Google Analytics

Search This Blog

Friday, September 30, 2011

LucidChart Sep 2011 Updates

Updated features on LucidChart.
  • Mock up your next iPad app with LucidChart. The iPad Mock up library consists of image-oriented GUI objects just for the purposes of illustration.
  • Draw your business process with BPMN(Business Process Model Notation) shapes
  • Organize your text with bullets, numbering and line spacing
  • Backup and restore - plain and easy
  • Swimlane improvements - Add or remove lanes easily, rotate lanes, rotate swimlane titles
    A swimlane is a visual element used in flowcharts, that visually distinguishes responsibilities for sub-processes of a business process. Swim lanes may be arranged either horizontally or vertically.
  • Venn diagram library improvements - new shape library. The library contains 16 shapes with pre-set colors and gradients so that you can quickly drag on the shapes and simply add text.

More on LucidChart.

Jobs: Information Management Developer / Consultant

Company : Concorde Solutions & Services
Location: Kuala Lumpur.

Responsibilities:
  • To develop a data warehouse and business application (profitability analytics, risk
    management & etc) according to the specifications set down and led by a solution
    architect
  • To adapt industry standard quality assurance and quality control methodology for
    writing test plans and test scripts.
  • To support and maintain the developed programs, scripts and objects
  • To embrace proven best practices and good programming design patterns
Specific Requirements
  • Strong understanding in relational database normalization, modeling and operations
  • Exposure to/interest in calculus concepts, set theory and statistics
  • Ability to write algorithm pseudo-code and to translate that to a working
    implementation (particularly parsing, multi threaded executions).
  • Final year project/Commercial projects dealing heavily on RDBMS persistence layer
    and front end application in an Object -Oriented language
  • Familiar with administrating J2EE containers and web servers
  • Willing to undergo related job trainings
  • Ability to participate in end-to-end project lifecycles
  • Some exposure to a Linux/UNIX-like environment, e.g. HP -UX, AIX, FreeBSD
  • Knowledge of Struts, JSF and other frameworks will be an added advantage
  • Accounting, finance and banking knowledge will be advantageous
General Requirements:
  • Good Degree in Computer Science, Software Engineering
  • Good/reasonable results in either of SPM or STPM
  • Professional certifications from IBM, Sun would be advantageous
  • Possess own transportation and ability to dress in presentable manner for client-site
    postings
  • Pleasant personality and willing to work as part of a team
  • Organized and analytical mindset
  • Results oriented (XP methodology) and sense of commitment with proper time
    management
  • Reasonable command of language and communication skills are vital
  • Fresh graduates and those with fewer than 3 years of work experience are
    encouraged to apply
Others:
  • 5 day s work week
  • young and dynamic team
  • not an entirely top down management style, we are open to suggestions
  • multi industry exposure, possibility of acquiring specialized skill sets
  • In depth technology training will be provided
  • Wide exposure in corporate analytical strategy
  • Attractive career growth plan with performance paced evaluation

Kindly Email to jobs@concordess.com for any inquiry and applications.

Thursday, September 29, 2011

Generic Polymorphic Malware

Refer to 'Symantec Announces September 2011 Symantec Intelligence Report' on Enterprise IT News

Generic Polymorphic Malware was first identified in July 2011.

Email-borne polymorphic malware soars to unprecedented levels in Sept

The malware is frequently contained inside an executable within the attached ZIP archive file and often disguised as a PDF file or an office document. This new aggressive approach to distributing generic polymorphic malware on such a scale should be concerning for many businesses, particularly for those who rely solely on more traditional security countermeasures, which this type of malware is designed to evade. One example of this technique involves changing the startup code in almost every version of the malware; subtly changing the structure of the code and making it harder for emulators built-in to many anti-virus products to identify the code as malicious. Technology cannot rely on signatures and heuristics alone, and must also take into account the integrity of an executable based on knowledge of its reputation and circulation in the real-world.

Additional research also reveals that JavaScript is becoming increasing popular as programming language by spammers and malware authors. JavaScript is increasingly used to conceal where spammers are redirecting, and in some cases, also to conceal entire Web pages.

Spam: In September 2011, the global ratio of spam in email traffic declined to 74.8 percent (1 in 1.34 emails), a decrease of 1.1 percentage points when compared with August 2011.

Phishing: In September, phishing email activity diminished by 0.26 percentage points since August 2011; one in 447.9 emails (0.223 percent) comprised some form of phishing attack.

E-mail-borne Threats: The global ratio of email-borne viruses in email traffic was one in 188.7 emails (0.53 percent) in September, an increase of 0.04 percentage points since August 2011.

Web-based Malware Threats: In September, Symantec Intelligence identified an average of 3,474 Web sites each day harboring malware and other potentially unwanted programs including spyware and adware; an increase of 1.0 percent since August 2011.

Endpoint Threats: The most frequently blocked malware for the last month was W32.Sality.AE, a virus that spreads by infecting executable files and attempts to download potentially malicious files from the Internet.

Brocade Strengthens Application Delivery Switching Performance and Security for Cloud-Optimized Data Centers

Brocade (NASDAQ: BRCD) expands customer control with the introduction of the Brocade® ServerIron® ADX 1000F compact application delivery switch, which includes the benefits of combined copper and fiber connectivity.

This extension to the award-winning Brocade ADX 1000 Series is designed to deliver increased customer choice and flexibility for cloud-focused service providers, financial institutions and governmental agencies, while also setting the industry benchmark for application delivery switching performance, scalability and investment protection.

The result is up to 50 percent power savings and improved data transmission reliability and security, while also dramatically consolidating data center rack footprint.

Video: Brocade ServerIron ADX 1000F Overview: http://www.youtube.com/watch?v=hN2NnFwerjU

Modern data center requirements have become increasingly stringent and demanding. The need to significantly reduce power consumption while also delivering greater performance, carrier-grade reliability and secure data transmission has caused network managers to scrutinize their application delivery solutions. Compounded with increasingly complex application requirements, massive client access growth and the requirement for maximum performance, the importance of anticipating future capacity requirements has become a critical factor.

While many industries can benefit from the inherent capabilities fiber optics deliver, there are three distinct vertical industries with clear deployment needs: large cloud service providers, global financial institutions and governmental agencies:
  • In large cloud provider implementations flexible capacity and massive scalability is necessary for providers to react quickly and seamlessly to changing end-user bandwidth and application requirements.
  • In enterprise networks, the ability to operate within a smaller real estate footprint and a reduction in overall cost are top concerns.
  • With security and data integrity primary concerns for government agencies, added layers of security are often necessary to meet strict regulations.

“To solve these critical challenges for customers worldwide, the Brocade ServerIron ADX 1000F leverages the inherent connectivity benefits of fiber to maximize bandwidth, dramatically reduce power consumption by roughly 40 to 50 percent and meet security requirements by government agencies,” said Zeus Kerravala, senior vice president and distinguished research fellow for Yankee Group. “Fiber also offers space-constrained customers with higher-density hardware and cable capabilities, resulting in the need for fewer racks. By consolidating rack space, data centers can operate within a smaller real estate footprint, which ultimately reduces energy overhead and increases rack efficiency 80 percent versus copper.”

From a connectivity medium perspective, fiber minimizes the possibility of performance degradation compared to copper. Because fiber is less susceptible to electrical interference, it is ideal in environments where magnetic fields can overpower cable shielding and cause performance degradation or complete connectivity loss. This vulnerability to interference is also a potential security liability. Data transmission signals over standard copper Ethernet can actually be tapped into from the electrical field around the cabling. Fiber is far less vulnerable to this, by design, making it a highly secure solution.

“Our organization is built on the ability to deliver highly reliable networking for mission-critical enterprise customers,” said Ik Joong Lee, IT Team Head for NICE (National Information & Credit Evaluation). “In order to ensure our customers have secure, resilient and fast data transmissions while also being very conscious about maximizing our data center real estate footprint, we turned to the Brocade ServerIron ADX 1000F because of its compact powerful form factor and proven capabilities in the most demanding environments.”



Fiber also provides extended range compared to copper connections. With copper, there is a distance limitation due to signal degradation as the cabling distance increases. Fiber has the capacity to carry high-speed signals over greater distances without the need for data signal amplifiers. This is an important factor for distributed data communications environments.

“We are providing more proof points for our Brocade One™ strategy, which helps our customers reduce network complexity and scale with new and distributed applications. With the launch of the Brocade ADX 1000F, we are able to demonstrate how our innovations provide new levels of performance, scalability and security through added customer choice and control,”said Gina Tan, Regional Director for South East Asia. “Our solutions available today support the IT transformation required to embrace any and all cloud architectures.”

The Brocade ADX 1000F is an extension to the Brocade ADX Series of high-performance application delivery switches. It provides a broad range of application optimization functions to ensure the reliable delivery of critical applications. Purpose-built for large-scale, low-latency environments, the Brocade ADX Series accelerates application performance and improves application availability–all while making the most efficient use of existing infrastructure. To help ease the transition to IPv6, leading-edge IPv4-to-IPv6 translation technology enables service providers, enterprises and government agencies to systematically adopt IPv6 without the costly process of replacing their existing IPv4 application infrastructure.

More on Brocade.

Monday, September 26, 2011

Silver Peak's VXOA (Virtual Acceleration Open Platform)

Refer to this link from Enterprise IT News.

VXOA (Virtual Acceleration Open Platform) is an virtualized platform for WAN optimization.

WAN optimization is a collection of techniques for increasing data-transfer efficiencies across wide-area networks.

It targets data center and enterprise market segment.

Common WAN Optimization techniques include:

1.) Deduplication
2.) Compression
3.) Latency optimization
4.) Caching/proxy
5.) Forward error correction
6.) Protocol spoofing
7.) Traffic shaping.
8.) Equalizing
9.) Connection limits
10.) Simple rate limits

VXOA differentiation with other similar product is it deploys virtualization technique as well.

In short, VXOA is a platform which sits on top of virtual machines and connects Silver Peak's WAN optimization product to these virtual machines and other external 3rd party applications (such as reporting tools).

#madworkshopkl2011 workshop organized by Instep Learning Asia, Info Trek and Frenclub

Do attend the workshop on 18 October 2011 (8:00am to 6:30pm) to learn about software development on mobile platform. The trainer is Daniel Freeman. The fee is RM 580 per head.

To get promo code, check out this link.

Check out 'Mobile Development Platforms and Tools (SDK)'

And to capitalize from the 10 million Galaxy S II users around the world as your potential customers (for your mobile app).

Also remember to attempt D.A.R.E BizStart event to be held on Sunway Pyramid Convention Center on 28 - 29 Sep 2011 to benefit from new ideas and funding opportunities.

CGC accelerates risk management program with SAS

To enhance its overall risk management system and improve small and medium enterprises (SME) portfolio management and outreach, Credit Guarantee Corp. Malaysia Berhad (CGC) selected SAS, the leader in business analytics software and services.

With SAS Enterprise GRC, SAS Financial Management and SAS Business Analytics, CGC expects greater efficiency in risk data reporting and analysis. Centralizing CGC’s risk data storage, SAS will quickly trigger alerts when CGC’s risk appetite rules are violated. The quick identification of potential problems helps CGC better manage its risk exposure and provide more effective loan quality.

SAS will serve as an administration platform for CGC to continually develop and maintain its credit rating model, which is essential for loan quality management. The system will also enhance strategic decision-making and risk mitigation through early warning signals and proactive risk monitoring.

“CGC’s credit risk and operational management system will enable us to be more proactive in risk management monitoring and provide better credit quality and overall risk management,” said Datuk Wan Azhar Wan Ahmad, CGC’s Managing Director.

Datuk Wan Azhar added that the dynamic risk management system reflects CGC’s resolve to further expand its outreach to all sectors of the economy. “With improved risk monitoring and enhanced efficiency, CGC will be able to better manage its diverse portfolio of SMEs and offer financing to those most viable and deserving.”

Datuk Wan Azhar further stressed that the faster and more reliable risk reporting system aligns with CGC’s efforts to improve its loan quality and continually enhance services to the SMEs that form a vital segment of the economy.

“Over the past 35 years, we’ve helped companies like CGC meet their objectives by combining innovation and a passion for business analytics,” said Andrew Tan, SAS Malaysia’s Managing Director. “We see CGC benefiting greatly from faster and more reliable risk reporting.”

Tan added, “SAS helps eliminate errors in risk identification, provides a new ability to pinpoint a specific risk sector and factor, and solves the huge challenge of integrating data of different variables from different systems for ad hoc reporting.”

With SAS’ proven analytics expertise and extensive experience as a reliable risk solution provider for financial services institutions, CGC is confident that the investment in its credit risk and operational management system will further enhance its position as the country’s leading credit guarantee provider for SMEs.

Saturday, September 24, 2011

Overcoming Cloud IT Security Challenges (by Ivan Wen)

Refer to this article from Enterprise IT News


Challenges

1.) Loss of governance - how to be in charged when you do not own the infrastructure ?

2.) Potential insecurity of shared infrastructure - security on a shared infrastructure, how to get it work ?

3.) Data lost and leakage - Confidentiality service level agreement (SLA). Is there such thing ?

According to Ivan Wen, the Country Manager of Sourcefire Malaysia.

Mitigation Solutions:

1.) Evaluating the cloud vendors.

2.) Start planning now.

3.) Trial and error on private cloud first.

Bill Gates Is the The Richest Yet Again

Forbes determines that Bill Gates is the richest person in the US yet again.

With a estimated fortune of US $59bn (£37.4bn).

Here are the top 10.

Rank Name Worth Age Source
1 Bill Gates $59B 55 Microsoft
2 Warren Buffett $39B 81 Berkshire Hathaway
3 Larry Ellison $33B 67 Oracle
4 Charles Koch $25B 75 diversified
5 David Koch $25B 71 diversified
6 Christy Walton $24.5B 56 Wal-Mart
7 George Soros $22B 81 Hedge funds
8 Sheldon Adelson $21.5B 78 Casinos
9 Jim Walton $21.1B 63 Wal-Mart
10 Alice Walton $20.9B 61 Wal-Mart

Friday, September 23, 2011

Government Must Improve Malaysia's Global Competitiveness

Refer to 'Dr Chua: Govt must continue to improve M'sia's global competitiveness'.

I am 100% agree with MCA President Datuk Dr. Chua Soi Lek.

The biggest problem with the financial situation of Malaysia is not that the consumer are spending too much money or that they are reckless in terms of spending.

Do we want to suggest that Malaysian cut spending on insurance coverage so that they don't have to use more of their credit cards ?

The way I see it from an entrepreneur or business man point of view, the biggest problem is that Malaysian are not earning enough money to cope with today's ideal living lifestyle. And the root of that cause is because Malaysia's businesses are not able to compete well enough in the regional and global arena to reap enough profit to reward back the employees.

Malaysia must produce more home grown international companies and smaller business must strive to acquire more global markets.

And please, better quality education for ALL Malaysian, as much as what you need for your 1Malaysia initiative.

Worth a thought.

Wednesday, September 21, 2011

Brocade's Cloud Computing Offerings Updates (Network Subscription, VCS Fabric, Virtual Compute Blocks)

Brocade Network Subscription is not an Infrastructure-as-a-service (IaaS) offering, rather it is about rental of Brocade's product on subscription basis.

Target market:
  1. Service providers
  2. Cloud providers
  3. Government
  4. Large enterprises
The purpose of such model is to offer potential customers with an alternative of adopting Brocade's technologies, particularly cloud optimized products.

To qualify for such facility, applications from potential customers must be approved by Brocade's sales. Each subscription comes with technical support, however, professional consultation is not included.

Such offering is crucial in lieu with current trend of cloud computing adoption where end users get to 'scale' their existing infrastructure by taping on Brocade's technology. It also offers customers with the option to perform trial and error before committing on acquiring the actual assets.

Anything to do with subscription will be more expensive in the long haul, however, given the scenario where technology obsolete almost at the same speed as depreciation (financial), such differences can be easily offset.

This is a new way of selling hardware and it is timely for customers in the abovementioned four categories to get on to the bandwagon of cloud computing quickly (to meet business demands) without having to 'rip and replace' their existing infrastructure. The logic behind this is because Brocade's products are designed to work with legacy Ethernet networks and the Ethernet fabrics.

For instance, Brocade VDX 6720 Data Center Switch is an Ethernet fabric switch which supports Brocade VCS technology and conventional ethernet switches. When deployed, it will form a bridge between conventional network and fabric network (Ethernet) fabric. Brocade's VCS fabric technology, the first Ethernet fabric technology in the industry is actually a platform to support virtualization of the Ethernet network. The VCS technology consists of three components namely: Etherenet Fabric, Distributed Intelligence and Logical Chasis.

The term fabric is thus so because it describes a scenario where all nodes are potentially interconnected and nodes are possible non physical nodes. It also meant to describe the concept of platforms, intelligence and automated, ubiquitous and scalability. It short fabric is the description for dynamism as opposed to rigid.

To understand this further in terms of it architecture, here is a snapshot.

"Brocade VCS fabrics are self-forming, self-healing, and highly resilient. By eliminating Spanning Tree Protocol (STP), they provide active-active connections originating from the server, which doubles the utilization of the entire network while improving resilience. Featuring a high level of resiliency, Brocade VCS fabrics provide rapid failover and fabric reconvergence, and links can be added or modified quickly and non-disruptively.

Unlike other Ethernet fabric architectures, Brocade VCS fabrics are masterless and can be designed in full mesh, partial mesh, leaf-spine, and various other topologies, and they are easily modified or fine-tuned as application demands change over time.

Only Brocade VCS-enabled fabric switches provide a full fabric-wide view of Layer 2 address tables as well as QoS, security, and VLAN-related information."

With commitment to Brocade One's CloudPlex Architecture; an open standard architecture for cloud optimized computer network architecture. (The CloudPlex supports open standards such as OpenFlow and OpenStack.), Brocade has now made further enhancements to its VCS fabric technology by introducing more new features such as:
  1. VM awareness (detection) and automation (configuration) which include integration with VMWare's vSphere.
  2. Network advisor provides a software based management console which caters for management of all physical and virtualized assets (which include SAN, virtual machines, switches, routers and etc) in the Ethernet fabric (powered by VCS fabric).
  3. Multi-Vendor Virtual Compute Blocks
Multi-Vendor Virtual Compute Blocks

Multi-Vendor Virtual Compute Blocks is a concept which is referring to a scenario where the VCS fabric now supports multi-vendor integration for server, virtualization, networking and storage resources; up to protocol level.

For example:

1.) Dell - Brocade and Dell have partnered to develop a reference architecture that includes Dell Compellent Fibre Channel storage, Dell PowerEdge servers, Brocade data center and SAN switches and the VMware hypervisor

2.) EMC - EMC and Brocade have joined forces with several partners to deliver Virtual Compute Blocks, which combine VMware virtualization software and management tools, EMC® VNXe™ unified storage, servers and integrated Brocade Fibre Channel and Ethernet fabric networking technologies.

3.) Fujitsu - Fujitsu and Brocade have partnered to create automated pools of computing resources made up of server, storage, network and virtualization technology.

4.) Hitachi converged data center solutions combine storage, compute and networking, with software management, automation and optimization to automate, accelerate and simplify cloud adoption.

5.) VMWare - VMware and Brocade have developed a reference architecture solution that enables organizations to create a scalable virtual desktop infrastructure (VDI) environment.

6.) Avnet - Brocade and Avnet announced the joint development of marketing and enablement support for a new set of multi-vendor, pre-tested and configured virtualization solutions.

VMware Workstation vs VMWare vSphere

Refer to this link from Enterprise IT News.

The VMWare vSphere is a virtualization platform for building cloud infrastructures.

Its core purpose is to manage virtualized computing infrastructure known as virtual machines which is pretty much virtualized operating system.

The core two layers of vSphere are 1.) Infrastructure services 2.) Application services.

Infrastructure services are referring to 3 core components 1.) Compute, 2.) Storage 3.) Network

Application services are referring to 3 core components 1.) Availability, 2.) Security, 3.) Scalability.

It is actually an operating system by itself, providing a infrastructure-as-a-service (IaaS) and platform-as-a-service(PaaS) product combination for the cloud computing arena.

Other products that are directly related to vSphere are 1.) vSphere Hypervisor, vCould Director, vCenter Server, vSphere Automation Tools vFabric Hyperic. All of which can be deployed collectively or individually on site. The vSphere is the foundation of all.

VMWare vSphere is a server-based product and it targets the data center industry and private cloud (for small business, SME and enterprise).

VMware Workstation is a desktop version of VMWare's virtualization platform. It can be used to run cloud computing (virtual machines) on PC and can be configured as server services as well. However, it is not meant for server and data center with its limited functionality.

VMware Workstation 8 now allows better integration with vSphere.

Sunday, September 18, 2011

Mobile Development Platforms and Tools (SDK)

Refer to
There are supposed to be 7 mobile platforms out there namely iOS,Android, Blackberry Tablet OS, Windows 7 Tablet OS, Web OS, Symbian, Bada.

With HP recently announced that they are halting the production of tablet due to below than expected sales, this leaves the playground to only 6 platforms.

Now let's see what type of tools out there in the market to target these 6 platforms.

A total of 8 tools (SDK) available in the market (could be more out there).

Development Tools (SDK) Company URL Language Type Compiled code applicable to (platform) SDK installable on (platform) License Cost Remarks
Xcode 4 Apple URL C, C++, Objective C, Objective C++, Java, Apple Script, Python and Ruby Native code deployment Mac, iPhone, and iPad apps Mac OS (Apple) Membership costs $99 per year 1.) Able to build all sort of apps including games. 2.) SDK is not free and only meant for Apple's platform 3.)Support server side scripting
PhoneGap Nitobi Software URL HTML5, CSS3, JavaScript Cross platform, non native, requires framework and run time machine to compile codes into native codes iOS, Android, Blackberry Tablet OS, Bada, Symbian, Windows Phone Mac OS (Apple) Modified BSD license or the MIT License (2008) 1.) Requires XCode as pre requisite. 2.) Suitable for phone based apps and business apps. 3.)SDK is free
AdobeAir SDK Adobe URL HTML, JavaScript, Adobe Flash ® and Flex technologies, and Action Script ® Cross platform, non native, requires framework and run time machine (Adobe Air ) to compile codes into native codes Android, Black Berry ® Tablet OS, and iOS Windows, Mac OS (Apple) Free 1.) Suitable for phone based apps and business apps. 2.) The availability of ActionScript and Adobe technology makes it suitable for games apps as well. This platform is more powerful than PhoneGap. 3). SDK is free
Titanium Studio Appcelerator URL HTML5, CSS3, JavaScript, Ruby, PHP, and Python Cross platform, non native, requires framework and run time machine (Titanium Platform) to compile codes into native codes Android, iOS Windows, Linux, Mac (Apple) Community (Free), Indie, Professional, Enterprise edition 1.) Suitable for phone based apps and business apps. 2.) Support web services calls (to cloud services) 3.) SDK is not free 4.) Support service side scripting
Marmalade SDK Marmalade URL C++, Objective C Native code deployment Android, iOS,  Symbian, Bada, Web OS, Blackbery Tablet OS, LG Smart TV, Windows Desktop & Mobile, Mobile Linux Windows, Mac (Apple) Basic (Free), standard, professional, enterprise edition 1.) Able to build all sort of apps including games . 2.) Supports LG Smart TV platform 3.) SDK is not free
Android SDK Android (Google) URL Java Cross platform, non native, requires framework and run time machine (Java Run Time) to compile codes into native codes Android Windows, Mac (Apple), Linux Apache License Version 2.0 1.) Able to build all sort of apps including games . 2.) Java based 3.)SDK is free
Visual Studio 2010 Express for Windows Phone Microsoft URL C, C++, C#, VB Non native, requires framework and run time machine (.NET, Silverlight,  XNA) to compile codes into native codes Windows Phone 7 Windows Complementary  (Add on to Visual Studio 2010) 1.) Able to build all sort of apps including games . 2.) Microsoft .NET based
Sybase® Unwired Platform (SUP) 2.1 Sybase URL HTML5, CSS3, JavaScript Cross platform, non native,  requires framework and run time machine (SUP 2.1) to compile codes into native codes iOS, Android, Blackberry Tablet OS Windows Require license 1.) Suitable for phone based apps and business apps . 2.) support for SAP data integration through SAP NetWeaver ® Gateway technology. 3.) SDK is not free

Conclusion:

Depending on the platform that you are building on and programming languages, different choices are to be made.

Windows looks pretty lonely and Android is the obvious choice for low investment projects.

Marmalade is pretty interesting to take note because it allows direct deployment of the same source codes into either iOS and Android natively. However, Android is actually not native, it is open source and that is why it is possible. This means that Marmalade is actually prone iOS.

Sybase SUP is also interesting because it caters for SAP data integration, which is a good thing because every body wants to be involved with SAP for it is a huge business.

Conclusions of the conclusion:
  1. If you build your code using C++ and Objective-C, you can always port it to Android, because Android is cross-platform and non-native. Thus, I suggest that Marmalade SDK is the preferred choice because you can develop it using Windows platform machine or Mac OS platform machine. Thumbs up!
  2. If you are most likely going to build business apps, it is a good choice to go for Sybase SUP because then you can also play around with SAP integration.
  3. If you are Windows hardcore fan, then just stick with Visual Studio 2010 Express for Windows Phone.
  4. If you are Adobe Flash fan, then just stick with AdobeAir.
Instep Learning Asia, Info Trek and Frenclub is organizing a workshop on Mobile App Development Workshop on 3 platforms (iOS, Android, Windows Phone 7) on 18 October 2011 (8:00am to 6:30pm).

Refer for details and to get the promo code.

The code name of the workshop is #madworkshopkl2011.

So, 6 platforms, 8 tools, this is a good time to become part of the history of ICT world.

Oracle Introduces Pillar Axiom Release 5 Storage System Software

Refer to this link from Enterprise IT News.

Pillar Axiom Release 5 Storage System Software is a unified storage solution.

It integrates SAN (Storage Area Network) and NAS(Network Attached Storage) technologies into a single platform;Pillar Axiom 600 is a unified SAN/NAS platform.

It is able to cater for Qos (Quality of Service) and user friendly configuration for assignment of storage resources.

In particular, it achieves the following capability.

In terms of SAN (Storage Area Network).
  • Unified storage pool
  • Ability to assign storage resources (CPU, cache, capacity)
  • Unmatched performance
  • Simplified management
And in terms of NAS (Network Attached Storage).
  • Low capital and operating expense (ownership cost)
  • Single management point for file based storage (as well as block based storage)
  • Huge capacity and performance scale
  • Dual-everything design; active-active
Both SAN and NAS are essential to create a powerful storage platform.

SAN and NAS used to be two different products offered by different vendors. Now it is available as modules in a single product.

Friday, September 16, 2011

Latest Version Of Solarwinds Application Performance Monitor launched

Monitoring the availability and performance of applications and servers is crucial to the health of today’s IT infrastructure. SolarWinds® Inc. (NYSE: SWI), a leading provider of powerful and affordable IT management software, today announced the availability of the latest release of its application performance monitoring product, SolarWinds Application Performance Monitor (APM).

SolarWinds first launched Application Performance Monitor in January to provide systems administrators with visibility into the performance of critical IT services, the underlying application components, the operating system, and the Windows, Unix and Linux server resources on which they run at a reasonable price.

New Features and Enhancements

  • Monitoring capability for Java-based applications including Apache Tomcat, JBoss, GlassFish, WebSphere, WebLogic, and more with JMX MBean monitors
  • Runs Nagios scripts natively, with no conversion required
  • Integrates with Synthetic End User Monitor to proactively monitor web applications
  • Includes new and updated out-of-the-box Expert Templates for over a dozen commonly monitored applications
  • Supports complex scripts that return multiple values
  • Multi-value charts provide the ability to graph multiple values in a single chart to show trending in a single pane
  • Data transforms allow you to perform mathematical operations on statistical values before display, reporting, and storage
  • Enhanced Performance and User Interface
Pricing and Availability

SolarWinds Application Performance Monitor is available now and pricing starts at US$2,495, with the first year of maintenance included. For more information, visit the SolarWinds website, download a free 30-day evaluation, or call +65 593 7600.

Media contacts:

Yip Min-ting                                                                                                       
The Hoffman Agency                                                                                         
Phone: 65.6238.1785                                                                                           
myip@hoffman.com

SAP and Sybase to Fuel Enterprise Mobile App Development With Latest Release of Sybase® Unwired Platform

Refer to this link from Enterprise IT News.

Sybase is a company famous for its "Sybase SQL Server", which is the ancestor for today's Microsoft SQL Server. Microsoft didn't acquire the whole Sybase, only the source code for the Windows Based SQL Server.

Sybase®Unwired Platform (SUP) 2.1 is a mobile enterprise application platform that enables enterprise developers to simply and quickly build applications that connect business data to mobile workers on any device, at any time. It will also includes support for SAP data integration through SAP NetWeaver? ®Gateway technology.

Sybase®Unwired Platform 2.1 is integrated with Afaria;the industry's most powerful and flexible mobile device management and security solution for the enterprise.

The SUP will include Software Development Kit (SDK) which is not free for download, it has to be purchased.

Its supports iPhone, BlackBerry and Android mobile platforms.

The mobile application opens a door of opportunity for enterpreneurs, start-ups and etc.

For entrepreneurs waiting to capitalize the SAP market, this is your chance.

The only problem is you need to purchase the SDK, can't download for free.

More on SAP and entrepreneur's opportunity.

Thursday, September 15, 2011

AIM - MACRI Forum on Nurturing Indigenous Ideas, 24 Sept 2011

This special forum on Nurturing Indigenous Ideas is the first joint effort between AIM and MACRI.

Leading this session is Dato Dr. Kamal Jit Singh, CEO of AIM, the vanguard for innovation in Malaysia. His passion in advocating innovation and his support for innovators, in particular our Garage Innovators, indeed give us all the more reason to attend this event.

Joining Dato’ Dr. Kamal Jit as panelists are Dato’ Dr Marzalina Mansor, Exco Member of MACRI, and Mr. Paul Chang, inventor of Cal-Lab Lightning Isolator and Founder/CEO of Cal-Lab Sdn. Bhd. While Dato’ Dr Marzalina will represent MACRI’s interest in nurturing the culture of innovation, Mr Paul Chang, who is an inspiration to many budding innovators, will share his thoughts on behalf of the Garage Innovators.

Date : 24th September 2011 (Saturday)

Time : 9.00am - 1.30p.m

Venue : AIM Level 2, Quill Building 3, Jalan Teknokrat 5, 63000 Cyberjaya.

Please register via www.macri.com.my/event.php before 20th September 2011 to reserve a seat.

Participation is free of charge on first come first served basis. You may bring along your friends, colleagues and family members. Attached is the invitation / flyer on the forum which you may extend to those interested. Should you have any problem receiving the attachment, kindly proceed to the link below to download the flyer.

Storing Items as Objects To Combo Box (VB.NET)

This applies to Microsoft .NET Framework programming.

The purpose of storing objects instead of string to combo box is to allow for other information to be stored as well.

For instance, instead of just storing the text, we may also want to store the index key.

To give you a very good example.

Let's say you want to store a record where the name=Ali in combobox.

But at the same time, you also want to store the index key alongside this information so the same record can be referenced back from the database (datasource).

If you are using textbox, it is possible to do this using the tag property, however in combo box, you can't do that.

Thus, you got to do it by storing the item as object instead of string.

The tricky part is that when you do that, by default, the combo box will display the instance name of the object instead of its intended property such as the name.

Refer to 'vs-issues-sep-2011-10.jpg'


The solution is to create an 'Overrides' function for ToString.

Refer to 'vs-issues-sep-2011-11.jpg'


1.) Create a customized class.

Public Class clsA

    Private recID As Integer
    Private myName As String

    Public Property VAR_recID() As Integer
        Get
            VAR_recID = recID
        End Get
        Set(ByVal value As Integer)
            recID = value
        End Set
    End Property

    Public Property VAR_myName() As String
        Get
            VAR_myName = myName
        End Get
        Set(ByVal value As String)
            myName = value
        End Set
    End Property

End Class

2.) Create instances of clsA and add those instances to the combo box.

'--- create new object relational
            objCol = Nothing
            objCol = New Collection

            For i = 1 To 10
                objA = New clsA

                objA.VAR_recID = i
                objA.VAR_myName = "brandon " & i

                If Not objCol Is Nothing Then
                    Call objCol.Add(objA, i)
                End If

                objA = Nothing

            Next i

            '--- Add to combo box ---
            If Not objCol Is Nothing Then

                For i = 1 To objCol.Count
                    objA = objCol.Item(i)
                    Call ComboBox1.Items.Add(objA)
                    objA = Nothing

                Next i
            End If


3.) Create an 'Overrides' function for ToString inside class clsA.

Public Overrides Function ToString() As String

        Try
            ToString = myName
        Catch ex As Exception
            ToString = DirectCast(Me, Object).ToString
            MsgBox(ex.ToString & vbCrLf & ex.Message & vbCrLf & ex.StackTrace)
        End Try

    End Function


Download the sample codes (VB.NET Visual Studio 2008 SP1) for detail.

Wednesday, September 14, 2011

SAP to Acquire 3-D Visualization Software Maker Right Hemisphere

Refer to this article from Enterprise IT News.


Right Hemisphere is a company which provides Visual Enterprise Solutions.

Visual Enterprise Solutions provides 3D visualization, collaboration and publishing solutions to the enterprise.

It primarily targets the manufacturing industry to enable visualization of manufacturing process right from design to production to sales and marketing.

It supports Windows platform.

This is very interesting.

What we learn from SAP until now ?

  1. Keep your product elite and charge premium prices.
  2. Make sure you keep growing your product, create a suite out of it and keep adding modules. From Archeology module to Zoology module.

Ya. That simple, just three things.

1.) Stand out in the market, 2.) sell and make money and 3.) never stop innovating. I haven't heard from a company which can sell product which the innovation stopped 10 years ago, but then again, maybe there are exceptions.

Emailed The Wrong Persons Can Be Costly and Even Funny

Inspired by 'Another potential threat of Doppelganger domains'.

The original article is written by Kim Zetter.

Basically, this is the summary.


Two researchers who set up doppelganger domains to mimic legitimate domains belonging to Fortune 500 companies say they managed to vacuum up 20 gigabytes of misaddressed e-mail over six months.

Doppelganger domain situation happens when you try to send email to brandonteohno1@yahoo.com and instead you sent it to brandonteohno1@ahoo.com and sometimes event brandonteohnol@yahoo.com.

The article says that when you send email to the wrong email addresses which are categorized as Doppelganger domain, you risk sending confidential information and exposes data lost and suffers data confidentiality breach or something like those.

These researchers set up 30 doppelganger accounts for various firms and found that the accounts attracted 120,000 e-mails in the six-month testing period. The emails that came into these sites include such potentially valuable information as:
  • Full configuration details for the external Cisco routers of a large IT consulting firm, along with passwords for accessing the devices
  • Passwords for obtaining full VPN access into the system that supports the major road tollways in a European country.
  • Lots of miscellaneous invoices, contracts and reports

Mitigating Strategies (recommended by the white paper)

  • Purchase and register the Doppelganger Domains. On the external DNS, configure those domains to not resolve anywhere so that the send would receive a bounded email notification.
  • Identify if attackers are already using a Doppelganger Domain against your compnay, and file a Uniform Domain Dispute Resolution Policy (UDRP) if they are.
  • Internally configure the DNS to not resolve any Doppleganger Domains, even if your company does not own them. This will protect internal only email from being accidentally sent to a Doppelganger Domain.
  • An alternative to configuring the internal DNS for Doppelganger Domains is to configure the mail server to not allow any outbound email destinations to Doppelganger Domains.
  • Communicate the attack vector to your internal users, customers and business partners. The more awareness they have on social engineering attacks, the less susceptible they will be.

CA Technologies Positioned in the Leaders Quadrant of the Magic Quadrant for Content-Aware Data Loss Prevention

Refer to this link from Enterprise IT News


CA DLP (Data Lost Prevention) is a product which will protect unauthorized crossing of data in and out of an organization.

It is content aware and intelligent.

It is categorized as 'Information Protection & Control' application.

Its application includes:
  1. Emailing controls
  2. Prevent loss and misuse of critical data in and out of organization.
  3. Information security compliance
  4. Organization integrity
  5. Confidentiality management.

Tuesday, September 13, 2011

Sourcefire Announces ‘AGILE SECURITY’ Vision: Moving IT Security Solutions Beyond Static Defenses

Sourcefire, Inc. (Nasdaq: FIRE), a leader in intelligent cybersecurity solutions, unveils its Agile SecurityTM vision that emphasizes the need for more informed, adaptive, and automated security solutions to protect today's dynamic IT environments from constantly changing threats.

IT security threats today can be extremely complex and unpredictable, and have been able to bypass traditional ‘static’ security which is not designed for rapidly moving IT resources, users, applications, devices and systems.

‘Agile Security’ aims to address today’s ‘dynamic’ threat environment through four essential tenets:

  1. See. Traditional IT security solutions are often blind to the threats to their network environment. An agile approach provides clarity and vision to reflect actual ‘threat’ reality faced by the business.
  2. Learn. Apply intelligence to IT security to improve understanding and decision-making.
  3. Adapt. Automatic modification of the enterprise network’s IT security defense to better respond to the threats faced.
  4. Act. Able to provide decisive, flexible and automated responses to threat events.


Sourcefire’s Agile Security ties together an organization’s entire security infrastructure, from network-to-endpoint, and continuously loops through this network-to-endpoint process in real-time so as to reduce the time gap between occurrence of a threat/ attack event and when action is taken.

Most of today’s security infrastructure is ‘static’. This means that security policies are mostly defined in advanced, and for IT infrastructure and business relationships that are relatively ‘unchanging’ or ‘unmoving’. However a‘static’ IT security infrastructure is becoming an inhibitor to dynamic business needs, and is not effectively to support an environment that has multisources (of data) and virtualized (ie. leveraging abstract IT resources). Traditional solutions lack the agility required to successfully defend today’s rapidly changing IT environments against modern threats

John Burris, CEO of Sourcefire says “We live in a world of surprise, and thus need IT security solutions that are agile enough to learn and adapt to network changes, vulnerabilities and threats as they happen.”

“With Agile Security, Sourcefire is defining a more effective approach for organizations to protect themselves against today’s security realities. With the industry’s most accurate detection and powerful automation, Sourcefire provide its users with unparallel production for their business IT networks.”

Sourcefire customers, in some of the most demanding computing environments in the world, have demonstrated how Agile Security elevates overall defense of their organizations. For more information, download the Agile Security white paper from http://www.sourcefire.com/agile.

Monday, September 12, 2011

Juniper Networks Ethernet Switches Awarded UC APL Certification by the U.S. Department of Defense

Refer to this link from Enterprise IT News.
 

U.S. Department of Defense (DoD) Unified Capabilities (UC) Approved Products List (APL) certification is a certification setup to help with the DoD to perform acquisition of technology for military usage.

The significant of such achievement of certification demonstrates Juniper's product superiority in worldwide basis.

More on Juniper.

Sunday, September 11, 2011

IBM Broadens Efforts to Prepare Small and Medium Businesses for Growth

Refer to this link from Enterprise It News.


IBM Global Financing helps you acquire the IT solutions that your business needs in the most cost-effective and strategic way possible.

Financing options include:

1.) IT lifecycle financing
2.) Commercial financing
3.) Pre-owned Equipment

IBM Global Financing offerings are provided through IBM Credit LLC in the United States other IBM subsidiaries and divisions worldwide to qualified commercial and government clients. Rates are based on a client’s credit rating, financing terms, offering type, equipment type and options, and may vary by country.

Saturday, September 10, 2011

In Search Of Incredible

Our planet is home to many stories.

But how many of them are truly incredible ?

We are seaching for the most amazing stories on earth and beyond.

You have a part to play, will you join us for the search ?

Watch one man’s quest to capture the amazing sound of the unmistakeable cry of a peacock. Listen to the incredible sound that’s captured as the echoes reverberate around the vaulted ceilings of the extraordinary cathedral. It’s a breathtaking sight and an incredible sound.

Friday, September 09, 2011

Microsoft Dynamics AX 2012 Launches Worldwide

Refer to this link from EnterpriseITNews.


Microsoft Dynamics AX 2012 is a cloud based ERP solution, based on Windows Azure (PaaS) cloud environment.

The first benefit allows eligible partners ordering Microsoft Dynamics AX 2012 licenses for customers replacing an existing Lawson ERP system to receive a 50% discount on the standard list price. This offer applies to orders for new customers making their initial purchase of Microsoft Dynamics AX 2012 during the offer period.

The second benefit is a reimbursement that participating partners can receive for training and certifying Lawson M3 or S3 consultants and developers in Microsoft Dynamics AX 2012.

It means that if you are hands-on with Lawson M3, you are eligible for discounts.

Microsoft localizes Microsoft Dynamics AX to include features and functionality designed to address specific tax, accounting or financial reporting requirements for various countries. It includes Malaysia!!!

Microsoft Dynamics AX 2012 marks the beginning of an era of web based business applications for SME and Enterprise (large corporation). This will mount a greater challenge to SAP and Oracle in the industry.

Web based is now !

Refer to more on Cloud Computing.

Thursday, September 08, 2011

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

Refer to this link from EnterpriseItNews.

One of World’s Largest Cybercrime Studies Reveals More Than One Million Victims a Day
  • $114 bn = The direct cash costs of cybercrime (money stolen by cyberthugs/spent on resolving cyberattacks)
  • $274 bn = Victims valued the time they lost to cyber crime.
With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion)

The study identifies men between 18 and 31 years old who access the Internet from their mobile phone as even more likely victims: in this group four in five (80 percent) have fallen prey to cybercrime in their lifetime.

Tablets – Fad or Here to Stay?

Tablets – Fad or Here to Stay?

Since the birth of the iPad, every week it seems like a different company is releasing their version of the tablet. And understandably so, right now they are the hot technology item to buy. They’re a smartphone-laptop cocktail, combining ingredients from both to concoct their own version of the two technologies all wrapped into one smooth device. But are tablets here for the long haul or just for the right now?

Tablet v. Smartphone

If you think about it, the tablet is a massive version of the smartphone. They both utilize the same sort of look and feel: rectangular, touch screen, high speed internet, endless apps… the main difference being that the tablet is much bigger, giving the user a little more ease when it comes to looking things up, reading on the screen, and doing general tasks such as typing. Except for the whole talking on the phone thing; you don’t really see anyone picking up their tablet to answer a call, and if you did, think about what a ridiculously huge phone that would be! This alone makes it hard for the tablet to overtake the smartphone, seeing as we are a nation that is addicted to our smartphones and being connected 24-7.

Tablet v. Laptop

It’s hard to guess which option is more ideal here. The tablet has obvious perks – one being that we are obsessed with touchscreens and emerging technology. We always want the latest and greatest. Another is how portable the tablet is with its sleeker design and the ease with which you can toss it into whatever bag or backpack you may currently be carrying. On the other hand, laptops have the advantage of the keyboard and more sophisticated software (for now, at least). And while you can buy a keyboard to connect to your tablet, doesn’t that kind of defeat the purpose? Then you’re just morphing it into a laptop…
Suffice it to say, it will be interesting to see if the tablet technology continues to improve and prevail or if it’s just a fad that fizzles out faster than hypercolor clothes and taking care of a pet rock did.

Laura Backes

This is a guest post from Laura Backes, she enjoys writing about all kinds of subjects and also topics related to internet providers in my area. You can reach her at: laurabackes8 @ gmail.com.

Read more about tablet.

Sunday, September 04, 2011

When Governments Have Got Not Enough Money #2

Inspired by 'We are doomed – doomed!'

In Britain, government debt is 89 per cent of GDP, company debt 126 per cent and household debt 106 per cent.

In Britain, as in every Western state, the primary business of government is the employment of its employees.

--> This happens everywhere, I believe.

The number of people of working age will shrink as a percentage of the total, and the number of pensioners will increase.

In the run-up to polling day, David Cameron summed it up in six words: “We can’t carry on like this.” Spot on, prime minister. Any ideas?

Also refer to David Cameron's 'The Next Age Government' and Bill Gates' 'How State Budgets Are Breaking US Schools' where Bill talks about
  • 2010 US GDP $14.7 trillion
  • 2010 US Spending (Federal, State, and local) - 36% of GDP
  • 2010 US revenue - 26% of GDP
  • Hence = 10% of deficits
I feel that smaller players have got better edge than their bigger contemporaries, and open source will have a bigger role. The governments will need to hire more Architects to oversee projects at a higher ground and expand ICT technical trainings for existing public servants.

The one gap to fill is who is going to be responsible for the success and failure of projects ? In current practice, vendors hold 100% responsibilities while stakeholders' agents such as project managers, project executives are merely playing facilitator roles. And even if you are going to hire a smaller firm with paid up capital of less than RM 100,000 to hold full responsibilities for a RM 10 million public project, it is ludicrous.

Perhaps a sensible solution to this is to split the RM 10 million public project into smaller and even smaller projects. However, we still need some form of overall responsibility.

Another solution to this is that the government simply cannot afford to own much ICT assets, everything will privately funded for public interest. And this will come with price; when you do not own the ICT facility, are you still in charge ?

It is a good time for public sectors to employ more best practices including financial management than political visions.

In previous similar discussion, 'When Governments Have Got Not Enough Money'.

Refer to more on trends.

Saturday, September 03, 2011

Juniper Network's Aug 2011 Updates (Meritalk Survey, Telecom Italia,ISO 140001, Harris Farm, vGW Virtual Gateway, University of Auckland)

1.) Meritalk Survey Finds Federal Consolidation Efforts are Increasing Data Center Complexity; 60 Percent Running More Than 20 Operating Systems

A Juniper Networks Sponsored Survey Reveals that Consolidation Mandate is Causing Data Center Complexity and Jeopardizing Potential Cost Savings

Check out details.

2.) Telecom Italia and Juniper Networks Win Award for IPv6 Migration Innovation

Telecom Italia today announced that they received Global Telecoms Business' IP Transformation award for their IPv4 Depletion & IPv6 Migration joint project. The project was designed to manage the parallel tracks of IPv4 and IPv6 seamlessly within a single architecture.

Check out details.

3.) Juniper Networks Achieves ISO 14001 Certification

Juniper Networks (NYSE: JNPR) today announced that it has achieved ISO 14001 certification for its environmental management system. The certification is based on an external validation of the company's environmental performance in the design, development, service and support of software, systems and silicon for high-performance networks.

Check out details.

4.) Harris Farm Markets Improves Customer Service with Juniper Networks Solutions

Fruit and Vegetable Chain Deploys Advanced Branch Networking and Security Solutions

Check out details.

5.) Juniper Networks Extends Cloud Computing Defense Platform with Anti-Virus Protections

Newest Version of Juniper Networks® vGW Protects Virtual Data Centers and Clouds with a Layered Defense Approach

Check out details.

6.) University of Auckland Simplifies Data Center with Juniper Networks

New Zealand's Leading University Adopts Innovative 3-2-1 Data Center Network Architecture

Check out details.

Friday, September 02, 2011

Google and Tourism Malaysia Ask Malaysians to Help Decide Where to Send the Street View Trike

Google today announced a team up with Tourism Malaysia to poll Malaysians on which national tourist treasures and uniquely Malaysian sites should be featured in Google Street View — the Google Maps feature that allows users to view and navigate 360-degree street-level imagery. Malaysians can vote and suggest their favorite locations at the website maps.google.com.my/svtrike, which will remain open for the rest of the month.

Malaysians will be able to choose places in five categories: Historical, Tourism, Cultural, Urban + Architecture, and Nature. The poll also includes a write-in suggestion box for any places not listed under the categories (go on, surprise us!). The public can submit their ideas until 11:59pm on Sept 30, 2011.

Google will finally tally the votes and identify interesting ideas from the write-in suggestions before publicly announcing the ‘winners.’ The winning sites will be prioritised as the Street View trike makes its way across the country. Throughout the entire process, Google is committed to working closely with the relevant organisations to collect images of privately-owned locations that have been included in the poll.


The imagery of the Malaysian sites will then be captured through the Google Trike — a specially-designed bike mounted with a camera that can capture and collect street-level imagery in places less accessible by car. The trike has already collected images from hundreds of places around the world, many of which can be visited in Street View today, such as Stonehenge in UK, Pompei in Italy, Legoland in California, Versailles in France and the Esplanade in Singapore. See images of the trike in action here.

Images collected by the trike will be processed and carefully stitched together, a process that can take several months. As with all Street View imagery done worldwide, Google will blur faces and license plates to protect people's privacy.

"We are happy to work with Google to showcase Malaysia to millions of people all over the world through Google Maps. The trike will help us feature even more of Malaysia’s culture, heritage, charm, attractions and landmarks that make us such a unique and compelling destination," said Dato’ Azizan Noordin, Acting Director General, Tourism Malaysia. "We look forward to receiving great ideas from the public on what areas the trike should cover. By featuring Malaysians’ suggestions of their favourite parts of our country, viewers from around the world will be able to discover the best of Malaysia through local eyes.”

"We're working hard to get Street View up and running for Malaysia, and the trike is an excellent way to start adding amazing imagery to showcase Malaysia’s history and culture," said Sajith Sivanandan, Head of Google Malaysia. "We want the public's votes to help us determine where we should go, so we encourage everyone to head over to the voting site to select and suggest their favorite spots.”

Media Contacts:

Jana Ponnudurai
Emerald Communications
Phone: +6012 250 4103
Email: jana.ponnudurai@gmail.com