G O D L I K E ! (don pipo†²)







"DOTA is the best medicine for all 4th year Computer Science Student"

Friday, September 17, 2010

CASE # 7

Computer Network Security


1. Computer System Security


The security of computer hardware and its components is also necessary for the overall protection of data. Even if the computer is not plugged into a network, a person can open its cabinet and gain access to the hard disk, which can later be used on some other computer for data theft. If a standalone system contains some important or classified information, it should be kept under constant surveillance. It is also necessary to remember that in case one dissembles his computer hardware, the risk of losing coverage of warranty becomes very high.

2. Computer Information and Data Security

It is important to avoid data and information loss in case of hard disk crashes. The only solution is to regularly keep backups of all the data on other media such as magnetic tapes, CD-ROM, etc. It is a good practice to store the media off-site and in case of a disk crash, restore the information from the backup media onto the new disk. In case a backup media is not affordable, one should try and store the files on at least two different media devices. These media devices should be systematically kept at a place which is safe and secured, as the information contained may be confidential. People usually backup database files, spreadsheet files and large documents. As the technical constraints are always there, it is better to take regular backups, in order to avoid any loss of information.

3. Phishing


Technology came with a flip side and left us trapped in the fraudulent 'phishing' net. Usually carried via SMS or e-mail, phishing technique obtains user names and passwords of bank accounts for siphoning money. Take tips to avoid such phishing activity, we sure don't want you land up in a 'catch'-22 situation.

4. Internet Crime

You go to your bank's website, put in the password for Internet banking and to your horror you realize that someone has hacked your account. Congratulations, you have become a victim of what is technically called as Internet crime. Check out what all is included under the umbrella term Internet Crimes by reading on.

5. Network Backup and Continuity Planning

Technologies can help your agency ensure the safety and integrity of your data, network, and business operations through detailed critical mission analysis and assisting you in planning for disasters such as terrorist events, hazmat incidents, weather emergencies, and other contingencies that arise that can disrupt your operations.

6.Web Based Notification and Messaging

Technologies can provide your agency with secure, remote hosted, web based messaging solutions allowing you to communicate critical messages to all or groups of your key personnel from any Internet connected PC.

7. Improper password use

Passwords are the simplest form of security. By leaving passwords blank or simple (i.e., password or admin), unauthorized users are practically invited to view sensitive data. Passwords are more secure when they contain both letters and numbers in a combination of upper-case and lower-case characters, and they should be changed periodically.

8. Plug and surf

Unfortunately, computers are not designed to be connected to the Internet straight out of the box. Before a phone line, Ethernet cable, or wireless card is anywhere near a new computer, install a line of defensive software. Ideally, this should include virus protection, multiple spyware scanners, and a program that runs in the background to prevent malicious software from ever being installed.

9. Ignoring security patches

Security holes may exist in your operating system. No software is perfect. Once an imperfection or hole is found, it's usually exploited within a very short period of time. Therefore, it is imperative to install security patches as soon as possible.

10.Scan TCP/UDP services

Turn off or remove unnecessary services. Unneeded services can be the entry point attackers use to gain control of your system.

=>For me this ten security are the were can we implement during the security of our computers and the data that we have in our computers.




Friday, September 3, 2010

THE CONSUMER ACT OF THE PHILIPPINES

Republic Act No. 7394
THE CONSUMER ACT OF THE PHILIPPINES



all of the consumer act article are very useful for the consumer because in consumer act will depend the interest of the consumer of the philippines.
all of the article can be the one who will implement the law of the consumer act and approving the safety nest of the consumers.

Sunday, August 15, 2010

CASE # 5

How New Technology is Rewiring our Brains?
The technology is rewiring our brains,” said Nora Volkow, director of the National Institute of Drug Abuse and one of the world’s leading brain scientists. She and other researchers compare the lure of digital stimulation less to that of drugs and alcohol than to food and sex, which are essential but counterproductive in excess.

Technology use can benefit the brain in some ways, researchers say. Imaging studies show the brains of Internet users become more efficient at finding information. And players of some video games develop better visual acuity.

More broadly, cellphones and computers have transformed life. They let people escape their cubicles and work anywhere. They shrink distances and handle countless mundane tasks, freeing up time for more exciting pursuits.

For better or worse, the consumption of media, as varied as e-mail and TV, has exploded. In 2008, people consumed three times as much information each day as they did in 1960. And they are constantly shifting their attention. Computer users at work change windows or check e-mail or other programs nearly 37 times an hour, new research shows.

The nonstop interactivity is one of the most significant shifts ever in the human environment, said Adam Gazzaley, a neuroscientist at the University of California, San Francisco.

“We are exposing our brains to an environment and asking them to do things we weren’t necessarily evolved to do,” he said. “We know already there are consequences.”

Mr. Campbell, 43, came of age with the personal computer, and he is a heavier user of technology than most. But researchers say the habits and struggles of Mr. Campbell and his family typify what many experience — and what many more will, if trends continue.

For him, the tensions feel increasingly acute, and the effects harder to shake.

The Campbells recently moved to California from Oklahoma to start a software venture. Mr. Campbell’s life revolves around computers. (View a slide show on how the Campbells interact with technology.)

He goes to sleep with a laptop or iPhone on his chest, and when he wakes, he goes online. He and Mrs. Campbell, 39, head to the tidy kitchen in their four-bedroom hillside rental in Orinda, an affluent suburb of San Francisco, where she makes breakfast and watches a TV news feed in the corner of the computer screen while he uses the rest of the monitor to check his e-mail.

Major spats have arisen because Mr. Campbell escapes into video games during tough emotional stretches. On family vacations, he has trouble putting down his devices. When he rides the subway to San Francisco, he knows he will be offline 221 seconds as the train goes through a tunnel.

CASE # 4

1. What is Outsourcing?

Base on the wikipedia, outsourcing refers to the process of contracting to a third-party. While outsourcing may be viewed as a component to the growing division of labor encompassing all s the term did not enter the Ebglish-speaking lexicon until the 1980s. Since the 1980s, transnational corporation have increased subcontracting across national boundaries. In the United States, outsourcing is a popular political issue.outsourcing is often viewed as involving the contracting out of a business function - commonly one previously performed in-house - to an external provider. In this sense, two organizations may enter a contractual agreement involving an exchange of services and payments. Of recent concern is the ability of businesses to outsource to suppliers outside the nation, sometimes referred to as offshoring or offshore outsourcing(which are odd terms because doing business with another country does not mean you have to go offshore). In addition, several related terms have emerged to grasp various aspects of the complex relationship between economic organizations or networks such as nearshoring, multisourcing and strategic outsourcing. Almost any conceivable business practice can be outsourced for any number of stated reasons. The implications of outsourcing objectively and subjectively vary across time and space.
According to T Thompson, Outsourcing refers to a company that contracts with another company to provide services that might otherwise be performed by in-house employees. Many large companies now outsource jobs such as call center services, e-mail services, and payroll.These jobs are handled by separate companies that specialize in each service, and are often located overseas.


2. What are the advantages and disadvantages of outsourcing?


The advantages of outsourcing are the following:
a)Focus on Core Activities-In rapid growth periods, the back-office operations of a company will expand also. This expansion may start to consume resources (human and financial) at the expense of the core activities that have made your company successful. Outsourcing those activities will allow refocusing on those business activities that are important without sacrificing quality or service in the back-office.
b) Cost and Efficiency Savings-nature, but the size of your company is preventing you from performing it at a consistent and reasonable cost, is another advantage of outsourcing.
c) Reduced Overhead-Overhead costs of performing a particular back-office function are extremely high. Consider outsourcing those functions which can be moved easily.
d) Operational Control-Operations whose costs are running out of control must be considered for outsourcing. Departments that may have evolved over time into uncontrolled and poorly managed areas are prime motivators for outsourcing. In addition, an outsourcing company can bring better management skills to your company than what would otherwise be available.
e) Staffing Flexibility-Outsourcing will allow operations that have seasonal or cyclical demands to bring in additional resources when you need them and release them when you’re done.
f) Continuity & Risk Management-Periods of high employee turnover will add uncertainty and inconsistency to the operations. Outsourcing will provided a level of continuity to the company while reducing the risk that a substandard level of operation would bring to the company.
g) Develop Internal Staff-A large project needs to be undertaken that requires skills that your staff does not possess. On-site outsourcing of the project will bring people with the skills you need into your company. Your people can work alongside of them to acquire the new skill set.

Disadvantages of outsourcing are:
a) Loss of Managerial Control- Whether you sign a contract to have another company perform the function of an entire department or single task, you are turning the management and control of that function over to another company. True, you will have a contract, but the managerial control will belong to another company. Your outsourcing company will not be driven by the same standards and mission that drives your company. They will be driven to make a profit from the services that they are providing to you and other businesses like yours.
b) Hidden Costs- You will sign a contract with the outsourcing company that will cover the details of the service that they will be providing. Any thing not covered in the contract will be the basis for you to pay additional charges. Additionally, you will experience legal fees to retain a lawyer to review the contacts you will sign. Remember, this is the outsourcing company's business. They have done this before and they are the ones that write the contract. Therefore, you will be at a disadvantage when negotiations start.
c) Threat to Security and Confidentiality-The life-blood of any business is the information that keeps it running. If you have payroll, medical records or any other confidential information that will be transmitted to the outsourcing company, there is a risk that the confidentiality may be compromised. If the outsourced function involves sharing proprietary company data or knowledge (e.g. product drawings, formulas, etc.), this must be taken into account. Evaluate the outsourcing company carefully to make sure your data is protected and the contract has a penalty clause if an incident occurs.
d) Quality Problems-The outsourcing company will be motivated by profit. Since the contract will fix the price, the only way for them to increase profit will be to decrease expenses. As long as they meet the conditions of the contract, you will pay. In addition, you will lose the ability to rapidly respond to changes in the business environment. The contract will be very specific and you will pay extra for changes.
e) Tied to the Financial Well-being of Another Company-Since you will be turning over part of the operations of your business to another company, you will now be tied to the financial well-being of that company. It wouldn't be the first time that an outsourcing company could go bankrupt and leave you holding-the-bag.
f) Bad Publicity and Ill-Will-The word "outsourcing" brings to mind different things to different people. If you live in a community that has an outsourcing company and they employ your friends and neighbors, outsourcing is good. If your friends and neighbors lost their jobs because they were shipped across the state, across the country or across the world, outsourcing will bring bad publicity. If you outsource part of your operations, morale may suffer in the remaining work force.

3. What is the implication of outsourcing?

IT outsourcing is a growing phenomenon in the developed economies. However, it is not often managed as strategically as it might be. Drawing on evidence from 30 case histories in the United Kingdom, this article presents the basis for a strategic approach. It identifies six critical factors around which IT outsourcing decisions can be based, provides a framework for decision-making based on organizational experiences of different levels of success, and discusses the additional factors that need to be borne in mind as a reality check, to ensure that the IT outsourcing decision can be delivered upon. The paper argues for a more strategic approach to IT outsourcing and provides frameworks to enable decision-makers to think through the issues presented by an impending IT sourcing decision.
The potential performance enhancement that may result from a carefully formulated outsourcing strategy are suggested by the competency-based and resource-based perspective om strategic management. Potential benefits of outsourcing, such a cost improvement and more narrow focus on core competencies, make outsourcing an attractive option. Firm performance is being influence by the two types of outsourcing, the peripheral and core. Peripheral allows firms to focus on activities they do best and improve the quality of those activities. Peripheral outsourcing intensity has a positive effect in the firm performance. Core outsourcing may lead to declining innovation and eventually competition from suppliers. This has a negative effect in the firm performance.

CASE # 2

Global Warming is the increase in the average temperature of Earth's near-surface air and oceans. It occurs when the earth heats up (the temperature rises). It happens when greenhouse gases (carbon dioxide, water vapor, nitrous oxide, and methane) trap heat and light form the sun in the earth's atmosphere, which increases the temperature. This hurts many people, animals, and plants. Many cannot take the change, so they die. It is also affecting many parts of the world. Global warming makes the sea rise, and when the sea rises, the water covers many low land islands.

This is a big problem for many of the plants, animals and people on islands. The water covers the plants and causes some of them to die. When they die, the animals lose a source of food, along with their habitat. Although animals have a better ability to adapt to what happens than plants do, they may die also. When the plants and animals die, people lose two sources of food, plant food and animal food. They may also lose their homes. As a result, they would also have to leave the area or die. This would be called a break in the food chain, or a chain reaction, one thing happening that leads to another and so on.


Causes of Global Warming
:

Many things cause global warming. One thing that causes global warming is electrical pollution. Electricity causes pollution in many ways, some worse than others. In most cases, fossil fuels are burned to create electricity. Fossil fuels are made of dead plants and animals. Some examples of fossil fuels are oil and petroleum. Many pollutants (chemicals that pollute the air, water, and land) are sent into the air when fossil fuels are burned. Some of these chemicals are called greenhouse gasses.

We use these sources of energy much more than the sources that give off less pollution. Petroleum, one of the sources of energy, is used a lot. It is used for transportation, making electricity, and making many other things. Although this source of energy gives off a lot of pollution, it is used for 38% of the United States’ energy.


Effect of Global Warming:


The effects, or impacts, of climate change may be physical, ecological, social or economic. Evidence of observed climate change includes the instrumental temperature record, rising sea level, and decreased snow cover in the Northern Hemisphere. Green house gases stay can stay in the atmosphere for an amount of years ranging from decades to hundreds and thousands of years. No matter what we do, global warming is going to have some effect on Earth. Here are the 5 deadliest effects of global warming. Polar ice caps melting, Economic consequences, Increased probability and intensity of droughts and heat waves, Warmer waters and more hurricanes, and Spread of disease.



The Effect of technology in the Environment:

The effects of technology on the environment are both obvious and subtle. The more obvious effects include the depletion of nonrenewable natural resources (such as petroleum, coal, ores), and the added pollution of air, water, and land. The more subtle effects include debates over long-term effects (global warming, deforestation, natural habitat destruction, coastal wetland loss). Each wave of technology creates a set of waste previously unknown by humans: toxic waste, radioactive waste, and electronic waste.

One of the main problems is the lack of an effective way to remove these pollutants on a large scale expediently. In nature, organisms "recycle" the wastes of other organisms, for example, plants produce oxygen as a by-product of photosynthesis, oxygen-breathing organisms use oxygen to metabolize food, producing carbon dioxide as a by-product, which plants use in a process to

Effect of Technology on Environment:

The effects of technology on the environment are both obvious and subtle. The more obvious effects include the depletion of nonrenewable natural resources (such as petroleum, coal, ores), and the added pollution of air, water, and land. The more subtle effects include debates over long-term effects (global warming, deforestation, natural habitat destruction, coastal wetland loss.)Each wave of technology creates a set of waste previously unknown by humans: toxic waste, radioactive waste, electronic waste.

One of the main problems is the lack of an effective way to remove these pollutants on a large scale expediently. In nature, organisms "recycle" the wastes of other organisms, for example, plants produce oxygen as a by-product of photosynthesis, oxygen-breathing organisms use oxygen to metabolize food, producing carbon dioxide as a by-product, which plants use in a process to make sugar, with oxygen as a waste in the first place. No such mechanism exists for the removal of technological wastes.Humanity at the moment may be compared to a colony of bacteria in a Petri dish with a constant food supply: with no way to remove the wastes of their metabolism, the bacteria eventually poison themselves.

Friday, July 23, 2010

CASE # 3

1. What is Facebook?

->Facebook is a social networking site that allows for developers to contribute applications that interact with Facebook features, a gathering spot, to connect with your friends and with your friends friends. Facebook allows you to make new connections who share a common interest, expanding your personal network. Facebook is a website where you can communicate to other countries using facebook.
->Facebook is like a friendster but this website is the best one for finding some new friends facebook is useful because it is a world wide communication or a online communication. In this site you can cooperate with your co-business man to deal with your products and other advertisement.


2. What are the disadvantages and advantages of facebook?

->Advantages
· Allows user search for new and old friends
· Accessible to chosen universities having a high level of security
· Makes it less awkward when communicating with strangers or people you are not familiar with
· Love attraction - can be used as a dating service system
· Makes it easier to join groups having similar likes and dislikes
· Allows members to check students who are taking the same class, living within the same area, or coming from the same academy

->Disadvantages
· Overcrowding
· Weakening long distance relationship
· Unsupported by physical adjacency
· Contributes wide-range procrastination
· Rampant addiction
· Stalking is possible
· Acquaintances be labeled as friends

->Surely, the disadvantages don't pose a threat to you just by merely looking at it. Someone else has to prove that what users do with their profile is directly in proportion with what can happen to them. A user must understand what he is trying to give out otherwise things might get messy and people will mistook them as someone else.


3. What are the characteristics of facebook why many people engaged in this site?

->The characteristic of facebook are non-interruptable they integrate multiple social mediums they don't strive for 1:1 communication but they are active. People engaged in this site because those games that's why many people are using facebook because of their good games and services and other things that are accessible in this site. And also people engaged in this site to develop their own business and to advertise their product. In this site many people are using this facebook some of them are the celebrity in our country or in the other countries that can access this site.


4. Can you use facebook in e-commerce?how and why?


->Yes we can!

We can use facebook in e-commerce by publishing your products and advertise your product. By publishing your product many people can see your product and make sure that they can access your product and they can buy some of them. Using E-commerce in facebook is very useful and helpful for a business man to gain some money not only money but also costumers. In facebook you can do some transaction in your products.


5. how important facebook in the society today?

->Facebook is important in our society because we can build some new friends in online communication and we can also upgrade our own profile and post some of our information and make some love relationship. Facebook today is very familiar to all countries in the whole world because of their online communication and in facebook you can post some of your photos and videos you can also add some friends and make some of advertisement and some business . You can make some of transaction using this facebook and because facebook is very linkable and either the schools are using facebook to make their own group in their subjects.

Friday, July 9, 2010

CASE # 1

Google is a highly successfully internet business. Resently they have broaden there scope with a moltitude a new tools.

Research google business model and answered the ff. question bellow.

You may add additional information not included in this question.


1. Who are their competitors?

->
Both shamelessly imitate Google in several ways, such as sporting stripped-down Internet sites and touting proprietary technology for ranking the significance of billions of pages that make up the World Wide Web. All three companies also have refused to follow a recent trend of selling placement within search results to advertisers—a practice that has created enviable Web profits at companies such as GoTo.com but sparked complaints from consumer advocates.

->
With backing from such Silicon Valley rainmakers as Sequoia Capital and Kleiner Perkins Caufield & Byers, the company has also emerged in the past two years as one of the chief engines powering portals such as Yahoo and several corporate sites. Last year, the company won Yahoo’s account from Inktomi, and it recently struck one of its largest deals to date powering search for Sony’s company sites.
->Some of their competitors are the same as google. But google is using of a high technology and they ignore the other search engine, and google now is emerging their site to make the it linkable and the surfer will easy to find what they are searching for.

2. How have they used information technology to their advantages?

->Founders Larry Page and Sergey Brin named the search engine they built "Google," a play on the word "googol," the mathematical term for a 1 followed by 100 zeros. The name reflects the immense volume of information that exists, and the scope of Google's mission: to organize the world's information and make it universally accessible and useful.

->When you visit www.google.com or one of more than 150 other Google domains, you can find information in many different languages (and translate between them), check stock quotes and sports scores, find news headlines and look up the address of your local post office or grocery store. You can also find images, videos, maps, patents and much more. With universal search technology, you can often find all of these things combined in one query.

Of course, there is a lot of information in the world that is not yet online, so we're also working to get more of it digitized, such as in Google Books or the Google News Archive. We also know that whenever you search the web you want it to be as fast as possible, with all your favorite websites at your fingertips, so we offer software like Google Toolbar and Google Chrome to help you browse the web quickly and easily.

Search is how Google began, and it's at the heart of what we do today. We devote more engineering time to search than to any other product at Google, because we believe that search can always be improved. We are constantly working to provide you with more relevant results so that you find what you're looking for faster. To that end, we've added services such as personalized search, which tailors results for you if you are signed in to your Google account.

3. How competative are they in the market?

->
Previous study of the effect of experience on economic behavior demonstrates the potential of the assumption that a general learning process drives adaptation to incentives in different settings. This assumption was found to provide useful ex-ante predictions of behavior in several studies (e.g., Erev & Roth, 1998), and is consistent with the observation of similar reaction to reinforcements across species (e.g., Thorndike, 1898), and with the discovery that the activity of certain Dopamine neurons is correlated with one of the terms assumed by reinforcement learning models (see Schultz, 1998).

->
The current project takes two measures to address these problems. The first is an extensive experimental study of the effect of experience under conditions that minimize the effect of other factors. The second is the organization of an open choice prediction competition that facilitates the evaluation of a wide class of models. We ran a large “estimation study” experiment examining different problems drawn randomly from the same space (the algorithm for the problem selection is here: problem selection algorithm), and challenge other researchers to predict the results of the second study, referred to as the “competition study” based on evaluation of the results of the first study.

->Their competitive because of their nice and good services and new technology services in the web search engine.

4. What new services do they offer?

->This list of Google products includes all major desktop, mobile and online products released or acquired by Google Inc. They are either a gold release, in beta development, or part of the Google Labs initiative. This list also includes previous products, that have either been merged, discarded or renamed. Features of products, such as Web Search features, are not listed.

->Their are many services offered in google such as 3D Warehouse, Apps, Buzz, and etc.
You can see all the services in google by clicking the url of the site http://en.wikipedia.org/wiki/List_of_Google_products in this site all the meaning of the services are sorted.

->Like we use for now blogger is one of the services of the google. In this site we can post some of information or details and some of your own opinion.


5. What makes them so unique?

->Previously I’ve written about the corporate culture at Google and how it isn’t likely to be an easy thing to emulate. Today at work, my coworker, Jackson, showed me this post that links to a slide show that delves into Google’s internal processes. Another post that I recently read was Steve Yegge’s post on Good Agile, Bad Agile, in which Steve explores Google’s version of agile.

Needless to say, it all adds up to a lot of Google on the brain. Google, at the moment, is held up as the gold standard of software companies. They have achieved massive success and are the company almost every developer wants to work for. Ask someone in the software industry which company they want to emulate and they will likely say Google.

Obviously, if it was easy to emulate Google, everyone would have done it or would be doing it by now. The more I think about Google, the more and more I think it is going to be impossible to emulate them. Certainly you can steal some of their ideas and what they’ve pioneered and put it to use in your company, but outright copying Google is going to be near impossible.

->The google is unique because of their linkable site. The design of search engine of the google is simple but they are not copying the design of their site. Some of the search engine is look like google. They are copying the design of the google so that it looks like the google and many surfer will surf to their search engine.

6. how competitive are they in the international market?

->Having studied Google abroad somewhat significantly, I believe this article provides a very naïve view on Google’s success abroad. Absolutely, Google, as any American company, needs to be extremely aware of the impression they make when entering foreign grounds, as the risk as being seen as arrogant – the ugly American – is omnipresent. And, yes, Google should continue to grow their in-country teams significantly in order to best overcome cultural and sales hurdles and take advantage of unique opportunities and the gigantic world market that is growing at a quicker pace than the U.S. market. Recent stats point to European e-commerce in a position to surge past U.S. e-commerce.

Yet, don’t attempt to fool anyone here: Google has enormous international market share. Though I’m on a plane and not able to access these stats immediately, I believe that Google has approximately a 10-point higher share of search in Europe than they do in the States. I attended an online and multi-channel retail conference in London earlier this year, and Google was constantly mentioned, and never in a bad light. I am attempting to arrange a dinner in Paris later this year or early next with top French e-commerce companies, and Google is the likely sponsor, due to their relationship with the French agency that I am in contact with and their relationship with the likely invitees. Google is dominant in most countries, with their distant following to Baidu in China and the Russian example in the article notable exceptions.

In the UK, Amazon.com and eBay have also taken off after some early slips and command a dominant share of the market. Of course, they face hurdles, most notably eBay’s fraud and trust problem, but these American brands have also experienced tremendous success abroad. And there are other huge hurdles across Europe, such as Germany’s reliance on non-credit card payments and their language and cultural barriers. The European Union is still quite segmented, and pan-European plays will rarely be successful. Yet, the world continues to flatten, and American brands can have success abroad with fewer hurdles as can international brands have success in the States.

Google has had success with other products abroad, most notably its Orkut social network which has bombed domestically to its MySpace, Facebook, and LinkedIn brethren, yet has taken off in huge countries such as India and Brazil. So, sure, Google should be sensitive to cultural sensitivities and will face different regulatory environments abroad, but the truth is that Google has been remarkably successful internationally in large part due to the international word-of-mouth generated by their product and feature set.

->Google is a wide search engine in the whole world. All of the nations can access the web search. They are competitive because of their unique site. Google is so linkable you can easily find what your searching for.