identify latest developments in mis regarding software’s in 2009
TRANSCRIPT
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
1/20
Bajwa,
IjazH
ussain.
bajwaih@
gmail.com
2
009
Identifylate
stdevelopmen
tsinMIS
regardingSoftwares
in2009
This project will help to understand the four basic things about
Management Information Systems regarding latest developments
in Software; these will be Upcoming technologies (2010),
improvements going on in current, arrivals of the 2009 and
identified problems of latest developments. Most important
developments were noticed in the fields of online CRM, Cloud
computing and SaaS.
Faculty of Management Sciences
International Islamic University
Islamabad
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
2/20
DEDICATION & SPECIAL THANKS
I dedicate this working to our parents; with there absolute love and care for me; I am able to
stand here. Named as; Mr. & Mrs. Imtiaz Hussain Bajwa.
And we pay our dearest thanks for; Prof. Imran M. Qureshi who supported us without any
official responsibility.
As this working is done as a small assignment; so problem of language understanding and
content selection may be pointed out. I hope you will ignore and for in-depth study you can go to
the references.
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
3/20
TABLE OF CONTENTS
UPCOMING TECHNOLOGIES ................................................................................................................... 4
EXCHANGE 2010 .......................................................................................................................................... 4FUSION APPLICATIONS IN 2010 ...................................................................................................................... 4
MICROSOFT WITH CRMONLINE DEAL............................................................................................................ 5SALESFORCE.COM ANNOUNCES 'CHATTER' ...................................................................................................... 5OFFICE 2010TECHNICAL PREVIEW ................................................................................................................ 5SAAS APPLICATION AT LARGE SERVICES BUSINESSES ....................................................................................... 6ON-DEMAND DEVELOPMENT PLATFORM ........................................................................................................ 6SAPPOTENTIAL GOOGLE WAVE RIVAL ......................................................................................................... 7SALESFORCE.COM A CUSTOMER SERVICE ........................................................................................................ 7
IMPROVING SYSTEMS............................................................................................................................... 8
INFOWORLDS TOP 10EMERGING ENTERPRISE TECHNOLOGIES ........................................................................ 8SALESFORCE.COM TARGETS THE SMALLEST BUSINESSES................................................................................. 11MICROSOFT ADDS ACCESS CONTROLS FORSQLAZURE ONLINE DATABASE ...................................................... 11ERP,CRM ON THE CLOUD:A'SIGNIFICANT' TREND ....................................................................................... 12VIRTUALIZED INFRASTRUCTURE .................................................................................................................. 12GOOGLE GOES AFTER ENTERPRISE WITH GROUPS APP ..................................................................................... 12CLOUD SECURITY SERVICE FROM WEBROOTLOOKS FOR MALWARE .................................................................. 13OPERA 10 .................................................................................................................................................. 13EASY EMAIL ENCRYPTION........................................................................................................................... 13FIRESHOT.................................................................................................................................................. 13ACORN 2.1................................................................................................................................................. 14E-MAIL CAMPAIGN SERVICES ...................................................................................................................... 14
NEW ARRIVALS IN 2009 ........................................................................................................................... 15
MIDDLEWARE FOR CORPORATE MOBILITY ..................................................................................................... 15CONNECT TO CUSTOMERS WITH E-MAIL MARKETING .................................................................................... 15
PEERBLOCKHELPS YOU SURF THE WEB IN SECRET....................................................................................... 15SNOW LEOPARD..WINDOWS 7 .................................................................................................................. 16NOVELL'S SUSELINUX ENTERPRISE DESKTOP 11:A TRUE WINDOWS REPLACEMENT ....................................... 16FAVBACKUP .............................................................................................................................................. 16PRIVACYCHOICE OPT-OUT.......................................................................................................................... 17
PROBLEMS IDENTIFIED IN CURRENT SYSTEMS ................................................................................ 18
MOBILE DEVICES EXPOSE NETWORKS TO SECURITY THREATS .......................................................................... 18BAD SOFTWARE DESIGN INHIBITS USE OF ENTERPRISE APPS .......................................................................... 18THE PROBLEM WITH MATURE ERPSYSTEMS ................................................................................................ 19
REFERENCES ............................................................................................................................................ 20
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
4/20
UPCOMING TECHNOLOGIES
Management Information System in simple term can be defined as The study of information system
focusing on their use in business and management. And the Information System is defined asInterrelated components working together to collect, process, store, and disseminate information to
support decision making, coordination, control, analysis, and visualization in an organization.
In this portion we discuss the possible arrival of software and hardware( if something extra ordinary occur
which change the companies plan then a delay or cancellation of project may occur); as this information
is taken from the most reliable sources which were possible for us, so no such are there form our point of
view . Which ultimately affect the Management Information System? Most of the software technologies
are about the Management Information System and Customer Relationship Management and other
mainly discuss the coming desktop application also considering the importance of Internet in future so
online technologies are also described briefly. Keeping in view; any development which can support anorganization or a business in term of decision making, coordination, control, analysis, and latest concept
of E-marketing and E-management. These topics are tried to cover in briefly; in less possible words with
keeping in view the limitation of space for the project. If one is interested in the details of these covered
topics he may go to the references page.
EXCHANGE 2010
In Exchange 2010, you move a mailbox which is in active use between message store databases.This lets the e-mail manager balance the load across servers and disk subsystems without making
mailboxes unavailable. Exchange 2010 is also internally more resilient to failures, with the
ability to automatically route around and retransmit messages lost by a malfunctioning transport
hub. Exchange 2010 helps to clean up what was really a confusing set of options. E-mail
managers looking for guidance on building distributed Exchange networks will be pleased to see
what has been pushed into Exchange 2010. Microsoft claims these new features will allow
larger Exchange deployments to use less-expensive hardware.
FUSION APPLICATIONS IN 2010
Oracle plans to launch its long-awaited Fusion Applications in 2010, and they will be deployable both on-
premises and as SaaS (software as a service). Fusion Applications, which Oracle first announced several
years ago, will combine the best elements of Oracle's various business software product lines into a next-
generation suite. Oracle has placed special emphasis on improving the user experience with Fusion, as
well as embedded BI (business intelligence) throughout the applications.
http://www.networkworld.com/reviews/2009/041509-exchange-2010-test.htmlhttp://www.networkworld.com/reviews/2009/041509-exchange-2010-test.html -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
5/20
MICROSOFT WITH CRM ONLINE DEAL
Microsoft is trying to steal away Salesforce.com and Oracle CRM on Demand customers with a new offer
that will provide them with six months' access to its own CRM Online application at no charge if they
sign a 12-month contract.
Microsoft charges $44 per month per user for CRM Online Professional edition. That compares to $65
per month per user for Salesforce.com Professional. Oracle CRM on Demand pricing starts at $70 per
month per user. Meanwhile, Microsoft's application is comparable from a feature standpoint and "already
about 35% cheaper" than the competition. The six-month offer is valid through the end of this year.
Microsoft will consider expanding access to customers of other CRM products once it sees how well the
program is received.
In the new release, Microsoft made signing up for CRM Online "super-simple. No credit card
information is required to sign up, although users need to provide an e-mail address. Thirty-day trials
include sample data so users can begin experimenting with the system. A series of help tools provide
information on setup and maintenance.
SALESFORCE.COM ANNOUNCES 'CHATTER'
Salesforce.com opened its annual Dreamforce announced by previewing Salesforce Chatter, a social-
networking application the vendor dubbed a "Facebook for the Enterprise." The upcoming release bundles
a variety of now-familiar features, such as personal profiles, real-time feeds from contacts and
applications, groups and alerts. It can also integrate with Google Apps, the Twitter micro blogging service
and Facebook.
Salesforce.com is also providing a set of APIs (application programming interfaces) for tying other
applications to Chatter. It will also be available on Windows Mobile devices, iPhones and Blackberries.The system will employ the same underlying security and sharing model as other applications built with
the company's Force.com development platform.
Chatter will be available early next year. It will be included in paid editions of Salesforce CRM and
Force.com, and also be available as a Chatter Edition that includes Salesforce Content and Force.com for
$50 per user per month. Salesforce.com's entry raises the competitive stakes for the many small,
specialized vendors hoping to sell social networking platforms into enterprises. Moreover, social
networking capabilities are a natural counterpart to CRM systems, given the latter's emphasis on
continuous communication with customers and suppliers.
OFFICE 2010 TECHNICAL PREVIEW
Microsoft Office 2010, as revealed by the just-released Technical Preview, brings a set of important if
incremental improvements to the market-leading office suite. Among them: making the Ribbon the
default interface for all Office applications, adding a host of new features to individual applications such
as video editing in PowerPoint and improved mail handling in Outlook and introducing a number of
Office-wide productivity enhancers, including photo editing tools and a much-improved paste operation.
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
6/20
The Ribbon takes center stage
Paste Preview
Photo editing tools
Communications, 64-bit version
Faster mail handling
PowerPoint enters the video age.
Office on the Web -- not yet
SAAS APPLICATION AT LARGE SERVICES BUSINESSES
SaaS (software as a service) is an application for large services provider. The application,
Appirio Professional Services Enterprise, is built on top of Force.com, the native development
platform of a key Appirio partner, on-demand CRM (customer relationship management) vendorSalesforce.com. There is a wide array of PSA (professional services automation) offerings
available in the market, with many tuned for specific verticals.
Appirio has made it easy to extend and modify facets of its application's "four pillars" -- people, projects,
customers and numbers -- to suit a particular industry or business. SaaS offers faster deployment than on-
premise software, which is valuable "in cases where you need to quickly put a project together. It is also
beneficial for "cases where your team members are located far away from each other. The Pricing of PS
Enterprise starts at $45 per user per month for organizations with more than 100 users.
ON-DEMAND DEVELOPMENT PLATFORM
SAP is hoping to build a platform of third-party SaaS (software-as-a-service) applications to
complement its own emerging wave of offerings. There intent is not to go out and be a tools
provider. We want to build good tools to build great applications and we want to open those up
to third parties to use.
One of the biggest things people want to be able to do is to connect to our data sources or to
connect to [SAP] Business Suite data sources. Therefore, SAP is developing the platform as a set
of on-demand services. So you want to go connect to a certain customer's implementation of the
Business Suite. You can use these on-demand services to connect to it, get access to master data,
and so on.
Meanwhile, the periodic but high-profile service outages suffered by some SaaS vendors over the
past couple of years have not been lost on SAP. The company has developed a "ramp plan" for
scaling up its technology and support infrastructure as SAP adds more on-demand customers.
Company worry about reliability all the time, but the good answers to all my hard questions so
they think we're in a good position to serve our customers.
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
7/20
SAP POTENTIAL GOOGLE WAVE RIVAL
SAP is planning to release a "virtual war room" decision-making tool dubbed Constellation,
which could be a potential rival to Google's heralded Wave collaboration platform. Constellation
will consist of a cloud-based tool accessible via a Web browser, as well as an on-premises
component, the company's term for particularly active and valued community members.
Users involved in buying decisions could pull in data from a purchase order system, discuss the
pros and cons, and reach a verdict. Right now, that's all being done on the phone, and it's all lost.
It's not captured. That kind of cognitive capture is very powerful.
Users of SAP ERP (enterprise resource planning) systems dating back will be able to move the
contents of a screen to Constellation for discussion. SAP plans to create an App Store-like
marketplace for the platform, where developers can create custom integrations or methods and
put them up for sale. They want to open it up for the community, for the teenagers in the garage.
The on-premises portion may be in beta by April 2009, and generally available sometime in2010.
SALESFORCE.COM A CUSTOMER SERVICE
The application is a response to traditional Web site forums, which provide some customer self-
service functionality but tend to get overwhelmed by long, meandering threads that obscure the
most valuable answers to particular questions. Web sites such as Yahoo Answers, where
community members rate and rank answers to questions are a better solution and
Salesforce.com's software will work much the same way. It will also be available as a Facebook
application that connects back to the Salesforce.com system. It is scheduled for release in thefirst half of 2010.
The idea is to make the tips and how-to information commonly found in knowledge bases
available through multiple channels; as well as uses those channels to procure additional useful
material. For example, an agent who spots a particularly popular response to a question posed
through Salesforce.com Answers could choose to pull it into a new file for the knowledge base.
Salesforce.com has announced that its Service Cloud Twitter integration, announced earlier this
year, is now generally available. A company can use Twitter to track conversations about its
products, or set up a Twitter channel dedicated to fielding customer service requests.
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
8/20
IMPROVING SYSTEMS
In this portion we discuss the Improvements in software and hardware; which ultimately affect the
Management Information System. Most of the software technologies are about the Management
Information System and Customer Relationship Management and other mainly discuss the coming
desktop application also considering the importance of Internet in future so online technologies are also
described briefly. Keeping in view; any development which can support an organization or a business in
term of decision making, coordination, control, analysis, and latest concept of E-marketing and E-
management.
INFOWORLDS TOP 10 EMERGING ENTERPRISE TECHNOLOGIES
List is based entirely on the collective judgment of InfoWorld editors and contributors. If it's
your job to concoct your organization's technology strategy and decide where to place your bets,
then our top 10 emerging enterprise technologies is for you.
10.Whitelisting Keeping: Whitelisting starts with a clean, malware-free image of a desktop orserver. Then whitelisting software is run to uniquely identify files using one or more
cryptographic hashes. Most companies distribute standard system images across the enterprise,
so whitelisting can be an extremely efficient way to lock down security.
Whitelisting requires a cultural shift. In many enterprises today, users still have some measure of
control over what they run on their own desktop or laptop computers. But due to the relentless
ramp-up in new and smarter malware -- and the increased involvement of organized crime inmalware-based attacks -- whitelisting may be our only hope in the losing battle over enterprise
security.
9. Cross-platform mobile app devices: The days of the iPhone being the only attractive game in
town are fading fast, though, as developers check out the competition. Android and BlackBerry
phones speak Java. Nokia's Symbian OS runs many languages, including several versions of C
and C++. Numerous developers look at this stew and see a common theme.
For enterprises, cross-platform app dev eliminates a key barrier to developing and deploying
mobile applications developed in-house. It's difficult to mandate that all employees use the same
Smartphone, and even if you could, coding your apps for a specific platform locks you in. With
cross-platform app dev, you can write it once -- without having to learn the quirks of a specific
platform -- and run it across many devices. At last, widespread deployment of mobile enterprise
applications may become a reality.
8. Hardware power conservation: We all know the "two kinds of green" clich: Save the planet
and save money by reducing power consumption.
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
9/20
More efficient power supplies, along with hard drives that reduce speed or shut themselves off
when they aren't needed, are delivering the goods right now. But in order to "park" inactive cores
and motherboards or other components that go to sleep, multicore CPUs generally need to be
told to do so at the OS or application level.
Power supplies are the simplest way to save energy. They need no software support and producea double savings; they waste less electricity in the AC-to-DC conversion process and produce
less heat -- reducing the power required for cooling. The 80 Plus certification program, funded
by a consortium of electric utilities, provides incentives for manufacturers to produce power
supplies that are at least 80 percent efficient, a jump from old units that went as low as 50
percent.
7. Many-core chips: The major processor vendors have hit the wall with clock speed. Chips
with multiple cores consume less power, generate less heat, and complete work very efficiently.
This era, dubbed "many core" -- a term that refers to more than eight cores -- is set to break out
shortly. Intel, for example, has already shown working demos of a chip from its Tetra-scaleproject that contains 80 cores and is capable of 1 teraflop using only 62 watts of power.
It's clear the many-core era -- which will surely evolve into the kilo- and mega core epoch -- will
enable us to perform large-scale operations with ease and at low cost, while enabling true
supercomputing on inexpensive PCs.
6. Solid-state drives SSDs (solid-state drives) have been around since the last century, but today
we're seeing wider adoption, with SSDs being used as external caches to improve performance in
a range of applications. Gigabyte for gigabyte, SSDs are still a lot more expensive than disk, but
they are cheaper than piling on internal server memory.
Compared to hard drives, SSDs are not only faster for both reads and writes, they also support
higher transfer rates and consume less power. On the downside, SSDs have limited life spans,
because each cell in an SSD supports a limited number of writes. There are two types of SSDs:
single-level cell (SLC) and multilevel cell (MLC). SLCs are faster than MLCs and last as much
as 10 times longer (and, as you might imagine, cost a lot more).
5. No SQL databases:The hottest Web sites are spewing out tetra bytes of data that bear little
resemblance to the rows and columns of numbers from the accounting department. Instead, the
details of traffic are stored in flat files and analyzed by corn jobs running late at night. Diving
into and browsing this data require a way to search for and collate information, which a
relational database might be able to handle if it weren't so overloaded with mechanisms to keep
the data consistent in even the worst possible cases.
You can make anything fit into a relational database with enough work, but that means you're
paying for all of the sophisticated locking and rollback mechanisms developed for the accounting
department to keep track of money. Unless the problem requires all of the sophistication and
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
10/20
assurance of a top-of-the-line database, there's no need to invest in that overhead, or suffer its
performance consequences.
4. I/O virtualization: I/O virtualization addresses an issue that plagues servers running
virtualization software such as VMware or Microsoft Hyper-V. When a large number of virtual
machines run on a single server, I/O becomes a critical bottleneck, both for VM communicationwith the network and for connecting VMs to storage on the back end. I/O virtualization not only
makes it easier to allocate bandwidth across multiple VMs on a single server, it paves the way to
dynamically managing the connections between pools of physical servers and pools of storage.
A single adapter resides in each server, connected by a single cable to the appliance or switch,
which then provides both network and storage ports to connect to storage and other networks.
This simplifies datacenter cabling, as well as the installation of each server. It also eases the task
of transferring adapters to another system if a server fails. Further, because the I/O virtualization
systems can emulate either multiple Ethernet or Fiber Channel connections running at varying
speeds, available bandwidth can be tailored to the requirements of VM migration or other heavyloads.
3. Data deduplication: Data is the lifeblood of any business. The problem is what to do with all
of it. According to IDC, data in the enterprise doubles every 18 months, straining storage
systems to the point of collapse. More significant, though, is that there's no expiration date on
business value. Surely here must be a way to reduce the immense storage footprint of all of this
data, without sacrificing useful information. And there is, thanks to a technology known as data
deduplication.
Every network contains masses of duplicate data, from multiple backup sets to thousands ofcopies of the employee handbook to identical file attachments sitting on the same e-mail server.
The basic idea of data deduplication is to locate duplicate copies of the same file and eliminate
all but one original copy. Each duplicate is replaced by a simple placeholder pointing to the
original. When users request a file, the placeholder directs them to the original and they never
know the difference.
2. Desktop virtualization: After Desktop virtualization, another milestone is just around the
corner: truly emergent technology in the guise of the desktop hypervisor. The desktop
virtualization technologies are applicable to your enterprise is wholly dependent on the nature of
the business.
The client hypervisor takes desktop virtualization the last mile. Picture each desktop running its
own bare-metal virtualization layer that abstracts the baseline hardware to whatever VM you
wish to push to the desktop, where it can be centrally managed, synced with a mirror on a server,
and easily replaced (or even reset by the user) when things go wrong. Citrix isn't alone with this
concept -- VMware is developing a similar solution, and both promise to hit the market in 2010.
As the blend of desktop virtualization technologies reaches a critical mass, the wide variety of
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
11/20
ways to ship a Start menu to a user offers a better chance that at least one will apply in every
instance. Certainly, if the world turns its back on fat clients at every desk, IT will be a happier
place.
1. Map Reduce: Map Reduce enables enterprises to plunge into analyzing undreamed of
quantities of data at commodity prices, a capability that promises to change business forever.IDC has predicted a tenfold growth in digital information between 2006 and 2011, from just
fewer than 180 Exabytes to 1,800 Exabytes (that's 1 trillion and 800 billion gigabytes!). This
explosion represents a challenge, of course (how to store, retrieve, and archive all that data), but
also a huge opportunity for enterprises. After all, everything in that sea of data is potentially
information -- information that could be used to guide business decisions.
In its simplest form, Map Reduce divides processing into many small blocks of work, distributes
them throughout a cluster of computing nodes (typically commodity servers), and collects the
results. Supporting highly scalable parallel processing, Map Reduce is fast, cheap, and safe. If
one node goes down, the lost work is confined to that individual node.
SALESFORCE.COM TARGETS THE SMALLEST BUSINESSES
On-demand CRM (customer relationship management) vendor Salesforce.com is an application
aimed at companies with just one or two employees. The offering is priced at US$9 per user per
month. Salesforce.com expects a ready audience for it. Many people having lost their jobs during
the recession are starting their professional lives over by forming new businesses. They need the
right product at the right price. This emerging body of entrepreneurs will see the value in having
their contact information stored in a single place and accessible through an Internet connection,
he added. Users can stock each of their contact pages with a variety of information, such as
upcoming meetings, shared documents and connections to the contact's Twitter feed and
LinkedIn profile. It is also possible to create custom fields and run a variety of prebuilt and
customized reports, such as for "neglected accounts."
MICROSOFT ADDS ACCESS CONTROLS FOR SQL AZURE ONLINE
DATABASE
Companies will be able to define, enforce policies controlling who can see what data Microsoft
Corp. is creating technology to give businesses more fine-grained control over access to datastored in the company's upcoming SQL Azure database-as-a-service. Code-named Vidalia, the
technology will provide "trustworthy data collaboration for highly-sensitive business data across
disparate trust domains. Companies will be able to define and enforce policies controlling who
can see what data at a very detailed level. It will bring a "database clone"; Users will be able to
restore their databases to any point in time. Microsoft is also working on making it easier for
-
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
12/20
users to grow and shrink their databases, so that they are not constricted in size or overpay for
storage they don't need.
ERP, CRM ON THE CLOUD: A 'SIGNIFICANT' TREND
Rather than pay someone to support a packaged application internally, cloud computing in
general allows enterprises to take advantage of applications that they can tweak to address their
specific requirements. Leveraging economies of scale, cloud computing providers can make
support costs less expensive, and it's generally less costly when it comes time to upgrade as well.
The cloud is about having a custom-developed application versus something everybody else is
packaging. In the meantime, the open-source cloud computing approach is more of a hit among
small companies and startups, which Forrester Research says are the main users of cloud
computing at the moment. They don't have a complicated infrastructure of IT investments to
manage. There are concerns about a lack of control over the data and about security. However,
cloud hosting companies maintain that security is one of their core competencies. But there will
be more of a movement toward on-demand, open-source cloud computing if the open-source
vendors have reseller agreements with hosting providers to redistribute the code.
VIRTUALIZED INFRASTRUCTURE
Microsoft and data storage company NetApp Inc. going for Virtualizations; the two companies
will collaborate to deliver technology that includes virtualization, private cloud computing as
well as storage and data management. For data center administrators that will mean a moretightly consolidated view for managing both server and storage infrastructure. This will move
toward enabling better management of public and private cloud infrastructures, where -- once
virtualization is well established -- workloads can be dynamically moved around for better
utilization of assets. It's no longer about thinking about workloads tied to specific servers, and, of
course, storage plays a big role in that whole model of private cloud.
GOOGLE GOES AFTER ENTERPRISE WITH GROUPS APP
The company is launching Google Groups for its Google Apps Premier and Education Edition
users. Employees can use these groups as mailing lists, but they can also share documents,spreadsheets, presentations, calendars, videos and sites with groups, instead of many individual
recipients. By unveiling applications for the enterprise, Google has the opportunity to not only
move into the lucrative enterprise realm but to sock it to Microsoft at the same time. This past
summer, Google unveiled the Google Apps Connectorfor BlackBerry Enterprise Server in
another move to make its hosted applications more attractive to business users.
http://www.computerworld.com/s/article/9138649/Defining_Cloud_Security_Six_Perspectiveshttp://www.computerworld.com/s/article/9137060/Microsoft_Update_Latest_news_features_reviews_opinions_and_morehttp://www.computerworld.com/s/article/9132538/Google_targets_business_users_with_BlackBerry_connectorhttp://www.computerworld.com/s/article/9132538/Google_targets_business_users_with_BlackBerry_connectorhttp://www.computerworld.com/s/article/9137060/Microsoft_Update_Latest_news_features_reviews_opinions_and_morehttp://www.computerworld.com/s/article/9138649/Defining_Cloud_Security_Six_Perspectives -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
13/20
CLOUD SECURITY SERVICE FROM WEBROOTLOOKS FOR MALWARE
Web Security Service; can now monitor for signs of malware-infected corporate computers
trying to "call home" for more instructions a common practice among criminally run bonnets. If
the cloud-based Webrootservice detects malware such as bonnet code calling out to get
instructions or otherwise perform an activity, it will block that request, though not all traffic onthe user's machine. The Webrootservice would then notify the systems administrator of the
security event via e-mail and the Web-based administrative console where reports can be
obtained.
OPERA 10
The venerable browser's latest version introduces several innovative interface ideas, some more
useful than others. In benchmark tests, Opera 10 performs respectably in the middle of the pack
when compared to other browsers. In a CSS test, Opera scored 152 milliseconds to Safari's 35
ms and Firefox's 361 ms. And in Web standards, Opera 10 earned a perfect score of 100 on the
Acid3 rendering test, and rendered all 578 selectors in a CSS3 compliance check.Opera 10unveils an impressive number of new design elements, although some are more pretty than
practical. Visual tabs, for example--drag down the tab bar to reveal thumbnail images of each
open page--look nice, but seem to add little usefulness.
EASY EMAIL ENCRYPTION
It provides about an easy a way to encrypt communications as you'll be able to find--as long as
the receiver has a copy of the program as well. To encrypt a message that you want to send, copyit into the program, tell the program to do the encryption, and it copies the garbled, encrypted
text to your clipboard. Simply copy the encrypted text into an email message and send it along.
The recipient can then copy the encrypted text to their Windows clipboard, and have Easy Email
Encryption Lite decrypt it. That requires, though, that both sender and recipient agree on the key
to use. You can use keys of between 16 and 64 characters, and the longer the key, the more
secure will be the communications.
FIRESHOT
Lets You Capture, Annotate Web Pages If you need to take screenshots of Web pages--and annotatethem and send them to others--you'll want to immediately download FireShot (free). This
excellent Firefox add-in is the best tool I've yet seen for capturing and annotating Web pages.
You can use a variety of annotation tools for marking it up, including drawing tools, shape tools,
text tools, pointers, the ability to add graphics and more. FireShot has plenty of useful options
and features, such as integration with your e-mail software to immediately e-mail a captured
page.
http://acid3.acidtests.org/http://www.pcworld.com/downloads/file/fid,81246-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,23160/description.htmlhttp://www.pcworld.com/downloads/file/fid,23160/description.htmlhttp://www.pcworld.com/downloads/file/fid,81246-order,3/description.htmlhttp://acid3.acidtests.org/ -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
14/20
ACORN 2.1
Acorn allows you to save your image as a JPEG, GIF, or PNG while previewing the results side-
by-side with the original. Save options also include familiar formats such as TIFF, BMP, and
Acorn's own proprietary file format. The only thing I found lacking is the ability to save a
layered screenshot as a PSD file; but with plenty of image-editing capability built in to the newversion, it's not really necessary to export anything into Photoshop.
E-MAIL CAMPAIGN SERVICES
Emma e-mail marketing service handles almost everything except your specific message content.
The company designs an e-mail template based on your preferences, website, and logo. So for
future mailings, you can just change the text for a new message. Emma imports your contact list
as an Excel spreadsheet file. Even better, the service cleans up bounced addresses and duplicates
automatically, saving you time from culling the database. Additional features can target
recipients based on their geographical location or alert you if your message seems likely to
trigger spam filters.
http://www.myemma.com/http://www.myemma.com/ -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
15/20
NEW ARRIVALS IN 2009
Here we discuss new arrival in 2009 of software and hardware; which may affect the Management
Information System. Most of the software technologies are about the Management Information System
and Customer Relationship Management and other mainly discuss the coming desktop application also
considering the importance of Internet in future so online technologies are also described briefly mainly
for business. Keeping in view; any development which can support an organization or a business in term
of decision making, coordination, control, analysis, and latest concept of E-marketing and E-
management.
MIDDLEWARE FOR CORPORATE MOBILITY
Some software makers claim that by partnering with wireless specialists to develop their
systems, they are selling more licenses to end users today. At the core of enterprises' strategy is
its own Mobile CRM software module, which it also sells as a stand-alone product. Having spentyears developing the right mix of features and formats for pushing business applications such as
sales force automation (SFA) tools to mobile devices, the company claims it is accelerating the
pace with which its partners can offer wireless applications to their customers. The middleware
model is becoming so pervasive that some applications vendors have moved to acquire providers
of the technologies. Customers agree that the middleware-bred mobile systems are getting the
job done well. The response has been really strong as these systems have worked so well. Now
our salespeople can truly have constant connectivity, which is a huge advantage in terms of them
not having to replicate information.
CONNECT TO CUSTOMERS WITH E-MAIL MARKETING
To help you manage e-mail marketing effectively, e-mail marketing services deliver help you
organize your contacts, track readership, and evaluate their interest in what you're sending out.
You'll build a newsletter template, import and manage the contact list, send messages, and audit
results. Many services can fill this role, and they all share many similarities. Here are a few good
e-mail marketing services to check out. If you want to try your prospects without paying,
consider the free version ofMailChimp to manage lists of 500 customers or fewer. JangoMail
can connect to your contact databases directly from your mail server, streamlining the process by
avoiding the exporting step to bring in new e-mail addresses.
PEERBLOCK HELPS YOU SURF THE WEB IN SECRET
They're lurking out there--sleazy spyware companies, unscrupulous advertisers, and just people
you don't want looking at what your computer is doing.PeerBlockdoes a huge amount of the
work for you, by providing several frequently-updated lists of host addresses. Getting the most
http://www.mailchimp.com/http://www.jangomail.com/http://www.jangomail.com/http://www.mailchimp.com/ -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
16/20
out ofPeerBlockrequires a little bit of technical savvy. It is easy to add new block lists, or to
unblock a particular range of addresses for a short period, or forever.
SNOW LEOPARD..WINDOWS 7
Both Apple and Microsoft have been chasing 64-bit computing as if it was the Holy Grail -- and
in some ways it is. 64-bit computing opens a lot of doors for hardware and software developers.
Because 64-bit processors have twice the number of registers to work with, they can process
twice as much information as per clock cycle as 32-bit processors. That obviously means much
better performance. Another big advantage to 64-bit computing is addressing memory. In
Memory-hungry applications; that performs complex and data-intensive tasks (such as high-end
graphics, video, or scientific computing tools. In fact, 64-bit computing even offers some
additional security because the routines used to interact with the processor are more secure than
in 32-bit computing. What's more, the system heap (which is shared memory available to
applications) is designed with both hard protections and stronger checksum algorithms that helpprotect against attempts to corrupt the addressable memory used by the operating system and
applications.
NOVELL'S SUSE LINUX ENTERPR ISE DESKTOP 11: A TRUE WINDOWS
REPLACEMENT
Linux SLED 11, which was released on March 24, stands above its competitors because it works
and plays well with existing Windows business networks, data files and application servers.
Installation is a snap. Inserting the DVD and following told the install program to do its stuff;
the process will be over in a few minutes. Hopefully, that deal will go through, because SLEDran flawlessly on all three PCs. It had no trouble working with a variety of Wi-Fi and graphics
cards. SLED, with all of its Microsoft integration, isn't a Linux for free software purists. But it is
a desktop Linux distro that makes a fine drop-in replacement for Windows at most offices. It is
because there are some things that Windows users take for granted, such as being locked into
Microsoft's document formats; there are security threats that could destroy a business. If you
want Windows compatibility, but you'd prefer a cheaper and more stable and secure alternative,
then SLED 11 is the desktop operating system for you.
FAVBACKUP
Personal settings and data such as bookmarks, history, cookies, and saved passwords are
essential to productivity. FavBackup(free) recognizes the importance of such data and offers an
easy and comprehensive way to back it all up. Perhaps even more useful, you can use the
program to migrate settings to a browser on a different computer. The "Backup" option allows
you to choose which items you want to save for a specific profile, while "Full Backup" saves all
http://www.pcworld.com/downloads/file/fid,81391-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,81391-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,81391-order,3/description.html -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
17/20
settings for all profiles. FavBackuppackages everything into a neat .dat file that is easily
transported and stored.
PRIVACYCHOICE OPT-OUT
Ad networks and Web sites constantly track your behavior as you surf the Web, recording what
sites you visit, what pages you visit on sites, and what kind of content you like to view. In
business it is very dangerous trend for leaking out the information so solution is:PrivacyChoice
Opt-Out, which lets you stop more than 100 companies from tracking your behavior. Install the
add-in, then choose Tools-->PrivacyChoice Opt-Outs in Firefox, and you'll be sent to a Web
page that lists more than 100 companies and Web sites that track your behavior, and from which
you can opt out. You can find information about each Web site, such as whether it shares
information about you with partners, whether you are anonymous when you visit the site, and so
on. On the Web page you can then opt out of all of the companies, or only the ones you select.
http://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.html -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
18/20
PROBLEMS IDENTIFIED IN CURRENT SYSTEMS
Now we focus on the some of the problem identified in the software and hardware; which may affect the
Management Information System. Most of the software technologies are about the Management
Information System and Customer Relationship Management. Keeping in view; any loop hole which can
affect an organization or a business in term of coordination, control, & security.
MOBILE DEVICES EXPOSE NETWORKS TO SECURITY THREATS
The latest IT security threat plaguing the corporate office is actually clipped to the belts and
purses of a company's mobile workforce. Wireless devices that can send and receive e-mail --
Blackberries, Windows Mobile-based phones or other smart phones -- are emerging as serious
corporate threats because they have become so advanced and widely used, yet are so thinly
secured, that cybercriminals are targeting them as a path to corporate data, say security experts
and vendors. There have been cases of viruses and other nasty things that can be done to mobilephones that have not really been serious yet, but they will be. One is text-messaging spam, or
quick Short Message Service (SMS) messages that mobile phone users receive directing them to
a Web site where the sender is selling something, or in more sinister cases to a site that captures
personal or financial information. This particularly annoying form of spam has been around for a
few years, but hasn't been prevalent in the United States since text messaging is not as popular
here as in Europe and Asia.
Because an employee's mobile device -- often issued and approved by the corporate IT
department -- is open to such threats, so is the entire network when the employee connects to the
company's Exchange server or enters data into a CRM application from the handset. People trustthese devices, they say 'I got it from my corporate IT guys, so it's got to be secure but attackers
always look for the highest return from the least-known back door.
BAD SOFTWARE DESIGN INHIBITS USE OF ENTERPRISE APPS
The new book, Wrench in the System (Wiley), takes a scathing look at business software
development practices, especially the products ofenterprise vendors. "Software manufacturers
are generally confident that their products will succeed on the strength of their technology." But
products that don't appeal to their users can be self-defeating. Whenever software systems create
obstacles-technical jargon, ambiguous messages, illogical sequences or visual clutter-the peoplewho use these systems will respond in a variety of ways. That typically includes undesired
behaviors that users (and CIOs and applications managers) know all too well-frustrating and
inefficient workarounds, complete disregard for business process.
http://www.wrenchinthesystem.info/http://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/blogs/enterprise_software_unpluggedhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/blogs/enterprise_software_unpluggedhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://www.wrenchinthesystem.info/ -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
19/20
THE PROBLEM WITH MATURE ERP SYSTEMS
Most CIOs today have inherited mature ERP systems implemented by predecessors, over which
they have little to no control as the years pass, the original implementation team disbands, retires
or dies, and the old use cases and best practices start to brown and curl at the edges like the
sepia-tinted photos of yesteryear. Like tectonic plates adrift on a sea of magma, ERP instancesand the businesses they serve are bound to drift apart over time ordramatically collide with
earthquake-like consequences.
Further complicating matters is that while spending on ERP has grown at the rate of 6.9 percent
each year, so too has dissatisfaction among end users with those enterprise applications,
according to the Forrester report. In other words, ERP is a lose-lose scenario. Several challenges
that cause end users, software vendors, consultants and systems integrators to struggle with ERP
Business really does evolve faster than users can recast the 'silicon cement' of ERP using present
technologies and practices. The main problem is to find in one body of experts knowledge both
of the business reasons for the modifications and of the true capabilities of the vendor's newrelease.
http://www.cio.com/article/40323http://advice.cio.com/thomas_wailgum/what_netbook_fans_and_frustrated_erp_customers_have_in_commonhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/5_ways_to_excite_the_generals_and_the_troops_about_erphttp://www.cio.com/article/499620http://www.cio.com/article/499620http://advice.cio.com/thomas_wailgum/5_ways_to_excite_the_generals_and_the_troops_about_erphttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/what_netbook_fans_and_frustrated_erp_customers_have_in_commonhttp://www.cio.com/article/40323 -
7/28/2019 Identify latest developments in MIS regarding Softwares in 2009
20/20
REFERENCES
http://www.networkworld.com
http://www.salesforce.com
http://www.computerworld.com
http://www.pcworld.com http://www.advice.cio.com
http://www.infoworld.com
http://www.wikipedia.org
http://www.apple.com
http://www.ibm.com
http://www.microsoft.com
http://www.economist.com
http://www.networkworld.com/http://www.salesforce.com/http://www.computerworld.com/http://www.pcworld.com/http://www.advice.cio.com/http://www.infoworld.com/http://www.wikipedia.org/http://www.apple.com/http://www.ibm.com/http://www.microsoft.com/http://www.economist.com/http://www.economist.com/http://www.microsoft.com/http://www.ibm.com/http://www.apple.com/http://www.wikipedia.org/http://www.infoworld.com/http://www.advice.cio.com/http://www.pcworld.com/http://www.computerworld.com/http://www.salesforce.com/http://www.networkworld.com/