Advert

SNMP Trap

Last edited by . Total of 1 comment in the discussion.

The SNMP (Simple Network Management Protocol) allows network management to communicate with different network components. Because of this, it is important for all network hardware to be equipped with an SNMP agent that allows for it to be communicated back to network management. Once the network is connected, the elements are able to send messages back to network management, and at the same time, network management can send messages to the elements for information. It is this constant back and forth between the network and all its elements that necessitates Read More

Share on:

BS7799

Last edited by . Total of no comments in the discussion.

ISO17799 and BS7799 are security policies and standards procedures. The standard was initially known as a British standard called BS 7799, developed by the British Standards Institution. Later, it became the ISO IEC 17799 standard when it was adopted by the ISO IEC technical committee for international use. Such a committee is called ISO IEC JTC 1 and is currently responsible for all information regarding technology standards, and the BS7799 refers specifically to Information Security Management Standard formally approved during the year 2000. This standard defines a set of recommended Read More

Share on:

POS Systems

Last edited by . Total of no comments in the discussion.

POS stands for Point of Sale; POS technology is used mainly at retail locations such as stores, supermarkets, restaurant, etc. When a customer would like to purchase an item or pay a bill a POS system is extremely useful to register the purchase, keep track of inventory, purchase details such as time, date and store location and input all this data into a database which then can be used for data mining purposes. POS systems have changed the face of retail. Now, a small or large business can easily keep Read More

Share on:

Point of Sale

Last edited by . Total of no comments in the discussion.

Point of Sale refers to the location, hardware, and software that is used to process a transaction. Point of Sale systems are used in restaurants, retail outlets, and any other place where money and goods are exchanged. Point of Sale systems range in capability and design and are most frequently represented by the checkout terminals that are seen in stores and businesses. A true Point of Sale system includes a cash register, a computer that processes the exchange, a barcode reader, and a printer that creates a receipt of the Read More

Share on:

ITIL Service Management

Last edited by . Total of no comments in the discussion.

The Information Technology Infrastructure Library (ITIL) is a collection of concepts developed Information Technology Services Management, IT development, and operations. What ITIL did was provide a description of different IT practices that were important. It took these important practices and applied a checklist to it that an IT organization could then tailor to suit its specific needs. It made things much easier for IT firms because they now could follow a comprehensive check list. ITIL Service Management ITIL service management is the support necessary to ensure that customers have access Read More

Share on:

ITSM (Information Technology Service Management)

Last edited by . Total of no comments in the discussion.

ITSM stands for Information Technology Service Management. It is a discipline that is widely used for managing large, medium and small scale information technology systems. ITSM is targeted towards the customer and is considered a consumer friendly approach to managing a wide variety of services. ITSM tries to put the consumer relationship first, by switching the emphasis from an IT centered philosophy to a customer service philosophy. IT Service management is sometimes associated with other types of management philosophies including Six Sigma, TQM (Total Quality Management) and Business Process Management. Read More

Share on:

ITIL Incident Management

Last edited by . Total of no comments in the discussion.

Incident management is a process area found within the ITIL check lists. The goal of any incident management process is to effectively and quickly get a business back to normal service operation. This way, a business’ operations are not impacted as severely. This results in a higher level of service quality. According to ISO 20000, the most important objective of an Incident management team is to “restore agreed service to the business as soon as possible or to respond to service requests.” What is an Incident? An incident is the Read More

Share on:

OLAP (OnLine Analytical Processing)

Last edited by . Total of no comments in the discussion.

A growing business of a company brings lots of effects with it and huge amount of data that needs to be stored and tracked is one of them. So, in order to deal with this data, new and sophisticated methods of data processing are required and OLAP or as others say, “On Line Analytical Processing”, is one of them. Well, it is really difficult to describe what OLAP really is, but in a nutshell, one can say that On Line Analytical Processing is a class of software technology that allows Read More

Share on:

Learning Management System

Last edited by . Total of 1 comment in the discussion.

Learning Management Systems (LMSs) are software programs that are used to centrally administer classroom education or training events via the Internet. High end LMS applications are normally capable of providing a wide-range of management and education-related services. These services range from personalizing content for the student, supporting web standards and portability, delivering content in a rapid fashion, supporting self-guided or self-paced courses of instruction, and providing centralized administrative controls over the course content. What Are Learning Management Systems Used For? An LMS can be used for many training or education Read More

Share on:

Data Entry

Last edited by . Total of 1 comment in the discussion.

Data entry refers to someone transferring/transcribing information into a computer application such as a spreadsheet, word processor, or database. Some common formats that require data entry include handwritten forms/documents, print-outs from other data storage programs, patient data at doctor or dentist offices, and personal data such as names and addresses. The data entry field ranges from full-time employees that do nothing but transfer information to computer programs and project managers who have the occasional need to conduct data entry tasks. Need for Data Entry Since the invention of the typewriter, Read More

Share on: