Blogumulus by Roy Tanck and Amanda Fazani | Distributed by Blogger Templates Designs
Thursday, October 1, 2009

Case No. 9 : Information Environment

Posted by fatima paclibar

Identify an information environment of your choice and write an essay to address the following questions: (3000 words).

• What should be your role within this environment?

• How can the principles of information organization and representation help you in performing this role?

• What are the challenges facing you in performing the role? How will you address these challenges?

I find this topic very ambiguous, at first, I thought this topic means evaluating some information environment group yet I was wrong. After some inquiry about this topic here is my reply to this post.

Looking back to the days before my high school graduation, I am so interested to be an “interior designer” in the future. Yeah! To be an INTERIOR DESIGNER! After searching what universities offer such course but sadly, I found not even one here in Davao. I feel so sad during that time. It’s so funny how I chose to take up Bachelor of Science in Information Technology in college. Knowing the fact that it is so unrelated with interior designing made me laugh, what made me decide to take up this course? Well, one of the career guidance conducted by Department of Labor and Employment (DOLE) in their presentation they list the top 10 most in demand jobs abroad and the top 1 among all other is IT specialist may it be programmer, web designer etc. all related to the Information Technology. After assessing myself if I really want to take up the said course and I said yes. I took the USEPAT or the University of Southeastern Philippines Admission Test, passed it, interviewed by our instructor of this subject (lolz), admit myself to this university and yes, I am now a certified IT student!!!(Hooray!)

To be an official student in this university is not easy, it’s quite tough. But, as time passed by, being a student in this university specifically under the Institute of Computing is tougher. It gives you a lot of pressure, sleepless night, formulating your algorithm even in your dreams and it’s very challenging! Indeed very, very, very challenging! I can sometimes say that programming is killing me! (haha!) Well, I am still alive and kicking, surviving, striving to a good programmer or analyst someday.

Going back to our topic, the information environment I chose is two, first, is the university I am currently in and the second one is my dream company where I will work in the future.

This is the definition of Information Environment I found in the internet, it is any organization having information system circulating in their environment. A lot structures nowadays, adopts this concept since we are living now in the world where computers (Information Technology) is the most commonly used in any establishment.

The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information. The actors include leaders, decision makers, individuals, and organizations. Resources include the materials and systems employed to collect, analyze, apply, or disseminate information. The information environment is where humans and automated systems observe, orient, decide, and act upon information, and is therefore the principal environment of decision making. Even though the information environment is considered distinct, it resides within each of the four domains. The information environment is made up of three interrelated dimensions: physical, informational, and cognitive.

This university I am currently in contributes a lot in developing a young programmer or an IT Analyst. One of the university mission is to able to produce competitive graduates and for them to be able to attain that said mission they hire the best instructors to train, to supervise, to instruct, to develop proficient graduates to be deploy in different fields and in our case in IT world. As an Information Technology student, we are to deal with IT people and IT world. The two meets at a common point which is business. We will be the bridge of the IT world and business may it be a construction business, trucking business, banking business etc. When I say IT world, I mean global affiliation of organizations that are capable to compete with each other.

So how can the principles of information organization and representation help me in performing this role? There are three principles of knowledge organization that I have known of. First is that, knowledge needs to be organized for communities. Second is that, in designing tools to support the organization of knowledge, guiding principle must be that of user orientation and predominant usage. And lastly, standardization and networking provide infrastructures, which facilitate effective and efficient access to information and documents.

What are the challenges I may encounter in performing my role? There are so many aspects to be consider first would be the readiness of the organization to adopt changes, second is the resources to be able to made these changes possible (all possible resources may it be skills, intellect, staff etc.), third is the integrity and security of the of the system, fourth is the cooperation of the human resources to these changes, fourth is the time – the timeliness of the said project and lastly the financial issues, let’s not be hypocrite to be able to establish, develop, maintain and implement an information system requires financial support and remember this is costly.

If there are obstacle that hinders you from doing what is supposed to be done think of these quotations.

“If you can’t go under, go over;
If you can’t go through, go round.
If you can’t go right, go left;
If you can’t get an angle, take two plates and make it.
If you haven’t the right material, go get it.
If you can’t find it, make substitutions;
If you can’t substitute, improvise; if you can’t improvise, make an innovation; but above all, get the job done!”

There’s no such thing as IMPOSSIBLE, only CHALLENGING.

If want thing to be done so badly, there are many ways how to kill a cat. Stop complaining. Start doing what should be done. Utilize your time wisely. Be responsible with your actions.

Case no. 2 : IT/IS RISKS

Posted by fatima paclibar

Subject: Assignment 2 (Due: July 7, 2009, before 01:00pm) Fri Jun 19, 2009 9:30 am

Based on the organization(s) that you visited, what do you think are the risks associated with business and IS/IT change? (1000 words)

(Before anything else I would to apologize for the late reply post regarding this topic.)

When there is a change a risk is expected and business world is not an exception to this aspect. In business, taking risk is not new strategy if want to improve and to be able to compete to the fast evolving world of technology. An efficient strategy to be able to cope up with this scheme, changing or implementing an Information System is advisable.

What is an Information System?

Everything will be clearer if I’ll define first what an Information System is. So, according to our class discussion an Information System is more than technology, more than a computerized system that enables to automate all business processes. An information System is the combination of PEOPLEWARE + HARDWARE + SOFTWARE. It focuses in three dimensions which are the management, organization and technology.

Why Information System?

Business world is a very competitive phase of the real situation of today’s living. To be able to have an edge with other business firm, having an Information System is a great help. With this, an organization can automate its business processes, it is very useful in coordinating organization’s activities, how it support the decision making, synchronization of knowledge from different management levels, functions and business firms. This also gives more importance to the customer relationship; automate the flow of information to manage and coordination of the organization to its other business partner if any.

What are the risks associated with IS/IT change?

  • Integrity risk, this refers to the information being vulnerable. While developing a new system the information is expose and a great possibility that it is incomplete, inaccurate and unreliable. The organization sets the standard requirements and policies to be use in the process of development of the said system thus data gathering must be collected cautiously, for this affects the system consistency. This aspect should not be bypass, for this may result to IT failure.

  • Organizational risks, pertain to the resistance of the people within the organization to use the available technology. The end-users may find reluctant to operate it due to unfamiliarity of the system. The users and technology should cooperate hand in hand in this way we can say the system is fully utilized and the IT benefit is maximized.

  • According to what I have read from the internet another risk is the business risks. This focuses on the financial or the monetary risks in an organization. Changing the Information System of an organization requires a lot of resources in the process as well as time yet the results or the success is not guaranteed. This attempt may improve the functionalities, efficiency and competence of the company’s system yet it may also pull it down resulting to bankruptcy.

  • Security jeopardy is another thing to be considered. In here, the exposure of the significant and confidential information is at stake. There must be an access control and data manipulation restriction especially to those hackers which are not authorized to gain access to the company’s information.

  • Another threat that must be considered is the Technical Risks. Here, we are talking about the capable of the end user of manipulating the said information system. It is said to be the one of the reasons why implementing an Information System in an organization fails because of the end-users. Lacking of the capability, skills, knowledge and ability to maximize the functions of the designed system and how to use it, the system would be useless and will only a liability to the organization. Thus, this requires intensive training and orientation of the system to all its users, which also means this will another process for the organization to make and this also include some financial aspects.

Tuesday, September 1, 2009

MIS Case No. 7

Posted by fatima paclibar

On the assumption that you heard/read the SONA of the President last month, (July 2000), identify at least 3 areas related to ICT and identify how these areas can improve our quality of life.

Our president Gloria Macapagal Arroyo made her last SONA (State of the Nation Address) last July 27, 2009. In here, she reported to the Filipino people the achievements, developments, advancements and growth take place within her administration.


I based my answer to this topic from an article I downloaded from the internet, similar to how she delivered it live to the public.


Kung noong nakaraan, lumakas ang electronics, today, we are creating wealth by developing the BPO and tourism sectors as additional engines of growth. Electronics and other manufactured exports rise and fall in accordance with the state of the world economy. But BPO remains resilient. With earnings of six billion dollars and employment of 600,000, the BPO phenomenon speaks eloquently of our competitiveness and productivity. Let us have a Department of ICT.


ICT Philippines is the newest savvy job hub for Information Communications and Technology virtuosos. The site functions as a marketing talent pool for the ICT professionals, and the companies that seek to employ them. The object is to assist the clients with the resources to hire the most qualified Information Communications and technology, and to provide these professionals with the best opportunities in their respective fields. Being in the IT Industry, we are exposed to the constant change in the needs of companies and recruiters in the industry. Our field of specialty and exposure to the highly-skilled IT professionals enable us to reach hard to find and exceptional experienced candidates and companies.




As a country in the path of typhoons and in the Pacific Rim of Fire, we must be prepared as the latest technology permits to anticipate natural calamities when that is possible; to extend immediate and effective relief when it is not; the mapping of flood-and-landslide-prone areas is almost complete. Early warning, forecasting and monitoring systems have been improved, with weather-tracking facilities in Subic, Tagaytay, Mactan, Mindanao, Pampanga.


This development is very useful to us, knowing that we are located in the Pacific and we one of the victims of most natural calamities. Early detections of the incoming typhoons and earthquake, made us all ready for it, enable us to make some precautions and preparations, and permit us to make important decisions in advance. Simulating the possible effects of these calamities will save lives and properties.





Sa telecommunications naman, inatasan ko ang Telecommunications Commission na kumilos na tungkol sa mga sumbong na dropped calls at mga nawawalang load sa cellphone. We need to amend the Commonwealth-era Public Service Law. And we need to do it now.

I personally experienced this one, where unsolicited promo directly sends ring tunes and mms, without my approval or without my consent to download it or subscribe to there ads. Here, after sending the uncalled services they automatically cut off your current load balance to the equivalent cost. I consider this circumstance as a virtual thief of our resources that supposedly are use in more important matter. All kinds of stealing is a crime and so this one should be given considerations and the government must act on it and make the right move to protect its people from this virtual thief.

MIS Case No. 6

Posted by fatima paclibar

If you were hired by the university president as an IT consultant, what would you suggest (technology, infrastructure, innovations, steps, processes, etc) in order for the internet connectivity be improved? (3000words)


Assuming that I am hired by the university president as an IT consultant, and the task given to me is to improve the internet connection. In an organization we are in, knowing that we have limited resources, it is advisable and recommended to maximize our resources where we have to limit expenditures, and it also means that we have limited ways on how to improve the connection of the internet in our beloved organization. Let’s just assume that we have all we need to implement this project. In connection to the topic, the following are my suggestions on how we can improve internet connectivity in our university; this is based on some articles I have read from the internet and my own experience and understanding.


To start, let us examine first the internet connection we have right now, our facilities or conditions of our computers as well as the network. As a member of this university, I have had use the computer laboratory or the so called “nodal” for only a minimal number of times for the following reasons:


1) Slow or should I say very slow internet connection.
2) The number of students falling in line to use the laboratory.
3) The number of computers available.
4) Restricted access of some sites.
5) Vast number of viruses residing in our computer laboratory.
6) Old and faulty hardware


What I have mentioned above are based on what I have observed and those are the problems I found, that must be given consideration in developing, recommendations that leads to improvement of the university connectivity.


Discussing the problems I have observed, we currently have a very slow internet connection this is may due to the that we have a not maximized the bandwidth usage, and we are aware that the allocated bandwidth we currently have, is not enough for the number of computers in the university, to be more specific I will state the users of the said topic, we have the students who uses the laboratory and the university virtual library and to mention, those students bringing their laptops with them, the faculties and school staffs. For we have a limited number of computers, it is expected that not all students can avail the said service where many of us choose to go to the nearest internet café with faster internet speed and no site restrictions. I also observed that our computer laboratory is like a lair of computer viruses which also contributes to slowing down of connections. And also, we have faulty and old hardware presents in our computer networks. These also a great factor that must be given attention, for its one of the main reasons why we have slow pace connectivity, to elaborate further internet connection depends on the capability of computers, we cant have a fast connection when we have an old and outdated hardware, and also UTP cables must be check and replace if necessary ‘coz this also slows down the connection for some interference maybe present and if needed use repeaters.


I suggest the following to speed up university’s internet connection:

  1. Perform some computer maintenance. Run Disk Defrag, a scan disk, a virus scan, a malware scan, and clear your recycle bin. An unusually slow Internet connection experience is often the only sign that your computer is infected with viruses or other malware. Delete old files and temporary files. Never allow the free space on your C: drive to be less than 10% of the total size or twice the installed RAM (which ever is larger). A well maintained PC will operate much better than a PC that has never had any maintenance. Google or your local computer repair store should be able to help you with this if you don't know how.
  2. Reset Your Home Network. Sometimes restarting your home network if you have one will drastically increase the speed of your connection.
  3. Optimize your cache or temporary Internet files. These files improve your Internet connection performance by not downloading the same file over and over. When a web site puts their logo graphic on every page your computer only downloads it when it changes. If you delete the temporary files it must be downloaded again. if you disable the cache, it must be downloaded every time you view a page that uses it. This can be done by opening Internet Explorer, clicking on "Tools" at the top and choosing "Internet Options". On the General tab, click the "Settings" button next to Temporary Internet Files. Set Check for newer versions to "Automatically". Set amount of disk space to use to 2% of your total disk size or 512 MB, which ever is smaller. On Firefox, click "Tools" then "Options," and go to the privacy tab. Then click on the Cache tab within this.
  4. Never bypass your router. Most routers include a firewall that is very difficult for hackers to defeat. If you don't need to use Wireless then hook your computer directly to your router. Routers will only slow down your connection by a few Milli-seconds. You won't notice the difference but the hackers will.
  5. If you are using a Wireless router, make sure it doesn't conflict with a cordless phone or wireless camera. Wireless routers come in two varieties; 802.11bg (2.4Ghz) or 802.11a (5.8Ghz) If you are using a 2.4Ghz Cordless phone and 2.4Ghz Wireless router then your Internet connection speed will slow while you use the cordless phone. The same is true of wireless security cameras. Check on your phone and camera, if it's 900Mhz then it's fine. If it says 2.4Ghz or 5.8Ghz then it could be the cause of your slow connection speed while they're in use.
  6. Call your Internet service provider (ISP). Sometimes you just have bad service. They can usually tell if your connection is substandard without having a technician come to your home. Just be nice and ask.
  7. Upgrade your computer. If your computer is slow, it doesn't matter how fast your Internet connection is, the whole thing will just seem slow. You can only access the Internet as fast as your PC will allow you to.
  8. Replace your old cable modem. Any solid-state electronics will degrade over time due to accumulated heat damage. Your broadband modem will have a harder and harder time 'concentrating' on maintaining a good connection as it gets older (signal to noise ratios will go down, and the number of resend requests for the same packet will go up). An after-market cable modem as opposed to a cable-company modem will frequently offer a better connection.
  9. Often your connection speed is slow because other programs are using it. To test if other programs are accessing the Internet without your knowing, Click Start, Click Run. Type "cmd" (without quotes). Type "netstat -b 5 > activity.txt". After a minute or so, hold down Ctrl and press C. This has created a file with a list of all programs using your Internet connection. Type activity.txt to open the file and view the program list. Ctrl Alt Delete and open up the Task Manager. Go to the process menu and delete those processes that are stealing your valuable bandwidth. (NOTE: Deleting processes may cause certain programs to not function properly)
  10. After you have tried all this try your connection again and see if it's running any faster.
  11. Caching proxy server. A proxy server can reply to service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance
  12. Proxy Servers. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that,
    among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.

Tips

  • Call your ISP and have them verify all of your TCP/IP settings if you are concerned. Ask them to verify that your Proxy settings are correct.
  • Don't expect dial up or high speed lite service to be fast. The Internet is primarily geared towards Broadband Connections. Sometimes, you have to wait a little.
  • Download programs that make browsing faster:
    • Loband.org is a browser inside of a browser that loads web pages without the images.
    • Firefox and Opera both have options to disable images.
    • In Firefox, you can also use extensions such as NoScript that let you block scripts and plug-ins that would otherwise slow things down a lot.
    • If you are using Internet Explorer or Firefox, try downloading Google Web Accelerator. It is meant to speed up broadband connections, but it can also slow your Internet connection. Try enabling it and disabling it and see when your Internet connection runs faster.
    • If you are using Firefox, download the Fasterfox extension and Firetune.
    • Reduce the amount of programs running that use your Internet connection (Instant Messengers, RSS Feeders, and MS Applications set to send Internet data)
    • Google Accessible Is designed to search pages in order of how clean they are of junk. This will bring up pages that are usually not only easy to read, but are quick to load.

  • Upgrade your RAM. This will not only improve your regular computer use, but it will affect the speed of your Internet connection because your computer works faster.
  • Use the Stop button to stop loading pages once you've gotten what you want.
  • Some times malware on your computer can eat up your bandwidth. Make sure you have an up-to-date malware protection program.
  • Most Internet Providers have flaky DNS servers (no citation necessary, it's a given) - so, instead of using those provided by your ISP, switch your DNS servers to use those of OpenDNS. OpenDNS is far faster, and more reliable, simply using 208.67.222.222 and 208.67.220.220 as your domain name servers will speed up most flaky DNS problems (may even speed up your networking since OpenDNS has large caches).
  • Look into running your own local DNS server on your network. Some newer routers may include their own nameserver, otherwise, check into AnalogX.com's DNSCache program, it works great to hold commonly accessed domain names in the "cache" so that the IP addresses do not have to be looked up everytime you navigate to a new page.

Warnings

  • Viruses and malware can often use up your bandwidth and slow down your Internet connection. Make sure you have protection against this. Many ISP's will provide software for this. Make sure your anti-virus and malware scanners are up-to-date.
  • Bypassing the router will leave you more vulnerable to attacks because you no longer have the built-in firewall from your router protecting you.
  • Watch out for scams that claim to make your Internet go a lot faster for free. They may tell you to download their program, which usually has a lot of other hidden programs attached that might steal your identity.


Those are my cost effective, brilliant and I guess efficient ideas on how to improve the internet connection of the university. However it does not end there, we must orient the users of this project. Proper usage of computers and connection must be reminded. Everything will be useless and all the efforts will be futile if the users is not responsible enough on how to fully utilized, maintained and managed this internet connection.

Tuesday, August 18, 2009

MIS cASE nO. 5

Posted by fatima paclibar


Based on your adopted organization(s), identify and discuss barriers in their IS/IT implementation.

Whew! 2000 words for this assignment and I find it quite difficult to find related articles in the internet to. According to the instruction above the input must be from our adopted company however to make my points clearer and to make this article more interesting and reliable I also include my research understanding via the internet regarding this topic. Let’s start the discussion of the said matter.

There are many identified barriers in the Information System or Information Technology implementation in an organization. For what I have read in some articles over the internet, I will categorized in into five (5) divisions in which I think the most important factors, these are the (1) Financial Problems, (2) Physical Problems, (3) Technical Problems, (4) Organizational Problems and (5) Social Problems.

As an elaboration of the division of the obstacle identified in the implementation of Information System, the following are the lists of more specific problems in each category.

1. Financial Problems
This should be considered in implementing an Information System in an organization. For this determined the resources needed in the processes, development and maintenance of an efficient system. If we have limited resources we may encounter insufficiency of funds to put into action the desired solution. This includes hardware replacement, software updates and maintenance and as well as funds for the specialized skills training for the company’s staff. With this, we can also determine if we can maximize the usage of Information System within the organization according to the company’s need and its users.
In the side of the investors, they may be hesitant to spend money for this project for will be very costly and requires ample time to complete the system yet the results or outcome is unsure. What I can say to the investors in this matter, if we want a changes or development we must take the risk, for business is a gamble, just makes sure that you have all the weapons not to lose in the game.

2. Physical Problems
When we are talking of the physical aspects of Information System we are pertaining to the hardware, software and network topology. Thus, this may involve redesigning the network, hardware replacement in order to have more improve speed and efficiency and as well as the determining the most appropriate software to used.

3. Technical Problems

Infrastructure. It is the very important framework of any information organization. Effective Information access and use depends on communication facilities such as telephones, Internet, fax, computers, as well as an adequate supply of electricity. Computer literacy is almost non-existent in primary and secondary education. It is very much limited in colleges and universities due to shortage of skilled human resources and computing infrastructure.

Lack of a shared, reliable computing and network infrastructure. When an institution lacks an IT infrastructure there will be a difficulty in operating technology supported programs with consistency from one office to the other or building to building. It also slows and complicates communication among the organization or other institutions

Unrealistic time frames. Some information systems take considerably longer than originally planned. Time delays lead to serious difficulties in planning for and adjusting to changes in operations. Since they consume more time than they expected, the deadline will become a pressure.

Difficulty of data collection and management. Data collection is considered to be the most critical and difficult part of implementing an Information System for it is the foundation of the entire system process. Thus, this convey what the system is all about, its scope and limitations. Proper management of the said data is essential.

4. Organizational Problems
The organization heads set too ambitious goals that require a lot of resources that may not be able to achieve. I suggest that in making the goals of the company they should focus on what are the necessities or focus on the needs of the organization that it must meet the business requirements of the party and it should be brief and accurate.

Unskilled Staff
As mention above, system must be maintained and monitor from time to time and the people who will handle this transaction must be well trained and have an expertise on maintaining the system. Not having this kind of people inside the organization will add up to the barriers to the success of the system.

5. Social Problems

. The resistance of the organization and its people to the technology is also a factor that I consider as one of the obstacle.

Human resources as the participants to the implementation of Information System should be able to meet or abide the requirements or standards of the company’s specific IS. In planning as well as in the development of the said system, the human resources should participate hand in hand in the process. We can consider the human resources as one of the Information System barriers with regards to its implementation for they are the one who gives the specifications, requirements and standards that help to develop the functionalities of the company. These people are also the one who will utilize, manage and control to be able to acquire the benefits of technology.

Communication is another factor that adds up to the impediments of technology. As what I mentioned above, every participant in the implementation must work together to make sure the success of the desired output is not impossible to attain. Without this there is no guarantee that the system will be a help to the organization or maybe it will just be add to its liabilities. Instead of gaining from what they have invested, they are more likely to lose or worsen the company’s situation.


Resources:
http://www.unesco.org/education/educprog/erd/english/wgesa/doc/ethiopia/appendice_2.htm
http://www.unm.edu/~jreenen/dlbook/chapter9.html

Friday, July 10, 2009

MIS Case No. 4

Posted by fatima paclibar

Find three (3) URL's that talk's about "green campus computing" and suggest ways how the university can adopt this concept.

When we are talking about “green campus computing” we are talking about our responsibilities as an IT student towards our environment, our contribution on how to use our electronic resources wisely such as computer and how we can minimize electronic waste or the e-waste.

In this assignment, we were given a task to give three URL’s that talk’s regarding green campus computing and how can we adopt or implement it in our own university which is the University of Southeastern Philippines and most importantly it should all begin in ourselves.

The following are the URL’s which talks about green campus computing:

1. http://green.wikia.com/wiki/Green_Computing

The Following are their suggestions:

a) Turn off the monitor when the user will be away for a moment.
b) Set your PC’s on standby mode at a certain point of time.
c) Remove all unnecessary or unused drive.
d) Unplug the CD-ROM if this is not used most of the time.
e) Print wisely. Print only the pages you need and try to avoid print all if it’s not necessary.
f) Refill inkjet cartridges or laser toner rather than to replace it into a new one.
g) Turn off the router, cable modems and WIFI access point when not in used. Avoid turning it on overnight.

Planning to buy new PC? These are their suggestions.

a) Buy laptop than PC because laptops consume less power than desktop does.
b) Buy a computer according to your need.
c) Choose the latest Intel than AMD because it is more environmental friendly though not as powerful as the latter.
d) Consider the 80 plus energy efficient power supply.
e) Choose its parts carefully. Do not install the unnecessary parts when you’re not using them.
f) Choose Corded Keyboard and Mouse over wireless.
g) Inkjet printers use less energy than laser printer. Choose according to your need.

2. http://searchdatacenter.techtarget.com/sDefinition/0,,sid80_gci1246959,00.html

In this site, it said that on earliest initiatives towards green computing the United States voluntarily labeling their program the Energy Star. On 1992, Environmental Protection Agency (EPC) was established to promote energy-efficiency on all hardware.

Here are some steps that promote green computing:

a) Power- down the CPU’s when not in used.
b) Try to do computer-related tasks during contiguous, intensive blocks of time, leaving hardware off at other times.
c) Power-up and power-down energy-intensive peripherals such as laser printers according to need.
d) Use liquid-crystal-display (LCD) monitors rather than cathode-ray-tube (CRT) monitors.
e) Use notebook computers rather than desktop computers whenever possible.
f) Use the power-management features to turn off hard drives and displays after several minutes of inactivity.
g) Minimize the use of paper and properly recycle waste paper.
h) Dispose of e-waste according to federal, state and local regulations.
i) Employ alternative energy sources for computing workstations, servers, networks and data centers.

3) http://www.p2000.umich.edu/energy_conservation/ec7.htm

Waste Minimization Procedure
Electrical Conservation Tips:

• Turn the computer off overnight and on weekends;
• Wait until ready to use the PC before turning it on;
• If the computer is going to be inactive for more than 16 minutes, consider turning it off. After this energy needed to run the computer outweighs the start-up energy;
• Do not turn on the printer until ready to print, even an idle printer consumes energy;
• Try to schedule computer-related activities to do them all at once, keeping the computer off at other times;
• If spending a large amount of time at the computer, consider reducing the light level in your office. This may improve cathode ray tube screen visibility as well as save energy.


Technology had given us many advantages that made our daily tasks easier. But as we all know that in all things there is an equal and opposite reaction and in this case, if technology brought us goodness well it have its disadvantages also. We belong to the IT world- the world of the new generation; we have an obligation to educate ourselves on how we can help to promote green campus computing in our university, as well as in our surroundings. Not just to promote and reinforce it but on how we can effectively implement this cause in our university. Knowing that these electronic wastes exist, and we are now informed what we can do to justify the means of green campus computing, thus our responsibility as an IT student does not end in this forum as we made our assignment, and the challenge to make this happens is in our hands.

MIS Case No. 3

Posted by fatima paclibar

Automated Election in the Philippines

The Comelec – Commission on Election in the Philippines have been very busy for the neither previous months nor years preparing for the near May 10, 2010 presidential election. An automated election was proposed by Senator Richard Gordon and officially amended by Republic Act 9369 or the amended Automated Election System. Its main goal is to assure the Filipino people to have a fair, honest and clean election thus, to regain the trust of its people to the electoral process and to its government.

What is this Automated Election?

This is a modern electoral process and also known as the Republic Act 9369 or the Automated Election System, authored by Senator Richard Gordon.

The system involves machines to be deploy in every precincts nationwide that helps to minimized the allotted time for counting of votes, secure the votes of each Filipinos, minimized or totally eliminate cheating or election frauds and regain the trust of every Filipino to the government in terms of electoral process.

The government allotted 11.3 billion supplemental budgets for the said project. The winning bidder will provide 80,200 machines, two of these machines will be deploy on every precincts.

Instead of writing the names of the candidates in the ballot, voters will shade their chosen candidate names. So, it means there is still manual action occurs during the election proper however, the process does not end there. After the voting proper, every ballot will be scan by the Precinct Counting Optical Scan (PCOS) which records and stores the votes and hopefully it neither reduce nor minimize instances of fraud and cheating. The said ballots also feature security codes or markings to safeguard the votes of the people. Thus, this will reduce complaints for this system promises to be fast, accurate and reliable.

The system promises to give fast results in a matter of more or less two (2) days. Even though the actual voting will be manual but the counting and transmissions of votes will be fully automated thus, Comelec is confident that this automation of election will be a success one.

Automated Election Vs Manual Election.

For the recent years, the Philippines have had implemented the manual electoral process. From the word itself “manual” it literally means that every actions occur on the said election is between man to man, those who are involve in the said issue which are the voters and the election officers. From the election preparation, voting proper, vote counting, vote canvassing, result transmission to result generation it is facilitated, administered and the results are manually computed by people. In the manual scenario of election it is prone to fraud and cheating. Filipino voters had experienced to witness this kind of scheme thus; they have loss their trust to our election system. Some example to these election irregularities are vote buying, cheating in vote counting, flying voters, and harassment of voters.

As the technology evolves, Comelec sees that there is a need of a change in our electoral process. And this change leads to the amendment of automation of our election system. In this connection, the realization of the quest of the Filipino people to have a reliable, clean, honest and fair election results to the approval of Republic Act 9369 or the amended Automated Election System.

May 10, 2010 election is the target date of the first nationwide automated election to take place. The said automation had been tested on the Autonomous Region in Muslim Minadanao (ARMM) election on August 2008. That said election was made to be an experiment to test if the proposed automation of election process in this country would be applicable, effective and credible. In result, according to survey conducted by Social Weather Station (SWS) in the ARMM August 2008 election it said to be a successful one and it satisfy the voters in the ARMM.

The following statements is based on the survey conducted by the SWS:
Among ARMM people, 75 percent said that the automated voting in their regional election the previous August gave them “much more” or “somewhat more” confidence that the election was free and fair. In the national survey, on the other hand, only 40 percent said that the automation of the ARMM elections in August 2008 gave them added confidence that the ARMM elections were free and fair. In other words, actual participants became more assured of the fairness of the election process, while mere onlookers mostly stayed skeptical.
Unsurprisingly, the great majority (69 percent) of ARMM voters agreed with the proposal to implement automated voting in the 2010 presidential elections. Only 8 percent disagreed; 24 percent were undecided. (This question was not asked in the October national survey.)
Directly from the people who have actually experienced the automated election, in this case it shows that it is in favor to the automation of 2010 election.
To automate or not to automate the 2010 election.
As an Information Technology student in the University of Southeastern Philippines I would suggest or I will stand in the side of the automation of our electoral process. As mention above it is more advantageous for our government and most importantly to us – the people of the Philippines. The said modern system or the modernization of our election system is not just a mere accessory on our government that we are embracing the high technology around us but this system offer us a secure, reliable, fast, time saving, free, honest and clean election. We all need a change. We all need to hear our voices in this matter. We all need a government that we can trust. And we have the power to make it all come true. To safeguard our votes with this system, to put in position the people that we think best suited for the given positions. All we need is to trust this change; this automation of election will bring good to all of us. With this system, we can guarantee that are votes are safe, accurately recorded, securely stored and will give us accurate and fast results. Why stop the change, when it brings development to our nation? Come to think of it. We want an honest, free and a clean government, why not starts it now? Let us support the 2010 Automated Election System.

COMDAP 2009

Posted by fatima paclibar

, ReflectionCOMDDAP means computer manufacturers distributors and dealers association of the Philippines. This association, had their exhibition here in Davao last July 2-4. IT was held on the Apo View Hotel. By the way, for some who does not know about COMDDAP, this is their brief information about the association:


“COMDDAP is an association of the country's top information technology businesses. Its primary objective is to promote the sustainable development of the of the country's information technology industry through voluntary collaboration of its member companies. It is the goal of COMDDAP to be able to provide its members general views and updates from different sectors - private and government, and highly regarded individuals to further uplift the morale and knowledge of its organization.

The vision of promoting and elevating the standards of Information technology (IT) in the Philippines fueled a group of prominent computer companies to form the Computer Distributors and Dealers Association of the Philippines or COMDDAP. Its initial member-companies represent the world's leading makers and providers of computer products, solutions and peripherals.

In 1997, the manufacturing sector - represented by industry leaders Hewlett Packard, Epson and Compaq, among others - was integrated into the COMDDAP membership, making the association a more diverse representation of the IT sector and thus the new name, COMPUTER MANUFACTURERS, DISTRIBUTORS AND DEALERS ASSOCIATION OF THE PHILIPPINES.”

This was of course taken from their site, http://www.comddap.org/.


So much for that, I will be talking about my experience on the COMDDAP exhibition on the Apo View Hotel. I arrived on the Hotel most likely around 1:40 or 2:00 pm. There was a sign showing where the exhibition is being held so it was easy finding the venue of the event. But when I saw the façade of the exhibition, I was primarily confused on where to sign up so that I can enter the said exhibition. That was a funny experience since I was not able to see the booth where students are
suppose to go and get there sticker for the exhibition. Good thing I noticed that the people that were signing forms are the people that will be taking the Adobe seminar. I did not went to that seminar since there will be a payment for each seminars, namely for the Adobe Dreamweaver, Adobe Flash, Adobe Fireworks and Adobe Contribute. I have a sufficient knowledge about what the seminars except for the Adobe Contribute. Well then, after much confusion, I got the sticker
for the student pass. I was amazed when I entered the exhibition. There were a lot of these things for techy guys from different brands. There were also other booths that showcases their service instead of their products. I saw our facilitator talking to some people in the exhibition. I tried looking for the place where the seminar will be held, which was my main purpose of coming in the first place. As I was looking for it, I saw some fellow USePians looking for the seminar also. We asked a personnel where the seminar is being held and he pointed us to the back of a booth where we can see a door. To make it short, we arrived at the registration confirmation table, where we asked if it was the room that the seminar is taking place. Good thing we are right but the bad thing is, we are told that we cannot go in anymore… the room is packed and we will have to wait for the next session, which will be the HP thin Client session. Well, since it was our fault then, we waited for the first session to finish. But we didn’t wasted time doing nothing there. We looked around at some numerous booths. There was this one booth that took my undivided attention (that was an exaggeration, hehehe). They were showing on the new graphic manipulation software. I think it was the new version of Corel Draw. I was amazed on the way it was presented and also, the new Acrobat reader presentation was nice. We toured the entire exhibition and after that, we went back to the place where the seminar is being held. We were a bit early so we had to wait for a few minutes for the first session to finish. We verified if our name was listed on the participants of the next session. After that, the first session finished but it seems like the people are not piling out. So as we went in, it was understandable. Most of the people on the first session was from USeP. We were able to find a seat just before the session started. The session is all about the HP thin client. The thin client is a computing device similar to the system unit of a personal computer. This is an exerpt from the site of the HP thin client, http://www.hp.com/sbso/solutions/pc_expertise/article/thinclients_consider.html:


“Thin clients are computing devices that function as an access device on a network. These solid-state devices connect over a network to a server where the bulk of the processing takes place. Thin clients have no hard drive, allowing for more secure storage of data and applications on the server. In fact, keystrokes, mouse events and screen images are all that is sent between the client and server. This makes the device much more secure than a standard desktop or notebook computer. With no hard drive, fan or other moving parts, thin clients have a much longer lifespan than standard computers and use significantly less power. Lower maintenance costs are another benefit as software application updates, virus scanning and patches can be executed on the server. Deployment costs are also reduced as thin clients can be remotely configured and do not need to be set up individually. Break-fix simply requires replacing the thin client. “


Basically, the thin client is more of a business tool rather than for personal use. Based on what I have understood on the session, The TCO of the Hp thin client is lesser than buying desktops. They have this certain features that are really nice to have especially for business and medium enterprises. After the presentation, there was a question and answer portion where prizes were given to those who can answer correctly. I was a fun session, not the type that makes you yawn. Hehehe.. After that, the next session was a proprietary system session and it was for only those who received an invitation. So sadly, we went out. But on the following day, we went back to the exhibition to join the sessions that we missed during the first day of exhibition.

Sunday, July 5, 2009

 

Posted by fatima paclibar

To my lady

This could be an overused cliche to you
but what I have right now, in this moment,
I will not trade for anything, and that's true
For I will do everything, just to be with you.

I may not utter the words I hold as a secret,
But let this be a sign, that there are no words
To describe how I feel about you.
For no one could make my day the way you do.

Promises are made to be broken, and that is true for me,
All I can do is show, in my own way,
That with my actions, you will know...
Ands I'll surely prove it by the end of the day.

Now let me hold your hand, for it gives me the chills,
Making this makes me laugh, but that's how it feels
When you are thinking of someone, it seems...
You will not mind the things you thought before as silly.

To my lady, let me say this to you,
There will be troubles and hardship ahead
It will not be an easy trail, for the both of us,
But I am here, just follow my lead, the only thing I can do
Is do everything in my ability, to make you happy,
I am not good; I am the best, that's what you said...
And now would be a good time to prove it all...

from: 10112912

MIS Case no. 2

Posted by fatima paclibar

Automated Election in the Philippines

The Comelec – Commission on Election in the Philippines have been very busy for the neither previous months nor years preparing for the near May 10, 2010 presidential election. An automated election was proposed by Senator Richard Gordon and officially amended by Republic Act 9369 or the amended Automated Election System. Its main goal is to assure the Filipino people to have a fair, honest and clean election thus, to regain the trust of its people to the electoral process and to its government.

What is this Automated Election?

This is a modern electoral process and also known as the Republic Act 9369 or the Automated Election System, authored by Senator Richard Gordon.

The system involves machines to be deploy in every precincts nationwide that helps to minimized the allotted time for counting of votes, secure the votes of each Filipinos, minimized or totally eliminate cheating or election frauds and regain the trust of every Filipino to the government in terms of electoral process.

The government allotted 11.3 billion supplemental budgets for the said project. The winning bidder will provide 80,200 machines, two of these machines will be deploy on every precincts.

Instead of writing the names of the candidates in the ballot, voters will shade their chosen candidate names. So, it means there is still manual action occurs during the election proper however, the process does not end there. After the voting proper, every ballot will be scan by the Precinct Counting Optical Scan (PCOS) which records and stores the votes and hopefully it neither reduce nor minimize instances of fraud and cheating. The said ballots also feature security codes or markings to safeguard the votes of the people. Thus, this will reduce complaints for this system promises to be fast, accurate and reliable.

The system promises to give fast results in a matter of more or less two (2) days. Even though the actual voting will be manual but the counting and transmissions of votes will be fully automated thus, Comelec is confident that this automation of election will be a success one.

Automated Election Vs Manual Election.

For the recent years, the Philippines have had implemented the manual electoral process. From the word itself “manual” it literally means that every actions occur on the said election is between man to man, those who are involve in the said issue which are the voters and the election officers. From the election preparation, voting proper, vote counting, vote canvassing, result transmission to result generation it is facilitated, administered and the results are manually computed by people. In the manual scenario of election it is prone to fraud and cheating. Filipino voters had experienced to witness this kind of scheme thus; they have loss their trust to our election system. Some example to these election irregularities are vote buying, cheating in vote counting, flying voters, and harassment of voters.

As the technology evolves, Comelec sees that there is a need of a change in our electoral process. And this change leads to the amendment of automation of our election system. In this connection, the realization of the quest of the Filipino people to have a reliable, clean, honest and fair election results to the approval of Republic Act 9369 or the amended Automated Election System.

May 10, 2010 election is the target date of the first nationwide automated election to take place. The said automation had been tested on the Autonomous Region in Muslim Minadanao (ARMM) election on August 2008. That said election was made to be an experiment to test if the proposed automation of election process in this country would be applicable, effective and credible. In result, according to survey conducted by Social Weather Station (SWS) in the ARMM August 2008 election it said to be a successful one and it satisfy the voters in the ARMM.

The following statements is based on the survey conducted by the SWS:
Among ARMM people, 75 percent said that the automated voting in their regional election the previous August gave them “much more” or “somewhat more” confidence that the election was free and fair. In the national survey, on the other hand, only 40 percent said that the automation of the ARMM elections in August 2008 gave them added confidence that the ARMM elections were free and fair. In other words, actual participants became more assured of the fairness of the election process, while mere onlookers mostly stayed skeptical.
Unsurprisingly, the great majority (69 percent) of ARMM voters agreed with the proposal to implement automated voting in the 2010 presidential elections. Only 8 percent disagreed; 24 percent were undecided. (This question was not asked in the October national survey.)
Directly from the people who have actually experienced the automated election, in this case it shows that it is in favor to the automation of 2010 election.
To automate or not to automate the 2010 election.
As an Information Technology student in the University of Southeastern Philippines I would suggest or I will stand in the side of the automation of our electoral process. As mention above it is more advantageous for our government and most importantly to us – the people of the Philippines. The said modern system or the modernization of our election system is not just a mere accessory on our government that we are embracing the high technology around us but this system offer us a secure, reliable, fast, time saving, free, honest and clean election. We all need a change. We all need to hear our voices in this matter. We all need a government that we can trust. And we have the power to make it all come true. To safeguard our votes with this system, to put in position the people that we think best suited for the given positions. All we need is to trust this change; this automation of election will bring good to all of us. With this system, we can guarantee that are votes are safe, accurately recorded, securely stored and will give us accurate and fast results. Why stop the change, when it brings development to our nation? Come to think of it. We want an honest, free and a clean government, why not starts it now? Let us support the 2010 Automated Election System.

Wednesday, June 24, 2009

Case No. 1

Posted by fatima paclibar

Concentrix

Global delivery, local results. Concentrix maximizes the long-term value of our clients' customers with solutions that support the entire customer lifecycle and provide a high return on investment. And, by delivering from our locations in Asia, Latin America, and the United States in 12 major languages, we give our clients the global reach essential for business success. Our results: satisfied clients, some with relationships of 12 years or more.

High-quality, experienced technical support drives customer satisfaction — and overall business success. Your customers won’t be happy with your technology product if they can't get it to work correctly. Today's global consumer demands prompt, knowledgeable support that’s easy to understand. To meet this need, we deliver quality technical support to our clients' customers over multiple channels from our centers in Asia, Latin America, and the United States, in 12 major languages, 24/7. From basic help desk to advanced hardware support, Concentrix can help you choose the most efficient combination of solutions for your customers.

When Concentrix becomes your customer support partner, we also become your voice. We incorporate your organization's culture, brand, training, quality, technology, language and security requirements into your program. Flexibility is key, and we work with you to continually evaluate and improve all aspects of your program and its performance. The result: improved customer experience and satisfaction, increased support capacity, and reduced costs.

Services we provide include: Accounts payable and receivable
• General accounting
• Order fulfillment and vendor claims
• Purchase order processing
• Data entry and document scanning
• Accounts payable automation


CallBox

Search Engine Optimization
Organic search engine optimization is the process of improving the volume and quality of traffic to a website from search engines via "natural" or "algorithmic" search results for targeted keywords. Usually, the higher it ranks, the more searchers will visit that site. Search engine optimization experts can target different kinds of search, including image search, local search, and industry-specific vertical search engines.

Get professional search engine optimization from Callbox. Professional SEO from Callbox means having SEO experts working on your website meticulously to get you the search engine results and page rankings you want. With our cheap search engine optimization, you can utilize our team of SEO specialists or simply consult about the entire SEO process with our search engine optimization consultant. Callbox’s search engine optimization SEO services aims to get you to the top spot in search engines’ results page, giving you unlimited business opportunities.

Database Cleanup

You may have a database of prospects and customers, but is it updated? Are the names on your list the actual decision makers? Could you be wasting mail efforts, time and money due to old information? Don't let the value of good data be lost by years of sloppy data entry.
You've spent many years collecting valuable data. Over time, a database can become outdated, contaminated, disorganized or just plain messy due to improper data entry. Make sure that it is organized effectively so your sales and service people can find what they need accurately and quickly. This is where database cleaning can help, and we are experts.

Callbox offers Database Cleanup services that will significantly increase the accuracy and value of your database marketing efforts. Let Callbox contact companies in your database to confirm company information, qualify the decision-maker, and assist in database management by adding additional information like e-mail addresses and other valuable information to your existing list.
Benefits of Database Cleaning include:
• Improved data accuracy
• Reduced effort in transforming data
• Data integrity
• Data consistency
• Removal of data duplication

A profile cleanup service can save your company time and money. Our goal is to put everything in its place, and fill in all the blanks. No duplicates, just clean, complete, updated data that will speed up report generation and filtering.
Keyword Research
Keyword research is a very important aspect of your search engine optimization campaign. If your site is using the wrong keywords, the search engines and your customers may never find you. If you’d like to know what search terms your target market is utilizing, conduct extensive keyword professional research. Callbox can do that for you.

Callbox’s keyword research service helps you find appropriate words and phrases to include in your web pages’ text to aid in effectively promoting your products and services and drive traffic to your site. Our keyword research services involves brainstorming all the words your potential customer would type into their search box when trying to find you. This includes thinking of phrases that are broad and targeted, buying and research-oriented, single and multi-word. Through google adwords keyword research, we will come up with the right words to cover all the services your site offers and narrow it down to the essentials. After all, it’s the targeted, buying-oriented terms that will maximize conversions.

Keywords will be inserted in the following elements of your website:
• Title Tag
• Meta Description Tags
• Meta Keywords Tag
• Headings
• Image Tag
• Alt text
• Anchor Text/ Navigational Links

Web Copy Writing

Web users are active, not passive. If they don't see a reason to stay on your site, all it takes is one click and they're gone. Your website’s content will not only determine whether visitors find your site through search engines, but will determine if they stay to learn more about your services. This is where a skilled online copywriter from a professional seo copywriting company comes in.
Website copywriting from Callbox focuses on content that will appeal emotionally to a CEO, corporate executive or large corporation. We know the importance of search engine copywriting to your business so our professional seo copywriting service is designed to deliver only clear, compelling information. Our online copywriting services involve creating content that informs, educates, entertains and stimulates perspective clients to stay and ultimately motivate them to take action. Overall, we make sure that your copy addresses your site's most important audience directly and lets them know in clear terms what you can offer them.

Our web copy writing process includes:
• Researching your market in relation to your products and services.
• Developing a strategy to present and sell your products and services online.
• Creating unique and effective content based on the results of our research.
• Creating landing pages with high conversion rates

Link building

Your website's rankings for various keywords depends to a certain extent on the link popularity of your website. That is why it is a good idea to tap a link building company that offers affordable link building with websites in your area of business that can help you in attracting more targeted audience to your site. Link building campaigns are very cost effective compared to other forms of advertising. Moreover, a link building program has better accountability and results can be tracked very easily.

Callbox can provide all forms of link building services that can help you increase and improve the link popularity of your website. Our link building campaign includes one way linking, reciprocal linking and three way linking. Our link building experts can provide a platform for buying one-way and text links. Your website will achieve higher rankings, better search traffic and higher internet exposure with our link building service in the long term.

If done correctly, increasing your linkage will:
• Increase your traffic significantly.
• Improve your visibility in the search engines.
• Provide an added resource to your website.
• Save you a lot of advertising money.
• Save you time.

TELECOMMUNICATIONS

Faced with constant challenges from the economy, competitors, regulators and customers who demand new service offerings and personalized customer care, leading telecommunications providers are re-evaluating their customer support strategies.

At Callbox, we work with you to develop customer, workforce and technology strategies aligned with your overall business objectives. We enable local, long distance and wireless providers and telecommunications equipment manufacturers worldwide to meet business challenges and grow their customer base through a broad range of cost-effective, customer-focused programs, covering everything from campaign management and welcome calls to complex tech support.

Our integrated customer interaction solutions will help your company increase revenues by consolidating marketing and sales efforts and improving customer loyalty and demand by providing consistent high level service, and reducing costs and operational efficiency.

We can market these products and services:

* Voice Over IP (VOIP) solutions and equipment
* Interactive Voice Response (IVR)
* IP phone systems
* High speed internet
* Web Hosting
* Broadband wireless
* Mobile, data and internet services

Our services include:

* Lead generation
* Company profiling
* Data management
* Tech support
* Welcome calls
* Sending prospects information
* Following up prospects from mailings or conventions to set appointments