Friday, October 22, 2010

Sunshine procurement is not a dream


With the continuous development of market economy, increasing competition among enterprises, price became the focus of competition. Costs constitute the main factor of price is the first source of corporate competitiveness. Join the WTO in particular, face the digital economy and meet the dual challenge of the Chinese enterprises to reduce costs is an urgent need for business development.
Procurement is an important part of business processes, procurement prices and procurement costs will directly affect the cost of enterprise products. Internet network technology based on electronic procurement, with its low cost, variety of choices for end-service, transparent process so short a significant advantage, to the traditional procurement has brought new opportunities and challenges.
Complete the procurement including the establishment from the plan until the goods storage and make the whole process of account management. This complete electronic management of business processes in order to fully reflect the electronic management of value-added role. Electronic procurement (e-Procurement) solution is based on this trend and the integrity of the procurement business processes to grasp, for business as soon as possible fast track into the network economy tailored e-commerce solutions.
Scope: manufacturing, government departments, retailers are
Applicable business types and sectors: manufacturers, trading companies, buyers, purchasing department

1 business needs analysis
1.1 Business Characteristics
The establishment of corporate procurement plans, please purchase application, the supplier selection and evaluation, procurement, personnel appraisal, development and signing of the contract, the implementation of procurement contracts, in-transit goods and materials Management, Account Management, etc., constitute the entire modern enterprise procurement process. The process itself is smooth with the scientific work, and other business processes and business such as inventory, production, finance, real-time with the digital management, constitute the basic requirements of modern procurement operations, including:
Scientific development of procurement plans, evidence-based;
Supplier selection system, the standard is reasonable;
Convenient and efficient procurement process, scientific checks and balances;
Procurement of goods cheap, timely and correct;
Contract Management orderly, clear rights and responsibilities;
Information flow in the way of resources, control and effective;
Account Management right clear, simple and efficient.

1.2 User Needs Analysis
In view of the operational characteristics and requirements of the procurement, users expect business operations in procurement, to:
鈭?shop around, quickly find more suppliers, objective assessment of the supplier, choose the best source of goods, as far as possible from end to end procurement, to reduce procurement costs and the purchase price.
鈭?keep abreast of market conditions and inventory, the scientific development of procurement plans, reducing the risk out of stock, while reducing inventory costs and to minimize the amount of funds used.
鈭?abreast of the various procurement channels of procurement information and arrival information, timely approval and implementation of procurement decisions, avoid blind purchase, advance purchase, repeat purchase, non-demand procurement.
鈭?procurement transparency, to prevent "black-box operation" procurement, scientific assessment of the procurement staff.
鈭?goods in transit management, account management and inventory management and procurement areas to smooth links with, increase accuracy, improve the processing efficiency.

China Business Network electronic procurement (e-Procurement) solution fully into account the actual needs of the enterprise, Internet-based online ordering and telephone support, electronic document form of order processing, etc., to fully reduce the corporate procurement costs, shorten purchasing processes and cycles, streamline procurement processes and improve order / contract processing and management such as the timeliness and accuracy for the purpose of achieving the advanced network technology with China's actual situation and the perfect combination of traditional business logic.

2, functions and features of the solution
The solution functions as shown.

2.1 Enterprise User Management
Definition of user roles: Enterprise based on business needs, you can define a number of different buyers, with different business and scope of the procurement; can define different approval, through the approval of buyer's order / request control of the procurement contract; can be defined more level approval of people, multi-level approval. Can define the quality inspector, inspection of procurement of goods and submit the results; can define Kuguan member ledger for goods storage and registration; can define the opposition members; on the quality of goods purchased for discount or return address, and submit processing results.
Web-based special advantage of the end users of the goods can be most directly based on their needs, direct as buyer, and supplier of design, manufacturing, sales for online discussions and exchanges, to achieve end to end procurement, to maximize simplify and shorten the intermediate links, to avoid errors.
Definition of user rights: Enterprises may need to define the different roles of authority, the provisions of their business scope, amount and so on.

2.2 List of Management
Contents included: the search for information in accordance with the classification of your goods, you can authorize a particular supplier of goods on their own release or upload information.
Catalog Maintenance: The maintenance of existing directory, including add, delete and modify.
Catalog Search: by browsing, advanced search, etc., accessing your cargo information.

2.3 Procurement Program Management
Programme Entry: procurement plan will be entered for future reference.
Plans to adjust: the actual market conditions and production requirements, to plan adjustments.
Execution Trace: According to the procurement plan for tracking the status of implementation.

2.4 On-line Purchasing
Order purchase: The purchase agreement has a fixed price product orders directly to the manner of procurement orders, and binding on both the performance behavior.
Inquiry Procurement: The products that qualified inquiry and suppliers directly and negotiate a way through the online purchasing intention to finalize the completion of contract negotiations and signing.

2.5 Bidding Procurement
Bid Information Release: For complex goods, or the market changes, more suppliers, a price cut could take the initiative to publish the tender of the goods information, competitive bidding procurement.
Online Bidding: Online accepted prequalified suppliers offer.
Online Bidding: Bidding in accordance with the rules agreed in advance online evaluation.
Online contract: signed with the successful side-line.
2.6 On-line approval
Online approval: approval of the buyer who submitted the order / contract for online approval. Based on actual business needs, can be multi-level approval.
Programme Enquiries: Enquiries procurement plans, decision-making reference for approval.
Stock: approval can check inventory to determine whether the buyer agreed to purchase application.

2.7 Order / Contract Management
Order / contract template customization: for different suppliers, select or customize the various templates.
Order / contract inquiries: buyers, examiners can check order history, current status of orders.
Order / contract tracking: buyers can order the implementation of the state, at any time to remind the relevant staff for approval, payment, receiving, inspection, inventory changes, realized in the way management.

2.8 Inventory Management
Daily inventory management: real-time data on inventory management and maintenance, input / modify / delete.
Stock: In accordance with permissions check inventory.
Stock Statistics: statistics of aggregate inventory information.

2.9 Statistical analysis of procurement
Can automatically generate, access privileges, custom send: purchasing daily / weekly / monthly / quarterly / annual reports; price trend analysis; species analysis; procurement aspect ratio.

2.10 Customer Management
Customer Information Management: Building Customer (suppliers, third-party service providers, etc.) information, and real-time information to add, delete, change and other operations.
Customer Relationship Management: including notification systems, complaint handling, investigation services.
Credit Assessment: the client's transactions, performing acts or services, conduct assessments, records, statistics, according to statistics of the customers were treated, including appreciation / warning, increase / decrease in purchases, cancel cooperation / service qualifications.

2.11 and internal information systems and the integration of third-party service interface
The solution provides the relevant interfaces, and internal information systems can be integrated. If the business does not establish an internal information system, the program also can be part of the function of the extension.
The program also provides third-party service interface to realize online payment, goods delivery and other third-party services.

3. Application of safety measures
To protect customers and operators of commercial interests, the solution given full consideration to the application of network security, data integrity process implementation, reliability, access control, data encryption, trusted authentication, non-repudiation. For data reliability and the legitimacy of the data source, correct the most effective means of information to encrypt data transmission. In this solution, for different users, providing different security mechanisms. The Internet for ordinary users, you can directly use SSL encryption to ensure Anquan, for this program in the advanced user, using DES and RSA combination, where the key information (such as passwords, Shuzi signatures, etc.) using RSA algorithm for encryption , the transaction data used for ordinary DES encryption algorithm. The integrity of the data achieved through the HASH function, non-repudiation of data sources and user identification by the RSA-based digital signature to be guaranteed.
Chinese business networks based PKI (public key infrastructure) security platform, using data encryption, digital signature, corporate CA certificates, and establishing a reliable network of trusted trading environment, allowing users to confirm the identity of each other, exchange product quotes, purchase orders, Delivery information and other transaction information, security in online transactions.

The solution required hardware and software environment
Hardware Platform: RS6000, Netfinity
Operating Systems: AIX V4.3.2, NT4.0 / 2000
Database platforms: DB2, MS SQL6.5/7.0
Application Platform: IBM WCS MPE, MS Siteserver Commerce Edition3.0
Security systems: IBM Fire Wall, ISS products
Network environment: the need for a dedicated connection Internet, or ISP, hosting server





相关链接:



illustrator IN the super-powerful hybrid tool (blend-3)



adobe audition runtime errors it can be FIXED



Illustrator9.0 and Golive5.0



3GP to MOV



With SNS To Create Individual Learning Ecosystem



Photoshop Rendering Realistic Beautiful Necklace



Operating principle of GRAY pigeons



Fast roaming Illustrator 10 (1)



RMVB To MP4



VERTICAL Market Apps comments



H.264 to AVI



Infomation File And Disk Management



Performance EVALUATION of 10 folly



WAP desperately short of qualified personnel



Friday, October 15, 2010

Firewoks create a broken texture


Deliberately broken objects and text on the effect of creating is a popular expression.

Let us deal with web images Firewoks, up in the simple example application to see.

Open a new file, first to draw a button.



Ctrl + Shift + D in situ clone a.




Zhang patterns online to find the material disorder picture, here we use the Zhang Marble.




Fireworks are being edited into the file.



Effect in the properties panel, press the Add button,
To two effects settings.
Brightness 50, Contrast 100;
Hue 36, Saturation 72, brightness 81, check the color of.




Multiply layer blend mode to color value.




We cloned the button will be referred to the top, and select just deal with good texture material,
On the menu select Modify -> Mask -> Group as Mask mask combination.




Now look at the results.
This is also the PNG source file, interested friends can download directly to Firewoks opening of reference.







[Next]



Properties panel on real-time effects on the two values change, you can control the damage effect performance.
Example, the following chart, we simply change the brightness to 25, the extent of the change also will accordingly.



Text can also do a similar deal with incomplete effects.
Open a new file, type, size bigger selection, made more obvious after effects.
Because the text with a white fill, so we set the background color of yellow do distinguish.




Keep up with a plan, we import the pictures to do the same stone texture.
And the effect of the property panel, press the Add button,
Two effects were set in front of the value of slightly different times, we just want to try a different color effect.
7 brightness, contrast 77;
Hue 30, Saturation 66, brightness -43, check the color of.




The text to be brought, Select both objects.



Modify -> Mask -> Group as Mask mask combination.




The mask layer into Difference between mixed-mode model, the effect came out.




At this point the document background color changed to white, the effect is even more apparent.




After all, the limited size of the text, if results do not ask, then, Firewoks own texture fill can be competent, but is more convenient.




However use of mask, real-time effects and mixed-mode layer effects to achieve broken for video editing more flexible and natural beauty.
The following is a PNG source file that contains the results of two methods (hidden layer texture fill Act), interested friends can download directly to Firewoks opening of reference.











Recommended links:



"Rise" magician / Swordsman bred Guide



Registry combat Collection - "Operation" Change Collection



"Batman Arkham Asylum" After Playing A Little Bit Of Getting



OGM CONVERTER



Advantage Of Limited Group Of Users: 2007 To See VPS Hosting



HOW to find email addresses easily



MKV to MOV



Simple Art - Screen SAVERS



Fireworks produced way back in effect



3G Operators Scramble For Promotion Blind Users Costly



The basic concepts of object-oriented



3G2 To WMV



Articles About Music Composers



The face of OOXML, how can we do?



Inventory And Barcoding Storage



e-cology in the Pan Micro Series 17



Good Terminal And Telnet Clients



Wednesday, October 6, 2010

"Six Degrees Theory" mold SNS


When Web2.0 in China, when the Internet became a fashion, SNS users in China is gradually raised and well-known, from the SNS website know like-minded friends, the online space through SNS build virtual cabin, even in the SNS line to get to know boyfriend lover achievement remote marriage ... ... but what is the SNS? To which sites can call SNS site? Internet in the field of SNS are the differences? Many people say that is not clear.

Conceptually, SNS and many Web2.0 applications like - because understanding of different construction sites are also different. SNS originated in the American social psychologist Milgram (Stanley Milgram) 60 years in the 20th century the first theory put forward by six degrees, he said: "You and the interval between any stranger who will not be more than six In other words, up to six individuals by any of you will be able to know a stranger. "

Therefore, a mainstream understanding of SNS is Social Network Sofwaret, that is social networking software, according to six degrees of theories to understand the basis of friends of friends, expand your contacts in a network software. Based on this theory of the SNS website in March 2003 happened in the U.S., after a very short period of time will be popular in North America, by many Internet companies and investors within the next two years as the fastest growing business in 2005 to get the United States TheFaceBook a 13 million yuan venture capital dollars.

Careful analysis of social network software SNS, can it is more dominant social software, social friends, more concerned about the direct relationship established with the community nature of human resource sharing between friends, there is a direct application of goal-directed in the establishment of social relations to complete the course or solve specific application problems, more focused business.

It is believed that SNS can be achieved through the use of personal data processing, personal social relationship management, reliable business information sharing, you can safely trust the people to share their information and knowledge, use trust relationships to expand their social network, reaching more valuable communication and collaboration. In the end, people's social capital to complete the accumulation of such a system to serve the future if the various social activities, will bring tremendous business and social value.

Also make an assumption on the context of Web 2.0, each user has its own Blog, maintained their own Wiki, social bookmarking or Podcast users Tag, RSS, or IM, email, etc. to connect to together, "according to six degrees of separation, each individual's social circle have been enlarged, and finally into a large network, that is social networking. "

SNS into "personal space" of the times

But almost all of the imported goods entering China, the changes or "innovation" also will bound, SNS is also true after the introduction of the Chinese Internet.

"Construction of the first online community friends, we refer to is the first theory of six degrees. From the process of human interaction, the first need to confirm that the 'people' in existence, but he needs to recognize the needs of others. But In China, the Internet, 'theory' is difficult to become a reality
. "An understanding of the Internet's" elite "from 2000, runs a community-based dating Web site, once soared in popularity, but the" virtual online world, Internet users in pursuit of a reality out of existence, entertainment and privacy more dominant. "

Construction of six degrees of theoretical guidance to the community dating site has endless, but the technical difficulties and business model have limited the development of the site, and finally the Internet winter "baptism" after running out.

"Fortunately, the theory of six degrees of superstition is gradually faded, and now more emphasis on the website, and not empty six degrees of relationship. To strengthen the long-term SNS website user, must be people-oriented, especially young people's social platform This is the Internet's objective circumstances. "FZone president Yin Hailong that the successful model of abroad, can refer to, but more to their own websites and innovative in order to meet the tide of Web2.0.

So, what is the current choice of Internet users? Simple analysis of the situation SNS dating platform, QQ QQ friends still rely on a large user base, match, and mop (2005 骞?Oak Pacific acquired UUMe) located in the dating and love between men and women, 100 million of Friends (YeeYoo) and bumper (PengPeng ) focuses on the integration of Internet and telecom value-added services.

As friends and network a single model of real-name field to slow progress on the Internet, SNS site visits and community friends can not achieve the desired amount of state, finally gave birth to "personal space" appears. South Korea's Cyworld "mini bubble nest" and the domestic FZone the mini tribe in this area is ahead.

As in the past two years, the rise of Japan and South Korea and other Asian countries, most young people love the popular Web services, the second generation of dating site "character space" similar morphological and Blog, but the emphasis is on real network of social, stress the pursuit of entertainment and interaction between people, communication.

Personality space seems to SNS and Blog, Podcast and other personalized software, and through vivid mini circle of friends expanded function rooms and the personal tribal base point, showing a rich network of personal style homes and a relaxed circle of friends. Spatial integration of personality information, diaries, music, albums, messages, friend circle function. Relying on personal space to provide a platform for a comprehensive text, audio, images, etc. related services as possible, most comprehensive show users their own perspective, and web-based virtual environment and real community networking event.

Thus, SNS spawned a new understanding - Social Network Service, the social networking service, a demand for people personalized service Social networking in the Web2.0 era heavy shine.






相关链接:



10 awesome avi mov to xvid Converter



MKV to VOB



VOB to MPG



MPEG4 to WMV