Wednesday, March 31, 2010

Akta Keselamatan & Kesihatan Pekerja 1994 (Akta 514) - En. Syafie Jamian

Semua pihak bertanggungjawab terhadap keselamatan dan kesihatan, ia adalah tangungjawab bersama, pihak majikan dan pekerja perlu bersama-sama menjaga keselamatan dan kesihatan. Pihak majikan dan pekerja mempunyai obligasi masing-masing terhadap keselamatan dan kesihatan.

Projek pembangunan yang kosnya lebih daripada 20 Juta ke atas perlu mempunyai SHO(Safety Health Officer). Setiap majikan perlu menubuhkan Jawatankuasa Keselamatan dan Kesihatan di tempat kerja, UiTM telah menubuhkan Jawatankuasa ini di semua Bahagian,Fakulti,Jabatan, Unit dan sebagainya untuk memastikan hal-hal berkaitan keselamatan dan kesihatan terpelihara. Menjadi tanggungjawab bagi S.O (Site Officer) sesuatu projek membuat teguran kepada kontraktor jika pekerjaa kontraktor tersebut tidak menggunakan peralatan pelindungan peribadi seperti kasut keselamatan, topi keselamatan dan sebagainya.

Keperluan Pengursan Fail & Rekod - Bahagian Arkib

Keperluan Pengurusan Fail dan Rekod
  1. Buku daftar surat masuk
  2. Buku daftar surat keluar
  3. Buku daftar masuk surat terperingkat - 4 jenis (a) Terhad (b) Sulit (c) Rahsia (d) Rahsia besar
  4. Memo ketua jabataan - hanya digunakan oleh Ketua Jabatan Sahaja
  5. Borang daftar pengkelasan surat terperingkat
  6. Borang daftar pengkelasan semua surat terperingkat
  7. Senarai fail jabatan
  8. buku panduan pelaksanaan fail klasifikasi perkara
  9. Buku panduan pengurusan rekod UiTM
  10. Panduan pengurusan rekod UiTM
  11. Pek. Pkh Bil. 5 Tahun 2007 - Panduan Pengurusan Pejabat
  12. Surat Pekeliling Am Sulit Bil. 1/93
  13. Bilik Fail
  14. Kabinet fail terbuka
  15. Kabinet fail terperingkat (Peti besi keluli)
  16. Kerani fail/rekod
  17. Borang pemisah rekod
  18. Borang penilaian rekod
  19. Borang pelupusan rekod (homogeneous)
  20. Senarai pemindahan rekod
  21. Kertas minit
  22. Kad keluar fail
  23. Penggunaan kulit fail (a) Rahsia Besar (Kuning palang merah) (b) Rahsia (Merah Jambu berpalang merah) (c) Sulit (hijau) (d) Terhad (Putih bertulis TERHAD) (e) Terbuka (Putih)
Semua surat perlu dimasukan dalam RQM(rekod qualiti masuk). Surat tersebut perlu dikumpulkan dalam fail timbul. Sama juga untuk surat keluar.

Introduction to Computer Networks

Something basic about network

DOTmed.com - Tapping In: Wi-Fi Company Aruba Networks Helps Hospitals Go Wireless

Hospital networks have long been operating under the preconceived notion that "the bigger the tether, the higher the performance," but new wireless network technologies have the ability to provide health care organizations more freedom at even greater speeds and in a smaller footprint than wired Ethernet networks. For this digital feature, DOTmed met up with Aruba Networks, a major provider of wireless infrastructure in the health care industry, to find out what happens when hospitals cut the cord.

There is a growing urgency within the health care informatics community to get electronic health records (EHR) online and upgraded as the Obama administration's guidelines for health IT funding begin to gel. While EHR may be driving the next generation of patient care and health care interoperability, these and other important applications fall flat without the proper network infrastructure -- a foundational technology also earmarked for federal stimulus money in the American Reinvestment and Recovery Act (ARRA).

(Source - DOTmed.com - Tapping In: Wi-Fi Company Aruba Networks Helps Hospitals Go Wireless)

Secure wireless LAN for large UK university campus (Aruba Networks)

Aruba Networks has been selected by The University of Manchester to upgrade its campus wireless network with a high-speed 802.11n solution. The University of Manchester is the UK’s largest single-site university, and depends heavily upon IT infrastructure to support its 35,000 students, 11,400 faculty and staff, and world-class research, innovation, and learning initiatives. To address wireless usage that outstripped the capability of its legacy Cisco ‘Fat’ AP network, meet demanding future video and virtual learning needs, and provide pervasive coverage that may ultimately require in excess of 4,000 access points, the university conducted an extensive technical review of single, multi-channel, and adaptive wireless LANs. Aruba was selected after the university determined that Aruba’s adaptive wireless LANs were more scalable, Adaptive Radio Management (ARM) easier to deploy, and overall the network was more easily managed than competing systems. The network will be supplied by authorised platinum Aruba partner, Pervasive Networks.

“We looked for a solution that could scale to deliver a pervasive wireless network on campus, yet would be cost effective and both easy to deploy and easy to manage,” said Darren Hankinson of The University of Manchester’s IT Services. “Aruba won on all points: its ARM technology makes deployment simple and automates a lot of the management; it’s easy to build and manage all the different user communities we need to support; and the scalability of the solution is exemplary.”

Aruba’s massively scalable centralised architecture delivers switch-like performance while lowering IT operating expenses by simplifying network set-up, expansion, and updates. A master-local design allows master Mobility Controllers in the data centre to manage and update dispersed controllers supporting local 802.11n access points. This field-proven architecture minimises IT overhead while delivering visibility into, and fine-grained control of, the entire network.

An ICSA-certified policy-enforcement firewall provides identity-based security, Quality of Service control, and traffic management capabilities. The firewall classifies traffic on the basis of user identity, device type, location, and time of day, and provides differentiated access for different classes of users. Guest access to applications and resources, and even bandwidth consumed, are tightly controlled by the firewall and an integrated captive portal.

Aruba’s Mobility Controllers authenticate users through Active Directory, RADIUS, LDAP and other commonly employed databases. Until such time as they are decommissioned, traffic from the 400 legacy Cisco ‘Fat’ APs will be passed through the Aruba controllers for authentication to deliver a uniform end-user experience.

To optimise Wi-Fi performance in real-time, ARM technology uses infrastructure-based controls to manage how Wi-Fi clients interact, and ensure that 802.11n data, voice, and video applications have sufficient network resources to operate properly. Acting on their own, Wi-Fi clients do not always work cooperatively with other clients, or select the optimal band, channel, and access point. These issues are exacerbated in environments like lecture halls and dormitories with high-bandwidth applications and densely-packed clients. ARM has been demonstrated to increase 802.11n throughput by more than 200%, enabling more than 100 laptops to reliably display multi-media lectures delivered from a single access point.

“Scaling a wireless LAN to support thousands of high-speed 802.11n access points is no mean feat,” said Bob Vickers, sales director of Aruba UK and Ireland. “It requires high throughput controllers, automatic management of the ever-changing RF environment, and centralised management. The University of Manchester validated that the robustness and scalability of Aruba’s adaptive wireless LANs make them a best-in-class solution for the rigors of a large university deployment.”

(Source - Secure wireless LAN for large UK university campus (Aruba Networks)

Tuesday, March 30, 2010

Structure Cabling System Design

Check out this SlideShare Presentation:

Network Design

Check out this SlideShare Presentation:

Voice over Internet Protocol (VoIP) using Asterisk

Check out this SlideShare Presentation:

VLAN-What is all about?

Unified Communication

Monday, March 29, 2010

Unified Communications in Healthcare

I will suggest to faculty of medicine to deploy Unified Communication

Pusat Latihan Kampung Gajah - Kenangan Lalu Terungkap Kembali

Pada hari ini sehingga khamis ini saya berkursus di Pusat Latihan UiTM Kampung Gajah Perak. Kami sampai kira-kira jam 12.30 tengah hari dengan menaiki bas UiTM. Kali terakhir saya sampai di sini kira-kira 5 tahun yang lalu, masa itu, Pusat Latihan Kampung Gajah tidak secantik macam sekarang. Secara keseluruhan kemudahan yang terdapat di Pusat Latihan Kampung Gajah ini boleh dikelaskan sebagai 3 bintang.

Semasa menyampaikan ucapan perasmian Tuan Haji Junaidi Muslim, Timbalan Pengarah, Pejabat Pembangunan menekankan betapa ilmu penting untuk menjadi membina kewibawaan. Kursus asas Pengurusan Projek ini bertujuan untuk mendedahkan semua peserta selok belok dalam mengendalikan projek pembangunan. Justeru, beliau menyarankan supaya peluang berkursus ini perlu digarapi sepenuhnya sebagai peluang untuk menimba ilmu dalam bidang pengurusan projek.

Sunday, March 28, 2010

SIP Phone, IP Phone, USB Phone, USB VoIP Phone, SIP ATA, Skype phone

Huntsville, Ala., and Xiamen, Fujian—[27th Feb,2010]—Digium®, Inc., the Asterisk® Company, and Yealink, a professional IP voice and video phone designer and manufacturer for broadband networks,today announced they have completed interoperability test in Asterisk Business Edition and Yealink SIP-T2x series. Yealink SIP-T2x series is high performance and affordable SIP telephones that help businesses leverage the increasing benefits of voice over Internet protocol (VoIP) telephone system. Yealink SIP phone provides the high quality audio, a brand range of voice codec, security protection for privacy, and rich telephone features. Yealink enterprise HD IP phones now are compliance-tested by Digium for compatibility.Digium is the creator, sponsor and driving force behind Asterisk, the most widely used open source telephony software.

The company’s product lines include a wide range of software and hardware that enable businesses to implement turnkey unified communications solutions or to design their own VoIP systems. Resellers, telecom professionals and software developers choose Digium’s products because only Digium delivers the technical superiority, security and flexibility associated with Asterisk.“The combination of Digium and Yealink enterprise HD IP phone gives businesses a powerful and yet cost-effective choice in VoIP solution market” commented David Chen, the CEO of Yealink Network, “We believe we are providing the best price-performance benchmark in the industry, Digium and Yealink combination offers a very compelling value to SMB”

About Yealink Network Technology

Yealink Network Technology Ltd. is a professional designer and manufacturer of innovative, affordable, and high quality IP voice and video products for the world-wide broadband telephony market. The company's products such as SIP-T2x series enterprise HD IP Phones, equipped with the TI chipset and TI Voice Engine, offer high definition voice, are fully compatible with the SIP industry standard, field proven with large and rapidly growing deployed base, and have broad interoperability with the major IP-PBX, IMS, NGN, soft-switch and other 3rd party SIP products on the market today. The extraordinary performance of our products and professional R&D team ensure us a strategic partner to Digium. For more information, please visit www.yealink.com

About Digium

Digium®, Inc., the Asterisk® Company, created, owns and is the innovative force behind Asterisk, the most widely used open source telephony software. Since its founding in 1999, Digium has become the open source alternative to proprietary communication providers, with offerings that cost as much as 80 percent less. Digium offers Asterisk software free to the open source community and offers Asterisk Business Edition and Switchvox IP PBX software to power a broad family of products for small, medium and large businesses. The company’s product line includes a wide range of hardware and software to enable resellers and customers to implement turnkey VoIP systems or to design their own custom telephony solutions. More information is available at http://www.digium.com.

(Source - SIP Phone, IP Phone, USB Phone, USB VoIP Phone, SIP ATA, Skype phone)

Tuesday, March 23, 2010

Introduction to Unified Communications: Concepts and Opportunities

Open platform of Unified Communication. My vision and mission to be completed in UiTM

Monday, March 22, 2010

Pengumuman Kursus di OSCC (Mac - April 2010)

Sukacita ingin dimaklumkan bahawa berikut adalah kursus yang dibuka untuk sesi pendaftaran di OSCC :

1. PHP Programming & MySQL Database (Basic) (22 - 24 Mac 2010)
2. Using MyMeeting (30 Mac 2010)
3. Linux Fundamental (30 - 31 Mac 2010)
4. Using MySpamGuard (1 April 2010)
5. Linux System Administration (12 - 14 April 2010)
6. Using MyMeeting (13 April 2010)
7. Introduction to CMS with Joomla! (19 - 21 April 2010)
8. Using MySurfGuard (19 April 2010)
9. Certified Linux Administration 01 (26 - 30 April 2010)

Sila rujuk laman web OSCC (http://www.oscc.org.my) untuk pendaftaran dan maklumat selanjutnya. Keutamaan diberikan kepada kakitangan kerajaan bergred F dan mempunyai asas sistem linux. Sekiranya anda berminat untuk menerima pengumuman kursus dari masa ke semasa sila daftar melalui oscc-training@lists.oscc.org.my di laman web
http://lists.oscc.org.my. Sekian.


Mariatul Shima Abu Hassan Asari
Penyelaras Latihan
OSCC MAMPU
3rd Floor, Enterprise Building 3,
Persiaran APEC
63000 Cyberjaya, Selangor.
Tel : 03-8319 1200
Fax : 03-8319 3206

http://opensource.mampu.gov.my/

Sunday, March 21, 2010

Saturday, March 20, 2010

Cisco and Tandberg reveal details on integration - FierceVoIP

Cisco and Tandberg are expecting the final regulatory thumbs-up during the first half of 2010 for the $3.4 billion acquisition deal and when that happens it will be full speed ahead on getting their systems to interoperate.

Once the acquisition goes through, Cisco plans to create the Cisco TelePresence Technology Group which will include both Cisco and Tandberg's products. The group will focus on open integrated architecture standards to make interoperability between the group's products and third party UC systems easier. The new TelePresence group will include a number of product lines: immersive TelePresence, multipurpose room systems, personal systems, platform portfolio, infrastructure and TelePresence as a service.

Back in January, Cisco released TelePresence Interoperability Protocol (TIP) into the wild in hopes to spur more interoperability with third parties. According to eWeek, some competitors like Polycom believe that while the new protocol may help interoperability along, the creation of protocols should be left up to third-party standards bodies rather than dominant players in the industry.

(Source - Cisco and Tandberg reveal details on integration - FierceVoIP)

Thursday, March 18, 2010

MLabs targets 50% video conferencing market share

KUALA LUMPUR: ACE Market-listed MLABS SYSTEMS BHD is targeting to increase its share of the local video conferencing market to 50% in the next five years from 30% at present.

The company, which manufactures both the hardware and software for video conferencing TECHNOLOGY , said it would use proceeds from its latest rights issuance for sales and marketing of its video conferencing system, hardware purchases and for the "expansion" of personnel. MLabs shareholders approved yesterday the company's proposed renounceable rights issue of 51.48 million shares together with 77.22 million free detachable warrants on the basis of two rights shares and three warrants for every four existing shares. The rights shares are priced at 10 sen apiece while the indicative price of the warrants is also 10 sen each.

MLabs executive director Ismail Ahmad said the company would focus its marketing efforts on government agencies as well as the business community. "We are in talks with some of these parties. We are confident in sealing more deals, especially with the government agencies," Ismail told The Edge Financial Daily today.

He added that the company had in previous months sealed deals with some government agencies like the Prisons Department to install such systems.

MLabs partners Universiti Sains Malaysia for the research and development (R&D) of its video conferencing products.

"We are currently developing high-definition and telepresence video conferencing technology. We hope to introduce it at half the price — below RM50,000 — offered by well-known competitors," MLabs R&D chief Prof R Sureswaran said.

"We actually have a prototype unit — the software portion of it. And we're trying to get hardware to support the software now. We expect to be able to release working units by the end of the year."

The company said its biggest competitive advantage was its lower set-up costs.

According to a Bursa Malaysia filing, MLabs' net loss narrowed to RM791,000 in the year ended Dec 31, 2009 from a net loss of RM6.88 million in 2008. Revenue increased to RM2.87 million from RM1.41 million.

(Source - MLabs targets 50% video conferencing market share)

Wednesday, March 17, 2010

VLAN guide for networking professionals

For years, virtual LANs have played an important role in basic enterprise networking, enabling engineers to segment portions of their networks for security, management and scalability. The emergence of virtualization and cloud computing networks only makes understanding VLAN implementation more important. VLANs are key to providing management in a world of virtualization, even where virtual machines are constantly migrating, challenging the very basics of network management. In this guide, learn about old and new uses of VLANs in everything from wireless LANs to data center networks.

What is a VLAN?

Before implementing or managing a VLAN, one must understand what a VLAN is. A VLAN, or virtual (logical) LAN, is a local area network with definitions that map workstations based on anything except geographic location. For example, a VLAN might have a definition that maps workstations by department, type of user, and so on. The benefits of VLANs include easier management of workstations, load balancing, bandwidth allocation and tighter security.

VLANs become even more efficient when coupled with server virtualization. In a virtualized data center environment, the VLAN strings the physical servers together and creates a route. By allowing virtual machines to move across physical servers in the same VLAN, administrators can keep tabs on the virtual machines and manage them more efficiently.

What's the best way to configure a VLAN?

There are three ways of configuring a VLAN: static, dynamic and port-centric. The configuration will be based on the needs of the VLAN. For example, for more security, administrators opt for a static VLAN, which assigns the VLAN membership to a switch's port; whereas a dynamic VLAN assigns the VLAN membership to the MAC address of the host or device. Switches that support VLANs establish the VLAN by either frame-tagging or filtering, both of which look at the frame and decide where it should be sent. Frame tagging "tags" a frame to keep track of it as it travels through the switch's fabric. Frame filtering examines specific information from each frame through a filtering table that is developed for the switch, allowing for examination of many different frame attributes. But frame filtering is less scalable than frame tagging because each frame needs to be referenced to a filter table. Frame tagging is considered the most efficient way to go, according to IEEE 802.1q.

For futher reading, please refer to VLAN guide for networking professionals.

Tuesday, March 9, 2010

WAN video conferencing network design requirements for QoS

Video conferencing is a real-time communications technology, like VoIP, which requires special treatment on the IP network. The wide area network (WAN) is a critical component of the infrastructure supporting video conferencing and must be properly configured in order to ensure high-quality video conferencing service delivery.

The critical requirements of the WAN video conferencing network design are as follows:

* To ensure that the WAN has adequate bandwidth.
* To properly classify traffic and support that traffic in a dedicated class.
* To support call admission control for bandwidth management.
* To properly locate the multipoint conferencing unit or bridge.
* To measure and monitor the WAN vendor.

Let's take a look at each of these requirements in turn.

# Determining adequate bandwidth for WAN video conferencing

Video conferencing sessions can consume significant amounts of bandwidth. Video conferencing can operate with as little as 400 Kbps of network traffic but may operate as high as 4 Mbps or even 6 Mbps of network traffic per call. The network designer must first determine the bandwidth of each video call by comparing the different resolution and frame rates available and determining which settings are best for the business application. The network designer must then determine the number of concurrent calls from each WAN-connected location. The call rate multiplied by the number of concurrent calls will determine the bandwidth requirement on each network access link. Remember to add IP overhead. Traditional video conferencing bandwidths are given as the transport bandwidth (e.g., 512 Kbps) where what the network actually experiences is about 20% higher (e.g., 615 Kbps). This is because video conferencing bandwidth values date from the days when it was all being carried on IDSN, which does not have any overhead. Signaling is out of band, but in an IP network we need overhead to create the packet headers that get the data from one computer to the next. This 20% is the overhead of the wrappers that let the IP network know how to handle the data (addressing, timing, protocol encapsulation, etc.).

# WAN traffic classification

The voice and video streams from a video conferencing endpoint must be given priority treatment in the network (overlay and converged) to maintain audio and video quality. A network class should be dedicated to video, and this class should be of a higher priority than all other application traffic except VoIP. The correct marking for this class will be provided by the WAN vendor. This marking should be put on the IP packets by the endpoint itself through proper configuration of the video endpoint. The network should be designed to trust the endpoint based on its IP address, subnet or port range.

# Video conferencing CAC

Once the bandwidths for the network have been calculated and put in place, the video conferencing application must stay within the design constraints. As additional systems are deployed, it becomes possible for video to overdrive the network, which will create packet loss and thus poor-quality video. The video conferencing infrastructure must have a call admission control (CAC) mechanism in place so that when the bandwidth for a specific network link is fully utilized, subsequent call requests which use that link will be denied.

# Locating the WAN video conferencing bridge

The video conferencing bridge is a bandwidth hotspot because all video conferencing calls participating in multipoint conferences must directly connect to the bridge. Thus, the bandwidth demand of the bridge connection can be significant. The best location for the bridge is in a collocation facility directly connected to the WAN core. This location provides inexpensive high-bandwidth connectivity and ensures that the design will scale as additional video conferencing endpoints are added to the enterprise.

# Trust and verify WAN video conferencing QoS

Network monitoring is a critical component of maintaining a high-quality video conferencing service. A path-based measurement tool should be used to measure the behavior of the network. The statistics gathered by traditional data network tools are not sufficient for monitoring the behavior of networks for voice and video conferencing. The voice and video monitoring tool should be an operational tool that collects information on a 24/7 basis and stores this information in a database. The tool will allow forensic analysis, trending, triggers based on thresholds, and real-time views of the behavior of the network in support of video conferencing. Currently, no video vendors have this kind of tool, but other vendors sell video network management tools.

# WAN video conferencing network design takeaways

These critical steps are all needed to ensure consistent, high-quality video service delivery across the WAN. Work with your WAN vendor to ensure that it has the right capabilities and that your network design meshes with the WAN service provided. Spending the time to get a good scalable design in place will pay off as video conferencing becomes an integral communications tool for the enterprise.

(Source : http://searchenterprisewan.techtarget.com)

Monday, March 8, 2010

UiTM MOOT TEAM WON LEGAL BATTLE

For the first time in the history of UiTM, the Faculty of Law’s moot team has won the prestigious Philip C. Jessup International Law Moot Court Championship, which was held at national level from 26th to 28th February at Universiti Kebangsaan Malaysia. Defeating other three universities known for their strength in the field, the team will be representing Malaysia in the same competition at international level in Washington DC, United States of America this 21st March.

The intervarsity ‘legal battle’ is organised annually by the International Law Students Association, a profit-oriented body with members consist of law students and practitioners world wide dedicated to research and promotion of international law, which is based in Chicago. The scenario of the contest is similar to that of a real trial, showcasing the participants’ oratory and debating prowess.

Congratulations and good luck for the next battle!

(Source - UiTM MOOT TEAM WON LEGAL BATTLE)

UiTM kaji genome Melayu guna profil DNA

UNIVERSITI Teknologi Mara (UiTM) bakal membawa pembaharuan dalam bidang perubatan dunia menerusi projek penyelidikan genome Melayu pertama di dunia yang kini dilaksanakan penyelidik Fakulti Perubatan universiti itu.

Naib Canselornya, Prof Datuk Ir Dr Sahol Hamid Abu Bakar, berkata kajian itu membolehkan penyelidik mencirikan pelbagai struktur genetik genome untuk diguna pakai dalam penyelidikan perubatan dan genetik pada masa depan. Dalam konteks masyarakat Melayu, katanya, kajian itu juga dapat meningkatkan kefahaman masyarakat mengenai genome orang Melayu menerusi kehadiran gen.

“Selain itu, dapatan kajian itu juga mampu mencirikan asal usul orang Melayu berdasarkan profil DNA yang diperoleh.

“Malah secara tidak langsung, ia dapat membantu pakar farmasi menyediakan ubat-ubatan bersesuaian dengan penyakit yang biasa dikaitkan dengan genome Melayu ini,” katanya pada majlis perasmian kampus UiTM Puncak Alam, baru-baru ini.

Penyelidikan genome merujuk kepada penyelidikan berkaitan set asas haploid kromosom sesuatu organisma pada manusia.

Prof. Dato Dr. Sahol berkata, projek penyelidikan itu dilaksanakan di Kampus Puncak Alam yang kini menjadi tapak penyelidikan dalam bidang sains dan perubatan berkonsepkan genome Melayu.

Katanya, kampus itu dipilih sebagai tapak penyelidikan yang turut menempatkan Fakulti Perubatan bersesuaian dengan keunikan dan kelestarian ruang serta alam semula jadinya yang menghijau.

“Kita merancang untuk memiliki hospital pengajar sendiri bagi menjamin kualiti program dan penyelidikan perubatan yang lebih sistematik selain menempatkan pusat penyelidikan berkaitan khususnya Centre for Translational Research bagi memantapkan penyelidikan klinikal.

“Justeru, kita berharap agar pihak kerajaan dapat memberi kelulusan dan peruntukan segera bagi merealisasikan cadangan penubuhan hospital di Kampus Puncak Alam sebagai kemudahan latihan klinikal kepada pelajar dan pensyarah,” katanya.

Dengan adanya kemudahan itu dan kurikulum mantap dan terkini, beliau yakin dapat mengeluarkan 2,000 doktor Melayu dalam tempoh lima tahun lagi.

Dalam perkembangan berkaitan, katanya, Fakulti Perubatan UiTM bekerjasama dengan Lembaga Bersama Perubatan menawarkan kursus pasca siswazah profesional dalam bidang perubatan, mulai Julai ini.

Katanya, kejayaan penawaran program itu adalah satu pengiktirafan kepada fakulti terbabit hasil peningkatan inovasi menerusi kurikulum mantap dan terkini.

“Walaupun baru berusia lima tahun, pencapaian itu membuktikan penekanan kita kepada aspek kualiti selain sokongan barisan tenaga akademik kanan berpengalaman dari dalam dan luar negara yang turut dilantik sebagai Profesor Adjung,” katanya.

(Sumber - Berita Harian Online)

Thursday, March 4, 2010

UPMC Again Named to U.S. News & World Report Honor Roll of America’s Best Hospitals for the 10th Time – UPMC, Pittsburgh, PA, USA

PITTSBURGH, July 16 – UPMC is once again the region’s only medical center named on the annual U.S. News & World Report Honor Roll of America’s Best Hospitals. UPMC is ranked 13th of only 21 hospitals nationwide that made the Honor Roll of the “nation’s best” in the 2009 survey.

UPMC was ranked in 13 of 16 specialty areas, including seven specialties for which UPMC is in the top 10. Once again, UPMC is the region’s only medical center to be ranked in any specialty. Only 174 hospitals of the more than 4,800 eligible hospitals nationally were ranked in any specialty area. This year marks UPMC’s 10th appearance on the Honor Roll, with UPMC advancing to 13th place, up from 14th place on the 2008 list.

“This well-deserved recognition is due to our superb physicians, nurses and staff and is a clear reflection of their commitment to providing exceptional patient care,” said Elizabeth Concordia, executive vice president of UPMC and president of the Hospital and Community Services Division.

According to U.S. News & World Report, the Honor Roll lists those institutions that demonstrate excellence and breadth of expertise by ranking at or near the top in at least six specialties.

UPMC’s ranked specialties are: Ear, nose and throat – ranked 4th; gynecology, 7th; respiratory disorders, 7th; geriatric care, 8th; psychiatry, 8th; orthopaedics, 10th; rheumatology, 10th; kidney disorders, 12th; rehabilitation, 14th; neurology and neurosurgery, 17th; digestive disorders, 18th; heart and heart surgery, 32nd; and cancer, 41st.

The 2009-10 publication of America’s Best Hospitals is accessible online now at www.usnews.com/besthospitals and on sale at newsstands beginning Tuesday, July 21.


(Source - UPMC Again Named to U.S. News & World Report Honor Roll of America’s Best Hospitals for the 10th Time – UPMC, Pittsburgh, PA, USA)

Wednesday, March 3, 2010

Security of healthcare Information Systems - Mandatory to comply!

Talking about security in Healthcare Information System, the HIPAA security rule and out line provide framework for establishing a viable health security program. Its include (a) Administrative safeguard (b) Physical safeguard and (c) Technical safeguard.

The threat to HIS fall into one of these three categories (a) Human threats, which can result from intentional or unintentional human tampering (b) Natural and enviromental threat, such as flood, fires, and power outages (c) Technology malfunctions, such as a drive that fails and has no back up.

Tuesday, March 2, 2010

The IT Department Functions - Becoming Increasingly Important!

I thinks in my opinion the IT department has several responsibilities such as:

(a) Ensuring that an IT Plan and strategy have been developed for the university and that the plan and strategy are kept current as the university evolves.

(b) Working with university to acquire or develop and implement needed new applications

(c) Provide day-to-day support of users: for example, fixing broken PC,fixing broken network connectivity, responding to questions about applications use,training new users etc.

(d) Managing the IT infrastructures ( performing backup of databases, installing network connections etc).

(e) Examining the role and relevance of emerging information technologies.

Within these 5 responsibilities , there are several sub-function

(i) Data center management - make sure the data center up-time 99.98% per year

(ii) Network management - make sure the connectivity of the network up-time 99.98% per year

(iii) Server management - manage server inside data center in top condition

(iv) Database management - manage database integrity and reliability

(v) Security - active directory, firewall, audit trail,ssh-vpn ,

(vi) Help desk - Support user all the time

(vii) Deployment - install new workstation, printers, new network point, wireless etc.

(viii) Training - train new user to use the application installed etc.

Once all of these function and sub function fulfilled, then then only the IT department will gain the credibility and respect from users.

UiTM bina enam kampus baru - kaedah PFI

PUTRAJAYA 2 Mac - Pembinaan enam buah kampus baru Universiti Teknologi Mara (UiTM) di enam lokasi akan dibuat menerusi kaedah inisiatif pembiayaan swasta bagi memenuhi sasaran penempatan 200,000 pelajar.Menteri Pengajian Tinggi, Datuk Seri Mohamed Khaled Nordin berkata, enam lokasi itu ialah di Pasir Gudang, Johor, Jasin (Melaka), Seremban 3 (Negeri Sembilan) Samarahan (Sarawak), Puncak Alam (Selangor) dan Tapah (Perak).

"Setiap satu kampus itu membabitkan kos sebanyak RM300 juta dan mampu menempatkan 5,000 pelajar. Kesemua projek itu dijangka dapat beroperasi dalam tempoh setahun setengah,” katanya kepada pemberita di sini hari ini.

Terdahulu, Mohamed Khaled menyaksikan majlis menandatangani perjanjian Konsesi Asrama Secara Penswastaan antara Universiti Teknikal Malaysia Melaka (UTeM) dengan Pengurusan Konsesi Asrama Sdn Bhd (Peka). - Bernama

(Sumber - Utusan Malaysia Online - Terkini)