Tuesday, November 15, 2016

Stock fundamental ranking and screening with James O'Shaughnessy Trending Value

James Patrick O’Shaughnessy is the founder of quantitative money management firm O'Shaughnessy Asset Management, LLC.

In 1996, he wrote the best selling book "What Works on Wall Street", which has now evolved to its 4th Edition.



In the 3rd Edition of this book published in 2005, O'Shaughnessy unveiled the Cornerstone Growth stock screening method, which is based on the following criteria:
  • Market capitalization >= $225 million
  • 3-month average daily share volume >= 100,000
  • Price-to-sales ratio <= 1.5
  • 3-month total return greater than the median return of Russell 3000 companies
  • 6-month total return greater than the median return of Russell 3000 companies
  • Trailing 12-month EPS > 0
  • Rank by highest 12-month total return
Subsequent to that, the 4th Edition of the book, published in 2011, introduced the improved Trending Value growth stock screening method, which claimed to achieved 21.19% annualized return over the 46-year period between 1964 and 2009.
Trending Value uses “value composite” (VC) instead of just the Price-to-sales ratio to measure stock undervaluation, which O'Shaughnessy described as "the top stock-market strategy of the past 50 years".

The value composite is composed of 6 value factors:
  • Price-to-Book
  • Price-to-Sales
  • EBITDA/EV
  • Price-to-Cashflow
  • Price-to-Earnings
  • Shareholder Yield
Listed companies in a stock market are divided into 100 groups (percentiles) based on the 6 value factors above. If a company's price-to-book ratio is in the lowest 1% of the dataset, it gets a score of 1. For some ratios it's the other way around, for instance EBITDA/EV. If a company belongs to the highest 10%, it gets a score of 1. If a value is missing, it gets a score of 50.

The same calculation is repeated for each of the ratios and then their values are summed up together. Companies are again divided into 100 groups based on this score. This final result is the so-called value composite.

A value composite of 1 means that the company belongs to the 1% cheapest companies according to these factors.
In the next filtering process, only the top 10% stocks ranked according to this value composite score are selected. Then these stocks are further filtered by a momentum factor, i.e. the 6-month price index. The result is an extremely cheap group of stocks that have been on the rise during the last 6 months.
O'Shaughnessy tested 3 different value composite scores as follow:
  • VC1: based on the first 5 ratios only, excluding shareholder yield. By using this ratio his backtests showed a return of 17.18% annually.
  • VC2: based on all 6 ratios. O'Shaughnessy uses this ratio in his trended value screen since his backtests showed an improvement in overall annual compound return of 12 basis points to 17.3%, a reduced standard deviation and downside risk.
  • VC3: same as VC2 but the last ratio is replaced by buyback yield. Some investors are indifferent whether a company pays out a dividend or want to avoid these since they can be very heavily taxed. This VC generates an even higher return of 17.39% annually but with a slightly higher standard deviation compared to the VC2.
At the time of writing,  ValueSignals website ranked KLM Royal Dutch Airlines (KLMR.PK) with the following scores:
  • VC1: 1
  • VC2: 1
  • VC3: 1

The value factors of KLMR.PK compared with the entire market, the Industrials sector, the Transportation group, and the Airlines industry, respectively, is as below:


However, KLMR.PK only ranked at 4,842 in Magic Formula screening method:


Anyhow, it still has a respectably high Piotroski F-Score:



ValueSignals website provides a very handy and straightforward online service for systematic value investing to perform quantitative stock screening, stock comparison and stock information, currently covering as many as 33,600 stock counters listed in 44 countries around the world.

Beside O'Shaughnessy Value Composites, ValueSignals website is also able to perform screening (including multifactor cross-screening) of:
The screening can be performed across all stock counters, or limited to within certain regions,  countries, industries, etc.

As a user of ValueSignals, I recommend this website to all serious value investors and fund managers to boost your stock screening and selection process.

Monday, November 7, 2016

Top 30 property developers in The Edge Malaysia Property Excellence Awards 2016

The Edge Malaysia has just announced the Top 10 winners in their Property Excellence Awards 2016, which are:

  • SP Setia Bhd
  • IJM Land Bhd
  • Sunway Bhd
  • Sime Darby Property Bhd
  • Mah Sing Group Bhd
  • Eco World Development Group Bhd
  • UOA Development Bhd
  • Gamuda Bhd - Property Division
  • IGB Corp Bhd
  • UEM Sunrise Bhd

Following the Top 10 winners above, the subsequent Top 11-30 are:
  • IOI Properties Group Bhd
  • Tropicana Corp Bhd
  • Eastern & Oriental Bhd
  • Paramount Corp Bhd
  • MKH Bhd
  • WCT Land Sdn Bhd
  • Selangor Dredging Bhd
  • OSK Holdings Bhd
  • Glomac Bhd
  • Malaysian Resources Corp Bhd
  • KSL Holdings Bhd
  • Wing Tai Malaysia Bhd
  • Matrix Concepts Holding Bhd
  • TA Global Bhd
  • Sunsuria Bhd
  • YTL Land & Development Bhd
  • Guocoland (Malaysia) Bhd
  • Hua Yang Bhd
  • SHL Consolidated Bhd
  • I-Bhd
On top of that, Tan Sri FD Mansor and Datuk Richard Fong, both from Glomac Bhd, won the Outstanding Property Entrepreneur Award 2016.

Wednesday, November 2, 2016

Stock fundamental ranking and screening with Greenblatt Magic Formula

In 2005, Joel Greenblatt published a book titled "The Little Book That Beats the Market" and introduced his Magic Formula value investing method to the world. The book was supposedly wrote to teach his own children, in his Jewish family, about investment. That book became a New York Times bestseller with over 300,000 copies in print.

In 2010, the books content was updated, and its new edition is now called "The Little Book That Still Beats the Market" which you can still find in bookstores (both physical and online) now.


Joel Greenblatt is a hedge fund manager running Gotham Asset Management (formerly known as Gotham Capital) which claimed to have achieved an impressive annualized return of 40% from 1985 to 2006. He is also an adjunct professor in Columbia Business School teaching the subject of "value and special situation investing".

Greenblatt operates the Value Investors Club website for value investors around the world to freely join and share investment ideas. Another website of him is Magic Formula Investing, which is a free online stock screener (for stocks listed in USA only) based on his Magic Formula.

In his book, Greenblatt explained that in order to get above-average returns, one should buy companies with above-average return on capital at below-average prices. To find those companies, he first filters the stocks by eliminating certain industries including Utilities and Financials, which he found not applicable to his Magic Formula.

After that, he narrows down the search by filtering the companies based on market capitalization. Greenblatt suggests to apply Magic Formula to companies with market capitalization of above US$50 million. You can adjust this filter to search between large caps, mid caps and small caps targets.

Then he ranks the remaining companies based on 2 ratios:
  • Earnings Yield
  • Return on Invested Capital (ROIC)
whereby...

Earnings Yield = EBIT / EV

which...

Enterprise Value (EV) = (Market Cap + Total Debt + Minority Interest + Preferred Stock − Cash & ST Investments)

and that:

ROIC = EBIT / (Net Fixed Assets + Net Working Capital)

whereby...

Net Fixed Assets = (Total Assets - Total Current Assets - Goodwill)

Net Working Capital = (Current Assets − Current Liabilities)

There are reasons why Greenblatt uses ROIC in his Magic Formula instead of ROE or ROA or other similar return ratios, and Hurricane Capital has written an article to explain about this.

At the time of writing, ValueSignals website ranked Sandridge Mississippian Trust II (NYSE:SDR) which operates in oil and natural gas sector at the top of Greenblatt Magic Formula screening.


However, SDR only scored a low 3 in Piotroski F-Score.


If you apply both the screeners of Greenblatt Magic Formula and Piotroski F-Score now, you will find magicJack VocalTec Ltd. (NASDAQ:CALL) on top of the list.

It ranks #4 in Magic Formula screening result, and scored a 7 in Piotroski F-Score test.


 
This combined screening is expected to produce better result than just using a single screening factor.

ValueSignals website provides a very handy and straightforward online service for systematic value investing to perform quantitative stock screening, stock comparison and stock information, currently covering as many as 33,600 stock counters listed in 44 countries around the world.

Beside Greenblatt's Magic Formula, ValueSignals website is also able to perform screening (including multifactor cross-screening) of:
The screening can be performed across all stock counters, or limited to within certain regions,  countries, industries, etc.

As a user of ValueSignals, I recommend this website to all serious value investors and fund managers to boost your stock screening and selection process.

Thursday, October 27, 2016

Stock fundamental ranking and screening with Piotroski F-Score

Piotroski F-Score was introduced by Professor Joseph D. Piotroski in his paper titled "Value Investing: The Use of Historical Financial Statement Information to Separate Winners from Losers" published in January 2002 while he was teaching as an assistant professor in University of Chicago. He is now teaching in Stanford University Graduate School of Business, and has just promoted from associate professor to professor in 2016.

You can click here to download that interesting 39-pages paper written by Piotroski on his F-Score.


Piotroski backtested his F-Score screening method in his paper and concluded that by investing in the low price-to-book ratio companies filtered by the F-Score, one could have generated a 23% average yearly return from 1976 to 1996.

Today, Piotroski F-Score is used by quite a number of fund managers as well as individual investors in their value investment stock screening process. The F-Score has also been applied in many other academic papers and has so far proven to be effective for stock screening, especially when combined with other fundamental stock screening methods, such as Greenblatt's magic formula, etc.

A backtest by Olivier Dambrine (owner of MFIE Capital which operates the ValueSignals global stock screening website) revealed that a European stock portfolio establised by their Piotroski price-to-book screener is able to achieve an impressive 525% return between June 1999 and August 2011, while at the same period of time the  S&P600 Europe including net dividends has a return of -15%. You can click here to read that article written by Olivier Dambrine on 1 September 2011.

The American Association of Individual Investors (AAII) also revealed in an article titled "2008 AAII Stock Screen Roundup: Piotroski Strategy Defeats the Bear" by Wayne A. Thorp that the F-Score was the only one of their 56 screening methodologies that had positive results in 2008 (up 32.6% on average across 5 stocks, versus -41.7% for all of the AAII strategies over the same period).

Piotroski F-Score is the sum of 9 binary (meaning, either 0 or 1) scores in 3 fundamental categories of the stock, as below:

Profitability:
  • Did the company make a profit during the last 12 months?
  • Did it generate any cash?
  • Was it more profitable compared to the prior year?
  • Did it make more cash than the reported profit?
Leverage, Liquidity and Source of Funds:
  • Did the company increase its relative LT debt compared to the prior year?
  • Did the company improve its ability to pay short-term liabilities  (debt and payables) with its short-term assets (cash, inventory, receivables)?
  • Was the company not required to issue new shares to pay for its future obligations?
Operating Efficiency:
  • Was the company able to improve its margins on sales?
  • Was the company able to improve productivity?
The above 9 criterias are tested by the following financial conditions, comparing the current year with previous year:
  • ROA > 0, EPS > 0
  • Operating cash flow > 0
  • ROA growth
  • Operating cash flow > Net profit
  • (Assets / LT Debt) increased
  • Current Ratio increased
  • Share Outstanding remains
  • Gross Profit Margin increases
  • Asset Turnover increases
An example of stock counter having full F-Score is Forrester Research Inc. (NASDAQ:FORR).


You might want to double check if the counter is consistently scoring high F-Score throughout the years, or has been improving from lower F-Score to higher F-Score across the period. Below is the historical Piotroski F-Score Scorecard of Forrester Research Inc. as presented by ValueSignals website.


The scorecard above shows that the F-Score of the stock counter improved from quarter to quarter, from 5 in 2013 eventually to 9 in mid-2016. It also indicates which out of the 9 criterias had passed or failed the test in each of the quarters.

ValueSignals website provides a very handy and straightforward online service for systematic value investing to perform quantitative stock screening, stock comparison and stock information, currently covering as many as 33,600 stock counters listed in 44 countries around the world.

Beside Piotroski F-Score, ValueSignals website is also able to perform screening (including multifactor cross-screening) of:
The screening can be performed across all stock counters, or limited to within certain regions,  countries, industries, etc.

As a user of ValueSignals, I recommend this website to all serious value investors and fund managers to boost your stock screening and selection process.

Tuesday, October 11, 2016

Mcdodo 2-in-1 USB type-c and micro USB fast charging data cable

If you bought a latest smartphone that uses USB type-c connector instead of the old style micro USB, you might probably want to search for some 3rd party fast charging and data sync cable for it.

If you still possess other smart mobile devices that use micro USB, a 2-in-1 cable that supports both USB type-c and micro USB will be very nice. If you also have Apple iPhone, perhaps a 3-in-1 cable that supports USB type-c, micro USB and lightning will be even better.

For this reason, I have recently bought some Mcdodo brand 2-in-1 USB cables. They have another 3-in-1 model as well with the Apple lightning connector.


This cable is 1 meter long, and supports fast charging with 2.1A current output. One end of it is normal USB connector, and the other end of it is a micro USB connector. What makes it special is it also comes together with an adapter that tied with it, which can be connected to its micro USB connector to convert it for USB type-c connection.


It also comes with a handy silicon belt that can be used to tie the cable up nicely in an organized manner for easy carriage.

Its cable is insulated with thermoplastic elastomer (TPE) material, which is robust, durable, anti-abrasion, anti-pull, anti-wrap and has high resistance to heat, oil, direct sunlight, flame, water, acid, alkali, alcohol, etc.






Thursday, October 6, 2016

Top 10 database security threats

Databases are among the most valuable assets in the information system as they store valuable and vital data and records of the business. As such, they are also among the most interested place of intrusion for hackers, attempting to gain access to confidential and sensitive information from within.

California based cyber security solution provider Imperva has been consistently publishing the Top 10 Database Security Threats white paper every year.

From year 2013 until 2015, this top 10 database security threats remained as the same listing, with the same ranking, as below:

  • 1. Excessive and Unused Privileges
  • 2. Privilege Abuse
  • 3. Input Injection (SQL Injection)
  • 4. Malware
  • 5. Weak Audit Trail
  • 6. Storage Media Exposure
  • 7. Exploitation of Vulnerabilities and Misconfigured Databases
  • 8. Unmanaged Sensitive Data
  • 9. Denial of Service (DoS)
  • 10. Limited Security Expertise and Education
According to Imperva, the top 9 threats above can be addressed by using an automated Database Auditing and Protection (DAP) platform, which is an approach that improves security, simplifies compliance, and increases operational efficiency. The 10th threat is "human factor" by negligent employee or contractor.

The white paper outlined a multi-layered database security defence strategy encompassing:
  • Discovery and Assessment: to locate where database vulnerabilities and critical data reside.
  • User Rights Management: to identify excessive rights over sensitive data.
  • Monitoring and Blocking: to protect databases from attacks, unauthorized access, and theft of data.
  • Auditing: helps to demonstrate compliance with industry regulations.
  • Data Protection: to ensure data integrity and confidentiality.
  • Non-Technical Security: to instil and reinforce a culture of security awareness and preparedness.
"Failing to safeguard databases that store sensitive data can cripple your operations, result inregulatory violations, and destroy your brand. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to recognize when you’re vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets are protected." -- Imperva, 2015

You can download the complete white paper to find out more detail of this interesting defence strategy.
 

Friday, September 30, 2016

Pisen TS-D192 4-in-1 presentation laser pointer pen and power bank (2nd generation)

If you do a lot of public presentation or classroom lecturing, you will find a presentation laser pointer pen as a very useful gadget for you to remotely control the flow of your presentation which run from your laptop and projected on a screen, as well as using its laser pointer to draw the audients' focus onto a particular area in your presentation screen.

I am using the Pisen TS-D192 4-in-1 presentation laser pointer pen and power bank for that purpose. In fact, it is more than just a presenter pen, it is also a 2,500 mAh power bank. It cost around RM70.


The Pisen TS-D192 has 3 buttons and can serve 4 features:
  • Laser pointer
  • Presentation remote controller
  • Video remote controller
  • Power bank


When you press its middle button, it will shoot up a red laser beam, with a long shooting range of up to 100 meters.

This Pisen TS-D192 comes with a nano USB receiver, which you can plug into your computer's USB port. It is really plug-and-play and can function immediately in Windows XP and above, even without the need of installing driver.

Its wireless transmission is using 2.4 GHz frequency band, with effective transmission range of about 10 meters. Unlike those infrared presenters that you need to aim the pen to the receiver, this Pisen TS-D192 which use 2.4 GHz wireless technology can work well regardless of its angle and direction, as long as it is within the 10 meters transmission range.

When your computer is running PowerPoint or Adobe PDF Reader, its buttons function like this:
  • Press top button to Page Up (go to previous slide)
  • Press bottom button to Page Down (go to next slide)
  • Long press top button will toggle full screen presentation
  • Long press bottom button will toggle a black screen on the display
  • The middle button will trigger its laser beam
When your computer is running Windows Movie Player or VLC Media Player, its buttons function like this:
  • Double press middle button to toggle between Play and Pause
  • Press top button for Forward
  • Press bottom button for Reverse

Most of the presenter pens in the market are powered by either AA or AAA size normal battery. This Pisen TS-D192 is powered by an internal rechargeable 18650 Li-ion battery with capacity of 2,500 mAh.

It can be recharged using a normal USB charging cable connecting its micro USB charging port to either your computer or a USB charger. There is a USB charging cable included in its packaging.

It is said that you can use it as a presenter pen for about one year with just a single charge. With its abundant power, it can also serve as your emergency power bank with 5V 1A output to charge up your phone or gadgets.


This is an interesting USP for the product, as you can still making use of it as a power bank when you are not using it for presentation.


Tuesday, September 20, 2016

Malaysia year 2017 national and state public holidays announced

The official 2017 national and state public holidays in Malaysia has been announced by Cabinet, Constitution and Inter-Government Relation Division (BKPP), Prime Minister Department.

There are 14 days of national holiday, and 2 of them fall on Friday, 4 fall on Saturday, 2 fall on Sunday, and another 3 fall on Monday. Most of the states will have around 4 state holidays in addition to the national holidays.

 
Chinese New Year falls on Saturday and Sunday (28th and 29th January 2017). Hari Raya Puasa falls on Sunday and Monday (25th and 26th June 2017). Deepavali falls on Wednesday (18 October 2017).
 
Click here to download the table of Malaysia year 2017 gazetted national and state public holidays.


Friday, September 16, 2016

Docasa DCS-BS02W non-electric water bidet for toilet water closet

I have just installed some Docasa DCS-BS02W non-electric water bidets in my residence's toilets. Each set of them cost only RM175 (or RM185.50 after GST).


This type of water bidet spray is pretty simple in design, and does not need to use electric to function. Just affix it onto the toilet bowl and attach its pipe to the existing water inlet of the water tank, and it is ready to function.


Its nozzle is able to spray water at the pressure of 0.05 MPa to 0.8 MPa, and its spraying angle is adjustable.


This Docasa DCS-BS02W is very easy to use. It has a level to adjust the high/low angle of water spray, and a big knob which clockwise is to spray the water at different intensity, and anticlockwise is a self-cleaning function whereby water is flowing down instead of spraying out.


This kind of water bidet is very popular in Japan, Taiwan and some other places. Normally they are electrical which can heat up and supply warm water, and the price is quite expensive. Although this Docasa DCS-BS02W is not able to heat up water, it is non-electric and very easy to install, and its price is much more affordable.

If you are still using toilet papers or external spraying hose, you might probably also want to switch to this type of bidet. It is gentle, clean and environmental friendly. I also makes your toilet looks modern and classy to your guests.




Thursday, September 15, 2016

The Johari Window

The Johari Window is a model developed back in 1955 by 2 psychologists Joseph Luft (Joe) and Harrington Ingham  (Harry), named after their combined first names.

It is a heuristic method originally used for self awareness, to examine your characters that you are aware of, and those that others are aware of. There is also a portion which so far nobody is aware of.

The Johari Window consists of 4 quadrants:

  • Open / Arena: represents traits of subject that both you and others are conciously aware of.
  • Hidden / Façade: represents traits of subject that you are aware of, but hidden from others.
  • Blindspot: represents your blindspot where others are aware of but not you.
  • Unknown: represents the mysterious area where nobody is aware of yet.
Nowadays the Johari Window is also commonly used in knowledge management, to examine the areas of knowledge between 2 parties (eg. superior and subordinate, supplier and customer, 2 different departments, 2 colleagues, 2 business partners, ...)

There are parts that known to both parties, and also parts that known to one party only, and also parts that unknown by both parties.

By sharing of information/knowledge with each other, i.e. ask for the parts in your blindspot, and tell about the parts in your hidden area, the open area can then be expanded.
At the same time, both parties will explore into the unknown area. The discovered parts will then be included into own hidden area, and if shared out, will further enlarge the open area. The parts discovered by the other party will initially fall into your bind area, and if shared out, will also become part of the open area.

Think of a person or a group in your mind, what is the Johari Window looks like? How you would like the Johari Window to look like? What action should you take to make that happen?


Monday, September 5, 2016

UniFi goodies: Switch to HyppTV Ruby Pack at no additional cost and get RM30 AEON Shopping Voucher

Today, I've received an email from TM Takeout with their HyppTV Mooncake Festival Ruby Pack Migration Campaign 2016 promotion as follow:


I have carefully checked the sender's email. It is not a scam and is really sent out from TM email server.

I clicked on the link and checked the URL of the webpage opened by the link. It is an HTTPS secured webpage, with valid SSL certificate issued by Entrust CA.


So, it is real!

I then checked on the Terms and Conditions that I need to agree in order to accept the offer.

The Terms and Conditions states that:
  • The Campaign starts from 1 September 2016 until 15 September 2016.
  • Only eligible to existing HyppTV subscribers of Aneka or Varnam Pack.
  • The migration to Ruby Pack is free of charge, and there will be no additional monthly charge as long as the migration was done within this campaign period.
  • Subscribers who have done the migration within this campaign period are eligible to receive a HyppTV Moon Cake Festival AEON shopping voucher worth RM30.

Its too good to be true as there is nothing to lose for the subscriber to accept the migration offer, and at the same time can get a RM30 voucher too.

Normally, the Ruby pack is RM10/month more expensive than the Aneka and Varnam pack for TM UniFi subscribers.

The Ruby pack consists of Chinese channels including tvN HD, Channel [V] Taiwan, now Baugu Movies, now Chinese Drama, now Jelli HD, Red by HBO, SCM, SCM Legend HD, SETI, Star Chinese Channel and TVB8.



So, if you also received this offer email from TM Takeout, think carefully first before trash it away. If you haven't received it, you might probably want to find it in your spam folder, or call 100 to find out from TM about your eligibility.


Wednesday, August 31, 2016

MEGA cloud storage with 50GB free quota and secured RSA-2048 encryption

Nowadays there are at least twenty over cloud storage service providers. Some of them provides free quota usage, such as the famous Dropbox (2GB), Google Drive (15GB), Microsoft OneDrive (15GB), pCloud (10GB), etc. while some other don't.

If you are looking for large amount of free storage, probably to store your precious videas, photos, disc images, etc., you should take a look at MEGA which generously provides 50GB free quota.


MEGA was founded in New Zealand by Kim DotCom in 2013, who was also the founder of the famous file-hosting website Megaupload. Megaupload was shut down by US government after being accused for copyright infringement. Anyhow, MEGA says Kim DotCom has already resigned as director since August 2013.

MEGA has on 23 August 2016 announced that they've reached a milestone of 50 million registered users with more than 20 billion files stored in their cloud service.

There is an article in Cloudwards posted in 18 September 2015 comparing MEGA with Google Drive, OneDrive, Dropbox, SugarSync and SpiderOak, and concluded with the following comparison table:

(Comparison table from Cloudwards website)

MEGA can be accessed with any one of the following medium:
  • MEGA Sync client for Windows, Mac or Linux
  • MEGA mobile app for Android, iOS, Windows Phone or Blackberry
  • MEGA web browser extension for Chrome or Firefox
Its usage experience is similar to Dropbox, Google Drive, OneDrive, etc. Its upload/download speed for free users is OK, I can get about 2 Mbps speed as shown below.


With its generous 50GB storage for free users, I find MEGA pretty attractive as a cloud storage for my videos, photos, disc images and other big files.

Note that users of Microsoft Office 365 are getting 1024GB bundled quota in OneDrive, which is much more larger than this 50GB. So, if you are genuine user of MS Office 365, you can make good use of your bundled 1TB space in OneDrive too.

HTC flagship smartphone users can also claim for 2 years usage of 100GB free additional storage in Google Drive through the pre-installed Google Drive app in the new phone. Beware that after 2 years, this 100GB additional storage quota will be revoked, unless you buy another new HTC flagship smartphone, and provided this offer is still available by then.



BC-01 multimedia bluetooth speaker with alarm clock and FM radio

I have purchased a BC-01 multimedia bluetooth speaker with alarm clock and FM radio for my kid. This made-in-China gadget is pretty cheap, with the price of around RM60 only, and its quality is not too bad.


The BC-01 has 2 colour options: white and black. It is pretty small, with surface about the size of the palm of an adult. This small footprint, together with its built-in 1,500 mAh Li-ion rechargeable battery, makes it very portable and easy to carry long, especially when travelling.

With a low power consumption of around 3W, the battery is good enough to support for many hours of continuous music playback. It can operate in clock display and alarm mode for a few days at a single charge cycle.


It has a pair of stereo speakers, which is pretty decent with sufficient loudness in volume. Do not unfairly compete it with Hi-Fi speakers, but its sound quality can really beat the speakers of most of the smartphones and tablets nowadays. However, probably due to the use of internal antenna, you'll probably be disturbed with some hissing sound when using it as a radio.

So, what can this small gadget do?

First of all, it is an alarm clock with pretty large LED time display, as you can see from its photo above.

Then, it is a Bluetooth wireless speaker for any multimedia devices that support Bluetooth pairing. It also has a built-in microphone and can act as Bluetooth hands free speaker for mobile phone, able to pick up calls and have phone conversation with it.

The phone recognizes it for phone audio (to handle phone calls) as well as media audio (to play music streaming from the phone).


It also has a micro SD slot that supports micro SD up to 32GB. You can store music files of MP3, WAV, APE or WMA format in a micro SD card, slot in the card into its slot, and use it as a music player.

It comes with a special USB cable with 2 split connectors. One of it is the USB connector used as external power source and for battery charging, another is an audio jack which you can plug into another music device, computer, handphone, etc. and use it as an external speaker for such device.

Lastly, it is also an FM radio with internal antenna. It is able to automatically search for radio stations and remember their frequency.

Despite its multiple functions and features, it only has 6 control buttons, as shown in its photo above. Therefore, it takes some time to figure out how to use it. It comes with a paper User Manual and I highly recommend you to RTFM before you start using it.

One thing I dislike about this device is that, it only uses a single button to sequentially rotate and switch among its functions as Bluetooth speaker, micro SD card multimedia player, FM radio, AUX line-in speaker, and alarm clock. So you need to keep on pressing its right button until you reach your desired function.

All in all, this is a pretty cool device for bedroom radio and alarm. It is a good candidate as Christmas or birthday present too.

Monday, August 22, 2016

GuardKey - your sensitive data protection solution for local storage, portable storage and also cloud storage (ie. Dropbox, Google Drive, OneDrive, etc.)

"A lot of people use Dropbox.

A lot of people put a lot of valuable, sensitive and personal data inside Dropbox.

A lot of people make the mistake of not encrypting their valuable, sensitive and personal data before they put it inside Dropbox.

Which all adds up to a whole heap of trouble if Dropbox suffers a data breach."

-- Quoted from Graham Cluley's article titled "The huge Dropbox password leak that wasn't".

Yes, your data in cloud storage such as Dropbox needs a second layer of protection despite being well encrypted and taken care by Dropbox.

This is because most of the time, the data in your cloud storage can be easily accessed once your password is obtained or hacked.

Worse still, most cloud services such as Dropbox provides the convenience for you to stay logon once you successfully signed in from their apps, be it from a computer or mobile device. This means that whoever obtained physical access to your computer or mobile device with an active logon session to your cloud service, can easily access to your data without even the need to know your password!

Nowadays, most cloud services like Dropbox do provide option for additional security through 2-step verification which requires second verification through SMS, USB key, etc. beside your password. However, novice users find it difficult to configure and activate, and there is limitation in the USB key method, such as, can only be used when accessing the cloud service with Google Chrome browser. In addition, this 2-step verification doesn't solve the open session loophole as described in the above paragraph.

I found a wonderful product called GuardKey which perfectly fills this gap of needs by offering data encryption and concealing solution to not only your cloud storages, but also your local storage (eg. harddisk, NAS storage, SAN storage, etc.) and portable storage (eg. USB drive, SD card, etc.).


GuardKey is a USB dongle with the following components:
  • A unique AES-256 encryption/decryption key.
  • A Windows software to be installed in your computer to perform seamless data encryption and decryption to your Safebox (an invisible folder in your storage device that everything in it will be protected by GuardKey).
  • 8 GB of free empty storage, for you to use the USB dongle as normal USB drive.
This metallic USB key has a solid and durable look and feel.

There is always a trade-off between security and convenience. The higher the security measure, the more inconvenience for the user it become, and vice-versa. The beauty of GuardKey is it provides a wide range of flexibility level to the user to determine between high security and high convenience.

If user opts for high security, the Safebox can only be opened with the USB dongle and a password. In a more convenient level, it only needs the USB dongle without the need of entering password. Plug in your GuardKey dongle, you have access to your Safebox; pull out your GuardKey dongle, your Safebox will be hidden, and even if found, all the data inside it is encrypted with AES-256 (Advanced Encryption Standard with 256 bits cryptographic key length) encryption, which is a military grade encryption method that recommended by NSA for US government to protect Top Secret grade of information.

Alternatively, you can also make it possible to unlock the Safebox without using the USB dongle, by using the GuardKey Viewer mobile app. The mobile device running GuardKey Viewer needs to be paired with the GuardKey application running in the computer before it can be used as Safebox mobile unlocker.

There are 2 levels of mobile unlock security: by using a six digit one-time-password (OTP) which changes every minute, or by using a combination of random sequence of images together with the six digit OTP.



GuardKey supports the creation and usage of Safebox in local disk (including portable storage) and also in Cloud storage.


Supported cloud storages including Dropbox, Google Drive, OneDrive, ASUS WebStorage, Box, SugarSync, and other cloud storages that sync with local disk, which the user needs to inform GuardKey about the location of the sync folder.


GuardKey supports one Safebox for each of the storage drive. The screenshot below shows I've created one Safebox for local drive D, and another for Dropbox.


The data inside these Safeboxes are encrypted and not accessible until they are unlocked by GuardKey. A virtual drive will be mounted with the Safeboxes now accessible as folders in the mounted drive. Once they are relocked, they will disappear from the virtual drive, and if all the Safeboxes are relocked, the GuardKey virtual drive will also be unmounted and disappear.


By using GuardKey, you can therefore ensure that all your AES-256 protected data in Safebox will remain be unreadable and inaccessible, even though your computer is stolen, seized or hacked. By encrypting your files and folders in cloud storage with GuardKey, you can also protect them from leaking and exposing through hacking or unauthorized access to your cloud storage account.

The same GuardKey USB dongle can be used in multiple computers to access the encrypted data in your cloud storage from different computer, so that you can access to your files from any one of the computers installed with GuardKey by using your dongle. In addition, you can also access your Safeboxes in cloud storages from within your smartphone by using the GuardKey Viewer mobile app.

GuardKey is a well thought product. In case you lost your USB dongle and you have not enabled mobile unlock option, you are still able to unlock your Safebox and rescue the data inside by using the backup AES-256 key residing in your local disk, which requires your password for its usage.

If you are concerned about this "backdoor" measure for emergency data retrieval, you can store your AES-256 key in another USB disk and lock it in a secured physical safe, then delete and wipe out the backup key in your local disk residing in data folder of GuardKey installed path.

Although the metallic GuardKey dongle is solid and looks durable, you might have the question of what if it is faulty and no longer usable. Without the key, how are you going to access to your valuable data protected by GuardKey? This situation has also been thought about, and there is a mechanism within the GuardKey software to allow you to duplicate the dongle to another USB disk.

As a conclusion, GuardKey is found to be very flexible between security and convenience, which you can adjust according to your need. In high security mode, I believe it is fit for commercial and industrial use. While in high convenience mode such as unlocking on the fly with USB dongle without the need of password, it can still protect your data, provided that your USB dongle does not fall into the hand of other people who at the same time also has your computer with them.



Tuesday, August 9, 2016

OCBC 360 Savings Account with up to 4.1% interest rate

I have opened an OCBC 360 savings account, which is statement based and without passbook.
ATM card can be applied at the cost of RM8 one time payment for convenience of account transaction using ATM machine.

This account has a fixed interest rate of 0.5% per annum. On top of that, there are 3 categories of additional interest of 1.2% per annum each to be earned for deposit amount up to RM100k.

The 3 categories are:

  • Deposit: to deposit a minimum of RM500 into the OCBC 360 account within the month.
  • Bill Payment: to perform at least 3 bill payments from OCBC 360 account using Internet banking or mobile banking within the month. This includes payment to OCBC credit card, payment to OCBC housing loan, and payment to any of the participating billing organizations available in OCBC Internet banking or mobile banking service.
  • Credit Card: to link an OCBC credit card to this 360 account, and to charge at least RM500 aggregated retail transactions to the credit card within the month. The calculated amount is excluding credit card fees and charges, balance transfer, instalment plan, cancelled transactions, etc.
Therefore, the maximum possible interest rate is 0.5% + (1.2% x 3) = 4.1%, for the first RM100k of deposit. The interest rate for additional amount above RM100k remains as 0.5% only.

This interest structure is pretty attractive and comparable to fixed deposit accounts.

OCBC 360 is an adult savings account for individual above 18 years old, and its 4.1% possible interest rate is even higher than most junior and/or teens savings account, which in turn higher than most normal savings account.

This account is insured with the Malaysian Deposit Insurance Corporation (PIDM) for deposit amount up to RM250k.

Apparently, this is a tactic for OCBC to attract working people to centralize their banking with them, which include monthly salary deposit, monthly bill payments, and credit card spending.

OCBC has been famous to give attractive offer with innovative products, such as their previous famous Titanium credit card. However, they also have the track record of making such attractive offer unattractive after a few years.

This OCBC 360 savings account was introduced somewhere in December 2015, which is considered still new. I think this attractive offer will stay around for quite some times, and if OCBC plays the trick to make it unattractive again, we can always pull out and deposit our money at other more attractive bank account.





Wednesday, August 3, 2016

The hacking of Telegram app and the vulnerability of relying on SMS as authentication method

Yesterday (2 August 2016) there was news about 15 million Iranian Telegram users mobile phone number exposed and more than dozen accounts compromised by hackers.

A chain is only as strong as its weakest link. This incident exposed that SMS, which is currently commonly used as authentication method in many online services including online banking systems, is vulnerable to security breach and could be the weakest link in the security measure.

Coincidently, Focus Malaysia Issue 191 dated 29 July 2016 has also just discussed about this vulnerability in its featured article titled "Overcoming The Two-Factor Vulnerability: When it comes to securing your web accounts, two-factor authentication using SMS is safer than just a standard password. But recent cases have shown that it might be time to move away from that."

Why is it not a good idea for online service providers to make use of SMS as security measure?

Firstly, the sending and receiving of SMS is depending on the telco service, which is totally out of control of the online service providers. Therefore, it is vulnerable to listening, hijacking, impersonating, replicating, and other kinds of security breaches along its sending and receiving process.

Secondly, technically speaking, personnel working in the telco can also easily manipulate the SMS as the control is with them. This is very likely the case as happened to Telegram users in Iran.

Thirdly, as mentioned in the article in Focus Malaysia, the code sent by SMS can be obtained using social engineering.

Fourthly, as SMS is sent to the phone, in the event the user lost his/her phone with the mobile apps of online banking, online stockbroking, etc., if the mobile apps are using SMS for authentication, whoever who got the phone can easily take control of the user's accounts, unless the SIM card in the phone is immediately barred, which then disables its SMS function.

As for the case of Telegram app, you can further secure your Telegram account by activating two-step verification, which will require your password to login beside your mobile phone number.

To activate two-step verification in Telegram app, go to Menu > Settings > Privacy and Security > Two-Step Verification and set your recovery email there. Your email can then be your last resort to safeguard your account from hijacking.







Monday, July 25, 2016

LED light bulb that fit in PLC downlight fixture

I have been wondering for a long time if the PLC downlights in my house that use CFL (compact fluorescence) bulbs can be replaced with LED light bulb without much modification. Today, I've finally found the answer.

One of my PLC downlights is faulty and I need to replace its 18W CFL bulb. While searching for its replacement at the shop, I found this...


Yes, it is the PLC light bulb with 2-pin leg that fit with the fixture of my downlight. Instead of CFL tubes, this product is using LED as its lighting source.

So, this is exactly the LED solution that I've been searching for years. Even better, this kind of LED light bulb fit exactly to the existing PLC fixture, and totally no modification is needed.

This LED light bulb is more environmental friendly than the CFL, as it contains no mercury. It also claims to have longer lifespan than CFL, and consume less electricity to obtain the same amount of lumen output. In addition, LED light generates much less heat than CFL. It is also said that LED light does not attract insects, which is a desirable feature. However, this LED bulb is a little bit more expensive than its CFL counterparts.

I have purchased one to replace the faulty CFL bulb. See it in action below:


Finally, I've found the solution to change my PLC based downlights at my house to LED type.

I have been gradually changing the CFL bulbs with E27 base to LED type, as LED light with E27 base has been around for a few years.

Eventually, most if not all the lamps at my house will be LED based, when the CFLs are gradually replaced after they have reached their end of life.

Sunday, July 24, 2016

Changed my car battery with The Battery Shop

I've just changed my car battery today with the service from The Battery Shop.

My old battery was still able to crank up the car engine, after serving for about 2 years. I decided to make an appointment with The Battery Shop for a free onsite checking, after experienced 2 times of car clock reset itself to 12:00 and 1 time of all the radio station preset memory gone. Yesterday, the VST-706 voltmeter in my car has shown unstable voltage that kept on changing within the range of 13.0V to 14.8V when the car is running.

2 young men arrived at my home right on time of the appointment. They called me about 40 minutes earlier to conform the appointment before they came.

They checked my car electrical system and informed me the car alternator is working fine. They found greenish residue developed at the anode terminal of the old battery. Decision was then made to replace the old battery with a new Korean brand Atlas BX 75D23L sealed maintenance free (SMF) battery.

They kept my car engine running during the changing of battery. The whole process was less than 5 minutes. All the settings and memory of the car's clock and radio system are still remained after the battery swap.

Here is my car's new battery, up and running at its place. The voltage supplied is now stable at around 14.2V when engine is running with this new battery.


The Battery Shop's onsite service (delivery, inspection and installation) at Klang Valley area is free of charge. The 2 young technicians I met were polite and the job was professionally done. I was given a RM20 discount, and the new battery cost me RM310. This price is quite reasonable, as 75D23L battery is of higher spec than 55D23L and therefore carries a higher price tag.

The new battery comes with 12 months warranty with warranty card and a car sticker. The technicians informed me that if they see this sticker on my car's windscreen during their next service, they will provide RM20 discount for the next battery change.


I am aware that The Battery Shop is in direct competition with BateriKu. The brands that they carry are different, and the team is also different. If you prefer Atlas BX or GP, you can contact The Battery Shop; if you prefer Century, Yuasa or Astra, you can contact BateriKu.




Friday, July 22, 2016

Wireless-AD - the next generation WiFi (WiGig) with Gigabit per second speed

Perhaps many of you have just upgraded your WiFi network from Wireless-N to Wireless-AC just like me, the next generation of wireless network namely IEEE 802.11ad has already come to the market.

Instead of operating at the highly congested 2.4 GHz band or the less congested 5 GHz band, wireless-AD (a.k.a. WiGig) operates at a new 60 GHz band. The key selling point of this wireless-AD network technology is that it is able to provide an unprecedented  throughput as high as 7 Gbps, which is even much more faster than the wired Gigabit Ethernet network!

However, the wireless-AD network, operating at 60 GHz band, has even shorter range than the 5 GHz band WiFi, and it find itself more difficult to penetrate through walls and other physical obstacles. In addition, its performance is degraded by the amount of oxygen in the air!

With these limitation, wireless-AD might require an open space environment with less oxygen in the air (such as at high altitude places) to transmit data at high speed to nearby devices that support the technology.

Some possible uses of wireless-AD could be media server transferring super UHD movie to nearby TV, "wireless external SSD hard disk", "wireless thumb drive without USB need", etc.

TP-Link has already come out with the Talon AD7200 Multi-Band WiFi Router that supports wireless-AD technology. However, many wireless devices are yet to catch up with this new technology.

Anyhow, it is already supported in the Qualcomm Snapdragon 820 processor which is inside the Samsung Galaxy S7, Samsung Galaxy S7 Edge, LG G5, Moto Z, Sony Xperia X Performance, XiaoMi Mi 5, and the newly launched HTC 10.

It is expected to be also supported in the upcoming Samsung Galaxy Note 7. However, it is still unclear whether Apple iPhone 7 will support wireless-AD or not.

Tuesday, July 12, 2016

How to Boost Your Rainy Day Fund

A rainy day fund is important as it will serve as your back up plan if you lose your job or when unexpected expenses arise. Get started as soon as you can even if you only have a little to put in. What matters is that you are doing something now that will benefit you in the future!


1. Prevent Late Payment Fees

Late payment fees may not seem like much, but you will be surprised at how quickly they add up. Put the money supposedly for the payment of late fees into good use by putting it in your emergency fund instead.


2. Automate Your Savings

Stop making excuses for setting aside your savings by having automated deductions from your payroll account to your rainy day account. You can always control how much you put in, this is just a sure fire way that money is being added to your fund monthly.


3. Avoid Debt

Avoid spending money that you do not have to avoid debt. Although there are good and bad debts, it is still important to assess if you really need to borrow money or if you are thinking of unnecessary expenses. You will be able to save more money when you have less things to pay for.


4. Treat Your Monthly Savings like a Bill

Think of your savings as a bill that you cannot afford to miss paying, just like your rent, electricity,
or phone bill. Better yet, once you have finished paying for something costly, such as credit card debt, car payment, or student loan, shift that payment to your savings account instead.


5. Review Your Daily and Monthly Expenses

It is easy to overlook expenses such as your daily cup of coffee, weekly manicure, monthly TV/movie subscription .Going over your expenses will help you realize what is really worth spending on and what is not. This will help you cut off on your spending give your savings a boost.


Note: This is a guest post by CompareHero.my, dedicated to raising financial literacy in our country and to helping everyday Malaysians make smarter and well-informed financial decisions in life.



Tuesday, July 5, 2016

My TP-Link AC2600 wireless dual band gigabit router Archer C2600 with TM UniFi and Maxis Home Fibre support

I have been using TP-Link TL-WDR3600 dual band wireless-N router for home Internet access for about 3 years, and have just changed it with a new TP-Link AC2600 dual band wireless-AC router.

The TL-WDR3600 router is still functioning well, and I changed it for better home network experience. The reason for the change includes:

  • The 5GHz WiFi band of TL-WDR3600 has a short coverage area. I can only connect to this 5GHz band when my mobile device is near to the router. Further away, the connection speed on 5GHz band dropped drastically, and I ended up only have the choice of using the 2.4GHz band.
  • The TL-WDR3600 is a wireless-N router and does not support wireless-AC connection. As more and more wireless devices at my home are supported with dual band and wireless-AC, I have to retire it and change to a newer router with wireless-AC support to enjoy the benefit of wireless-AC network and new features such as Beamforming and MU-MIMO. I have chosen the Archer C2600 as its successor.
  • The price I paid for the TL-WDR3600 3 years ago was RM17x. Depreciating this cost over a 3 years period, it cost me less than RM60 per year. I don't feel financially guilty to replace it with a better one after using it for over thousand days.
Other than the limitation on 5GHz band coverage and lacking of wireless-AC support, I would say the TL-WDR3600 is a great WiFi router with stable, consistence and quality performance.

Coming on stage is my new TP-Link Archer C2600 router, which I purchased online at the price of RM68x (RM64x +6% GST) with Hari Raya promotion. At the front cover of its packaging box, there is a red sticker about its 2 years warranty support, and a blue sticker stating its UniFi and Maxis Fibre support.


At the back of the box, there is a comparison table for Archer 2600, Archer C9 and Archer C5.


I have also made a comparison table for Archer C7, Archer C8 and Archer C9 in March 2016. (Yeah, I have been surveying and researching around for the router replacement for quite some times, before finalized to this Archer C2600.)

The size of this Archer C2600 is larger than I expected. It is 10.4" X 7.8" which is about the size of a 10-inch netbook.


It has a larger power adaptor than the WDR-3600 too, and is of the same type with the laptop power adaptor. The adaptor converts AC current from wall socket into 12V/4A DC supply to power up the router.

The Archer C2600 is a MU-MIMO router with 4 antennas, which mean it is able to individually serve up to 4 MU-MIMO supported devices at full bandwidth on the 2.4GHz band and another 4 MU-MIMO on the 5GHz band. If the connecting wireless device does not support MU-MIMO, or the amount of MU-MIMO connections at the router has reached the maximum, the connection will fall into SU-MIMO mode, which means its connection bandwidth will be shared with other SU-MIMO connected devices. (For MU-MIMO routers, the more antenna the merrier, so this type of wireless routers usually have more antennas than the older non-MU-MIMO routers)

The Archer C2600 also comes with a modern looking web user interface, which looks nicer than the traditional TP-Link web interface for router administration. Anyhow, there is not much different in features and functionalities between the newer and older interfaces.


Setting up for UniFi IPTV is much easier than before, just a 2-step action of select and save.


Special note on turning on the UniFi IPTV setting:
  • Do not access the router administration web interface by connecting your PC to LAN Port #1 of the router, you should connect your HyppTV STB to that port instead. If you connect your PC to that port, you will end up unable to access the administration web interface after you click on the Save button, because that port will be assigned to a separate VLAN.
  • There is an option for IGMP Version 2 and Version 3. If you choose IGMP V3, your Internet link will be down. Your Internet link can only work properly with IGMP V2.
  • Certain function of the router, such as QoS, will need to be disabled once you enable the IPTV setting. Probably because they are not compatible with each other.
This Archer C2600 also supports the TP-Link Tether mobile app for you to manage it with your smartphone.



My experience of using the Archer C2600:
  • The LED is less brighter than the WDR-3600, which is good after you turned off all your lights for sleeping at night. In fact, the LED of the Archer C2600 can be configured to turn off by itself during sleeping time too. There is also a button on it to manually turn the LED lights on/off.
  • The 5GHz band coverage improved a lot. Now my Samsung UHD 4K smart TV downstairs is able to connect with it using the 5GHz band. Previously it can only connect with my WDR-3600 using the 2.4GHz band.
  • The overall WiFi coverage (2.4GHz band and 5GHz band) is much larger than the WDR-3600 too. Previously I can only get a poor 2.4GHz connection with very low speed at my car poach area outside the building, which is a few walls and some distance away from the location of the router. Now my mobile devices still able to detect the 2.4GHz WiFi with moderate signal at the car poach, and able to connect to the router at speed of single digit Mbps only. The 5GHz WiFi is also detected but signal is much weaker than the 2.4GHz. 
  • The connection speed improved a lot too. My HTC One M8 smartphone used to get a 150Mbps connection at home, now can get a 433Mbps connection. My newer Samsung Galaxy Note 5 smartphone is able to get a 866Mbps connection, with its dual channel support.
  • My external harddisk connected to the router's USB 3.0 port has faster read/write speed too. Time taken to copy large file is shorter.

Therefore, I can say that the performance of this Archer C2600 wireless router is as advertised. At the price of RM68x, it really worth the upgrade from WDR-3600.

Hint: Click on the "Older Posts" link to continue reading, or click here for a listing of all my past 3 months articles.