Novel Netware Network Operating System

This is an operating system that has the capabilities of supporting information and resources sharing between network computers. It provides an influence between workstation in a network.

Network Operating System Services includes:

File and resource sharing – Is the fundamental requirement for a network ie is the reason behind networking computers.

Configurability and usability – configuration and use should be easy paper documentation, electronic format, books should be provided for a first time user to get the network up and running.

Support – any kind of useful information should always be available.

Types of Network Operating System:

Novel Netware
• It is the first NOS to support the multiple platforms
• It was the first NOS to support multiple and varying topologies and routines between this different topologies
• Novel Netware servers typically outperform other network servers because it is by design network operating system

Features of Novel NOS include:

• Novel directory services (NOS)

NDS offering is what makes a novel a strong competitor of Windows NT. It uses X.500 standard and therefore prevent the creation of duplicate objects. Each object has a distinguish name (DN). Because NDS directory services is displayed in neat graphically arranged order, objects such as users, printers, workstations and application servers are sharing an organization structure to the system administration user. You can log in as the administrator user from any workstation. This enables you to manage the entire directory tree. You can add and remove user's services and other network resources. Users need to log only once in order to gain access to all network resources.

• Security Services

All passwords flows back and forth from the Netware server to the client workstation in an encrypted format, even the administrator can not look at user's password on the server. The administrator can remove and add users permission but only the users know their own password, even if users get to physical Netware server, they have no greater access to resources that would have on their own workstation is build into the network system because Netware security is build into the Netware system of the lowest level. All attempts to access information or resources on the network go through on the network security system.

• Database services

Provide a central repository for information on the server, the major database management system available is
Netware C – a database record management system index with a database key for easy development for vertical application.

Netware SQL – standard used for accessing records stored in relational database system.
Oracle DBMS – it is SQL based system used primarily business critical application in different lines of business.

• Messaging services

Provide a messaging service called Netware message handling service. This provides ease of message, transmission between many fronted applications. This application can share data over the LANs and Novel word.

• Print services

Allows up to 16 printers to be shared per print server on the Network and therefore a real flexibility of printing, Printers need not to be attached to the actual print server in order to be operated.

• Netware loadable machine (NLM)

Netware loadable modules are maintained by Novel Netware operation. It provide the power needed to support hierarchy used network services in the server. have the same access to the Netware security services making them same to control and monitor.

Advantages of the Novel Netware
Has the print and file server software in the business and its sharing of files and printers that makes a network important and useful. Has the best LAN NOS directory service.

Disadvantages
As an application server its failures as Windows NT beats it on this case. Poor at printing data / information network status and management. It has build in network management tools that are not powerful.

Effective Communication – Multiple Channels of Communication

As if face-to-face miscommunication were not enough of a challenge, dealing with multiple channels of communication can compound the issue of clear message transmission. One of the most frustrating aspects of communicating to multiple audiences (eg customers, business partners, and senior managers) is the redundancy and repetition intrinsic to the process of repeating the same message, over and over, to different stakeholders.

One of the best ways to handle the need to repeat a message across multiple channels is to identify an "elevator pitch" version of your message. The idea is that you have the good fortune to be on the elevator with the senior decision maker for a project or proposal you have. What do you say in the 30 seconds? How do you quickly and concisely convey the benefits of your message to someone whose time and attention is scarce?

When you consider your elevator pitch, think of the most concise way of expressing the key feature or benefit of your message. The more you understand and internalize the key aspects of your own message, the more easily your audience will pick up on your intended meaning. The American president Teddy Roosevelt was famous for giving "whistle stop" speeches that rented from five minutes to two hours, from the back of a train that rolled through town (this was before television broadcast such messages through the country). When asked how long it took him to prepare a five minute speech he was said to have responded, "About a day." And a twenty minute speech? "A few hours." How about a two-hour speech? "I'm ready to go right now!" The insight here is that to convey your message clearly and concisely takes more work than piling on more words, hoping your listener can sort out your meaning from the vast stream of thoughts spewing forth.

Once you've identified the elevator pitch version of your message, you can tailor it for face-to-face communication at sales and networking events, for print advertising, for online newsletters, and so forth. The elevator pitch clarifies your message's value in a succinct yet versatile manner, suitable for a variety of communication channels.

3 Different Types of Screen Protectors

A plastic or glass screen protector is a perfect solution to minimize damage to all types of on-the-go electronic devices. Screen protectors come in several different materials to increase the ability to provide the right protection and minimize issues with unwanted marks or scratches on the screen. Here are three of the different types of screen protectors:

PET Film

The PET film is one of the most common choices on the market and can provide plenty of useful benefits. This type provides a reliable solution to protect the screen at a relatively low price. Plus, there are many different types of protectors in this category which vary from the plain to matte finishes. A great positive of the PET film is the ease of installation and removal, as well as the high transparency for crystal-clear viewing. But, this film does have the negative of being prone to fingerprint marks and gives minimal protection in the event of impact.

For greater resistance to marks, scratches, or fingerprints, the matte PET film is the preferred option. However, this film can present a slight downgrade in the quality of the screen visibility.

Liquid

The intention of the liquid screen protector is to give the portable device long-term protection against scratches that result from normal wear and tear, repels dust, and leaves the screen feeling smooth. A single application of this nano coating technology is said to provide protection for up to 6 months. Plus, this type of screen protector has the ability to provide twice the protection of the more traditional films, while also being resistant to water spills and providing anti-static qualities.

The liquid screen protectors are more practical on the oleophobic coated or gorilla glass devices and don’t have much of an impact on devices with regular tempered glass screens.

Tempered Glass

The tempered glass screen protector is a sturdier option compared to the thin (about 0.1mm), plastic choices. Tempered glass has a thickness in the region of 0.3-0.5mm and gives a feel that is virtually the same as the original screen. Some of the great qualities of this type of protector is the oleophobic coating (reduces stain or fingerprint marks) and a higher degree of impact protection. Also, the installation process is usually a lot easier than using the plastic film. A slight downside to the glass protectors is the thickness, which is more noticeable on certain devices and might cause aesthetic issues for some users.

Citibank’s Transformation of Traditional Money Management Into E-Business

Citibank’s strategic intent is to convert its traditional money management business into an e-business framework. How does Citibank transform its traditional assets into digital assets? What issues, if any, do you envision that Citibank must overcome in order for the implementation to be successful?

According to Porter two main ways for a company to compete are on cost advantage or on differentiation. Citibank chose not to compete on price, but instead chose to compete on differentiation.

Since many other companies have similar products and services, Citibank bases its differentiation on customer service. Traditionally, this involved “offering telephone hotlines, relationship managers who understood clients’ needs, product consultants who provided service expertise and most important, continuous investment in technology to support both the front-end and the back-end electronic banking systems”. In order for “successful” transformation of traditional assets into digital assets the company must maintain or enhance its differentiation. Since the company’s differentiation is based on customer service, that means that in the transformation from traditional to digital assets the company must continue to be highly responsive to the customers’ current and future needs, and must do so to a higher level than the competition.

One main way that Citibank achieved transition from traditional to digital was via alliances with such technological companies as Oracle, Commerce One Inc, SAP AG, Wisdom Technologies and Bolero.net. Earlier the company invested millions of dollars on its own in multiple areas of e-business, and failed. Technology is not Citibank’s area of expertise, and it found dealing with constantly changing technology to be an expensive struggle, which it ultimately lost. However, by 2000 Citibank had changed its strategy to one of garnering alliances and using its partners’ strengths to create the technological infrastructure that the company needed to access markets and meet its customers changing demands. Working through alliances reduced Citibank’s risks and costs, increased its effectiveness, and allowed it to remain flexible in meeting changing technological and customer demands.

Customer demands varies, both in the short term and long term. According to McCauley and Kahn, one of the most important obstacles for Citibank to overcome in migrating customers from traditional to digital service was meeting their deep seated concerns about security. While to some degree this hindered Citibank’s efforts in rolling out Web-based applications, Citi did actively implement “multi-layered security architecture… public and private access keys, single-use passwords and multiple authorization controls” in order to meet customer needs (2002, p. 9). In addition, with digital processing it looked to transform repeatable processes that could be “commoditized” into an efficient digital factory. Commoditizing repeatable processes improves efficiency, but also allows resources for additional regional focus — localization. So too, Citibank’s strong brand name is a resource that translates into increased trust as a “trusted provider” when competing with Deutche Bank and other competitors. In fact, most Fortune 500 companies assign value to Citibank’s specific offerings, and prefer it to other international payment providers. Citibank, then, offers multiple areas of value to customers.

The key question, however, is whether this value translates into a competitive advantage which translates into additional profits. Though Citibank met their customers’ needs in the area of information technology, how unique is what it offered? Cutting edge technological capabilities can soon become “hygiene factors”, which are considered to be required, rather than a competitive advantage. These then, do not qualify for differentiation or competitive advantage. While at one point Citibank may have offered cutting edge technological capabilities, the competitive advantages these afford can quickly be eroded. Customer service and transactional efficiency are important. However we need to ask what other areas of business require attention in order for Citibank’s ultimate success. If these are not met, the corporation will not meet its growth goals.