Tuesday, 1 March 2011

About Me

PERSONAL PARTICULAR

Name : Hamdan b Abu Kassim
E-mail : dan_dindon@yahoo.com
Date of Birth : 18th Feb 1987
Age : 24 years old
Gender : Male 
Nationality : Malaysian
Marital Status : Single 
Religion : Muslim 
Health : Excellent


EDUCATIONAL BACKGROUND

2010- till present : Bachelor in Business Management 
(Human Resourses)
Universiti Teknologi Mara Bandaraya Melaka ( UiTM)

2006-2010 : Diploma in Town and Regional Planning
Universiti Teknologi Mara caw. Perak (UiTM)


2002-2004 : MRSM Terendak
Sijil Pelajaran Malaysia (SPM)


2000-2002 : MRSM Terendak
Penilaian Menengah Rendah (PMR) 

1993-1999 :Sek.Rendah Kebangsaan Bt Berendam
(UPSR)



Telecommuting

Telecommuting, also known as teleworking, is the act of working from a remote location, usually one's home. This is made simple with the use of various telecommunications technologies such as a telephone, fax machine and the internet. Many telecommuters are also set up withweb conferencing capabilities allowing them to sit in on office meetings via modem and webcam, or at the very least, a conference call.
In most cases, telecommuting equipment is provided by the company, though it's up to the teleworker to provide an office space free of distraction. For the telecommuter, the benefits abound. Most enjoy the flexibility of working their own hours, at their own pace, as long as all deadlines are met. There's also the ability to work in one's pajamas or take breaks as needed at attend to personal family matters. Money is saved on expenses such as commuting, lunch or snacks, clothing and daycare.
Telecommuting not only enables an employee the convenience of working at home, it also allows the employer to save money on certainoverhead expenses such as utilities. In addition, since telecommuters are happier, they're often more productive; they may spend more time working than their office working counterparts who tend to spend more time on lunch breaks or chit-chatting around the coffee maker. Absenteeism is down among telecommuters because sick workers still work at home and they put in longer hours because they never leave their office.


e tailing benefits & limitations

E-tailing has certain advantages over catalog retailing:
  • Customers have a much wider choice at their fingertips (many e-tail sites etc.) Thus the web creates a global bazaar style marketplace that brings together many consumers and many retailers.
  • With web search capabilities (which need further development) it is easier to find the types of goods a customer is searching for, catalogs are received passively, at the behest of the retailer.
  • Customers can execute transactions via the same medium the information is provided, so there is no disconnect between the desire to purchase and the ability to purchase. (Payment schemes are still evolving and therefore this advantage is likely to become more apparent in the future.)
  • E-tailers can use price descrimination more efficiently than catalog retailers (which may use coupons to lower certain "fixed" prices). E-tailers can use previous transactions to identify the likelihood of products being purchased at certain price points.
  • E-tailers can change the product placement (user display) based on previous transactions, to increase the visibility of goods that the user is more likely to purchase based on their close relationship with previous purchases. Thus placement can be designed based on the context of the previous purchases.
E-tailing has certain disadvantages over catalog shopping:
  • Not all customers have access to the web, as they do to the postal system. This is a temporary issue as the evolution of the web continues.
  • Ease of use is a problem, as the web design is still complex, or at least somewhat chaotic. E-tail stores are not standardized in design in the way catalogs and retail stores have become. Therefore different user bahaviors (navigation schemes) need to be learned for each e-tail store. This is a temporary issue as the evolution of the web continues.
  • Trust, security and privacy concerns prevail. Consumers are concerned with the use of the data they provide during transactions.
  • Graphic presentation is not as compelling for the web as it can be for catalogs. This is a temporary issue as the evolution of the web continues.


What is e business?

Ebusiness is a term used to describe businesses run on the Internet, or utilizing Internet technologies to improve the productivity orprofitability of a business. In a more general sense, the term may be used to describe any form of electronic business —- that is to say, anybusiness which utilizes a computer. This usage is somewhat archaic, however, and in most contexts ebusiness refers exclusively to Internet businesses.
The most common implementation of ebusiness is as an additional, or in some cases primary, storefront. By selling products and services online, an ebusiness is able to reach a much wider consumer base than any traditional brick-and-mortar store could ever hope for. This function of ebusiness is referred to as ecommerce, and the terms are occasionally used interchangeably.
An ebusiness may also use the Internet to acquire wholesale products or supplies for in-house production. This facet of ebusiness is sometimes referred to as eprocurement, and may offer businesses the opportunity to cut their costs dramatically. Even many ebusinesses which operate without an electronic storefront now use eprocurement as a way to better track and manage their purchasing.
In addition to buying and selling products, ebusiness may also handle other traditional business aspects. The use of electronic chat as a form of technical and customer support is an excellent example of this. An ebusiness which uses chat to supplement its traditional phone support finds a system which saves incredible amounts of time while providing opportunities unavailable through traditional support. By using virtual computer systems, for example, technical support operators can remotely access a customer's computer and assist them in correcting a problem. And with the download of a small program, all pertinent information about the hardware and software specifications for a user's computer may be relayed to the support operator directly, without having to walk a customer through personally collecting the data.
In the past few years, virtually all businesses have become, to some degree or another, an ebusiness. The pervasiveness of Internet technology, readily available solutions, and the repeatedly demonstrated benefits of electronic technology have made ebusiness the obvious path. This trend continues with new technologies, such as Internet-enabled cell phones and PDAs, and the trend of ebusiness saturation will most likely continue for some time.

Monday, 28 February 2011

Web Search Engine

web search engine is designed to search for information on the World Wide Web and FTP servers. The search results are generally presented in a list of results and are often called hits. The information may consist of web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained by human editors, search engines operate algorithmically or are a mixture of algorithmic and human input.



How Search Engines Work

The term "search engine" is often used generically to describe both crawler-based search engines and human-powered directories. These two types of search engines gather their listings in radically different ways.
Crawler-Based Search Engines
Crawler-based search engines, such as Google, create their listings automatically. They "crawl" or "spider" the web, then people search through what they have found.
If you change your web pages, crawler-based search engines eventually find these changes, and that can affect how you are listed. Page titles, body copy and other elements all play a role.
Human-Powered Directories
A human-powered directory, such as the Open Directory, depends on humans for its listings. You submit a short description to the directory for your entire site, or editors write one for sites they review. A search looks for matches only in the descriptions submitted.
Changing your web pages has no effect on your listing. Things that are useful for improving a listing with a search engine have nothing to do with improving a listing in a directory. The only exception is that a good site, with good content, might be more likely to get reviewed for free than a poor site.
"Hybrid Search Engines" Or Mixed Results
In the web's early days, it used to be that a search engine either presented crawler-based results or human-powered listings. Today, it extremely common for both types of results to be presented. Usually, a hybrid search engine will favor one type of listings over another. For example, MSN Search is more likely to present human-powered listings from LookSmart. However, it does also present crawler-based results (as provided by Inktomi), especially for more obscure queries.
Crawler-based search engines have three major elements. First is the spider, also called the crawler. The spider visits a web page, reads it, and then follows links to other pages within the site. This is what it means when someone refers to a site being "spidered" or "crawled." The spider returns to the site on a regular basis, such as every month or two, to look for changes.The Parts Of A Crawler-Based Search Engine
Everything the spider finds goes into the second part of the search engine, the index. The index, sometimes called the catalog, is like a giant book containing a copy of every web page that the spider finds. If a web page changes, then this book is updated with new information.
Sometimes it can take a while for new pages or changes that the spider finds to be added to the index. Thus, a web page may have been "spidered" but not yet "indexed." Until it is indexed -- added to the index -- it is not available to those searching with the search engine.
Search engine software is the third part of a search engine. This is the program that sifts through the millions of pages recorded in the index to find matches to a search and rank them in order of what it believes is most relevant. You can learn more about how search engine software ranks web pages on the aptly-named How Search Engines Rank Web Pages page.

Major Search Engines: The Same, But Different
All crawler-based search engines have the basic parts described above, but there are differences in how these parts are tuned. That is why the same search on different search engines often produces different results. Some of the significant differences between the major crawler-based search engines are summarized on the Search Engine Features Page. Information on this page has been drawn from the help pages of each search engine, along with knowledge gained from articles, reviews, books, independent research, tips from others and additional information received directly from the various search engines.
Now let's look more about how crawler-based search engine rank the listings that they gather.


Types of malware

The more you educate yourself on malicious software, the better off you'll be. Malware is not a virus. In fact, it consists of viruses, worms, Trojan horses, adware, rootkits and many other nasty infections. Some of these programs are more of an annoyance than anything, while others pose a serious threat to your computer. Regardless of the type, each of them offer their own unique security threat, and they should be avoided at all costs.

Viruses


The computer virus is the most infamous form of malware. It is a self replicating program that infects a system without authorization. A virus is often transmitted via email but can also be distributed through various storage mediums such as a flash drive. Once installed, it will execute itself, infect system files, and attempt to propagate to other systems. The impact of a virus ranges widely from slow system performance to wiping out every file on your computer.

Worms


Though closely related, worms and viruses are two completely different types of malware. Both have the ability to self-replicate and propagate by attaching themselves to files. While a virus moves from machine to machine, a worm tends to leach onto network traffic and can be a corporation's worst nightmare. In no time, it can travel through the internet and inflict great damage from deleting files to creating backdoors that give its creator control of a system.

Trojan Horses

Similar to the mythical wooden horse used by the Greeks to invade Troy, the Trojan horse is a very deceptive program that appears harmless but is actually one of the most dangerous types of malware. It may arrive as a friendly email attachment or present itself as a useful application on a website. Because it does not have the ability to self replicate, a Trojan cannot be classified as a virus. However, it does have the ability to deliver destructive payloads and unload viruses, worms or spyware.

Spyware

Spyware is a sneaky program that tracks and reports your computing activity without consent. While it isn't designed to inflict damage, spyware can terribly affect the performance of your computer over time. Spyware usually comes bundled with free software and automatically installs itself with the program you intended to use. Signs of spyware include sudden modifications to your web browser, redirects of your search attempts and the frequent displaying of pop-ups. In this instance, spyware can also be termed as adware which is essentially add-supported software that has the ability to track your activity.

Rootkits

A rookit could be a single program or collection of programs designed to take complete control of a system. This type of malware is employed by hackers and gives them all the abilities of a system administrator from a remote location.
Rootkits are very sophisticated as they make hackers very difficult to find. They are often used to infect other computers and enslave them as zombies, forcing them to attack other machines, distribute spam or steal passwords. When attempting to track a rootkit's creator, the search usually ends with the first zombie while the hacker goes undetected.

Staying Safe

As you can see, malware is abundant and will attempt to attack your from every direction. However, there are several security solutions and system updates that will help to keep you protected. Combine these tools with safe computing and you have a much better chance of keeping the malicious software away.

Thursday, 24 February 2011

Video conference problems

1. Eye Contact: Eye contact plays a large role in conversational turn-taking, perceived attention and intent, and other aspects of group communication. While traditional telephone conversations give no eye contact cues, many videoconferencing systems are arguably worse in that they provide an incorrect impression that the remote interlocutor is avoiding eye contact. Some telepresence systems have cameras located in the screens that reduce the amount of parallax observed by the users. This issue is also being addressed through research that generates a synthetic image with eye contact using stereo reconstruction.
2. Appearance Consciousness:
 A second psychological problem with videoconferencing is being on camera, with the video stream possibly even being recorded. The burden of presenting an acceptable on-screen appearance is not present in audio-only communication. Early studies by Alphonse Chapanis found that the addition of video actually impaired communication, possibly because of the consciousness of being on camera.
3. Signal latency: The information transport of digital signals in many steps need time. In a telecommunicated conversation, an increased latency larger than about 150-300ms becomes noticeable and is soon observed as unnatural and distracting. Therefore, next to a stable large bandwidth, a small total round-trip time is another major technical requirement for the communication channel for interactive videoconferencing.