Friday, 12 October 2012

IT? how it excite your daily life and stay connected with your circle


Hye Guys!

 
I use to be bored in daily routine....what else we can do more??, how to stay connect to the world, fast, flexible, memorable and the most important worthwhile taking experiences..... boring with favourite Cd’s..Tv program, stay away temporarily at nice and cozy resort(just a relieve and not permanent basis)...apart from  choosing to  click with those we love, we care and we cherish most...which is our families and friends...

Or long lost schoolmate, we never meet them say what...since 10 to 20 years back ago....hemmm i can say...IT has actually contribute majorly in such manner.

We use to complain when we apart from our siblings, parent, cousins, aunty, uncle and friends and best best friends...especially when we got married, further study, transfer from one work location(hehe what iam experiencing now) from one state to another state....how we keep in touch??? Isolated and as if we are disconnected ....obviously we loss and care less to those people we love and used to be close...


With the Smartphone, IT gadget created by the genius from Apple, Blackberry, Samsung and all android and all the what not.....is in fact reconnect us in such a memorable manner and we stay connected to all those beloved family, friends, new so called “friend”, bosses....i love it...and its free!! Seriously it does really change and excite our daily life...it’s like we have something to look forward to share everyday within our circle...just a little thought in my mine
















 

Thursday, 11 October 2012

We WhatsApp All The Time:)

Hi guys!!!


Today my cousins and I shared our all time favorite songs in WhatsApp. Thanks to the technology that we can share so many things with our frens and family anytime and everywhere. The sharing activity definitely brings so much fun out of us..

How about you guys? What application is your favorite?Any fun story to share ?

Tuesday, 9 October 2012

The Practice of Supply Chain Management: Where Theory and Application Converge.



HighBeam® Research

Figure 1 : Components of Supply Chain Management
Supply chain management, as both a key functional area for business and a thriving academic field, has clearly emerged over the past decade and shows no signs of slowing down. Supply chain as an academic field continues to draw interest from neighboring academic areas with longer standing as disciplines. Multiple fields have moved into the supply chain terrain. The field of logistics and transportation has evolved naturally into a supply chain orientation; indeed, most traditional academic programs in logistics and transportation have morphed into a supply chain management approach. 


However, a number of other disciplines have maneuvered for a piece of the supply chain pie. Management science and operations research have applied traditional modeling techniques in areas such as inventory management and the supply chain field. Empirical operations management scholars and programs have also gravitated to the supply chain space. The field of marketing, particularly the sub-field of marketing channels, has also jumped on the supply chain bandwagon. And linkages are present in other academic disciplines that provide a nexus to the supply chain area. For example, I am currently conducting a research project reviewing and summarizing literature in strategic management with applicability to the supply chain field. The strategy field is replete with research contributing to supply chain, including such topics as the make-or-buy decision, organizational modularity, boundaries of the firm, networks, alliances, and supply chain relational management. Theories such as the resource-based view of the firm and transaction cost perspective have been applied to these questions within strategy, and have great relevance to supply chain research in fields such as logistics and transportation. 

While many academic disciplines are conducting research in supply chain, there is an unfortunate lack of communication and cooperation amongst the various disciplines regarding supply chain research. Each academic area tends to be a silo, with building over time and integration of supply chain research in that functional area, but little integration or even acknowledgement of the supply chain work on similar questions in other academic areas. This is unfortunate, as each field offers contributions to the whole of the cross-disciplinary world of supply chain management. 


The recently published book reviewed here is no exception to this general trend. The authors collect together nineteen articles on supply chain management with a distinct management science/operations research orientation. There are three sections to the book. The first focuses on Core Concepts and Practices, including general supply chain principles, the role of inventory, and supply chain performance metrics. The second section addresses Emerging Supply Chain Practices. This section includes articles on sourcing strategy, leveraging of information, e-business, high technology supply chains, and supply chains with differentiated service. 

The third section of the book addresses Supply Chain in Action and includes information based on experience at specific companies. Articles in this section include a postponement example at Lucent Technologies, aerospace supply chain dynamics, and a fabless semiconductor setting, along with analysis of combinatorial auctions in procurement and agent models of supply network dynamics.

To its credit, the volume brings together authors from many leading business schools, along with practitioners from companies such as Boeing, DaimlerChrysler, LogicTools, Hewlett-Packard, and Accenture. The volume is a component of Kluwer's International Series in Operations Research and Management Science, and should prove a valuable addition to the supply chain literature in this academic area. As such, the volume is recommended to supply chain researchers in operations research and practitioners with a strong OR background. 

Two limitations could be noted with regard to the volume: First, the volume is a collection of articles and as such is not as well integrated or organized as would be a stand-alone book or text in the area. The book is thus most appropriate for readers who already have a solid grounding in the supply chain area. Second, the volume, as typical in supply chain writing, has a distinctly management science/operations research orientation. As such, it does not incorporate to any great degree supply chain perspectives from marketing or logistics, and is likely to be of minimal interest to researchers outside the OR domain.

Sunday, 7 October 2012

IT Trends of 2012: Enjoy the Benefits without Taking Unnecessary Risks.


HighBeam® Research

Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, announced the most important technology trends for the coming year include virtualization, cloud computing, social networking and energy efficiency. However, businesses that want to benefit from these trends need to look at adopting iron clad information management and security strategies to ensure data security and data loss avoidance.

"Technologies like virtualization, cloud computing, social networking and energy efficiency present companies with major opportunities to develop their businesses - even in difficult economic times," said Todd Johnson, vice president of data recovery operations, Kroll Ontrack. "However, despite all the enthusiasm for these developments, it is important to keep one eye firmly fixed on the associated risks. Just as with any other technology, data loss can never be completely prevented, and businesses should be prepared for these incidents before they occur."

In 2012, virtualization will continue to evolve and spark a variety of other trends, predicts IT analyst firm Gartner. Without a doubt, virtualization provides more flexibility and hardware independence; however, the risk of data loss remains. Even in the virtual world, information is still stored on a hard or tape drive. Hardware independence does not therefore eliminate the risk of hardware failure, operating errors or insufficient employee training. Rather, companies should make sure they adjust their information management strategies for newly adopted technologies and their associated risks as well as know that expertise and specialized tools can result in a successful data recovery from these complex infrastructures.

Companies will also continue to increase their use of cloud computing in 2012. According to a report recently published by Cisco Systems, cloud-related network traffic is increasing by 66 percent each year. In 2010, there were 130 exabytes of data flowing through cloud networks, and if Cisco's predictions are correct, by 2015, this will increase to 1.6 zettabytes. Although cloud computing offers optimized storage that is not connected to a specific infrastructure, this technology still relies on hardware components and is consequently not immune to data loss. Cloud service clients should therefore work with their provider to understand what safeguards are in place in the event of data loss. A sound and tested disaster recovery plan with an experienced data recovery provider denoted is imperative for any cloud service. Social networking tools such as Twitter, LinkedIn and Facebook are increasingly being used by companies for marketing, recruiting and information sharing. While there is tremendous value in harnessing this collective information, organizations can't overlook how to protect it. Higher levels of human interaction equate to increases in storage volume and consequently the probability of data loss and data security vulnerabilities. Organizations therefore need to make decisions regarding if and where this social networking content is physically stored and how this information can be protected.

The growing bring-your-own-device trend also presents businesses with new challenges, as privately owned mobile phones, tablets and laptops may not be sufficiently secured. Without a concise back-up strategy for personal devices, valuable information may be lost if the personal device is damaged or stolen. Further, proprietary data could remain on the personal laptop or iPad[R] when the employee leaves the company. Companies need services that can retrieve data from damaged devices when necessary as well as professional solutions to securely delete data without damaging the device itself. Flash storage drives and solid state disks (SSDs) in particular offer greater storage capacities and are falling in price. As flash and SSD technology become more widespread, the amount of critical company data stored on them will also grow. Users therefore need efficient ways of recovering data from flash media and SSDs. Standards have not yet been established, so manufacturers have developed their own versions of the technology. As new products hit the market quickly, data recovery engineers will have to stay up-to-speed with the necessary tools and technologies to successfully retrieve data from flash and SSDs. For flash and SSD users, this means that regular backups are even more important.

Finally, 2011 data breach stories and countless spot checks have shown time and again that confidential data has been and continues to be easily retrieved using relatively simple methods. As new technology is adopted in 2012 and older corporate and end user technology is discarded or donated to charitable institutions, organizations and consumers alike must develop strategies for securely deleting data before passing them on. This applies to all mobile devices, laptops, virtual infrastructure, USB sticks, archive volumes and memory cards that are discarded, donated or resold on the second-hand market.

"Kroll Ontrack data engineers specialize in these issues and regularly help organizations and home users with recovering lost or damaged data and advising them on data management strategies," said Johnson. "We continually invest in creating current proprietary tools and technologies to address the latest technology developments and use trends."
Keywords: Industry, Kroll Ontrack Inc., Technology Companies, Information and Data Security, Information and Data Management, Information and Data Loss and Recovery, Information Technology Service Companies.

Friday, 5 October 2012

Management Information Systems (MIS) In The Nutshell



CUSTOMER RELATIONSHIP MANAGEMENT (CRM)

Figure 1.0 : Components of CRM

  • Understand the customer
  • Retain customers through better customer experience
  • Attract new customer
  • Win new clients and contractsIncrease profitably
  • Decrease customer management costs
How CRM is Used Today

CRM is the abbreviation for customer relationship management. CRM entails all aspects of interaction that a company has with its customer, whether it is sales or service-related.  CRM is often thought of as a business strategy that enables businesses to:
While the phrase customer relationship management is most commonly used to describe a business-customer relationship, however CRM systems are used in the same way to manage business contacts, clients, contract wins and sales leads.
CRM solutions provide you with the customer business data to help you provide services or products that your customers want, provide better customer service, cross-sell and up sell more effectively, close deals, retain current customers and understand who the customer is.
Technology and the Web has changed the way companies approach CRM strategies because advances in technology have also changed consumer buying behavior and offers new ways for companies to communicate with customers and collect data about them. With each new advance in technology -- especially the proliferation of self-service channels like the Web and smartphones -- customer relationships is being managed electronically.
Many aspects of CRM relies heavily on technology; however the strategies and processes of a good CRM system will collect, manage and link information about the customer with the goal of letting you market and sell services effectively.
Organizations frequently looking for ways to personalize online experiences (a process also referred to as mass customization) through tools such as help-desk software, e-mail organizers and different types of enterprise applications.