Identify latest developments in MIS regarding Software’s in 2009

Embed Size (px)

Citation preview

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    1/20

    Bajwa,

    IjazH

    ussain.

    bajwaih@

    gmail.com

    2

    009

    Identifylate

    stdevelopmen

    tsinMIS

    regardingSoftwares

    in2009

    This project will help to understand the four basic things about

    Management Information Systems regarding latest developments

    in Software; these will be Upcoming technologies (2010),

    improvements going on in current, arrivals of the 2009 and

    identified problems of latest developments. Most important

    developments were noticed in the fields of online CRM, Cloud

    computing and SaaS.

    Faculty of Management Sciences

    International Islamic University

    Islamabad

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    2/20

    DEDICATION & SPECIAL THANKS

    I dedicate this working to our parents; with there absolute love and care for me; I am able to

    stand here. Named as; Mr. & Mrs. Imtiaz Hussain Bajwa.

    And we pay our dearest thanks for; Prof. Imran M. Qureshi who supported us without any

    official responsibility.

    As this working is done as a small assignment; so problem of language understanding and

    content selection may be pointed out. I hope you will ignore and for in-depth study you can go to

    the references.

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    3/20

    TABLE OF CONTENTS

    UPCOMING TECHNOLOGIES ................................................................................................................... 4

    EXCHANGE 2010 .......................................................................................................................................... 4FUSION APPLICATIONS IN 2010 ...................................................................................................................... 4

    MICROSOFT WITH CRMONLINE DEAL............................................................................................................ 5SALESFORCE.COM ANNOUNCES 'CHATTER' ...................................................................................................... 5OFFICE 2010TECHNICAL PREVIEW ................................................................................................................ 5SAAS APPLICATION AT LARGE SERVICES BUSINESSES ....................................................................................... 6ON-DEMAND DEVELOPMENT PLATFORM ........................................................................................................ 6SAPPOTENTIAL GOOGLE WAVE RIVAL ......................................................................................................... 7SALESFORCE.COM A CUSTOMER SERVICE ........................................................................................................ 7

    IMPROVING SYSTEMS............................................................................................................................... 8

    INFOWORLDS TOP 10EMERGING ENTERPRISE TECHNOLOGIES ........................................................................ 8SALESFORCE.COM TARGETS THE SMALLEST BUSINESSES................................................................................. 11MICROSOFT ADDS ACCESS CONTROLS FORSQLAZURE ONLINE DATABASE ...................................................... 11ERP,CRM ON THE CLOUD:A'SIGNIFICANT' TREND ....................................................................................... 12VIRTUALIZED INFRASTRUCTURE .................................................................................................................. 12GOOGLE GOES AFTER ENTERPRISE WITH GROUPS APP ..................................................................................... 12CLOUD SECURITY SERVICE FROM WEBROOTLOOKS FOR MALWARE .................................................................. 13OPERA 10 .................................................................................................................................................. 13EASY EMAIL ENCRYPTION........................................................................................................................... 13FIRESHOT.................................................................................................................................................. 13ACORN 2.1................................................................................................................................................. 14E-MAIL CAMPAIGN SERVICES ...................................................................................................................... 14

    NEW ARRIVALS IN 2009 ........................................................................................................................... 15

    MIDDLEWARE FOR CORPORATE MOBILITY ..................................................................................................... 15CONNECT TO CUSTOMERS WITH E-MAIL MARKETING .................................................................................... 15

    PEERBLOCKHELPS YOU SURF THE WEB IN SECRET....................................................................................... 15SNOW LEOPARD..WINDOWS 7 .................................................................................................................. 16NOVELL'S SUSELINUX ENTERPRISE DESKTOP 11:A TRUE WINDOWS REPLACEMENT ....................................... 16FAVBACKUP .............................................................................................................................................. 16PRIVACYCHOICE OPT-OUT.......................................................................................................................... 17

    PROBLEMS IDENTIFIED IN CURRENT SYSTEMS ................................................................................ 18

    MOBILE DEVICES EXPOSE NETWORKS TO SECURITY THREATS .......................................................................... 18BAD SOFTWARE DESIGN INHIBITS USE OF ENTERPRISE APPS .......................................................................... 18THE PROBLEM WITH MATURE ERPSYSTEMS ................................................................................................ 19

    REFERENCES ............................................................................................................................................ 20

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    4/20

    UPCOMING TECHNOLOGIES

    Management Information System in simple term can be defined as The study of information system

    focusing on their use in business and management. And the Information System is defined asInterrelated components working together to collect, process, store, and disseminate information to

    support decision making, coordination, control, analysis, and visualization in an organization.

    In this portion we discuss the possible arrival of software and hardware( if something extra ordinary occur

    which change the companies plan then a delay or cancellation of project may occur); as this information

    is taken from the most reliable sources which were possible for us, so no such are there form our point of

    view . Which ultimately affect the Management Information System? Most of the software technologies

    are about the Management Information System and Customer Relationship Management and other

    mainly discuss the coming desktop application also considering the importance of Internet in future so

    online technologies are also described briefly. Keeping in view; any development which can support anorganization or a business in term of decision making, coordination, control, analysis, and latest concept

    of E-marketing and E-management. These topics are tried to cover in briefly; in less possible words with

    keeping in view the limitation of space for the project. If one is interested in the details of these covered

    topics he may go to the references page.

    EXCHANGE 2010

    In Exchange 2010, you move a mailbox which is in active use between message store databases.This lets the e-mail manager balance the load across servers and disk subsystems without making

    mailboxes unavailable. Exchange 2010 is also internally more resilient to failures, with the

    ability to automatically route around and retransmit messages lost by a malfunctioning transport

    hub. Exchange 2010 helps to clean up what was really a confusing set of options. E-mail

    managers looking for guidance on building distributed Exchange networks will be pleased to see

    what has been pushed into Exchange 2010. Microsoft claims these new features will allow

    larger Exchange deployments to use less-expensive hardware.

    FUSION APPLICATIONS IN 2010

    Oracle plans to launch its long-awaited Fusion Applications in 2010, and they will be deployable both on-

    premises and as SaaS (software as a service). Fusion Applications, which Oracle first announced several

    years ago, will combine the best elements of Oracle's various business software product lines into a next-

    generation suite. Oracle has placed special emphasis on improving the user experience with Fusion, as

    well as embedded BI (business intelligence) throughout the applications.

    http://www.networkworld.com/reviews/2009/041509-exchange-2010-test.htmlhttp://www.networkworld.com/reviews/2009/041509-exchange-2010-test.html
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    5/20

    MICROSOFT WITH CRM ONLINE DEAL

    Microsoft is trying to steal away Salesforce.com and Oracle CRM on Demand customers with a new offer

    that will provide them with six months' access to its own CRM Online application at no charge if they

    sign a 12-month contract.

    Microsoft charges $44 per month per user for CRM Online Professional edition. That compares to $65

    per month per user for Salesforce.com Professional. Oracle CRM on Demand pricing starts at $70 per

    month per user. Meanwhile, Microsoft's application is comparable from a feature standpoint and "already

    about 35% cheaper" than the competition. The six-month offer is valid through the end of this year.

    Microsoft will consider expanding access to customers of other CRM products once it sees how well the

    program is received.

    In the new release, Microsoft made signing up for CRM Online "super-simple. No credit card

    information is required to sign up, although users need to provide an e-mail address. Thirty-day trials

    include sample data so users can begin experimenting with the system. A series of help tools provide

    information on setup and maintenance.

    SALESFORCE.COM ANNOUNCES 'CHATTER'

    Salesforce.com opened its annual Dreamforce announced by previewing Salesforce Chatter, a social-

    networking application the vendor dubbed a "Facebook for the Enterprise." The upcoming release bundles

    a variety of now-familiar features, such as personal profiles, real-time feeds from contacts and

    applications, groups and alerts. It can also integrate with Google Apps, the Twitter micro blogging service

    and Facebook.

    Salesforce.com is also providing a set of APIs (application programming interfaces) for tying other

    applications to Chatter. It will also be available on Windows Mobile devices, iPhones and Blackberries.The system will employ the same underlying security and sharing model as other applications built with

    the company's Force.com development platform.

    Chatter will be available early next year. It will be included in paid editions of Salesforce CRM and

    Force.com, and also be available as a Chatter Edition that includes Salesforce Content and Force.com for

    $50 per user per month. Salesforce.com's entry raises the competitive stakes for the many small,

    specialized vendors hoping to sell social networking platforms into enterprises. Moreover, social

    networking capabilities are a natural counterpart to CRM systems, given the latter's emphasis on

    continuous communication with customers and suppliers.

    OFFICE 2010 TECHNICAL PREVIEW

    Microsoft Office 2010, as revealed by the just-released Technical Preview, brings a set of important if

    incremental improvements to the market-leading office suite. Among them: making the Ribbon the

    default interface for all Office applications, adding a host of new features to individual applications such

    as video editing in PowerPoint and improved mail handling in Outlook and introducing a number of

    Office-wide productivity enhancers, including photo editing tools and a much-improved paste operation.

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    6/20

    The Ribbon takes center stage

    Paste Preview

    Photo editing tools

    Communications, 64-bit version

    Faster mail handling

    PowerPoint enters the video age.

    Office on the Web -- not yet

    SAAS APPLICATION AT LARGE SERVICES BUSINESSES

    SaaS (software as a service) is an application for large services provider. The application,

    Appirio Professional Services Enterprise, is built on top of Force.com, the native development

    platform of a key Appirio partner, on-demand CRM (customer relationship management) vendorSalesforce.com. There is a wide array of PSA (professional services automation) offerings

    available in the market, with many tuned for specific verticals.

    Appirio has made it easy to extend and modify facets of its application's "four pillars" -- people, projects,

    customers and numbers -- to suit a particular industry or business. SaaS offers faster deployment than on-

    premise software, which is valuable "in cases where you need to quickly put a project together. It is also

    beneficial for "cases where your team members are located far away from each other. The Pricing of PS

    Enterprise starts at $45 per user per month for organizations with more than 100 users.

    ON-DEMAND DEVELOPMENT PLATFORM

    SAP is hoping to build a platform of third-party SaaS (software-as-a-service) applications to

    complement its own emerging wave of offerings. There intent is not to go out and be a tools

    provider. We want to build good tools to build great applications and we want to open those up

    to third parties to use.

    One of the biggest things people want to be able to do is to connect to our data sources or to

    connect to [SAP] Business Suite data sources. Therefore, SAP is developing the platform as a set

    of on-demand services. So you want to go connect to a certain customer's implementation of the

    Business Suite. You can use these on-demand services to connect to it, get access to master data,

    and so on.

    Meanwhile, the periodic but high-profile service outages suffered by some SaaS vendors over the

    past couple of years have not been lost on SAP. The company has developed a "ramp plan" for

    scaling up its technology and support infrastructure as SAP adds more on-demand customers.

    Company worry about reliability all the time, but the good answers to all my hard questions so

    they think we're in a good position to serve our customers.

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    7/20

    SAP POTENTIAL GOOGLE WAVE RIVAL

    SAP is planning to release a "virtual war room" decision-making tool dubbed Constellation,

    which could be a potential rival to Google's heralded Wave collaboration platform. Constellation

    will consist of a cloud-based tool accessible via a Web browser, as well as an on-premises

    component, the company's term for particularly active and valued community members.

    Users involved in buying decisions could pull in data from a purchase order system, discuss the

    pros and cons, and reach a verdict. Right now, that's all being done on the phone, and it's all lost.

    It's not captured. That kind of cognitive capture is very powerful.

    Users of SAP ERP (enterprise resource planning) systems dating back will be able to move the

    contents of a screen to Constellation for discussion. SAP plans to create an App Store-like

    marketplace for the platform, where developers can create custom integrations or methods and

    put them up for sale. They want to open it up for the community, for the teenagers in the garage.

    The on-premises portion may be in beta by April 2009, and generally available sometime in2010.

    SALESFORCE.COM A CUSTOMER SERVICE

    The application is a response to traditional Web site forums, which provide some customer self-

    service functionality but tend to get overwhelmed by long, meandering threads that obscure the

    most valuable answers to particular questions. Web sites such as Yahoo Answers, where

    community members rate and rank answers to questions are a better solution and

    Salesforce.com's software will work much the same way. It will also be available as a Facebook

    application that connects back to the Salesforce.com system. It is scheduled for release in thefirst half of 2010.

    The idea is to make the tips and how-to information commonly found in knowledge bases

    available through multiple channels; as well as uses those channels to procure additional useful

    material. For example, an agent who spots a particularly popular response to a question posed

    through Salesforce.com Answers could choose to pull it into a new file for the knowledge base.

    Salesforce.com has announced that its Service Cloud Twitter integration, announced earlier this

    year, is now generally available. A company can use Twitter to track conversations about its

    products, or set up a Twitter channel dedicated to fielding customer service requests.

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    8/20

    IMPROVING SYSTEMS

    In this portion we discuss the Improvements in software and hardware; which ultimately affect the

    Management Information System. Most of the software technologies are about the Management

    Information System and Customer Relationship Management and other mainly discuss the coming

    desktop application also considering the importance of Internet in future so online technologies are also

    described briefly. Keeping in view; any development which can support an organization or a business in

    term of decision making, coordination, control, analysis, and latest concept of E-marketing and E-

    management.

    INFOWORLDS TOP 10 EMERGING ENTERPRISE TECHNOLOGIES

    List is based entirely on the collective judgment of InfoWorld editors and contributors. If it's

    your job to concoct your organization's technology strategy and decide where to place your bets,

    then our top 10 emerging enterprise technologies is for you.

    10.Whitelisting Keeping: Whitelisting starts with a clean, malware-free image of a desktop orserver. Then whitelisting software is run to uniquely identify files using one or more

    cryptographic hashes. Most companies distribute standard system images across the enterprise,

    so whitelisting can be an extremely efficient way to lock down security.

    Whitelisting requires a cultural shift. In many enterprises today, users still have some measure of

    control over what they run on their own desktop or laptop computers. But due to the relentless

    ramp-up in new and smarter malware -- and the increased involvement of organized crime inmalware-based attacks -- whitelisting may be our only hope in the losing battle over enterprise

    security.

    9. Cross-platform mobile app devices: The days of the iPhone being the only attractive game in

    town are fading fast, though, as developers check out the competition. Android and BlackBerry

    phones speak Java. Nokia's Symbian OS runs many languages, including several versions of C

    and C++. Numerous developers look at this stew and see a common theme.

    For enterprises, cross-platform app dev eliminates a key barrier to developing and deploying

    mobile applications developed in-house. It's difficult to mandate that all employees use the same

    Smartphone, and even if you could, coding your apps for a specific platform locks you in. With

    cross-platform app dev, you can write it once -- without having to learn the quirks of a specific

    platform -- and run it across many devices. At last, widespread deployment of mobile enterprise

    applications may become a reality.

    8. Hardware power conservation: We all know the "two kinds of green" clich: Save the planet

    and save money by reducing power consumption.

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    9/20

    More efficient power supplies, along with hard drives that reduce speed or shut themselves off

    when they aren't needed, are delivering the goods right now. But in order to "park" inactive cores

    and motherboards or other components that go to sleep, multicore CPUs generally need to be

    told to do so at the OS or application level.

    Power supplies are the simplest way to save energy. They need no software support and producea double savings; they waste less electricity in the AC-to-DC conversion process and produce

    less heat -- reducing the power required for cooling. The 80 Plus certification program, funded

    by a consortium of electric utilities, provides incentives for manufacturers to produce power

    supplies that are at least 80 percent efficient, a jump from old units that went as low as 50

    percent.

    7. Many-core chips: The major processor vendors have hit the wall with clock speed. Chips

    with multiple cores consume less power, generate less heat, and complete work very efficiently.

    This era, dubbed "many core" -- a term that refers to more than eight cores -- is set to break out

    shortly. Intel, for example, has already shown working demos of a chip from its Tetra-scaleproject that contains 80 cores and is capable of 1 teraflop using only 62 watts of power.

    It's clear the many-core era -- which will surely evolve into the kilo- and mega core epoch -- will

    enable us to perform large-scale operations with ease and at low cost, while enabling true

    supercomputing on inexpensive PCs.

    6. Solid-state drives SSDs (solid-state drives) have been around since the last century, but today

    we're seeing wider adoption, with SSDs being used as external caches to improve performance in

    a range of applications. Gigabyte for gigabyte, SSDs are still a lot more expensive than disk, but

    they are cheaper than piling on internal server memory.

    Compared to hard drives, SSDs are not only faster for both reads and writes, they also support

    higher transfer rates and consume less power. On the downside, SSDs have limited life spans,

    because each cell in an SSD supports a limited number of writes. There are two types of SSDs:

    single-level cell (SLC) and multilevel cell (MLC). SLCs are faster than MLCs and last as much

    as 10 times longer (and, as you might imagine, cost a lot more).

    5. No SQL databases:The hottest Web sites are spewing out tetra bytes of data that bear little

    resemblance to the rows and columns of numbers from the accounting department. Instead, the

    details of traffic are stored in flat files and analyzed by corn jobs running late at night. Diving

    into and browsing this data require a way to search for and collate information, which a

    relational database might be able to handle if it weren't so overloaded with mechanisms to keep

    the data consistent in even the worst possible cases.

    You can make anything fit into a relational database with enough work, but that means you're

    paying for all of the sophisticated locking and rollback mechanisms developed for the accounting

    department to keep track of money. Unless the problem requires all of the sophistication and

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    10/20

    assurance of a top-of-the-line database, there's no need to invest in that overhead, or suffer its

    performance consequences.

    4. I/O virtualization: I/O virtualization addresses an issue that plagues servers running

    virtualization software such as VMware or Microsoft Hyper-V. When a large number of virtual

    machines run on a single server, I/O becomes a critical bottleneck, both for VM communicationwith the network and for connecting VMs to storage on the back end. I/O virtualization not only

    makes it easier to allocate bandwidth across multiple VMs on a single server, it paves the way to

    dynamically managing the connections between pools of physical servers and pools of storage.

    A single adapter resides in each server, connected by a single cable to the appliance or switch,

    which then provides both network and storage ports to connect to storage and other networks.

    This simplifies datacenter cabling, as well as the installation of each server. It also eases the task

    of transferring adapters to another system if a server fails. Further, because the I/O virtualization

    systems can emulate either multiple Ethernet or Fiber Channel connections running at varying

    speeds, available bandwidth can be tailored to the requirements of VM migration or other heavyloads.

    3. Data deduplication: Data is the lifeblood of any business. The problem is what to do with all

    of it. According to IDC, data in the enterprise doubles every 18 months, straining storage

    systems to the point of collapse. More significant, though, is that there's no expiration date on

    business value. Surely here must be a way to reduce the immense storage footprint of all of this

    data, without sacrificing useful information. And there is, thanks to a technology known as data

    deduplication.

    Every network contains masses of duplicate data, from multiple backup sets to thousands ofcopies of the employee handbook to identical file attachments sitting on the same e-mail server.

    The basic idea of data deduplication is to locate duplicate copies of the same file and eliminate

    all but one original copy. Each duplicate is replaced by a simple placeholder pointing to the

    original. When users request a file, the placeholder directs them to the original and they never

    know the difference.

    2. Desktop virtualization: After Desktop virtualization, another milestone is just around the

    corner: truly emergent technology in the guise of the desktop hypervisor. The desktop

    virtualization technologies are applicable to your enterprise is wholly dependent on the nature of

    the business.

    The client hypervisor takes desktop virtualization the last mile. Picture each desktop running its

    own bare-metal virtualization layer that abstracts the baseline hardware to whatever VM you

    wish to push to the desktop, where it can be centrally managed, synced with a mirror on a server,

    and easily replaced (or even reset by the user) when things go wrong. Citrix isn't alone with this

    concept -- VMware is developing a similar solution, and both promise to hit the market in 2010.

    As the blend of desktop virtualization technologies reaches a critical mass, the wide variety of

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    11/20

    ways to ship a Start menu to a user offers a better chance that at least one will apply in every

    instance. Certainly, if the world turns its back on fat clients at every desk, IT will be a happier

    place.

    1. Map Reduce: Map Reduce enables enterprises to plunge into analyzing undreamed of

    quantities of data at commodity prices, a capability that promises to change business forever.IDC has predicted a tenfold growth in digital information between 2006 and 2011, from just

    fewer than 180 Exabytes to 1,800 Exabytes (that's 1 trillion and 800 billion gigabytes!). This

    explosion represents a challenge, of course (how to store, retrieve, and archive all that data), but

    also a huge opportunity for enterprises. After all, everything in that sea of data is potentially

    information -- information that could be used to guide business decisions.

    In its simplest form, Map Reduce divides processing into many small blocks of work, distributes

    them throughout a cluster of computing nodes (typically commodity servers), and collects the

    results. Supporting highly scalable parallel processing, Map Reduce is fast, cheap, and safe. If

    one node goes down, the lost work is confined to that individual node.

    SALESFORCE.COM TARGETS THE SMALLEST BUSINESSES

    On-demand CRM (customer relationship management) vendor Salesforce.com is an application

    aimed at companies with just one or two employees. The offering is priced at US$9 per user per

    month. Salesforce.com expects a ready audience for it. Many people having lost their jobs during

    the recession are starting their professional lives over by forming new businesses. They need the

    right product at the right price. This emerging body of entrepreneurs will see the value in having

    their contact information stored in a single place and accessible through an Internet connection,

    he added. Users can stock each of their contact pages with a variety of information, such as

    upcoming meetings, shared documents and connections to the contact's Twitter feed and

    LinkedIn profile. It is also possible to create custom fields and run a variety of prebuilt and

    customized reports, such as for "neglected accounts."

    MICROSOFT ADDS ACCESS CONTROLS FOR SQL AZURE ONLINE

    DATABASE

    Companies will be able to define, enforce policies controlling who can see what data Microsoft

    Corp. is creating technology to give businesses more fine-grained control over access to datastored in the company's upcoming SQL Azure database-as-a-service. Code-named Vidalia, the

    technology will provide "trustworthy data collaboration for highly-sensitive business data across

    disparate trust domains. Companies will be able to define and enforce policies controlling who

    can see what data at a very detailed level. It will bring a "database clone"; Users will be able to

    restore their databases to any point in time. Microsoft is also working on making it easier for

  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    12/20

    users to grow and shrink their databases, so that they are not constricted in size or overpay for

    storage they don't need.

    ERP, CRM ON THE CLOUD: A 'SIGNIFICANT' TREND

    Rather than pay someone to support a packaged application internally, cloud computing in

    general allows enterprises to take advantage of applications that they can tweak to address their

    specific requirements. Leveraging economies of scale, cloud computing providers can make

    support costs less expensive, and it's generally less costly when it comes time to upgrade as well.

    The cloud is about having a custom-developed application versus something everybody else is

    packaging. In the meantime, the open-source cloud computing approach is more of a hit among

    small companies and startups, which Forrester Research says are the main users of cloud

    computing at the moment. They don't have a complicated infrastructure of IT investments to

    manage. There are concerns about a lack of control over the data and about security. However,

    cloud hosting companies maintain that security is one of their core competencies. But there will

    be more of a movement toward on-demand, open-source cloud computing if the open-source

    vendors have reseller agreements with hosting providers to redistribute the code.

    VIRTUALIZED INFRASTRUCTURE

    Microsoft and data storage company NetApp Inc. going for Virtualizations; the two companies

    will collaborate to deliver technology that includes virtualization, private cloud computing as

    well as storage and data management. For data center administrators that will mean a moretightly consolidated view for managing both server and storage infrastructure. This will move

    toward enabling better management of public and private cloud infrastructures, where -- once

    virtualization is well established -- workloads can be dynamically moved around for better

    utilization of assets. It's no longer about thinking about workloads tied to specific servers, and, of

    course, storage plays a big role in that whole model of private cloud.

    GOOGLE GOES AFTER ENTERPRISE WITH GROUPS APP

    The company is launching Google Groups for its Google Apps Premier and Education Edition

    users. Employees can use these groups as mailing lists, but they can also share documents,spreadsheets, presentations, calendars, videos and sites with groups, instead of many individual

    recipients. By unveiling applications for the enterprise, Google has the opportunity to not only

    move into the lucrative enterprise realm but to sock it to Microsoft at the same time. This past

    summer, Google unveiled the Google Apps Connectorfor BlackBerry Enterprise Server in

    another move to make its hosted applications more attractive to business users.

    http://www.computerworld.com/s/article/9138649/Defining_Cloud_Security_Six_Perspectiveshttp://www.computerworld.com/s/article/9137060/Microsoft_Update_Latest_news_features_reviews_opinions_and_morehttp://www.computerworld.com/s/article/9132538/Google_targets_business_users_with_BlackBerry_connectorhttp://www.computerworld.com/s/article/9132538/Google_targets_business_users_with_BlackBerry_connectorhttp://www.computerworld.com/s/article/9137060/Microsoft_Update_Latest_news_features_reviews_opinions_and_morehttp://www.computerworld.com/s/article/9138649/Defining_Cloud_Security_Six_Perspectives
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    13/20

    CLOUD SECURITY SERVICE FROM WEBROOTLOOKS FOR MALWARE

    Web Security Service; can now monitor for signs of malware-infected corporate computers

    trying to "call home" for more instructions a common practice among criminally run bonnets. If

    the cloud-based Webrootservice detects malware such as bonnet code calling out to get

    instructions or otherwise perform an activity, it will block that request, though not all traffic onthe user's machine. The Webrootservice would then notify the systems administrator of the

    security event via e-mail and the Web-based administrative console where reports can be

    obtained.

    OPERA 10

    The venerable browser's latest version introduces several innovative interface ideas, some more

    useful than others. In benchmark tests, Opera 10 performs respectably in the middle of the pack

    when compared to other browsers. In a CSS test, Opera scored 152 milliseconds to Safari's 35

    ms and Firefox's 361 ms. And in Web standards, Opera 10 earned a perfect score of 100 on the

    Acid3 rendering test, and rendered all 578 selectors in a CSS3 compliance check.Opera 10unveils an impressive number of new design elements, although some are more pretty than

    practical. Visual tabs, for example--drag down the tab bar to reveal thumbnail images of each

    open page--look nice, but seem to add little usefulness.

    EASY EMAIL ENCRYPTION

    It provides about an easy a way to encrypt communications as you'll be able to find--as long as

    the receiver has a copy of the program as well. To encrypt a message that you want to send, copyit into the program, tell the program to do the encryption, and it copies the garbled, encrypted

    text to your clipboard. Simply copy the encrypted text into an email message and send it along.

    The recipient can then copy the encrypted text to their Windows clipboard, and have Easy Email

    Encryption Lite decrypt it. That requires, though, that both sender and recipient agree on the key

    to use. You can use keys of between 16 and 64 characters, and the longer the key, the more

    secure will be the communications.

    FIRESHOT

    Lets You Capture, Annotate Web Pages If you need to take screenshots of Web pages--and annotatethem and send them to others--you'll want to immediately download FireShot (free). This

    excellent Firefox add-in is the best tool I've yet seen for capturing and annotating Web pages.

    You can use a variety of annotation tools for marking it up, including drawing tools, shape tools,

    text tools, pointers, the ability to add graphics and more. FireShot has plenty of useful options

    and features, such as integration with your e-mail software to immediately e-mail a captured

    page.

    http://acid3.acidtests.org/http://www.pcworld.com/downloads/file/fid,81246-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,23160/description.htmlhttp://www.pcworld.com/downloads/file/fid,23160/description.htmlhttp://www.pcworld.com/downloads/file/fid,81246-order,3/description.htmlhttp://acid3.acidtests.org/
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    14/20

    ACORN 2.1

    Acorn allows you to save your image as a JPEG, GIF, or PNG while previewing the results side-

    by-side with the original. Save options also include familiar formats such as TIFF, BMP, and

    Acorn's own proprietary file format. The only thing I found lacking is the ability to save a

    layered screenshot as a PSD file; but with plenty of image-editing capability built in to the newversion, it's not really necessary to export anything into Photoshop.

    E-MAIL CAMPAIGN SERVICES

    Emma e-mail marketing service handles almost everything except your specific message content.

    The company designs an e-mail template based on your preferences, website, and logo. So for

    future mailings, you can just change the text for a new message. Emma imports your contact list

    as an Excel spreadsheet file. Even better, the service cleans up bounced addresses and duplicates

    automatically, saving you time from culling the database. Additional features can target

    recipients based on their geographical location or alert you if your message seems likely to

    trigger spam filters.

    http://www.myemma.com/http://www.myemma.com/
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    15/20

    NEW ARRIVALS IN 2009

    Here we discuss new arrival in 2009 of software and hardware; which may affect the Management

    Information System. Most of the software technologies are about the Management Information System

    and Customer Relationship Management and other mainly discuss the coming desktop application also

    considering the importance of Internet in future so online technologies are also described briefly mainly

    for business. Keeping in view; any development which can support an organization or a business in term

    of decision making, coordination, control, analysis, and latest concept of E-marketing and E-

    management.

    MIDDLEWARE FOR CORPORATE MOBILITY

    Some software makers claim that by partnering with wireless specialists to develop their

    systems, they are selling more licenses to end users today. At the core of enterprises' strategy is

    its own Mobile CRM software module, which it also sells as a stand-alone product. Having spentyears developing the right mix of features and formats for pushing business applications such as

    sales force automation (SFA) tools to mobile devices, the company claims it is accelerating the

    pace with which its partners can offer wireless applications to their customers. The middleware

    model is becoming so pervasive that some applications vendors have moved to acquire providers

    of the technologies. Customers agree that the middleware-bred mobile systems are getting the

    job done well. The response has been really strong as these systems have worked so well. Now

    our salespeople can truly have constant connectivity, which is a huge advantage in terms of them

    not having to replicate information.

    CONNECT TO CUSTOMERS WITH E-MAIL MARKETING

    To help you manage e-mail marketing effectively, e-mail marketing services deliver help you

    organize your contacts, track readership, and evaluate their interest in what you're sending out.

    You'll build a newsletter template, import and manage the contact list, send messages, and audit

    results. Many services can fill this role, and they all share many similarities. Here are a few good

    e-mail marketing services to check out. If you want to try your prospects without paying,

    consider the free version ofMailChimp to manage lists of 500 customers or fewer. JangoMail

    can connect to your contact databases directly from your mail server, streamlining the process by

    avoiding the exporting step to bring in new e-mail addresses.

    PEERBLOCK HELPS YOU SURF THE WEB IN SECRET

    They're lurking out there--sleazy spyware companies, unscrupulous advertisers, and just people

    you don't want looking at what your computer is doing.PeerBlockdoes a huge amount of the

    work for you, by providing several frequently-updated lists of host addresses. Getting the most

    http://www.mailchimp.com/http://www.jangomail.com/http://www.jangomail.com/http://www.mailchimp.com/
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    16/20

    out ofPeerBlockrequires a little bit of technical savvy. It is easy to add new block lists, or to

    unblock a particular range of addresses for a short period, or forever.

    SNOW LEOPARD..WINDOWS 7

    Both Apple and Microsoft have been chasing 64-bit computing as if it was the Holy Grail -- and

    in some ways it is. 64-bit computing opens a lot of doors for hardware and software developers.

    Because 64-bit processors have twice the number of registers to work with, they can process

    twice as much information as per clock cycle as 32-bit processors. That obviously means much

    better performance. Another big advantage to 64-bit computing is addressing memory. In

    Memory-hungry applications; that performs complex and data-intensive tasks (such as high-end

    graphics, video, or scientific computing tools. In fact, 64-bit computing even offers some

    additional security because the routines used to interact with the processor are more secure than

    in 32-bit computing. What's more, the system heap (which is shared memory available to

    applications) is designed with both hard protections and stronger checksum algorithms that helpprotect against attempts to corrupt the addressable memory used by the operating system and

    applications.

    NOVELL'S SUSE LINUX ENTERPR ISE DESKTOP 11: A TRUE WINDOWS

    REPLACEMENT

    Linux SLED 11, which was released on March 24, stands above its competitors because it works

    and plays well with existing Windows business networks, data files and application servers.

    Installation is a snap. Inserting the DVD and following told the install program to do its stuff;

    the process will be over in a few minutes. Hopefully, that deal will go through, because SLEDran flawlessly on all three PCs. It had no trouble working with a variety of Wi-Fi and graphics

    cards. SLED, with all of its Microsoft integration, isn't a Linux for free software purists. But it is

    a desktop Linux distro that makes a fine drop-in replacement for Windows at most offices. It is

    because there are some things that Windows users take for granted, such as being locked into

    Microsoft's document formats; there are security threats that could destroy a business. If you

    want Windows compatibility, but you'd prefer a cheaper and more stable and secure alternative,

    then SLED 11 is the desktop operating system for you.

    FAVBACKUP

    Personal settings and data such as bookmarks, history, cookies, and saved passwords are

    essential to productivity. FavBackup(free) recognizes the importance of such data and offers an

    easy and comprehensive way to back it all up. Perhaps even more useful, you can use the

    program to migrate settings to a browser on a different computer. The "Backup" option allows

    you to choose which items you want to save for a specific profile, while "Full Backup" saves all

    http://www.pcworld.com/downloads/file/fid,81391-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,81391-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,81391-order,3/description.html
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    17/20

    settings for all profiles. FavBackuppackages everything into a neat .dat file that is easily

    transported and stored.

    PRIVACYCHOICE OPT-OUT

    Ad networks and Web sites constantly track your behavior as you surf the Web, recording what

    sites you visit, what pages you visit on sites, and what kind of content you like to view. In

    business it is very dangerous trend for leaking out the information so solution is:PrivacyChoice

    Opt-Out, which lets you stop more than 100 companies from tracking your behavior. Install the

    add-in, then choose Tools-->PrivacyChoice Opt-Outs in Firefox, and you'll be sent to a Web

    page that lists more than 100 companies and Web sites that track your behavior, and from which

    you can opt out. You can find information about each Web site, such as whether it shares

    information about you with partners, whether you are anonymous when you visit the site, and so

    on. On the Web page you can then opt out of all of the companies, or only the ones you select.

    http://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.htmlhttp://www.pcworld.com/downloads/file/fid,82019-order,3/description.html
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    18/20

    PROBLEMS IDENTIFIED IN CURRENT SYSTEMS

    Now we focus on the some of the problem identified in the software and hardware; which may affect the

    Management Information System. Most of the software technologies are about the Management

    Information System and Customer Relationship Management. Keeping in view; any loop hole which can

    affect an organization or a business in term of coordination, control, & security.

    MOBILE DEVICES EXPOSE NETWORKS TO SECURITY THREATS

    The latest IT security threat plaguing the corporate office is actually clipped to the belts and

    purses of a company's mobile workforce. Wireless devices that can send and receive e-mail --

    Blackberries, Windows Mobile-based phones or other smart phones -- are emerging as serious

    corporate threats because they have become so advanced and widely used, yet are so thinly

    secured, that cybercriminals are targeting them as a path to corporate data, say security experts

    and vendors. There have been cases of viruses and other nasty things that can be done to mobilephones that have not really been serious yet, but they will be. One is text-messaging spam, or

    quick Short Message Service (SMS) messages that mobile phone users receive directing them to

    a Web site where the sender is selling something, or in more sinister cases to a site that captures

    personal or financial information. This particularly annoying form of spam has been around for a

    few years, but hasn't been prevalent in the United States since text messaging is not as popular

    here as in Europe and Asia.

    Because an employee's mobile device -- often issued and approved by the corporate IT

    department -- is open to such threats, so is the entire network when the employee connects to the

    company's Exchange server or enters data into a CRM application from the handset. People trustthese devices, they say 'I got it from my corporate IT guys, so it's got to be secure but attackers

    always look for the highest return from the least-known back door.

    BAD SOFTWARE DESIGN INHIBITS USE OF ENTERPRISE APPS

    The new book, Wrench in the System (Wiley), takes a scathing look at business software

    development practices, especially the products ofenterprise vendors. "Software manufacturers

    are generally confident that their products will succeed on the strength of their technology." But

    products that don't appeal to their users can be self-defeating. Whenever software systems create

    obstacles-technical jargon, ambiguous messages, illogical sequences or visual clutter-the peoplewho use these systems will respond in a variety of ways. That typically includes undesired

    behaviors that users (and CIOs and applications managers) know all too well-frustrating and

    inefficient workarounds, complete disregard for business process.

    http://www.wrenchinthesystem.info/http://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/blogs/enterprise_software_unpluggedhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/blogs/enterprise_software_unpluggedhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://advice.cio.com/thomas_wailgum/what_does_a_successful_erp_implementation_actually_meanhttp://www.wrenchinthesystem.info/
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    19/20

    THE PROBLEM WITH MATURE ERP SYSTEMS

    Most CIOs today have inherited mature ERP systems implemented by predecessors, over which

    they have little to no control as the years pass, the original implementation team disbands, retires

    or dies, and the old use cases and best practices start to brown and curl at the edges like the

    sepia-tinted photos of yesteryear. Like tectonic plates adrift on a sea of magma, ERP instancesand the businesses they serve are bound to drift apart over time ordramatically collide with

    earthquake-like consequences.

    Further complicating matters is that while spending on ERP has grown at the rate of 6.9 percent

    each year, so too has dissatisfaction among end users with those enterprise applications,

    according to the Forrester report. In other words, ERP is a lose-lose scenario. Several challenges

    that cause end users, software vendors, consultants and systems integrators to struggle with ERP

    Business really does evolve faster than users can recast the 'silicon cement' of ERP using present

    technologies and practices. The main problem is to find in one body of experts knowledge both

    of the business reasons for the modifications and of the true capabilities of the vendor's newrelease.

    http://www.cio.com/article/40323http://advice.cio.com/thomas_wailgum/what_netbook_fans_and_frustrated_erp_customers_have_in_commonhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/5_ways_to_excite_the_generals_and_the_troops_about_erphttp://www.cio.com/article/499620http://www.cio.com/article/499620http://advice.cio.com/thomas_wailgum/5_ways_to_excite_the_generals_and_the_troops_about_erphttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/why_erp_is_underused_companies_are_oversoftwaredhttp://advice.cio.com/thomas_wailgum/what_netbook_fans_and_frustrated_erp_customers_have_in_commonhttp://www.cio.com/article/40323
  • 7/28/2019 Identify latest developments in MIS regarding Softwares in 2009

    20/20

    REFERENCES

    http://www.networkworld.com

    http://www.salesforce.com

    http://www.computerworld.com

    http://www.pcworld.com http://www.advice.cio.com

    http://www.infoworld.com

    http://www.wikipedia.org

    http://www.apple.com

    http://www.ibm.com

    http://www.microsoft.com

    http://www.economist.com

    http://www.networkworld.com/http://www.salesforce.com/http://www.computerworld.com/http://www.pcworld.com/http://www.advice.cio.com/http://www.infoworld.com/http://www.wikipedia.org/http://www.apple.com/http://www.ibm.com/http://www.microsoft.com/http://www.economist.com/http://www.economist.com/http://www.microsoft.com/http://www.ibm.com/http://www.apple.com/http://www.wikipedia.org/http://www.infoworld.com/http://www.advice.cio.com/http://www.pcworld.com/http://www.computerworld.com/http://www.salesforce.com/http://www.networkworld.com/