Wednesday, April 22, 2009

Services of salesforce.com

Salesforce.com offers Comprehensive On-Demand Business Services in different areas. Two of these are discussed below:-
Customized Services Strategy:-
As mentioned on the website the company rightly points out that each and every single company is different from another in some way or the other. This means that each of their requirement for Enterprise Systems is also quite distinct. This is the reason why Salesforce offeres customized services for its clients. Through its vst experience it has learnt all the different combinations of services it can offer and now each service can be speciafically designed according to the needs of the customer.
Force.com Services :-
Other than the previous service they also offer an overall integration of all the different business processes from desktop tools to enterprise applications. Some of these integration services include Salesforce.com Consulting, Salesforce.com Training & Certification, and Salesforce.com Support.
Consulting:-
At each and every step of installations and implementations of systems they provide proper advisory and consulting services for data management,Implementation and Configuration etc.
Training and Certification:-
All employes are properly trained and awarded certificates for successful completion of their training programs.
Customer Support:-
Explains which package to choose from, how to integrate it with your organization and achieve maximum return on your investment.

Monday, April 13, 2009

RFID and Privacy

Today I am going to talk about a technology called RFID. It stands for Radio Frequency Identification Systems.
RFID was initially built for one sole purpose: security. However this is not the case today. In the name of security numerous new applications of RFID have cropped up that have almost nothing to do with security but rather only serve as privacy intruders.
Some of the major applications that can pose a threat to privacy include the following:-
  • Tracking Apparel:-

This kind of eccentric device is used for linking the clothing a consumer purchases to his or her Id, credit card information etc.

In my opinion there is no such need for this absurd device. It encroaches on the basic right of humans i.e. privacy to a very large extent. There is no need for companies to keep track of consumer purchases and their personal information.

This application poses a very severe threat to privacy because such intimate data can be used for all kinds of actions both positive and negative.

  • Tracking Tires:-

This kind of device can link the tires of car to the vehicle's license plate. This in turn will enable any observer to view where the vehicle is travelling to at any point in time.

This application again is quite absurd. There is no need to keep a check on every single person's travelling schedule. It is a completely personal choice of a human being where he or she wants to go. Tire companies have no right to violate this law.

Although the privacy issue is there but in my opinion the threat is low because sometimes such data can actually be used for security purposes also. This is especially relevant if these devices are only used for citizens which pose a threat to national security. As far as common people are concerned there is no need for anyone to pry on their privacy.

  • Tracking Patient and Personnel:-

This device is used to keep track of every single patient in a hospital. Although such an application might be useful in certain situations but the problem is that the data received by these devices can be viwed by everyone. This means that if someone wants to use some very sensitive information about a particular patient for stuff like blackmailing then this technology will become a liability.

Should we Adopt it or not?

As far as the technology itself is concerned the fact remains that it is extremely useful and informative. The problem starts when we start using anything so abundantly that it turns into a liability.

In my opinion as far as proper measures are taken to ensure that the privacy of common individuals are not being violated then this technology can be used. An important thing to remember is the fact that as long as the principle of "moderation" is employed instead of "extremism" then there is no harm in using it.