Thursday, June 29, 2006

RFID application in hospital

Source: TheStar InTech (29 June 2006, page IT18)

RFID tags better but cost more.

The article discussed the application of RFID in hospital. Some of the facts discussed:
  • RFID tag stores information
  • Doctors and nurses carrying RFID tag readers, perhaps attached to laptop PCs or personal digital assistants (PDAs), could retrieve up-to-date information from the patient’s wristband if the hospital information system is down.
  • Convenient for doctors who could refer to or update patient records from the bedside, as they make clinical observations, prescribe medication or order medical procedures.
  • Implementing RFID in a hospital information system could help cut down on errors as well as reduce the clerical workload for nurses, freeing them to get on with actual nursing.
  • RFID tags are more physically robust than barcode tags, are reusable.
However, the limitations faced are:
  • No Malaysian private hospital has converted from its barcode-based information system to an RFID-based one.
  • Cost could be an issue, with RFID tagging systems costing about twice as much as barcode-based ones.
  • RFID tags cost from 15 cents (54sen) to US$10 (RM38) each – depending on data capacity and whether the tag is “active” (carries a radio transmitter), among other things – a barcode tag only costs as much as the paper it is printed on.
  • Issuing doctors and nurses with additional IT equipment ranging from Tablet PCs to PDAs and laptop PCs.
  • This would add to the implementation costs to the hospital,
  • Raise potential security and privacy risks for confidential patient data if the devices are lost or stolen.

Sooner or later, RFID will be a common application in hospitals, and may be in schools to.

Thursday, June 22, 2006

Amazon.com goes for e-groceries

First, Amazon.com is famous for its online bookstore.

Slowly, it expanded into a well diversified business offering such as DVDs, clothing, toys and other.

Now, it is adding groceries to their e-retailing lines with 15,000 non-perishable items ranging from cereal to canned tuna and detergent.

What other business that Amazon.com can add to its e-tailing lines in the future?

Celcom to expand its 3G coverage

Celcom is expected to expand its 3G services coverage to cover the whole country by July 15 this year.

Its 3G service currently covers the major urban areas, such as the capital, Shah Alam, Johor Baru, Ipoh, Alor Star, Kota Kinabalu and Kuching. There are 100,000 subscribers to the service now. (It was 45,000 3G subscribers at the end of 2005). Celcom is also targeting to increase its 3G subscribers to 150,000 by year end - an increase of 233%).

To fend off competition, as well as upcoming technology such as WiMAX (Worldwide Interoperability for Microwave Access) - a rival wireless broadband platform - Celcom said it is looking at upgrading its 3G network to HSDPA (High Speed Downlink Packet Access) standard.

It has already started its HSDPA trials and this is scheduled to end late next month.

HSDPA enables much faster data download speeds (at least 4 times faster) on 3G networks than is possible now. What takes minutes to download now will take only seconds with HSDPA, said Celcom. This will be a boon to corporate users who need to send and receive extensive files on their mobile devices faster.

The only catch is that consumers will need to change their 3G phones and PC datacards to enjoy the benefits of HSDPA technology.

Celcom has selected six Klang Valley sites for its HSDPA trials - Suria KLCC, Mid Valley, Berjaya Times Square, Bangsar and, within Menara Celcom and Menara TM.


Source: TheStar InTech, (20 June 2006, page IT27)


Mobile Money and MM Wallet

This is a summary from an article in TheStar (20th June 2006, page B7)

Mobile Money International Sdn Bhd launched the MM Wallet which enables users to conduct transactions via short messaging service (SMS) by personal identification number (PIN) authorisation using a mobile phone.

The technology took the company about four years to develop at a cost of RM4mil to RM5mil, and Mobile Money was currently applying for a worldwide patent.

Mobile Money is the pioneer of mobile payment using mobile phone in Malaysia. Currently
Mobile Money has teamed up with Hong Leong Bank Bhd and Bumiputra-Commerce Bank to allow consumers to make payments via their bank accounts linked to their mobile phones but Mobile Money is keeping its options open for tie-ups with other banks.

Users could send cash to anyone, pay merchants, buy Telekom Malaysia Bhd's (TM) iTalk card, Celcom and Maxis reload cards, pay Syarikat Bekalan Air Selangor Sdn Bhd (Syabas) water bills and soon, other utility bills and bus tickets, by just replying to an authorisation PIN to make payment. There are 13,000 merchants linked with Mobile Money.

Mobile Money is targeting 1 million Malaysian mobile phone subscribers to use the MM Wallet.
It believe that sending cash via SMS will eventually become a daily way of life for many in the very near future.


Previous entry on Mobile Money
Mobile Money aims for 100,000 vendors.
G-Cash - Mobile payment systems: The Philippine's Experience




Friday, June 09, 2006

Spammer Agrees to $10 Million Settlement

Ryan Pitylak, 24, one of the world's most notorious spammers and a recent University of Texas graduate, has admitted sending 25 million e-mails every day at the height of his spamming operation in 2004. At one time, Pitylak was listed as the fourth-worst spammer in the world.

How he earned using spamming:
Pitylak's e-mails touted low-cost mortgages, extended auto warranties and debt-counseling services, among other offers, and he received $3 to $7 for every lead he generated when someone clicked on the links in his messages.

Turning a new leaf
Pitylak says he now opposes spam and is offering his skills to Internet companies to help them fight spam.

More reading is available here.


Mass Defacement of Website in Malaysia

An article from The Star InTech which is related to online threats towards e-commerce and website (Lecture 4)

PETALING JAYA: The Malaysian Computer Emergency Response Team (MyCERT) has detected 300 website defacements up till the end of May this year.

MyCERT said it observed a mass defacement of .my domain websites in early May affecting mostly those on the FreeBSD and Linux platforms.

However, Kol Husin Jazri, director of the National ICT Security and Emergency Response Team (Niser), said in an e-mail interview that the attacks weren’t platform specific but were targeted at virtual webhosts.

MyCERT is a unit of Niser and is responsible for tracking and logging security incidents, as well as analysing major security incidents and trends.

Virtual hosts are multiple websites hosted on a single machine.

"A few of this virtual hosts were targeted resulting in between 20 to 100 web¬sites being defaced at any one time," Husin said. Intelligence and reconnaissance activities are involved before launching the attacks, Husin said.

Husin said the recent attacks indicates attackers have taken due diligence before executing their strategies. "Intelligence and reconnaissance activities are involved before launching the attacks," he said.

MyCERT's analysis of the recent attacks showed that it was done via PHP scripting vulnerability. (PHP is web scripting language).

Husin said this involves modifying computer program scripts to ensure validation of input.

"These vulnerabilities are exploited to allow entry to access certain restricted locations within the host," Husin said. He added that in some cases, these vulnerability exploits even open up arbitrary Net connections and turn some PHP scripts into proxies and open mail relays.

MyCERT has already pro¬vided an alert on the recent attacks and encourages victims to submit the audit trails to MyCERT through the MyCERT website for further analysis.


Thursday, June 08, 2006

World Cup and E-Commerce lecture

World Cup fever is here even before it kick-off on Friday.

Below is a blog comment interaction between a lecturer and a student:

Background - the author from the student blog did mentioned about 2 points which are related to World Cup & E-Commerce lecture.

1st entry on Sat, May 20th, 2006
Oh yea, my new semester timetable had been released. Pity me! I've got 3 days 8am class, Monday, Tuesday and Wednesday. Things get worst when the world cup final is on a Monday, 10th of July 2am! For sure i'll skip the Monday lecture(e-commerce). I wonder whether Mr. Hen would read this. ;p Anyway, i'll replace the class if possible.

My reply:
Hahaha...of course I'm reading this.....




2nd entry on Sat, June 5th, 2006
It's a weekend full of happenings. I woke up at 10am ...............(with lots of activities) .................... I reached home at 3am and immediately fall asleep as soon as my head get to the pillow.

The replies

And the next Monday......you missed your 8am morning lecture.......

Bro, World Cup not started yet la.


sorry lar....i know you called my name on monday.

I was half awake at 7.30am when my alarm clock rang. When i regain full conciousness, it's 9.30am. So i continue sleeping....

;p


How to grant you the leave on the post of the World Cup Final if you already started being AWOL even before the World Cup started.....

World Cup will become a disease if not being cured appropriately......



Thanks for reading.

Note: For the protection of privacy, the name of the student and his blog is not being disclosed here.

Wednesday, June 07, 2006

World Cup Stars Blog - Specially for "kaki bola"


Want to read more about your favourite players such as Ronaldinho, Michael Owen, Claude Makelele, Kevin Kuranyi, Xabi Alonso, and Edgar Davids?

Visit this link http://worldcup.malaysia.msn.com. and you will be able to read the daily dairies, news and anything related to them during the World Cup session.

The application of weblog in sports.

Kayak.com Is Tops Among Travel Search Engines

Frequent travelers will be familiar with the big players in the industry namely Expedia, Orbitz and Travelocity.

Beside these, there are Travel Search Engines that check multiple sites at once and can uncover Web specials and airlines that the big three online agencies might miss namely:

Full story is here.

This article is related to online travel and tourism (Lecture 6)

Thursday, June 01, 2006

Earning more airtime by watching ads

Fancy of earning more airtime by watching ads?

Read the story below: (Source: Yahoo News)

Virgin Mobile USA is launching a service June 14 letting customers of the company's prepaid plans earn airtime minutes for watching or reading ads.

Customers will be able to sign up for the service, "SugarMama," at Virgin Mobile's Web site, where they can watch 30-second video ads. Afterward, they'll be asked some questions about the ads. Correct answers yield one minute of airtime for every ad.

Virgin Mobile charges 25 cents per minute under its Minute2Minute plan, meaning a customer who watches the maximum of 75 ads per month could be earning $18.75 in airtime for less than an hour's work.

Customers will also be able to sign up for text ads that are sent to their phones.

Virgin Mobile has signed up three advertisers so far: Microsoft Corp.'s Xbox gaming console division, PepsiCo Inc. (which will be advertising Diet Mountain Dew) and Truth, an anti-smoking campaign funded by tobacco settlement money.

Virgin said it is the only plan of its kind in the wireless industry. Similar deals have been available for landline long-distance minutes.


Piracy down in China and Russia...plus Malaysia too

Business Software Alliance (BSA) reported that 35% of the packaged software installed on personal computers worldwide in 2005 was illegal.

The Business Software Alliance (BSA) is a trade group representing a number of the world's largest software makers. It is funded through membership dues based on member company's software revenues, and through settlements from companies it successfully brings action against.

Its principal activity is trying to stop copyright infringement of software produced by its members - an activity it claims to cost the software industry over 11 billion dollars each year.

Some facts from the report:

  • Losses from the illegal software = US$ 34 billion (2005), an increase of US$ 1.6 billion from 2004.
  • The four countries with the biggest percentage declines in piracy were China, where 86 percent of all software sold is pirated, down 4 percentage points from the 90 percent of 2004; Russia, down 4 percentage points to a piracy rate of 83 percent; Ukraine, down 6 percentage points to a piracy rate of 85 percent, and Morocco, down 4 percentage points to a piracy rate of 68 percent.
  • By contrast, the United States had the lowest piracy rate in the world last year at 21 percent. However, that amounted to $6.9 billion in losses to software manufacturers, the highest of any country because the U.S. market for computer software is so large.
  • The lost sales in China totaled $3.9 billion, putting it in second place in dollar losses followed by France with losses put at $3.2 billion and a 47 percent piracy rate.
  • One out of every three copies of PC software were obtained illegally last year.
  • The countries with the highest piracy rates, according to the study, were Vietnam, 90 percent; Zimbabwe, 90 percent, Indonesia, 87 percent, and China and Pakistan, both at 86 percent.
  • The countries with the lowest piracy rates were the United States, 21 percent; New Zealand, 23 percent; Austria, 26 percent, and Finland, 26 percent.

----------------------------------------

Malaysia:
  • 60% of the software installed on PCs in Malaysia in 2005 was illegal.
  • The software piracy rate declined by three percentage points in the last two years
  • BSA attributed the reduction to the Ops Tulen antipiracy campaign which is held in conjunction with the Domestic Trade and Consumer Affairs Ministry.
  • The campaign, which involves raids and software audits, began in 2002 and aims to cut down the use of unlicensed software by Malaysian businesses.
  • The BSA said that its software auditing programme was well received by Malaysian companies, with 1,493 businesses performing self-audits to check if their software is genuine.
  • Companies that perform the audit are given a grace period of immunity from raids by the BSA and other authorities in order to “clean up their act” if they have pirated software in their offices.
  • However, despite the small drop in piracy levels, the ringgit value of losses increased from US$134mil (RM509mil) in 2004 to US$149mil (RM566mil).


Types Software Piracy

Source: The StarInTech, 30 May 2006, pg 29 - An article being part of the Ops Tulen 2006 antipiracy campaign organised by the Ministry of Domestic Trade and Consumer Affairs.

This article is related to Lecture 4 - E-Commerce Security Systems

Additional link for software piracy: WiseGeek - What is Software Piracy?

Don’t be caught in the piracy trap

This is the second of a six-part weekly series brought to you by the Business Software Alliance. The articles are part of the OpsTulen 2006 antipiracy campaign organised by the Ministry of Domestic Trade and Consumer Affairs.

AS WE have discussed the impact and unravelled the myths of software piracy last week, it is time to look at the different types of software piracy, and how we can differentiate genuine from fake products. While many know that copying and distributing copyrighted software illegally is considered piracy, not many are aware that possessing software that has been illegally copied or using software against its licensing terms is also piracy. There are several types of software piracy:


Casual copying

This is a most common method of piracy, where copies are made of the genuine version and distributed among friends and colleagues in a casual office environment (against the end-user licence terms), and it is also called “softlifting."

Tip: Ensure you keep the genuine software CD-ROM or diskette in a safe locked central location with a single identified person accountable, i.e. the IT or finance manager.


Under-licensing

This happens when one copy of licensed software is purchased and loaded in more than one computer system without proper licensing and monitoring of the number of licences purchased against the number actually installed.

Tip: Ensure you conduct regular software audits (every six months) to ensure the number of licences you have purchased tallies with what has been installed on the computers.


Hard-disk loading

This type of piracy often goes undetected especially when businesses do not check the legitimacy of the application that comes with the purchase of PCs and laptops. It happens when a hardware distributor or reseller installs illegal and/or unlicensed software on to a computer and sells it as a package. Often, this is attractive to buyers as the price is low.

Tip: Ensure you always insist on genuine software pre-installed up front with your purchase and that it comes with the proper licence documentation, i.e. genuine CD-ROM or diskette, manuals, receipt/invoice, end-user license agreement, certificate of authenticity (COA), etc.


Counterfeiting

This happens when pirated software is packaged in a manner that is very similar to the original packaging, thus looking like original. This could easily fool buyers, as counterfeit registration cards with unauthorised serial numbers, boxes and manuals are often a part of these packages.

Tip: Ensure you consult your software principal on how to tell genuine software from the fakes and what licence documentation is required.


Licence misuse

Software vendors often provide various types of licensing, including OEM (original equipment manufacturer), volume licensing, those meant for non-profit organisations and academic institutions, upgrades, etc. Using software against its licensing terms is a form of piracy for example using academic licences in a commercial business or purchasing OEM licences (required to be pre-installed with a new computer system) separately without the new computer system (unless otherwise specified by the licensing terms).

Tip: Ensure you consult the end-user license agreement or the software principal to see what rights you acquired with your software licence type.


Multiplexing

There are many multiplexing devices (pooling, dumb client, thin client = hardware that reduces number of CPUs/ PCs/ input devices) available in the market today that promise the reduction in the number of software licences required. Beware that multiplexing DOES NOT necessarily reduce the number of software licences required.

Tip: Ensure you refer to the specific licensing terms or product usage rights accompanying your software to always be certain.


Renting

This type of piracy works in the same manner as video rental where a licensed copy of software is rented out for temporary use against the licence agreement, or without the owners’ agreement.

Tip: Again, ensure you consult the licensing terms.


Internet piracy

The sharing of illegal and unlicensed copies of software has become easier and more prevalent, as identity over the Internet can be faked easily. Beware of sources selling cheap software online disguised as “on sale” or “OEM version” via what looks to be very professional looking websites or spam e-mail messages.

Online auction is another popular channel for Internet piracy. Unlicensed software could be easily resold over an auction site. In addition, technologies that have emerged to enable easy sharing of files over the Internet such as FTP (File Transfer Protocol) and P2P (Peer-to-Peer), allow faster and easier transfer of pirated software.

FTP allows transferring of large files easily by downloading files to a site. P2P technology allows a community of people to share files. Most people are attracted to the wide range of software resources available for free when they join a P2P community, and they, in turn, contribute by sharing what they have. Often, pirated software is easily available through both FTP and P2P technology users.

Tip: Ensure you purchase your software from reputable and trusted sources only. If the deal seems too good to be true, it probably is.

If you would like to learn more about software piracy and Software Asset Management (SAM) visit www.bsa.org/malaysia. You can also contact the BSA Antipiracy Hotline at 1-800-887-800.



Clashes of the Internet titans (2) - Microsoft to buy eBay?

According to this news, Microsoft is considering making a bid to buy eBay (How about the joined forces of Yahoo and eBay in the previous entry?) after the initial plan to acquire AOL was backfired when AOL stricking a deal with Google.

The Post reported that Microsoft founder and Chairman Bill Gates favored eBay over Yahoo as a takeover target because of the technology that eBay would bring to the table, including its PayPal online payment system and its Skype VoIP subsidiary.

Read more here.

Questions:
1. How does these development will affect the e-commerce in the next few years and does these benefit the consumer?
2. In the end, which combination will emerge?