Wednesday, 1 February 2012

ANOTHER BLOG COMPETITORS


Strength: 1) Sell various types of Kerepek and innovative in change their product.
Weakness: 1) Not always updated their blog's information.
Blog Url:  http://siramarakmal.blogspot.com/2011/02/jum-jual-kerepek.html


Strength: 1) Their product price are reasonable.
Weakness: 1) They do not expand the business throughout the state.
 Blog Url: http://www.facebook.com/pages/Kerepek-RM/119717614720845?v=info


Strength: 1) Customer can get their product at a lower price.
Weakness: 1) Their blog not interesting and not coverage all state.



Strength : low price.
Weakness: not attractive, it can be good if they can change their design.



Strength: accurate information. Customer can easy to buy the product since she had put all the information needed to buy the product such as phone number.
Weakness: not regularly update.

Thursday, 26 January 2012

THE INTERVIEWS

                                 
  Assalamualaikum...(^_^). This is the interview of four people in UITM Pahang. This task is for our assignment in this blog. We are assign to ask several questions about UITM Pahang
Their opinion about UITM Kampus Jengka is ?..........

First person that we ask the question is the Gardener. The question is how the environment in this campus? His answer is : 

 We as workers are happy to serve in uitm. The situation comfortable and harmonious environment.
 


The second person is Police Assistance:
The question is how about the facilities in UITM Pahang. Is it enough or not? His answer is:
The facilities here is good and complete. All students can use the facilities without any complaint. They are lucky enough to study in here. So my advice for all students is to appreciate the facilities that uitm provide for them.


The third person is students ;we enjoyed studied at Uitm Jengka. We think it is the best and popular university among others. Futhermore, Uitm students are creative and active in all activities that provided to fulfill their time.

     - In my opinion, the atmosphere at Uitm Jengka is comfortable and clean. The environment is surrounded by flora and fauna that makes it ideal to study.

UITM JENGKA KAMPUS KHAZANAH ALAM


ADMINISTRATION BUILDINGS




KOMPLEKS SISWI





STUDY PLACE

Where students gain knowledge and practical..











Thursday, 5 January 2012

Prepare for e-business on demand.

WE all remember the days when checking one's bank account balance meant a
trip to the branch and when placing a phone call outdoors required
finding a telephone booth. Now we no longer have to worry about some
stores' business hours, the location of a phone booth or a bank branch. 
  We have come to expect and depend on services being available to us,
wherever and whenever we need them. 
  "E-business on demand" is the next phase of e-business, Companies and
organisations will move beyond integrating their various processes as
they will need to sense and respond to fluctuating market conditions in
real-time and adjust to doing business in these areas: 
  • Responsiveness: Adapt quickly to the dynamic and often
unpredictable changes in demand for a company's products or services,
availability of supplies, market trends, consumer behaviour and
competition developments;
  • Variability: Be flexible in terms of costs and processes. This
is the internal, organisational facet of responsiveness and the set of
practices and mechanisms that a business needs to deploy in order to be
responsive;
  • Focus: The ability to understand and sustain one's core
competencies and differences within the market - this is the leadership
facet of responsiveness; and,
  • Resiliency: Manage changes and threats in a reliable and
secure manner. Events ranging from force majuere or man-made catastrophes
to power spikes have become more and more part of what businesses have to
confront. This is the operational facet of responsiveness. 
  What kind of technological infrastructure does "e-business on demand"
require? In order to be successful, the on-demand environment will have
to be:
  • Integrated: Core processes - not merely computers - will have
to work seamlessly. 
  • Virtualised: Using the dormant capacity of servers and PCs
(notorious for their low percentage of actual CPU usage) will result in
virtually unlimited computing capacity, available to business processes -
this is the computing grid;
  • Open: All technologies will be able to work together. This is
the era of open standards and architectures: Linux, XML, Java and Web
services; and,
  • Autonomous: The complexity of this infrastructure will require
a new method of management and support, very much like how living
organisms self-manage their physiological functions. The infrastructure
components will have the ability to autonomously detect, fix and manage
problems in their own "body", with no human intervention, and without
affecting the functions that support business processes.
  So, there has never been a better time to go into computing. There is
no sign of any decrease in the demand for IT skills.
  Internet networking and communications remain a current boom area. 
  The best courses should include the basic science of computing. These
are skills that will never become outdated regardless of how the industry
changes.
  Contact Olympia College for course details in Information Technology or
Business Studies and other courses in Hotel Management, Secretarial
Studies, Accounting, pre-university matriculation programmes and English
at 03-20503638 (Kuala Lumpur), 03-7955 8868 (Petaling Jaya), 04-658 4868
(Penang), 07-2233868 (Johor Baru), 09-5177868 (Kuantan) or 05-243 3868
(Ipoh). 
 
 Reference: 
Prepare for e-business on demand. (2005, May 1). New Straits Times.

The Internet has eroded our privacy


IF you came to this column via the Internet, be assured that your visit
will be recorded, stored and retrievable in all its glorious detail - from
the number of times you visit this site to the number of minutes you
linger here.
This will happen to you wherever you go in your cyberworld.
If then, you arrived here on the back of your Mozilla Firefox browser,
Firefox has very kindly given your location to websites that requested it.
This is done through a default in your browser that can be deactivated
by you - if you were aware of it. But how many of you did know?
Not many I bet, but the question that nags me is why do they make it a
default rather than an opt-in feature in the full glare of publicity?
Let's imagine that you have just landed on a website and your host asks
Firefox, your browser, where you are.
This is what Firefox says about their "location aware" browser plug-in:
"Google Location Services then returns your estimated geolocation (e.g.,
latitude and longitude) ...The information is exchanged over an encrypted
connection to protect your privacy.
"Once Firefox has your location information, it passes it to the website
that requested it."
You're on Firefox, right, but why did you see Google up there?
Yes, you did, and Firefox and Google are a gaggle of blood brothers,
let's say.
The aim for this intimacy is purportedly to make browsing more
efficient, and more efficient means all the Big Brother implications that
sail with her.
Get a friend to try this game on Google, your trusted search engine
people.
Take a topic in common and search the subject on your separate computers
and take a snapshot of the result.
You will find that you will have two different screen pictures.
The reason this is so is because Big Brother thinks he knows you and
will therefore tailor your results to what he thinks will suit you best
interest.
To do this they will have kept a record of your past browsing, past
searches, and God knows what else that has happened between you and them
in the past that is now securely kept in their records to match your
virtual personality.
This is just one way the Internet has eroded your privacy and how it is
probing -- ever more deeply -- into who they think you are.
As my friend Azwan is fond of saying about this planet we're in, this is
a Scary Mary world.
And thank you Azwan, I've just violated your privacy, but in that I'm
sure I'm not the first to be there.
If you have been Scary Marying in your emails, the email service
providers will have noted this usage many times a long time ago.
And someone selling a product named or even vaguely connected with Scary
Mary will soon be emailing you or putting a pop-up note on your computer
screen somehow.
The clear irony is that the Internet, where great debates are being
waged about freedom and privacy and your right to be yourself, unmolested,
is also the place where secrets about yourself are most easily available.
Take Facebook, for instance, that great marketplace in Cyberia where you
let your hair down and tell all and reveal all.
Facebook's privacy policy is a very interesting read with enough
material to raise your hackles.
And oh, of course there's an opt-out button available.
So when was the last time you read what Facebook has to tell you about
their use of your personal information?
And how many Facebookers really know how to opt out even if they want to?
And even if you want to die on Facebook it may prove to be well nigh
impossible.
Those who have deleted their accounts merely become old soldiers of
Facebook, and as you know, old soldiers never die, they just fade away,
with Facebook lumbered with their personal details in a place where their
pet habits and address and proclivities are preserved for ever more.
Mark Zuckerberg of Facebook may have said that privacy is a thing of the
past but many of us still want to keep details about ourselves to
ourselves in this snoopy-doopy world.
In the latest development, Facebook has introduced face recognition
software that is even now studying all those photos you have posted and
putting names to facial features that will one day mean something
sensational.
You may fancy a lass and take her photograph and send it to Facebook,
and you may be rewarded with details like her name, address, likes and
dislikes and a few other things she may not want you to know.
Data harvesting on the Interent is a real preoccupation of real people
with different reasons with viewing glasses of many hue.
Last year, a Canadian security consultant broke into Facebook and stole
information from 100 million users.

Wan A.Hulaimi.(2011 JUN 19).The Internet has eroded our privacy.The New Strait Times.
IN this Internet era, communication travels fast and wide. Thanks to social media, people no longer rely solely on email to send or receive news, gossip, photos and videos. However, from time to time, the email contents and information shared in the social media are malicious in nature and touch on the sensitivity of certain individuals, ethnic groups or religions. It is also improper to share photos or videos of people who killed or injured. While some may share them for the purpose of reminding others about certain issues, many actually see them as a form of entertainment. Sharing as such is not only unethical, but also an invasion of privacy for those concerned and their families. Imagine how the families must feel when the photos or videos of their dead or maimed loved ones are distributed over the Internet. There are also instances when photos and videos may have leaked out from journalists and the police. More care should be taken by these professionals to protect them, so that they are not circulated to the wrong people. Use email and the Internet wisely. Respect other people. Even more so, respect the dead, too. Don't do unto others things you don't want others to do unto you and your families. 


RERERENCE : 
Abdun Nizar Ahmad.(2011,November 15).Be more responsible and respect privacy.New Straits Times.

MANAGING LEGAL RISKS IN E-BUSINESS.
ANY enterprise involved in business typically encounters different typesof risk in its daily operations. These include credit risks, technologyrisks, market risks and legal risks. As professional service providers, lawyers offer legal risk managementadvice to businesses as one of their core services. But being driven bycost-saving considerations, businesses (whether "e" or brick-and-mortar)tend to be reluctant users of such risk management services until majorlegal problems arise. This reactive mode of legal risk management thendrives the business process, resulting in, more often than not, highercosts. All businesses want to deepen their overseas market share, but most tendto be uncertain about their legal rights in foreign jurisdictions. So, howbest does one manage one's legal risk exposures in foreign jurisdictions? For an enterprise venturing overseas for e-business, the legal minefieldcan be boggling. Not only do you have language and cultural barriers, themyriad of differing and often immature laws and regulations governing e-business also present tremendous challenges. There are essentially two types of legal risks that flow from theconduct of e-businesses: direct and indirect consequences. The direct legal risks involve potential liabilities in relation to: * compliance requirements at the regulatory level, both at home and inforeign jurisdictions with regard to the legislative and regulatoryenvironment; * contracting parties (breach of contract); * third parties (for example, violation of intellectual propertyrights); and * the enterprise's employees in their dealings with third parties whichmay lead to potential liabilities for their employer. The indirect legal risks, in turn, are those risks that flow fromtechnical risks such as: * poor system design or architecture that may result in system failure,which could lead to potential legal liability for the software developer,for instance; * computer viruses which may cause the whole network to collapse,leading to legal liabilities for service providers; and * intrusion by hackers and other criminal activities such as theft orcorporate espionage which lead to potential legal liability for bothservice and content providers. Thus, businesses need to manage their legal risk exposures in astructured and proactive manner. Structured risk management is a processof identifying and managing legal risk exposures and taking proactivesteps within a clear framework to avoid and/or minimise the aforementionedforms of legal risk liabilities. First, the enterprise must determine the awareness level at both theinstitutional (corporate) and personal (employee) levels. Second, a legal risk audit should be carried out across the enterprisecovering every aspect of corporate work. These include reviewingdocumentation, seeking legal advice confirming compliance with prevailinglaws and regulations, and reviewing of corporate e-policy. Third, there has to be a risk management framework at the enterpriselevel. This framework should determine the programme and methodology forproactive management of such legal risk exposure. It must determine theacceptable level of risk tolerance and should include the tools as well asthe system for management and decision support. And finally, there has to be systematic review. The risk exposures mustbe identified carefully and evaluated by senior management together withthe guidance of legal counsel. * The writer is a technology lawyer and author of E-Security Law &Strategy. He is a visiting associate professor at a local university andan associate fellow at the Centre for Asia Pacific Technology Law & Policyin Singapore.

Reference:
Zaid Hamzah.(2005, September 15).New Straits Times.