An example of an organization that has utilized client management tools is Microsoft Corporation, which specifically subscribed to FullArmor and DesktopStandard so that administrators of computer systems (i.e., users) can "manage, customize and lock down desktop and server settings based on a set of policies maintained...The policies...can prevent users from changing settings and can disable services such as USB ports to prevent use of removable storage devices" (Fontana, 2005). Through client management tools, Microsoft was able to maintain its own system its employees as well, wherein any security breach or unauthorized retrieval and use of company information are prevented by having the tools that is exclusively for the company's use only.
In addition to contact center management and client management tools, identity management tools are seen as another emergent technology that avoids, among other things, password and information theft, two of the most often committed technology crimes, either through the Internet or the computer system itself. A specific identity management tool is the network access control (NAC), which, in the case of Microsoft and Cisco, is created through a fusion of the companies' two forms of NACs. The merger of these NACs includes tools such as up-to-date patches, antivirus systems, and spyware signature, among others (Fontana, 2006).
Related to the technology of identity management tools, Yahoo's anti-phishing service is most relevant to Internet users who have been victimized by identity or password thefts. Phishins is an online security problem that is commonly experienced by users who have disclosed confidential information through the Internet. Phishing operates by "tricking" people into entering a web site, and gets the "sensitive information" disclosed by the user after entering the site (Perez, 2006).
One apparent characteristic among these technologies is their being integrative -- that is, each technology is actually a system of improved tools wherein customers or clients can take advantage of the systems multi-functionality and flexibility. Apart from their functionality and flexibility as computer system tools, the contact center management, client management, and identity management are examples of how computer systems are...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now