Thursday, July 2, 2009

business technology

Business Information: Business Intelligence guide

Posted by admin | Business | Monday 30 March 2009 4:11 pm Edit This

Big and small companies collect information to assess the business environment i.e. to acquire a sustainable competitive advantage in the business environment and also cover the areas of marketing research, industry research and competitive analysis. Every business intelligence system has a particular purpose (be it short term or a long term purpose) based on a vision statement or organizational goal. Business intelligence can be defined as a set of business processes designed to garner and analyze business information. It is a vast category of application of programs that includes providing access to data to help an entrepreneur in his business decisions, task of query and reporting, online analytical processing (OLAP), statistical analysis, forecasting and data mining.

Business intelligence involves different strategies. The BI task can be handled with the aid of application software. Application software is broadly categorized under class of computer software that enables a computer to function in accordance with what the user desires. The application software is designed to help people be prudent in taking decisions by imparting them accurate, current and requisite information. This is precisely the reason that business intelligence is also referred to as ‘decision-support system’ or DSS. While framing and implementing a business intelligence program there are several crucial points to be borne in mind.

The goal or the purpose of the program, in simple terms the goal of the organization that the program will address should be considered. There should be a rough idea of how can the program will lead to better results.

Secondly the expense of adopting a new business intelligence program should be estimated.

A person should establish a procedure to reach the ideal way of measuring the requisite metrics. The business intelligence program should be carefully governed to ensure completion of the desired targets. You may have to make several adjustments or modifications in the program from time to time. The business intelligence program should also be tested for accuracy, reliability and validity. One should also know that how the business intelligence initiative entails a variation in results and how much change was a chance product.

Also see what will be the quantitative and qualitative benefits and about employees, shareholders, distribution channels etc. The information so gathered must be tracked into well-defined metrics. A person should be sure of the kind of metrics adopted, its standardization and its performance.

Analysis of a Mandatory Access Restriction System for Oracle DBMS

Posted by admin | Technology | Wednesday 25 March 2009 4:03 pm Edit This

For many information system based on DBMS it is often a problem to implement access restriction, which takes information value into account. It is usually crucial for large-scale information systems of government or corporate use (i.e. geographical information systems or document management systems). Such system usually imply mandatory access model. One of the features of the mandatory model is prevention of either intentional or accidental decrease of information value thanks to information flow control. Mandatory access model is implemented by labeling all the subjects and objects belonging to the access restriction system.

Oracle DBMS is currently one of the most powerful and popular industrial DBMS. Starting from Oracle9i version, Oracle Label Security (OLS) component is implemented, which makes it possible to organize mandatory access to stored data. OLS is a set of procedures and limitations built into database kernel, which allow implementation of record-level access control.
Analysis for possible leakage channels of confidential information seems interesting for the reviewed system.
We are offering the following common analysis algorithm of the implemented mandatory access model.

1) Access object types are determined according to the published documentation and investigation of the DBMS (e.g., tables, strings, or columns).
2) Commands of SQL are analyzed in terms of how users can modify access objects.
3) Several objects with different confidentiality levels are created for each access object type.
4) Several user (access subject) accounts are created with different mandatory access rights.
5) A sequence of SQL-queries is formed, which are executed with different mandatory access restriction rights and objects with different confidentiality level.
Let us consider access objects in OLS. These are table records, which have

unique labels. It is often implied that tables are access objects in OLS because security policy is applied to tables. However tables do not have labels themselves; they just contain labeled rows.
The following basic SQL operations handle individual records:
- CREATE – creation of a new record;
- SELECT – reading of an existing record;
- UPDATE – modification of an existing record;
- DELETE – deletion of a record.
Our experiments consisted of sequences of queries called by users with different mandatory access rights to objects of different confidentiality levels. These experiments made it possible to construct the mandatory access model of OLS to records. We define two variables: I and J. I is a value of object’s label. Smaller values of I indicate higher confidentiality level (the value of 0 corresponds to “top secret”). J is a value of subject’s access level.
The model can be presented in the following formalized view:

1. CREATE \ SELECT \ UPDATE \ DELETE, j = i
2. SELECT, j i

Such mandatory access model on record-level is quite correct and it meets criteria of Bell-La Padula security model. So OLS works correctly on the level of table records.
However, beside records as representation of stored data, users can interact with other data representation, which are not affected by the mandatory access policy. Tables are an example of such objects. Users indeed can modify structure of tables, i.e. add new fields, change their names, and modify data types. OLS loses its ability to work properly on table level.
For instance, a user with higher mandatory rights has a right to create a new field in a table. The name of the field may be confidential itself, and OLS mechanism does not prevent this operation. A user with lower access rights has always a possibility to query names of all the fields.
For example, a new field is created with the name new_password_xxx (where xxx is a top secret information) with the following sql-query:
ALTER TABLE user1.test_table ADD (new_password VARCHAR2(30));
If another user who does not have any mandatory rights executes the following query (SELECT * FROM user1.test_table; ), he gets an empty data set, however all field names ofuser1.test_table are exposed to him. As it was shown above, column name can contain classified information.
Operations shown in the example create duplex channels of data exchange between subjects with higher and lower access rights, and therefore they can cause leakage of classified information.

In the issue of the foresaid, the mandatory access model implemented in Oracle is not complete, and this fact makes it possible to exchange classified information without any control of the mandatory access system, which decreases information value.
Also you can read about actual methods of biometric keyboard signature authentication from our site: http://www.allmysoft.com/biometric-keyboard-signature-authentication.html

The bundle of professional lighting effects

Posted by admin | Technology | Friday 20 March 2009 3:59 pm Edit This

The power bundle of plug-in modules for After Effects lets to making various sorts of special effects which are so indispensable for each video artist. In one set several types of powerful instruments are collected in order to create all kinds of incredible video FX, such as flashes, rays, stars, sparkles, glow, rainbow, lens flare etc.

Each module in the AlphaStar set is a very powerful tool in itself that covers the whole trend in the sphere of producing special effects and permits great variety of methods of its application.

AlphaStar allows create pictures amazing in their beauty and quality. Being built based on the unique 64-bit drawing algorithm, this plug-in allows achieving quite complex types of the half-tone transitions, chromatic aberrations and color mixing. All these create very effective pictures, so attractive to people’s eyes.

additionally, AlphaStar contains special facilities to perform complex effects with significant number of lighting objects easily and quickly. Well thought of and convenient particle systems and automatic object generation systems allow easily decorating the compositions with myriads of immensely beautiful start and make them live their own life on the screen.

The UI of AlphaStar is quite convenient; it is aimed at easing working with this solution to the maximum by making it more pleasant and productive. Despite the great amount of adjustable parameters, it is really convenient to work with our module. All parameters are grouped in thematic lists.

The special solution for the quick and productive work with AlphaStar should be mentioned especially. The Presets mechanism shows the basic possibilities of plug-ins in the form of buttons with icons. By just pushing a button, you can automatically change the corresponding parameters to achieve the same effect on the screen as on the chosen image.

Undoubtful, AlphaStar is a very powerful and convenient instrument in the inventory of any video artist. The quality of drawing and convenience of usability make our product an indispensable assistant which give a creative person the ability to create the truly glamorous masterpieces of the computer art.

wto-center.org

Posted by admin | News | Friday 13 March 2009 3:31 pm Edit This

Environment ISOTR14062 tube …
??RoHS?????????… European RoHS directive implementation possible …
???????REACH???… The new chemicals policy (REACH) on the ring …
???????????????… Sony’s e-waste recycling measures …

?????REACH?????… Australia’s views on REACH (the British …
???REACH??????? Views on REACH Brazil (English)
????REACH??????… Canada’s views on REACH (English …
???REACH??????? Views on REACH Chile (English)

“Technical Barriers to Trade, Shenzhen, early warning system” is a set of specially designed to help domestic enterprises to respond to global trade, technical barriers to trade large-scale database system, the system main section of the Profile are as follows … …

????2004???????… Held in 2004 on the Shenzhen high-tech skills …
???????????????… Organized by the European Union on environmental protection means electrical and electronic equipment …
???????????????… Organized by the European Union on environmental protection means electrical and electronic equipment …
2004???????????… Shenzhen High-Tech in 2004 standardized …
RoHS???????????… RoHS directive six hazardous substances seized …

[G/TBT/N/SVK/7] 2005?……?????????????… (2005-03-22) [G/TBT/N/SVK/7] 2005 Yearbook … … Ministry of Economic Affairs of the Slovak Republic Act … (2005-03-22)
[G/TBT/N/THA/170] ?????? (2005-03-22) [G/TBT/N/THA/170] Product Certification Standard (2005-03-22)
[G/TBT/N/THA/171] ??????????6??BE254… (2005-03-22) [G/TBT/N/THA/171] Industrial Product Standards Act (No. 6) BE254 … (2005-03-22)
[G/TBT/N/CHE/47] ????????????????(OO… (2005-03-18) [G/TBT/N/CHE/47] Office of the Federal Communications Act on the communication equipment (OO. .. (2005-03-18)
[G/TBT/N/JPN/141] ??????????????? (2005-03-18) [G/TBT/N/JPN/141] non-road special motor vehicle emission regulations Act (2005-03-18)

No comments: