Thursday, October 15, 2009

Information Environment

Assignment 9

Identify an information environment of your choice and write an essay to address the following questions:

• What should be your role within this environment?
• How can the principles of information organization and representation help you in performing this role?
• What are the challenges facing you in performing the role? How will you address these challenges?

To begin with, let me first define the word information. Information can be defined as facts, data or knowledge that has been acquired through study or communication. It can be sent or received by using any type of communication media. Through information, we have the knowledge about recent happenings in our surroundings, the latest market trends and the like and now that we are in the age of information technology, the most common source of information is the internet. Internet is an information technology infrastructure that is designed to interconnect hundreds of thousands of computers world wide. It is capable of sending and retrieving information from the different parts of the world in a matter of less than a minute depending on the speed of your internet connection and of your computer.

In the world of information technology, we have what we call Information Systems. Information system is the combination of the components of information technology which as we all know is the hardware and the software; and of the people or end users. According to what was written in the site www.elsevier.com, in the Information systems are the software and hardware systems that support data-intensive applications. Information Systems publishes articles concerning the design and implementation of languages, data models, algorithms, software and hardware for information systems.

Information environment refers to a group of people or an organization in the corporate world. It can also refer to the Management Information System or Information System department of a company. According to www.answers.com, information environment refers to the aggregate of individuals, organizations, or systems that collect, process, or disseminate information; also included is the information itself.

The information environment I chose is the Management Information System. This is where all the necessary and confidential information about the company is being secured or being managed. According to www.wikipedia.com, a management information system (MIS) is a subset of the overall internal controls of a business covering the application of people, documents, technologies, and procedures by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization.

The challenges that the information environment I have chosen which is the Management Information System or the MIS department are keeping the company’s confidential information or data secured from any data thieves, moreover, protecting it from the damaging effects of unwanted computer programs like viruses, spywares, malwares and Trojans. Included in the protection of the company’s information is the maintenance of data or backing up of the databases of the company. It has been also a challenge for the Management Information System department or the Information Technology Department of a company to keep their databases up to date as always as possible. Another challenge is finding competent and dedicated Management Information System Staff or Information Technology professionals. Another challenge is deciding whether the company will opt for insourcing or the outsourcing of the business practices from the company. Another challenge is the creation of user – friendly applications needed by the company for their end users, having their end – users kept updated or taught about the system or application/s that they have created.

To address these challenges, it would be best if the company will support their Information environment by any means and at all times. The Management Information System department in return should be able to keep their staff dedicated in their work,

As an Information Technology student, I may become a part of the said information environment in the future. Align to this, I may be become one of their staff or even manage somehow the said environment because as an IT student it is the part of the field we are align with. To manage information system is part of the cycle and even so, to continue to grow, discover and find solution to the problems regarding information management system. To be part of a management information system department is a immense role to be consider.


Moreover, within this kind of information environment, the role that I preferred to be is being a MIS Supervisor. Since I am already belong on the field of IT industry because I am already an IT student right now and becoming an IT professional someday, I want to use this profession or my profession with this role though I know that MIS Supervisor is not an easy role. In fact, this is an exciting and a challenging role of a company which is the reason why I chose it. The MIS Supervisor will be responsible for day to day support of infrastructure computer equipment within the field locations. This position will provide guidance and support in installing and configuring software as well as administration of daily, weekly and monthly IT checklist. This position will involve the troubleshooting of infrastructure related problems including but not limited to, connectivity, operating systems, third party and in-house applications. This position will have supervisor responsibility over other Network Techs within their facility of operations, will drive the planning, reporting and analysis process through all areas of local operations.

The other duties and responsibilities of MIS Supervisor:

• Manage and coach the local IT support team.
• Coordination and Implementation of multiple IT projects.
• Supervise other IT staff in regards to project delegation, vacation coordination, scheduling.
• Troubleshooting of system problems to minimize down time.
• Installation and configuration of desktop computers.
• Installation and configuration of hardware accessories.
• Installation, maintenance and troubleshooting telecommunications.
• Preparation of project status reports for team manager.
• Take appropriate actions in case of IT equipment failure.
• Maintenance of Server Backups and tape management.
• Execution of daily, weekly and Monthly IT procedure checklist.
• All other duties assigned

Qualifications for this exciting position are:

• Associate or equivalent technical training required
• 10 + years working experience in the above requirements
• Strong working knowledge of Intel base computers and Servers.
• Strong working knowledge of Microsoft XP and Server 2003 operating systems.
• Strong working knowledge of Microsoft Active Directory.
• Must possess demonstrated sound judgement and decision making skills
• Must have demonstrated attention to detail
• Must possess outstanding organizational skills
• Willing to work flexible hours and shifts including weekends and 24X7 on call.
• Excellent Interpersonal Skills
• Ability to work in Cross Functional teams to accomplish business driven projects.
• Excellent communication skills verbal and written.
• Ability to lead by example.
• Consistently sets an example as a high performing team member.
• Has a positive and constructive approach when dealing with others and when faced with difficult taks.
• Uses influence and organizational dynamics effectively for positive results.
• Resolves more complex issues/problems while weighing risks and considering alternatives.
• Consistently demonstrates forward thinking when presenting ideas/solutions.
• Communicates effectively in highly visible situations.
• Sought out by peers for technical/operational information.
• Confronts problems quickly and escalates issues as appropriate.
• Takes the initiative to generate ideas/solutions.


These duties and responsibilities, experience requirements and qualifications are also can be as the challenges of being a MIS Supervisor because and it will measure the proportion of your effectiveness in this role and as how much and deep is your ability, skills, and knowledge on this field.

afro afro afro


Reference:

www.answers.com

www.wikipedia.com

http://www.elsevier.com/wps/find/journaldescription.cws_home/236/description#description

http://www.medcohealth.apply2jobs.com/index.cfm?fuseaction=mExternal.showJob&RID=8876&CurrentPage=8

http://jobfunctions.bnet.com/abstract.aspx?docid=322715&tag=content;col1
Assignment 8
Outsource or In-source

Neutral Neutral Neutral Neutral

Most organization nowadays already engaged in automation. Technology plays a great role in the success of a business and to be competitive in the market. Adopting the way of technology, gadgets and hardware are necessary as well as its software and people ware. One of the wide issues covered by technology is outsourcing and in-sourcing. Every business, university or organization has to determine whether they should perform a service themselves in-source or outsource. However, it is not essential or required to limit the option by choosing only side of the coin because in business things are viewed in different directions to see the right angle to make the decision more accurate based on the current situation of the company.

Outsourcing refers to the subcontracting practice of taking company business functions and contracting them out to a third party. While, in-sourcing, is the opposite of outsourcing; it means “contracting in”. In in-sourcing, an entity or company personnel who can be said to be an expert in the field to be tested is the one who will deliver/create and manage what the university needs in regards to information system.

In taking the sides on where to stand between outsource or in-source depends on the situation of the school if what would be the best option for them. There are cases that outsourcing is a good thing to do. However, in-sourcing could also be a better choice if the school holds a number of skilled individual who can do programs better than what they can get outside. In any stand there are factors of advantage and disadvantage effects to the school. These factors are essential to know and identify well to come to the right decision in concern to the current situation and resources of the company.

Resources would be the biggest factor that can effect the decision whether to choose outsourcing or in-housing of information system. The company or the school would see to it that they have sufficient funds for their forwarded action. The decision is a case-to-case basis. As a decision maker, I must have the list of all the information, advantages and disadvantages between the two proceedings.

Here are some of the advantages and disadvantages of outsourcing and in-housing of Information System.

In outsourcing, some of the advantages are:
- through outsourcing it can be used to bring in new ideas and to train internal staff,
- it ca also increased productivity and it is more service guaranteed.
- lower personnel costs
- Can focus on your core competencies
- Don't have to worry as much about keeping current in outsourced activities
- Frees up space that can be put to alternative uses
- Increases speed of delivery for outsourced activities
- Increases quality of delivery for outsourced activities
- Frees up management time
- Can reduce cash outflow
- Focus On Core Activities - In rapid growth periods, the back-office operations of a company will expand also. This expansion may start to consume resources (human and financial) at the expense of the core activities that have made your company successful. Outsourcing those activities will allow refocusing on those business activities that are important without sacrificing quality or service in the back-office.
- Cost And Efficiency Savings - Back-office functions that are complicated in nature, but the size of your company is preventing you from performing it at a consistent and reasonable cost, is another advantage of outsourcing.
- Reduced Overhead - Overhead costs of performing a particular back-office function are extremely high. Consider outsourcing those functions which can be moved easily.
- Operational Control - Operations whose costs are running out of control must be considered for outsourcing. Departments that may have evolved over time into uncontrolled and poorly managed areas are prime motivators for outsourcing. In addition, an outsourcing company can bring better management skills to your company than what would otherwise be available.
- Staffing Flexibility - Outsourcing will allow operations that have seasonal or cyclical demands to bring in additional resources when you need them and release them when you’re done.
- Continuity & Risk Management - Periods of high employee turnover will add uncertainty and inconsistency to the operations. Outsourcing will provided a level of continuity to the company while reducing the risk that a substandard level of operation would bring to the company.
- Develop Internal Staff - A large project needs to be undertaken that requires skills that your staff does not possess. On-site outsourcing of the project will bring people with the skills you need into your company. Your people can work alongside of them to acquire the new skill set.


Disadvantages are:
- more expensive,
- risk in data security


While in in-sourcing some of the advantages are:
- less expensive,
- more likely to be data secured,
- easy to access the manpower,
- offers easy access to maintenance,
- IT support if any complications occurred.
In my own opinion, taking a stand on whether to outsource or in-source the IS functions of the schools would first require a thorough study on the matter. Define the pros and cons of the two situations and weigh the two against each other. The one that has more benefits should be the action that would be taken.

To take it seriously, choosing between the two without knowing the parameters and the situations to be considered in decision making is critical. In relation to the school, outsourcing maybe good and fair. Outsourcing is mostly made to organizations that do not have the resources in making the information system. All that is needed to do is to find the people who are capable and competent enough to do the job. Tap these people to do the work and let them do there task inside the school. Present to them the functions that the school wants to be the process of the system. After that, a little assessment to the system then waits until the system is fully made. In addition, the maintenance after the making of the system is also taken cared of by the provider. The school won’t problem anymore the installation and maintenance after. But, the greatest negative factor to it is the school need to allot money for hiring the people that is enough and sufficient to support the project all the way. In which, monetary is the problem in the school.

However, in-sourcing may offer advantages to the school. Since, we have the resources of people that are capable and competent to make the system it would lessen the budget in making the system. Aside from that the data are more secured compare if the maker of the system is from outside of the school. Since, in-source the maker of the system is more reliable to the confidential data of the school. On the other side, the makers of the system will mostly the faculty member of the school which probably affects the teaching performance of the faculty maker. Where the main purpose of the instructor is to inculcate its student would possibly affect. Since, we all know that the first priority of professors should be to teach and not to create or to manage the IS facilities.

Razz Razz Razz

School Internet Connection

Assignment 6

If you were hired by the university president as an IT consultant, what would you suggest (technology, infrastructure, innovations, steps, processes, etc) in order for the internet connectivity be improved?
Laughing Laughing Laughing
Internet connection….

Internet connection nowadays is somehow important. Internet had become essential part of any organization, may it be educational institution or business organization. It has been part of our everyday life. Especially in schools, where internet helped in a great way in easing the problems of homeworks, researches and so on. Having a stable internet connection is essential for it to cater to the needs of the user. Through, internet connection information may gather easily and disseminate easily as well. Internet is a global computer network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail and the World Wide Web. It is a medium where exchanging of information is possible, can use to explore new things, search different ideas, discover things easily, see different concepts, open up issues, and even allow you to experience travel in different places in just one click.
It is also use for communication and even entertainment. There are a lot of things to do over the internet, even businesses, organizations and schools uses internet and get benefits from it to continue the work and allows advance opportunity.


As a consultant…

As a consultant, there are things need to consider in giving suggestion and recommendation. Considering on the current situation in the university’s internet connection an intricate issue to be discuss.

I would suggest first thing is to educate the users. Make it simple and go into small detail because we all know that we are in a state university and budget in limited.

To conducting a seminars would be helpful. Most of the students don't know the effects in the connection upon downloading in the Internet. It can reduce the connection speed especially when most of the user is downloading at the same time. Through seminars the student will be educated on this matter. We are already certain about the increased of bandwidth in our school, but it is just a short term solution if the students won’t follow the rules and continue to download everything from the Internet. Another one is by not making use of Internet in school as a source of entertainment. As a student it is inappropriate to the school if you are making any jobs not related to your course. You can make use of the Internet outside of the school if your purpose is to download files from the Internet. Limit the student of video streaming which I believe is already implemented in the school. In addition to these rules could be implemented to further boost the internet connection is at most 2 internet browsers with only 1 tab each should be open at a time. If a student want to video stream or to download something then only 1 browser window should be open at his station. These rules should be implemented with strict compliance to make effective.

By proper orientation of the users, faculty or student, about the proper usage of the Internet or the computer will help to lessen the cause of the problem and if the users are the ones causing the delay, then our efforts would be useless. Proper usage mean so much because no matter how fast or advance the technology your using, it will be useless if the users doesn't use their initiative. Computers are only tools, and we are the users of these tools.

Realistically speaking, imposing such rules and regulations somehow restrict the students to explore more and learn new ideas in the internet. It maybe a good way to increase the speed of the internet connection but at the same time it would put into the line the role of the school in cultivating the student.

Computer viruses are also a problem. One factor that affects the performance of the computer and the Internet connectivity is the virus dilemma. This is something that is also acquired from the Internet. Adequate and appropriate anti-virus software should be installed in all computer units or there could be one unit where removable storage media must be scanned and cleaned of any infections. I noticed that most students do not scan their removable storage media and just use them without hesitation. My suggestion would be to introduce to the users some anti-virus software and encourage them in using that software for their protection. Good and up-to-date anti-virus software would also help make the processes of computer a lot faster. In relation to the virus problems, it would also be practical and wise move to apply the deepfreeze mode on all the units in the laboratory to prevent virus to spread.


Another thing is upgrading the unit in the school. It is important to use high-speed computers in order for our connection to be fast. But since the university lacks the budget to buy new units, it is even more practical to just upgrade the computers. Even by doing it partially and one at a time would be a big help than doing nothing but wait.


Similarly, by using internet connection software that speeds up the pace of the internet that is a effective, easy-to-use program and lacks the power to provide an optimal
Internet connection because of changing, unstable network conditions. But the down side of using accelerators is that the quality of the interface will be decreased. To think of it, it is not a major problem and not a bad option since the concern is to speed up internet
connection.


Caching proxy server. A proxy server can reply to service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance


Using Proxy Servers. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that,
among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.



Use network repeaters or routers to regenerate incoming electrical, wireless or optical signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a
limited distance before the quality of the signal degrades. Repeaters attempt to
preserve signal integrity and extend the distance over which data can safely travel. Routers are specialized computers that send your messages and those of every
other Internet user speeding to their destinations along thousands of pathways. So if we use routers, best path will evidently accelerate internet speed. Our school is currently using routers but internet connection was still very low.


Since we are already using fiber-optic cables and UTP cables, we should maintain and maximize the use of these mediums in order for the data to travel faster.

Increasing the bandwidth is also a good solution, but nothing will happen if it is not properly allocated. Applying the idea of properly allocating bandwidth depending on the usage is an alternative solution maybe. With this, probably, the tasks that require the most bandwidth can be properly attended to and the tasks that require the least bandwidth can also be done at the same time.


Rolling Eyes Rolling Eyes Rolling Eyes

Barriers in IS/IT Implementation

Assignment 5
Barriers in their IS/IT Implementation


In an organization, barriers are common to all. In any form, there would be a barriers or hindrance to do the act and in doing some. But, these barriers may be good or bad. It would or would not help the company depending on how the company and its employee approach to these issues.

There are many forms of barriers present in an organization. Barriers that may occur may vary on what type of organization is, because in every circumstance things change. These barriers, employees have a big contribution. In fact, employees are one and have the major contribution, concerns and involvement in this matter. In addition, there are still a lot of factors that is involved in this matter of issue.

A barrier is an obstacle which prevents a given policy instrument being implemented, or limits the way in which it can be implemented. In the extreme, such barriers may lead to certain policy instruments being overlooked, and the resulting strategies being much less effective. Potential risks and barriers to implementation have board coverage.

Our adopted company is ANFLOCOR which is holding company. As a holding company their services to their affiliates or subsidiary companies is the core of their major business flow. Compare to other organizations, ANFLOCOR doesn’t produced goods or manufacture goods, but instead its focus and concerns are to its subsidiary companies. With the series of interview we had with the Senior Manager – IT and Management Services of the company, we identified some of their barriers in information system and information technology implementation.

Resistance to Technology
Resistance is present in almost everywhere. It is part of the action or activity in our daily life and in every change we plan to have. It is part of the circulation and it may or may not help to achieve the success in our action. As a matter of fact, without resistance things may won’t work well or make it balance. In a sense, it would serve as an evaluation of the action we did or the change we had.
More likely, people resist because they don’t want change. It may seems burden to them or not necessary to engage with. Frequently, resistance takes place due to lack of understanding to the changes and its implications, fear to lose something they value and missing skills or resources to carry out the change.

***In the said company, resistance of the end-users to implement new IS/IT is visible. It is one of the concerns of the IT personnel of the company every time they implement new system. End-users may experience the reasons why fear of change that is stated above. To point out, the said company does not directly consider their end-users or clients as “barrier” in implementing new IS. In fact, as a holding company, their focus is to the “internal service” they can offer to their client. They work for the benefit of its clients or customers. They also provide what the clients suggest or needed. In implementing new IS, client side and approval are sought first before the implementation made.
But, based on observation, it is most likely due to lack of orientation and evaluation to its users to the limitation, scope, parameters and opportunity of the change they plan to do.

Project Implementations Period
As stated earlier, end-user or clients approval plays a big role in implementing new IS. When a need of the client is shows, the company does their role of providing services and does the system as mandated by the clients. On the period of making the system, there would instances that alterations of the functionality occur as the pace of necessity move. In effect, it may consider as barrier in implementation of IS but only partially.


To all intents and purposes, barriers vary occasionally depending to the kind of organization. Organizations core value, concerns, goal, role, activity and priority play a significance role in every step of the way and pace of improvements. But still, a lot of factors still present and show now or later. Here are some of the potential risks and barriers in implementation of new IS that may occur in any kind of organization.


Potential Risks and Barriers in Implementation of New IS


Delayed Decision Making by External Agencies
- Delayed decisions by agencies may jeopardize timelines
- Decisions that alter requirements may affect contracts


Negative Customer Reaction
- Customer may not be satisfied because needs may not meet.
- May be customer backlash if expected benefits don’t materialize
- Customers may not be satisfied with implementation rate of program
- Customers may see this as a way to justify increase in bills

Public Pressure on Government to Change Direction
- Program will not be completed prior to some political events
- Public pressure on government to reverse decisions


Changing Technologies
- The rapid change of the technology may also be considered as barrier. Changes in technological aspect also consider before implementing new IS that in effect relate to planning. As a result, it can insure the effectiveness of the new system and cope up in the competing issue in the market.


Similarly, group processes can be as straightforward or as complex as the individuals who make up the organization. It is vital to successfully launching a new program that the leaders understand the strengths, weaknesses, and idiosyncrasies of the organization or system in which they operate. Try to anticipate barriers to implementation so that you can develop strategies to minimize their impact or avoid them altogether. The following list of common barriers can be used to help your leadership team identify potential obstacles. The list of essential elements for change can help the team brainstorm possible solutions. The lists are a good starting point for a planning session that will be most effective if it also takes into account the organization's unique characteristics.
Common Barriers
• Studying the problem too long without acting
• Trying to get everyone's agreement first
• Educating without changing structures or expectations
• Tackling everything at once
• Measuring nothing or everything
• Failing to build support for replication
• Assuming that the status quo is OK
More Barriers to Change
• Lack of such resources as time and commitment
• Resistance to change
• Lack of senior leadership support or physician champion
• Lack of cooperation from other agencies, providers, departments, and facilities
• Ineffective teams
• Burdensome data collection
Essential Elements for Change Effort
• Define the problem
• Define the target population
• Define effective treatment strategies and establish procedural guidelines
• Establish performance measures; set goals
• Define effective system changes and interventions
• Develop leadership and system change strategy


To address the problem, there are 3 things to consider in implementing new IS:

Still, as difficult as major IT implementations can be, they can be properly executed. The roadmap to success lies in successful planning and management of the overall project. Many problems can be avoided or at least mitigated by paying constant attention to the "three R's" of project management: requirements, resources and recovery rates.
These three R's comprise the foundation of effectively planning and implementing projects. Successful large-scale project managers measure each of these project components and continuously communicate their status to senior management and the project team.

Requirements
The requirements of an IT implementation define the core reasons a business is investing time and resources in the project. The requirements of a project, often referred to as the project scope, must clearly set out what the project team is expected to deliver, and should be documented in detail.
By accurately documenting the work that needs to be done, the project manager can provide senior management with a better understanding of the time frames and resources that will be required to complete the project.
Prior to commissioning a major initiative, senior management should require the project team to complete a cost/benefit analysis. This analysis should outline high-level deliverables that will result from the project meeting its goals. The project team also should define metrics and benchmarks that can be used to measure the benefits of change and the progress and completion of each deliverable.
For example, if a new system is being deployed that reduces the time required to print, sort and attach hangtags, the current amount of time required to complete these activities must be accurately benchmarked. After the new system has been deployed, management can compare the new tagging time requirements against the historical benchmarks and quantify the amount of time saved.

Resources
The second of the 3 R's -- resources -- includes all employees, consultants and vendors who are required to successfully complete the project. Resources also encompass the budgets, capital expenditures, equipment and infrastructure necessary to achieve the requirements of the project within the target time frame. Resources are the most important commodities of the project. Without them, none of the project requirements will be completed. They also can be the most difficult aspect of a project to accurately pinpoint.

In determining the amount of resources that will be required to complete a project, many base their calculations on the firm's number of full-time employees (FTEs). Deriving an accurate FTE count, however, can be a difficult task. Thousands of variables change the resource requirements of major projects on a daily basis. People become ill, quit, go on vacations and take maternity or paternity leave.
When establishing an estimate for a project, the project manager must consider the amount of work that needs to be completed and put a stake in the ground in terms of the resources that will be required to do the job. As the project progresses, it is important that the project manager revisit the original estimates with updated information, and adjust his or her team's size, budget projections, etc. accordingly.

Recovery Rates
The recovery rate can be measured from the time any requirements of the project are completed through the time the business begins to recover its capital investment. A classic mistake of many project managers is to focus 100 percent on the end of the project. If project managers do not develop and manage interim milestones, they are unable to determine the rate at which they are achieving project requirements. As a result, they are not able to clearly determine whether the project is on time and if it will meet the deadline.
In the end, requirements, resources and recovery rates must all be carefully balanced to successfully realize the benefits of a large-scale project that is on time and meets budget. As changes occur, it is imperative that the project manager identifies which of the three R's each change affects. When a project is in balance, any change to one of the three R's will cause a compensatory change in another. For example, as requirements are added to a project, either additional resources or additional time must be added to the initiative.



http://www.growthhouse/palliative
http://www.mywhatever.com/cifwriter/content/22/4481.html
http://informationr.net/tdw/publ/papers/1989ISstrat.html

SONA of the President (27 July 2009)

Assignment 7

Her Excellency President Gloria Macapagal-Arroyo's State of the Nation Address for the 3rd Regular Session of the 14th Congress
27 July 2009

During on the SONA of the president, she mentioned about the ICT or Information and Communications Technology.

Information and communication technologies (ICT) is an umbrella term that covers all technical means for processing and communicating information. The term has gained popularity partially due to the convergence of information technology (IT) and telecom technology. ICT defines a broad range of technologies, including methods for communication (communication protocols, transmission techniques, communications equipment, media (communication), as well as techniques for storing and processing information (computing, data storage, etc.)

In relation to this, the president mentioned to have an ICT department…..

But BPO remains resilient. With earnings of $6 billion and employment of 600,000, the BPO phenomenon speaks eloquently of our competitiveness and productivity. Let us have a Department of ICT.


Arrow Arrow ICT allows users to participate in a rapidly changing world in which work and other activities are increasingly transformed by access to varied and developing technologies.
ICT tools can be used to find, explore, analyze, exchange and present information responsibly and without discrimination. ICT can be employed to give users quick access to ideas and experiences from a wide range of people, communities and cultures.



More funds to education were also brought up. “Pondohan ang mas maraming classroom at computers. Kaya namuhunan tayo ng malaki sa edukasyon at skills training. Ang magandang edukasyon ay susi sa mas magandang buhay, the great equalizer that allows every young Filipino a chance to realize their dreams.

Arrow Arrow More attention to education is a big help to all especially to the youth because what we already know, education is the key to success. More funds for classroom will make the student more effective in class and will give productive place to learn and gain more knowledge. To be aware and expose in technology would also be a great help to the student. It would make the student to be more equipped after the school life, to face the real world.


"In 2001, I said we would finance fully automated elections. We got it, thanks to Congress."

Arrow Arrow Election is a crucial event in our country. It is a big issue that is needed to have attention and concern of. Truly, it should not take advantage and even use to personal interest of any. Making our election to be automated is a big help to the process of election and to make it effective timely manner. Having automation has many advantages to the voters and to everyone. But, there are still important things that should take into account. Implementing the automation should properly discuss well, plan well and make sure it is secure.
Arrow Arrow Automation in election would be very helpful to make it more organize in manipulation of data, to make the result more reliable and fast, it may lessen the human error, and can make the process more easy and timely. It may reduce any anomaly during the election process and even in the casting of votes.
Arrow Arrow We cannot deny that the result of the election is very important to the government of our country including its constituent. The elected individual will be in the position to serve its people and to manage the political issues and concerns of the country. To make sure the laws and regulations are implemented well and assure its people to protect their rights from any vices. That is why, this automation would be a great help but it should make sure to make it fair and honest.

bounce bounce bounce

http://en.wikipedia.org/wiki/Information_and_communication_technologies
http://www.abs-cbnnews.com/technology/07/27/09/arroyo-oks-creation-ict-department
http://en.wikipedia.org/wiki/Information_and_communication_technologies

Green Campus Computing

Assignment 4
Green Campus Computing

Environmental issues of today….


The climate is changing. The earth is warming up, and there is now overwhelming scientific consensus that it is happening, and human-induced. With global warming on the increase and species and their habitats on the decrease, chances for ecosystems to adapt naturally are diminishing. Many are agreed that climate change may be one of the greatest threats facing the planet. Recent years show increasing temperatures in various regions, and/or increasing extremities in weather patterns.

We all know that the world today is facing not only economic crisis but also with the environmental crisis. Everything that we do that has something to contribute to the environment affects us directly or indirectly. More likely, we are now starting to perceive the effect of what they called “Global Warming”.

Global Warming is defined as the increase of the average temperature on Earth. As the Earth is getting hotter, disasters like hurricanes, droughts and floods are getting more frequent.

According to Encarta Dictionary “Global Warming” is the increase in world’s temperatures that believed to be caused in part by the greenhouse effect. Greenhouse Effect is warming of the earth’s surface as a result of atmospheric pollution by gases coming from factories, burnings of plastics, etc. made by human activities. It is now feared that the warming effects are being undesirably increased, causing climate change and melting icecaps. Changes that would really inflict all creatures in the world.

To address this very important issue that everyone is involve one of the advocacies is green campus computing.

Green Campus Computing is a way that make our practices using computing devices environmental friendly and contribute to the welfare of our environment. Its concern is to the electrnic waste or e-waste to lesssen and save energy.

To broaden the idea, let us take the side from Encarta dictionary about green campus computing. It denotes to become environmental advocate, to become aware of environmental issues, and make somebody aware of environment issues. As well, supporting or promoting the protection of the environment and produced an environmentally and ecologically friendly way such as by using renewable resources. An advocacy that has something to do with the use of computers or activity of using computers software, electronic gadgets, and the like that is more likely involve to school activities and universities.

An eye-opener and movement to make everyone to…Go GREEN… to become actively interested in environmental issues and support environmental causes.

Since, it involves computers and technology; there are a lot of organizations and institution that support green campus computing. One of the medium in promoting it is through internet or specifically speaking sites, blogs, and forum. There are some of the sites that promote green campus computing is:

http://www.mtholyoke.edu/offices/es/8450.shtml
http://www.northwestern.edu/newscenter/stories/2009/03/greencampus.html
http://www20.csueastbay.edu/news/2009/04/powerdown-040709.html


This site campaign to save energy and the environment by practicing green computing. They have several suggested practices of saving energy, to mention with:

Enable Power Management on your Monitor
Setting the monitor to go into "sleep" mode after 10 minutes when not in use. For the 2,800 computers on campus this could save as much as 574,000 KWh annually. Through following this, our university could really save energy and contribute to prevent the increasing condition of environmental crisis.

Turn off your Screen Saver
Despite the name, screen savers don't save anything, especially not power. Screen savers with a moving display use as much or more energy as a monitor in use. Unless it is conveying a message to the user, shut it off, and enable the "sleep" mode or turn off the monitor.

Turn off your Computer at Night and on Weekends
Turning a computer off at night so it runs only 8 hours a day reduces energy use by 141 kWh per unit or 57% savings. The 2,800 computers on campus could save as much as 394,800 kWh annually.
If your machine is a server, check with LITS or your department to see if hours of operation can be reduced.
· Shutting down computers does not reduce its life. Myths often do not keep pace with technology, modern hard
disks are not significantly affected by frequent shutdowns.
· Turning computer off uses more energy than leaving it on is not true. The truth is the surge of power used by a CPU to boot is less than the energy used by the unit when left on for over 3 minutes.

Turn off Printers (and Copiers) at Night and on Weekends
A typical laser jet printer uses 1,221 kWh if left on all the time. This can be reduced to 378 kWh by turning off at night and on weekends, a 69% savings. For the 235 LITS supplied printers on campus, this equates to 198,000 kWh.

Don't Turn Equipment on in the Morning until you Need it
Break the habit of turning on office equipment as soon as you arrive each day. Wait until the first time you need it!
For the 235 LITS supplied printers on campus, if each printer operated for 2 hours less each day, the additional annual savings would be $17,100 kWh.

Turn off Scanners and other Peripherals Except when being Used
In many offices, scanners and other peripherals are only used occasionally. Keep them off until they are needed and turn off after use.

Buying Equipment
If you are buying printers or other peripherals for the office, buy Energy Star compliant equipment. If you are purchasing monitors, purchase flat screens. Flat screens use 40% less energy (30W instead of 70W).
By switching the campus standard LITS saves approximately 103,000 kWh annually.

Reduce Paper Use
Producing paper is both an energy and resource intensive operation. In copiers alone, the Colleges may makes hundreds or thousands copies a month. Not using the paper in the first place is always better than recycling it after use.

Tips for reducing paper use:
· Print double-sided when possible
· Use 'print preview' to review documents before printing
· Archive your email by saving to a folder instead of printing it out
· Use the 'track changes' feature in Word when collaborating with others on a document to avoid printing it out
· Limit mailings — circulate by email
· Think twice before printing something off the web — save a bookmark for future reference
· Use recycled content paper (at least 30%)
· Recycle all toner cartridges and computer components

In addition…

Energy audits of campus buildings
Facilities Management that is conducting energy audits of the major buildings on the campuses. The audits identify energy cost saving measures that are implemented to reduce energy costs and consumption.

Recycling Policy
A policy that promote recycling in office materials and wastes. Unplugging electronic devices, changing light bulbs and recycling are made to help departments "green" their offices.

*** By practicing these little things in our university we may do our part as an organization to our environment. It may be little thing to consider but big things start with it. Let’s make our campus green.


References:
http://www.mtholyoke.edu/offices/es/8450.shtml
http://www.northwestern.edu/newscenter/stories/2009/03/greencampus.html
http://www20.csueastbay.edu/news/2009/04/powerdown-040709.html
Microsoft® Encarta® 2008. © 1993-2007 Microsoft Corporation.

First Major Paper Consultation

just yesterday Oct. 14, we finally had our first consultation...
wewww.....
after a long wait... hehehe.... we already had it....

we are so glad and at the same time during our consultation we are so nervous...
mix emotions were there... is was like we had a fever and worst than that....
but, after that.... we came out in the faculty more relief...
"may na lang...."

Tuesday, October 13, 2009

September 11, 2009

Until now we still didn’t made any consultation for our major paper…

I’m worried…

documentation again...

September 27, 2009

We continued our documentation...
By this time we didn’t meet at my boarding house, we agreed to make it in different place because of some reasons. We’ve started around 6:30pm and the tasked was divided to the group members. Though, the last few hours was arduous we still have accomplished some of our paper works.

...It was already 12:00 am when we went home...

Sunday, October 4, 2009

Third Interview

September 25, 2009

On this day, we had our interview at ANFLOCOR. We arrived there at 12:30 pm and we had to wait 30 minutes because office time is 1:00 pm.

We had so many questions that we asked from Mr. Giovanni Pimentel, the IT-Senior Manager of ANFLOCOR. The questions were more about on STEEP and SWOT analysis. We asked him about the Sociological, Technological, Economical, Environmental, and Political factors that are external to the organization. Then, we asked him about the Strengths, Weaknesses, Opportunities and Threats of their organization. We also asked him about the structure of their company and a brief history of there IS.

We ended our interview at 2:30 pm.

Request for Third Interview

September 25, 2009

During the last few days we have been checking our email account but there is still no reply from Sir Giovanni. So we decided to call them. Fortunately, we were able to talked t Sir Giovanni. We first asked for an apology (thank God! He understands.). Finally, we will have our interview this Friday, September 25, 2009 at 1:00 pm.

Yes....


September 14, 2009

We sent an email for Sir Giovanni, saying sorry and asking for a reschedule of interview… if we can still.


September 13, 2009

We checked our email and read Sir Giovanni’s reply which was sent on September 10, 2009. Sir Giovanni said that he will be vacant on September 11, 2009 at 1pm. Since, September 11 had already passed and we weren’t able to be there, we felt sorry for ourselves and we were so downhearted and afraid that Sir Giovanni might not allow us to interview him anymore.


September 09, 2009

We went at ANFLOCOR before 8:00 in the morning. Sir Giovanni has not yet arrived and the girl on the reception said that Sir Giovanni will be having an important meeting on that morning, so we might not be entertained. Sir Giovanni’s secretary said that we really cant be entertained so she gave their contact number for us to call and confirm our next interview.

Later that day, we checked our email and figured out that Sir Giovanni had actually sent us a message telling that we can interview him 1pm that day.


August 27, 2009

Sir Giovanni replied that we can interview him. Unfortunately, there is a conflict because Edsa and Emilio will have their O.R. midterm examination on that day and time.

So we humbly requested to reschedule the interview.


August 26, 2009

We sent on email to Sir Giovanni requesting for a third interview.

Tuesday, September 29, 2009

Documentation of Major Paper

August 20, 2009

We browsed through internet for STEEP and SWOT analysis examples. After an in-depth study about what and to come up with STEEP and SWOT. We immediately formulated questions for our adopted company.


August 17-19, 2009

We started making the possible contents of our ISNA. After making the draft of our table of contents, we decided the task among the members. The introduction was assigned to Edsa, background information about the company to Edsa and Emilio and the purpose, scope and objective of the study and the approaches to systems building was assigned to Karen.


Start Documentation
August 11, 2009

It was August 11, 2009, when we started our major paper through researched and study. We browsed the internet to formulate a concept about our major paper. We also did a researched for the STEEP and SWOT analysis to an idea how to start and make it.
As side from it, we researched some information about our adopted company, ANFLOCOR.

...weeww... i was run-out of words with this paper... weeww...

Gantt Chart

August 12, 2009

One of the days that made me feels better. When our gantt chart was approved and ready for posting…. Yes. After how many repeats and revision, we made it.


August 10, 2009


By this time, we consulted Sir Gamboa for our gantt chart. Unfortunately, we had some mistakes that we hadn’t noticed so we had to revise our gantt chart.



Second Interview

August 06,2009

This day is our schedule for our second interview. We arrived at the ANFLOCOR approximately 8:00 am. The interview started 8:15 am. We asked the IT-senior manager about their strategic transitions in there IS, how their organization does used Information System for competitive advantage and the factors to consider when planning a new system. We also asked him whether their system is in-source or out-source, what are the hardware and software used and how does they manage it e.g. maintenance and back-up. Also we asked him regarding the company’s approached to system building, the SWOT of the company, the problems and issues they had encountered and the flow of their major business and IS operations. However, he refused to give us the information about the flow of their major business and IS operation. Lastly, we had a picture taking with him and we ended our interview past 9:00 am.



-ANFLOCOR Lobby-

Friday, September 25, 2009

Asking for Second Interview

August 04, 2009

We had a discussion and review of the slides presentation of reports by this time. We gathered information to formulate questions for our incoming second interview with ANFLOCOR Company.


August 03, 2009


In this day, Karen Palero submitted a letter in the email for our second interview at ANFLOCOR. The next morning, August 04, 2009, Mr. Pimentel replied to schedule us on Friday, August 06.



First Interview in ANFLOCOR

July 27, 2009

On this day, we had our first ever interview in ANFLOCOR with Mr. Giovanni Pimentel, Senior Manager – IT and Management Services of ANFLOCOR Company. The scheduled time was 8am, and we were there just on time but only Edsa and Emilio was there to conduct the interview.
...
The interview was all about the basic information in management information system of the company. It goes smoothly yet a little nervous in our part, we felt intimidated and challenge as well. We asked questions such as the role MIS in their company, how it affect, in what way and some sort of things. We also threw the same questions we had during the class sharing like hacking, resistance, and etc. He shared to us the company background of the company, their services, what kind of company is ANFLOCOR, the history of there is, about their personnel and department, the sub-company it has and a lot more. General thoughts regarding their company was tackled and discussed.

During the interview we informed him regarding the ISNA or major paper we have, if it is okay to conduct a series of interview for the information we needed to complete the study. He told us that he is willing to be interviewed but he also informed us that e cannot give us the confidential information.


Before the interview ended, we also had a picture taking with Sir Pimentel and informed him that we will have another interview with him.


-with the Senior Manager-IT and Management Services-

...It was a good start for our major paper though...

Friday, September 18, 2009

July 23, 2009

One of the companies we had that accepted our request to conduct an interview,
was the ANFLOCOR.

...weewww...

By this day, we submitted a letter to the company, and they told us to call them on the following day.

...the next day...

After a follow-up call, we are scheduled to have an interview with the MIS department Senior Manager.

...i was smiling then...

July 15, 2009

Days before, we already manage to visit some of the companies we plan to include in our listing of companies to make sure that they have an information system and they will allow us to conduct an interview.

Thankfully,
some of the companies we visited had positive response. Through, internet we manage to acquired basic information about the companies we had and included them on our list of companies.



We even had a call center on our list, the Concentrix.
They allow interviews to be conducted but unfortunately, only to Karen which was part of the company as a call center agent. We tried to abide to their regulations but we found out that it won’t work with that kind of setting so we’ve decided to withdraw and look for another company.

Listing of Companies

July 6, 2009
...the first try...

On this day we first presented our list of companies to be adopted with our MIS- instructor. We presented different names of companies more than once to seek for approval. There were times that the company we listed was already taken with the other group, so we had to list other names of companies.

Saturday, September 12, 2009

ANFLOCOR Company

Our adopted Company is a holding company...

Monday, July 20, 2009

Digital Filipino Club and Bloggers Networking Event

Digital Filipino Club and Bloggers Networking Event
July 18, 2009

At Pantawan Hall,Grand Regal Hotel



…Digital Filipino Club…

The DigitalFilipino.com Club is an Internet community that was launched last December 25, 2003. It is founded by Janette Toral, site owner of DigitalFilipino.com. The Club currently has nearly 100 members from students, researchers, entrepreneurs, and professionals. What makes the club unique is its business promotion focus and knowledge sharing culture.

…REFLECTION…

July 18…around 6pm… together with some of my classmates, we went to Grand Regal Hotel to attend an event that we really don’t know what is it all about but only a fact and a little idea from the word “bloggers”. Even so, we came to the place, ready to see or experience what’s waiting ahead… The venue was a little elegant and cozy. Most of the attendees were students, researchers, entrepreneurs, and professionals. Nonetheless, the people there we accommodating that made us felt comfortable in the whole time of the event. Before the event started we had first a dinner… and hmmm… it was nice… hmmm… Afterwards, we introduced ourselves one by one in front of everybody… no exception… hehehe In the proper event, they discussed all about blogging, specifically what is blogging, top bloggers, the things what you can do in blogging, the advantages it offers and they also promoted to engage more on blogging to be more competitive and to make Davao as one of the top bloggers. On the later part of the event, everyone was asked to play bingo and winners got there prices sponsored by PAGCOR and freebies were also given to the attendees… It was one of the great experiences I had… hope there will be a next time…






…On Our Way Home…

We dropped by were a car show was held not far from Grand Regal Hotel… Another experience to be consider… hehehe… Here’s some of our picz…



Saturday, July 18, 2009

COMDDAP DAVAO EXPO

COMDDAP DAVAO EXPO 2009
July 2-4
Apo View Hotel
Computer Manufacturers, Distributors and Dealers Association of the Philippines



COMDDAP…


COMDDAP is an association of the country's top information technology businesses. Its primary objective is to promote the sustainable development of the of the country's information technology industry through voluntary collaboration of its member companies. It is the goal of COMDDAP to be able to provide its members general views and updates from different sectors - private and government, and highly regarded individuals to further uplift the morale and knowledge of its organization.

The vision of promoting and elevating the standards of Information technology (IT) in the Philippines fueled a group of prominent computer companies to form the Computer Distributors and Dealers Association of the Philippines or COMDDAP. Its initial member-companies represent the world's leading makers and providers of computer products, solutions and peripherals.



COMDDAP DAVAO EXPO…


The biggest I.T expo held in the South…

With the speed that I.T. is evolving and becoming ever more pervasive in our everyday lives… an event “COMDDAP DAVAO EXPO was held”… a yearly event, to step up to the challenges of bringing something new to its market with every show.

To get up close and to take a first-hand at the latest I.T products and software for computing, imaging, printing, connecting and communications, security, entertainment and lifestyle applications.

This year, COMDDAP Davao stages the LCD Monitor Shootout. In tradition, this event within the main event brings together the top LCD monitor brands in the world in a showdown of their most brilliant features in terms of graphics, photo and video display.

Other regular events in store for the visitors are the:
Technology Update series of Seminars and Workshop
Product Demos
as well as Event Discount
Raffle Draws
and generous giveaways for lucky attendees



The Technology Update Sessions…

Led by Nexus group and in collaboration of:


Presented by Nexus Group (TNG) Title
1. Jupiter Systems
The ERIC Dealer Management System
2. Nexus Technologies Inc.
The HP Thin Client
3. EduPro, Inc.
Windows Server 2008
4. Spinweb Productions, Inc.
Open Source For Business Applications
5. The Nexus Professional Services and Solutions (NPSS)
Retail Management System Overview



TECHNOLOGY UPDATE SESSION…


The sessions that I attended in the event are…

The HP Thin Client - Thin clients are computing devices hat function as an access device
on network.
- a computer without hard disk
- use flash for storage
- sharing and processing data
- pre-active for security


Open Source For Business Applications – Open source development of business
applications has proven to lower acquisition costs, and decrease vendor lock-in reliance and obsolescence rate so that even commercial software giants have knowledge the rise of this technology by allowing interoperability.

Windows Server 2008 – showcasing the new features of windows server 2008, such as
Read-Only Domain Controller, Network Access Protection, Server Core, Active Directory Rights Management Services, and Hyper-V.






REFLECTION…



We were able to attend the COMDDAP EXPO event for new latest technology that was participated by the different sectors of the country. Including the business people and tech-people, we, student was also given the chance to participate and observed in the event and see the new gadgets and observed the exhibitors presenting their new products.

The first session that I was attended was HP Thin Client, a computing device that have no hard drive, with displays data and applications from remotely located servers, blade PC’s or virtual desktops and processes programs at this same time. It also presents new features than a computer desktop doesn’t have.

The next one was the Open Source which opened our mind and clarifies things regarding open source. The session runs smoothly and interesting in my part. They also introduced some applications that support open source. It was also pointed out that open source is not actually free but of license free that made it an open source to everyone. On the run of discussion one of the representatives of Microsoft also presented himself and expressed his opinion regarding open source and proprietary. The exchange of thoughts was motivating and thought-provoking. They even discourse about the automation of election in the country in regards of using open source or proprietary application. Both sides were have their own idea and point on their stand, different views and opinions on the subject matter and stressed out that there are a lot of things to consider in choosing open source and proprietary. Eventually, it was a good factor to relate the issue of election since the election is soon to come and it was knowledgeable occurrence for us, students to witness an interaction of tech-people expressing their views.

The last one was the Windows Server 2008 that showcases the new features of the application for businesses where it addresses the needs of a business transaction and everyday activities. It was also discussed the benefits and convenience it offers to the users and the owner in terms of inventory, online access and many more.

I, personally, glad that we were invited in the said event because we were able to witness an event that gives us knowledge and information of the current technology we have nowadays. It was also an opportunity to us, students, to be part of the event for it was a great experience to even just observed to the tech-people discussing or sort of defending their products from others. Honestly, it was my first time to be part of that kind of activity and I am thankful for it. Hopefully, it won’t be my first and last because as a student it would be a big contribution to our learning.




-picture picture together with the Microsoft Representative-

Very Happy Very Happy Very Happy

Monday, July 13, 2009

Automated Election Reflection

Assignment 3

...Automated Election…..


Automated election system — a system using appropriate technology for voting and electronic devices to count votes and canvass/consolidate results.

The conduct of elections in the Philippines for the past four decades has remained largely unchanged. Philippine elections rely heavily on manual tallying and canvassing of votes thus making them vulnerable to control and manipulation by traditional politicians and those with vested interests. The cost of winning an elective post is highly expensive, and the absence of mechanisms to check and limit sources of campaign funds become fertile grounds for corruption and divisiveness.
In recent years, initiatives to reform the electoral system included the enactment of the following laws: Republic Act (RA) 8046, establishing a pilot program modernizing the registration and vote counting process in the Autonomous Region in Muslim Mindanao, the Party List Law, Fair Elections Act and the Absentee Voting Act. To address the inadequacies and limitations of the electoral process, RA 8436 or the Election Automation Act of 1997, was passed authorizing the Commission on Elections (COMELEC) to use automated election system for vote counting and canvassing in the national and local polls. The law provided for the generation of a national computerized voters list, establishment of a voters identification card system and the automation of the vote counting.
However, sectoral issues still hinder reform efforts in the electoral process. The following have been identified as basic problems afflicting the electoral system:
(a) outdated electoral process;
(b) failure to implement the electoral modernization law;
(c) limited administrative and
regulatory capabilities of the COMELEC;
(d) ineffective educational/information campaigns on new laws and policies;
(e) weak political party system;
(f) unaccountable political financing; and
(g) defective party list system (Governance Assessment, 2003).


...GOALS, STRATEGIES AND ACTION PLANS in Automated Election...

To ensure a credible and transparent electoral process, the modernization of the electoral system through computerization shall be supported to ensure the credibility of polls and correct the deficiencies in the electoral system. Likewise, the Omnibus Election Code shall be further revised and amended to respond to the needs of the present electoral system. Measures to strengthen the party system and regulate the activities of political parties shall be created. State financing of political parties shall also be considered through the passage of the Campaign Finance Bill.
The COMELEC’s capacity to raise the level of political discourse and educate citizens regarding their right to vote will be enhanced. This will be done through conduct of continuing citizen and voter education through partnership with civil society groups and other government institutions. The electorate must be empowered with information that would help them vote intelligently. The challenge is to develop the people’s appreciation of their vote as a means to reform the government and receive better services from it. Part of this challenge is the need to raise the awareness of the electorate on relevant issues and the corresponding platforms of the candidates, if the country is to shift from the politics of personality to the politics of party programs.



...How would it be?...

In partnership of Smartmatic Corp. and Filipino-owned Total Information Management Corp. (TIM) the automated election would be possible. With their partnership, the Smartmatic will be the one to provide machines for the automation, the one that has to guarantee the technology, the software, the transmission and the operations of the elections and indeed in charge of the operations.

Is it trustworthy to let this two company handle the operation in a critical event in our country like election?... The first thing to consider is “liability”. The trust and integrity of the provider and maker of the machines and operations to be used in the election proper are the top priority to ponder and contemplate. Starting from the planning, then processing and until implementing, and even the people include should make sure that they or it won’t be influence by any group of any party.



...In my own point of view….


Having an automated election in 2009 can make the Philippine election organize, manageable and faster, but of course the integrity which is the main concern of the election would still be on the hand of the Filipino people. Whatever the process or procedure to be used in an election or any event that is critical in a country, its central point is the people involve and the people to choose the right thing to do. To be on the duty of responsibility to take charge of the nonviolent, peaceful, harmonious, honest and fair election to all. In any event, whatever the purpose, the result would still depend on the intention and determination of each one to make the situation clear and accordingly. It would be a favorable condition for us in the election to be automated. However, there are lots of things to put into account such as process, security of data, the system, the accuracy, the management and a lot more are needed to consider in automated election. Since next year’s election will be automated it should be our duty, people of the Philippines to be vigilant, cautious and attentive in the election proper because the result of this election will greatly contribute to the country’s success and economic situation.

...Regarding to the issues of the election automation....

Since, election is a critical event in our country, it cannot be avoided to encounter negative issues and problem while undertaking the automation. In addition, for the protection of the Filipino people it is more relieving to thoroughly examine, check, study and evaluate things regarding automation for the benefits of everyone. It is the policy of the State to ensure free, orderly, honest, peaceful and credible elections, and assure the secrecy and sanctity of the ballot in order that the results of elections, plebiscites and other electoral exercises shall be fast, accurate and reflective of the genuine will of the people.


cheers cheers cheers


References:
http://www.chanrobles.com/republicactno8436.htm
http://www.neda.gov.ph/ads/mtpdp/mtpdp2004-2010/pdf/mtpdp%202004-2010%20neda_chapterx13_elections.pdf

Sunday, July 12, 2009

Risks Associated with Business and IS/IT Change

Assignment 2

Based on the organization(s) that you visited, what do you think are the risks associated with business and IS/IT change?

There are a lots of factors/risks that must be consider in business and IS/IT change to take place. Risks can occur in different ways and therefore risks should be approach properly to address the problem.

In a call center company like Concentrix, technology change has enabled call center operators to adopt new business models to meet the needs of the costumers and compete in the business world of call center. Technology has the capacity to fundamentally alter the way a company or a whole industry operates and that is certainly the situation now unfolding in the call center. Technology made every aspect of building and operating a call center faster, easier and also frequently has the side effect of changing business processes.

In my own point of view, regarding call center company, services is one of there concern. The services that it offers to the customers and to the internal customers of the company should take into consideration.

“Your customers are in a perfect position to tell you about quality, because that’s all they’re really buying. They’re not buying a product. They’re buying your assurances that their expectations for that product will be met.”
– John Gaspari, “I Know It When I See It”

Another one, it would maybe the security and reliability that it would offer in the said change. The security of the system and the progress it would present, if these would really address the necessary needs of the whole company for improvements.

Another thing is the cost, the expenses on making and in the implementation of the system.

In addition, the condition or state of the company, if it is capable of the change without affecting the other aspects of the company because a change should not put the other aspect of the company into jeopardy. Instead, it would result to the betterment of the whole company in general.


Listed below are brief tips that may be helpful as an overview and guidelines for risk management activities.


Tips & Guidelines©
...for Corporate Risk Management

10. Identify and assess risks
Risk is everywhere. Success in business often comes down to recognizing and managing possible risks associated with potential opportunities and returns. The types of risks faced in most businesses are quite varied and far ranging. Risks typically include both financial and physical categories. Types of risk include sometimes apparent hazards, such as safety and health risks associated with operations, as well as financial risks from exposures to market price volatility, counter party credit defaults, and legal liabilities. Some risks are intuitively obvious; unfortunately, many are not. Risk categories include: Market, Credit, Legal, Regulatory, Political, Operational, Strategic, Reputation, Event, Country and Model Risks. So first identify possible risks throughout your business.

9. Know the numbers
Systematic processes such as a RiskRegister ® to identify and rank risks by order of magnitude can be a key first step, but effective risk management strategies typically depend on quantification of risks, often through probabilistic modeling techniques. Said another way: one must 'measure it to manage it.' Measurement and valuation can be one of the most difficult efforts in risk management and finance, but these are crucial for cost effective risk management and informed decision-making. Spend the time and money to get the tools and expertise to best quantify the company's key risks. A close corollary is to know what is in any 'black-box' models used for valuation & reporting.

8. Risks are interrelated
Interactions and correlations of risks are a key element of which to be aware in identifying, quantifying and mitigating risks. For example, exposure to credit risks may also affect market price risks, whereas operational risks such as fraud may create legal and reputational risks. Recognition that risks interact between business activities is one of the basis for the 'enterprise-wide risk management' approach now widely practiced by leading companies.

7. Continually reassess risks
Things change, and so do risks. Market conditions and volatility levels change, financial strength of counter parties change, physical environments change, geopolitical situations change, and on-and-on. And these changes can be rather sudden, or they can be creeping and hidden. Exposures to risks that result from business activities may also change. Effective risk management requires that one reevaluate risks on an ongoing basis, and processes such as a RiskAudit ® should be built into the corporate risk management framework to assess both current and projected risk exposures. Forecasting future exposures is necessary since hedge decisions are based on projected risk levels.

6. Commit adequate resources
Effective risk management also requires considerable expertise and resources, from basic risk control, compliance and governance activities, through advanced quantitative risk analysis. The costs for these resources are usually not cheap, but as has been proven repeatedly by high-profile business failures, the cost of losses due to risk management weaknesses or lapses can be catastrophically high. Investment in risk management capabilities for most businesses has a high payoff. Due to the potentially extreme cost of mistakes, risk managers should be especially well trained.

5. Review the cost of risk mitigation
Transferring risks through hedge transactions or other activities is often an effective and advisable risk management technique, but risk mitigation strategy may largely depend on the hedge costs. Risk mitigation strategies also depend on the capacity of the firm to sustain risks and possible losses. Trading activities that are truly for hedging should not be avoided due to concern that trading could be misconstrued as 'speculative'; however, various hedge instruments may not have the same cost effectiveness or appropriateness for every company and environment.

4. Reduce exposure
Risks arise from exposure. A commonly accepted definition of risk is 'exposure to uncertainty' (at least for that uncertainty for which one is concerned about the outcome). Reduce the exposure and you likely reduce the risk. The selected approach and structure of business activities can have a significant effect on the exposure & risk levels generated. Commercial agreements and transaction structures may result in transference or acceptance of risks with a counter party. Risk awareness in business processes and commercial activities can lead to opportunities to reduce current and future exposures. Billing currency for international purchases is an example of exposure effect.

3. Assess the Risk/Return Ratio
Risk management does not equate to risk aversion; however, decisions driven by risk/reward assessments usually have a higher probability of successful outcomes. A consideration in such risk-based business decision-making should also be the capacity of the firm to sustain risks. As in the well developed finance field of portfolio theory (which in general terms focuses on how investors can best balance risks and rewards in constructing investment portfolios), business decisions based on risk/reward balance should optimize returns.

2. Monitor for quantum shifts in risk levels
A key value of quantitative risk measures is to highlight significant changes in risk levels. Although opinions may differ on the optimal methodology for some valuation metrics, significant changes or trends in risk metrics, such as Value-at-Risk measures, can provide a key signal to management. Best practices designs of management reporting 'dashboards' provide this risk monitoring capability, also showing segment reporting and consolidation to reflect correlations such as offsets in price risks between markets.

1. Create a risk aware culture
Educate the organization in practical aspects of risk management, and that especially includes the most senior business executives and the corporate board of directors. Risk management responsibilities should be clear. Whether it is intuitive actions based on experience and expertise in risk management or whether it is a result of institutionalized risk policies and procedures, effective risk management is typically a key factor in successful businesses. Training and building awareness can lead to a risk management culture that will drive business success.

http://www.riskex.com/risk-tips.htm

-=Here are some tips on how to management risks that will mostly arise in a business and guidelines for a company on how to approach with risks associated in different business activities. Before a company consider a crucial change it is must to know and plan well the change it would do or perform and consider all the factors in all angles of the company.=-

“The problems of today cannot be solved by the same kind of thinking that
created them.”
– Albert Einstein
 

Management Information System 1. Design By: SkinCorner