Sunday, 15 April 2012


businesses and companies nowadays need to compete along with the technologies, and at least to be up to date to succeed. they cannot just stay with the traditional method even though its still possible. but, why not try the new way? here are some of revolution for them to improve their business in attracting customers: 
  • Collaboration Key - companies set up smart hubs that are not only used by their own customers, but also interact with other companies' sites 
  • Breaking Barriers - allowing constant updates of information related to inventory, product availability and shipping status 
  • Supercharged Kiosks - The customer could even purchase the TV directly from the kiosk for later deliver 
  • IM's New Role - instant messaging likely will be beefed up to handle everyday business processes 
  • Speeding Things Up - the real-time aspect of future e-commerce technologies will allow users to engage in "threaded discussions" as they negotiate contracts and share data 
  • On the Same Page 
  • Wireless e-commerce - also called mobile commerce or m-commerce


Online transactions can be monitored, recorded, and key logged by a variety of hackers and third parties without the knowledge or consent of the user and exchanging sensitive information without the appropriate encryption technology or security measures can make a computer user or identity particularly vulnerable.

The following list provides some tips on how to make sure your transaction is secure: 
  • Use the latest Internet browser. 
  • Look for digital certificates 
  • Read the privacy policy 
  • Only use one credit card for all of your online purchases
  • Never give out passwords or user ID information online unless you know who you are dealing with and why they need it. 
  • Keep records of all of your Internet transactions. After you've made purchases online, check your e-mail
  • Never sharing passwords with any other person

never forget these rules ok... =D

Wednesday, 11 April 2012


e-commerce is used to describe business that is conducted over the Internet using any of the applications that rely on e-mail, instant messaging, shopping carts, Web services, FTP, and EDI (electronic data interchange). 

E-commerce can be classified based on the type of participants in the transaction: 

  • Business to Business (B2B) : transactions are those where both the transacting parties are businesses, e.g., manufacturers
  • Business to Consumer (B2C) : When businesses sell electronically to end-consumers
  • Consumer to Consumer (C2C) :  transactions were virtually non-existent in recent times until the advent of ecommerce. e.g; lelong.com and mudah.my

below are the examples of e-commerce:

1) online shopping

2) electronic payment

3) online auction

4) internet banking

5) online ticketing

  • Overcome geographical limitations
  • Gain new customers with search engine visibility
  • Lower promotion costs
  • Locate the product quicker
  • Eliminate travel time and cost
  • Provide comparison shopping
  • Enable deals, bargains, coupons, and group buying
  • Provide abundant information

·         Lack of personal touch
·         Delays goods
·         Anyone can set up an ecommerce website
·         Low security measurement
·         Many goods cannot be purchased online
·         Does not allow you to experience the product before purchase

Wednesday, 4 April 2012


the examples of collaborative tools in e-learning are online forum, wikis, pod-casting and second life... wut are they? =)

Friday, 16 March 2012


is an Expansion of education over the Internet/web along with an Intensive use in organizational communication for Personal and organizational web pages. the reasons are to: 

—- Connecting people in workplaces and educational institutions 
- —Supplement for other communication channels 
—- Support for diverse interpersonal and group interactions and activities 
- —Development of online relationships


in being a good communicator, u have to practice these skills:

—- Understand the communication process 
- —Appreciate the strengths and weaknesses of different methods of communication 
- —Recognize which communication method to use in a range of work situation 
- —Describe the key stages in the communications process


1) Demonstrates reliability
2) Communicates constructively
3) Listens actively
4) Functions as an active participant
5) Shares openly and willingly:
6) Exhibits flexibility
7) Works as a problem-solver
8) Treats others in a respectful and supportive manner
9) Shows commitment to Forum (Group)

Saturday, 10 March 2012


nowadays, internet is a need for everyone. but did u know what can the net done to u?

 netiquette is etiquette while using the internet. we need to be careful and also behave while online as we are interacting and representing ourselves to the world. plus, there is no protection towards the information that u upload to not be manipulated by other person.people can judge and use the information available to judge and even worse, use them for their own good. beware... so, here are the guidelines for you to express good netiquette:

- avoid Criticism
- Pay Attention to Language Issues
- Think Before Posting
- Avoid Humor but you can use emoticons
- Reply Quickly
- Make sure you do not send secret emails to a group of recipients
- Keep Personal Information Private
- Obey Copyright Laws
- Be Aware of Cyber bullying
-Respect other participants 
- Respect people's time and bandwidth 
- Only post relevant items 
- Be forgiving 
- Represent yourself well 
- Be brief, precise, and clear 
- Be quick, and don't monopolize the chat

- View the internet as a novel, not a diary 
- Be careful what you advertise 
- Realize that you can't take it back

for the do's and don'ts while using the internet, u can refer the link below

internet security involves the protection of a computer's internet account and files from intrusion of an unknown user. Basically, security measures involve protection by well selected passwords, change of file permissions and back up of computer's data. do not create spam and threatening others. now, i will share some of the tips in creating a good password:

- Do not use your log in name. 
- Do not use your first, middle, or last name. 
- Do not use other information easily obtained; birth date, plate numbers, telephone numbers. 
- Do not use a password of all digits or all the same letter. 
- Do not use a password shorter than six characters. 
- Do use a password with mixed-case alphabetic. 
- Do use a password with non-alphabetic. 

Saturday, 3 March 2012


I'm new in this field of IT learning and perhaps together, our knowledge will increase. insyaallah =D. first and foremost, have u ever heard of ONLINE TERTIARY LEARNING or E-LEARNING of TERTIARY LEVEL? 

History : 

E-learning is introduced widely and is encouraged to be implemented in organisations and education. in 1996 the Multimedia Super Corridor and the privatisation of tertiary education was established by the previous prime minister, Datuk Seri Dr. Mahathir bin Mohamed when he introduced the Vision of 2020.

for more detail info on how the e-learning had been developed, please go to:

what is e-learning and its scope :
E-learning is commonly referred to the intentional use of networked information and communications technology in teaching and learning. They include online learning, virtual learning, distributed learning, network and web- based learning. it is a learning process that is facilitated and enhanced by using digital tools such as CD-Roms, video conferencing, websites, e-mail and many more, where the content and instruction is delivered electronically.
As the letter “e” in e-learning stands for the word “electronic”, e-learning would incorporate all educational activities that are carried out by individuals or groups working online or offline, and synchronously (real time reply. e.g chat) or asynchronously (different time reply. e.g email) via networked or stand alone computers and other electronic devices.

E-learning in Malaysia's institutions :
E-learning is already been used by UNIVERSITY PUTRA MALAYA (UPM), UNIVERSITY MALAYSIA SABAH (UMS), KOLEJ PROFESIONAL MARA (KPMIM) and many other institutions. The example of famous web application for producing and providing modular internet-based courses is MOODLE and learning management system (LMS). It is for making announcements, documents sharing, forum learning, tracks links, assessments giving, and many more additional functions.

and here is the first company that fully using e-learning in Malaysia,

Kenshido International Sdn Bhd
Wisma Kenshido, No 1-1, 1-2, 1-3,Jalan PJU 5/6, Dataran Sunway PJU 5,
47810 Kota Damansara, Petaling Jaya, Selangor Malaysia.

By widely using e-learning in Malaysia, our educational institutions can be well known in the eyes of the world to become people's choice for studying in advance level.