
Microsoft Announces Windows Kinect SDK For Spring Release.
Microsoft released a new version of the Bing Bar for IE7, IE8, and IE9 that includes Facebook integration.
Google hit with new antitrust complaint in Europe.
IBM Rochester Making Super Computer.
Wipro Technologies inaugurated a new office in Mississauga,as part of an expansion plan for its Canadian operations.
IT biggies set sight on mobile apps business.
Thursday, February 17, 2011
The Best Strategies for Consulting
Businesses pay consultants for providing advice, knowledge and expertise. Business consultants offer a wide range of services but, in general, they focus on helping clients increase their revenues, decrease operating costs and run their businesses more efficiently. To succeed as a consultant, you must think strategically -- identify which customer prospects especially need your services and find ways of reaching them.
Find a Niche
•Identify a problem that you can solve for your clients, or a need they have that you can address. You should base the services you provide on your own business background and experience. The need should be strong enough, or the problem significant enough, that prospective clients will be willing to pay you to provide a solution. Clients look to solve their most pressing business problems first. Understand what these problems are and create a package of services to solve them.
Differentiate Your Services
•Part of your sales pitch to clients is to show what you do better than other consulting firms do in your niche. Don't try to compete based on providing lower prices for your services. Offer more services or higher service quality. A technology-consulting firm could emphasize its availability to repair or install systems on nights or weekends; such availability might better fit the client's schedule. Personality plays a role in the client's hiring decision. Express empathy for the client's concerns and aspirations. Show you care whether they succeed and reach their business objectives.
Market Through Other Professionals
•One of the best ways to obtain new clients is through referrals from other professionals that work with your target clients but provide services that do not compete with yours. Develop relationships with these firms when you start your consulting practice. You may be able to refer clients to them as well, so the relationship is mutually beneficial. A referral from someone the client already trusts gives your firm and its services immediate credibility.
Sell Products
•A limitation to the earning potential of consultants is they have a fixed number of hours for which they can work and bill their clients. A solution is to develop additional revenue streams, such as recommending products to clients. The consultant purchases the product from the manufacturer, marks it up and resells it to the client. Technology consultants who install computer or communications systems frequently do this, but other types of consultants can take advantage of this revenue stream as well, recommending such products as software packages to their clients. They can also develop their own products -- books, seminars in CD form or advisory newsletters for which they charge subscription fees.
Take Advantage of Technology
•The Internet has given independent consultants the opportunity to market their services globally. Clients use Internet searches to find service providers. With a professional looking website that projects an image of competence and shows why clients should hire you, it is possible to be in the enviable position of your customers finding you rather than you having to look for them. By using search engine optimization strategies, you can improve your firm's chances of appearing high on the list of service providers when your clients are searching. Video conferencing technology allows you to offer services with a personal touch without having to travel, saving time and money. Some clients prefer to be able to see their service provider rather than conducting business on the phone or by email.
Find a Niche
•Identify a problem that you can solve for your clients, or a need they have that you can address. You should base the services you provide on your own business background and experience. The need should be strong enough, or the problem significant enough, that prospective clients will be willing to pay you to provide a solution. Clients look to solve their most pressing business problems first. Understand what these problems are and create a package of services to solve them.
Differentiate Your Services
•Part of your sales pitch to clients is to show what you do better than other consulting firms do in your niche. Don't try to compete based on providing lower prices for your services. Offer more services or higher service quality. A technology-consulting firm could emphasize its availability to repair or install systems on nights or weekends; such availability might better fit the client's schedule. Personality plays a role in the client's hiring decision. Express empathy for the client's concerns and aspirations. Show you care whether they succeed and reach their business objectives.
Market Through Other Professionals
•One of the best ways to obtain new clients is through referrals from other professionals that work with your target clients but provide services that do not compete with yours. Develop relationships with these firms when you start your consulting practice. You may be able to refer clients to them as well, so the relationship is mutually beneficial. A referral from someone the client already trusts gives your firm and its services immediate credibility.
Sell Products
•A limitation to the earning potential of consultants is they have a fixed number of hours for which they can work and bill their clients. A solution is to develop additional revenue streams, such as recommending products to clients. The consultant purchases the product from the manufacturer, marks it up and resells it to the client. Technology consultants who install computer or communications systems frequently do this, but other types of consultants can take advantage of this revenue stream as well, recommending such products as software packages to their clients. They can also develop their own products -- books, seminars in CD form or advisory newsletters for which they charge subscription fees.
Take Advantage of Technology
•The Internet has given independent consultants the opportunity to market their services globally. Clients use Internet searches to find service providers. With a professional looking website that projects an image of competence and shows why clients should hire you, it is possible to be in the enviable position of your customers finding you rather than you having to look for them. By using search engine optimization strategies, you can improve your firm's chances of appearing high on the list of service providers when your clients are searching. Video conferencing technology allows you to offer services with a personal touch without having to travel, saving time and money. Some clients prefer to be able to see their service provider rather than conducting business on the phone or by email.
Wednesday, February 16, 2011
Android
Android commonly refers to: Operating system
Android 2.3 Platform Highlights:
UI refinements for simplicity and speed
The user interface is refined in many ways across the system, making it easier to learn, faster to use, and more power-efficient. A simplified visual theme of colors against black brings vividness and contrast to the notification bar, menus, and other parts of the UI. Changes in menus and settings make it easier for the user to navigate and control the features of the system and device.
Faster, more intuitive text input
The Android soft keyboard is redesigned and optimized for faster text input and editing. The keys themselves are reshaped and repositioned for improved targeting, making them easier to see and press accurately, even at high speeds. The keyboard also displays the current character and dictionary suggestions in a larger, more vivid style that is easier to read.
The keyboard adds the capability to correct entered words from suggestions in the dictionary. As the user selects a word already entered, the keyboard displays suggestions that the user can choose from, to replace the selection. The user can also switch to voice input mode to replace the selection. Smart suggestions let the user accept a suggestion and then return to correct it later, if needed, from the original set of suggestions.
New multitouch key-chording lets the user quickly enter numbers and symbols by pressing Shift+ and ?123+, without needing to manually switch input modes. From certain keys, users can also access a popup menu of accented characters, numbers, and symbols by holding the key and sliding to select a character.
One-touch word selection and copy/paste
When entering text or viewing a web page, the user can quickly select a word by press-hold, then copy to the clipboard and paste. Pressing on a word enters a free-selection mode — the user can adjust the selection area as needed by dragging a set of bounding arrows to new positions, then copy the bounded area by pressing anywhere in the selection area. For text entry, the user can slide-press to enter a cursor mode, then reposition the cursor easily and accurately by dragging the cursor arrow. With both the selection and cursor modes, no use of a trackball is needed.
Improved power management
The Android system takes a more active role in managing apps that are keeping the device awake for too long or that are consuming CPU while running in the background. By managing such apps — closing them if appropriate — the system helps ensure best possible performance and maximum battery life.
The system also gives the user more visibility over the power being consumed by system components and running apps. The Application settings provides an accurate overview of how the battery is being used, with details of the usage and relative power consumed by each component or application.
Control over applications
A shortcut to the Manage Applications control now appears in the Options Menu in the Home screen and Launcher, making it much easier to check and manage application activity. Once the user enters Manage Applications, a new Running tab displays a list of active applications and the storage and memory being used by each. The user can read further details about each application and if necessary stop an application or report feedback to its developer.
New ways of communicating, organizing
An updated set of standard applications lets the user take new approaches to managing information and relationships.
Internet calling
The user can make voice calls over the internet to other users who have SIP accounts. The user can add an internet calling number (a SIP address) to any Contact and can initiate a call from Quick Contact or Dialer. To use internet calling, the user must create an account at the SIP provider of their choice — SIP accounts are not provided as part of the internet calling feature. Additionally, support for the platform's SIP and internet calling features on specific devices is determined by their manufacturers and associated carriers
Near-field communications
An NFC Reader application lets the user read and interact with near-field communication (NFC) tags. For example, the user can “touch” or “swipe” an NFC tag that might be embedded in a poster, sticker, or advertisement, then act on the data read from the tag. A typical use would be to read a tag at a restaurant, store, or event and then rate or register by jumping to a web site whose URL is included in the tag data. NFC communication relies on wireless technology in the device hardware, so support for the platform's NFC features on specific devices is determined by their manufacturers.
Downloads management
The Downloads application gives the user easy access to any file downloaded from the browser, email, or another application. Downloads is built on an completely new download manager facility in the system that any other applications can use, to more easily manage and store their downloads.
Camera
The application now lets the user access multiple cameras on the device, including a front-facing camera, if available.
Android 2.3 Platform Highlights:
UI refinements for simplicity and speed
The user interface is refined in many ways across the system, making it easier to learn, faster to use, and more power-efficient. A simplified visual theme of colors against black brings vividness and contrast to the notification bar, menus, and other parts of the UI. Changes in menus and settings make it easier for the user to navigate and control the features of the system and device.
Faster, more intuitive text input
The Android soft keyboard is redesigned and optimized for faster text input and editing. The keys themselves are reshaped and repositioned for improved targeting, making them easier to see and press accurately, even at high speeds. The keyboard also displays the current character and dictionary suggestions in a larger, more vivid style that is easier to read.
The keyboard adds the capability to correct entered words from suggestions in the dictionary. As the user selects a word already entered, the keyboard displays suggestions that the user can choose from, to replace the selection. The user can also switch to voice input mode to replace the selection. Smart suggestions let the user accept a suggestion and then return to correct it later, if needed, from the original set of suggestions.
New multitouch key-chording lets the user quickly enter numbers and symbols by pressing Shift+
One-touch word selection and copy/paste
When entering text or viewing a web page, the user can quickly select a word by press-hold, then copy to the clipboard and paste. Pressing on a word enters a free-selection mode — the user can adjust the selection area as needed by dragging a set of bounding arrows to new positions, then copy the bounded area by pressing anywhere in the selection area. For text entry, the user can slide-press to enter a cursor mode, then reposition the cursor easily and accurately by dragging the cursor arrow. With both the selection and cursor modes, no use of a trackball is needed.
Improved power management
The Android system takes a more active role in managing apps that are keeping the device awake for too long or that are consuming CPU while running in the background. By managing such apps — closing them if appropriate — the system helps ensure best possible performance and maximum battery life.
The system also gives the user more visibility over the power being consumed by system components and running apps. The Application settings provides an accurate overview of how the battery is being used, with details of the usage and relative power consumed by each component or application.
Control over applications
A shortcut to the Manage Applications control now appears in the Options Menu in the Home screen and Launcher, making it much easier to check and manage application activity. Once the user enters Manage Applications, a new Running tab displays a list of active applications and the storage and memory being used by each. The user can read further details about each application and if necessary stop an application or report feedback to its developer.
New ways of communicating, organizing
An updated set of standard applications lets the user take new approaches to managing information and relationships.
Internet calling
The user can make voice calls over the internet to other users who have SIP accounts. The user can add an internet calling number (a SIP address) to any Contact and can initiate a call from Quick Contact or Dialer. To use internet calling, the user must create an account at the SIP provider of their choice — SIP accounts are not provided as part of the internet calling feature. Additionally, support for the platform's SIP and internet calling features on specific devices is determined by their manufacturers and associated carriers
Near-field communications
An NFC Reader application lets the user read and interact with near-field communication (NFC) tags. For example, the user can “touch” or “swipe” an NFC tag that might be embedded in a poster, sticker, or advertisement, then act on the data read from the tag. A typical use would be to read a tag at a restaurant, store, or event and then rate or register by jumping to a web site whose URL is included in the tag data. NFC communication relies on wireless technology in the device hardware, so support for the platform's NFC features on specific devices is determined by their manufacturers.
Downloads management
The Downloads application gives the user easy access to any file downloaded from the browser, email, or another application. Downloads is built on an completely new download manager facility in the system that any other applications can use, to more easily manage and store their downloads.
Camera
The application now lets the user access multiple cameras on the device, including a front-facing camera, if available.
Google Woos Publishers With Payment Service
Google Inc. unveiled a new payment system for online paid content that will give newspaper and magazine publishers a significantly larger share of revenues than a rival service offered by Apple Inc.
Under the new service, called Google One Pass, Google will keep 10% of revenues, compared to the 30% cut demanded by Apple for subscriptions sold through its online store. Google's service will also give publishers control of consumer data, something Apple has refused to do.
Subscribers to the new service, called Google One Pass, can access content on any participating website with one username and login. The system can be used to view individual articles, for full subscriptions and other payment plans.
Google's announcement, which comes just a day after Apple presented its own subscription service, reflects the intensifying competition between the two Silicon Valley giants in the booming market for smartphones, tablet PCs and other portable computers.
Apple has dominated the high-end of the market through with its iPad and iPhone, but competing devices that operate on Google's Android operating system are making inroads.
Under the new service, called Google One Pass, Google will keep 10% of revenues, compared to the 30% cut demanded by Apple for subscriptions sold through its online store. Google's service will also give publishers control of consumer data, something Apple has refused to do.
Subscribers to the new service, called Google One Pass, can access content on any participating website with one username and login. The system can be used to view individual articles, for full subscriptions and other payment plans.
Google's announcement, which comes just a day after Apple presented its own subscription service, reflects the intensifying competition between the two Silicon Valley giants in the booming market for smartphones, tablet PCs and other portable computers.
Apple has dominated the high-end of the market through with its iPad and iPhone, but competing devices that operate on Google's Android operating system are making inroads.
What to expect in cloud-based communications in 2020
In one broad scenario,wireless users could store all kinds of data about their lives in the cloud and authorize various algorithms and computing systems to analyze it for later use to communicate and, for example, remind them of names, addresses, arcane facts and other important and not-so-important tidbits.
And if the cloud is capable of that, it's possible that we don't need the personalized mobile phones and tablets that we use today.
Someone could drive to dinner at a friend's house and use a wireless device, perhaps over a TV, to make a call or send a message by entering a password or fingerprint scan. The device would then find all of the caller's personal information in the cloud, including the phone number or e-mail address of whomever was being called.
Even the names of the user's children would be accessible, for example.
Answers to everything will be at our fingertips, and [the information will be] more mobile and more ubiquitous,"
As a result of having such a rich repository of information in the cloud, people will become independent of devices like smartphones and tablets. "Software will converge, and devices will disintegrate, and we'll have fewer devices that belong to us anymore,". "I don't see the need to carry mobile devices to visit you at your house; I'll borrow one you have and authenticate myself on it."
Donovan, AT&T's chief technology officer says,AT&T is already experimenting with the cloud concept in its labs. One study uses information about calling and data usage patterns that carriers have known for years. One well-known pattern is that a preponderance of people call home on Sunday nights.
That kind of pattern analysis will ultimately make communication and access to information more convenient. "If today I always answer calls from home at my work, then the phone will continue to ring there, but if I never answer your calls or e-mails, then I should never hear [or see] them,"."Time of day, day of week, location, business versus personal ... these things are not terribly complex [to analyze]."
Donovan said that AT&T researchers have even used him as a guinea pig. For example, engineers in recent weeks took all of his communications, including calls and e-mails, and uploaded logs from them in order to find patterns, not to study the messages word for word. The lab analysis spit out a list of Donovan's top 30 best friends and ranked from 1 to 30. To his relief, "my wife was at the top," he said.
"They told me, 'Here's who we think your best friends are,'" by analyzing who got the longest calls, the most e-mails, the most texts, and even who got the longest texts from him, among other patterns.
The value of that kind of list is that it would help an automated system populate favorites, much the same way that Netflix suggests movies someone will like, Donovan said. In one example, Donovan said a TV today will turn on to the last channel watched, but it could be set up with a profile for every member of a family to turn on to the most-watched channel for each person.
The level of detail that's possible from the AT&T lab experiments seems so personal and so invasive that Donovan admits it will initially be controversial to most people, even "creepy."
He admitted there would probably be enormous pushback over personal privacy initially. Also, he said manufacturers such as Apple that are proud of the design of their smartphones and tablets would still want everyone to own a device instead of using someone else's device at a friend's house or at work or in the car.
"As I look at the horizon, this industry is just beginning to hit," he said. "It's not just mobile and cloud where things can be detached from devices, whether it's the TV or the laptop." What Donovan called "disintegration" of the user from the device will allow a "lot of flexibility," he said, adding "we'll see socially amazing things."
And if the cloud is capable of that, it's possible that we don't need the personalized mobile phones and tablets that we use today.
Someone could drive to dinner at a friend's house and use a wireless device, perhaps over a TV, to make a call or send a message by entering a password or fingerprint scan. The device would then find all of the caller's personal information in the cloud, including the phone number or e-mail address of whomever was being called.
Even the names of the user's children would be accessible, for example.
Answers to everything will be at our fingertips, and [the information will be] more mobile and more ubiquitous,"
As a result of having such a rich repository of information in the cloud, people will become independent of devices like smartphones and tablets. "Software will converge, and devices will disintegrate, and we'll have fewer devices that belong to us anymore,". "I don't see the need to carry mobile devices to visit you at your house; I'll borrow one you have and authenticate myself on it."
Donovan, AT&T's chief technology officer says,AT&T is already experimenting with the cloud concept in its labs. One study uses information about calling and data usage patterns that carriers have known for years. One well-known pattern is that a preponderance of people call home on Sunday nights.
That kind of pattern analysis will ultimately make communication and access to information more convenient. "If today I always answer calls from home at my work, then the phone will continue to ring there, but if I never answer your calls or e-mails, then I should never hear [or see] them,"."Time of day, day of week, location, business versus personal ... these things are not terribly complex [to analyze]."
Donovan said that AT&T researchers have even used him as a guinea pig. For example, engineers in recent weeks took all of his communications, including calls and e-mails, and uploaded logs from them in order to find patterns, not to study the messages word for word. The lab analysis spit out a list of Donovan's top 30 best friends and ranked from 1 to 30. To his relief, "my wife was at the top," he said.
"They told me, 'Here's who we think your best friends are,'" by analyzing who got the longest calls, the most e-mails, the most texts, and even who got the longest texts from him, among other patterns.
The value of that kind of list is that it would help an automated system populate favorites, much the same way that Netflix suggests movies someone will like, Donovan said. In one example, Donovan said a TV today will turn on to the last channel watched, but it could be set up with a profile for every member of a family to turn on to the most-watched channel for each person.
The level of detail that's possible from the AT&T lab experiments seems so personal and so invasive that Donovan admits it will initially be controversial to most people, even "creepy."
He admitted there would probably be enormous pushback over personal privacy initially. Also, he said manufacturers such as Apple that are proud of the design of their smartphones and tablets would still want everyone to own a device instead of using someone else's device at a friend's house or at work or in the car.
"As I look at the horizon, this industry is just beginning to hit," he said. "It's not just mobile and cloud where things can be detached from devices, whether it's the TV or the laptop." What Donovan called "disintegration" of the user from the device will allow a "lot of flexibility," he said, adding "we'll see socially amazing things."
Monday, February 14, 2011
ERP and its benefits
Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, etc. ERP systems automate this activity with an integrated software application. Its purpose is to facilitate the flow of information between all business functions inside the boundaries of the organization and manage the connections to outside stakeholders.
ERP systems can run on a variety of hardware and network configurations, typically employing a database to store data.
ERP systems typically include the following characteristics:
An integrated system that operates in (next to) real time, without relying on periodic updates.
A common database, that supports all applications.
A consistent look and feel throughout each module.
Installation of the system without elaborate application/data integration by the Information Technology (IT) department
Functional areas
Finance/Accounting
General ledger, payables, cash management, fixed assets, receivables, budgeting, consolidation
Human resources
payroll, training, benefits, 401K, recruiting, diversity management
Manufacturing
Engineering, bill of materials, work orders, scheduling, capacity, workflow management, quality control, cost management, manufacturing process, manufacturing projects, manufacturing flow, activity based costing, Product lifecycle management
Supply chain management
Order to cash, inventory, order entry, purchasing, product configurator, supply chain planning, supplier scheduling, inspection of goods, claim processing, commissions
Project management
Costing, billing, time and expense, performance units, activity management
Customer relationship management
Sales and marketing, commissions, service, customer contact, call center support
Data services
Various "self–service" interfaces for customers, suppliers and/or employees
Access control
Management of user privileges for various processes
Major Benefits of ERP:
Quality management
Improve the customer experienec
High level decision support capability
Provides accurate information to customers
Reduce data entry
Streamlined process
Improve supply chain management
Increase revenue
Improving on-time deliveries
Rasing product quality
Reducing customer service cost
Expanding into new markets
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions
ERP systems can run on a variety of hardware and network configurations, typically employing a database to store data.
ERP systems typically include the following characteristics:
An integrated system that operates in (next to) real time, without relying on periodic updates.
A common database, that supports all applications.
A consistent look and feel throughout each module.
Installation of the system without elaborate application/data integration by the Information Technology (IT) department
Functional areas
Finance/Accounting
General ledger, payables, cash management, fixed assets, receivables, budgeting, consolidation
Human resources
payroll, training, benefits, 401K, recruiting, diversity management
Manufacturing
Engineering, bill of materials, work orders, scheduling, capacity, workflow management, quality control, cost management, manufacturing process, manufacturing projects, manufacturing flow, activity based costing, Product lifecycle management
Supply chain management
Order to cash, inventory, order entry, purchasing, product configurator, supply chain planning, supplier scheduling, inspection of goods, claim processing, commissions
Project management
Costing, billing, time and expense, performance units, activity management
Customer relationship management
Sales and marketing, commissions, service, customer contact, call center support
Data services
Various "self–service" interfaces for customers, suppliers and/or employees
Access control
Management of user privileges for various processes
Major Benefits of ERP:
Quality management
Improve the customer experienec
High level decision support capability
Provides accurate information to customers
Reduce data entry
Streamlined process
Improve supply chain management
Increase revenue
Improving on-time deliveries
Rasing product quality
Reducing customer service cost
Expanding into new markets
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions
Why Breaches Happen…What to Do About it
For companies that have critical information assets such as customer data, intellectual property, trade secrets, and proprietary corporate data, the risk of a data breach is now higher than ever before. In fact, more electronic records were breached in 2008 than in the previous four years combined.
In a world where data is everywhere, it has become harder than ever for organizations to protect their confidential information. Complex, heterogeneous IT environments make data
protection and threat response very difficult. Yet today's businesses depend on their security teams to ensure that collaboration and sharing by an increasingly mobile workforce remains safe and secure.
Why data breaches happen:
Third-party research into the root causes of data breaches.
protection and threat response very difficult. Yet today's businesses depend on their security teams to ensure that collaboration and sharing by an increasingly mobile workforce remains safe and secure.
Why data breaches happen:
Third-party research into the root causes of data breaches.
Main types: well-meaning insiders, targeted attacks, and malicious insiders.
Well-meaning insiders
Company employees who inadvertently violate data security policies
involved incidents resulting from negligence.
1)Data exposed on servers and desktops
2)Lost or stolen laptops
3)Email, Web mail, and removable devices.
4)Third-party data loss incidents
Targeted attacks
Such attacks are often automated using malicious code that can penetrate into an organization undetected and export data to hacker sites.
The malicious insider
1)White collar crime.
Well-meaning insiders
Company employees who inadvertently violate data security policies
involved incidents resulting from negligence.
1)Data exposed on servers and desktops
2)Lost or stolen laptops
3)Email, Web mail, and removable devices.
4)Third-party data loss incidents
Targeted attacks
Such attacks are often automated using malicious code that can penetrate into an organization undetected and export data to hacker sites.
The malicious insider
1)White collar crime.
The employee who knowingly steals data
2)Terminated employees.
2)Terminated employees.
How to stop data breaches?
1)Proactively protect information
Implement "define once, enforce everywhere" policy management with incident remediation workflow, reporting, system management, and security.
• Find sensitive information located on file servers, databases, email repositories, websites, laptops, and desktops, and protect it with automatic quarantine capabilities as well as support for policy-based encryption.
• Inspect all network communications, such as email, IM, Web, FTP, P2P, and generic TCP, and enforce policies to proactively block confidential data from leaving the organization through these network exits.
• Proactively block confidential data from leaving the organization from endpoints via print, fax or removable media.
2)Automate the review of entitlements to sensitive data. Data breach is often the result of a targeted attack that uses malware to find and export the data—and use of improper credentials is the leading cause of such attacks. By automating regular checks on passwords and other entitlement controls, organizations can reduce the risk of such a breach. In addition, failure to lock down the entitlements of terminated employees in a timely manner is a major
contributor to breaches caused by malicious insiders. Automated entitlement reviews can stop such breaches before they happen. Survey tools, controls assessment automation, and security event management solutions enable organizations to prevent breaches that stem from unenforced entitlements.
• Automatically check technical controls on entitlements assigned to the terminated employee, such as Active Directory and Exchange access.
• If, after a termination, the disabled credential is used in an attempt to access restricted data or systems, flag the incident for investigation and prevent a potential data loss incident.
3) Identify threats by correlating real-time alerts with global security intelligence.
• Security intelligence services analyze data from billions of email messages and monitor millions of systems worldwide on a daily basis.
4) Stop incursion by targeted attacks. The top three means of hacker incursion into a company's network are default password violations, SQL injections, and targeted malware
1)Proactively protect information
Implement "define once, enforce everywhere" policy management with incident remediation workflow, reporting, system management, and security.
• Find sensitive information located on file servers, databases, email repositories, websites, laptops, and desktops, and protect it with automatic quarantine capabilities as well as support for policy-based encryption.
• Inspect all network communications, such as email, IM, Web, FTP, P2P, and generic TCP, and enforce policies to proactively block confidential data from leaving the organization through these network exits.
• Proactively block confidential data from leaving the organization from endpoints via print, fax or removable media.
2)Automate the review of entitlements to sensitive data. Data breach is often the result of a targeted attack that uses malware to find and export the data—and use of improper credentials is the leading cause of such attacks. By automating regular checks on passwords and other entitlement controls, organizations can reduce the risk of such a breach. In addition, failure to lock down the entitlements of terminated employees in a timely manner is a major
contributor to breaches caused by malicious insiders. Automated entitlement reviews can stop such breaches before they happen. Survey tools, controls assessment automation, and security event management solutions enable organizations to prevent breaches that stem from unenforced entitlements.
• Automatically check technical controls on entitlements assigned to the terminated employee, such as Active Directory and Exchange access.
• If, after a termination, the disabled credential is used in an attempt to access restricted data or systems, flag the incident for investigation and prevent a potential data loss incident.
3) Identify threats by correlating real-time alerts with global security intelligence.
• Security intelligence services analyze data from billions of email messages and monitor millions of systems worldwide on a daily basis.
4) Stop incursion by targeted attacks. The top three means of hacker incursion into a company's network are default password violations, SQL injections, and targeted malware
• Automate polling of administrators to make sure that default passwords are deleted and ACLs are updated.
• Use host-based intrusion detection and intrusion prevention systems on servers to safeguard host integrity in case of SQL injection attack and to stop malware from writing to core systems.
• Use messaging security to monitor and block the inbound flow of targeted malware.
5) Prevent data exfiltration. In the event that a hacker incursion is successful, it is still possible to prevent a data breach by using network software to detect and block the exfiltration of confidential data.
• Use host-based intrusion detection and intrusion prevention systems on servers to safeguard host integrity in case of SQL injection attack and to stop malware from writing to core systems.
• Use messaging security to monitor and block the inbound flow of targeted malware.
5) Prevent data exfiltration. In the event that a hacker incursion is successful, it is still possible to prevent a data breach by using network software to detect and block the exfiltration of confidential data.
Using technology to monitor and protect information, the security team should be able to continuously improve the plan and progressively reduce risk based on a constantly expanding knowledge of threats and vulnerabilities.
• Integrated solutions for data loss prevention, system protection, compliance, and security management enable customers to create an operational model for security that is risk-based, content-aware, responsive to threats in real time, and workflow-driven to automate day-to-day processes and close gaps between people, policies, and technologies.
• Security services—including consulting, education, critical support, and global intelligence services—provide organizations with deep security knowledge and broad security product expertise.
• Integrated solutions for data loss prevention, system protection, compliance, and security management enable customers to create an operational model for security that is risk-based, content-aware, responsive to threats in real time, and workflow-driven to automate day-to-day processes and close gaps between people, policies, and technologies.
• Security services—including consulting, education, critical support, and global intelligence services—provide organizations with deep security knowledge and broad security product expertise.
Breaking IT news
HTML5 will be finished in 2014.
Obama Goal:98% of U.S. residents would have access to high-speed mobile broadband service within five years.
India-based firm Infosys Technologies Ltd., Top H-1B visa user of 2010.
Applied for 3,800 US visas last year.
Mozilla adds 'Do Not Track' to newest Firefox 4 beta
Cisco revenues push to $10.4B in Q2
Social networks credited with role in toppling Egypt's Mubarak
Obama Goal:98% of U.S. residents would have access to high-speed mobile broadband service within five years.
India-based firm Infosys Technologies Ltd., Top H-1B visa user of 2010.
Applied for 3,800 US visas last year.
Mozilla adds 'Do Not Track' to newest Firefox 4 beta
Cisco revenues push to $10.4B in Q2
Social networks credited with role in toppling Egypt's Mubarak
Saturday, February 12, 2011
Microsoft's IE9 for browsing privacy
Microsoft's release Internet Explorer 9 -- made available for download this week -- includes a tool that lets users protect themselves from being tracked on the Web.
How does it work?
We never have a static web page. They're more like a mosaic of different services.
What do those do?
Those are mostly tracking pixels. They measure, for example, how many hits a site gets. It's important to understand that cookies are only one way to track users on the Web. There are also tracking pixels and a variety of others. The fact is that users on the Web are tracked, often without their knowledge and without their consent. Another important aspect is the distinction between tracking and advertising. Not all tracking is advertising, not all advertising is tracking. The third aspect is that you have to distinguish between expected tracking and unexpected tracking. If I buy a book at Amazon, for example, or listen to a song on Last.FM, I know that the service will track my behavior. I know it will use this data to show me similar things which I might like, and thus enhance my experience.
The other thing is unexpected tracking or, call it as creepy tracking. The user gets no information about which service is tracking his online behavior, how this information is used or where it ends up. It is precisely this kind of tracking that IE want to address with Tracking Protection. The technology will be an integral part of all versions of IE9, starting with the Release Candidate of IE9.
How will the plug-in know which attempts at tracking it should stop?
The plug-in relies on lists; these contain a set of rules that define which content to block.
How much technical know-how does it take to generate these lists? Can anyone generate a new list and share it with their friends?
Yes.Tracking Protection is designed as an open platform; the more people create lists, the better the service will get. The process itself is really simple: Say you browse the Web one rainy afternoon and you want to see what content the website you're currently visiting is loading. IE9 will have a feature that shows you precisely this information. If you find something you can't explain, you can add it to a list. You can then put the list online and send the links to your friends. They just need to click on the link and your rule-set is added to their IE9.
So Tracking Protection is not limited to Tracking? Can you block ads as well?
If you generate a list for it, it can block other things.
Sounds simple enough -- how do you think the site-owners and advertising companies will react?
It has already generated a lot of interest.If your list blocks a specific thing a website tries to load and a lot of people install your list, the site might go: "Wow, people are blocking these things and I need them. Hmm... if I try and explain to my visitors what this specific content does and why I need it, I might be able to convince them and they might switch to my list, which allows this particular feature." Tracking Protection really levels the playing field for consumers compared to the people who own the site. It might even help start a conversation that otherwise won't happen.
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions
How does it work?
We never have a static web page. They're more like a mosaic of different services.
What do those do?
Those are mostly tracking pixels. They measure, for example, how many hits a site gets. It's important to understand that cookies are only one way to track users on the Web. There are also tracking pixels and a variety of others. The fact is that users on the Web are tracked, often without their knowledge and without their consent. Another important aspect is the distinction between tracking and advertising. Not all tracking is advertising, not all advertising is tracking. The third aspect is that you have to distinguish between expected tracking and unexpected tracking. If I buy a book at Amazon, for example, or listen to a song on Last.FM, I know that the service will track my behavior. I know it will use this data to show me similar things which I might like, and thus enhance my experience.
The other thing is unexpected tracking or, call it as creepy tracking. The user gets no information about which service is tracking his online behavior, how this information is used or where it ends up. It is precisely this kind of tracking that IE want to address with Tracking Protection. The technology will be an integral part of all versions of IE9, starting with the Release Candidate of IE9.
How will the plug-in know which attempts at tracking it should stop?
The plug-in relies on lists; these contain a set of rules that define which content to block.
How much technical know-how does it take to generate these lists? Can anyone generate a new list and share it with their friends?
Yes.Tracking Protection is designed as an open platform; the more people create lists, the better the service will get. The process itself is really simple: Say you browse the Web one rainy afternoon and you want to see what content the website you're currently visiting is loading. IE9 will have a feature that shows you precisely this information. If you find something you can't explain, you can add it to a list. You can then put the list online and send the links to your friends. They just need to click on the link and your rule-set is added to their IE9.
So Tracking Protection is not limited to Tracking? Can you block ads as well?
If you generate a list for it, it can block other things.
Sounds simple enough -- how do you think the site-owners and advertising companies will react?
It has already generated a lot of interest.If your list blocks a specific thing a website tries to load and a lot of people install your list, the site might go: "Wow, people are blocking these things and I need them. Hmm... if I try and explain to my visitors what this specific content does and why I need it, I might be able to convince them and they might switch to my list, which allows this particular feature." Tracking Protection really levels the playing field for consumers compared to the people who own the site. It might even help start a conversation that otherwise won't happen.
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions
Friday, February 11, 2011
CRM Solutions,Contact us
Microsoft Dynamics CRM (Customer Relationship Management) is a Microsoft solution that uses Microsoft .NET-connected technologies to automate day-to-day tasks for sales, customer service, field service, call center, and marketing professionals.
CRM,is a company-wide business strategy designed to reduce costs and increase profitability by solidifying customer loyalty. True CRM brings together information from all data sources within an organization (and where appropriate, from outside the organization) to give one, holistic view of each customer in real time. This allows customer facing employees in such areas as sales, customer support, and marketing to make quick yet informed decisions on everything from cross-selling and upselling opportunities to target marketing strategies to competitive positioning tactics.
If customer relationships are the heart of business success, then CRM is the valve the pumps a company's life blood. As such, CRM is best suited to help businesses use people, processes, and technology to gain insight into the behavior and value of customers. This insight allows for improved customer service, increased call center efficiency, added cross-sell and upsell opportunities, improved close rates, streamlined sales and marketing processes, improved customer profiling and targeting, reduced costs, and increased share of customer and overall profitability.
CRM success stories:
Alta Resources
Alta Resources is an outsourcer of customized sales and service applications such as call center management and customer data analysis applications. To keep up with increasing internet and global demands, Alta needed a CRM solution that integrates its clients' business processes with its own applications.
Bedfordshire County Council
It's not surprising that the public sector has turned to higher-tech CRM solutions in the past few years. SAP worked with the Council to create a CRM solution that makes the Council more efficient and enhances communications within its own department, with private companies, and with the general public. Bedfordshire County, and other communities worldwide, has realized that CRM has huge potential benefits to the efficiency of our government agencies, and can change the way government interacts with the public.
Three Rivers Pharmeceuticals (3RP)
3RP is an example of a start-up company that implemented a CRM solution from the beginning in order to maximize its profits and efficiency during this most important growth period.
American Airlines
American Airlines wanted to better understand its growing customer base, specifically the members of its AAdvantage Travel Awards program.Using this system,greatly increase their profitability by retaining customers in an increasingly dynamic and competitive industry.
Is your company looking to provide better customer service?
Do you want to increase your revenues?
Dont you want new customers?
Looking forward to simplify sales and marketing solutions?
Would like to make call centers more efficiently?
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
CRM,is a company-wide business strategy designed to reduce costs and increase profitability by solidifying customer loyalty. True CRM brings together information from all data sources within an organization (and where appropriate, from outside the organization) to give one, holistic view of each customer in real time. This allows customer facing employees in such areas as sales, customer support, and marketing to make quick yet informed decisions on everything from cross-selling and upselling opportunities to target marketing strategies to competitive positioning tactics.
If customer relationships are the heart of business success, then CRM is the valve the pumps a company's life blood. As such, CRM is best suited to help businesses use people, processes, and technology to gain insight into the behavior and value of customers. This insight allows for improved customer service, increased call center efficiency, added cross-sell and upsell opportunities, improved close rates, streamlined sales and marketing processes, improved customer profiling and targeting, reduced costs, and increased share of customer and overall profitability.
CRM success stories:
Alta Resources
Alta Resources is an outsourcer of customized sales and service applications such as call center management and customer data analysis applications. To keep up with increasing internet and global demands, Alta needed a CRM solution that integrates its clients' business processes with its own applications.
Bedfordshire County Council
It's not surprising that the public sector has turned to higher-tech CRM solutions in the past few years. SAP worked with the Council to create a CRM solution that makes the Council more efficient and enhances communications within its own department, with private companies, and with the general public. Bedfordshire County, and other communities worldwide, has realized that CRM has huge potential benefits to the efficiency of our government agencies, and can change the way government interacts with the public.
Three Rivers Pharmeceuticals (3RP)
3RP is an example of a start-up company that implemented a CRM solution from the beginning in order to maximize its profits and efficiency during this most important growth period.
American Airlines
American Airlines wanted to better understand its growing customer base, specifically the members of its AAdvantage Travel Awards program.Using this system,greatly increase their profitability by retaining customers in an increasingly dynamic and competitive industry.
Is your company looking to provide better customer service?
Do you want to increase your revenues?
Dont you want new customers?
Looking forward to simplify sales and marketing solutions?
Would like to make call centers more efficiently?
Contact us (PerfeITo Software solutions) for inquiry or interest in Microsoft Products.We are consulting company, and Microsoft Partner* Program since 2008.
Log in to http://www.perfeitosoftware.com
Mail to :mail@perfeitosoftware.com
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions.
Thursday, February 10, 2011
HP announces first webOS tablet: the TouchPad

HP has revealed that users will soon be able to enjoy the webOS experience on a bigger screen. Its new TouchPad tablet is headed for a Q3 release and will run on a dual-core Snapdragon processor, offer genuine multi-tasking and feature a host of useful productivity tools like Synergy and touch-to-share. There's Wireless-N and Bluetooth connectivity, a webcam for online chat and cable-free charging via an optional touchstone charging dock.
The first thing you are struck by when looking at the TouchPad is its similarity to Apple's tablet. The display is of the same 9.7-inch proportions and capacitive, multi-touch functionality, and it has the same 1,024 x 768 pixel resolution.
The tablet is also exactly the same weight at 1.6 pounds (740 g). HP's slate starts to break away from the iPad at its slightly chunkier dimensions of 7.48 x 9.53 x 0.54inch (190 x 242 x 13.7mm), and then there's its inter-device connectivity.
The TouchPad's innovative touch-to-share feature allows users to share data stored on a webOS smartphone by brief physical contact with the tablet – no wires in sight. It can also be wirelessly charged via a newly-developed Touchstone for TouchPad charging dock right out of the box and the webOS operating platform allows users to run applications specifically designed for Touchstone.
The Exhibition feature, for instance, launches as soon as the TouchPad is placed on the dock, and can show off the day's schedule or a slideshow of photos while the 6,300 mAh battery gets a top up. There's also wired charging via micro-USB if you don't fancy parting with extra cash for the Touchstone dock.
About us:At PerfeITo, we specialize in providing cost-effective solutions customized for your specific business. The advantage of global sourcing coupled with local business knowledge enables us to deliver solutions that are cutting edge while retaining the focus on how these solutions best meet your particular needs. Our services include software application development, software product development along with application management and technology integration solutions.
Website: www.perfeitosoftware.com
Email: mail@perfeitosoftware.com
Going Green - IT and Environmental Sustainability

Of all the factors contributing to the past two decades of economic and political change around the world, one stands above the rest: information technology (IT).
Once considered a privilege of developed countries, IT now bridges the gap between the developed and developing world. Access to information itself has become an equalizer and a mobilizer in the effort to meet two urgent challenges: climate change and our ability to create a sustainable global environment.
IT is growing at an astonishing rate. According to an IDC white paper the amount of information created, captured, and replicated in 2007 totaled 281 billion gigabytes—more than three million times the information contained in all the books ever written. And between 2006 and 2011, the amount of data added annually to the digital universe will increase 10 times.
How, in the immediate- to near-term, can IT minimize its impact on the global environment?
How can IT support cultural and process changes that help people and organizations respond tactically, strategically, and systemically to create a more energy efficient world?
Mitigating the environmental impact of IT
As access to information over the Internet has become more global, ownership of the asset pool has become much less concentrated in developed nations. Near-ubiquitous connectivity and access to information has empowered people to contribute to the world’s knowledge base from every corner of the world. Harnessing this global human capital represents our best chance to address critical issues such as climate change.
But this ever-expanding digital universe is not a panacea: It has had environmental consequences. It consumes large amounts of resources to build out data centers and server farms, and it’s driving higher demands for energy. Yet many of these resources are being wasted. The average utilization rate for servers ranges from 5 percent to 15 percent and for non-networked storage, 20 percent to 40 percent. That means many companies are paying the energy costs to run data centers at 100 percent capacity, but are only using 5 percent to 15 percent of that capacity—a tremendous waste.
At the same time, as much as 70 percent of the information an organization accumulates may never or only rarely be accessed. Clearly, the IT industry must minimize the environmental impact of rapid information growth by attaining higher levels of efficiency. Three key technology initiatives support this goal:
Virtualization and consolidation
Information lifecycle management
De-duplication
Virtualization and consolidation are essential to energy conservation in the data center, where IT managers have installed more and more systems to enhance performance, redundancy, and availability, but without a focus on power or cooling efficiency. Virtualization addresses these inefficiencies by separating software from the underlying hardware, so that a single computer can run multiple operating systems and applications. In turn, better utilization of servers and storage means deployment of fewer machines—thereby using less electricity for power and cooling.
Information lifecycle management (ILM) is based on the premise that the value of information changes over time. ILM uses automatic intelligence to store information in the most appropriate and energy-efficient storage device at every point in its lifecycle. For example, business-critical and real-time information requires systems that offer the highest reliability and performance—and therefore demand more resources and power. When that information reaches a less critical state, ILM migrates it to storage that consumes less energy.
De-duplication vastly reduces the amount of stored backup data that results from users storing multiple copies and variations of the same file in many places across the network. De-duplication stops runaway duplication by transforming data files into data segments that can be stored and re-used in multiple files. The original file is saved and backed up just once to a central server. When file edits are sent to the server, they’re in the form of new and unique sub-file data segments associated with the original, and only those new segments are backed up. De-duplication can reduce network bandwidth and backup storage by a factor of 300.
Supporting global communities to change policies and outcomes
Beyond reducing the environmental impact of the information explosion, IT has a larger role to play as a vehicle through which information about environmental sustainability can be shared, enabling people to come together around the world to devise new approaches and solutions.
A new, global platform for collaboration—enabled by blogs, wikis, and social networks—has given rise to virtual communities, where everyone can contribute to a global dialogue by uploading their own ideas, content, and products for wide dissemination and comment. This is fundamentally changing the flow of information gathering, distribution, innovation, political mobilization, and more. And the United Nations Global Alliance for ICT and Development (UN-GAID) itself has been using these technologies to collaborate across its global network.
However, a global collaborative effort on a vastly larger scale is needed to advance environmental sustainability. As the number of connections between people and organizations increases, so the ability to combine and recombine ideas accelerates. Knowledge sharing also builds social capital and trust, and emboldens people and groups to stand more forcefully and vocally behind their positions.
Creating environmental sustainability is a massive undertaking. It will demand global collaboration and cooperation among the largest and most influential stakeholders in the outcome—the United Nations, government and non-governmental organizations, businesses, universities, and individuals. It will demand taking a system view of energy generation, energy use, and climate change.
And it will require a combination of incentives, standards, grants, continued research, and imagination and innovation to drive the global changes needed in what is a shrinking timetable. IT is positioned to play a critical and central part in this urgent task.
Cloud Computing
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
The advantages of cloud computing include reduced costs, easy maintenance and re-provisioning of resources, and thereby increased profits. Cloud also helps save the environment
Top Companies using Cloud computing are :
1)Microsoft - Free Services
Top in this list of cloud computing companies stands Microsoft. This king of cloud computing was already offering Skydrive and a host of other services so you can share your documents and images with your family and friends. As cloud computing gained momentum, it started offering few more cloud packages to meet the needs of a diverse clientèle. The most popular among these are Office Live Workspace, BPOS (Business Productivity Online Standard Suite), Office Live 365, and Windows Azure.
2)Google - Free Services
Almost everyone knows and uses Google Docs. The cloud computing package from Google is free to use. Anyone having a Google account can access the service. The cloud package allows you to store your documents, spreadsheets, and presentations online so that you can access them from anywhere in the world.
Google Docs also offers you the facility of in-place editing of the documents stored online. You can share the documents, set privacy and read/write permissions on the files, and can even print them using Google Cloud Print service.
3)Microsoft Office 365
Microsoft Office 365 allows you to host remote servers, set up emails for all the employees in your business, and video conferencing facilities. Like Office Live Workspace, it also allows you to upload, share, edit, and collaborate on documents.
The services come at a cost. The most basic package is email account creation that costs around $2 per employee per month.
4)Google Apps
Google Apps is a collection of its already present services that it integrated in a fashion useful for small businesses. The collection includes email accounts for each employee, Google Docs, and Google videos. Google charges a yearly, fixed fee of around $50 per account and it does not place any restrictions on the number of sub-accounts created within the account. So it can be said that it offers the service at much lower cost compared to Office 365.
5)MOZY - Free Continuous Backup
If we had ignored Microsoft and Google, Mozy would have been at the top in this list of cloud computing companies. Mozy is actually SAAS (Software as a Service) that allows you to back up your important files and documents to remote servers.
The cloud computing service offers 2GB of free space for your backups. If you need more space, you can pay a nominal fee
6)SalesForce
SalesForce offers CRM and Collaboration applications for your use. It allows you to pay as you go. This means you pay only for the services you use. You can ask for more if your requirements increase. SalesForce also offers the facility of creating different applications without having to set up your own data centers
7)IBM Cloud Computing
IBM also follows the typical structure of Windows Azure though the latter was developed recently. IBM currently offers web hosting, backup, and virtualizations facilities
8)Amazon Web Services
A sister product of Amazon, one of the leading online stores, Amazon Web Services offers pay as you go for remote storage. The cloud computing company also offers a range of related services such as networks, web hosting, traffic monitoring, and more. It also offers workforce should you need more resources at cheaper rates.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
The advantages of cloud computing include reduced costs, easy maintenance and re-provisioning of resources, and thereby increased profits. Cloud also helps save the environment
Top Companies using Cloud computing are :
1)Microsoft - Free Services
Top in this list of cloud computing companies stands Microsoft. This king of cloud computing was already offering Skydrive and a host of other services so you can share your documents and images with your family and friends. As cloud computing gained momentum, it started offering few more cloud packages to meet the needs of a diverse clientèle. The most popular among these are Office Live Workspace, BPOS (Business Productivity Online Standard Suite), Office Live 365, and Windows Azure.
2)Google - Free Services
Almost everyone knows and uses Google Docs. The cloud computing package from Google is free to use. Anyone having a Google account can access the service. The cloud package allows you to store your documents, spreadsheets, and presentations online so that you can access them from anywhere in the world.
Google Docs also offers you the facility of in-place editing of the documents stored online. You can share the documents, set privacy and read/write permissions on the files, and can even print them using Google Cloud Print service.
3)Microsoft Office 365
Microsoft Office 365 allows you to host remote servers, set up emails for all the employees in your business, and video conferencing facilities. Like Office Live Workspace, it also allows you to upload, share, edit, and collaborate on documents.
The services come at a cost. The most basic package is email account creation that costs around $2 per employee per month.
4)Google Apps
Google Apps is a collection of its already present services that it integrated in a fashion useful for small businesses. The collection includes email accounts for each employee, Google Docs, and Google videos. Google charges a yearly, fixed fee of around $50 per account and it does not place any restrictions on the number of sub-accounts created within the account. So it can be said that it offers the service at much lower cost compared to Office 365.
5)MOZY - Free Continuous Backup
If we had ignored Microsoft and Google, Mozy would have been at the top in this list of cloud computing companies. Mozy is actually SAAS (Software as a Service) that allows you to back up your important files and documents to remote servers.
The cloud computing service offers 2GB of free space for your backups. If you need more space, you can pay a nominal fee
6)SalesForce
SalesForce offers CRM and Collaboration applications for your use. It allows you to pay as you go. This means you pay only for the services you use. You can ask for more if your requirements increase. SalesForce also offers the facility of creating different applications without having to set up your own data centers
7)IBM Cloud Computing
IBM also follows the typical structure of Windows Azure though the latter was developed recently. IBM currently offers web hosting, backup, and virtualizations facilities
8)Amazon Web Services
A sister product of Amazon, one of the leading online stores, Amazon Web Services offers pay as you go for remote storage. The cloud computing company also offers a range of related services such as networks, web hosting, traffic monitoring, and more. It also offers workforce should you need more resources at cheaper rates.
Tech Today
Twitter sought by Facebook, Google for up to $10B.
Microsoft sets Feb. 22 as Windows 7 SP1 public launch.
A study reveals that Microsoft's Bing search engine, and even Yahoo, are providing users with more-accurate searches than Google.
NIIT Technologies ranked No.1 globally among IT outsources.
Microsoft sets Feb. 22 as Windows 7 SP1 public launch.
A study reveals that Microsoft's Bing search engine, and even Yahoo, are providing users with more-accurate searches than Google.
NIIT Technologies ranked No.1 globally among IT outsources.
Wednesday, February 9, 2011
Tech today
Bank of Baroda has appointed Hewlett Packard (HP) to implement its IT modernisation initiative.
World cup ads to cost 24lakhs per 10sec.
IBM, Intel and Hewlett-Packard would invest in an effort to create jobs in US and promote growth in emerging technology areas such as cloud computing, health care and mobile applications.
Google bets $20K that Chrome can't be hacked
Apple starts manufacturing ipad2.0
World cup ads to cost 24lakhs per 10sec.
IBM, Intel and Hewlett-Packard would invest in an effort to create jobs in US and promote growth in emerging technology areas such as cloud computing, health care and mobile applications.
Google bets $20K that Chrome can't be hacked
Apple starts manufacturing ipad2.0
Now you can edit, share Microsoft Office docs from anywhere
Microsoft India has launched the Office Web Apps in India. Hereafter, users can access Office Web Apps, the online companions of Microsoft Word, Excel, PowerPoint and OneNote, for free using their Windows Live ID on the SkyDrive or Hotmail. This will enable users to create, view, edit, and share Office documents from anywhere with an Internet connection.
“Office Web Apps are a key piece of Microsoft’s overall cloud strategy. Features like ease of sharing and high document fidelity make Office Web Apps a powerful enabler of productivity in the cloud for modern information workers and consumers alike. Moreover, this tool helps students collaborate on their school and college projects in a seamless way,” said Sanjay Manchanda, Director, Microsoft Business Division.
Office Web Apps provide consistent formatting of a document with full images and footnotes, table borders and text effects to the user. To start with Office Web Apps, users only require a Windows Live ID, a supported web browser (IE, Firefox, Chrome or Safari) and an Internet connection. Moreover, team members can work together using Office Web Apps, regardless of what version of Microsoft Office they use and whether they work on a PC or a Mac.
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
“Office Web Apps are a key piece of Microsoft’s overall cloud strategy. Features like ease of sharing and high document fidelity make Office Web Apps a powerful enabler of productivity in the cloud for modern information workers and consumers alike. Moreover, this tool helps students collaborate on their school and college projects in a seamless way,” said Sanjay Manchanda, Director, Microsoft Business Division.
Office Web Apps provide consistent formatting of a document with full images and footnotes, table borders and text effects to the user. To start with Office Web Apps, users only require a Windows Live ID, a supported web browser (IE, Firefox, Chrome or Safari) and an Internet connection. Moreover, team members can work together using Office Web Apps, regardless of what version of Microsoft Office they use and whether they work on a PC or a Mac.
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
Subscribe to:
Posts (Atom)