<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-608402436617286445</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:22:24 +0000</lastBuildDate><category>Internet security</category><category>introduction</category><category>History</category><category>e-auction</category><category>E-government</category><category>Mobile Payment</category><category>Piracy</category><category>corporate blogging</category><category>credit card</category><category>e-tailing</category><category>electronic currency</category><category>prepaid cash card</category><category>revenue model</category><title>biz-com</title><description>The Best Biz-Com</description><link>http://biz-ecom.blogspot.com/</link><managingEditor>noreply@blogger.com (Biz-cOm)</managingEditor><generator>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-6531583031666121473</guid><pubDate>Sun, 15 Mar 2009 14:39:00 +0000</pubDate><atom:updated>2009-03-22T07:24:15.048-07:00</atom:updated><title>我们这一班.....accouting GROUP 6 ^.^</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7aZOIfDpttXnZxbJENkUEVAk1WP4B9u-9tKttUZx9Ti-Ut_KqkUkfHGlWqG49P-YgjbS7DDDTBCSfyWzzsrSsOt2rkJOoSbpqqHBqDcwSstnngbzcVOKJqArLarq8lkpQgkiWddy_dXg/s1600-h/IMG_1895.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5313431240314335506&quot; style=&quot;margin: 0px 10px 10px 0px; float: left; width: 200px; height: 134px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7aZOIfDpttXnZxbJENkUEVAk1WP4B9u-9tKttUZx9Ti-Ut_KqkUkfHGlWqG49P-YgjbS7DDDTBCSfyWzzsrSsOt2rkJOoSbpqqHBqDcwSstnngbzcVOKJqArLarq8lkpQgkiWddy_dXg/s200/IMG_1895.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color: rgb(255, 255, 0);&quot;&gt;从第一学年到现在的班友：&lt;br /&gt;因为有你们，让我每每上课也不觉得乏味....&lt;br /&gt;因为有你们，让我每每去学校也不厌倦...&lt;br /&gt;因为有你们，让我可以到处和你们一起去游玩.....&lt;br /&gt;因为有你们，让我觉得utar读书生涯也有趣.....&lt;br /&gt;因为有你们，才有这么多回忆的照片......&lt;br /&gt;毕业将即，希望你们前程似锦.... ^.^&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;俐光&lt;/span&gt;&lt;/strong&gt;，口斋心不斋+常说自己是蟒蛇的班上专业摄影大哥哥&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 204, 0);&quot;&gt;麦克&lt;/span&gt;&lt;/strong&gt;，细心到爆(可以在电脑室工作人员在叫我们走时，他还可以慢慢把全部file分门别类出来的小男人！)又爱把房事告诉我们的小男人.....&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 153, 102);&quot;&gt;美菱，&lt;/span&gt;&lt;/strong&gt;一个人未到笑声先到然后很白却一直说自己黑(真是欠打)的小妹妹。 G6 IT department 专属楂fit人&lt;span style=&quot;color: rgb(153, 51, 0);&quot;&gt;(阿呆曰）&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;庆椿&lt;/span&gt;&lt;/strong&gt;，一个脱下眼镜是个小美人的女生(可惜她怎样都不肯戴隐形眼镜 :P)。也是小鸟依人的小姐哦&lt;span style=&quot;color: rgb(153, 51, 0);&quot;&gt;（阿呆曰）&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(51, 204, 0);&quot;&gt;阿呆，&lt;/span&gt;&lt;/strong&gt;一个尽心尽力为我们班付出不求回报又爱看经商的书爱到可以晚上还跑去sunway买popular大抛售的书的班长&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(51, 255, 255);&quot;&gt;justin&lt;/span&gt;,&lt;/strong&gt;一个默不寡言在旁听人家讲，他负责笑和喜欢防不胜防杀出一句经典的“侧田”。每次和他出去我都变成他姐姐&lt;span style=&quot;color: rgb(204, 102, 0);&quot;&gt;（阿呆气愤的曰）&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(204, 102, 204);&quot;&gt;sozin,&lt;/span&gt;&lt;/strong&gt;一个一直十句十一局不离色和最大愿望是做个成功的…..家庭主妇(我也不懂成功家庭主妇的定义是？！:P)的傻二姐&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;yinwen，&lt;/span&gt;&lt;/strong&gt;三年来都无奈被我们叫“老板”而渐渐真名被遗忘的老板…..hahaha!:P&lt;br /&gt;焕凝，一个在班上”超级无敌xx“称号而腿是瘦到让我很羡慕+对镜头超级敏感的女生~~~&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(153, 0, 0);&quot;&gt;Peiding,&lt;/span&gt;&lt;/strong&gt;一个动作很淑女，然后一直是我模仿却被他们说不像的女生…..无歌不晓，老中青通杀（阿呆曰）&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;Pooiwen&lt;/span&gt;&lt;/strong&gt;,一个我不太敢和她交谈的人，因为感觉我说了十句，她就真是回我：“嗯！”的女生…. ：P&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(153, 153, 255);&quot;&gt;Janice,&lt;/span&gt;&lt;/strong&gt;一个我们班上的abc，感觉她人很不错，可是就是天意弄人，我们话不投机~~遗憾！&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 153, 102);&quot;&gt;Jackie,&lt;/span&gt;&lt;/strong&gt;一个认识后，才真正发现她那真面目：超级爱搞怪+爱抢镜头+说做model很累的女生。每次要shoot 她都被炸回&lt;span style=&quot;color: rgb(204, 0, 0);&quot;&gt;（阿呆曰）&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(204, 51, 204);&quot;&gt;Choy har,&lt;/span&gt;&lt;/strong&gt;一个cute到爆的可爱，小鸟依人，娇滴滴地样子的小女生。&lt;span style=&quot;color: rgb(153, 51, 0);&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(204, 204, 204);&quot;&gt;Lala,&lt;/span&gt;&lt;/strong&gt;一个在那天viva拍照后，看到她摆出了一些很可爱的动作，才发现原来她也很cute一下的小小女生…..(也第二遗憾和她话不投机…..唉！)&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Amanda&lt;/span&gt;&lt;/strong&gt;,听说她就快出国读书了，在此祝她一路顺风啦~~~&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;Hasveen,&lt;/span&gt;&lt;/strong&gt;一个一直叫她ah sing 的插班生，因为语言不通，所以甚少和她交谈，不过也发现其实她是个蛮乐意帮人的女生……(第三遗憾，做不到聊天的朋友，都怪自己英文不好！唉…..)&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 204, 204);&quot;&gt;Beewee&lt;/span&gt;&lt;/strong&gt;,一个在班上超会穿衣服+可爱+美丽的女生….社交超厉害~~~&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;Ah ju,&lt;/span&gt;&lt;/strong&gt;一个个子小小讲话cute cute的小小女生&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 204, 153);&quot;&gt;Rabbit,一&lt;/span&gt;&lt;/strong&gt;个满脸都洋溢着很幸福的幸福小女生&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(0, 204, 204);&quot;&gt;Hwaichee,&lt;/span&gt;&lt;/strong&gt;一个让我感觉到自己变年轻的插班生，因为终于出现一个84年的在我班上啦~~~哈哈！！！！！！&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Sweekim&lt;/span&gt;&lt;/strong&gt;,一脸样子很甜感觉又爱笑的小女生&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(153, 255, 153);&quot;&gt;Yiling&lt;/span&gt;&lt;/strong&gt; ，一个不戴眼镜也很漂亮的女生&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(204, 102, 204);&quot;&gt;Jinghua&lt;/span&gt;&lt;/strong&gt;, 一个每次游玩都没有她份的女生…..(give me a reason, y?!?!:P)。专长是上刀山，下火海捡球&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;（&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;阿呆曰&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 0);&quot;&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;）&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 102, 102);&quot;&gt;Eyaz,&lt;/span&gt;&lt;/strong&gt;一个班长觉得最帅&lt;span style=&quot;color: rgb(153, 51, 0);&quot;&gt;（阿呆曰）&lt;/span&gt;及超欣赏的印度同胞~~~哈哈！！！&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(255, 204, 153);&quot;&gt;Yenchin&lt;/span&gt;&lt;/strong&gt;,一个感觉每次动作来无影去无踪的女生&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(102, 255, 255);&quot;&gt;Weimin&lt;/span&gt;&lt;/strong&gt;,一个像马来人的华人班友…. :P&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 0);&quot;&gt;传说中yinwen的外人&lt;/span&gt;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;（阿呆曰）&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 255, 0);&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;是不是觉得独漏了一个呢？？哈哈，那就是（本篇的作者）&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;cheeling&lt;/span&gt; , 一个公认的大眼睛美女，逃不出狮子座的宿命，最大的优点就是很厉害给例子，比方说。活跃于社交活动，超级的说，哈哈&lt;/span&gt;&lt;span style=&quot;color: rgb(153, 51, 0);&quot;&gt;(阿呆曰）&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2009/03/accouting-group-6.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7aZOIfDpttXnZxbJENkUEVAk1WP4B9u-9tKttUZx9Ti-Ut_KqkUkfHGlWqG49P-YgjbS7DDDTBCSfyWzzsrSsOt2rkJOoSbpqqHBqDcwSstnngbzcVOKJqArLarq8lkpQgkiWddy_dXg/s72-c/IMG_1895.JPG" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-7037829081961779183</guid><pubDate>Wed, 11 Mar 2009 16:35:00 +0000</pubDate><atom:updated>2009-03-11T09:50:48.566-07:00</atom:updated><title>超感动之viva日 ^。^</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjci69WYS5jl8EuSpc9IiGR1FgqWY3IRFtcAA4ljhfFOPm-nJudZisHpiMzNQlIDIJlSwqydMIRawCc3dkBpPdkXCKgX9ndUZIovTXfFNZfOEGOBG-zMj3irqpzJVyJHFAMbU7xLxMzHKg/s1600-h/%E5%9B%BE%E5%83%8F0503.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5311973245099182322&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 150px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjci69WYS5jl8EuSpc9IiGR1FgqWY3IRFtcAA4ljhfFOPm-nJudZisHpiMzNQlIDIJlSwqydMIRawCc3dkBpPdkXCKgX9ndUZIovTXfFNZfOEGOBG-zMj3irqpzJVyJHFAMbU7xLxMzHKg/s200/%E5%9B%BE%E5%83%8F0503.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#ffff00;&quot;&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;11/3/2009，&lt;/span&gt;&lt;br /&gt;今天是可喜可乐的日子哦~~~&lt;br /&gt;因为今天是我们viva的大日子，&lt;br /&gt;准备了很多天。。。。&lt;br /&gt;(虽然实际上只是准备了两三天：P)&lt;br /&gt;今天终于要整装待发准备出击了！&lt;br /&gt;一直抱着‘船到桥头，自然直’ 心态的我们，&lt;br /&gt;今天终于看到船头直了！&lt;br /&gt;心里总有说不出来的感动。。。&lt;br /&gt;换了衣服，化了妆，&lt;br /&gt;一切真的就准备就绪了。。。。&lt;br /&gt;我们都抱着忐忑不安的心情在临present前准备着的！&lt;br /&gt;因为牌一直都说，&lt;br /&gt;我们会遇到很多问题或阻扰~~~&lt;br /&gt;牌，&lt;br /&gt;有时真的不由得我们不信的！&lt;br /&gt;就在临半小时前，&lt;br /&gt;哈哈！！！！&lt;br /&gt;就出问题了！&lt;br /&gt;Slide印错~~~~&lt;br /&gt;幸好及时发现，&lt;br /&gt;一切都解决了~~~&lt;br /&gt;感谢上天！ J&lt;br /&gt;一直正在寻找幸运星的我们，&lt;br /&gt;他-竟然就在我们身边。。。&lt;br /&gt;而我们却茫然不知。。。&lt;br /&gt;这种特殊的距离，&lt;br /&gt;让我们事后都有莫名的感动。。。&lt;br /&gt;谢谢你，&lt;br /&gt;我们可爱一直叫我们go ahead ‘s supervisor~~~&lt;br /&gt;真是的 “万万”都没有想到的！&lt;br /&gt;难怪sz都不懂！&lt;br /&gt;哈哈！！！！！！！！:P&lt;br /&gt;虽然present中，&lt;br /&gt;总有小小的差错~~&lt;br /&gt;然后那位小姐就一直自责的。。。&lt;br /&gt;晕倒！！！&lt;br /&gt;实不相瞒，&lt;br /&gt;其实我当下也乱了！&lt;br /&gt;然后乱讲一通的！&lt;br /&gt;哈哈！！！！！！！&lt;br /&gt;所以打平！ :P&lt;br /&gt;而且啊我们都感受到我们大家都尽力了！&lt;br /&gt;事后，&lt;br /&gt;我们心里有的只是感动！&lt;br /&gt;并没有责怪！&lt;br /&gt;明白吗？&lt;br /&gt;这种小小的感动，&lt;br /&gt;也就只属于我们四人的！ :)&lt;br /&gt;&lt;span style=&quot;color:#66ff99;&quot;&gt;今天真的是超级无敌感动的！！！！！！！！！！！！&lt;br /&gt;也很谢谢viva前给我们鼓励的你们！&lt;br /&gt;真的！&lt;br /&gt;有你们，&lt;br /&gt;我们当下都觉得很窝心！:)&lt;br /&gt;也因为有你们，&lt;br /&gt;我们才更有信心做到了！&lt;br /&gt;对！&lt;br /&gt;我们真的做到了！！！！！！&lt;br /&gt;谢谢你们！！！！！！！&lt;/span&gt;&lt;br /&gt;这份美好加超感动的回忆，&lt;br /&gt;会一直深烙在我心里！:)&lt;/span&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2009/03/viva.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjci69WYS5jl8EuSpc9IiGR1FgqWY3IRFtcAA4ljhfFOPm-nJudZisHpiMzNQlIDIJlSwqydMIRawCc3dkBpPdkXCKgX9ndUZIovTXfFNZfOEGOBG-zMj3irqpzJVyJHFAMbU7xLxMzHKg/s72-c/%E5%9B%BE%E5%83%8F0503.jpg" height="72" width="72"/><thr:total>13</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-3999339212767779620</guid><pubDate>Sun, 08 Mar 2009 09:57:00 +0000</pubDate><atom:updated>2009-03-08T03:23:19.833-07:00</atom:updated><title></title><description>jl, 这首歌叫Bubbly是Colbie calliat唱的，知道你在这里写东西就立刻“飞”来看了。。。我也好想念以前的我们。我们就快毕业了。。我也很舍不得。。希望在毕业前，我们可以像是塔罗牌所说的——》女王已成功驯服了狮子。。（在此，本人好想外婆哦。。我妈说：以前每次回来都是说:老妈，吃早餐咯！现在起来却是三支香。。虽然外婆已活到了九十五岁，但大家还是很舍不得。。外婆你安息吧。。）&lt;br /&gt;&lt;h4&gt;&lt;br /&gt;&lt;/h4&gt;</description><link>http://biz-ecom.blogspot.com/2009/03/jl-bubblycolbie-calliat.html</link><author>noreply@blogger.com (Biz-cOm)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-529318654194670413</guid><pubDate>Thu, 05 Mar 2009 19:28:00 +0000</pubDate><atom:updated>2009-03-05T11:50:11.916-08:00</atom:updated><title>永远的我们 :)</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGFJmRwKu5XOrmLxtJ2eXJ1gI7wcSJ1vqBBpLFxVHIkJHBaYwzBIt3tl0qLJ-nQt_JGmcppnSurIJngJAZ5kaFMfXC0BAlu_w-13135UCWG_7vER2LSrhSd4P9RuqmDPe6-i2UChslxKA/s1600-h/DSC01998.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5309793101462737826&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 150px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGFJmRwKu5XOrmLxtJ2eXJ1gI7wcSJ1vqBBpLFxVHIkJHBaYwzBIt3tl0qLJ-nQt_JGmcppnSurIJngJAZ5kaFMfXC0BAlu_w-13135UCWG_7vER2LSrhSd4P9RuqmDPe6-i2UChslxKA/s200/DSC01998.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#33ffff;&quot;&gt;还记得我们曾经一起努力做出来的这个blog吗？&lt;br /&gt;在这个夜已深的夜晚，&lt;br /&gt;突然听到那首英文歌 (不懂歌名:P),&lt;br /&gt;想起了在我们blog里一开就会听到的那首英文歌，&lt;br /&gt;Sz,&lt;br /&gt;你去找下是叫什么名的。&lt;br /&gt;你比较在行英文歌嘛！&lt;br /&gt;哈哈！&lt;br /&gt;谢谢！&lt;br /&gt;因为这个&lt;strong&gt;&lt;span style=&quot;font-size:130%;color:#ff0000;&quot;&gt;BIZ-COM&lt;/span&gt;&lt;/strong&gt;是我们很辛苦一起created的，&lt;br /&gt;所以我觉得不能浪费的！&lt;br /&gt;而且每每听到那首英文歌，&lt;br /&gt;就会想到一进blog就会看到我们那一张张充满回忆的照片！&lt;br /&gt;真的开始有点不舍了！&lt;br /&gt;所以我想大伙们，&lt;br /&gt;你们还记得这个blog的username n password吧？&lt;br /&gt;忘了吗？&lt;br /&gt;好吧！&lt;br /&gt;给你们下提示啦！&lt;br /&gt;是我们老板的专利！&lt;br /&gt;记得了吗？&lt;br /&gt;所以希望你们得空就进来写写我们一起的点点滴滴吧！&lt;br /&gt;好吗？&lt;br /&gt;一起“工作”了&lt;strong&gt;3年&lt;/strong&gt;的，&lt;br /&gt;我们的默契也已经不是别人不能质疑的！&lt;br /&gt;不是吗？&lt;br /&gt;真的一个眼色，&lt;br /&gt;就已经知道了！&lt;br /&gt;我们，&lt;br /&gt;是&lt;span style=&quot;font-size:180%;color:#3333ff;&quot;&gt;&lt;strong&gt;永远的朋友&lt;/strong&gt;&lt;/span&gt;的！&lt;br /&gt;更是&lt;strong&gt;&lt;span style=&quot;font-size:180%;color:#ff0000;&quot;&gt;永远的战友&lt;/span&gt;&lt;/strong&gt;哦！&lt;br /&gt;一起&lt;strong&gt;&lt;span style=&quot;font-size:180%;color:#ffff00;&quot;&gt;加油&lt;/span&gt;&lt;/strong&gt;啦！！！&lt;br /&gt;&lt;br /&gt;共勉之~~~~&lt;br /&gt;From: cheryL&lt;/span&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2009/03/blog-post.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGFJmRwKu5XOrmLxtJ2eXJ1gI7wcSJ1vqBBpLFxVHIkJHBaYwzBIt3tl0qLJ-nQt_JGmcppnSurIJngJAZ5kaFMfXC0BAlu_w-13135UCWG_7vER2LSrhSd4P9RuqmDPe6-i2UChslxKA/s72-c/DSC01998.JPG" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-5479803954275463294</guid><pubDate>Sat, 05 Jul 2008 10:09:00 +0000</pubDate><atom:updated>2008-07-14T01:44:26.781-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">e-auction</category><title>local e-commerce site: lelong.com</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ2x5qadoSpIwlY3sgqYd9kz2OF7jjdcNjy2VZC6RaL_dLSQADgtcYcQ65htP5fEE5VhpOHzjGQGUKZ4Ngb7c6tPfdKvOJ3ISZtN6abhn34VI6pwjv_sJrxGeIhEnBMSos-E71vofZpVM/s1600-h/L.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219483068777591586&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ2x5qadoSpIwlY3sgqYd9kz2OF7jjdcNjy2VZC6RaL_dLSQADgtcYcQ65htP5fEE5VhpOHzjGQGUKZ4Ngb7c6tPfdKvOJ3ISZtN6abhn34VI6pwjv_sJrxGeIhEnBMSos-E71vofZpVM/s200/L.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://list.lelong.com.my/Auc/List/Browse.asp?DA=A&amp;amp;TP=21&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Le&lt;/span&gt;&lt;span style=&quot;color:#ffcc66;&quot;&gt;long&lt;/span&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;.com.my&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt; was commerced at the end of 1998. It is the founders of the pioneer auction website in Malaysia. It provides an open trading platform where the market determines the value of items that are sold. Thus, it styled and functioned is similar to the international auction site such as eBay.com.&lt;br /&gt;&lt;br /&gt;In the home page of Lelong.com.my, there are three language preferences for the users to select. Thus, the users may choose the language that he/she is more comfortable with. I believe this will probably reduce misunderstanding between the seller and the bidder. Beside that, Lelong.com.my has divided goods into different categories. This is easier for the users like me to search for the items as there are already categorized it.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJy-usUgVjkX1UlEECO2vA7quYZtndZyd733zsPk8MPlEUP10EIxPOT4KSLDle-DBEBYnTonncbbrWuqBkzC5K52fvS0IK064grGaz_MOvqL_5EOuEs778N9YZk5A10tc66BXp94mKpwg/s1600-h/auction.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219483067709556754&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJy-usUgVjkX1UlEECO2vA7quYZtndZyd733zsPk8MPlEUP10EIxPOT4KSLDle-DBEBYnTonncbbrWuqBkzC5K52fvS0IK064grGaz_MOvqL_5EOuEs778N9YZk5A10tc66BXp94mKpwg/s200/auction.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Other than convenient, I am emphasis on the security when I trade. There is a &lt;a href=&quot;http://www.lelong.com.my/safetrade/html/overview.asp&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;safetrade ser&lt;/strong&gt;vice&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/a&gt; in this website that provide the buyer and seller to complete their online transaction more safety. Furthermore, people that are currently not residing in Malaysia are not allowed to sell things over this website. This is because they want to reduce and prevent online fraud. With this service provided, it enhances users confident during the online transaction. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;It also provides a forum for the users to discuss and exchange information with other users. However, the most importantly is this website provide fee calculator. Thus, the users only need to key in the figure and the calculator will show them the exact amount that they suppose to pay. It is so convenient and users friendly.&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/07/local-e-commerce-site-lelongcom.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ2x5qadoSpIwlY3sgqYd9kz2OF7jjdcNjy2VZC6RaL_dLSQADgtcYcQ65htP5fEE5VhpOHzjGQGUKZ4Ngb7c6tPfdKvOJ3ISZtN6abhn34VI6pwjv_sJrxGeIhEnBMSos-E71vofZpVM/s72-c/L.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-8267197682320329921</guid><pubDate>Sat, 05 Jul 2008 10:07:00 +0000</pubDate><atom:updated>2008-07-14T01:38:06.875-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">e-auction</category><title>Things to take note to prevent e-auction fraud when a consumer participating in an e-auction</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOB5H35cvz7fketObHaF-QzNauTcVDWrfuJEpfTu_7eziKDiOJdT1KXRphz-me3ysGDpVOqkk78D9CJxT6hu_QiJnU3Pv4D5X0Wbi-mV-1aROwIzz1nVV03EuvujFZKD4oXfljsq49rl0/s1600-h/auc.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219484755813614386&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;66&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOB5H35cvz7fketObHaF-QzNauTcVDWrfuJEpfTu_7eziKDiOJdT1KXRphz-me3ysGDpVOqkk78D9CJxT6hu_QiJnU3Pv4D5X0Wbi-mV-1aROwIzz1nVV03EuvujFZKD4oXfljsq49rl0/s200/auc.jpg&quot; width=&quot;127&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Nowadays, e-auction becomes a normal and popular internet activity for the internet users. However, e-auction fraud such as bid shielding, shilling, failure to ship merchandise and other problems still exist.&lt;br /&gt;&lt;br /&gt;Thus, some important issue must take note when a consumer participating in an e-auction in order to minimize or prevent e-auction fraud.&lt;br /&gt;&lt;br /&gt;User identifies verification: IC number, mother’s name, driver’s license or such privacy information can use by users to identify the verification when make bid in e-auction or trading in the internet. &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW7yXMF-cL-W1lsr3heyduV6Dln43HnOXcua7mW0zmBwwxMFvy5pa6OdLnjKihTtXk8tEZJeH2XfAZUKnRTId_PgEXc96Dy9rDurqHPDNJVqmFXIKL1rBdfFIlvoAMxilOQmReQR4XIDw/s1600-h/eau.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219484758606891586&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW7yXMF-cL-W1lsr3heyduV6Dln43HnOXcua7mW0zmBwwxMFvy5pa6OdLnjKihTtXk8tEZJeH2XfAZUKnRTId_PgEXc96Dy9rDurqHPDNJVqmFXIKL1rBdfFIlvoAMxilOQmReQR4XIDw/s200/eau.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Authentication service: It is a service provide by the specific companies use to determine whether an item is genuine or not. However, sometimes different expert authenticators may have different opinion when doing the verification in the same item based on their different experience.&lt;br /&gt;&lt;br /&gt;Grading services: It used to determine the physical condition of the items. Different items may have different grading system. Thus, it will be more precise when grading the items.&lt;br /&gt;&lt;br /&gt;Escrow Service: It provides users with safe and convenient environment when &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2veOVhLxmhZLuaGLnvsxKjKPrWfUDgdKnhdlupQiOwwrA-kug5p6ht3vGaLyeWk6gbQtxYqC1DirPYtLYKMxoR6oYrkplImLTSHSN7KOFwUTZN2Bg5gfolIG4fSWksvZ7wrbRFYBQkGU/s1600-h/4084710945.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222172738026720770&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2veOVhLxmhZLuaGLnvsxKjKPrWfUDgdKnhdlupQiOwwrA-kug5p6ht3vGaLyeWk6gbQtxYqC1DirPYtLYKMxoR6oYrkplImLTSHSN7KOFwUTZN2Bg5gfolIG4fSWksvZ7wrbRFYBQkGU/s200/4084710945.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;they conduct business with other users through internet. Escrow service provider act as a third-party. They collect, hold and send a buyer’s money to a seller according to instructions agreed on by both buyer and seller. Once the buyer receives and approves the item from the seller within an agreed time frame, the escrow service will send the payment to the seller.&lt;br /&gt;&lt;br /&gt;Feedback forum: Feedback forum is a good platform that allows buyer and sellers to build up their own e-auction reputation. Users can give comment on their online trading experience. It is especially useful when potential buyer make reference to those comments in the feedback forum in order to make online trading decision.&lt;br /&gt;&lt;br /&gt;Non-payment Punishment: It is a policy implemented by the e-Bay to punish those who do not pay for their winning bids at the due time. For example, suspension of their accounts. This can be a warning to those bidders who do not honor in the winning bids.</description><link>http://biz-ecom.blogspot.com/2008/07/things-to-take-note-to-prevent-e.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOB5H35cvz7fketObHaF-QzNauTcVDWrfuJEpfTu_7eziKDiOJdT1KXRphz-me3ysGDpVOqkk78D9CJxT6hu_QiJnU3Pv4D5X0Wbi-mV-1aROwIzz1nVV03EuvujFZKD4oXfljsq49rl0/s72-c/auc.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-6565063868041237466</guid><pubDate>Sat, 05 Jul 2008 10:03:00 +0000</pubDate><atom:updated>2008-07-14T01:43:06.902-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Piracy</category><title>Piracy in Malaysia: Fighting through education and enforcement</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ10mPDPZx6VAjYeIlVIQPa-eFTdafLfxlshjU5m5AtN9iE3EfVxz3J0JaVssRESi_J9mRkPCWAo1oMvJaURee9UZ8C9WVUHyQ6MsefcetnF3CxmfWmBqmzgvqbxvpU2T6WLR8DIl1KdQ/s1600-h/pirated+pro.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219733893124689010&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 193px; CURSOR: hand; HEIGHT: 87px; TEXT-ALIGN: center&quot; height=&quot;87&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ10mPDPZx6VAjYeIlVIQPa-eFTdafLfxlshjU5m5AtN9iE3EfVxz3J0JaVssRESi_J9mRkPCWAo1oMvJaURee9UZ8C9WVUHyQ6MsefcetnF3CxmfWmBqmzgvqbxvpU2T6WLR8DIl1KdQ/s200/pirated+pro.jpg&quot; width=&quot;270&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Malaysia’s image has once being alleged as a leading producer and exporter of pirated products. According to &lt;a href=&quot;http://global.bsa.org/idcglobalstudy2007/studies/2007_global_piracy_study.pdf&quot;&gt;&lt;strong&gt;&lt;em&gt;Fifth Annual Business Software Alliance&lt;/em&gt;&lt;/strong&gt; &lt;/a&gt;(BSA) and International Date Corporation (IDC) Global Software Piracy Study, Malaysia maintained its software piracy rate at 59% , it is representing a loss of US311 million. The following chart illustrates average piracy rates in the Asia Pacific region:&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW3Gsv0jyQVe4-mk0POxWYYdaYcOrRY2SMYXGOE3UXqQsHjh-qybYU4s_SOqsqrEXd-ZnRs6qVTwvZEY4RZBz71_RmLy0jkICxjUMeqDf1Ir0uBEcckLMOonRI2N6cpz-J0EoiHi0zfcM/s1600-h/pc.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219880116935578658&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 95px&quot; height=&quot;137&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW3Gsv0jyQVe4-mk0POxWYYdaYcOrRY2SMYXGOE3UXqQsHjh-qybYU4s_SOqsqrEXd-ZnRs6qVTwvZEY4RZBz71_RmLy0jkICxjUMeqDf1Ir0uBEcckLMOonRI2N6cpz-J0EoiHi0zfcM/s200/pc.bmp&quot; width=&quot;204&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Cultural differences are the major factors that affect the piracy problem. In addition, the strength of intellectual property protection and the availability of pirated software also the factors that determine the piracy rate in the particular country.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEdjNGUvQ_Z0LrkL2ne5sUhe3CtWBXbqvyFnoEvkxw2626rUsmeVgaEhq04MTLunIa9FJId2tB_1boKwOTE7LkxR4sgI-quTo6y40FhQRqnEBFhIXz1d-OnO6XPU44fQlMQa6VoFsPr94/s1600-h/4053581272.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222174559849199394&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEdjNGUvQ_Z0LrkL2ne5sUhe3CtWBXbqvyFnoEvkxw2626rUsmeVgaEhq04MTLunIa9FJId2tB_1boKwOTE7LkxR4sgI-quTo6y40FhQRqnEBFhIXz1d-OnO6XPU44fQlMQa6VoFsPr94/s200/4053581272.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Furthermore, development of internet and technology has increased the conveniences of privacy. People produce huge numbers of CDs and DVDs in short time and sell them at very low prices. Those illegal download from internet has caused music and video companies suffer thousand million dollars losses per year.&lt;br /&gt;&lt;br /&gt;Therefore, Ministry of Domestic Trade and Consumer Affairs work along with &lt;a href=&quot;http://www.bsa.org/country/Report%20Piracy.aspx&quot;&gt;&lt;strong&gt;&lt;em&gt;Business Software Alliance&lt;/em&gt;&lt;/strong&gt; &lt;/a&gt;or other relevant association to counter the piracy problem. They should focus on the sources that cause piracy problem in order to mitigate it. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;In addition, they should educate the consumers and computer users through public education such as &lt;a href=&quot;http://www.allbusiness.com/retail-trade/miscellaneous-retail-retail-stores-not/4648053-1.html&quot;&gt;&lt;strong&gt;&lt;em&gt;awareness campaigns&lt;/em&gt;&lt;/strong&gt;.&lt;/a&gt; This will enrich the users&#39; knowledge regarding other people copy right. Furthermore, it may inform the businesses and the public at large about the risked associated with using the pirated product and encouraging the use of legitimate product. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;Insignificant punishment toward those pirated activities have been the main cause of piracy in Malaysia. Thus, strong government policy with effective enforcement is the key mean to minimize the piracy rate as well. Although it will take longer time to process but it is the most effective method.&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/07/piracy-in-malaysia-fighting-through.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ10mPDPZx6VAjYeIlVIQPa-eFTdafLfxlshjU5m5AtN9iE3EfVxz3J0JaVssRESi_J9mRkPCWAo1oMvJaURee9UZ8C9WVUHyQ6MsefcetnF3CxmfWmBqmzgvqbxvpU2T6WLR8DIl1KdQ/s72-c/pirated+pro.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-2955003439388475416</guid><pubDate>Sat, 05 Jul 2008 09:59:00 +0000</pubDate><atom:updated>2008-07-14T01:45:04.447-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">corporate blogging</category><title>Corporate Blogging: A new marketing communication tool for companies</title><description>Corporate blog is a blog published by or with the support of an organization to reach their organization’s goal. Companies use it for external and internal communications. External communications is to strengthen relationships with important target groups. Internally, blogs are use as tools for collaboration and knowledge management.&lt;br /&gt;&lt;br /&gt;Corporate often updated its blog to announce news about their new products and services. It also uses to explain and clarify policies as well as react on public criticism on certain issues. This has enabled the company to communicate with customer more effectively. Hence, this has increase the transparency and accessibility in the corporate image. For example &lt;a href=&quot;http://bplans.typepad.com/blog/&quot;&gt;&lt;strong&gt;&lt;em&gt;Bplans Blog&lt;/em&gt;&lt;/strong&gt; &lt;/a&gt;is a great extension of &lt;a href=&quot;http://www.bplans.com/&quot;&gt;&lt;em&gt;&lt;strong&gt;Bplans.com&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Beside that, it is a user-friendly publishing interface. The design of the webpage is more creative and innovative compare to the traditional communication channel in marketing the products and services. Thus, it attracts people to visit the blog and promoted the company products and services.&lt;br /&gt;&lt;br /&gt;Furthermore, corporate blogging is the most cost effective way in marketing the company products and services. This is because people that surfing internet is often more than the people reading newspaper. The management also need not need to spend money on making changes of the information in the blog. This has reduced the expenses of advertisement for company.&lt;br /&gt;&lt;br /&gt;Corporate blogging has broadened the corporate internet marketing program. At the same time, corporate blogs enable some interact with the targeted market on a more personal level by building link credibility to tie back to the corporate site. Thus, it has increased the corporate websites’ value and it become more visible to search engines. Therefore, corporate blogging has become one of the marketing tools in most of the companies.&lt;br /&gt;&lt;br /&gt;Click &lt;a href=&quot;http://www.inc.com/articles/2003/07/bblogs.html&quot;&gt;&lt;em&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/em&gt; &lt;/a&gt;for further information.</description><link>http://biz-ecom.blogspot.com/2008/07/corporate-blogging-new-marketing.html</link><author>noreply@blogger.com (Biz-cOm)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-1144259167944618385</guid><pubDate>Sat, 05 Jul 2008 09:55:00 +0000</pubDate><atom:updated>2008-07-14T01:46:15.935-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-government</category><title>E-Government in Malaysia:Its implementation so far and citizen adoption strategies</title><description>Electronic government (E-government) is one of the seven flagship applications introduced in &lt;a href=&quot;http://www.gov.my/MyGov/BI/Directory/Business/BusinessByIndustry/ICT/MSC/&quot;&gt;&lt;em&gt;&lt;strong&gt;Multimedia Super Corridor&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; (MSC). In the survey, Malaysia’s ranking is at 25th out of 32 countries in terms of E-government usage growth. Since the implementation of E-government was initiated in 1996, it enables government to exchange information, provide services and transaction with citizens, businesses and other arms of governments more efficiently.&lt;br /&gt;&lt;br /&gt;Implementation of e-government includes several government processes and services online such as:-&lt;br /&gt;&lt;a href=&quot;http://www.eprocurement.gov.in/&quot;&gt;&lt;em&gt;&lt;strong&gt;e-Procurement&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; – purchase and sale of supplies and services through the internet. It provides real time bidding solutions for buyers and sellers that bring an unprecedented level of profitability, control and simplicity to corporate procurement and liquidation processes.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fabm.gov.lk/projsystem.html&quot;&gt;&lt;strong&gt;&lt;em&gt;Project Monitoring System&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; – system used to monitor the implementation of government’s development projects from the high-level management down to activity levels. This enables government agencies to have a better management and access information.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://thejobseekerdilemma.com/blog/electronic-labour-exchange-elx-malaysia/2007/02/09/&quot;&gt;&lt;strong&gt;&lt;em&gt;Electronic Labour Exchange&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; – provide a one-stop job search and job advertisement platform for Malaysian jobseekers and employers.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sains.com.my/sains/brochures/Brochure_E-Syariah.pdf&quot;&gt;&lt;em&gt;&lt;strong&gt;E-Syariah&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; – provide a case management structure that integrates the processes related to management of cases for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Syariah_Court&quot;&gt;&lt;strong&gt;&lt;em&gt;Syariah Court&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://trainings.asti.dost.gov.ph/index.php?option=com_content&amp;amp;task=view&amp;amp;id=79&amp;amp;Itemid=58&quot;&gt;&lt;strong&gt;&lt;em&gt;Human Resource Management Information System&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; (HRMIS) – provide a single interface for government employees to efficiently and effectively manage the human resource processes.&lt;br /&gt;&lt;br /&gt;Citizen’s adoption strategies of e-government in Malaysia:-&lt;br /&gt;1) Improve legislation on personal data protection, privacy and security so that consumers are protected. Hence, they feel more confident and safer performing online transactions with government.&lt;br /&gt;2) Narrow the digital divide especially in urban so that the citizens are ready and able to adopt online government services.&lt;br /&gt;3) Provide &lt;a href=&quot;http://www.ecdl.ie/ecit_about.aspx?sm=9&quot;&gt;&lt;strong&gt;&lt;em&gt;e-Citizen&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; education, skills and training to every citizen about the benefits of using e-government services.&lt;br /&gt;&lt;br /&gt;Click &lt;a href=&quot;http://www.emeraldinsight.com/Insight/ViewContentServlet?Filename=Published/EmeraldFullTextArticle/Articles/0400240903.html&quot;&gt;&lt;strong&gt;&lt;em&gt;here&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; for further information.</description><link>http://biz-ecom.blogspot.com/2008/07/e-government-in-malaysiaits.html</link><author>noreply@blogger.com (Biz-cOm)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-5574921429127605129</guid><pubDate>Sun, 29 Jun 2008 13:43:00 +0000</pubDate><atom:updated>2008-07-14T01:49:46.344-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">e-tailing</category><title>e-tailing</title><description>&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217304862721744882&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg258-hNUdcTEdoJI8EJ8Sts1CLrtPwp5PBES3jMXSvsJhEKGW91iZZBl21kH_w6P8-JkGu-TYAmXdBapkHeuY9ZbeNoro1qH-VZ594QSbftmhwslhMjr-PEOHPLiD12QUnbLo0d5-sFQg/s200/e-tailing.gif&quot; border=&quot;0&quot; /&gt;Nowadays, e-tailing take part in pure play-type business have the opportunity to gain higher profit margins because the overhead expenses associated with a physical retail space, such as retail space, labour and inventory is significantly alleviated. Pure play allows a retailer to reach customers world wide while they still maintaining in one location for each customer to visit. It is operate for 24 hours a day and 7 days a week.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbGM3tQKVTwACtYvykvZK_LrUmk9zn79pCoue8-YX8b0x2Ey8fYOB33TVy058ldOLwQIeI_QSqaUMhyphenhyphen8rQr7Auktvi70miFKS19gjp20xJE_qp-WeBlhS5bjJ2ZKcXCbNotavIhGDbxd0/s1600-h/1654132146.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222172090035473042&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbGM3tQKVTwACtYvykvZK_LrUmk9zn79pCoue8-YX8b0x2Ey8fYOB33TVy058ldOLwQIeI_QSqaUMhyphenhyphen8rQr7Auktvi70miFKS19gjp20xJE_qp-WeBlhS5bjJ2ZKcXCbNotavIhGDbxd0/s200/1654132146.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Furthermore, e-tailing contains online clothes, online reservation the restaurant, eyeglasses, tourism, e-groceries and others. This is more convenient to us looking for different online categories to shopping.&lt;br /&gt;&lt;br /&gt;For example, Dell is direct sell their computers and laptops online. They do not appoint any retailer to sell their product in shop. This is because they are able to save a lots cost through online services. However, they have now start to presence brick and mortar business. There is a first Dell physical store in Malaysia that located in Mid Valley Megamall’s IT World, Kuala Lumpur.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzD6SQmp_T8etyXl3b1YXFMUMKuh35JKVxn8ApVx4vFgr2YX91eE94HvX6rj9u8GFkJaCYue3KiFcgxZO0AksHDIMcZ_xmUsyS8A-sr9AfLVwnzWIMmAtrUyQNSppVHbyY_8lqaSq-xZU/s1600-h/images.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219477451249107234&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzD6SQmp_T8etyXl3b1YXFMUMKuh35JKVxn8ApVx4vFgr2YX91eE94HvX6rj9u8GFkJaCYue3KiFcgxZO0AksHDIMcZ_xmUsyS8A-sr9AfLVwnzWIMmAtrUyQNSppVHbyY_8lqaSq-xZU/s200/images.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;One of the reason that Dell implement this strategy is to increase the market share in the PC market as they have been taken over by Acer as the 2nd in worldwide notebook market. With this strategy, they are able generate more revenue. It enable the customer to physically feel and touch the product. It is more reality compare to the catalogue provided in e-tailing. Then, they may purchase the physical products through their shop.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTG0B24u2qowK_j_0uYd-ayLvbKWwgdfcnHOlQU9bXPJLfJe1Bz013pHatNTJmz2-yYnM0J6e9LtJc2IwyjMzlw0rpTBdNIRn28AwKkKZAt7_xSFDTa7zM4c50N7CCviJFrWDMZZURUJE/s1600-h/1938016080.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222172323412048930&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTG0B24u2qowK_j_0uYd-ayLvbKWwgdfcnHOlQU9bXPJLfJe1Bz013pHatNTJmz2-yYnM0J6e9LtJc2IwyjMzlw0rpTBdNIRn28AwKkKZAt7_xSFDTa7zM4c50N7CCviJFrWDMZZURUJE/s200/1938016080.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Beside that, brick and mortar business is able to reduce the possible problem that incurred in e-tailing such as lost shipment, errors in shipments, overbilled customers, faulty products and credit card fraud. All this are often the causes that cause the customer felt unsecure of their product or the transaction process.&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/e-tailing.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg258-hNUdcTEdoJI8EJ8Sts1CLrtPwp5PBES3jMXSvsJhEKGW91iZZBl21kH_w6P8-JkGu-TYAmXdBapkHeuY9ZbeNoro1qH-VZ594QSbftmhwslhMjr-PEOHPLiD12QUnbLo0d5-sFQg/s72-c/e-tailing.gif" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-7783913014806829983</guid><pubDate>Sun, 29 Jun 2008 13:42:00 +0000</pubDate><atom:updated>2008-07-14T01:50:23.307-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">electronic currency</category><title>Electronic currency</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfuYTbIPfcpYoExOdjUcdBuVBlrZHaADaHEJ3rA9OgCkXg6Bg4-v6tIVDszll3Axi-FVkPtYe-iWN7NgE42qI15kNZLELuZdSQfMaxQyW5f3qtIRFX-HoUmVnJ1Qr5gr-nA6-8WP1OUl8/s1600-h/electronic-money.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217302295749319346&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfuYTbIPfcpYoExOdjUcdBuVBlrZHaADaHEJ3rA9OgCkXg6Bg4-v6tIVDszll3Axi-FVkPtYe-iWN7NgE42qI15kNZLELuZdSQfMaxQyW5f3qtIRFX-HoUmVnJ1Qr5gr-nA6-8WP1OUl8/s200/electronic-money.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Digital_cash&quot;&gt;&lt;strong&gt;&lt;em&gt;Electronic currency&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; refers to transactions carried out electronically with a net result of funds transferred from one party to another. It is anonymous and reusable. An amount of money must convert to electronic currency before we can spend it. The electronic currency has serial numbers. Each one is issued by a bank and represents a specified sum of real money. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;One of the most attractive features of electronics currency to the consumers is confidentiality. Other people will not obtain the information about the buyer during the electronic currency amount being sent to the seller as the bank will have no record of the customer involved in the electronic currency transaction. Unlike credit card companies, they collect customer’s data and may have the probability to sell it to third parties. Therefore, it provides safety protection of customers’ privacy. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;The security of electronic currency is provided by the use of encryption. The use of&lt;em&gt; &lt;/em&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/RSA&quot;&gt;&lt;strong&gt;&lt;em&gt;RSA cryptography&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; makes it almost impossible to break the code of a digital signature. In addition, the enacted digital signature statutes require a certification authority to use a trustworthy system. Thus, this improves the security of the transaction. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;However, there are some drawbacks of electronic currency. Fraud committed to electronic currency is one of it. If a consumer misplaces his private key and perpetrator uses it to withdraw funds, the bank would never know and the consumer would be liable for it. Besides, if the security code is broken and the message is intercepted, the hacker will be able to perpetrate fraud on the recipient of the message. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;Another potential problem is double spending of digital coins. This is only a potential drawback if the consumer chooses a peer-to-peer transaction. This is because the bank is able to check the serial number of each coin in the transaction against its database of spent coins. The transaction will be denied if the coin has been spent. Thus, the consumer will be protected if he includes the intermediary (bank) in the transaction. Otherwise, the consumers have to bear the risk that coins may be intercepted or sent to wrong recipient.&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/electronic-currency.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfuYTbIPfcpYoExOdjUcdBuVBlrZHaADaHEJ3rA9OgCkXg6Bg4-v6tIVDszll3Axi-FVkPtYe-iWN7NgE42qI15kNZLELuZdSQfMaxQyW5f3qtIRFX-HoUmVnJ1Qr5gr-nA6-8WP1OUl8/s72-c/electronic-money.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-5323332082669239297</guid><pubDate>Sun, 29 Jun 2008 13:21:00 +0000</pubDate><atom:updated>2008-07-14T01:51:08.369-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">prepaid cash card</category><title>The application of prepaid-cash card for consumers.</title><description>A prepaid-cash card is a pre-paid debit card that enables the card holders to make purchases and the payment is deducted from the card’s available balance. It has become popular and widely used in all parts of the world. The most common prepaid-cash card used by Malaysian is Touch ‘n Go card and mobile prepaid card while Octopus card is famously use in Hong Kong.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhbnBlinCw8GyduIP48z5EkRO0U4Bq7p2KbZiCE2IqdMIeNN-4f_gNWSuZs1xpziNBExyU5eEr9rPqzvIpKuclmjcWtjgDP8ASBv_A0EFGyenUzPc6KIOEIG9kNJQJ5wa3YvC0opF1eQ/s1600-h/img_card1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217298151333290770&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhbnBlinCw8GyduIP48z5EkRO0U4Bq7p2KbZiCE2IqdMIeNN-4f_gNWSuZs1xpziNBExyU5eEr9rPqzvIpKuclmjcWtjgDP8ASBv_A0EFGyenUzPc6KIOEIG9kNJQJ5wa3YvC0opF1eQ/s200/img_card1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Touch ‘n Go card may use in many places such as highway and Light Rail Transit (LRT). It is very convenient to the users especially during festival time. Users can easily pass through the counter with Touch-and-Go card. Thus, they do no need to waste their time to buy ticket. Furthermore, &lt;a href=&quot;http://thestar.com.my/news/story.asp?file=/2008/4/12/nation/20902911&amp;amp;sec=nation&quot;&gt;&lt;em&gt;&lt;strong&gt;Touch ‘n Go card&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; can be used to buy item in some outlets situated in Klang Valley such as Burger King and A&amp;amp;W. Beside that, there will be a &lt;a href=&quot;http://motoring.asiaone.com/Motoring/News/Story/A1Story20080625-72832.html&quot;&gt;&lt;em&gt;&lt;strong&gt;plan to replaces credit card with Touch ‘n Go card&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; at petrol station as the dealer of petrol station have to bear the 1% commission for credit card transactions.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Cell phone prepaid card is also a type of prepaid cash card. The users buy those prepaid cash card and reload into their mobile phone account in order to make call or perform any communication purposes. For example, IDD prepaid calling card that uses to make a call to other country.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6KW9A3E2bDWb4hFVecCstXQ0hn3CirdzZ2XePN8cOaRyS1p2JfhSrhU9NT2PYKsdvA-a1gQHhZIhAXFpV479SD054e5GOrLDTHIr7Tgv8R6cFtF5R62EtMv3nGojof1dBjbqRi3r1OTQ/s1600-h/hongkong_octopuscard.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217297793679894450&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6KW9A3E2bDWb4hFVecCstXQ0hn3CirdzZ2XePN8cOaRyS1p2JfhSrhU9NT2PYKsdvA-a1gQHhZIhAXFpV479SD054e5GOrLDTHIr7Tgv8R6cFtF5R62EtMv3nGojof1dBjbqRi3r1OTQ/s200/hongkong_octopuscard.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.octopuscards.com/corporate/aboutus/en/index.jsp&quot;&gt;&lt;em&gt;&lt;strong&gt;Octopus card&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; is the most useful prepaid cash card in Hong Kong. It has offered various services for the user. For exmple, user can use those cards to purchases goods in retail outlets and pay for the public transportation services. They are over 10 million transaction incurred everyday.&lt;br /&gt;&lt;br /&gt;Overall, the advantage of the prepaid cash card is cardholder themselves can control their expenditure because the payment will become invalid once it exceed the balance available in the card. Thus, cardholder will not overspend their money.</description><link>http://biz-ecom.blogspot.com/2008/06/application-of-prepaid-cash-card-for.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhbnBlinCw8GyduIP48z5EkRO0U4Bq7p2KbZiCE2IqdMIeNN-4f_gNWSuZs1xpziNBExyU5eEr9rPqzvIpKuclmjcWtjgDP8ASBv_A0EFGyenUzPc6KIOEIG9kNJQJ5wa3YvC0opF1eQ/s72-c/img_card1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-2018126381476290762</guid><pubDate>Sun, 29 Jun 2008 13:20:00 +0000</pubDate><atom:updated>2008-07-05T03:40:48.605-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">credit card</category><title>Credit card debts: causes and prevention</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsO4DtpdrDHXkQOotzr4Oe3Dpg6Ez1L5DKTuYGoxO-g8Z-RFtcT3QPfg44h8roWpGXUP-yYJ3GRnGgvlDNLCKhFoUbOhHHTp_QH5uYigxLtaIRMPkBGbvEUw2TVeNdk3_qHyHffuvKHC8/s1600-h/CreditCard.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217300766996674386&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsO4DtpdrDHXkQOotzr4Oe3Dpg6Ez1L5DKTuYGoxO-g8Z-RFtcT3QPfg44h8roWpGXUP-yYJ3GRnGgvlDNLCKhFoUbOhHHTp_QH5uYigxLtaIRMPkBGbvEUw2TVeNdk3_qHyHffuvKHC8/s200/CreditCard.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Nowadays, most of the adult will have at least one credit card in their wallet. When a person has a credit card, he is able to spend the money before he earns it. This means he is using future money for current expenses.&lt;br /&gt;&lt;br /&gt;One of the reasons that cause credit card debts is the cardholders do not payoff their debt or are late in paying off the minimum payment required. This may because the cardholders are too busy with their work and forget about the payment. Thus, the users should set up a direct debit for the minimum amount and pay off as much of the remaining balance as possible to keep the debts low.&lt;br /&gt;&lt;br /&gt;Another general reason for credit card debts is overspending. People tend to spend more than what they earn with the credit card. Thus, a monthly spending plan is essential. Without this plan, they may find themselves spending on the credit card unnecessarily and ended up with a plenty of credit card debts. The cardholders also need to be smart in using credit card in place of cash and make sure they can pay off the cost over time. &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBW4ebpz1qL-ez8XTZ15PsKChunxSZ_bQT3meB0ziegX_YPg4IpPwsG8dHkKVhYKOZ3U2rZ7hAXCUCjnNd3Oj8tG3xOWV3SBeBjsYrjJHG6R8xGspMYn64JzgHrkOYv0LmWJQjOs-9-44/s1600-h/credit_0.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217300904167479218&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBW4ebpz1qL-ez8XTZ15PsKChunxSZ_bQT3meB0ziegX_YPg4IpPwsG8dHkKVhYKOZ3U2rZ7hAXCUCjnNd3Oj8tG3xOWV3SBeBjsYrjJHG6R8xGspMYn64JzgHrkOYv0LmWJQjOs-9-44/s200/credit_0.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;A person having too many credit cards may also cause credit card debts. The more credit cards a person has, the more likely they are to use them. Hence, it is advisable to clear any outstanding balances and cancel (in writing) cards that no longer used or just use one or two at a time.&lt;br /&gt;&lt;br /&gt;When an individual loses their job or some portion of income, he may have difficulties to payoff his debts. Situation will be worse if he continues to spend the same amount with their reduced income. Thus, he should call up the credit card company and explain the situation to them. The credit card company may agree to freeze his card temporary (and perhaps even the interest rate) and let him paxyoff the debt at an agreed amount each month.&lt;br /&gt;&lt;br /&gt;In conclusion, the key to keep away from credit card debts is use the credit card wisely. Plan it before spend!&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/credit-card-debts-causes-and-prevention.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsO4DtpdrDHXkQOotzr4Oe3Dpg6Ez1L5DKTuYGoxO-g8Z-RFtcT3QPfg44h8roWpGXUP-yYJ3GRnGgvlDNLCKhFoUbOhHHTp_QH5uYigxLtaIRMPkBGbvEUw2TVeNdk3_qHyHffuvKHC8/s72-c/CreditCard.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-221466689228128067</guid><pubDate>Sun, 29 Jun 2008 13:17:00 +0000</pubDate><atom:updated>2008-07-14T01:52:01.357-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile Payment</category><title>Mobile Payment systems in Malaysia: Its potentials and consumers’ adoption strategies</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixfYM2EvGt7WKgov-jg-WwEeUFBj2VnlLevshPf29lb8u3IF23hxNJPrFeXDV7tRdyyi9D_vzGtOyvHDtm7opqvAKwG02S5MFjv30JCfmbtJOq72f9I0a413lTamXYLAnjVIyXlyxybYg/s1600-h/mobile+payment.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217303402398726498&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixfYM2EvGt7WKgov-jg-WwEeUFBj2VnlLevshPf29lb8u3IF23hxNJPrFeXDV7tRdyyi9D_vzGtOyvHDtm7opqvAKwG02S5MFjv30JCfmbtJOq72f9I0a413lTamXYLAnjVIyXlyxybYg/s200/mobile+payment.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; Mobile payment system is a payment system that emerges due to the development of mobile-commerce (m-commerce) and it is conducted over a wireless telecommunication network.&lt;br /&gt;&lt;br /&gt;Last year, there is a mobile payment event held in Thailand. It is to unlocking the business opportunities with mobile payment services. In Malaysia, cash and check payment still account for a large portion of the number of transactions in the economy. Hence, mobile payment system is still very new to all the consumers. Therefore, it has created huge potentials to begin with this service.&lt;br /&gt;&lt;br /&gt;First of all, there are almost 88% (25 million) of Malaysian population are subscribing to mobile phone services. With this large number of mobile phone subscribers in Malaysia, it has immense opportunities to leverage on the mobile phone to accelerate the migration to mobile payment.&lt;br /&gt;&lt;br /&gt;In term of speed, simplicity, cost and conveniences for the public, mobile payment system has provide an efficient and cost effective method of delivering the financial services even in the remote areas. For example, users can transfer money to their friends, pay bills, meals or even taxi rides by using mobile payment system.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3Odmqz8qsuZcki2Dbh2aS0ZiI28UoGz21spZ-fk0Y5PBGG0Q9AdT_R_Kegx15ZO1Hxm_tp-PINfFGhUa0wAFiZy8qeZh2YMUXwhJ00DfJ6XsUppscuEpu4074dduNbM0BYoIRwnrok8U/s1600-h/untitled.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219474840486801890&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3Odmqz8qsuZcki2Dbh2aS0ZiI28UoGz21spZ-fk0Y5PBGG0Q9AdT_R_Kegx15ZO1Hxm_tp-PINfFGhUa0wAFiZy8qeZh2YMUXwhJ00DfJ6XsUppscuEpu4074dduNbM0BYoIRwnrok8U/s200/untitled.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Many of the companies have invited those established brand such as Touch ’n Go, Maybank, Visa International and Nokia to work together in order to provide various avenues of payments and services to their customer. They also offer a special user interface to allow customers payment details, credit balance and recent transaction on the mobile phone screen at any point in time. Those convenient services have attracted the consumers to adopt this payment services.&lt;br /&gt;&lt;br /&gt;In future, there will be more adoption of mobile payment as there is acceleration of consumer preferences and technology evolves. However, there still need to strengthen consumer confidence in the security and reliability of mobile networks as a mean for consumers to access financial services.&lt;br /&gt;&lt;br /&gt;Here is the article that related to mobile payment system:-&lt;br /&gt;&lt;em&gt;&lt;strong&gt;1.&lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;http://www.internetnews.com/ec-news/article.php/3667181&quot;&gt;&lt;em&gt;&lt;strong&gt;http://www.internetnews.com/ec-news/article.php/3667181&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;&lt;br /&gt;2.&lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm&quot;&gt;&lt;em&gt;&lt;strong&gt;Malaysia&#39;s first mobile payment system launched : News : Communications - ZDNet Asia&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;div&gt;&lt;em&gt;&lt;strong&gt;3.&lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htmhttp:/www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm&quot;&gt;&lt;em&gt;&lt;strong&gt;http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htmhttp:/www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/mobile-payment-systems-in-malaysia-its.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixfYM2EvGt7WKgov-jg-WwEeUFBj2VnlLevshPf29lb8u3IF23hxNJPrFeXDV7tRdyyi9D_vzGtOyvHDtm7opqvAKwG02S5MFjv30JCfmbtJOq72f9I0a413lTamXYLAnjVIyXlyxybYg/s72-c/mobile+payment.bmp" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-6393677509030175250</guid><pubDate>Sat, 21 Jun 2008 06:45:00 +0000</pubDate><atom:updated>2008-07-14T01:55:38.619-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet security</category><title>Firm Use the Cyber Thugs to Attack Competitors</title><description>&lt;p align=&quot;right&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1S4z3i6uK6FhibtpAGfLSBr7vAwsQPC0jnhZyvg-Pp4Mo4zMLXqPkmj-2frAOOTvyFJDLzUjGu4_BnWI-4BvcHiLNuCUuFSN0N-QhCM9pwSM4BaCXTq5PXE6OYpNTkDcX4uoSeuUhBGw/s1600-h/ddos.bmp&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;left&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Denial-of-service_attack&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214227897155065906&quot; style=&quot;FLOAT: right; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;134&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1S4z3i6uK6FhibtpAGfLSBr7vAwsQPC0jnhZyvg-Pp4Mo4zMLXqPkmj-2frAOOTvyFJDLzUjGu4_BnWI-4BvcHiLNuCUuFSN0N-QhCM9pwSM4BaCXTq5PXE6OYpNTkDcX4uoSeuUhBGw/s200/ddos.bmp&quot; width=&quot;277&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Denial-of-service_attack&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Distributed denial-of-service&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; (DDoS) can become a useful tool by the legitimate firms to damage their competitors’ website or servers. However, it only take place in internet.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0B4QAkFRMTxDW9j8xJFagw2NUwcy1aTf9qflD37A_PLcq73YBjxOV6nSFc-NYPVobTRShVZ8THcguXrC2yRECGd_8idjFGtHRHiDM-l_-cWIIruUZXGxwWRHbFdevVZOAOYGY9q9Ec8I/s1600-h/dos.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214227895341574274&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0B4QAkFRMTxDW9j8xJFagw2NUwcy1aTf9qflD37A_PLcq73YBjxOV6nSFc-NYPVobTRShVZ8THcguXrC2yRECGd_8idjFGtHRHiDM-l_-cWIIruUZXGxwWRHbFdevVZOAOYGY9q9Ec8I/s200/dos.bmp&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;DDoS attack is an attempt that attacker gain the illegal administrative access to as large amount of compromised systems on the internet as possible to attack a single target. It purposes is to make the computer resource unavailable to its intended users or potential users. The common method of DDoS attack involves the flood of incoming messages to the target systems with external communications requests. Thus, the target system cannot respond to legitimate requests as soon as possible or cannot responds to the valid applications effectively and efficiency.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Normally, the DDoS attack will force the targeted system to reset or close down for few hours even for few days in order to repairs and restore. This is because DDoS attack will consume all the resources of the targeted system that it can no longer provide its intended services or as a communication media between the users and the targeted system.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFC9KcvcMcLuMRC8uUiBES9lA6ud-85SjnZb5lc2CyGyHPYMVgI4AJVX_1XWV8yLnIlISydw6aSbm4gxFuB8XhLSFIncFjUMbcFZvqKdp47Igp7GrvVhLfGbSj1kNGOl1Sl1Z3IepK3jk/s1600-h/56.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214227899096267090&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;123&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFC9KcvcMcLuMRC8uUiBES9lA6ud-85SjnZb5lc2CyGyHPYMVgI4AJVX_1XWV8yLnIlISydw6aSbm4gxFuB8XhLSFIncFjUMbcFZvqKdp47Igp7GrvVhLfGbSj1kNGOl1Sl1Z3IepK3jk/s200/56.bmp&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;DDoS attack always used in the business industry on the internet. This attack will seriously influence the operating of the competitors’ computer system especially those websites that major revenue is rely on the online selling or transaction fees. Once the website closes down for few hours or few days, the million in dollar per day will be loss. Furthermore, reputation of the company and the confident of the users will loss due to the DDoS attack to the company system. Thus, most of the companies are afraid to become the target system of DDoS. &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/firm-use-cyber-thugs-to-attack.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1S4z3i6uK6FhibtpAGfLSBr7vAwsQPC0jnhZyvg-Pp4Mo4zMLXqPkmj-2frAOOTvyFJDLzUjGu4_BnWI-4BvcHiLNuCUuFSN0N-QhCM9pwSM4BaCXTq5PXE6OYpNTkDcX4uoSeuUhBGw/s72-c/ddos.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-4295884833261461710</guid><pubDate>Sat, 21 Jun 2008 05:00:00 +0000</pubDate><atom:updated>2008-07-14T01:57:42.425-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet security</category><title>How To Safeguard Our Personal and Finaicial Data?</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGfkTW7XdydI2zHAHvPyzGDSHS_v9an60XvjqmZMG9hdALsqa1ZhzAYn_6OplT68QrIiPH6Zr5YuuSADpn1cugOpMt-PTp3ny8msDg5_41xF2eL4SSMl_gbQESBqv8o6LsPTTpNyOMio/s1600-h/6.bmp&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214212290331778290&quot; style=&quot;WIDTH: 422px; CURSOR: hand; HEIGHT: 134px&quot; height=&quot;134&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGfkTW7XdydI2zHAHvPyzGDSHS_v9an60XvjqmZMG9hdALsqa1ZhzAYn_6OplT68QrIiPH6Zr5YuuSADpn1cugOpMt-PTp3ny8msDg5_41xF2eL4SSMl_gbQESBqv8o6LsPTTpNyOMio/s200/6.bmp&quot; width=&quot;672&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVkZVUSfbEoe7etafDWLjLmtqmYRWtsY8vPgougx_r0y_PbG7itveh5zoevQweSxz6Irs2EMW1r203ClCPIHmPfK0ur9u9YpUc_pdjCcPponteOm4k-45pZjZDS75v_PX-Gp_gq5bfSIA/s1600-h/2.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214220393426623378&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 237px; CURSOR: hand; HEIGHT: 144px&quot; height=&quot;134&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVkZVUSfbEoe7etafDWLjLmtqmYRWtsY8vPgougx_r0y_PbG7itveh5zoevQweSxz6Irs2EMW1r203ClCPIHmPfK0ur9u9YpUc_pdjCcPponteOm4k-45pZjZDS75v_PX-Gp_gq5bfSIA/s200/2.bmp&quot; width=&quot;312&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Performance of computer systems and networking have becoming more advance nowadays. It allows corporate to record, store and retrieve huge amounts of data faster and more efficiently than ever before. However, these capabilities have raised the concerns about the privacy of individuals in large networked information technology environments as online threats increased. There are several ways to safeguard our personal &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;and financial data from network.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;Firstly, we can download or purchase some software to guard against online threats in order to protect our computer from hackers and spyware. They are easily acquired either from the internet or from the local computer shops. Thus, it will be convenient for all the users to acquire. For examples of those software are &lt;/span&gt;&lt;a href=&quot;http://www.symantec.com/index.jsp&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Norton Antivirus&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;, &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;a href=&quot;http://www.mcafee.com/us/&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;McAfee VirusScan&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;, &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;a href=&quot;http://free.grisoft.com/&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;avast!, &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;a href=&quot;http://free.grisoft.com/&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Girsoft AVG&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;, &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;a href=&quot;http://www.eset.com/&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;NOD (Eset)&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;and&lt;/span&gt; &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;a href=&quot;http://www.spywareterminator.com/&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Spyware Terminator&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dySFO3V1dku6cXobL023Ss7SRX4d_vXbIkdc9FK4Apt_sqpz2N2UHSPgqPFqKqI73Gbc2iQAG4rULNRh1cOVA&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Beside that, we should never post our personal information in the chat rooms or on websites as well as enter full information in the online registration forms. This is because it can make you a target for identity theft, stalking or even harassment. In addition, we should never use E-mail or unsecured instant massage(IM) to transmit confidential information because E-mail and free instant massage communications are easily intercepted. Hence, it is not a secure process for transmitting personal information. &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Uq5-hclgQ1-4dAxmX_PtZUCN_Jyc03A7bL7ceb1hzdROs1X59cu8PSoZlDGNaUZyhCXr5alVwc5KWGx7m5w8pNa79j67d3DLAaHixvt-HWY6f52DyabqE-Pka6qpbDFTit5PkFpFJH0/s1600-h/7.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214220392185368882&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; height=&quot;115&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Uq5-hclgQ1-4dAxmX_PtZUCN_Jyc03A7bL7ceb1hzdROs1X59cu8PSoZlDGNaUZyhCXr5alVwc5KWGx7m5w8pNa79j67d3DLAaHixvt-HWY6f52DyabqE-Pka6qpbDFTit5PkFpFJH0/s200/7.bmp&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Then, a strong financial software password is also one of the methods to improve security of our personal and financial information privacy. A password should not contain personal information and change it constantly. It should be combination of numbers and alphabet. In addition, we should dispose our confidential information properly. It is recommended to dispose the materials in electronic formats (on CD or computer) so the information cannot retrieve by others.&lt;br /&gt;&lt;br /&gt;Next, we should never reply to an E-mail, pop-up message that asks for personal or financial information in order to avoid phishing scams. Social engineers often use phishing to impersonate well-known banks, online retailers or credit card companies. They use fraudulent E-mails and websites to fool recipients into divulging personal financial data such as credit card numbers, account passwords and social security numbers.&lt;br /&gt;&lt;br /&gt;In nutshell, it is advisable that we should protect or safeguard our personal and financial data properly. No matter how sophisticated the Information Technology, we can never be a foolproof! &lt;/span&gt;</description><enclosure type='video/mp4' url='http://www.blogger.com/video-play.mp4?contentId=98f253d9a5084981&amp;type=video%2Fmp4' length='0'/><link>http://biz-ecom.blogspot.com/2008/06/performance-of-computer-systems-and.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGfkTW7XdydI2zHAHvPyzGDSHS_v9an60XvjqmZMG9hdALsqa1ZhzAYn_6OplT68QrIiPH6Zr5YuuSADpn1cugOpMt-PTp3ny8msDg5_41xF2eL4SSMl_gbQESBqv8o6LsPTTpNyOMio/s72-c/6.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-2380287789541527662</guid><pubDate>Fri, 20 Jun 2008 17:31:00 +0000</pubDate><atom:updated>2008-07-14T02:03:30.461-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet security</category><title>Phishing: Examples and its Prevention Methods</title><description>&lt;span style=&quot;color:#6666cc;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Phishing &lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;may refer as brand spoofing or carding. It is a technique used by the social engineering to gain personal information from recipients for the purposes of identity theft through the fraudulent e-mail messages.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeadbFJZtwIWocrOo6viHUZngYsOoCcDWRVl8fNmm9-WgZw7kakRwqUAoD5hVypcmO8e3a0Tpwaz4HJTS3k8DT_kb0HFnSnsPnKN6GOtvwdKVe1cM-j36QXkYS1ajXLzVp1pnpi6JjVTo/s1600-h/1.bmp&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214190433789895234&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeadbFJZtwIWocrOo6viHUZngYsOoCcDWRVl8fNmm9-WgZw7kakRwqUAoD5hVypcmO8e3a0Tpwaz4HJTS3k8DT_kb0HFnSnsPnKN6GOtvwdKVe1cM-j36QXkYS1ajXLzVp1pnpi6JjVTo/s200/1.bmp&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Normally, E-mail of phishing sends to the people who are new to the internet or who are not aware of phishing frauds. These E-mails contain a link that would look like the real link but in fact not. When the users direct click on the link , they are spoof by phishers.&lt;/span&gt;&lt;span style=&quot;color:#ffff33;&quot;&gt; &lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Pay&lt;/span&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Pal&lt;/span&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;e&lt;/span&gt;&lt;span style=&quot;color:#000099;&quot;&gt;B&lt;/span&gt;&lt;span style=&quot;color:#ffff33;&quot;&gt;a&lt;/span&gt;&lt;span style=&quot;color:#009900;&quot;&gt;y&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;, &lt;span style=&quot;font-family:arial;color:#000099;&quot;&gt;&lt;strong&gt;MSN&lt;/strong&gt;&lt;/span&gt;, &lt;strong&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;Yahoo&lt;/span&gt;&lt;/strong&gt;, &lt;strong&gt;Best Buy&lt;/strong&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;and online retail store are often the target of phisher. It may also from anywhere that a person may have to register and supply financial information when register for an account. The link of E-mail may not be obvious to recipients. Thus, those recipients should be careful on not directly click on the links in the E-mail that especially sent by the bank or credit card company. They should call up the company using the listed number provided in the bank statement and not from the phone number provided in the E-mail.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpv1aFKXhBl6AHEzEW7ucKZCYHRhtLqLEzu6RjQNrjTKxSuT6BANFhCNL1y5mFvkOEgNaKxdKijHr6r5jhmJniiXZocpvxZM3jNNGlQWAAskLdJxJMHusVSYy8NjwTmRQFqRTvXE18tHI/s1600-h/untitled.bmp&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214189376374803602&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpv1aFKXhBl6AHEzEW7ucKZCYHRhtLqLEzu6RjQNrjTKxSuT6BANFhCNL1y5mFvkOEgNaKxdKijHr6r5jhmJniiXZocpvxZM3jNNGlQWAAskLdJxJMHusVSYy8NjwTmRQFqRTvXE18tHI/s200/untitled.bmp&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;The phisher may also create fraudulent website to required victim to fill in their details such as their names, bank account number, pin number, credit card number, social security number to register and log in. The appearance of the fraudulent website seemed to be similar to the real website. Thus, visitors may not aware of it. As the result, phisher is able to obtain the secure information from the visitor. Therefore, users should verify the website through the sign from &lt;/span&gt;&lt;a href=&quot;http://www.verisign.com/&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;www.Verisign.com&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;to avoid the possibility of landing on a spoof website.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVp9G-czLgLH3lnWyQR9U__2pIdFtJCKS_sCcqv3t5WQuGyN78cXLoL1o30pGFFf2NxlOz0XiC7pmAvvRZ7lqrQPdOoiySD2MPDwA6P507IyFbyoBvwp-LAxMnikZNAyIF-R6frf6ofpI/s1600-h/untitled.bmp&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214180891767749714&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 153px; CURSOR: hand; HEIGHT: 82px&quot; height=&quot;106&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVp9G-czLgLH3lnWyQR9U__2pIdFtJCKS_sCcqv3t5WQuGyN78cXLoL1o30pGFFf2NxlOz0XiC7pmAvvRZ7lqrQPdOoiySD2MPDwA6P507IyFbyoBvwp-LAxMnikZNAyIF-R6frf6ofpI/s200/untitled.bmp&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Beside that, users may install anti phishing software to protect from frauds and scams by the phishers. Some companies may also use augmenting password logins to prevent the phishing. For example, the Bank of America’s website ID is one of several banks that ask users to select a personal image and display the selected image with any forms that request a password. In addition, users of the bank’s online services are also instructs to enter a password only when they see the image they selected.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Here are some relevent websites and articles:-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.antiphishing.org/&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;http://www.antiphishing.org/&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;http://www.mozilla.org/security/phishing-test.html&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;http://www.mozilla.org/security/phishing-test.html&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;http://www.mailfrontier.com/docs/SurefirePhishingTips.pdf&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;http://www.mailfrontier.com/docs/SurefirePhishingTips.pdf&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/phishing-examples-and-its-prevention.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeadbFJZtwIWocrOo6viHUZngYsOoCcDWRVl8fNmm9-WgZw7kakRwqUAoD5hVypcmO8e3a0Tpwaz4HJTS3k8DT_kb0HFnSnsPnKN6GOtvwdKVe1cM-j36QXkYS1ajXLzVp1pnpi6JjVTo/s72-c/1.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-8928775514141562232</guid><pubDate>Fri, 20 Jun 2008 16:03:00 +0000</pubDate><atom:updated>2008-07-14T02:02:37.890-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet security</category><title>The Threat of Online Security: How Safe Is Our Data?</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQUxbypQWQP88M2-F5QaBQwGgGF6jqwWweZyVCPcS8U0RwhG2MHG9wJVNJURJr8lJvSVQZSohUGBjAxSsVHb5hjyzSCIkKjRdi5X1f_GYSi1TcuzuVzkkGeDryh2P2q8nrr0DNNUS6A4/s1600-h/virus-ch.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214006201964682706&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 159px; CURSOR: hand; HEIGHT: 132px&quot; height=&quot;150&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQUxbypQWQP88M2-F5QaBQwGgGF6jqwWweZyVCPcS8U0RwhG2MHG9wJVNJURJr8lJvSVQZSohUGBjAxSsVHb5hjyzSCIkKjRdi5X1f_GYSi1TcuzuVzkkGeDryh2P2q8nrr0DNNUS6A4/s320/virus-ch.jpg&quot; width=&quot;167&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; Internet has become a critical infrastructure between one another. An individual may use the internet to make their payment while the corporate may use it to deal with their customers or suppliers. Thus, there are a lots personnel and confidential data involved during the transaction.&lt;br /&gt;&lt;br /&gt;In e-commerce, online security always been question by the users especially the rate of threat in online security increased recently. Those threats may refer to malicious codes which are virus, Trojan horses and worms. &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_virus&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Viruses &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;are the best known in the malicious code categories. It is a piece of software code that inserts itself into an operating system in order to propagate it. However, it does not run independently. It required user to move them from one machine to another.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqHoQO_zyceeSh6HyKuZNDR7w5uehCvjMQME7-3rt5xxWJy9PV-DWUoq4fiJmlqlc39YlPiKAxSDOrQMm7poHnWZf0ZzS-_HvXiY0yYXxfLttssRCAMUR5kVJix-lhTF8y1fabpax10gA/s1600-h/trojan-horse-virus.jpg&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214012647842402210&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; height=&quot;133&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqHoQO_zyceeSh6HyKuZNDR7w5uehCvjMQME7-3rt5xxWJy9PV-DWUoq4fiJmlqlc39YlPiKAxSDOrQMm7poHnWZf0ZzS-_HvXiY0yYXxfLttssRCAMUR5kVJix-lhTF8y1fabpax10gA/s200/trojan-horse-virus.jpg&quot; width=&quot;154&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Then,&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://www.webopedia.com/TERM/T/Trojan_horse.html&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Trojan horse&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt; &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;is a program that appears to have a useful function but in fact it contains a hidden function that presents a security risk. It normally will give the attacker some degree of control over the user’s machine. This control allows the attacker to remotely access and commands to the user’s machine. The data that usually targeted by Trojan horse are usernames and passwords. In addition, Trojan horse may also make the user’s machine become part of a Distributed Denial of Service (DDoS) network where they used to attack other users.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.webopedia.com/TERM/w/worm.html&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214017414095513202&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;92&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8bSRQ9s6wDNiYm7xdVIulNJDB4KhTDEzwZACIXFuE8wad2urah8Ed9BPTOC-Z70pl-5FOPja4YKscuyZr-0WSjnZUWEL8KPnD_BiQrvGzi63GECNlBeJi0Fav_4c-91SoSOK4aiauC1E/s200/untitled1.JPG&quot; width=&quot;168&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Worm &lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;is a type of malicious code that runs independently. It consumes resources of its host and it is capable of propagating the complete working version of itself into another machine. This mean once the worm has attacks the machine and take it over, the worm itself will scan for and attack other machine. Thus, there is not human intervention is required to spread a worm across a network. Besides, the entire process only takes seconds or less to spread over thousand of machines.&lt;br /&gt;&lt;br /&gt;In nutshell, proper safeguards should be undertaken by the user to protect their data. They may download antivirus program or any other program to guard against those security problems. &lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Related info:-&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://www.infosecwriters.com/text_resources/pdf/Mal_Codes_in_Depth.pdf&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;http://www.infosecwriters.com/text_resources/pdf/Mal_Codes_in_Depth.pdf&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/threat-of-online-security-how-safe-is.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWQUxbypQWQP88M2-F5QaBQwGgGF6jqwWweZyVCPcS8U0RwhG2MHG9wJVNJURJr8lJvSVQZSohUGBjAxSsVHb5hjyzSCIkKjRdi5X1f_GYSi1TcuzuVzkkGeDryh2P2q8nrr0DNNUS6A4/s72-c/virus-ch.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-7178566257769709730</guid><pubDate>Thu, 12 Jun 2008 15:51:00 +0000</pubDate><atom:updated>2008-07-14T02:10:40.245-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">revenue model</category><title>Identify and Compare the Revenue Model For Goole,Amazon.com and eBay</title><description>&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;strong&gt;Revenue model&lt;/strong&gt; is a description of how the company or an&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/E-commerce&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;E-Commerce&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;project will earn their revenue. Since E-commerce consists of doing business online or electronically, the revenue models are different from the “&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Brick_and_mortar&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;brick and mortar&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;” business.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbg-4wumgw7PtmQfhMYYINw2jhtjhALfssrKjZjRdhEx0wezNg00wtQWM6viCM2sYuYblBBwz2QVU0R6aJpQilsHzPtNprHCAapVrooJz4ZMzqPOKr3TTcxq37XcNczKVMnuJ8smZIuK0/s1600-h/untitled.bmp&quot;&gt;&lt;em&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211023552384517314&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbg-4wumgw7PtmQfhMYYINw2jhtjhALfssrKjZjRdhEx0wezNg00wtQWM6viCM2sYuYblBBwz2QVU0R6aJpQilsHzPtNprHCAapVrooJz4ZMzqPOKr3TTcxq37XcNczKVMnuJ8smZIuK0/s320/untitled.bmp&quot; border=&quot;0&quot; /&gt;&lt;/em&gt;&lt;/a&gt;&lt;a href=&quot;http://www.amazon.com/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Amazon.com&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;is an E-commerce company. They source and sell variety of products worldwide through their retail website. The products categories include books, electronics &amp;amp; computer, sports &amp;amp; outdoors, tools, auto &amp;amp; industrial and other. Thus, it generates revenue from sale. Beside that, it also generates revenue through co-branded credit card agreements and other marketing and promotional services which is online advertising. There are also subscription service for Amazon Prime and other membership program which the consumers have to pay for the subscription fees. Amazon.com also receives commission and per-unit fees from the sellers through Amazon Enterprise Solution which known as affiliate fees.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#33ff33;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSmSmKqnvA81iAIQYPxvEoI4aH856Z-1LZMbMIzopKKa_fCBq2OdOpLLQyErP-d1bHhvgmsyplhzNIxdUiF11XSvt2e6sPE6smiiextE20Jf6EHlPZyII8_ySLJoHchWm4UVU8zBPwKEw/s1600-h/logo_plain.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211023916865860786&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 201px; CURSOR: hand; HEIGHT: 59px&quot; height=&quot;73&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSmSmKqnvA81iAIQYPxvEoI4aH856Z-1LZMbMIzopKKa_fCBq2OdOpLLQyErP-d1bHhvgmsyplhzNIxdUiF11XSvt2e6sPE6smiiextE20Jf6EHlPZyII8_ySLJoHchWm4UVU8zBPwKEw/s320/logo_plain.png&quot; width=&quot;225&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.google.com.my/&quot;&gt;&lt;span style=&quot;font-size:130%;color:#ff0000;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;G&lt;/span&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;color:#ffff00;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;g&lt;/span&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;l&lt;/span&gt;e.com&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;is focused on improving the ways people connect with the information. They maintain the largest and most comprehensive index of websites and other online content in order to make the information freely available to anyone with an internet connection. Thus, Google.com generates their revenue from advertising fee. They enable advertisers to place their display ads on their web sites through &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Google_Adwords&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Google Adwords&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;. &lt;span style=&quot;color:#ccffff;&quot;&gt;Then, they receive payment from their customer base on the&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://www.marketingterms.com/dictionary/cost_per_click/http:/www.marketingterms.com/dictionary/cost_per_click/&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;em&gt;cost per click&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;basis and &lt;/span&gt;&lt;a href=&quot;http://adwords.google.com/support/bin/answer.py?hl=en&amp;amp;answer=18267&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;cost per impression&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;pricing. Google.com also generates their revenue from licensing of their web search technology and the sales and license of other products and services.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf_qGByMRaW5j7nkLZJePwkQuCqL3TPU4PxB2JSxFfUrS6uPbA43v-4Hr1POA4ROZsBA9fyjJVDq9xpods4wkl2wCsWeLsdvaAuIkOOfCwL-BCqDEfckpkJn1ZSSOijJcm_uRPHrVc0_Y/s1600-h/logoEbay_x45.gif&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211024071067460898&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 141px; CURSOR: hand; HEIGHT: 44px&quot; height=&quot;45&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf_qGByMRaW5j7nkLZJePwkQuCqL3TPU4PxB2JSxFfUrS6uPbA43v-4Hr1POA4ROZsBA9fyjJVDq9xpods4wkl2wCsWeLsdvaAuIkOOfCwL-BCqDEfckpkJn1ZSSOijJcm_uRPHrVc0_Y/s320/logoEbay_x45.gif&quot; width=&quot;146&quot; border=&quot;0&quot; /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href=&quot;http://www.ebay.com/&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;e&lt;/span&gt;B&lt;span style=&quot;color:#ffcc00;&quot;&gt;a&lt;/span&gt;&lt;span style=&quot;color:#009900;&quot;&gt;y&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:180%;color:#009900;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;is an online marketplace that provide sale of goods and services, online payments services and online communication offerings to diverse community of individuals and businesses. It provides a virtual space for an ongoing auction. Thus, it revenue model is base on transaction fees. The highest of the transaction incurred through eBay, the more revenue they will generate. This is because eBay earns commission based on either volume of the transactions or the fee per transaction conducted at the website. Beside that, it is also generate revenue from advertising.&lt;br /&gt;&lt;br /&gt;Amazon.com, Google.com and eBay are providing different type of service in E-commerce. Thus, they are having different kind of revenue model. Amazon.com revenues is mainly generate from sale of products and services to customers while Google.com is mainly generate from advertising fees which the advertising revenue had make up to 99% of their revenue. Then, eBay is generally generates revenue from transaction fees which it had make up to 97% of their revenue&lt;/span&gt;&lt;span style=&quot;color:#000000;&quot;&gt;.&lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/identify-and-compare-revenue-model-for.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbg-4wumgw7PtmQfhMYYINw2jhtjhALfssrKjZjRdhEx0wezNg00wtQWM6viCM2sYuYblBBwz2QVU0R6aJpQilsHzPtNprHCAapVrooJz4ZMzqPOKr3TTcxq37XcNczKVMnuJ8smZIuK0/s72-c/untitled.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-2235951457862869668</guid><pubDate>Thu, 12 Jun 2008 15:40:00 +0000</pubDate><atom:updated>2008-07-14T02:10:08.429-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">History</category><title>An Example of an E-commerce Success and its Causes</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgquIPl7njNYsRpL0jtpi50oDAWclrOC9IFwOR0SxfC7AxbVOyMQjzmHEHczE6mF56pk970i_TUuDrRaJwHVZuhKhCtwHtAR8Vk_ANf7u3kGZZWYMnXqrEH5MX-27TwG7K6Mw4J9okF9Yk/s1600-h/2821578240.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222173320617023074&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgquIPl7njNYsRpL0jtpi50oDAWclrOC9IFwOR0SxfC7AxbVOyMQjzmHEHczE6mF56pk970i_TUuDrRaJwHVZuhKhCtwHtAR8Vk_ANf7u3kGZZWYMnXqrEH5MX-27TwG7K6Mw4J9okF9Yk/s200/2821578240.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;E-commerce is a system used to conduct business transactions of buying and selling goods and services over a computer network. There are various strategies for the E-commerce to be success. The strategies reasons for success may focus on the marketing, promotional and product or service strategies of the company.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIbT33R_H_wNCXAFMP93S7gj6rzbng44BtV0tqMbDO-bzpRtMacKuQ7o99L_o4ddlKaPx2kuOAiFgUvEGE34AwU8EhzxaKtP0RuZfBLjWAKt8WHdXadKSrBfe28l6vB9RpsIKWbYX2n7c/s1600-h/untitled.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211020600591059698&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 178px; CURSOR: hand; HEIGHT: 63px&quot; height=&quot;76&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIbT33R_H_wNCXAFMP93S7gj6rzbng44BtV0tqMbDO-bzpRtMacKuQ7o99L_o4ddlKaPx2kuOAiFgUvEGE34AwU8EhzxaKtP0RuZfBLjWAKt8WHdXadKSrBfe28l6vB9RpsIKWbYX2n7c/s320/untitled.bmp&quot; width=&quot;195&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;One of the companies’ &lt;em&gt;&lt;strong&gt;successes in the E-commerce&lt;/strong&gt;&lt;/em&gt; is&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Amazon.com&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ff99ff;&quot;&gt;. &lt;/span&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;It was launched in 1999 which is an online auction house. There are other same kind of retailers emerged in electronic commerce but Amazon.com was success as best know of&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/E-commerce&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;E-commerce&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;despite the highly challenging and competitive environment faced by the E-commerce.&lt;br /&gt;&lt;br /&gt;The cause of success for Amazon.com is because its informative environment is developing with a strong basic of market knowledge that is customer competition. Beside that, a strong communication and persuading relation with each customer is strongly emphasized in Amazon.com. Thus, Amazon.com able to handle the emerging challenges in market and used the advanced tools to &lt;em&gt;overcome those challenges&lt;/em&gt;. At the same time, Amazon.com is able to maintain the balance between the relationship of the company and customer.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhhMgiYB2gjqQ92hkp8lRHNZ4pHqOz86OCuJ0nPhu7p7W4JbNaORJYQkENAU_scNut6xT1T7C9zODLjvv5nccj9QQtXjawU7AyVC3sKewkL7AC5-BtOEavLtES8wFQn5d-JPyGLJ3Cajc/s1600-h/success.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219492432833956642&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhhMgiYB2gjqQ92hkp8lRHNZ4pHqOz86OCuJ0nPhu7p7W4JbNaORJYQkENAU_scNut6xT1T7C9zODLjvv5nccj9QQtXjawU7AyVC3sKewkL7AC5-BtOEavLtES8wFQn5d-JPyGLJ3Cajc/s200/success.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Other than that, Amazon.com governs the internet business with the best marketing techniques such as free shipping of product. It also able anticipates the market position, trends and fulfills the demand of its customers. Therefore, it is the favorite website to most of the users. In addition, it is the only website that contains the web books, business brands and retails on a single web-based business. Thus, Amazon.com does not only leads to sale books but also offer a variety of electronic items as well as gifts, video, music, wireless mobile phones, kitchen utensils, health and fitness, automobile, house holds, software, hardware and other. As the result, its items are suitable for all stage of people.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXGIxy5a_ap36JIf-pmfpxU_ecjU8HBmFJd4jgaxFRVwgUOy4e8_tO70O9MYaXtgstuUIpEmU5O2G0PpeNF2Z-9rMXEeS03VqljyGe4_9WJ7KqZXry1OvuoTWrrY88Aw4HYvxhEBZwKQ/s1600-h/2920378331.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222173497509056610&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAXGIxy5a_ap36JIf-pmfpxU_ecjU8HBmFJd4jgaxFRVwgUOy4e8_tO70O9MYaXtgstuUIpEmU5O2G0PpeNF2Z-9rMXEeS03VqljyGe4_9WJ7KqZXry1OvuoTWrrY88Aw4HYvxhEBZwKQ/s200/2920378331.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Beside that, Amazon.com continues to invest in the several areas of technology which including the seller platforms, web services and digital initiatives. It is because they want to improve their E-commerce process efficiency and support their infrastructure web service so that the server would not down when too much people visit the website.&lt;br /&gt;&lt;br /&gt;In the nutshell, clarify the company key objectives as well as &lt;em&gt;effective coordination in the operation&lt;/em&gt; is important for Amazon.com to sustain huge business benefits and success in E-commerce. &lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/example-of-e-commerce-success-and-its.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgquIPl7njNYsRpL0jtpi50oDAWclrOC9IFwOR0SxfC7AxbVOyMQjzmHEHczE6mF56pk970i_TUuDrRaJwHVZuhKhCtwHtAR8Vk_ANf7u3kGZZWYMnXqrEH5MX-27TwG7K6Mw4J9okF9Yk/s72-c/2821578240.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-6230743165011693248</guid><pubDate>Thu, 12 Jun 2008 15:31:00 +0000</pubDate><atom:updated>2008-07-14T02:11:15.947-07:00</atom:updated><title>Discuss How E-commerce Can Reduce Cycle Time, Prove employees&#39; Empowerment and Facilitate Customer Support</title><description>&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Nowadays,&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/E-commerce&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;E-commerce&lt;/strong&gt;&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;has become an &lt;em&gt;integral part&lt;/em&gt; in development of the commercial. It reduces the cycle time, improve employees’ empowerment as well as facilitate customer support.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSy2t9MXMQkxYLbW8mi11xb482gk_KcbT6hyF8IM-LVfios6AwHK5jI50oS9N3oVy6yUEssULS3oo-nYrsyuXDPHLJQ1oM0_3wck3AptiKNiPUddpgSYpb5RCT1kYhGvwCRQ74KW4cnms/s1600-h/cycle+work.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219496135597308546&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSy2t9MXMQkxYLbW8mi11xb482gk_KcbT6hyF8IM-LVfios6AwHK5jI50oS9N3oVy6yUEssULS3oo-nYrsyuXDPHLJQ1oM0_3wck3AptiKNiPUddpgSYpb5RCT1kYhGvwCRQ74KW4cnms/s200/cycle+work.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Let us have a look at the aspect of the reduction of cycle time through the use of E-commerce. Cycle time is the total time that a customer placing an order and receiving the goods or services. &lt;em&gt;&lt;strong&gt;Traditionally&lt;/strong&gt;&lt;/em&gt;, the company has to pass through manufacturer and retailer before the goods reach to the customers. It is time consumed. However, the existence of E-commerce has speeded up the process of receiving orders and shortens the time to deliver goods or services to the customer. It reduces the cycle time by eliminating the steps in the business process. Thus, the company is able to offer the delivery time that are better than the competitors and increase the competitive advantage in the global.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRMYNiE6lHSndYjrY2LstfHnhOEuGyKVev2-Vob5FWwoplcNmTQgBu5Ip3lvPbBwNY81DiOuOkMocD201uNFw-Go7HV-7T6rMvnqDAUoxU3NUUDT2nBGhm5hcxXa61beohPMeyGghRMdc/s1600-h/empowerment.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219496135498107042&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRMYNiE6lHSndYjrY2LstfHnhOEuGyKVev2-Vob5FWwoplcNmTQgBu5Ip3lvPbBwNY81DiOuOkMocD201uNFw-Go7HV-7T6rMvnqDAUoxU3NUUDT2nBGhm5hcxXa61beohPMeyGghRMdc/s200/empowerment.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Then, employees are having greater accountability through the use of E-commerce. Thus, the company improves their empowerment in order for them to access into the information that related to the product or company more easily. This is because employees have to face various complex inquiries from the on-line customers or potential customers. Hence, they often have to obtain information from the company database. However, they are restricted to alter any information without proper permission. For example, when customers do the online shopping, they will have some queries in their mind before placing the orders. Therefore, they will call to the contact centre. Employees with greater empowerment can solve the customers’ problems immediately with the available real-time information. It can also ensure the consistency of information across the channels and help to boost up the sales.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhyOK28RTNU4KVBt_DwPbPIRx8KtunfgQdieRgrD91qjoocwPIkp7ewCiAH4wYF4dFFiXL4iw-b7W70r0IfNAKVleTsBc5n2QWbxsfoV-OtdVXiTiRnHN0lM0k_Iz_hL62CWVacWgYaVA/s1600-h/customer+support.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219496135649560498&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhyOK28RTNU4KVBt_DwPbPIRx8KtunfgQdieRgrD91qjoocwPIkp7ewCiAH4wYF4dFFiXL4iw-b7W70r0IfNAKVleTsBc5n2QWbxsfoV-OtdVXiTiRnHN0lM0k_Iz_hL62CWVacWgYaVA/s200/customer+support.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Last but not least, E-commerce can used to facilitate the customer support. E-commerce improves and enhanced customer relationship by providing a broad range of technological solutions and the communication opportunities. In additional, customer support is available 24 hours. Thus, the customerswill get assist when they confront with any problem. As the result, it will &lt;em&gt;increase the customer satisfaction&lt;/em&gt;. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#ffffff;&quot;&gt;&lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/discuss-how-e-commerce-can-reduce-cycle.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSy2t9MXMQkxYLbW8mi11xb482gk_KcbT6hyF8IM-LVfios6AwHK5jI50oS9N3oVy6yUEssULS3oo-nYrsyuXDPHLJQ1oM0_3wck3AptiKNiPUddpgSYpb5RCT1kYhGvwCRQ74KW4cnms/s72-c/cycle+work.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-3078358342230628854</guid><pubDate>Thu, 12 Jun 2008 15:09:00 +0000</pubDate><atom:updated>2008-07-14T02:21:13.174-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">History</category><title>An Example of an E-commere Failure and its Causes</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilE9P6nxkhICIfF534ztfkM-O7ISAWXY1Oo46hEuUwsPy140AAIEbjhdNBaycE4eK1tbu2n53a0ZLxIqN3VFmG3w3g1a5TSJoLxBbqVFw5ny9tFXyAzrE_nRGytOpt9fYlWoG-K4iHB-w/s1600-h/4269071418.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222167546843313890&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;91&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilE9P6nxkhICIfF534ztfkM-O7ISAWXY1Oo46hEuUwsPy140AAIEbjhdNBaycE4eK1tbu2n53a0ZLxIqN3VFmG3w3g1a5TSJoLxBbqVFw5ny9tFXyAzrE_nRGytOpt9fYlWoG-K4iHB-w/s200/4269071418.jpg&quot; width=&quot;96&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Many newly formed&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Dotcom_companies&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;DotCom companies&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;around the world &lt;span style=&quot;font-size:130%;&quot;&gt;failed in year 2000&lt;/span&gt;. This is because the market with similar products or services has created intense competition among themselves. The &lt;em&gt;causes of failure&lt;/em&gt; can be separated into &lt;em&gt;controllable and uncontrollable causes&lt;/em&gt;. The controllable causes can be further divided into strategic, operational and technical &lt;em&gt;causes&lt;/em&gt; while uncontrollable can be divided into technical and behavioral causes.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgglxF8cLKWRB20osXxFSibP_cSmG7wGG1FNo4igYP7_RlqudSW_mIAk-pAb_Q6yzH8HgAWPyRthvY1cmQy9D7xzngE5ZzZ_B5XIgHi3K5ob_NrEjfjTOaO_orr1meo1_YK_umuT5GrEtE/s1600-h/HomepageLogo.gif&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgglxF8cLKWRB20osXxFSibP_cSmG7wGG1FNo4igYP7_RlqudSW_mIAk-pAb_Q6yzH8HgAWPyRthvY1cmQy9D7xzngE5ZzZ_B5XIgHi3K5ob_NrEjfjTOaO_orr1meo1_YK_umuT5GrEtE/s1600-h/HomepageLogo.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211012825022194066&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgglxF8cLKWRB20osXxFSibP_cSmG7wGG1FNo4igYP7_RlqudSW_mIAk-pAb_Q6yzH8HgAWPyRthvY1cmQy9D7xzngE5ZzZ_B5XIgHi3K5ob_NrEjfjTOaO_orr1meo1_YK_umuT5GrEtE/s320/HomepageLogo.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.furniture.com/default.aspx?se=633488632269856250&quot;&gt;&lt;span style=&quot;font-size:130%;color:#3333ff;&quot;&gt;&lt;em&gt;&lt;strong&gt;Furniture.com&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;is one of the example of an E-commerce failure. It was a company that sold furniture and other household amenities online. Under controllable causes, Furniture.com failed to make the optimum decision as the entrepreneurs lacked a clear understanding of business fundamental in the areas of finance, marketing, distribution, inventory and other. As a result, Furniture.com had &lt;/span&gt;&lt;em&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;insufficient back-end operations to support front-end demands.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhqhvw1Y9x0WycsZEo6R3eqvgQTc2Argv2XlheH0vQ1hhCohPa3_NosjV18ilJ1K2s3z7Br1b1XjRYwbMM-Jf2tig3S9Fo6bR12nb2LNDVEPXIUwf1sU23AZAv4NK8dUddGhmwjvz8Uc/s1600-h/failure.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219496828429878434&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhqhvw1Y9x0WycsZEo6R3eqvgQTc2Argv2XlheH0vQ1hhCohPa3_NosjV18ilJ1K2s3z7Br1b1XjRYwbMM-Jf2tig3S9Fo6bR12nb2LNDVEPXIUwf1sU23AZAv4NK8dUddGhmwjvz8Uc/s200/failure.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Beside that, Furniture.com was wrongly focused on spending pattern to support or initiate high growth. Thus, they had overspent on marketing and IT infrastructure in an attempt to grow quickly. As the result, it did not pay proper attention to the product differentiation, product quality and back-end infrastructure to support front-end sales and after-sales services. Finally, it &lt;em&gt;suffers a huge loss&lt;/em&gt;. For example, according to Securities and Exchange Commission documents filed by Furniture.com, the company generated revenue of $10.9 million in 1999 &lt;span style=&quot;font-size:130%;&quot;&gt;but&lt;/span&gt; loss $46 million because it spent $33.9 million on sales and marketing which was three times the cost of product development, general and administrative expenses combined.&lt;br /&gt;&lt;br /&gt;Then, delivery system in Furniture.com is slow. This is under operational cause which the business mainly closed due to its&lt;em&gt; logistics problems&lt;/em&gt;. In addition, it often sent the wrong products which resulted in paying extra cost for pick-ups, refunds and reordering. Furthermore, Furniture.com often do not turn up their promised. Hence, &lt;em&gt;shoppers felt irritating and turning them away from the company’s business. &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Other than that, server down is the technical cause that makes Furniture.com failed. The web servers often run with interruption. Long server down time in Furniture.com cause the customers quickly lose their interest when they visit the website.&lt;br /&gt;&lt;br /&gt;As the result, an E-commerce company must be aware of their delivery and server services. Then, the entrepeneur should have the fundamental knowledge of business in order to manage the company well and sustain in the E-commerce.&lt;/span&gt;&lt;span style=&quot;color:#33ffff;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#33ffff;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#33ffff;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/example-of-e-commerce-failure-and-its.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilE9P6nxkhICIfF534ztfkM-O7ISAWXY1Oo46hEuUwsPy140AAIEbjhdNBaycE4eK1tbu2n53a0ZLxIqN3VFmG3w3g1a5TSJoLxBbqVFw5ny9tFXyAzrE_nRGytOpt9fYlWoG-K4iHB-w/s72-c/4269071418.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-1612173102480932471</guid><pubDate>Thu, 12 Jun 2008 14:56:00 +0000</pubDate><atom:updated>2008-07-14T02:23:41.877-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">History</category><title>The History and Evolution of E-commerce</title><description>&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219497544720668754&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgXN3FHf5bEGDhnHZXLRSYmmqAaU0FkzEpNGCehUaeQgn4X9sOJMYR50UT8cukczCz0ZMekJkPOVmqsNrwBUKmKyUrmg66zuqwu29qjTRNexrQWpd5jlrYRiWULEze0kbuL6JQYbHXOGg/s200/ecom.jpg&quot; border=&quot;0&quot; /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;a href=&quot;http://wiki.media-culture.org.au/index.php/E-Commerce&quot;&gt;&lt;span style=&quot;font-size:130%;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Electronic commerc&lt;span style=&quot;color:#3333ff;&quot;&gt;e&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;&lt;em&gt;(E-commerce)&lt;/em&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;/strong&gt;&lt;/span&gt; is a process of buying and selling products or services or information over the computer networks. It is a technology mediated exchange between an individuals or organizations. Before the e-commerce being developed, it has been gone through several steps of &lt;/span&gt;&lt;a href=&quot;http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/history.htm&quot;&gt;&lt;span style=&quot;font-size:130%;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;development and evolution&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;.&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Initially, there are not much people having computer. Thus, only cash, check &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgygzgDIr17471mNQe9PRlVW-iAl7NPFY3-vMghLQ60fL5FJoRE4GAoo6IwALKzq1gG_HH1QfTBORa0WCbNKCGbqq_frhnvaw2Pdjezdc5wARRCofSboWCx6AR2vLBO86IYIuO441uLHVo/s1600-h/3732127707.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222166336608253298&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgygzgDIr17471mNQe9PRlVW-iAl7NPFY3-vMghLQ60fL5FJoRE4GAoo6IwALKzq1gG_HH1QfTBORa0WCbNKCGbqq_frhnvaw2Pdjezdc5wARRCofSboWCx6AR2vLBO86IYIuO441uLHVo/s200/3732127707.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;and credit card being used in the daily transaction. E-commerce was started in the early 1970s which allows organizations to transfer funds between one another electronically. Then, &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Electronic_Data_Interchange&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Electronic Data Interchange&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt; (EDI)&lt;/span&gt;&lt;/em&gt; &lt;/strong&gt;has been developed to exchange&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; the business information and do electronic transactions. However, most of the company still unable to interact with each other as there was several different EDI formats that a business could use. Beside that, it is costly and complex to administer for the small business. Thus, EDI not widely accepted. &lt;strong&gt;ASC X12&lt;/strong&gt; standard has been introduced in 1984. It is more stable and reliable in transferring large amounts of transactions.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;In &lt;strong&gt;1992&lt;/strong&gt;, the&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Mosaic_(web_browser)&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Mosaic web-browser&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;was made available. It was the first ‘point and click’ browser. After that, Mosaic browser was adapted into a downloadable browser,&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Netscape&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Netscape&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt; &lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;which allow access to E-commerce easily. It &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWPNTPHHp9Y4oWabcluuNKpRNevW7Ch5LNe_GB1xKJYSut47mYCCUDhBRsdH2T9lPYqe2y4ByRRnUXh9Gca3jfkLKUL6LKMLxMcj_bm8UMv-ueSrzhyphenhyphenTp4XTMIuInh5OBkV59o6lnVEso/s1600-h/netscape.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219498162820216642&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWPNTPHHp9Y4oWabcluuNKpRNevW7Ch5LNe_GB1xKJYSut47mYCCUDhBRsdH2T9lPYqe2y4ByRRnUXh9Gca3jfkLKUL6LKMLxMcj_bm8UMv-ueSrzhyphenhyphenTp4XTMIuInh5OBkV59o6lnVEso/s200/netscape.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;provides the users a simple browser to surf the Internet and a safe online transaction technology known as Secure Sockets Layer. &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Amazon.com&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;http://www.ebay.com/&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;eBay&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; were then launched.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/DSL&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;Digital Subscriber Line&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt; (DSL)&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;which was another development of E-commerce after that moment. It allowed quicker access and persistent connection to the internet. This has encouraged people to spend more time online. Then, another major step in E-commerce growth was the&lt;/span&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;em&gt; &lt;/em&gt;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Red_Hat_Linux&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Red Hat Linux&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;. &lt;span style=&quot;color:#ccffff;&quot;&gt;It has given the users another choice in a platform other then Windows.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXjLySN2-NtM7xiByMqid9FDm3bzDABor_jroPjr_R30izwgmaG8IFTi674dHMOn3eNdUCOAQfiRZjrcsvQ3AKaO8bw3eTpLbAhVR0Z7_5Nye61Sxg7eJGoj4ASDBDpWe_1glpQk2Vu6A/s1600-h/his.jpg&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5219497544502102898&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXjLySN2-NtM7xiByMqid9FDm3bzDABor_jroPjr_R30izwgmaG8IFTi674dHMOn3eNdUCOAQfiRZjrcsvQ3AKaO8bw3eTpLbAhVR0Z7_5Nye61Sxg7eJGoj4ASDBDpWe_1glpQk2Vu6A/s200/his.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;br /&gt;Other than that,&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/AOL&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;AOL&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt; &lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;(known as online software suite) and Napster were also the major development of the E-commerce. In early 2000, AOL and Time Warner merge and they push for the E-commerce. At that time, many people start to make transaction through E-commerce. This is because people are educated and the living standard has been increase. Hence, more people own computer. Beside that, it is more convenient as the users’ only need to sit at home and all the transaction can be done.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;Nowadays&lt;/strong&gt;,&lt;/span&gt; the largest E-commerce is Business to Business (B2Ba). This form of E-commerce had around $700 billion transactions in 2001 by selling their goods to other businesses. It has increase from year to year. The other forms of E-commerce which are growing include Consumer to Consumer (C2C) and Peer to Peer (P2P). &lt;strong&gt;In future&lt;/strong&gt;, there will be more and more people and organization using E-commerce as technology become more advance.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/history-and-evolution-of-e-commerce.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgXN3FHf5bEGDhnHZXLRSYmmqAaU0FkzEpNGCehUaeQgn4X9sOJMYR50UT8cukczCz0ZMekJkPOVmqsNrwBUKmKyUrmg66zuqwu29qjTRNexrQWpd5jlrYRiWULEze0kbuL6JQYbHXOGg/s72-c/ecom.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-4565571639834499304</guid><pubDate>Wed, 04 Jun 2008 11:15:00 +0000</pubDate><atom:updated>2008-07-14T02:25:22.183-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">introduction</category><title>Chee Ling</title><description>&lt;span style=&quot;color:#ccffff;&quot;&gt;Sometimes it is hard to introduce yourself because you know yourself so well that you do not know where to start with. Let me give a try to see what kind of image you have about me through my impression about myself and your impression about me are not so different. Here it &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBPoC7zkzehANrUiud2Sm7cFw_4OKGS5hNdZHOAdittOystPCBsN7KPm-Eefb5WNmQm7cNALQ_YU350RXW7rUbw-cvlI-8oalXYsFby9kEuyks5jpEhtYQayu36YPHKShi78y-VY94U0/s1600-h/cheryl1.JPG&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211028370454616130&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBPoC7zkzehANrUiud2Sm7cFw_4OKGS5hNdZHOAdittOystPCBsN7KPm-Eefb5WNmQm7cNALQ_YU350RXW7rUbw-cvlI-8oalXYsFby9kEuyks5jpEhtYQayu36YPHKShi78y-VY94U0/s320/cheryl1.JPG&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;goes.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;My name is &lt;span style=&quot;font-size:180%;&quot;&gt;&lt;strong&gt;Chee Ling&lt;/strong&gt;&lt;/span&gt;. The name gave by my dad who got it when he saw a gecko. &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-Nm_iZd2EeQRqeP8z5V70N0u7QAlbrwVurS8PvjZ4bVrrCPwKAClNwH4TVJRilAM9a6BZq_K4kyLs2SBX2fF0yG15NeZrTsrXuqZV3-xMOV8kGD4wVsvqBHl0dDHEfHHVfsHA0yApkxE/s1600-h/cheryl1.JPG&quot;&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;This is because gecko in Hockkien is known as “cheeling”. My dad is a conservative people and does not studies much. Therefore, he just gave a name on that moment.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;I am a person who is positive about every aspect of life. There are many things I like to do, to see, and to experience. My favorite things to do are reading and collecting books. So, I like to go to bookshop and finding the books that I want to collect. Then, I will go to Starbuck to have a cup of coffee and read the book. Sometimes, it takes me two hours or more. I wanted to be producer but I realize that I don’t have much talent on writing the stories. But I like to imagine. I like to take pictures and chat on the internet. There are several website which are my favorite as they enable me to get more knowledge and meet new friends.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJjkXN7eLzHhM5mwVpJeDHYwSAbg0I9AdzKNhzqsEgB7yHTZACECGtSUNTYpy5g4aDBVyNXblVK-PM5Nti0HL_VUX7eL2933c12tvFhJCl_zz79j8KdA7AlvhahOVCjzQhC5epjg2lPVA/s1600-h/friendster_nav_logo.png&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211027609056782562&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 144px; CURSOR: hand; HEIGHT: 39px&quot; height=&quot;56&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJjkXN7eLzHhM5mwVpJeDHYwSAbg0I9AdzKNhzqsEgB7yHTZACECGtSUNTYpy5g4aDBVyNXblVK-PM5Nti0HL_VUX7eL2933c12tvFhJCl_zz79j8KdA7AlvhahOVCjzQhC5epjg2lPVA/s320/friendster_nav_logo.png&quot; width=&quot;164&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;My favorite website will be&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://www.friendster.com/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#999999;&quot;&gt;&lt;strong&gt;&lt;em&gt;www.friendster.com&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;.&lt;span style=&quot;color:#ccffff;&quot;&gt; It is a personal network site which has grown to its current size by creating permission-based individual networks of friends and acquaintances through which members can trade messages, view each other’s home pages and write testimonials. Besides that, it allows us to upload new photos and add new friends in our own group. There are also users who used the website for dating purposes.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Other than that, my internet activities will be visiting&lt;/span&gt;&lt;em&gt; &lt;/em&gt;&lt;/span&gt;&lt;a href=&quot;http://www.google.com.my/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#000000;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;G&lt;/span&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;color:#ffff66;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;g&lt;/span&gt;&lt;span style=&quot;color:#009900;&quot;&gt;l&lt;/span&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;e&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;.&lt;span style=&quot;color:#ccffff;&quot;&gt;This is because this website provided a lot of service such as web research, display advertising, e-mail, interactive advertising and other. Web research makes us easy to look for the information from thousand websites in the net. However, thing that attract me the most is the large space mailbox which is available to sign up for free.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKRFj4-96BewFyRgAwOgvUkL41eDf5Cd-5g_SaWZq1MhMPjWEyxRv6cHDYS-e8kqFqW6QOzQsYIe0myErjQeZeAEU7WzAlRnVIp4rMaOPVFPDo3O8y_TfYRpjAQy4Y8peW7By86eHVLyo/s1600-h/cari.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211026982872210114&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKRFj4-96BewFyRgAwOgvUkL41eDf5Cd-5g_SaWZq1MhMPjWEyxRv6cHDYS-e8kqFqW6QOzQsYIe0myErjQeZeAEU7WzAlRnVIp4rMaOPVFPDo3O8y_TfYRpjAQy4Y8peW7By86eHVLyo/s320/cari.bmp&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;I also will visit&lt;/span&gt; &lt;/span&gt;&lt;a href=&quot;http://eforum.cari.com.my/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#999999;&quot;&gt;&lt;strong&gt;&lt;em&gt;Cari Forum&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt; Cari forum is probably a website for us to exchange our ideas and information with the people around the world. The discussion in the forum is very wide. The topic may from lawn mowers to animal husbandry and everything in between. There are many unique ideas come out of these open discussions.&lt;br /&gt;&lt;br /&gt;Beside that&lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;,&lt;/span&gt; &lt;span style=&quot;font-size:180%;color:#ff0000;&quot;&gt;&lt;em&gt;e&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;a href=&quot;http://www.ebay.com/&quot;&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;B&lt;/span&gt;&lt;span style=&quot;color:#ffff00;&quot;&gt;a&lt;/span&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;y&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;is a famous online shopping in the net. Many categories were provided to meet the need of consumers. Therefore, consumers can access the Internet about products as well as purchase them at any hour and any day. I often visit this website to buy goods.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.tudou.com/&quot;&gt;&lt;span style=&quot;font-size:180%;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;www.tudou.com&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;is a website that allows us to load the drama and movie to &lt;strong&gt;watch for free&lt;/strong&gt;. Hong Kong, Korea, Taiwan and Chinese’s video are available over this website. We also can register to be member in order to load the video more easily.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/chee-ling.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSBPoC7zkzehANrUiud2Sm7cFw_4OKGS5hNdZHOAdittOystPCBsN7KPm-Eefb5WNmQm7cNALQ_YU350RXW7rUbw-cvlI-8oalXYsFby9kEuyks5jpEhtYQayu36YPHKShi78y-VY94U0/s72-c/cheryl1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-608402436617286445.post-3111327847286460755</guid><pubDate>Wed, 04 Jun 2008 11:01:00 +0000</pubDate><atom:updated>2008-07-14T02:26:57.322-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">introduction</category><title>Yin Wen</title><description>&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5207982333139955778&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDoIzHZBMwonX-yu1IrGeF1cptxFRjd4Rdv4MlpRMUHB_0gaO7KjjeabavuzmXEAK0X6VdFMYJ_YT6iYRQYwf7vF5T8pyfn3Gtr3eePF4rdRAKvxI229SaArNrHFfamwBHbnAdW5M3SW4/s320/yinwen.JPG&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Let me briefly introduce about myself over here. I am an extrovert and friendly girl. My name is &lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;Yin Wen&lt;/strong&gt;&lt;/span&gt; who is now 21 years old. Currently, I am pursuing a Degree Course in University Tunku Abdul Rahman(UTAR) that is located at Sungai Long. During my free time, I like to surf internet. Traveling is also one of my hobbies. Whenever I have the time and extra money, I will travel around with my friends or family. This is because traveling enables us to enjoy our life and relax our mind from the hectic pace of the city life.&lt;br /&gt;&lt;br /&gt;Since I like surfing the internet, my main internet activity will be chatting with my friends through messenger. This is because most of my friends have been further their studies outstations or overseas. Thus, messenger will be the best way for us to keep in touch with one another. Besides that, I am also trading Forex during my free time. I read articles and news through the internet as there is much information available and quite up-to-date. This enables me to enhance my knowledge. Then, I will play on-line game when I feel stress as all works no play make Jack a dull boy. Other than that, my internet activity will be listening to the music.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbxYrFpTnPEZmCltTp8xxcm8ixzT0CpSekpeHClVQrQHfdse1DDQya6V1CsbeDRUH-MssoKbp0EqhzS8nKoWT6sJBpue0IOxP-kTmmXFbUhLpSy9xW6fSzWccECwhRcKIyyhZY2GhTEe8/s1600-h/logo_plain.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222162331656324210&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbxYrFpTnPEZmCltTp8xxcm8ixzT0CpSekpeHClVQrQHfdse1DDQya6V1CsbeDRUH-MssoKbp0EqhzS8nKoWT6sJBpue0IOxP-kTmmXFbUhLpSy9xW6fSzWccECwhRcKIyyhZY2GhTEe8/s200/logo_plain.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Normally, I will visit&lt;/span&gt; &lt;a href=&quot;http://www.google.com/&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;em&gt;&lt;strong&gt;www.g&lt;span style=&quot;color:#ff0000;&quot;&gt;o&lt;/span&gt;&lt;span style=&quot;color:#ffff66;&quot;&gt;o&lt;/span&gt;g&lt;span style=&quot;color:#33ff33;&quot;&gt;l&lt;/span&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;e&lt;/span&gt;.com&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/a&gt; and &lt;a href=&quot;http://www.yahoo.com/&quot;&gt;&lt;span style=&quot;font-size:130%;color:#ff0000;&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;http://www.&lt;/span&gt;yahoo&lt;span style=&quot;color:#cc66cc;&quot;&gt;.com/&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;to search for information and articles that &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_G6EtsLaPsqXxW5a_5VFV_AeGyFGCZeWzUYfi5ZbbIVzEwCzdU_T64vHjCItBbT06WyTURjz6MuIKUg3hc1owCVvtreCdkNhADstUQkIOpqb7HwDxDhE9L1qZa60lMRmG-gCkHuwnS0E/s1600-h/y3.gif&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222162425115441922&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_G6EtsLaPsqXxW5a_5VFV_AeGyFGCZeWzUYfi5ZbbIVzEwCzdU_T64vHjCItBbT06WyTURjz6MuIKUg3hc1owCVvtreCdkNhADstUQkIOpqb7HwDxDhE9L1qZa60lMRmG-gCkHuwnS0E/s200/y3.gif&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;I need to complete my assignment. This is because these two websites are among the largest search engines in the world. It can assist me to search for the information within a short period. Besides that, these two websites also offer a lot of services for the users. For example, the google website provides users to get a quick access to a wide range on the music information. It is favorable to me as I love music. While in the yahoo website, it offers services such as messenger for the users. With messenger, I can communicate with my friends around the world without have to pay for it.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicrX1SgzFNS3oRWtySCvXnbIDXnabyvl31r2MKQou8dlYh9yGeAdxfel6Kx3N067cRR1gwty3OdgcBHf7hh3fuEnYfg2WYRpLZUjsaOnxEfIH6sGbdUIIFvdUeaxRO2nBKXaSRUBNFLWY/s1600-h/friendster_nav_logo.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222163323583722466&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; height=&quot;43&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicrX1SgzFNS3oRWtySCvXnbIDXnabyvl31r2MKQou8dlYh9yGeAdxfel6Kx3N067cRR1gwty3OdgcBHf7hh3fuEnYfg2WYRpLZUjsaOnxEfIH6sGbdUIIFvdUeaxRO2nBKXaSRUBNFLWY/s200/friendster_nav_logo.png&quot; width=&quot;167&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;Other than that, I also visit&lt;/span&gt; &lt;a href=&quot;http://www.friendster.com/&quot;&gt;&lt;span style=&quot;font-size:130%;color:#ccccff;&quot;&gt;&lt;strong&gt;&lt;em&gt;http://www.friendster.com/&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;website. This website is for us to meet more friends that are not only within Malaysia but also from other countries. Thus, I am able to know more about the culture of other countries by having friends with different nation. At the same time, this website also allows me to share my photos with my friends and receive or write testimonials to them.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifYKQy7oBPXu9jANGRyYTvuLvOxLqPhZvzSnp5bfFiPfPZ1PMcMfgiMh3zdyzNnUXsR4GzNUlmFzflhI_hNCWCSJMomXKPqY0XDJdJhyphenhyphenfMxK1YH4-rHyAuWyS-bVZsQR4unz6gk-YT1D8/s1600-h/dailyfx-logo.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222163188892658914&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifYKQy7oBPXu9jANGRyYTvuLvOxLqPhZvzSnp5bfFiPfPZ1PMcMfgiMh3zdyzNnUXsR4GzNUlmFzflhI_hNCWCSJMomXKPqY0XDJdJhyphenhyphenfMxK1YH4-rHyAuWyS-bVZsQR4unz6gk-YT1D8/s200/dailyfx-logo.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.dailyfx.com/&quot;&gt;&lt;span style=&quot;font-size:130%;color:#3366ff;&quot;&gt;&lt;strong&gt;&lt;em&gt;http://www.dailyfx.com/&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;and&lt;/span&gt; &lt;a href=&quot;http://www.crownforex.com/&quot;&gt;&lt;span style=&quot;font-size:130%;color:#3333ff;&quot;&gt;&lt;em&gt;http://www.crownforex.com/&lt;/em&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;color:#ccffff;&quot;&gt;are also the websites that I often visit in the internet. These two websites are about the foreign exchange market. It provides the latest news on the current market position. All the information is up-dated immediately in the website. Any changes in the market price are shown in these websites. There are also &lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFP_rQonamIcvJhOQBYvhwe_69vw6QwHDhkwmb43XuRWs4eJuy3wtc2lF3jDwzTE2Akwffqm3ZTfm2SyFn_ReuVZTz1bfgk1g26vo-aaKk6v7PwfSEF8Y_VV0lWBFZeReeJPjXagHw-14/s1600-h/crownforex.bmp&quot;&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5222163762490494306&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFP_rQonamIcvJhOQBYvhwe_69vw6QwHDhkwmb43XuRWs4eJuy3wtc2lF3jDwzTE2Akwffqm3ZTfm2SyFn_ReuVZTz1bfgk1g26vo-aaKk6v7PwfSEF8Y_VV0lWBFZeReeJPjXagHw-14/s200/crownforex.bmp&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#ccffff;&quot;&gt;some analyses about the market by the experts. Therefore, I am able to analyze the current market position based on the information provided.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://biz-ecom.blogspot.com/2008/06/clever-and-smart-assignments-leader.html</link><author>noreply@blogger.com (Biz-cOm)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDoIzHZBMwonX-yu1IrGeF1cptxFRjd4Rdv4MlpRMUHB_0gaO7KjjeabavuzmXEAK0X6VdFMYJ_YT6iYRQYwf7vF5T8pyfn3Gtr3eePF4rdRAKvxI229SaArNrHFfamwBHbnAdW5M3SW4/s72-c/yinwen.JPG" height="72" width="72"/><thr:total>1</thr:total></item></channel></rss>