Wednesday, 15 August 2012

Group Work 7


Question 1: Assume you are the manager of a retail store and need to hire a CIO to run your new computer system. What characteristics would you want in a new CIO?

The characteristics are:

1.       Have a background with significant management experience in non-IT business functions.

2.       Exploit the opportunities to have informal interactions with other business executives.

3.       Know the company's business strategy and learn what drives value.

4.       Know and clear about their role and have formal objectives -- and yet they also have "a greater appetite for risk" to achieve business goals.

5.       Must allocate more time to talent development than to any other activity.

6.       Must learn about company operations in preparation for broader, non-IT opportunities.

Question 2: What are the advantages of using virtual organizational structure? What are the disadvantages?

Advantages:

•        This structure leads to more autonomy as employees can choose and manage their own personal infrastructure and expenses.

•        It also leads to more meritocracy as personal infrastructure is separated from a hierarchical position in the formal organizational structure.

•        This leads to a better decentralization-centralization balance, as employees can make their own decisions on selection and acquiring of the personal infrastructure and other personal expenses, whilst the company can have a very efficient corporate infrastructure.

•        This speeds up the process and reduces the cost of approving requests for and acquiring of personal infrastructure.

•        Cost savings are achieved by improving the efficiency of the corporate infrastructure and allowing greater flexibility with their personal infrastructure and business expenses.

Disadvantages:

•        The managing infrastructure produces diseconomies in the Knowledge Age.

•        The practice of controlling personal technology has resulted in high costs and high employee frustration in most large organizations

•        Infrastructure related decision are usually based more on status rather than on expertise or the needs of those who have to work with it.

•        This structure leads to over-controlling the use of personal technologies.  This is both frustrating to employees and expensive for employers.

•        Standard expense management. Individuals are largely incented to spend up to their budget (and negotiate for continually higher budgets).

References
Vlatka Hlupic (2012) Using "Traditionally Virtual" organizational structure
Available from: http://www.managementexchange.com/hack/using-traditionally-virtual-organizational-structure, [Accessed on 25th June 2012]

Group Work 6

Question 1: Form a team to identify the public locations (such as an airport, public library, or café) in your area where wireless LAN connections are available. Visit at least two locations and write a brief paragraph discussing your experience at each location trying to connect to the Internet.

The first location that we want to discuss is the cafe named Coffee Bean & Tea Leaf. It has many branches in Brunei Darussalam. The one that I am going to discuss located at Brunei Capital District, Bandar Seri Begawan along the Jalan Sultan. Once we try to access the internet, we notice that there are Wireless LAN connections available with a password protected. So we ask the staff about the WIFI password. Later, we are able to access through the WIFI.  The WIFI required our IP address just in case for security.  For a few second, we are already able to access through the internet. The connection is about 5mbps which is the fastest and expensive package in Brunei named ESPEED.

Second location is Twelve Cafe at Kiulap, Brunei Muara. It is a really high standard restaurant. This café also has WIRELESS LAN connection. The staff didn’t tell us that one password is for one user where is is very high level in security.  I did realize that when sharing the WIFI password, the other cannot use it again.  The connection was only 3.5mbps. The router was so strong as user can reach the WIFI signal outside the café.

In conclusion, the Wireless connection at the first location was very fast compared to second location. But wireless connection at was very secure when compare to first location.

Question 2: Do a research on the Web on wireless communications standards for MAN’s often called WiMAX. What is it current status of the various standards and what are the current major issues? Write a short report on what you found.

WiMAX, which stands for Worldwide Interoperability for Microwave Access is a next generation open standard that seeks to serve users' increasing demands for high data throughput (broadband) services such as streaming media on the internet, live video conferencing, and mobile TV on computers as well as handsets and PDAs.

WiMAX is considered as one of the most promising 4G technologies, an IP based core network which is an open system suitable for Greenfield operators and has been deployed world over. Industry analysts judge that the spectrum allocation for WiMAX is easy and cheaper than the existing 3G technologies.
 
Some existing facts:
•         According to WiMAX forum there are 430 million people or Points-of-Presence (POPs) globally, and are on a path to nearly double to 800 million people by the end of 2010, suggesting that there is significant potential for WiMAX to transform wireless broadband communications
•         Revenue from mobile games (from 10,485m in 2009 to 17,593m in 2009) and sports (7,873m in 2009 to 9,498m in 2011) in particular is forecasted to grow significantly. This is an opportunity for WiMAX incumbents as it will allow them to create a market and achieve customer lock-in, creating a challenge to 3G/HSPA.

Major wireless service providers are already planning to roll out WiMAX, and Intel is enabling mass market adoption of WiMAX in notebooks and other mobile Internet devices similar to the way it enabled Wi-Fi in notebooks. WiMAX is a global, standards-based technology that is being adopted and deployed in many countries around the world. For example, Clear* began deploying WiMAX services in the U.S. in 2008, and over 100 carriers are currently trialing Mobile WiMAX around the world.

Authentication
A fundamental principle in 802.16 networks is that each subscriber station (SS) must have a X.509 certificate that will uniquely identify the subscriber. The use of X.509 certificates makes it difficult for an attacker to spoof the identity of legitimate subscribers, providing ample protection against theft of service. A fundamental flaw in the authentication mechanism used by WiMAX's privacy and key management (PKM) protocol is the lack of base station (BS) or service provider authentication. This makes WiMAX networks susceptible to man-in-the-middle attacks, exposing subscribers to various confidentiality and availability attacks. The 802.16e amendment added support for the Extensible Authentication Protocol (EAP) to WiMAX networks. Support for EAP protocols is currently optional for service providers.

Encryption
With the 802.16e amendment, support for the AES cipher is available, providing strong support for confidentiality of data traffic. Like the 802.11 specification, management frames are not encrypted, allowing an attacker to collect information about subscribers in the area and other potentially sensitive network characteristics.

Availability
WiMAX deployments will use licensed RF spectrum, giving them some measure of protection from unintentional interference. It is reasonably simple, however, for an attacker to use readily available tools to jam the spectrum for all planned WiMAX deployments. In addition to physical layer denial of service attacks, an attacker can use legacy management frames to forcibly disconnect legitimate stations. This is similar to the deauthenticate flood attacks used against 802.11 networks.

WiMAX Threats
Despite good intentions for WiMAX security, there are several potential attacks open to adversaries, including:

  • Rogue Base Stations
  • DoS Attacks
  • Man-in-the-Middle Attacks
  • Network manipulation with spoofed management frames

The real test of WiMAX security will come when providers begin wide-scale network deployments, and researchers and attackers have access to commodity CPE equipment. Other attacks including WiMAX protocol fuzzing may enable attackers to further manipulate BSs or SSs. Until then, the security of WiMAX is limited to speculation.
Reference:

Gaddi Blumrosen (2009) The Future of Things
Available from: http://thefutureofthings.com/articles/6361/the-future-of-wimax.html, [Accessed on 20th June 2012]

Priyesh (2010) WIMAX and its future Available from: http://4gwirelessjobs.com/articles/article-detail.php?WiMAX-and-its-future-&Arid=MTE3&Auid=NjI=, [Accessed on 20th June 2012]

Joshua Wright (2006) WIMAX security issuesAvailable from: http://www.networkworld.com/columnists/2006/121106-wireless-security.html, [Accessed on 20th June 2012]

Group Work 5

Question 1: How did Google’s stance provide the company with an advantage over its competition?

Google maintains huge databases filled with information on billions of Web sites. Google also maintains databases of search statistics that can be mined to learn about user interests and general search trends. Google and the other search companies also maintain private detailed information that includes the specific searches made by specific IP addresses. IP addresses can be connected to actual users through information provided by Internet service providers. All of the statements above are the commonly used in a company.

Question 2: What risk did Google take in not initially complying with government request?

In the global war on terror, and with government efforts to find terrorists, many businesses have been placed in that exact position. The United States Patriot Act provides the US government with wide-reaching authority to request information from businesses regarding the activities of suspected terrorists. Privacy advocates are working to limit that reach. In 2006, the Web search Company Google found itself stuck between corporation with US government requests for information and its commitment to preserving its user’s privacy. Its refusal to release database records to the federal government landed Google in Court.

Question 3: Do you feel Google was supporting or obstructing justice in its refusal to give up private information to its government? Why?

Google is multinational publicly traded organization built around company which popular search, cloud computing, advertising technologies and Web app, browser and operating system development. Google was chosen for its resemblance to the word googol a number consisting of a numeral one followed by a hundred zeroes as a reference to the vast amount of information in the world. Google's stated the mission is "to organize the world's information and make it universally accessible and useful." This mission and the means used to accomplish it have raised concerns among the company's critics.

While competitors are targeting the individual applications Google has deployed, Google is building a massive, general purpose computing platform for web-scale programming. Criticism of Google includes possible misuse and manipulation of search results, its use of others' intellectual property, concerns that its compilation of data may violate people's privacy, censorship of search results and content, and the energy consumption of its servers as well as concerns over traditional business issues such as antitrust, monopoly, and restraint of trade.

Therefore in my opinion, Google was supporting and obstructing justice because they have a lot of user includes us that we used every time when we doing research. Google and the other search companies also maintain private detailed information that includes the specific searches. The customer put a lot of trust on them. If the government knows all about this, our privacy will not save the government will knows everything our details. They won’t to give the privacy information to the government, but the government has the rights to get the information from Google. By getting information from Google it can help the government to find the terrorist or criminals by using IP addresses.

In conclusion, it is better that Google won’t give any information to the government because if it happen some companies will give the information to the government but with condition the government have to pay the information that the companies give and it will make some profit for that companies. Well, if this happen the customer will not trust to keep their information to Google because they can’t keep the private information.

References

Margaret Rouse (2011) Google
Available from: http://searchcio-midmarket.techtarget.com/definition/Google, [Accessed on 22nd June 2012]

Question 4: Should government have the right to force a legitimate business to take an action that might damage its relationship with its customers? What does this imply about the action of the government and support of its citizens?

The U.S government with all due respect is trying their best to handle the global war on terror and so far doing a good job at it. Although, sometimes people tend to use extra force, more than they should be using. In this case, although the government is trying to tackle the problem but certain policies such as customers’ privacy should be kept that way; private.

The government has no rights to force a legitimate business to breach their “contract” with their customers. This, not only can jeopardize the relationship between the business and the customer, but can also cause Google to lose their customers or worst get sued for breaking the customers’ privacy.

This action shows that the government is doing all within their power to stop terror, and to avoid the same incident from happening again. Even if they get support from their citizens, majority of them will probably still want their privacy thus disallowing the government to proceed with their intentions.

Group Work 3


Answers for Section B: Case Studies of Group Work 3

Question 1: What benefits has DreamWorks enjoyed since migrating to open-source systems?

There are many benefits to DreamWorks since migrating from the SGI running the UNIX operating systems to open-source system. The benefits are as follow:-
  •    DreamWorks produced movie on a system that cost half as much and was four times as powerful as the SGI/UNIX system
  • DreamWorks has steadily transformed itself into a complete user of open-source software.
  • After DreamWorks ported its production software to Linux, A service-oriented architecture, commonly known as SOA, defines the use of software services to support the requirements of software users. In an SOA environment, nodes on a network make resources available to network users as independent services that the participants access in a standardized way.
  • Linux provides the API and tools to make service-oriented architecture (SOA) easy to develop.
  • It also built a new services-based copyright application that provides authorization and authentication for incoming feature film scripts.
  • Having a Linux operating environment and HP Linux servers in racks saves critical data center space.  Data center space is extremely valuable. Not only has the move to open source freed space, but it’s provided a more transparent and modular system architecture that is easy to build on and maintain.
By conclusion of the new system, it does not only give benefits to the DreamWorks itself, but also for the customers and also their workers. The open-source system are capable to provide the world with the standardized way of life.

Question 2: What price did DreamWorks have to pay for adopting systems that were not standard to the motion picture animation industry?

Although using the new system seems to work even better and more sufficient for DreamWorks, they did however face certain drawbacks from it. Some of them are in terms of cost, finding the right software and converting the old software to the new one.

The cost of the new system cost half as much as the previous system. Despite that, DreamWorks were able to produce the animation Shrek, in 2001. The new system was worth the money though; because it was four times more powerful and gave DreamWorks a lot more advantage.

Although the company faced a big challenge which is trying to find the special software required for motion picture animation and production to run the Linux platform. While working with third-party software partners and HP, DreamWorks has been translating, or converting, its software from its old SGI/UNIX system to Linux. This is no small task considering that its in-house animation software includes millions of lines of code.

Question 3: Why do you think the SGI special-purpose systems that DreamWorks formerly used were so much expensive than the Intel/Linux systems it uses now?

The reason is SGI special-purpose systems have high-end graphics software and other specialized systems where as the Intel/Linux systems has the open-source operating system and cost half as much and was four times as powerful as the SGI system.

Question 4: How has open-source SOA system provided DreamWorks with a unique edge over its competition?

Open-source means that you can get the source code of the software for free (source code is the code of the program written in a certain programming language). Operating system is the software that you use to operate your PC (like Windows or Linux). Operating system can be any Linux or UNIX flavor, but important thing is File system. ZFS is best suited for storage, so snapshot, writable clone and replication is free. Most of the storage company used to charge too much money as snapshop/clone and replication license.

ZFS is very simple and convenient. You can use any operating system under VMware or Virtual box that support ZFS so you can manage your logical devices on top of physical devices. You don't need to purchase any hardware or software to manage your storage.

After DreamWorks ported its production software to Linux, it focused on its business applications. Recently, DreamWorks replaced a dozen of its core legacy application with custom designed software using service oriented architecture. Service oriented architecture, commonly known as SOA, defines the use of software services to support the requirements of software user. In an SOA environment, nodes on a network make resources available to network users as independent services that the participants access in standardized way.

The system that DreamWorks updated using SOA include tasks such as tracking copyright, accessing human resources data and pulling information from back-end ERP systems. Linux provides the API and tools to make SOA easy to develop. Developers also used the JBoss Enterprise Middleware software Suite for software development. JBoss is a global leader in open-source middleware software and provides the industry’s leading services and tools to transform business to SOA. DreamWorks used these tools to develop a new service that authenticates employee roles and responsibilities against company directories to provide access to applications. It also built new services based copyright application that provides authorization and authentication for incoming feature film scripts.

References
Answers Corporation (2012) What is an open-source operating system?
Available from: http://wiki.answers.com/Q/What_is_an_open-source_operating_system#ixzz1hJXhuoSJ, [Accessed on 5th June 2012]





Tuesday, 26 June 2012

Group Work 9


Question 1: Use any known conventional work-motivation theories:

i) The motivation problems of Group A. Your answer should indicate which theory you are using.

By looking on Douglas McGregor theories, this group belongs to theory X. This is because:

  • Work for a simple lifestyle and satisfaction of basic needs.
  • They have poor attendance records.
  • Exert the minimum effort and don’t show any initiative in doing work.

Question 1: The motivation problems of Group B, Your answer should indicate which theory you are using.

ii) The motivation problems of Group B. Your answer should indicate which theory you are using.

By looking on Douglas McGregor theories, this group belongs to theory Y. This is because:
  • Have no hesitation in leaving the company, they want to be interested in their work and, under the right conditions they can enjoy it.
  • Prepared to job-hop to find the ideal job.
  • Dislike routine tasks.

Question 1: Suggest a number of workable solutions to deal with the motivation problems identified in Part a(i) above.

iii) The solutions:-

  • Responsibility. Give them important projects to handle. Have more trust to the workers. This will make them feel appreciated.
  • Give them something to look forward to. For example, a prize for the person who is punctual. Or, cut their paycheck every time they are late.
  • Motivate the workers by for example; including them in important meetings, include them or make them team leader for projects, or increasing their salary when their work improves. Basically this will motivate the workers.


Question 1: Suggest a number of workable solutions to deal with the motivation problems identified in Part a(ii) above.

iv) The solutions:-

  • Increase self-esteem, by stick to one job to gain more experiences and challenges.
  • Conduct  motivational talk to increase the enthusiasm and confidents for the group.
  • Give advices about responsibilities and facts about facing the challenges for the better good    that will be given in the future.
  • Give practical activities how to adapt routine tasks that are comfortable for them.

Sunday, 27 May 2012


Answers for Section B: Discussion Questions Group Work 2

Questions:
  1.  Imagine that you are the business manager for your university. What type of computer would you recommend for broad deployment in the university’s computer labs – a standard desktop personal computer or a thin client? Why?
  2. What is a dual-core processor? What advantages does it offer its user?
  3. Describe how you would select the best DVD burner to meet your needs.
  4. If cost were not an issue, describe the characteristics of your ideal computer. What would you use it for? Would you choose a handheld, portable, desktop, or workstation computer? Why?
  5. Your company’s marketing department plans to acquire 150 new computers and monitors, plus several new printers. The marketing vice president has asked you to lead a three-person project team assigned to define user computer hardware needs. Who else (role, department) would you select to be a member of the team? How would you go about defining users’ needs? Do you think that one hardware configuration (computer, monitor, and printer) will meet everyone’s needs? Should you define multiple configuration s based on the needs of various classes of end user? What business justification can you define to substantiate this expenditure of roughly $300,000?

Answers:
Question 1's Answer:

Computer is an electronic device that is designed to work with information. Computer cannot do anything without a program. Computer takes raw data as input from the user and processes these data under the control of set of instructions called program and gives the result and save output for the future use. A typical modern computer uses LSI Chips.

Standard computer would recommend for broad deployment in the university’s computer labs. A standard desktop personal computer is relatively small, inexpensive single-user computer systems that are highly versatile. Named for their size – the part are small enough to fit on or beside an off desk, desktop computer can provide sufficient memory and storage for most business computing tasks. 

A thin client is a low-cost, centrally managed computer with no extra drives, such as a CD or DVD drive, or expansion slots. These computers have limited capabilities and perform only essential applications, so they remain “thin” in term of the client application they include. These stripped-down versions of desktop computers do not have the storage capacity or computing power of typical desktop computers, nor do they need it for the role they play. With no hard disk, they never pick up viruses or suffer a hard disk crash. 

Unlike personal computers, thin clients download software from a network when needed, making support, distribution and updating of software application much easier and less expensive. Some organizations are able to take advantage of thin clients including Fireman’s Fund Insurance Company, which is providing employees in the field with thin clients to let them make billing inquiries and view policy data. Other organizations find it difficult to have users accept thin client, who prefer the features of a full-fledged computer. 

In summary computer have different type and brand for computer labs. The type of recommend computer is standard computer which has better processor and hard drive to store all data. Desktop computer cannot be carried to every way because desktop has big monitor and cpu, while thin client have limited capabilities and do not have storage capacity.

References

Dinesh Thakur (N.A) What is Computer?
Available from: http://www.ecomputernotes.com/fundamental/introduction-to-computer/what-is-computer, [Accessed on 25th May 2012]


Question 2's Answer:

A dual core processor for a computer is a central processing unit (CPU) that has two separate cores on the same die, each with its own cache. It essentially is two microprocessors in one. This type of CPU is widely available from many manufacturers. In a dual core processor, each core handles incoming data strings simultaneously to improve efficiency.

Advantages:-
An attractive value of dual core processors is that they do not require new motherboards but can be used in existing boards that feature the correct sockets. For the average user, the difference in performance will be most noticeable during multi-tasking. Servers that are running multiple dual core processors will see an appreciable increase in performance.

·         Features
Dual core processors often come with advanced features that single core processors do not have, such as multithreading. A thread is a single line of data that is processed by your processor at one time. A dual core processor can thread more data streams simultaneously. This makes multitasking on your computer easier because your processor doesn't have to switch back and forth between threads.

·         Affordability
When you need extra processing power, there are several ways to enhance your computer. You can purchase a system with two processors and two motherboard sockets. However, dual core processors are often cheaper alternatives. A dual processor refers to a computer with two processors, each processor containing a separate connection with the motherboard. A dual core processor is one single processor with two processing cores having a single connection to the motherboard.
·         Better Performance
Dual core processors report faster speeds than single core processors. When running a single program, both cores work together to stream data. This allows your computer to download at faster speeds and run commands more efficiently. Dual core processors also reduce the need for motherboard fans.


·         Power Consumption
With two cores running simultaneously, your computer is able to process programs faster, which reduces the power consumption of your system. This is especially useful in video and audio editing. You computer may need to run for hours while a video is rendering. A dual core processor cuts rendering time and saves energy.

Question 3's Answer:

Selecting the best DVD burner is subjective. The most important way is to find the needs when selecting the DVD burner. The first thing is to determine whether an internal DVD burner is better or if an external DVD burner could meet the needs. If is it about to share DVD burner with multiple computer, an external burner would probably function as the best. However, some consumer would select an internal DVD burner as their needs. I also want to think about whether color matters at all to me.

Once the consumer determined what the needs and already willing to purchase, they have to make sure the purchase is really the best DVD burner for them. You can do this various way, one of which is to discover and read consumer reviews of special products you are interested in.

Further option is to check out your local shop, which sold various electronic products and accessories and engage a customer service representative to talk about your choices. It is helpful if you are thinking about the small differences between special products, but keep in mind that shop sales people are more interested in selling you something compared to point you in the direction that is good for you.

In the conclusion, the best DVD burner, you will look for is one that provides the specs and reliability you need and expect, while offering a reasonable price tag to choose it. Make sure it is the case when you are willing to buy, and you cannot make a mistake. If you buy a product which does not meet all your needs, possibilities are you will be disappointed, and you will end up on another search for the best DVD burner sooner than you would like.

References
XPUpdate (N.A) How to Find the Best Internal DVD Burners
Available from: http://xpupdate.com/uncategorized/how-to-find-the-best-internal-dvd-burners/, [Accessed on 27th May 2012]

Question 4's Answer:

Creating your own ideal and unique computer is actually possible. By purchasing all the right hardware, you can assemble your own one of a kind computer.

If cost were not an issue I would want to be able to design and setup my own computer; which will be ideal for me and meet all of my need and requirements. I will use the computer for gaming and surfing the internet, but generally for gaming; and do assignments if it requires using a computer. I choose the computer to be portable (laptop), so that I can take it anywhere. Having a portable computer, this will enable me to take the computer anywhere and the matter of size means that it will not be space consuming. The downside of having a portable computer (laptop) is that, if hardware is damaged, you will have to disassemble the whole computer. This is because everything is assembled into one packed laptop. A desktop however, has its own monitor, CPU and keyboard; making it easier to fix the computer if it is damaged.

But nevertheless, being able to make or create your own computer with no price restrictions is very favorable.

Sunday, 20 May 2012

Answers for Section B: Case Studies of Group Work 1


Questions:

1. What is the impact to the world in terms of social economic value as the result of the retirement of Western Union telegrams?

2. How have online retailers such as Amazon.com affected change in traditional brick-and-mortar business such as Sears?

3. Problem solving: It is often difficult for old, established industries to change business practices. How can this be observed in the impact of the digital music boom (MP3 file sharing) on record companies and their traditional methods of music distribution?

4. Consider the uses of technology at your school. How are educational institutions taking advantage of technology to compete with each other and attain students?


Answers:

Answer to Question 1 by Faiz:

Social Value is the principle and standards of human interaction within a given group that are regarded by members of that group as being worthy, important or significant. This social value can influence by communication technology which is new business with new innovations regularly eclipse old business based on old technologies. A business must continuously evaluate its mission and practices in light of current day trends.

Before the retirement of western union telegram, people used telegrams to send cross country messages in less than a day. Earlier, messages were sent via pony express. In the early days of electronic communication, western union telegrams were an important part of person to person communication around the world. Telegrams reached their peak in year ago when it was cheaper to send a telegram than it was to make a long distance phone call. Telegram became much more amusing with the invention of the singing telegram in 1993. Early in 2006, telegram is the last delivered as western union discontinued its telegram service. The invention of the telephone and fax machine reduced the need for telegrams. Today, western union’s core business is in helping consumers and business transfer money and make payments.

After the retirement of western union telegram, people used new technologies can cause businesses to redefine themselves. Today, they used different methods to send messages in less than a day, for example fax, e-mail and mobile phone. These businesses implemented sustaining change by changing their organizations to move with new trends. Sometimes these methods will refuse to change. The consequences lose out to others that embrace new technologies, as though technology itself has callously plowed them under. It is important to consider the changes brought about by new technologies and gauge their value in terms of quality of life. While western union telegram not longer been used and new technology like fax, e-mail and mobile phone will be called as Smartphone.

Summary about two different methods, western union telegram is famous method to sent messages but this method not longer used because from year to year this method will leave behind and new technology will produce for example fax, e-mail and mobile phone. Nowadays people used Smartphone method to sent messages to others country and it take less than a day. You can make text messages at home or everywhere. Overall, using Smartphone is very easy to sent messages to everyone.

References
Education.com (2012) Education
Available from: http://www.education.com/definition/social-values/, [Accessed on 18th May 2012]


Answer to Question 2 by Fafa:

Sears:
Disadvantages:
  • Dominated home delivery with 75 million catalogs distributed each year  at which it is a waste of paper for these days and is not efficient and not recent updated.
  • Sears (SHLD) has not retooled its venerable brand for the technology age and still using the mail-order-catalogs method.
  • Sears have the ideas what to offer to customers to have the feature or tools but they give it without giving real thought to how consumers use them.  In addition, refunds are not allowed.
Amazon.com
Advantages:
  • Amazon has a strange system of charging a flat shipping rate per item, regardless of its size and weight, while Sears computed exact shipping charges, whether freight, express or mail, and tables are given to enable customers to compute these for themselves. In addition, Amazon has a per-shipment packing charge, which can be relatively large for small orders. Sears made no charge for packing and handling.
  • It is cheaper, even after the cost of shipping, especially with products for which you can choose from a number of vendors.
  • Amazon.com have so much more recent product lines than a marketplace which is more than what Sears have provided such as, books, music CDs, videotapes and DVDs, software, consumer electronics, kitchen items, tools, lawn and garden items, toys and games, baby products, apparel, sporting goods, gourmet food, jewelry, watches, health and personal-care items, beauty products, musical instruments, clothing, industrial and scientific supplies.
  • Amazon have AmazonFresh, which announced in August 2007. It is a grocery service offering perishable and nonperishable foods. Customers can have orders delivered to their homes at dawn or during a specified daytime window. And they also operated pick-up locations.
  • Amazon's Subscribe & Save program offers a discounted price on an item (usually sold in bulk), free shipping on every Subscribe & Save shipment, and automatic shipment of the item every one, two, three, or six months.
  • Amazon have their own online music store called the Amazon MP3 and they are selling downloads exclusively in MP3 format without digital rights management.
  • Amazon released a Mac download store in order to offer dozens of games and hundreds of pieces of software for Apple computers.
  • They have the Amazon Prime which is a service of two-day shipping on all eligible purchases, for a flat annual fee, as well as discounted one-day shipping rates.
  • Computing services are provided:-
o   Amazon Web Services (AWS) in 2002, which provides programmatic access to latent features on its website.
o   Amazon Simple Storage Service (Amazon S3) is an online storage service. It has an unlimited number of data objects, from 1 byte to 5 terabytes in size, can be stored in S3 and distributed via HTTP or BitTorrent. The service charges monthly fees for data stored and transferred.
o   Amazon Elastic Compute Cloud (Amazon EC2), a virtual site farm, allowing users to use the Amazon infrastructure to run applications ranging from running simulations to web hosting.
o   SimpleDB, a database system, allowing users of its other infrastructure to utilize a high-reliability, high-performance database system.

·         They can do film production. In 2008, they producing the film The Stolen Child with 20th Century Fox.




References
  • Wordpress.com (2010) A First Glance at the Sears Marketplace
    Available from: http://retailya.wordpress.com/2010/01/11/a-first-glance-at-the-sears-marketplace/, [Accessed on 18th May 2012]
  • Pantaneto.co.uk (2006) McKinley’s Amazon
    Available from: http://www.pantaneto.co.uk/issue23/ben-ari.htm, [Accessed on 18th May 2012]
  • Elizabeth G. Olson (2012) How Amazon ate Sears' lunch
    http://management.fortune.cnn.com/2012/01/09/how-amazon-ate-sears-lunch/, [Accessed on 19th May 2012]
  • Wikipedia (2012) Title: SEARS
    Available from: http://en.wikipedia.org/wiki/Sears, [Accessed on 19th May 2012]
  • Wikipedia (2012) Amazon.com
    Available from: http://en.wikipedia.org/wiki/Amazon.com#cite_note-96, [Accessed on 18th May 2012]


Answer to Question 3 by Aziz:

Music has been around since the ancient times and has been an important part of our lives. Music can be used in various ways such as to deliver meaningful messages, express feelings, culture wise and entertainment. However in this essay, I will discuss how record companies are affected by the impact of file sharing and music distribution.



With our modern technology, file sharing has been made very easy to access by means of the internet or devices such as mobile phones or Bluetooth. Music is so accessible that a person can simply download it from the internet. Rarely do they go and purchase CDs from music stores anymore; unlike how it all started. This method, will definitely affect record companies in so many ways such as; income, piracy and work opportunities.



Because of music piracy, record companies have lost, not entirely, but a fraction or more of their source of profit. This is because people don’t buy their products anymore as they download it from the internet or through peer to peer sharing methods such as torrents.

Not only that, file sharing also caused dropping percentage of working opportunities for the unemployed. The artists who work hard to sell their albums will also be affected; their source of income is focused on their products.

Apart from all that, when you use software that facilitates illegal downloads, the computer will be vulnerable to viruses and security breaches.

In conclusion, enjoy the music but at the same time respect the copyright as well. File sharing is copying another person’s creation without their permission and that is the same like stealing one’s belonging.


Answer to Question 4 by Azwan:

Technological advances are rapidly changing way in which educational institute works throughout the world. The term Technologies refers as a branch of knowledge that makes a creation and use of technical means and their interrelation with life, society, and the environment. To use technologies, it needs a tutor as a guide and a student to learn to use it. Not only, company and industry can use technologies, but education institution also able to use it when it is what they want.

Before the World Wide Web arises, educational institutes had to rely on word-of-mouth, advertising in daily newspapers, advert it at another Institute and at events specifically designed for showcasing further learning institutes such as open days and seminars. Nowadays, every Institute has a website, and links to the websites via other associated websites. For example, Micronet International College had their own site with URL address www.micronet.com.bn. These websites not only appeal to prospective students, but are also used as a platform to advertise for teachers. For example, www.brudirect.com is well known websites where educators can post their resumes for potential employees to view, as well as browsing through the sites' jobs page.


The internet has changed the way in which institutes compete for students. It is by using online learning. Universities and colleges in particular are eager to make us of the internet and more precisely, e-learning. The typical university student is no longer seen as being a young twenty-something; people from all places and all generations are potential students, and the higher learning institutes are aware of this. By using emails and GMAIL it is now possible for students to communicate with their teachers. Web Boards are used as virtual classrooms where students and teachers alike can post messages, have discussions, and upload files.

The stunning features of e-learning give students the flexibility to study during hours that suit them from the comfort of their own home or the closest internet cafe. The classroom is still the main learning environment for any Institute, and the technology used in the classroom has come a long way. Most schools are equipped with computer rooms, and it is common for there to be a computer in the class for the use with the teacher. Overhead projectors are also used to display images from the computer onto a large white screen. This feature is particularly useful for teachers who wish to use software such as PowerPoint when presenting their lesson. Wireless microphones are also used in the classroom to provide audibility in large classrooms whilst at the same time allowing unrestricted movement around the classroom
.

In conclusion, computer technology is a positive supplement to bridge the gap between education and the world in which we live. Computer-assisted technologies in schools offer students greater access to information, an eager motivation to learn; a jump-start on marketable job skills and an enhanced quality of class work. The future of the classroom looks promising with interactive whiteboards becoming popular in recent years, podcasts being used by teachers who are technologically adept, and assignments, syllabuses, grades, and schedules posted online can all be found being used in the modern classroom.


References

Tommy11 (2009) How are educational institutes making the most of technology?
Available from: http://www.bukisa.com/articles/166632_how-are-educational-institutes-making-the-most-of-technology [Accessed on 20th May 2012]


Welcome To The Ultimate Four Page


Welcome To The Ultimate Four Blogspot




Azwan - Group Leader



Aziz




Fafa Nur Fa'dhilah



Faiz