Monday, November 10, 2014

Internationalization drivers and Global Markets

By Raul Bernardino

Abstract:
Nowadays organization and companies will be different in next 5 to 10 years’ time. The world moves rapidly. The world leaders often met and put their intervention in order to have a clear direction of the global market. Moreover, technology innovation helps to spread out today’s world decision and information to a very remote location in matter of second. Therefore, innovation becomes a biggest part business strategy components and planning whereas to be an updated organizations.

Furthermore, organization faces a time compression which means an organization is no longer similar to last 20-30 years operations. In other hands, the employees are also facing a past education very soon and therefore organization needs strategizing the available resource within an updated knowledge and also uses of the innovation technology for delivering a product and service within high quality standard and in time.

We are living in instant information and 24 hours news cycles. A 30 second story on the evening news, Capitol Hill new legislation, new UN approach, a competitors or business partner could shifting and playing in the field on any business landscape. There are too many complexity and complicate things around internationalization and globalization.

In initial stage of the technology centered company is challenged with the complexity of the foreign markets and global competition from their earliest stage of development. It is not only to be a technology entrepreneurs who keeps certain technology based offer products, but they must simultaneously stay abreast of the competitors and industry trends in the multiple countries.

The findings suggest that resources necessary to pursue international sales have an important impact on both foreign market intensity and diversity. Additionally, company age was positively associated with the global diversity but not international intensity. Therefore, business today should not necessary to have it owns resources; the important how to deploy the available resources in the timely manner.  These findings support the notion of small technology companies become ‘instant internationals’ but suggest that is proceeding to the next step of achieving the global diversity will require a greater time and resources.

Introduction:
With the presence of the technology innovation and the existing of the internet, the globalization such as global financials flows, transportations and market competition become bases of adjusting and adapting the needs within the new products and services delivers. This includes doing a strategic for new market environment. Additionally, the global market becomes booming in all parts of the globe whereas it utilizes the means of the communication by accessing the transportations (private and public) and multi financial resource. 

Some factors need to consider in the global market competition:
  1. ‘Global competition in the home market’: There are a lot of new products arrives and supplies in the home market and probably we will lose our own customers very soon; because our competitors may offer good quality of the products and services than we did. The competitor prices may also lower than our product price. The global competitions at home markets are also speeding up a new innovation and added value to the customers, it includes developing and improving the current products and services with the high quality of standard. 
  2. ‘Stagnant or shrinking home market’: The global communication also helps stagnant the home market. E.g. a new product which not launch yet however the promotion of product has adverted and this will allow customer to wait that new product instead going to buy an existing product with old fashion. 
  3. ‘Foreign markets with more opportunity’: the globalization gives an opportunity to expand the market in the foreign countries, however the businessmen have to understand several issues such as ‘International Trading System, foreign country economic environment, foreign country political and legal system, foreign country culture and it is environments’, Armstrong and Kotler (2010:580-585). The international trading system may have a restriction from one country or nation to the other countries. For example, to protect their domestic products and its company, the government of the country may put high tariff or taxes to the imported goods which gain additional revenue to the country.  The economic environment, the businessmen have to analyse ‘foreign country industrial structure and income distribution’, Armstrong and Kotler (2010:582). The industrial structures are consisting of economic subsistence, export raw material economics, and industrialization economics. They are also look at income distribution for low individual incomes, medium, and high household. The foreign country political and legal system. The political stability, bureaucracy, and legal system are the major factors and metrics point for the new market entry into the country. The businessmen have also need to know the new target country’s culture and norms before trying to expand their products and services marketing. Each country has different norms and beliefs. For example, we cannot sell fast food with pork meat in the Islamic countries and etc.
  4. ‘Expansion of customers to international markets’: Build a good relationship with new customers and with the existing customers can be seeing as the point to expand new product and service, it includes introducing new product from foreign countries.
In general a globalization is an integration of the societies, economies, cultures of the globe over of process of technology innovation, politic and trade.
The advantages of globalization:
  1. Free trade is which a country does not pay a levy taxes on import or export goods or services.
  2. Globalization allows company tries to find new market and earn more customers. Subsequently, companies are competing each other by provide goods a service with high quality because customers have more choice in new market.
  3. Globalization brings up employment rate because new market need both skilled and un-skill labor. The globalization increases living standard.

The disadvantage of globalization:
  1.  Although, the globalization increases employment's rate in new market, meanwhile unemployment's rate increase in developed countries. Industries are moving from developed nation to less develop countries. It’s because in less develop countries have low labor cost.
  2. People immigrate in to other countries and bring their own cultures to the destination and forget local culture.
International standards and best practices become and standard for ever organizations such as health and safety environment policies and procedures, quality management, ISOs, etc. In the organization where I work, we use OPEC prices as a standard for determine oil and gas prices; ISO 27001 for information security management system, etc.

This international standards drives the organization to lift up their standards whereas to compete with other organization and to be an excellence and up to dated organizations. This also bring local company become international deliver service globally.

In case of Siemens company that’s operates across 190 nations all decision must in the best of Siemens interest. Moreover, the design keeps concentering in manufacturing and economics scale through specialization. Those product can ship to anywhere within the group. The weakness part is currency changes fluctuation that can affect to the price in the market.

There are many globalization challenges to the Seimens. For instance customer can buy raw material from any supplier but not have a technical expertise, therefore Seimens comes with product and services at once. This is a deliberate strategy for Siemens. Seimens in the UK share the customer culture and it group focuses on think customers.

As we know that in the global market there are lots of competitors therefore Seimens established global center of excellence that can serves the special request for entire group.
  
Conclusion:
According to Professor Gary Hamel, London Business School on ‘Creating the Future’ presentation to the senior executive course at Stanford University (December, 1997) stated that:  “Ninety per cent of what you need to learn, you will learn from outside your own business sector.” Therefore, we do need a coping from other organizations and adapt them into our own business environments.  Especially the changes are more quickly than ever (time compressing era).

Therefore internationalization becomes vehicle for the globalization.

Reference List
·         Armstrong, G. and Kotler, P. (2010) Principles of marketing,13th edition, Global edtition: Prentice Hall
·         Miles, G.,Preeece,S.B., Beatz, M.C. (1998), Explaining the international intensity and global diversity of early-stage technology-based firms [on-line]. Available from:  http://www.sciencedirect.com/science/article/pii/S0883902697001055 (Accessed: 22 October 2014)
·         Stiglitz, The globalization [on-line]. Available from:  https://www.youtube.com/watch?v=sV7bRLtDr3E (Accessed: 8 November 2014)

·         Meeting Global and Local Needs [on-line]. Available from:  http://businesscasestudies.co.uk/siemens/meeting-global-and-local-needs/introduction.html#axzz32685SAnm (Accessed: 8 November 2014)

Thursday, October 30, 2014

Terminal Services and Remote Administration

By Raul Bernardino

The Overview
By using a terminal service, a client can appear to run Windows Server 2003 locally. All the processing power is done by the server. Windows XP and Windows Server 2003 have a feature called “Remote Desktop” which will allow you to connect remotely to the computer and logon as if you are sat at the machine.  Although Windows Server 2003 can be administered remotely by using an MMC or a Web Administration Interface it is still handy and necessary to be able to physically logon to the server to perform specific tasks.

Windows XP and Windows Server 2003 have a feature called “Remote Desktop” which will allow you to connect remotely to the computer and logon as if you are sat at the machine.
Once connected you will see the desktop as it is on the server and you will be able to work as if you were physically located at the machine.
You can disconnect from the session at any time and reconnect to the same session, continuing where you left of.
Using Windows XP’s fast user switching you can easily transfer your desktop to another machine, e.g. to ask for assistance or to show a file on your desktop.
Remote Desktop on Windows Server 2003 will allow two concurrent connections and doesn’t require any special licenses.
Remote desktop can be further extended by enabling terminal services.
By using terminal services, a client can appear to run Windows Server 2003 locally. All the processing power is done by the server.  The server receives keyboard and mouse requests from the clients (terminals) and transmits the display back. Only one copy of Windows Server 2003 is required.
Rather than installing a full version of Windows on every client, a Windows terminal server can be deployed instead.  Clients whose hardware might not be supported by Windows can still take advantage of the Windows Server 2003 features.
Clients can continue to use their old operating system and benefit from the features and applications from Windows Server 2003.  Many different devices can act as terminal clients (called thin clients). E.g. a Windows 3.11 machine can run terminal services client and appear to be running Windows Server 2003.  Although the client terminals can be very low-end machines with no hard-drive and no operating system, the clients will still need client software to run terminal services.  Terminal Services is also a good way to run applications such as Microsoft Office on incompatible clients.  N.B. Once a server is installed with Terminal Services, applications MUST be installed by using Add/Remove Programs from the Control Panel.
Remote Administration

Unlike Remote Desktop, Terminal Services requires licenses. However Terminal Services allows a lot more clients to connect and enables the use of application sharing. Terminal Services can only be enabled on a machine running Windows Server 2003.
Terminal Services Overview
Using Terminal Services, users can log in multiple times to the same server using different sessions. This allows users to perform many tasks at once.  Users can easily cut and paste between applications running locally and applications running on the Terminal Server.
Using Remote Control, two users can use the same terminal session, in other words one user can control and view another user’s session. This can be used to train users or diagnose problems.  Printers that are connected locally to the client will continue to work from a terminal session. Terminal Services and Remote Desktop use the RDP (Remote Desktop Protocol) v5.2.
A terminal session can be disconnected and reconnected at a later time from another client. The session will effectively remain active until logged off or closed by the server.
The logon process is also encrypted and such things as the number of logon attempts can be controlled through security policies. Data transmitted between the client and server can also be encrypted at four different levels (low, compatible, FIPS compliant or high).
User Accounts created locally on the terminal server or in Active Directory can be used with terminal services.
Terminal Services Requirements
The hardware requirements for a Terminal Server depend upon on how many clients will be connecting and what the clients will be doing once connected.  A Terminal Server requires at least the recommended Windows Server 2003 requirements plus an additional 10Mb RAM for each client connecting.  All though not a requirement, using SCSI disk drives can greatly improve performance. You could also use high-performance bus architecture such as EISA or PCI.  Since many clients will be connecting simultaneously, using a high performance network card will help. You could also install two adapters and dedicate one adapter solely to the RDP protocol.  When running Terminal Services, ensure that only 32-bit applications are used.  In order to run 16-bit applications, Windows uses an emulation service called Windows-on-Windows (WOW), which consumes a lot of system resources. Because 16-bit applications will take up more system resources than 32-bit applications it’s better to use solely 32-bit applications. Terminal Services client runs on a variety of machines. They must support VGA and have at least 4MB of memory. Terminal Services client is available to Windows-based terminals and Intel & Alpha based computers running Windows for Workgroups 3.11, 95, 98, NT 3.51, NT 4.0 2000, XP and 2003. There is also third-party support for Macintosh and UNIX-based computers.
Terminal Services Licenses
Terminal Services have its own licensing method. A Terminal Client must have a valid license when connecting to a Terminal Server.  Either a Windows 2003 Terminal Services Client Access License or a Windows Server 2003 license is required as well as a Client Access License (CAL). Windows 2003 machines that are used as clients already have a Terminal Services Client Access License.  You can use Terminal Services for 90 days before you need to install Terminal Services Licensing and activate them.  N.B. Even after 90 days you will still be able to use Remote Desktop and Remote Assistance connections.
Reference list:

TechNet (N:N) How Terminal Services Works [Online]. Available from:  http://technet.microsoft.com/en-us/library/cc755399(v=ws.10).aspx#w2k3tr_ts_how_kqhp (Accessed: 31 October 2014)


Wiki (N:N) Remote Desktop Services [Online]. Available from: http://en.wikipedia.org/wiki/Remote_Desktop_Services (Accessed: 31 October 2014)


Transmission Control Protocol/Internet Protocol (TCP/IP)

By Raul Bernardino

Introduction:
All communication occurs on any type of networks and all involved parties must use a common language. In the Information Technology (IT) networks, this is known as a protocol.  There are many different protocols that are available for computer networks. The most common and widely used being TCP/IP.
TCP/IP is the standard protocol that is being used on the internet whereas allows any network to access the internet and therefore you must use the TCP/IP protocol suite. In other hand an Active Directory required CP/IP. For that reason, TCP/IP is developed and as a default protocol starting from Windows XP and server 2003.
Protocols
This protocols reference is often made to the TCP/IP stack. This consists of layers of mini applications which are performing the discrete job of sorting and filtering the data packets picked up by the Network Information Center (NIC) and then passing the packet on to the next layer for further processing. Eventually a coherent message pops out of the top of the stack into the operating system for the user to read. The reverse is also true i.e. converting of the reply into data packets that can be sent over the network media.
The layers in a TCP/IP stack write headers for network messages as well as decoding them.  Each level in the stack adds a portion to the network packet which its counterpart in the receiving computer will understand.  Strictly speaking, the NIC isn’t part of TCP/IP, but protocols are bound to a particular adapter.
At the receiving computer, the headers are stripped off as they pass up through the TCP/IP stack until only the bare payload is presented to the user.
The DOD Four Layer Model

TCP/IP is often referred to as the TCP/IP protocol suite. TCP/IP is in fact a group of protocols/applications working together to provide network communication. TCP/IP was invented by the US Department of Defense (DOD) to allow machines to communicate over a network. It is a simpler model than the 7 layer OSI model.  The different components of TCP/IP all function at different layers. These layers group the different components into four different categories.
The Application Layer
The application layer contains the applications that use TCP/IP such as Internet Explorer, chrome, safari, Netscape, and Outlook.  The application layer also contains Application Programming Interfaces (API) such as Winsock, which enables applications to use TCP/IP.
The Transport Layer
The transport layer is responsible for the transfer of data on the network.  There are two different transport protocols TCP and UDP. Both protocols provide transport but it works in different ways.
Transmission Control Protocol (TCP)
TCP is a connection-orientated protocol. Both sides (end to end) confirm that the data is being sent and received.
User Datagram Protocol (UDP)
UDP is a connectionless-orientated Protocol. Both computers presume the other side has received the data.  As an example, name resolution uses UDP. If the query fails then a TCP name query is made.
The Internet Layer
To send data the sender must have a method of distinguishing the recipient. This is called an IP address and they take the form of a unique number on the network. The Internet Protocol is responsible for these addresses.  The Internet Control Messaging Protocol (ICMP) is used to test connectivity between machines by sending ICMP messages using the PING command.  The Internet Group Messaging Protocol (IGMP) is used to send data to groups of machines, e.g. Streaming Video. This is known as Multicast.  The Address Resolution Protocol (ARP) is responsible for changing an IP address into the network card’s physical address. Every network card has a unique physical address hardwired into the card itself which is needed for communication on a network.
The Physical Layer
The physical layer is responsible for the actual physical media and how the data is sent to another machine, e.g. Fibre Optic, ATM.  There are many ways to send data down the cable, the most common technologies for LANs are Token Ring and Ethernet. In order for two machines to communicate they must be using the same technology or be connected via a bridge.
Reference list:
Wiki, (n:n) Network Interface Controller, [On-line]. Available from: http://en.wikipedia.org/wiki/Network_interface_controller (Accessed: 20 October 2014)


Saturday, August 16, 2014

The use of an Internet for the Educational Research, Social Business and Government

By Raul Bernardino, MSc ISM

Abstract:
Internet is a public domain and very interactive media whereas enable whole world to connect. Where each individuals, communities, intellectuals, independent personality around the globe are expressed their own opinions, ideas, entertainments, innovations, etc. In other hands, the individuals or group of people are utilizing that information or even collecting that information and interpret them according to their perceptions.  Internet also called a cyberspace or a virtual media.
As it is a public domain and it is intended for public consumption and public sharing. With the internet people are exposing and telling to the listeners or to the readers about their own ideas, histories, cultures, and it is also including the existing of themselves for intervening and to convince others to follow their own paths or ideas or even just spreading an information. The information or the fact of materials such as videos, pictures, and voice records can be also disclosed by someone about some interesting news or histories that are most important according to him or her in which is to let the rest of the world to know.
Since these information are publicly available and these can be accessed worldwide by and millions people at anytime and anywhere. As it is a public domain, there would be a good and bad personalities are involved. Therefore, it will be given a positive an a negative impacts to the society. However, final decisions are totally depends on the recipients or listeners cultures and knowledge’s, either those collection are accepted or rejected.
It is important for the rule governments to have a law and regulation in order to minimize the negative impacts to the society. We also understand that, the governments may have their own limitation with the geographically boundaries of the other nations law enforcement and it is because the nature of the cyberspace itself which has no geographically boundaries.
It’s quite risk for the academicals writers and student whereas uses the internet information as base for their own thesis or dissertation without have deep understanding on the mater.
Moreover, the internet technology can help companies to determine their own customer needs and create new products and brands but it’s also with time compression over technology disruption in the businesses and industries.

Introduction:
Internet is publicly accessible computer network which is connecting many smaller networks, computers or palm devices from around the world.
Internet means connecting a computer to any other computer from anywhere and at anytime in the world through a router and server. When computers are connected over the Internet, they can easily access all kind of information such as graphic, text, voice, and videos but also can be a victim of using the internet.
No one owns the Internet. It is a public domain and every individual, group, organizations or any society can express themselves and also able to collect an intended information. Internet has no boarder. On the internet, information can be traveled from one country to other countries without have any rules and controls.
Although several organizations around the world are collaborating to ensure the development and the functioning of the internet are publically available for public consumption.  They are telecom companies, ISPs, and data centers.
Several organizations are creating an exclusivity of the information that only visible to their staff and it owns branches. This information share over technology is called intranet. Moreover, we can also found that organization A and B agreed to share their information among themselves which is called extranet. The Intranet and Extranet cannot be accessed over public domain internet unless who have register and have access permissions. It’s only available in closed networks.

The Internet History:
The internet is grew out of a U.S. Defense Department program called ARPANET (Advanced Research Projects Agency Network), which is established in 1960s and later in 1969 with connections between computers at the University of California at Los Angeles, Stanford Research Institute, the University of California-Santa Barbara, and the University of Utah.
The purpose of the ARPANET was to conduct research into computer networking in order to provide a secure and survivable communications system in case of war. As the network quickly expanded, academics and researchers in other fields began to use it as well.
Moreover, in 1971 the first program for sending Electronic-Mail over a distributed network was developed
By 1973, the year international connections to ARPANET were made (from Britain and Norway), where e-mail represented most of the traffic on ARPANET. The 1970s also saw the development of mailing lists, newsgroup and bulletin-board system, and the TCP/IP communications Protocols, which were adopted as standard protocols for ARPANET in 1982–1983, leading to the widespread use of the term Internet. In 1984 the Domain name addressing system was introduced.
In 1986 the National Science Foundation established the NSFNET, a distributed network of networks capable of handling far greater traffic, and within a year more than 10,000 hosts were connected to the Internet.
In 1988 real-time conversation over the network became possible with the development of Internet Relay Chat protocols. In 1990 ARPANET ceased to exist, leaving behind the NSFNET, and the first commercial dial-up access to the Internet became available.
In 1991 the World Wide Web was released to the public. The Mosaic browser was released in 1993, and its popularity of the World Wide Web sites and users. Furthermore, in 1995 the NSFNET reverted to the role of a research network, leaving Internet traffic to be routed through network providers rather than NSF supercomputers.
In that year the Web became the most popular part of the Internet, surpassing the FTP protocols in traffic volume. The fact that in 1997 there were more than 10 million hosts on the Internet and more than 1 million registered domain names. Internet access can now be gained via radio signals, cable-television lines, satellites, and fibre-optic connections, though most traffic still uses a part of the public telecommunications (telephone) network. The Internet is widely regarded as a development of vast significance that will affect nearly every aspect of human culture and commerce in ways still only softly visible.
The Use internet for Educational Research:
Since internet is a public domain and no one guaranty and responsible of what are being wrote or spread. It may be an obsolete knowledge or information, or it is partially tested information or it is uncompleted information. Therefore, it is higher risk to consume internet information as base for academicals writing. Especial the information whereas is spread over the anonymous sites.
Although there were anonymous and uncompleted sites, we can found millions of popular journals, economic magazines, and bulletins such as New York Post, Strait times, Washington post, universities libraries etc.
All internet users have a high regard for the internet as a source of information, but the characteristic shows men look for a broader range of information online than women do.
According PewReserach report Internet project (2000), nearly all internet users, 91%, agreed that the internet is a good source of information for everyday interests like news, weather reports, and sports scores.
In Pewresearch shows that about 80% of both men and women also expect to find information online about more specialized topics of government issues and health or medical issues. The same number also say they expect to find information on particular products they want to purchase, although this includes more men, 82%, than women, 77%. About a third of internet users say they expect to find reliable information online about individuals.
Moreover Pewresearch (2000), asked users about the kinds of information they look for online. Men and women are equally likely to get travel information and to look up phone numbers and addresses. They also look for information about the government, about colleges, jobs, and places to live.
 For instance, the student is writing about free speech, “President Barak Obama reacted to the censorship of the government of the Egyptian. He stated “free speech is Human Right”. Furthermore, he stated "the people of Egypt have rights that are universal. That includes the right to peaceful assembly and association, the right to free speech, and the ability to determine their own destiny."  This is an idea of freedom of the speech to give a high value of the democracy. President Barak Obama tried to convince President Hosni Mubarak where protestors or people of Egyptian have absolute right to speak up and tell the truth of their problems that are not resolved by its own country.” This information quoted on January 28, 2011. The news above may be still new for the certain community or society but it is also obsoleted to the other societies. 

Social business Over Internet Technology:
Again the characteristic online transactions shows man do more than women, including some with less predictable or controlled outcomes.
It is about 75% of internet users believe that the internet offers them a good way to conduct their everyday business like banking or buying tickets etc.
The PewResearch  Internet Project has been tracking users’ participation in more than a dozen kinds of online transactions found that Men and women are about equally likely to go online to do many of these: to buy products, as well as everyday items like groceries, food, and household items and prescriptions; to make travel arrangements or to purchase tickets; to do their banking; and to donate to charities.
For online shopping, both men and women cite convenience and time savings as major reasons to like shopping online. Further, more men than women value cost savings, and more women than men appreciate the chance to find unusual gifts.

Government over Internet Technology:
The digital information enables you and your community to discuss and prioritize issues, then challenges our member of the government and parliament to respond. The positive aspects of using this digital technology are bringing global communities to your own desk and start to share and help one another with knowledge and best practices. It brings an effective and efficiency solution to the problems that you normally experience.
The digital technology also brings us some negatives aspect of it. It is a free place to express and interact. Technology helps to bring multi culture to interact and it might create a culture shock. Whereas, the use of social media for free expressing, - not use a common sense or constructive critiques anymore but use of threatening, negative arguments, offensive words, etc.

Conclusion:
Internet is public domain and unsecure. The academicals researchers use universities library, journal, and accredited sites as base for their research. Nowadays businesses are change the way of doing business; they become technology evangelist. The government needs to collaborate with the society and regulate information flows.
 
Reference list:
An Encyclopedia Britannica Company-Merriam Webster (n:n) First Known of Internet [On-line].Available from: http://www.merriam-webster.com/dictionary/internet  (Accessed: 13 August 2014)
Eugene Volokh(n:n) Freedom of Speech in Cyberspace from the Listener's Perspective: Private Speech Restrictions, Libel, State Action, Harassment, and Sex  [On-line].Available from:   http://www2.law.ucla.edu/volokh/listener.htm (Accessed Date: February12, 2011) 

Fallows, D. (2005) HOW WOMEN AND MEN USE THE INTERNET[On-line]. Available from: http://www.pewinternet.org/2005/12/28/part-5-functions-of-the-internet-how-men-and-women-use-it-as-a-tool-to-communicate-transact-get-information-and-entertain-themselves/ (Accessed: 14 August 2014)

Internet (n:n) [On-line].Available from:  http://www.businessdictionary.com/definition/internet.html (Accessed: 13 August 2014)
Negative effect of the internet [On-line]. Available from:   http://www.helium.com/items/790966-negative-effects-of-the-internet (Accessed Date: February12, 2011)

WEISER, E.B. (2000) THE FUNCTIONS OF INTERNET USE AND THEIR SOCIAL, PSYCHOLOGICAL, AND INTERPERSONAL CONSEQUENCES, [On-line]. Available from: http://www.ncbi.nlm.nih.gov/pubmed/11800180 (Accessed: 14 August 2014)



Tuesday, July 15, 2014

Enterprise Software Competition - Innovation on Private Sector at Computer World

By Raul Bernardino

Introduction:
Autoridade Nacional do Petroleo is a government of Tmor-Leste independent institution based on decree law 20/2008 whereas to administer all mineral resources within Timor-Leste territory and Joint Development area with Australia.

As an independent institution, the IT team is focusing on manual business administration processes and turns it into the digital processes.
We are able to build employee database application which has integrated with workflow, asset allocation, leave forms, document registrations, document integrity and so forth.

This application has capabilities of a cross platforms, a workflow, a social networking, single sign on, and open standard.
We use IBM notes as a platform of the application. The applications are integrated with email, calendar, contacts, website, and other databases.

We progressively turn papers works into the electronic modes. The main objectives of having digital processing are to support office in the green environment and availability of data whereas easy to access from any-where and at time without decreasing the integrity and confidentiality of the information as whole.

What are the project’s aims?
The resulting project outcomes will produce a methodology which may be utilized by any organization or institution or become a role model of system integration and cost effective. The purpose of this methodology is to analyze the existing IT systems and plan for the implementation or upgrade to a new system based on a modern integrated social framework. The qualifications of the system will be assessed using the following guidelines:

  • Cost effectiveness; the resulting system should produce a significant Return On Investment (ROI) based on: The business requirements and needs, reduced workload, reduced duplication of data entry, reduced infrastructural investment for the additional data storage and processing data which includes easily manageable data.
  • Ability to integrate with other systems; the existing system should be tested on whether or not it is based on open standards. Additionally, their ability to exchange data with other applications within the existing systems and with newly adopted application systems will also be assessed. Therefore, I recommend the cross platform system and open standard which will easily adapt to any additional requirements of an application within the existing systems without having to build a new green field IT system.
  • Workflow capabilities; the ability for existing systems to identify the roles, routes, and business rules applicable to objects moving through the system.
  • Level of Single Sign On (SSO) integration; where there are multiple systems in place, what is the level of SSO capability between those systems? i.e.: how many user names and passwords is each user required to remember?
  • User interface standards have been developed and are being followed; standard user interface guidelines result in intuitive systems that require less user training and lower implementation costs.
  •  Where data duplication exists across the system; a single data on the system will reduce the cost of storage, maintenance and staff.
  • Social capabilities; to test whether the existing systems are based on social capability. The social capability has become an integrated part of technological development and is used to enable connections with team members virtually (meetings, conferences, etc) in order to speed up the decision making processes(e.g. easily identify the professional or person to be consulted or connected, with establish professional and private networks, and improve the communications and work life balance). The focus is sharing information and knowledge in the hopes of having information integrated into the system; the aim is to have team members able to connect, communicate, coordinate and collaborate.
  • Meet regulatory requirements; the system should be tested to establish whether the existing systems are based on official or governmental regulation. Regulations such as to set a document or information as confidential, private, or public, and to establish ownership through secure internal or public networks.   

What is the proposed solution?
The proposed solution is based on open standard and cross platform application. It is a secure and integrated system. The proposed system capabilities are as follows:
-      A database application,
-      A powerful workflow,
-      User interface standards,
-      Single sign On (SSO),
-      A single directory,
-      Cross platform capability,
-      Open standard,
-      A scalable system and applications,
-      Document management (Document audit: stages, versions, security, and document histories or logs),
-      Domino Attachment and Object Service (DAOS) in order to save storage space,
-      Social framework,
-      Decrease existing licenses; e.g. Microsoft office, Windows OS and server licenses,
-      And most importantly, it must meet internal regulations which have to maintain a secure communication between internal and external parties and ne able to coordinate and collaborate with the existing knowledge.


Conclusion: Any planting system should has ROI, secure, integrity and available for those who need to use. 

"These concept was short listed in the computerwekly.com on June 6,2014"  please click the link http://www.computerweekly.com/news/2240221770/Computer-Weekly-European-User-Awards-for-Enterprise-Software-Shortlist-2014