In this seminar, Prof Gilbert drew our attention to the cyber crime which would be the next biggest crime source in the near future. I was interested in the video clip showed at the very beginning. There are a lot of ATM card stealing cases in China. But I have not heard about the "mechanism" before.
We also looked at the high tech crime. The terminology is quite complicated: there are different names for different cyber criminals:
Spammer:
People who abuse electronic messaging systems to send unsolicited bulk messages, which are generally undesired. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, Internet forum spam and junk fax transmissions.
Hacker:
A person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them.
Phisher:
People who attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out using email or an instant message,and often directs users to a website, although phone contact has been used as well.
So the security for cyber is quite difficult to maintain. Now criminals are high IQ people. The fight between good and bad is a fight in intelligence. I am worried if the pay for phishing, hacking or spamming is much much higher than our security warriors, warriors may turn their back to security.
From a cyber user's point of view, it is better to stop the criminals. From a cyber guard point of view, it is wiser to prevent crimes. The scenario is like gaming, such as chess. The essential ability is to forecast and predict future trend. This principle was also illustrated in our in-class activity: Cyberwar. If I did not understand wrongly, this should be the hint that Prof Gilbert wanted to give us. ^_^
Another surprising knowledge to me is the content about Russian mafia. So I searched a bit on its history. From Wikipedia:
Despite seeming to arise during the Fall of the Soviet Union, organized crime had existed throughout the imperial and communist eras as a form of open rebellion against the systems in the form of the "Thief's World". During this time organized crime was fiercely honor-based and often attacked and killed traitors among their ranks. Nevertheless, during World War II, many enlisted in the Russian Army resulting in the Suka Wars, which killed many of the thieves who were branded as government allies as well as the original thief underworld during Stalin's reign. The criminals, seeking a new survival strategy, began to ally with the elite in the Soviet Union as a means of survival, creating a powerful Russian black market.
The real breakthrough for criminal organizations occurred during the economic disaster of the 1990s that followed the fall of the Soviet Union. Desperate for money, many former government workers turned to crime and the Mafia became a natural extension of this trend. According to official estimates, some 100,000 Russians are committed mobsters, with a large but unknown number engaging in these criminal practices on and off.
Between 1992 and 1994 the Russian Mafia targeted the commercial centers of power, seizing control of the nation’s fragile banking system. At first the criminal gangs were content to merely “park” their large cash holdings in legitimate institutions, but soon they realized that the next step was the easiest of all: direct ownership of the bank itself.
Banking executives, reform-minded business leaders, even investigative journalists, were systematically assassinated or kidnapped. In 1993 alone, members of the eight criminal gangs that control the Moscow underworld murdered 10 local bankers. Calling themselves “Thieves in Law” (vori v zakone), Russian gangsters have murdered ninety-five bankers in the last five years.
Since the mid-90s the Russians have been trying to expand into America, most often via the trafficking of drugs and illegal weapons. This has led to some brutal wars with the organizations already present, including the Italian Mafia, Chinese Triads and the Yakuza. The group is believed to have links to Colombian drug smugglers and many smaller gangs as a result of the fall of the Soviet Union. Some also believe they are at the heart of gangs smuggling illegal workers west to the European Union and often Britain, though no proof has been offered for this at this time. The home of the Russian Mafia in America is in the Brighton Beach (dubbed by Russians "Little Odessa") neighborhood in New York.
Over the last few years, the FBI and Russian security services have tried to crack down on the Mafia, though the impact of this has yet to be measured.
Its history does not mention a lot on cyber crime. However, this will be the next big thing in recent years to mafia.
Xinjie: Welcome to My Blog!

I like my teapot!
Saturday, March 31, 2007
Monday, March 26, 2007
Seminar Ten Business Plan and Storytelling Skill
In this seminar, we focused mainly on the business plan which was closely related to our final project.
A business plan is a formal statement of a set of business goals, the reasons why they are believed attainable, and the plan for reaching those goals. It may also contain background information about the organization or team attempting to reach those goals.
Based on my searching results, there are a lot of business plan templates available online. To my big surprise, some websites even provide the service to construct customized plans for people. However, I will not try that because I can not trust them to make the right plan for me. ^_^
There are several components essential to a business plan:
1 Executive Summary
2 Organizational Background
2.1 Mission Statement
2.2 Current Status
2.3 History
2.4 Management Team
3 Product Portfolio
4 Marketing Plan
4.1 Market Size and Structure
4.2 Competitive analysis: Existing Markets
4.3 Competitive analysis: New Markets
4.4 Pricing
4.5 Demand Management
4.6 Distribution
4.7 Promotion and Brand Development
5 Operational Plan
5.1 Current Product/project status
5.2 Research and development plan
5.3 Manufacturing/Deployment plan
5.4 Information and Communications Technology Plan
5.5 Staffing Plan
5.5.1 Staffing Needs
5.5.2 Union issues
5.5.3 Training Requirements
5.5.4 Hiring Time Table
5.5.5 Staffing Budget
5.6 Business Process Outsourcing Plan
6 Asset Development Plan
6.1 Intellectual Property Plan
6.1.1 Intellectual Property Inventory
6.1.2 Portfolio Development Plan
6.2 Acquisition Plan
6.3 Organizational Learning Plan
7 Cost Allocation Model
8 Financial Plan
8.1 Current Financing
8.2 Funding Needs
8.3 Funding Plan
8.4 Financial History
8.5 Financial Forecasts
8.6 Valuation
9 Risk analysis
9.1 Risk Evaluation
9.2 Risk Management Plan
10 Decision Making Criteria
We are now working on our mobile food guide business plan. At the same time, I continue reading the text book of Mobile Web 2.0. There are some points I feel quite useful to our case, and yet we still not think about it.
1. The triangulation is based on the cell. The cells are not uniform. They are usually bigger in country side than that in urban region.
2. The needs to mobile food guide may need to be reconsidered. If the rate is a bit high, potential users will not choose to search by phone but just simply look around!
Hopefully, we can have these two points solved during next meeting.
The other part of this seminar is the storytelling skills shared by Prof Gilbert. That was really interesting. Although I am not good at telling a story, I personally think I am good at writing story--but in Chinese. The storytelling skill is important, especially in a business career. I may learn some from Prof during each seminar, because the stories he told in class are really attractive. It is time for me to improve my English.
A business plan is a formal statement of a set of business goals, the reasons why they are believed attainable, and the plan for reaching those goals. It may also contain background information about the organization or team attempting to reach those goals.
Based on my searching results, there are a lot of business plan templates available online. To my big surprise, some websites even provide the service to construct customized plans for people. However, I will not try that because I can not trust them to make the right plan for me. ^_^
There are several components essential to a business plan:
1 Executive Summary
2 Organizational Background
2.1 Mission Statement
2.2 Current Status
2.3 History
2.4 Management Team
3 Product Portfolio
4 Marketing Plan
4.1 Market Size and Structure
4.2 Competitive analysis: Existing Markets
4.3 Competitive analysis: New Markets
4.4 Pricing
4.5 Demand Management
4.6 Distribution
4.7 Promotion and Brand Development
5 Operational Plan
5.1 Current Product/project status
5.2 Research and development plan
5.3 Manufacturing/Deployment plan
5.4 Information and Communications Technology Plan
5.5 Staffing Plan
5.5.1 Staffing Needs
5.5.2 Union issues
5.5.3 Training Requirements
5.5.4 Hiring Time Table
5.5.5 Staffing Budget
5.6 Business Process Outsourcing Plan
6 Asset Development Plan
6.1 Intellectual Property Plan
6.1.1 Intellectual Property Inventory
6.1.2 Portfolio Development Plan
6.2 Acquisition Plan
6.3 Organizational Learning Plan
7 Cost Allocation Model
8 Financial Plan
8.1 Current Financing
8.2 Funding Needs
8.3 Funding Plan
8.4 Financial History
8.5 Financial Forecasts
8.6 Valuation
9 Risk analysis
9.1 Risk Evaluation
9.2 Risk Management Plan
10 Decision Making Criteria
We are now working on our mobile food guide business plan. At the same time, I continue reading the text book of Mobile Web 2.0. There are some points I feel quite useful to our case, and yet we still not think about it.
1. The triangulation is based on the cell. The cells are not uniform. They are usually bigger in country side than that in urban region.
2. The needs to mobile food guide may need to be reconsidered. If the rate is a bit high, potential users will not choose to search by phone but just simply look around!
Hopefully, we can have these two points solved during next meeting.
The other part of this seminar is the storytelling skills shared by Prof Gilbert. That was really interesting. Although I am not good at telling a story, I personally think I am good at writing story--but in Chinese. The storytelling skill is important, especially in a business career. I may learn some from Prof during each seminar, because the stories he told in class are really attractive. It is time for me to improve my English.
Tuesday, March 20, 2007
Seminar Nine Scenario Planning and Case Study
In this seminar, we focused mainly on the scenario planning method from a case-based perspective.
In the scenario about education, there are three key factors: market, knowledge base, and political requirement. As an education provider (polytechnics, universities, etc), our market is the recruiting companies and agencies. By properly sensing the need of talents and skills, we can modify the knowledge base of education. Since education is always in the social circumstances, we should consider the political issues all the time.
In the scenario about technology, the three factors change a bit: market, technology and political requirement. Here I want to elaborate only the political part. For new technology and issues raised by it to be legalized, the period of time is at least one year. It is reasonable for us to generalize that the legalization is always far behind new technology. This means it is not a good idea to solve potential problem after the born of new tech. Instead, there will be some suitable and foreseeing political requirements for new tech to follow. As a new tech provider or consumer, we need to consider these requirements very carefully.
From the search results of Scenario Analysis online, I found an interesting technique based on computing: Visualization of Scenarios, or Morphological Analysis.
Morphological Analysis
Morphological analysis (MA) is a non-quantified modelling method for structuring and analysing technical,organisational and social problem complexes. It is well suited for developing scenarios, and the method is highly appropriate for complex cases where expertise from several areas is required. It is also useful for developing and relating operational and tactical scenarios to force requirements. Using MA for scenario generation and strategy management typically involves workshop sessions supported by computer applications.
Morphological analysis (MA) is a non-quantified modelling method for structuring and analysing technical,organisational and social problem complexes. It is well suited for developing scenarios, and the method is highly appropriate for complex cases where expertise from several areas is required. It is also useful for developing and relating operational and tactical scenarios to force requirements. Using MA for scenario generation and strategy management typically involves workshop sessions supported by computer applications.
Process-data Model of MA This section presents the process-data model explaining the generic concepts and the activities involved in morphological analysis methods, as shown by figure below.
The left figure shows the meta-process model, which is the representation of the activities involved in performing morphological analysis. These activities are explained in more depth in section 2. On the right hand of the figure you see the meta-data model of morphological analysis, which is the presentation of the data that are produced by the activities of the method. Each of these data or concepts is detailed in section 3. The dashed lines in between the two models indicate the relationship between the activities and the produced data. An example of Morphological Analysis project to clarify the application of Morphological Analysis’activities is then presented in section 4. The aim of this example is to perform analysis and explore the possibilities to grow a start up company.
I think this seminar will improve our skill in case study and scenario analyzing, and thus is quite helpful for the final exam. ^_^
Sunday, March 11, 2007
Seminar Eight Interaction Design
In this seminar, we first presented our proof-of-concept for the mobile technology product of the final projects. Our group was the first to present the idea. It was a mobile food guide java system implemented in the phone. There are some similar products available in the market, but we have important differentiations from other food guides as our competitive advantages:
1. It is with the phone, unlike others are just available online.
2. It provides an easy grading system to collect the feedback from visitors as well as Singaporeans. This in fact utilize the Web 2.0 idea, the wisdom of crowd.
3. It is ads free. We will try to cover all the eateries and update them based on sourcing group from our company and also recommendations from users of our system.
The suggestions we got in the seminar discussion are the following:
1.Food preference : Hindu, Muslim
2.Language preference (inbuilt)
3.PPT attractiveness
4.Transportation
5.Views and average rating
6.Other restaurant not bound to the location (search for restaurant)
I am also thinking about collecting information based on different country groups. For example, people from India may not like the food loved by Chinese. With this sorting system, visitors can view the ratings of people from their country and also the overall ratings.
Other groups' proof-of-concepts were really fantastic. For our group, we still have a long way to go in terms of technique for creating beautiful flashes.
After all the presentations, we learnt some design issues. There are three levels in design: user interface, telecommunications infrastructure and application domain& service. To connect these phases, we need standards for both software and hardware. After having designed a prototype of a specific product, we need testing. One common practise is the iteration testing: First test design without users, then with different kinds of users. Use analysis from test data in next iteration of design, then retest with different users. Design for multiple user profiles, using a variety of interfaces and adaptive mechanisms.
There is one new information I am quite interested in: the simcard for mobile bank. I found relative knowledge from wikipedia:
SIM Application Toolkit (commonly referred to as STK) is a standard of the GSM system which enables the SIM to initiate actions which can be used for various value added services.
The SIM Application Toolkit consists of a set of commands programmed into the SIM card which define how the SIM should interact directly with the outside world and initiates commands independently of the handset and the network. This enables the SIM to build up an interactive exchange between a network application and the end user and access or control access to the network. The SIM also gives commands to the handset, such as display menu and ask for user input.
STK has been deployed by many mobile operators around the world for many applications, often where a menu-based approach is required, such as mobile banking and content browsing. Designed as a single application environment, STK can be started at the initial power up of the SIM card and is especially suited to low level applications with simple user interfaces.
Advantages of SIM Application Toolkit:
1. Some manufacturers claim that STK enables higher levels of security through identity verification and encryption, which are necessary for secure electronic commerce.
2.STK has been deployed on the largest number of mobile devices.
Limitations of STK:
1.After a SIM has been delivered to the customer it can be difficult to change the STK applications and menus on the SIM. To do so either the SIM must be returned and exchanged for a new one which is costly and inconvenient or in some cases the applications can be updated over the air. This limitation hinders the number and frequency of STK application deployment.
2.No multimedia support (only basic pictures)
3.Poor independent development support
1. It is with the phone, unlike others are just available online.
2. It provides an easy grading system to collect the feedback from visitors as well as Singaporeans. This in fact utilize the Web 2.0 idea, the wisdom of crowd.
3. It is ads free. We will try to cover all the eateries and update them based on sourcing group from our company and also recommendations from users of our system.
The suggestions we got in the seminar discussion are the following:
1.Food preference : Hindu, Muslim
2.Language preference (inbuilt)
3.PPT attractiveness
4.Transportation
5.Views and average rating
6.Other restaurant not bound to the location (search for restaurant)
I am also thinking about collecting information based on different country groups. For example, people from India may not like the food loved by Chinese. With this sorting system, visitors can view the ratings of people from their country and also the overall ratings.
Other groups' proof-of-concepts were really fantastic. For our group, we still have a long way to go in terms of technique for creating beautiful flashes.
After all the presentations, we learnt some design issues. There are three levels in design: user interface, telecommunications infrastructure and application domain& service. To connect these phases, we need standards for both software and hardware. After having designed a prototype of a specific product, we need testing. One common practise is the iteration testing: First test design without users, then with different kinds of users. Use analysis from test data in next iteration of design, then retest with different users. Design for multiple user profiles, using a variety of interfaces and adaptive mechanisms.
There is one new information I am quite interested in: the simcard for mobile bank. I found relative knowledge from wikipedia:
SIM Application Toolkit (commonly referred to as STK) is a standard of the GSM system which enables the SIM to initiate actions which can be used for various value added services.
The SIM Application Toolkit consists of a set of commands programmed into the SIM card which define how the SIM should interact directly with the outside world and initiates commands independently of the handset and the network. This enables the SIM to build up an interactive exchange between a network application and the end user and access or control access to the network. The SIM also gives commands to the handset, such as display menu and ask for user input.
STK has been deployed by many mobile operators around the world for many applications, often where a menu-based approach is required, such as mobile banking and content browsing. Designed as a single application environment, STK can be started at the initial power up of the SIM card and is especially suited to low level applications with simple user interfaces.
Advantages of SIM Application Toolkit:
1. Some manufacturers claim that STK enables higher levels of security through identity verification and encryption, which are necessary for secure electronic commerce.
2.STK has been deployed on the largest number of mobile devices.
Limitations of STK:
1.After a SIM has been delivered to the customer it can be difficult to change the STK applications and menus on the SIM. To do so either the SIM must be returned and exchanged for a new one which is costly and inconvenient or in some cases the applications can be updated over the air. This limitation hinders the number and frequency of STK application deployment.
2.No multimedia support (only basic pictures)
3.Poor independent development support
Monday, February 26, 2007
Seminar Seven: Podcasting
In this seminar , we learnt podcasting and its potential applications. The reason why I use "potential application" is that, usually podcasting means a tool to entertain viewers or publicize certain ideas and products, however, it can also deliver messages(an alternative of meeting). This idea is new to me and I think if we think more creatively, there will be tons of functions that podcasting will contain. For example, psdcasting can work for scientists when they have new discoveries or contributions, they can easily make a podcasting to elaborate more with papers. If readers want to learn more about the new idea, they can simply search for the scientist's name and the title of the paper to gain more comprehensive and visual explanations.
The other thing I think is really useful in this seminar is that the prof provide us quite a lot of websites and e-products. I like the audacity and now use it for building our elevator pitch sound background.
The results for the OCBC case study competition is still now released yet. Gabriel, Dawen and I worked quite hard for that. Hope we can get passed.
The other thing I think is really useful in this seminar is that the prof provide us quite a lot of websites and e-products. I like the audacity and now use it for building our elevator pitch sound background.
The results for the OCBC case study competition is still now released yet. Gabriel, Dawen and I worked quite hard for that. Hope we can get passed.
Friday, February 16, 2007
Seminar 6 Disruptive Potential of Web 2.0
In this seminar, we mainly talked about the case studies. For a given case study, we need to choose from different approaches and give out suggestions for that specific situation. Case study is a more powerful tool in terms of reality than business theory.
The following is relevant information from Wikipedia about case study:
A case study is a research strategy, sometimes likened to an experiment, a history, or a simulation, though not linked to any particular type of evidence or method of data collection (Yin 2003). It is qualitative research, as isn't often confused by laymen.
Rather than using large samples and following a rigid protocol to examine a limited number of variables, case study methods involve an in-depth, longitudinal examination of a single instance or event: a case. They provide a systematic way of looking at events, collecting data, analyzing information, and reporting the results. As a result the researcher may gain a sharpened understanding of why the instance happened as it did, and what might become important to look at more extensively in future research. Case studies lend themselves to both generating and testing hypotheses (Flyvbjerg, 2006).
Yin, on the other hand, suggests that case study should be defined as a research strategy, an empirical inquiry that investigates a phenomenon within its real-life context. Case study research means single- and multiple case studies, can include quantitative evidence, relies on multiple sources of evidence and benefits from the prior development of theoretical propositions. He notes that case studies should not be confused with qualitative research and points out that they can be based on any mix of quantitative and qualitative evidence (Yin, 2002). This is also supported and well-formulated in (Lamnek, 2005): "The case study is a research approach, situated between concrete data taking technique and methodological paradigm".
The points that I need further understanding are:
Value Chain Analysis
Financial Analysis
Value Chain Analysis
The value chain is a concept from business management that was first described and popularized by Michael Porter in his 1985 best-seller, Competitive Advantage: Creating and Sustaining Superior Performance.
The value chain categorizes the generic value-adding activities of an organization. The "primary activities" include: inbound logistics, operations (production), outbound logistics, marketing and sales, and services (maintenance). The "support activities" include: administrative infrastructure management, human resource management, R&D, and procurement. The costs and value drivers are identified for each value activity. The value chain framework quickly made its way to the forefront of management thought as a powerful analysis tool for strategic planning. Its ultimate goal is to maximize value creation while minimizing costs.
Financial analysis
It refers to an assessment of the viability, stability and profitability of a business, sub-business or project.
It is performed by professionals who prepare reports using ratios that make use of information taken from financial statements and other reports. These reports are usually presented to top management as one of their basis in making business decisions. Based on these reports, management may:
Continue or discontinue its main operation or part of its business;
Make or purchase certain materials in the manufacture of its product;
Acquire or rent/lease certain machinery and equipments in the production of its goods;
Issue stocks or negotiate for a bank loan to increase its working capital.
other decisions that allow management to make an informed selection on various alternatives in the conduct of its business.
Financial analysts often assess the firm's:
1. Profitability- its ability to earn income and sustain growth in both short-term and long-term. A company's degree of profitability is usually based on the income statement, which reports on the company's results of operations;
2. Solvency- its ability to pay its obligation to debtors and other third parties in the long-term;3. Liquidity- its ability to maintain positive cash flow, while satisfying immediate obligations;
Both 2 and 3 are based on the company's balance sheet, which indicates the financial condition of a business as of a given point in time.
4. Stability- the firm's ability to remain in business in the long run, without having to sustain significant losses in the conduct of its business. Assessing a company's stability requires the use of both the income statement and the balance sheet, as well as other financial and non-financial indicators.
I will learn more about the case study and hope we can do well in the competition!
The following is relevant information from Wikipedia about case study:
A case study is a research strategy, sometimes likened to an experiment, a history, or a simulation, though not linked to any particular type of evidence or method of data collection (Yin 2003). It is qualitative research, as isn't often confused by laymen.
Rather than using large samples and following a rigid protocol to examine a limited number of variables, case study methods involve an in-depth, longitudinal examination of a single instance or event: a case. They provide a systematic way of looking at events, collecting data, analyzing information, and reporting the results. As a result the researcher may gain a sharpened understanding of why the instance happened as it did, and what might become important to look at more extensively in future research. Case studies lend themselves to both generating and testing hypotheses (Flyvbjerg, 2006).
Yin, on the other hand, suggests that case study should be defined as a research strategy, an empirical inquiry that investigates a phenomenon within its real-life context. Case study research means single- and multiple case studies, can include quantitative evidence, relies on multiple sources of evidence and benefits from the prior development of theoretical propositions. He notes that case studies should not be confused with qualitative research and points out that they can be based on any mix of quantitative and qualitative evidence (Yin, 2002). This is also supported and well-formulated in (Lamnek, 2005): "The case study is a research approach, situated between concrete data taking technique and methodological paradigm".
The points that I need further understanding are:
Value Chain Analysis
Financial Analysis
Value Chain Analysis
The value chain is a concept from business management that was first described and popularized by Michael Porter in his 1985 best-seller, Competitive Advantage: Creating and Sustaining Superior Performance.
The value chain categorizes the generic value-adding activities of an organization. The "primary activities" include: inbound logistics, operations (production), outbound logistics, marketing and sales, and services (maintenance). The "support activities" include: administrative infrastructure management, human resource management, R&D, and procurement. The costs and value drivers are identified for each value activity. The value chain framework quickly made its way to the forefront of management thought as a powerful analysis tool for strategic planning. Its ultimate goal is to maximize value creation while minimizing costs.
Financial analysis
It refers to an assessment of the viability, stability and profitability of a business, sub-business or project.
It is performed by professionals who prepare reports using ratios that make use of information taken from financial statements and other reports. These reports are usually presented to top management as one of their basis in making business decisions. Based on these reports, management may:
Continue or discontinue its main operation or part of its business;
Make or purchase certain materials in the manufacture of its product;
Acquire or rent/lease certain machinery and equipments in the production of its goods;
Issue stocks or negotiate for a bank loan to increase its working capital.
other decisions that allow management to make an informed selection on various alternatives in the conduct of its business.
Financial analysts often assess the firm's:
1. Profitability- its ability to earn income and sustain growth in both short-term and long-term. A company's degree of profitability is usually based on the income statement, which reports on the company's results of operations;
2. Solvency- its ability to pay its obligation to debtors and other third parties in the long-term;3. Liquidity- its ability to maintain positive cash flow, while satisfying immediate obligations;
Both 2 and 3 are based on the company's balance sheet, which indicates the financial condition of a business as of a given point in time.
4. Stability- the firm's ability to remain in business in the long run, without having to sustain significant losses in the conduct of its business. Assessing a company's stability requires the use of both the income statement and the balance sheet, as well as other financial and non-financial indicators.
I will learn more about the case study and hope we can do well in the competition!
Tuesday, February 13, 2007
No Assignment For 7 Days
We were told that there would be no presentation in Seminar 6. Everyone seemed quite happy.
Another shocking news was that the out and in seminar time ratio is 2:1, which meant for 3 hours seminar, by right we should spend 6 hours at home. Wow, quite a lot! I need to work harder to catch up.
My plan in the recess week is to learn flash. Hope I will have a good result. Cheers!
Another shocking news was that the out and in seminar time ratio is 2:1, which meant for 3 hours seminar, by right we should spend 6 hours at home. Wow, quite a lot! I need to work harder to catch up.
My plan in the recess week is to learn flash. Hope I will have a good result. Cheers!
Seminar Five Governing The Freedom Economy
As usual, the first half seminar was for the assignment presentation. We showed our own elevator pitches and most of them were quite interesting. Some useful points that Prof Gilbert elaborated along our presentation:
1. Revenue model should be included and can be simple.2. Words appearing on the screen should be brief and short.
3. Animation could be added to show business idea better.
4. As an elevator pitch, we could think about an impressive end and reinforce that your good idea can work excellently(the last group, a "movie"- like end).
These points made me think and they were really useful. Combined with the sample elevator pitches we watched that day, I derived the following elements in addition to contribute to the successful pitch making:
5. Attractive and differentiable background music. For music, I think it is better to choose the right one for targeted audience. If we want to sell idea to young people, rap and pop music may work well. But what if the target buyers are senior people? The most suitable music will certainly change.
6. Good and original idea. It is the soul of whole elevator pitch. Without a good idea, there is no selling point for the elevator pitch.
7. Clear logic flow and easy to understand. This make audience feel comfortable to follow up our idea and less easier to get bored.
After a better understanding of the elevator pitch, we were required to improve our pitch and post them on YouTube. For our group(A+ Group), we would cut some details in order to not be wordy. We would also include the revenue model part and our competitive advantages for completeness.
In the other half seminar, we learnt about the governing the freedom economy.
This is quite useful for our final business plan. We need to consider the norms, rules, laws. And for new product, we'd better to follow the social norms, because it is easier to extend norm than to create a new norm.
Thursday, February 1, 2007
Fourth Seminar: The Business Model
We changed to another seminar room for this session.
In the first part of the seminar, each of the groups presented their model to make a new infomating Jurong Bird Park. Besides blue tooth and mobile radio, I think our model, the bar code reading method is a also a quite good one. Because not all the mobile phone has the feature of blue tooth, the bar code seems more convenient for most of the visitors. For the problem of queuing up at the registration site, my idea is that to apply the same principle of buying a movie ticket via sms, we can enable the mms users to use the mms of the bar code as the physical ticket they may otherwise buy. And visitors can scan the bar code from the screen of their phone. I think this will be convenient enough.
In the second half session, we learnt about the business model. Some quite revolutionary and novel models like E-Bay, Amazon.com are introduced.
At the end, Prof Gilbert discussed the term project with us. One thing I want to mention is when we asked for the guidelines of the elevator pitch after class, Prof talked about his idea of walk-tour. I think I have some thoughts for that. We can introduce the electronic paper(this may not be available now, but in a few years, this kind of paper will be quite popular). There will be map of the place of interest, in this case, should be Singapore, and also different icons standing for major buildings on that paper. When walking in a place, you can actually touch the place on the map and a detailed map for that region will appear on the paper. You can find cafes, restaurants, hotels, shopping malls on the map. For the famous sites, like Singapore River, Raffles' Building, there will be a sound icon beside the site on the map. By clicking that, you will receive a call from the Singapore Tourism Board Information Center. The working principle is the same as we applied in JBP. So, the tourist will feel quite satisfied for this kind of walking journey.
In the first part of the seminar, each of the groups presented their model to make a new infomating Jurong Bird Park. Besides blue tooth and mobile radio, I think our model, the bar code reading method is a also a quite good one. Because not all the mobile phone has the feature of blue tooth, the bar code seems more convenient for most of the visitors. For the problem of queuing up at the registration site, my idea is that to apply the same principle of buying a movie ticket via sms, we can enable the mms users to use the mms of the bar code as the physical ticket they may otherwise buy. And visitors can scan the bar code from the screen of their phone. I think this will be convenient enough.
In the second half session, we learnt about the business model. Some quite revolutionary and novel models like E-Bay, Amazon.com are introduced.
At the end, Prof Gilbert discussed the term project with us. One thing I want to mention is when we asked for the guidelines of the elevator pitch after class, Prof talked about his idea of walk-tour. I think I have some thoughts for that. We can introduce the electronic paper(this may not be available now, but in a few years, this kind of paper will be quite popular). There will be map of the place of interest, in this case, should be Singapore, and also different icons standing for major buildings on that paper. When walking in a place, you can actually touch the place on the map and a detailed map for that region will appear on the paper. You can find cafes, restaurants, hotels, shopping malls on the map. For the famous sites, like Singapore River, Raffles' Building, there will be a sound icon beside the site on the map. By clicking that, you will receive a call from the Singapore Tourism Board Information Center. The working principle is the same as we applied in JBP. So, the tourist will feel quite satisfied for this kind of walking journey.
Sunday, January 28, 2007
Third Seminar : Collective Intelligence and the Web 2.0 Paradigm
In this seminar, we learnt the interesting phenomenon that crowd is usually much smarter than the smartest individual. What I feel more persuasive is the advantage of diversity of a group. This is also the essential part of Web 2.0. We can have a lot of people from different divisions and provide broader images. For a same question, we can have answers from different perspectives. What's more, the minority's voice can also be heard.
Near the end of the seminar, Prof Gilbert talked about the working principle of mobile phone calling and sms. The network is extremely important.
I search for the mobile network operators (retrieved from wiki pedia): The China Mobile is the largest company in terms of the subscribers population. Second is Vadafone operated in United Kingdom. Interestingly, the third is still a Chinese company, China Unicom. For Singapore, SingTel, the ranking is 17 which is not bad. And the technology used in network in Singapore is GSM, UMTS.
There are various technologies used around the world: GSM, GPRS, EDGE, UMTS, HSDPA, CDMA, CDMA2000 1x, EV-DO,etc.
Here I want to introduce the GSM and UMTS since both of them are used in Singapore.
GSM
The Global System for Mobile Communications (GSM: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. GSM service is used by over 2 billion people across more than 212 countries and territories.
Network Structure:
The network behind the GSM system seen by the customer is large and complicated in order to provide all of the services which are required. It is divided into a number of sections and these are each covered in separate articles.
the Base Station Subsystem (the base stations and their controllers).
the Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network.
the GPRS Core Network (the optional part which allows packet based Internet connections).
all of the elements in the system combine to produce many GSM services such as voice calls and SMS.
the Base Station Subsystem (the base stations and their controllers).
the Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network.
the GPRS Core Network (the optional part which allows packet based Internet connections).
all of the elements in the system combine to produce many GSM services such as voice calls and SMS.
UMTS
Universal Mobile Telecommunications System (UMTS) is one of the third-generation (3G) mobile phone technologies. The currently most common form uses W-CDMA as the underlying air interface, is standardized by the 3GPP, and is the European answer to the ITU IMT-2000 requirements for 3G cellular radio systems.
To differentiate UMTS from competing network technologies, UMTS is sometimes marketed as 3GSM, emphasizing the combination of the 3G nature of the technology and the GSM standard which it was designed to succeed.
To differentiate UMTS from competing network technologies, UMTS is sometimes marketed as 3GSM, emphasizing the combination of the 3G nature of the technology and the GSM standard which it was designed to succeed.
Technology:
UMTS combines the W-CDMA, TD-CDMA, or TD-SCDMA air interfaces, GSM's Mobile Application Part (MAP) core, and the GSM family of speech codecs. In the most popular cellular mobile telephone variant of UMTS, W-CDMA is currently used. Note that other wireless standards use W-CDMA as their air interface, including FOMA.
UMTS over W-CDMA uses a pair of 5 MHz channels. In contrast, the competing CDMA2000 system uses one or more arbitrary 1.25 MHz channels for each direction of communication. UMTS and other W-CDMA systems are widely criticized for their large spectrum usage, which has delayed deployment in countries that acted relatively slowly in allocating new frequencies specifically for 3G services (such as the United States).
The specific frequency bands originally defined by the UMTS standard are 1885-2025 MHz for uplink and 2110-2200 MHz for downlink. In the US, the 1700MHz band will be used instead of 1900MHz - which is already in use - for the uplink by many UMTS operators. Additionally, UMTS is commonly run on 850MHz and 1900MHz (independently, for both the uplink and downlink) in some countries, notably in the US by Cingular Wireless.
For existing GSM operators, it is a simple but costly migration path to UMTS: much of the infrastructure is shared with GSM, but the cost of obtaining new spectrum licenses and overlaying UMTS at existing towers can be prohibitively expensive.
A major difference of UMTS compared to GSM is the air interface forming Generic Radio Access Network (GeRAN). It can be connected to various backbone networks like the Internet, ISDN, GSM or to a UMTS network. GeRAN includes the three lowest layers of OSI model. The network layer (OSI 3) protocols form the Radio Resource Management protocol (RRM). They manage the bearer channels between the mobile terminals and the fixed network including the handovers.
UMTS over W-CDMA uses a pair of 5 MHz channels. In contrast, the competing CDMA2000 system uses one or more arbitrary 1.25 MHz channels for each direction of communication. UMTS and other W-CDMA systems are widely criticized for their large spectrum usage, which has delayed deployment in countries that acted relatively slowly in allocating new frequencies specifically for 3G services (such as the United States).
The specific frequency bands originally defined by the UMTS standard are 1885-2025 MHz for uplink and 2110-2200 MHz for downlink. In the US, the 1700MHz band will be used instead of 1900MHz - which is already in use - for the uplink by many UMTS operators. Additionally, UMTS is commonly run on 850MHz and 1900MHz (independently, for both the uplink and downlink) in some countries, notably in the US by Cingular Wireless.
For existing GSM operators, it is a simple but costly migration path to UMTS: much of the infrastructure is shared with GSM, but the cost of obtaining new spectrum licenses and overlaying UMTS at existing towers can be prohibitively expensive.
A major difference of UMTS compared to GSM is the air interface forming Generic Radio Access Network (GeRAN). It can be connected to various backbone networks like the Internet, ISDN, GSM or to a UMTS network. GeRAN includes the three lowest layers of OSI model. The network layer (OSI 3) protocols form the Radio Resource Management protocol (RRM). They manage the bearer channels between the mobile terminals and the fixed network including the handovers.
Sunday, January 21, 2007
Second Seminar: Technology Infrastructure: The Internet and The World Wide Web
In this seminar, we learnt the history and the trend of internet and www.
Topics covered are:
--The origin, growth, and current structure of the Internet
--How packet-switched networks are combinedto form the Internet
--How Internet protocols and Internetaddressing work
--The history and use of markup languages on the Web, including SGML, TML, and XML
--How HTML tags and links work on the WorldWide Web
--The differences among internets, intranets,and extranets
--Options for connecting to the Internet,including cost and bandwidth factors
--About Internet 2 and the Semantic Web
During the html lab, I tried to build a web page for the first time. It seemed really interesting to me. I will spend some time and learn more about the html.
Topics covered are:
--The origin, growth, and current structure of the Internet
--How packet-switched networks are combinedto form the Internet
--How Internet protocols and Internetaddressing work
--The history and use of markup languages on the Web, including SGML, TML, and XML
--How HTML tags and links work on the WorldWide Web
--The differences among internets, intranets,and extranets
--Options for connecting to the Internet,including cost and bandwidth factors
--About Internet 2 and the Semantic Web
During the html lab, I tried to build a web page for the first time. It seemed really interesting to me. I will spend some time and learn more about the html.
Monday, January 15, 2007
First Seminar Introduction to Electronic and Mobile Commerce
This was the first session of BM362. I learnt quite a lot of new things during the three hours. They were :
--Data Services as Disruption
--Course Structure and Conduct
--Supply-side: Convergence or Chaos?
--Demand-side: Network-based Freedoms
--Business Models and New ICT: Web 2.0
Here I want highlight the third and fifth topic.
"Supply-side: Convergence or Chaos?"
Before the seminar, I have read the paper about FMC "The Impact of Fixed Mobile Convergence Technology on Market Entry" and have done some research on it. From my searching results, convergence of technology is a main trend in today's world. There are voice-data convergence, fixed-mobile convergence. They provide more convenience to users by improving technology in e-commerce field. For those who feel interested in voice-data convergence, here is the link to more
details:http://direct.xilinx.com/bvdocs/whitepapers/wp138.pdf
Business Models and New ICT: Web 2.0
My interest fell in the term Web 2.0 because I am not familiar with it.
Explanation from wikipedia :
Alluding to the version-numbers that commonly designate software upgrades, the phrase "Web 2.0" hints at an improved form of the World Wide Web; and advocates suggest that technologies such as weblogs, social bookmarking, wikis, podcasts, RSS feeds (and other forms of many-to-many publishing), social software, Web APIs, Web standards and online Web services imply a significant change in web usage.Alluding to the version-numbers that commonly designate software upgrades, the phrase "Web 2.0" hints at an improved form of the World Wide Web; and advocates suggest that technologies such as weblogs, social bookmarking, wikis, podcasts, RSS feeds (and other forms of many-to-many publishing), social software, Web APIs, Web standards and online Web services imply a significant change in web usage.
Characteristics of Web 2.0:
--"Network as platform" — delivering (and allowing users to use) applications entirely through a browser.See also Web operating system.
--Users owning the data on the site and exercising control over that data.
--An architecture of participation and democracy that encourages users to add value to the application as they use it.
--A rich, interactive, user-friendly interface based on Ajax or similar frameworks.
--Some social-networking aspects.
--It is a Public good. "public goods" are characterized by two properties: jointness of supply and non-excludability (Hardin, 1982 ). The impossibility to exclude group members who didn’t contribute to the provision of goods from sharing its profits gives rise to the possibility that rational members will prefer to withhold their contribution of effort and "free ride" (see Free rider problem) on contribution of others (Marwell and Ames, 1979).
--Data Services as Disruption
--Course Structure and Conduct
--Supply-side: Convergence or Chaos?
--Demand-side: Network-based Freedoms
--Business Models and New ICT: Web 2.0
Here I want highlight the third and fifth topic.
"Supply-side: Convergence or Chaos?"
Before the seminar, I have read the paper about FMC "The Impact of Fixed Mobile Convergence Technology on Market Entry" and have done some research on it. From my searching results, convergence of technology is a main trend in today's world. There are voice-data convergence, fixed-mobile convergence. They provide more convenience to users by improving technology in e-commerce field. For those who feel interested in voice-data convergence, here is the link to more
details:http://direct.xilinx.com/bvdocs/whitepapers/wp138.pdf
Business Models and New ICT: Web 2.0
My interest fell in the term Web 2.0 because I am not familiar with it.
Explanation from wikipedia :
Alluding to the version-numbers that commonly designate software upgrades, the phrase "Web 2.0" hints at an improved form of the World Wide Web; and advocates suggest that technologies such as weblogs, social bookmarking, wikis, podcasts, RSS feeds (and other forms of many-to-many publishing), social software, Web APIs, Web standards and online Web services imply a significant change in web usage.Alluding to the version-numbers that commonly designate software upgrades, the phrase "Web 2.0" hints at an improved form of the World Wide Web; and advocates suggest that technologies such as weblogs, social bookmarking, wikis, podcasts, RSS feeds (and other forms of many-to-many publishing), social software, Web APIs, Web standards and online Web services imply a significant change in web usage.
Characteristics of Web 2.0:
--"Network as platform" — delivering (and allowing users to use) applications entirely through a browser.See also Web operating system.
--Users owning the data on the site and exercising control over that data.
--An architecture of participation and democracy that encourages users to add value to the application as they use it.
--A rich, interactive, user-friendly interface based on Ajax or similar frameworks.
--Some social-networking aspects.
--It is a Public good. "public goods" are characterized by two properties: jointness of supply and non-excludability (Hardin, 1982 ). The impossibility to exclude group members who didn’t contribute to the provision of goods from sharing its profits gives rise to the possibility that rational members will prefer to withhold their contribution of effort and "free ride" (see Free rider problem) on contribution of others (Marwell and Ames, 1979).
Friday, January 12, 2007
First Class of MB362
This Thursday was the first class of e-commerce. Other than the normal introduction, a really funny thing happened. I went to the seminar room, seeing our Prof writing something on whiteboard-- and, there was only the prof! We waited for about 1o min then realized there might be some confussion. OMG, we went to the wrong room! This was really a special start for this course.
Subscribe to:
Posts (Atom)