Salesforce.com's flagship sales force automation (SFA) application gives businesses the upper hand with their sales data. Comprehensive and easy to customize, Salesforce empowers companies to manage people and processes more effectively, so reps can close more deals. With Salesforce, reps spend more time selling and less time on administration.
Marketing
Salesforce.com's closed-loop marketing automation application, Salesforce CRM Marketing, empowers companies to manage multichannel campaigns and provide up-to-date messaging to sales. Lead hand-off is automated to ensure that no opportunity is missed. Real-time analytics and reporting give marketers the tools to evaluate results and adjust campaigns to maximize them.
Cmprehensive on- Demand Marketing Automation include:
* Integrated marketing and sales application with automated lead conversion
* Real-time analytics to measure and optimize campaigns for best results
* Multichannel campaign management and analysis for a complete marketing solution
* Rapid deployment and award-winning ease-of-use to get users working quickly
Sales
Salesforce CRM SFA enables companies to drive sales productivity, increase visibility, and expand revenues with an affordable, easy-to-deploy service that delivers success to companies of all sizes. Reps need solutions that make their jobs easier, not more complicated. Salesforce gives them fast access to data—online, offline, and via mobile devices—and links easily to popular tools like Microsoft Office and Outlook.
for further detailers visit www.salesforce.com
Saturday, April 25, 2009
Wednesday, April 15, 2009
Assignment
Question 1
Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.
Some of the RFId applications are discussed below
1.Racking Apparel: Clothing maker Benetton planned to embed retail items with RFID tags. The implanted devices would enable Benetton to track individuals and inventory their belongings by linking a consumer's name and credit card information with the serial number in an item of clothing. Privacy advocates noted the potential abuses of a system, and Benetton agreed not to tag clothing with tracking devices—for now.
However, Marks & Spencer, one of the largest retailers in the UK, announced that it will begin tagging apparel items with ultra high frequency (UHF) tags beginning in Fall, 2003. UHF tags are a new generation of RFID technology that provide faster data transfer speeds and longer read ranges. Marks & Spencer has already used tracking devices extensively in its food supply division.
2.Tracking consumer packaged goods (CPGs): Gillette, Wal-Mart, and the U.K.-based supermarket chain Tesco are teaming up to test specially designed shelves that allow for real-time tracking of inventory levels. The "smart shelves" will be able to read radio frequency waves emitted by microchips embedded in millions of shavers and other products. Wal-Mart plans to test the Gillette shelf initially in a store located in Brockton, Mass. If the technology is successful, Wal-Mart also plans to join forces with Procter & Gamble to test a similar system with cosmetic products, and has encouraged its top 100 suppliers to use wireless inventory tracking equipment by 2005. So far, Wal-Mart executives say the company plans to use RFID chips only to track merchandise, and will remove the tags from items that have been purchased. However, Wal-Mart's decision to implement RFID technology will likely propel the ubiquity of the tags in CPGs.
3,Tracking tires: Tire manufacturer Michelin recently began fleet testing of a radio frequency tire identification system for passenger and light truck tires. The RFID transponder is manufactured into the tire and stores tire identification information, which can be associated with the vehicle identification number (VIN). Critics argue the tags could ultimately become tracking devices that can tell where and when a vehicle is traveling.
4.Tracking currency: The European Central Bank is moving forward with plans to embed RFID tags as thin as a human hair into the fibers of Euro bank notes by 2005, in spite of consumer protests. The tags would allow currency to record information about each transaction in which it is passed. Governments and law enforcement agencies hail the technology as a means of preventing money-laundering, black-market transactions, and even bribery demands for unmarked bills. However, consumers fear that the technology will eliminate the anonymity that cash affords.
5.Tracking patients and personnel: Alexandra Hospital in Singapore recently began a new tracking system in its accident and emergency (A&E ) department in the wake of the Severe Acute Respiratory Syndrome (SARS) scare. Under this system, all patients, visitors, and staff entering the hospital are issued a card embedded with an RFID chip. The card is read by sensors installed in the ceiling, which record exactly when a person enters and leaves the department. The information is stored in a computer for 21 days. Officials say that the technology enables health care workers to keep tabs on everyone who enters the A&E department, so that if anyone is later diagnosed with SARS, a record of all other individuals with whom that person has been in contact can be immediately determined. Other hospitals in Singapore are expected to adopt similar technology.
6.Payment systems: In 1997, ExxonMobil developed the wireless payment application known as Speedpass. Since then, six million consumers have utilized the payment option at 7,500 Speedpass-enabled locations. Now, a wide range of merchants and retailers are looking for ways to implement radio frequency (RF) wireless payment systems. Sony and Phillips are leading the way. The two corporations will soon begin field testing an RFID system called Near Field Communication (NFC), which will enable RFID communication between PCs, handheld computers, and other electronic devices. The companies envision that consumers will log on to their personal online portal by swiping their smart cart—embedded with a Sony or Philips RFID—which will be read by a RFID reader plugged into the USB port on the computer. Next, consumers would shop online, say, for tickets to a local event. The consumer would pay for the tickets online, download them to their PC and then transmit them with NFC technology to an RFID tag in their mobile phone. Then, at the event, consumers would wave their cell phone near a reader in the turnstile, and be automatically admitted.
7.Tracking Chicken: IBM is working with the Norwegian company Nortura and its IT subsidiary Matiq to track chickens from farms to supermarket shelves.
8.Applications in manufacturing: Most RFID applications in manufacturing are centered on the fully automatic identification of objects that may not
be in the line of sight of the readers. They improve shopfloor inventory tracking and automate warehouse operations,
including shipping / receiving. Over the past few years, documented examples include the following:
• Toyota (South Africa). Carrier tagged to streamline manufacturing and vehicle tracking. The tags are intended to
remain with the vehicle throughout its life and hold its maintenance history.
• Harley Davidson. Process automation by tagging bins carrying parts to provide instructions to employees at
each stage of the process.
• Johnson Controls. Tracking of car and truck seat through the assembly process.
• TrenStar. Beer keg tracking to improve demand forecasts and improving efficiency.
Question 2:
As the technology behind RFID advances, the potential for privacy infringement does as well. A more recent development is a study which reveals that RFID already has the capability to determine the distance of a tag from the reader location. With such technology already available, it is not difficult to imagine a situation in which retailers could determine the location of individuals within their store, and thus target specific advertisements to that customer based upon past purchases. In effect, that store would be creating a personal log of your past purchases, your shopping patterns, and ultimately your behavioral patters. While such information gathering would be considered intrusive enough by many consumer's standards, the danger that such information could be sold to other retailers, (similar to the way such profiles are currently sold regarding Internet commerce), could create potentially devastating information vulnerabilities. While some RFID critics have pointed out that the technology could lead to some sort of corporate "Big Brother," there is a more widespread concern that allowing RFID to develop without legal restrictions will eliminate the possibility for consumers to refuse to give such information to retailers.
If "live" unique RFID devices pass beyond the point of sale and are carried out into the consumer's world, they pose a strong threat to privacy. The unique ID in a garment or a car could be read silently by any organization and associated with an individual, allowing subsequent re-identification by that organization. The organization doing the surveillance need not be the manufacturer or retailer. As readers cost as little as $20, a hobbyist snoop or private investigator could even set one up near a doorway to record people who revisit an area.
If common items such as clothing, wallets and car tyres become track able, marketers will certainly start installing RFID readers in entrances to stores and car parks, to obtain more information about visitors. Once you have been identified with a bugged item you're carrying, that item can give you away anywhere. If you make a purchase with a credit or loyalty card, the seller could link your identity with the RFID number of any tagged articles you are carrying, and use it later or even sell that linking information to other organizations. Vast databases of records of people's movements would become available to telemarketers, government investigators and divorce lawyers.
Question 3:
RFID applications should only be deployed in limited cases. I don't see any harm in applying it for warehouse management but once the product reaches the consumer, the tag should be removed or disabled. It is highly unethical to use these tags for gathering consumers personal information.
Benetton decided to install a type of washable RFID but its CIO later clarified that Benetton would not put any RFID which cannot be disabled, and they will disable every device no later than point of sale. If they act on last two points, the personal information security threat is neutralized.
Use of RFID to gain insight into consumers life should not be allowed. This will lead to information chaos and information can get into wrong hands where it could be manipulated
These tags can be detected by all tag readers which is another reason why they shouldn't be installed. A person with many tags moving into some place will highly be vulnerable and that specific shop can gather all his personal information. One way to avoid this from happening is to use anti-reader chip introduced in market which blocks the communication of chips from readers
Note: following resources have been used for this assignment:
RFID applications in manufacturing by Michel Baudin
www.rfidgazette.org
www.Computerweekly.com
www.junkbusters.com
www.wikipedia.com
http://epic.org/privacy
Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.
Some of the RFId applications are discussed below
1.Racking Apparel: Clothing maker Benetton planned to embed retail items with RFID tags. The implanted devices would enable Benetton to track individuals and inventory their belongings by linking a consumer's name and credit card information with the serial number in an item of clothing. Privacy advocates noted the potential abuses of a system, and Benetton agreed not to tag clothing with tracking devices—for now.
However, Marks & Spencer, one of the largest retailers in the UK, announced that it will begin tagging apparel items with ultra high frequency (UHF) tags beginning in Fall, 2003. UHF tags are a new generation of RFID technology that provide faster data transfer speeds and longer read ranges. Marks & Spencer has already used tracking devices extensively in its food supply division.
2.Tracking consumer packaged goods (CPGs): Gillette, Wal-Mart, and the U.K.-based supermarket chain Tesco are teaming up to test specially designed shelves that allow for real-time tracking of inventory levels. The "smart shelves" will be able to read radio frequency waves emitted by microchips embedded in millions of shavers and other products. Wal-Mart plans to test the Gillette shelf initially in a store located in Brockton, Mass. If the technology is successful, Wal-Mart also plans to join forces with Procter & Gamble to test a similar system with cosmetic products, and has encouraged its top 100 suppliers to use wireless inventory tracking equipment by 2005. So far, Wal-Mart executives say the company plans to use RFID chips only to track merchandise, and will remove the tags from items that have been purchased. However, Wal-Mart's decision to implement RFID technology will likely propel the ubiquity of the tags in CPGs.
3,Tracking tires: Tire manufacturer Michelin recently began fleet testing of a radio frequency tire identification system for passenger and light truck tires. The RFID transponder is manufactured into the tire and stores tire identification information, which can be associated with the vehicle identification number (VIN). Critics argue the tags could ultimately become tracking devices that can tell where and when a vehicle is traveling.
4.Tracking currency: The European Central Bank is moving forward with plans to embed RFID tags as thin as a human hair into the fibers of Euro bank notes by 2005, in spite of consumer protests. The tags would allow currency to record information about each transaction in which it is passed. Governments and law enforcement agencies hail the technology as a means of preventing money-laundering, black-market transactions, and even bribery demands for unmarked bills. However, consumers fear that the technology will eliminate the anonymity that cash affords.
5.Tracking patients and personnel: Alexandra Hospital in Singapore recently began a new tracking system in its accident and emergency (A&E ) department in the wake of the Severe Acute Respiratory Syndrome (SARS) scare. Under this system, all patients, visitors, and staff entering the hospital are issued a card embedded with an RFID chip. The card is read by sensors installed in the ceiling, which record exactly when a person enters and leaves the department. The information is stored in a computer for 21 days. Officials say that the technology enables health care workers to keep tabs on everyone who enters the A&E department, so that if anyone is later diagnosed with SARS, a record of all other individuals with whom that person has been in contact can be immediately determined. Other hospitals in Singapore are expected to adopt similar technology.
6.Payment systems: In 1997, ExxonMobil developed the wireless payment application known as Speedpass. Since then, six million consumers have utilized the payment option at 7,500 Speedpass-enabled locations. Now, a wide range of merchants and retailers are looking for ways to implement radio frequency (RF) wireless payment systems. Sony and Phillips are leading the way. The two corporations will soon begin field testing an RFID system called Near Field Communication (NFC), which will enable RFID communication between PCs, handheld computers, and other electronic devices. The companies envision that consumers will log on to their personal online portal by swiping their smart cart—embedded with a Sony or Philips RFID—which will be read by a RFID reader plugged into the USB port on the computer. Next, consumers would shop online, say, for tickets to a local event. The consumer would pay for the tickets online, download them to their PC and then transmit them with NFC technology to an RFID tag in their mobile phone. Then, at the event, consumers would wave their cell phone near a reader in the turnstile, and be automatically admitted.
7.Tracking Chicken: IBM is working with the Norwegian company Nortura and its IT subsidiary Matiq to track chickens from farms to supermarket shelves.
8.Applications in manufacturing: Most RFID applications in manufacturing are centered on the fully automatic identification of objects that may not
be in the line of sight of the readers. They improve shopfloor inventory tracking and automate warehouse operations,
including shipping / receiving. Over the past few years, documented examples include the following:
• Toyota (South Africa). Carrier tagged to streamline manufacturing and vehicle tracking. The tags are intended to
remain with the vehicle throughout its life and hold its maintenance history.
• Harley Davidson. Process automation by tagging bins carrying parts to provide instructions to employees at
each stage of the process.
• Johnson Controls. Tracking of car and truck seat through the assembly process.
• TrenStar. Beer keg tracking to improve demand forecasts and improving efficiency.
Question 2:
As the technology behind RFID advances, the potential for privacy infringement does as well. A more recent development is a study which reveals that RFID already has the capability to determine the distance of a tag from the reader location. With such technology already available, it is not difficult to imagine a situation in which retailers could determine the location of individuals within their store, and thus target specific advertisements to that customer based upon past purchases. In effect, that store would be creating a personal log of your past purchases, your shopping patterns, and ultimately your behavioral patters. While such information gathering would be considered intrusive enough by many consumer's standards, the danger that such information could be sold to other retailers, (similar to the way such profiles are currently sold regarding Internet commerce), could create potentially devastating information vulnerabilities. While some RFID critics have pointed out that the technology could lead to some sort of corporate "Big Brother," there is a more widespread concern that allowing RFID to develop without legal restrictions will eliminate the possibility for consumers to refuse to give such information to retailers.
If "live" unique RFID devices pass beyond the point of sale and are carried out into the consumer's world, they pose a strong threat to privacy. The unique ID in a garment or a car could be read silently by any organization and associated with an individual, allowing subsequent re-identification by that organization. The organization doing the surveillance need not be the manufacturer or retailer. As readers cost as little as $20, a hobbyist snoop or private investigator could even set one up near a doorway to record people who revisit an area.
If common items such as clothing, wallets and car tyres become track able, marketers will certainly start installing RFID readers in entrances to stores and car parks, to obtain more information about visitors. Once you have been identified with a bugged item you're carrying, that item can give you away anywhere. If you make a purchase with a credit or loyalty card, the seller could link your identity with the RFID number of any tagged articles you are carrying, and use it later or even sell that linking information to other organizations. Vast databases of records of people's movements would become available to telemarketers, government investigators and divorce lawyers.
Question 3:
RFID applications should only be deployed in limited cases. I don't see any harm in applying it for warehouse management but once the product reaches the consumer, the tag should be removed or disabled. It is highly unethical to use these tags for gathering consumers personal information.
Benetton decided to install a type of washable RFID but its CIO later clarified that Benetton would not put any RFID which cannot be disabled, and they will disable every device no later than point of sale. If they act on last two points, the personal information security threat is neutralized.
Use of RFID to gain insight into consumers life should not be allowed. This will lead to information chaos and information can get into wrong hands where it could be manipulated
These tags can be detected by all tag readers which is another reason why they shouldn't be installed. A person with many tags moving into some place will highly be vulnerable and that specific shop can gather all his personal information. One way to avoid this from happening is to use anti-reader chip introduced in market which blocks the communication of chips from readers
Note: following resources have been used for this assignment:
RFID applications in manufacturing by Michel Baudin
www.rfidgazette.org
www.Computerweekly.com
www.junkbusters.com
www.wikipedia.com
http://epic.org/privacy
Wednesday, March 18, 2009
Sufi Music
Sufi Music is one of my favorite type of music. It has a strange power to grab your attention and hold you for as long as it wants to . I will start a series of posts regarding Sufi music to promote it among youth. So try to go beyond the beat and make an attempt to understand the meaning of it.
This is an amazing song by Abida Perveen from the album Raqse-e-Biamal(Dance of Wonderer), one of my all time favorite
This is an amazing song by Abida Perveen from the album Raqse-e-Biamal(Dance of Wonderer), one of my all time favorite
Few Days Experience
in my intro to this blog, i wrote that i am doing this blog thing for an assignment. in last few days of experimenting with this thing, i now think i might change my view. this things is interesting and fun. i m now thinking of maintaining this thing after wards as well and take it as something more than an assignment.
Tuesday, March 17, 2009
Ab Raj Karay gi Khalk-e-Khuda
The whole nation deserves to celebrate the restoration of judges specially that of Chief Justice Iftikhar Muhammad Cahudary. At last the efforts of civil society and that of lawyers resulted into something which can be a foundation stone for free judiciary.
Having said all this, i still am skeptical of the current situation. We, as nation, associate too much hopes from people. Lets see what change would restoration of Cj bring into the judicial system. The most encouraging fact was the involvement of the whole nation in uproar against the establishment. i guess this is for the first time that people have protest for so long against some government decision.
So i congratulate everyone on this historical event
Having said all this, i still am skeptical of the current situation. We, as nation, associate too much hopes from people. Lets see what change would restoration of Cj bring into the judicial system. The most encouraging fact was the involvement of the whole nation in uproar against the establishment. i guess this is for the first time that people have protest for so long against some government decision.
So i congratulate everyone on this historical event
The Campus Transfer Story
i have been asked lot of times as to why did i get myself transfered to University Campus. There are many reasons for it. Few of them cant be disclosed officially. The story which is believed to be true is that i had two kidney surgeries last year. Traveling all the way from Hostel to City Campus was not feasible at all after these surgeries. So i moved to university campus.
Everyone is requested to neglect any other story they hear from anyone. i was not involved in any terrorist activity and i didn't run to Dara Adamkhle (No go area) to save my life from a Sindhi Wadera.
Everyone is requested to neglect any other story they hear from anyone. i was not involved in any terrorist activity and i didn't run to Dara Adamkhle (No go area) to save my life from a Sindhi Wadera.
Monday, March 16, 2009
Introduction
Ladies and Gentlemen
This is my first ever blog which i have been forced to create as an assignment. Had it not been an assignment, i would have never ever in my life even visited this site. But life is cruel :) .
So for initial stages, it would be a general blog about different things such as politics(national and IBA) , art, literature, books and music etc. It will get more specific in later stages.
This is my first ever blog which i have been forced to create as an assignment. Had it not been an assignment, i would have never ever in my life even visited this site. But life is cruel :) .
So for initial stages, it would be a general blog about different things such as politics(national and IBA) , art, literature, books and music etc. It will get more specific in later stages.
Subscribe to:
Posts (Atom)