Google Analytics

Search This Blog

Tuesday, May 30, 2006

Malaysia's best ...

The market is so boring that IBM has to organize a competition to get people excited...

The bull is not coming back yet...
1. Asian market falls, foreign investors wary.
2. Market down in lacklustre trade
3. etc

Let's take a look at Malaysia's richest person for year 2005, published by Forbes.

The following are top 10, pretty much unchanged for many years.

1. Robert Kuok - Sugar King
2. Ananda Krisnan - Maxis
3. Teh Hong Piow - Public Bank
4. Lee Shin Cheng - IOI
5. Quek Leng Chan - Hong Leong
6. Lim Goh Tong - Genting
7. Yeoh Tiong Lay - YTL
8. Tiong Hiew King - Timber King
9. Syed Mokhtar Albukhary - Rice trader
10. Lim Kok Thay - Genting (Second generation)

Thankfully, none of them made their name from the ICT industry. This makes plenty of room for budding entrepreneurs.

On the other development, let's take a look at Malaysian's most popular bloggers.

1. Liewcf - Personal Tech blog
2. Paul Tan - Automotive blog
3. Jeff Ooi - Political blog
4. TV Smith Dua Sen - 2 cents blog
5. Kenny Sia - Gadget
6. Huai Bin - Discovery and englightenment
7. Lim Kit Siang - Political Blog
8. Shaolin Tiger - Brit in Malaysia
9. Brand Malaysia - Malaysia commentary
10. Rojaks - Comedy bunch

Monday, May 29, 2006

BCRAN - Fundamentals

WAN Connection Characteristic:
1. Dedicated connection
- Circuit switching
- End to End. i.e phone.
2. On-demand connection
- packet switching
- broadband.

Dedicated Circuit-switched Connection:
1. Leased Lines:
Router -----CSU/DSU----------CSU/DSU-------Router

2. TDM Circuits
Router-----CSU------------------CSU--------------Router

Packet-Switched Connections:
- Virtual circuit (frame relay/ATM)
- Share bandwidth statistically

Broadband Access:
- Use existing infrastructure
- Terminate at service provider POP Internet transport.

DSL Limitation:
- Distance. The closer you need to be to the nodes to provider faster connection to nodes.
- Currently, ADSL requires 1.5km.

Summary;
- A WAN can be characterized by connection duration, type of switching, form of synchronization, data rate, termination and media type.
- WAN connection types are dedicated, on-demand circuit-switched, packet-switched, and broadband.
- Dedicated connection are continuously available, typically using a CSU/DSU to connect to service provider time-division multiplexing (TDM) network.
- Asynchronous on-demand circuit-switched connections used a process such as DDR when there is a bacup connection needed.
--> Floating static route.

Defining WAN Encapsulation Protocols:
1. PPP
- Open standard
- Multilink (bundling)
- Authentication (CHAP, PAP, MSCHAP)
- Compresion
- Error detection (magic sequence number)
2. HDLC
- Vendor specific (Every vendor has own HDLC)
3. Frame-Relay

PPP Encapsulation:
1. LCP (Link Control Protocol)
- Layer 2 (carries multi-protocol across)
- Authentication, compression

2. NCP
- Layer 3

Frame Relay:
- Cost saving
- Leased line is very expensive, depending on distance.
- Frame relay can work up to a maximum of E3 line. (30 * 64) =1920 mbps.

WAN Connections:
Leased Line - High control, full bandwidth, high-cost enterprise networks, and last-mile access.
Broadban
+ Cable - A very fast connection shared through a LAN to the Internet. Low cost, but performance can vary.
--> MODEM is different.
A COAX cable has to be pulled from the fiber optic switch.
+ DSL - Converts existing telephone lines into access paths for multimedia and high-speed data transfers. Most high-performance DSL connections have distance limitations.
ISDN - Creates a digital loop. Higher bandwidth than typeical dialup, often with significatnly higher cost.
Analog - Slow setup and transmission speeds. Location flexibility.

Connection Selection Considerations:


Summary:
- Selecting a WAN connection involves considering things as - Availability, Bandwidth, Cost, Ease of management, Application traffic, QoS and reliability, Access control


MODEM for out-of-band-management:
- Console, AUX and TTYp are out-of-band or backdoor management.
- In-band interfaces are ethernet and etc.

Vulnerability and risk:
- Add a terminal server that provides more secured access.
- Limit access to modems, phone numbers and etc.
- AUX port to cable --> using straight cable.

CTS = Clear to Send
RTS = Ready to send
DSR = Data set ready

Configuration of AUX line:
router(config-line)#modem autoconfigure discovery
router(config-line)#speed 56000
router(config-line)#transport input telnet
router(config-line)#flowcontrol hardware
router(config-line)#pass cisco
router(config-line)#login

Terminating a call over the analog phone line:
DTE-initiated termination
- Router or laptop drops DTR
- Modem must be programmed to terminate connection on loss of DTR and restore to saved settings.
- Triggered by users.

DCE-initiated termination
- Router detects CD low and terminates connection.
- Modem must be programmed so that CD reflects the carrier state.
- Triggered by the other side.

"debug confmodem"
Different modem has different AT commands.

Summary:
- Out-of band management uses an AUX or console port; in-band management uses regular interfaces.
- Modems can provide dial-up connectivity to a router for out-of-band administration and troubleshooting.

Describing PPP Fundamentals:


"ip unnumbered loopback 0" - when people connect to my router via the aux port, it will always resume the IP of the loopback 0.
"async dynamic address" - when connected, you get an IP address.

Summary:
- Asynchronous connections can be used either an in-band PPP session or an out-of-band EXEC session.
- To start either a PPP session or an EXEC session, use the async mode interactive command.

PPP Authentication:
CHAP uses plain-text while PPP uses MD-5 encryption.

labC(config)#username EVEN password 2468
labC(config)#int serial 0
labC(config-if)#ppp authentication pap
labC(config-if)#ppp pap sent-username ODD pass 1357
labC(config-if)#int serial 1
labC(config-if)#ppp authentication pap
labC(config-if)#ppp pap sent-username ODD pass 1357

Backward Compatible:
lab(config-if)#ppp authentication pap chap --> if pap doesn't work, try using chap.

Summary:
- When user enters the ppp command, the system determines the type of authentication configured. if no authentication is configured, the PPP process starts immediately.
- PPP is a one-way authentication between a host and a router or a two-way authentication between routers. It sends a password in plaintext.

PPP Callback and Compression:

Setup a normal ISDN:

1. Apply IP address to BRI0
2. Apply the appropriate IDSN switchtype - Basic NAT 3
3. Apply PPP encapsulation.

PPP Callback configuration:
Client:
labA(config)#username routerB password cisco
labA(config)#int bri 0
labA(config-if)#dialer map ip 66.0.0.2 name labB **21
labA(config-if)#ppp callback request
labA(config-if)#ppp authenticate chap callin
labA(config-if)#exit
labA(config)#username labB pass cisco --> create username and password for CHAP.

Server:
labB(config-if)#encap ppp
labB(config-if)#dial callback-secure
labB(config-if)#dialer map ip 66.0.0.1 name labA class callback **11
labB(config-if)#ppp callback accept
labB(config-if)#ppp authentication chap

labB(config)#map-class dialer callback --> create a map class called "callback"
labB(config-map-class)#dialer callback-server username --> dialer for callback-server will be sending across a username

Compression:
- Predictor (router to router)
+ based on hash
+ CPU intensive technique

- Stacker (router to router)
+ Substitution
+ Memory intensive

- MPPC : Proprietary standard by Microsoft.
+ Memory intensive

- TCP header (host to router)
+ Only can be applied to asynchronous interface (bcoz it is from host to router)
+ Memory intensive

Configuration:
labC(config)#int serial 1
labC(config-if)#compress stac

MP3, ZIP and etc are compressed files. Thus, if you apply compression to these files, it will be redundant.

Multilink PPP:
- When you perform a dial-up, only one B-Channel will open up.
- Packet fragmenting.

labC(config)#int bri0
labC(config-if)#encap ppp
labC(config-if)#ppp multilink
labC(config-if)#dialer load-threshold 1 either

In BCMSN, when created an etherchannel, a port-channel will be created.
Over here, when created a multilink, a virtual-access channel will be created.

Malaysia IT Spending Prospect 2006 - v9

Malaysia doesn't look so good last few weeks. Our previous discussion was v8.

First of all, the bull hasn't returned. KLSE leveled at 929.24 at mid-day trading.1.51 points lower than previous high.

Government and MSC has been busy to improve FDI (Foreign Direct Investment) with recent efforts...

1. MDeC is looking at outsourcing as the answer
2. Malaysia to lure more FDI
3. International collaboration
4. etc

The latest FDI potential came from Intel who plans to further invest in Malaysia on top of its $3 billion investment so far.

Political Stability to Determine Smooth Flow of FDI:

The latest political issues involving Malaysia is the sentimental build-up of the proposal to setup an Independent Police Complains and Misconduct Commissions (IPCMC) by the government.

Such proposal received painful feedbacks from the Royal Malaysia Police; with threats by the police force to vote against the goverment and let crimes happen.

This is a serious issue and it will shake national security by any standard. KKDN (Domestic Affair Ministry) has to act tough now. The people of Malaysia would definitely not interested to let its peaceful harmony to be threatened by the gatekeeper.

Very annoying!

Friday, May 26, 2006

Hotel Key and Personal Security

I received this email from someone..

From the California Bureau of Investigation:

"Southern California law enforcement professionals assigned to detect new threats to personal security issues, recently discovered what type of
information is embedded in the credit card type hotel room keys used throughout the industry.

Although room keys differ from hotel to hotel, a key obtained from a well known hotel chain that was being used for a regional Identity Theft
Presentation was found to contain the following the information:
a.. Customers (your) name
b.. Customers partial home address
c.. Hotel room number
d.. Check in date and check out date
e.. Customer's (your) credit card number and expiration
date!

When you turn them in to the front desk your personal information is there for any employee to access by simply scanning the card in the hotel
scanner.

An employee can take a hand full of cards home and using a scanning device, access the information onto a laptop computer and go shopping at your
expense.

Simply put, hotels do not erase the information on these cards until an employee re-issues the card to the next hotel guest. At that time, the
new guest's information is electronically "overwritten" on the card and the previous guest's information is erased in the overwriting process. But
until the card is rewritten for the next guest, it usually is kept in a drawer at the front desk with YOUR INFORMATION ON IT!!!!

The bottom line is: Keep the cards, take them home with you, or destroy them. NEVER leave them behind in the room or room wastebasket,and NEVER turn
them in to the front desk when you check out of a room. They will not charge you for the card (it's illegal) and you'll be sure you are not leaving a
lot of valuable personal information on it that could be easily lifted off with any simple scanning device card reader.

For the same reason, if you arrive at the airport and discover you still have the card key in your pocket, do not toss it in an airport trash
basket. Take it home and destroy it by cutting it up,especially through the electronic information strip!

Information courtesy of:
Pasadena Police Department

This is interesting to take note that recently, Malaysia's electronic identification card; MyKad is claimed to be readable from third party devices such as Astro's (cable-TV provider) decoder.

I am not too sure did the CMA (Communication and Multimedia Act) already taken consideration into such area where personal security is at stake. Recently, the CMA had announced legistrations for spammers. Shouldn't the government consider liable for negligence in failure for upholding effective legistrations for handling of supposedly important matters ?

Can we bring up a case before something is already happened?

Yet again, it seems like government agencies needed more ICT talents to make sure things go right.

Tuesday, May 23, 2006

Malaysia IT Spending Prospect 2006 - v8

The bullshitting Bull ...

Thus, we had during the v7 observed that...

The picture is pretty gloomy for local entrepreneur given the fact that market is not that pumped up for excitement planned for 9th Malaysian Plan.

The bull is not coming back yet... share prices continue to end lower with Monday trading... closing at 925.51. According to Bernama, this is due to market capitalists' hope of having the central bank to raise the interest rates in order to curb inflation. Nevertheless, central bank didn't hit the bulldozer, and interest rates is kept at the same level.

All these seems like market players are not earning much market since recent good performances as indicated in the previous prospect analysis. It is very obvious that they have had their hand burnt and are playing the safe game now.

We are outsourcing..

On the other development, MDeC is gaining momentum by declaring a vision for IT malaysia; to become competitive market leader in outsourcing for certain vertical industries. This will definitely paint a brighter outlook towards Malaysia which is not R & D centric, will create a lot of jobs and opportunities for local entrepreneurs. However, it provides no indication about spending power in the local scene.

The Blue Ocean Strategy ...

Perhaps, instead of focusing on all the bad news such as the following...
1. MAS Malaysia to cut work force.
2. Correction or something wrong..
3. Competition affecting Digi's profit.
4. etc

We should instead focusing on where the money is...
1. Rubber price in Malaysia nears 20 years high.
2. Palm oil council to setup RM 20 million fund for conservation.
3. Economy to stay robust..

Are we seeing the disneyland yet ?

Thursday, May 18, 2006

Legistration for blogging

MCMC just has just recently published an anti-spam toolkit for the Malaysian audience.

It is not a software toolkit, but more like a user guide, which they called it a framework to curb spam of whatever definitions.

According to the framework, it is the responsibilities of all parties (government, users, technology providers) to make things work.

In conjunction with that, it also published the CMA (Communication and Multimedia Act):

Section 233 (1) of the CMA states-
A person who –
(a) by means of any network facilities or network service or applications service knowingly
(i) makes, creates or solicits; and
(ii) initiates the transmission of,
any comment, request, suggestion or other communication which is obscene, indecent, false, menacing or offensive in character with intent to annoy, abuse,threaten or harass another person; or
(b) initiates a communication using any applications service, whether continuously,repeatedly or otherwise, during which communication may or may not ensue, with or without disclosing his identity and with intent to annoy, abuse, threaten or harass any person at any number or electronic address, commits an offence.

Section 233 (2) states-
A person who knowingly-
(a) by means of a network service or applications service provides any obscene communication for commercial purposes to any person; or
(b) permits a network service or applications service under the person’s control to be used for any activity described in paragraph (a) commits an offence.

Section 233 (3) states-
A person who commits an offence under this section shall, on conviction, be liable to a fine not exceeding fifty thousand ringgit or to imprisonment for a term not exceeding one year or to both and shall also be liable to a further fine of one thousand ringgit for every day during which the offence is continued after conviction.

Section 233(1) (b) is an appropriate section to deal with the problems faced by
spamming activities.
The MCMC continues to monitor the development of spam laws and legislation in various jurisdiction around the world i.e. United States of America, Australia, South Korea, Singapore etc.

Therefore, this means that a blogger is now liable for criminal charges with punishment of up to RM 50K or imprisonment of not more than 1 year or both should he or she is not careful with its blog publication; provided that his or her identity can be identified.

Service provider such as blogspot may also be liable for similar cause per se. However, due to the fact that currently, MCMC had only signed MOU with Australian and South Korea government for international cooperation of such purpose, it is not able to sue blogspot(from the USA) should one or more of its hosted blogs are found to be guilty. This is why China had basically filtered out all international blog providers including blogspot, wordpress and etc.

RM 10 k to be won

Good news for local ICT enterpreneur, there are RM 10 K to be won for your innovative ideas..

One may want to participate in the APTM award jointly organized by MAMPU and PIKOM.

The award will be focusing on three areas:
1. Public Sector
2. Private Sector
3. Socio-Economic Sector

Winners of year 2004 (in Malay Language)

According to Pikom..

The prestigious Premier Information Technology Awards 2006 is now open for nomination and the closing date for submission of nominations is 22 May 2006.

Details of the awards can be found at http://www.pikom.org.my/aptm2006. Readers may also call Pn Nurika Abdullah of PIKOM at 03-79552922 or e-mail nurika@pikom.org.my for any queries.

The winners of the APTM 2005 were Lembaga Hasil Dalam Negeri for the Public Sector Category and HSBC Bank Malaysia in the Private Sector Category. There was no winner for the Socio-Economic Sector.

Perhaps, a little too late for many with just 4 days left.

Nevertheless, let us strive for APTM 2007!

Wednesday, May 17, 2006

Malaysian IT Spending Prospoct 2006 - v7

Followng the suspension of Iris Corporation Bhd and Patimas Computer Bhd shares trading on monday and eventually reopened for lowest-limit on Tuesday, Malaysian shock market suffered unprecedented declines.

Many analysts claimed it is due to the effect of shocks from the suspension of the two counter. However, today theStar reported that it is due to last-minute buying of shares from Tuesday. This actually implies that many shares had been disposed off on Monday, after the announcment of the suspensions.

Earlier on, we try to study the prospect of IT spending for year 2006 in Malaysia where we have had the following entries.

Version 6
Version 5
Version 4
Version 3
Version 2
Version 1

These previous entries favors the IT spending behaviour to be rosy at least until year ending 2006, due to the following catalysts:

1. 9th Malaysian plan
2. Hike of interest rates
3. Appreciation of the Malaysian Ringgit.
4. Share market seemingly gained the bull strenght.

Therefore, reports from theStar firmly hold on to the fact that if the market were to be real bull, the composite index should gain strenght in a short period.

Nevertheless, Pikom paints a gloomy picture over our search for a better prospect by year 2006, where the IT growth is expected to drop to 10% for 2006. This also contradicted with IDC forecast of 11% and Microsoft forecast of 7%.

According to Pikom ....

"Companies are not willing to invest (in ICT) long term because of economic factors like the ringgit repeg and external factors like the Tsunami.Also the technology is changing so fast, that companies aren't willing to upgrade to something that would be updated in two years,"

Pikom advices local ICT entrepreneur to start focusing on export market as the local market has been saturated. This is really a bad news for startup because it is impossible to have export capabilities unless you already proved a strong home-root. The prospective market to look into is China, Indonesia, Philliphines and Vietnam.

On the other development, MSC hasn't announced any new grants from the government yet. We take a look at previous grants winner and figure out how well they have faired according to justification of tax-payers money.

Previous grants winner.

Create a successful web venture

We talked about Google's venture into the corporate scene at here... where it is assumed that it would be much better off for Google to sell corporate edition softwares in a different way rather than via partnership with enterprise software vendors such as Cognos, SAS, SalesForce and etc.

To take things into perspective, let's study linkedin.

Linkedin provides free services for individual around the world to register professional profiles into a single platform. So how does it make money besides hoping for acquisition ?

Refer to the following two articles:
1. Linkedin expands into paid services.
2. Social networking startup turns a profit.

Therefore...

The first thing which linkedIN did was to collect as much user as possible.

Slowly and eventually, it introduces premium paid services...
- Corporate services
Big corporate has the ego to pay rather than benefiting from free services.
- Advertising
- Jobs posting
- Research services
- Advance search features
- etc

According to these reports, word of mouth is the best advertisement.

It is okay to introduce additional paid services while keeping the common services free as it was meant to be.

Take a look at Linkedin's investors, which consist of Sequioa Capital; key investor for Google.

Also take a look at their board of directors...

With that kind of support, they would have a lot of mouths to talk about it around Palo Alto; that is Silicon Valley.

Tuesday, May 16, 2006

Google Climbing Corporate Ladder

I have previously made serious allegation that Google's product for enterprising edition is not something to brag about. It was merely to serve for political correctness.

However, I could be wrong... I mean Google is just like Microsoft, Sun Microsystem and etc, they have the resources and they could just manage anything.

Recently, they are getting real with corporate deals.

They are going to penetrate the corporate market with partnerships with major enterprise solution vendors such as Cognos, SalesForce and SAS. This is a good move because partnership is a great asset to a company.

Critics felt that Google don't have that kind of corporate look to impress CIO. However, supporters felt that the Google brand is just enough to get anyone to be excited about any corporate offering.

Personally, I feel that Google should sell enterprise edition in a personal way. Since they have been so popular, they should have been just directly sell the software from the website alone (perhaps they have failed). The thing with impressing CIO is that it is very personal. CIOs will only those those whom they trusted and even so, they would have preferred vendors in their minds.

The process of partnership with Cognos, SAS and Salesforce is a long-ended thing. But it would not be a problem for Google given its superiority and honour earned amongst its peer. In all, the success of Google enterprise software division to meet the target of breaking the 1% of total revenue from 2005 will not be something which everybody would be taking about.

Even though 1% of USD 6 billion is still a lot of money to many.

UK Requirement - Fake Email

This is definitely a fake email... with fake contents and fake promises.

Subject: UK Requirement

Dear Friends,
Please do not take this for a junk letter. Bill Gates is sharing his fortune. If you ignore this you will repent later. Microsoft and AOL are now the largest Internet companies and in an effort to make sure that Internet Explorer remains the most widely used program, Microsoft and AOL are running an e-mail beta test.

When you forward this e-mail to friends,
Microsoft can and will track it (if you are a Microsoft Windows user) for a two week time period.

For every person that you forward this e-mail to, Microsoft will pay you $245.00, for every person that you sent it to that forwards it on, Microsoft will pay you $243.00 and for every third person that receives it, you will be paid $241.00. Within two week! s, Microsoft will contact you for your address and then send you a cheque.

Regards.
Charles S. Bailey
General Manager Field Operations
1-800-842-2332 Ext. 1085 or 904-245-1085 or RNX 292-1085
Charles_Bailey@csx.com

To derive to such conclusion is easy...

1. Even though Microsoft is deep pocketed, they don't usually give out donation based on spam-email. Further so, Bill Gates had personally mentioned that email spammers should be responsible for lost of time in the work place. Read here.
2. AOL and Microsoft are not partnering. AOL is partnering with Google instead.
3. No American company is so stupid enough to give out money for baseless reason. The only way one does get pay for Internet activities is via advertisement publishing; using Google Adsense, Adbrite or Chitika. Trust me, it is not easy to earn this kind of money.

Otherwise, prove me wrong.

Monday, May 15, 2006

Malaysia IT Spending Prospect 2006 - v6

Microsoft on IT Spending Growth:

First of all, Microsoft mentioned that IT spending to grow only 7% by 2006, contradicting with IDC reports that IT spending would grow by 11%.

Microsoft was quoted as saying that three major IT buyers for 2005 was:
1. Banking sector
2. Government
3. Telecommunication

With majority money spent on purchasing equipments and solutions for telecommunication purposes.

Microsoft is investing another RM 26 million towards it ISV(Independent Software Vendors) program; a program which provides registrant with cheaper Microsoft products. This program is expected to sustain growth of 20% over the next five years.

Iris and Patimas Suspension Big Blow to Local Entrepreneurs:

On the other hand, Iris Corporation Bhd and Patimas Computer Bhd had both been suspended by the security commission; for its share counter. This is a big blow for the IT market as both are market leaders in respective areas. This also shows that how real jeolousy sentiment is around the Malaysian ICT market. The SC didn't quite able to come up with a strong conclusion towards the decision, however it seems that the speculation about Iris's share prices started since 2005, when many claims something is wrong with the sudden rise in strenght.

However, Iris Corporation Bhd countered offer speculators with securing a huge contract from Indonesia; RM 74 million E-ID system.

The suspension is bad for local entrepreneurs in a sense that honest intention is vulnerable towards sabotage potentials.

Meanwhile, Jeff Ooi and SKThew offers no condolences or analysis for it. At least not yet. We will wait for them.

Stock Revalued as Ringgit Firms Up:

Stocks revaluation activities are being undertaken and many blue chips are expected to experience slight windfalls. For instance, 1% appreciation in the ringgit would translate into RM 150 billion gains for TNB (Tenaga Nasional Bhd).

Therefore, as we blogged about in previous entries:

Version 5
Version 4
Version 3
Version 2
Version 1

That we expect all these to create a better prospect for IT spending for year 2006, based on the fundamental reason that Malaysian would be richer by year end. Before the crude oil prices gaining sharp edge to USD 100 per barrel.

Digi is probably running out of idea:

Meanwhile, Digi is probably running out of idea to make way for a better future in the ICT market of Malaysia.

Ever since it was not granted by the Malaysian government for a 3G licence since March 2006, it has been so-called misaligned.

We recently realized that 3G is not an option for telco.

Recently, they came out with the idea of "Galleries without Walls" to create value-adds to its EDGE(2.5G) network.

Thursday, May 11, 2006

How to compete with Google ?

The Google Economy .. as narrated in the book "The Google Story" described that it is probably as strong an economy like any countries. In other words, economics theories and other business related books and documentations would be deemed outdated without including a section on Google Economy, so much so for the father of modern economics Adam Smith.

So, what is it about the Google Economy ?
Is it about its advertising potential ?
or is it about China ?

or is it about making things free and accessible for everyone and try to make money later, with whatever means possible ?

So, Google runs company like a research institutes, where computer science and mathematics are king. However, they are not selling software and consultancy, they are providing free contents. And they make money from dollar per dollar.

Eventually, what this means is that by providing things for free (Search, Google Earth, 3D software), they will for sure gather a huge mass of audiences, and even though they are providing non-free versions of those softwares(enterprise edition) for corporations and etc, I strongly would like to believe that not much sales had been achieved through that channel(corporate channel). I like make an allegation that those enterprise editions are just to make things to become politically correct.

And even if you are going to make use of those free services to make some money, Google will still earn it somehow and someway because eventually they are source. For instance, if you are going to use the 3D software to create GIS interface for your city, embedd it to Google Earth and sell it as content to other people, all these are eventually Google's content. You can have a great portal - serving millions of people, however the bottom line is that these audiences are ultimately Google's audiences. And there is saying that if every single person in China would just contribute USD 1 to your pocket, you only need to live for another day to see a billion bucks in your account.

So how do I fight this war now ?
Is it really a challenge now to create another 3D software and hope to sell it for USD 99 per individual license and USD 1,500 per enterprise edition. It seems a little outdated isn't it ?

Can we really defeat an economy ? We need to consult NATO for that.

I heard about interviews from prestigous company like Boston Consulting Group (BCG) where they would ask question like ...

1. If nobody were to die, what would happen to this world in 10 years ?
2. If you were a terrorist, how would you destroy a city in one day ?

Definitely, if someone were to bomb Google's core system, the world would be devastated. But of course, Google would have been prepared.

I am still thinking....

Without Google, you wouldn't even get to read this blog entry of mine.

Long live Google, long live.

Life goes on for others.

Malaysia IT Spending prospect 2006 - v5

With our earlier discussion of ...

Version 4
Version 3
Version 2
Version 1

Malaysia's economy looks set to take an exicted boom.

The ringgit once again recorded many years high of reaching RM 3.55 against the USD yesterday.

Let me stress again, this is good for the ICT sector because of the following:

1. Malaysian are richer by certain margins. (rise of interest rates and ringgit)
2. 9th Malaysian plan has put us into some proper direction. It marks the end of old projects making way for new ones to come. Definitely, you won't look like an idiot to take about it at least until the end of the year.
3. The world congress (WCIT) to be held in Malaysia by 2008 will be a catalyst for innovations and activities.

Gold price breaks USD 700 per ounce is also a good indication that people's wealth would be increased by certain margin. I based this on the fact that now is not a good time to spend money, however it may be a good time for to keep the money with your financier hoping for more windfall. Therefore, this would cater for a stronger financial projections for year end and early of year 2007. In other words, instead of spending money on neccesity; now companies may be focusing on improving financial strenght and therefore long-term investments such as implementing strategic ICT solutions and systems. Because all of those are based on ROI calculations.

On the other development, theStar Online seemed to have invested a hugh amount of money towards a report from IDC about IT spending to dip. It(the news) has been around for the past 5 days or more; at least I am sure that it has been there since May 6, 2006. Looks like either there is nothing more to report on the technology side or they are simply waiting to achieve the ROI for investing in the report before taking it off for something else.

Indeed, ROI is something everything looking foward to now.

Monday, May 08, 2006

MSC Malaysia created IMPACT

MSC Malaysia unveiled its invention at the 15th WCIT (World IT Congress) in Texas, it is called IMPACT (International Multilateral Partnership Against Cyber Terrorism).

"It will serve as a pioneer platform to allow governments of the world to exchange notes and ideas, as well as to facilitate the sharing of skills and best practices, with the ultimate objective of combating these constantly evolving threats."

On the other hand, the prime minister of Malaysia performed several high level marketing job for Malaysia's IT sector, including one of persuading Dell to setup more facilities in Penang area.

US computer giant Dell Inc plans to set up a technology and development centre in Cyberjaya that will involve high value-added activities, including process design and software development.
Looks like MSC Malaysia is off to a good start and the PM did a good job.

Saturday, May 06, 2006

Blog is like my baby


This blog is like our baby you know.. so much care been put on it.

I did a search on MSN and found that there may be over 60 millions blog out there currently in the world and thus there could be easily a few of tenth millions bloggers out there; so many baby out there.

Blog is such a great tool for self-development purposes. Over the years, it has helped me and my team with the following advantages:

1. Improved English
2. Improved linguistic intelligence
3. Improve analytical mind
4. Improve report writting skills
5. Many more.

In my humble opinion, blogging is a good activity and hobby.

Recently, feedburner gave an overview of recently most popular blogs ever written by me...

These blog entries are:

1. Building the rabbit hole
2. Ethernet Switch for Medical Doctors ?
3. Embedded Linux Native or Java ?

By looking at these blogs, sometimes even I impresses myself. I mean I have written over 300 blog entries in a period of 2 years and even I can't recall most of it. These are actually all my intelligence, my so-called time-life. Had blogspot gone burst, I would have lost some much of intelligence. And no much people would actually care about it, not until I become the next dot-com millionaire. Anyway, I am proud of myself, I should have been rich but just not yet. So much so that there are so many of you out there attempted to make a difference to yourself, you guys deserve all the merits which I preached about now.

I wouldn't be surprised, one day one may be hired for jobs over the credibility of its blog.

Keep blogging, you may not change the world, but you certainly created valuable time-line for yourself. And tomorrow is never ever coming back!

Malaysia IT Spending Prospect 2006 - V4

Fresh from our discussion pertaining to Malaysia IT Spending Prospect 2006, where the following had been published..

Version 3
Version 2
Version 1

Now, with recent news about the government to review MSC incentives to make all MSC-status company more competitive in the run-up to 15th World Information Congress (WCIT) at Texas.

In other words, they are going to add more incentives for MSC-status companies such as:

1. More funds.
2. More scholarships.
3. Create a MSC-center at Sillicon Valley.
4. Provide incentives for marketing costs.
5. Provide incentives for travelling costs.
6. Provide incentives for licensed softwares.

Yahoo!, we await their good news.

However, this will build up more supply than demand. Thus, ICT spending is not really going to dip but the margin going to dip. And to worst things up, alamak (means OMG), Jeff Ooi hinted that Crude oil prices will hit USD 90 by end of 2006. When the government raised petrol prices with a 0.30 hike, crude oil prices leveled at USD 60. Many also predicted that Malaysia economy would be effected severely when it reaches USD 100.

So, for those ICT entrepreneur out there, your time is up, it is now(May 2006 to November 2006) or wait!

Second round recession is expected to hit by 2007 to 2008, based on the theory of 10 years economic cycle; since 1999 recession after the asian financial crisis. Things look pretty bad for years down the road.

Inbound logistic of your web site

As I was pondering over the 4 Ps of marketing; price, place, promotion, product. I took into interest promotion particularly where it is supposed to be identifying the methods of promotion.

If you going to tell that using Internet for "Promotion", then that is not quite accurate because Internet should belong to "Place"; to have a web presence. "Promotion" is more like saying cold-calling and spam-email. In other words, when you have the web presence, what is next ?

An advertisement from Google Adsense about messaging system took my interest. It is from a company called Interfaceware. It provides two main softwares; Chameleon and Iguana.

Chameleon - Messaging tool supporting HL7 standard
Iguana - EAI/ETL tool for HL7 to database.

My first problem with understanding this message they are giving across is that I am not sure what "messaging system" is ? Is it related to telecommunication systems or SMS systems ?

I could understand what Iguana does explicitly because I had experiences with EAI/ETL tool for business intelligence. However, I speak for myself only.

Then, I found the answer for the meaning of messaging system through a tutorial provided under "Resource" tab.

Essentially, a messaging system is supposed to let two or more discrete systems talk to each other. It is not meant to let two databases talk to each other.

The problem they are trying to solve is to get disparate IT systems in the hospital environment to communicate through one logical channel; the messaging system.

The big question is "how do you get existing HIS to talk to Chameleon"?
The answer as we would all guess is "we have to embed more codes into existing HIS" using Chameleon's API.

My comment for InterfaceWare's inbound logistic usage of web site as the promotion's place and that their promotion strategy was meant to target those who are familiar with messaging and HIS system. I came to this conclusion based on the primarily fact that the home page didn't try to address explicitly the following facts:

1. What is messaging system ? Is it SMS system ?
2. What is HL7 standard ?
3. Where does Chameleon and Iguana fit in to existing IT infrastructure of a hospital?
4. How does existing system communicate with Chameleon ?

We have to dig through the pages to get the answer.

Wednesday, May 03, 2006

BSCI - BGP

BGP: (Open standard protocol)

1. Connect between autonomous systems.
2. Autonomous system = A collection of networks under a single technical administration.
3. IGP = IS-IS, EIGRP, RIP, OSPF
4. BGP will not tell you how far the distance, they only tell you which path to go.
5. Between Jaring, Maxis, if you want to connect them together without using BGP, the routing table will be too long.
6. BGP is only used:
+ in a huge environment
7. Using BGP, you can track aircraft.
8. Have to memerize the 10 steps to choose the path.
9. Have to memerize the 4 message types for BGP.
- Opne
- Keepalive
- Update
- Notification
10. Internal BGP - You are only connected to one autonomous system.
External BGP - Connected between autonomous systems.
The router will detect your topology and decide whether you are internal or external.
11. BGP acts based on autonomous system.
12. COnfiguration steps.
1. Setup autonomous number to all routers. (Look for which Autonomous system your are in and set it to your router)
2. Establish internal adjacency. Determine your neighbours and make it up. (Specify internal neighbor)
This also includes loopback interfaces.
3. Establish external adjacency. Setup external BGP
4. Advertise directly connected neighbor --> To tell topology algorithm about your own network (refer to "sh ip int brief")


labD(config)#router bgp 4000 --> Create BGP routing
labD(config-router)#neighbor 50.0.0.2 remote-as 4000 --> Set internal BGP neighbor
labD(config-router)#neighbor 7.7.7.1 remote-as 1000 --> Set external BGP neighbor
labD(config-router)#network 50.0.0.0 mask 255.255.255.252
labD(config-router)#network 7.7.7.0 mask 255.255.255.252
labD(config-router)#no synchronization --> Enable external BGP to work

Verification that BGP is working, --> "sh ip route"

Gateway of last resort is not set

1.0.0.0/30 is subnetted, 1 subnets
B 1.1.1.0 [20/0] via 7.7.7.1, 00:02:24
50.0.0.0/30 is subnetted, 1 subnets
C 50.0.0.0 is directly connected, Serial1
2.0.0.0/30 is subnetted, 1 subnets
B 2.2.2.0 [20/0] via 7.7.7.1, 00:02:50
100.0.0.0/30 is subnetted, 1 subnets
B 100.0.0.0 [20/0] via 7.7.7.1, 00:01:55
200.0.0.0/30 is subnetted, 2 subnets
B 200.0.0.0 [20/0] via 7.7.7.1, 00:02:51
B 200.0.0.4 [20/0] via 7.7.7.1, 00:00:59
7.0.0.0/30 is subnetted, 1 subnets
C 7.7.7.0 is directly connected, Serial0

13. Instead of doing redistribution, you may want to use BGP.
14. Synchronization will only when you have a fully distributed network.
15. External BGP has lower Administrative Distance than internal BGP.
This is because there could be many routers within the autonomous system which defined by Internal BGP.
Also, if you have three routers A-B-C
A connect to C via external BGP while B to C via OSPF. Thus, when external BGP between A and C is established, OSPF between B and C can be removed and allowed to be corrupted.

16. Using loopback interface to connect to Internal bgp neighbor.

labD(config-router)#neighbor 27.0.0.1 remote-as 4000
labD(config-router)#neighbor 27.0.0.1 update-source loopback 0
labD(config-router)#neighbor 21.0.0.1 remote-as 1000
labD(config-router)#neighbor 21.0.0.1 update-source loopback 0
labD(config)#router bgp 4000
labD(config-router)#network 24.0.0.0 mask 255.255.255.0 --> Advertise loopback network into BGP

--> All using loopback interfaces


Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd

21.0.0.1 4 1000 0 0 0 0 0 never Idle
27.0.0.1 4 4000 6 5 31 0 0 00:01:40 1

-->Uptime for 27.0.0.1 is valid.
-->Uptime for 21.0.0.1 is "never" because it is an external bgp and 21.0.0.1 is a loopback address.
you cannot use loopback for external BGP, it can only be used for establishing neighborship with internal BGP.

17. Creating peer-group.

neighbor AS2222 peer-group --> create a peer-group called AS2222
neighbor AS2222 remote-as 2222 --> Apply remote AS to this group
neighbor AS2222 update-source loopback 0
neighbor 28.0.0.1 peer-group AS2222
neighbor 29.0.0.1 peer-group AS2222
neighbor 30.0.0.1 peer-group AS2222
neighbor 31.0.0.1 peer-group AS2222

Tuesday, May 02, 2006

E-Filling for Malaysia

This message apparently came from the Inland Revenue Board Malaysia where

>"BERKHIDMAT UNTUK NEGARA"
>LEMBAGA HASIL DALAM NEGERI MALAYSIA
>
>ELECTRONIC SUBMISSION OF TAX RETURN FORMS (e-Filing)
>
>
>Dear valued taxpayer,
>
>Lembaga Hasil Dalam Negeri Malaysia (HASiL) has introduced e-Filing, an
>application which enables taxpayers to submit their Tax Return Forms
>electronically - "Easy, Accurate & Safe".
>
>2. In order to submit your tax return forms via internet, a digital
>signature is required. To facilitate this, HASiL provides for free Digital
>Certificates to all taxpayers.
>
>3. You can obtain the Digital Certificate from any HASiL branch. All
>these services are provided for FREE.
>
>4. Information pertaining to e-Filing can be obtained from :
> i. HASiL website https://e.hasil.org.my ; or
> ii. Customer Call Center at 1-300-88-3010 ; or
> iii. e-mail : e_filing@hasil.org.my
>
>5. Hasil would like to extend its gratitude to taxpayers who have
used
>this system. HASiL also welcomes constructive suggestions /
comments
>towards increasing the quality of service.
>
>
>Thank you
>
>INLAND REVENUE BOARD MALAYSIA
Nevertheless, there are some who doubted this good intention...

OSK - On Screen Keyboard (Microsoft)

My friend Brian Ong told me this..

An alternative keyboard in Windows ....

In case your keyboard or some keys stop working Microsoft provides you with an lternative way to type in using the mouse

To work this tool, follow the steps

1) go to Start menu
2) Then Select Run
3) Type OSK (OSK- means On Screen Keyboard..)




Isn't this savvy ? It looks really cute.

As far as I am concern, it is available for Windows 2000, thus it could be available for Windows Me and Windows 98. It would probably available for Windows XP with high definitely.

Malaysia IT spending prospect 2006 - v3

Just a few days ago, we were predicting the IT spending prospect for Malaysia in year 2006 where...

Version 2
Version 1

that the following three catalysts would trigger tremendous growth for the ICT industry by 2006. There catalysts are:

1. 9th Malaysian Plan
2. Hike of interest by 0.5%
3. Ringgit gained strength over the US dollar.

Nevertheless, IDC predicted that ICT spending would contract and with growth of only 11% for 2006 and hopefully it would maintain the same for 2007 (depending on global forces). The value for total ICT spending by 2006 is predicted at RM 14.76 billion.

Reasons given were that despite the announcement of 9th Malaysian Plan:
1. Many huge government projects have already been completed by 2005.
2. Spending behaviours shifted to mobile personal systems.

In retrospect, IDC predicted the following as the biggest potential IT consumers for 2006:
1. Banking
2. Communications
3. Media
4. Discrete Manufacturing
5. Government sectors

We share monitor and see what would happen next.

Monday, May 01, 2006

This copy of Windows is not genuine

Looks like the recent fist and fury issue in the Malaysian ICT arena is Microsoft' s hard nut case over genuine Windows installation.

They have actually derived a mechanism which would humiliate users from using illegal installation of Windows XP.



want to find out more about how to go about it, check out Tien Soon's tech blog.

Windows Genuine Advantage Notification is Cracked
Pirated Windows Tattoo is installed through Windows Update
Microsoft will embarass you for using pirated XP

Perhaps you can try Windows 2000.

Alexa is now powered by MSN

Yahoo, Alexa and A9 was initially powered by Google.

Now Alexa is powered by MSN. This is great because it will add flavours to the search engine industry. MSN search technology is called the MSN Live.

Now, we know that there are probably a few search engine technology in the market.

Google's Pagerank
Ask Jeeve's Teoma
MSN Live

9th Malaysian Plan - ICT lukewarm

With the announcement of 9th Malaysian Plan during March 2006, perhaps many are still caught with the excitement and totally off guard.

We haven't seen much big spending-activities happening around the Malaysian ICT scene.

Recently, SCAN Associate Bhd; Malaysia hotshot for security solutions landed a project with Jakarta Bank. Where the former has been appointed by PT Bank Danamon to provide managed security services. Any solution started with the word "managed" means that "outsource", where certain administration work would be handled by the vendor.

Since Jan 06, there had been a few of local companies making impact to the foreign ICT scenes.

Jan 06
Feb 06

The few big players in terms of ICT for Malaysia are still:
1. Kompakar
2. CSA
3. Heitech Padu
4. Mesiniaga
5. Sapura

There are the so-called big IT vendors with a lot of cash-flow to temper with.

I am still waiting for big announcement pertaining to the 9th Malaysian Plan and still eagerly excited.