Projek pembangunan yang kosnya lebih daripada 20 Juta ke atas perlu mempunyai SHO(Safety Health Officer). Setiap majikan perlu menubuhkan Jawatankuasa Keselamatan dan Kesihatan di tempat kerja, UiTM telah menubuhkan Jawatankuasa ini di semua Bahagian,Fakulti,Jabatan, Unit dan sebagainya untuk memastikan hal-hal berkaitan keselamatan dan kesihatan terpelihara. Menjadi tanggungjawab bagi S.O (Site Officer) sesuatu projek membuat teguran kepada kontraktor jika pekerjaa kontraktor tersebut tidak menggunakan peralatan pelindungan peribadi seperti kasut keselamatan, topi keselamatan dan sebagainya.
"....semua makhluk ciptaan Tuhan samada manusia,binatang,tumbuhan, alam semulajadi dan sebagainya,saling perlu memerlukan,saling bantu-membantu kerana mereka berkait,terikat antara satu sama lain dalam satu kitaran yang berhubungan. Justeru, jangan diputuskan ikatan itu, kelak, seluruh kitaran akan musnah..." Ahmad Rais Johari
Wednesday, March 31, 2010
Akta Keselamatan & Kesihatan Pekerja 1994 (Akta 514) - En. Syafie Jamian
Projek pembangunan yang kosnya lebih daripada 20 Juta ke atas perlu mempunyai SHO(Safety Health Officer). Setiap majikan perlu menubuhkan Jawatankuasa Keselamatan dan Kesihatan di tempat kerja, UiTM telah menubuhkan Jawatankuasa ini di semua Bahagian,Fakulti,Jabatan, Unit dan sebagainya untuk memastikan hal-hal berkaitan keselamatan dan kesihatan terpelihara. Menjadi tanggungjawab bagi S.O (Site Officer) sesuatu projek membuat teguran kepada kontraktor jika pekerjaa kontraktor tersebut tidak menggunakan peralatan pelindungan peribadi seperti kasut keselamatan, topi keselamatan dan sebagainya.
Keperluan Pengursan Fail & Rekod - Bahagian Arkib
- Buku daftar surat masuk
- Buku daftar surat keluar
- Buku daftar masuk surat terperingkat - 4 jenis (a) Terhad (b) Sulit (c) Rahsia (d) Rahsia besar
- Memo ketua jabataan - hanya digunakan oleh Ketua Jabatan Sahaja
- Borang daftar pengkelasan surat terperingkat
- Borang daftar pengkelasan semua surat terperingkat
- Senarai fail jabatan
- buku panduan pelaksanaan fail klasifikasi perkara
- Buku panduan pengurusan rekod UiTM
- Panduan pengurusan rekod UiTM
- Pek. Pkh Bil. 5 Tahun 2007 - Panduan Pengurusan Pejabat
- Surat Pekeliling Am Sulit Bil. 1/93
- Bilik Fail
- Kabinet fail terbuka
- Kabinet fail terperingkat (Peti besi keluli)
- Kerani fail/rekod
- Borang pemisah rekod
- Borang penilaian rekod
- Borang pelupusan rekod (homogeneous)
- Senarai pemindahan rekod
- Kertas minit
- Kad keluar fail
- Penggunaan kulit fail (a) Rahsia Besar (Kuning palang merah) (b) Rahsia (Merah Jambu berpalang merah) (c) Sulit (hijau) (d) Terhad (Putih bertulis TERHAD) (e) Terbuka (Putih)
Introduction to Computer Networks
DOTmed.com - Tapping In: Wi-Fi Company Aruba Networks Helps Hospitals Go Wireless
There is a growing urgency within the health care informatics community to get electronic health records (EHR) online and upgraded as the Obama administration's guidelines for health IT funding begin to gel. While EHR may be driving the next generation of patient care and health care interoperability, these and other important applications fall flat without the proper network infrastructure -- a foundational technology also earmarked for federal stimulus money in the American Reinvestment and Recovery Act (ARRA).
(Source - DOTmed.com - Tapping In: Wi-Fi Company Aruba Networks Helps Hospitals Go Wireless)
Secure wireless LAN for large UK university campus (Aruba Networks)
“We looked for a solution that could scale to deliver a pervasive wireless network on campus, yet would be cost effective and both easy to deploy and easy to manage,” said Darren Hankinson of The University of Manchester’s IT Services. “Aruba won on all points: its ARM technology makes deployment simple and automates a lot of the management; it’s easy to build and manage all the different user communities we need to support; and the scalability of the solution is exemplary.”
Aruba’s massively scalable centralised architecture delivers switch-like performance while lowering IT operating expenses by simplifying network set-up, expansion, and updates. A master-local design allows master Mobility Controllers in the data centre to manage and update dispersed controllers supporting local 802.11n access points. This field-proven architecture minimises IT overhead while delivering visibility into, and fine-grained control of, the entire network.
An ICSA-certified policy-enforcement firewall provides identity-based security, Quality of Service control, and traffic management capabilities. The firewall classifies traffic on the basis of user identity, device type, location, and time of day, and provides differentiated access for different classes of users. Guest access to applications and resources, and even bandwidth consumed, are tightly controlled by the firewall and an integrated captive portal.
Aruba’s Mobility Controllers authenticate users through Active Directory, RADIUS, LDAP and other commonly employed databases. Until such time as they are decommissioned, traffic from the 400 legacy Cisco ‘Fat’ APs will be passed through the Aruba controllers for authentication to deliver a uniform end-user experience.
To optimise Wi-Fi performance in real-time, ARM technology uses infrastructure-based controls to manage how Wi-Fi clients interact, and ensure that 802.11n data, voice, and video applications have sufficient network resources to operate properly. Acting on their own, Wi-Fi clients do not always work cooperatively with other clients, or select the optimal band, channel, and access point. These issues are exacerbated in environments like lecture halls and dormitories with high-bandwidth applications and densely-packed clients. ARM has been demonstrated to increase 802.11n throughput by more than 200%, enabling more than 100 laptops to reliably display multi-media lectures delivered from a single access point.
“Scaling a wireless LAN to support thousands of high-speed 802.11n access points is no mean feat,” said Bob Vickers, sales director of Aruba UK and Ireland. “It requires high throughput controllers, automatic management of the ever-changing RF environment, and centralised management. The University of Manchester validated that the robustness and scalability of Aruba’s adaptive wireless LANs make them a best-in-class solution for the rigors of a large university deployment.”
(Source - Secure wireless LAN for large UK university campus (Aruba Networks)Tuesday, March 30, 2010
Structure Cabling System Design
Network Design
Monday, March 29, 2010
Unified Communications in Healthcare
Pusat Latihan Kampung Gajah - Kenangan Lalu Terungkap Kembali
Semasa menyampaikan ucapan perasmian Tuan Haji Junaidi Muslim, Timbalan Pengarah, Pejabat Pembangunan menekankan betapa ilmu penting untuk menjadi membina kewibawaan. Kursus asas Pengurusan Projek ini bertujuan untuk mendedahkan semua peserta selok belok dalam mengendalikan projek pembangunan. Justeru, beliau menyarankan supaya peluang berkursus ini perlu digarapi sepenuhnya sebagai peluang untuk menimba ilmu dalam bidang pengurusan projek.
Sunday, March 28, 2010
SIP Phone, IP Phone, USB Phone, USB VoIP Phone, SIP ATA, Skype phone
The company’s product lines include a wide range of software and hardware that enable businesses to implement turnkey unified communications solutions or to design their own VoIP systems. Resellers, telecom professionals and software developers choose Digium’s products because only Digium delivers the technical superiority, security and flexibility associated with Asterisk.“The combination of Digium and Yealink enterprise HD IP phone gives businesses a powerful and yet cost-effective choice in VoIP solution market” commented David Chen, the CEO of Yealink Network, “We believe we are providing the best price-performance benchmark in the industry, Digium and Yealink combination offers a very compelling value to SMB”
About Digium
(Source - SIP Phone, IP Phone, USB Phone, USB VoIP Phone, SIP ATA, Skype phone)
Tuesday, March 23, 2010
Introduction to Unified Communications: Concepts and Opportunities
Monday, March 22, 2010
Pengumuman Kursus di OSCC (Mac - April 2010)
1. PHP Programming & MySQL Database (Basic) (22 - 24 Mac 2010)
2. Using MyMeeting (30 Mac 2010)
3. Linux Fundamental (30 - 31 Mac 2010)
4. Using MySpamGuard (1 April 2010)
5. Linux System Administration (12 - 14 April 2010)
6. Using MyMeeting (13 April 2010)
7. Introduction to CMS with Joomla! (19 - 21 April 2010)
8. Using MySurfGuard (19 April 2010)
9. Certified Linux Administration 01 (26 - 30 April 2010)
http://lists.oscc.org.my. Sekian.
Mariatul Shima Abu Hassan Asari
Penyelaras Latihan
OSCC MAMPU
3rd Floor, Enterprise Building 3,
Persiaran APEC
63000 Cyberjaya, Selangor.
Tel : 03-8319 1200
Fax : 03-8319 3206
http://opensource.mampu.gov.my/
Sunday, March 21, 2010
Saturday, March 20, 2010
Cisco and Tandberg reveal details on integration - FierceVoIP
Cisco and Tandberg are expecting the final regulatory thumbs-up during the first half of 2010 for the $3.4 billion acquisition deal and when that happens it will be full speed ahead on getting their systems to interoperate.
Once the acquisition goes through, Cisco plans to create the Cisco TelePresence Technology Group which will include both Cisco and Tandberg's products. The group will focus on open integrated architecture standards to make interoperability between the group's products and third party UC systems easier. The new TelePresence group will include a number of product lines: immersive TelePresence, multipurpose room systems, personal systems, platform portfolio, infrastructure and TelePresence as a service.
Back in January, Cisco released TelePresence Interoperability Protocol (TIP) into the wild in hopes to spur more interoperability with third parties. According to eWeek, some competitors like Polycom believe that while the new protocol may help interoperability along, the creation of protocols should be left up to third-party standards bodies rather than dominant players in the industry.
(Source - Cisco and Tandberg reveal details on integration - FierceVoIP)Thursday, March 18, 2010
MLabs targets 50% video conferencing market share
The company, which manufactures both the hardware and software for video conferencing TECHNOLOGY , said it would use proceeds from its latest rights issuance for sales and marketing of its video conferencing system, hardware purchases and for the "expansion" of personnel. MLabs shareholders approved yesterday the company's proposed renounceable rights issue of 51.48 million shares together with 77.22 million free detachable warrants on the basis of two rights shares and three warrants for every four existing shares. The rights shares are priced at 10 sen apiece while the indicative price of the warrants is also 10 sen each.
MLabs executive director Ismail Ahmad said the company would focus its marketing efforts on government agencies as well as the business community. "We are in talks with some of these parties. We are confident in sealing more deals, especially with the government agencies," Ismail told The Edge Financial Daily today.
He added that the company had in previous months sealed deals with some government agencies like the Prisons Department to install such systems.
MLabs partners Universiti Sains Malaysia for the research and development (R&D) of its video conferencing products.
"We are currently developing high-definition and telepresence video conferencing technology. We hope to introduce it at half the price — below RM50,000 — offered by well-known competitors," MLabs R&D chief Prof R Sureswaran said.
"We actually have a prototype unit — the software portion of it. And we're trying to get hardware to support the software now. We expect to be able to release working units by the end of the year."
The company said its biggest competitive advantage was its lower set-up costs.
According to a Bursa Malaysia filing, MLabs' net loss narrowed to RM791,000 in the year ended Dec 31, 2009 from a net loss of RM6.88 million in 2008. Revenue increased to RM2.87 million from RM1.41 million.
(Source - MLabs targets 50% video conferencing market share)
Wednesday, March 17, 2010
VLAN guide for networking professionals
What is a VLAN?
Before implementing or managing a VLAN, one must understand what a VLAN is. A VLAN, or virtual (logical) LAN, is a local area network with definitions that map workstations based on anything except geographic location. For example, a VLAN might have a definition that maps workstations by department, type of user, and so on. The benefits of VLANs include easier management of workstations, load balancing, bandwidth allocation and tighter security.
VLANs become even more efficient when coupled with server virtualization. In a virtualized data center environment, the VLAN strings the physical servers together and creates a route. By allowing virtual machines to move across physical servers in the same VLAN, administrators can keep tabs on the virtual machines and manage them more efficiently.
What's the best way to configure a VLAN?
There are three ways of configuring a VLAN: static, dynamic and port-centric. The configuration will be based on the needs of the VLAN. For example, for more security, administrators opt for a static VLAN, which assigns the VLAN membership to a switch's port; whereas a dynamic VLAN assigns the VLAN membership to the MAC address of the host or device. Switches that support VLANs establish the VLAN by either frame-tagging or filtering, both of which look at the frame and decide where it should be sent. Frame tagging "tags" a frame to keep track of it as it travels through the switch's fabric. Frame filtering examines specific information from each frame through a filtering table that is developed for the switch, allowing for examination of many different frame attributes. But frame filtering is less scalable than frame tagging because each frame needs to be referenced to a filter table. Frame tagging is considered the most efficient way to go, according to IEEE 802.1q.
Tuesday, March 9, 2010
WAN video conferencing network design requirements for QoS
The critical requirements of the WAN video conferencing network design are as follows:
* To ensure that the WAN has adequate bandwidth.
* To properly classify traffic and support that traffic in a dedicated class.
* To support call admission control for bandwidth management.
* To properly locate the multipoint conferencing unit or bridge.
* To measure and monitor the WAN vendor.
Let's take a look at each of these requirements in turn.
# Determining adequate bandwidth for WAN video conferencing
Video conferencing sessions can consume significant amounts of bandwidth. Video conferencing can operate with as little as 400 Kbps of network traffic but may operate as high as 4 Mbps or even 6 Mbps of network traffic per call. The network designer must first determine the bandwidth of each video call by comparing the different resolution and frame rates available and determining which settings are best for the business application. The network designer must then determine the number of concurrent calls from each WAN-connected location. The call rate multiplied by the number of concurrent calls will determine the bandwidth requirement on each network access link. Remember to add IP overhead. Traditional video conferencing bandwidths are given as the transport bandwidth (e.g., 512 Kbps) where what the network actually experiences is about 20% higher (e.g., 615 Kbps). This is because video conferencing bandwidth values date from the days when it was all being carried on IDSN, which does not have any overhead. Signaling is out of band, but in an IP network we need overhead to create the packet headers that get the data from one computer to the next. This 20% is the overhead of the wrappers that let the IP network know how to handle the data (addressing, timing, protocol encapsulation, etc.).
# WAN traffic classification
The voice and video streams from a video conferencing endpoint must be given priority treatment in the network (overlay and converged) to maintain audio and video quality. A network class should be dedicated to video, and this class should be of a higher priority than all other application traffic except VoIP. The correct marking for this class will be provided by the WAN vendor. This marking should be put on the IP packets by the endpoint itself through proper configuration of the video endpoint. The network should be designed to trust the endpoint based on its IP address, subnet or port range.
# Video conferencing CAC
Once the bandwidths for the network have been calculated and put in place, the video conferencing application must stay within the design constraints. As additional systems are deployed, it becomes possible for video to overdrive the network, which will create packet loss and thus poor-quality video. The video conferencing infrastructure must have a call admission control (CAC) mechanism in place so that when the bandwidth for a specific network link is fully utilized, subsequent call requests which use that link will be denied.
# Locating the WAN video conferencing bridge
The video conferencing bridge is a bandwidth hotspot because all video conferencing calls participating in multipoint conferences must directly connect to the bridge. Thus, the bandwidth demand of the bridge connection can be significant. The best location for the bridge is in a collocation facility directly connected to the WAN core. This location provides inexpensive high-bandwidth connectivity and ensures that the design will scale as additional video conferencing endpoints are added to the enterprise.
# Trust and verify WAN video conferencing QoS
Network monitoring is a critical component of maintaining a high-quality video conferencing service. A path-based measurement tool should be used to measure the behavior of the network. The statistics gathered by traditional data network tools are not sufficient for monitoring the behavior of networks for voice and video conferencing. The voice and video monitoring tool should be an operational tool that collects information on a 24/7 basis and stores this information in a database. The tool will allow forensic analysis, trending, triggers based on thresholds, and real-time views of the behavior of the network in support of video conferencing. Currently, no video vendors have this kind of tool, but other vendors sell video network management tools.
# WAN video conferencing network design takeaways
These critical steps are all needed to ensure consistent, high-quality video service delivery across the WAN. Work with your WAN vendor to ensure that it has the right capabilities and that your network design meshes with the WAN service provided. Spending the time to get a good scalable design in place will pay off as video conferencing becomes an integral communications tool for the enterprise.
(Source : http://searchenterprisewan.techtarget.com)
Monday, March 8, 2010
UiTM MOOT TEAM WON LEGAL BATTLE
The intervarsity ‘legal battle’ is organised annually by the International Law Students Association, a profit-oriented body with members consist of law students and practitioners world wide dedicated to research and promotion of international law, which is based in Chicago. The scenario of the contest is similar to that of a real trial, showcasing the participants’ oratory and debating prowess.
Congratulations and good luck for the next battle!
(Source - UiTM MOOT TEAM WON LEGAL BATTLE)
UiTM kaji genome Melayu guna profil DNA
Naib Canselornya, Prof Datuk Ir Dr Sahol Hamid Abu Bakar, berkata kajian itu membolehkan penyelidik mencirikan pelbagai struktur genetik genome untuk diguna pakai dalam penyelidikan perubatan dan genetik pada masa depan. Dalam konteks masyarakat Melayu, katanya, kajian itu juga dapat meningkatkan kefahaman masyarakat mengenai genome orang Melayu menerusi kehadiran gen.
“Selain itu, dapatan kajian itu juga mampu mencirikan asal usul orang Melayu berdasarkan profil DNA yang diperoleh.
“Malah secara tidak langsung, ia dapat membantu pakar farmasi menyediakan ubat-ubatan bersesuaian dengan penyakit yang biasa dikaitkan dengan genome Melayu ini,” katanya pada majlis perasmian kampus UiTM Puncak Alam, baru-baru ini.
Penyelidikan genome merujuk kepada penyelidikan berkaitan set asas haploid kromosom sesuatu organisma pada manusia.
Prof. Dato Dr. Sahol berkata, projek penyelidikan itu dilaksanakan di Kampus Puncak Alam yang kini menjadi tapak penyelidikan dalam bidang sains dan perubatan berkonsepkan genome Melayu.
Katanya, kampus itu dipilih sebagai tapak penyelidikan yang turut menempatkan Fakulti Perubatan bersesuaian dengan keunikan dan kelestarian ruang serta alam semula jadinya yang menghijau.
“Kita merancang untuk memiliki hospital pengajar sendiri bagi menjamin kualiti program dan penyelidikan perubatan yang lebih sistematik selain menempatkan pusat penyelidikan berkaitan khususnya Centre for Translational Research bagi memantapkan penyelidikan klinikal.
“Justeru, kita berharap agar pihak kerajaan dapat memberi kelulusan dan peruntukan segera bagi merealisasikan cadangan penubuhan hospital di Kampus Puncak Alam sebagai kemudahan latihan klinikal kepada pelajar dan pensyarah,” katanya.
Dengan adanya kemudahan itu dan kurikulum mantap dan terkini, beliau yakin dapat mengeluarkan 2,000 doktor Melayu dalam tempoh lima tahun lagi.
Dalam perkembangan berkaitan, katanya, Fakulti Perubatan UiTM bekerjasama dengan Lembaga Bersama Perubatan menawarkan kursus pasca siswazah profesional dalam bidang perubatan, mulai Julai ini.
Katanya, kejayaan penawaran program itu adalah satu pengiktirafan kepada fakulti terbabit hasil peningkatan inovasi menerusi kurikulum mantap dan terkini.
“Walaupun baru berusia lima tahun, pencapaian itu membuktikan penekanan kita kepada aspek kualiti selain sokongan barisan tenaga akademik kanan berpengalaman dari dalam dan luar negara yang turut dilantik sebagai Profesor Adjung,” katanya.
Thursday, March 4, 2010
UPMC Again Named to U.S. News & World Report Honor Roll of America’s Best Hospitals for the 10th Time – UPMC, Pittsburgh, PA, USA
PITTSBURGH, July 16 – UPMC is once again the region’s only medical center named on the annual U.S. News & World Report Honor Roll of America’s Best Hospitals. UPMC is ranked 13th of only 21 hospitals nationwide that made the Honor Roll of the “nation’s best” in the 2009 survey.
UPMC was ranked in 13 of 16 specialty areas, including seven specialties for which UPMC is in the top 10. Once again, UPMC is the region’s only medical center to be ranked in any specialty. Only 174 hospitals of the more than 4,800 eligible hospitals nationally were ranked in any specialty area. This year marks UPMC’s 10th appearance on the Honor Roll, with UPMC advancing to 13th place, up from 14th place on the 2008 list.
“This well-deserved recognition is due to our superb physicians, nurses and staff and is a clear reflection of their commitment to providing exceptional patient care,” said Elizabeth Concordia, executive vice president of UPMC and president of the Hospital and Community Services Division.
According to U.S. News & World Report, the Honor Roll lists those institutions that demonstrate excellence and breadth of expertise by ranking at or near the top in at least six specialties.
UPMC’s ranked specialties are: Ear, nose and throat – ranked 4th; gynecology, 7th; respiratory disorders, 7th; geriatric care, 8th; psychiatry, 8th; orthopaedics, 10th; rheumatology, 10th; kidney disorders, 12th; rehabilitation, 14th; neurology and neurosurgery, 17th; digestive disorders, 18th; heart and heart surgery, 32nd; and cancer, 41st.
The 2009-10 publication of America’s Best Hospitals is accessible online now at www.usnews.com/besthospitals and on sale at newsstands beginning Tuesday, July 21.
(Source - UPMC Again Named to U.S. News & World Report Honor Roll of America’s Best Hospitals for the 10th Time – UPMC, Pittsburgh, PA, USA)
Wednesday, March 3, 2010
Security of healthcare Information Systems - Mandatory to comply!
The threat to HIS fall into one of these three categories (a) Human threats, which can result from intentional or unintentional human tampering (b) Natural and enviromental threat, such as flood, fires, and power outages (c) Technology malfunctions, such as a drive that fails and has no back up.
Tuesday, March 2, 2010
The IT Department Functions - Becoming Increasingly Important!
(a) Ensuring that an IT Plan and strategy have been developed for the university and that the plan and strategy are kept current as the university evolves.
(b) Working with university to acquire or develop and implement needed new applications
(c) Provide day-to-day support of users: for example, fixing broken PC,fixing broken network connectivity, responding to questions about applications use,training new users etc.
(d) Managing the IT infrastructures ( performing backup of databases, installing network connections etc).
(e) Examining the role and relevance of emerging information technologies.
Within these 5 responsibilities , there are several sub-function
(i) Data center management - make sure the data center up-time 99.98% per year
(ii) Network management - make sure the connectivity of the network up-time 99.98% per year
(iii) Server management - manage server inside data center in top condition
(iv) Database management - manage database integrity and reliability
(v) Security - active directory, firewall, audit trail,ssh-vpn ,
(vi) Help desk - Support user all the time
(vii) Deployment - install new workstation, printers, new network point, wireless etc.
(viii) Training - train new user to use the application installed etc.
Once all of these function and sub function fulfilled, then then only the IT department will gain the credibility and respect from users.
UiTM bina enam kampus baru - kaedah PFI
PUTRAJAYA 2 Mac - Pembinaan enam buah kampus baru Universiti Teknologi Mara (UiTM) di enam lokasi akan dibuat menerusi kaedah inisiatif pembiayaan swasta bagi memenuhi sasaran penempatan 200,000 pelajar.Menteri Pengajian Tinggi, Datuk Seri Mohamed Khaled Nordin berkata, enam lokasi itu ialah di Pasir Gudang, Johor, Jasin (Melaka), Seremban 3 (Negeri Sembilan) Samarahan (Sarawak), Puncak Alam (Selangor) dan Tapah (Perak).
"Setiap satu kampus itu membabitkan kos sebanyak RM300 juta dan mampu menempatkan 5,000 pelajar. Kesemua projek itu dijangka dapat beroperasi dalam tempoh setahun setengah,” katanya kepada pemberita di sini hari ini.
Terdahulu, Mohamed Khaled menyaksikan majlis menandatangani perjanjian Konsesi Asrama Secara Penswastaan antara Universiti Teknikal Malaysia Melaka (UTeM) dengan Pengurusan Konsesi Asrama Sdn Bhd (Peka). - Bernama
(Sumber - Utusan Malaysia Online - Terkini)