Archive for Luty, 2013

What factors influence the cost of a SAP Business One implementation?

By admin, 25 lutego, 2013, No Comment

How much does SAP Business One cost to implement? This is a question that we at Bluekey Software Solutions need to answer on a regular basis. The highly experienced Bluekey team, consisting of more than 100 employees, has implemented more than 220 SAP Business One sites in 16 different countries. Whilst there is no set formula to provide you with a 100% accurate price for the implementation of SAP Business One, we can provide you with some information to understand what SAP Business One implementations costs are likely to be and what expenses you can expect to see.   The cost of implementing SAP Business One is dependent on many variables: number of branches and companies, number of users, customer internal capabilities and responsibilities, quantity and quality of data, level of integration required, extent of customisation, business rules and workflow requirements, reporting and stationery needs and the amount of training required. Choosing a reputable and experienced SAP Business One partner will ensure that you get a complete solutions configured to your business processes and can significantly reduce your implementation costs. You can assess the complexity, and the implementation costs, for your business by considering:

SAP Business One Software licenses

SAP Business One offers businesses and users a choice of Professional, Limited CRM, Limited Financial, Limited Logistics, and SAP Business One Starter Package users. SAP Business One pricing will depend on the number of users and the type of licenses that your business requires and also if your solution is on-premise or on-demand. Different license types have access to different functionality sets within SAP Business One to increase control of your operations.

SAP Business One Implementation

SAP Business One costing for implementation will depend on a number of factors including – number of SAP Business One users, business location, number of branches or subsidiary companies to be implemented, reporting needs and requirements , data cleaning and conversion, development / integration requirements and current skill level of system users. Consulting days to implement SAP Business One can range from a few days for small, ‘vanilla’ implementations, to 100 days or more for large implementations with complex requirements and multiple branches.

SAP Business One Support and Maintenance

As part of our vision for long-term partnerships with our customer we offer a range of SAP Business one support options to ensure that you get the support you need when you need it. Our objective is always to ensure you receive the best possible SAP Business One Support, value and up-time from your investment in SAP Business One and Bluekey.   As part of the SAP Business One support package, Bluekey provides all SAP Business One customers with an annual maintenance plan which is priced based on a percentage of the upfront software pricing – charged on an annual basis – which entitles customers to software upgrades and patch releases, access to the SAP portal, and help-desk facilities for bug resolution. The Bluekey Extended Support plan is priced per user and includes telephonic, help-desk and remote access support, limited to 15 minutes per instance.

Hardware requirements for SAP Business One

SAP Business One requires a server, operating system and database. When purchasing SAP Business One you should ensure that your server and client machines meet the minimum required specifications. A bit like implementation pricing the question with regards to minimum hardware requirements for SAP Business One cannot be answered without first asking several questions. Questions such as – number of users, is remote access required, potential growth plans, are complimentary or integrated solutions being used and what volumes of data will be processed. SAP Business One is a highly scalable and configurable solution – making sure that you have the right hardware solutions in place is a relatively straight forward task that the team at Leverage can assist you with.

How many branches/locations will be implementing SAP Business One

Is the implementation for a single branch or head office or are there multiple branches or companies that need SAP Business One implementations? If you have multiple branches or companies, will you require inter-company/branch and data consolidation? SAP Business One offers some great tools to enable quick implementation of additional companies from a master company but you will need to ask yourself – are all your branches or companies configured and set up the same way? You also need to think about what stationery or marketing documents you will need (invoice layouts, remittance advice, etc.) and whether this needs to change for each branch or company.

Geographic location of SAP Business One implementations

Is the SAP Business One implementation going to cover multiple cities or expand into neighbouring countries? If so, there are likely to be different set-ups and configuration requirements based on the different legal and fiscal requirements for each country. Another potential complexity with multiple country support is different language sets. SAP Business One offers support in multiple languages covering multiple legal and fiscal requirements – great for companies that are looking to expand geographically.

Data conversion

Unless your business is a start-up it is highly likely that you will want to convert data from your legacy system. Data conversions are categorised into two broad categories – master data and historical data. SAP Business One provides a Data Transfer Workbench (DTW) which assists with the upload of master data, and enforces data integrity and business rules. There is still some work to be done – export data from your legacy system, check and clean data, import into SAP Business One and reconcile / check data again. From a pricing / implementation point of view, you should consider whether you will be able to extract, clean and validate the data sets internally or whether the consultant will be required to assist with this process. Another question is whether or not there is a requirement to export historical data and whether it needs to be imported in summary or detail format. Summary format might be used to compare the current year’s profit and loss to last years (historical) profit and loss whereas a detailed import of historical data will allow drill down to original “closed” document (for example AR invoice). Historical data is notoriously inaccurate and ‘dirty’ usually requiring substantial effort to transfer to a new system.

SAP Business One reporting requirements

SAP Business One offers many standard reports and Dashboards. Even so it is highly likely that you will want some reports changed or custom written. The number and complexity of reports to be written to your specific requirements will have an impact on the days (and therefore price) to implement SAP Business One. SAP Business One, together with Crystal Reports, delivers compelling reporting functionality and information access to small businesses. You should however seriously consider keeping custom reports to a minimum if you want to reduce implementation time.

SAP Business One user training

How many people need to be trained as SAP Business One users? Will training be on-site or off-site and will site-specific user notes be required? Many companies adopt a “train the trainer” approach where the SAP Business One Partner is responsible for training super users of the customer. These super users then pass down their knowledge and train other users in the team. This approach helps reduce implementation pricing for remote and distributed sites by reducing the amount of training days required.

Business Processes

This is something that sounds obvious but is sometimes overlooked. If your business processes are industry specific and your requirements extend beyond the standard functionality or configurability offered by SAP Business One then extra consultancy, customisation or development will be required. There are also industry-specific solution extensions that reduce the implementation price by eliminating the need to customer development. The suggestion is always to try and keep the initial implementation as simple as possible and add functionality as your business develops.

SAP Business One User skill set

The skill level of users (including accounting, business knowledge and general computer skills) are all factors in determining how long it will take to implement SAP Business One in your business and how long it will take for your SAP Business One users to efficiently adopt the solution.

SAP Business One Project and Change Management

Sound project management, change management and a proven project management methodology is the basis of all successful ERP implementations. It is important to make sure that you have a project manager dedicated to your project, preferably with proven experience in successful SAP Business One implementations. The amount of project management required will vary dependent on the topics discussed above and also what change management/project management resources are available within your business to facilitate the transition.   Based on our analysis of your requirements we provide an estimate of the services and costs you should expect to implement SAP Business One. In the absence of this investigation you can estimate your implementation costs to be between 80% and 140% of your software costs. Bear in mind that if you add users or change the project scope during the implementation process, you should budget for a commensurate increase in implementation costs.

Graphic Image Technologies appoints new Sales Executive and Technical Support

By admin, 25 lutego, 2013, No Comment

Graphic Image Technologies (GIT) has expanded its staff complement with the recent appointed of Martin Cooper and Neil Coertze as Account Executive and Technical Support respectively. Cooper will drive new sales for the company and Coertze will deliver technical support, ensuing the company maintains its high service levels.

Security is a growing market and GIT is well positioned to meet this market’s need with their offering. Cooper will be responsible for increasing GIT’s local sales as well as identify opportunities within the market. Cooper brings with him extensive knowledge from the IT arena and as a previous reseller of GIT’s products, he has a good relationship with GIT and is knowledgeable of their products. Together with his sales experience, this made him the ideal candidate.

“My goal is to meet my growth targets and provide GIT with new prospects which will in turn result in further growth of the company. I am well positioned for the role as my long-standing association with GIT as a reseller has meant I have a good understanding of its products and solutions as well as market knowledge,” says Cooper.

Coertze will fill the role of Technical Support, providing GIT’s clients with technical support and assist with repairs and maintenance. Coertze brings with him extensive knowledge of the IT industry, as well as in-depth technical expertise.

“Working as a workshop manager for an IT company over the last few years has provided me with the technical experience to assist clients as and when technical support is required. Managing the workshop, repairing products and ensure sales are within targets the IT company has provided me with a skill set to ensure that I can provide GIT and its customers with the expertise required for all technical problems. The gap between security and IT is closing with many solutions making use of servers, hard disk storage and Internet Protocol (IP) networks as their backbone. My experience in this field will stand me in good stead,” says Coertze.

Concludes Mark Chertkow, Managing Director at Graphic Image Technologies, “Coertze and Cooper will allow us to further enhance our new business opportunities and service delivery with their appointments. The dedication and enthusiasm brought by both Cooper and Coertze is welcomed in GIT and we are keen to see the results they bring forth within their roles.”

Tackling the security challenges of BYOD for the SMB

By admin, 25 lutego, 2013, No Comment

By Dawie Bloomberg, Managing Director, Green Apple IT

The Bring Your Own Device (BYOD) trend has gained traction both within the corporate and Small to Medium Business (SMB) space. It offers a number of benefits for the smaller organisation. However, the BYOD trend also presents a number of challenges, chiefly related to security. These security issues are similar to those faced by the enterprise, but unlike the enterprise the SMB does not have a full blown IT department to rely on to address them. SMBs are often more concerned with focusing on their core business than dealing with IT security, but the reality is that in today’s world security challenges need to be addressed if SMBs are to take advantage of the value of BYOD without falling foul of the problems it can bring.

For the SMB, the concept of BYOD can be enormously beneficial. It can help to increase productivity, as every individual has their own preference on how they work best, and BYOD lets them use the device of their choice, with which they are already familiar. There is also a cost saving benefit, since the SMB no longer needs to buy specific devices but can simply plug and play employees existing devices. However, while the plug and play nature of BYOD is one of its benefits, it is also one of its biggest weaknesses, since this concept is prone to opening an organisation up to a host of security concerns.

The challenge is to find the right balance of access for authorised users, while ensuring that unauthorised persons cannot gain access to the company network, something that can be additionally complex given the often-unstructured nature of the SMB IT environment. SMBs need to prevent unauthorised access to data, and ensure that permissions are setup properly to achieve this while allowing employees to access the information they need.

However, BYOD and the security challenges surrounding it are not the only security issues faced by SMBs. Wireless networks are commonly used in SMB offices as they are quick and easy to setup and share between multiple devices. These are convenient but can add another layer to security issues and vulnerabilities. When setting these networks up, users often forget to change the passwords on wireless routers and modems, and even if the passwords are changed they need to be strong to prevent unauthorised usage. Leaving standard passwords or having weak passwords on the devices means that outside users can gain access to the network and an organisation’s bandwidth, using this for their own purpose and potentially limiting the productivity of an organisation.

Internet security is also important, and it is necessary to have adequate firewall technology in place to prevent attacks from outside the organisation, such as cybercriminals and hackers, who steal corporate information. Firewalls need to be set up correctly so that there are no loopholes for attackers to exploit, as this adds another layer of security to protect the SMB.

Circling back to the issue of BYOD, there are several other security concerns given the mobile nature of these devices. Because they are portable, they are more likely to get lost or stolen, which means that sensitive information could be compromised. Using built-in features such as screen locks and passwords is a simple but necessary step to preventing the casual attacker. SMBs should also invest in security technology that enables the encryption of sensitive information, as well as the ability to remotely wipe the device should it go missing.

It is also necessary to allow users on mobile devices such as laptops and tablets to access the company network when they are not in the office. Securing remote access can be done either by ensuring a very strong password is in place, or by hard coding access for specific devices using each device’s unique MAC address. This will block any devices that are not permitted from accessing the network. Remote desktop technology is another option, allowing the user to access the server as if they were in the office, ensuring that the same security policies apply to remote working as they do in the office. It is also possible to set up a Sharepoint site that allows users to access common data via the Internet, with passwords to authenticate users and access.

BYOD offers many benefits to the SMB, and is a convenient way of allowing users to work on technology they feel comfortable with. However, it does present security challenges on top of those already faced. When it comes to securing the SMB organisation, this often is not a core focus or priority. It is therefore vital to partner with a reliable and reputable IT service provider that will ensure security solutions meet requirements, are fit for purpose, and will allow SMBs to benefit from their technology without falling prey to attacks and security threats.

Choosing the right disk drive for your video surveillance system

By admin, 25 lutego, 2013, No Comment

Richard Makwela, Western Digital Product Specialist at Drive Control Corporation (DCC), discusses why reliable high-capacity audio visual (AV) hard drives should be the foundation of any security surveillance strategy.

Digital video surveillance today is widely used to enhance the physical security and safety of government institutions, corporations, public spaces and even schools and private homes.

Frequently we hear news reports about how criminals were apprehended after they were caught “on tape”. However, more often than not we hear that the footage was deleted off the security surveillance system only a few days after an incident occurred due to hard disk drive (HDD) space constraints or disk failures.

While digital surveillance was first introduced as a cumbersome technology in the 1940s, the technology has made a rapid transition from high-cost analogue to more affordable digital security systems. With increased presence and enhanced requirements of modernised closed-circuit television (CCTV) systems, there is a need for specialised HDDs with more storage capacity and advanced features designed specifically for surveillance mediums.

In fact, today’s AV hard disk drives are very different from ordinary desktop or enterprise hard drives. If you consider that an average desktop hard drive is designed to run for nothing more than an eight hour day, today’s surveillance systems run 24 hours a day, seven days a week. They are optimised for multiple continuous sequential write operations onto the drives from different audio and visual sources.

Today’s systems deliver a comprehensive range of features and capabilities such as high-resolution image quality, streaming video from multiple cameras, video archiving with ultra-fast data access and on-demand video playback.

AV drives provide full support for ATA streaming commands to measure performance and to minimise error recovery time limits in favour of completing operations on time. This means that while the video quality is not always ideal, all the desired frames are captured.

To understand which HDD is right for any particular application, one must first look at the recording system being used and how it is being used in conjunction with newer technologies, such as biometrics and smart sensors.

Surveillance drives are available in three distinct classes: AV-class, enterprise class, and solid state. Irrespective of the industry, the vast majority of surveillance systems used worldwide fall into one of six types. These include:

  • A Standalone digital video recorder (DVR) records video streams from one or more cameras. The video is recorded onto up to six hard drives, which are housed in the device itself. Typically small to mid-sized commercial facilities and home users favour these devices and AV-class drives have proven to be the best choice with low power consumption, 24×7 reliability and ease of use.
  • Hybrid and PC-based SDVR systems integrate analogue and digital video sources and provide local playback and search features on a PC. Organisations such as banks, small casinos and shopping malls and schools make use of this type of surveillance as it supports remote management and reporting features. AV-class storage and solid state storage are commonly used for these systems.
  • Network video recorders (NVRs) and video management systems (VMS) are systems that provide active analysis of recorded video, such as people counting, license plate recognition and monitoring of virtual boundaries. These advanced systems are used by governments, as well as casinos and commercial buildings, airports and manufacturing plants. AV-class storage as well as enterprise-class storage are best suited for these applications and are RAID-ready.
  • Mobile SDVR systems are used in vehicles and transportation systems such as police cars, armoured trucks, trains, buses and airlines, as well as military vehicles and vessels. This environment is typically hostile, such as high-motion or extreme temperature environments and solid state storage has been proven to be the best solution for these conditions to avoid disk failure.
  • Finally, surveillance storage expansion drives are external drives with AV-class storage inside and are engineered for 24×7 use. Because the solution is external, storage can be scaled as the need arises, or archived for analysis. These external drives are typically USB-enabled.

In closing, regardless of your surveillance environment, whether its banking, casino, retail, commercial, corporate, government or law enforcement, surveillance based hard drives are the foundations that deliver the superior performance, added capacity, and enhanced reliability that surveillance applications require.

Transnet National Ports Authority protects critical data with Autonomy solution from Altonet

By admin, 25 lutego, 2013, No Comment

Transnet National Ports Authority (TNPA) is a division of Transnet Limited, tasked with controlling and managing all commercial ports on South Africa’s coastline. It is the largest port authority in Southern Africa in terms of cargo volumes and is responsible for providing port infrastructure and marine services as well as ensuring the safe, effective and efficient economic functioning of the national ports system. In a digitally driven world, TNPA’s data is critical to performing its mandated functions and effective backup and restore capabilities are an integral part of protecting this data. In an effort to automate and streamline this process, TNPA turned to Altonet and the HP Autonomy Connected Backup solution to reduce risk, improve efficiency and ensure mission critical data is secure and protected at all times.

Previously, TNPA relied on users manually saving their valuable data, an inefficient practice that left the organisation vulnerable to data loss. With in excess of 1800 desktop and notebook computers across eight ports and the TNPA head office, this manual process not only relied heavily on human compliance, but also exposed the organisation to unnecessary risk in the event of an incident, including lost laptops, hard drive failures, accidental deletion of files or even fire, flood and other disasters. TNPA needed to ensure that all critical user data was protected at all times across all nine locations, and went out to tender with its requirements, ultimately selecting the HP Autonomy Connected Backup solution from local HP Autonomy Data Protection Partner Altonet.

“After evaluating many solutions as part of an open tender process, we found that the HP Autonomy Connected Backup solution was best suited for our needs. Altonet provided us with a workable solution and had the quality reference sites we needed to give us peace of mind on the quality of their implementations. They met all of our requirements and as such were the natural choice to work with,” says Ian du Preez, Senior Manager: Enterprise Architecture at TNPA.

“TNPA needed an intelligent, automated and secure backup solution, and provided a detailed tender with a tough selection process. Our product offering is extremely robust and we were confident that it met all of their requirements, including Broad-Based Black Economic Empowerment (BBBEE) criteria. We were awarded the tender at the end of 2011 and after conducting due diligence in March 2012 and ensuring that all hardware and software met requirements, the rollout began. This was completed towards the end of 2012. We also provided an educational workshop for helpdesk staff to ensure that they are able to deliver support to users should this be required,” adds Gareth Tudor, CEO at Altonet.

TNPA provided a comprehensive list of requirements as part of the tender process, all of which the robust HP Autonomy Connected Backup solution and Altonet met and exceeded. One of the most important requirements was for a fully automated solution that provided auto-scheduling of backups as well as fixed opportunistic backup, and which would run in the background without interrupting users.

Centralised management, strong encryption, version control and the ability to work in a virtual machine environment were also critical, as well as the ability to backup open files as well as saved files. Data de-duplication technology was required to optimise storage capacity, along with support for multiple user profiles on machines, rollout via Active Directory, and support for both 32 bit and 64 bit Windows operating systems.

“TNPA also required the ability to lock user profiles and specify attributes and file types that each user or group of users are required to back up. This helps to further optimise storage, ensuring that only critical business-related data is stored. Back end reporting was also required for visibility on all users, showing when backups occurred and how much data was backed up each time,” Tudor adds.

HP Autonomy Connected Backup automatically and securely saves critical data in the background while users work, backing up incremental changes in data and new documents to reduce the time, size and complexity of backups. Compliance and reporting functions are supported with Connected Classify and Collect, which offers extended capabilities for eDiscovery and data analytics. Connected Backup also makes it possible for users to securely access their protected files while on the move. Files can be searched and downloaded to a variety of mobile devices, including smartphones and tablets, for offline use. Autonomy utilises advanced encryption and other security technologies to safeguard enterprise data during transmission, storage and recovery, ensuring that TNPA’s critical data is always protected and always available for recovery.

Altonet and the HP Autonomy Connected Backup solution stood out from other tender applicants because of its proven scalability and single-platform approach, as well as its de-duplication and email optimisation capabilities. The HP Autonomy solution set is a global leader in the corporate and enterprise PC backup market, used by banks and auditors as well as other industries across the globe, and has a solid reputation for excellence. This proven track record for protecting customer data along with the agility and intelligence of the Connected Backup solution were deciding factors in the selection of the winning tender bid.

“The biggest threat to business, with all employees working either on laptops or desktops, is a loss of data resulting from people not backing up their work. HP Autonomy Connected Backup minimised this risk by automating backup and ensuring that if data is lost for whatever reason, it can be swiftly retrieved. We are confident that our data is stored safely and that we are compliant with legislation around data retention. We have already seen the benefits of this by being able to quickly recover lost data and get our staff back to full productivity in short order,” du Preez concludes.

Pet Shop Boys, Yes Promo Set USA, Megamix CD + Postcard

By admin, 24 lutego, 2013, No Comment

BONEY M // MEGA MIX // MCD

By admin, 24 lutego, 2013, No Comment

HOUSE ENERGY MEGAMIX CD Benassi Bros. Espirito Dhany

By admin, 24 lutego, 2013, No Comment

Dee Jay Team: Italian Dance Megamix (mixed by DJ Mike B.) CD

By admin, 23 lutego, 2013, No Comment

BEST OF THE BEST Dancehall Megamix Vol. 1 (2CD’s)

By admin, 23 lutego, 2013, No Comment
wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin skanowanie lublin serwis kopiarek convert Warszawa naprawa ksero Warszawa projekty powykonawcze dokumentacja powykonawcza skanowanie do pliku wielki format drukowanie projektów w lublinie