Monday 12 November 2012

Improving service delivery

The Honorable Chief Secretary to The Government of Malaysia, Y. Bhg Dato' Sri Dr. Ali bin Hamsa is our new Ketus Setiausaha Negara. His approaches in dealing with the government servants is really different compare to the previous one. His smile, openness, good listener and tolerant gave more happiness to the government servants to serve better for the nation. Hence, for sure its will improve government servants motivation's and spirit of works.

During job visit of Y. Bhg. Ketua Setiausaha Negara (Chief Secretary to The Government of Malaysia) to Perak on October 4th 2012, I asked the KSN regarding on his opinion about several government departments that still imposed to the customer to take off their shoes (menanggalkan kasut) when entering the counter.

The honorable KSN answered that it all depends to the head department to set rules and regulations to the customers. In this case, the KSN gave options to the head departments to decide.

Meanwhile, I would like to share my opinion's that majority of my PTD batch's agreed with me that the customer should be allowed to enter the service counter with their shoes.

Thank you.
 


Wednesday 11 July 2012

IMPROVING CUSTOMER SATISFACTION

I can't understand why some government offices imposed to their customers/clients to take -off their shoes or sandals before entering the office. For instance at the Pejabat Agama and also some at the Baitulmal at the State level.

The related department might said for hygienic reasons. My answer is "then, why the department need to outsource cleaner service?

I can't accept this issue. I believed that many customer doesn't want to do so. It is unacceptable.

For example, I will not enter any shop lots that imposed the same rule which is to take-off the shoes.

People said that small effort, generate big result.

In order to improve customer satisfaction especially in Malaysia public service, I would like to suggest to the higher authority to abolish this unneeded rules.

Therefore, all customers and clients can enter the particular department with their shoes and sandals.

In this, for sure will increase the customer satisfaction.

Thank you.

Sunday 17 June 2012

TIPS TO REDUCE SPAM - PART 2

As in Part 1, I already explained the definition of Spam and how to distinguish Spam.

In this posting, I will details how to reduce Spam.

  1. Don't reply to Spam - many spammers will put 'unsubscribe' function into their e-mails. By responding, users are actually verifying that the user's account is active. This can deluge the users for the spam mails.
  2. Don't open Spam - some spam messages are programmed to contain web bugs, which notify the senders when an e-mails has been opened. The notification is a positive sign to spammers that the users e-mails is valid.
  3. Never used 'remove' options in a Spam - because using the 'remove' option is same as replying to a spam.
  4. Never buy anything advertised in Spam - Spammers exists when there are people purchase what the spammers peddle in the e-mails. By not purchasing the advertised in spam, the spam might be stopped.
  5. Don't publicly disclose your e-mail address - Only give out your e-mails address where there is justifiable need.
  6. Use Spam filters - Using protective software is one of the most effective ways to control spam because filters will allow the e-mail's user to block any e-mails messages from specified address, domains or which have a specific subject or text from being deposited to the e-mail box.
(Source mainly from SKMM)

HANDLING SPAM IN E-MAILS - PART 1

Assalamualaikum and Selamat Sejahtera

Today I would like to touch about Spam in e-mails. As an e-mails users, there are no doubts that everybody has been experienced when received Spams in their e-mails. For sure, these Spams is really frustrating to the users.

What is Spam?
Spam is defined as mass sending of unsolicited or unwanted message either to our e-mails or nowadays into our mobile phone. Normally, spam is using for spreading viruses, but there also spam for marketing and create publicity for products and services.

Therefore, spam will create less confidence to the e-mail users toward e-mail usage. By the way, for e-mail service provider, spam will increase their cost due to impose more storage, transmission and computing costs.

The only way to distinguish between legitimate message and spam is consent. If you asked for that information, it is not spam. For instance, an e-mail from friends is not spam.

There are several ways how the spammers get e-mail address. Firstly by using automatic programs or 'harvesters' to scan newsgroup, webpages and forwarded e-mails. Secondly by purchasing lists of e-mails from third parties and lastly by using 'dictionary attack' in order to try out all possible combinations of letters, common names and words in e-mail address.

Thanks you.

In next posting, I will details tips to reduce Spam. (Main source from SKMM)




Friday 15 June 2012

RESALE OF DOMAIN NAMES

This summary is not available. Please click here to view the post.

DOMAIN NAMES/INTERNET ADDRESS COORDINATION

Who coordinate and set address or what we called as Domain Names in the internet?

The agency that coordinate the internet address or Domain Names is Internet Corporation for Assigned Names and Numbers (ICANN).

The Domain Names must be unique either as a name or a number compare to the others because the computer will know where to find each other. Therefore ICANN coordinates these unique identifiers across the world so the internet will become global.

ICANN coordinates the Domain Name System (DNS), Internet Protocol (IP) address, space allocation, protocol identifier assignment, generic Top Level Domain (gTLD), and country code Top Level Domain (ccTLD) name system management and root server system management functions.

These services were originally performed under U.S Government contract by the Internet Assigned Number Authority (IANA). ICANN now performs the IANA function.

Meanwhile, the Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated – and this coordination role is undertaken by IANA.

Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet. IANA’s various activities can be broadly grouped in to three categories:
  • Domain Names
    IANA manages the DNS root, the .int and .arpa domains, and an IDN practices resource.
  • Number Resources
    IANA coordinates the global pool of IP and AS numbers, providing them to Regional Internet Registries.
  • Protocol Assignment
    Internet protocols’ numbering systems are managed by IANA in conjunction with standards bodies.
IANA is one of the Internet's oldest institutions, with its activities dating back to the 1970s. Today it is a set of services provided by ICANN, an internationally-organised non-profit organisation set up by the Internet community to help coordinate IANA's areas of responsibilities. (Sources from ICANN and IANA)

Wednesday 6 June 2012

MY FIRST EXPERIENCE IN COMPUTER WORLD


My first experience in ICT, 1992
When I was in Form 1 in the year of 1992 at my secondary school at Sekolah Menengah Kebangsaan Datuk Abdullah (SEMENDA), Astana Raja, Negri Sembilan, I was introduced to the computer world. During that time, my computer class will be held at night by one of the teacher's namely as Cikgu Fairus. He also acted as a hostel warden.

As a kampung boy, the computer is totally new things to me. At that time also, computer still new to the Malaysia education system. I still remember that when I back home normally at the end of every month, several computer literacy program was introduced maybe by the Felda Palong 6 administration to the peoples.

I was excited because during that class, I normally will enjoy to play computer game. The first lesson in that class is about BASIC language and we in the class learned how to instruct the computer using BASIC language to print something as a end product.

Actually BASIC language is an acronym from Beginner's All-purpose Symbolic Instruction Code.

My computer lesson certificate dated in 1993
The original BASIC language was designed in 1964 by John Kemeny and Thomas Kurtz and implemented by a team of Dartmouth students under their direction. BASIC was designed to allow students to write programs for the Darthmouth Time-Sharing System. It was intended specifically for the new class of users that time-sharing systems allowed. It was also design for a less technical user who did not have the mathematical background of the more traditional users and was not interested in acquiring it.
BASIC remains popular in numerous dialects and new languages influenced by BASIC such as Microsoft Visual Basic. In 2006, 59% of developers for the .NET Framework used Visual Basic .NET as their only programming language. (Source from Wikipedia)

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 3)

Types of cameras in Video Surveillance:
Outdoor camera
Dome camera

Types of Camera
Function

Indoor Camera

Indoor camera is used for indoor security mechanism. Depending upon user security needs, the users can mount it at any suitable location inside the building. Suitable for security in location where indoor surveillance is required such as homes, schools, offices and hotels.
Outdoor camera
Outdoor CCTV camera is used for the outdoor such as entry and exit points with limited night lighting. Outdoor cameras typically have hard shell vandal-proof casings and a variety of lens options.
Infra Red (IR) Day/Night Camera
IR type of camera is used for high alert security areas for day and night surveillance. In the daytime, the cameras functions like a normal camera with standard colours, but at night, it switches to ‘low-lux’ black and white mode. When visibility decreases due to no-light situation, IR LEDs automatically imposed. Normally used in military activities and in parking lots.
Dome Camera
Dome cameras are installed inside a dark dome offering compacts design for a discreet appearance. These cameras can also be rotated and tilted manually. Dome type cameras are used in public areas like railway stations, bus terminals and other arrears with huge gathering of people.
Bullet Camera
Bullet cameras encased in bullet shaped housing are used in residential places as well as commercial places. They are small in size, with integrated design and offer illuminate viewing even in darkness and are weatherproof.
Vandal Proof Camera
Vandal proof cameras are used for outdoor security which sheltered within solid material and covered by a break-proof glass. These cameras are difficult to break, rain and fog resistant making them suitable for high security and normally placed at wall or ceiling mounted.
Hidden Camera
Hidden cameras are compact in size and used for secret monitoring. It’s has a built-in recorder that records and broadcasts simultaneously. They are usually installed in public places like department stores, theaters and clubs.
Pan Tilt Zoom Camera
Pan-tilt-zoom Camera offers the ability to view and zoom in all directions. One can even set the camera to automatically rotate to different fields of vision.
(Source: SKMM)

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 2)


The use of video surveillance is getting vital and important especially in crime prevention tool used by both in public and private sector. For instants, larger metropolitan areas such as London and Perth are equipped with video surveillance since early 1980s and the 1990s. However, the implementation of video surveillance in Malaysia considered as relatively new with prevalent developments only in the last five years.

Indoor camera
Video Surveillance can be defined as an activity using a video appliance that enables image capture of video images or extract information to be compressed, stored and transmitted over communication network and digital data link. Its also used to monitor, observe and analyze a person, a group and activities or even objects using surveillance camera.

CCTV is short for Closed Circuit Television is often highlighted since CCTV is one of the earliest and most well-known forms of video surveillance since its availability in 1960s. CCTV is a television transmission system where live or pre-recorded signal are sent over a closed loop to a finite and predetermined group of receivers, a monitor, sets of monitors or video recorder, either via coaxial cable, television wires, fiber-optic, microwave radio systems, internet or communication satellite. (This definition source from Sci-Tech Encyclopedia, Answers.com, VideoSurveillanceGuide.com)

However, implementing a video surveillance systems in public spaces must be done with integrity and respect for personal privacy and civil liberties. Other consideration and issues are recording of workplace surveillance as cameras installed at public spaces indirectly record the activities of on-street workers and cleaners, the potential risk of liability incurred in the responsibility of ensuring public safety within CCTV areas and the limitation of disclosure of video recording and images to other parties. (Source from SKMM)

Note: Due to the length of this article, types of surveillance cameras will be published in Part 3.

VIDEO SURVEILLANCE IN PUBLIC SPACES (PART 1)


CCTV in SUK Perak
One of the ICT's benefits to the consumers or to the citizens is the usage of the Video Surveillance, or what people always mentioned as CCTV. This article was taken from the Malaysian Communication and Multimedia Commission (SKMM) report's.

Crime incidents that have taken place around the world have changed government's orientation and spending towards security measures and solutions in the country. By 2012, the worldwide video surveillance industry market revenue is expected to grow to USD12.72 billion, with Asia Pacific accounting for almost a third of the market at USD3.59 billion.

CCTV for deterrence
In Malaysia, the Cabinet Paper of The Implementation of Program Bandar Selamat (Safe City Program)  was submitted to the Cabinets of Malaysia in July 14, 2004 which consist of three (3) strategies and 23 prevention method. One of them is the usage of CCTV especially in the 'hot area' of crime rate.

In a video surveillance system, a Closed Circuit Television or widely known as CCTV is the most commonly used equipment in recording surveillance activities together with Digital Video Recorders (DVRs). But lately, the market trend start using the:

  1. CCTV cameras and digital products are gradually converting to Internet Protocol (IP) cameras and networked;
  2. Cameras are using Network Video Recordings (NVRs) as opposed to full DVRs and going IP based;
  3. Smart and intelligent applications usch as Video Contents Analytic Software are being used; and
  4. Storage technology has improved in term of capacity and scalability through the development of Storage Area Networks (SANs)
There are several anticipated results from using Video Surveillance Cameras which are:

  1. Deterrence where installing surveillance cameras can discourage potential offenders
  2. Create efficiency in security deployment such as police department and the others authorities whereby they can gauge if police assistance is required thus avoiding false alarms incurring unnecessary police resources
  3. Develop self disciplining towards offenders and victims where potential victims are reminded of the risk of crime whereas offenders are disciplined through fear of being watched
  4. Detection where video recordings of crimes and offenses can be used to punish, remove offenders or used as evidence in court.
In PART 2, I shall explained the several types of cameras used in surveillance today.

Thanks you.


Sunday 27 May 2012

The ICT Impacts To The World (Part 2)

As I promised before, here I would like to share the other 5 from The Ten (10) Forces That Flattened The World, which taken from a book title The World Is Flat (Thomas L. Friedman):

6) Offshoring, by contrast to the outsourcing, is when a company taken one of its factories that is operating in the domestic/local country, and moves the whole factory offshore to the other country. These business practices getting actively in the business world since the December 11, 2011 when China formally joined the World Trade Organization (WTO). This means that Beijing agreed to follow the same global rules governing imports, export and foreign investments that most countries in the world were following. By doing offshoring, the factory will produces the very same product in the very same way, only with cheaper labor, lower taxes, subsidized energy and even lower health care costs.

7) Supply-Chaining is a method of collaborating horizontally among suppliers, retailers and customers to create additional value. Supply-chaining is both enabled by the flattening of the world because the more these supply chains grow and proliferate, the more they force the adoption of common standards between companies that can interface with others. Then, the companies will eliminate points of fractions so they become more efficient among each other and finally they will encourage global collaboration.

8)  Insourcing, is also one of a whole new form of collaboration and creating value horizontally. Compared to the Supply-Chaining which normally involved big companies, insourcing suitable for the smaller company. These small companies saw a lot of places where they could sell their goods/services, manufacture their goods or buy their raw materials in a more efficient manner. The best example is the UPS company that will go to the bigger company, analyze the manufacturing, packaging and delivery processes, and the design , redesign and manage the whole company's global supply chain. Just like when UPS will pick up breakdown Toshiba computer, the UPS will repair it and send it right back to the Toshiba customers.

9) In-Forming is the individual's personal analog to uploading, outsourcing, insourcing, supply-chaining and offshoring. In-Forming is the ability to build and deploy your own personal supply chain such as a supply chain of information, knowledge and entertainment. In-forming is about self collaboration when you becoming your own self-directed and self-empowered researcher, editor and selector of entertainment. In-forming is searching for knowledge, normally using Google, Yahoo and Microsoft (MSN Search) or any search engine that available.

10) Digital, Mobile, Personal and Virtual where Digital explained that majority of current jobs can be digitized and therefore can be shaped, manipulated and transmitted over computer. By virtual, the process of shaping, manipulating and transmitting this digitized content can be done at very high speed using underlying digital pipes, protocols and standards. By mobile, through the wireless technology, all of the jobs can be done from anywhere, with anyone, through any device and can be taken anywhere. And by personal, its means that it can be done by you, just for you, on your own device.

Credit to the Thomas L. Friedman.

Thursday 24 May 2012

Choosing a smartphone


Why until now I don't have any smartphone?

My favourite smart phone
 Personally, I think that when I have a smartphone, I'll not fully utilize the usage of the smartphone. I still believe that,  the marketing personnel and department creatively innovated all of the applications in a smartphone in order to create needs and demand to the users, even though the consumer will not use the application in the smartphone.
Despite of that, I'm ready to have a smartphone in future due to the usage, current trends and application available.

Before that, I would like to share the ideas in choosing a smartphone. This article mainly taken from The Malaysian Insider online news and from the other articles.

Technical specifications explained:
    iPhone (Google)
  • GHz (aka processor speed or the smartphone “brain”)
GHz is the abbreviation for gigahertz, the unit used to measure your phone’s processor speed. This determines how responsive your phone will be and how quickly it will swap between applications and browse the web. A typical smartphone in today’s market will usually come with a 1GHz processor or higher.
  • RAM (aka performance)
RAM, measured in megabytes (MB), determines the number of applications your phone can run at the same time without slowing the device down. If you’re just browsing the web or making calls, 256MB will be enough. If you like to run multiple applications (called multitasking) at the same time or play a lot of processor-intensive games, aim for a minimum of 512MB.
  • GB (aka storage)
Smart phone by Samsung
Depending on the phone you buy it may have integrated storage (that can’t be added to or removed) or a device with an expansion slot for a microSD, SD or MiniSD memory card. Device storage is measured in gigabytes (GB). If you want to store lots of music, videos, photos and apps you will want more storage. Most removable memory cards will store between 2GB and 34GB.
  • MP (aka camera quality)
The smartphone’s camera quality is measured in megapixels (MP). Typically, a smartphone with more MP will take better (higher resolution) photos. Most new smartphones now feature a 5MP or better camera but you can find smartphones that capture up to 16MP.
  • 3G or 4G (aka cellular data internet speed)
3G and 4G refer to the speed of your cellular data speed or how quick your phone’s internet connection is over your carrier’s network. Measured in Kbps and Mbps, 3G networks typically range from 144Kbps to 2.4Mbps. 4G speeds are the next step up and typically range between 1Mbps to 25Mbps (but differ country by country and carrier by carrier). 4G is expected to hit speeds of 100Mbps — faster than your existing home broadband connection — in the future. The consumers must have the knowledge of highest cellular data internet speed in his area.

Tips to buy a smartphone:
Lumia (Google)
1. Try before you buy
Go into a store and try as many different smartphones as you can to see which one feels most comfortable. Before you buy use the exact model you are interested in purchasing. Try using the device to take a photo, send a text, make a call, download apps and browse the internet.Focus on the features you want
Figure out what is most important to you (long battery life, good camera, fast internet (WiFi and 3G or 4G), cost, easy-to-use operating system, applications, gaming, email). This will help you choose the right handset for your needs. 

2. Choose your operating system
Major smartphone operating systems include Google’s Android, Apple’s iOS, Microsoft’s Windows Phone and Research In Motion’s BlackBerry platform. Choosing the right operating system (often referred to as a smartphone “OS”) is almost more important than choosing the right smartphone: It will determine the applications you can download and will govern the way you interact with your phone.

3. Research, research, research
HTC (Google)
After narrowing it down to a few models, hit the web and search for smartphone reviews. Look for “hands on” reviews on technology blogs like TechCrunch, The Verge, Gizmodo, VentureBeat, ReadWriteWeb, AllThingsD, Engadget, Mashable, CNET and The Next Web for comprehensive information about the smartphone you are interested in.

4. Take a knowledgeable friend with you
It’s good to have a tech-savvy friend to provide assistance and make sure you don’t get conned into buying old technology at inflated prices. If you don’t have a friend in the know, sites like Decide and Retrevo can help you find the right device at the right price.

I do recommend the following:
  • One spec that you should look at is battery life. Nothing worse than dealing with a dead phone when you need it most.
  • If you have a choice, get a phone with as much RAM as you can. CPU speed isn’t the only factor in the zippiness of a device.
  • Don’t just go by whether a processor is single-, dual- or (as more phones release) quad-core. Some phones are actually zippier with a single-core CPU than others with dual cores, likely because the software was written optimally for it.
  • Consider your storage needs. If you know you’re an app hound, or you tend to stash large amounts of media on your phone, you’ll need as much room as you can afford.

Meanwhile, Microsoft has just released a handy guide that explains smartphone basics on hardware specs. The guide focuses on Windows Phones but still offers some helpful advice for first time smartphone buyers. PC Advisor has also created an in depth smartphone buyer’s guide that can be found there. — AFP/Relaxnews

The ICT Impacts To The World (Part 1)


One of the my favorite books

As I mentioned before, I would like to share one of the my favorite book which I bought in February 2007 ago. The title is THE WORLD IS FLAT, by Thomas L. Friedman.
Actually, some of the contents of this book's was used by me during presenting Public Speaking when I'm doing my Penilaian Tahap Kompetensi (PTK) in 2008.

The author's mentioned that there are Ten (10) Forces That Flattened The World. In this Part 1, I would like to share the first five (5) of the factors which are: 


  1. On November 9, 1989: The New Age of Creativity; when the fall of the Berlin Wall that unleashed and tipped the balanced of power across the world towards those advocating democratic, consensual, free-market oriented governance, and away from those advocating authoritarian rule. The Cold War had been a struggle between two economic systems which between capitalism and communism. When the Berlin Wall fall in 1989, there was only one system left.
  2.  The New Age of Connectivity: When the Web Went Around and Netscape Went Public. The authors did mentioned about the concept of a World Wide Web (WWW), a system for creating, organizing and linking documents so they could be easily browsed over the Internet. In facts, WWW was developed by British computer scientist Tim Berners-Lee and he posted the first Web site in 1991. After the Berners-Lee inventions, others scientist and created a number of browsers to surf this early Web. The whole culture of Web browsing for the general public was created by a tiny start-up company in Mountain View, California, called Netscape. Netscape went public on August 9, 1995.
  3. Work Flow Software. The rise and integration of work flow software in mid-to late 1990s was a quiet revolution that most people had no clue what was happening. The work flow software enable more people in more places to design, display, manage and collaborate on business data previously handled manually. The first breakthrough in work flow was the combination of the PC and e-mail.
  4. Uploading. There are variety of uploading. The flat-world platform not only enabled more people to author more content, and to collaborate on that content. it also enabled people to upload files and globalize the content. The most popular uploading web site is Wikipedia, that also known as "the people's encyclopedia". The word "wiki" is taken from the Hawaiian word for "quick". Wiki are Web sites that allow user to directly edit any Web pages on their own from their home computer.
  5. The World Is Flat by Thomas L. Friedman
  6. Outsourcing here means that many American business player looking more brainpower, educated person especially from India to migrate to the United State to work with them. The history begin when Jawaharlal Nehru, India's first Prime Minister, set up the first of India' seven Indian Institute of Technology (IIT) in the eastern city of Kharagpur. in the fifty-five years since then, hundreds of thousands of Indian have completed to gain entry and then graduate from these IIT's. However, India could not provide good jobs for most of the talented engineers. So, America got to be the second buyer of India's brainpower.

GPS Navigation Device

I still remember when I bought a GPS Navigation Device at the end of year 2011. With considerably at cheaper price compare to the one year before, I also received several gives namely as anti-virus software, hard disk cover and several others.


This is the GPS device in my hand's.
I feel that GPS help a lot in finding a route especially at unfamiliar place or location. GPS also capable in tracing the speed trap location. 

But the user must read that GPS cautiously during driving. Please avoid any incidents or accidents.  


The GPS device activate.
However, my wife unable to use the GPS mainly because confusion during driving and also annoyed from the GPS voice.


What is the GPS Navigation Device?

A GPS navigation device is any device that receives Global Positioning System (GPS) signals for the purpose of determining the device's current location on Earth. GPS devices provide latitude and longitude  information, and some may also calculate altitude, although this is not considered sufficiently accurate or continuously available enough due to the possibility of signal blockage and other factors). GPS devices are used in military, aviation, marine and consumer product applications.

GPS devices may also have additional capabilities such as:
  • containing maps, which may be displayed in human readable format via text or in a graphical format
  • providing suggested directions to a human in charge of a vehicle or vessel via text or speech
  • providing directions directly to an autonomous vehicle such as a robotic probe
  • providing information on traffic conditions (either via historical or real time data) and suggesting alternative directions
  • providing information on nearby amenities such as restaurants, fueling stations, etc.
In other words, all GPS devices can answer the question "Where am I?", and may also be able to answer:
  • which roads or paths are available to me now?
  • which roads or paths should I take in order to get to my desired destination?
  • if some roads are usually busy at this time or are busy right now, what would be a better route to take?
  • where can I get something to eat nearby or where can I get fuel for my vehicle?
Consumer GPS navigation devices include:
  • Dedicated GPS navigation devices
  • GPS modules that need to be connected to a computer to be used
  • GPS loggers that record trip information for download. Such GPS tracking is useful for trailblazing, mapping by hikers and cyclists, and the production of geocoded photographs. 
  • Converged devices, including GPS Phones and GPS cameras, in which GPS is a feature rather than the main purpose of the device. Those devices are the majority, and may use assisted GPS or standalone (not network dependent) or both.
Source of reference: Wikipedia

INTRODUCTION

Firstly, I would like to say thanks and deeply appreciation to the Prof Madya Dr Norzaidi Mohd Daud, our lecturer of Managerial Information System (MIS 750) because gave us an assignment which is to develop our own blog.

If not of him, I may not develop any blog at this time, since I have an intention to develop a blog. Therefore, this blog will be my starting point to be one of the active blogger in Malaysia.

Basically, at now, this blog will shared my experiences in using ICT apparatus or gadget due to the our lecturer request.