Thursday 9 May 2013

Example of Kumo user Manual

This is a kumo user manual for Time Temasek













 










         (Source : Kumo Manual)

Tuesday 7 May 2013

Kumo User at My Workplace

                                                                             
                                                                           Source : Google Image - Kumo

Currently, we are using Kumo to protect, share & control information in our organization. Kumo has been introduced and supplied by Scellus Sdn Bhd. As an Admin & HR, I will responsible for Human Resources and Administration work duties including IT. We have identify the problem occur in our workplace which is internet speed that  we can get at office maxed out at 1Mbps. We have checked and verified with all Internet Service (ISPs) that covers the location, but none of them can provide faster internet access. There is no centralized backup system implemented at the moment. Thus anyone in the organization can copy, delete or edit documents even without proper authorization. Furthermore, the amount of staff increases and there's no system in place to monitor all the activities that will provide an overall view of the organization.

The solutions of this problem, we choose Kumo to be installed at our workplace in order to secure, protect, control and collaborate. 

Internet
The speed available will not be sufficient without any kind of bandwidth control in place. With proper content filtering and caching system in place, the use of internet bandwidth can be controlled  providing a better internet access experience for everyone.

Back-up
It will not be feasible for us to implement an automated cloud system with the current infrastructure that is available to us. We will implement a local backup system that will be highly redundant and will be stored locally in the office. You will not need to build a data center to house our server. It can fit in a small area as we have designed it to be compact and space saving. All laptops and desktops will be backed up to it automatically too!

File sharing & control
A centralized file sharing will be implemented. All important work related files will be stored on the server, and permissions will be assigned to users that requires access.

Project Management
We will implement a platform for planning progress tracking and communication. Our staff will be able to work with associates and clients, assign tasks, share files, get notified for latest updates.

What is Kumo?



                                                                              Source : Google Image - Kumo

Kumo was designed as solution that is as functional in a small office setting as it is in larger corporation. It is dependable and affordable way to organize and safeguard our work.

Backup & file sharing
Access and share files securely - and at lightning speed between personal computers, be it a mac, Windows or Linux. Backups are performed automatically on a daily basis for every computer, and an innovative system ensures that Kumo only backs up data that has not already been backed up before, so backups are fast and compact. You can easily restore an entire computer or an individual file or folder to a previous point in time.



Content filtering

Kumo is an integrated content filtering, application blocking and malware protection solution that is powerful, easy to use and affordable for businesses of all sizes. It enforces Internet usage policies by blocking access to Web sites and Internet applications that are not related to business, and it easily and completely eliminates spyware and other forms of malware from your organization. No more productivity loss trying to repair computers or make computers usable again.


It works with everything
We have designed it to support features for systems running Windows, Mac & Linux. Some of the module like Firewall; works even with Android and iOS devices without any additional configuration.


                                            Source : Time Temasek Infra Proposal

Friday 3 May 2013

Securing information

Source : Google image

In most organization's in Nigeria today, especially those within the public sector, an increasing amount of funds are being allocated to and spent on physical security. While there may be a valid business need for these investments in physical security, an import question to ask is : " What is being done to secure information?"

Information is increasingly becoming the most important and most valuable asset to any organization. Organization thrives on information  and its associated assets acts as an enabler-information technology. As a result of the value of information to organizations, it becomes appropriate that it must be suitably protected and preserved in terms of confidentiality, integrity and availability (CIA). In most cases, protecting information goes beyond the physical. Processes, people and technology are other factors that come to the fore. 

There are instances where organizations are re engineering processes and implementing technologies to secure their information while nothing is being done to secure the people (eg: employees, contractors, service providers). People are the custodians and users of any implemented technologies or processes put in place within an organization and therefore, they require a regular dose of TEA (training, education and awareness) on information security.

With regard to processes, a good starting point for any organization is to adopt and implement an information security management system as prescribed by ISO/IEC 27001:2005.

Written by : Nurudeen  Odeshina's recent Journal article:
"Resource from SACA Journal, volume 2, 2013.

From this journal is to tell about the securing information system in organizations. The risk of the information is give impact to the business. As for me the information / data is an asset which like other important business assets, has value to an organization and consequently needs to be suitably protected. Protecting information and information systems from unauthorized access, use, disclose, disruption, modification, or destruction. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.


The important of security is to protects information from a range of threats ensures business continuity minimizes financial loss, optimizes return on investments increases business opportunities. Security breach will leads to reputation loss, financial loss, intellectual property loss, legislative breaches leading to legal actions (Cyber law), loss of customer confidence and business interruption costs.

Let's share  your opinion?

                                                                              

Trust in information system

Source : Google Image

Trusting others we interact with is a norm. Our everyday life is surrounded by scores of people whom we trust:  trust that they will uphold their end of responsibility. And when they do indeed act responsibly, the day becomes more predictable and the efforts more productive. There is nothing that shakes loose the faith in normal occurrence; expectations meet the reality and no one notices anything of concern.

When I go to the university each morning, I find the facility has been cleaned, as expected, the night before. The trash was taken out and recyclable bins were emptied. The coffee room is open and no one has spilled anything there, and if someone did spill, it was all cleaned up by the person who ran into the mishap. I go to teach my classes without wearing armor; of course, I trust that my students will not violate my trust in them. It has worked for more than 30 years and I am not nervous about the daily norm of walking into the classroom as I anticipate nothing out of the ordinary.



When you trust others, you do elicit from them—whether they are aware or not—a sense of duty that they perform their part. Any time this implicit contract is violated, you wonder if this was a one-time blip or a permanent change in the trust relationship. A change in expectations spills over in the realignment of trust; now you are more cautious and rather consciously protective of yourself. And this goes for any level of humanity:  a person, family, church group, theater goers, institutions and businesses, nations, and the world. A broken trust means steps to curb the defectors, and this may come from society, institutions or the government.



Trust, risk and responsibility are closely related. Trust generates reciprocal responsibility and, at the same time, remains a source of risk in the event that the trust is violated. The response from people and organizations is likely to be consistent with the nature of harm by the defectors. If a person lies and you are not affected in any manner—in fact, you may not even be aware—your response to the trust violation would probably be negligible or none. On the other hand, misleading senior citizens into signing an expensive long-term service contract that they cannot afford could trigger an angry and even violent response from the neighborhood.


Trust is sourced in humans. Technology can only be the enabler in supporting trust and sometimes even in violating trust. Tools provide the means to do things (right or wrong); they don’t drive a human being’s disposition or are bent to be a dove or a hawk. When humans design information systems or innovate technology, the source of trust transfers from those who have designed systems or developed new technologies to the systems and technologies. A driverless car gets to be trusted because you believe the designers have delivered a reliable vehicle that can be trusted. On the other hand, batteries in Dreamliner jets are suspect and people responsible for the product are working to overcome this.


(Written by Vasant Raval)
Source : ISACA Journal, volume 2, 2013


From the above journal, I am agree with him about the trust in information system. This is because the technology now a days can support the system in every organizations, business, school, manufacturing, hospitality, operations and many more. The system are easily to work for the people, cost effective, faster to generate & transferable the data, data accurately and etc. All the data and information can be process in order to get the result or making decision. The people are able to used the tools through innovative and creativity by the system. 

So, human are responsibility to manage the Information system. The information of data in the system are reliable, right and trusted. People believe that  the technology and information system are important in our lives.Therefore, they should trust the information system.


Do you believe trust is transferable to technology and systems? Do we treat trust in humans differently than we trust in technology and systems? I invite you to share your thoughts.

                                                 

Thursday 2 May 2013

E -Mobile

                          
                                                               
                                                           Source : Google Image- E-Mobile



Mobile E-commerce & Its Advantages

Mobile Commerce is any transaction, engaging the transfer of ownership or rights to use goods and services, which is started and completed by using mobile access to computer-mediated networks with the help of an electronic device. Japan and some European countries are much ahead of the United States in using of mobile commerce and mobile payments, and also these countries have alreadty become commonplace.As of March 2009, Japan had 50 percent more 3G subscribers than the United States. The utilize of the mobile technology as a payment gateway first begin in Helsinki, Finland in 1997, when a company owned by Coca-Cola installed two mobile-optimized transaction machines. And NTT DOCOMO, Japan’s zenith cell phone carrier, launched the first 3G network in 2001. Japanese mobile users are now able to use their phones for mainly daily transactions. Through Mobile Commerce, anyone can purchase a plane ticket and use the e-statement stored on your phone to check into your flight.Mobile Commerce: Ahead of Its Time, mobile phone users think that they would put together more purchases if the procedure was not so burdensome, products were easier to find and their devices supported secure credit card transactions. Web-enabled mobile phone users are much more probable to use their devices to get weather forecasts, read news, find movie times and bank online than to buy products.


Advantages of Mobile E-Commerce
The advantages of m-commerce (Mobile - Commerce) are:

  • Providing wider reach
  • Reducing transaction cost
  • Streamline business processes
  • Competitive pricing
  • Reducing time to order
  • The age of mobile shopping is here to stay, consumers can access millions of products at the palm of their hands and retailers can increase their reach and overall sales

  • Use of graphics unlimited
  • Unlimited bandwidth
  • WAP and SMS unlimited to small number of characters and text.
  • More functionality for mobile Internet over mobile phones and existing generation of handhelds than for mobile computers
  • Small screens of most devices still unlimited types of file and data transfer
  • The good news is that these mobile sites are an addition of your current contribution but they can also locate on their own
  • The mobile sites can be foundation from the same database that your are performing now to make their management very straightforward
  • New advanced mobile applications characteristically engage high-speed services being accessed by devices distantly, anywhere, at any time
  • M-commerce requests to eradicate even further the intelligence of a consumer having to go to the business for products or services, or requiring to be skilled in multiple technologies or having to preparation whenever they want to contact a business using the Internet
  • To allow the development of customer use of data options m-commerce applications and technology that have evolved quickly

                                                (Source : www.plaveb.com)

                                                (Posted by : Mark Spenser)

What is the mobile computing?
In the traditional computing environment it was necessary to come to the computer to do some work on it. All computers were connected to each other, to networks, servers, etc. via wires.


•Mobile Computing
–The first phase was to make computers small enough so they can be easily carried - Mobile devices–The second solution to the need for mobile computing was to replace wires with wireless communication media.
–The third phase was a combination of the first two, namely to use mobile devices in a wireless environment. Referred to as wireless mobile computing, this combination enables real-time connections between mobile devices and other computing environments.

Mobile computing - characteristics

. Mobile computing has two major characteristics that differentiate it from other forms computing   mobility and broad reach.
•Mobility implies portability based on the fact that users carry a mobile device everywhere they go. Therefore, users can initiate real-time contact with other systems from wherever they happen to be.
•Broad reach is the characteristic that describes the accessibility of people. They can be reached at any time.




                                                               

Wednesday 17 April 2013

Introduction of Management Information System


Source : Journal of The influence of Enterprise Systems on Business & Information Technology
Written by : Revenaugh, D lance and Muretta, Myle.M


My Comments 

From this journal we can analyze the activities of almost every business function, we can notice that 90% of all activities in the majority of business functions come down to collecting, processing and analyzing certain data. The role of information technology in a company makes a business system able to react quickly and adequately on the influences from the surroundings. A company with a well structured information technology can react efficiently and change its relation towards the surroundings promptly, when a reason to do so appears. The process of performance measurement enables the company to identify economic resources that it has at its disposal, to realize what the key factors that influence its performances are, and to find the best flow of action. 
Information of business and other organizational system can be introduced by developing one's own information system or by purchasing a suitable software program. For example: payroll system, attendance system, purchasing or procurement system, account system and many more. 

Why we need Enterprise Resource Planning (ERP) ?
It is because of :

- Integrates organizations department & functions.
- Value - added for the organizations
- Planning the available resources.
- Automates key business process

The Advantages of ERP 

- Efficient production management & material flow
- The opportunity for the integration of several manufacturing locations from the aspect of data application.
- Efficient management of consumer-supplier relations.
- Support from all aspects of a firm accounting systems.
- Elimination of redundant operations and data.
- Localized software versions, not only in view of the sense of legal solutions.
Efficient system reporting on all level of management so forth.