Pages

Clockwise..

Wednesday, 7 December 2011


FLOW CHART DEFINED

A typical definition of "Flow Chart" usually reads something like ...
A flow chart is a graphical or symbolic representation of a process. Each step in the process is represented by a different symbol and contains a short description of the process step. The flow chart symbols are linked together with arrows showing the process flow direction.

AS-IS FLOWCHART

The first cool thing about flow charts is that they let you see the process flow at a glance, so my first alternate definition of "Flow Chart" is a Snap Shot of your Business Processes. This is commonly called an As-Is Flowchart. You can tell a lot about the complexity (and often over-complexity) of many business processes just by looking at an as-is flow chart of them - without even reading the text in the symbols. You can easily see the flow of information and materials, branches in the process, opportunities for infinite loops, the number of process steps, inter-departmental operations, and more.

A Note on Flowchart Symbols

Different flow chart symbols have different meanings. The most common flow chart symbols are:
·         Terminator: An oval flow chart shape indicating the start or end of the process.
·         Process: A rectangular flow chart shape indicating a normal process flow step.
·         Decision: A diamond flow chart shape indication a branch in the process flow.
·         Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow.
·         Data: A parallelogram that indicates data input or output (I/O) for a process.
·         Document: used to indicate a document or report .

What is Hacker??

Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.

We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses. 

Examples of weaknesses include poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. (In nearly all the cases, the Information Syhstems department is not informed of these planned attacks.) Then we work with the customer to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.

From the interview with Dr. Charles C. Palmer, IBM. 

Monday, 5 December 2011

News: Indulging rocket launcher technology


COUNTRIES of the world at this very optimistic in the development of space industry sectors in which Malaysia is no exception with the active development of the sector which is considered extreme.

This is evidenced by the launch of the country's first remote sensing satellite is successfully launched into TiungSAT low-earth orbit Low Earth Orbit (LEO) in 2000 and followed RazakSAT in 2009.
The two satellites involved was built using local expertise of Astronautic Technology Sdn. Ltd.(ATSB) through the National Space Agency (Space), agency of the Ministry of Science, Technology and Innovation (MOSTI).
Construction of satellites that marks the entrance to the space age Malaysia.
Looking back four years ago, when Malaysia celebrated the success of seconds the country's first astronaut, Datuk Dr. Sheikh Mustafa Shukor Sheikh Muszafar selected through the Russian Space Agency Astronaut Selection (Roscosmos), he has made it to the International Space Station (ISS) through the mission.
What I am connected is through both the achievements and success is the importance of launchers or rocket launcher technology to a country in enhancing the economic, social, political, and security.
Please note that the basic construction of satellites and astronaut missions depend on the ability to launch from Earth into orbit or beyond the layer of the earth's atmosphere.
If you look at the launch of RazakSAT TiungSAT and both require the services of renting commercial launchers from foreign countries.
Rocket launcher is owned by Russia and Zenit II rocket launcher Falcon 1 owned company Space Exploration Technologies (SpaceX) of the United States (U.S.).
Similarly, the mission's first astronauts to the ISS on board Soyuz TMA-11 rocket, which is owned by Russia.
Rental of commercial launcher-launcher requires a very high cost as well as country risk to be borne.
Among them, the cost of launching space rental increases from time to time, including the high logistics costs and do not have much control over the space launch program.
Malaysia could emulate the development of launcher technology development in the U.S. which is one of the main pioneers of the field.
The development of rocket technology in the U.S., which took more than 70 years is not a simple matter but face a difficult process.
It begins with a group of students from Caltech came to Arroyo Seco north of Pasadena Rose Bowl in which lies the Jet Propulsion Laboratory (JPL) today.
Their arrival was to test a small rocket motor.
The group consists of a combination of students with diverse interests and expertise of Frank Malina and later became the second director of JPL, a chemist Jack Parsons and Ed Forman a talented machine operator.
Their actions to make a rocket experiment is considered to be very brave and were driven by their intense interest in the field of rocket.
Based on an interview with Malina in 1968, he says, the first trial conducted in October 1936 in which there are no provisions available only to use their capital.
However, so-called good fortune as the rocketmen because getting strong support from the Theodore von Karman, who was a professor and Caltech aerodynamicist at the time.
However, their interest is not supported by the public at the time.
In fact, they were used as an object of ridicule and laughter is associated with the fantasy of children at the time.
Through experimentation and testing has been done on the rocket motor, it has improved a better launch in November 1936.
On January 16, 1937 they have successfully launched a rocket.
From the early moments of the experiment at Arroyo and the military work, to the space exploration, an experiment conducted 70 years ago opened the way for JPL as a place where extraordinary ideas into reality.
JPL will continue to operate to this day the U.S. government's huge investment results to see the great transformation to the development of rocket technology development. 
The hard work of the people and governments involved in developing rocket technology should be the lesson for the people and government of Malaysia.
Source: www.utusan.com (Published:05/12/11)

News: Flying robots build this tower at the FRAC Centre

by Mark R - on December 5th, 2011
What you are seeing here is a 20-foot tall, 1,500 block structure at the FRAC Centre in Orleans, and I think it’s pretty FRAC-ing amazing.
The reason why is because this structure is made by robots. Not just any robots, but flying robots. There are about four flying robots who serve as construction workers, and they have the quadrocopter construction of Parrot’s AR.Drone. There is a video of it after the jump showing a camera on one of these robots putting a block into place, and it is surprisingly precise.
I’m not certain how confident I would be just standing around a tower built by robots, but if you look on the video, it appears that there are a whole group of people standing around like they are at a party. Granted, the blocks are made of polystyrene foam, but I don’t feel comfortable in any room with a giant card house in it.
By the way, the tower is supposed to be a model of a futuristic city that is meant to house 30,000 people. Man, I wonder if one day, real flying robots will construct such a city.
For now, you can see this “Flight Assembled Architecture” at the FRAC center through February 19. This project is the work of architects Fabio Gramazio and Matthias Kohler, with the help of ETH Zurich roboticist Raffaello D’Andrea.
Source: www.coolest-gadgets.com

News: Nanotechnology expert added

WORLD is to focus exclusively on nanotechnology industry in which the sector could provide a significant positive impact in people's lives.
Malaysia also has started to move in parallel with the development of the industry.
According to the Minister of Science, Technology and Innovation (MOSTI) Datuk Seri Dr. Johnity Maximus Ongkili, Prime Minister Datuk Seri Najib Tun Razak has identified nanotechnology as an engine of growth for New Economic Model.
"The mission of government is to make the development of nanotechnology as a platform for science, technology, industry and the economy.
"Even the government is also aware that nanotechnology plays an important role in developing the country's industrial sector," he said in the NanoMalaysia 2011 Conference and Expo at Putra World Trade Centre (PWTC), Kuala Lumpur recently.
Clearly, the development and expansion that began in many areas of research with significant impact in daily life, it is difficult for the country rejected the potential and benefits of the technology.
However, the technology must be developed based on the guidance and control so that it does not cause any damage or harm.
To realize the government's intention in developing these technologies, a body known as the Establishment of the National Nanotechnology Directorate (NND) was approved by Cabinet in 2010.
Armed with a fund of RM2.63 million, NND began operating under MOSTI to implement the nanotechnology initiative.
NND functions as driver of the national nanotechnology initiative, develop strategies, coordinate the research and development (R & D).
In addition, it is also responsible for strengthening the existing nanotechnology research center with supporters recent research facilities.
Further enhance human capital development in nanoscience and technology, thus creating a network with the industry.
In fact, the government also provides suggestions NanoMalaysia program by making nanotechnology as a science of innovative and integrated.
Among others is the design direction and implementation strategies and monitoring programs and activities in the development, commercialization and industrialization of nanotechnology in Malaysia.
In addition, the government also continued to boost research activities, development, commercialization (R & D & C) in the field of nanotechnology in the country.
Through all of the planned program, expected to produce a positive output on the development of the country.
It includes the establishment of the National Nanotechnology Policy, Industrialization and Commercialization Framework and Technology Nanotechnology National Nanotechnology Road Map for 2011 to 2020.
The program will enhance human capital (RSE) trained with skills in science and technology.
It is expected that the addition involves the addition of PhD graduates in the field of nanotechnology to 250 people in 2015.
In fact, the development and expansion of these technologies will also enhance career opportunities for highly skilled personnel.
Source: ww.utusan.com.my

Saturday, 3 December 2011

B2B, B2C, & C2C

B2B e-commerce offers direct links between a manufacturer, its supplier and its customer, and it supports business transactions, processes and information exchange. It enables a manufacturer to bypass other middlemen and shorten the length of distribution channel. Another prominent feature of B2B e-commerce is to provide a channel to develop new products and services for both existing and new customers. It offers a manufacturer the ability to dominate the electronic channel and therefore controls the access to customers and set terms of trade. The impact of e-commerce on the B2B sector has been already manifesting itself in a number of different ways. However, the future will bring more discussion between manufacturing company and its business partners on a number of levels within the supply chain that will result in an even greater need to harness the benefits of B2B e-commerce can bring (Walters and Lancaster, 1999; Fraser and Fraser, 2000).
Business to Customer (B2C), sometimes referred to as Business to Consumer, describes the activities of businesses in selling products and/or services. For example, someone buying a television set from an electronics retailer would be a B2C transaction. The transaction preceding this, eg, the purchase of components, screens, plastics etc. by the manufacturer, and the sale of the set from the manufacturer to the retailer would be B2B transactions. Many B2C transactions now take place online, eg, the purchase of books from amazon.co.uk, CDs/DVDs fromplay.com, or even doing the weekly shopping online at Tesco.

Customer to Customer (C2C), sometimes known as Consumer to Consumer, E-Commerce involves electronically-facilitated transactions between individuals, often through a third party. One common example is online auctions, such as Ebay, where an individual can list an item for sale and other individuals can bid to purchase it. Auction sites normally charge commission to the sellers using them. They act purely as intermediaries who match buyers with sellers and they have little control over the quality of the products being offered, although they do try to prevent the sale of illegal goods, such as pirate CDs or DVDs. Another popular area for customer to customer transactions is online classified advertising sites, such as Craigslist and Gumtree. Major online retailers like Amazon also allow individuals to sell products via their sites. C2C is expected to increase in the future because it minimizes the costs of using third parties. However, it does suffer from some problems, such as lack of quality control or payment guarantees and there can sometimes be difficulties in making credit-card payments.

Home Security and Internet

Some people live with the illusion that they have protected their home networks from internet attacks by purchasing a firewall.  Manufacturers even promote this by identifying their products as firewalls. Sadly, most users are not protected by a firewall, but by the simple router.  
What’s the difference between a router and a firewall?  Without complicating it too much, a router acts as a junction point between the computer (or computers) in your home and the internet.  It has the ability to route your computers requests to the internet and route the responses back to your computer.  A firewall has this ability as well, but also offers another level of security by actually inspecting all the information and making some decisions about if it should allow it or not.    Since most routers are relatively simple devices, they act as a firewall because they are not capable of complex tasks, like routing internet requests back to your computer without some assistance. 
A very common attack on the internet is called a DOS (Denial of service) attack.  A hacker floods a website with requests for information that don’t exist and the website becomes overrun with requests, and service degrades.  Hackers have been known to exploit this attack to gain access to a site. How is it done? Usually a hacker will gain control of unsuspecting computers around the world, and use them to launch these attacks.  Your home computer could be infected and used as a pawn.  A router would simply pass your computer’s requests on but a sophisticated firewall could identify the traffic as suspicious and notify you.
So, how concerned should you be? It really comes down to your personal comfort level.  A basic router provides adequate protection.  Make sure if you have wireless access on your router, that you encrypt this as well.  Keep your computer’s antivirus updated and run a regular scan.  When you do have problems, deal with it promptly. The old saying “locked doors keep honest people out” is pretty a good analogy.  You leave in the morning and lock your front door, as you head to work.  If someone wants access to your house, it’s fairly easy for a professional to gain access.  The same is true with the internet, if someone wants access, they will get it.  With millions of computers on the internet, and thousands of unprotected machines available, your chances of attracting attention are pretty slim.
Source: Northern Computer