WELCOME TO MY BLOG

WELCOME TO MY BLOG

Friday, 4 May 2012

iOS vs Android




I have read the article about Samsung Galaxy S3 vs Apple iPhone 5 that wrote by Raj Dutta on May 3, 2012. He claims that the buying decision may influence by the hardware or the iOS or Android operating system. Samsung Galaxy S3 has released in London on May 3, 2012 and expected to be available internationally around June while Apple iPhone 5 chose a late release since sales of iPhone 4S are still concern in the market. Click here for the article.


Even though, I am one of the Android users, I am not really bothered the information regarding iOS and Android. Since this issue is highlighted recently, let’s check it out.


What is iOS?
According to Daniel Nations (About.com Guidde, 2012), iOS is Apple's mobile operating system used to run the popular iPhone, iPad and iPod Touch devices. Formerly known as the iPhone OS, there are over 300,000 iOS applications available for download in the Apple app store, the most popular app store of any mobile device. iOS utilizes a multi-touch interface where simple gestures are used to operate the device, like swiping your finger across the screen to move to the next page or pinching your fingers to zoom out.


What is Android?
As stated by Matthew Boltan (http://www.techradar.com, 2011), Android is an operating system for mobile phones and tablets, in much the same way that PCs run Microsoft Windows as their operating system. It's maintained by Google, and comes in a few different versions. At the time of writing, mobile phones run a variant of version 2 of Android, while most new tablets run a variant of version 3. The difference between the 2.x and 3.x versions of Android is mainly in how they use the screen space provided.


The similarities of iOS and Android
Both iOS and Android have:
1. Traditional access control
Password and idle time screen locking to protect the device itself.


2. Isolation
A process’s availability to access sensitive data or system resources is limited from another process.


3. Permission-based access control
Granting each application a set of permissions that limits its access specified device data and system.


4. Limited hardware access
Apps cannot directly access the underlying hardware. The hardware interactions are all controlled exclusively by a number of different layers of software which at as intermediaries between the application and the device itself.


5. Resistance to web-based attack
Both systems have some built in capabilities to resist web-based attacks.


The differences between iOS and Android
1. Method of application distribution
Android has more distribution channels. With Android there are more opportunities and methods to load application.
iOS apps can only be distributed through the Apple app store.


2. Data Encryption available on both devices
There are different levels of encryption, and some of them are device-specific. The OSes provide mechanisms for app to store secret in ciphertext on disc but apps don’t always take advantage of these features.


3. Application security testing
The level of verification on app security isn’t the same between various Android marketplaces and Apple’s App Store. Security and privacy are not thoroughly tested and unauthorized access to sensitive data has already occurred in both the App Store and Android Marketplace.


4. Apple sometimes approve apps then disapproves them
Apple has an approval process to place an application into the iTune store. However, it’s not hard to find examples of apps being removed from the store after they have found to behave badly.


The security features
Android security features
1. Permission-based access control
Android’s access control model is different than iOS’s: inside the application manifest, there is a static list of permissions that the Android application requests up front. The user is presented with list at application installation time.


2. Installing applications
The official Google marketplace allows remote installation of applications to your phone. It prompts the phone to accept the installation, therefore it is not possible to remotely install and run an auto erase or find me type application.


iOS security feature 
1. Permission-based access control
When an application requests the use of a protected feature in iOS at runtime, the OS pops up a dialog box in the middle of the app and asks the user if he/she chooses to allow the application access to the resource. Many apps fail if the user chooses “no”.


2. Geolocation
Locate the phone when it’s lost. This feature is provided by Apple as a feature of its operating system and accompanying online service.


3. Auto Erase
If the phone is lost or stolen, the user can wipe sensitive data from their device. In the event that the phone is returned, the user can restore the information from the backups on the desktop. When the feature is enabled, 10 failed passcode attempts will automatically erase date from the device.


Now, you have the information. Thus, use your smartphone wisely.

Internet Banking: CIMBClicks

What is CIMBClicks?

CIMBClicks is the Internet banking and financial service portal accessible to all CIMB Bank ATM and Credit Cardholders. It is convenient and safe way to do banking on the Internet. CIMBClicks specifically caters to the need of consumer banking clients of CIMB. The service is accessible 24 hours a day, 7 days a week. (Exception of daily downtime at midnight (Malaysia) for maintenance.) and CIMBClicks is accessible from anywhere in the world with Internet access.

The URL address for CIMBClicks is www.cimbclicks.com.my

What are the benefits?

The benefits by signing up CIMBClicks as follows:
Perform transaction easily and conveniently.
Spend much less effort at a lower cost.
The service is offered at no charge.
The user can make transactions after banking hours and from the comfort of the office  or home.
Pay your bills online to respective government agencies, utility companies and subscription services.
Check on Loan/Financing and Foreign Currency Accounts.
View Credit Card statements and transaction history.

CIMB has also promised by continuously adding new services from time to time to meet consumer banking needs.

How to register for this service?

First, create your Internet Banking e-PIN at any CIMB ATM. Then, log on to www.cimbclicks.com.my and register online.

How to create e-PIN at ATM machine?

i. At the CIMB ATM machine, insert ATM card and enter the existing ATM PIN.
ii. Select "Others", then select "Internet e-PIN ".
iii. Key in 6-digit e-PIN of your choice. It must be different from present ATM card PIN.
iv. Confirm e-PIN by keying the same 6-digit number again.
v. If e-PIN creation is successful, the ATM will display the message "Internet e-PIN accepted".

How secure is CIMBClicks?

CIMB has promised the confidentiality and integrity of the transactions performed via CIMBClicks as that all information transmitted over the Internet is encrypted using 128-bit SSL. Strong end-to-end encryption is also adopted. In addition to that CIMB has received a security certification from a prominent security expert for having achieved a greatly enhanced level of security conforming to global best industry practices.

The browsers that are compatible with this service are:
Internet Explorer version 6 & above 
Netscape Communicator V8.1 & above
Firefox V1.5.0.3 & above
SeaMonkey V1.1.8 & above
Apple Safari 2.0 & above

In order to ensure the transactions that have performed cannot be view by an unauthorized person or stored in the cache memory of the computer used, the user is advised to clear the cache memory of the Internet browser. You can follow below instruction according the browser that you have used:

Internet Explorer 6 
* Click "Tools"
* Select "Internet Options" 
* Click "General" 
* Select "Temporary Internet Files" and click "Delete Files" 
* Click "OK" 
* Click "OK" again to close the Internet Options window 

Internet Explorer 7
* Click "Tools"
* Select "Internet Options" 
* Click "General" 
* Under "Browsing History", click "Delete"
* Select "Temporary Internet Files" and click "Delete Files" 
* Click "OK" 
* Click "OK" again to close the Internet Options window

Mozilla Firefox 2
* Click "Tools" 
* Select "Clear Private Data"
* Select "Cache" 
* Click on "Clear Private Data Now"

Opera
* Click "Tools" 
* Select "Delete Private Data"
* Select "Cache" and click "Delete"

Safari
* Open browser and click "Empty Cache"

Thus, let’s start using CIMBClicks together. It is safe and convenient!

References:





Friday, 20 April 2012

Technology in Birth: Cesarean

I still remember the time that I went to Operation Theater to deliver my first baby every time I look at her.  The doctors decided that a cesarean section should be done urgently due to intrauterine growth restriction (IUGR).  I have given birth on January 25, 2012 at 33 weeks. Ventilator has been ready for my baby in case of emergency. After given birth, my baby need to place at incubator. She went there for 24 days. All these things make me keep it as unforgettable journey of my life. Now, let’s see more about cesarean.



What is a Cesarean Section?
A cesarean section is a surgical procedure in which incisions are made through a woman's abdomen and uterus to deliver her baby.

The Purposes
Cesarean sections, also called c-sections, are performed whenever abnormal conditions complicate labour and vaginal delivery, threatening the life or health of the mother or the baby. The procedure is often used in cases where the mother has had a previous c-section. Dystocia, or difficult labour, is the other common cause of c-sections. 
Difficult labour is commonly caused by one of the three following conditions: abnormalities in the mother's birth canal; abnormalities in the position of the fetus; or abnormalities in the labour, including weak or infrequent contractions.
Another major factor is fetal distress, a condition where the fetus is not getting enough oxygen. Fetal brain damage can result from oxygen deprivation. Fetal distress is often related to abnormalities in the position of the fetus or abnormalities in the birth canal, causing reduced blood flow through the placenta. Other conditions also can make c-section advisable, such as vaginal herpes, hypertension, and diabetes in the mother.

My lovely baby

In my case, I have no choice unless through cesarean section. Conversely, in this new millennium, women do have an alternative that has been provided by the wonders of modern technology. Women today have choice that something women in ages past did not have. Let’s we see the reasons of women to choose deliver their baby through cesarean section.

Why do some women consider cesarean delivery more advantageous and more in keeping with the 21st century?

  • A cesarean is a modern way to have a baby, involving the use of technology. Modern technology features highly in our daily lives. We are at ease with it and find it reassuring. The latest and most up-to-date technological equipment is much prized and sought after in all areas of our lives.
  • A cesarean is a medical operation. Birth is currently seen as a medical event as it usually takes place in hospital. Is a cesarean operation not therefore a logical conclusion to pregnancy for women of this millennium?
  • A cesarean can be scheduled. Few of us can get through a day in our modern world without a watch and a diary. Our daily lives are ruled by time and by carefully planned appointments. Choosing the date of the baby’s birthday has considerable appeal in this context for some women. We have become accustomed to leading our daily lives in a way that pays little heed to the natural flow of events. For example, modern technology allows us, in many respects, to disregard the divisions of night and day or the seasons of the year.
  • A cesarean is quick in comparison to most labours. We live in an age when the quicker something can be achieved the more advantageous it is perceived to be – whether this is making a cup of instant coffee, washing the laundry, travelling from a to b, or sending a communication. In our society time is money.
  • A is perceived as pain-free. The operation is carried out under anaesthetic and therefore there are no pains of labour to be endured. The “wake me up when it’s all over” scenario appeals to many women.
  • A cesarean avoids the need for a baby to make the journey through the birth canal. Many women worry about how something as large as a baby could possibly fit through such a small opening. Some women fear the baby may be ‘squashed’ and damaged in the process.
  • A cesarean is clean. The antiseptic nature of the operating theatre is very different from the physical exertion of labour. No sweat and tears. The mess of amniotic fluid and blood is dealt with out of sight. Urine is catheterised. There are no lumps of poo emerging from the rectum, pushed out by the baby’s head as it journey’s down the vagina. Is this not more in keeping with our aseptic society?
  • A cesarean is clinical – and therein perhaps lies its biggest attraction. Planned cesarean birth avoids the necessity for the many probings of the vagina, which have become routine during what is termed ‘normal’ birth today. A woman can more easily maintain a degree of professionalism and detachment in her relationship with her carers since the private areas of her body are left unmolested and unsullied.

There are many very good reasons for having a cesarean section and with a little forethought and planning the operation can indeed be a wonderful experience. There is also no denying that a positive cesarean section is infinitely preferable to a traumatic vaginal delivery.

Nevertheless, what too many have lost sight of, is that even the best cesarean can never hold a candle to a good experience of giving birth to your baby yourself.

References:





Wednesday, 18 April 2012

J-Alert

Do you still remember what was happened 6 days ago? For those who can still remember, on April 11, 2012, magnitude 8.9 earthquake hits the West Coast of Northern Sumatra. Tremors were felt in Singapore, Thailand, Malaysia and India. High-rise apartments and offices on Malaysia’s West Coast shook for at least a minute.

What is a warning system used for detects this disaster and alert the public of the various threats? Recently, I have watched one documentary related to this issue that happened in Japan. The system is J-Alert. I found the information about J-Alert system and I like to share with all of you.

What is the J-Alert?

J-Alert is a nationwide warning system in Japan launched in February 2007. It is designed to quickly inform the public of various threats. The system was developed in the hope that early warnings would speed up evacuation times and help coordinate emergency response.


Diagram of the J-Alert system

How the system works?

J-Alert is a satellite based system that allows authorities to quickly broadcast alerts to local media and to citizens directly via system of loudspeakers. According to Japanese officials it takes about 1 second to inform local officials, and between 4 and 20 seconds to relay the message to citizens. All warnings are broadcast in five languages: English, Mandarin, Korean and Portuguese (Japan has a small Chinese, Korean and Brazilian population), including Japanese. 



Information able to be transmitted by this system
    • Earthquake
      • Earthquake Early Warning
      • News flash of hypocenter, magnitude, and precaution to tsunami
      • Information of hypocenter, magnitude, intensities of various cities, and presence of tsunami
      • Advisory information of Tokai earthquakes
      • Earthquake prediction information of Tokai earthquakes
      • Caution to Tokai earthquakes
    • Tsunami
    • Volcano eruption
    • Military threats
      • North Korean ballistic missile launching
      • Air assault
      • Military attack to nuclear power plant
      • Large scale terrorism


References:
1.        http://www.terradaily.com/reports/Japan_Launches_Alert_System_For_Tsunamis_And_Missiles_999.html
2.        http://www.thetruthbehindthescenes.org/2012/04/11/8-9-magnitude-earthquake-hits-the-west-coast-of-northern-sumatra/
3.        http://www3.nhk.or.jp/nhkworld/english/movie/feature201204051503.html


Tuesday, 17 April 2012

E-Filling: Quick and Easy


Fuhhh….I feel so good right now...I just completed the e-BE form and has submitted just now. As I remember this is the 4th year I have submitted the taxes through e-Filing system. By opt for this method, I just need to key in the figure. Thus, it makes so convenient, saves time and effort as compared with the conventional paper and pen method. For me, E-Filing method is user-friendly and there would be no problem for the first timer to use this method. As stated in New Straits Times dated April 16, 2012, 2.3 million filed their taxes online last year. However, the numbers of taxpayers that opt for this method are expected to be increased to 2.5 million for this year. It shows that Malaysians are starting conscious about e-Filing system.  Here, I have some information about e-Filing that I want to share with all of you.

What is e-Filing?

E-Filing is an application on filling and filing Income Tax Return Form (ITRF) electronically through internet for the following Forms:

Form B
-
Business Income
Form BE
-
Non-Business Income
Form P
-
Partnership
Form M (e-M)
-
Non-resident Individual
Form E (e-E)
-
Employer
Form C (e-C)
-
Company
Form R (e-R)
-
108 statement for company
e-Estimated (e-CP204)
-
An online Estimate Tax Payable Form submission for Company/Co-operative Society/Trust Body

What are the requirements of e-Filing?
  • Income Tax Reference Number and PIN Number
  • Pentium III and above
  • Internet line
  • Microsoft Windows 2000 (Latest service pack)
  • Microsoft Windows XP (Latest service pack)
  • Internet Explorer 5.0 and above/ Mozilla Firefox 5/ Opera 9/ Safari

How to get the PIN No.?
  • Stated on the ITRFs issued
  • Visit the nearest IRBM offices
  • Apply through telephone/letter/fax
    (a copy of identity card is required for verification)

Lost Your Password?
Login to e-Filing website and choose 'Terlupa Kata Laluan' menu to register new password.
  
Besides that, on March 1, 2012 Inland Revenue Board (IRB) has introduced the m-Filing system to help mobile-savvy users with smartphones to file their taxes. Everyone has his or her own favourites method. By introducing m-filing, it will cater to their needs. Thus, make your own choice!

References:
1.         http://www.hasil.org.my


Welcome




I hope I can share something that useful for all of us. Enjoy reading and always support my blog!
Thank you.