Monday, 19 March 2012

Event Scheduling Tools



1. Doodle (http://www.doodle.com/)

Description - Doodle eliminates the chaos of scheduling and saves you a lot of time and energy when you’re trying to find a time to bring a number of people together. The service is used for business and personal scheduling by more than 10 million people per month. Instead of using just one option, Doodle enables you to propose several dates and times and the participants can indicate their availability online. You'll find the perfect time to meet in a quick and easy way no matter how many people and calendars are involved.


Type of license - Doodle is free and doesn't require you to register. Advanced users can connect their calendars, customize their own Doodle, and use a lot of extra features. Doodle offers scheduling for everyone.

This software offer customization with additional cost. Users can choose 3 different package : 'solo', 'business', 'enterprise'



2.SCHED (http://sched.org/)

Description - is a simple yet powerful event calendar, personal agenda builder and social networking tool.

Type of license - Free. This software offer upgrading with additional cost. Users can choose 4 different package : 'Basic', 'Plus', 'Pro','Premium'.



3.VIP Task Manager Professional (http://www.taskmanagementsoft.com/products/taskmanagerpro/)

Description - VIP Task Manager Professional allows multiple users to plan, schedule, share, track and report tasks, appointments, projects, business processes, and any company activities simultaneously through Local Network (LAN) and Low Speed Networks (Internet, VPN). It is a groupware tool (client/server software) for increasing company performance, effectiveness and productivity by better task management and team collaboration

Type of license - Proprietary: Users can choose 2 different package : 'VIP Task Manager Standard edition', 'VIP Task Manager Professional edition'.


4. 

Web Conferencing Tools


1.       Adobe Acrobat Connect
                                                    
a.      Tools Description
                       i.      Operating System compatibility - Windows and Mac
                      ii.      Able to do video conferencing with 15 peoples.
                     iii.      Can do web conferencing with 2,500 people maximum.
                     iv.      Support features like session recording and embedded quizzes

              b.       Type of License: Proprietary


2.       Central Desktop:
- Central Desktop Web Meeting is an integrated Real-Time Web Conferencing solution.
- allows business teams to communicate and collaborate more efficiently. 

a.       Tools Description
                      i.      Operating System compatibility - Windows and Mac
                     ii.      Can conduct web meeting with 10 attendees maximum
                    iii.      Support almost all browsers.
                    iv.      Require Java Runtimev.1.1 or higher.
                    v.      Integrated with popular Instant Messaging networks like MSN messenger, Yahoo messenger and etc.
                             
b.      Type of License: Proprietary


3.       GoToMeeting:
a.       Tools Description
                    i.      Operating System compatibility – Windows only
                   ii.      Some of the features in it include chat, screen sharing and attendee permission Support almost all browsers.
                  iii.      Integrated with popular Instant Messaging networks like MSN messenger, Yahoo messenger and etc.
                  iv.      It is also possible to record the meeting sessions

b.      Type of License: Proprietary

4.       Microsoft Live Meeting
a.       Tools Description
                   i.      easy to use and reasonable quality web conferencing

b.      Type of License: Proprietary


P@5sw0rD

Definition - A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. 

Follow these password do's and don'ts to help protect your data and your identity.

PASSWORD DO'S: 
  • DO pick a password you will remember
  • DO change your password regularly
  • DO use a mix of uppercase and lowercase characters.
  • DO use punctuation marks and special characters such as #, $, %.
  • DO choose a line or two from a song or poem and use the first letter of each word, preceded or followed by a digit. (e.g "Do you know the way to San Jose?" becomes the password DYKtwTSJ?).
  • DO use a password that you can type quickly without having to look at your keyboard. This makes it harder for someone to notice your password if they happen to be watching over your shoulder.
  • DO use a password with 8 or more characters. More is better.
  • DO create different passwords for different accounts and applications.
PASSWORD DON'TS:

  • DON'T write your password down.
  • DON'T make obvious choices like your last name, first name, nickname, birthdate, spouse name, pet name, make/model of car, or favorite expression.
  • DON'T choose your username as your password.
  • DON'T share your password with anyone. Once it is out of your control, so is your security.
  • DON'T use a word contained in English or foreign language dictionaries, spelling lists or commonly digitized texts such as the Bible or an encyclopedia.
  • DON'T use an alphabet sequence (lmnopqrst), a number sequence (12345678) or a keyboard sequence (qwertyuop).
  • DON'T use a password shorter than six (6) characters.
  • DON'T use a word spelled backwards.
  • DON'T use a password of all digits, or all the same letter.
  • DON'T use the same password for more than one system or web site.
  • DON’T Use numbers in place of letters. For example, “Password” becomes “Pa55w0rd.” Dictionary programs are also equipped to combat this technique.
  • DON’T Use dates to create a password (for example, AUguST2001).
  • DON’T Re-use any of your last 10 passwords.
  • DON’T Provide your password—or any of your sensitive or confidential information—over e-mail or instant message. Think of an e-mail message or IM like a postcard. The information can be seen while it’s traversing the Internet. Also, once you send an e-mail, you no longer control the information in it. It can be forwarded to other people without your knowledge or consent.
  • DON’T Use sample passwords given on different Web sites, including this one.