Tuesday, February 28, 2012

Resources for Development

Development Cycle

Development is unthinkable through 'government only' efforts owing to the limitations of resources, outreach and continuity. Though all of us in our own capacities are doing a great job for change in our spheres but tend to be doing so in isolation most of the time. It takes away the true potential of our individual contributions- No one can do it alone.

Human Resource Software

Development cannot be deemed as an isolated event; in fact it is a complete life process of individuals and communities. One part is linked to the other- Education to livelihood to healthcare and that to better choices, capacity to pay and the true growth and development. For example, On one hand poverty takes away capacity to pay and on other the poor communities are not lucrative markets; like education is value addition to overall growth while resources are essential for quality education and ill- health is the mother of depressed productivity and healthcare always has a price tag, so one is connected and dependent to the other as a continuous life process. The cycle of development has an inherent continuity and that is why it cannot be segregated into commercial and non-commercial or for-profit and not-for-profit or even social development and market growth.

The idea that development is some government or 'NGO' job only takes away its amplifying continuity. Hence the paradigm of multi-sectoral engagement and action for sustainable development requires change. It means further obliteration of the traditional gap between commercial and non-commercial entities. It also means understanding the 'true profits' and directly connecting the same with sustainable development. The paradigm change also encourages that the social sector should invite more of 'business-like' thinking and skill set. Likewise the commercial sector should struggle more to inculcate skills for sustainable/ dependable market development.

Resources- Financial and Non Financial

The above perspective also offers an eye to see a 'resource-strength' in everything and everyone around us. However it is important to understand that Man, Money, Material and Time are earned through exchange of value. Creating tangible/ measurable value is the trick of this multi-sectoral engagement. Let us see what this value exchange means.

People derive satisfaction from what they do and the source of this satisfaction is not money only. The argument is supported by the fact of ever increasing volume of volunteers regardless of recession or growth in the markets. This region still has to go a long way to capitalize on the value of volunteerism. Reforms in the Human Resource function are pivotal to add value to volunteerism. Voluntary time and skill contribution needs more structuring in terms of input/output, tasks and credentialing. The volunteerism must assume a very important place in all human- resource evaluations. Placement interviews should give more weight-age to voluntary contributions and volunteer work. It means creating measureable value for people to contribute their time, skills, energy etc.

Likewise the money contribution in the social projects is mostly seen by corporate as going into waste or non-core activity with no or immeasurable returns for their stakeholders. This requires forging partnerships that can tangibly demonstrate to have positive impacts on bottom line along with sustainable outcome for the served communities. For example the organizations those work for improving healthcare of children and those that are in the business of producing and selling services/ products for children are natural allies. Projects can be built between the two to address the underserved on one hand and create opportunities for livelihood and growth on the other. Thus service and business can get along and social impacts and profits can become flip-side of a single coin if value is shared.

Though financial resource is very important but the non-financial resource is most sustainable. Undoubtedly both are essential for effectiveness and sustainability. Openness and understanding that individuals and organizations carry some strength, and that they are willing to share the same, can create mutually beneficial alliances and partnerships. Like media can offer free space and time, pharmaceutical free or discounted medicines, computer software companies the training and software so on.

Finally in the given competitive environment developing regions have already been left behind in the agriculture and industrial market functions. At this critical juncture, the knowledge revolution could offer an opportunity and alternative model of human economic and social progress. Hence in the context of resources for development knowledge can be enlisted as one of the important element besides Man, Money, Material and Time.

NEW ALLIANCES- Participation of strength

The change and development agenda has to start from individual, from institution, from organization and thus from the society. And it is always short of achievements until the efforts of government are supplemented through recognized and effective forums. The magic of sustainable partnerships lies in the right recipe of participation of strengths.

There are organizations that have enormous potential to catalyze change within their immediate neighborhood given their financial and non-financial strengths. Likewise academia has lot to exchange in terms knowledge, skill and research. Development without an effective voice will always face lack of interest and participation. Therefore Media has a vital role to play in this mix. Thus to enhance the true potential of change for development an integrated and structured approach to combine these forces and pool the strengths is essential.

Resources for Development

Monday, February 27, 2012

Virtual Machine: Reasons to Have One

You may still be thinking about where getting a virtual machine for your business solution is worth the price you have to pay. Most companies who are using a virtual machine technology in their system say that their processes are now more manageable, reliable and have saved them money too. To give a heads up on what a virtual machine does to your system, here are some of its features.

Isolating Processes
Isolation is one of the benefits of using a virtual machine. In a usual business processing system setup, all processes run together in one computer. This is good if all your processes are running well, but what if one of those processes suddenly hangs or messes up, then the other processes you are running will be affected. This is the beauty of this machine is it will make all your processes independent from one another yet, still running form one machine. Thus, isolating the process failure will not affect those processes that are running smoothly and you can still continue your operations.

Human Resource Software

Uniform Hardware
With virtual machines, your hardware is all standard. This standard platform is what will reduce the costs and will increase your IT resources. Your host machines will be different but your virtual machine will be the same in all your machines.

Consolidating Processes
A virtual machine will help you consolidate all your processes into one computer. You can now manage it easily and save on hardware costs. However, with consolidation, you are more prone to having system failures since everything is ran from a single hardware. What you can do is get another physical machine, where both machines can monitor each other. If there is a system failure, the other machine can take over. However, you shouldn't get more than two physical machines. Remember, machines are cost-effective and they should not make you buy more physical machine to handle the processes. You will be able to save on electricity as well.

Testing Capabilities
Another benefit of this machine is that you can run tests on it and you can simply stop and roll back. You can now take snapshots and perform the test you like and easily roll back to where the system stopped. Test will include installing new software, configuration changes and the likes. This is a good feature for software since you can see what will happen if ever you change something. If something bad happens, you can easily roll it back.

Easy Transfers
Transferring a virtual machine to another physical is really easy. Only a single file represents the entire guest environment that is why it is very mobile. These are just some of the reasons why you should get a virtual machine in your office. It will really help smooth out your business processes and will save you on costs. In the daily business processes that take place, you can never be too sure that nothing wrong will happen, computers are computers and they are still subject to human control. So if you want a more manageable solution, get a virtual machine.

Virtual Machine: Reasons to Have One

Sunday, February 26, 2012

What Is SAP Access?

SAP is basically a software provider that generates the third- highest revenue among software service providers the world over. It stands for "Systems, Products and Applications in Data Processing". It provides business solutions to six industrial sectors like process industries, discrete industries, service industries, financial services, consumer industries and public services. It has dedicated more than 25 industry solution portfolios that deals with huge business concerns and greater than 550 solutions for smaller businesses.

SAP owes its success to the fact that it is more flexible, open and adaptable to different web-based and software-related business activities compared to many other counterparts. As reliable sources say, it comes out as the only software service provider that not only provides solutions to complex business issues but help businesses develop their own solutions too, by supplying them the required technology.

Human Resource Software

The major products in SAP include SAP ECC (used in Enterprise Resource Planning), CRM (Customer Relationship Management), PLM (Product Lifecycle Management), Supply Chain Management (SCM) and Supplier Relationship Management (SRM). Products like the Netweaver platform, Governance, Risk and Compliance (GRC) solutions and Performance Management solutions are also popular.

SAP IDES (Internet Demo and Educational System) is a type of SAP system that guides the users about SAP implementations as it has already been configured. IDES has been developed for a large number of SAP applications like APO IDES, CRM IDES, and BW IDES. It also provides insight about the SAP system integrated applications. IDES takes care of many facets of a business concern including Overhead Management, Product Cost Analysis, Profitability Analysis, Human Resource, Planning and Production. Third party CAD systems have also been integrated within the IDES, which means that CAD drawings can also be accessed within the system.

SAP training is provided online to help the consultants improve their existing expertise or learn the software if they have not done so as yet. Online training is quickly getting popularity so much so that many universities have also opted to get these services for their students.

In order to get online training, SAP access to SAP's educational environment (IDES) is required. Since the SAP software uses TCPIP as the network communication protocol, the SAP can be accessed over both LAN and WAN with equal ease. While accessing SAP software, there are some technical requirements as well. The prime among these is that SAP GUI is most compatible with Microsoft Windows 32-bit Operating Systems (Windows NT, Windows 2k, Windows XP and Windows Vista). Minimum requirements are 1GB RAM along with 3GB Hard Drive space. Virtual ports of different types are used for communication over the internet, such as port number 80- allocated for browsing, email clients use port number 127 and Simple Mail Transfer Protocol uses port number 25. The configuration of most common virtual ports is already done in firewalls, but for SAP GUI, the virtual ports need to be opened manually, owing to its uncommon nature.

After SAP access has been ordered, an automatically generated email is received that gives SAP connection and SAP GUI download information. While the SAP GUI is installed, the SAP user ID is being set up. After that, you would receive user ID and password via email.

What Is SAP Access?

Saturday, February 25, 2012

Asset Management Software

Asset management is the management of a company's assets by a team dedicated entirely for this purpose. The company's assets, apart from its capital portfolios, also involve its infrastructure, plant, property, and human resources.

Now, consider a scenario in which these assets have to be managed manually. These will involve some disadvantages. First of all, the chances of human error increase, not to mention the consumption of the time of the professionals involved. This in turn means waste of resources and also the resulting inefficiencies that slow down business returns.

Human Resource Software

The answer to this problem lies in asset management software. The software is designed to keep a track of the company's assets, provide for analysis, and thereby prove an effective tool in managing a company's resources. In other words, asset management software helps to keep track, monitor and analyze business processes and resources. It automates the work processes that were previously manually done. This, in turn, helps to speed up the work and minimize errors.

Another advantage is that people who are involved in manual file management can be diverted to more productive work. Also, skilled professionals will save time in searching for required data. This results in the optimum utilization of resources, thereby adding to the productivity of the company.

As said, asset management involves the management of all assets in a company by a professional team. Now, to manage these assets, the team first of all needs to know what the assets of a company are. This is where the role of the asset management software comes in.

The software can keep a track of an asset. This includes its initial purchase value, running costs, service costs, depreciated value, and upgrades. The team can then use this information to assess the present value of the asset. The information can also help the company charge individual departments for the usage of that asset. The current value and condition of an asset can also help the procurement department of a company in that the people can decide whether the asset is in a usable condition, needs upgrades, or needs to be replaced altogether.

Asset management software is an effective tool for a company to manage its assets, analyze data and arrive at business decisions. The asset data is placed in a central easy to access repositories. The individual departments can access it through the company's intranet. The accurate data, accessed at a click of the mouse, can lead to more effective decisions and also a better management of a company's assets.

Asset Management Software

Friday, February 24, 2012

The Art of a Presentation

There is always the opportunity for a Presentation

Presentation is a generic term that includes every time someone tells something. It could be a formal presentation to boss and colleagues with the support of technology or can be a story told to friends in a pub. Considering the actual crisis, it could also be a presentation of a job seeker to the Human Resources department of the ideal company. Or a salesperson who has to convince a customer that is product is the best in the world, even it is not true!

Human Resource Software

In every situation, the following elements should be mixed and used in different proportions, but every time it is important to use them. One of the best public speaker is Steve Jobs who is able to use some features to create an effective presentation. In this article there are highlighted the most popular secrets (most popular and secrets?!?) that are used to present our story, whatever it is.

First of all, it is normal to see persons who are great to tell stories, and then they are not able to say a single word when the boss comes. Or people who could sell a refrigerator in the North Pole, but they are not able to talk to a girl. The good news is that everybody can learn how to do a convincing presentation. To have a prove of that, just check Steve Jobs in his presentation at the university talking about his life and health diseases, where everyone was crying full of emotions and his first presentations decades ago, where everyone was crying but for the horror! After that, everyone can fell better.

Generally a couple of messages should pass in a presentation: to inform and to entertain. So it is important to consider what it is said as well as how it is said.

Plan the story

The first step is to be prepared. Planning the plot of the story with analogical support give the possibility to be check the single parts of the story. To do that, software supports are useful but paper and pens, pencils with different colors and mind maps are much better. The explanation goes more in the mind that is more stimulated the emotionalpart. Planning a presentation gives also the possibility to insert into it all the possible elements to get the audience attention active. This is the time when it is possible to consider the use of demonstrations, video clips, slides and every other external elements.

The main message

Presentations are used to be remembered by others, therefore the main message should be clear and easy to remember. To do that a short message is more influenced. TV spots usually use this approach and some short sentences from the advertisements are commonly used in the normal life. Just think few minutes and you will be able to think a lot of them. The characteristic they have in common is they are short. We can compare the length as an sms or a Twitter message. Even if your message will not be told by thousands of people, it must be associated to what you want to say. "The world's thinnest notebook" fits perfectly to MacBook Air.

The story

Like comedians or writers, a presentation is about a story that needs a hero and an antagonist. In this way the listener can identify himself/herself with the hero and can fell the possibility to fight against the evil. Again, just think to some movies to have a clear example of that. Steve Jobs used IBM as the antagonist in one of his presentation, and Apple was the new force that could save the world.

Audience benefits

The message must have a benefit for who is listening. It could be the best presentation, but if the public is not interested in it, no one will listen. Therefore, the message should be tailored around the audience, and in particular around the benefit they can get out of that. It is not interesting for customers that the iPhone can make Apple incredibly reach, popular with a huge market share (that's more important for Apple management). Customers can be attracted by the benefit for them that the iPhone is twice as fast at half of the price.

Rule of the three

Once again, writers use to divide their stories into three parts. It helps to keep the attention high and it is a good number to remember. Steve Jobs used this rule in his presentation about his life and everybody can remember those three stories.

Logical plus emotional

It depends on the audience, of course. In any case, a good mix of both should be used. Everybody is impressed by numbers and rational facts, and the emotional factor is usually the winning one. The presentation should convince the others with facts: for example our product is the fastest. And customers must have a good feeling about that, or about us. Sometimes a pair of jeans is nice but we don't buy it because the clerk is not polite. Even more, Steve Jobs likes to sell dreams, not products. It could be like Martin Luther King. In any case, it works and it is easier to remember. An example could be: "in our own small way, we are going to make the world a better place".

Visual impact

Words are important and images can communicate lots of them in one moment. Even more, a picture can evoke different feelings in the audience. Is the Apple Macbook Air incredible thin? A picture with the Macbook fitting into an envelop is much more powerful. And easier to remember: it has more impact.

Numbers for the audience

Numbers are important because they access to thelogical part of the mind. In any case, they must beadapted to the audience. 220 million iPods is a meaningful number for sales, not for the customers. 73% of market share for iPods gives the customers the feeling they are buying the most used product in the market. No number is right or wrong in absolute: it simply depends on the audience.

The emotionally charged event

In every presentation there should be the most important moment, the one everybody will remember. It must be introduce with a sense of suspense and then the main message should be launched. Prepare your audience to listen to it, or to see that.

Practice makes it perfect

Training is the secret of everything. The first time could be fine, the next will be better. Steve Jobs is the example of that.

Conclusion

Every time there is the possibility to show a presentation. It could be a story or us or our product, whatever. We should be ready to that moment and keep the attention high. Some rules are useful to frame our presentation in a way that will be better remember by the audience. That's a challenge, but everyone can improve himself/herself getting great results.

Link:

Steve Jobs video at Stanford: http://www.youtube.com/v/UF8uR6Z6KLc.

The Art of a Presentation

Thursday, February 23, 2012

Test Their Mettle! A Review of the Cognitive Processes Profile Assessment

Have you ever thought about how a potential job candidate would handle complex problem solving in the heat of the moment? Or wondered whether or not they would be able to solve new challenges as they arise? Maretha Prinsloo, a South African psychologist wondered the same things and came up with an assessment that allows hiring managers to test a potential job candidate's problem solving skills before investing a lot of time and money in the onboarding process. She developed the Cognitive Processes Profile or CPP for short.

According Dr. Prinsloo, "The CPP is an advanced computerized assessment technique, designed to measure thinking processes and styles and to link these to everyday cognitive functioning. Using simulation exercises, subjects are monitored on their ability to explore, link, structure, transform, remember, learn and clarify information. The results are linked to job-related performance. The idea behind the CPP is to move beyond the concept of general intelligence as popularized by the IQ paradigm. The CPP therefore measures a number of information processing constructs in an integrated fashion."

Human Resource Software

There are many advantages to using the CPP when assessing a potential job candidate's suitability. A particularly nice feature about the CPP is that it is a valid test to use cross-culturally. This is because the CPP uses symbols rather than words or numbers, which may introduce cultural bias.

Another noteworthy feature is that the CPP can help organizations identify employees or job candidates who might have the "VUCA gene". What is VUCA? I am sure you are familiar it - even if you have never heard the term before! It stands for Volatility, Uncertainty, Complexity, and Ambiguity. If you are doing business in today's environment you are probably experiencing your fair share of VUCA.

The military (who specialize in acronyms) use VUCA to describe the hostile conditions soldiers often face in the field when they are making life or death judgment calls. But business leaders and managers too are facing VUCA like conditions in these volatile and uncertain times. In an unforgiving market, getting judgment calls wrong may mean the difference between the life and death of the business.

Some people seem to have an uncanny natural ability make good judgment calls, otherwise known as the "VUCA gene". They seem to see through the clutter and consistently choose the right course of action. If you could only bottle this skill you would make a fortune! Unfortunately this is not possible, however an alternative would be to hire or promote people with the "VUCA gene". Knowing who has the "VUCA Gene" and who does not can help you make more effective hiring and promotion decisions. After all, VUCA conditions are unlikely to disappear from the business horizon any time soon. The CPP can help find job candidates or current employees with the "VUCA Gene."

Though this tool may prove extremely valuable in finding the right person for the job, it does have a few, minor draw backs. The first drawback deals with the accessibility of the assessment. The tool in not internet based so test takers must take the test on a computer that houses the software. Additionally, this test must be proctored. This is a minor draw back as it does not promote flexibility or convenience for test taker. An additional drawback to the tool is that the entire assessment takes approximately 1.5 hours (on average) to complete! One wonders if fatigue may set in at some point and skew the results.

Regardless of these minor drawbacks, the CPP is extremely useful in the hiring or promotion process and is a valuable arrow in the hiring manager's quiver.

Test Their Mettle! A Review of the Cognitive Processes Profile Assessment

Tuesday, February 21, 2012

Photo Loss Due to Corrupt Media

Technology has made our lives simpler and easy accessibility and utilization of the IT and IT enabled resources has widened our vision and perceptions towards life. Digital cameras bring alive our memories that lie buried in the rubble of time. Besides promoting a feel good factor, photos provide a refreshing change and rejuvenates our senses and very being.

Just imagine if all the photos that you have so carefully taken and preserved over the years gets deleted in one stroke. That is a heart-rending experience for anyone and no amount of compensation can bring back the priceless memories that lay trapped in those photos. Many a times we use the pen drives for transferring the photos from the Digicams to the computers.

Human Resource Software

The most common occurrences that lead to the deletion of photos are few but fatal.

The pen drive is pulled out while the write process was on.

Corrupt media

Indiscriminate switching of media between computers

Majority of the problems in most cases is human induced and can be effectively safeguarded against if a little precaution is taken while handling the media.

The ideal process that can ensure safety and security of your photos is allowing the writing process to complete fully and not pulling the card out before it has been performed. After the completion of the writing process, it is quintessential to right click on the tab (showing the USB flash) and click on the option that asks for a safe hardware removal command. In most cases, we refrain from taking so much of pain and end up resorting to the easier option that entails simply pulling out the pen drive from the port. This is detrimental to the life of the media and can eventually lead to its corruption thereby rendering all photos stored in it completely inaccessible.

If you are still to encounter this situation, then you must count yourself among those lucky ones whose photos have not suffered deletion but if you can identify with the above discussed data loss situation, you still have hope.

Photo Loss Due to Corrupt Media

Monday, February 20, 2012

Benefits of ERP - Enterprise Resource Planning Software

Enterprise Resource Planning (ERP) software system helps in integration of all the major functional units of an enterprise in a singly unified system. This enables a free flow of information and communication, which helps in quick decision making leading to increased productivity and better profit margins of the business organization.

ERP software system provides the reliability and fast operations in a well coordinated manner. Organizations can opt for stepwise implementation of ERP through the different modular packages to avoid huge one time expenditure. Moreover, the requirements of organizations vary and in that case the modular ERP software is very useful to satisfy the specific requirements.

Human Resource Software

Many small and big enterprises are implementing ERP software system with an objective to take up new challenges in the ever changing world economy, and to stand out from the rest in the competitive market.

ERP installation and implementation requires lots of expertise planning involving huge costs. But the beneficial aspects of this software system outweigh the investments in the long run.

The benefits of ERP can be summarized as follows

1. ERP software is much sought after package in the business world due to the flexibility of operations that caters the needs of all kinds of business like manufacturing, healthcare, government sectors, IT sectors and many more.

2. The main benefit of the ERP system lies in the free flow of data and information and easy scalability. Anybody can access the data from any point, which hastens the production of the manufacturing unit.

3. ERP offers various packages that support the sales and marketing, customer relationship, human resources, keeps track of inventory, production and distribution of an organization.

4. It updates the current status of the inventory and maintains communication between the supply chain management in the retail stores. It maintains records of order books of the customers, inventory and purchase.

5. ERP integration includes all the vital steps starting from planning and marketing to the production, sales and supply of products including the logistics.

6. This software is very effective in asset management of an organization and minimizes the cost and errors through the optimized use of the assets. Deployment of the right person to the right job and keeping track of their performance is another vital beneficial aspect of ERP.

7. ERP provides the best customer services by immediately attending the customer queries and with timely delivery of products. It aids in resolving the customer payments well before the scheduled deadline.

8. ERP offers a complete solution for all the business purposes, which can function globally crossing all geographical boundaries.

Benefits of ERP - Enterprise Resource Planning Software

Sunday, February 19, 2012

Think and Assimilate Thoughts and Objects - The Future Will Be Grand

It has often been said that the human mind only uses about 10% of its ability. In fact, Einstein made some interesting comments about this, and although they are pretty funny when you stop to consider it, he may actually one day be proven correct, not by percentages, but in theory. Still, I have a question as to, not the ability of the human mind, but the resources it needs to function at its highest levels.

That is to say that the human mind requires a lot of nutrients, energy, and focus to work beyond its 10% level. If of course, this hypothetical 10% is the actual figure. You see, without a good amount of rest and relaxation, proper food supply, and brain exercises, the human brain does not have the stamina or ability to work at higher levels for very long because it takes too much energy.

Human Resource Software

And if it worked at the highest levels, it would rapidly deplete all the nutrients, and then it would need to sleep. But what if the human mind could use 100% of its ability, for a long period of time, it would be rather excellent. If it is true that there is 90% of the brain which is not being used, but is accessible, then perhaps the human mind could rearrange molecules, "will" events to occur, and even assimilate objects.

Perhaps, it could think beyond time, through multiple dimensions, and do quantum physics calculations as fast as the computers that humans are now designing. But, even if we can't get the human mind to do this, knowing that it may be possible or even the ability to imagine what I just said, means that we can create devices which interface with the human brain that can.

Therefore, I'd like you to consider the periodic table of elements, where each box would be filled with the elements they depict. Think of it if you will, as an assortment of jars with various sizes of nuts and bolts inside in your garage. The parts you need to make anything.

Now then, consider if you will a CAD CAM software program where you have just designed something new. Something that doesn't exist, but you want it to exist. Then imagine hooking up the CAD CAM program to a device that had access to the periodic table of elements and it would take from each of those little jars the exact amount it needs of each element to assimilate the object.

This will be the future. Mark my words.

Think and Assimilate Thoughts and Objects - The Future Will Be Grand

Saturday, February 18, 2012

What Is a Computer Virus?

A computer virus is malicious software designed to spread to other computers by inserting herself into legitimate programs called "guests." It can more or less seriously damage the functions of the infected computer. It can spread through any medium of exchange of digital data such as computer networks and CD-ROMs, USB keys, etc.

Its name comes from an analogy with biological viruses because it has similarities in the way it is spread using the reproductive capability of the host cell. It assigns the term "computer virus" in computer and molecular biologist Leonard Adleman (Fred Cohen, Experiments with Computer Viruses, 1984). Computer viruses are not to be confused with computer worms, which are programs that can spread and replicate on their own without contaminating the host program. In a broad sense, is often used and misused the word virus to designate any form of malware.

Human Resource Software

The total number of malicious programs known to be about 95 000 according to Sophos (all types of malware combined). However, the actual number of viruses in circulation would not exceed a few thousand depending on the WildList Organization, every antivirus vendor with an interest in "inflating" the number of viruses it detects. The vast majority affects the Windows platform. Although they are extremely few, there are also virus-like systems Unix / Linux, but no outbreaks similar to that of the Windows virus has been detected in 2010. The rest is mainly aimed at operating systems that are distributed over the past few years, as the 27 viruses - none being dangerous - imposed Mac OS 9 and its predecessors (recorded by John Norstad, author of the antivirus Disinfectant ). Systems are least affected FreeBSD that focuses its development on security, as well as Netware and OS / 2 too few to provide a developer known viruses. Viruses are often subject to false alarms that the rumor spread, bulky freight.

Some of them, playing on the ignorance of computer users, they sometimes destroy parts of the operating system completely healthy. The first autonomous software had no purpose they have today. The very first software of this type were mere entertainment, a game between three data of Bell, Core War, created in 1970 in the laboratories of the company. For this game, each player writes a program, then loaded into RAM. The operating system, which has just been multitasking, in turn executes an instruction for each software. The goal of the game is to destroy the opposing programs while ensuring its own proliferation. The players do not obviously opposing the location of the program. The software is capable of copying itself, repair itself, to move themselves into different areas of memory and "attacking" the software by writing random opponent in other memory areas. The game ends after a set time or when a player sees all its programs inactive or destroyed. The winner is the one that has the largest number of active copies. This is exactly the principles of programming viruses.

In 1984, the magazine Scientific American presented a computer game design consisting of small programs that come into s'autoreproduisant fight and trying to inflict damage on opponents, thus setting the stage for future viruses. In 1986, the ARPANET was infected by Brain, virus renaming all boot disks system (C) Brain. The creators of this virus gave them their name, address and phone number because it was an advertisement for them.

The virus is a classic piece of program, often written in assembler, which fits into a normal program, most often at the end but also at the beginning or the middle. Each time the user runs the program "infected", it activates the virus the opportunity to get integrated into other executable programs. Moreover, when it contains a payload, it may, after a certain time (which can be very long) or a special event, perform a predetermined action. This action can range from a simple message harmless to the deterioration of some functions of the operating system or damage to files or even complete destruction of all data on the computer. One speaks in this case "logic bomb".A boot virus installs a boot sector of a boot device: hard drive (the main boot sector, the "master boot record, or that of a partition), floppy or whatever. It replaces a boot loader (or boot program or "bootloader") entered (by copying the original elsewhere) or created (on a disc or there was none) but does not modify a program like a normal virus, when it replaces an existing startup program, it acts like a virus "prepend" (which is inserted at the beginning), but the fact of infecting a virgin device of any software startup differs from classical virus, which never attacks to "nothing."

Macro viruses that attack software macros in Microsoft Office (Word, Excel, etc..) Through VBA Microsoft. For example, adhering to the normal.dot template in Word, a virus can be activated every time the user runs the program. Viruses, worms, appeared around 2003, having experienced a rapid development in the years that followed, are classic viruses because they have a host program. But similar to the worms (in English "worm") because:

Their mode of propagation is linked to the network, like worms, usually via the exploitation of security vulnerabilities.

Like worms, their action is discreet and non-destructive to users of the infected machine.

Like worms, they continue to set broad goals, such as distributed denial of resources attack or DoS (Denial of Service) to a server with thousands of infected machines connecting simultaneously. [ref. necessary] The batch-type virus, which emerged in the days when MS-DOS operating system was in vogue, viruses are "primitive." Although able to reproduce and infect other batch files, they are slow and have very low infectivity. Some programmers have been up to create encrypted and polymorphic viruses Batch. This is a real technical feat Batch as the language is simple and primitive.

Other threats exist in IT, it often distinguished by the absence of reproductive system that characterizes the viruses and worms, the term "malicious software (" malware "in English) is more appropriate in this case. The term computer virus was created by analogy with the virus in biology: a computer virus uses its host (the computer it infects) to reproduce and spread to other computers. Like biological viruses, where the genetic diversity slows growth chances of a virus, computer systems and what are the most popular software that are most affected by viruses: Microsoft Windows, Microsoft Office, Microsoft Outlook, Microsoft Internet Explorer, Microsoft Internet Information Server... Professional versions of Windows (NT/2000/XP Pro) to manage rights in a professional manner are not immunized against these stealthy invaders.

The commoditization of Internet access was a major factor in the rapid widespread dissemination of the latest viruses. This is mainly due to the ability of viruses to appropriate email addresses found on the infected machine (in the address book but also in the messages or archives visited web pages or messages to newsgroups ). Similarly, the interconnection of computers in local networks has amplified the ability to spread viruses that find this way more potential targets. However, systems with limited distribution are not affected proportionately. The majority of these systems, as variants of the architecture UNIX (BSD, Mac OS X or Linux), using standard management rights of each user allowing them to avoid the simplest attacks, the damage is so normally confined to areas accessible only to users, saving the base operating system. Legal viruses.

When discovered, the virus is assigned a name. This theory is consistent with the agreement signed in 1991 by members of Computer Best Antivirus Research Organization. This name is determined as follows:

- Prefix, mode of infection (macro viruses, trojan horses, worms...) or the operating system concerned;

- A word expressing its special or flaw that exploits (Swen is an anagram of News, an anagram of Admin Nimda, Sasser exploits a vulnerability LSASS );

- In a version number suffix (the viruses are often taken the form of variants with similarities to the original version). Unfortunately, the analytical laboratories of various antiviral publishers sometimes affect their own name to the virus they are working on, which makes it difficult to find information. Thus, for example, the Netsky virus in Alternative Q is called W32.Netsky.Q @ mm Symantec, Trend Micro WORM_NETSKY.Q, W32/Netsky.Q.worm at Panda and I-Worm.NetSky. r at Kaspersky. It is possible to search for a generic name given through specialized search engines, such as Virus Bulletin or Kevin Spicer. Virus on Linux. The Linux operating system, as well as the Unix operating systems and related, is usually fairly well protected against computer viruses. However, some viruses can potentially damage Linux systems are not secure.

Like other Unix systems, Linux implements a multi-user environment, in which users have rights corresponding to their specific needs. There is thus a system of access control to prevent a user to read or edit a file. Thus, viruses typically have less capacity to affect and infect a system running Linux or DOS on Windows files always having FAT32 (NTFS files have the same protection as files UNIX, Windows NT database also isolate the accounts between them). Therefore, no viruses written for Linux, including those listed below, could spread successfully. In addition, security vulnerabilities that are exploited by viruses are corrected in a few days for updates of the Linux kernel. Virus scanners are available for Linux systems to monitor the activity of active viruses on Windows. They are mainly used on proxy servers or mail servers that have Microsoft Windows client systems The antivirus software designed to identify, neutralize and eliminate malware (including viruses are just one example) that are based on the exploitation of security vulnerabilities. Antivirus checks the files and emails. Different methods are possible:

- The major antivirus market are focusing on signature files and then compare the signature of the virus to viral code to check.

-The heuristic method is the most powerful, seeking to discover malicious code by its behavior. She tries to detect it by analyzing the code of an unknown program. Sometimes false alarms may be caused.

- The shape analysis is based on filtering rules between regexp or other, put in a junk file. The latter method can be very effective for mail servers supporting postfix regexp type since it does not rely on a signature file. Antivirus programs can scan the contents of a hard drive, but also the computer memory. For the more modern they act upstream of the machine by scanning the file exchanges with the outside world, both in amount that flows downhill. Thus, emails are reviewed, but the files copied to or from removable media such as CDs, floppy disks, network connections, USB keys... Virus creators have previously identified and recorded information about the virus, like a dictionary, the antivirus can detect and locate the presence of a virus. When this occurs, the virus has three options, it may:

1. try to repair the corrupted files by removing viruses;

2. put the files in quarantine so they can be accessible to other files or spread and they can eventually be repaired later;

3. delete infected files. To maximize the yield of virus, it is essential to make frequent updates by downloading newer versions. Internet and conscientious with good computer skills can identify themselves from viruses and send their information to software developers so that their antivirus database is updated. Typically, antivirus review each file when it is created, opened, closed, or read. In this way, viruses can be identified immediately. It is possible to program the system of administration which conducts a regular review of all files on the storage space (hard disk, etc.). Although antivirus software are very reliable and regularly updated, virus writers are just as often be inventive. In particular, the virus "oligomorphiques", "polymorphic" and more recently "metamorphic" are harder to detect. Whitelist. The "white list" is a technique increasingly used to fight against malware.

Instead of seeking software known as malware, it prevents execution of any program except those that are considered reliable by the system administrator. By adopting this method of blocking by default, it avoids the problems inherent in the updating of virus signature file. In addition, it helps prevent the execution of unwanted programs. Given that modern enterprises have many applications are considered reliable, the efficiency of this technique depends on the ability of the administrator to establish and update the whitelist. This task can be facilitated by the use of tools for process automation and inventory maintenance. Another approach to localize the virus is to detect suspicious behavior programs. For example, if a program tries to write data to a program run, the antivirus will detect this suspicious behavior and notify the user that will indicate the steps to follow.

Unlike the previous approach, the method used to identify suspicious behavior very recent viruses that are not yet known in the dictionary of the virus. However, the fact that users are constantly warned of false alarms can make them insensitive to the real threats. If users answer "Agree" to all of these alerts, antivirus offered them no protection. This problem has worsened since 1997, since many programs have changed some harmless executable files without observing these false alarms. Therefore, most modern antivirus software use less this method. The heuristic analysis is used by some viruses. For example, the antivirus can scan the beginning of each code of all new applications before transferring control to the user. If the program seems to be a virus, then the user is notified. However, this method can also lead to false alarms. The heuristic method can detect virus variants, and automatically communicating the results of the analysis to the editor, it can verify the accuracy and updating its database of virus definitions.

The method of the sandbox (sandbox in English) is to emulate the operating system and run the file during the simulation. Once the program is terminated, software analyzes the results of the sandbox to detect changes that may contain viruses. Because of performance problems, such detection usually takes place during the scanning on demand. This method may fail as viruses can be nondeterministic and result in different actions or perhaps even no action when executed. It is impossible to detect from a single execution. Many companies claim the title of creator of the first antivirus software. The first public announcement of a neutralization of a virus for PC was made by European Bernt Fix (or Bernd) in early 1987, the Vienna virus. Following this virus, several other viruses have surfaced such as ping pong, Lehigh and Survive-3, also known as Jerusalem.

Since 1988, several companies with the objective of further research in the field of antivirus software came together. The first breakthroughs in anti-virus occurred in March 1988 with the release of Den Zuk, created by Indonesian Denny Yanuar Ramdhani. Den Zuk virus could neutralize the Brain. In April 1988, the Virus-L forum has been created on Usenet, and mid-1988 saw the design of a search engine can detect viruses and Trojans that were known to the public. In autumn 1988 appeared antivirus software Dr. Solomon's Anti-Virus Toolkit designed by Briton Alan Solomon. At the end of December 1990, the market has come to the point of offering the consumer products related to 19 different anti-virus, among them, Norton Antivirus and McAfee VirusScan. Peter Tippett was extensively involved in the emerging field of detection of computer viruses. It was an emergency occupation and also had his software company. He read an article about the Lehigh virus, which was the first to be developed, but it's actually on Lehigh himself that Tippett was the most knowledgeable.

He asked if there were similar characteristics between these viruses and those that attack humans. From a standpoint epidemic, he was able to determine how these viruses affect the same processor computer (the boot sector was affected by the Brain virus, the. Com with the Lehigh virus, while the Jerusalem virus attacked both files. com and. exe). Tippett's company, Certus International Corp.. was therefore involved in the creation of antivirus software. He sold the company to Symantec Corp. in 1992. Tippett and joined them by implementing the software developed on behalf of Symantec, Norton AntiVirus.

What Is a Computer Virus?

Friday, February 17, 2012

ERP Popularity and Need in Health Care Industry

The scope of implementing ERP in healthcare industry has been increased fairly as more and more hospitals are coming up with the growing population and critical diseases causing to the mankind. Nowadays treating patient is no more just a service, the whole hospital sector has become hospital industry.

As number of hospitals are coming up, so every one is looking for better professionalism and better service from the concerned department.

Human Resource Software

These days patients are more demanding. With so many medical facilities they get and they invest money just to ensure they get the best of treatment so naturally they want the best return of their hard earned money. So this health care industry is developing at a great speed with the two major factors namely business and service.

So now the situation has come that hospitals can't continue with their old practices and technologies where service are not up to the mark and yet charge huge bill to the patients. Therefore it is mandatory for hospitals to go for the latest trends of technology and ensure the best service to the customer or patients.

So there is a need of implement an ERP solution which has been specially designed and developed for the health care industry. Every hospital has their basic set up in terms of equipments and necessary instruments, devices to give treatment to the patients. Also they hire best doctors, nurses and other clinical and surgical staffs in order to maintain the reputation of the hospital. So the focus here is to manage the whole operation smoothly and in more professional way, so that the patients can be really satisfied by the service of the hospital.

The main focus of the ERP in health care Industry is from the point of view of patients' satisfaction. The key factors which one has to keep in mind while implementing the software are as follows -

1. Patients should not wait in queue for long to visit a doctor of their choice.
2. There should be option for booking in advance for the specific doctor.
3. All the bills can be paid online by the patient party in case of emergency.
4. Availability of choice of beds should be there in case of admission.
5. Discharge procedure should not be long.
6. Medi claim facilities and procedure should be fast and should be directly with the insurance company.

The hospital authority should also focus on that type of software which can give a proper track of the following.

1. Doctors' schedule with date and time.
2. Proper intimation to the dashboard when specific doctors are not available on some said days.
3. Daily entry of patients list.
4. Proper billing methods for surgical treatments, and medical treatments along with diagnosis reports.
5. Regular update for the stock of medicines.
6. Regular attendance of the staffs of the hospital.
7. Stock updates of laundry and kitchen materials.

These should be the basic features of the ERP in health care industry. It can reduce hospital overheads as it helps to integrate all functions namely accounts, finance, human resources and bring them under one roof or one common database.

In hospitals connectivity is most important, because every time the information has to be circulated ion various departments in order to maintain a chain of events. Like a chain of events happen when a patient got admitted for certain operation. So keeping a track from admission to discharge is very important.

So for hospital industry there is a need of developing specialized ERP software that can take care of every aspect that has been mentioned above.

ERP Popularity and Need in Health Care Industry

Thursday, February 16, 2012

Maintenance Management Schools Offer Many Programs of Study

Maintenance Management Schools train professionals for various management positions in maintaining grounds in parks and recreation facilities, schools, hospitals, aviation, software, and more. Students can choose from many schools that specialize in various areas of managing maintenance, and can choose two-year associate degrees, four-year bachelor degrees, or certificates in maintenance management. Some schools streamline courses of study that shorten the time it takes to become employed with a specialty.

Curriculums will focus on the particular program a student chooses to study. Perhaps the largest field of maintenance management is in the filed of aviation maintenance management. Aviation Maintenance Management Schools train in the complex field of managing the maintenance of military, commercial, and private aircraft. Curriculums for degrees in aviation maintenance management provide a foundation in all disciplines of management: business, human resources, production, and strategic management.

Human Resource Software

Parks and recreation facilities management will focus on comprehensive instruction for maintenance management parks, recreation, and conservation personnel who manage programs of park and recreation maintenance.

School maintenance management programs focus on planning actions to be taken; inspections and maintenance of grounds and buildings; maintenance of multi-facility schools; assets, labor, and equipment management; and managing costs. Maintenance management students can learn to track and manage specific data with regard to safety, capital expansion projects, and information for making reports to districts, school boards states, and for assisting in administrative improvement initiatives.

Maintenance Management Schools that teach software maintenance management programs provide studies of basic systems for management of software for creating and tracking repair and preventive maintenance, work orders, and equipment. Personnel maintenance management programs features tracking employees from their date of hire to the date of termination. Safety maintenance management tracks inspections and sets up programs for keeping records and schedules for future inspections and maintenance.

Associate, bachelor, and master degree programs are available in maintenance management. Graduate seminars are available, as well, and are intended for graduates of the Maintenance Management Schools. These seminars are intensive learning experiences that address issues of managing people and systems in specialized environments.

If you are interested in learning more about Maintenance Management Schools, please search our site for additional information and resources.

DISCLAIMER: Above is a GENERAL OVERVIEW and may or may not reflect specific practices, courses and/or services associated with ANY ONE particular school(s) that is or is not advertised on SchoolsGalore.com.

Copyright 2006 - All Rights Reserved

Michael Bustamante, in association with Media Positive Communications, Inc. for SchoolsGalore.com

Notice to Publishers: Please feel free to use this article in your Ezine or on your Website; however, ALL links must remain intact and active.

Maintenance Management Schools Offer Many Programs of Study

Wednesday, February 15, 2012

Multi-Touch Software: Put Any Windows System at Your Fingertips

Multi-touch software programs can be developed for specific business uses, for general industry purposes, or to integrate with existing business software and hardware systems. These programs can be used simply for navigation purposes and to control functions of a touch screen display, or they can be developed as complex, proprietary protocols to run the everyday operations of even the most sophisticated companies. And while start-ups and some well-established businesses have chosen to have complete hardware and software solutions developed and deployed, other business have taken advantage of the fact that multi-touch software can integrate with current hardware systems and save a substantial amount of money and resources.

Multi-touch software can take your existing Windows based systems and streamline them for better performance. This is accomplished by the reorganization of the desktop and icons in a more visual-friendly format. Clutter is reduced or completely eliminated and the most prominent functions are quite literally at hand with logical placement of critical operating functions. These intuitive systems allow a user to drill into items to uncover related pieces of information and access sub-files and sub-folders. Research and the accumulation of data are relegated to the tap of a finger, the swipe of a hand or the flip of a wrist.

Human Resource Software

The most convenient feature of multi-touch software is that it does not change the normal Windows operating system. Files, folders, videos, pictures, programs and applications can all be found in their customary places and are run using the same commands. Web browsers are launched and controlled as normal, only with the human hand versus a clunky, insensitive and outdated mouse or other pointing device. With all of the benefits that a touch screen display has to offer, it's no wonder that former Macintosh OS users are switching to Windows based programs in order to take advantage of multi-touch software.

One of the principle goals of professional multi-touch software developers was to create a technologically advanced solution for people that are not technologically savvy. This means that despite the fact that touch screen displays and multi-touch hardware and software programs are extraordinarily sophisticated and boast incredible capabilities, they can be used by virtually anyone. This is a critical concern for businesses that need to be able to use the technology immediately and without downtime normally associated with the launch of new software or hardware programs and systems.

Currently multi-touch software can integrate with existing Windows based business systems, or industry-specific software can be installed. This includes software for the medical community, the legal profession, public safety departments, sports groups, professional services businesses and retailers. If your business does not fall into one of these categories, specialized multi-touch software can be developed to meet your specific business needs. Furthermore, technologies and applications that you see employed in other industries' software programs can be easily adapted to your own needs, so parallel industries may be a good place to look for development and implementation ideas. To learn more, please watch one of the videos referenced below:

Multi-Touch Software: Put Any Windows System at Your Fingertips

Tuesday, February 14, 2012

Payroll Software, Payroll Services, Online Payroll - What's the Difference? Which is Best?

Selecting the right payroll solution is an important decision for all business owners. The wrong payroll solution can be expensive not only in terms of money, but in productivity, which translates back to morale, which translates back to money. When selecting payroll solutions, carefully consider your resources. Here are brief descriptions of each type, and the resources you need to implement them:

Payroll Software - Payroll within Accounting Software

Human Resource Software

When using payroll software, or when running payroll within your accounting software, your company runs payroll "in-house." Your company is responsible for all upgrades to the software, including tax table and tax rate changes. This option provides a high level of control, which some clients prefer. Generating checks, withholding taxes, tax return filings, and payroll tax payments are the main duties that must be carried out in a timely manner by somebody within the business. Electronic services, such as direct deposit, may or may not be available through the software.

To run payroll in this manner, you need a person who is not only familiar with payroll laws, but also familiar with the accounting side of payroll. Payroll is confusing, even daunting, so don’t expect a an hour clerk to set up and run your payroll.

Speaking of payroll set-up: be certain your software provides excellent customer support during the set-up process. Depending on the number of checks run in the current year, payroll set-up can be challenging, to put it mildly.

If you have many checks to print, consider buying a printer dedicated exclusively for this purpose (it can also be used to print accounts payable checks). Contact your check vendor for more information about ordering the correct type of check for your printer.

In terms of the monthly expense, this option will probably run between the next two options.

Payroll Services

When using a payroll service, your company outsources payroll duties entirely. You are in contact with the payroll service as often as you run payroll (for example, every week or every two weeks), telling the service how many hours each employee worked, informing the service of new or terminated employees, or asking any other questions. The payroll service will then generate and deliver checks; withhold taxes; make tax payments; file tax returns; and compute, distribute, and file year-end forms. Electronic services are available. Human resource (HR) services are sometimes available. Usually you can find a payroll service in close proximity to your business.

This is a very simple option. A phone call to the payroll service takes care of most payroll duties. This is a good option for those who do not want to take care of payroll duties themselves, and who do have other resources (such as time or personel) to run payroll in some other manner. Even the set-up should be trouble free, since the payroll service will handle it.

This option is the most expensive of the three options.

Online Payroll - Internet Payroll

Online payroll, also known as Internet payroll, can be customized to suit the client’s needs. For clients who wish the ease of a payroll service, wanting only to make a phone call each payroll period with the service taking care of everything else, online payroll can provide that. For clients who prefer the control that payroll software brings, wanting to run checks and take care of other duties "in-house," online payroll can provide that as well. Even something in between these two options is possible. The level of service varies from one provider to another. Even within a single provider there can be varying levels of service, depending on what clients need. Same with the set-up; the online service can handle it all, or the client can handle it all, or there can be a mix of both parties taking care of it.

Clients are not responsible for maintaining tax tables or updating software when using an online payroll provider. Electronic services, such as direct deposit, electronic tax payments, and electronic tax returns, are available. It is not necessary to find an online payroll provider in close proximity to your business, since you can both access the same data through the Internet.

This is a good solution for those who are already comfortable with the concept of online banking. Payroll data is stored on secure servers, and transmitted with a high degree of encryption, so it is very safe.

Regardless of how this solution is customized, this option is most likely the least expensive of the three options.

Final Thoughts

Take some time to shop around and compare payroll solutions. You will be better able to make the right choice if you carefully consider the time, money, and personel you can devote to payroll tasks.

Payroll Software, Payroll Services, Online Payroll - What's the Difference? Which is Best?

Monday, February 13, 2012

Diversity: IBM versus Monitor Company - What Can We Learn?

A question for executives to answer is whether they are on board with diversity in their organizations'. Taking a cursory view of diversity at IBM versus Monitor Company, one sees an outward projection at IBM and inward projection at Monitor. The executives of these two global business giants do not have a shared strategy of diversity.

In a 2006 article, Melissa Jenkins1 reported the findings of 120 HR professionals from Fortune 1000 companies. These professionals used terms to define diversity as "direct impact" and "competitive edge." The statistics she encountered include 79 percent believe diversity enhances corporate culture. Seventy-seven percent reported diversity improved recruitment and the same percentage said diversity improves worker morale. The largest percentage, 91 percent, found diversity helps keep their organizations competitive. How do these statistics relate to IBM and Monitor?

Human Resource Software

This comparative analysis considers circumstances, as they existed, when the original authors wrote their case studies. Therefore, this report is only a snap shot of realities then. A future study may interpret events differently based on new data.

The Companies

International Business Machines is the long name for IBM known globally for mainframe and PC computers; however, IBM is more than computers. IBM is software, IT services, servers, business consulting, and a host of other operations related to technology. From the IBM web site, http://www.ibm.com, we read,

At IBM, we strive to lead in the invention, development and manufacture of the industry's most advanced information technologies, including computer systems, software, storage systems and microelectronics.

We translate these advanced technologies into value for our customers through our professional solutions, services and consulting businesses worldwide.

In the end, IBMers determined that our actions will be driven by these values:

o Dedication to every client's success

o Innovation that matters, for our company and for the world

o Trust and personal responsibility in all relationships

These statements support the claim of IBMs outward projection on customers and relationships.

Monitor Company is a global group of consultants with expertise in vital areas of leadership and management. They work in business networking, innovation management, market-to-customer, regional competitiveness, and executive development. Monitor appears driven by individual relationships between consultants and clients and individuality appears the norm in internal affairs. From the Monitor Company web site, http://www.monitor.com, we read,

Monitor is structured as a group of companies, each of which aspires to link cutting edge intellectual property with a diverse array of human, technical, and financial assets in the service of helping our clients compete and win in their marketplaces.

Throughout our history, we've been blessed with customers who not only found value in our services, but were committed to our success and growth. We benefited immensely from the patience and commitment demonstrated by our early, relationship clients and from the spirit and hard work of colleagues dedicated to building a firm which could offer both highly competitive services and a highly collegial work environment. Our proudest accomplishment remains our ability to attract and retain so many talented individuals, and our highest ongoing priority is sustaining an environment which will continue to attract a diverse pool of accomplished individuals.

Reading the first quote, one can argue Monitor has an outward projection, yet reading the second quote suggests an approach to clients from an inward position.

Diversity Positions

IBM and Monitor are very different organizations but have many similarities. Both companies offer technology services, business consulting, and both are global. With worldwide operations, both have personalities representing international flare. With international flare, both have issues with diversity management.

The IBM stance is that diversity is an investment in the future of customers and the future of business, business development, and business diversification. Diversity did not receive lip service from the top rather it received commitment. The IBM diversity decision came with total buy-in from the top. Discussion of its implementation at IBM comes in future paragraphs.

At Monitor, diversity discussions started from survey results during their tenth anniversary year. The company commissioned a global Definition of Purpose exercise intent to learn Monitor's "vision of itself as it grew into its second decade" (Grant 1994, pg. 2). The surprise result was how uncomfortable people felt in the homogeneous climate of Monitor. Establishment of diversity programs at monitor launched slowly from bottom up.

Implementation at IBM

Thomas2 wrote of his interview with IBMs Lou Gerstner about IBMs business turnaround in the mid 1990s. IBM had an aggressive human relations and EEO management system in place. What Gerstner discovered is that the equal employment opportunity program attempted to ignore differences rather than maximize them. What Gerstner recognized is the IBM customer base is diverse but leadership in the company did not reflect its customers.

IBM made a "significant philosophical shift" in implementing diversity. The tradition at IBM was to minimize differences. Gerstner and his primary implementation partner, Ted Childs, vice president of Global Workforce Diversity, needed to tell the entire organization that the shift was a strategic goal. To implement the departure from the old position to the new, IBM (Childs) selected Bastille Day, July 14, 1995. According to Childs, Bastille Day was appropriate because of its "historic day of social disruption.
We were looking for some constructive disruption."

Gerstner and Childs with the assistance of Tom Bouchard, senior vice president of human resources, established eight task forces, each having 15 to 20 senior managers from eight different demographic constituencies. Within specific constituencies, the senior managers gather data on personnel trends, labor trends, and customer market trends. As these teams did their research, they discovered many similarities that became "The Vital Few Issues: Employees' Biggest Diversity Concerns." Now the task forces had areas from which they could begin exploring areas for business development.

As these senior managers began to think diversity, they began acting diversity. Within their specific operations, subordinate managers did not ignore these senior managers' actions. Subordinate managers' resistance soon shifted to the view that diversity is good for operations. IBM now has "pillars of change" including, demonstrated leadership support, engaged employees as partners, integrated diversity with management practices, and linked diversity goals to business goals

Implementation at Monitor

Monitor Company began to recognize diversity following a ten-year anniversary definition of purpose survey of the organization. Several members of the organization proposed Diversity Mentor Program that met with resistance. Reframing the proposal to as an Advisor Network, the firm's Diversity Network gave empowerment to proceed. Monitor did not have full commitment at the top to diversity management rather it took a bottom up approach and resistance followed.

A significant event coming through director and senior manager level changed the focus of diversity. Women in these roles began to open up on issues of sexual harassment from clients and internal insensitive comments for co-workers. Kaplan, legal advisor and CFO, had a personal interest in matters of sexual harassment and harassment in general. Using a directors meeting, he expressed his concerns by relating how women in director and senior management roles actually felt, sharing how difficult it was for them to speak out.

Key players in the Advisory Network included Rotenberg, a gay employee with a long history of business success going back to his teens; he is also of Jewish faith. Also, Basden, an African-American noted the lack of minorities when he joined the company. Another is Singh-Molares, of mixed Indian and Hispanic decent. Born in Europe, he grew up in Manhattan where he attended the United Nations International School.

Grant3 writes in her analysis that Basden did not feel that directors understood diversity and that change was not likely. In a quote, Basden related that directors "don't see the problem, physically don't see the problem, mentally don't see the problem."

Writing of Singh-Molares, she quotes him as saying he sometimes feels different but not uncomfortable. Speaking on behalf of hiring practices, she quotes him that Monitor hires people with the special needs of the company, not hiring someone who will fail. "It doesn't help [minorities] and it doesn't help us."

Another key members discussed by Grant is Martineau, a director, one of the first women hired by Monitor. She became a director in 1991. She felt like she had to be one of the "guys" while being the "first" female director. She explained in a board meeting that she often felt sexually harassed by clients. Further, she explained feeling like others considered women as disabled if they became pregnant. She described gender-hurdles at Monitor as external to the organization.

Firstbrook, is a senior manager, also a woman, and holds an engineering degree. She explained how difficult it is for a woman engineer to get ahead in a male dominated career. She supported Martineau's position of external pressure relating how men perceive women giving consulting advice.

The Advisory Network had support; however, most consultants felt they would not use it. Rotenberg asked for time allocation for the work of the Advisory Network and received notice to work it as a collateral assignment.

The organization already had Professional Development Advisors for employees that were "formal and institutional." They felt the Advisory Network should be "informal and personal."

Armed with a new sensitivity, Fuller, the founding director, accepted the role of diversity as a tool to improve performance at Monitor. He issued a statement that began, "There is not a lot of dissent in our management ranks about whether we ought to be doing [something about diversity]. There is only anxiety..." Fuller, quoted by Grant, commented that because of his position, he feels separated from the rest of the organization and by virtue of is background is not qualified to execute "some of the tactical aspects of managing diversity... What I can do is act as a sounding board and I can as something of a sponsor."

In the final assessment, Monitor did acquire top-down buy in to diversity management and from previous attempts at bottom-up diversity management, the Diversity Network became a reality with Fuller and Martineau overseeing its implementation.

Discussion

IBM, from the most senior level, recognized the value of diversity as part of the culture. Further, they recognized their customer base was diverse and internally, they had to reflect their customer base to expand it into new areas and products. IBM became very successful at reinventing itself in its global market. Hoyle4 tells us that a clear-shared vision pulls people into a change process in a way that makes the vision happen. Hoyle shares four principles of persuasion that leaders need to employ in order for visionary change to occur. At IBM, Gerstner had these skills.

1. Identification Principle: Like cause and effect, addresses personal fears, hopes, and desires.

2. Action Principle: Either sponsored or by personal proof of a value of something, people will not buy in.

3. Principle of Familiarity and Trust: Acceptance of ideas comes through those we trust or regard and credible.

4. Clarity Principle: The idea must be clear, not confusing, not open to several interpretations

Monitor, it appears, was unconsciously unaware of the need to manage diversity even when facts began to emerge from its internal Definition of Purpose survey. Applying the four points above to Monitor, one concludes it was not prepared to take steps until reality from senior managers and directors manifested themselves in a directors meeting. Maxwell5 writes that leaders need to slow down, work at the pace of the organization, and be involved and engaged in dialogue at all levels. Fuller admitted feeling separated from the organization by position, although admitting he felt bad about that.

The title of this paper asks what we can learn. Organizational culture has formal and informal processes that link values and beliefs. IBM and Monitor possess both these links. Entering either company, a new recruit begins a socialization process and builds informal relationships while becoming more comfortable in their roles. Finally, over time, people naturally tend to one role or another that serve the organization in some formal or informal way6.

IBM learned the value of diversity linkage is economic. Improving their organizational population diversity opened new way of think about and serving a diverse customer population. Monitor learned that although it has highly motivated people in a good work environment, they needed to explore their vision of diversity. Emerging leaders often had differing views of what diversity meant. It became apparent that proponents of different advisory groups needed to link their resources for the greater personal and organizational good.

Another view of the two organizations is the value placed on individuals and groups. IBM operates in a manner that supports teamwork and group effort to accomplish goals. Monitor has an individual consultant/client operation valuing the effort of the consultant in a relationship to satisfy client needs. Observation of the diversity climate at IBM versus Monitor is an example of open climate versus closed. IBM projects outward to identify diversity needs and Monitor projects inward.

Conclusion

IBM improved its heterogeneity and improved its economic bottom line. Monitor seems to remain more homogenous yet sensitive to diversity of its population seeking to recruit more people from different backgrounds. In both cases, the organizations recognize equal employment opportunity and diversity do not ignore differences. Instead, they champion differences. IBM is more successful at maximizing them.

IBM, with its much larger reach in the global community learned the strength of diversity to cast light on customers and cast light internally. The IBM business commitment did not change because of diversity; rather it embraced other truths and other traditions to improve business. Monitor, intentionally or unintentionally, cast shadows on diversity; they seemed insecure with it or feared it, they denied it to themselves giving it evil properties. Their final acceptance of it came only after most senior members made it an open issue.7

In diversity and globalization, it is important to acknowledge the two sides of human nature. Confucius said, "Human beings draw close to one another by their common nature, but habits and customs keep them apart."

Diversity: IBM versus Monitor Company - What Can We Learn?

Sunday, February 12, 2012

ERP Training and Job Opportunities

ERP stands for Enterprise resource planning; it's a computerized system used in order to manage resources such as financial, human, tangible assets, or materials. The purpose of this software is to make flow of information easier and to coordinate business functions. ERP can be considered as managing of business practices along with modern technology. ERP is uniting three goals: managing business practices, IT (information technology), and specific business goals.

ERP systems are used in fields such as: manufacturing, financial, human resources, supply chain management, customer relationship management, and data warehouse. It has also been introduced as a part of management syllabus. This system improves in productivity, in speed, and also in performance. It holds a promising future in terms of employment and training. ERP professionals are not chosen on secondary bases.

Human Resource Software

The market demanding the professionals in ERP, thus an industry has emerged which train candidates who want to pursue in ERP. Therefore, there are companies which offer training programs. Candidates who want to pursue in ERP jobs must be versatile. Only academic qualification and/or only technical knowledge won't be sufficient for the job in ERP. Since the system undergoes changes from time to time, so the candidate must be able to accept these changes. Candidate cannot stick or depend on his learning of one or two software, he must update in all areas of ERP. Aspirant must have knowledge of various applications so that whatever be the demand in market is he could suffice it. Earlier ERP was formally used for one function but now organizations are choosing ERPs for various functions after the advancements in it (such as open source, web facilities, and wireless facilities).

Numbers of job opportunities have emerged such as: ERP vendors; they would be offering services from the very beginning implementation stage. ERP professionals have huge opportunities in larger sector, in large companies not in small sector companies. Surveys made by IT consultants have added to the positive side of ERP. Organizations have realized the utmost importance of ERP in their companies. Professionals in ERP placed in organizations hold jobs designated as: Application programmers, Application developer, and consultant. They must have good knowledge of software codes and languages. As a consultant, the job of ERP would demand prior experience in many backgrounds. There is usually no constraint of which stream does the candidate belongs, however technical knowledge would be compulsory.

Hence jobs in ERP is a promising career, however the fees are expensive. Many institutes provide training programs but applicants are advised to check for their authenticity before applying.

ERP Training and Job Opportunities

Saturday, February 11, 2012

Steps to Preventing Being a Victim of Identity Theft

Tips for Preventing Identity Theft

In the not so distance past, identity theft was a crime that was given little regard in criminal court. Identity theft has literally ruined lives by destroying credit and leading to false arrests. Victims are not even typically aware that their identities have been stolen until they go to apply for special licensing or credit somewhere and are denied based upon a bad background check or a bad mark on their credit report. More often than not, there are steps that could have been taken by the victim to help prevent the theft of their personal information. Just how can we as individuals protect our good names and credit?

Human Resource Software

1. Examine your credit report - By examining your credit report one to two times a year, it is easier to notice any unusual and fraudulent activities. There is a website that allows you to examine your credit report from the three major credit agencies once ever 12 months FREE of charge. Take advantage of it! You can also request your credit history from any or all of these agencies at any time if you're willing to pay the price.

2. Report unusual activity - If you start receiving strange phone calls about receiving services that you don't remember, find that police may be questioning you about events that you had nothing to do with, receiving mail about services that you never applied for, or notice strange things with your financial institution or credit history, immediately notify your banking institutions, at least one of the credit reporting agencies, and the police. The credit agencies can put a 90 day to 7 year fraud alert onto your credit report.

3. Too much information is a bad thing - Do not provide your driver's license, state identification number, social security number, or birth certificate to anyone when it's not needed. If you are applying for jobs, keep in mind that many other people may handle that job application before it reaches human resources. This gives anyone who an access it a chance to write down. Provide this information only at the time that you fill out other necessary taxation and hiring forms. This will help assure that your information remains on a need to know basis.

4. Don't voice your information in public - When dealing with certain agencies or while on the phone in a public place, you may be asked for personal information. If you can, write it down and give it to the necessary party. Ask them to tear it up when they are finished. If you're on the phone, let the person know that you are in a public place and do not feel comfortable giving up such private information in a public forum.

5. Burn important documents before discarding them - Many people buy paper shredders and use them regularly. This step alone is not an effective one, especially against a determined thief. A good thief can extract information through shredded documents simply by digging through refuse and taking the time to reassembling the pieces, much like a puzzle. When you burn paper, it turns ash and becomes relatively unreadable.

6. Lock down your computer - If you do a lot or even the smallest amount of online banking, installing anti-virus software protection is important. Make sure that it takes measures against malware programs or install one for that as well. Most viruses destroy computer systems by corrupting data, launching applications in a hidden manner, or by monitoring system activity. Malware (short for malicious software) are hidden programs that often collect information and then transmit it to a specific source. Malware can be used to gather your precious banking information or anything else that you might enter online such as your driver's license or social security number.

7. Ditch the checks, go plastic - When you order checks through the mail, they are at risk of being stolen. Most companies make no effort to hide the fact that there are checks being delivered; they're sent in boxes that are about five inches long, three inches wide, and about three inches tall. If they come directly from a banking institution, the bank's name may be affixed to the return shipping label. The same applies for mail order check printing companies. Any alert thief knows these packages and will be on the lookout for them. It's also best to leave your driver's license or identification number OFF of the checks. Only provide them in person and when you are asked for it. The lack of them being printed on a paper check should prompt cashiers to actually check your identification when presented with the check. The best option is simply to ditch the paper and go with the plastic. While debit and credit cards are just as likely to be stolen, they often don't have your driver's license or identification number available.

Steps to Preventing Being a Victim of Identity Theft

Friday, February 10, 2012

Small Business Software

For any business yearning to be more successful, choosing the right business software and installing it can help the company grow by leaps and bounds. This is because; business software applications come with the capability of automating several processes which are otherwise complex and time consuming to be done manually. For a small business, such applications do also save a great deal of budget which otherwise may go in the maintenance of more employees to do the task together which a software application can accomplish all alone in minutes.

Small business software applications

Human Resource Software

First and foremost, a company should be able identify what its specific kinds of bulk load tasks that it would like to transfer to a software application. Some of the regular heavy tasks that can be easily performed by a small business software include word processing, payroll, project management, human resources, inventory control and accounting.

Popular applications

The small business applications are not expensive. Rather, many are available for free. Web based software applications are also available which can be accessed via the internet. Some of the most popular small business software available in the market today include the MS Office Suite, which comes with a host of word processing, documentation and presentation choices, Skype, which allows online business conferencing, instant messaging and calling, Microsoft Office Communicator that allows remote conferencing, instant messages, meeting scheduling options etc and Quicken Home and Business which handles finance monitoring, expense tracking and income reviewing complete with balance charts and graphs, account balances and due dates.

Determining the applications required

Depending on a particular business and its specific requirements, a small business software can be ordered for. The first and foremost thing to do is figuring out in which area or areas of the business is a software application handling needed. For example, a freelancer may require a submission tracking application and a retailer may need a software application to track his inventory of goods. While these are specialized needs of a particular type of a business, there are basic heavy tasks that every business needs to be carried out and those include accounting and finance tracking. Even for such requirements, software applications are available. For companies with a bigger staff, a payroll software may be needed. Moreover, a word processing software may prove to be useful in almost any type of business, as it may be used in writing proposals, advertising, circulars, mail correspondence etc.

Small Business Software

Thursday, February 9, 2012

HRMS System - Employee Tracking Database

Organizations these days are more concerned about their expenses more than ever. With all the economic and financial threats, more and more organizations are gearing towards streamlining different back office functions to realize savings. To help organizations streamline functions to realize more savings, they can turn to the automation of tedious office tasks. Indeed, implementing software solutions can significantly cut down time, effort, and paperwork that comes with traditional office functions. And one department that can benefit from this is human resources. Through implementing a human resources management system or HRMS, human resources personnel are able to better focus on more important functions instead of spending most of their time tracking and managing paperwork.

A human resources management system or HRMS system is simply a computer program that enables the integration of different human resources tasks - from applications tracking to employee performance evaluations to benefits and compensation and a lot more. Several software development companies have developed their own HR management system. In fact, these days, even small and medium sized businesses can benefit from such a software solution. And there is definitely a package out there that can meet the needs and budget of small and mid-sized businesses.

Human Resource Software

While HRMS system packages have similar functions, their components can differ, depending on the software company that has developed them. Some have more functions than the others. Others provide an integration of different functions while others provide an interface between and among functions. Nevertheless, there is one essential element that HR management systems have: an employee tracking database.

An employee tracking database is the most basic storehouse of employee information. It can handle all the different data on employees from the moment they signify their intent to join the organization to the time that they leave it, whatever the reason might be. In fact, there are some organizations who prefer having a stand-alone employee tracking database instead of implementing and deploying a full human resources management system package.

The differences between and among HRMS packages relies on the needs and preferences of different organizations. What is important is for organizations to have a thorough evaluation and selection process so they can truly find the package that would best suit their requirements and preferences. And it helps to involve human resources managers and information technology leaders in the evaluation process to ensure that the selected package is indeed able to bring a solution to the cumbersome paperwork that comes with HR functions and processes.

HRMS System - Employee Tracking Database

Wednesday, February 8, 2012

Virtual Elearning Libraries For Online Learners

Libraries are the heart of every learning institution; from grade school to universities, the library presents a haven for learners needing references for projects and homework. They are extensions of the schools providing knowledge and quiet space for learners to bridge the gap in their education.

Traditional libraries usually contain volumes of encyclopedias, books, and periodicals meticulously organized under the Dewey Decimal System. Only a few years ago, libraries had the physical card catalog where borrowers have to sort through alphabetically organized series of index cards containing the title of the book, author and subject. Stern, obsessive compulsive librarians would shush boisterous students and severely reprimand anyone for showing the least sign of disrespect towards a book. Libraries like books, music and almost everything else are now making a radical change of moving into the virtual world.

Human Resource Software

Virtual libraries are websites and web portals containing catalogues of ebooks and archived media. They are resources that can be used as elearning tools for learners. Most of the virtual libraries on the web are websites of physical libraries. The contents however are limited and most of the time, the library only indicates the availability of the book you searched for and you are required to physically checkout the book. However, there are library portals where the contents are free and open.

The World Digital Library (WDL) is an online portal that consolidates library contents from the 6 continents. The project was headed by the US Library of Congress, the largest library in the world, with the participation of partner institutions in other countries. WDL is also supported by United Nations Education, Scientific, and Cultural Organization (UNESCO) with financial contributions from private foundations and businesses.

The service is free and open to the public. This virtual library aims to provide primary information on cultures and histories of different countries. The interface is available in multiple languages so it is accessible, even to non-English speaking online learners.

Just like any normal library, the World Digital Library can be an extension of the online schools. This is an extremely useful resource for online as well as traditional students with homework and projects. Unlike Wikipedia, the sources in the virtual library are credible; the materials came from previously published books, and various archived media.

Another free virtual library portal is the WWW Virtual Library or VL, for short. The library continuously grows in content and is now reportedly containing 300 sub-libraries. The main categories at this time are: Agriculture, Arts, Business and Economics, Communications and Media, Computing and Computer Science, Education, Engineering, Humanities, International Affairs, Law, Natural Science, Mathematics, Recreation, Regional Studies, Social and Behavioral Sciences, Society and Information and Libraries.

Virtual and online libraries are essential elearning tools for online learners because the contents are checked by the organizations and institutions that created them. Relying on sites like Wikipedia can sometimes lead to erroneous information that may mislead students. Many people believe that if the information came from the internet, then it is automatically true. In actuality, a lot of information on the internet have been created without factual basis. Students have to be careful in choosing their sources and the virtual libraries are references they can rely on.

The world, indeed, is shrinking; with each institutions of learning from different countries contributing knowledge, the virtual library is this generations' answer to the great Alexandria Library from the ancient world.

Virtual Elearning Libraries For Online Learners