You are on page 1of 15

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 1.0 Introduction of Information Technology.

We use the term information technology or IT to refer to an entire industry. In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary.

IT is the area of managing technology and spans a wide variety of areas that include computer software, information systems,computer hardware, programming

languages but are not limited to things such as processes, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy: business process automation, providing information, connecting with customers, and productivity tools.

IT professionals perform a variety of functions that range from installing applications to designing complex computer networksand information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as management and administration of entire systems. Information technology is starting to spread further than the conventional personal computer and network technologies, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs.

[Type text]

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

2.0

Radio Frequency Identification (RFID).

2.1

Introduction. RFID technology has been available for more than fifty years. It has only been recently

that the ability to manufacture the RFID devices has fallen to the point where they can be used as a "throwaway" inventory or control device. Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. 2.2 Definition. RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. 2.3 Critical Issues regarding RFID.

2.3.1 RFID tags can be used to prevent surgeons from leaving sponges inside bodies of patients This article was taken from Natural News Thursday July 20, 2006. The radio frequency identification (RFID) tags that cause store alarms to go off when tagged items pass through may help surgeons keep track of sponges during operations, according to a Stanford University School of Medicine study released Monday. An earlier study revealed that one in every 10,000 patients who undergo surgery has a foreign object, usually a sponge, left
[Type text] 2

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI inside them by medical personnel. These objects can cause post-surgical complications and even death. "We need a system that is really fail-safe; where, regardless of how people use this technology, the patient doesn't leave the operating room with a retained foreign body," said Alex Marcario, a physician and professor of anesthesia who led the study, which was funded by the National Institutes of Health and a grant from the Small Business Innovation Research Program. Researchers tested the technology by deliberately leaving RFID tagged sponges inside eight study participants' temporarily closed surgical wounds, and then waving detector wands over them. Although the RFID tags help locate the sponges, the 20-millimeter chips used were too big to be practical for everyday use and would need to be smaller in the future, according to the study authors. Marcario said that the RFID tags would be most effective if used with other simpler techniques, like counting surgical tools and sponges before and after operations. Two of the coauthors of the study own patents related to the RFID sponges, and work for Clear Count Medical Solutions, the company that developed them. 2.3.2 Scientists push to implement edible RFID tracking chips in food.

This article is taken from Natural News by Ethan A. Huff on Friday, June 03, 2011.

It will monitor your calorie intake, show from where your food was sourced, and even let you know when the food in your fridge is about to go bad -- these are some of the enticing claims made by the developers of a new system that embeds edible radio frequency identification (RFID) chips directly into food. Its creators insist the technology will revolutionize the way humans eat for the better, but critical-thinking onlookers will recognize the ploy as just another way to track and control human behavior. Developed by Hannes Harms from the Royal College of Art in London, the "Nutri Smart" system is based on the idea that RFID wafers injected directly into food can help better track the food supplychain, further automate the supermarket shopping experience, and simplify threat experience by programming data into food so that humans essentially do not have to think about what they are doing.
[Type text] 3

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI The technology makes both eating and dealing with food in general mindless, as a person simply needs to plop an RFID-embedded food item onto a special RFID-laced plate, which then tells the person all about the item and how much of it to eat. RFID ovens and microwaves also eliminate having to think about how long to cook an RFID food item -- simply put it in the RFID microwave, oven, or toaster, and the machine will know exactly how long to cook the item.

As interesting and novel as this might sound, such technology is actually quite frightening when taken to its logical ends. Natural News previously warned that mad scientists have already developed edible RFID tags for use in pharmaceutical drugs . These tags, of course, can and will likely be used to monitor patients' compliance with doctors orders, and alert authorities if a patient refuses to take certain pills as prescribed. And if such technology also ends up in food, it is safe to assume that evil powers will seek to control the food supplywith it, as well as monitor the types of food people eat. In other words, if authorities one day decide that vitamin and mineral supplements are off limits, which is what is currently happening in Europe, it is plausible that RFID technology can assess illegal intake of such nutrients, and immediately send this data to the appropriate. This 1984-esque scenario appears to be more than just science fiction -- it is unfolding before our eyes just a little bit more every single day. And the Nutri Smart system is just another piece of evidence that those in power wish to micromanage every single aspect of our lives, from the drugs we take to the foods we eat.

2.4

Conclusion. In a conclusion, a reason why it has taken so long for RFID to come into common use

although it has a lot advantages is the lack of standards in the industry. Most companies invested in RFID technology only use the tags to track items within their control, many of the benefits of RFID come when items are tracked from company to company or from country to country.

[Type text]

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 3.0 Electronic Commerce.

3.1

Introduction.

Founded in the heart of Silicon Valley in 1993, ECI has consulted for a variety of EDI/e Commerce implementations from Fortune 100 companies to small private enterprises. Frequently, these projects are global in scope, require coordination with global teams, and encompass the implementation of variety of business processes and EDI/XML standards across multiple platforms.

3.2

Definition. Electronic Commerce is a leading consulting and service provider specializing in the

strategic and tactical implementation of business transactions into our clients' financial systems. We have the business and technical experience to help you achieve a successful implementation. 3.3 3.3.1 Critical Issues in Electronic Commerce. Enabling the Customers Electronic Commerce is enabling the customer to have an increasing say in what products are made, how products are made and how services are delivered (movement from a slow order fulfillment process with little understanding of what is taking place inside the firm, to a faster and open process with customers having greater control.

[Type text]

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 3.3.2 Increasing of Revenue Firm use technology to either lower operating costs or increase revenue. Electronic Commerce has the Potential to increase revenue by creating new markets for old products, creating new information-based products, and establishing new service delivery channels to better serve and interact with customers. The transaction management aspect of electronic commerce can also enable firms to reduce operating costs by enabling better coordination in the sales, production and distribution processes and to consolidate operations arid reduce overhead. 3.3 Conclusion. As we step into the 21st Century, the Internet has played an important role in human life. The Internet does not just perform its role as a channel for communication. It has now emerged as a machine to generate economic revenue. The Internet has become an excellent venue for advertising and conducting trade with consumers. The style of doing business using the electronic media especially the Internet is popularly known as e-commerce or e-business, the most used terms in the media today. This research aims to look at the Malaysian Internet users opinion and perception about Electronic Commerce application by employing quantitative and qualitative research methods. It identifies behaviors of Malaysia Internet users, behaviors of Malaysia online shoppers and Internet banking users, the factors that motivate the usage of electronic commerce application, the factors that hinder the adoption of electronic commerce application and future usage of electronic commerce application in Malaysia. The findings of this survey suggest that the usage of electronic commerce application in Malaysia is still in its infancy. Although there is a significant concern regarding security and privacy, lack of familiarity, and uncertainty about its benefit, there is a future in the growth of electronic commerce in Malaysia. With consumer education, government enforcement actions, and industry consumer protection initiatives, can make electronic commerce a safe and convenient way for conducting business

[Type text]

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 4.0 Fuzzy Logic (FL).

All information about Fuzzy Logic is taken from Encoder: The Newsletter of the Seattle Robotic Society. Written by Steven D. Kaehler. 4.1 Introduction. The concept of Fuzzy Logic (FL) was conceived by Lotfi Zadeh, a professor at the University of California at Berkley, and presented not as a control methodology, but as a way of processing data by allowing partial set membership rather than crisp set membership or nonmembership. This approach to set theory was not applied to control systems until the 70's due to insufficient small-computer capability prior to that time. Professor Zadeh reasoned that people do not require precise, numerical information input, and yet they are capable of highly adaptive control. If feedback controllers could be programmed to accept noisy, imprecise input, they would be much more effective and perhaps easier to implement. Unfortunately, U.S. manufacturers have not been so quick to embrace this technology while the Europeans and Japanese have been aggressively building real products around it. 4.2 Definition. FL is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multichannel PC or workstation-based data acquisition and control systems. It can be implemented in hardware, software, or a combination of both. FL provides a simple way to arrive at a definite
[Type text] 7

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's approach to control problems mimics how a person would make decisions, only much faster. 4.3 Critical Issue regarding Fuzzy Logic.

4.3.1 A simple temperature control system could use a single temperature feedback sensor whose data is subtracted from the command signal to compute "error" and then timedifferentiated to yield the error slope or rate-of-change-of-error, hereafter called "error-dot". Error might have units of degrees F and a small error considered to be 2F while a large error is 5F. The "error-dot" might then have units of degrees/min with a small error-dot being 5F/min and a large one being 15F/min. These values don't have to be symmetrical and can be "tweaked" once the system is operating in order to optimize performance. Generally, FL is so forgiving that the system will probably work the first time without any tweaking. 4.3.2 Fuzzy logic is used to control the operation of traffic light. In a conventional traffic light controller, the lights change at constant cycle time, which is clearly not the optimal solution. It would be more feasible to pass more cars at the green interval if there are fewer cars waiting behind the red lights. Obviously, a mathematical model for this decision is enormously difficult to find. However, with fuzzy logic, it is relatively much easier. First, eight incremental sensors are put in specific positions as seen in the diagram below.

[Type text]

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

The first sensor behind each traffic light counts the number cars coming to the intersection and the second counts the cars passing the traffic lights. The amount of cars between the traffic lights is determined by the difference of the reading of the two sensors. For example, the number of cars behind traffic light North is s7-s8.

The distance D, chosen to be 200ft., is used to determine the maximum density of cars allowed to wait in a very crowded situation. This is done by adding the number of cars between to paths and dividing it by the total distance. For instance, the number of cars between the East and West street is (s1-s2)+(s5-s6)/400. Next comes the fuzzy decision process which uses the three step mentioned above.

Step 1 : As before, firstly the inputs and outputs of the design has to be determined. Assuming red light is shown to both North and South streets and distance D is constant, the inputs of the model consist of cycle time, cars behind red light and cars behind green light.
[Type text] 9

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI The cars behind the light are the maximum number of cars in the two directions. The corresponding output parameter is the probability of change of the current cycle time. Once this is done, the input and output parameters are divided into overlapping member functions, each function corresponding to different levels. For inputs one and two the levels and their corresponding ranges are zero(0,1), low(0,7), medium(4,11), high(7,18), and chaos(14,20). For input 3 , the levels are were short(0,14), short(0,34), medium(14,60), long(33,88), very long(65,100), limit(85,100). The levels of output are no (0), probably no(0.25), maybe(0.5), probably yes (o.75), and yes(1.0). Step 2 : The rules, as before are formulated using a series of if-then statements, combined with AND/OR operators. Ex: if cycle time is medium AND cars behind red are low AND cars behind green is medium, then change is Probably Not. With three inputs, each having 5,5 and 6 membership functions, there are a combination of 150 rules. However using the minimum or maximum criterion some rules are combined to a total of 86.

Step 3 : This process, also mentioned above converts the fuzzy set output to real crisp value. The method used for this system is center of gravity: Crisp Output={Sum(Membership Degree*Singleton Position)}/(Membership degree) For example, if the output membership degree, after rule evaluation are: ~ ~ ~ ~
[Type text]

Change Probability Yes = 0 Change Probability Probably Yes = 0.6 Change Probability Maybe = 0.9 Change Probability Probably No = 0.3
10

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI ~ Change Probability No = 0.1

Then the crisp value will be: Crisp Output= (0.1X 0.00) + (0.3X 0.25) + (0.9X 0.50) + (0.6X 0.75) + (0X 1.00) /0.1+0.3+0.9+0.6+0 = 0.51

4.4. Conclusion. FL was conceived as a better method for sorting and handling data but has proven to be a excellent choice for many control system applications since it mimics human control logic. It can be built into anything from small, hand-held products to large computerized process control systems. It uses an imprecise but very descriptive language to deal with input data more like a human operator. It is very robust and forgiving of operator and data input and often works when first implemented with little or no tuning.

[Type text]

11

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 5.0 Wireless Radiation.

5.1

Introduction.

The first wireless transmitters went on the air in the early 20 th century using radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voices and music via wireless, the medium came to be called "radio." With the advent of television, fax, data communication, and the effective use of a larger portion of the spectrum, the term "wireless" has been resurrected. 5.2 Definition.

Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless. 5.3 Critical Issue regarding Wireless Radiation.

5.3.1 Universal Mobile Telecommunications System (UMTS). A broadband, packet-based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world.

[Type text]

12

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 5.3.2 i-Mode. The world's first "smart phone" for Web browsing, first introduced in Japan; provides color and video over telephone sets. 5.4 Conclusion.

Wireless technology is rapidly evolving, and is playing an increasing role in the lives of people throughout the world. In addition, ever-larger numbers of people are relying on the technology directly or indirectly. It has been suggested that wireless is overused in some situations, creating a social nuisance.

[Type text]

13

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 6.0 Fiber Optic.

6.1

Introduction. Optical communication systems date back to the 1790s, to the optical semaphore

telegraph invented by French inventor Claude Chappe. In 1880, Alexander Graham Bell patented an optical telephone system, which he called the Photo phone. However, his earlier invention, the telephone, was more practical and took tangible shape. The Photo phone remained an experimental invention and never materialized. During the 1920s, John Logic Baird in England and Clarence W. Hansel in the United States patented the idea of using arrays of hollow pipes or transparent rods to transmit images for television or facsimile systems. The use and demand for optical fiber has grown tremendously and optical-fiber applications are numerous. Telecommunication applications are widespread, ranging from global networks to desktop computers. These involve the transmission of voice, data, or video over distances of less than a meter to hundreds of kilometers, using one of a few standard fiber designs in one of several cable designs. 6.2 Definition. A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Data can be transmitted digitally (the natural form for computer data) rather than analogically.

[Type text]

14

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 6.3 Critical issue regarding Fiber Optic.

6.3.1 Optical fiber is also used extensively for transmission of data. Multinational firms need secure, reliable systems to transfer data and financial information between buildings to the desktop terminals or computers and to transfer data around the world. Cable television companies also use fiber for delivery of digital video and data services. The high bandwidth provided by fiber makes it the perfect choice for transmitting broadband signals, such as high-definition television (HDTV) telecasts. 6.3.2 Optical fiber is also used for the biomedical industry. Fiber optic systems are used in most modern telemedicine devices for transmission of digital diagnostic images. Other applications for optical fiber include space, military, automotive, and the industrial sector. 6.4 Conclusion. Fiber optics is a particularly popular technology for local-area networks. In addition, telephone companies are steadily replacing traditional telephone lines with fiber optic cables. In the future, almost all communications will employ fiber optics.

[Type text]

15

You might also like