Feeds:
Posts
Comments

Archive for February, 2007

ISDM – review

Michael Hammer
(how to overcome structure inertia problem)
Reengineering triggers changes of many kinds, not just of the business process itself. Job designs, organizational structures, management systems – anything associated with the process must be refashioned in an integrated manner.
Mutual Benefit Life – case manager. (Making a new job position)
Reengineering – notion of discontinuous thinking of recognizing and breaking away from the outdated rules and assumptions that underlie operations.
Reengineering requires looking at the fundamental processes of the business from a cross-functional perspective.

Why did we design inefficient processes? In a way, we didn’t. many of our procedures were not designed at all; they just happened.

What benefits of ICT innovation:
1. increased in productivity and efficiency, cutting down middle management (massive data loads transaction, computerization, may gain cost leadership (Porter’s value chain))
2. improved management and decision making (the use of CSCW – computer supported collaborative work), by the troubleshooting company; to use computer to collaborate ideas and share the accumulated knowledge on reported cases. 替换旧方式 – based on experience ( personal ) tacit knowledge to troubleshoot (rely on good engineering knowledge)
3. enhanced business competitiveness (porter’s five force model)
4. new business products and services
5. improved work arrangements and new possibilities in delivering public services (e-government)

– However, investment in IT may not lead to increased productivity (productivity paradox, lag between investment in IT and the occurrence of the results, mismanagement, misuse of IS resources) but It may maintain or increase its competitiveness or create surplus value to customers.
– Implementation of IT may not caused business to success, should considered as a significant factor for competitive advantage, rather than the cause of it.
– Organisational change:
1. planned change – michael porter’s five force (value chain) model
2. planned radical change – BPR (Michael Hammer)
3. emergent, situated change – Ciborra, Orlikowski: perceive change as ongoing and emergent, requiring continuous management.
Organizations should expects changes to happen as their employees learn how to exploit the potential of new technologies.

System Development:
– Involves the development of various other technical components and the design of organizational changes. Organizational identification problems using SSM (Soft System Method – Peter Checkland, system thinking, system practice)
– SSM is on of the most successful efforts to systematize the investigation of systems which are not amendable to structured, mathematically defined behaviour such as human organizations.
1. SSM addresses vague problematic situations, rather than well defined “problems”
2. SSM guides analyst to consider the different points of view.
3. It suggest the analyst to search for theories relevant to the problem situation in order to design an appropriate human activity model.
4. SSM aims at reaching decisions for actions, which are systematically desirable and organizationally feasible, SSM may lead to decisions about organizational change rather or in addition to the development of an information system.

3 Different development model:

1. SDLC (system development life cycle)
– problem identification
– preliminary information requirement analysis
– feasibility study
– system analysis
– system design + programming
– implementation
– maintenance : adaptive, corrective, perfective
– evaluation ( have some concern on political (very much subjective and political (Markus).
Main advantage: simplicity, easy to understand, teach and adapt as a standard practice.
Disadvantage:
– SDLC is based on the assumption that there’s a clear specification of the system to be developed. However, organization may have very vague and often conflicting views about developing information systems.
– In many projects, the time between writing the initial spec and of the system implementation is long enough for the system to be obsolete the very first day it becomes operational.
– SDLC determines dysfunctional relationship between the system development expert and or the organization’s participant, as the latter unable to define accurate and comprehensive specs for the system they need.

2. Evolutionary model:
Assumes that IS are always changing and therefore requires continuous development, required characteristic of the system are expected to be discovered in an iterative process of development and use. Suitable for systems that are small and contain innovative elements which can’t be clearly prescribed from the beginning (eg: 4GL language)

3. Prototyping model:
Appear to provide an alternative and more flexible way of developing systems, usually accommodated within the life cycle to overcome in some cases some of its most severe rigidities. Used very frequently within SDLC to help determine requirements and overcome some of the rigidities of the model.

Approaches of Information Systems:
1. systems approach – engineering process
2. socio – technical approach (formal approach) – development process is an intervention in an organisation’s affairs (Markus and lynn)

– understand whether the development process deals primarily with the construction of a technical product or with socio – organizational changes.
– Avison + Wood Harper’s “Meta-methodology”, Multiview, claims to assist system developers to decide how the need to combine engineering methods with socio-tech analysis methods can be achieved.
– Engineering approach:
1. rigid in nature, exact, reliable, systematic.
– Socio-technical approach:
1. recognized the importance of user participation (Enid Mumford!!!!!)
2. user as a rich source of valuable information, because they have tacit knowledge of how task are being performed (daily)
3. participative decisions about new IS create commitment and acceptance of change.
– system developer able to setup fruitful collaboration
– management are able to overcome the problem of resistance.
– employees have a say and remain in control of their means of work
Disadv:
– slowdown development process
– conflicting views expressed by different user groups.

Training of ppl for their new information handling tasks is one of the most crucial factors for the success of the new system. People must feel confident about the system and satisfied with their changed work environment. so the evidence that possibility of introducing technology efficiently is significantly enhanced if the workforce at all levels has a high level of education and training.

The organization which invest in an educated workforce and ensures that education and training is continuous has advantage – in terms of adopting change – over the organizations which sees technology as an opportunity for employing a workforce with reduced skills. – C.Avgerou

Functionalistic – served as a best practice, any IS expert expected to master this standard practices. to be able to achieve organizations and rational choice.
Interpretive – the organisation’s objective mission may be vary according to people’s interpretation. (very subjective)
e.g:: what is Quality?
– Durability (Sales person P.O.V)
– Zero defects (Manufacturing P.O.V)
– Value of services encompassing a core product (marketing/cust service P.O.V)
– Situated change environment
Critical – complex forces + social processes. Not simply putting “best practices” at face value, point out that a course of action within the organization may not go according to plan as people don’t see it as desirable to their own purposes.
Intro to IS may not be seen as a tech innovation that brings out desired benefits if the participant don’t see it in the same light. IS innovation involves – power relations.

Development including:
Model: SDLC, Evolutionary, Prototype
Approach: Socio-tech, system (formal), Ad-hoc (organizational)
Methods: SSM, Implementation methods.

What is prototyping?
– explanatory – to clarify idea or features of the system
– experimental – to test new aspects of the sytem
– incremental – to build a system
Approach? How to tackle a problem

Job enlargement, rotation, enrichment, redesign, satisfaction, task structuring, multiskilling – Abraham Maslow, Frederick Herzberg.
Peter checkland – Systems thinking, systems practice.
Management of IS – CSF

DP – Nolan’s 4 stage model, identify the organisation’s level of maturity in this context, in identifying the key issues associated with further IT development. Nolan posited that the growth path could be identified primarily by analyzing the amount spent on DP (Data Processing) as a proportion of sales revenue. Thus postulating that the DP expenditure would follow a S-curve over time. The S-curve appeared to represent the learning path with respect to general use of IT within the organization.

6 stage – initiation, contagion, control, integration, data admin, maturity.
Earl – extending the single learning curve stage to number of learning curves.

Read Full Post »

big booom banngg!!!!

What actually happens when you’re typing any website into your destination URL (uniform resource locator)?

We use the internet as frequent as ever before, and we’re all take the technology for granted. Well, simply being ignorant isn’t helpful at all.. So I decided to borrow another webserver concept and application book from library yesterday, I briefly looked into its content and it’s pretty much in depth with some exercise question embedded on each chapter. Overall speaking, this book talks about the general picture of how things are being done, and advise its user with some of their own summary report about OS, hrdware, which software to choose, comparison between, and provides much greater scope for broad range of users. (Enterprises, individuals, small business etc.)

I have a sad feeling about how I waste my time gaming, often expect it as my leisure time, but perhaps I should decrease the amount of time doing some research, other useful stuff. Btw I bought the daily planner and hoping for better management of my time and such, and I found it a little bit useful when it comes to reminding stuff.. however as the proverb says that it’s easier said than done, I also found that it’s relatively easy to plan our schedule rather to actually realizing it.

Ok so I’ll mention about the discussion regarding the important steps of how webbies and its related component works. So I read the first chapter of the book, mentioning about types of web server content, mostly HTML form, so when we’re type the address in the destination URL, the web browser will do 2 things, resolving the DNS to a recognizable unique IP address (it usually listed in the DNS server, so each ISP has at least 2 DNS server yo, to put lots of IPs and DNS address..), and send the request line to the destination web server, containing its line, header section, entity body. Btw the server also responds to the request in a similar fashion yo!~ status line, header sect, entity body. This is how the server admin knows what users are using; which type of browser, resolution type, what OS, etc, and regarding visitor types, maybe the server have somekind of caching memory that truly identify which IP is a frequent comers or is it a new IP coming to the site. So complicated…

So the domain address of http://www.exeqzalie.blogspot.com using a HTTP protocol to communicate with the server, its default port is 80, but one can actually change to other un-reserved port such as exeqzalie.owns.it, I’m using port number 1337 because it’s just simply 1337. that’s it. The PHP is a server side scripting language, and it’s more useful if your website is a database in a pre-defined role, less dynamic, although one can actually script php into a such powerful page that contains lots of dynamic objects. (but not as powerful as flash pages imo).

When we’re first connecting to the internet through an ISP, the ISP will then automatically assign an unused IP address for us (they have a DHCP idk what’s the acro but I’ll figure it out later). So it’s not a good idea to become a web server when the IP address is not static shit. Constantly updating the IP address to conform with the domain name is tiring and.. suck..

After the server response is initiated, the server will then upload the request data to the client browser, however, for parents who don’t want to let their child to visit “pr0n” websites, they can actually use proxy server. (or VPN virtual private nethwerk for cooler terms). The VPN provides filtering, security, and caching. OH right… talking about the VPN, last I met world of warcraft Singaporean player in game, I was playing BG and coincidentally met this person, talked abit about the current lvling progress, and I offered him my gold when we decided to share our Skype acc.. and he said he’s kinda interested but because of so much money involved, he said that he’ll think about it later. The recent price for gold is indeed higher compared to olden days before Burning Crusade, and uh.. I also asked him about his current occupation, whether he’s still studying or what.. and he said that he owns a VPN service company, mainly for china mainland players, who have somewhat popular reputation of being a gold farmer, not digger, unfortunately… (btw you can call me gold farmer, I don’t mind.. but the main difference is that I’m selling gold for fun, extra money in my pocket, not an official occupation imho!!!) But it is not really true that all mainland players are all farmers. Some of players are extremely hardcore and very much dedicated to the overall gaming experience. Having said that, perhaps they’re too hardcore and such having a great amount of resources in hand makes Blizzard suspicious about them and worst, deemed em’ as a normal gold farmer, hence violating the blah blah blah misconduct and hurdling the economic stability blah blah bunch of unreasonable stuff.

So it raises the demand for VPN service to most of the Chinese mainland players who still wanted to play at the original US server for various reasons. So the very concept behind it is to use the mask layer to cover original IP address identity so that the server will virtually recognize that the player is playing in Singapore, virtually. It’s very much the same concept as privax, a virtual proxy that I’ve mentioned in the previous blog. So this realizes me of how good Singapore’s reputation as a small country in the stage of global world.

Instead of connecting directly to the destination server, when a request for a URL is made, the browser sends the request to the proxy server, the proxy will then passes the request to the destination server, receive the response, and passes the response back to the user. I’ve seen this as a good prospect of business for Indonesian e-commerce frequent user. The fact that most online credit card transaction made from Indonesian IP has been repeatedly fraudulent, almost all webbys don’t accept trans. Request from Indonesian cc thoroughly.. unless the reputation is getting better soon, I can see the business prospect of this service is going to be high yo!

So what if you connect to the youtube or making an online e-commerce transaction that needs somewhat confidentiality? For a browser to play an audio or video file, it must first download the entire file, so it’ll prolly took hours of downloading, precious time wasted for waiting it to finish.. however, the concept of streaming media overcomes this problem. It allows media player to start playing while data is still being received. The srver is alos provided specially to process the buffer query, apart from the HTTP server itself. The client browser, on the other hand, needs an additional plug-in in order for media player to be played. Plugin-EG: java E applet, flash, quicktime, adobe pdf reader, etc.

More likely that streaming media player uses UDP netwerk protocol instead of TCP/IP, because its speed quality, while TCP/IP offers reliability and it is somewhat slower compared to UDP. UPD (user datagram proto) is good at transmitting very small pieces of data quickly, and unlike TCP/IP, UDP will not retransmit the data if there’s an error. This is fine for digital audio and video coz’ a few bits of lost here and there will hardly noticeable.

Global registrar for top lvl domains: http://www.networksolutions.com

freeDNS: soa.granitecanyon.com

haha.. just now I met a bunch of Chinese youngsters buying some ice cream, they looked at me and whispered, “can you speak Chinese?” and I replied, “hui a” after that they’re all look surprised and somewhat happy.. haha.. they said they’re just came here bout 4 days.. taking part of some exchange school programme eh? Idk…

BG colour : #BD8CC6

Read Full Post »

AGes

Ages.

This word reminds me of something in my server, an infamous guild consisting lots of 1337 people who proud of themselves about their achievement in the virtual world of warcraft… Eventually the guild was broken into 2 parts, making gap between those who’re really hardcore and those who aren’t. The hardcore members form their own guild, so called Insomnia, and the number of casual players left the guild dwindled or perhaps some assimilate to other guilds as time goes on. Their goal is to conquer all the high content dungeons and become server’s first. Now that the expansion is already took place, the previous tier equipment becomes obsolete, now people are wondering why the hell are the greens and blues (superior items) are much more easy to get and yet somewhat makes the epic equipment inferior. The reason to add some new expansion content and more items in game overcomes the problem of how to get and lure more people to play the game. I do personally feel that the time I devoted last year to get these epic equipments is totally wasted…I do feel like this MMO is nothing but an endless game.

Read Full Post »

happy birthday ciliangg!

happy birthday yoooooooo!! hehe

Read Full Post »

TCP/IP layer

7
Application
HTTP, SMTP, SNMP, FTP, Telnet, ECHO, SIP, SSH, NFS, RTSP, XMPP, Whois, ENRP
6
Presentation
XDR, ASN.1, SMB, AFP, NCP
5
Session
ASAP, TLS, SSL, ISO 8327 / CCITT X.225, RPC, NetBIOS, ASP
4
Transport
TCP, UDP, RTP, SCTP, SPX, ATP, IL
3
Network
IP, ICMP, IGMP, IPX, OSPF, RIP, IGRP, EIGRP, ARP, RARP, X.25
2
Data Link
Ethernet, Token ring, HDLC, Frame relay, ISDN, ATM, 802.11 WiFi, FDDI, PPP
1
Physical
10BASE-T, 100BASE-T, 1000BASE-T, SONET/SDH, G.709, T-carrier/E-carrier, various 802.11 physical layers

Read Full Post »

as charging goes slowly..

ok.. while i’m waiting for my HP charger.. time for blog abit.. err.. so today i was working with one of the worker who has somewhat – blood relation with my supervisor.. she seems fine to me, and since the crowd wasn’t very much there, we ended up slacking the whole time.. i’m reading my own notes (tml we have networking test omg!! i have so much confidence but in the end – not too sure … zero.. blank.. ).. the tacit knowledge acquired from reading some internet articles isn’t enough to fulfill the exam requirement.. well.. i don’t have much time left reading the thick study guides now though.. omg gtg to bed soon…. i’m giving tuition tml!! 😀

Read Full Post »