Wednesday, November 30, 2011

50 Things You Didn't Know About Disney World

Think you know everything about Walt Disney World Resort and its four world-class theme parks - Disney's Magic Kingdom, Epcot, Disney-MGM Studios and Disney's Animal Kingdom? Think again! Even the biggest Disney fanatic will be amused, intrigued or surprised by some of the 50 fascinating Disney World facts listed below . . .

disney store

1. Walt Disney World encompasses 30,500 acres, making it approximately the same size as San Francisco.

DISNEY

2. When Disney's Magic Kingdom first opened its doors on October 1, 1971, adult admission cost .50.

3. The opening day crowd at Disney's Magic Kingdom was approximately 10,000 guests.

4. The eight "E ticket" attractions at Disney's Magic Kingdom were Space Mountain, Pirates of the Caribbean, Haunted Mansion, Country Bear Jamboree, Hall of Presidents, Jungle Cruise, It's a Small World and 20,000 Leagues under the Sea.

5. The estimated annual attendance at Disney's Magic Kingdom is 16.2 million, followed by Epcot with 9.9 million, Disney-MGM Studios with 8.6 million and Disney's Animal Kingdom with 8.2 million.

6. Cinderella Castle is Disney's tallest structure at 189 feet, followed by Space Mountain at 183 feet.

7. Both the Carousel of Progress and It's A Small World made their debut at the 1964-65 New York World's Fair.

8. The 180-foot-tall Spaceship Earth at the entrance to Epcot weighs approximately 16 million pounds.

9. The Haunted Mansion uses state-of-the-art Omnimover vehicles called "Doom Buggies."

10. The jolly headhunter who shows up near the end of the Jungle Cruise is known as "Trader Sam."

11. In conjunction with the 2006 release of Pirates of the Caribbean: Dead Men's Chest, the Pirates of the Caribbean attraction at Disney's Magic Kingdom was renovated to add several characters from the movie such as Jack Sparrow and Hector Barbossa.

12. The icon of Disney's Animal Kingdom, The Tree of Life, stands 14 stories, features more than 300 animal carvings and is 50 feet wide.

13. Built in 1917, Cinderella's Golden Carrousel in Fantasyland was once located at Olympic Park in Maplewood, New Jersey.

14. The Great Movie Ride at Disney-MGM Studios is housed in a replica of Mann's Chinese Theater.

15. Astro Orbiter first opened in Tomorrowland in 1974 as Star Jets.

16. The Hall of Presidents had its origins as an audio-animatronic exhibition called "Great Moments with Mr. Lincoln," which premiered at the 1964-65 New York World's Fair.

17. Originally known as the "Tropical Serenade," the Tiki Room in Adventureland was once sponsored by Florida Citrus Growers.

18. The 60-foot-tall Swiss Family Treehouse in Adventureland weighs approximately 200 tons and is made of concrete and thousands of polyethylene leaves.

19. Cinderella Castle, the centerpiece of Disney's Magic Kingdom, features 18 towers and 13 gargoyles.

20. The Many Adventures of Winnie the Pooh at Fantasyland is located on the site of the former Mr. Toad's Wild Ride.

21. The "Spirits of America" statues in The American Adventure at Epcot represent Adventure, Compassion, Discovery, Freedom, Heritage, Independence, Individualism, Innovation, Knowledge, Pioneering, Self-Reliance and Tomorrow.

22. Towering four stories over DinoLand U.S.A. at Disney's Animal Kingdom, Dino-Sue is an exact replica of the largest Tyrannosaurus Rex ever discovered.

23. Big Thunder Mountain Railroad in Frontierland features six trains: I.B. Hearty, I.M. Brave, I.M. Fearless, U.B. Bold, U.R. Daring and U.R. Courageous.

24. The Rock 'n' Roller Coaster - Starring Aerosmith at Disney-MGM Studios launches you at a speed of 0 to 60 miles per hour in 2.8 seconds.

25. A swinging suspension bridge leads from Tom Sawyer Island to Fort Langhorne, which was named after Samuel Langhorne Clemens (better known as Mark Twain).

26. The replica of the Liberty Bell that can be found in the center of Liberty Square was built from the same authentic cast as the original in Philadelphia, Pennsylvania.

27. The exit to Haunted Mansion features crypts with humorous names inscribed such as I.M. Ready, Rustin Peese, Pearl E. Gates, Manny Festation, Dustin T. Dust and Asher T. Ashes.

28. The Walt Disney World Railroad, which serves approximately 1.5-million passengers annually, is an authentic 1928 steam-powered train.

29. The Mission: SPACE thrill ride at Epcot is so authentic that motion sickness bags are available just in case of emergency.

30. Mickey's Toontown Fair was once known as both Mickey's Birthdayland and Mickey's Starland.

31. Sonny Eclipse, an "intergalactic lounge singer," performs daily at Cosmic Ray's Starlight Café in Tomorrowland.

32. In order to rank as a "Galactic Hero" at Buzz Lightyear's Space Ranger Spin, you must score 900,000 to 999,999 points.

33. The audio-animatronic dog in the Carousel of Progress is named "Rover."

34. Astronauts Scott Carpenter, Gordon Cooper and Jim Irwin were present at the grand opening of Space Mountain in 1975.

35. Stitch's Great Escape in Tomorrowland lies at the former site of ExtraTERRORestrial Alien Encounter, which closed in 2003.

36. One of the original attractions at Disney's Magic Kingdom, Tomorrowland Indy Speedway was once known as Grand Prix Raceway.

37. Recently renamed The Seas with Nemo & Friends, The Living Seas pavilion opened at Epcot in 1986 and was originally sponsored by United Technologies.

38. "Honey, I Shrunk the Audience," a 3-D film at Epcot, is located in Future World at the former site of "Captain EO," another 3-D adventure that was directed by Francis Ford Coppola and starred Michael Jackson and Anjelica Huston.

39. Legendary golfer Jack Nicklaus was the first champion at the Walt Disney World Open Invitational, which made its debut in 1971.

40. The Tomorrowland Transit Authority was originally called the WEDway People Mover (WED standing for Walter Elias Disney).

41. Disney's Magic Kingdom, which encompasses approximately 107 acres, is itself larger than Disneyland, which only covers 80 acres in Anaheim, California.

42. The design of Main Street U.S.A. was loosely based on Walt Disney's hometown of Marceline, Missouri.

43. The Swiss Family Treehouse is of the species Disneyodendron eximus or "Out-of-the-Ordinary Disney Tree."

44. The 189-foot-tall water tower icon at Disney-MGM Studios is known as the "Earffel Tower."

45. Jungle Cruise riverboats include Amazon Annie, Bomokandi Bertha, Congo Connie, Ganges Gertie, Irrawaddy Irma, Kwango Kate, Mongala Millie, Nile Nelly, Orinoco Ida, Rutshuru Ruby, Sankuru Sadie, Senegel Sal, Ucvali Lolly, Volta Val, Wamba Wanda and Zambesi Zelda.

46. Splash Mountain in Adventureland features a five-story, free-fall plunge at a 45-degree angle into a splash pool at a speed of 40 miles per hour.

47. The 8,500-acre Disney Wilderness Preserve, which lies 15 miles South of Disney World, features a Conservation Learning Center and hiking trails.

48. Buzz Lightyear's Space Ranger Spin is located at the former site of If You Had Wings in Tomorrowland.

49. The three "talking heads" who introduce the Country Bears Jamboree are named Buff, Max and Melvin.

50. Approximately 46 million people visit Walt Disney World - including Disney's Magic Kingdom, Epcot, Disney-MGM Studios, Disney's Animal Kingdom and Downtown Disney - annually.

50 Things You Didn't Know About Disney World

Ryan Wiseman is a travel writer based in Orlando and the author of Orlando, Florida Guide, the most comprehensive guide to Orlando.

DISNEY

Eating on a Budget in Las Vegas Restaurants

A Las Vegas trip for many families is an experience to enjoy for everyone with all the food, drink, gambling, and kid-friendly games. In fact, one of the main reasons that people visit Vegas is for the delectable restaurants. You do not have to be wealthy to experience many of the exquisite restaurants - you just have to know where to go!

Las Vegas has so much more than gambling to offer its thousands of visitors. The days when gambling was the only income stream for casinos is long gone. The casinos have had to develop a multitude of income streams to remain successful in the hottest vacation destination in the world. The Las Vegas of old is nothing like the Las Vegas of today. It has been changing year-to-year to cater to all walks of life and become the ultimate travel destination for everyone in the family, young and old! Just look at the Vegas sky line right now and you will be hard pressed to find any of the old casinos.

DISNEY ENTERPRISE

Las Vegas is quickly becoming a city that offers five star world-class foods to its residents and tourists. It has some of the best dining anywhere on the planet. Many of the best dining experiences are located within the Vegas strip casinos, but they would not be as successful as they are if there was not a reason to keep the tables full. Obviously, diners don't tend to dine if the food isn't any good and for a first-class Las Vegas restaurant, one bad review will travel around the world faster than ten good reviews. This means that all of the world-class Vegas restaurants really must work hard to earn their badges of honor in order to bring in the customers to stay in business.

However, not all of the Las Vegas restaurants will cost you an arm and a leg. I personally tend to look for the cheap dining options and that is what this particular article focuses on. There are many great places to eat in Las Vegas that will not have you busting open your wallet. Now my wife is a steak lover so I always try to look for good steak deals around town. She loves the Sahara's Caravan Cafe. Here you can get a complete prime rib dinner with a baked potato and your choice of soup or salad for only .99 (4:30pm to 7pm). They even offer a large T-bone steak dinner for just .99. This is truly one of the many unknown Las Vegas restaurant gems that are known for providing good food at a price that easy on your wallet.

This is just one of the many Las Vegas restaurants that a family can get an affordable and great tasting meal in a Las Vegas strip casino. Not all great bargains involve steaks though, as there is a lot of high quality, inexpensive Las Vegas restaurants to be found. Many Vegas casinos offer valuable coupon books, provided that you ask for them at the front desk. Please note that you will want to be cautious of these coupons because many of them have fine print. So make sure to read the coupons fine print before you try to use it! Oftentimes, they will have some type of restriction that could cost you in the long run. However, using coupons effectively can and will save you money that you can then use for whatever you desire! Go ahead and put some of that money you saved on dinner and put it on the tables - you just might get lucky!

Eating cheap in Las Vegas by no means indicates a lack of quality. While it may not be as pricey as some of the five star Vegas restaurant offerings, you will find that a lot of the cheaper places to eat will taste just as good as many of the more high-class Las Vegas restaurants, and it's just nice to get away from buffet food lines once in a while during your Las Vegas stay. You can only endure so many buffets before they all begin looking and tasting alike.

Eating on a Budget in Las Vegas Restaurants

For more information about the Las Vegas experience and how to get the most out of your visit to Las Vegas - visit our site at LasVegasInformationOnline.com now!!

DISNEY ENTERPRISE

Choosing the Best Baby Nursery Themes

Choosing the best nursery themes from the large number of themes in stores can be a confusing task. There are so many decisions to make regarding the baby's room. Along with purely decorative decisions, you must choose your style of baby furniture, wall decorations and the kind of carpet that will protect baby when he or she is taking those first steps. One of the easiest ways to start decorating is to go ahead, bite the bullet and decide on a decorating theme. Once you decide on your theme you will have direction for all aspects of the room.

UNDERSTANDING THE CONCEPT OF NURSERY THEMES ?

DISNEY ENTERPRISE

Think of your nursery as a storybook and the available styles of decor as the subject of that storybook. The similarities are that a book without a topic would be uninteresting and rooms with no obvious theme or decorating style would be just as unappealing. If you are still in the dark about themes, here are some examples. For a baby girl, some popular themes would be a western cowgirl theme or any of the Disney princesses like Ariel the Mermaid or Cinderella. Nursery themes for boys might be centered on popular sports like soccer, football or motocross. Then, of course there are decorating styles that would appeal to either sex like jungle or animal themes.

TRADITIONAL BABY THEMES

If baby kittens and rubber duckies don't tickle you, don't sweat it. A few years ago you might have been facing some difficulties with that attitude, but that day has passed. Modern nursery decorating trends have become so diverse that there are ideas available for every taste. Decorative motifs that might once have been considered inappropriate for nurseries are now acceptable.

FINDING the BEST NURSERY THEMES

Most parents have hobbies, occupations or passions that can be adapted for use as nursery themes. Agricultural minded parents can select themes taken from inspired by their favorite brand of farm implements. Bikers might select decorations sharing the logos taken from the gas tanks of their Harleys.

THEMES or NO THEMES

If the idea of decorating in themes is not appealing to you, that's not a problem. The gratifying thing about decorating for the modern baby is that anything goes. The important thing is to have a plan of action for the design of a room that will be warm and welcoming. The ultimate goal would be a comfortable space where you can enjoy your baby.

Choosing the Best Baby Nursery Themes

Jan Bay's love of interior design and childcare inspired the building of her site, Unique Baby Gear Ideas which features numerous articles on nursery design, reviews of modern baby gear and the creation of modern nurseries for babies.

Use of this article requires an active link to Unique Baby Gear Ideas, Nursery Themes and Decorating Ideas

DISNEY ENTERPRISE

Tuesday, November 29, 2011

Ben 10 Alien Force

Ben 10 Alien Force, a sequel to Ben 10, is a marvelous and an interesting anime Television series, which is the result of hard work done by Dwayne McDuffie and Glen Murakami and the studio "Man of Action". The studio is a group of 4 young creative personalities named, Duncan Rouleau, Joe Casey, Joe Kelly, and Steven T. Seagle.

Ben 10 Alien Force is produced by Cartoon Network Studios, and is based on the central figure Ben Tennyson. He is now 15 years of age and has grown up to become a more matured guy with a clear outlook towards life.

DISNEY ENTERPRISE

He has removed the Omnitix, and has tasted the good and challenging adventures out there.

Now, in Ben 10 Alien Force, you see there is a fanatic aliens known as Highbreed have surreptitiously com on Earth and they have the mission to ruin the earth and kill its inhabitants altogether. Max, who is Ben's grandfather and also an active member of the planet-defending Plumbers has already gone out there to protect the humanity from their evil deeds, but nobody has heard of him ever since. There stands no choice in front of Ben, but to use Omnitrix to fight the aliens back from the earth. Omnitrix has adapted according to his teenage body, and this has resulted into new forms and functions, and makes Ben ready to go for fighting the aliens.

Ben is supported in his endeavor by Cousin Gwen, and both have their natural abilities enhanced to give the Highbreed a tough blow. Ben's formal rival, Kevin Levin who worked in Null Void is also coming in front and joining his hand.

The cartoon animated series has all its drama and adventure lined up for the children and the adults. What's more, the animated series has got all the super digital sound and backed by orphic music scores. The best thing is that you don't get bored while watching the entire series. Ben is leading the fight the war against the aliens and also on his mission to look for Max. In the time of five years that has past, been has become more matured and he has all the goals set in line to go ahead with the mission along with his cronies. Come and explore the adventure filled mission where the fight for the cause is truly realized by the saviors who are packed with their guns.

Ben 10 Alien Force

For some of the best canker sore medicine you need to visit Canker Complete.

Also have a look at the selection of cold sore medicine that will begin to work from the first application.

DISNEY ENTERPRISE

Common Mistakes: Functional Web Specification

Ineffective functional specification for web projects such as web sites, intranets or portals contribute largely to delays, higher costs or applications that do not match the expectations. Independent if the Web site, Intranet or Portal is custom developed or built on packaged software such as Web-, enterprise content management or portal software, the functional specification sets the foundation for project delays and higher costs. To limit delays and unexpected investments during the development process, the following pitfalls should be avoided:

Too vague or incomplete functional specification: This is the most common mistake that companies do. Everything that is ambiguously or not specified at all, developers do not implement or implement in a different way of what site owners want. This relates primarily to Web features that are considered as common user expectations. For example, HTML title tags, which are used to bookmark Web pages. The Web steering committee may specify that each page contains a page title, but does not specify that HTML Title tags needs to be implemented as well. Web developers therefore may do not implement HTML Title tags or implement them in a way, which differs from site owners' visions. There are other examples such as error handling on online forms or the definition of ALT texts for images to comply with the disability act section 508. These examples look like details but in practice, if developers need to modify hundreds or even thousands of pages, it amounts to several man-days or even man-weeks. Especially, the corrections for images as business owners need first to define the image names prior that Web developers can implement the ATL texts. Ambiguous functional specification can result due to the lack of internal or external missing usability skills. In this case, a one-day usability best practice workshop transfers the necessary or at least basic usability skills to the Web team. It is recommended, even for companies that have usability skills or rely on the subcontractor's skill set, that an external and neutral consultant reviews the functional specification. Especially, as such reviews relate to marginal spending as compared to the total Web investments (e.g. about K - K dollars for a review).

ENTERPRISE PORTAL

Future site enhancement not identified or not communicated: It is crucial that the Web committee identifies at least the major future site enhancements and communicates them to the development team. In the best case, the development team knows the roadmap for the coming three years. Such an approach allows the development team to anticipate implementation choices to host future site enhancements. It is more cost effective on mid- or long-term to invest more in the beginning and to build a flexible solution. If Web teams do not know or even ignore future enhancements, the risk for higher investment increases (e.g. adding new functionality in the future results in partially or at worst in totally rebuilding existing functionality). Looking at the financial delta for a flexible solution versus a solution just satisfying the current requirements, the flexible solution has proven to be more cost-effective in practice from a mid- and long-term perspective.

Planned functionality not aligned with internal resources: Many companies look at site functionality only from a site visitor perspective (e.g. facilitation of searching information or performing transaction) and corporate benefits (e.g. financial benefits of self-service features). However, there is a third dimension the impact of site functionality on internal resources. Site functionality that can heavily impact internal resources are for example:

- Web sites: providing news, online recruitment, online support, etc.

- Intranets / portals: providing content maintenance functionality for business managers.

It is crucial for the success of site functionality that the Web committee analyzes the impact and takes actions to ensure operations of the planned functionality. For example, providing the content maintenance functionality to business owners and product mangers with an associated workflow. This functionality is effective and can generate business benefits such as reduced time to market. However, in practice, business owners and product managers will need to write, validate, review, approve and retire content. This results in additional workload. If the Web committee has not defined in the Web governance (processes, policies, ownership and potentially enforcement), it may happen that this functionality is not used and hence becomes useless.

Wish lists versus actual needs and business requirements: The functional specification is not aligned with user's needs or business requirements. This is more common for internal applications such as Intranets or portals. In many cases, the project committee neglects to perform a sound internal survey and defines functionality by generalizing individual employees' wishes without any sound proves. Capturing the feedback of internal users across the organization allows determining the critical functionality. To effectively perform a survey a representative set of employees need to be questioned. Further these employees need to be categorized into profiles. The profiles need to be characterized by for example, frequency of usage of the Intranet, estimated duration by visit, usage of the Intranet to facilitate their daily tasks, contribution to the business, etc. Based on this information the Web team can then prioritize the functionality and choose the most effective and relevant functionality for the next release. Less critical or less important functionality may be part of future releases (roadmap) or dropped. If such a sound decision process is not performed, it may happen that functionality is developed but only used by few users and the return of investment is not achieved.

Not enough visual supports or purely text based: Textual description of Web applications can be interpreted subjectively and hence leading to wrong expectations. To avoid setting wrong expectations, which may are only discovered during development or at worst at launch time, functional specification need to be complemented by visual supports (e.g. screenshots or at best HTML prototypes for home pages or any major navigation pages like sub-home pages for the major sections of the site such as for human resources, business units, finance, etc.). This allows reducing subjective interpretation and taking into account the users' feedback prior development. Such an approach helps setting the right expectations and to avoid any disappointments at the end once the new application is online.

We have observed these common mistakes, independently if companies have developed their Web applications internally or subcontracted them to an external service provider.

Common Mistakes: Functional Web Specification

Nicolas Bürki is the founder of effbis.com, a European based usability and Strategic Web Marketing company delivering its services in English, French and German language such as usability reviews, Web Information Architecture Services, etc.

Nicolas also is the founder of effinfo.com an information Web site providing free tips, advice and research paper on usability, Web projects, Web analytics and Intranet topics

ENTERPRISE PORTAL

Improve Channel Partner Performance - How to Engage and Collaborate With Partners to Improve ROI

Manufacturers, in their quest to increase the brand loyalty and mind share of dealer employees, look for ways to increase dealer engagement and collaboration. Engagement is the employee's positive emotional attachment to the organization. Collaboration is the ability of the dealer employee to interact with both manufacturer and other dealers for problem solving and best practices ideas. If you can do a better job of engaging and collaborating with your dealers, they will do a better job representing your brand and selling your product, increasing your return on investment (ROI).

More Engagement and Collaboration through Technology
Technology used to be a considered "de-humanizing" in the sense that people ended up having less interaction with individuals in a company when new technologies were introduced (how did you feel about the first electronic phone answering systems?). If your goal was more engagement with your dealers or customers, then adding technology for increased efficiency was not something you would consider. It's almost counter-intuitive, but today technology can make it easier to encourage engagement with your channel partner employees. Technology can make your company more "human-like," it can provide more touch points to your brand, and generate more brand loyalty, not less.

ENTERPRISE PORTAL

There are a number of ways that manufacturers can take advantage of technology to engage and collaborate with both their dealers and customers, and improve ROI at the same time.

Use a Partner Relationship Management (PRM) System
Adopting a Partner Relationship Management (PRM) system to connect with your dealers is the most important first-step to take. PRM systems are web-based software solutions that unify all facets of developing and managing a distribution channel into a single partner portal. A PRM system works best when it functions well in these four areas of channel management:
Marketing/Communications Training/Certification Performance Management Collaboration

PRM systems give companies an integrated system to market, sell and service their products more effectively than traditional sales applications. It's a best practice that should be integrated into any company today selling through a channel. A good PRM system allows your dealers to better engage with you and it provides an excellent platform for manufacturer-to-dealer and dealer-to-dealer collaboration.

Suggestion - Start with a PRM system that offers all four areas of channel management. But start slowly. You don't have to move all legacy systems at once. You can link to your older systems through your PRM. Start slowly, and build from there.

Integrate the PRM with Your CRM
Most companies today use some type of Customer Relationship Management (CRM) system to automate and manage their direct sales needs, whether as a tool for business analysis or to track customer purchasing trends. As more companies adopt a PRM to manage the activities of their dealers, it's becoming clear that linking these two separate tools can enhance the effectiveness of each. Combining information from both a CRM and PRM can provide a more global view of the entire channel, from dealer to customer, yet preserve the individual value that each system provides.

Suggestion - You need both a CRM system and a PRM system. They perform two entirely separate functions. Don't use a CRM to manage your dealer partners - it's not designed for them. You need a PRM system with functionality like online training and certification, managing marketing communications and presentations, and collaboration tools. A CRM doesn't provide these.

"Go Mobile" with Tablets and Applications
More and more companies are pushing some of their training, product presentations, online libraries and ordering applications to a dealer mobile or tablet environment. There are some important reasons why this is occurring:
Individuals can access information when they need it. It can be interactive and contextual Sales and product presentations can be delivered easily to the customer Ordering applications can be used when the customer is "ready to buy" Equipment trouble-shooting apps can decrease a technician's diagnostic time

While still a new way to interact with dealers and customers, manufacturers are seeing that tablets and mobile apps can significantly increase engagement with their dealers and customers.

Suggestion - Don't do a "data dump" from your current system to your mobile application. Banks are a good example to follow. They offer simple, contextual apps that their customers can use easily and often. With a good bank app you can check your balance or transfer funds to your savings account, but you can't apply for a home loan. Don't try to recreate your entire training or your entire spec'ing and ordering system in an app. Instead, determine the tasks that dealer people 1) truly need in a mobile app, and 2) are easy to use. Keep it simple and helpful.

Connect It All Together
Successful companies work to connect all of these technology advancements holistically together, to the benefit of both the company and its dealers. That's how they create real engagement and an improved ROI. Your IT department doesn't want to manage three content management systems. They need to be able to integrate these systems using just one. Your dealers want a portal so it's easy and intuitive for them to get the information they need, when they need it. And they want to be able to take the next step using mobile applications that provide real value. So start slowly to see what works. But... start now! No company can afford to be a technology laggard today and earn a good ROI.

Improve Channel Partner Performance - How to Engage and Collaborate With Partners to Improve ROI

John Panaccione is the CEO of LogicBay Corporation, http://www.logicbay.com Founded in 2003, LogicBay provides Partner Relationship Management (PRM) solutions which enable organizations to manage and support an extended enterprise globally. By designing and launching powerful on-line communities which support collaboration and knowledge transfer between the Enterprise, Channel Partners, Dealers, Distributors and End-user customers world-wide, LogicBay optimizes engagement levels between disparate businesses resulting in measureable increases in productivity, revenues and profitability. Through his work in facilitating over 50 client implementations in Heavy Equipment Manufacturing, Technology, Financial Services, Retail and Higher Education, Mr. Panaccione has become a leading authority on best practices in the area of PRM and Channel Performance excellence.

ENTERPRISE PORTAL

Ford Motor Company - Case Study

Background (General Facts)

Ford Motors is one of three leading automotive manufacturing companies in the United States. Based in Michigan in 1903 by Henry ford and grew to reach revenue of 0 billion and more than 370,000 employees by 1996 [1]. In the 1970's, the automobile market for the major auto makers - General Motors (GM), Ford, and Chrysler- was crunched by competition from foreign manufactures such as Toyota and Honda. In 1999, Ford acquired the Swedish Volvo model in an attempt to compete in the foreign market and expand to other regions. Furthermore, Ford launched a full organization re-engineering business process plan called "Ford 2000" aiming at reestablishing the company's infrastructure. The process meant reduction in their Vehicle Centers (VCs) to only five covering the operations that spanned 200 countries. It also meant cutting redundancies and requiring Information Technology (IT) to be the driving force and the link between Ford centers worldwide.

ENTERPRISE PORTAL

In building Ford's IT infrastructure, the company focused on implementing a setup that supported the TCP/IP communication protocol based on the U.S. department of Defense requirements. At those days, Ford internal network was meant to serve files transfer unlike most companies that used the network mainly for email communications. Throughout the 1990's, Ford developed a cost effective Global Enterprise Network Integration (GENI) process to link all its locations compromising on the type of the connection and the cabling in favor of full coverage. During the same time, Ford started building its Web Farm, which was basically a set of hardware and software managed by a team for building Ford's public website. The work started by publishing documents for technical references and moved to more advanced images from a live auto show. As a result, the website received 1 million visits a day in less than 2 years after its official launch. Throughout the end of the 90's, Ford established its web services by increasing the amount of information published, building more intelligent and standard web application in 12 weeks period, purchasing more Netscape browsers for setup on its users' machines, and creating a B2B server to allow the suppliers secured access to Ford's Intranet.

In the path towards service cost reduction and bringing more business through the web, Ford worked closely with its competitors in the U.S. market GM and Chrysler to establish what came to be known as "Automotive Network Exchange" (ANX) certificate. The protocols aimed at providing a unified communications standard through the Internet to enable suppliers to provide common technology for all manufacturers. Moreover, Ford focused on making information on its web site more accessible and useful by deploying a team to manage the process of adding and updating information based on an analysis of how humans deal with information. One final aspect of Fords endeavor was to try to build a model through its infrastructure that benefited from the model implemented by Dell computers to improve their supply chain and delivery process. The direct model would not work well for automotives as it would with computers, as a result Ford worked on its retailing network remodeling and identifying what would eventually give it the extra edge in delivery time.

Enterprise Architecture Issues

Ford's regional expansion to address the competition for market shares demanded cost management for the infrastructure upgrades IT infrastructure places limitations on the type of application development based on the platforms Easy access to information and prompt delivery of vital data to key individuals requires proper knowledge managementOrganizations reengineering and process remodeling is necessary when adapting new technologies to maintain the cost and increase efficiency Supply chain errors and delays can severely affect the progress of the business and the market value of the corporation
Analysis

Infrastructure Upgrade

Since the inception of the Internet in the 1960's, much effort has been made in standardizing how computers connect to it. In 1982, the International Organization for Standards (ISO) realized that during that period many ad hoc networking systems were already using the TCP/IP protocol for communications and thus adapted it as a standard in its model for the Internet network [2]. The main driver for IP convergence, at that period, was the growth in data traffic through wide area networks (WANs) established by local companies. Furthermore, in 1991, the Internet was open for commercial use, and that demanded a reduction in the total cost of operating the network to cope with 1 million Internet hosts that materialized in only 1-year time. Telecommunications companies like AT&T understood the potential and worked on standardizing the network offering voice services over IP networks that managed the separation between voice and data transmission [3].

At the same time, Ford had launched its plan to update its infrastructure, and seized the opportunity brought by the global movement of integrating the voice, fax transmission network with data transmission and expanded its WAN to include its offices in Europe and elsewhere. The financial benefits also came from the fact that Ford adapted the TCP/IP protocol from the beginning and made sure that all its technical infrastructure upgrades adhere to the standards. This made the transition of its system to the Internet as cost effective as it could be.

Web Technologies

Intranets employ the hypertext and multimedia technology used on the Internet. Prior to 1989, when Tim burners-Lee invented the Web [4], most applications used standard development languages such as C and C++ to create desktop applications that were proprietary and dependent on the platform. For example, applications running on a command-based operating system such as UNIX would not run under Windows, and those working for PCs might not work on Apple computers and vice versa [5]. The invention of HTML (Hyper-Text Markup Language) introduced a new model for applications that conform to the standards provided by a single program, the "Web Browser". Unlike standard applications, the browser brought a unified interface that had a very fast learning curve. Users seem to require no additional training to work with web browsers. Furthermore, system administrators did not have to spend time installing upgrades on users' machines, since the Intranet client/server architecture facilitated all the updates through the connection with the web server [6].

Since Ford established its Intranet, it was aiming at building web applications through the initial analysis of "Mosaic", the early form of web browsers. The technical department at Ford used web languages to create the first web site in 1995. In 1996, the team started building applications making use of the unified "Netscape" browser that was deployed on all machines at the company, and working on a standard template to cut on the development life cycle. There was a substantial cut in training cost due to the user-friendly interface of web applications. Furthermore, the speed of development made vital applications available to different individuals across the company. For example, the B2B site allowed suppliers remote and secured access to various sections of Ford's Intranet. In addition, the development team created an application as a virtual teardown on Ford's website where Ford's engineers could examine parts of competitors' cars and evaluate any new technologies. The alternative would have been an actual trip to a physical location where Ford tears down cars to examine the parts.

Knowledge Management

While there are many definitions for knowledge, each company might adapt its own based on how it analysis data and information to acquire knowledge. The University of Kentucky, for example, defines knowledge as "a vital organization resource. It is the raw material, work-in process, and finished good of decision-making. Distinct types of knowledge used by decision makers include information, procedures, and heuristics, among others... " [7].

Organizations go through different activities to manage the amount of information they collect to form the knowledge base of the company. Activities include creating databases of best practices and market intelligence analysis, gathering filtering and classifying data, incorporating knowledge into business applications used by employees, and developing focal points for facilitating knowledge flow and building skills [8].

Ford was excited about the traffic it was receiving on the Web site and everyone was publishing all the material they have on desk on the Intranet. Nevertheless, there was a growing concern about the usability and usefulness of the material people were adding. As a result, Ford created a "Knowledge Domain Team" to build complete information in nine areas that were identified as vital to the business. The process Ford took was based on surveys and specialists input in how people perceive information, and what is considered vital and what is distracting in the structure of Ford's website. The aim behind the initiative was to reduce the time individuals spent in searching for information through proper indexing of the website content, and making sure that what was important could be accessed in due time, and what is trivial did not overwhelm the researcher with thousands of results.

Business Re-engineering

In the area of organization's re-engineering process innovation is the set of activities that achieve substantial business improvements. Companies seeking to benefit from process innovation go through the regime of identifying the processes, the factors for change, developing the vision, understanding the current process, and building a prototype for the new organization. History shows that organizations who define their processes properly will not have problems managing the issues and developing the change factors [9]. When introducing technology, business redesign is necessary. The industrial fields have been using Information Technology to remodel processes, control production, and manage material for generations. However, it is only recently that companies recognized that the fusion of IT and business would go beyond automation to fundamentally reshaping how business processes are undertaken [10].

When foreign companies were allowed to compete in the U.S. market, Ford understood that to succeed in business in a competitive arena it needed to implement strategies that competitors find difficult to imitate [11]. As a result, Ford bought Sweden Volvo to enter the European market, and partially owned Mazda to have a competitive edge with Japanese cars1 [12]. To achieve that it re-engineered its production development activities and global corporate organization and processes for dramatic cost reduction. Furthermore, it understood that expansion requires collaboration and alignment, and thus planned to establish the IT infrastructure through a WAN that connected all the offices. In the process of innovation and re-engineering, Ford has set policies to manage the cost of establishing the network, built models for continuous implementation, and organized global meetings to align all parties with the process. Adding to that, when it came to managing the website, Ford facilitated an awareness campaign for all the branches to understand that Ford is using the web to collaborate and research and adapting information technology as a way to maximize its business value. The goal for Ford was to maintain its leadership in the market and to do that in the most efficient and cost effective method that is there.

Supply chain management

Supply chain management (SCM) is about coordinating between suppliers, manufactures, distributors, retailers, and customers [13]. The basic idea that SCM applications revolve around is providing information to all those who are involved in making decisions about the product or goods to manage delivery from the supplier to the consumer [14]. Studies show that reducing errors in supply chain distribution, increases revenue, enhances productivity, and reduces the order-to-fulfillment period [15].

Ford often compared its supply chain process to that of Dell's, in an attempt to close the gaps in its own process and reach the level of success Dell has reached. The difference in the distribution model between Dell and Ford lies in the middle link of using retail shops. Since Ford cannot skip retail as a focal distribution point, it worked on establishing a network of retail shops that it owned. Ford made sure shops are not affecting each other in terms of sales, and gave them all a standard look and feel to establish itself in the consumer's market as a prestigious cars sales retail company. Furthermore, extensive re-engineering initiatives were undertaken to enhance Ford external network by eliminating the correlation with smaller suppliers. In that way, Ford made sure that key suppliers have access to forecasting data from customers' purchasing trends and production information to enable a faster order-to-delivery cycle. Ford vision was to create a model that allowed flexibility, predicable processes and delivered the product at the right time to the right consumer.

Conclusions

Ford is an example of how traditional organizations can mature to adapt what is current and maximizes the business value. The process that Ford went through necessitated the continuous support from management. In addition, it depended on alignment between those involved as a key for success. The correlation was not restricted to internal staff; it extended to cover competitors to reach mutual benefits, to work with suppliers to maintain similar grounds and adequate infrastructure, and to create training programs to educate all on the vision and organization's objectives.

Ford technical progress came at a time where the Internet was yet to reach its full potential. The introduction of Fiber-optic cables in the late 90's and the substantial increase in bandwidth would have helped Ford and cut on the cost in endured connecting its own offices. Furthermore, the ISP services that provided hosting servers were limited to only few players, which explained why Ford preferred to manage its own web server and maintain the overhead of the 24 hours uptime and backup.

From this case study, I understood the level of commitment large firms have to maintaining their position in the market. These companies know the revolving nature of business in the sense of how easy it is to fall back if they did not keep up with the change. The Ford process also shows the need for quick and resourceful thinking when faced with situations that might seem to be unfavorable. The way Ford ventured into the foreign market by acquiring local manufacturers was a strategic decision that did not only enabled Ford to merge with different technologies, but it also saved it the additional cost of establishing production centers in Japan and Europe.

Recommendations

Maintaining leadership in the market requires innovative organizations willing to reengineer to succeed. IT fusion with the business means restructuring and remodeling to understand the role IT would play to meet the business objectives Planning and modeling is vital when coordinating work with large teams. Constructing websites is not about content; it is about understanding what adds value and how humans interact with information. Knowledge management is a plan that companies need to develop as part of their initial business process modeling It is not wrong for large firms to try to adapt to successful processes implemented by other firms.
References

Robert D. Austin and Mark Cotteleer,"Ford Motor Co.: Maximizing the Business Value of Web Technologies." Harvard Business Publishing. July 10, 1997. harvardbusinessonline.hbsp.harvard.edu/b02/en/common/item_detail.jhtml;jsessionid=WDARNHINBSYKSAKRGWCB5VQBKE0YOISW?id=198006 (accessed July 30, 2008). Computer History Museum, Internet History 80's. 2006. computerhistory.org/internet_history/internet_history_80s.shtml (accessed July 30, 2008). Darren Wilksch and Peter Shoubridge, "IP Convergence in Global Telecommunications." Defense Science & Technology Organization. March 2001. http://www.dsto.defence.gov.au/publications/2400/DSTO-TR-1046.pdf (accessed July 30, 2008). Computer History Museum, Internet History 80's. H. Joseph Wen, "From client/server to intranet." Information Management & Computer Security (MCB UP Ltd) 6, no. 1 (1998): 15-20. R. Boutaba, K. El Guemioui, and P. Dini, "An outlook on intranet management." Communications Magazine (IEEE), October 1997: 92-99. Joseph M. Firestone, Enterprise Information Portals and Knowledge Management (OXFORD: Butterworth-Heinemann, 2002), 169. David J. Skyrme, "Knowledge management solutions - the IT contribution." ACM SIGGROUP Bulletin (ACM) 19, no. 1 (April 1998): 34 - 39, 34. Thomas H. Davenport, Process Innovation: Reengineering Work Through Information Technology (Watertown,MA: Harvard Business Press, 1993), 28. Thomas H. Davenport "The New Industrial Engineering: Information Technology and Business Process Redesign." Sloan Management Review 31, no. 4 (Summer 1990): 11-28, 12 Gary M. Erickson, Robert Jacobson, and Johny K. Johansson, "Competition for market share in the presence of strategic invisible assets: The US automobile market, 1971-1981." International Journal of Research in Marketing (Elsevier Science) 9, no. 1 (March 1992): 23-37, 23. Austin and Cotteleer, "Ford Motor " , 2. Henk A. Akkermans, et al. "The impact of ERP on supply chain management: Exploratory findings from a European Delphi study." European Journal of Operational Research 146 (2003): 284-301, 286 Thomas H. Davenport and Jeffrey D. Brooks, "Enterprise systems and the supply chain." Journal of Enterprise Information Management 17, no. 1 (2004): 8-19, 9. Kevin B. Hendricks, Vinod R. Singhal, and Jeff K. Stratman. "The impact of enterprise systems on corporate performance:A study of ERP, SCM, and CRM system implementations." Journal of Operations Management 25, no. 1 (January 2007): 65-82.

Ford Motor Company - Case Study

Sally Ahmed is a webmaster , web technology analyst, and a developer for more than 7 years. Earned the Certified Web Professionals title from the International Webmaster Association in 2001. Worked as a technical Internet instructor at New Horizons computer learning center. Worked in several companies where she developed and planned over 20 websites . Holds a Masters degree in web technologies from the University College of Denver, CO. Currently working as a web technology consultant and an E-commerce manager for several local companies.

ENTERPRISE PORTAL

Monday, November 28, 2011

Is There a Shift Away From Ego-Centric CEOs to More Performance Oriented Leadership?

In addition to such victims of "industry dissonance" as the late Enron founder Kenneth Lay and CEO Jeffrey Skilling, there seems to be a movement, perhaps due to the dramatic economic shifts occurring at the start of the century, in which the status-loving, jet-setting, deal-making celebrities of the 1990s are being replaced by awareness-sensitive leaders who are more performance oriented and less egocentric. Some clear examples of this trend are Disney's preference for consensus builder Robert Iger over the more domineering Michael Eisner; Hewlett -Packard's choice of low-key Mark Hurd over high-profile Carly Fiorina; and Intel's transition from charismatic, rough-and-tumble Andy Grove to the more diplomatic and soft-spoken Paul Otellini.

When Otellini took over as CEO in May of 2005, he converted Grove's old antagonistic philosophy of "only the paranoid survive" to the more discrete "praise in public, criticize in private." To integrate a sense of connectedness into the company culture, Otellini hired sociologists and ethnographers to better discover what emotional ties potential customers had to certain product images in one particular region over another. Intel even hired doctors to work with their ethnographers to explore which technologies the elderly might find most useful in monitoring their vital signs or tracking how victims of Alzheimer's ate. "I have seen more flexibility," admitted Sony vice president Mike Abary, in a Business Week article, 'more of an open mind-set than in years past," appreciating the shift toward Intel's increasingly collaborative attitude.

DISNEY ENTERPRISE

When Bill Ford Jr. took over as CEO of Ford Motor Co. after firing Jacques Nasser, it became clear that the corporate culture there was shifting away from Nasser's aggressive, hierarchical status style to Bill Ford's more collaborative awareness style. Bill is a passionate environmentalist and student of Buddhist philosophy. He's much more people-oriented than Nasser, who shook up the company with his hyper-aggressive management style. Yet Bill Ford is no pushover. As Mark Fields, president of Ford's Americas division, puts it in an issue of Time magazine, "You don't have to be a tyrant to be tough."

Though Bill Ford has since yielded the presidency to former Boeing executive Alan Mulally, he maintains a strong influence over his family's company, remaining executive chairman. No lover of hierarchy, he answered, in a Newsweek article when asked about his giving up his title of CEO, "I've always said that titles are not important to me...What's important is getting this company headed in the right direction."

After handing the CEO mantle over to Mulally, Ford said, "I have a lot of myself invested in this company, but not my ego. I just want the company to do well. It's not about me."

Mulally was characterized in the Wall Street Journal as a new-age Lou Gerstner, a "gregarious man...an executive with a strong track record for building teamwork in a large organization." This fit with Bill Ford's style of maintaining the connectedness of his management team-"searching for a combination of subordinates who shared his desire for a teamwork-oriented, collegial management culture." In Mulally's own words, as described in another Wall Street Journal article, "You talk to customers, dealers, Ford employees, UAW, your suppliers, your investors-everybody...I know that's what I have to do. I need to network with these groups."

While General Motors and Chrysler floundered in 2009, Ford's U.S. market continued to grow. Upon ascending to the leadership of Ford, Mullaly had acquired what he jokingly termed "the biggest home-equity loan in history"-cash and credit worth almost billion-a brilliant deal, according to financial analysts. With its focus on smaller cars and electric vehicles, Ford was in much better fiscal shape than its competitors, an indication that connecting with employees and customers does work where other approaches are not as nimble.

Is There a Shift Away From Ego-Centric CEOs to More Performance Oriented Leadership?

David Nour is a social networking strategist and one of the foremost thought leaders on the quantifiable value of business relationships. In a global economy that is becoming increasingly disconnected, David and his team are solving global client challenges with Strategic Relationship Planning™ and Enterprise Social Networking best practices. http://www.relationshipeconomics.net/

DISNEY ENTERPRISE

Walt Disney World Map - Top 5 Disney Map Tips

So... You're looking for a Walt Disney World Map?

disney princess dress up

Follow along and I will give you my top 5 Disney Map Tips

DISNEY

1. Get a customized Walt Disney world map - Did you know that you can get a free customized map? Choose up to ten attractions at any or all of the Walt Disney World theme parks and a customized map will be created. This map shows the locations of favorite attractions and the distance from each other to help plan your visit to the parks.

2. You can also view for free a interactive map of Walt Disney and all of the other properties as well.. including Animal Kingdom, Epcot, Hollywood studious and all of the surrounding water parks.

3. Did you know that there is software programs that can map out and plan your entire Disney vacation? For a small fee this can make planning a Disney World trip a breeze. You can customize your entire trip. Very handy tool.

4. The parks and resort hotels offer all of the Disney maps for free. You can request as many as you need and they are available at the entrance of each park with updated show times and activities for the day.

5. You can order a Disney map online and have it delivered to your door. You need to do this 2 weeks before you go on your trip to ensure you get the map on time.

And There you have it! Not hard to do at all.

Walt Disney World Map - Top 5 Disney Map Tips

I have found that when looking to save money on a Walt Disney World Vacation Package, http://www.wdwdiscounts.info is a great resource for cutting my price in half.

Walt Disney World Map

DISNEY

Walt Disney World Souvenirs That Don't Cost a Fortune

Mickey ears, stuffed animals, princess dresses and pirate swords. Walt Disney World is filled with venues for selling souvenirs and much of it is very overpriced. It's the nature of souvenirs that you take them home and rarely look at them again (except possibly the stuffed animals for small kids), so why do we spend so much money on things that don't matter once we get home? I did the Mickey Mouse ear hats and the expensive t-shirts, and then I decided to get creative. We always leave the parks with inexpensive Walt Disney World souvenirs to help us remember our trip. None of them cost very much money, and many of them are absolutely free.

disney costumes

Pressed Pennies

DISNEY

There are hundreds of pressed penny machines in Walt Disney World, and each one creates a unique design. Simply put in a penny along with two quarters and push the lever. Out pops your penny, squashed and embossed with a Disney design. There are sets to collect, like the Epcot country logos, pennies commemorating rides like Pirates of the Caribbean and Tower of Terror and even pennies marked with resort hotel designs. Check in Downtown Disney for collector's penny holder books to hold your loot. Your kids can add to this collection over and over again. Check out the pressed pennies and quarters list on Allears.net for an idea of all the locations.

Special Friend Photos

If your child has a special stuffed animal, you'll likely have it along on your vacation. Turn that animal into the subject of a photo series all over Disney World. Bring the animal along on the rides, get it a seat at the table for dinner, have it give Snow White a hug in front of the castle. Snap pictures of how much fun your child's stuffed friend is having all week long. Print out the photos when you get home to create a unique photo album for your child to keep.

Autographs

While many people buy specialized autograph books at the resorts or parks, you can get one at a dollar store before you pack for the parks. Look for a notebook with a Disney design on front, or buy a plain autograph book and let your child design the cover with Disney character stickers. Get autographs from the characters, of course, but make it even more special. Ask cast members for their autograph when they offer a little bit of Disney magic for your day. Request autographs from waiters who smiled through a busy shift, cashiers who offer to let your kids peruse their trading pins, people who run the rides with a smile on their face or custodians who do a fabulous job at a difficult task. You'll make the cast member's day and make yourself feel pretty good, too.

T-shirts and Pins

If you absolutely don't feel like it's a vacation without buying something with Mickey's face on it, head to one of the Disney outlet stores just outside of the park area. There are three outlets that take from 7 to 18 minutes to drive to from the Disney parks. Each of the outlet stores carries hats, t-shirts, sweatshirts, beach towels, coffee mugs, pins and a huge variety of other souvenirs. Almost every items in these stores is 50% off the price in the parks, and some of it is up to 80% off. Who cares if it's last season's Mickey head design if you're paying 20 cents on the dollar?

Disney World souvenirs don't have to be expensive plush toys that sit on a shelf and collect dust all year. Get creative with your souvenir hunting and pick up a series of items that remind you of your magical time but don't cost a fortune. After all, it's the memories that count, not how much you spent in building them.

Walt Disney World Souvenirs That Don't Cost a Fortune

Anne Baley is a Florida resident and veteran Walt Disney World guest. She has explored Disney World dozens of times, always looking for new and unique ways to get more out of a trip for less money. Baley writes about every possible way to get discounts on your Disney vacation at http://www.disneycheaper.net

DISNEY

Sunday, November 27, 2011

Bossini Advances Its Supply Chain Strategy With the WebMethods ESB

To keep ahead in a fast-moving industry, leading Asia-Pacific fashion retailer Bossini needed to have better visibility into its business and operational processes through the synchronization of real-time data across multiple orders, shipments and stock-keeping units.

By leveraging the Enterprise Service Bus (ESB), Bossini is able to speed up the deployment of new applications and processes and bring new partners on board much more quickly.
The intuitive development environment of the webMethods ESB has enabled Bossini's programmers to easily, and quickly, build the large number of interfaces required to meet its complex integration requirements.

ENTERPRISE PORTAL

Upon transforming to a Service Oriented Architecture (SOA), Bossini could synchronize real-time data from multiple orders, shipments and stock-keeping units (SKUs) across its Point-of-Sale (POS) systems and Warehouse Management System (WMS) inventory.

Benefits include:

• Better visibility into real-time processes with dynamic synchronization of data between point of sale and warehouse management systems
• Additional business capabilities, e.g. late shipment and sales performance monitoring via dashboards/SMS and stock-on-hand monitoring for all markets.
• Factory order allocation reduced from three days to one
• Finance month-end closing slashed from 25 days to seven
• Developer and IT productivity increased by up to 30 percent through user-friendly intuitive interface and re-use of programming objects from the webMethods ESB.

A standards-based solution

With the webMethods Enterprise Service Bus, Bossini is able to take full advantage of the standards-based interfaces to integrate with their existing systems and utilize service orchestration to connect their existing systems to their processes. This allows Bossini to speed up the deployment of new applications and processes and bring new partners on board much more quickly.

Subsequent changes are also easier to implement, and the company enjoys cost savings resulting from the re-use of the service components. "The webMethods ESB enables us to achieve real-time interoperability across numerous disparate applications, including independence from the constraints of their operating systems and hardware platforms," said Mr. Andrew Ling, Director of IT and Supply Chain of the Bossini Group.

Of equal importance is the platform's flexibility and ease of use. "This was crucial in our ability to gain competitive advantage in the fickle world of apparel retailing," said Ling. "In our decision, we also took into account the faster adoption, lower training costs and quicker return-on-investment enabled by the very intuitive design of the webMethods ESB."

Bossini Advances Its Supply Chain Strategy With the WebMethods ESB

Software AG is the global leader in Business Process Excellence with 40 years of innovation driving its business, including the invention of the first high-performance transactional database, Adabas; the first business process analysis platform, ARIS; and the first B2B server and SOA-based integration platform, webMethods ESB.

ENTERPRISE PORTAL

Discounted Disney World Tickets - Make Sure the Ticket Broker is Reputable!

If you are planning a vacation to Walt Disney World, buying discounted Disney World tickets is an excellent way to save money. And there are many vendors who are selling discount tickets to Walt Disney World. The problem is in determining who is reputable, and who is not. This article will present several easy tips to help you decide which ticket brokers you can trust, and which ones you should steer clear of.
 
First of all, look for the Disney logo, and "authorized discount ticket agent" designation. If you don't see these, the seller does not have the legal authority to sell those tickets. Authorized brokers purchase bulk tickets under contract, directly from the attractions. By purchasing in large volume, they receive discounts from Disney and the other attractions, which in turn are passed on to consumers. Those designations insure that buyers can trust the ticket broker.
 
Secondly, make sure the company is a member of organizations like the Better Business Bureau, and area Chambers of Commerce. Even better, see how long they have been in business: if they have been around a while, chances are good it is a reputable company.
 
Next, honestly look at the ticket prices, and if they seem too good to be true, well they probably are. There are many seemingly legitimate sites who offer unbelievably low prices, and most are usually scams. Some note prices that are so low there is no way that they could sell tickets at that price without losing money. Note also the URL on the website: many are currently operating from Romania, and you will see .ro at the end of the URL. These sites will often want you to pay by wire transfer, which means that you can't get your money back.
 
Lastly, make certain that the broker is not requiring you to sit through a timeshare presentation in order to receive the tickets. Check the fine print at the bottom of the website and read it carefully: it will say if they are soliciting for timeshares.
 
Purchasing discounted Disney World tickets is a great way to plan an affordable Disney family vacation. Just be certain to choose a reputable, authorized ticket broker for your purchase.

disney princess tv

DISNEY

Discounted Disney World Tickets - Make Sure the Ticket Broker is Reputable!

Nancy Bobby has been planning Disney World vacations (and saving money on them) for over ten years. To learn more about the many Disney-planning tips and strategies she has discovered over the years, visit http://www.theaffordablemouse.com, a collection of resources devoted to planning an affordable Disney vacation.

DISNEY

Up! Where They Belong - Disney, Pixar, and the New Golden Age of Animation

The nomination of the Disney/Pixar film "UP" in the Best Picture category of the 2010 Academy Awards returns Disney to its rightful position as undisputed king of animated film, a throne it has occupied for most of the past 100 years. Putting aside arguments as to what constitutes an animated film (some claim this appellation for Up's co-nominee Avatar), this marks only the second time an animated feature has been nominated for the award (the first was another Disney film - Beauty and the Beast, of 1991, which somewhat ironically lost out to The Silence of the Lambs, which, it could be argued, resembled Beauty and the Beast in more ways than one.)

disney couture

Although popular opinion has Avatar as the front runner to win Best Picture, the mere fact of Up's nomination is a vindication of Disney's purchase of the company in 2006 and testament to the courage and commitment of Pixar chairman and CEO Steve Jobs, and creative genius John Lassetter, now Chief Creative Officer of Pixar, and also of Disney Animation Studios.

DISNEY

Disney's wisdom not only in recognising the financial worth of Pixar, but also the artistic worth of its creative team, brings the company back almost full circle to the very earliest days of animation, when founder Walt Disney very quickly realised that he would not be able to achieve his creative and business ambitions single-handedly, and set about employing the very best artists and writers that were available.

His first major collaboration was with friend and former workmate Ub Iwerks, with whom Disney had worked at the Pesmen-Rubin Commercial Art Studio in Kansas City. Although Iwerks was not the only animator with whom Disney worked, he was the most influential on the early films, most notably in his development of the now iconic Mickey Mouse from an earlier Disney character Oswald the Lucky Rabbit, rights to which he had lost in a contractual dispute. Using Iwerks' new character, Disney took the risky step of investing in the new film technology of sound, introduced the previous year in The Jazz Singer.

Although Steamboat Willie of 1928, starring Mickey Mouse in his third appearance, is often cited as the first synchronised sound cartoon, it was in fact preceded in 1926 by Max and Dave Fleischer's My Old Kentucky Home, and in 1928 by Dinner Time, created by Paul Terry, later founder of Terrytoons. Neither of these predecessors were successful at the box office, but Steamboat Willie was a sensation. With it, Disney moved into the big time, and embarked on a hugely productive phase in which several Mickey Mouse cartoons (including his first two - Plane Crazy, and The Gallopin' Gaucho - remade with sound) were released each year, along with a number of other titles featuring a growing stable of popular characters.

Disney had combined technical superiority with artistic excellence and business acumen, and this combination of attributes earned him and his company's place at the forefront of the animation industry, a position he cemented four years later when he signed Technicolor to a two year contract for his exclusive use of their new colour processing technique for cartoons.

By the end of the 1930s, Walt Disney was ambitious to develop animation even further. He took the risky, but ultimately profitable leap into animated feature films with the vastly popular and successful Snow White and the Seven Dwarfs in 1938, a film which began several decades of box office domination for Disney, with such iconic films as Bambi (1942), Song of the South (1946), and Cinderella (1950) joining modern classics like The Little Mermaid of 1989, and Beauty and the Beast (1991), in the pantheon of great films - animated and otherwise.

It is no surprise then, that the Disney company recognised the potential of the groundbreaking new medium of computer animation when Pixar made its first feature film Toy Story in 1995. Disney and Pixar entered into a distribution partnership for Toy Story and subsequent Pixar output which, although not without the occasional contractual disputes and personality clashes, eventually led to Disney's purchase of a majority share in Pixar. True to the history of both of these leaders in film animation, the quality of Pixar's work has steadily progressed, and with the appointment of John Lassiter (also a one time Disney animator) as creative director of both companies, there is no reason to doubt that this will continue. It can only be a matter of time until a Disney/Pixar film is given the recognition and respect that this often underrated art form has deserved since the early days of animation.

Up! Where They Belong - Disney, Pixar, and the New Golden Age of Animation

Andy McScott loves watching films, reading about film history, and writing about film. He has a degree in American Studies, specialising in film, and has even appeared in a film (a 'blink and you'll miss it' extra role in Peter Jackson's "The Frighteners" that is now visible due to advances in DVD freeze frame technology.) His favourite film genres are Western, Gangster, and Animated. Check out some more of his film writing at: http://www.squidoo.com/Top10BestNosesinFilmandTelevision or http://www.squidoo.com/Top10CartoonBirds.

DISNEY

Saturday, November 26, 2011

Disney World Rides - Top 10 For Kids Under 9

There are so many Disney world rides, shows and attractions that you may not even get the chance to experience them all. There are great rides for adults and plenty of fun Disney rides for the kids.

disney costumes

We've put together a top 10 list of must-see rides if you have kids under nine years old. They range from the cute and fun, to the mildly spooky. It was almost impossible to limit it to just ten, but we gave it our best attempts!

DISNEY

10. It's Tough To Be A Bug- This movie keeps the audience laughing and feels like you are actually touching bugs and being "stung" by a bee.

9. Mickeys Philharmonic- Full of energy 3-D attraction with Maestro Mickey and his out of control orchestra.

8. Peter Pan Ride- Soar over Never Land in your pirate ship as you encounter Indians, Mermaids, and Captain Hook.

7. Muppet Vision 3-D-All the lovable Muppets, combined with 3-D special effects make this a don't miss attraction.

6. Dumbo Ride- A must see ride for preschoolers, this Fantasyland attraction allows you to fly high with Dumbo.

5. Winnie the Pooh Ride- Join Winnie the Pooh and friends in your honey pot car through a stormy day in the Hundred Ace Wood.

4. Country Bears Jamboree- Musically-challenged Big Al and the rest of the Country Bears perform in this family favorite.

3. Its A Small World Ride- Colorful dolls represent children across the world in their native dress and catchy songs.

2. Haunted Mansion- is a must see for most everyone. The holographic dancing ghosts and floating candlesticks make this ride an all-time favorite.

1. Pirates Of The Caribbean Ride is one of the most popular rides in Disney World. Revamped in 2006, this lively, swashbuckling adventure takes riders along with Captain Jack and his hunt for treasure.

Enjoy your next Walt Disney World vacation!

Disney World Rides - Top 10 For Kids Under 9

For fun Disney world rides and reviews, age recommendations, video footage, and fun facts visit http://www.mouse-world-vacation-fun.com as well as tips for making Disney World affordable.

© Copyright 2009. Feel free to reprint this article on your site as long as the article is not modified in any way and the resource information (about the author) is listed as above.

DISNEY

Friday, November 11, 2011

How Buyers and Suppliers Gain From B2B Marketplace

Ever growing Business-to-business marketplaces, popularly called B2B marketplaces are changing the ways of doing business. These online marketplaces have immense potential, both for buyers and suppliers, thanks to their smooth transaction processes and global reach.

What is a B2B marketplace?

ENTERPRISE PORTAL

B2B marketplace is an Internet based online platform where buyers and sellers can communicate and do business transactions. The buyers here are not consumers, they are businesses and can be anyone- wholesalers, retailers, and other traders in a specific industry. These marketplaces act as vertical search engines. Vertical search engines contain information about a specific industry or industries. For example, a fabrics B2B marketplace will contain information only about fabric manufacturers whereas a beads B2B marketplace will enlist beads manufacturers only. There are certain bigger marketplaces like indiamart.com that include manufacturers and suppliers of various industries. Thus, a B2B marketplace means serious business and is different from B2C platforms that connect businesses with consumers.

Why a B2B marketplace?

Many researches and surveys have been conducted about the search behavior of business and professional users. These studies say when the professionals use general purpose search engines like Google and Yahoo, they don't get specific information about their work related queries. A keyword based search can give diverse results in the form of scattered information contained in various websites, blogs etc. not necessarily useful for business purposes.

On the contrary, the vertical searches on B2B marketplaces or B2B trade directories (B2B trade specific Web sites) give the required business related information needed by the professionals. If we take the earlier example of a fabrics marketplace, we can relate to other professionals say a ribbons wholesaler. It will be much easier for him to search ribbon suppliers on a narrow fabrics B2B marketplace. These specialized websites have at least two advantages over general search engines. In the first place, they exactly know what are the needs of their targeted community and have complete knowledge about their requirements. Secondly, they can make hard assumptions based on their sound knowledge and make the search activity a fruitful one through expert organization of the product contents.

B2B marketplace and its Potential

B2B marketplace uses its potential for the benefit of buyers and sellers. It gives them instant access to a global audience.

Benefits to the Buyers:

A B2B marketplace removes all the geographical barriers and buyers get access to a number of new suppliers. Access to user friendly and smooth online transaction processing lowers the transaction costs and saves time. Buyers can compare the products and services offered on a marketplace for efficient purchasing decisions. Delivery tracking is also easier apart from assurance of quality by established B2B marketplaces having their own brand value.
Benefits to the Suppliers:

When a supplier does business locally, his market is limited. A B2B marketplace gives an opportunity to do business globally and explore new markets. Online sales processing minimizes the need of other human and material resources thereby reducing overhead costs in a significant manner. The listed products are combined with the eCatalog (suppliers' directory) and seller's Web Store which helps in converting a potential buyer into an actual buyer. Apart from product listings, B2B portals also include many other features such as discussion groups, latest industry news, and other business oriented information that can be used by the companies to expand their business. In fact, B2B marketplaces have proved to be one-stop business solutions for buyers as well as suppliers.

How Buyers and Suppliers Gain From B2B Marketplace

DeepaRc, an experienced writer on business related textile issues, recommends visiting fabrics manufacturers marketplace and textile furnishing blog for insightful articles on textile and its online business.

ENTERPRISE PORTAL

Thursday, November 10, 2011

Keep Track on the Progress of the Projects With Web Based Project Management

Modern projects just cannot succeed if Project Managers do not have answers to the following questions:

o How much work has been done, by whom, where and against which task?
o Who can you interact with for clarification or resolution?
o Do team members require more time than anticipated? If yes, how much more time? How soon can these estimates be available?
o Who needs which additional resources? Where are these going to come from?

ENTERPRISE PORTAL

Without a system in place, Project Managers cannot have up-to-date answers to these questions. With more projects being disparate by time zones and geo-location, a web based solution is vital.

Ask any modern Project Manager, project information changes constantly. Sometimes the progress goes faster and sometimes it is stagnant. Sometimes resources are available and at other times nonexistent. The solution to resource management must provide real-time or close to possible real-time allocation, status and data, and it must also allow for constant updates and visibility across the enterprise landscape. Information entered into a web based solution is readily available to stake holders, helping them make better strategic decisions. Success is based on the availability of the following information:

Resource Visibility:

Real-time visibility of resource allocation is an essential requirement. Project Managers must know which tasks can be assigned to which roles (Analysts, Team leads, Administrators, etc.). Information entry into the solution must be easy to enter/update, since it can change due to resource re-assignment (Emergency leave, illness, etc.).

Time Tracking:

Having the ability to track actual hours worked against the tasks of the projects is absolutely essential. Problem resolution becomes much easier when you know where the problem originated from; thus, enabling you to get the project back on track. This is also invaluable to cost estimation of future projects as it provides a record of the number of hours various resources spend on the project. ROI calculations become much easier.

Enterprise-wide Data:

It is most vital that Project Managers can present data on project cost, status, schedules and resources to stakeholders in a clear, concise way. Information entered into the web based solution can be translated into reports, reflecting changes instantly thus providing the visibility needed by management and other departments. Collaboration and document sharing in a web based system frees the users/team members of physical communications constraints. Sharing information in project blogs, threaded emails and document pooling, all combine to improve communications within a project team, thus, improving the efficiency of task execution.

Flexible:

Web based software allows a user to have the facility to avail 24x7, all the necessary tools or data. You can work anytime and anywhere.

Protection:

Web based software provides you with protection against data loss due to machine failure or hardware theft. Security and access control is centralized. Risk mitigation is improved.

Cost Effective:

Web based software can be financially cost-effective as you do not have to incur the maintenance costs of traditional software. You get access to the latest versions and people get easy access to your services, saving money in formulating strategies.

Keep Track on the Progress of the Projects With Web Based Project Management

You can consult a specialist to implement the web based project management software in your organization.

ENTERPRISE PORTAL

Disney Princess Bedrooms - Great Ideas

If you're looking to decorate or redecorate your daughter's bedroom, one great idea you can use is to choose one of her favorite characters. If she is a big fan of a certain character - for example a Disney princess, you can easily decorate her room so that when she walks into it, she will feel like a princess with her Disney princess decorated bedroom.

disney costumes

How can you decorate a bedroom in a specific character, such as a Disney princess (or multiple princesses)? There are many great ways. First off, you can decorate the walls. Paint the room in a color that goes with princesses. If you do this, you can get a border that goes at the top of the walls with princesses on it. You can also find great Disney wallpaper that has all of her favorite princess on it. If you're really ambitious, you can even paint Disney items or princesses on the walls.

DISNEY

Once you have the walls painted or wallpapered, you can put posters or Disney art on the walls of the princesses. You can choose from many different ideas, such as pictures of the princesses themselves, or of their castles.

At this point, you have the walls taken care of. You can then move onto the bed, where you can choose between many different sheet sets, pillows, blankets, comforters, and more. You would be very surprised at all of the choices you will have for each item! You can choose between different characters, colors, and more.

By now, most of the room will be redecorated. You can always add other small touches such as toys, Disney princess figurines, and more. Your daughter will be happy and thrilled each and every time she walks into her bedroom from then on.

Disney Princess Bedrooms - Great Ideas

Jessica Mele loves everything Disney, and can help you find all of the Disney Princess Bedroom Items you are looking for. Instead of searching multiple web sites and stores to find all of the items you'll need for the birthday party, you can go to just one website and search what all of stores have in stock.

DISNEY

Strategic Planning - On One Page

Strategic planning is not a scary proposition. In fact, I'd argue, you actually do it more often than you think you do. David Allen, is his blockbuster book, "Getting Things Done," says humans are actually "planning machines."

Let's face it; we start planning the moment we wake up in the morning. We start planning our day, what we'll have for breakfast, what we'll wear to work, and so on. Planning is both a conscious and subconscious act. We plan on purpose, and we often find ourselves planning unconsciously.

DISNEY ENTERPRISE

So, because we're going to plan anyway, let's take a few minutes and look at a planning model that will work for any occasion or circumstance. What makes this model even better is that it can be accomplished on a single sheet of paper.

This particular model asks and answers five fundamental planning questions:

1. What do I want to accomplish?

2. Why do I want to do it?

3. How will I bring my plan to fruition?

4. What will I measure to gauge my progress?

5. What tasks will I need to complete to accomplish my goals?

What do I want to accomplish? This is your VISION for what, specifically, you want to accomplish. Notice I said "specifically." The clearer you can be in describing what you want to accomplish or achieve, the greater the chances you'll make it happen. Your mind functions best when it's very clear on what you intend to do.

Why do you want to do it? This is your MISSION. Written succinctly, it will provide the motivation and the inspiration you need to keep moving toward your vision. Your mission makes clear why you do what you do. It describes the grand purpose for your efforts or your enterprise. The mission statement for the Disney Corporation is simply: "To Make People Happy." Notice it doesn't describe a product or service, just a purpose for why they do what they do.

STRATEGIES describe how you'll go about fulfilling your vision. A strategy is a general plan of action. It simply states, in general terms, the steps you'll take to make your vision a reality. Strategies describe such activities as sales, marketing, and process improvement. Personal strategies might include health, exercise, nutrition, improved education. Strategies do not have to be measurable. Goals do.

GOALS ask: How much? By when? If my strategy is to sell more stuff this year than I did last year, then the sales goal should clarify how much more stuff you intend to sell and in what time frame. Goal: Sell 1,000 widgets by 12/31/11. If your strategy is to lose 12 pounds, then your goal might be to lose two pounds per week for the next six weeks.

ACTION PLANS are very similar to goals but with a shorter time frame. To really ramp up your progress, keep your action items right in front of you - all the time. In order to sell 1,000 widgets within a 12-month time frame, you'll need to sell 83 a month, 20 a month and - enter action plan - five a week.

I think you can see the power of this simple but powerful planning process. Hey, you're already a planning machine; David Allen said so! So, why not add on a little One Page Plan methodology and really ramp up your progress?

Strategic Planning - On One Page

Les Taylor is a professional speaker, author, consultant, and recognized expert in the field of personal improvement and professional development. Get several "free" performance improvement resources at http://www.achievement-solutions.com also, read interesting and entertaining performance improvement articles at Les Taylor's blog at http://www.gettingmorewithles.wordpress.com

DISNEY ENTERPRISE

Wednesday, November 9, 2011

Biometric Techniques - Enhancing Security Standards In High Performance Enterprise

INTRODUCTION:

In today's digital economy, where many important activities are carried out with the help of computer, the need for reliable, simple, flexible and secure system is a great concern and a challenging issue for the organisation. Day by day security breaches and transaction fraud increases, the need for secure identification and personal verification technologies is becoming a great concern to the organisation. By measuring something unique about an individual and using that to identify, an organisation can dramatically improve their security measures. Awareness of security issues is rapidly increasing among company how they want to protect the information which is a greatest asset that the company possesses. The organisation wants to protect this information from either internal or external threat. Security plays a very important role in the organization and to make computer system secure, various biometric techniques have been developed. Today biometric techniques are a reliable method of recognising the identity of a person based on physiological or behavioral characteristics. Biometrics techniques exploit human's unique physical or behavioral traits in order to authenticate people. The features measured are face, fingerprints, hand geometry, iris, retinal, voice etc. Biometric authentication is increasingly being used in areas like banking, retailing, defense, manufacturing, health industry, stock exchange, public sector, airport security, internet security etc. Biometric technologies are providing a highly-secure identification and personal verification solutions. Biometric techniques are an attempt in providing a robust solution to many challenging problems in security. Biometrics focuses on the analysis of physical or behavioral traits that determine individual identity. Biometrics can he used to verify the identity of an individual based on the measurement and analysis of unique physical and behavioral data. Indeed, biometrics techniques increasingly are being viewed as the preferred means to confirm an individual's identity accurately.

DISNEY ENTERPRISE

The history of biometric techniques is not new, it trace its origin from the past. The ancient biometric technique which was practiced was a form of finger printing being used in China in the 14th century, as reported by the Portuguese historian Joao de Barros. The Chinese merchants were stamping children's palm and footprints on paper with ink to distinguish the babies from one another. Biometrics the ancient Greek word is the combination of two words -bio means life, metric means measurement.It is the study of methods for uniquely recognizing humans based upon physical or behavioral characterstics. The physiological characterstics are fingerprint, face, hand geometry, DNA and iris recognition. Behavioral are related to the behavior of a person like signature, study of keystroke, voice etc. Thus a biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric characteristics are collected using a device called a sensor. These sensors are used to acquire the data needed for verification or identification and to convert the data to a digital code. The quality of the device chosen to capture data has a significant impact on the recognition results. The devices could be digital cameras for face recognition, ear recognition etc or a telephone for voice recognition etc. A biometric system operates in verification mode or identification mode. In verification mode the system validates a person identity by comparing the captured biometric data with the biometric template stored in the database and is mainly used for positive recognition. In the identification mode the system captures the biometric data of an individual and searches the biometric template of all users in the database till a match is not found.

DIFFERENT TYPES OF BIOMETRIC TECHNIQUES

o Face Recognition

The biometric system can automatically recognize a person by the face. This technology works by analyzing specific features in the face like - the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin ,unique shape, pattern etc. These systems involve measurement of the eyes, nose, mouth, and other facial features for identification. To increase accuracy these systems also may measure mouth and lip movement.Face recognition captures characteristics of a face either from video or still image and translates unique characteristics of a face into a set of numbers. These data collected from the face are combined in a single unit that uniquely identifies each person. Sometime the features of the face are analyzed like the ongoing changes in the face while smiling or crying or reacting to different situation etc.The entire face of the person is taken into consideration or the different part of the face is taken into consideration for the identity of a person. It is highly complex technology. The data capture by using video or thermal imaging. The user identity is confirmed by looking at the screen. The primary benefit to using facial recognition as a biometric authenticator is that people are accustomed to presenting their faces for identification and instead of ID card or photo identity card this technique will be beneficial in identifying a person. As the person faces changes by the age or person goes for plastic surgery, in this case the facial recognition algorithm should measure the relative position of ears, noses, eyes and other facial features.

o Hand Geometry:

Hand geometry is techniques that capture the physical characteristics of a user's hand and fingers. It analyses finger image ridge endings, bifurcations or branches made by ridges. These systems measure and record the length, width, thickness, and surface area of an individual's hand. It is used in applications like access control and time and attendance etc. It is easy to use, relatively inexpensive and widely accepted. A camera captures a 3 dimensional image of the hand. A verification template is created and stored in the database and is compared to the template at the time of verification of a person. Fingerprint identification.Currently fingerprint readers are being built into computer memory cards for use with laptops or PCs and also in cellular telephones, and personal digital assistants. It is successfully implemented in the area of physical access control.

o Eye Recognition:

This technique involves scanning of retina and iris in eye. Retina scan technology maps the capillary pattern of the retina, a thin nerve on the back of the eye. A retina scan measures patterns at over 400 points. It analyses the iris of the eye, which is the colored ring of tissue that surrounds the pupil of the eye. This is a highly mature technology with a proven track record in a number of application areas. Retina scanning captures unique pattern of blood vessels where the iris scanning captures the iris. The user must focus on a point and when it is in that position the system uses a beam of light to capture the unique retina characterstics.It is extremely secure and accurate and used heavily in controlled environment. However, it is expensive, secure and requires perfect alignment and usually the user must look in to the device with proper concentration. Iris recognition is one of the most reliable biometric identification and verification methods. It is used in airports for travellers.Retina scan is used in military and government organization. Organizations use retina scans primarily for authentication in high-end security applications to control access, for example, in government buildings, military operations or other restricted quarters, to authorized personnel only. The unique pattern and characteristics in the human iris remain unchanged throughout one's lifetime and no two persons in the world can have the same iris pattern.

o Voice Biometrics

Voice biometrics, uses the person's voice to verify or identify the person. It verifies as well as identifies the speaker. A microphone on a standard PC with software is required to analyze the unique characteristics of the person. Mostly used in telephone-based applications. Voice verification is easy to use and does not require a great deal of user education. To enroll, the user speaks a given pass phrase into a microphone or telephone handset. The system then creates a template based on numerous characteristics, including pitch, tone, and shape of larynx. Typically, the enrollment process takes less than a minute for the user to complete. Voice verification is one of the least intrusive of all biometric methods. Furthermore, voice verification is easy to use and does not require a great deal of user education.

o Signature Verification

Signature verification technology is the analysis of an individual's written signature, including the speed, acceleration rate, stroke length and pressure applied during the signature. There are different ways to capture data for analysis i.e. a special pen can be used to recognize and analyze different movements when writing a signature, the data will then be captured within the pen. Information can also be captured within a special tablet that measures time, pressure, acceleration and the duration the pen touches it .As the user writes on the tablet, the movement of the pen generates sound against paper an is used for verification. An individual's signature can change over time, however, which can result in the system not recognizing authorized users. Signature systems rely on the device like special tablet, a special pen etc. When the user signs his name on an electronic pad, rather than merely comparing signatures, the device instead compares the direction, speed and pressure of the writing instrument as it moves across the pad.

o Keystroke

This method relies on the fact that every person has her/his own keyboard-melody, which is analysed when the user types. It measures the time taken by a user in pressing a particular key or searching for a particular key.

OTHER BIOMETRIC TECHNIQUES ARE
o Vein/vascular patterns: Analyses the

veins in, for example, the hand and the face.

o Nail identification: Analyses the tracks in the nails.

o DNA patterns: it is a very expensive technique and it takes a long time for verification/identification of a person

o Sweat pore analysis: Analyses the way pores on a finger are located.

o Ear recognition: Shape and size of an ear are unique for every person.

o Odour detection: Person is verified or identified by their smell.

o Walking recognition: It analyses the way the person walks.

METHODS OF BIOMETRIC AUTHENTICATION:

o VERIFICATION : is the process of verifying the user is who they claim to be.

o IDENTIFICATION : is the process of identifying the user from a set of known users.

WORKING OF BIOMETRICS:

All biometric systems works in a four-stage process that consists of the following steps.

o Capture: A biometric system captures the sample of biometric characteristics like fingerprint, voice etc of the person who wants to login to the system.

o Extraction: Unique data are extracted from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual.

o Comparison: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person.

o Match/non-match: The system then decides whether the features extracted from the new sample are a match or a non-match with the template. When identity needs checking, the person interacts with the biometric system, a new biometric sample is taken and compared with the template. If the template and the new sample match, the person's identity is confirmed else a non-match is confirmed.

[Biometric Authentication System and its functional components]

The Biometric authentication system includes three layered architecture:

o Enroll: A sample is captured from a device, processed into a usable form from which a template is constructed, and returned to the application.

o Verify: One or more samples are captured, processed into a usable form, and then matched against an input template. The results of the comparison are returned.

o Identify: One or more samples are captured, processed into a usable form, and matched against a set of templates. A list is generated to show how close the samples compare against the top candidates in the set.

A biometric template is an individual's sample, a reference data, which is first captured from the selected biometric device. Later, the individual's identity is verified by comparing the subsequent collected data against the individual's biometric template stored in the system. Typically, during the enrollment process, three to four samples may be captured to arrive at a representative template. The resultant biometric templates, as well as the overall enrollment process, are key for the overall success of the biometric application. If the quality of the template is poor, the user will need to go through re-enrollment again. The template may be stored, within the biometric device, remotely in a central repository or on a portable card.

Storing the template on the biometric device has the advantage of fast access to the data. There is no dependency on the network or another system to access the template. This method applies well in situations when there are few users of the application. Storing the template in a central repository is a good option in a high-performance, secure environment. Keep in mind that the size of the biometric template varies from one vendor product to the next and is typically between 9 bytes and 1.5k. For example, as a fingerprint is scanned, up to 100 minutia points are captured and run against an algorithm to create a 256-byte binary template. An ideal configuration could be one in which copies of templates related to users are stored locally for fast access, while others are downloaded from the system if the template cannot be found locally.

Storing the template on a card or a token has the advantage that the user carries his or her template with them and can use it at any authorized reader position. Users might prefer this method because they maintain control and ownership of their template. However, if the token is lost or damaged, the user would need to re-enroll. If the user base does not object to storage of the templates on the network, then an ideal solution would be to store the template on the token as well as the network. If the token is lost or damaged, the user can provide acceptable identity information to access the information based on the template that can be accessed on the network. The enrollment time is the time it takes to enroll or register a user to the biometric system. The enrollment time depends on a number of variables such as: users' experience with the device or use of custom software or type of information collected at the time of enrollment

Biometric Performance Measures:

o False acceptance rate (FAR) or False match rate (FMR): the probability that the system incorrectly declares a successful match between the input pattern and a non-matching pattern in the database. It measures the percent of invalid matches. These systems are critical since they are commonly used to forbid certain actions by disallowed people.

o False reject rate (FRR) or False non-match rate (FNMR): the probability that the system incorrectly declares failure of match between the input pattern and the matching template in the database. It measures the percent of valid inputs being rejected.

o Receiver (or relative) operating characteristic (ROC): In general, the matching algorithm performs a decision using some parameters (e.g. a threshold). In biometric systems the FAR and FRR can typically be traded off against each other by changing those parameters. The ROC plot is obtained by graphing the values of FAR and FRR, changing the variables implicitly. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes.

o Equal error rate (EER): The rates at which both accept and reject errors are equal. ROC or DET plotting is used because how FAR and FRR can be changed, is shown clearly. When quick comparison of two systems is required, the ERR is commonly used. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. The lower the EER, the more accurate the system is considered to be.

o Failure to enroll rate (FTE or FER): the percentage of data input is considered invalid and fails to input into the system. Failure to enroll happens when the data obtained by the sensor are considered invalid or of poor quality.

o Failure to capture rate (FTC): Within automatic systems, the probability that the system fails to detect a biometric characteristic when presented correctly.

o Template capacity: the maximum number of sets of data which can be input in to the system.

For example, performance parameters associated with the fingerprint reader may be:

o a false acceptance rate of less than or equal to 0.01 percent

o a false rejection rate of less than 1.4 percent

o the image capture area is 26×14 mm.

Obviously, these two measures should be as low as possible to avoid authorized user rejection but keep out unauthorized users. In applications with medium security level a 10% False Rejection Error will be unacceptable, where false acceptance rate error of 5% is acceptable.

False Acceptance When a biometric system incorrectly identifies an individual or incorrectly verifies an impostor against a claimed identity. Also known as a Type II error. False Acceptance Rate/FAR

The probability that a biometric system will incorrectly identify an individual or will fail to reject an impostor. Also known as the Type II error rate.

It is stated as follows:

FAR = NFA / NIIA or FAR = NFA / NIVA

where FAR is the false acceptance rate

NFA is the number of false acceptances

NIIA is the number of impostor identification attempts

NIVA is the number of impostor verification attempts

False Rejection Rate/FRR The probability that a biometric system will fail to identify an enrollee, or verify the legitimate claimed identity of an enrollee. Also known as a Type I error rate.

It is stated as follows:

FRR = NFR / NEIA or FRR = NFR / NEVA

where FRR is the false rejection rate

NFR is the number of false rejections

NEIA is the number of enrollee identification attempts

NEVA is the number of enrollee verification attempts

Crossover Error Rate (CER)

Represents the point at which the false reject rate = the false acceptance rate.

Stated in percentage

Good for comparing different biometrics systems

A system with a CER of 3 will be more accurate than a system with a CER of 4

BIOMETRICS USE IN INDUSTRY

Punjab National Bank (PNB) installed its first biometric ATM at a village in Gautam Budh Nagar (UP) to spread financial inclusion. "The move would help illiterate and semi-literate customers to do banking transaction any time.

Union Bank of India biometric smart cards launched. Hawkers and small traders could avail loan from the bank using the card.

In Coca-Cola Co., hand-scanning machines are used to replace the time card monitoring for the workers. In New Jersey and six other states, fingerprint scanners are now used to crack down on people claiming welfare benefits under two different names.

In Cook County, Illinois, a sophisticated camera that analyzes the iris patterns of an individual's eyeball is helping ensure that the right people are released from jail. At Purdue University in Indiana, the campus credit union is installing automated teller machines with a finger scanner that will eliminate the need for plastic bankcards and personal identification numbers.

MasterCard International Inc. and Visa USA Inc., the world's two largest credit card companies, have begun to study the feasibility of using finger-scanning devices at the point of sale to verify that the card user is really the card holder. The scanners would compare fingerprints with biometric information stored on a microchip embedded in the credit card.
Walt Disney World in Orlando has started taking hand scans of people who purchase yearly passes. These visitors now must pass through a scanner when entering the park preventing them from lending their passes to other people.

The technology also received widespread attention at summer's Olympic Games Atlanta, where 65,000 athletes, coaches and officials used a hand-scanning system to enter the Olympic Village.

Selection of Biometric Techniques:

There are a lot of decision factors for selecting a particular biometric technology for a specific application.

1. Economic Feasibility or Cost:-The cost of biometric system implementation has decreased recently; it is still a major barrier for many companies. Traditional authentication systems, such as passwords and PIN, require relatively little training, but this is not the case with the most commonly used biometric systems. Smooth operation of those systems requires training for both systems administrators and users.

2. Risk Analysis:-Error rates and the types of errors vary with the biometrics deployed and the circumstances of deployment. Certain types of errors, such as false matches, may pose fundamental risks to business security, while other types of errors may reduce productivity and increase costs. Businesses planning biometrics implementation will need to consider the acceptable error threshold.

3. Perception of Users:-Users generally view behavior-based biometrics such as voice recognition and signature verification as less intrusive and less privacy-threatening than physiology-based biometrics.

4. TechnoSocio Feasibility:-Organizations should focus on the user-technology interface and the conditions in the organizational environment that may influence the technology's performance. The organization should create awareness among the users how to use the techniques and should overcome the psychological factors as user fears about the technology. Organization has to also consider the privacy rights of users while implementing the biometric techniques.

5. Security: Biometric techniques should have high security standards if they will be implemented in high secure environment. The biometric techniques should be evaluated on the basis of their features, potential risk and area of application, and subjected to a comprehensive risk analysis.

6. User friendly and social acceptability -Biometric techniques should be robust and user friendly to use and they should function reliably for a long period of time. The techniques should not divide the society into two group i.e. digital and non digital society.

7. Legal Feasibility-Government has to form a regulatory statutory framework for the use of biometric techniques in various commercial applications. It should form a standard regulatory framework for use of these techniques in commercial applications or transactions. If required the framework has to be regulated and changed time to time.

8. Privacy-As biometric techniques rely on personal physical characteristics, an act has to be made to protect the individual's privacy data not to be used by other. A data protection law has to be created in order to protect the person's privacy data.
Criteria for evaluating biometric technologies.

The reliability and acceptance of a system depends on the effectiveness of the system, how the system is protected against unauthorized modification, knowledge or use, how the systems provide solutions to the threats and its ability and effectiveness to identify system's abuses.

These biometric methods use data compression algorithms, protocols and codes. These algorithms can be classified in three categories:

o Statistical modeling methods,

o Dynamic programming,

o Neural networks.

The mathematical tools used in biometric procedure need to be evaluated. Mathematical analysis and proofs of the algorithms need to be evaluated by experts on the particular fields. If algorithms implement "wrong" mathematics then the algorithms are wrong and the systems based on these algorithms are vulnerable. If the algorithms used in the biometric methods have "leaks", or if efficient decoding algorithms can be found then the biometric methods themselves are vulnerable and thus the systems based on these methods become unsafe.

Different algorithms offer different degrees of security, it depends on how hard they are to break. If the cost required to break an algorithm is greater than the value of the data then we are probably safe. In our case where biometric methods are used in financial transactions where a lot of money is involved it makes it worth it for an intruder to spend the money for cryptanalysis.

The cryptographic algorithms or techniques used to implement the algorithms and protocols can be vulnerable to attacks. Attacks can also be conceived against the protocols themselves or aged standard algorithms. Thus criteria should be set for the proper evaluation of the biometric methods addressing these theoretical concerns.

The evaluation of the biometric systems is based on their implementation. There are four basic steps in the implementation of the biometric systems which impose the formation of evaluative criteria.

o Capture of the users attribute.

o Template generation of the users attribute.

o Comparison of the input with the stored template for the authorized user.

o Decision on access acceptance or rejection.

Applications of biometric techniques

Biometrics is an emerging technology which has been widely used in different organization for the security purpose. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking). Due to increased security threats, many countries have started using biometrics for border control and national ID cards. The use of biometric identification or verification systems are widely used in different companies as well as the government agencies. The applications where biometric technique has its presence are

o Identity cards and passports.

o Banking, using ATMs, Accessing Network Resource

o Physical access control of buildings, areas, doors and cars.

o Personal identification

o Equipment access control

o Electronic access to services (e-banking, e-commerce)

o Travel and Transportation, Sporting Event

o Border control

o Banking and finance, Shopping Mall

o Airport security

o Cyber security

o Time Management in Organization

o Voice Recognition(Telebanking)

o Prison visitor monitoring system.

o Voting System

Prospects of Biometric Techniques:

The biometric industry is at an infancy stage in India, but is growing fast to capture the entire market. This technique is expanding both into private and public areas of application. Biometric applications need to interconnect to multiple devices and legacy applications. The industry market and consumer markets are adopting biometric technologies for increased security and convenience. With the decreasing price of biometric solutions and improved technology, more organization is coming forward to implement this technology. The lack of a standard regulatory framework is a major drawback in implementing biometrics in organisation.It is not widely accepted by the users because some organization and society have the opinion that this technology is inappropriate and the privacy data of the users are lost. If proper regulatory framework is not established it will not be accepted by the organization as well as by the user. The devices manufactured for biometric techniques has to comply with standards Increased IT spending in the government and financial sector offers better opportunities for such deployments. Even though there are no global mandated or regulatory frame works as of now, they are expected to arrive very soon.
Standarad law and regulation will open a wide market for biometrics in electronic legal and commercial transactions.

The anti-terrorism act has introduced has a wide scope for the biometric techniques to be implemented.

Consumer privacy data has to be protected in order to be widely accepted by the user.
Integration of biometric with different legacy application and hardware.

Biometric technique has a great demand in the telecommunication domain.

The notebook and laptop manufacturer has already implemented the biometric techniques like finger printing for the enhancement of the security.

The biometric industry must address major challenges related to performance, real-world utility, and potential privacy impact in order for biometrics to reach their full potential
Many companies are also implementing biometric technologies to secure areas, maintain time records, and enhance user convenience.

An interesting biometric application is linking biometrics to credit cards.

Other financial transactions could benefit from biometrics, e.g., voice verification when banking by phone, fingerprint validation for e-commerce, etc. The market is huge, and covers a very wide range of hardware, applications and services.

Conclusion:

The future of this technology is booming. With the rapid increase of fraud and theft in commercial transaction; it is a great concern for the organization to use biometric as key instrument in eliminating the fraud and flaws in the traditional security approach. Both businesses and consumers are anxious for greater security in commercial transactions. The technology is increasingly reliable and affordable, and the question of the legal enforceability of electronic contracts is settled. While consumers recognize the benefits of biometric authentication, they are reluctant to fully accept the technology without adequate assurances that companies will keep their biometric information confidential and subject to various safeguards and the existing law provides a limited measure of protection for biometric information so greater protection should be offered to consumers so that their personal information is not misused. Biometrics will play vital roles in the next generation of automatic identification system. Biometric identifiers must be considered when implementing a biometric-based identification system. The applicability of specific biometric techniques depends heavily on the application domain. Biometrics must be implemented properly to be effective and the consequences considered. Biometrics will become increasingly prevalent in day-to-day activities where proper identification is required. The real future of the technology lies in creating a biometric trust infrastructure that allows private sector and the public sector to handle security needs. Ultimately, such an infrastructure would allow people to move to various locations worldwide while maintaining their security clearance as defined by their physiological and behavioral identities.

Biometric Techniques - Enhancing Security Standards In High Performance Enterprise

DISNEY ENTERPRISE