Archive for the ‘Security and Compliance’ category

Malware attacks on leading hotel pos machines in U.A.E. – for a secure solution ask us about TCPOS

August 16th, 2016

“We believe the malware could have affected payment card data – including name, payment card account number, card expiration date and verification code – of customers who used a payment card at point-of-sale terminals at the affected properties,” the hotel group said.

The reality is that there many systems in the market with an obsolete credit card management system that although it is PCI/DSS compliant it is not safe at all and can be attacked by professional hackers.

For TCPOS this is not a risk because it does not read/save/process/analyse or see any credit card, and leaves this task to third party providers who are specialized in this field.

TCPOS is a modern dot net based solution for both Retail and F@B outlets. It is deployed globally with many leading retail and F@B outlets and has specialist offerings for example for Quick Service restaurants, or Drive-though kiosks, Multi currency and multi language as you would expect and works on almost any platform.

For more information contact us on 009714336589
We will feature TCPOS more articles in the near future, and will review the changing nature of retail and F@B and how that is addressed by new technologies.

Dynamics 365 and Linked in – How does this affect Dubai and the U.A.E.?

August 10th, 2016

The code word Madeira has now transformed into Microsoft Dynamics 365

This is Microsoft’s new approach to end-to-end intelligent business applications in the cloud. Dynamics 365 unifies ERP and CRM into one cloud service with new, purpose-built apps to manage all your core business functions: Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation. At the Enterprise level Dynamics Ax will also be an option.

Dynamics 365 is a cloud-only solution built on the Microsoft Azure stack. What excited the partners at the recent WPC conference that Synergy Software Systems’ directors attended in July, was the announcement of an underlying common data model, with deep integrations, coupled with the equally new Microsoft Flow solution and the emergence of Xamarin as Power Apps. So we will see Office 365 seamlessly connect business apps with collaboration and productivity tools like email, spreadsheets and word processing documents, Skype Business. Power BI and a flexible, extensible platform,

Dynamics 365 looks to be a game changer that will enables companies to stay nimble, adapt and innovate in real time. It will launch in the USA probably in November this year with just the Finance functional piece. Other elements will release through next year, but realistically we do not foresee it reaching the UAE as a fully featured solution much before 2018.

The life of the on-premise Dynamics Ax 2012 R3 versions is to be extended by at least another 3 years meanwhile.

Microsoft has steadily been increasing tis presence in social media, with several acquisitions embedded in Dynamics CRM. There was positive endorsement for Microsoft’s cloud and social strategy by the announcement that Facebook has adopted Office 365 ( which ahs now reached 75 million user seats).

The other recent big news of course was their acquisition of Linked-in. There are a number of ways that Microsoft plans to take advantage of its $26.2 billion LinkedIn acquisition, ranging from data-gathering to getting a foothold in social to plans for re-imagining the recruitment and talent management businesses and more.

A more straightforward integration opportunities between the two companies is LinkedIn’s integration with Microsoft Office. Microsoft explained how it could use LinkedIn’s data in familiar programs, like Outlook, Skype, or Office applications like Word, Excel and PowerPoint, for example. Microsoft says that today, there’s not a single source for data on individual professionals — it’s scattered around, and is often out-of-date. (And I might add often widely inaccurate or hyped)
By integrating professional profile data into Office 365, email and other communication apps, users may be more inclined to keep that information up-to-date. The data will maybe more visible to friends, colleagues and employers. This of course may be a double edged sword if that that data more easily accessible to anyone who wanted to know more about a professional’s background or experience.

LinkedIn has a sizable network of over 433 million users, yet Office’s footprint is much bigger. Microsoft says there are more than 1.2 billion Office users today. LinkedIn becoming a part of Office would massively increase its data’s visibility.
LinkedIn itself in 2012, bought the Gmail plugin Rapportive for $15 million, which allowed Gmail users to access a sidebar that would show the profile and other social networking updates. Maybe unfortunately, the it took out functionality that made the service popular in the first place, including its integrations with other social networks.Installing an extension into your web browser that changes what your Gmail inbox looks like and what information it displays when loaded in a tab. didn’t address the fact that many users today get their email by way of mobile phones, not just desktop web interfaces.

It makes absolute sense for Microsoft to invest in the messaging capability within LinkedIn, to create an integrated experience between Outlook, Skype and LinkedIn. Traditional email is starting to die off. Instead, communication is shorter and the frequency go3w up, leaning more towards an instant messaging type mechanicism e.g. What’s App, Snap Chat, Twitter.

So, what changes LinkedIn becoming a part of Microsoft,. Well that profile data can become natively integrated into Microsoft’s Office products and other communications apps which could then share their data back with LinkedIn. Microsoft CEO Satya Nadella explained in an email to employees, that by integrating LinkedIn’s network in Office 365 and Dynamics, the company will be able to enable new experiences like “a LinkedIn newsfeed that serves up articles based on the project you are working on and Office suggesting an expert to connect with via LinkedIn to help with a task you’re trying to complete.”

In other words, LinkedIn’s newsfeed, can become highly personalized and might e.g. know what you’re currently working on, what meetings you have planned and what projects are underway. And as you head into those meetings, Microsoft’s digital assistant Cortana will then be able to quickly give you background on who you’re about to sit down with, and have have their LinkedIn resumes on file. This, Nadella says, will increase user engagement, the company’s subscription business, and opens the door for targeted advertising.

It sounds both clever and creepy to think about your work projects and meetings being the subject of for ad targeting in the future. We can hope for an opt-out mechanisms that respect user and data privacy.

Knowing how employees spend their time and who they work with, could also help to inform LinkedIn’s recruiting products.

Microsoft says that LinkedIn Learning (based on LinkedIn’s acquisition of Lynda.com last year for $1.5 billion), will also be integrated into Office so users canlearn how to perform advanced tasks and sign up for courses without having to leave Office.

The Dynamics family has never really figured big at Microsoft -Bng for example added $5bn to the bottom line last year. Azure is the new engine of growth. Linked in may prove to be the strategic acquisition that brings Dynamics to the fore.

How much will Lined in’s profiling of a customer’s management team assist a sale in Dynamics CRM? LinkedIn’s Sales Navigator has the capability to create quality leads and present updated and accurate information to sales reps. With the acquisition, it is probable that Sales Navigator will directly integrate with Dynamics CRM and may eventually be built on Dynamics CRM. What if the records of contacts, accounts and leads in your Dynamics CRM are updated as the related profiles of those people and companies are changed? Think of all the time sales reps and administrators would save inputting and updating records or the wasted hours saved by not using wrong contact data. When a client got a new phone number, – it’s already reflected in the Dynamics CRM contact record. What if you could see the contact’s, or lead’s, recent activity on LinkedIn. What posts has he liked or shared? Has he published any LinkedIn pulse articles lately?

HR professionals may find a bigger role on the Dynamics 365 platform as the powerful recruiting tool of LinkedIn is integrated into the ERP solution. Both, human resources professionals and the projects and field service industries may benefit from LinkedIn’s to help them source and to manage temporary workers.

A recent report by Cisco said that by 2019, video will account for 80 percent of global internet traffic and this is where Microsoft’s 2011 acquisition of Skype may come to the fore. Experts predic that video is the future of recruitment, and with Whatsapp currently thought to be testing video messaging, video communication will become commonplace, even in the workplace. Hands on in the product interviews with WebEx, Go to Meeting, Team viewer etc and use webcams, or with videoconferencing are already well established, Will video meanl the end of face-to-face interviews>. Should you send a video message as your cover letter? It might differentiate you today, but if you’re not doing that in 24 months, then you’ may be left out.

Given the tie ups between Infor, Salesforce and SAGE on AWS – maybe Microsoft realises it needs to compete with the full suite of business apps to drive forward its cloud future.

Rather than pay the 35% corporate tax rate to repatriate offshore capital for the purchase, which would have amounted to approximately $9 billion, Microsoft fund4e the purchase using debt. In addition to the tax savings, Microsoft’s AAA credit rating no doubt facilitatee a low-interest loan %, which can be written off to further reduce the cost of funds. The LinkedIn acquisition is a marked departure from the strategy of ex-CEO Steve Ballmer, which deployed a series of Windows-only products in an attempt to build a moat around the f Windows franchise.

The LinkedIn purchase signals Microsoft’s intention to seize opportunities in areas with high growth potential. The deal is likely to drive significant benefits and an increasing revenue stream to the Azure cloud platform, which saw a decline in sales in Q1 2016.

The immediate significant benefit opportunity for Microsoft’s cloud initiatives is to migrate of LinkedIn’s operations, which are hosted as a private cloud across several leased data centers, to the Azure cloud service. LinkedIn need to expand its data center utilization, and Azure’s excess capacity provides a solution at a lower overall cost.

Integrating each company’s unique social graphing metrics of how users use the systems will benefit Azure , because the graphs have very little overlap. Microsoft graphs are generally Office-centric, including: calendar usage, email, contacts and documents. LinkedIn’s graphs, on the other hand, track communications, professional relationships, learning and recruiting. The combination of graphs provides the opportunity for Microsoft to present customized cloud-based productivity solutions based on a holistic view of users’ data.

In a world where the millenials are rapidly being chased by ‘generation z’ – social and media are the norm – maybe Microsoft really is ‘cool again. ‘ In this region with a high percentage of the population aged under 25, and one of the highest uses of mobile phones, a ‘Smart government’ focus, with apps for everything we are lily to see the results of such speculation very soon.

Microsoft wins Data privacy battle

July 23rd, 2016

Tech giant Microsoft scored a major legal victory yesterday with a unanimous decision by an appeals court that ruled warrants issued by U.S. authorities do not extend to data stored in other countries. The ruling by the Second U.S. Circuit Court of Appeals was applauded by the vast majority of the tech industry, which had strongly supported Microsoft’s case against the government.

“The decision is important for three reasons: it ensures that people’s privacy rights are protected by the laws of their own countries; it helps ensure that the legal protections of the physical world apply in the digital domain; and it paves the way for better solutions to address both privacy and law enforcement needs,”
Microsoft president and chief legal officer Brad Smith said in a statement about the decision.

Territorial Limitations

The case centered around a previous decision by the U.S. District Court for the Southern District of New York, which had ruled against Microsoft’s efforts to quash a warrant issued under the Stored Communications Act (SCA). The SCA is part of the broader Electronic Communications Privacy Act passed in 1986 designed to protect the privacy of users interacting with an electronic communications service provider.

The warrant directed Microsoft to seize and produce the contents of an email account that it maintained for a customer who used the company’s electronic communications services. The government stated that it believed the emails contained information about narcotics trafficking.

But the information the government requested was stored on servers in Ireland, and Microsoft refused to transfer the data to the U.S. In explaining its decision in favor of the company, the appeals court explained that “warrants traditionally carry territorial limitations: United States law enforcement officers may be directed by a court-issued warrant to seize items at locations in the United States and in United States-controlled areas . . . but their authority generally does not extend further.”

A Ruling for Privacy

The decision was hailed by technology companies, business groups, and privacy advocates. “This ruling is a major affirmation that the rights we enjoy in the physical world continue to apply in the digital world,” said Greg Nojeim, director of the Freedom, Security and Technology Project for the Center for Democracy and Technology. “By declaring that a U.S. warrant cannot reach communications content stored abroad, the court ruled strongly in favor of privacy and national rule of law.”

Amicus briefs supporting the company had been signed by the Chamber of Commerce, AT&T, Verizon, Apple, Cisco, and the National Association of Manufacturers. The Republic of Ireland also supported Microsoft’s case, arguing that the warrant represented an assault on the nation’s sovereignty.

While the decision is certainly a win for Microsoft, the government may yet appeal. The case could eventually end up before the U.S. Supreme Court. The U.S. is also likely to push for new laws requiring companies to store customer data within the U.S. if it decides it can’t legally compel organizations to surrender data stored overseas.

Ransomware on the increase

July 21st, 2016

We have helped several companies recover from ransomware attacks this year.

The business segment is becoming an increasingly attractive target for cipher-malware developers, Kaspersky Lab says in a new study. According to the report based on Kaspersky Security Network (KSN) data, the number of attacks against the corporate sector 2015-2016, compared with 2014-2015 has grown six fold (from 27,000 to 158,000). Thus, ransomware tried to encrypt the data of every tenth B2B user.

Cyber-criminals using ransomware now attack businesses frequently, particularly small and medium-sized companies. This trend is confirmed by the IT Security Risks 2016 study from Kaspersky Lab and B2B International, during which 42% of respondents from small and medium-sized businesses agreed that cryptomalware was one of the most serious threats they faced last year.

For s companies, any data unavailability – however brief – can lead to significant losses, or bring their entire operations to a halt. If a company has not been taking due measures to ensure the safety of its important information, purchasing the decryption key from cyber-criminals can be the only way to recover data.

However, this does not guarantee complete data recovery. The best way to protect your company from malware is to prevent the attack in the first place.

Kaspersky Lab experts recommend several simple safety rules:
-Make regular backup copies of all important files. Companies should have two backups: one in the cloud (for example Dropbox, Google Drive, etc.), and another on an additional server or on removable media if the data volume is not too big.

Synergy’s guide is the 3-2-1 rule
– 3 copies
- on at least 2 media
- 1 of which is held remotely i.e. offsite

1. Compromised servers selling for $6 in IT underground market
2. Kaspersky: 35% of people in UAE are likely to accidentally share confidential data
3. USB charging creates mobile security risk, says Kaspersky

Trust well-known and respectful service providers who invest into security. Usually you can find security recommendations on their web-sites, they publish 3rd part security audits on cloud infrastructure. Don’t assume cloud provider can’t have security, availability or data leakage problems. Raise a question what do you do if security provider losses your data. There should be transparent data backup and restore processes together with data protection and access control.

Avoid using only free security and anti-malware software: small businesses expect the basic security tools offered within free solutions to be sufficient. Free tools do provide basic protection, but they fail to provide multi-layered security support. Instead, take a look at dedicated solutions: they do not require a large financial outlay, but deliver a higher level of protection. Some ‘free tools’ may be provided by the hackers.

Regularly update your OS, browser, antivirus, and other applications. Criminals use vulnerabilities in most popular software to infect user’s devices.

Prevent IT emergencies – configure security solution for your company. Small businesses usually don’t have an IT department or full-time dedicated administrator, they simply rely on the techiest person in the office to take care of the computers, in addition to his regular duties. Don’t wait until something breaks, use IT support from an IT service provider to review your software and security configuration in advance.

Crypto-malware is becoming more and more serious threat, not only an organization losses money for ransoms but business can be paralyzed during files recovery. There is wide attack vector including web, mail, software exploits, USB devices, and others. To avoid infection, you personnel should explain where attacks come from and that employees should not open email attachments, visit untrusted web resources or plug USB devices into unprotected computers. Anti-malware solution is an essential measure to avoid majority security incidents”, noted Konstantin Voronkov, Head of Endpoint Product Management Kaspersky Lab.

Qatar to implement data privacy law -watch out for the fines

July 20th, 2016

Qatar’s Advisory (Shura) Council unanimously approved the draft of a landmark new data privacy law, requiring companies to increase their level of data security and protection against cyber threats. The law was originally drafted in 2011, but has recently gained importance in the wake of the alleged cyber attack on Qatar National Bank. During the attack, hackers gained access to the bank’s customer records and leaked them online in a massive 1.4 GB file. The file contained sensitive information on more than 1,200 individuals, including Al Jazeera journalists and members of Qatar’s ruling Al Thani family.

Creating a regulatory framework for cyber security has become an urgent priority to prevent similar attacks from occurring in the future. In the near future, these laws will place the burden and responsibility of protecting sensitive information on the leadership of every organisation in the country. Organisations that fail to comply with the new laws will face heavy fines of up to 1.37 million USD.

Qatar is not the first country in the GCC to implement such laws. Oman, for example, has been one of the most proactive countries in the GCC in terms of adopting legislation to help promote cyber security and protect the country’s virtual borders. Under the new law, companies are obliged to protect sensitive information from being leaked or hacked. Failure to do so could result in hefty fines (5 million QAR).

According to the Qatari Ministry for Transport and Communication, the new law seeks to create “established standards of data protection as determined by the state”. The third chapter of the law outlines basic data protection responsibilities will become mandatory for all organisations in the country. These responsibilities include properly training data handlers to detect and to mitigate cyber security threats, by using “the necessary precautions to prevent personal data against loss, damage or disclosure”.

Organisations will be required to ensure that their networks and systems are adequately protected. They will be expected to rely on effective, up-to-date cyber security measures, and test these measures on a regular basis. In Qatar CEOs may need to urgently look into authorising budgets for cyber security – to pay for technology rather than to pay fines.

Security ramblings

July 18th, 2016

I ran across a piece last week that noted 10mm Android phones have malware that has rooted their operating system. For the most part this malware is designed to show ads and install apps. Mobile devices are becoming ubiquitous, for everyone. It’s not just technical people that now have access to internal systems from mobile systems as everyone from low level marketing people to high level executives is becoming comfortable with accessing information regularly, from anywhere, at any time. This means that our security is inherently weaker because we allow access and with BYOD spreading this problem looks to get worse before it gets better..

One of the constant challenges with the spread of data breaches is establishing what is indeed data hacked out of an organisation versus data from another source. Many recent cases where representations of a data breach were made turned out subsequently to be wrong. For example, the recent case where it was claimed that 272 million accounts had been stolen from Hotmail, Yahoo, Gmail and Mail.ru. The mail providers subsequently confirmed that this was not the case. Same again for recent claims that there were 32 million Twitter accounts on the loose. Twitter quickly debunked this and speculation that they were obtained via malware has never been substantiated.

The basics of security are still woefully weak. Many sites only allow you to create limited length passwords or to enter weak passwords such as pwrod123, or ******, etc. This implies they’re trying to fit the password into that varchar(10) column in the database thus implying no cryptographic storage, and it fundamentally weakens the choice of passwords available to the user. E.g. see the Etihad site, or KLM flying blue. Other airlines are equally lackadaisical and there many other security flaws easy to find. PayPal will also truncate long passwords but without telling you – so you might find yourself locked out because your entered password is too long

A recent data back up mantra I heard that is worth repeating is the 3-2-1 approach:
3 copies of data
on at least two media
one copy held remotely
.

Microsoft warns of new self propagating ransomware – Ransom:Win32/ZCryptor.A

May 31st, 2016

The new ransomware, which Microsoft has dubbed Ransom:Win32/ZCryptor.A, is distributed through spam emails. It can also infect a machine running Windows through a malware installer or fake installers like a Flash player setup file.
The ransomware would run at boot and drop :
• a file autorun.inf in removable drives,
• a zycrypt.lnk in the start-up folder,
• and a copy of itself as {Drive}:\system.exe and %APPDATA%\zcrypt.exe.
It will then change the file attributes to hide itself from the user in file explorer.
The Microsoft advisory said a file headlined “All your personal files are encrypted” would be displayed to the user and the ransomware would encrypt numerous files, changing their extensions to .zcrypt in the process. A total of 88 file-types would be encrypted and Microsoft said it was important to enable file history, or system protection so that restoring personal files from a backup was possible in some cases. However, it appears that Microsoft was also not fully aware of the actions of the ransomware because it offered the following advice: “Some ransomware will also encrypt or delete the backup versions and will not allow you to do the actions described before. If this is the case, you need to rely on backups in external drives (not affected by the ransomware) or OneDrive.”

Windows users take care.

Dynamics AX 2012 R3, CU11 coming soon to Dubai ask Synergy Software Systems

May 23rd, 2016

The latest update to Dynamics AX 2012 R3, CU11, will be available in July 2016.

The CU11 update will include will include more than 50 new features and design changes covering 4 major areas: Retail, Supply Chain Management, Warehouse Management, and Regulatory updates.

Specifically, these include,
• Retail- Design changes and new features including updates to POS and MPOS.
• Supply Chain Management- Enhancements to master planning.
• Warehouse Management- Enhancements that cover the warehouse mobile device portal and more efficient picking and shipment operations.
• Regulatory updates – To provide compliance with local and regional legislation.

SQL Server 2014 RTM cu13 released

April 23rd, 2016

The 13th cumulative update release for SQL Server 2014 RTM is now available for download at the Microsoft Support site.

https://support.microsoft.com/en-us/kb/3144517

Extended support for SQL Server 2005 ended on April 12, 2016

April 21st, 2016

Extended support for SQL Server 2005 ended on April 12, 2016
customers still running SQL Server 2005 after April 12, 2016, will no longer receive security updates and technical support. We recommend upgrading to SQL Server 2014 and Azure SQL Database to achieve breakthrough performance, maintain security and compliance, and optimize your data platform infrastructure.

Phishing and Ransomware – what to do about it?

April 6th, 2016

Ransomware is typically delivered by via email. In particular, the healthcare industry is targeted with these types of attacks. A user opens an email attachment and suddenly whatever files they have access to are encrypted; short of restoring the data from backups, the only answer is to pay a ransom in Bitcoins.

High profile incidents include:

Omaha’s Scoular Co. lost $17 million after spearphishing attack
Ubiquiti Networks says it was victim of $47 Million Cyber Scam
Mattel fought elusive cyber-thieves to get $3M out of China

How the emails trick users:
Mismatched Senders

Every email has y two “from” addresses.
The “mail from” field which is also referred to as the “envelope” or “P1” address The “from” field, is referred to as the “P2” address.
Spam filtering solutions will look at the P1 address .
So the phishing email is sent with a P1 that is from a company that publishes a valid SPF record. However the P2 (which is what the user sees in Outlook) will appear to be from your organization.
So the message arrives , and looks legitimate to your spam solution and to the user it appears as internal or normal business mail. The user swamped with spam emails may not notice that it’s actually going to the P1 address.

Similar Domain Names
An effort is made to register a domain similar to your own. So when your domain is “Synergy1.com”, the email might come in with the domain “SynergyL.com”; assuming the username portion of the email matches, it takes a keen eye to spot this -and that someone will bother to check. Combined with the above where the P1 was “ceo@Synergy1.com” and the P2 (which the user sees) is ceo@SynergyL.com”, its expecting a lot of users to spot this.

Three technologies provide different protection options:
three technologies are, how they provide different types of protection and how they can work together.

SPF (Sender Policy Framework)
SPF is pretty well known and commonly implemented. it’s essentially a DNS record (TXT) that contains a list of approved senders by IP address, domain name or some other mechanism.

SPF looks as the “Mail From” field within an email and compares the sending IP address to the published TXT record for that domain. The “Mail From” field can contain a different value than the “From” or “Reply To” fields. This is how some phishing emails can enter your organization. They will have a valid SPF published for the “Mail From” and then present the user with a different email in the “From” field.

With Exchange Online, Microsoft provides the information to properly configure your SPF record. There are some limitations on the number of DNS queries you can have in your SPF record and it’s not uncommon to see syntax errors so you always validate your SPF record with one of the online validation tools.

When a message is received from a source not authorized in the SPF record, the receiving party can do what they choose with that information e.g. to block the message, to rank it higher as prospective spam or to ignore it.

DKIM (DomainKeys Identified Mail)
DKIM also looks at the “Mail From” field and will show a “None”, “Pass” or “Fail” once the message is evaluated. The same potential phishing issue exists with DKIM where the “Mail From” does not necessarily match the “From” field that the user sees.

DKIM uses a public/private key to sign messages as opposed to the published TXT record. One advantage of DKIM over SPF is that there is no limit to the number of partners you can authorize to send on your behalf (assuming they support DKIM). If you use a number of third-party senders, then will run into issues when trying to include those in your SPF.

Another way to address the SPF limitation is to have senders send their messages under a subdomain and to publish a separate SPF for that subdomain.

DMARC?
DMARC looks for a passed SPF or DKIM but also looks for “alignment” of the “Mail From” and “From” fields. Configuration of DMARC allows you to tell recipient mail servers what to do with a message when DMARC fails.
A DNS TXT record is created (_dmarc.company.com) and for mail systems that use DMARC, they will send success/failure reports to the addresses specified in the TXT record. A third-party tool or service can be used to aggregate these reports and analyze them.

Prophix 12 is now available from Synergy Software Systems

April 5th, 2016

We are happy to announce the availability of Prophix Version 12. Designed with the user in mind, with enhanced ease of use with a web browser interface and access to Prophix from anywhere, any time, on any device.

The same productised approach with a single suite of tools for all your corporate performance requirements is now enhanced. In this time of ongoing recession, volatile exchange rates, commodity prices collapse, and global political challenges the need for corporate performance management tools are greater than ever. More frequent reforecast, budget scenarios, budget vs actuals, detailed planning, faster month end, ease of inquiry are all essential now.
A proven solution for almost 30 years Prophix is regularly enhanced with a clear road map that leverages the evolving Microsoft technology stack and is driven by business need and user and partner feedback.

Some of the great new enhancements in Prophix Version 12:
• Brand new user experience developed after hundreds of hours of usability studies with everyday users, designed to make it even easier to complete key tasks in performance management across the organization.
• New web client based on HTML5 technology for access all major browsers (e.g. Chrome, Firefox, Internet Explorer, Edge, Safari).
• New Dashboard Studio for self-service dashboard creation by any user through a drag and drop user interface. Create innovative mash-ups to monitor key business processes and performance metrics using data sourced both from within Prophix, or externally.
• Redesigned Workflow Tasks portal and new workflow dashboard tile for quick access to assigned tasks, and monitoring of completed, past due, and future tasks.
• Enhanced navigation and layout selection in Ad hoc Analysis and Templates. These changes enable users to interrogate ,and to navigate, across multidimensional data to get exactly what they need in fewer clicks.
• Enhancements to line item schedules to cell commentary.

The upgrade path to Prophix Version 12 will be seamless for customers currently using Prophix 11. Cubes do not need to be rebuilt; templates will not have to be redesigned. Everything that users have learned will still be valid as the existing Smart Client and its functions continue to work well.

GESS Exhibition ( Global Educational Supplies & Solutions ) 2016

March 2nd, 2016

Gulf Educational Supplies and Solutions (GESS) opened yesterday and is being held under the patronage of his Highness Sheikh Mohammed Bin Rashid Al Maktoum, Vice President of the UAE, Prime Minister and Ruler of Dubai, in partnership with the Ministry of Education, GESS and Global Education Forum (GEF). In its 9th edition, GESS provides the ideal platform for education professional worldwide to meet, find new products and services, and discuss a range of topics about education and its future.

H.E. Hussain Ibrahim Al Hammadi, Minister of UAE Ministry of Education, UAE and Synergy Software Systems Account Manager Sudhakar Raman at yesterday’s exhibition in Dubai. The event continues today and tomorrow.

H.E. Hussain Ibrahim Al Hammadi was appointed Minister of Education in 2014 by His Highness Sheikh Mohammad Bin Rashid Al Maktoum, Vice-President and Prime Minister of the UAE and Ruler of Dubai. He is also CEO of the Emirates Advanced Investments Group of companies.

Synergy Software Systems is a Microsoft President’s Club member and implements solutions for the Education sector, such as: specialised Admissions and Billing in Dynamics Ax, library system, classroom scheduling, as well as traditional enterprise solutions for finance, HR, payroll, CRM , T@A and the Office 365 suite of applications.

Filehold – ask Synergy Software Systems about document management for the U.A.E.

November 30th, 2015


Courier documents


Mobile document management

http://www.businessnewsdaily.com/8031-best-windows-document-management-software.html

“We recommend FileHold as the best document management system for businesses using Windows. We chose FileHold from dozens of document management system options.
Why FileHold?
Ease of use
FileHold is a self-hosted document management system for businesses using Windows computers. It has the same look and feel of programs you’re already accustomed to using, and the interface is designed specifically with Windows Explorer in mind. The filing structure incorporates the same cabinet, drawer, folder and subfolder approach that Windows uses. So, once the software is installed, employees should have no trouble grasping how to use and navigate it.
We like FileHold’s clean interface. It isn’t cluttered with icons or images. All you see when logging in is the file library running down the left-hand side of the page and a search bar along the top. The majority of the page remains blank until you start filing, searching for or opening documents. This approach keeps you on the same page the entire time you’re using the system. Many of the other systems we examined force you to toggle back and forth between pages depending on the task you’re working on.
The FileHold library structure is designed with Windows Explorer in mind.
Adding to the system’s ease of use are the MyFileHold folders, which are placed on top of the general library of cabinets and drawers on the left-hand side of the page. The MyFileHold section features separate folders for employees’ “favorite” documents, their checked-out documents, any alerts or reminders they have, the files they recently accessed and the files they recently added to the system. This provides a quick snapshot of the documents currently being worked on and the files that need immediate attention.
Each employee can customize various portions of the system with their personal preferences. This option isn’t offered by all of the document management systems we examined. When looking at specific documents, employees can choose the tools they want to be quickly accessible. Quick links can be added for a variety of tasks, such as adding files, linking documents together and checking out files. Additionally, you can choose the metadata attributes — like document type, version, number of linked files and the author — that are shown alongside the file’s name.
Filing documents within the software is simple and can be done in many ways. You can drag and drop files already on your computer or network, as well as scan documents directly into the system. The Microsoft Office integration also allows you to add documents you are working on in Microsoft Word, Excel, Outlook or PowerPoint with just a click of a button.

Microsoft Azure or Amazon AWS >

October 19th, 2015

An informative presentation from a Microsoft MVP that will help to understand what the ‘cloud’ means and what factors need to be considered. Cost security governance, scalability, services, public, private or hybrid – a common sense introduction.