Archive for June, 2011

Microsoft major patch updates tomorrow

June 13th, 2011

Microsoft today said it will issue 16 security updates next week to patch 34 vulnerabilities in Windows, Internet Explorer (IE), Office, SQL Server and other products( typically patches are ‘heavier’ in even months.)

Of the 16 updates, nine will be rated “critical,” the highest threat label in Microsoft’s four-step scoring system, while the remaining seven will be marked “important,” the second-most-dire ranking.

The company also regularly updates IE on even-numbered months, and will patch its browser next week in two separate bulletins, an unusual move. Both IE updates were labeled critical. All versions of IE will receive one of the updates, including IE9,

Several of the updates will patch Windows 7, Microsoft’s newest operating system that continues to gain users. According to Web metrics company Net Applications, Windows 7 now accounts for 26% of all operating systems currently in use. Eight of the 10 Windows updates affect Windows 7, with five of those marked critical. The other three were tagged important by Microsoft.

The 16 updates from Microsoft will be released at approximately 1 p.m. ET on June 14.

Micorosoft and HP

June 13th, 2011

Hewlett-Packard says that its customers run more Oracle databases and applications on HP hardware than any other vendor. But at HP’s big user conference this week no Oracle presence  and  one conference session is titled “Oracle database migrations to Microsoft SQL Server with HP services.”

Microsoft  had a supersized presence at this year’s conference, the result of a joint $250 million, three-year investment that HP and Microsoft announced last year to improve the integration of their products.

The benefits of  investment include newly announced products optimized for Microsoft SQL Server, including the HP Business Data Warehouse Appliance, and HP Database Consolidation Solution for Microsoft SQL, used for consolidating transactional databases.

Thus Microsoft blog gives more info on product direction

http://blogs.technet.com/b/dataplatforminsider/archive/2011/06/06/a-growing-family-of-solutions-by-hp-and-microsoft.aspx

Why Ingersoll Rand Biometric Handpunch and Interflex Software – Dubai

June 9th, 2011

Unique business benefits of Handpunch for Access control and Time and Attendance recording.

  • User and administrator acceptance
  • Ease of use and enrollment
  • High robustness and reliability
  • Does not have the ‘police’ connotations of fingerprints

 These attributes results in both a low error rate and a fast validation – both of which guarantee:

  • the high throughput that is essential at shift changeovers
  •  a lot less hassle for administrators
  •  reduced complaints and payroll disputes for end users

 How is this achieved?

  •  Silver dosed base to eliminate risk of contamination 
  •  The system records over 100 measurements of a person’s hands – so, even if it cut or dirty, palm up or palm down or with or without a ring then most of the measurements do not change so amthc cna be amde with high accuracy.
  • The system self adjusts to minor changes in an individuals template e.g. adding a wedding ring, a scar, gaining or losing weight.
  •  Unlike a fingerprint, or face image it takes very little data storagesapce to record an individual’s measurements which means: Thousands of records can be stored at each terminal
  •  No network traffic to recover individual templates
  •  Minimal network traffic to synchronise templates across a network of devices so you can enroll on one device in your company and then use any other device connected to your network.
  •  More data storage is available to store offline transactions with battery back up to ensure you never lose a transaction.
  •  Improves payroll accuracy and simplicity
  • Eliminate ‘buddy-punching’ and time fraud. Suitable for businesses of all sizes which continually strive to control costs.
  •  In addition to veryfying that ‘you are you’, the HandPunch meets the special needs of computerised time and attendance systems.
  • Integrated with leading time & attendance software systems they reduce the large overhead and inaccuracies of a manual payroll process to just a simple ‘punch’ of the hand with an integrated biometric payroll process.
  • Programmable Data Management Keys User-definable data management keys let you collect and/or display data as employees punch. Common data collection uses include: department transfers, tips collected, job codes, or pay codes. The keys can also be defined to allow employees to review punches. To reduce keystrokes, the keys can also be set to automatically enter data such as a frequently used department number or in/out status.
  • Global Schedules 64 different employee schedules can be defined to restrict the times that an employee can punch. This can reduce unauthorised overtime as well as early ‘in’ punches. A separate schedule can be defined for 64 groups of employee providing the ultimate in flexibility.
  •  Communications and Networking Whether your needs are to network two terminals or thousands, the HandPunch* can be configured to meet your needs. Standard RS-485 communications makes networking terminals easy and reliable. Options include an Ethernet Communications Modules and a high speed internal modem for remote sites.
  • Each unit also provides RS-232 serial printer support.
  • Edit-at-the-Clock Functions The HandPunch* allows supervisors to override user restrictions and to input such items as missed punches, planned vacations, and sick time at the terminal.
  • The password-protected mode provides greater supervisor flexibility by lessening the need for computer edits.
  • Audit trails document the use of these functions to ensure security.
  •  Bell Schedules The bell schedule lets you program the day, time, and duration of a series of bells. The bellscan be programmed to signal the beginning, or end of a shift, lunch, or break.
  • Door Control The HandPunch* provides the capability to unlock and monitor a door.
  • An employee’s individual schedule may be used to restrict access.

 Synergy Software Systems also offers:

  •  Staff rostering.
  •  Integrated Payroll and Financial system
  • Local, qualified support

These are some of the many reasons why the Ingersoll Rand hand-punch and its integrated Interflex software continues to be the market leader

ERP Partner, Dubai Middle East, Dynamics Ax, Sunsystems, Microsoft CRM

June 6th, 2011

A paintbrush is just that, a paintbrush that in the right hands can wield art that is priceless.

So goes the way of ERP (Enterprise Resource Planning) systems. Erp is a business  tool (albeit a sophisticated one) and like any other tool, in the hands of a skilled craftsman can work wonders  for an organization.

Why is this relevant? Time and time again we see prospective customers looking into the depths of an ERP system demo, orcreating  1000 quedstion rfp for a capability to meet a “requirement,” but don’t use the same scrutiny when looking for the partner to implement and to support the system. A reference check may be completed, but a serious discussion around ideas to IMPROVE their business does not take place. They end up with a new paintbrush and use it the same way. To change metaphors this is what we call changing the piano and playing the same tune.

An ERP implementation partners all have a set of brushes and they can all paint, but some have significantly more expertise in wielding the same brush as another.

So  don;t paying so much attention to the system being implemented and start paying more attention to the partner  chosen, and when you look s the cost quesiton whether his works are really  masterpieces.

A good partner does not recommend a bad system and will make the system work for you. Even the best system implemented by novices and amateurs will fail. The use of sub-contract labour is also a consideration. What happens when you want to repaint if the expert painters have left, how much more  committed to quality is a partner providing local support with its own resources?  Why do some partners charge more than others- maybe you get what you pay for – no partners want to lose business so if they have been in business a long time, then they will price at market rates – if that seems high you have to wonder why another would undercut and  what else they cut in quality and service.

Most cars can list a similar list of features, a  driving wheel an engine, 4 wheels, brakes lights etc so why doesn’t everyone just drive the cheapest one? After all they get you from A to B. Why go to a certified garage when freelancer engieerss will cut the cost?  Why buy branded spares? 

No support ocntract is like no insurance cover? And not all insurance polices are the same. Is there a skilled, manned helpdesk to answer queries?

So why use a different basis of selection for your key business system and partner?.

Buying a new car to rpelace oen witjh bugs, or a new paintbrush that is easier to use is  relatively painless comapred to having to switch implementation partners mi- project.  In the long run the right solution implemented by the right partner is the most effective, and the fastest, and the cheapest.

What is Surestep? Erp implementation Dubai.

June 6th, 2011
MICROSOFT DYNAMICS SURE STEP METHODOLOGY
Sure Step Methodology
Reduce the Microsoft Dynamics total cost of ownership,when you adopt  the Sure Step Methodology for projects ranging from large, medium, to small engagements as well as optimization and upgrade projects. The Sure Step Methodology provides detailed guidance on roles required to perform activities and proven best practices. Flowchart diagrams within this implementation methodology point you to tools and templates that can be used at different phases during an implementation project from diagnosis, analysis, design, development, deployment, operation, and also through an optimization or upgrade project. The content tools and best practices of this implementation methodology help you increase the quality and success of your implementations.
PHASES
Diagnostic
 
MILESTONES:
– Customer accepts the implementation proposal and contract, including the project scope statement and preliminary project plan.
Analysis
 
MILESTONES:
– Customer approves the Functional Requirements, including all business processes, integrations and data migration.
– Customer accepts the updated project plan and schedule.
Design
 
MILESTONES:
– Customer accepts the Design Specifications and Data Migration Design.
– Customer approves the development time and cost estimates.
Development
 
MILESTONES:
– Customer accepts the delivered solution, test results, and documentation.
Deployment
 
MILESTONES:
– Customer signs off on user acceptance.
Operation
 
MILESTONES:
– Customer signs off on final system acceptance.
– Customer accepts the post live support agreement.
Optimization
 
MILESTONES:
– Customer accepts the recommendations and proposal, signs contract.
– Customer approves detailed design/change specifications.
– Customer signs off on user acceptance.
– Customer signs off on final system acceptance.
– Customer accepts the post live support agreement (if new).
 

This is a  professional methodlogy derived from PMP,  Synergy Software Systems also enhances this with a Rapid Implementation toolset: Preparation pack, our proprietary training materials, templates, checklists, pilots, and audits, Vital sign montoring and psot go live   advsnced training and support – all reinforced by exceptionally well quslified consultants, and our own Microsoft Cerfied trainers and a manned helpdesk. Does this really work? Ask our clients!

IT security attacks – you could be next. 2011

June 5th, 2011

2011 continues to see database exposures hitting organizations  and according to the Privacy Rights Clearinghouse, the first half of 2011 saw 234 breaches that affected more than hundreds of millions of individuals.

1. Victim: HBGary Federal
Assets Stolen/Affected: 60,000 confidential emails, executive social media accounts, and customer information.

Following an announcement by security firm HBGary Federal that it was planning on exposing information about the renegade Anonymous hacking community, the firm was assaulted by Anonymous members. Anonymous hacked into HBGary’s CMS database through a vulnerable front-end Web application, stealing credentials that they were able to then leverage to break into the company’s executives’ e-mail, Twitter, and LinkedIn accounts. They were also able to access, and then dump publicly, the email spools of HBGary proper via the HBGary Federal hack.

Lessons Learned: This attack proved that SQL injection remains a hacker’s prime tool . Anonymous used this method to enter into HBGary Federal’s systems and the attack was able to go deeper because the credentials stored within the affected database were not adequately hashed with something stronger than MD5. The passwords used by the executives were simple and the credentials were reused across many accounts.

2. Victim: RSA
Assets Stolen/Affected: Proprietary information about RSA’s SecurID authentication tokens.

After an employee retrieved a spear phishing e-mail from the Junk folder and opened an infected attachment contained within, the hackers  were able to dig into the RSA network to find a database containing sensitive information pertaining to RSA’s SecurID authentication products. Though RSA has never confirmed exactly what was stolen, reports this week have surfaced of a U.S. defense contractor using SecurID and getting hackedwhich suggests the  RSA attackers took the all-important SecurID seeds.

Lessons Learned: No hacking target is sacrosanct, not even one of the leading security companies in the world. The RSA breach shows how important is employee training.  Even the most secure networks and databases can be penetrated if bumbling insiders open the door wide enough for hackers.

3. Victim: Epsilon
Assets Stolen: E-mail databases from 2 percent of the firm’s 2,500 corporate clients.

Marketing firm Epsilon has never confirmed exactly how many email addresses were stolen from its massive stores of consumer contacts, which were used to send messages on the behalf of behemoth customers, such as JPMorgan Chase, Kroger, and Tivo. But breach notifications trickling out from the firm’s client companies show that this exposure surely impacts millions of customers, putting them at higher risk of phishing and spam attacks in the future.

Lessons Learned: Epsilon also has not confirmed the technical details , but a sophisticated spear-phishing campaign against the email marketing industry has been fingered by many as a likely source of the attack, re-emphasizing the importance of awareness . When you outsource, you still retain the risk and responsibility for protecting the data a contractor oversees. Every Epsilon client is still on the hook for disclosure and associated costs due to this breach caused by a partner.

4. Victim: Sony
Assets Stolen: More than 100 million customer account details and 12 million unencrypted credit card numbers.

Attackers were able to compromise three different databases containing sensitive customer information, including names, date of birth, and, to some extent, credit card numbers owned by Sony, affecting customers of PlayStation Network (PSN), Qriocity music and video service, and Sony Online Entertainment. So far, some nine Sony assets have been hacked as a result of the initial breach.

According to testimony by respected security expert Dr. Gene Spafford of Purdue University, Sony was using an outdated Apache server that was unpatched and had no firewall installed — a fact that Sony knew about months before the breach went down. Last week hackers poured salt on the wound when they started to exploit PSN once again after Sony didn’t fortify the password reset system in light of the fact that hackers had email addresses and dates of birth. The bad guys were able to change the password of users who had not changed the email associated with their PSN accounts before Sony shut down PSN once again to fix the problem.

Lessons Learned: A corporate culture devoid of security emphasis can cost a company a fortune in this day and age. According to reports out this week, Sony has spent $171 million so far on customer remediation, legal costs, and technical improvements in the wake of the breach — and that cost is only rising. Recovery from such a massive breach can be not only expensive, but is also embarrassing and damaging to the brand.

5. Victim: Texas Comptroller’s Office 
Assets Stolen: The names, Social Security numbers, and mailing addresses of 3.5 million individuals, plus dates of birth and driver’s license numbers of some.

Sensitive information collected in databases by three Texas agencies — the Teacher Retirement Center of Texas, the Texas Workforce Commission (TWC), and the Employees Retirement System of Texas — were exposed for nearly a full year by the Texas Comptroller’s Office on an unencrypted publicly accessible server. The employees responsible for putting the data online purportedly broke departmental procedures and were fired when the breach was discovered

Lessons Learned: Policies and procedures don’t mean much when there are no technical controls or monitoring solutions installed to enforce them. The fact that employees were able to place database information in such a vulnerable position shows how policies without “teeth” can expose an organization. The State of Texas now faces two class-action lawsuits as a result of this breach, one of which is going for a $1,000 statutory penalty for each affected individual — a whopping charge when it’s aimed at a breach impacting millions.

Dubai – Indoor Flea Markets

June 4th, 2011

Dubai Flea Market at Crowne Plaza, Sheikh Zayed Road, Dubai:

When: The Dubai Flea Market at Crowne Plaza is taking place on the first Saturday of June & July 2011

Opening hours for visitors: 10:00 – 15:00

Where: Crowne Plaza Hotel – Jumeirah Ballroom, Sheikh Zayed Road, Dubai  (first event today 4 June)

Dubai Flea Market at Stargate, Zabeel Park, Dubai:

When: The Dubai Flea Market at Stargate is taking place every third saturday from June – September 2011 (Flea Market timings during Ramadan will be updated soon) (Next event 18 June)

Opening hours for visitors: 10:00 – 15:00 (June & July timings)

Where: Stargate, Zabeel Park, Dubai – Entrance Gate 4

Micrsoft Dynamics Ax 2012 Synergy Software Systems Dubai

June 3rd, 2011

Where does AX 2012  fit?

Considering the many functional  nd technical enhancements  Microsoft Dynamics AX is a strong candidate for organizations in the mid-tier and above, especially for those with the following characteristics:

  • Organizations in sectors targeted by AX, specifically manufacturing, distribution, retail, public sector, and services. These are major industry groups covering a broad swath of business types.
  • Organizations that have standardized or want to standardize on Microsoft’s technology stack, such as Windows Server and MS SQL Server.
  • Organizations where users want to leverage their familiarity Microsoft’s end-user productivity tools, such as Microsoft Office, Exchange/Outlook, and Sharepoint.
  • Organisations with very specifc requirements not addressed by typical erp systems where customisation can be done with the layered architecture reusing exisitng objects
  • Organizations needing an ERP system that can scale globally to multiple international locations without incurring the overhead and expense of an SAP or Oracle.
  • Organizations that have SAP or Oracle running for centralized functions such as financials and HR, but desire a lower-cost, small footprint solution for local operations or satellite offices/plants—the so-called “two-tier” strategy.
  • Organizations running multiple legacy systems that want to consolidate to a single modern platform are well advised to short-list Dynamics AX. Its backing by Microsoft in many cases will be enough to warrant AX a closer look. With the enterprise software industry undergoing consolidation over the past decade, Microsoft’s continued investment in AX gives customers and prospects the assurance that AX is not at risk for being acquired and orphaned.

Synergy Software Systems has been particpating in the TAP programme since January and we are very excited about the many enhancements that take Dynamics Ax to a diferent level

THIS IS THE ONLY TIME WE WILL SEE AND LIVE THIS EVENT

June 3rd, 2011

This year, July has 5 Fridays, 5 Saturdays and 5 Sundays. This happens
once every 823 years. This is called money bags.

This year we’re going to experience four unusual dates.

1/1/11, 1/11/11, 11/1/11, 11/11/11 and that’s not all…

Take the last two digits of the year in which you were born – now add the age you will be this year, 

The results will be 111 for everyone in whole world.

 This is not of course 100% true, but it can be presented as a  mass prediction at a party :

 e.g.

1949 – age 62 =111

1950 age 61 = 111

 and the prediction works up to

1999 age 12 = 111

 Thereafter. once you get into the 2000s the logic breaks down and the total becomes 11 rather 111

 So, 11 is the prediction for children  i.e. 11 or under , and 111 for adults i.e. for 12 and over

Premier Composite Technology – Live with Microsoft Dynamics AX 2009

June 1st, 2011

A little  late posting this project closure meeting photo.

PCT provides a specialist build to order service which encompasses  a wide range of composite structures ranging from boats to building structures which they erect at site such as the new clock tower at Mecca.

The company has grown rapidly over the last 2 years. It is to their credi that they have the foresight and confidence to invest in the future continued growth and were  able to complete a factory move,  and commissioning in parallel with the implementation of Dynamics Ax. Synergy Software Systems provided a rapid 1 month implementation of core finance and trade and logistics and project accounting  to allow the site to enter transactions immedately after the year end audit. 

 A futher month of enhancement followed to adapt the project modle to their specific needs and this was followed by one more month to set up BOMs and implement master scheduling and  production. This included a  way of tracking the completion progress of wip through each work centre, and a tailored  material requisition and approval system.

By all standards this has been a  very successful project; Useful lessons learned include

A dedicated project team maintains continuity and impetus

Certified consultants with industry knowledge  add value and focus

Senior Operational staff  leading the project team ensure timely good business decisions

Clear objectives and realistic scope ensure the project does not get bogged down

Early go live in phases with subseqent handholding and product enrichment is a key factor:

Imminent deadlines ensure timely decisions 

Early hands on use is the fastest way to get experiiened with the solution without being overwhelmed and pays early dividends, builds confidence and  makes each subsequent phase easier to implement

The familiar Windows user interface and navigation eases end user adoption

The ability to rapidly customise and adapt the solution to specific business needs eases change management

Integrated real time transactions and access to information provides better business decisions,  tighter controls and better operational effciency and senior management buy in  – early evidence of this provides a virtuous spiral  of success for a project.

PCT continues to grow rapdily and Microsft Dynamics Ax scalablity is the ideal platform to support that growth.  The company is already considering further extensionof the  system with mobility and bar coding .