Website counter


Hye! My name is Yana. I am 21 years old and currently studying at UiTM major in Human Resource course. Feel free to drop by at my page and enjoy blog walking here guys! You are welcome to follow me and comment on my entry.=)


From left is my superb father, Abd Halim. In the middle is my lovely mum, Paridah and me Yana.

This is the only sister that I had until death! I love her damn much even we always getting fight for all the time. She love to sing and talk!


They are my coursemate and classmate that quite close with me. They are superb! I was glad to know them and I hope our friendship will never end.

Articles

ARTICLE 1

Information Technology - MGT 417
Assalamualaikum and have a nice day readers!

For the previous entry, I had told about myself and my interest. And now for this entry, I would like to share some knowledge regarding one of my subject in this semester (Semester one) in UITM. The subject code is MGT 417 which is also known as Information System. 

Information System is a subject which refer to combination from both information technology and people actions or activities that support management, operations, and decision making.  In other way, Information technology is more known as interaction between people, processes, data and technology.

The goal of learning this subject is to show us how real global business use technology and information systems to increase their profitability, gain market shares, improve their service and manage their daily operations. Besides, it’s also teach us how to use IT to concur their current or future jobs and help us to be success in our career.

The advantages from learning this subject is  too much. As we concern, all the company nowadays are using modern technology to generate their daily routine. Because of what? Because all this technology are easier for them and all the data are stored orderly and systematically. So, all the employees in the company need or compulsory to know about IT at least at basic level. Hence, since this subject is teach in my course, so I no need to take IT course from outsider. Besides, IT also bring more profit in a company. It was because a company can generate it’s business 24/7/365 when there are present of Internet service and we know that Internet is part of Information Technology.

Although it has many advantages, but in other side, it also having it’s bad side. One of it security beaches. The ability to store information in an electronic database facilitates quicker, more efficient communication. In the past, an individual would sift through stacks of paper records to retrieve data. With properly implemented technology, information can be recovered at the touch of a button. Others disadvantages is that it need an implementation expenses. Every business must consider startup costs when implementing any type of information technology system. In addition to the cost of hardware and software, some technology vendors require businesses to purchase user licenses for each employee that will be operating the system. Businesses must examine the cost of training employees in unfamiliar technology.

In conclusion, I do realize that this subject bring me a lot of benefit either in future or now. It’s very useful. Nowadays even a small company also use Information Technology to achieve their market target and improve company profitability. So, let’s enjoy our subject guys! All the subject that we learn has pro and contra. 


ARTICLE 2

Wireless Communication

Click to this link for the Article review- The Future Of Wireless Communication

Comments :
     Wireless communication systems are becoming increasingly popular in today's fast-paced world. Mobility, portability, and instant access (via the Internet) to unlimited information have become the mantra of businesses and individuals alike. The evolution of wireless communications has been incredibly quick and the future of this technology on our lives will be allow us to do things we never imagined.

     The two main wireless services in use today are cellular and private packet radio.  The service that is chosen will depend on the application that a company or an individual wants to run.  Cellular technology is common in both business and private sector.

     There are two types of cellular technology which is circuit-switch cellular and cellular digital packet data (CDPD). The circuit-switch cellular have the biggest advantages in its nationwide availability. Another advantages is its ability to send voice and data over the cellular phone network.  This types of network is ideal if there is requirement to exchange of long text messages, large files or faxes because it's typically charges by the minute of connection time, not by the number of bytes transferred. A practical application for this technology is the transfer of data from a laptop by means of a cellular modem and phone. The disadvantage of this type of service is the long setup time each connection requires (about 30 seconds).

     Besides, CDPD is best suited for transaction processing and database queries. This services offers fast call setup (about 5 seconds), and is expensive for short messages, such as sending e-mail. Other disadvantages of  CDPD is it is expense of large file transfer, and are limited availability of the service.

     Hence, for the private packet radio, its offer business widespread connectivity. These services can be connected to from virtually anywhere in the country. Private packet radio offers quick call setup and is well suited to communications that generate short, burst messages such as email. The disadvantages of private packet data is same with CDPD which it is expensive for large file transfer.

     The fundamental problem that wireless communications faces is that none of the major wireless data services is ideal for all applications. The obstacle to spread adoption of data connections for laptops and personal digital assistants (PDAs) include the lack of compatibility between services, the cost of the services, and the size and price of wireless modems.

     Radio telephones have been used for decades, but have not been widely available due to limited system capacity problem was the development of the cellular concept, which allows frequency reuse. The use of wireless communications has increased exponentially since that breakthrough. The evolution of wireless systems can be divided into four stages :
  1. The preprevailing stage.
  2. The first generation analog system
  3. The second generation digital system;and
  4. The third generation system.
As a conclusion, the fusion of computers and communications into a unified entity may appear to be a subtle distinction from the computers and networks popular today.


ARTICLE 3

Computer Hacking
Comments :
     Nowadays, the internet allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected and major corporations and government security departments have acknowledged that hacker break-ins have gone out of control. Some companies are too fearful to join networks because of this. Software programs brought out to deal with the growing problem, such as firewalls, are no longer totally effective.

     The basics of computer security (using difficult passwords, and guarding of data) are not being met surveyed. In most countries, computer hackers can only be prosecuted if the victimised company has proven that it had showed active security consciousness. Furthermore, companies which become prone to hacks become liable to other companies if their lack of security precautions allowed their computer network to become an opening for break-ins to the networks of other companies.

     Companies are disinclined to report breaches in security as it denotes a poor images and highlights their vulnerability.  Clients demand security, and lack of it will send them elsewhere.

     Billions of dollars annually are spent on protection devices.  Others are utilizing the expertise of former convicted hackers to fine-tune and update their security features. It is a case of befriending the enemy in order to learn more. These hackers come out prison with a ready market for their expertise, and great financial rewards.

   The  explosion of the internet use, and networks around the world have brought with a need for greater security consciousness amongst its users and systems conciousness amongst its users and be constantly updated in the war against the hackers.

     Firms and security enforces are now dealing with elite hackers whose intent is now focus on sinister revenge, damage, political and defence corruption, and monetary greed. The cost of these types of computer crimes could run into the billions.  This is due to either the reluctance of corporations to report all break-ins or because the informations systems are so massive that the scale of corruption may be too difficult to detect.

     There are also a select few who choose to label themselves as hackers with moral erhics. These second type of hackers prevelant today are assisting companies and law enforcement agencies in the fight against dangerous hackers in a number of ways. These include holding hackers conventions and online information services to inform the public of new security risks, as well as being employed by corporations to break into their systems in order to secure and refine them. These hackers love computers and motivated by the anger and frustation they feel at the prevailing laxity of security measures in place. Despite this corporation, these remains an inherent distrustful fear between the two camps. Fear is also a motivating factor for corporations in refusing to join networks, allocating enormous funds for security measures, restricting access to information, and utilizing passwords to deter alien entry.

     Hacking is now far more sophisticated, varied and costly to society. There is a need to continue to work with ethical hackers in the battle for safety and order, for otherwise we face an increasingly monitored future and a reduction in the freedom of computer use.

As a conclusion, the advent of continuos the issue is open and clear-cut. The advent of continuos new technology demands continuous changes within society, and new approaches. There are two ways to resolve the hacker problem which is deal with it as it is countered or take a different and proactive approaches. 






No comments:

Post a Comment