Pages

Thursday, April 29, 2010

Webinar Registration: Deliver Federation Projects with Virtual Directories

with 0 comments



In some studies, enterprises are spending up to 60% of their IT budgets on operational costs thus impacting the available budget to spend on innovation. The challenge we all face in the identity and IT departments is how to get the most out of our existing licenses and reduce cost where possible in delivering IT projects. One of the costly areas of projects is getting at identity data when it lives in legacy applications. This is especially true when you look at Federation projects.

If you are running a Federation project and have to access identity data in legacy or disparate data sources, this webcast is for you! Virtual directories provide a critical tool for Federation projects as they allow you to expose identity attributes without changing code in legacy applications. Additionally, you have control over how the data is accessed allowing you to manage sensitive service level agreements which can cause difficult political battles in organizations when discussing access.

Register here for this webinar and we will look at ways virtual directories can help you deliver that Federation project and make you an Identity Hero!

Wednesday, April 28, 2010

Call for Proposals by National Council on Teacher Quality

with 0 comments
The National Council on Teacher Quality is issuing a call for proposals for its second biennial research competition. This preeminent competition culminates in a national conference in March 2011 in Washington, D.C., when finalists will defend their paper before some of the nation’s top teacher quality scholars. The 2009 jury included Jane Hannaway, Eric Hanushek, Susan Moore Johnson and Michael Podgursky. See the site http://www.nctq.org/tr3/competition/competition2011.jsp for details.

Tuesday, April 27, 2010

Iron Man 2, Identity Security and Access Management in the Cloud

with 0 comments

If you are a security expert and you have not been to the new Oracle Iron Man 2 website you have to take a look at the cool demo site listed under "Stark Expo". The intro has a great security questionnaire on Security in the cloud in an cutting edge interface. If you read yesterday's blog, and went to the Iron-Clad Cloud: Secure Cloud Computing article in the new Security Newsletter, you were able to get an insight into way's Oracle can help secure the cloud. You will also do well on the questionnaire at "Stark Expo".

Go Check it out!

In Iron Man 2, Oracle is a proud sponsor of
Stark Expo, a world-class tradeshow that depends on a cloud computing
architecture to ensure that all systems are free from overload. And
that’s where you come in: by becoming a Master Cloud Operative, you’ll
help keep Stark Expo up and running. Complete your training, test your
troubleshooting skills, and get certified in the Oracle Pavilion.

Monday, April 26, 2010

Iron-Clad Cloud: Secure Cloud Computing with Oracle Identity Management 11g

with 0 comments
As organizations continue to leverage the cloud for essential business applications and services the provisioning and security of identity data becomes an essential compliance requirement. Oracle's new Security Newsletter has an article that provides information on critical approaches to security in the cloud.

One solution to the security problem with cloud services can be overcome using Service Oriented Security. The Oracle approach to using Service Oriented Security allows developers to pull from a centralized, authoritative source of identity services. This allows developers to build security into every application from the inside-out. This is critical to ensuring this is done in a standardized manner and most importantly it allows developers to develop without being security experts.

The "Iron-Clad Cloud: Secure Cloud Computing" article in this quarter's Security Newsletter is a great place to start when looking for information on how to use these tools to improve the security for your organizations cloud services. You will also find articles on database security and other bloggers who are sharing data about the security industry and Oracle's thought-leadership.

Friday, April 23, 2010

New Oracle Security Newsletter

with 0 comments






Oracle Identity and Database Security Teams have created a new Security Newsletter. The Newsletter launches this week and will be distributed to customer's who have signed up for the Newsletter via Oracle.com.

In each edition, you'll find news, blog posts, events, webcasts, and much more covering Oracle's Security Solutions. Whether your focus is on identity management or database security, each issue will be filled with the information you need to secure your database, middleware, and applications, and meet IT compliance requirements.

In this inaugural version of the newsletter you will find content on:You can see the entire newsletter here

Register for future versions of the newsletter by following the directions here. You can also see samples of all the different newsletter content that is available to stay current and aware of the latest leading news from Oracle.

Mass Layoffs Loom for Teachers

with 0 comments
Unless additional money is forthcoming from the federal government, many school districts will be forced to layoff large numbers of school teachers. The NY times article "Districts Warn of Deeper Teacher Cuts" reports that hundreds of thousands of teacher jobs around the country may be eliminated. The Los Angeles school district is one of the school districts facing deep potential cuts in jobs where last month the Superintendent Ramon C. Cortines sent layoff notices to 5,200 of the district’s 80,000 employees.

Sunday, April 18, 2010

Seneby ICT Corp.

with 0 comments
Kita Bisa


ECON 252: Financial Markets

Lecture 3 - Technology and Invention in Finance




Overview:

Technology and innovation underlie finance. In order to manage risks successfully, particularly long-term, we must pool large amounts of risk among many, diverse people and overcome barriers such as moral hazard and erroneous framing. Inventions such as insurance contracts and social security, and information technology all the way from such simple things as paper, and the postal service to modern computers have helped to manage risks and to encourage financial systems to address issues pertaining to risk. The tax and welfare system is one of the most important risk management systems.

Reading assignment:

Robert Shiller, The New Financial Order, Introduction


Class lecture:

Transcript
html
Audio
mp3
Video
medium bandwidth
low bandwidth
high bandwidth



Saturday, April 17, 2010

New York City will no longer pay some teachers to do nothing

with 0 comments
New York City pays some $30 million a year to some 650 educators who do nothing. As reported in the Associated Press article "NYC to stop paying teachers to do nothing" these teachers go to reassignment centers or "rubber rooms" everyday and surf the Net, play scrabble or read. Educators can spend months or even years in these rubber rooms while awaiting disciplinary hearings. Under a new agreement with the United Federation of Teachers, most of the teachers will be given administrative or nonclassroom work while their cases are pending. Teachers accused of serious charges including violent felonies, however will be suspended without pay.

Tuesday, April 13, 2010

Service

with 0 comments

"Melinda Gates"


A service is the intangible equivalent of a good. Service provision is often an economic activity where the buyer does not generally, except by exclusive contract, obtain exclusive ownership of the thing purchased. The benefits of such a service, if priced, are held to be self-evident in the buyers willingness to pay for it. Public services are those society pays for as a whole through taxes and other means.

By composing and orchestrating the appropriate level of resources, skill, ingenuity,and experience for effecting specific benefits for service consumers, service providers participate in an economy without the restrictions of carrying stock (inventory) or the need to concern themselves with bulky raw materials. On the other hand, their investment in expertise does require consistent service marketing and upgrading in the face of competition which has equally few physical restrictions. Many so-called services, however, require large physical structures and equipment, and consume large amounts of resources, such as transportation services and the military.

Providers of services make up the tertiary sector of the economy.

Service characteristics

Services can be paraphrased in terms of their generic key characteristics.

1. Intangiblity

Services are intangible and insubstantial: they cannot be touched, gripped, handled, looked at, smelled, tasted or heard. Thus, there is neither potential nor need for transport, storage or stocking of services. Furthermore, a service cannot be (re)sol owned d or by somebody, neither can it be turned over from the service provider to the service consumer nor returned from the service consumer to the service provider. Solely, the service delivery can be commissioned to a service provider who must generate and render the service at the distinct request of an authorized service consumer.

2. Perishability


Services are perishable in two regards

  • The service relevant resources, processes and systems are assigned for service delivery during a definite period in time. If the designated or scheduled service consumer does not request and consume the service during this period, the service cannot be performed for him. From the perspective of the service provider, this is a lost business opportunity as he cannot charge any service delivery; potentially, he can assign the resources, processes and systems to another service consumer who requests a service. Examples: The hair dresser serves another client when the scheduled starting time or time slot is over. An empty seat on a plane never can be utilized and charged after departure.

  • When the service has been completely rendered to the requesting service consumer, this particular service irreversibly vanishes as it has been consumed by the service consumer. Example: the passenger has been transported to the destination and cannot be transported again to this location at this point in time.

3. Inseparability

The service provider is indispensable for service delivery as he must promptly generate and render the service to the requesting service consumer. In many cases the service delivery is executed automatically but the service provider must preparatorily assign resources and systems and actively keep up appropriate service delivery readiness and capabilities. Additionally, the service consumer is inseparable from service delivery because he is involved in it from requesting it up to consuming the rendered benefits. Examples: The service consumer must sit in the hair dresser's shop & chair or in the plane & seat; correspondingly, the hair dresser or the pilot must be in the same shop or plane, respectively, for delivering the service.

4. Simultaneity

Services are rendered and consumed during the same period of time. As soon as the service consumer has requested the service (delivery), the particular service must be generated from scratch without any delay and friction and the service consumer instantaneously consumes the rendered benefits for executing his upcoming activity or task.

5. Variability

Each service is unique. It is one-time generated, rendered and consumed and can never be exactly repeated as the point in time, location, circumstances, conditions, current configurations and/or assigned resources are different for the next delivery, even if the same service consumer requests the same service. Many services are regarded as heterogeneous or lacking homogeneity and are typically modified for each service consumer or each new situation (consumerised). Example: The taxi service which transports the service consumer from his home to the opera is different from the taxi service which transports the same service consumer from the opera to his home - another point in time, the other direction, maybe another route, probably another taxi driver and cab.


Each of these characteristics is retractable per se and their inevitable coincidence complicates the consistent service conception and make service delivery a challenge in each and every case. Proper service marketing requires creative visualization to effectively evoke a concrete image in the service consumer's mind. From the service consumer's point of view, these characteristics make it difficult, or even impossible, to evaluate or compare services prior to experiencing the service delivery.

Mass generation and delivery of services is very difficult. This can be seen as a problem of inconsistent service quality. Both inputs and outputs to the processes involved providing services are highly variable, as are the relationships between these processes, making it difficult to maintain consistent service quality. For many services there is labor intensity as services usually involve considerable human activity, rather than a precisely determined process; exceptions include utilities. Human resource management is important. The human factor is often the key success factor in service economies. It is difficult to achieve economies of scale or gain dominant market share. There are demand fluctuations and it can be difficult to forecast demand. Demand can vary by season, time of day, business cycle, etc. There is consumer involvement as most service provision requires a high degree of interaction between service consumer and service provider. There is a customer-based relationship based on creating long-term business relationships. Accountants, attorneys, and financial advisers maintain long-term relationships with their clientes for decades. These repeat consumers refer friends and family, helping to create a client-based relationship.

Service specification

Any service can be clearly, completely, consistently and concisely specified by means of the following 12 standard attributes which conform to the MECE principle (Mutually Exclusive, Collectively Exhaustive)

  1. Service Consumer Benefits
  2. Service-specific Functional Parameters
  3. Service Delivery Point
  4. Service Consumer Count
  5. Service Delivering Readiness Times
  6. Service Support Times
  7. Service Support Languages
  8. Service Fulfillment Target
  9. Service Impairment Duration per Incident
  10. Service Delivering Duration
  11. Service Delivery Unit
  12. Service Delivering Price

Friday, April 9, 2010

Is Reading is Fundamental doomed?

with 0 comments
A change in the way that the federal government is planning to allocate funds to increase literacy may severely hamper some non-profit organizations who are currently running literacy programs the best known of which is the Reading is Fundamental or RIF program. As is reported in the NY times article "U.S. Plan Threatens Free-Book Group", RIF stands to lose all of its federal financing, which accounts for roughly 75 percent of its annual revenues through this change. RIF is mainly involved with giving out free books to under-privileged children to enhance their literacy.