Friday, November 12, 2010

Why, how and what? By Thompson Rayner (12.11.2010)

Every person and organization on the planet knows what they do. Some know how they do it, but very few know WHY they do what they do. By WHY, we mean why does your organization exist at the first place? or Why do you get out of bed every morning?. Most individuals and companies are focused on the WHAT, i.e., what service they are providing, and not the WHY, i.e., why are they in business.

The Sinek’s Golden Circle Model

The Golden Circle of Simon Sinek begins with the why on the inside of the circle, moves to the how, and ends with the what. Apple, Inc. believes that they are here to challenge the status quo and to think differently (the WHY), using innovation and revolutionary thinking (HOW) in order to create the greatest technological products on the market (WHAT). Most companies create the what first. They create a great product first, then we as a consumer are supposed to buy it. As Sinek says, people who wear a Harley-Davidson tattoo emblazoned on their arm do not do so for the WHAT, i.e., not because Harleys ride that much better. They instead subscribe to the WHY, i.e., the lifestyle, the philosophy, the perspective celebrated by Harley-Davidson.

It is so obvious that in any person’s or organization’s life, everything seems goes right. However, as elaborated by Roshan Thiran on the Sinek’s golden circle model (the combination of WHY, HOW and WHAT) justified that, the process to learn your WHY is about going back and examining these times to find out what the patterns were so that they can be repeated. This is the reason learning WHY is always a process of discovery, not invention. Whether an individual or an organization, a WHY comes from the same place: the past. For individuals it is the sum total of a person’s upbringing and experiences. For organizations, it is born out of the very reason or purpose the organization was founded. In accomplishing the WHY, HOW are the ways, which is the value system, processes and structures, infrastructures, the talent in our organization and the eco-system created to support the WHY and finally, the WHAT which is the tangible ways in how we bring the WHY to reality.

Conclusion

The purpose, cause or belief is the WHY which driving motivation for action. The HOW are the specific actions that are taken to realize your WHY and the WHAT are the tangible ways in which you bring your WHY to life. Understanding and practicing “inside-out” instead of “outside-in” principle of Sinek golden circle model somehow will differentiate between successful and loosing individual or organization.

Reference

1. http://biz.Thestar.com.my/news

2. http://www.startwithwhy.com/What/TheBook.aspx

Friday, August 6, 2010

French watchdog warns of iPhone hacker glitch

French authorities and experts warned Thursday hackers could gain control of iPhones and other gadgets made by US tech giant Apple through the Internet, plundering users' data and tapping their calls.

"Two vulnerabilities have been discovered" in Apple's operating system for the iPhone, iPad tablet computer and iPod music player, the French government computer security agency CERTA said on its website.

Apple did not immediately respond when asked on Thursday to comment on the alert, which was issued by CERTA following a warning by experts at the computer security firm Vupen Securities. One of the soft spots is caused by a glitch triggered when a user views data in PDF-formatted documents, they said.

Hackers could lure web users on their Apple devices onto special websites where they could exploit the PDF glitch to gain access to the device remotely, Vupen's chief executive Chaouki Bekrar told AFP on Thursday.

A second soft spot involves a data error in one of the devices' components which could allow hackers to increase their control once they have gained access to the device, he said. The two glitches combined could allow a hacker "to access all of the information" on the device, including contacts, emails, documents and functions such as the camera, microphone and GPS navigation, CERTA said.

CERTA said the problems affected iPhones running versions 3.1.2 to 4.0.1 of Apple's operating system, iPads with versions 3.2 to 3.2.1 and iPod Touch devices with version 3.1.2 to 4.0.

"Pending corrective measures by Apple, great care is recommended while opening PDF files," for example by only opening files from known senders, the government watchdog warned. Apple devices "are generally very secure," but "are becoming a popular target for hackers," who could tap users' telephone conversations or send messages from their mailboxes, Bekrar said.

guys...this is the time to change to Android 2.1..... :)


Tuesday, August 3, 2010

The Most Dangerous Computer Viruses in History

Here are some of the most dangerous computer viruses in history..and i say it again "MOST DANGEROUS"






1) Jerusalem - 1987

This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University. The Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.

2) Morris (a.k.a. Internet Worm) - November 1988

This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions and it could pick user passwords.

3) Solar Sunrise - 1998

A decade later the situation didn't change, it might have gotten even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computers systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

4) Melissa - 1999

For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after it overloaded servers the virus led to unpredictable problems. For the first time it spread in the Usenet discussion group alt.sex.

Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.  Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida.

After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 or Outlook 98.

5) I Love You - May 2000

Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world in just one night. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty.

6) The Code Red worm - July 2001

This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT as well as Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at a total of $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

7) Nimda - 2001

Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having up to 5 different methods of infecting computers systems and duplicating itself.

8) Downadup - 2009

The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F-Secure stated that three of the most affected countries were China, Brazil and Russia.


9) Thompson Virus - 2010

Opssss....sorrrryy folks.. this virus not yet created!!


Sunday, August 1, 2010

Virtual Surgery



For your info "Virtual surgery" refers to a virtual reality simulation of surgical procedures. Such simulations are used to practice often dangerous surgical procedures without the need for an actual patient. Just to summaries things :


  • The virtual reality simulation is used as an analog for the actual surgery where doctors can practice on a virtual patient before performing the surgery.

  • Types of surgeries commonly simulated are laparoscopic surgery where the surgeon cannot physically see the operation being performed.

  • Virtual surgery uses a computer screen displaying a 3-dimensional graphic of the organs being operated on.

  • Various surgical tools or gloves are connected to motion sensors and haptic or tactile feedback mechanisms where the user can physically feel the difference in simulated tissue and organs.

  • The user can "perform surgery" upon the virtual organs by manipulating the tools, which are also displayed on the screen as the user moves them, and the tools also provide force-feedback and collision detection to indicate to the user when they are pushing on or moving some organs or tissue.

  • By inputting data from computerized tomography (CT) and magnetic resonance imaging (MRI) scans the patient can be replicated in the virtual environment.

  • The advantages of this type of simulation is surgeons can practice operations multiple times without the use of cadavers or animals. Surgery simulation would give an objective evaluation of a surgeon dexterity combined with a more intensive training activity.

  • Virtually trained students may be more proficient and make fewer errors, and would thus be better prepared to assist during surgery.
The first virtual surgery (where actual surgery followed the virtual practise) was performed on 17 August 2009 when Dr David Clarke in Halifax, Nova Scotia removed a brain tumour 24 hours after removing a simulated tumour.

Whatever it is guys..this is how IT really help making our life better..and what a wonderfull world we live in :)

Wednesday, July 21, 2010

Chapter 4: Networks and Collaboration as Business Solutions

You will meet with Chao Zhang tomorrow to learn about the wireless capabilities currently in place at the café, current communication problems with the restaurant’s 24/7 operations, and to discuss the feasibility of adding some new collaboration capabilities for customers, employees and suppliers.

Here the situation : The Employee Login link provides access to the Wireless Café’s intranet. Explore this portal from the perspective of an employee. What functionality would be useful to view on your mobile phone? Describe some functionality and a business reason to add it!!

Monday, July 19, 2010

Using Information Technology to Achieve Better Health : Healthymagination

Using Information Technology to Achieve Better Health : Healthymagination

Wednesday, July 14, 2010

"CLONAL PLANTING MATERIALS : THE WAY FORWARD"

Have you guys ever heard about "Clonal Palm"?? ..no idea!!..well let me share with you guys the story of this wonderfull..superior plant known as "clonal planting materials" and guess what..this is actually the future oil palm planting materials in Malaysia. This superior oil palm (Kelapa Sawit) produced using the latest technology in biology...or people may call it "Biotechnology". As what we all know, ordinary oil palm (most all plants) germinated via seed but somehow this particular palm "given life" from active and developping plant cell..usually taken from young oil palm leaf or my nenek used to call it..."umbut".....To illustrate the delicate process, attached herewith the simplified process...for sharing purpose :)

Usually..from (a) to (f) will take 2-3 years to complete the process (Production cycle) and can be harvested after 2-3 years after field planting...and u might ask...what for...all this?? ha ha ha..interested to know...please come visit my laboratoy in Tawau for cup of coffee or tea and i will share all the wonderfull things about this "Clonal Palm" :)

Tuesday, July 13, 2010

WORKING HARD FOR LIVING!

Work Hard..Work hard and stop sleeping, Work hard and stop robbing, .Work hard to see the perfect liberation, Work hard to see that you are more than human, ...Work hard to see that house, Work hard to see that you are the man, Work hard and move on hard, Work hard the world still in motion, Work hard to the official thought, Work hard with agile and deft, No time for saying that you had enough,Work hard,and this I'm telling you...

Monday, July 12, 2010

Personally Speaking-The Journey of Entrepreneur!!

We've heard the phrase "You can always quit anytime, so why quit now?" somehow it can be reversed to "You can start anytime, so why not start now?" and again we feel that the time is always ripe for anyone to chase their dream, as long as they put their mind to it.

According to Johnson Kho and Chia sheng Yeong (Young Entrepreneur Winner), the journey of an entrepreneur is not always a gloriuous, luxurious and confortable as the media..the movie..paints it to be. It's actually an uphill battle especially in the early stages. The most important lesson for us to know is that to remain focused on our goal and not allowing ourselves to stagnate due to the fear of commiting mistakes.

Whenever we see that we're running towards a brick wall, our brain will instinctively tell us to stop, think and find alternative routes around it. Often when we stop to think, the wall seems to get bigger and bigger, however if we just keep on running, perhaps we will find that there is enough gaps and holes for us to leverage on, enabling us to climb over it.!!

A wise man once said "Let it be said that there were not enough opportunities, but let it not be said that you didn't respond when opportunity came knocking on your door" and my friend, lets take the first step and embark on this journey together to become....Entrepreneur :)

SHOCKING!! Hidden Message In 2010 World Cup Logo !!

People talking...."If u study the logo carefully, it depicts a black man kicking the circle world cup and it is actually an eagle symbolizing the whites out of africa (the background) behind the man. If u also check properly, u will see that the eagle is not too happy to be shown the door and it's position in the logo world cup is clearly off tangent with the rest of the drawing depicts been thrown out or since it's a circle, been KICKED OUT. Now, if this is not a display of pure and unadulterated racism in the midst of an important international event, i wonder what is!!! but heyy....its just a perception anywhere!!