Tuesday, October 6, 2009

Simulation Report

co-reporters in simulation, here is the link of the report

http://www.fileden.com/files/2008/12/12/2220521/simu_report.doc







Thursday, October 1, 2009

Difference Between Method and Methodology

it is actually based on my own understanding.... hehehehehe

For me, method is just a part of the methodology. I agree with what Mr. Biloy has said that Methodology has the bigger picture. On my part, what constitute the methodology are the methods itself. Method is a technique and on the other hand, a methodology is a set of techniques to answer a problem.

Reviewing the Article -- posted by my classmates..

Before you call a web developer, Ask yourself one question
By
Susan Daffron

I would like to make a review of one of the posted articles by my classmates and what I have chosen is the article that was posted by George Duran on “before you call a web developer, ask yourself one question”. As what I have read in his posted article, it would suggest one thing and that is “is there a reason for existence of things around us?”

Anyway, let’s go back to the entry of George Duran. One thing that one should ask first before doing an action is “why do you need to do this?”. This would suggest that one should establish goals first before doing anything. Just like in putting up a website. One should know what the main purpose of having a site is.

In particular, our System in our Systems Analysis and Design 2 is the online version of the University Publication. The main purpose of having the site is to become the voice of the students and to let every student in the university express their thoughts and talents in writing through our site. One of the goals of our site is to help every student in EVERY COLLEGE be heard and not just focusing on to the people who are in frontline. Specifically, our site would also help contribute to a greener environment since it would reduce the usage of papers where in fact, papers came from trees right? So less paper means less trees that needs to be cut just to produce a piece of paper. The said goals were established since our group have noticed some existing problems, for example, a student would want to submit his /her article at the office but then whenever the office is closed then there would be no choice for this student but to come back to the office some other time. And this would result to waste of the energy and effort of the student to go to that office. In addition, whenever a student would want to comment on a particular article, with the old system, the student would have no choice but to keep the comment to himself since the article has been published in a paper. Furthermore, every semester, a student would pay Php 55.00 to the University Publication, but then there are tendencies that the newspaper / magazine are lacking that not every student can get his own magazine.

But with the help of our system, this could minimize and even lessen the said problems. The students do not need to go to the office just to submit an article since our system does have a feature on that, similar to an email. They just have to log on our site and register themselves in the convenience of their own homes. Then, after doing so, they can submit now their article and can even comment to other published articles.

To go back to George’s post, he quoted that “when setting Web site goals, it makes sense to think about the visitors you are hoping to attract to the site. Who will be reading it? What do they need to know? Why would they visit your site in the first place? What terms would they type into a search engine to find your site? If you do not have good answers for these questions, you should reconsider the question I asked at the beginning of this article: why do you need a website?”

After establishing goals, one should gather the necessary data to come up with the website. Most probably, the owner should now visualize and conceptualize on to what are the contents of his/her site so that the visitors would be attracted to always browse your site.
The article is very interesting in a sense that it would teach us something with regards to technology and also in real life situations. That as to everything we do we should think of it a couple and even a hundred times so that we won’t waste our time, money perhaps and effort in putting into action on what we really want to do. And so that we would not want to regret the things we’ve done and to be prepared for the possible consequences that one may face.


One article that also caught my attention is the article that was posted by Cherry Ann Montejo that has a title of “The Promise of Information Technology in the Travel Industry”. As I go through the article, I do agree with what Cherry has said, time would come that information technology would take place in the travel industry, the IT Professionals would be developing enhancements on online ticketing etc. that would help the tourist be more comfortable and convenient on their part to travel around the world.

I may somehow relate this one to the one of the so called feature of St. Peter Life Plans. One would not need to go home just to be there in the wake of their loved ones who passed away, through their (referring to the St. Peter Life Plans) cctv or built in camera in their chapels, it would seem like you are on the actual wake. But for me, it would still be better to be there with your loved ones (hehehe).

Also, I would relate it with the reality show “Amazing Race” that there are chosen people that would race around the world. The online ticketing system would be a good strategy in booking up early flights to their respective destination. All they have to do is just login to the website and do the transactions there! It would truly help them in winning 1 million US Dollars (that’s’ a lot of money there)

Anyway, the title is very catchy, that as you read the title, you would have a glimpse and you would understand already what the article is all about. It would be very nice if I and my group mates would come up with a good research title that one would understand what our topic is all about by just reading its title.

3rd reading... again and again and again....

Computers May Slowly Be Turning Green
By
Jon Norwood, October 8, 2007

Summary:
The paper discusses the new trend of eco-friendly computers being manufactured, as well as their possible impact on Global warming. A PC draws between 200 and 700 watts when left on. It is also more than a DVD Player or a TV. 600 watts over time will add considerably to an electric bill and it will send a great deal of carbon dioxide into the atmosphere over the course of the year.

Europe has begun to take the computer disposal problem seriously. Several regulations are currently being established to help promote the concept of “Green PC”. In fact in America, the Dell Inc. pledged to plant a tree for every PC they sell that begins in 2008.

The PC World is currently working on a carbon neutral PC that focuses primarily on decreasing the power requirements of the computer which means less carbon dioxide in the atmosphere. The manufacturing process PCs go through is the real environmental concern as on average 10 times the weight of the PC in raw materials will be burned through during its creation. This is a problem bigger than the US as a great deal of hardware used in American computers is imported. Companies such as Dell and Gateway will have to become more mindful of where the parts they are using come from, and perhaps refuse to purchase from firms that are not environmentally friendly. This would more than likely increase the cost of computers immediately , but that may be a necessary change.

Evaluation:

It is good to know that there are Computer Manufacturers would initiate towards a greener and healthier environment. On my part, writing the said paper would also help people be aware of what is really happening right now. It seems that we’ve seen the effects of Global Warming today, even if there’s only a day of rain pouring but floods would truly be there, affecting lots of people.
On my own opinion, to really solve global warming, all of us even ordinary citizens should do our part if we do not want to let these things get worst as possible. We should all take step. Haha!

2nd reading again and again...

The Effect of Bandwidth Software on the Business
By
Muhammad Azeem Ashraf
July 13, 2009


Summary:

In every human being in the world, computers and technology is used in all parts and fields of their life. In this paper, bandwidth software is introduced into the market. The bandwidth software would provide solutions to the small and large businesses that use internet service. Since most business today, do their advertising over the web so all the clients need to do is to sit comfortably in their homes and do the shopping online.
The paper stated that the bandwidth software helps an individual to have a check and limit the speed of the internet that is being used and provided to its users. The bandwidth software manages the traffic and speed of the internet that is being provided. Also, if one would use bandwidth software to its business, it would help them in different ways that include the following:
o Reduces the cost of the internet by not providing to the each user separately
o Secure the sites that you don’t want to be accessed
o Each user can increase or decrease the bandwidth according the rate of transfer of data and the speed he needs to perform his tasks.
o This bandwidth software also helps all the computers safe from any viruses or threats
Thus the bandwidth software plays a significant role in the growth of the business. It can reduce their cost and more efficiently use that cause for other purpose that may increase its profit and in return leads that business towards growth and goodwill.


Evaluation:

Yes, it’s true that bandwidth software can give benefits to a business but how about schools and universities? I was just wondering if this software is applicable in our school. One thing that I have noticed is that the paper is too general that it should suggest as to what type of businesses this software can be applied into. Also, one thing I would suggest is it should specify the possible prices that the software could range.

1st reading .... again?

eWatch: AWearable Sensor and Notification Platform
Uwe Maurer1, Anthony Rowe2, Asim Smailagic3, Daniel P. Siewiorek3
3School of Computer Science, Carnegie Mellon University, Pittsburgh
2Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh
1Computer Science Department, Technische Universität München, Germany


Paper Abstract:
The eWatch is a wearable sensing, notification, and computing platform built into a wrist watch form factor making it highly available, instantly viewable, ideally located for sensors, and unobtrusive to users. Bluetooth communication provides a wireless link to a cellular phone or stationary computer. eWatch senses light, motion, audio, and temperature and provides visual, audio, and tactile notification. The system provides ample processing capabilities with multiple day battery life enabling realistic user studies. This paper provides the motivation for developing a wearable computing platform, a description of the power aware hardware and software architectures, and results showing how online nearest neighbor classification can identify and recognize a set of frequently visited locations.

Evaluation:
The eWatch reminds me of a mobile phone. How I wish that mobile phones can be attached to a watch. All you just have to do is to put on your wrist and just wait for the phone calls and text messages to come. As I have read the paper, one thing that took my attention is that it can locate a person (that is using a eWatch) that is similar to a GPS. In the paper, it states there that eWatch would be very beneficial to patients. Since, eWatch senses light, motion, audio and tactile notification. An eWatch can sense if the user is in distress and then query to confirm that it is an emergency. The use of online learning could profile the patient’s daily activity and notify the caretaker if a patient no longer performs their daily activities. The eWatch can also notify a patient when they should take their medication. (taken from the actual paper).

I myself is truly amazed with this technology. This would be very helpful in our elderly people; with the help of this technology it could lessen the chances that our elderly will get lost since we can track them through the use of an eWatch. One thing I have learned as I read the paper is that every location has its own unique have location noises such as the noise of computers, television and even traffics that came from the cars. Also, the GUI has a calendar that can monitor and can add, edit and delete schedules on the specific dates. This would help the very busy people remind them of what they have to do.

Anyway, with regards to the paper, there are terms that need to be explained more or they just have to put a glossary of terms so that the readers can understand more about what they are talking about. One thing I’ve also liked about is that they’ve shared about the hardware specifications as well as the screenshots of the said technology. In addition, they have stated that they will be having a future work. I just hope that there would be a technology like that here in the Philippines, it would truly benefit us.

State of Computer Science Research

Office of Naval Research, Asian Office
Computer Science Research in India
A summary report by Prof. Krithi Ramamritham


According to Ramamritham (1995), India has shown the potential for high-caliber computer-science research. He stated some facts and here are the following:
· India's pool of technical man power is one of the largest in the world,
· The growth rate of India's software industry has been tremendous in the recent past, and
· The demand in the West for students from India's top science and technology educational institutions has been very strong.
The report was all about the Computer Science Research in India, in which the first discussion would focus on the Nature of the Computer Science Research in India, then it is followed by the kinds of organizations in which the said computer science research is conducted then followed by the support for conducting research in the form of equipment, infrastructure and publications is then discussed.

It has been said that India is the sought after IT Professionals, they are not just proficient in English but also with their works. Today, almost all areas of computer science research are covered by researchers in India, including topics that are "hot" elsewhere such as multi-media, workflow automation, virtual reality, and hardware-software co-design. In addition, some of the research has even attracted international attention including work on neuro-fuzzy systems, machine learning, genetic and neural algorithms, the modeling and control of flexible manufacturing systems, speech synthesis, databases, and complexity theory.

But what really caught my attention is that Indians were able to develop a solution to cope up with the conditions in conversation of multitude of languages. It means that Indians have developed a machine-assisted language processing. As we all know, not everyone can really speak English fluently but then with the help of the technology that was built by the Indians that would truly help not just their fellow men but also every citizen in the world. Of course, the technology that was developed go through extensive research. And with these developed technology, that would just simply prove that Indians do produce high quality and very good research.

One thing I have also liked about is that, in India, there are 3 categories of institutions that conduct Computer Science Research in India. And these are the following:
· The first one is the six major research and teaching institutes devoted to science and technology. The following are taken from the article. These six institutes are the IITs (of which there are five, with one more coming up in Assam) and IISc, located in Bangalore. These institutions form a select group in the minds of the government as well as the citizens. The next tier of institutions is made up primarily of the Regional Engineering Colleges (RECs), with one located in each state. Also, there are several other universities where computer science research is being conducted quietly. (One such is the University of Hyderabad; researchers here are very active in (collaborative) AI research, keeping close contacts with overseas colleagues.) But a considerable gap does exist between the six top tier institutions and the next because of high teaching load imposed on the faculty, students being, on average, of a lower quality, and finally poorer infrastructure, namely library and computing facilities.

· Government-Sponsored Institutions
There are organizations in India that are funded and supported by their government and different ministries and departments. These are just some of the examples:
o TIFR and the Institute for Mathematical Sciences (MatScience) perform research which is predominantly of a theoretical nature. These are funded by DAE.
o Defence-related work takes place in a number of labs around the country, many located in Bangalore and Hyderabad, both in Southern India. A good example is CAIR which can be described as a "think- tank" serving the AI and robotics needs of Indian Ministry of Defense. It is a component of the Defense Research and Development Organization (DRDO).
o The Ministry of Planning funds ISI, with its primary location in Calcutta. (It is worth noting that the first indigenous digital computer -- fabricated using discrete transistor units -- was commissioned by ISI in 1966 in collaboration with Jadavpur University.)
o NCST also carries out research in several areas of computer science besides having education and training among its functions. NCST is a successor of the erstwhile National Center for Software Development and Computing Techniques (NCSDCT) which was a component of TIFR.
o The Indian Space Research Organization (ISRO), is also involved in computer science work, but most of its work is of an applied nature, in the context of satellites and launch vehicles. ISRO has been building satellites for remote sensing as well as for communication. Its most recent success involved the launch of the Polar Synchronous Launch Vehicle capable of launching 1000-Kg class satellites into sun-synchronous orbits.
o National Aerospace Laboratories (NAL), Bhabha Atomic Research Center (BARC), and Center for the Development of Advanced Computation (CDAC) have had the development of parallel processing platforms for solving computational science problems as the main focus of their computer science research.

How I wish that our country would have one like that. Even just a little support from the government in conducting Computer Science Research and not just depending on outside funding institutions. It may be sad to admit but other countries offer support to our fellow men to conduct research but the Government itself cannot support its own people. One thing is for sure, the issue is really not about money, our country is rich but then with the officials that are in the position do not know how to value Research as much as other countries do. But then, based on the recent State of the Nation Address of the President, she would like to come up with a Department of Information, Communications and Technology. I just hope that this one would push through since having this department; we would have the chance to do research and seek help to the government via this department. And not just that, this would give opportunity to IT Professionals to excel and be heard in the country.

Monday, September 21, 2009

the role of my research topic in my future career!

To start of, while I was reading Hannah’s post, I am really impressed and inspired on what she has gone through just to come up with her research topic. It’s one of the nicest posts I’ve read (no kidding! heheheheh)

Anyway, just to second the motion with what Hannah said, honestly speaking, at first it’s really hard to find a research topic that would be interesting enough not just to my professor but also to my classmates. As I have searched in the web, one of the most common topics I had was on the CO2 Calculator. The mere fact that it’s really technical (I mean it involves both hardware and software implementation), I was hesitant at first, but then what urged to propose it to the class via forum is that “everything is worth a try”, what I am trying to imply in here is that it doesn’t matter if my idea is rejected or not, what really matter is I tried. Gladly, it took the attention of my professor that he told me that if I would make some adjustments or new refinements, it would be a good topic. First question that came up to my mind is, am I ready for everything (I should, perhaps.. hahahaha). Another would be is my knowledge enough to do the research (because what I have in mind that time is the implementation stage of the research) and knowing that the hardware part is not my field of expertise. I am really bothered with the way I think and with my attitude and with the way I act. I am on my 5th year in this University and honestly, I really want to graduate and work.

Time passes by, days to weeks, weeks turned into months. Even our professor have been encouraging us and begging us to post our topics, he even asked what is the problem on coming up with our research topic. He kept asking what our problem is so that he could help us, honestly, I am hesitant, and that question that was raised by my professor stuck me in my seat, I simply asked myself, what is really the problem? Is it the theme? I, myself cannot answer the question. Probably because I didn’t do my part as the student, I got pissed off with my attitude, with my laziness. I am only seeing the smaller part of the theme, I stuck with only one topic and not venturing to other. I am dependent in the web. And knowing GREEN COMPUTING is not just focusing on the larger environmental issues but it started with the small things. What I have in mind is only focusing on CO2 Emissions, computers radiating CO2 and wastes of energy. Honestly speaking, I really do not know what I am doing that time or where my path is going. My professor told us that all of us are planning to fail. I was stunned; I simply asked myself, do I really want to fail after 5 long years of hardships in this University?

During a class meeting, our professor decided to do the research by group. As they say, two heads are better than one. On my part 3 heads are better than one. Together with my group, we had our own brainstorm and honestly our brains are stormed! (hahahaha), and again, days turned into weeks, up until one group’s proposal was approved. I think, that’s the go signal for us, we really have to think as hard as possible. What I have in mind is something that is simple but very useful not just to one person but for everybody. As I was charging my phone, an idea came up to my mind, why not make a mobile application that has an alarm system to notify the owner that the battery is 100 % fully charged. It would not just save energy and electricity but also it reduces CO2 Emissions and other harmful gases. It would not just be very helpful to one particular person but it’s everybody who has mobile phones.
As I search in the web, there is an existing IPhone application that has the same idea with mine. But to add a twist with the application, I simply added a feature wherein the application can send text messages to people who can remind the user to unplug the charger. I think the application would not just help the environment but it would be very beneficial to the users not to spend money much. Since, with the help of the application, it can prolong the battery’s life and a person would not spend much money in buying new phones (one cause would be they tend to change their phones because it can no longer be used which would be the result of overcharging). If there are many junk phones, another problem will occur; there will be an increase in E-Waste. Hey! My application is really helpful and its benefits are really rewarding! And as an IT student, it gives motivation to me knowing that developing a mobile application for a good cause and would contribute not just for the betterment of one person, for every mobile user, for every human being but also to save our Mother Earth in my own simple way. After proposing the topic, our group was surprised with the comments with our classmates, they said that it’ really useful and helpful. And gladly, our topic was approved and recently we were able to proceed to the Review of Related Literature stage of our research. It maybe hard at first but then reflecting on a text message that was sent to me by my friend “DO NOT ASK GOD TO GUIDE YOUR STEPS IF YOU ARE NOT WILLING TO MOVE YOUR FEET”, I know that we are getting there, but with the guidance from up above, I know that we will reach our goals.

Why am I telling you my own journey as I came up with my topic, I think it would simply explain the impact of my research topic in my future career. If one would be observant enough in very small and simple things that are going on with his surroundings, and would be very curious enough to formulate questions, I think that would give a very good impact in research. On my own point of view and basing from my experience in my on the job training, the role of my research topic in my future career is very simple. I would like to develop applications that are useful, interesting and would contribute in saving our Mother Earth. I would like to indulge myself in organizations that do have advocacies in Green Computing. I would like to be a developer, developing any applications that could help each and every one in the world. I maybe very ambitious but that’s my simple way of foreseeing my future. Aside from giving my family a good life, I would like to let them live in a healthy and livable environment. Most probably, if given the chance, I would like to start of here in Davao City. I know that there are students who are interested in Green Computing. What I am trying to say is that, we should not wait let things get worst. As we can see today, we’ve seen changes in our environment.

As far as I can remember, while I was watching a documentary of Al Gore which is entitled “An Inconvenient Truth” which tackles about Global Warming which is a result of abuse of the human kind to the environment. The very simple explanation of global warming is that whenever we want to eat an ice cream, it would just simply melt and we cannot eat it anymore because of the intense heat that we are experiencing. Al Gore pointed out that in ten to twenty years from now, CO2 Emissions will double up and the ice that is on the North Pole would melt and would cause lands to sink. Even today, here in Davao City, we are experiencing the effects of global warming, even in an ample of rain, the downtown do experience flood. And it is the first time in my whole life here in Davao City to see flood up to the knee.

What I am trying to imply here is that, we can see the problems today. Why not implementing solution to lessen the problem right? That in our own way of unplugging the unused wires would help save our mother earth. We may not see the impact of doing the solutions today but surely in the near future, we would be fulfilled and satisfied.

To end this, there are lots of ways in saving our Mother Earth. And in my future career, the impact of my research topic today would truly make a difference and would leave a good mark and experience as to what will in-store for me and my career in the future. Good Day!

Monday, September 7, 2009

How do we know if a research is good or not? How are they evaluated?

Assign5

How do we know if a research is good or not? How are they evaluated?

The question is tough (hehe). Anyway, based from my readings, I have come up with the factors to be considered for the evaluation of a good research paper.

According to Simon Peyton James of Microsoft Research, Cambridge, he stated that writing papers is a skill, it is a skill that is worth learning. Well for me, it’s true, it is in writing that we can express our great ideas and also if it is backed up with evidences and documents that would support our ideas. Also, a good writer should also be a good reader. Am I out of the topic? Hehehe, I get carried away.

As Simon Peyton said that papers communicate ideas, is one of the factors that need to be considered in evaluating a research. A good research should infect the mind of the reader with his idea like a virus in our computers. As the saying goes, great ideas are worthless if you only keep it by yourself. That is why we write papers and do research right?

Another factor would be the presentation of the idea. The researcher should figure out what is his idea. The researcher should make certain that the readers will have no doubt on what the idea is. In other words, the researcher should state the main purpose of the research. We may somehow relate it with the “ping” or a ring of a bell, in which the research should just have on ping or one clear and sharp idea. In presenting an idea, the researcher should explain it as if he/she was speaking to someone. He/she should convey his/her perception towards the readers that even if the readers skip the details, they can still take something important from what they have read about.

The researcher should also state the purpose of the paper, he/ she should present a situational analysis that would state the problem, of course, and he/she should make it an interesting and unsolved problem, then after stating it. He/she can now present his idea, should explain his idea properly stating on how to solve the said problem. Example, in the abstract of his research, by just reading his papers abstract, the reader would know and would understand what his research all about. According to Kent Beck, the abstract should contain four sentences. The first one is that the researcher should state the problem first, and then he would say why it is an interesting problem. Next, the researcher should state what does his solution achieves and should say what is next or what follows from the presented solution. Another example would be in the introduction of the paper, the researcher can use example or examples to introduce the problem.

In addition, another factor that is needed for the evaluation is the relevance of the research to the readers. When we say relevant, it simply means that it has importance to people or it has a great impact on the lives of the people. A reader would give his time and attention to one thing if he/she can relate into or it has something that took his/her interest with. For example, as an information Technology student, our research is all about Green Computing. For me, the topic is really interesting that it pertains to the impact of technology to out Mother Nature and that we should provide ways to minimize and lessen the impact of it to the environment. Knowing that one of the major contributors to global warming is the technology itself that we use everyday.

It’s really hard to come up with a topic but after a while, we have come up with an idea which turned into an approved research topic.

In addition, the research should also be evaluated by the appropriateness of the methodology used to come up with the results. Another factor would be whether the idea or the research is proved to be rationally consistent; this one pertains to the results of the study or the research that was made. Perhaps the results that came off from a survey, does the mean, median and mode correct. Does the questionnaire used for the survey was validated by an expert, does it go through a series of validation. Stuffs like that. One thing that I have kept in mind was that, every research or in everything that we do, we should take into consideration the standards or the guidelines presented by some organizations. There are some simple guidelines that we should follow and I think the most basic and the most important one is citing the references and acknowledge them properly in your research. Since if without them, you cannot come up with a topic that could improve not just your life but also the lives of other people.



3rd reading...

Why Hackers Do What They Do: Understanding Motivation and

Effort in Free/Open Source Software Projects1


Karim R. Lakhani* and Robert G Wolf **

*MIT Sloan School of Management | The Boston Consulting Group


**The Boston Consulting Group

September 2003



SUMMARY:
The research paper is all about the stating the outcomes of the study on what are the motivations behind the individuals for their continuous contribution to the Free/Open Source Software. In other words, what are the factors or what are the driving force to the developers to give their much time and effort in developing Free/Open Source Software.

What are the motivations of the F/OSS developers?

In the paper, they have stated and reviewed the two types of motivations. These are:

Intrinsic Motivation
From the word intrinsic this means a motivation that is found deep within a person. It stated there that when a person is intrinsically motivated, he/she is moved to act for the fun or challenge entailed rather than because of external prods, pressures, or rewards. And again, according to Lindenberg 2001, intrinsic motivation is separated into two distinct components: 1. enjoyment-based intrinsic motivation and 2. obligation/ community-based intrinsic motivation.

According to Deci and Ryan 1985, the idea behind of the intrinsic motivation is having fun or enjoying oneself when taking part in an activity. Csikszentmihalyi (1975) proposed a state of “flow”, in which enjoyment is maximized, characterized by intense and focused concentration; a merging of action and awareness; confidence in one’s ability; and the enjoyment of the activity itself regardless of the outcome.
On the other hand, the obligation/ community-based intrinsic motivation, according to LindenBerg (2001), he stated that individuals may be socialized into acting appropriately in a manner consistent with the norms of a group.

Extrinsic Motivation
The idea behind the extrinsic motivation is gaining rewards (whether direct or indirect) for doing a task or an activity. In other words, the developer is paid and most probably he/ she are given incentives for doing such activity.


How does the study done?
The researchers did a sample web-survey. The samples that are to be included in the survey was from the individuals listed as official developers on F/OSS projects that is found in SourceForge.net, the F/OSS community web site. The researchers sent personalized e-mails to each individual inviting them to participate in the survey. The researchers also provided or assigned a random personal identification number for accessing the survey. The first part of the survey was done from October 10-31,2001 generating 526 responses giving a response rate of 34.3% . The second survey was conducted on April 28, 2002 that generated 173 responses out of the 573 mails sent, giving a response rate of 30.0 %

The results:
According to their study, they’ve found out that 87 % of all the respondents received no direct payments, 55 % of them contributed code during their work time. The combination of those who received direct payments and those supervisors knew their work on the project created do consists of approximately 405 of the sample.

On the number of hours per week spent on a project, they’ve found out that the respondents spent an average of 14.1 hours on all their F/OSS projects and 7.5 hours on the focal project.

On the personal creativity and flow of the respondents, based on the research done, the respondents noted a very high sense of personal creativity in the focal projects. More than 61% of the respondents said that their participation in the focal F/OSS project was their most creative experience.

Motivations to contribute
With respect to the results of the said survey, the top single reason to contribute to projects is based on enjoyment-related intrinsic motivation: “Project code is intellectually stimulating to write” which gains 44.9 % of all the respondents. Improving programming skills, an extrinsic motivation related to human capital improvement, was a close second, with 41.8% of participants saying it was an important motivator. Approximately 20% of the sample indicated that working with the project team was also a motivation for their contribution.
Paid contributors are strongly motivated by work-related user need (56%) and value professional status (22.8%) more than volunteers. On the other hand, volunteers are more likely to participate because they are trying to improve their skills (45.8%) or need the software for non-work purposes (37%).

To end, the study shows what are the driving force of the developers to contribute to the F/OSS projects and what is good in here is that, whether it is intrinsic or extrinsic motivation, there are many people who contributes to the fast growing and success of the F/OSS community.

Evaluation:
The research paper really interests me that it shows the motivations that affect the developers to contribute to the continuing success of the F/OSS community. The research is very informative, complete in a sense that it gives the information on who are the respondents, the scope of the research as well the results and their conclusion.

2nd reading... hehehe

Charity Begins at… your Mail Program




Peter G. Capek, Barry Leiba, Mark N. Wegman

IBM Thomas J. Watson Research Center,

Hawthorne, NY 10532

{capek, barryleiba, wegman}@us.ibm.com


Scott E. Fahlman

Carnegie Mellon University

Computer Science Department

Pittsburgh, PA 15213






Summary:

There are many methods introduced in the industry to minimize the spam mails or junk mails. One of which is asking the sender of an e-mail to pay the recipient just to prove that the sender is not a spammer. And this study introduces another technique, “charity seals” which means that the money you spent will be donated to the charity, and most legal users would not mind dong it and the money they will be spending is for a good cause.

The primary interest of the study is more on the e-mail involving the users which are not familiar or do not even know each other. Nowadays, the information about the sender is usually not confirmed or not verifiable at all and these would result to the spam problems.

The study also introduced number of approaches of solving the problem of spam e-mails and comparing it to the “charity seals”. One of those is the one-time-use or “passworded”-e-mail address idea. Also, there are many authors that promote “sender pays the recipient” schemes that suggest the exchange of money. The idea in here is that, if the sender is caught as a spammer, the recipient can collect the money; otherwise, the recipient will return the money to the sender. The thought in here is just to determine whether the sender is a spammer or not. Another approach is using CAPTCHA (“Completely Automated Public Turing test for telling Computers and Humans Apart”) scheme. The primary intention of this scheme is the idea that any human can answer the CAPTCHA easily and would be difficult or impossible for the computers.

Also, included in the paper that Fahlman and Wegman have proposed another approach, it is the “sender pays charity” in which the idea of the “charity seals” have taken. The idea is similar to the “Christmas seals” in which it has been used by the United States for quite some time now. Since Christmas is the only time that people will send large amounts of conventional mail. The idea is, these seals are distributed by a charity (using paper mails) with a solicitation for a contribution. The sender will only use the seals if he/ she will make a contribution to the charity that issued the seals.

The idea of the “charity seals” is the same as with the one stated above, the exchange of money and the electronic version of the seals. The only difference is that it tightens the combination; the seals are not reusable and not forgeable.

How it is done? At first the sender will choose what specific charity which he will donate the money. Then, an agency collects donations on behalf of the charities. The agency operates an Internet service which supplies to the donors a custom-created seal which the sender can include in his e-mail. The seal is essentially a document containing at least the recipient’s identity, an amount of money donated and a unique number – perhaps a time stamp – and the sender’s identity. It is digitally signed by the agency, and is proof that the sender has made a qualifying donation to a participating charity. Effectively, the agency keeps an account for each contributor and debits it whenever a seal is issued.

If the task is giving money, the system requires a connection with some banking system. Typically this would be done using a credit card. Senders probably do not want to give credit cards out to everyone they send mail to, and most recipients are not set up to take credit cards. Financial institutions do, however, have the idea of escrow accounts. The notion of escrow is that one person puts money into an escrow that is trusted by both parties, and they agree to terms under which the money would be released to one or the other party. This makes it much easier to handle payments when one party could disappear.

One way to achieve the advantages of a central server when the task is delivery of money is to have the sender establish an escrow account for each recipient. If the recipient votes the mail as spam within some pre-established time limit, the money is paid (that is, the task is performed). Otherwise it is returned to the sender. If the time limit expires, before the recipient reads the mail the system has the options of assuming that if the sender was willing to risk the money it is probably legitimate mail, or of not delivering the mail to the actual person until money is placed back in the escrow account.

There are many approaches in addressing the problem of spam mails and one of which is the “charity seals”. This would make the cost of mail low to those who are legal users and making it expensive to the spammers.


Evaluation:

It is true that spam mails do really exists and does contain problems. There are many people who have been victims of the spammers. I think, the awareness of the people about this problem should be the number one that should be addressed into. With regards to the study, it’s a good idea that they have introduced this kind of approach since giving money to charities is a good cause though you spend a little money. I think, they’ve introduced the idea but with respect to the implementation of the said methodology are still missing.

1st reading...... hehehe

A Biologically Inspired Immune System for Computers

Jeffrey O. Kephart

High Integrity Computing Laboratory

IBM Thomas J. Watson Research Center

P.O. Box 704, Yorktown Heights, NY 10598

Summary:

The study primarily focuses on the computer viruses that are in fact being thought of as a serious problem in the industry nowadays. According to the study, two alarming trends are likely to make computer viruses a much greater threat. The first one is the speed at which new viruses are being written is high and accelerating. Imagine that new computer viruses are being created and being spread almost every after minute! The second is the trend towards the increasing the interconnectivity and interoperability among computers which would result to the fast spreading of the computer viruses.

Then, the IBM conducted a study and was able to create an immune system for computers. The primary features of the immune system are the following:
1. Recognition of known intruders.
2. Elimination/neutralization of intruders.
3. Ability to learn about previously unknown intruders.
o Determine that the intruder doesn't belong.
o Figure out how to recognize it.
o Remember how to recognize it.
4. Use of selective proliferation and self-replication for quick recognition and response.
Their system develops antibodies to the viruses and worms that were once encountered by the computer system, the computer system remembers them and would respond quicker if those viruses and worms will again attack the system.

With respect to the immune system of the computers, the system would not recognize a virus via exact match or exact information or data with regards to that virus but it is detected via an exact or fuzzy match to a relatively short sequence of bytes occurring in the virus (termed as the signature).

How do they eliminate the intruders? If the computer immune system were to find an exact or fuzzy match to a signature for a known virus, it could take the analogous step of erasing or otherwise inactivating the executable file containing the virus.


Their system also has the ability of learning about the previously unknown intruders. First, the process by which the proposed computer immune system establishes whether new software contains a virus has several stages. Integrity monitors, which use checksums to check for any changes to programs and data files, have a notion of ``self'' that is as restrictive as that of the vertebrate immune system: any differences between the original and current versions of any file are flagged, as are any new programs. Then, Mechanisms that employ the complementary strategy of ``know thine enemy'' are also brought into play. Among these are activity monitors, which have a sense of what dynamic behaviors are typical of viruses, and various heuristics, which examine the static nature of any modifications that have occurred to see if they have a viral flavor.

If one of the virus-detection heuristics is triggered, the immune system runs the scanner to determine whether the anomaly can be attributed to a known virus. If so, the virus is located and removed in the usual way. If the anomaly can not be attributed to a known virus, either the generic virus-detection heuristics yielded a false alarm, or a previously unknown virus is at large in the system.
At this point, the computer immune system tries to lure any virus that might be present in the system to infect a diverse suite of ``decoy'' programs. A decoy program's sole purpose in life is to become infected. The algorithms extract from a set of infected decoys information on the attachment pattern of the virus, along with byte sequences that remain constant across all of the captured samples of the virus. Next, the signature extractor must select a virus signature from among the byte sequences produced by the attachment derivation step. The signature must be well-chosen, such that it avoids both false negatives and false positives. In other words, the signature must be found in each instance of the virus, and it must be very unlikely to be found in uninfected programs.
With regards to the usage of self proliferation and self-replication for the quick recognition of the viruses and worms, their system also has the ability that when a computer discovers that it is infected, it can send a signal to neighboring machines. The signal conveys to the recipient the fact that the transmitter was infected, plus any signature or repair information that might be of use in detecting and eradicating the virus. If the recipient finds that it is infected, it sends the signal to its neighbors, and so on. If the recipient is not infected, it does not pass along the signal, but at least it has received the database updates -- effectively immunizing it against that virus.

Their system develops antibodies to the viruses and worms that were once encountered by the computer system, the computer system remembers them and would respond quicker if those viruses and worms will again attack the system.

Evaluation:
The research is not bias. It is interesting that the IBM develops an immune system similar to the immune system of human beings. The research is very informative in a sense that it shows how to avoid and even fight the computer viruses by providing an immune system for computers.

key factors in publishing a research in top-tier journals

First and foremost, before I discuss the key factors, I just want to say what’s really on my mind right now, doing a research and coming up with a good research topic is really a tough job. As what Ms. Hernandez said above, it needs time, focus, effort and proper funding. I totally agree with that. Almost everyone in the class is really having a hard time in coming up with a good research topic. I think what is more important is it’s usefulness to the people, what I am trying to say is that we should come up with a topic wherein it’s simple but useful. Anyway, as what I have said above, the difficulty of coming up with a good topic is also same as true with publishing a research in the top-tier journals.

Let me discuss it one by one, from the most simple down to the complicated (I am not sure if “complicated” is the right term, hehe). Anyway, I think, one of the simplest factors that a researcher should follow is the standards of writing, most probably the proper citing of references, providing good English or the most appropriate word is the grammar or the proper usage of words. The researcher should also include glossary, perhaps if there are words that are unfamiliar with the readers. Another factor is the presentation of the research. The research should be easily understood by the readers and would catch their attention.

Next, it’s the timeliness and relevance of the information or the research, example; right now we are doing a research with regards to the Green Computing. Yes, it’s timely, since each and every one of us are experiencing global warming and climate change. We should think and research well on how to minimize the emissions of different harmful gases. In the aspect of technology which is one of the major contributors to global warming, we should do something that could lessen the impact of it to the environment by providing means and services that could protect the environment. Of course, the timeliness of the information would result to another factor which is the impact of it to the people.

Then, another factor would be the precision of the research. This would answer the following questions like does it follow the specific standards? Does the source of the information reliable? Was the information correct? Does the information itself is consistent? What are the methods or the methodologies used? Is the methodology appropriate for the research? Things like those.

As the saying goes it is easier to say than doing it. Doing a research is a tough job. As far as I can remember, in one of our class discussions, a good researcher should be patient and should be full of enthusiasm. If we will just persevere and if we will just give and do our best, time will come that everything we’ve done will be rewarded it may not be money but with the blessings from up above.

Tuesday, August 25, 2009

what a day!!!!!


before anything else i would like to greet a happy birthday to someone who means a lot to me!

to my dear friend arianne!!

a happy birthday to you!

if you don't want to ruin your day, don't think and even mind the people who hurts you!


God Bless Dude!

Tuesday, July 21, 2009

USEP's Enrollment System ... my views and opinions...

I have been in this university for quite long time now (to be exact, five long years..) and based from my experience, the enrollment in the University needs a lot of patience, a towel or hanky for the sweat (I am not kidding!) and lastly, good and strong bones as we go back and forth from the corners of the University. It may sound like it’s funny but to tell you honestly and talking from my experience I am dead serious with this thing I am saying here.

Anyway, to start of, way back in my freshman days here in the university, to tell you frankly I was a bit confused on what the enrollment procedure is (what are the steps involved) and where are the offices located inside. But then as what I have seen with the enrollment system now, I am quite impressed since it is really quite obvious that the administration have really prepared for it. To answer my case stated above, during the summer days, I have seen a so-called map of the University in UGTO where a freshman usually stays and deals with that office in his or her early days inside the university. Also, the university really make an impact on putting tarpaulins(which shows the steps involved in the enrollment) in every strategic locations in the University, though, the tarpaulin that is found just as the wall covering the comfort room in the ground floor was once located near the dean’s office of the Institute of Computing. Before digging deeper (for sure!), it was indeed a good move and putting tarpaulins was a big help for the new students in the University that they wouldn’t have to be confused and disgusted on what to do and where to go during their enrollment unlike my experience.

I will enumerate the steps involving the new enrollment system.

For the new students and transferees, they have to follow the steps:

STEP 1 – they need to go to the UNIVERSITY GUIDANCE AND TESTING OFFICE for:
- Encoding of Student Information.
- Identification Number Assignment.

STEP 2 – then, they need to go to the OFFICE OF STUDENT SERVICES this is applicable only for scholars for their:
- Scholarship Application.
- Releasing of Scholarship Card.

STEP 3 – they need to proceed to ROTC/CWTS offices for their:
- Registration and Sectioning of ROTC/CWTS.
- Releasing of ROTC/CWTS slip.

STEP 4 – after that, they should go their respective COLLEGE to:
- Present enrollment requirements.
- Advising / Pre-Registration.
- Payment of other fees (Local Council fee, OCSC fee, insurance fees, collegiate headlight fee).
- Encoding of the Pre-Registration Form.
- Assessment of fees.
- Temporary Certificate of Registration Printing

The next step would be the payment of the matriculation fees and since there are two types of students here in the University specifically scholars and non-scholars, the step is categorized into two and these steps are:

STEP 5 – the scholars would go to the STUDENT ACCOUNTS (bookkeeper) for:
- Submit Temporary Certificate of Registration.
- Posting of Accounts.

And for the non-scholars they need to go to the:
STEP 5 – CASHIER
- Submit Temporary Certificate of Registration.
- Payment of Matriculation.
- Official Receipt Printing.

STEP 6 – REGISTRAR
- Submit enrollment requirements.
- Form 138 (High School Card).
- Photocopy of NSO Birth Certificate.
- USEPAT Entrance Exam Result.
- Admission Slip.
- Medical Certificate.
- Certificate of Good Moral (Original).
- 2 pcs. 2x2 recent ID picture.
- Prospectus of the enrolled course.
- 1 pc. Long brown envelop.
- Official receipt of tuition and other fees.
- Printing of Official Certificate of Registration.

And for the old students, here are the steps involved:

STEP 1 – STUDENT ACCOUNTS.
- Check students’ accounts.
- Check balance.
- Clearance signing.
STEP 2 – COLLEGE
- Advising / Pre- Registration
- Payment of other fees (Local Council fees, OCSC fees, collegiate headlight fee).
- Encoding.
- Assessment of fees.
- Temporary Certificate of Registration Printing.
Same situation would happen as what I have stated above on the steps involved in payment of matriculation. These can be done in the following ways:

STEP 3 – STUDENT ACCOUNTS (applicable for scholars only)
- Submit Temporary Certificate of Registration.
- Posting of Accounts

And for non-scholars:
STEP 3 – CASHIER
- Submit Temporary Certificate of Registration.
- Payment of Matriculation.
- Official Receipt Printing.


STEP 4 – REGISTRAR
- Present Clearance.
- Present Official Receipts (Tuition and other fees).
- Printing of Official Certificate of Registration.

Here are the enrollment procedures for those students who shifted from other course:

STEP 1 – STUDENT ACCOUNTS.
- Check students’ accounts.
- Check balance.
- Clearance signing.

STEP 2 – FORMER COLLEGE
- Request to shift.
- Recommendation to shift.

STEP 3 – NEW COLLEGE
- Acceptance of Shiftee
- Advising / Pre- Registration.

STEP 4 – UNIVERSITY GUIDANCE AND TESTING OFFICE / OFFICE OF STUDENT SERVICES
- Student Profile Updating

STEP 5 – NEW COLLEGE
- Payment of other fees (Local Council fee, OCSC fee, insurance fee, collegiate headlight fee).
- Encoding.
- Assessment of fees.
- Temporary Certificate of Registration Printing.


Same situation would happen as what I have stated above on the steps involved in payment of matriculation. These can be done in the following ways:

STEP 6 – STUDENT ACCOUNTS (applicable for scholars)
- Submit Temporary Certificate of Registration.
- Posting of Accounts.

STEP 6 – CASHIER (applicable for non-scholars)
- Submit Temporary Certificate of Registration.
- Payment of Matriculation.
- Official Receipt Printing.

STEP 7 – REGISTRAR
- Present Clearance.
- Present Official Receipts (Tuition and other fees).
- Printing of Official Certificate of Registration.


Before getting into details of the flowchart (as shown in the tarpaulin), I would like to give my observations with the new enrollment procedure. I may say, as with the process, nothing has changed except for some simple things that I have noticed. One of which is the renewal of scholarship, based on the diagrams that we’ve made during our SAD1, renewal of scholarship was a part of the enrollment procedure for the old students, but it was not shown in the chart. And to think, I, as a scholar, my subjects cannot be encoded if my scholarship card is not yet validated and renewed. On my own, it would be the initiative of the old students what to do. But how about the new scholars? The new students? Come to think of this, scholarship cards need to be validated and renewed every after semester. And if a freshman is a scholar and the next semester comes, if he/she will follow the chart given, he/she will be confused. Why? It is because, he/she still needs to be told that his/her card needs to be validated by the Office of the Student Services and since in the chart it is not shown that the scholarship card needs to be validated. Imagine yourself in that situation, you are done with the payment of local fees, ocsc fees and publication fees then you proceed to your adviser and secure a prf, but then, when you reach the encoder, he/she will told you that your subjects can not be encoded since you scholarship card is not yet validated and you are not yet renewed. And with this, you have to go to the OSS for you to be validated (imagine if that your college and the OSS are located in both ends of the university). Time and energy is wasted. Remember when I mentioned above that you need to have a towel or a handkerchief since the OSS is located near the visitor’s gate of the university.

One thing I have actually noticed is the number of scholars being entertained by the OSS. This semester was really dreadful and really needs a lot of patience; the line in the OSS was very long, and very congested. You yourself do not even know what lines are for the application of scholarship or what lines are for the renewal. I would suggest, that the OSS would have to do is to have an arrangement on the classification of lines (queue of people) on who are applying for scholarships and for those who are on just renewing. One thing I have also observed in that office, there are District 1 scholars inside the office, getting their ORDER TO RENEW FORM, and imagine the number of students inside and the requirements they need to give in order to have that form! I would suggest that there should be a specific place for that most especially that District 1 Scholars are the most numbered amongst the scholarships. And on my part, why not ask the scholarship provider to ask for assistance? What I am trying to say is that, first district congressman may somehow provide a simple room that would cater the students, right? So that the OSS will not that much congested.

Nonetheless, let’s get back into business; one thing I have also noticed in the process is the involvement of the guards during the payment of tuition fees and going to the registrar. For me, this one is highly commendable, my two thumbs up to them! They were able to get the students organized that the place will not that be filled up with people! There is a specific place for the entrance and exits. In the cashier and registrar’s area, there are seats available and arranged in a manner that the students will just have to wait for their turn. And for me, since I am a scholar, it was easy for me since at that time, there were just few scholars who are inline in the seats, If I am not mistaken, it took me for about 15 minutes to finish my transaction in the bookkeeper. But to my surprise, the two copies of temporary certificate of registration was all taken by the bookkeeper and what I have in hand is just my scholarship card only. The bookkeeper told me that I should proceed to the registrar. Here’s another thin I have noticed, before, after paying our tuition fees (for non-scholars) and posting of accounts (for scholars) our COR is manually brought to the registrar’s office and we’ll just have to wait if our name is called. I have a very disappointing experience on this one, it all happened on the 2nd semester of last school year. Since I am a scholar, it was easy for me to go to the bookkeeper and be able to finish the entire process before noon, as to my surprise, my COR was manually brought to the registrar’s office, as hours passing by, I have noticed that my name was not called and yet those students who are late than me were called already. I was so disgusted, I asked the student assistant in that office on why my name was not yet called, she told me, what’s your last name, I mentioned mine, unfortunately, my COR was at the last, and covered by all the new COR’s. Gladly, this semester, was quite impressive since it is not manually brought, of course, a big thanks to the new system developed by the two of the instructors of the Institute of Computing.

Here is also another problem that occurred. Yes, as what I have mentioned, the COR’s are not manually brought, but then all of the students have to fall in one line just for going to the registrar’s office. The security guards were the one who give the students priority numbers. But then again, it took me for about an hour and thirty minutes (1 hour and 30 minutes) before being entertained by the registrar and have my official certificate of registration. Unlike before, that every college does have their own registrar, and to the Institute of Computing, it was really easy and fast because of the small number of students. It would be an advantage if they would stick out to the one college one registrar policy (hehehe, since it would be easy for us IC students). And to those college in which there are large number of students probably, 2 of the employees can help it out.

I have noticed some changes (of course! nothing is constant except change right?)
anyway, i would just compare the before from now to explain it carefully.

Before, during the signing of clearance, one of the requirements of the bookkeeper are the receipts of the students, receipts that would notify that they have already paid their liabilities to the school. if the students would fail to comply the requirements then the student would left nothing to do.

But now, the process becomes clearer. The bookkeeper would just require the clearance, nothing more. All the bookkeeper needs to do is to check on the database whether the student have already updated his/her account. The clearance would be easy and faster with this manner.




Wednesday, June 24, 2009

USEP goes in-house...

Last semester, two of our instructors were tapped by the university to do the enrollment system. Summer, were the dry run days of the system and this semester is the full implementation of the said system.

On the question stated above, what are the possible reasons on why the university tapped in-house resources? Was it because they’ve realized that they can make money out of it (hmmmm.. sounds fishy,bato bato sa langit ang tamaan wag magalit!) or what? Did the university think of the possible consequences in tapping in house resources? For example, the classes that the instructors gave up just to do the enrollment system. We, students were the ones who are greatly affected on this. Affected in good and bad ways (I’ll tackle it later).

Anyway, for me these are the reasons:
1. Dissatisfaction with the provider
2. MONEY
3. Problems on the system and the maintenance of it.
4. Taking full advantage of the resources inside the university.

During our SAD 1 (Mam Tammy was still our instructor), we went to the registrar’s office and asked several questions. Our registrar told us that they have encountered a lot of problems with the old system; she just didn’t tell us what those problems are (sorry on us, ehheheh). Anyway, from there I can clearly say that there are problems that are not addressed by the old system, probably the university felt that they are not satisfied with the old system and it is time to change.

Second, MONEY, considering the financial crisis that the world have gone through, so organizations like USEP should really think twice if they are going to spend money for a particular service. For me, every peso counts, we should think of the quality of the service being given. And as what I have stated above, is it really worth to spend 70,000 pesos a month if the provider cannot address the problems of the old system in the university? For me, it’s not, there are still bigger problems that need attention, for example, the Laboratory 1 of IC, yes, there are computers but it cannot accommodate the students, some of it are not functioning well or even not working at all. I am sorry, I just cannot help myself to react on the situation, and I just want to express my sentiments on this. Let’s just go back to the topic, on my own opinion (which I guess I’ve been really telling, hehe) the University thinks that if they will tap in-house resources, they can save more on the money and making the most of the resources available inside the university.

My third reason is, in terms of the problems and maintenance of the system, it would be good if it is in-house resources since the developers can immediately resolve the said problems or if there are departments who have difficult time in using the system, they can be attend to their needs right away. For me, the problem if it is outsource, it would take time contacting the developers, probably there are still other commitments or other important matters they need to attend to, so, the transactions within the university would be delayed right? Even though there are IT specialists in the University but still they cannot resolve the problem since they do not have the right in configuring the system (since it is not own by the university).

Taking full advantage of the resources inside the university is my last reason. Why did I say so? As what I have said above, we should make sure that every time we spend money it will give us the quality that we need, we should also make sure that it is long lasting and would address our problems. The university does have very good in-house resources and two of my instructors are part of it. Mam Tammy is the 2nd to have a doctorate degree in IC, I’ve also heard that Mam Tammy was also tasked before to develop and implement a system in the university. I may not know her that much but I can clearly see that she would not achieve what she has achieved today if she’s not good right? It’s really my first time to be with her but then it didn’t pushed through because of the development of the enrollment system of the university in which she is tasked to do.

Engr. Cagape is really good in managing and developing systems most especially in database. Being with him (I mean, as his student for quite long, way back on my first year in college), I can clearly tell that he has the skills and very excellent working attitude. Also, as far as I can remember, during our lecture in database days, he asked a question “how long will a system live?”, all of us were quiet and do not really know what to answer (no kidding!). There, he told us one of his experiences, he made a system for a specific store near UIC, and the system is still running up to now, he told us, that as long as the system can answer all of the client’s needs and problems, then, the system would live longer and the client is satisfied.

For me, those were my reasons. Why would the University go with outsourcing when it has great in-house resources, right? There are actually pros and cons in our every move right? But, was it a good decision on the part of the university? For me, yes! Why do I say so? Since USEP has resources, why not use it, right? There are hidden talents and skills available most especially from the students, they can also take part in the development of a system, knowing IC it is the cream of the crop in USEP. And in view of the fact that we know what the problem is, therefore we are the ones who knows how are we going to solve it.
Going back to what I have said above that tapping in-house resources do affect the university in a bad way. WE, students are greatly affected! When we say “experience is the best teacher”, yes it’s true, now during lectures, the more experienced people do have so many things to share to his students on the subject matter, thus, it will also help the students enrich their knowledge and losing the instructors with experiences would greatly affect the students. But on our part, even though we didn’t pushed through with Mam Tammy, we are with RSG who has great ideas and would help us conquer our fears and discover our strengths (no kidding sir!hehe). There was one thing that Sir RSG told us, we should be proud and happy that our instructors are practicing what they have learned and experienced not just talking about theories etc, which is true.

To end this, all I can say (is this really all I can say? hehe) we should stand up for whatever decisions we made and are going to make in the future.

Sunday, June 21, 2009

an inspiring message...

"Never hate the times where you failed. These are the times where you show the world that failures don't define you but it makes you stronger. "

a text message that was sent to be my friend.

just want to share it with you guys, so that you will also be inspired..

hehe..

ciao!

Friday, June 19, 2009

try and try...

am having a hard time to log-in in USEP Virtual Learning Environment..
damn!

as my title goes..
try and try until i succeed!

anyway, one of my friends have told me, if i want a part time job..
hahaha
funny it may seem but it sounds great

UIC is looking for a facilitator for their CWTS classes.
of course, CWTS is once a week, right?
the class is only on Saturdays..

if i am to accept the offer, i will be paid for 1000php every month
meaning, if there are 4 saturdays in a month, then 250 every saturday, right?
and i will be holding 50 students for the said subject.

on my part, it would be a big help since i have a lot of expenses
this semester, i just don't want to mention it, hehehe
and i don't need to ask for money from my parents..
hayz..

Bro, help me decide..
hmmmm...


should i accept the offer?





Sunday, March 29, 2009

it has it's own purpose!

i never thought that march 27 would be a big day for the MOVERZZZ

we made it!
we were able to proceed to the Design Phase of our Systems Analysis and Design Project.

and sir Randy suggested a name for our system and the group adopted it.

FreeExpress System is now....

"E-dikit"
haha

we find it really good and nice..
thankz to sir..

yeah, the group is having problems with each other,
i just hope and pray that each and everyone in the group
would open their hearts and minds..
possibly..
open their hearts for forgiveness

yes, it's easier to say than to do.
but we are one group

as one of my classmates said, "you should resolve it, your group need to talk, because you're ONE!"

hopefully, with God's grace
the group can surpass the challenges and trials..
but one thing is for sure...

it has it's own purpose!
ciao!
God Bless Us All!

A big thanks to Sir Randy and to our Bro!

hand-out in financial management

pipol concerned:

here's the link(url) for my report in financial management!
http://www.fileden.com/files/2008/12/12/2220521/reporter4_group4_alcoriza.doc
tnx

Wednesday, March 25, 2009

imageworld!!!







these were the times that we visited the Image World Digital Printing Inc.
formerly known as the DCT Printshop
the VP-Admin showed as a very warmth welcome!
we're very glad that we were able to have the chance to work with these people!
God Speed!
Ciao!


Designed by
Blog Need Money