Cloud Computing Models

There are many considerations for cloud computing architects to make when moving from a standard enterprise application deployment model to one based on cloud computing. There are three basic cloud computing models to consider, and they differed as the open APIs versus the proprietary ones. These are public, private and hybrid cloud and IT organization can choose to deploy applications according to their requirements. IT organizations can choose to deploy applications on public, private, or hybrid clouds, each of which has its trade-offs. The terms public, private, and hybrid do not dictate location. While public clouds are typically “out there” on the Internet and private clouds are typically located on premises, a private cloud might be hosted at a collocation facility as well. Companies may make a number of considerations with regard to which cloud computing model they choose to employ, and they might use more than one model to Continue reading

What is Electronic Records Management (ERM)?

ISO standard 15489: 2001 defines Records Management (RM) as the field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use, and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records. Electronic Records Management (ERM) guarantees that your company has the records they need when they are needed. Records management is referred to a set of activities that are required for systematically controlling the distribution, use, creation, maintenance, and disposition of all recorded information that’s maintained as proof of business transactions and activities. Records management is mainly concerned with the evidence of a company’s activities. Applying records management usually occurs according to the value of the records, not their physical formats. The essential records managements are capable of assigning specific identifiers to individual records, providing safeguards against all unauthorized changes Continue reading

Data Mining and Privacy Concerns

In data mining, the privacy and legal issues that may result are the main keys to the growing conflicts. The ways in which data mining can be used is raising questions regarding privacy. Every year the government and corporate entities gather enormous amounts of information about customers, storing it in data warehouses. Part of the concern is that once data is collected and stored in a data warehouse, who will have access to this information? Oftentimes a consumer may not be aware that the information collected about him/her is not just shared with who collected the information. With the technologies that are available today, data mining can be used to extract data from the data warehouses, finding different information and relationships about customers and making connections based on this extraction, which might put customer’s information and privacy at risk. Data mining necessitates data arrangements that can cover consumer’s information, which Continue reading

Components of an RFID System

Radio frequency Identification (RFID) as the name implies uses radio frequency to exchange data between two entities for identification purpose. It is a wireless technology to collect information without any human interventions. An RFID system is basically an integrated combination of various components which work together for detection and identification of objects or persons. These are the components which are primarily responsible for working of any RFID system whether basic or complex. Although there can always be additional components associated with RFID systems like sensors etc. but the following are amongst the key components of these systems: A tag (sometimes called a transponder), which is composed of a semiconductor chip, an antenna, and sometimes a battery. An interrogator (sometimes called a reader or a read/write device), which is composed of an antenna, an RF electronics module, and a control electronics module. A controller (sometimes called a host), which most often Continue reading

Targeting Strategies Involved in E-marketing

Once the variables that form a lucrative cluster of customer base for the product is identified, advertising campaigns are decided to target those customers. The E-marketer arrives at the second stumbling block here “portals”. Portals have the most popular URLs on the web today. They claim to be a one-stop solution for anything and everything that the netizen looks for. For the netizen it means less URLs to remember and a place to meet people & socialize. It could have, in most probability, also been the place of a successful electronic transaction before, quelling his/her security concerns. Although portals deny their comparison with the supermarkets of the real world, they are doing just that right now. A portal is not exactly a marketers’ paradise. He would rather prefer sites, which have a niche target audience in sync with his requirements. The next step is to select segments for targeting online Continue reading

What Is Augmented Reality?

Augmented reality refers to the utilisation of computers to modify reality, usually in order to provide additional assistance when a human user is interacting with the real environment. The real world around humans provides a wealth of information which the human user must absorb and process through their senses. The most useful and informative of all human senses is the sense of vision and a huge amount of information about the ambiance is required to be sensed as well as processed by the human visual system. Computers are useful because they can provide an overlay of information to assist with the human processing of the information which they perceive through their senses, mostly the visual sense. As an example, a human who is walking around an urban area can be provided additional information through a head mounted display which superimposes textual information about identification of buildings and other important landmarks Continue reading