Wednesday, 17 April 2013

BASIC FIELD HOCKEY RULE



I will share some basic field hockey rule, as i learn with my coach before,  as athletes Before you learn basic skill you must learn  the rule and regulation of the game. So, you will avoid some mistake at the hockey field.


The Game:
·        Two halves 20 – 25 minutes each with a 5 minute half time.
·        11 players per side, including the goalkeeper.
·        The ball must be passed or dribbled down the field with the flat side of the stick.
·        A goal is scored when an attacker strikes the ball into the goal from within the striking circle.

Fouls:
A player may not:
  • Shield or obstruct the ball from an opponent with the body or stick.  All players must have an equal chance to gain control of the ball as it is dribbled or passed down the field.
  • Play the ball with the rounded side of the stick.
  • Charge, hit, shove or trip an opponent.
  • Play the ball in a potentially dangerous way.
  • Raise the stick above the waist in a dangerous manner while attempting to play or stop the ball.
  • Advance the ball by any means other than with the stick.
  • Stop or deflect the ball in the air or on the ground with any part of the body.
  • Hit, hook, hold or interfere with and opponents stick.

Penalty Corner:
  • In a penalty corner, the ball is placed on the goal line at least 10 yards from the nearest goal post.  One attacking player hits the ball to a teammate just outside the striking circle line.  No shot on goal may be taken until the ball is stopped or comes to rest on the ground outside the circle.  All attackers must be outside the circle before the hit is taken.  On defense, a maximum of five defenders may be behind the goal line while the remaining defenders must be positioned beyond the center line.
  • Typically, the attacking player taking the free hit passes the ball to her teammate positioned outside the striking circle.  An offensive player will stop the ball with the stick while another player will strike the ball at the goal. 
  • A penalty corner is awarderd for the following offenses:
    • Any breach of the rule by a defender within the circle that would have resulted in a free hit to the attacking team if the breach had occurred outside the circle.
    • An intentional hit over the goal line by a defender from any part of the field.

16 – Yard Hits:
  • When the attacking team plays the ball over the backline, the defense receives a 16-yard hit.  The free hit is taken 16 yards from the spot where the ball crossed the backline.

The Push-In/Hit In
·        A push-in or hit-in is awarded to the opposition if a player hits the ball over the sideline.  All players and their sticks must be at least 5 yards away from the spot where the ball is put into play.



 some memory in KARISMA and OPEN games.

 







PORTER'S MODEL




Ø   INDUSTRY COMPETITORS.
Rivalries naturally develop between companies competing in the same market. Competitors use means such as advertising, introducing new products, more attractive customer service and warranties, and price competition to enhance their standing and market share in a specific industry. To Porter, the intensity of this rivalry is the result of factors like equally balanced companies, slow growth within an industry, high fixed costs, lack of product differentiation, overcapacity and price-cutting, diverse competitors, high-stakes investment, and the high risk of industry exit. There are also market entry barriers.

Ø  PRESSURE FROM SUBSTITUTE PRODUCTS.
Substitute products are the natural result of industry competition, but they place a limit on profitability within the industry. A substitute product involves the search for a product that can do the same function as the product the industry already produces. Porter uses the example of security brokers, who increasingly face substitutes in the form of real estate, money-market funds, and insurance. Substitute products take on added importance as their availability increases.

Ø  BARGAINING POWER OF SUPPLIERS.
Suppliers have a great deal of influence over an industry as they affect price increases and product quality. A supplier group exerts even more power over an industry if it is dominated by a few companies, there are no substitute products, the industry is not an important consumer for the suppliers, their product is essential to the industry, the supplier differs costs, and forward integration potential of the supplier group exists. Labor supply can also influence the position of the suppliers. These factors are generally out of the control of the industry or company but strategy can alter the power of suppliers.

Ø  BARGAINING POWER OF BUYERS.
The buyer's power is significant in that buyers can force prices down, demand higher quality products or services, and, in essence, play competitors against one another, all resulting in potential loss of industry profits. Buyers exercise more power when they are large-volume buyers, the product is a significant aspect of the buyer's costs or purchases, the products are standard within an industry, there are few changing or switching costs, the buyers earn low profits, potential for backward integration of the buyer group exists, the product is not essential to the buyer's product, and the buyer has full disclosure about supply, demand, prices, and costs. The bargaining position of buyers changes with time and a company's (and industry's) competitive strategy.

Ø  POTENTIAL ENTRANTS.
Threats of new entrants into an industry depends largely on barriers to entry. Porter identifies six major barriers to entry:
· Economies of scale, or decline in unit costs of the product, which force the entrant to enter on a large scale and risk a strong reaction from firms already in the industry, or accepting a disadvantage of costs if entering on a small scale.
· Product differentiation, or brand identification and customer loyalty.
· Capital requirements for entry; the investment of large capital, after all, presents a significant risk.
· Switching costs, or the cost the buyer has to absorb to switch from one supplier to another.
· Access to distribution channels. New entrants have to establish their distribution in a market with established distribution channels to secure a space for their product.
· Cost disadvantages independent of scale, whereby established companies already have product technology, access to raw materials, favorable sites, advantages in the form of government subsidies, and experience.

New entrants can also expect a barrier in the form of government policy through federal and state regulations and licensing. New firms can expect retaliation from existing companies and also face changing barriers related to technology, strategic planning within the industry, and manpower and expertise problems. The entry deterring price or the existence of a prevailing price structure presents an additional challenge to a firm entering an established industry.

Author : R. Kelly Rainer & Casey G. Cegielski, 2013, Introduction to Information System
In summary, Porter's five-forces models concentrates on five structural industry features that comprise the competitive environment, and hence profitability, of an industry. Applying the model means, to be profitable, the firm has to find and establish itself in an industry so that the company can react to the forces of competition in a favorable manner. For Porter, Competitive Strategy is not a book for academics but a blueprint for practitioners-a tool for managers to analyze competition in an industry in order to anticipate and prepare for changes in the industry, new competitors and market shifts, and to enhance their firm's overall industry standing.

Sunday, 14 April 2013

TYPES OF SOFTWARE ATTACKS



There has three types of software attacks. Firstly, Remote Attacks Requiring User Action. Which has Virus, Worm, Phishing Attack, Spear Phishing Attack. Secondly, Remote Attacks Needing No User Action. Which has Denial of Service Attack, Distributed Denial-of-Service Attack and lastly, Attacks by a Programmer Developing a System. Which has Trojan Horse, Back Door, and Logic bomb. Okay now, let's go deeply on the term...

Remote Attacks Requiring User Action
  1. Virus : Segment of computer code that performs malicious action by attaching to another computer program,
  2. Worm : Segment of computer code that performs malicious action and will replicate, or spread by itself.
  3. Spear Phishing Attack : Phishing attack target large group of people. In spear phishing attacks, the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information
  4. Phishing Attack : Phishing attack use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
Remote Attacks Needing No User Action. 

  1. Denial of Service Attack : Attacker send so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.
  2. Distributed Denial-of-Service Attack : An attacker first takes over many computers, typically by using malicious software. These computer are called zombies or bots. The attacker uses these bot-which form a botnet- to deliver a coordinated stream of information request to a target computer, causing it to crash.
Attacks by a Programmer Developing a System. 
  1. Trojan Horse : Software programs that hide in other computer and reveal their designed behavior only when they are activated.
  2. Back Door : Typically a password, known only to the attacker, that allow him or her to access a computer system at will, without having to go through any security procedures.
  3. Logic bomb : Segment of computer code that is embedded within an organization's existing computer programs and is designed to active and perform a destructive action at a certain time or date.
Author : R. Kelly & Casey G. Cegielski, 2013, Introduction to Information System

So that still have several ways to avoid software attact. Firstly, Install Anti Virus Software. There are many good Anti Virus programs available. For your convenience, two possible selections are listed on Useful Links. You can also check the West Coast Labs & ICSA web sites to see which Anti Virus programs have been certified. Make your choice, install it and keep it active.Secondly, Keep your Anti Virus program current. If your program is more than a year old, you may be at risk. If you install Anti Virus software but ignore it, it will quickly become obsolete. Watch for upgrades. When a newer version of your program comes out, buy it. The upgrade will intercept the newest viruses. Thirdly, Between upgrades, update your Virus Definitions often. New viruses are being written every day! Therefore, Anti Virus companies are updating their virus definitions frequently. PC Technical suggests you update your virus definitions twice a week. While most Anti Virus programs will update automatically, you should check to make sure it is working properly. Automatic updates have been know to fail.And lastly, Scan your system weekly. Anti Virus software can only protect our computer systems if we use it regularly. If your program gives you a warning, let the software fix the problem. Follow up with a complete virus scan.


S O L A T


just wanna share something i've learnt last night.

          when performing your solat, please try to slow down and recite the surahs properly. kita ada something called makhraj. kalau salah sebut or tinggal huruf or salah tajwid, the meaning might be different. maka, tak betullah surah anda baca. maka rugi lah solat anda.. sayang kan? 

        praying 5 times a day won't mean much kalau surah yang ada 4,5 ayat jadi satu je (sebab baca laju2).
so sabar dalam melakukan solat

         pastu, niat kena betul. ni fundamental. and then takbiratul ihram jangan tinggal. sebutlah "Allahuakbar" and remember it's meaning: Allah The Almighty. girls are encouraged to say it too but not out loud! asal diri sendiri boleh dengar, ok la tu. Allah is Mighty, we shouldn't be scared to admit that. =)

Have a great day ahead!