Monday, March 31, 2008

Opportunities in CRM Market

Earlier when organizations of major projects concentrated on Main Frames, ERP, SCM and MRP systems, a new concept of "Front Office" has changed focus to Customers resulting emergence of Customer Relationship Management (CRM) applications. CRM has helped organizations in & 39; improvement of & 39; efficiency and better services for customers. CRM has been the mantra to survive in the competitive market by focusing on customer needs. To achieve this, there were many CRM solutions that came out in the market. These solutions included generic CRM solutions focused on sales and services to industry & 39; embedded solutions that best practices in these industries. These solutions help software developers and software vendors to generate large revenues in terms of sales and implementation of such applications.
Now most large organizations have chosen, implemented and more or less stabilized the & 39; one or the other application & 39; with its base and the functionality of CRM customized. This article explores d & 39; other opportunities that are available in CRM Market.
Enterprise Application Integration (EAI): Once a CRM solution is implemented, the Organization & 39; must focus on its integration with other applications d & 39;. There are diverse applications and technologies used in an Organization that need to interact with each other. Integrating these applications can share data critical for the company & 39; and & 39; help improve the efficiency of & 39; company & 39; better by reducing the time it takes to move on the collection and sharing of such information. This brings to the possibility of & 39; application to application (A2A) and Business to Business (B2B) integration strategies & 39; EAI using as a point-to-point, the Hub and Spoke and Distributed Messaging.
Upgrade: There are many large organizations that have heavily customized CRM solutions which they have continued to use for years. There are new / new versions of these applications available. As of now there are many providers of CRM solutions that support older versions of & 39; application, but how long is a question. Once these agencies decide to upgrade or move to later / latest versions of & 39; application, it will open up new markets.
Small and medium enterprises (SME): Although CRM solutions have been implemented by most large organizations, the SMEs segment is still very open and a lot of potential for & 39; be capitalized.
Hosted Solutions: There are many small organizations that & 39; n & 39; have neither infrastructure nor the ability & 39; buy and implement CRM. These smaller organizations prefer to opt for hosted solutions and pay based on the use & 39;.
Redesign place to reinvent the wheel, it - New technology of the architecture as & 39; Changes Service Oriented Architecture is demanding the redesign of the architecture of the & 39; CRM solution. This has opened up new market opportunities for software vendors and system integrators. elizabet tena



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

CCNP Certification / BCMSN Exam Tutorial: Getting Started With HSRP

Defined in RFC 2281, HSRP is a proprietary protocol from Cisco routers, in which a group HSRP router. Together with dynamic routing protocols and STP, HSRP is a high availability network service, as all three have an almost immediate elimination of a secondary path when the primary path is unavailable.
One the router are considered primary (Active & " quot;, In HSRP terminology), and that is the primary routing, while the other routers are in standby mode, ready to be loaded when the primary router is not available. In this fashion, HSRP guaranteed high network availability, as it routes IP traffic, without a single router.
The host as a gateway with HSRP do not know the actual IP or MAC addresses of the routers in the group. They communicate with a pseudorouter a virtual router " " caused by the HSRP configuration. This virtual router is a virtual MAC and IP address as well.
The standby routers are not only to sit, though! Due to the configuration of HSRP several groups through a single interface, load distribution HSRP achieved.
Before we can to the more advanced HSRP configuration, we get a more fundamental one started! We will work with a two-router topology here, and note that one or both of these routers could also Multilayer Switches. To facilitate reading, I rely on them only as routers.
R2 and R3 will also be configured so that in the standby Group 5 The virtual router is an IP address 172.12.23.10 / 24. All hosts in VLAN-100 should address them as their default values gateway.
R2 (config) interface ethernet0
R2 (config-if) ip 172.12.23.10
R3 standby 5 (config) interface ethernet0
R3 (config-if) ip 5 Standby 172.12 .23.10
The show command is HSRP standby for show, and it is the first command you in configuring and troubleshooting HSRP. Leave it on both routers and compare results.
R2 show standby
Ethernet0 - Group 5
Local standby state, priority 100
Hellotime 3 sec, holdtime 10 sec
Next hi sent in 0.776
Virtual IP address 172.12.23.10 configured
Active router 172.12.23.3, priority 100 runs In 9.568
Standby router local
1 state change, change state 00:00:22
R3 show standby
Ethernet0 - Active Group 5
Local state, priority 100
Hellotime 3 sec, holdtime 10 sec
Next hi sent in 2.592
Virtual IP address 172.12.23.10 configured
Active router local
Standby router 172.12 .23.2 runs in 8.020
Virtual mac address is 0000.0c07.ac05
2 state change, change state 00:02:08
We can see that R3 was selected as the Active router (" local government is Active & quot ;), the virtual router - IP is 172.12.23.10, and R2 is the standby router.
There HSRP are some values that you need in order from time to time. What if we want to be R2 Active router? Can we change the MAC address of the virtual router? I will answer these questions in the next section of this tutorial HSRP!
Chris Bryant, CCIE 12933, is the owner of The Bryant Advantage (http://www.thebryantadvantage.com), home of free CCNA and CCNP tutorials, the Ultimate CCNA Study Package, Ultimate CCNP Study Packages, CCNA CBT and Video training. Pass for the CCNA exam, BSCI exam, and BCMSN exam with Chris Bryant, CCIE 12933!
For a copy of his Free ebooks, " How To Pass The CCNA " and " How To Pass The CCNP ", visit the website and download your copy! You can now have a FREE CCNA and CCNP exam question every day without e-mail registration required. Get your CCNA study guide from The Bryant Advantage! felton anna



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Tuesday, March 18, 2008

TiVo: An Introduction for the Few Who Don t Know Yet

TiVo will change your life... for the better. Plain and simple: record shows by telling TiVo to record them (not when, what channel, how long, etc.), record all new episodes of X, record all movies w/ so-and-so in them, etc.

High Points:

Most people know the basics of the concept. Here s the low-down on the things I m asked most...

1. You can record one thing and watch something else already recorded.

2. You can get a dual tuner TiVo, but you ll need two SEPARATE feeds to the TiVo (i.e., two lines from your satellite dish). Then you can record 2 things at once or watch one/record another. These are more expensive, but you can get a DirecTiVo w/ dual tuner cheaper and then the monthly TiVo fee is about half normal.

3. Pause live TV - if you don t realize the value of this, I can t explain it. :)

TiVo has many different versions which all some slight variations. If you want to go beyond average guy level, check out this forum.

Comparison to ReplayTV:

TiVo seems to have a better interface from what I ve seen and what others have said. It s easier to use. However, ReplayTV is more easily hackable - you can access it from the web and the PC easier to convert/archive shows, etc. I have a DVD recorder for this which is another post for another time.

Both can be made to do mostly the same things, but you get the idea.

My Suggestion

I recommend the DirecTiVo Hughes HDVR2 (dual tuner) w/ the Triple LNB dish (this is the oval dish w/ 4 lines from it and it s HDTV ready). It s got the satellite converter box built in so it s only one box to deal w/, the TiVo monthly fee is less and it s dual tuner.

This model isn t as hackable as some TiVo s, but it can do some and if you want to go beyond the basics than you probably haven t read this far.

Sites:

http://www.dvrinfospot.com

http://www.TiVo.com

http://www.TiVoCommunity.com

http://www.WeaKnees.com

...and, of course, The Armchair Geek (see below).

Bear Cahill is a software engineer in the Dallas, TX area and is the creator of Booples (http://www.theBooples.com) and the Video Exchange Community (VEC) (http://www.videoexchange.org)

Publish freely if this resource box is included and links maintained as links. iceman willian



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

What Is Wardriving And How Can You Prevent It

Imagine a car equipped with nothing more than a laptop, a portable GPS receiver, and a wireless network card slowly strolls around the neighborhood. Unknown to any curious, this is not a common vehicle, but it is a wardriving machine. As the car strolls past homes and businesses, a wireless network card (available at any electronics store for as low as $ 25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The team is seeking what is known as SSID. An SSID is the name of your wireless network, which is being constantly transmitted by your access point, allowing computers to know of his presence. The wardriver uses software as Netstumbler (for Windows) or Cismet (for linux) to scan the airwaves for SSID. The program can keep track of the various access points at once and monitor the signal strength. These programs can also check if the network is encrypted. The wardriver generally configure their software to access any strong signals unencrypted. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this first disc, the wardriver can return to the places where they were recorded, and connect to the access point. Once connected to a network without encryption, the wardriver can use the victim of Internet access, and can also explore computers on the network. If files are shared within the private network to someone, all that information is susceptible to a wardriver. Moreover, once on the network, a wardriver can track network traffic and can see all the information such as passwords and credit card numbers to send to the Internet - even secured data SSL. Wireless vulnerability is a major problem, and as more and more households buy wireless technology, the problem of insecure networks increases. The sound of fear? Well this happens every day, and not take an expert to quit. It does not take an expert to protect against anyone, however.

Steps you can take to protect against wardrivers:

There are a number of very simple steps you can take to protect your wireless network. For many of these, you will have access to the usefulness of your router configuration (check your manual on how to do this, usually the type of need for an IP address in the browser, as 192.168.0.1 or 192.168.1.1 ).

Don & 39; t Your SSID broadcast. If your SSID, this is the first thing that a collection program and recognize. If your router configuration to its non-broadcast SSID, it will be difficult to detect (but not impossible, for some software can sniff out wireless communication, so if you are using your wireless network, the SSID can be revealed). If it is not your SSID, but it can be guessed (as if using a default SSID), cloaking is futile. Because of this, be sure to change the SSID from the factory default. This is not a 100 percent effective method to secure your network, but is a good first line of defense.

Change password default. When you buy a router, a factory password is stored. People with experience in working with routers know default passwords for different routers (and to make the router can be seen by wardriver software as netstumbler). It is important that you secure your router with a good password.

Encrypt its wireless communication. I can not stress the importance of encrypting your wireless communication enough. Enable encryption and enter a password. Most routers are only capable of WEP encryption, but if they permit, the use of EAP encryption, is more secure than WEP. Like its concealment SSID, encryption is not 100 percent secure. It& 39;s just a matter of time and will, if someone wants to target you and access to the network, WEP encryption can be bypassed using software as AirSnort.

Filter MAC addresses that are authorized to connect to your router. This would require that you enter your router configuration and input the MAC address of each wireless card you have. This will restrict access so that only your computers can connect to the router. You will need to obtain the MAC address (which is the address of individual identification of a network card in the form a 12-digit hexadecimal number). If someone sniffs traffic and detects the MAC address of a computer through its wireless network, the wardriver could emulate that address and connect to the router, but this takes time.

If can configure file sharing on your computer, make sure that is password-protected. You should not share files on their networked computers unless it requires an authenticated user access. Configuring the same user account on their machines so that their computers can share files.

With these relatively simple measures, network users can secure their wireless networks wardrivers. Wireless networks are inherently insecure, and is limited to these tips will help you get more from your network. If someone is really determined to gain access to its network, it is only a matter of time, a good hacker can get access. These tips will deter the average wardriver have access to your network, however. Although these methods are not definitive security measures, which will change its network to be something that can be cut in a matter of seconds, something that will take a determined hacker days, if not weeks of work, all which will be done while in the vicinity of his network.

The author is a veteran of network security, and general manager of Andertec http://www.andertec.com Enterprises, which specializes in the custom of the site services of the Los Angeles area. Andertec custom that is also sold to the order of computer systems, and has a line of products at incredibly low prices revolutionaries including the best-selling CyberHome complete package of home automation. rafaela kaila



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com