Tuesday, December 30, 2008

Use WinSCP to securely transfer files between local and remote computer

I have been using WinSCP to securely transfer files between my Windows PC and remote Linux servers for years, and is still using this handy tools until today.

Based on the implementation of the SSH protocol from PuTTY and FTP protocol from FileZilla, WinSCP is developed by Martin Prikryl back from 2000 and was probably the first ever GUI file transfer client for SSH. This awards winning open source application is licensed under GPL with the project migration to SourceForge.net repository in 2003. The project is now hosted in TeamForge since 2005 while still made available in SourceForge.net at the same time.

With WinSCP, you can connect to and transfer files with an SSH (Secure Shell) server running SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol) service. It can also connect to a normal FTP (File Transfer Protocol) server for unencrypted file transfer.



The main differences between SFTP and SCP are:

  • File transfer with SCP is generally faster than SFTP.
  • SFTP supports resume of incomplete file transfer while SCP doesn't.
  • SFTP supports file transfer bigger than 4GB while SCP supports file transfer up to 4GB only.
  • Recursive operations with directories (deletion, permissions change, etc.) is faster in SCP than SFTP.
Some interesting features of WinSCP includes:
  • Translated into multilingual.
  • Integration with Windows Explorer for drag&drop, URL detection, shortcut icons, etc.
  • Supports for scripting and command line interface.
  • Local and remote file manipulation such as create, copy, duplicate, move, delete, rename, compress, etc.
  • Compare local and remote directories.
  • Directory synchronization between local and remote folder.
  • Remote editing of text files with integrated text editor.
  • Portable version that doesn't need any installation is available.


WinSCP is also available as a plugin for file manager applications such as FAR and Altap Salamander.

Click here to go to the download page of WinSCP.

Monday, December 29, 2008

iCapital.biz Bhd (ICAP, 5108)

Established as a closed-end fund (CEF) with 140 million shares by now, iCapital.biz Bhd (ICAP, 5108) has been listed in the main board of Bursa Malaysia since October 2005.

Similar to unit trust funds, ICAP pools together money for investment in Malaysian securities and/or other permitted assets to gain revenue and profit for the benefit of its shareholders. The appointed fund manager who is in charge of ICAP's investment activities is Capital Dynamic Asset Management Sdn Bhd (CDAM) head by Mr Tan Teng Boo (陈鼎武), which has been operating for more than 10 years and manages more than 50 discreationary accounts for various types of investors.

Funds under CDAM's management have consistently outperformed the market, and recorded an attractive annual compounded rate of return of more than 20% for the period from April 1998 to September 2008. The graph below shows its performance benchmarked with KLCI.




According to ICAP's IPO prospectus, so far CDAM has never made any negative returns in any year, and registered positive returns in 1998, 2000 and 2002 despite the bearish general market.

The primary investment objective of ICAP is long-term capital appreciation of its investments, whilst dividend and/or interest income from these investments would be of secondary consideration.

Its investment policy is to allocate not more than 10% of its net asset value (NAV) in any single public listed company in Bursa Malaysia. It may also invest a maximum of 10% of its NAV in unlisted Malaysian companies. As disclosed in its 2008 Annual Report, its portfolio as at June 2008 is as follow:




The NAV of ICAP is calculated on every Wednesday and updated by the end of Thursday on their website as well as Bursa Malaysia's announcement website. Today its last announced NAV by 24-12-2008 stood at RM1.56 and its share price closed at RM1.37 on 26-Dec-2008. This mean its share price is at a 13% discount position from its NAV. The graph below shows its share price versus its NAV.




The best time to invest in a CEF is when the market is undervalued or when there is a lack of excessive optimism. If you intend to invest in ICAP, perhaps the technical analysis below can give you some clue about the timing.




Click here to visit the official website of ICAP.

Disclaimer: This article is intended for sharing of point of view only. It is not an advice or recommendation to buy or sell any of the mentioned stock counters. You should do your own homework before trading in Bursa Malaysia.

Sunday, December 28, 2008

About the Statutory Reserve Requirement (SRR)

Effective 1 December 2008, Bank Negara (BNM) reduced the Statutory Reserve Requirement (SRR) by 50 basis points from 4% to 3.5%, together with the reduction of Overnight Policy Rate (OPR) from 3.5% to 3.25%. The last adjustment to SRR rate was made 10 years ago, from 6% to 4% effective 16 September 1998.

The SRR is a monetary policy instrument available to BNM to manage liquidity and hence credit creation in the banking system. It is used to withdraw or inject liquidity when the excess or lack of liquidity in the banking system is perceived by BNM to be large and long-term in nature.

SRR is the amount of money set aside by banks (all commercial, merchant, investment, islamic banks) to be placed in their Statutory Reserve Accounts with BNM with zero interest. By lowering the SRR, the banks will have a reduced cost of funds, and can therefore help to preserve their profit margins by lending out the liquidated money and earn interest.

A reduction in SRR will inject a certain amount of liquidity into the financial system, which is expected to be lend out by the banks to finance more economic activities in the market. The recent move of 50 basis points SRR reduction by BNM is expected to release about RM2.7~3 billion ringgit back to the bank system.

Together with the 25 basis points reduction to the OPR at the same time, it is expected to have positive impact to the economy as the bank can now lend out more money to earn interest, and the business and consumer public can also borrow money from the bank with a lower interest rate following the reduction of OPR for consumption or investment purposes.

Click here to learn more about SRR.

Added the e-Referer gadget

I have added a new gadget to this blog, namely the e-Referer.

This is how it works: if you've provided a link from your website to my blog here, and somebody clicked on that link to make a visit to here, your website will be listed in my referer listing, which contains a link back to your website.

I have made the setting so that the last 20 referers are listed. So, in order to stay on top of the list, continuous visiting from your website to update the last visit timestamp record is necessary. The number of reference made from your website is also shown beside your link. The total number of references within the last 127 days will be shown below the gadget.

If you find that this gadget is cool and you would like to have one in your website, just click on the e-Referer link provided in the gadget, register for a free account there, and copy over the javascript codes into your website.

Saturday, December 27, 2008

Asia Trader & Investor Convention @ KL 2009

Organized by NextVIEW and first launched in 2006, the Asia Trader and Investor Convention (ATIC) has travelled to 7 Asian Cities -- Singapore, Kuala Lumpur, Bangkok, Ho Chi Minh City, Mumbai, Shenzhen and Tokyo.

With participation by over 300 financial services organizations including securities exchanges, retail & consumer banks, securities brokerage firms, asset/fund management firms, listed companies and other financial services providers, ATIC events have already attracted over 75,000 active traders and serious investors across Asia.

The ATIC @ KL 2009 is coming soon.
Date: 14-15 March 2009
Time: 9.00am - 6.00pm
Venue: Kuala Lumpur Convention Centre, KLCC, Malaysia

It will feature more than 50 English and Mandarin investment seminars, 30 international and local renowned speakers, 40 exhibitors and 15,000-20,000 targeted investors.

Some of the feature speakers including:

  • Daryl Guppy - Founder & Director of Guppytraders.com
  • Paul Forchione - Commodity Trading Advisor
  • Brent Penfold - Veteran Trader, Licensed Futures Adviser, Educator
  • Dale Gillham - Fund Manager, Author, Educator & Founder of Wealth Within, Markets
  • Collin Li Xin Jing 李欣京 - Technical Markets Strategist
  • Don Schellenberg - Founder, Master Money Traders
  • Benny Lee - Chief Market Strategist
  • Yusrizan Ome Yaacob - Retail Market Strategist
  • Dar Wong - Independent Trainer & Columnist
  • Alan Hing - Institutional Trainer
  • Alan Voon 温世麟 - CEO, Warrants Capital
  • Saeed Shah - Senior Sales Manager
  • Azizi Ali - Chartered Financial Consultant
  • William Wermine - Fund Manager Rep
  • G.M. Teoh - Technical Analyst

This event is endorsed/supported by:

It carries a Continuing Professional Development (CPD) 15 hours for Registered Financial Planner (RFP) designees. The early bird entry ticket for this 2 days event is free (normal price is RM28.00).

Click here for more information about ATIC at KL 2009.

Friday, December 26, 2008

Laptops shipment has outnumbered desktops in 2008 Q3

The 3rd Quarter (July-September) of 2008 has been a historical break-through moment for worldwide laptops (a.k.a. notebooks) shipment to outnumber desktops for the first time ever.

During that quarter, global laptop PC shipments rose almost 40 percent compared to the same period of 2007 to reach 38.6 million units. Conversely, global desktop PC shipments declined by 1.3 percent for the same period to 38.5 million units.

This shows that more and more people are opting for laptop than desktop when they buy new PC. In my humble opinion, the following contributes positively for such purchasing decision:

  • Nowadays, the graphics display of laptop is not losing to desktop monitor.
  • The multimedia function of laptop also competitive to desktop. In fact, certain laptop even has built-in webcam camera, microphone, etc.
  • The network function of laptop is also superb. Most laptop nowadays has built-in LAN interface, dial-up modem, Wi-Fi, bluetooth, infra red connection, etc. However, most desktop doesn't have all of these built-in as standard package.
  • The laptop CPU processing power also in par with desktop CPU, besides being able to work with lower voltage and discipate less heat.
  • The laptop harddisk also more robust for mobile usage.
  • Most importantly, the gap between selling price of laptop and desktop has greatly narrowed down, although generally laptop is still more expensive than desktop.

What do you think? Will you select a laptop or desktop for your next PC purchase?

Click here to read iSuppli's news report about "Notebook PC Shipments Exceed Desktops for First Time in Q3".

Thursday, December 25, 2008

Job hunters advices about ethics for job seekers

As a manager in my present and past companies, I had interviewed with numerous candidates for my department's job openings. And when I changed job in the past, I was also being interviewed by others. I have to agree that all interviewers are very concern about the integrity of the candidates.

Most job candidates would have encountered some or all of the following 4 scenarios. Did you react ethically and up to the interviewers' expectation? Perhaps you could learn something from the advices of the job hunter, and act smartly during your future interview sessions when similar scenarios occur again.

Scenario #1:

You had an interview arranged by a Recruitment Consultant. On the day of interview, you were not feeling well. What do you do?

(a) Call the employer to explain the situation and request the interview to be arranged on another day

(b) Did not show up for interview

(c) Send an email to the Recruitment Consultant to cancel the appointment


Allyhunt's advice: Keeping posted is important as this is somehow lost in today’s culture. So, (a) is the answer. In situation such as this, an email is not sufficient. The Consultant may not check the email at all. Even an SMS falls short. It is only courteous to make the call personally. And don’t get your boyfriend and girlfriend to call on your behalf too unless you are too sick to even get yourself a drink.

My comment: I had encountered candidates of (a), (b) and (c), and sad to say that majority of them fall under (b) or (c). As of myself, if I can't make it, I'll call the Recruitment Consultant asking for a rearrangement. I didn't call the employer directly because I believe I need to keep the Recruitment Consultant well informed about any changes to the scheduled interview, and I trust the Recruitment Consultant can make a wise arrangement for me.

Scenario #2:

You attended two interviews with A and B companies and both companies have expressed interest in hiring you. Company A came back to you first and offered you the job and you accepted Company A’s offer. Before you sign the contract, Company B makes you an offer, with a RM200 more in salary. What do you do?

(a) Don’t sign the contract and accept Company B’s offer.

(b) Call Company A and tell them you are no longer interested. Reason given was another company has offered you a RM200 more in salary.

(c) Reject Company B offer and tell them that you had already accepted another offer.

Allyhunt's advice: The answer is (c). KEEP YOUR WORD! To accept a position and then renege on it for a better offer is poor form. Believe me, it’s a small world and you would not want to be labeled as a candidate that can be bought over with money easily later in your career. What do you do in such situation? Best advice: accept offers only after careful consideration. Think critically rather than grabbing the first offer out of fear or desperation. It is unethical to continue to interview after accepting an offer and/or to renege on an accepted position. Company B will respect you for that. Who knows? The same company may have a senior position in the future and you may be applying for the job then. You probably stand a better chance for the ethics you hold firmly at the beginning of your career.

My comment: Yes, I did encountered last minute rejection from candidates who had accepted an offer, or worse still a no show-up when he/she suppose to commence to work. And frankly speaking, I did blacklisted those candidates with the HR, and for those no show-up candidates, I did file an official complaint and request for explanation from the head hunter (if the recruitment was done with this channel) or blacklist the candidate in the job searching website (if the recruitment was done with this channel, and the website has such function to blacklist candidates with poor ethics). As of myself, I did experience such moment, and I rejected Company B which offered RM1200 more than Company A. I also rejected interview invitation from Shell IT International (which was a good place where many IT personnels are eager to work with) because they called me a few days right after I joined Company A, which had been more than a month after I sent them my application. I'm still unsure if that was the best decision to stay put with Company A, but anyhow, I was promoted to managerial position later while I was serving Company A, which end up to be not too bad.

Scenario #3:

You have been short listed for an interview at employer’s office after attended an on-campus interview. During the on-campus interview, you were very keen on the job and you managed to convince the employer accordingly. But now, the more you thought about the job, you find neither the organization nor position is for you. What shall you do?

(a) Go for the interview anyway and pretend you are still interested.

(b) Ignore the interview completely as the employer would have also short listed other candidates.

(c) Tell the recruiter that you have changed your mind and do not wish to pursue this opportunity.

Allyhunt's advice: The answer is (c). At this stage of the process, it is not unethical for you to decline the offer to meet up at the office.

My comment: My own experience in the past, I did rejected a 2nd interview session with Intel, after I found out during 1st interview that the job position is a "Green Badge", which was employed under the job hunter company and outsourced to Intel, instead of being Intel's own employee, and I was not interested nor keen with such arrangement.

Scenario #4:

During an interview, you are asked to give an example of a part-time job experience, but you never had that exact experience. What do you do?

(a) Make something up.

(b) Reinterpret the question to something you are more comfortable with and answer that question.

(c) Acknowledge that you have not had this experience, but offer the closest experience you have had.

The answer is (c). Telling your employers what you think they would like to hear or what you think will get you the job is not productive for you or the employer. If they discovered that you have been less than honest, you may be disqualified immediately.

My comment: Yes, honesty is very important. Only tell the fact to interviewer, don't make story. If you make the interviewer to have a wrong expectation on you, you will be having a very hard time if you happen to be employed, because the employer is expecting you to perform up to the standard and level as you have told them.

(Source of the above 4 scenarios and advisable answers are from Allyhunt, an executive sourcing company in Malaysia)

Wednesday, December 24, 2008

Post Graduate Education Fair 2009

The 11th Post Graduate Education Fair(PGEF) will be organized by AIC this coming January 2009. The event is freely open to public.

Exhibitors consist of local and international universities and colleges, and over RM500,000 worth of scholarships and study grants will be available for application.

The event details are as follow:

Date: 16-18 January 2009
Time: 10am ~ 7pm
Venue: Mid Valley Exhibition Centre (KL)

The 8th Malaysia Career & Training Fair (MCTF) 2009 will also be held at the same time and same venue together with this PGEF '09.

Click here for online registration to PGEF 2009.

JobStreet.com Malaysia Career & Training Fair 2009

The 8th Malaysia Career & Training Fair (MCTF) to be organized by JobStreet.com is coming in January 2009. This event is freely open for public. The previous MCTF 2008 had successfully attracted participation from more than 116,000 job seekers and over hundred of exhibitors.

The event details are as follow:

Date: 16-18 January 2009
Time: 10am ~ 7pm
Venue: Mid Valley Exhibition Centre (KL)

Job seekers are advised to bring along their C.V., and some of the exhibitors might conduct on the spot interview with suitable candidates during the event.

The 11th Post Graduate Education Fair (PGEF) 2009 will also be held at the same time and same venue together with this MCTF '09.

Click here for more information and online registration of MCTF '09.

Click here to see the exhibitors' list in MCTF '09.

Tuesday, December 23, 2008

The UNIX genealogy

The UNIX genealogy diagram below is released to the public domain and free for use for any purpose. It shows the relations between several UNIX systems.



UNIX is born in AT&T's Bell Laboratories. Its history began from 1969 when Ken Thompson, Dennis Ritchie and others started working on a project with a PDP-7 minicomputer in their lab.

It was first written in Assembly Language, and was then rewritten in C Language in 1973. In 1975, UNIX version 6 branched out with the emergence of the first version of BSD, which was developed based on UNIX version 6 free source code.

In the 1980s, the two common branches of UNIX were BSD (from the University of California, Berkeley), and System V (from AT&T). Both were derived from the earlier UNIX version 7, but had diverged considerably.

The GNU Project, started in 1984 by Richard Stallman, had the goal of creating a "complete UNIX-compatible software system" made entirely of free software. This mission was eventually realised by Linus Torvalds, who has developed the Linux kernel in early 1990s.

Today, the BSD family has branched out to FreeBSD, NetBSD, OpenBSD, Solaris, Mac OS, etc. On the other hand, the System V family has branched out to HP-UX, AIX, UnixWare, IRIX, etc. Meanwhile, Linux, which was derived from Minix (a UNIX-like system intended for academic use), has gained its popularity and rapidly growing in both the server and desktop markets.

Monday, December 22, 2008

Gartner Business Intelligence Summit to be held in The Hague, Netherlands

With the theme of "The BIg Discrepancy: How can we do better with BI?", the Gartner Business Intelligence Summit will be held in The Hague, Netherlands on the coming 20-22 January 2009.

The conference, consists of more than 80 conference sessions and exhibition with more than 25 leading BI technology and service providers, will focus on the following key Business Intelligence issues:

  • Key steps to making Business Intelligence strategic
  • Creating a BI and performance management strategy to widen the use of BI
  • The evolving role of corporate performance management
  • Role, structure and organization of the BI Competency Center
  • Identifying the right metrics to measure performance
  • The Data Warehouse in a time of data explosion
  • New delivery models: Open Source and BI "as a service"
  • The impact of SOA on BI
  • Trends in Enterprise Information Management (EIM) and Master Data Management
  • Difficult choices in the Data Quality tools market
  • Portal strategies for BI integration
  • Business Activity Monitoring and the rise of process-driven BI
  • Determining the "return on BI"
  • Performance management and compliance
  • BI market trends and the increasing impact of the mega-vendors
  • Best practices in budgeting, planning & forecasting
Some key benefits to attend this Summit are:
  • Understanding the business forces that will affect IT leaders of BIIM initiatives
  • Insight into the future scenarios facing BI leaders
  • Techniques in making the right innovation choices at the right time
  • Improved decision-making responsibilities for BI investment
  • Evaluation of the market dynamics when making investment decisions
  • Approaches for melding emerging technologies with existing tools and infrastructure
  • Development of ROI and cost allocation models that impact the business case
  • Linking of CPM to strategic planning, budgets and operational activities to aid strategy execution
  • Improved decision-making through BI initiatives and techniques
Click here for more information about the Gartner Business Intelligence Summit and its online registration.

Serious security flaw found in Internet Explorer

You might be awared that recently, there is a serious security flaw found in Internet Explorer versions 5.01, 6 and 7. The security bug is related to the way Internet Explorer handles XML (Extensible Markup Language), which allows hackers to put and run trojan horse program in your computer without your knowledge, when you visit infected website with unpatched Internet Explorer.

In fact, this exploits have already been rigged into many hacked Chinese language websites. Later, launching of massive SQL injection attacks to thousands of legitimate websites to serve this exploit were also found and over 100,000 websites were affected.

In simple words, if you are using Internet Explorer to browse websites, and you haven't patch up this security flaw via Windows' Automatic Updates service or manually download and install the patch, your computer is vulnerable to the attack, and your password and other information could be exposed and stolen by the hackers. Your computer can also be made use by hackers to launch further attacks to other computers.

This security issue is discussed in Microsoft Security Bulletin MS08-078 (KB-960714) published on 17 December 2008, and rated as Critical by Microsoft. Microsoft has responded quickly and come out with an out-of-band patch. Links to download the security patch for various version of Internet Explorer is available in that article.

Therefore, you should immediately patch up your Internet Explorer, or use other browsers such as Firefox to surf the Internet. However, Firefox has also just released a new version 3.0.5 which fixed up several security issues (which were not as critical as the Internet Explorer's security flaw). Even though you use Firefox (or SeaMonkey suite), it is also advisable for you to update the browser to the latest version.

You may click here to go to the download page of Firefox.

How do you know the security patch has been applied to your computer?

For Windows XP, run the "Add or Remove Programs" in the Control Panel, and ensure the "Show updates" option is selected. You should be able to find the installed patch in the listing under Internet Explorer 7 as "Security Update for Windows Internet Explorer 7 (KB960714)" as shown in the diagram below. You should also ensure that other earlier security patches also installed for your browser.

Sunday, December 21, 2008

How to get rid of termite

People are afraid of termites because its infestation could bring damages and losses, it is hard to detect, and it's colony is hard to eliminate.

To get rid of termite, you must firstly know your enemy. Here are some of the characteristics of termites:

  • Termites consume fibrous plant matter, such as wood, paper, etc.
  • Termites love mud and don't like sand, because it is hard for them to burrow through sand.
  • Termites love moisture and stay in the dark.
  • Termites might come from soil, and also from sky. During reproductive seasons, they have wings and will swarm around. They'll shed off the wings once they found place to settle down.
  • Termites may move to another location when disturbed. Therefore, if you find them, don't disturb them before getting the pest control service.

Knowing about these, you should avoid a termite-friendly environment found around your house.

There are generally 2 methods of termites treatment:

  • Method 1 is to create a chemical barrier underneath the building structure. Normally it is done to the land before the building is developed. After the building is developed, this treatment requires drilling of holes all over the house in order to inject the chemical into the land underneath. The chemical will either repel the termites, or kill them off. However, its effectively wear off after time, and can probably last for 3 years only. In addition, if there is untreated gap in between, termites can still find their way into the house.
  • Method 2 is to use a colony elimination baiting system, such as the Sentricon system. Stations are placed around the house to look for the presence of termites. If found, chemical which can retard the termites' moulting process will be put into the bait, and the termites who eat the chemical will infect each other when they return to the colony. Eventually, the colony will be eliminated. This method also require to drill holes in order to place the station inside the house. Normally only 2 stations are placed in the middle of the house, and the rest are placed in the garden area outside the house building.

Method 2 is generally more expensive than Method 1, and the baiting stations need regular inspection for presence of termites. However, it is a more effective way, and unlike Method 1 which only function to create barrier to hinder termites from entering the building, Method 2 will try to eliminate the termites colony by killing them off.

Anyhow, it is a good practice to regularly inspect your house for signs of termite infectations. And I would recommend the inspection to be done with thermal imaging technology.

Detect termite infestations with thermal imaging inspection

Among the household pests, termite brings the more headache because it would cause damage and loss to the building materials, furnitures, etc. In fact, some studies show that losses caused by termites are 4 times higher than losses caused by fire.

Termites infestation is difficult to detect because they are intelligent to cover up their tracks. For example, they will consume up the wood underneath the surface, and the wood seems to be normal from outside. It might take up to a few years before signs of the problem eventually revealed. Worse still, the termite queen may live up to 25 years and lay more than 60,000 eggs in her lifetime, and there could be more than one queen in a termite colony.

The conventional way to detect termite infestations is to look for signs such as hollow sound when wood surface is tapped with blunt object, muddy tubes, shed wings of termite swarm, etc.

The more effective way nowadays is to make use of thermal imaging technology.

Objects with a temperature above absolute zero (- 459° F) emit infrared radiation which is not visible to our naked eye. As an object heats up, it will radiate more and more energy from its surface. The technique for making this invisible radiation visible is called thermal imaging, and involves the use of sophisticated thermal imaging cameras.

Thermal imaging technology detects heat patterns. When termites invade buildings, the normal heat patterns of the walls, floors and roof change due their presence. The thermal imaging camera is able to records this change in heat pattern and indicates the exact location of any termite infestation. The camera is very sensitive and is able to detect temperature variations as little as 0.1 degrees celcius.

Thermal imaging can therefore be used in detecting items that may be of concern which are concealed by wall linings, including termites. This method is non-destructive and non-intrusive, as there is no need to poke holes in a surface to determine if there is damage beneath it.

I have just engaged with Ridpest to inspect for termite with this with thermal imaging technology. It has been few years since the termite barrier threatment done by the developer when my house is built, and I'm aware that the effectiveness of that termiticide underneath the house will just wear off by time.

Tuesday, December 9, 2008

Find out and compare grocery price in all major hypermarkets & supermarkets

The Ministry of Domestic Trade and Consumer Affairs (MDTCA, a.k.a. Kementerian Perdagangan Dalam Negeri Dan Hal Ehwal Pengguna - KPDNHEP) has setup a Price Watch section in their website and list out the grocery price in all major hypermarkets and supermarkets including Carrefour, Giant, Jusco, Mydin, Tesco, The Store, etc.

The price lists are made according to state. You might be surprised to find out how much different can the highest and lowest price of the same item among them, and different hypermarket under the same group might have different price for the same item in different area.

Here are the grocery price list downloadable from their website:

Monday, December 8, 2008

Secret code to enter Service Menus of Sony Ericsson handphone

There is a secret code to enter the Service Menus of Sony Ericsson handphone. Different information might be shown in different model number. And here is the code... (warning: use it at your own risk! Don't do it if you feel uncomfortable to try!)

Enter the following sequence in Standby Screen.

For handphone with joystick or arrow keys:
1. Press the [right] key
2. Press the [*] key
3. Press the [left] key
4. Press the [left] key again
5. Press the [*] key
6. Press the [left] key
7. Press the [*] key

For handphone with jog dial:
1. Rotate jog dial up (just rotate a bit, don't make circular rotation)
2. Press the [*] key
3. Rotate jog dial down (just rotate a bit, don't make circular rotation)
4. Rotate jog dial down again
5. Press the [*] key
6. Rotate jog dial down
7. Press the [*] key

Here is what I get on the Service Menus of Sony Ericsson P1i:
1. Service Information

  • Model information
  • Software information
  • Hardware information
  • SIM locks
  • Configuration
2. Service tests
  • Display
  • Camera
  • Touch screen
  • Illumination
  • LED's
  • Keyboard
  • Vibrator
  • Speakers
  • Microphone
  • FM radio
  • Memory Stick
3. Format internal disk
  • Are you sure you want to format your internal disk? (you should answer NO or else you might get into trouble)

You might probably want to play around with the Service Tests available to your handphone. It is a handy tool to check if the respective hardware portion of your handphone is functioning or not.

Disclaimer: I shall not be liable to any losses or damages if you intend to use the secret code mentioned in this article.

Sunday, December 7, 2008

Procedures for the approval for house extensions and/or renovations

The following serves as a useful FAQ that you should know as a house/building owner who plan to extend and/or renovate your house/building in Malaysia.

What is meant by building extensions / renovations?

  • Any demolition work to the original building
  • Any extension work to the original building (enlarging floor area)
  • Any renovation work to internal building layout
  • Construction of car porch, fencing wall and refuse chamber
  • Any other extension / renovation as prescribed in Act 133, Road, Drainage, and Building Act 1974, and Building By-Laws 1984

Steps to be taken by home owner for submission of extensions / renovations application:

  • Obtain letter of consent from neighbours should extension / renovation work involving housefront bordering neighbour's house
  • Appoint an architect or a registered draughtsman for preparation of building plans
  • Appoint professionals should extension / renovation work involving concrete structures
  • Obtain Development Order approval from municipal council should the extension work exceed 50% of the original floor area
  • Ensure the proposed extension / renovation work comply with the Building Guidelines & Standards
  • Ensure construction work commence only after proposed extension / renovation application has been approved

Documents in submitting application for building extension / renovation:

  • Form A
  • 4 complete copies of the building plan
  • 1 copy of the most recent income tax returns
  • 1 copy of the Certificate of Fitness
  • 1 copy of the Title Deed or the Sales & Purchase Agreement
  • Consent letter from neighbouring residents (if applicable)
  • 1 copy of the structure plan and structure measurement from a certified consultant engineer (if applicable, or purchase the Standard Plan from Department of Building)

Examples of standard plan available:

  • Back extension
  • Front awning extension
  • Building of gazebos
  • Concrete fence
  • Air-well
  • Store and fish pond

Processing fees for plan submission:

  • RM500 for extensions / renovations that involve the lower level / storey
  • RM1000 for extensions / renovations that involve the lower and upper level / storey

Steps to be taken by home owner after extensions / renovations approval:

  • Apply for permit to place building materials on the road shoulders prior to commencement of renovation work.
  • Contact Alam Flora for collection of debris of building materials before construction begins.
  • Display Letter of Approval of the extension / renovation application during construction work.
  • Ensure construction works is carried out within own boundary and adhere to the approved extension / renovation plan.
  • Notify construction stages to municipal council by submitting the relevant forms.

Saturday, December 6, 2008

40% of IT jobs will be related to open source by 2020

Last week, the 78 pages 2020 FLOSS Roadmap Version 2.16 has been tabled in the Open World Forum (OWF) in Paris. OWF is a forum dedicated to free/libre/open source software (FLOSS), its players and projects.

This 2020 FLOSS Roadmap report is the OWF’s main manifesto, and is designed to support discussions taking place during the different OWF seminars and forums. It is a prospective and projection to the influences that will affect FLOSS between now (2008) and 2020, with descriptions of all FLOSS-related trends as anticipated by OWF contributors over this period of time. It also highlights all sectors that will, potentially, be impacted by FLOSS, from the economy to the Information Society.

Studies have been carried out in seven key areas:

  • Theme 1: Public policies: promoting sustainable development of sharedresources
  • Theme 2: FLOSS: the key to future innovation and competitive differentiation?
  • Theme 3: Ensuring sustainability for FLOSS developer communities and businessecosystems
  • Theme 4: Technological and economic breakthroughs: challenge or opportunityfor FLOSS?
  • Theme 5: IT 3.0: towards new governance for information systems?
  • Theme 6: FLOSS: a lever for employment and careers
  • Theme 7: FLOSS in an Open World: Innovations and best practices from Brazil

The report predicted that within the next 12 years, 40% of IT jobs will be related to open source, and open source-based cloud computing will be solving many problems in the real world.

The roadmap has outlined seven areas of change for 2020, which are:

  • FLOSS will become mainstream. It will be the de facto standard for areas such as development tools, infrastructure and scientific computing, as well as being widespread in other sectors
  • 40% of IT jobs will be related to FLOSS
  • FLOSS will free businesses from vendor lock-in, providing a "vaccine against abusive behaviour from a commercial vendor"
  • FLOSS will help reduce the global digital divide, as it is a collaborative effort that works for sustainable development of a shared resource
  • Open source communities will help build business ecosystems for specific markets
    Green datacentres will lead to business models with a low ecological impact, in "the next industrial revolution"
  • Cloud computing will be ubiquitous, and social networking will be the main way to communicate with businesses and government

Click here to download the comprehensive 2020 FLOSS Roadmap Version 2.16.

Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.