Monday, December 15, 2008

E-commerce and Government

A number of authors are unhanded by the fact that they cannot fully manipulate electronic commerce sufficiently to satisfy the demands of both governments and consumers. It is an actuality for both parties. Eventually, there are suggestive solutions with it. However, it has not been fully completed in order to diminish such issue.
According to wikipedia.org, a free online encyclopedia, “Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.” The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well. When President Estrada signed the e-commerce law, the Philippines became only the third country in Southeast Asia with legislation to promote and protect electronic transactions. This culminates a very long and tedious process that was started way back July 1st 1998, when Senator Juan M. Flavier filed the first of many bills that would eventually lead to the Philippine Electronic Commerce Act (R.A. 8792, an act providing for the recognition and use of electronic commercial and non- commercial transactions, penalties for the unlawful use thereof, and for other purposes). The E-Commerce law addresses the significant legal challenges facing Filipinos who wish to participate in this wealth-creating global phenomenon. First, it gives validity and legal recognition to electronic documents, electronic signatures and electronic transactions. Second, it facilitates the admission of electronic documents and electronic signature as evidence in cases of disputes. Third, it outlaws and penalizes unauthorized access to information and interference in communications systems (i.e., hacking, introduction of viruses and the like). Finally, it calls upon government to formulate and institute programs that are not only supportive of e-commerce but would actually get the government online. Many questions will be raised especially in the first months of the law’s implementation. This is an initial attempt to provide some answers to questions regarding to how the law was intended to mean. This will discuss many, not all, provisions of the law that we feel is the most important for the private as well as public sectors. As e-commerce develops ambiguities in the current tax code in which it may be exposed. It would not be regarded as too early to take premature steps for undertaking such a review at a time when detailed international legislation are going on to promulgate acceptable standards laws for imposition taxation in this regard. The Central Board of Revenue should take active part in promulgation of conducting research on this subject in hand and should propose any changes to tax law in the light of what emerges in development in e-business. In the meantime, Central board of Revenue will do two things: make sure that e-commerce taxation requirements are fully considered when recommending amendments are made to existing laws, and such changes should be made to national tax laws that are needed as unforeseen legal obstacles to the growth of e-commerce emerge to subject to tax revenue constraints. If there is a difficulty in fitting any of our existing tax legislation to e-commerce transactions, then CBR should look at these emerging legal problems connect with its execution and administration. Uncertainty is bad for business. Taxpayers should not be left in doubt as to the applicability of a particular provision of tax laws. This is not to say that all of the existing tax legislation should be made applicable to e-commerce. However, the fact remains that e-commerce is just another way of doing business and it should normally be subject to the same tax requirements as any other method of doing business. The development of e-commerce may require some fine tuning of our tax laws in consistent in international legislative trends. The integrity of electronic documents provides for prima facie presumptions relating to electronic signatures: that the electronic signature is that of the person to whom it correlates, and that the signature was affixed with the intention of signing or approving the electronic document. This means that when A’s signature is attached to a document, one may presume that it is A’s signature and that he was the one who signed it with the intention of signing or approving the same. The presumption is, of course merely prima facie, it may be rebutted with better evidence to the contrary. What constitutes Original Documents is also discussed in the law. This is important as it impacts on rules of evidence or court procedures where the concept of original is most vital to whether one’s piece of evidence is admitted or not. Presently, where the law requires information to be presented or retained in its original form, that requirement would be deemed met by an electronic data message or document if the integrity of the information is shown by evidence aliunde or otherwise and that it is capable of being displayed to the person to whom it is to be presented. This provision of law will be of great help to those who go to court presenting electronic evidence. While the old paradigms could only conceive of original document as just being generally singular, this paves the way for the existence of many “originals” as long as the provision’s criteria of integrity and reliability are met. Nothing represents the modern office more than filing cabinets. Offices have rooms full of filing cabinets largely because there are no other ways of keeping files that are required by government or by law. This Act may yet make filing cabinets obsolete. Under this law, the retention of documents in its original form is satisfied by retaining them in the form of an electronic data message or electronic document as long as the criteria of accessibility, integrity, and identification of person and time are assured. The person required to retain the forms may also do it by using the services of a third party. This may be applied where the government, say the BIR, requires the retention of receipts for at least three years, for audit purposes. This can free corporations from having to keep the required documents in paper form. Affidavits are dealt with under Sections 14 and 15. The requirements in Section 9 on integrity, and Section 12 on admissibility may be established by affidavit. This is useful as the requirements may prove to be too stringent and inflexible. Of course, as in any statement contained in affidavits and presented in courts, such are subject to the right of the person against whom the affidavit is executed, to test the accuracy and truth of the affidavit by cross-examination. This Law applies to any kind of information in the form of a data message used in the context of commercial activities. This Act shall apply to any kind of electronic data message and electronic document used in the context of commercial and noncommercial activities to include domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information.These Rules apply where electronic signatures are used in the context of commercial activities. They do not override any rule of law intended for the protection of consumers. Any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or any methodology or procedures employed by a person and executed or adopted by such person with the intention of authenticating or approving an electronic document. An electronic signature on the electronic document shall be equivalent to the signature of a person on a written document if the signature is an electronic signature and proved by showing that a prescribed procedure, not alterable by the parties interested in the electronic document, existed under which – a method is used to identify the party sought to be bound and to indicate said party’s access to the electronic document necessary for his consent or approval through the electronic signature; Said method is reliable and appropriate for the purpose for which the electronic document was generated or communicated, in the light of all circumstances, including any relevant agreement; It is necessary for the party sought to be bound, in order to proceed further with the transaction, to have executed or provided the electronic signature; and The other party is authorised and enabled to verify the electronic signature and to make the decision to proceed with the transaction authenticated by the same. Electronic documents shall have the legal effect, validity or enforceability as any other document or legal writing, and – where the law requires a document to be in writing, that requirement is met by an electronic document if the said electronic document maintains its integrity and reliability and can be authenticated so as to be usable for subsequent reference, in that – the electronic document has remained complete and unaltered, apart from the addition of any endorsement and any authorised change, or any change which arises in the normal course of communication, storage and display; and the electronic document is reliable in the light of the purpose for which it was generated and in the light of all relevant circumstances. Paragraph applies whether the requirement therein is in the form of an obligation or whether the law simply provides consequences for the document not being presented or retained in its original form. A foreign certificate shall be deemed to have the same effect as that given to a certificate issued under this Act provided that a trustworthy system which is no less reliable than the trustworthy system under this Act is issued in the issuance of such foreign certificate and that the issuance is in accordance with the rules and procedures prescribed by the Commission. An electronic signature created and supported by a foreign certificate under section 38 shall be deemed to have the same effect as that given to an electronic signature supported by a certificate under this Act. The Internet has transformed the way individuals and companies conduct economic activity. Its now possible for individual firms to sell their products on the other side of the world and for individuals to purchase desired products and services from around the world via computer transactions. The economic, legal, and privacy implications of this have come to the attention of government agencies as well as they grapple with the economic, financial, personal, and other implications of these developments. These governments are producing numerous resources on electronic commerce or ecommerce as it is often called. E-commerce law will regulate the procedure of a concluding of online retail contracts and ensure its legal equality with the other forms of transactions. The norms of the law on e-signature shall extend on civil contracts in electronic form, including but not limited to sale and purchase, distribution of the goods, service contract, commission, storage, carriage, transport freight forward etc. The norms of the Law shall not however extend to such contracts, which, in accordance with RA legislation have to be notarized and/or registered. The law should also limit the liability of intermediaries in accordance with the general principles of civil legislation of the countries.
Thus, electronic commerce is one of the most significant law in our country and in the whole world. Like every area of business these days, ecommerce is surrounded by a maze of red tape, rules and regulations. In fact, selling online tends to be worse because of the international dimension. And any slip-ups you make are there for the world to see so it's doubly important to be legal and decent. It should be taken care of on how to blemish such law. Finally, assuming that you are legal and decent, let the world know. Anything that adds to your credibility will help online.


Reference:
http://www.smallbusinesssuccess.biz/articles_week/ecommerce_legislation_taxation.htm

http://synergy.media.am/Downloads/e-commerce-indicators-eng.htm

Read more...

Journey of Innovations

There are several substantial and significant upshots, happenings and events that occur from the early beginnings of man until now that bring forth the innovations of technology. This may include natural disaster, man-made catastrophes, international calamity and tragedy, cataclysm, worldwide warfare and some others. Eventually, innovations and excogitation of technology emanated from the necessity and essential of man.
One important event is the World War II because at this time countries that partake in this war have been developing eminent machineries and devices in order to win. According to Wikipedia.org, a free online encyclopedia, “World War II was a global military conflict which involved a majority of the world's nations, including all of the great powers, organized into two opposing military alliances: the Allies and the Axis.” The war involved the mobilization of over 100 million military personnel, making it the most widespread war in history. In a state of "total war", the major participants placed their complete economic, industrial, and scientific capabilities at the service of the war effort, erasing the distinction between civilian and military resources. Over 70 million people, the majority of them civilians, were killed, making it the deadliest conflict in human history. After the Treaty of Versailles the Western democracies were satiated powers and expected a general peace. Their political environment was one where the aim was disarmament. (In Britain there was the Ten Year Rule.) Consequently they conducted very little military R & D. On the hand Germany and the Soviet Union were dissatisfied powers that for different reasons cooperated with each other on military R & D. The Soviets offered Weimar Germany facilities deep inside the USSR for building and testing arms and for military training, well away from Treaty inspectors' eyes. In return, the Soviets asked for access to German technical developments, and for assistance in creating a Red Army General Staff. The first German officers went to the Soviet state for these purposes in March, 1922. One month later, Junkers began building aircraft at Fili, outside Moscow, in violation of Versailles. The great artillery manufacturer Krupp was soon active in the south of the USSR, near Rostov-on-Don. In 1925, a flying school was established at Vivupal, near Lipetsk, to train the first pilots for the future Luftwaffe. Since 1926, the Reichswehr had been able to use a tank school at Kazan (codenamed Kama) and a chemical weapons facility in Samara Oblast (codenamed Tomka). In turn, the Red Army gained access to these training facilities, as well as military technology and theory from Weimar Germany. In the late 1920s, Germany helped Soviet industry begin to modernize, and to assist in the establishment of tank production facilities at the Leningrad Bolshevik Factory and the Kharkov Locomotive Factory. This cooperation would break down when Hitler rose to power in 1933. The failure of the World Disarmament Conference marked the beginnings of the arms race leading to war. In France the lesson of World War I was translated into the Maginot Line which was supposed to hold a line at the border with Germany. The Maginot Line did achieve its political objective of ensuring that any German invasion had to go through Belgium ensuring that France would have Britain as a military ally. France had more, and much better, tanks than Germany as of the outbreak of their hostilities in 1940. As in World War I, the French generals expected that armour would mostly serve to help infantry break the static trench lines and storm machine gun nests. They thus spread the armour among their infantry divisions, ignoring the new German doctrine of blitzkrieg based on the fast movement using concentrated armour attacks, against which there was no effective defense but mobile anti-tank guns - infantry Antitank rifles not being effective against medium and heavy tanks. Air power was a major concern of Germany and Britain between the wars. Trade in aircraft engines continued, with Britain selling hundreds of its best to German firms - which used them in a first generation of aircraft, and then improved on them much for use in German aircraft. In fact, Mountain Bikes emerged from among a group of passionate bike riders who wanted the challenge of riding on Northern California mountian trails. They built clunkers for one another adapting old bike frames, experimenting with tires & breaks. As these prototypes grew more refined, one of their number saw a commercial opportunity & began to manufacture them. Radical innovators are deeply empathetic; they understand – and feel – the unvoiced needs of customers. They recognize needs that customers don’t even know they have yet. Or they solve some common frustration in a way that people could never have imagined – which is precisely why they are not articulating the need, or asking for a specific product, service, or business to address it. Unfortunately, most companies define themselves by what they do, rather than by what they know or what they own. Usually they find it difficult to see things like skills, processes, technologies, assets and values as distinct, stand-alone entities because they are completely embedded in the company’s current business model. But radical innovators have the ability to decouple particular skills and assets from the existing business, and then leverage them in new ways or new settings to generate growth opportunities. The fact is, radical innovators tend to think of the whole world as a LEGO kit of different competencies and strategic assets, owned by different companies, which can potentially be reconnected like building blocks or used in a new context to invent novel products, processes, services and business models. Actually, some of the biggest opportunities for innovation can come from bundling your company’s competencies and assets with those of other companies to produce radical new solutions. Innovation in generating deep change might come from Pull: the creation of active platforms that call together a newtork around an irresistable desire to create. draw needed resources, learn by acting, & so build know-how & shift expectations. Another excellent way to discover new opportunities for business innovation is by harnessing trends and “discontinuities”. What exactly is a “discontinuity”? It’s not just a single trend, invention, or technology. Rather, it’s a cluster of trends – for example, in technology, demographics, lifestyle, regulation, geopolitics and so forth – that has the power to substantially change the competitive rules, or the structure of an industry. Trends and “discontinuities” are often the launching pad for radical innovation. Orthodoxies tend to become embedded in the way we do business. After a while, they form the dominant logic about the “right” way to compete, price, organize, market, and develop products and services. Orthodoxies are not by definition “bad” or necessarily wrong. In fact, they are often essential for creating a common understanding across a dispersed organization, allowing teams to work smoothly and efficiently. The problem starts when orthodoxies start to stifle rather than foster progress – they are potentially limiting if you can’t see beyond or around them. If left unchallenged, they may blind you to the possibility of new industry rules, new offerings, and new competitive space. Time and again, the strategy innovations that radically change customer expectations or industry structures come from questioning beliefs that everyone else has taken for granted.
Eventually, technological escalation during World War II was more profound than any other period in human history. More new inventions, certainly as measured by such means as patent applications for dual-use technology and weapon contracts issued to private contractors, were deployed to the task of killing humans more effectively, and to a much lesser degree, avoiding being killed. Unlike technological escalation during World War I, it was generally believed that speed and firepower, not defenses or entrenchments, would bring the war to a quicker end. Military operations were also conducted in order to obtain intelligence on the enemy's technology e.g. the Bruneval Raid for German radar and Operation Most III for the German V-2. The introduction of new weapons was so much a feature of the war that German propaganda featured wonder weapons in the pipeline as a reason why Germany would eventually win the war. In that sense, technological advance prolonged the war. Depending on one's frame of reference, one can reasonably assert that World War II began with the Japanese invasion of Manchuria in 1931, or as late as the last declarations of war between the United States and Germany in December 1941. Quite a bit occurred during this time to escalate technological conflict, most notably the upgrading and deployment of aircraft carriers by the U.S. and Japan in the Pacific, and invention of carrier-type aircraft such as the Mitsubishi Zero, largely considered the best plane of its time. Horrifying city battles (Stalingrad, Berlin) and sieges (Leningrad, London) from ground and air.
Time does not mean it changes everything. However, this brought to us to where we now and where we should be in the near future. Innovations and technologies are essential things for us humans and other living.

Read more...

Monday, December 8, 2008

Being an IT Professional

As far as I can remember the past, I never really thought of becoming an IT student. Since in early grade school, I am only thinking of becoming an astronaut (as every child would be dreaming to be). Then, later I realized I want to become someone that can identify a certain stone (that would be a geologist, I suppose) and descried its properties and etc. However, when I enter high school, my mind have become much open and overt where there are broad possibilities of what will I become, so many knowledge and interesting things that are adding in my befuddlement upon my decisive decision. Then, senior year came where the real confusion started. In this stage, I really don’t have any idea what course I will take up. Nursing? Education? Engineering? ….blah blah blah! And then, I made up my final decision (I was wishing it could be final). I will become a chemical engineer. Well, I am really good in chemistry (I just thought I am). But, when I heard my classmates talking about IT, I kind of like to change my decision. Yes, the Information Technology course. Almost quarter of the class decided upon IT, so I just followed the flow of peer pressure. If I will lost my luck with my direction, I have an option. Then, the series of what-so-called unfortunate events happened. It started when I took the USEPAT (University of Southeastern Philippines – Admission Test). The entrance test was quite fine. I got a rating of High Average. The following event – the interview. Hmmm? I am not quite prepared for the interview but fortunately I turned out good in answering the questions. I was very nervous that time because I really am not used in being interviewed. The questions were casual and I answered casually but I was anxious and my hands were trembling. Finally, I ended up enrolling in the BSIT (Bachelor of Science in Information technology) course. At first, the college approach was a bit confusing to me and it seems that I have been having difficulties in adjusting. But as time pass by, I am getting used with it.
Now, I am a 4th year student and getting ready to face the real but cruel world. As of my state of knowledge, it is rather in the most basic stage. Apparently, since I am just starting, I am still learning. I know that after I graduate, the true and surreal beginning of my journey will just start. Am I ready or not? Yes I am. But I still lack of something. Something important that if I will not acquire of such, I will be nothing. I guess it is for me – but just me – to find it out.
If I would become a successful and productive IT professional (daydreaming…!), I am obliged to contribute in technology and for the innovation of it. The contribution should be to meliorate the quality of man’s living. Eventually, I cannot tell that I could really accomplish such obligation. As for now, I really cannot think clearly what I could possibly do. I am not that kind of person that could easily finish a task easily and flawlessly (on the process and in the application). I need to reciprocate fairly in order in massively attest this factual conception onto my very own self as if it had been made as a habit for within the ego of me.
In today’s trend, there have been a large number of innovations on technology. Scientists and technologists are striving their very best in order to contribute and share their knowledge and learning upon each noesis and cognitions. In lots of field, there are innovations, These includes agriculture, motor cars and automobile, computer hardwares (printers, CPUs, monitors), computer accessories, softwares (application and operating system), computer services, gadets and PDAs, medicine and health, bioscience, robotics, aeronautics, defense and security, engineering and innovations, and energy and environment. In recent months, the concept of ‘cloud computing’ was all the buzz. European researchers think about another name, the World Wide Grid, which could run on top of the Internet. In an article to appear soon, ICT Results will report about the g-Eclipse project. As the scientists said, ‘the g-Eclipse project aims to build an integrated workbench framework to access the power of existing Grid infrastructures. The framework will be built on top of the reliable eco-system of the Eclipse community to enable a sustainable development. As I mentioned above, there are plenty of ‘computing clouds’ these days. Once you’re working with one like Amazon, it’s not easy to interoperate with another one such as Google. Even if these ‘clouds’ merely exist in 2006, this was this lack of interoperability which created the need for the g-Eclipsea project. The Firefly mission is the second project under the new U.S. National Science Foundation (NSF) CubeSat program. The goal of this program is to provide a low cost access to space research. Firefly will be launched in 2010 or 2011 and will try to ’solve the mystery of the most powerful natural particle accelerator in Earth’s atmosphere: TGFs, or terrestrial gamma-ray flashes. TGFs are short, powerful bursts of gamma rays emitted into space from Earth’s upper atmosphere. The gamma rays are thought to be emitted by electrons traveling at or near the speed of light when they are slowed down by interaction with atoms in the upper atmosphere. These events may occur much more often than realized and may be associated with a significant fraction of the roughly 60 lightning strokes per second that occur worldwide. They could have a large effect on the upper atmosphere and near-Earth space, scientists say. U.S. researchers have developed an integrated blood barcode chip which can identify what’s in your blood in less than 10 minutes. Instead of going to a lab, having a shot, and waiting for results for a day or two, this new chip will allow physicians to practice sophisticated exams in their offices by using a single drop of your blood. And these tests will be very cheap compared to existing procedures. If this chip becomes widely available, you might one day enter your physician’s office and learn a few minutes after that you have a cancer. Of course, such blood chips are a good thing, but they also are frightening. This blood chip has been developed by Caltech chemistry professor James Heath and his colleagues, and by Leroy Hood, the president and founder of the Institute for Systems Biology in Seattle. Hood is already known for his participation of the invention of the high-speed DNA sequencer that made the Human Genome Project possible. wireless experts estimate that our personal networks will include about a thousand devices in 2017, including dozens of sensors checking our health and our home. This is why European researchers have launched in 2006 a networking project called ‘MAGNET Beyond.’ The name is an acronym for ‘ My personal adaptive Global NET and beyond.’ The article suggests that the researchers have in fact built the Smart Personal Network, which integrates the concepts of Personal Networks (PNs) and Personal Area Networks (PANs). But first, where does this number of a thousand devices in a personal network come from? “In reality, it is hard to know what kind of devices or technology might be around for sure, but one thing is certain… there will be a lot of them. The first satellites were launched about 50 years ago as a way to conquer space. Now, satellites are essential for our civilian and military communications. But they remain large and expensive, some of them costing several hundreds of millions of dollars. This is why researchers from the University of Florida are building small satellites able to work as a team to take multiple and distributed measurements or observations of weather phenomena for example. These small satellites should cost only about $100,000 to produce. The first one should be launched next year by a NASA rocket and should not be larger than a softball. The goal is to mass-produce these satellites to even reduce their costs. The northern lights are beautiful when you see them from the ground. But they can be dangerous for your life if you’re in a plane crossing an area where they are active. This is because your plane can lose radio contact for a long time when flying above the northern polar region. This is why a Norwegian professor of physics is about to launch a rocket to discover the mysteries of the northern lights. The 9-meter long rocket should be launched between November 28 and December 7, 2008. It should reach an altitude of 350 kilometers and its flying time will be only 10 minutes. Let’s hope that the embarked sensors function correctly. Canadian scientists have recreated a famous painting from Vermeer on the microscale by using a new protein patterning technique. In fact, they’ve used a new laser method to draw protein pictures. And to illustrate the precision of their protein patterning technique, the research team reproduced ‘Girl with a Pearl Earring,’ a masterwork of Dutch painter Johannes Vermeer. The technology landscape may be going through a period of change at a pace not ever witnessed. The Internet’s expansion helped drive what we have called “a boom ! bust ! boom-let period for new-company creation and a boom-let ! bust ! boom period for wealth creation.” That said, the underlying trend of technology investment has remained relatively constant. The unrelenting stream of private investment may be one indisputable data point - not only has venture capital remained healthy throughout the past ten years, in the midst of the bubble bursting, technology actually increased as a total percentage of all venture capital investments and has remained above levels seen during the ncreased attention in the late 90’s. But the real goal of this work is to replicate the brain’s complex cellular environment. The research team said their new laser method is ‘a major discovery, since the new laser technology can encourage and guide the growth of finicky nerve cells.’ According to New Scientist, engineers at Carnegie Mellon University have modified an unmanned commercial civilian helicopter to fly fast and low while avoiding obstacles such as buildings, trees or power lines. The unmanned aerial vehicle from Yamaha has been adapted to integrate a sensing system able to see obstacles — and to avoid them. The article said that ‘the helicopter’s eye is a custom-built 3D laser scanner, which sweeps an oval path ahead of the 3.5-metre long craft. The scanner can detect objects as hard to see as power lines from 150 metres away.’ Imagine a nuclear reactor small enough to be carried by truck and buried in a garden… According to The Guardian, a U.S. company based in New Mexico, Hyperion Power Generation, has designed mini nuclear plants to power 20,000 homes. The company has already received firm orders and expects to deliver about 4,000 ‘individual’ plants between 2013 and 2023. It also said that it has a six-year waiting list. So if you want such a micro nuclear reactor, don’t expect to receive it by 2014. There are multiple other data points that suggest we are in the midst of a groundswell of technology innovation and growth. It is our intent to use these specific trends to identify some of the potential winners most impacted by these emerging trends.
My goal is to contribute but not to exploit. I will rather lose myself than exploiting each of these innovations. I merely cannot call myself worthy as an IT professional and should be suitable for it. It could be worse if my contribution turns out on endangering others. It is unforgivable. IT professional’s contribution should be for the better living of man’s course of life and not to hinder it.
But however, even though I can really achieved such goals and objectives, I am still fresh and preparing myself to face the true challenge in life. Still, it is an obligation as future IT professional, to contribute and introduce learning and knowledge for the betterment of tomorrow.

Read more...

Friday, November 28, 2008

Future Technology presentations

Book Technology

History of books, present state and the future book technology proposal.

Emerging Technology Trends


current and uprising technology trends under certain categories.

Read more...

Why use technology?

Technology is an important thing for us human beings. It is essential for the development of mankind. In apparent for our progression, technology have played a vital role for society growth. Technology is seen and being enjoyed in each part of our everyday life. When we are using the net, listening to mp3 and ipods or using 3g mobile phones, it feels very normal for us because we are in a situation wherein the blessings of technology astonishing. It is even used for saving our lives.

The main point that influence us is the need for development.

Factors for technology change

- "Change is the most constant thing in the world"
- Increased scientific research


Quote:
Science has been the pillar of technology and therefore it is considered to be the most looked upon subject in the modern world due to its technological success.

from http://www.hudtech.net

Read more...

Wednesday, November 26, 2008

Hologram Book

There are a large number of upcoming future technology. Scientist and even normal human beings do predict the future devices and machines that will enhance the man's way of living. However, as for me (for I am a student), it is a requirement to predict such future technology (jejeje).

The proposal is HOLOGRAM BOOK. It is a digital book with a holographic features in it. It means that it can produce a hologram wherein events happening in the book will appear (of course as a hologram). I have not found any futuristic pictures for it. So, if you find some, please refer it to me.

Read more...

Saturday, November 22, 2008

the last beginning..

Well, second semester is now starting.. I know this kinda late post. So, I apologize for being such a lazy student blogger. November 2008 until April 2009 will be the last remaining months of my stay in the university (hopefully... huhu). Im quite excited for the moment I will graduate. But for now, I need to finish this semester. I know this sem will be tough.

I know, mentally and spiritually, I am not yet ready to be a professional. But I will try my best to become one!

Read more...

Friday, September 26, 2008

Nutbok 4 "WHHAAAATTT??"

It's all that the young can do for the old, to shock them and keep them up to date
by George Bernard Shaw



However, the old ones have been making young people shocked and petrified!
PEACE!!!

As for this time, I am not that really sure with my draft. I am planning to consult it first with a grammarian before it will proceed to RSG. From the Ms. Abadilla's confession (after consulting with RSG), she said that it took them almost one hour of consultation cause they really checked it verbatim. She said that there should be diagrams in review of related literature and other things. My face was like a startling doll and just exclaimed "WHAT!"

However, I am still hopeful (I might daresay) that I can go through with it successfully... I Hope so..

Read more...

Wednesday, September 24, 2008

Nutbok 3: "Might as well finished this off"

After days of hard and deep researching of data concerning my research proposal topic, I can now gladly say that I am FINISH WITH MY DRAFT!!! YYYAAAAHHOOOO!!! Google na to! heheheh joke!

I know that resources on the net are unlimited. However, related studies of my topic that are present on the web has only provided abstracts. Thus, I have gathered a few number of resource. But I think that is enough to finish my drafted proposal.

Karon lng jud ku nahuman ay sa expecte output. That's why I am so happy right now. I know this is just the beginning of my PAHLULUKSA. But I will strive hard to attend that passing grade!!!


Research Proposal

*just click the hyperlink "research proposal" to download the drafted research proposal file.

Read more...

Nutbok 2 "The End is Near"

Yes..Truly yes... "The end is near"

hehehe

Well, actually, I am done with my initial draft! Expected outputs and budget na lng ang kulang. I will post the download link of my drafts tommorrow. Kasi nga gagawin ku pa ang kulang. But as I have said "the end is near". Hehehe I just have a hard time doing with methodology but fortunately I have done it.

So see you this friday.

Read more...

Wednesday, September 17, 2008

Nutbok 1 "the front and the middle"

Since my approval of my research topic (Molecular Algorithm in Data Integration), I started gathering resources on the net that are related with my topic. Fortunately (in a very ironic way to say), I have limited information because my research has a specific and particular area to focus upon. Eventually, the resources contain only abstracts or its just whitepapers. So, it’s not easy to formulate statements.

So, I just make my gannt chart which has been approved immediately. I eventually consult my Introduction, Significance of the Study, Objectives. Our instructor (RSG) have minute corrections and clarifications, so I revised my draft. When I consulted again, I waited for almost ONE WEEK!!! Hehehe So, I waited and waited.. 2010… 2045.. 2999.. 4500.. I cannot wait anymore… aaaaahhhhhh…. *Just Kiddin* Fish tayo sir…!!!

As for now, I am finished with my review of literature and I will consult it to our instructor. But I think I have additional statements in my review of literature. Actually, I have difficulty with my review of literature because of limited resources. Hayst! I hope it will have no corrections so that I could proceed with my methodology.
AJA!

Click here to view my introduction
Click here to view my review of literature
click

Read more...

Thursday, September 11, 2008

20 problems of IT

Well, I read this pdf article concerning with the problems of information technology. However, it is published in the year 2001. Some of the problems are solved but some of it remains an issue that need to focus with.

The article is entitled "Twenty Problems of Information Technology" which is written by K. K. Nambiar.

Hope you will read it and identify those problem that are still present as of today!

Click here, to read the article.

Read more...

Saturday, August 30, 2008

Research Topics Derived from SONA 2008

Social Networking Site for Filipino Talents

This is where filipinos can share and show their talents. Since it is a social networking site, many businessmen, producers and "big" people can discover filipino talents.

1. to visualize filipino talents.
2. to spread the specialization of each talents.
3. to make a concession upon filipino gifts.
4. to be able to spread talents not only locally but worldwide.
5. to rate filipino talents according to their specialties.

Automated Rice Production
Few of Rice production is still done manually. So this proposal helps producing rice through a touch of technology.

1. Easy production
2. Fast completion of the production.
3. Minimize the usage of water.
4. Depreciate human cost.
5. Reach highest farm expedient.

Garbage to Money

this research shows most effective ways for making money out of garbage.

1. Part time profit.
2. Advantages and disadvantages of recycle.
3. importance of non-biodegradable garbage
4. importance of biodegradable garbage.
5. Awareness of making money out of garbage.

Read more...

Wednesday, August 13, 2008

A review with the Reflection of MS Abadilla

Well, as I scouted the reflections of my classmate, there are really good writings and there are the not-so-good ones. However, I found a reflection from Ms Regina Abadilla on "Studying and Treating Schizophrenia Using Virtual Reality: A New Paradigm".

As I read her reflection, I came to realize that she has a hidden talent in writing (despite his mumblings that she is a bad writer etcetera etcetera). She pointed out that Virtual Reality (VR) is not only for fun in games but also as a tool for curing a certain disease or illness. And she stated it satisfiably. I observed with Ms Abadillas written works that it has a really informative contents. She has a future, I might dare say.

I agree with her statements. It is true that VR has been a great help in the area of Health and Medicine. Nowadays, several hospital all over the world are now using Virtual Reality on treating their patients and it has a productive results.

Read more...

Monday, August 4, 2008

Research topic 2: Molecular Algorithm in Data Integration

I have read many articles about data integration. I observed that they retrieved data from different sources that they consider it as separate files. In my topic, i will suggest that molecular algorithm will be applied to it. The two or more data will become a single data.

"two become one"

This is just an integration for two separate data. I have not yet started my investigation on how particular it will be that this two data will become one. So, please bare with me.

Bale ani na xa! kuntahay gusto ka muretrieve ug information tapos katong information kay kailangan duha ka data ang idownload pero the same nature lang. ang akung proposal dapat pagreturn sa imung query kay isa na xa kadata using sa algorithm sa creation of a molecule. Diba magcombine man ug atoms paramahimun molecule mao iapply naku siya sa data integration. gets?

This is merging of two disparate data from different remote sources and creation of molecule will be applied as algorithm.


Molecular Algorithm


Read more...

Tuesday, July 29, 2008

My Research Topic

Online Barangay Inquiry for Brgy 7-A, Davao City

This research topic will solve the following problem:

1. Often unaccesible inquiry for barangay concerns.
2. Slow retrieval of answers to the inquiry.
3. Insular location of the barangay office.
4. Cluttered mass of people for inquiry in barangay office.

Read more...

Sunday, July 27, 2008

Factors in Publishing Top-Tier Journals

Well, let us first define what is "top-tier journal".

According to what I have read within this article (click here)

"Top-tier journals are those that are considered as top quality research papers. These are journals that every researcher wish and aspire to publish in."

Eventually, publishing such credible work as a "top-tier journal" is a really hard thing to accomplished. As for me the key factors in publishing such journals are the following.

1. Environmental Factor
Journals makers supposed to be conscious of the effect upon their journals towards the environment.
2. Impact Factor
Impact to the readers is a very critical factor for researchers or journal makers.
3. Efficiency and Effectivity
Journals should be efficient with its objectives and effective upon its benefits.
4. Importance to the Public
The public will be most likely to be affected with journals and it should be more significant to them.


*These are based on my observation.

Read more...

Monday, July 21, 2008

Evaluating a Research work

Evaluating a research paper is not an easy thing to accomplished. It needs patience and perseverance. It also needs appropriate knowledge upon the research works.

According to http://www.chssc.salford.ac.uk/healthSci/rem99/resmeth/evaluati.htm

"The critical review should be approached in a systematic manner, and it is useful to let the research methodology process, and the report itself, guide the approach."

One must first look within the title and determine the variables upon it. Then look for authors if it is well-known for the respective field. Next, read the abstract if it consist a clear idea upon what the research is all about. After that, read the introduction if it has important concepts of the research paper. Lastly, read the methods if it thoroughly explains significantly the procedures of the research work.

Upon finishing this, you can rate or gave your evaluation to the author or for the benefit of other readers.

Read more...

Saturday, July 19, 2008

Research Assumption and Review of Literature


I shared my understanding with my topic aforementioned.

Assumptions

“An assumption is a realistic expectation. It is something that we believe to be true ”

According to IS 540: Research Methods
(http://web.utk.edu/%7Ewrobinso/540.html)

Review of Literature
"This involves the systematic identification, location and analysis of documents containing information related to the research problem"

http://www.slideshare.net/japorto/research-methods-517946



Upload my shared presentation here.

Read more...

Thursday, July 17, 2008

Students that are mandated to provide snacks for tommorrow

Attention: To all CS Research Students

The following names are mandated to provide snacks for the Saturday session in our CS Research. (Be sure to include drinks).


1. Tabanayag, Davemar
2. Matildo, Angelo
3. Damondamon, Jade
4. Daliba, Richard Mark
5. Galinato, Agnes
6. Galgao, Clenemae
7. Orquillas, Celeste
8. Itucas, Francis Anthony
9. Aurelio, Raymond
10. Majarocon, Teodorico
11. Morata, Ronald
12. Halilio, Julaysa
13. Masecampo, Jazzle Khay
14. Lee, Robert Marvin
15. Tangian, Thomas
16. Alcordo, Anthony
17. Castillo, Nate Jordan
18. Macaraeg



See you this Saturday July 19, 2008 1:00 pm. Thanks in advance for the snack. Tsk Tsk. Tsk.

Read more...

Importance of research topic for future career

A research topic is the first thing to identify for making a full blown research. Identifying research topic is not easy to accomplish. As for me, I think I should focus on what I have learned. In other words, the research topic should be in line of your field of study. However, my field of study is broad. So, I decided to identify a research topic to where my passion of study is really centered upon my field of science.

This will be our prime basis as for our future career. For instance, a topic about Visual Foxpro Skins manipulation. We will eventually acquire subdue knowledge during the course of study. Thus when you become a professional someday, you are confident enough when you encounter VFP skins problem. Employers employ will you because of your specialization.

Read more...

Attendance July 16, 2008 CS Research

1. Abellana, Ma. Theresa
2. Gador, Riza Eve G.
3. Lañada, Sheena Joy L.
4. Andrin, Rendell
5. Lee, John Wilson Lee
6. Raganas, April Rose B.
7. Cane, Chris Jan
8. Ibasco, Eric B.
9. Lovitos, Harley E.
10. Abadilla, Regina
11. Bustamante, Glayra
12. Niones, Julie Ann
13. Buladaco, Mark Van
14. Gorgonio, Giesi Mae
15. Catamora, Anthony
16. Gonzales, Lorena
17. Adlaon, Kristine Mae
18. Galua, Norma
19. Tello, Kenneth Roldan
20. Ang, Arianne Joy
21. Abrenica, Charmaine Joy
22. Majarocon, Teodorico Jr.
23. Halilio, Julaysa
24. Masecampo, Jazzle Khay
25. Lee, Robert Marvin
26. Tangian, Thomas
27. Alcordo, Ashbury Franklin
28. Castillo, Nate Jordan
29. Galinato, Agnes
30. Damondamon, Mary Jade
31. Galgao, Clenemae
32. Daliba, Richard Mark
33. Orquillaa, Celeste
34. Matildo, Angelo
Those who are not on the list but enrolled in CS Research are mandated to donate snacks for everybody in our upcoming saturday session.

Read more...

Attendance July 14, 2008 CS Research

1. Abellana, Ma. Theresa
2. Gador, Riza Eve G.
3. Lañada, Sheena Joy L.
4. Tabanayag, Davemar
5. Andrin, Rendell
6. Lee, John Wilson Lee
7. Raganas, April Rose B.
8. Cane, Chris Jan
9. Ibasco, Eric B.
10. Lovitos, Harley E.
11. Abadilla, Regina
12. Bustamante, Glayra
13. Niones, Julie Ann
14. Buladaco, Mark Van
15. Gorgonio, Giesi Mae
16. Catamora, Anthony
17. Gonzales, Lorena
18. Adlaon, Kristine Mae
19. Galua, Norma
20. Tello, Kenneth Roldan
21. Itucas, Francis Anthony
22. Ang, Arianne Joy
23. Abrenica, Charmaine Joy
24. Majarocon, Teodorico Jr.
25. Morata, Ronald
26. Halilio, Julaysa
27. Masecampo, Jazzle Khay
28. Lee, Robert Marvin
29. Tangian, Thomas
30. Alcordo, Ashbury Franklin
31. Castillo, Nate Jordan

Those who are not on the list but enrolled in CS Research are mandated to donate snacks for everybody in our upcoming saturday session.

Read more...

Friday, July 11, 2008

As an IT student of USEP, i should adress my research topic to..



Being an IT student is not an easy thing especially in USEP where filtering of students is implemented. And choosing a research topic is also not an easy thing where there problems cannot be easily identified. There are a wide range of research topics for our science. We are in the field of information technology and the problems for our research should focus on the international development and concern. We should address our research topic to those who are in need of our skills and knowledge. For instance, systems of government agencies are not usually automated or computer-based. We can help them on applying our knowledge upon their systems. We can also address our topics to the IT society wherein we can collaborate to people that are also into our field.

Read more...

Tuesday, July 8, 2008

Attendance July 9, 2008 CS Research

1. Abellana, Ma. Theresa
2. Gador, Riza Eve G.
3. Lañada, Sheena Joy L.
4. Tabanayag, Davemar
5. Andrin, Rendell
6. Lee, John Wilson Lee
7. Matildo, Angelo F.
8. Raganas, April Rose B.
9. Cane, Chris Jan
10. Damondamon, Mary Jade
11. Ibasco, Eric B.
12. Lovitos, Harley E.
13. Daliba, Richard Mark
14. Galinato, Agnes
15. Abadilla, Regina
16. Bustamante, Glayra
17. Niones, Julie Ann
18. Buladaco, Mark Van
19. Gorgonio, Giesi Mae
20. Catamora, Anthony
21. Galgao, Clenemae (sharer)
22. Gonzales, Lorena
23. Adlaon, Kristine Mae
24. Galua, Norma
25. Orquillas, Celeste
26. Tello, Kenneth Roldan
27. Itucas, Francis Anthony
28. Aurelio, Raymund
29. Ang, Arianne Joy
30. Abrenica, Charmaine Joy (sharer)

Those who are not on the list but enrolled in CS Research are mandated to donate snacks for everybody in our upcoming saturday session.

Read more...

Friday, June 27, 2008

The State of Computer Science Research

I examined an article about data encryption which deals muchly with vulnerability of computer model on level of encryption written by Stefanie Hoffman on February 21, 2008 (The article is located here: [b][url=http://www.ict-economic-impact.com/CMP_Software_FDE_Broken.pdf]
http://www.ict-economic-impact.com/CMP_Software_FDE_Broken.pdf[/url][/b]). It focuses on how common the disk encryption standard on some software encryptions. The article stated that "..users can gain access to supposedly protected information by getting a hold of a computer while it is in sleep mode or waiting for a password prompt. An attacker could access contents of a computer's RAM by simply booting a laptop over a network or from a USB drive, and then scanning for encryption keys. The research continues to delineate how hackers could scan encryption keys...". I am not heavily inclined with data encryption but as i understand with the article, some data encryption techniques doesn't really work hardly by some hackers. It is such a piece of cake for them.

Upon reading this, I revibrated each paragraph and realized that Computer science research is really important in our improvement for the better future. We are in the generation of technology evolution. Soon we will be in the age of machines and robotics. The state of CS research is now highly significant on a nation's integration and advancement and also for international progressive metamorphosis for abrupt

[b]Variety of Technical Topics[/b]
1. Data Encryption
2. Software Encryption
3. Security (Software and Hardware)

References:
[1] http://www.crn.com/security/206801225

Read more...

Thursday, June 26, 2008

A Reaction with "IT DOESN’T MATTER (NICHOLAS CARR, 2003)"

Ted Hoff, a senile Intel engineer, have discovered a way to put the circuits necessary for computer processing onto a tiny piece of silicon during 1968 which now commonly called as processor. Because of his invention, there are now millions of popping technologies including the controversial proprietary and infrastructural technologies. Proprietary technologies can only be owned in a single company for their sole successful operations. On the other hand, infrastructural technologies offer far more value because it is been shared in the industry.
IT has all the hallmarks of an infrastructural technology even though there are more complex and malleable than its predecessors. As a matter of fact, its mix of characteristics guarantees particularly rapid commoditization including the arrival of the Internet which has provided a perfect delivery for generic applications. Gordon Moore has predicted that the density of circuits on a computer chip would double every two years and also the coming of the free fall in the price of computer functionality.
A significant lesson can be learned in early infrastructural technologies: If there will be a build up of competition to resource that is inconsequential to strategy, the risks it creates become more important than the advantages it provides. As the years passed, IT management has become more satirical than ever. The prime provocation will be to preserve that inculcation when the business cycle strengthens and the ensemble of publicity about IT’s strategic worth ascends afresh.
The material is created in such a way that the readers or audience can understand the prime gist and develop eccentric thoughts for the ideas from it. The thesis sentence itself is strong which give the purpose of the material’s topic and it also addressed the process that will be discussed. The ideas are appropriate for the audience’s needs and detailed enough for the readers to follow. The best part of the material is when the author differentiates proprietary technology between infrastructural technologies and also he cited that the latter technology is having far more greater value. The least great part of the material is about how vendors problem become a risk in the industry.
The author is brilliant and he is very good in organizing ideas for this material. Actually, he has build up the audience paragraph by paragraph on its climatic finish. In fact, I, myself, understand the general and main idea of the material. Generally, this material is a good to read and very informative to eager readers.The material is not fictional rather it transcends the realities in the IT world and on all human being. Information Technology has become trend in the marketing and business world. Because of this, there are competitions in technologies and they become very greedy in terms of IT marketing. As humans, we should be generous and productive. This will help the industry progress and relentlessly fruitful.
This material has a very informative way of displaying ideas and gist. For my personal reaction, I really like the material and it is not boring and I felt enjoyable during my reading. The ideas are organized well and perfectly by the author. I easily understand it and define each of it with much thought.
There are parts of the material that I find interesting and surprising. One of it is when Gordon Moore predicted that the density of circuits on a computer chip would double every two years and that the price of computer functionality will come to fall. This is very observable nowadays and this occur because of the fast pace of technology in the industry.
I dislike the fact that there is a great risk in IT management because of the market competition. This will be a factor on declining in IT organizations. There should be an immediate solution with this from the government agencies.
Over all, the material’s totality is really great and very informative for readers.
There are a few parts in the material that relates in my own daily life experiences. One is the competition in IT industry. This is very common nowadays. It can be seen on simple things like cellphone marketing, computer sales and etc. Another one is in the difference of proprietary technologies and infrastructural technologies. In either small or large companies, there are difference in technologies and might create a risk in appropriate IT management.

Read more...

Tuesday, June 17, 2008

A Commentary Reflection on "Information Technology and Administrative Reform: Will The Time After E-Government Be Different?"

Research File: www.crito.uci.edu/publications/pdf/egovernment.pdf

Reflection:

Government is the prime system in our community or nation. This is the that operates every function for the development of the country. In Wikipedia.org, A government is "the organization, that is the governing authority of a political unit,""the ruling power in a political society,"and the apparatus through which a governing body functions and exercises authority."

Inside the government offices, there are a lot of paper work and paper works which can be a small problem for the officials. Thus, as technology is booming the several government agencies shifted to automated systems which are easy to manipulate and to organize with. This can be a great help for the officials because it can make their works more easy and satisfiable.

In Kraemer and King's research paper, they stated "Much of the literature on information technology as instruments of administrative reform claims that IT has the potential for dramatically changing organizations." It is obviously true with our government today. Much you can see that IT have made a difference and change as its arrival a few years ago.

Reference:
[1] KENNETH L. KRAEMER, Center for Research on Information Technology and Organizations (CRITO), Graduate School of Management and School of Information and Computer Science, University of California, Irvine, kkraemer@uci.edu and JOHN LESLIE KING, School of Information, University of Michigan, Ann ArborAugust 2003, jlking@umich.edu, http://www.crito.uci.edu/
[2] http://wikepedia.org

Read more...

A Commentary Reflection on "Economic Incentive in Software Design" by Hal R. Varian

Research File: http://www.sims.berkeley.edu/~hal/Papers/Software.pdf


Reflection:

Software is an essential part of a computer system. According to Wikipedia.org, "Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system."

Varian stated that "The market for computer software is large and rapidly growing." Yes, this is really true nowadays. Thousands and thousands of new software are popping like mushrooms all over the world wide web. In Varian's study, he investigated a significant part of the software design economics.

Truly, software design is a conscious essential for software designers. It must touch key ares (as cited by Varian): User cost (how the software can be of ease with the use), market structure (how the software is concentrated and dense within the market), basic idea (simplicity and briefness), design of a word processor, monopoly provisions of quality, model, software that is too easy to learn and policy implications.

Reference:
[1] Hal R. Varian, University of Michigan, March 1990, Current Version: June 15, 1993, http://people.ischool.berkeley.edu/~hal/people/hal/papers.html
[2] http://wikepedia.org

Read more...

A Commentary Reflection on "Economics of Information Technology" by Hal R. Varian

Research Link: http://people.ischool.berkeley.edu/~hal/Papers/mattioli/mattioli.html

Reflection:

The rise of Information Technology have been successful in the world's economy during the 1990's up until now. Technologies are rapidly booming throughout the world including the Internet, digital gadgets and the likes. These have been a very important part of an international development and progress.

Upon the study of Varian, he significantly gave importance on network and systems effect, personalization of products and prices, and economics of scale. Moreover, as in general terms, his research is about how IT have gave effect to modern economy. With his research paper, the value of IT in our international industry have been increasing continuously after each and every year since the boom of the world wide web or the Internet. Finally, he concluded that technologies vary in different aspects of the world's economy but nevertheless and undeniably that IT is our key factor for the worldwide progression in terms of the balance of Technology and Economics.

For his research, I highly agree upon his significant citing and studies about ITs stand in the economy. As of today (year 2008), IT is the major proponent of each industry throughout the globe. IT can be seen in department stores (POS system and automated machineries), groceries, government agencies, business firms and even in bakeries. IT is everywhere. It will bring us to infinite evolution.

Reference:Hal R. Varian, "Economics of Information Technology", University of California, Berkeley, July 2001, Revised: March 23, 20003, http://people.ischoool.berkeley.edu/~hal/people/hal/papers.html

Read more...

School Stuffs Blog

Well here i am again.

This is my new blog. This blog is especially for school related stuffs and posts especially in our CS Research.

Read more...

About

My photo
Hi! Mabuhay everyone! I am Mark Van M. Buladaco! I am from Davao City! Hope you enjoy my blog!

Contact me

476 alley Malvar St., Davao City, Philippines
celticguardiandancingelf@yahoo.com

Blog Archive

Web Marketingdrive recovery software