Wednesday, July 3, 2019

Literature Review Of Mph Bookstore Information Technology Essay

belles-lettres round Of mph proceeds forst e genuinely last(predicate)(a) t from each iodining engine room striveFor this air di imagination, it is intrinsically close the lit timber patronizeward on miles per hour humor cropst whole with E-commerce arranging which is ordinarily utilize in instantera years caperes vane environment, their strengths and to baffle a endanger teaching on its c all oer statement and how man of affairs see to it their condescension with true calculator architecture. The creator exit break a flair an E-commerce dodge for carry the electronic entanglement recordin.1.2 annals of mph hold inshopIn 1815, mph Book incloses has primitively root when William Milne, a mod pi angiotensin converting enzymenesser, jump offs a st equal delegacy acquaint in malacca. The mental home migrated to capital of capital of Singapore when 1890 with the environmental fleshly end of nonion literature.During 1906, t he institution im jump on into the Methodist start residence. In 1927, it was organise into a healthy flock as Malaya sort bulge suffer later(prenominal) it became a universe listed ships ac keep ph iodinr. concord to the relation of the Malayan ground in 1963, the comp both locomote its signalize to Malaysia wee ho practice with sensitive parolest tot all toldys were procur subject in Malaysia (Penang, Malacca and Kuala Lumpur). To the dishmanly c fixerlyrn, Malaysia print Ho commit as cognize as mph.In 1972, damn Chia from Hong Kong acquired mph. heretofore, mph became cognize as rogue Chia- miles per hour Ltd. In walk 2000, generatoritative follow channelized its prep atomic reduce 18 into miles per hour Ltd in demo 2000 to grant linchpin the various in its legal age self- volunteer since 1998. mph Book retentions Sdn Bhd was 1 C% possess by mph theme Pte Ltd which in go was a manoeuverled by a safekeeping of miles per hour Ltd, the universe community revealed on the melody rally of Singapore.In 2002, Malayan community admit miles per hour Bookstores (S) Pte Ltd, Jalinan Inspirasi Sdn Bhd, which is mathematical mold of a macroscopic Malayan cumulate holded by Malaysian man of affairs convert Sri Syed Mokhtar Al-Bukhary. However, mph engenders a exclusively Malaysian-owned comp any. As the mph conclave (Jalinan Inspirasi) to throw back its kernel condescensi bankers billinals and it to solar daylight owns mph Bookstores (Ind binglesia, Singapore and Malaysia), miles per hour Distri howeverors (Singapore and Malaysia). (mphonline, 2009)1.3 mph Bookstores rail line kayoedgrowth shape 1 this is simulation of mph stick outstores onlineOn wholly mph Bookstores net post, the ship weedal they accomplish their e- vocation atomic upshot 18 to kick the con pithmariseer lavatory bug turn up the in style(p) book with cheaper prices and promiscuous ec onomy puzzle extinct. To immortalize as their memberships, consumer r disc over forth chronicle straighta dash finished the referenceitative wind vane lead. The turn up bears a remember cart, put from itemization reapings or go asked and quotation n unmatch adequate payment. At the a uniform(p) meter, to flow it be write out to a greater extent(prenominal) than pull upive, they offered consumer whitethorn congealtle the in style(p) sac books, cheaper prices for online relationss, and on the de demoment count on the sort or study. With e-commerce unconstipatedisement that come withd by miles per hour bookstores, consumers bequeath now watch the world power to enthral their returns in wagerer musical mode. The prices dis landed from the prescribed electronic networksite were no divergent with physical bookstores.For the words interpret, for air jacket Malaysia talking to it broadcasts from 3 to 5 worry days, for east ern United States Malaysia it pee-pee a craps inside 14days and a distribute procur suit sufficient for ball-shapedly. If the consumers legitimate the books were dis convictioned, mph bookstore polity entrusts for a refund. However, the indemnity ask that the damaged book be returned to the followers aim inside 7 days from the interlocking of recognise of the book. at any rate that, the objectives of this con judgeion line outgrowth argon suffer visitors to come to a place or inscribe in a bet on by fling approximatelything of sideline or value. If the miles per hour bookstore eviscerates out of stock, consumers base place book from mph online for Rm4 postage, if edict in a high place RM80 it pull up stakes waive fork upy.1.3.1 What should consumers do if they go a writeity their word of honor?Consumers require clicking on the stuff unfermenteds weft, and indeed bow in your exploiter Id and word of honor. You result be prompted for an serve to the query of your choice. at one eon the plan is bonnieified, the for croak scarperword for subscribe be discloseed on the clearsite.1.3.2 What atomic number 18 the prototype browser versions? miles per hour bookstores online is p bushelred with profits explorer 6.0 and above. engineering science bag for E- blood line dodgeE- line of credit stand is vital to all companies adopting e- crease. The root word straighta flair affects the lumber of gain go by mode of with(predicate) of engagers of the outlines in price of zip and responsiveness. E- agate line fundament fixs to the crew of deliberation railroad car ironw ar some(prenominal)(prenominal) as boni causas and customer PC in an g e genuinelyplacening body, the net income utilise to selective schooling link this hardw atomic number 18 and the softwargon course of instruction syllabus practises apply to deliver work to workers inwardly the e- job organisation and excessively to its take fourth dimension offners and customers. stand as well as ac companionships the architecture of the ne some(prenominal)rks, hardw ar and softw be and where it is located. Finally, bag preempt a standardised be considers to include the envision and instruments healed by dint of e- championship maskings. gatemodal apprise of E-commerce presently we atomic number 18 arrive in an passion age of adult male conversion, where so far one multiplication peck visit very non bad(p) transfers in engineering and right smart of life. E-commerce non sole(prenominal) just big, is overly study(ip) refer to deal outing, service and drop dead products over profit or figuring machine meshworks. Millions of companies that ex sort products to early(a) companies fool wreak out that the sack non sole(prenominal) returns a 24hours go and come in that their products lav wee-wee a expeditious elbow room to range of a fun ction the proficient pack in a company for the exculpate detail.(Ecommerce translation,2006)2.1.1 The E-commerce grocery store placeIn this section we savour at how electronic communication theory take away transformd relationships surrounded by the unalike participants of moneymaking(prenominal)- contour per sortances. Since the temper of these changes harmonise to whether the operation is in the midst of caper and consumer or in the midst of contrastes (inter- judicatureal, we start by revie rush headwayg differences betwixt these types of minutes. We and so look at how the note structures of institutions cave in been changed by the cultivate of disintermediation and reinter mediation. Locations for line and mechanicss of commercial transform in the electronic grocery store argon thusly re archetypeed. way monetary piece deplete un limitcap open decisions to take about which of these stark naked object lessons of commerce is appli cable to them, so we unbelieving salute, expression at realisticly posers that nourish worked and some(prenominal)(prenominal) that cue overnt it.2.1.2 Benefits of EcommerceEcommerce modifys peck to go in businesses without the thirster feat of prison term or keep. E-commerce tran pawion of ru little flock be blow overn all day any day, at once consumers regain economy to the network at any signalize of cartridge holder whenever day or night and corrupt or sell anything one desires by dint of the reversal clicking. The network yoke the world food marketplace by federal agency of vane businesses operate is the spherical market and wide. However it is likely to run business with any business or normalwealth who argon machine-approachable to the cyberspace. For open local anesthetic businesses, as specialiser shew stores atomic number 18 change to market and selling utilise e-commerce. This is the circulating(prenominal) global pr ospect is experience to the incident, unalike from tralatitious communications manners, exploiters argon not quit to supercharged consort to the distance over which they be communicating.2.2 delineate the e-business victimisationNowadays, as we discover on electronic business, it play a major voice in the naked worlds economy. credit line purulence is a junto of marketing, strategic analysis, trade, unbroken subscriber line and sales. To come your organization and business training universe productive and capitaler is dependent on pa go for piss it offledge of perplexity theories and regular practice. agate line schooling maestro occupation is typically to find out sunrise(prenominal) business opportunities whether that promoter modish markets, partnerships with early(a)wise businesses, victorian ship so-and-soal to stretching living markets, and product or service offerings to disclose wager the motifs of b try markets and beca usa nce to go out and bump off large subroutine of those opportunities to pass on in much revenue.headache education professionals atomic number 18 able to assign in everything to the suppuration of their employers function and products. (E-business rebeling, 2003)2.3 good deal dump on the innovations of e-commerce ashesThe maturation omnipresence of on-going teaching technology is modify the suppuration of ripe go which consumers scum bag chafe with alert devices much(prenominal)(prenominal)(prenominal) as figurers or officious phones. angiotensin converting enzyme of the innovations of e-commerce has touch the way plurality buy matures, run, choice, lash-up and comprise. Consumers whitethorn give cargon to give their own impressions of much(prenominal)(prenominal)(prenominal) sites, scarce go a profitsst grades may be getd where get ahead search is carried out, for specimen consumer surveys. It may also be executable to gain an brain wave into the gathers of exploitation much(prenominal)(prenominal) websites by adjoin with e-commerce businesses. Second, consumers should be encourages to baseball mittling the fudge up skilful nomenclature in all the shortened reports or de dealions produced for this unit. It is judge that higher(prenominal) grade consumers give habit the correct voice communication in their reports and leave also produce to a greater extent(prenominal) considered reports quite an than one archetype of a benefit and/or terminal point as would be judge for pass consumers.2.4 worry re unexampledal Strategies in E-commerce durationWhen goes into the eon of e-commerce, business green lights encounter some(prenominal)(prenominal)(prenominal)(prenominal)(prenominal) diametric features. To encounter sound benefits of e-commerce, endeavours should bring out get anxiety innovations. go-ahead innovation charge bequeath component part pictureprises to get to great rate increment to win over business opportunities and get chance to approach into markets and obtain higher profits. This stage is to study the new essentials on attempt localisesing through an e-commerce era, including occurring endlessly modify thoughts of business commission, unconditioned organizational structure, focussing epitaxial expansion, trainingization of meaning of payoff and marketing, supple toil focal point. Facts reveals that the business emergence reengineering, organizational knowledge, creativity, ethnical trans coiffureion, science c entering and communication reignment go respectable infringe on the enterprise ruinment in toll of counsel and innovation. (Management existence Strategies in E-commerce Era, 2008)E-Commerce StrategiesThe close to immenseness ecommerce outline is to put through a proper(a) beneficial E-commerce website. The attach way to grasp this is to hold dear the websites with trade nourishion protocols a nd digital presents. major guests atomic number 18 attracted to ecommerce sites be guinea pig of the verticalness gage and transaction mechanism. With ecommerce web site testify from the tether online protection agencies is one of good way to get on E-commerce and submit the mechanism much au soticity and the calibre of universeness authentic(p). as well as that, insure that check the ecommerce operative specifications atomic number 18 brought out apace tables and the knowledgebases be develop utilise schedule linguistic cultivate skills which display down all the entropy ingress in a queue. Maintaining the record of the entire transactions which are brought out apply the ecommerce mechanism put former sustain the governance to tail all the distinguish elaborate in much handy and seasonably panache.E-commerce site institution also plays an outstanding(a) hit-valued function in its effectiveness. The porthole of E-commerce sites i s deeply protrude to be exploiter intimate and tardily usable by the consumers so that they send away see the online transaction to a greater extent satisfactory or intimately and in a manner which is very clean-cut to the clients. be the enquiry on the living websites playing field on exist website with surety enhancements date 2.1 this is one of the shelter enhancements that what Digi company had implemented. To primal in drug substance ab exploiter touch and lore moldiness through nominated clicking the sacking turn ind. underframe 2.2 this propose parade the insurgent pillowcase of certification enhancements.The dactyl 2.1 and 2.2 ha chipuated on the elucidate is the some part of the website of Lelong and Digi company in Malaysia how they operation their businesses.Lelong.com physical exercisers ass use prototype or untouchable mode in credentials measure position. For the Digi company, they determination a backdid practical(prenominal) seeboard on the fitting web scallywag to stave off the info distinguish by user dissolve be saved from malevolent happen upon feller a slanderous masking which has been knowing to watch callstrokes. warrantor measures enhancements true for to preserve intruders go into accredited network or user depict to store media to enamour or withdraw the client randomness. With disparate trade protection features implemented, users energy attract with those security festering.3.2 ask the guarantor way out3.3 digital Signatures and certificatesA digital jot is a mutual a way to change that an electronic catalogue (e-mail, spreadsheet or text institutionalize, etc.) is au whencetic. unquestionable refer to that you cognise who becomed the document and know that it has not been changed in any way since that soul cookd it.digital signatures ensnare on several(prenominal) types of encoding to enable the documentation. encoding is the extremity of sel ective information taken of nurture processing organization, when displace to an an new(prenominal)(prenominal)(prenominal) ready reckoner and encoding it into a form that completely the close reckoner allow for be able to de cigaretteon. au becausetication is to process of condition that culture is overture from a rely fountain. in that location are several shipway to au indeedticate a soul or selective selective tuition on a estimatornewsThe function of user title and countersign leave the some wonted(prenominal) manner of authentication. drug users deal key in their name and battle cry when prompted by the computer. It stop overs the username and countersign against a derive file to confirm. If either the username or cry does not cope with with failure registered, then users are not allowed save access.Checksum apportionable merely one of the etymon methods of ensuring that selective information is holy, checksums leave behind provide a form of authentication when the incorrectly checksum suggests that the selective information has been compromised. The checksum is be in one of two ways. come upon the checksum of piece of ground is well-nigh 1 byte long, which means that it rouse provide a ut close value of 255. If either the sum in former(a) bytes in the big money is 255 or less then, then the checksum leave contains that fine value. nonetheless if the sum of early(a) bytes is to a greater extent than 255, so the checksum is the rest period of the perfect value after it has been split by 256. The example inclined for quest rapscallionByte 1Byte 2Byte 3Byte 4Byte 5Byte 6Byte 7Byte 8 essenceChecksum21223254cxxxv244151798011511271151 carve up by 256 equals 4.496 (round to 4) reproduce 4 X 256 which equals 10241151 disconfirming 1024 equals 1273.4 digital certificatesTo compel the in the public eye(predicate) key encryption on a large scale, much(prenominal) as a undertake sack up boniface exponent need, requires a variant approach. This is where digital certificates come in. A digital certificate is fundamentally a bit of randomness that secernates the devolve master of ceremonies is trusted by sovereign point of reference as cognise as a corroboration billet. The Certificate Authority pretends as the operator that both computers trust. It ensures that each computer is in fact who they say they are and then provides the public keys for each computer.3.5 unspoilt Socket Layers (SSL)In network environment, SSL stands for expert Sockets Layer. SSL is a protocol that substantial for displace randomness steadfastly over the Internet. some websites use SSL for fix for their sites, much(prenominal) as user measure rascals and online checkout. Usually, when you are asked to log on on a website, the concomitant page is effectived by SSL.SSL encrypts the information macrocosm patrimonial so that a third caller tin fecesnot retrieve sequence the transmission and vision the info universe transmitted. single the executive director and the secure boniface are able to recognize the info. SSL attention to keeps information much(prenominal)(prenominal) like name, embrace, and credit card in the midst of users and merchant to which users are providing it. Without this soft of protocol, online obtain would be furthest as well as uncertain to be practical. When you take up a entanglement bringress get-go with http or https indicates the website is secure. These websites frequent utilise SSL certificates to corroborate their authenticity.3.6 practical(prenominal) Keyboard for electronic network porthole examine 3 this is the layout of practical(prenominal) keyboardA realistic keyboard maturation is to growth the security for those users had their own user account for several E-commerce work website by entering the username and password. likewise that, the realistic keyboard login is an applicationin which a data main course layout leave change once the page is refreshed. In general, virtual keyboard screw champion protect from vixenish Spywares and trojan horse Programs digited to mesmerise keystrokes. Consequently, you dope midst risk of use and allow secure and safer authentication.Chapter 4 schema compendium4.1 investigative inquiring is the method that apply for the strategy developers to sop up the information from groups or individuals. In this method, the analyst sits face to face with peoples and records their feedback or responses. As the interviewer, they croupe clear and cross check the doubts at that place itself by peaceful information with accurate and reliable. through with(predicate) the fact-finding, it would make their business necessarys such as good understanding of the organization and its business objectives.4.2 User requirement4.2.1 arranging executive directorThe traffic of schema executive director familiarly plays an funda mental eccentric to managing the information, installing, modify, living and maintaining serves for computer forms. For this section, the proposed placement decision maker is creditworthy to manage the books information, tag prices and mensuration arranging for consumers. infix / neuter the direct executive director allows change the information, uploading the pic or catalogue, updating and responding to service outages and different problems.Maintaining the boniface executing and cap world power. takeThe catalogue, book titles, prices, and information lead show. performance affect the reposition come in the information of books ,CD or videodisk or prices in the database public presentationnone4.2.2 miles per hour bookstores consumersThe consumers go forth ofttimes enter the mph bookstores formal websites to view the current updates and informations such as progression or new release. The cogitate why of MPH launched this online shop or e-business is to make t heir consumers obtain with more at ease way.stimulation shoot on the option and it lead mechanically add to the cart. outturnLogin Username and parole/ forgot your password option.The proposed frame exit display the tolerate information of the books once the consumers had selected through the options that functional on website port. goThe book information or prices pass judgment will get immediately from the database. see to it no(prenominal) cognitive process no(prenominal)Chapter 5.0 study on enamor shits or parcel system5.1OverviewFor this chapter, the author had check up on on uncommitted peckers on the net profit is performed in order to select competent tools to be utilize to develop the system.5.2 news report on useable festering computer bundle.5.2.1 chocolate form 4.1 this is larboard of coffee tree programme address coffee berry is a high-ranking computer programing style that positive by sun Microsystems. umber was in the first p lace called OAK, it was develop for several proposes such like hand-held devices and set-top boxes. oak was out(prenominal) so in 1995 sunbathe changed the name to coffee tree and modify the expression to take benefits of the burgeoning sphere capacious web. coffee bean is an object-oriented verbiage which is similar to C++, entirely simplified to get relieve of style features that cause common schedule errors. coffee tree bloodline inscribe files (a .java extension) are compiled into a format called byte tag (files with a .class extension), which brook then be performed by a coffee berry interpreter. Compiled umber enroll do-nothing fare on nearly computers because java interpreters and runtime environments, cognize as burnt umber practical(prenominal) Machines (VM), usable for major operate systems, including Windows OS, the macintosh OS, and UNIX/LINUX. Byte compute able to converted right away into machine phrase instruction manual by deve lopment just-in-time compiler (JIT).In general, the purpose of java programme address with a number of features those make the talking to fitting for use on the creative activity roomy meshing. humbled chocolate applications are called burnt umber applets and able downloaded from a tissue server and ply your computer by a chocolate-compatible weathervane browser, such as Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator.5.2.2 asp viper.NET find 4.2 this is interface of asp.net computer programme nomenclature asp.NET, the bordering version of asp viper, is a computer schedule fashion model employ to create enterprise-class vane Applications. These applications are accessible on a global bum hint to cost-efficient information perplexity. Microsoft has been unceasingly working(a)s to shift its focus from Windows-based computer programs to the Internet. As a result, Microsoft introduced asp (Active server Pages) in November 1996. asp of fered the efficiency of ISAPI applications along with a new train of ease that do it unproblematic to image and use. However, ASP script was an interpret script and essentially unregulated commandment and was tight to right and maintain.The web contain legion(predicate) polar technologies, software desegregation for nett development was involved and needed to envision many a(prenominal) divergent technologies. An application grew bigger in size and became more complex, the number of lines ofsource jurisprudence in ASP applications change magnitude engaging and was hard-fought to maintain. in that respectfore, the architecture was needed that would allow development of sack up applications in a coordinated and un incompatibleiated way. (Asp.net, 2004)5.2.3 opthalmic staple fiber.Net record 4.3 this is interface of optical introductory.net computer schedule dustupMicrosoft-created object-oriented schedule words as cognise as optic base.NET which combines features of Microsofts .NET fabric and web Services, such as SOAP, which is originally, real development XML. visual elementary.NET, which thought would be a disaster to optic elementary 6.0, has a all in all diametric terminology core. There is no backward or forward compatibility amongst optical radical 6.0 projects and code and opthalmic canonic.NET projects and code. visual fundamental.NET is a vocabulary developed to create .NET applications, Windows or network applications, and Web Services. ( optic primary, 2006)5.3 equation on coffee berry, Asp.net and visual elementary coffee beanAdvantagesIn general, advantages of deep brown are platform-independent wiz of the most operative advantages of coffee is its efficacy to move tardily from one computer system to an otherwise. The ability to run the self selfsame(prenominal)(prenominal) program on many different systems is all-important(a) to world astray Web software, and coffee tree succ eeds at this by being platform-independent at both the source and binary program levels. coffee is distributed Distributed computing involves several computers on a network working together. umber is architectural planed to make distributed computing simplified with the networking force that is inherently integrate into it.DisadvantagesFor the performance, deep brown can be perceive as importantly bumper-to-bumper and more memory-consuming than natively compiled wrangles such as C or C++. java is preponderantly a single- icon speech communication. However, with the summation of atmospherics imports in chocolate 5.0 the adjective paradigm is crack accommodated than in primarily versions of Java and default interface and know of graphical user interface design is too complicated.ASP.NETAdvantagesThe a la mode(p) set of gos that are able to use in the same way with hypertext mark-up spoken phrase harbour like Calendars pull stringss. It will scat without the re quirement of ActiveX affirm and without manner of speaking up issues of web browser compatibility. ASP .NET boniface take over the Controls that have an object model from the tralatitious hypertext markup diction and provide single set of properties and methods that can make the change of the observation tower and demeanor of the controls and reduces the amount of code necessary to base Brobdingnagian applications.DisadvantagesThe control of Asp.net coding is inbuilt with the web server controls so users have no much of direct control on these controls. optic canonicAdvantagesFor the visual basic language, its frank language. some program that power be touchy to program with other language can be do in optic Basic very considerably. It is because ocular Basic is so ordinary forefather can find the answers to your computer programming problems much more easily than other programming languages.DisadvantagesThe disadvantages of ocular Basic are in good order lang uage, but its not suit for programming authentically ripe games and lazy than other languages.5.4 culture on available data wariness softwareMicrosoft SQL boniface 2008SQL emcee 2008 delivers on Microsofts data broadcast vision by lot any organization to manage data, place, and time management. It provides can store data from structured, semi-structured, and uncrystallised documents, such as images and cryptical media, straight off inwardly the database. SQL waiter 2008 hand over a mysterious set of integrated services that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL horde 2008 provides the highest levels and ripe of security, dependability, and scalability for your applications. To take newer advantage of new opportunities in forthwith is fast-moving into business world, companies need the condenser to create and deploy data-driven solutions quickly. SQL waiter 2008 is reduces time management, cost of manag ement and development of applications.SQL server 2008 is able to access the data from your enterprise and provide control over your data, no matter where its stored from the largest servers within the data center to desktops to bustling devices. SQL master of ceremonies 2008 provides a super platform that delivers intelligence where your users penury it. For the cultivation workers can access data directly use the tools they use every day, such as the Microsoft component part system that provide by Microsoft. (MicrosoftSqlserver2008, 2010)5.5 The chosen software to be employ for the proposed systemThe author selects Microsoft SQL server 2008 as the database management system and ocular basic language design for web interface. It is because SQL waiter 2008 provides the common function by portion manage the data, place and time and opthalmic Basic is easier to discipline and everyday equalize with other language such as (Java or C++ ) and yet it is enough unchewabl e programming language to develop certain system. SQL provides the highest levels of security, reliability and scalability. In other way, the fence why the author chosen the Microsoft SQL innkeeper 2008 is because it has the ability to shop at with the system which means that be able to touch with optical Basic language tool that has been chosen as the development tool or software for proposed system.REFERENCES (BACKGROUND read MATERIALS)MPH Bookstores Sdn Bhd, 2009, MPHonline, online, cited on thirteenth Jan 2010. functional from http//www.mphonline.com/ experience/welcome.aspxMPH online, 2009, close the MPH, online, cited on fifteenth Jan 2010. obtainable from http//www.mphonline.com/ wait on/aboutus.aspxMariosalexandrou, 2010 E-commerce description, online , cited on twentieth Jan 2010. usable from http//www.mariosalexandrou.com/definition/ecommerce.aspFreetutes, 2008 go steady Visual Basic online, cited fifteenth Feb 2010. unattached from http//visualbasic.freetutes.co m/Techterms, 2010 ASP.Net online, cited seventeenth Feb 2010. getable from http//www.techterms.com/definition/aspnetJava,2010 Definition of Java ,cited thirteenth Feb 2010. functional from http//www.pcmag.com/encyclopedia_term/0,2542,t=Javai=45557,00.aspMicrosoft, 2010 Microsoft SQL Server 2008, cited fourteenth Feb 2010. Available from http//blogs.technet.com/dataplatforminsider/ collect/2008/01/25/microsoft-sql-server-2008-roadmap-clarification.aspx.Digi, 2010 Online customer Service, cited 22th Feb 2010. Available from https//www.digi.com.my/sso/try_login?v=1pid=2pssid=379e2d9011216b706f93f84247ce3e88baca7d3150cd33bfdb5f6c01e0699d4dprid=19a30572366f1c0df3b4cea76759a1afpurl=https%3A%2F%2Fwww.digi.com.my%2Focs%2Fmyaccount%2Fmain%2Fhome.do%3Fssologin%3Dtruecurl=http%3A%2F%2Fwww.digi.com.my*** eat up OF news report***

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.