Sunday, October 31, 2010

The Smartphone's Coup Others Product and It Technology Because of Information Technology


The Smartphone's Coup Others Product and It Technology Because of Information Technology

Smartphone’s and element of Smartphone may be thought of as handheld computers integrated within a mobile telephone, but while most feature or element of the phones are able to run applications based on platforms such as Java ME, a smart phone allows the user to install and run more advanced applications based on a specific platform. The one thing certain about technology is that something better is always on the horizon alike a Smartphone’s. Some technologies, such as the landline telephone, evolve. Others, like the telex machine, just go away. The issue here, whether old tech never fades away or it just dies?

Before we look into a deep of how the Smartphone’s plays it game changers, we observe firsts the others product or technologies are alive and kicking but some people wish were dead. Some example here such as Point and shoot digital cameras Smartphone’s are having an effect on the point and shoot market as greater numbers of people leave the camera at home in favor of posting quickly to the Internet or e-mailing a photo to friends. Jordan Selburn, an iSuppli analyst, says “the low end camera market is already getting squeezed”. Some claim that point and shoot cameras are already obsolete, but the optics on Smartphone’s just aren’t there yet. There’s no question that a lot of people are just happier using their phone.

The second product such as Consumer Video Cameras, Smartphone’s are rapidly eating into the Consumer Video Camera market on one side, while SLR cameras with HD capability are slicing off the other side. The main mechanical question that remains is optics. Phones are still stuck on digital zooms and tiny lenses. Battery power is also a problem. We can almost see people buying these devices for no other reason than carrying a spare battery. But as battery power and storage capabilities get better for phones, owning a Smartphone with HD video and, say, a digital and video will be not practical now days.

The third product we look at personal digital assistants (PDAs) which are already dead. If we compared to the Smartphone advance technology it has a lot of function and application, the PDAs just an organizer even if you had it, you still needed a computer to send an email or use community site such as Facebook and a phone to make a phone call. Don’t even try using the Internet on PDAs it’s a terrible experience. While using Smartphone we are able to use both the internet and make a phone call.

Variety of Application In Smartphone


Indeed, Smartphone’s could change the items we put in our pockets before work such as keys, money, and credit cards. And many single use devices that have revolutionized life in the last few decades are bound for the landfill due to Smartphone’s such as MP3 players, cameras, PDAs, dash mounted GPS systems. It was answer the issue where by the old technologies with single function will die and fades.


Now after we observe the above three product and it technology we will think how do we ensure that the new systems or technology we are buying won't be outdated within months of installation? The reality and fact here all the technologies are depend on a variety of factor and environment. As we know in this decade Information Technology gives a huge consequence toward the product and it technology. From the current vantage point, it appears the smartphone is one of the game changers after community or people now emphasize on Information Technology (IT) which Smartphone help people function better and able to provide all application in IT such social community network Facebook, Yahoo Messenger, Email, YouTube, Wikipedia and etc.

Looking ahead, more game changers are in store, though when we look too far ahead it's hard to see beyond the peak of inflated expectations. Nearing those heights are technologies at least five years out, including 3D printing, mobile robots, and a wide variety of "human augmentation" techniques to help people function better. For the time being, we'll stay away from predictions on those fronts with follows by many old product and technologies will dying due to the Information Technologies Improvement.



Published by : Mohd Abidzar Zainol Abidin ( 2009901051)

Negative Impact of Online & Video Gaming


Assalamualaikum…. May all of us being blessed by Allah.
I would like to share with all of you about the negative impacts of online or video games that can easily been accessed and I am sure that all of us had tried any of it before. For example The Sims, Diner Dash and Facebook also do provide online games such as FarmVille, Fishville & Mafia Wars.

Online or video gaming has emerged as a popular and successful source of entertainment and play for people of all ages with different background, from students, housewife, husbands, mothers, officers and many more. It refers to the games that are played over some forms of computer network, typically on the internet. These games are played online, in which you can connect with multiple players. It is normally platform independent, relying on the web browser and appropriate plug-in.


It is one of the best inventions that are made ever by human beings. It has the ability to link players together. It has been one of the most popular activities in entertaining for younger people. Because of this, almost everybody is into it. It is fantastic characteristic makes a lot of players become hook on it. It provides entertainment and at the same time, online socialization with different kind of people. But sometimes, it causes negative effects. It has two kinds of impacts: the good and bad. It depends on the player itself.

Studies show that online or video gaming is a major source of addiction. Because of its ability to link multi-players together, most of the players become hooked on it. They keep on playing and playing because it gives them thrill until it becomes an addiction. There is also an issue of wife or mother did not cooked for her family because of too addicted playing FarmVille on Facebook.


Moreover, most of the bad effects of these games are blamed on the violence they contain.  Children who play more violent online or video games are more likely to have increased aggressive thoughts, feelings, and behaviors, and decreased pro-social helping, according to a scientific study (Anderson & Bushman, 2001).  The effect of this type of games violence in kids is worsened by the games’ interactive nature.  In many games, kids are rewarded for being more violent. The act of violence is done repeatedly.  The child is in control of the violence and experiences the violence in his own eyes (killings, kicking, stabbing and shooting).  This active participation, repetition and reward are effective tools for learning behavior.  Indeed, many studies seem to indicate that violent video games may be related to aggressive behavior (Anderson & Dill, 2000; Gentile, Lynch & Walsh, 2004).


Furthermore, academic and work achievement may be negatively related to over-all time spent playing those games. Studies have shown that the more time a kid spends playing video games, the poorer is his performance in school (Anderson & Dill, 2000; Gentile, Lynch & Walsh, 2004).


There are many other negative impacts caused by online and video games so, we must be able to control ourselves and not let the games control us or we might end up be part of the games.

References:
  • http://www.raisesmartkid.com/raise-smart-preschool-kid-articles/the-good-and-bad-effects-of-video.html
  • http://www.pamf.org/preteen/parents/videogames.html
  • http://www.buzzle.com/articles/negative-effects-of-video-games.html
  • http://portal.acm.org/citation.cfm?id=1385695.1385806

  


Maizura Bt Alias (Mai Alias)
2009762975

AntiVirus!!! Is it really important????

Owwhhhh!!! Owhhhh!!! Have you experience your PC, NOTEBOOK even your HANDPHONE being attack by the virus???? Is it actually a virus or just another application that been detected as a VIRUS????

Well the reason I choose this topic because I HAD EXPERIENCED this!! say it out loud " MY NOTEBOOK , PENDRIVE even my HP being attacked by the virus!! ". For ages, since I learn how to use notebook I never ever been attack by the virus. Only this semester it comes and hunting me... Now i know how does it feel when my friends told me that they have to format their notebook, do this do that, bla bla bla.... Maybe some of you may say this topic is outdated but I need to stress out the importunates to have an original antivirus. Its true when people said, prevention is better than cure. I totally agreed and admit it.

It all happen when I started to plug in my pendrive into our lovely computer at computer lab. hihihi..Lovely!! Since that our official class for this semester.. Hopefully we will get better and conducive class for next semester.. AMIN.. eh eh eh..Back to the topic... Continue... It happen when all of us been superb busy with our assignment... DATELINE!! All reports need to be submit!! Sad crying heart Only that i realize, my antivirus already out of date. No protection for my notebook and I'm open for being attack by the ad ware, spy ware and all sort of virus.

The next step is to do some research and study about latest anti virus. Some said KASPERSKY is the best option for now.. But as a smart buyer, I need to consider another options. Well, there are tons and tons of anti virus in the market and some of it, I does not even aware about their existent.Shocked heart

And finally, after I made a comparison, and get financial approval from my Lovely Daddy, I choose Norton Internet Security 2011. The reason is because, it include all the packages and this what i looked forward. Their latest technologies and upgrade version includes the :

  • Antivirus
  • Antispyware
  • Anti Rootkit
  • Smart Firewall
  • Network Monitoring
  • Parental Controls
  • Norton Safe Web
  • Professional- Strenght AntiSpam
  • Identity Protection

Others additional information: Norton Internet Security 2011 comes with system requirement and customers need to check your notebook compatibility.

Here are the system requirements:

  • Microsoft® Windows® XP (32-bit) with Service Pack 2 or later Home/Professional/Media Center
  • Microsoft® Windows Vista® (32-bit and 64-bit) Starter/Home Basic/Home Premium/Business /Ultimate
  • Microsoft® Windows® 7 (32-bit and 64-bit) Starter/ Home Basic/Home Premium/Professional/Ultimate
  • Minimum Hardware Requirements
    • 300MHz or faster processor
    • 256MB of RAM(512 MB RAM required for Recovery Tool)
    • 200MB of available hard disk space
    • CD-ROM or DVD drive (if not installing via electronic download)
  • Browser support for Vulnerability Protection and Phishing Protection
    • Microsoft Internet Explorer® 32-bit 6.0 or higher (32-bit only)
    • Mozilla Firefox® 3.0 and later

So people, I would love to remind all of you about the importunates to get an antivirus! Highly recommended Norton Internet Security 2011 at the recommended price RM108.99.

SO PROTECT YOUR PC!! It will save cost to re-format and save your energy to re-do all your works!! PEACE people!!

Prepared by:

Norfa'izah Binti Safaruddin
(FIZIE)
2009559995

Lets Make Money Through Blogging

Blogging....I started out blogging in January 2009. It was only almost 2 years ago? I thought it had been few decades haha. Back then it was the times where what your friend do and have are what you yourself should do or have. Weird is it? But life is all about competitions and rivalry. You can have it? Well so do I (I sound evil now don’t I hmm). I myself at first use blog as my own personal diary. Well not that personal actually and I remembered my 1st post was just me bragging to my friends that I’d also manage to have my own blog. That’s all.

Well my blog is basically bout me, me, me, the stuff I did, my friends, my family and not to forget my so called lovey-dovey life. Ahaha but basically it’s just about me. Okay enough. What I’m trying to highlight here is about blog, blogging and how we can make money out of it. Something that not only you can consider but also I myself should think about instead of just blogging I could make some money out of it right?

What actually is a blog? Blogging actually comes from the word web log. Remember Dr. once told us about this term? Haaa, kantoi if you don’t remember (hmm no wonder she said if we had final exam most of us will fail including me miahahhaa). Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Through blog we are able to share things like our thoughts, pictures and videos of our own and others that become the blogger subject of interest. Did you guys know that as of December 2007, blog search engine named Technorati tracked more than 112,000,000 blogs? Can you imagine what’s the figure is now? Goshh the figure is so huge and just imagine having millions of diaries falls on your head and I’m sure we’ll be dead crushed by tons of diaries haha. Okay back to reality now, blogging in Malaysia become known to public even more due to the case of Raja Petra (the writer of Malaysian Today) for his controversial entries in his blog. He’s into politics but not me hehe. The trend further increase and we can see more and more blogs emerge day by day but however not all succeed in making it a successful way to make money.

Using blog as a medium to make money not only just through selling products and services but we can also make money through advertising, affiliate marketing, selling or flipping blogs and also through other indirect methods such as growing offline business, syndication and job hunt. There a multiple streams of income and a famous saying state that we should not put all egg in one basket then therefore bloggers should also think about other available options for its income stream. According to stevepavlina.com, the author states that there are six different streams of income which includes:

make-money-online-bag

  1. Google Adsense ads (pay per click and pay per impression advertising)
  2. Donations (via PayPal or snail mail — yes, some people do mail a check)
  3. Text Link Ads (sold for a fixed amount per month)
  4. Chitika eMiniMalls ads (pay per click)
  5. Affiliate programs like Amazon and LinkShare (commission on products sold, mostly books)
  6. Advertising sold to individual advertisers (three-month campaigns or longer)

 

The image below mirror the ways that blogger can make money through blogging. Click image for larger view

However, a poll was also conducted at ProBlogger which asked readers if they make money online from sources other than blogging. The result shows that 50.22% responded that they make money online from non blogging sources. All of this indicates that there are so many means of making money from blogging itself. We already know what can be done to create income from blogging now the focus is on how to attract traffic or readers to our blog. Why is traffic important?  It is simply because for most methods of online income generation, the traffic represents our income. Simply saying that by doubling the traffic to the blog, blogger will most probably doubles his or her income assuming that the visitor demographics remain fairly consistent. Having sufficient traffic the realistic worst case is that you’ll eventually be able to monetize your web site via trial and error as long as you keep those visitors coming. Traffic is the primary fuel of online income generation and having more visitors means there will be more ad clicks, more product sales, more affiliate sales, more donations, more consulting leads and others which will leads to income generation.

It may be easy to start a blog but how good should a blog be in attracting readers that will contribute to the account streams? Here's the tip that I manage to get from few great sources:-

  1. Create valuable content.
  2. Create original content.
  3. Create timeless content.
  4. Write for human beings first, computers second.
  5. Know why you want a high-traffic site.
  6. Let your audience see the real you.
  7. Write what is true for you, and learn to live with the consequences
  8. Treat your visitors like real human beings.
  9. Keep money in its proper place.
  10. If you forget the first nine suggestions, just focus on genuinely helping people and the rest will take care of itself.

So now you have almost all the necessary information to make money out of blogging. As easy as that and what we all need now is some effort to make it happen and succeed. Keep the money coming guys. Have fun with blogging and Good Luck!

 

..:: MONEY, MONEY, MONEY..ALWAYS SUNNY..IN THE RICH MAN’S WORLD ::.

 

REFERENCES :

http://en.wikipedia.org/wiki/Blog

http://www.problogger.net/moneymap/

http://www.stevepavlina.com/blog/2006/01/how-to-build-a-high-traffic-web-site-or-blog/

http://www.problogger.net/archives/2008/10/29/how-bloggers-make-money-online-without-blogging-poll-results/

http://ezinearticles.com/?16-Ways-to-Drive-Traffic-to-Your-Blog&id=22928

http://ezinearticles.com/?The-Five-Things-to-Do-to-Make-Money-Blogging&id=5287856

http://www.stevepavlina.com/blog/2006/05/how-to-make-money-from-your-blog/

 

PREPARED BY :

 

NUR HANEE MOHAMAD

2009703549

P1080385-1

 

WILL GPS SATELLITE SYSTEM FAIL??

Nowadays, GPS satellite system (Global Positioning System) is one of important technology that we all know and needs. Mostly when we talk about GPS people will talk about map or route. Currently, in Malaysia GPS satellite system is still new to our people. Only few past year ago that we know about the existence of GPS satellite system. From the research done, GPS satellite system was exist about 20 years ago when the first satellite launched by the United States. As we can see today, people use GPS satellite system to find direction whether use the mobile phones or the GPS navigation system such as Garmin or Papago that is currently sell in our market. Some of the weaknesses of GPS was it could not navigate us when we stay in the building or at the enclose spaces. But do you know that sometimes even we stay in an open place, our GPS navigation may not give us the right direction. How can this be happen? The answer for that GPS satellite system was at the maturity stage or decline stage.
From the report last year, the government of the United States said that the worldwide network of satellites that constitute the Global Positioning System (GPS) might be fail by the year 2010. This system might be failed because of mismanagement and a lack of investment. The first satellite that was supposed to replace the 20 years old system was scheduled for launch in year 2007 but it still not be ready until now. Experts still cannot give any details on whether the satellites that are in orbit today will keep the GPS running efficiently until its replacements will be ready. A study conducted by the United States government accountability office (GAO) states that Satnav system might be fail by 2010. As a result for that, the system has already shown its side effects by showing the wrong direction to 1 in 3 motorist that stuck in unusual place or dangerous place.
This signals sent by the network of GPS are monitored by United States Air Force. Due to fact that the United State Air Force did not succeed in keeping the system up to date, it was highly criticized by the United Stated government accountability offices in one of its reports. Despite the fact that Air Force spend over $2 billion in order the system running properly, the GAO stated that the regular delays along with overspending could lead to the failure of the entire system. Furthermore, the report also said that it is uncertain whether the Air Force will be able to acquire new satellites in time to maintain current GPS without interruption.
If this GPS satellite system fail, it will bring to more complicated process and harsh consequences including problem linked with national security and defense. In terms of national security and defense, GPS satellite system play a major role in order to coordinate their army or troops. Moreover, GPS satellite system also been use to map and track enemy target. Moreover, a country such as United States and Russia use the GPS satellite system to collect valuable information such as the new weapon development or new energy places. All this information is importance to ensure their power and control over the other countries.
In addition, besides providing drivers the right direction, the GPS technology allows tracking offender’s location using electronics tagging devices. As a result, if this system fail, it will bring a major problem or negative effect not only to an individuals, groups or corporation but also the country national security and defense.
PREPARED BY : AMIERUL AAZ (2009191757)


BlackBerry: Consumer Privacy Vs. National Security

Blackberry Overview

Blackberry is a line of smart phone developed and designed by a Canadian Company called Research In Motion (RIM), Research In Motion is a Canadian telecommunication and wireless company best known for its smart phone Blackberry, its headquarter is in Waterloo, Ontario, Canada, and the Founder is Mike Lazaridis who is currently serving as a co-CEO of the company, the Company is best known for its innovative smart phone device called Blackberry which function as a messaging phone, a personal digital assistant and as entertainment device.

The Blackberry is well-known for its ability to Push Internet email wherever mobile network or Wi-fi is presented, it also allows push Facebook and MySpace notification, push EBay, and push instant messaging with Windows Live Messenger, Yahoo Messenger, and Google Messenger, the operating system used by the devices is a proprietary multitasking environment developed by the RIM, the phone data is compressed through Blackberry Internet Service (BIS), which allows the POP3 and IMAP email integration for individual users, it also allows for the function of push capabilities for various Blackberry applications developed by RIM or third party developers. The phone comprise all the popular applications including Facbook, Messenger and many others. Its really an amazing device.


Blackberry newer devices uses the Blackberry Messenger application which allows instant massages to be sent internationally, the software allow instant massaging sending and receiving via Blackberry PIN. Hence is an eight character hexadecimal identification number that are assigned to each Blackberry phone device, these eight PIN numbers cant be changed manually by users and serve as an identification number for each device. The Blackberry Messenger allows the exchange of instant massaging, personal information, pictures, and personal status. It allows users to connect to other Blackberry users around the world exchanging in real-time instant massages, pictures and GPS location. The blackberry uses high level of encryption for all its push function such as email, instant massaging through Windows, Yahoo, and Google Messengers that prevent any access by any other party. The Blackberry Messenger is using high level of encryption where massages send to other Blackberry devices encrypted when users send it and decrypted when other Blackberry receive it through the Blackberry PIN, and all data is routed to RIM servers in Canada. The Blackberry Messenger is the most poplar Blackberry application by young users because of its ability to able users to communicate with other Blackberry users around the world.
Consumer Privacy Vs. National Security




Many countries around the world have expressed their concerns about Blackberry functionality. These countries have expressed there reservation about Blackberry Strong encryption and the fact that all data of Blackberry is routed to RIS servers, which not enable local governments to track or monitor these data and the possibilities of terrorist attacks. Also these servers are based in RIS Canada which in fact are out of these government Legal Jurisdictions.
However these concerns have escalated into the threatening of total block of all Blackberry service. United Arab Emirates, Saudi Arabia, and Bahrain have recently threatened block all Blackberry services in there countries, as they view these services as a national security threat, they also announce a deadline for Blackberry to hand out the encryption's keys that able them to monitor all communication through Blackberry. Addtionally India have risen the issue of Blackberry national security threat as it afraid that domestic and foreign terrorist will use these technology to coordinate their attack on India, India recently announced that they were able to crack the encryption of Blackberry however they still face difficulties to crack all Blackberry encryption's. According to Blackberry announcement regarding its security issues it stated that it values consumers privacy and it will work towards that goal. Blackberry announced that it will not make country-specific deals as it attempts to work with government threatening to block its services. However the Blackberry is in a continuous negotiations with these government in order to resolve the issue without compromising consumers privacy.

The question here is: Which is more Important, Consumers Privacy or National Security?. the issue is more complicated than it seems, with the risen of more sophisticated terrorist attacks by using latest technology have risen the concerns about the misuse of technologies by terrorist, therefore we have to establish a countermeasures in order to prevent terrorist from successfully delivering an attack. I think we should all put some compromises in order to prevent these terrorists attacks and these compromising will be for the greater good. What do you think?
References
http://mobileactive.org/blackberry-messenger-ban
http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-security-vs-consumer-privacy/5732
http://blogs.thenational.ae/beep_beep/2010/08/full-rim-customer-statement-on-blackberry-security-issues.html
http://docs.blackberry.com/en/admin/deliverables/7325/BlackBerry_Enterprise_Solution_security_834422_11.jsp http://en.wikipedia.org/wiki/BlackBerry





Created By
MOHAMMED ABDULRAHMAN SHARAF AL-KEBSI
2009744857

Open Source Software in Malaysia

In the world of IT, there are two types of software; Open Source Software and Proprietary Software. Open Source Software is defined as software where the source code (files used to construct the software in the first place) is available to public users so that they can study it, change it, and write enhanced versions of it. Open Source Software is free for use and redistribution. Examples include OpenOffice, Linux and Firefox. Proprietary Software is computer software licensed under exclusive legal right of its owner. The purchaser, or licensee, is given the right to use the software under certain conditions, but restricted from other uses, such as modification, further distribution, or reverse engineering. The prominent example is the world-dominating Microsoft.

I was quite surprised when I stumbled upon an article by Hazel Hassan Hisham entitled “The Rise of Open Source Software” published in the August 1st – 15th 2010 issue of Malaysian Business. The article highlights on the increasing adoption of Open Source Software at the Malaysian public sector. Yes, our government is adopting Open Source Software! Can you believe that? All this while I thought that our government uses proprietary software, and well, absorbs all the license fees that come with them. The fees should have been peanuts compared to the millions if not billions of Ringgit in taxes collected every year.

The government had launched an Open Source Software (OSS) Master Plan in 2004 which was aimed towards expanding the adoption of OSS in the Malaysian public sector. This master plan is supervised by Malaysia Administrative Modernization and Management Planning Unit (MAMPU). MAMPU established Open Source Competency Centre (OSCC) to support the implementation of the OSS Master Plan. The OSCC’s role was to be the single reference centre to lead, guide, facilitate, coordinate, and monitor OSS implementation in the Public Sector. The statistics are certainly impressive:

Year

2003

2004

2005

2006

2007

2008

2009

2010

No. of agencies

25

51

92

131

163

354

691

703

Source: OSCC statistics, July 2010.

As of July 2010, a total of 730 or 97% of government agencies have adopted some form of OSS solution. About 87% are using it for back-end infrastructure (Linux & MySQL), and 66% are using OSS on the desktop (via OpenOffice and Firefox). The adoption of OSS over the last 6 years had enabled the government to save a massive RM188.39 million on software licenses. In addition, several studies and surveys on OSS initiatives conducted by international business organizations showed Malaysia earning prominent standings. USA Georgia Institute of Technology OSS Index Survey (2009), Government Policy category: 12th. United Nations e-Government Web Index Survey (2008): 17th from a total of 192 nations. At the community level, increased participation in OSS is evidenced from the increasing number of vibrant local OSS communities such as OSDC.my, FOSS.my, PHP.net.my and Ubuntu-my.

I think this issue is important for us who are going to be managers in the future, as our beloved Dr. Madziah always say. The savings on software license fees would certainly have positive financial impact on companies, even more so for SMEs and start-up businesses. The savings can then be reinvested at other areas. The only stumbling block is that a majority of us grew up using Microsoft and might feel insecure to use OSS. In my case, I had used Windows 3.11, 95, 98, ME, XP, Vista, and Seven yet had never used nor seen a Linux OS. At the organization level, this mental stumbling block can be addressed through continuous education, cultural adaptation, and re-skilling to embrace Open Source. Furthermore, OSS nowadays is on par in terms of user-friendly and functionality compared with the proprietary software. On a personal note, I think Mozilla Firefox and Google Chrome are much more user-friendly and customizable compared to Internet Explorer.

Talking about alternative, we have our national illegal software vendors and we can download cracked copies of proprietary software through online peer-to-peer network. However, these illegal copies pose serious reliability and security risks. The software may crash, causing data losses, or may be vulnerable to attacks by Malware, Virus, Worm, Trojan horse or Botnets, and at worst vulnerable to hackers that steal private data. At the enterprise level, these would have very serious consequences. For example, in January 2007, TJX Companies reported data from 100 million credit and debit cards had been stolen by hackers starting in July 2005. Consequently, tens of millions of dollars of fraudulent charges were made on the cards. The estimated total cost of data breach was estimated at a whopping $197 million.

One of our national illegal software vendor Examples of peer-to-peer networks

In sum, as we look to embark into the future as business leaders, we should seriously consider adopting Open Source Software at the enterprise level as a financially beneficial alternative to proprietary software or Microsoft. The cost savings may well be a competitive advantage to our company.


Kamarul bin Amirudin (2009416582)


References

Hazel Hassan Hisham (2010). The Rise of Open Source Software. Malaysian Business, August 1st - 15th 2010. Section mb-e p. 1 - 5. Berita Publishing, KL.

Open-source software. (2010, October 20). In Wikipedia, The Free Encyclopedia. Retrieved 14:19, October 31, 2010, from http://en.wikipedia.org/w/index.php?title=Open-source_software&oldid=391827383

Proprietary software. (2010, October 29). In Wikipedia, The Free Encyclopedia. Retrieved 14:23, October 31, 2010, fromhttp://en.wikipedia.org/w/index.php?title=Proprietary_software&oldid=393637901

Turban, E. and Volonino, L. (2010). "Chapter 5: Securing the Enterprise and Business Continuity". Information Technology for Management. International student version, 7th edition. John Wiley & Sons Inc. P.152 - 196.



No More Long Queues!! It's Time for RFID..

Have u faced the situation where you should make a long queue to make a payment when you shopping in the retail shops before? Are you often shopping in any retail shops during peak seasonal day like Hari Raya or public holiday? If yes, you might faced with a situation where you should make a long queue to make a payment right? These situations often happen especially during peaks seasonal days like Hari Raya or Chinese New Year and also during public holidays. Even though the retail shops have more than 10 counters but it still not help to reduce line of sight at cashier counter. Its take a longer time because the cashiers need to present the bar code of each product that customers buy one by one to a laser scanner.

This situation already happened to me during last Ramadhan, whereby I need to make a long queue to buy a few things that took more than half an hour of my time in MYDIN wholesaler. I believe that everyone outside also often face with this situation before and they might agree with me if I say that this scenario make us boring, wasting our time and spoil our shopping mood. Sometimes we will decide to change to shopping in another shop if we see there is a long queue in cashier counter. The retailers should take an action to overcome this bad situation and give better customer services if they don’t want this scenario harm their company profit. That’s why I think it’s time for MYDIN and other retail industries in Malaysian change their traditional methods from bar code to RFID tags. Why RFID? It because RFID give many benefit in retail industries but what I want to highlights here is benefit of RFID in improve customer services and as a way to overcome above problems.

What is RFID?
RFID or Radio frequency identification is an automated data-collection technology that enables equipment to read tags at a distance, without contact or direct line of sight. RFID uses radio frequency (RF) waves to transfer data between a reader and an item that is to be identified, tracked, or located. In its most basic form, an RFID system has two components: tags and readers. A tag (also known as a transponder) consists of a microchip that stores identification data of the item to which it is attached and an antenna to transmit this data via radio waves. A reader (also known as an interrogator) sends out a radio signal and prompts the tag to broadcast the data contained on its chip. The reader then converts the radio waves returned from the tag into digital data and forwards them to a computer system. A reader can scan an area for any tags that are tuned to the same frequency as the reader.

Why RFID Tags Over Bar-Code?
I’m suggest RFID tags rather than bar code because the best advantage that RFID have over bar code systems is its ability to read without line-of-sight. As we all know from shopping in retail stores, bar codes must be directly presented to a laser scanner in order to register. Staff or cashier must turn products around and hold the bar codes, flat and clean, up to a reader. With RFID, scanning of products requires none of this whereby the products only need to be brought within the appropriate distance of a reader. Can you imagine, it look like the future shoppers will walk through checkout lanes (or arches) to registering their purchases and payment instantly without wait in line or interact with cashier. It will give better shopping experience to the customer.

RFID tags also hold more data than bar codes. Whereby, RFID tags are capable to carrying more than 64 bits of information compared to only 19 bits with the bar code technology. This greater capacity allows the storing of additional information such as location, history, and destination data. This, in turn, allows for new process development and fail-safe mechanisms to be put in place.

RFID Tags are more sophisticated identification systems because it no needs to be placed in a position precisely relative to the scanner. In fact they can be read within a few feet of the RFID reader or scanner, with readability up to 20 feet for high-frequency and RFID tags can read with up to 100 tags in one time. This means that, if your entire grocery shopping is put into a bag and the bag is set on the scanner, all the RFID tags be read separately and your composite bill will generated immediately. So smart!!

What interesting about RFID is it readers also can sense items even though when the tagged items are hidden behind other tagged items. RFID uses a serialized number scheme such as EPC (Electronic Product Code). Each tag has a unique serial number. Serial number information is extremely powerful in understanding and controlling the supply chain and provides much more detailed behavior of the supply chain.

This serial numbers has many advantages such as food freshness/expiration. This information can tell for how long an item has been in the supply chain where as such information is not captured in bar code system. Hence items can be reached the right place at the right time. Furthermore RFID implementation able to monitors theft too because RFID systems have stronger sensor networking system or monitoring system than bar code systems. Other than that, RFID also bring other benefit to the retailers including reduce labor and inventory costs, offer many benefits in shrinkage reduction, tracking inventory management, material handling efficiency, increased product availability and improved asset management.

The successful stories from world’s largest retailers in implement RFID in their business operations like Wal-Mart and Metro Group can be a proved to show that RFID is the right choice to replace bar code. So for all of significant benefit that RFID able give to us why not Malaysia retailers adopt this sophisticated technology in their operations and become one of them. Since nowadays the usage of RFID is widespread, maybe it’s time for Malaysia to adopt it in their retail industries……. Hehe!! If we encourage researcher to come out researches about successful implementation in RFID, I believe this can be reality in Malaysia!! MALAYSIA BOLEH!!!!

REFERENCE :
http://en.wikipedia.org/wiki/Radio-frequency_identification
http://www.youtube.com/watch?v=eob532iEpqk
http://www.youtube.com/watch?v=sDyqhcy1L-0
http://www.youtube.com/watch?v=zBz3aoikLpU

PREPARED BY:
NAIMEY BT ABD JALIL
2009985203