Google Analytics

Search This Blog

Tuesday, January 28, 2014

NEC Partners SAP for Cloud-Based ERP Solutions in SME Key Markets Globally

PR - KL, Jan 15, 2014

Today NEC and SAP announced they have entered into an agreement to integrate the SAP’s Business ByDesign solution with NEC’s global cloud-based enterprise resource planning (ERP) services.

The new offering, NEC Global Localization Package for SAP Business ByDesign, will leverage SAP’s ERP cloud solution and NEC’s end-to-end cloud deployment capabilities to enable subsidiaries of large corporations and small and midsize enterprises to improve efficiency and gain insights into real-time enterprise-wide operations.

This OEM agreement is the first of its kind worldwide regarding SAP Business ByDesign. At the initial stage, NEC plans to roll out the new offering in key South East Asia markets. NEC also intends to develop valued-added localization functionalities, which will be integrated with SAP Business ByDesign. NEC also targets to provide its new cloud services in the several countries on three different continents where the solution is already available.


Monday, January 27, 2014

Motorola Moto G Review

1.) The body frame looks better than iPhone 4 and Samsung Galaxy S plus.

Moto G is the biggest amongst most of them all.

The body is a solid - feels like stealth non-metal material.

Biggest of them all

2.) I like the virtual keypad - it feels even better when you enable each key touch to be associated with vibration.

3.) Android to android migration is seamless.

Literally hassle free when you migrate from one Android based phone to Moto G - it comes with wizard based first-time configuration dialogs.

4.) Camera flash - good enough.

QR Code scanning also works well.

ICT Happening Updates for Week 5 of Jan 2014

The most significant ICT happening for year 2013 in a global perspective was the announcement of planned retirement of CEO of the biggest enterprise software company in the world, Steve Ballmer of Microsoft.

For this week / last week, here are / were the biggest news.
  • PR - Jan 30,2014 - WFT Cloud: Migration to SAP HANA at no additional charge
  • PR - Jan 30, 204 - FanXT Pleases Its Fans with Fantasy ISL and Prediction Game
  • PR - SG, Jan 29, 2014 - Capillary Tech. Signs Joint Marketing Agreement with AMEX
  • PR - SG, Jan 29, 2014 - Viber Sticker Market Lands on Windows Phone 8 in Latest Update
  • PR - Basel, Switzerland, Jan 27, 2014 -- Ultra-Low Dielectric Loss and High Temperature Materials for Telecomm. Industries
  • PR - KL, Jan 27, 2014 - Lazada Announces the 'Lifestyle Monday with Mastercard' promotion'!
  • PR - KL, Jan 27, 2014 - XOX-Voopee: Communication Mobile App which empowers second mobile number without additional SIM card
  • Reuters - Jan 24, 2014 - Google fixed Gmail, down for a little over an hour
  • PR - KL, Jan 24 2014 - Groupon Malaysia Celebrates Chinese New Year with RM1,288,888 Credit Giveaway
  • PR - Jan 24, 2014- HTC Malaysia Announces Local BlinkFeed Providers for HTC smartphones
  • PR - Jan 24, 2014 - Opticomm Deploys New Brocade Network Core to Provide Service-Class Guarantees and Unlimited Bandwidth Capability
  • PR - Jan 24 2014 - New Game Mode Rolls Out in World of Tanks
  • PR - Munich, Jan 23, 2014 - jtel launches FreeSWITCH GUI and run-time server at Call Center World, Berlin, February 18th – 20th, 2014
  • PR - JOHOR BAHRU, Jan 23 2014 - Smiths Detection Establishes Manufacturing Footprint in Asia
  • PR - PJ, Jan 23 2014 - SAP Appoints Bernard Chiang as Managing Director, SAP Malaysia Giveaway
  • PR - KL, Jan 23, 2014 - VMware to Acquire AirWatch
  • PR - KL, Jan 22, 2014 - AMD Offers 12- and 16-Core Additions to the AMD Opteron 6300 Series
  • PR - Hillsboro (Oregon), Jan 22, 2014 - Tata Comm. brings 100G connectivity to carrier and enterprise customers from the US to Asia
  • PR - KL, Jan 16, 2014 - Introducing Moto G in Malaysia: An Exceptional Phone At An Exceptional Price: RM 698 for 8 GB
  • PR - KL, Jan 16, 2014 - Lazada launches iOS e-commerce app
  • PR - KL, Jan 7, 2014 - ALCATEL ONETOUCH unveils IDOL S and HERO in Malaysia

ESI International Releases Top 10 Trends in Business Analysis

PR - Singapore, Jan 23, 2014

ESI International, the world's leading project management training company, today announced the release of its top 10 trends in business analysis for 2014. This year’s trends discuss the evolving roles that business analysts take on and underscore the need for varied skill sets to ensure that they are prepared for what’s coming next.

“Business analysts find themselves taking on multiple roles in organisations, as business leaders recognise the importance of requirements management,” said Raed S. Haddad, Managing Director for Asia Pacific, ESI International. “Enterprising BAs see this trend and are carving out career paths beyond the typical BA roles.”

ESI’s top 10 trends for business analysis include:
  • Business analysts and systems analysts will need to develop interchangeable skill sets.
  • Many will realise that being “Agile” is a competency, not a methodology.
  • The role of the BA and PM will continue to overlap in small to medium-size organisations.
  • BAs will get in on the action early and often.
  • Requirements management gets sophisticated.
  • Business analysis continues to emerge as a profession with a career path in larger organisations.
  • More and more, project sponsors will learn about BA.
  • BAs become cool.
  • Enterprise architecture comes back to life. Was it ever really dead?
  • There are plenty of cloudy days ahead, and those clouds are filled with apps.

Sunday, January 26, 2014

ICT Happenings 2013 Flashback / Review

The most important news for year 2013 in terms of ICT happenings. For my own pick, I've selected the announcement of the planned retirement of Microsoft CEO, Steve Ballmer as the biggest news - Microsoft is the biggest enterprise software company in the world.

Until today, no words on development of hiring of Microsoft new CEO has been released to the press yet. Check out some updates here.

Hence, let's go back year 2013 and appreciate what had emerged.

Week 5, Oct 2013

1.) Reuters: Start-up Vicarious claimed to have cracked CAPTCHAs: challenge-response test used by web sites to check for real human users from automated bots.

2.) Malaysian 2014 Budget ICT Comments - RM 1.8 billion for HSBB Phase 2; increase in broadband speed; underwater cables for Sabah and Sarawak; RM 1.6 billion rural transmission towers; etc

Week 4, Oct 2013

1.) Apple launched Mac OS 10 Mavericks and iPad Air.

2.) USA Today: Facebook supported removal of potentially damaging content against total freedom of expression.

Week 3, Oct 2013

1.) Oracle introduced new x86 servers - based on the latest Intel® Xeon® processors E5-2600 v2 product family.

Week 1, Oct 2013

1.) Cisco delivered network convergence system to power "Internet of Everything".

2.) Brocade and EMC partnered to enable Software-Defined Storage for EMC Fibre Channel SAN Install Base.

Week 4, Sept 2013

1.) The Telegraph reported that BlackBerry agreed to sale for $4.7 bn.

Week 2, Sept 2013

1.) Announcement of iPhone Series - iPhone 5C and 5S.

Week 1, Sept 2013

1.) Reuters: Microsoft proposed to buy Nokia's phone business for 5.44 billion euros.

2.) Reuters: Worldwide PC shipments to fall 9.7% this year.

Wednesday, January 22, 2014

Prolexic Publishes Top 10 DDoS Attack Trends for 2013

Press release - FORT LAUDERDALE, FL – (January 21, 2014)

Throughout the year, metrics were collected from all DDoS attacks launched against the company’s global client base by the Prolexic Security Engineering & Response Team (PLXsert) using proprietary techniques and equipment. Through digital forensics and post-attack analysis, PLXsert is able to build a global view of the evolving DDoS threat.

Top 10 ddos attack trends for 2013:
  • DDoS attack volume continued to rise with Prolexic mitigating 32.43 percent more attacks in 2013 than it did in 2012
  • DDoS attack volume also increased month-to-month in 2013, with 10 out of 12 months showing higher attack volume compared to 2012
  • Smaller, stealthy and more sophisticated application layer (Layer 7) attacks increased approximately 42 percent
  • High bandwidth, volumetric infrastructure layer (Layer 3 & 4) attacks increased approximately 30 percent
  • DNS, UDP, and UDP fragmentation floods, as well as CHARGEN, were the attack vectors that showed the most adoption in 2013
  • SYN and ICMP floods were the attack vectors that showed the most decline in use
  • Average DDoS attack sizes continued to increase with Prolexic mitigating numerous attacks over 100 Gbps, the largest peaking at 179 Gbps
  • Reflected amplification attacks emerged as a very popular attack method
  • Mobile devices and apps began participating in DDoS campaigns
  • DDoS attacks were more likely to originate from Asian countries

Tuesday, January 21, 2014

Remoting cannot find field nativeImage on type System.Drawing.Image

This article applies to MS .NET programming, simulated by .NET 3.5 SP 1 using VB.NET.

This exception happens when transferring a bitmap object over remoting and trying to load the proxy bitmap object into a picturebox.

For my case, it occurs during the invocation of System.Drawing.Graphics.DrawImage

The solution is to convert the bitmap object into bytes array (at server), transfer it to client over via remoting and then convert the bytes array into bitmap object again (at client).

Hacker Economics: Three Cost Effective Ways to Tackle Hackers

Greg Bunt, Director of Security, APAC, Juniper Networks contributed an article entitled Hacker Economics: Three Cost Effective Ways to Tackle Hackers, which he wrote about the hacking pattern observed from Juniper's customers. The pattern found that most hackers are impatience in nature and seek only instant gratification.

His article wrote that by and large, hackers usually spent not more than 8 minutes on hacking small web sites; not more than 3 hours on larger web sites; and usually not more than a single day on a typical large assignment.

Greg Bunt, Director of Security, APAC, Juniper Networks

While his findings made no attempt to identify further into pecuniary issues, personally I agree with him on certain terms. Here is what I think:

First of all, assuming that hackers are above average gifted IT person with penchant for solving difficult problems, it then brings us to make an assumption that these people would usually lead a normal life working at technology related companies doing technical jobs such as software engineering.

Now here is the tough part; if you have a great future, why would you want to risk going to prison ???

Thursday, January 09, 2014

Cooliris partners Albotix to integrate drone technology for photography

Press release - Jan 9, 2014

Today, Cooliris announces a partnership with Aibotix, the world's leading innovator in autonomous aerial vehicles, to bring a brand new consumer sharing experience for drone photography. While drone photography is in early stages of its evolution,the partnership creates a new era in the history of photography. Cooliris will be the first consumer photo application to integrate with drones, enabling consumers to gain a unique perspective in real-time and share the drone-captured photos and videos to private groups on their iPad and iPhone.

Using Aibotix’s next generation multicopter, which has a built-in camera mount, and Cooliris Groups, consumers will be able to capture otherwise inaccessible aerial angles of landscapes, such as the Grand Canyon, or close-up action shots of surfing, skiing and other immersive activities, and share them with private groups of friends as the moment unfolds in real-time.

Consumers would also be able to use the Aibot X6 to easily capture photos at a party, an event or even a recreational activity, instead of being preoccupied with taking photos themselves and missing the action. With the private Cooliris group experience, the photos could be automatically shared into private groups so that those not in attendance would be able to gain a shared experience of the event and feel as if they were there.

Wednesday, January 08, 2014

Exabytes Forges Partnership with P1 Networks

Press release - Jan 7, 2014

Exabytes Forges Partnership with P1 Networks to promote high business availability amongst ecommerce community with converged connectivity solutions. “As part of Exabytes’ commitment to empower the online SMBs, this partnership will offer not only the latest broadband services for online operations but also the state-of-the-art technologies to manage their daily business communication with customers,”Exabytes’ Founder and CEO, Chan Kee Siak.

(L-R): Kelvin Lee, P1; Chan Kee Siak, Exabytes

P1’s Chief Commercial Officer, Kelvin Lee shares, “The partnership with Exabytes is strategic for P1 to deepen our broadband and voice penetration into the expanding ecommerce market. Instantly, it has enabled us to reach out to over 60,000 of Exabytes’ customers in the online business space; as well as the thousands of e-commerce merchants on, which is now one of Southeast Asia’s largest online retail shopping platforms powered by Exabytes.”

“Through this partnership, we hope to see more SOHO and SMBs going online and leverage on the values of converged connectivity technologies to perform their business efficiently, and on par to compete with other players within the global ecommerce market,” says Lee.


Avanade: Consumerization of IT Gaining Strengths in Enterprise

Press release - Jan 7, 2014

Avanade, a global business technology solutions and managed services provider, today released Malaysia results from a global survey on the changing sales process and buying patterns of business. Avanade’s latest research shows the “consumerisation” movement is shifting the sales process away from the sellers’ control, as enterprise buyers begin to mimic consumer shopping behaviours. With this shift, now, the value of the customer experience is more important than cost to business and IT decision-makers.

Monday, January 06, 2014

Computer Security Updates: Global Cyber Security Review 2013

Ok. Let's take a deep look back into what really matters had emerged out of year 2013 with respect to cyber security in the global perspective.

Q1 2013:

For Q1 2013, on week 4 of Mar 2013, DDoS attack of SpamsHaus rocked the entire industry.

Tuesday, March 19, 2013, it was reported that CloudFlare was contacted by the non-profit anti-spam organization Spamhaus. They were suffering a large DDoS attack against their website and CloudFlare was asked a favor to help mitigate the attack.

CloudFlare eventually deployed Anycast which served to effectively dilute the situation by spreading the threat across CloudFlare's facilities.

In terms of key trends of Q1 2013; 1.) the whole industry agreed that Mobile computing trend such as BYOD was the biggest catalyst for security vulnerability; 2.) enterprise security solution began to pay a lot of attention into providing intelligent security features to deal with matters in a more proactive approach.

Saturday, January 04, 2014

Sony Pictures presents Animax On Demand

Press release - Kuala Lumpur, 26 November 2013

Sony Pictures Television Networks, Asia and Astro are proud to roll out Asia’s very first Animax On Demand service offering the latest and best anime titles on demand to anime fans in Malaysia!

Animax On Demand is a subscription video-on-demand (SVOD) service that enables customers to enjoy their favourite anime series, free of commercials, at their convenience.

Golden-Time - Animax-on-Demand

Brand new anime series which are currently airing in Japan include the latest blockbuster anime titles such as college romance series Golden Time, vampire themed Strike The Blood, as well as the post-apocalyptic Arpeggio of Blue Steel.

Animax On Demand is available to customers with a connected Astro PVR, and Astro On-The-Go customers who have linked their accounts. No matter where they may be, subscribers can get their anime fix with Animax On Demand.

Animax On Demand is now available for subscription to all in Malaysia via Astro On-The-Go’s online and mobile application. The monthly fee for subscription to Animax On Demand is RM12.00 and detailed information including instructions to subscribe are available at


Thursday, January 02, 2014

HTC Introduces New Mid-Range Desire 601 Dual SIM

HTC, a global leader in mobile innovation and design, today announced the addition of the HTC Desire 601 dual sim to its popular smartphone family, enabling consumers to enjoy a premium experience at any price point. Changing the face of the mid-range, the HTC Desire 601 dual sim introduces fast 3G speeds and innovative features from the flagship One family, including HTC Zoe™ with Video Highlights and HTC BoomSound. HTC Desire 601 dual sim will be available in black and white at RM1,099 starting mid December 2013 at HTC authorised retail stores.

Not too bad... just when I needed it. My old iPhone 4 is literally interested in considering Voluntary Separation Scheme (VSS) and I am contemplating the reality of having a phone which supports dual SIM to deal with my current needs.

Hence, my first thought about this phone is its price which is rather affordable, though it is slightly pricier than Samsung Galaxy Win which supports dual SIM too.

Comments from around my network told me that Samsung phones are not known to be that 'loyal' compare to iPhone, some people are recommending that I should just go get the latest iPhone to enjoy a longer human-phone companionship. Nevertheless, I feel that investing RM 1,099 in order to embrace new experience may not be a bad idea.

What else ? BoomSound... I don't really care about that. I am more interested in power consumption and SAR level which so happens that such information are not readily available.

Any comments on HTC ???  Feel free to express your personal experience here.

Nonetheless, the phone design looks great.


Creating a Robotic Arm with Kinect Interface Case Study

I found a project creating a robotic arm by leveraging on Microsoft Kinect.

The overview of how everything works together:

Component Diagram for the project

Here goes the summary:

1.) The fingers are constructed using flex sensors, which are essentially potentiometers that react to bending.

To detect the tilt of the wrist, an accelerometer is used.

2.) Microsoft Kinect's skeletal tracking capability helps with reducing learning curve on mechanical engineering.

To retrieve the angles for : between elbow and shoulder; between elbow and wrist.

3.) Controllers are used for processing input and output - for capturing input data and producing processed output data based on the programming of the firmware.

Controllers are actually micro-computer, in this case, their functions are to read the various sensors on the glove and actuating the motors for the hand accordingly.

Arduino controller is a single-board hardware meant for hobbyists. The firmware can be written in C/C++ using the provided IDE which is Java based (cross platform).