Author: charlessuobiron

Movies showing different cultures are my favorite! Such are The Bourne Series and Mission Impossible. I am greatly fascinated with the uniqueness of each nation. It speaks my heart for travel and cultural experience :)

Information Tech: It’s Signifance

“I have found a desire within myself that no experience in this world can satisfy; the most probable explanation is that I was made for another world” (CS Lewis).

CS lewis
As co-journers of life, we are consistently seeking for its meaning and purpose so to forward in the right direction. With the current fast-paced setting and the voices surrounding us, we may tend to be like waves, carried to and fro by the wind. We have to decide and make a stand, else we end up falling on any side. I believe that the  quality of our decision navigates us to succeed. How can we have such a decision? If it takes accurate information, how can we gather and interpret such decision? That questions raised, I have experienced that Information Technology (IT) has now become crucial in our daily sojourning.

That questions raised, I have experienced that Information Technology (IT) has now become crucial in our daily sojourning.

In different business, IT is basically a box for precious treasures. It safe keeps or protects the business’ data, information, and knowledge from any possible form of lost. Documents in offices especially in giant organizations are countless; thus, it has be kept and protected not only in organized cabinets but virtual folders has now become a necessity.
IT has served as a tool for analysis. Countless number of software are made daily, from simple to complex ones. Regardless, IT has become very useful to provide necessary analysis so organizations can have a substantial decision to ultimately reach its goals. As observed, without such usefulness, any business still in conventional ways of running, may be left behind from others who uses IT as a competitive edge. IT serves as a simplifier of business processes in a way that intangible words and ideas are now easily visually presented and thus becomes easily understandable and transferable.
On the note regarding Social Media, countless information floating in the internet provided guidance on its responsible use. Out of the many responsible uses, I would like to highlight the lessening of frequency of use or the time spent in social media as such may dislocate us from important matters in life. Admit it, a lot of people nowadays spend more time in social media than sleeping well, basic as it is.

hoso12_frth

To end, the internet as a sea of information (accurate or not) has become an accessible source of people. Anytime and in any circumstance they are in, they would that information to provide them direction or to substantiate their options and make a wise decision. As a co-journer, I became fascinated with knowledge and considers one of the most priceless jewel that a man should pursue with all means being exhausted. And such knowledge can now be readily accessed through Information Technology.

As a co-journer, I became fascinated with knowledge and considers one of the most priceless jewel that a man should pursue with all means being exhausted. And such knowledge can now be readily accessed through Information Technology.

Software Piracy: Justifiable or Intolerable?

“Piracy harms all software publishers, regardless of their size. Software publishers spend years developing software for the public to use. A portion of every dollar spent in purchasing original software is funneled back into research and development so that better, more advanced software products can be produced. When you purchase pirated software, your money goes directly into the pockets of software pirates instead” (www.microsoft.com).

Piracy

When the term “piracy” was coined, it became easier for the public to have a negative stigma towards the action and the doers as well. In reference to Microsoft, “Software piracy is the unauthorized copying, reproduction, use, or manufacture of software products.” Any form is considered illegal in most countries. In Philippines, the Anti-Piracy Law is Presidential Decree 532.

Being lawfully punitive can lessen the piracy of software, but it doesn’t guarantee effectiveness especially when our law is loose in terms of implementation. Perhaps we have to experiment on other ways to minimize and eradicate piracy. The two basic questions to be placed on the table are (i) why would violators resort to piracy and (ii) why are there a lot of clients/customers/purchasers of pirated software? I believe the general public has resorted to the manufacture and purchase of pirated software because primarily most original software are mostly relatively over priced.

I believe the general public has resorted to the manufacture and purchase of pirated software because primarily most original software are mostly relatively over priced.

I believe the best solution software designers can provide to combat piracy is to educate the public on its effect or impact towards everyone’s lives.  According to www.smallbusinness.chron.com, there are several impacts brought by piracy to the community:

  1. Revenue Diverson
    • Piracy diverts money away from producers and distributors of items such as audio recordings, making those companies who make an investment in production and distribution less profitable.
  2. Tax Revenues
    • Except in the case where pirated items are sold through retail channels and taxed, tax revenue is not generated from pirated items. For example, when music is downloaded with no tax charged when it is supposed to be, as dictated by tax laws, that revenue is lost as well. Lost tax revenue reduces funds available by the taxing government to spend.

The anti-piracy has made an impression, which made an impact towards manufacturers but less towards end-users. Perhaps the general public has been entrusted for this decision but they can only decide well when they are given sufficient information.

oatmeal_panel_4

Business Intelligence: A Manager’s Perspective

“Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyze an organization’s raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting” (www.cio.com).

With such, organizations can identify employee performance, trends and better strategies to efficiently and effectively achieve company goals. However, due to several factors, employees normally have less engagement in B.I. So the question lies to management how will they be able to present and implement B.I. to their staff in a way that everyone will have a full understanding of its application and importance and, consequently, be encouraged to utilize it in their daily work.

That said, the following are suggested ways to make them engaged actively and religiously with Business Intelligence.

Lessen the amount of data to be collected

Data to be collected in any organization is unlimited but not everything is critical. Thus, management must be able to filter data into the most significant ones. Trying to sponge everything from employees will even discourage them ultimately from using it.

Data Funnel

Consistent follow up on data collection

In the implementation of data collection in B.I., the management should build a culture of timely submission of data. The first step would be to establish the system of data collection. The following is an example of an email where submission of a particular data is followed up.

Compliance

Frequent engagement on collected data

These data collected must as well be understood in terms of its significance. Without such understanding, employees will not be able to appreciate why the management puts great efforts for its collection.

Explain datqa

 

In summary, with such tips on encouraging employees to religiously engage with B.I, a manager should make the best of his effort to strategically implement such. These are just a few, a manager has a lot of innovative ways to implement such effectively among the members of an organization.

Social Media for Personal & Professional Growth

internet world

I once thought that there is another world where it is more populated than any other country, bigger even than the United States. Lo and behold, Social Media has become the virtual globe where every living is connected.

Mark Zuckerberg once said, “When you give everyone a voice and give people power, the system usually ends up in a good place.” Perhaps it is this giving of freedom of speech that man is eventually sustained and contained in this platform. Visually, it seems that people are dragged without resistance to such world. Consequently, ideas and connections become accessible, available and central to everyone.

fb

That said, I believe social media can be used for personal development and even professional growth.

  • Social Media has made relatively significant websites for one’s development.

Admit it, you did not discover entrepreneurs.ph or businessinsider without facebook flooding their web links. A lot of helpful websites depending upon your interest were first known through social media.  Whether you are in need of  knowledge in fitness and nutrition or in mental health, social media has become a platform for such and made them accessible to everyone’s growth and development.

  • Groups were created to promote and sustain a particular cause.

How many of you are connected to political groups such as Pro-Du30s or Miriam’s Legacy? Most of us searched social media groups to support and sustain our views and causes.

Even professional groups are now very engaged in discussion through these social media groups. It has then become a pool of information and even a source of encouragement.

  • Travel and Leisure are advertised for reader’s benefits.

Many were able to reach a particular scenic beach or mountain because somebody posted in social media a how-to-get-there. Queries are then responded immediately by anyone else. Thus, it has offered quick advice and will narrow down to accurate answers.

For business involving travel and tours, social media has become a great marketplace as information consequently becomes falling dominoes.

Though social media has bulk of advantages, it can as well be utilized abusively or irresponsibly. Thus, I personally commit and encourage all readers to keep the list in mind and have them implemented:

  1. Do not express your emotions immediately in social media, especially those that evoke hate and criticism.
  2. Do not create fake account/s and use photos of random people.
  3. Do not post any extreme graphic content which may disturb others.
  4. Do not shame any person regardless of the gravity of their mistake to you.
  5. Do not create posts intentional to confuse people or distort information as internet together with social media has become a pool of erroneous data as well.

fake-news-invasion

 

To conclude, I recommend that everyone should find first one’s interest/s and match them with helpful links flooded by social media as it becomes a powerful search engine as well. Such will help you in your personal development and professional growth. Lastly, I recommend that everyone should be mindful of one’s post – it should always be done with the intention of proliferating truth and knowledge.

Guide for Online Malling

“My job is to help more people have jobs,” Jack Ma, founder of Alibaba Group, once said as he looks at the empire he built by leveraging the power of the internet to engage with users and customers.

Alibaba

Since the invention of the internet, there was much evolution and exploitation done especially by entrepreneurs. Most of them made it as a tool to reach customers within their region or even global. By then, online shopping has become a trend as it offers a lot of convenience and accessibility to potential consumers. While others enjoy shopping without leaving their homes, some still preferred the traditional way because of the actual checking and review of items, safety in payment and other factors. That said, does online shopping or malling really offer absolute convenience to its customers?

The following are list of ways that shopping on the Internet can be convenient:

  • Traffic-Free

Traffic has become an enemy by almost of the population especially in urban cities. Whether you commute or drive your own vehicle, growing traffic brings additional stress and steals time that should have been maximized in particular priorities.

This point is normally in the topmost idea of online shoppers – they avoid traffic and its consequences. Why waste time on transportation and, in unfortunate circumstances, be stuck in the traffic if one can access online and purchase desired items?

traffic

  • Wide-range of Selection

Instead of roaming the mall until one’s feet become red, online shopping offers energy-saving vertical and horizontal swipes in our smart phones and other gadgets which could lead you to even multiple shopping centers.

selection

  • Easy and Faster Search

In connection with the previous point, online shopping offers easier and faster search of products especially through the use of the search bar. If it is not found in that website, one could easily jump to another.

seqarch

  • Privacy Issues

Admit it, there are items that everyone does not like to purchase publicly. In online malling, one can protect its privacy because transaction is only seen by website operators and the customer in cyber mode.

 

The preceding ways of convenience online shopping offers does not guarantee that it is indeed convenient. There are points as well we have to consider that causes online shopping the otherwise.

  • Danger for Online Shopping Addiction

With the above listed convenience, it would easily be dangerous for online shoppers to be addicted, in a way that one would buy a lot of things that they actually don’t need.

  • Delayed Gratification

The deprived feeling in online shopping would be the detailed satisfaction that one would experience when it purchases physically.

  • Possible Delivery Problems

Because one cannot check it physically, there is a possibility that items ordered have defect/s.

  • Substandard Delivered Product

Aside from defects, products can as well be substandard or in a quality lesser than one expected. Be reminded that photos can be deceiving.

  • Difficulty in Item Returns

Once items are already purchased, there is difficulty in having them returned when having defects or are substandard. This is worse when items bought are coming from abroad.

 

Given the list of convenience and inconvenience, there are items which must be treated to be bought without hesitations, be bought with hesitations and, lastly, there are those that should automatically not be purchased online.

Buy without hesitations:

  1. Plane Tickets – Either from Cebu Pacific, Air Asia or Philippine Airlines, they are easily free of scams and unsafe payment schemes because of the reliability and credibility of the brands.
  2. Furniture – Should you be purchasing bulk of such items, it would be better to buy them online and have them delivered in your home unless you have your own delivery truck or you’re okay with going back and forth to transmit your purchased furniture.
  3. Food – Businesses offering such products compete on the speed of deliveries as this is part of their customer service to serve products as if they were served in their physical stores.

 

Buy but think twice:

  1. Clothes – As mentioned in one of the inconveniences, photoraphs can be deceiving especially when businesses projects photos worn by top models. One would not be able to check the fabric and the exact fitness of items relative to one’s shape.
  2. Cellphones – Though there are legit online shops for this, one should hesitate when they are sold by uncertain sellers in social media.
  3. Shoes – Same with clothes, shoes should be fitted well. Though sizes are indicated and standardized in US/UK, sometimes they still vary.

 

No online purchasing:

  1. Potted plants – One cannot check the quality of plants to be delivered because their condition changes daily.
  2. Houses – Such items being sold online does not deserved to be bought immediately primarily because of the big price. They should be checked and reviewed physically. House displayed online are only for advertising.
  3. Vehicles – Especially those that are second-hand, one should always check the engine and all parts and accessories before purchasing.

 

One should always be careful with what the internet offers for consumption or use. Though it may offer a lot of convenience, it will not always hurt if we think critical or twice in items we order online. The web has definitely made everything accessible but not all will level to our expectations.

Wireless Network | Advantage & Safe Usage

Who could have thought of using radio waves as medium to transfer and share information from one computer to another or between network of computers? Human mind continually unlimits impossibilities and unthought potential existence of tangible and intangible objects and ideas. As by-product, wireless networking has greatly contributed in organizations who grab the opportunities it offers.

wifibanner

Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations.

Wireless networks use radio waves to connect devices such as laptops to the Internet, the business network and applications. When laptops are connected to Wi-Fi hot spots in public places, the connection is established to that business’s wireless network.

There are four main types of wireless networks:

  1. Wireless Local Area Network (LAN): Links two or more devices using a wireless distribution method, providing a connection through access points to the wider Internet.
  2. Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
  3. Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and cities.
  4. Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally within a person’s reach.

 

ethernet-cables

Advantages of Wireless Networks

  1. The main advantage of a wireless network over a wired one is that users can move around freely within the area of the network with their laptops, handheld devices etc and get an internet connection.
  2. Users are also able to share files and other resources with other devices that are connected to the network without having to be cabled to a port.
  3. Not having to lay lots of cables and put them through walls etc. can be a considerable advantage in terms of time and expense. It also makes it easier to add extra devices to the network, as no new cabling is needed.
  4. If you are a business such as a café, having a wireless network that is accessible to customers can bring you extra business. Customers generally love wireless networks because they are convenient.
  5. Wireless networks can sometimes handle a larger amount of users because they are not limited by a specific number of connection ports.
  6. Instant transfer of information to social media is made much easier. For instance, taking a photograph and uploading it to Facebook can generally be done much quicker with wireless technology.

 

Disadvantages of a Wireless Network

  1. It can require extra costs and equipment to set up, although increasingly routers have built-in wireless capability, as do devices such as laptops, handheld devices, modern DVD players, and TVs.
  2. Setting up a wireless network can sometimes be difficult for people who are not experienced with computers. (Although there are issues with setting up a wired network too, off course!)
  3. File-sharing transfer speeds are normally slower with wireless networks than they are with cabled. The speeds can also vary considerably according to your location in relation to the network.
  4. The general speed of a wireless connection is also usually much slower than a wired one. The connection also gets worse the farther you are from the router, which can be a problem in a large building or space.
  5. Wireless connections can be obstructed by everyday household items and structures such as walls, ceilings, and furniture.
  6. Wireless networks are generally less secure. There can also be problems with neighbors stealing bandwidth, if the network hasn’t been set up to be password protected. Information is also less secure too and can be easier to hack into.

 

Application to My Organization

In property management, wireless network is exploited especially in database of our equipment, tenant information, utility monitoring, security monitoring, financial control, other details for our reports and even reports themselves.

One thing I intend to implement is the use of google drive in storing files which are normally and frequently needed for reports. These files should be shared wherein it is editable within those who are concerned. In comparison, email of such information normally takes more time and effort for manual reminder. It also serves as a virtual back up in cases our hardware malfunctions.

 

Safe-Internet-Use

Standards & Guidelines to Ensure Safe Usage of Wireless Networks

  1. Turn Off Sharing

    You may share your music library, printers or files, or even allow remote login from other computers on your Wi-Fi network in the privacy of your own home. Unless you disable these settings before connecting to a public Wi-Fi network, anyone else in the vicinity may be able to hack into your PC.

    If you’re using a Windows PC, you’ll want to start by opening the advanced sharing settings of the Homegroup section of the Network and Internet settings in the Control Panel. From here, you’ll be able to toggle file and printer sharing as well as network discovery, which will make your computer visible to anyone connected to the same network. For Mac, just go to System Preferences, then Sharing, and make sure none of the options are checked.

  2. Get a VPN

    The most secure way to browse on a public network is to use a virtual private network. A VPN routes your traffic through a secure network even on public Wi-Fi, giving you all the perks of your private network while still having the freedom of public Wi-Fi.

    While free VPN services exist, a paid VPN service guarantees the connection’s integrity. If you regularly connect to unknown networks, setting up a VPN is smart to protect your personal information.

  3. Avoid Automatically Connecting to Wi-Fi Hotspots

    Your smartphone or tablet may be set to automatically connect to any available Wi-Fi hotspot, a setting that can seriously endanger your privacy. Not only will this allow your device to connect to public networks without your express permission, you may also be automatically connecting to malicious networks set up specifically to steal your information.

    Most modern smartphones have this option disabled by default, but this isn’t always the case, and it’s a setting you should always double-check. First, open the Wi-Fi section of your phone’s settings app. If you don’t see an option to disable auto-connecting, you’re already safe. Otherwise, turn this setting off.

  4. Use HTTPS

    Regular websites transfer content in plain text, making it an easy target for anyone who has hacked into your network connection. Many websites use HTTPS to encrypt the transfer data, but you shouldn’t rely on the website or Web service to keep you protected.

    You can create this encrypted connection with the browser extension HTTPS Everywhere. With this plugin enabled, almost all website connections are secured with HTTPS, ensuring that any data transfer is safe from prying eyes.

  5. Use Two-Factor Authentication

    Two-factor authentication means you need two pieces of information to log into an account: One is something you know and the other is something you have. Most often this takes the form of a password and a code sent to your cellphone.

    Many popular websites and services support two-factor authentication. This means that even if someone is able to get your password due to a hole in a public Wi-Fi network, they won’t be able to log into your account.

    To enable this feature for Gmail, log into your account and open the settings page. Navigate to the Accounts And Import tab and click Other Google Account Settings. The second section will be two-step verification, and you can click Settings to start.

    First, enter your phone number and choose whether you’d like a text message or a phone call. Next, Google will send a six-digit code to your phone. Enter this when prompted. Now, whenever you log into Google from a new computer, you’ll be asked to verify your identity by entering both pieces of info.

    The login process will now take a few extra seconds when you use a different device, but you can rest peacefully knowing that your account is safe and secure.

  6. Confirm the Network Name

    Sometimes hackers will set up a fake Wi-Fi network to attract unwitting public Wi-Fi users. The Starbucks public Wi-Fi network might not be named “Free Starbucks Wi-Fi.” Connecting to a fake network could put your device into the hands of a malicious ne’er-do-well.

    If you’re not sure if you’re connecting to the official network, ask. If you’re in a café or coffee shop, employees will know the name of the official network and help you get connected. If there’s no one around to ask, you may want to move to a different location where you can be sure that the Wi-Fi network isn’t fake.

  7. Protect Your Passwords

    Using unique passwords for different accounts can help if one of your accounts is compromised. Keeping track of multiple secure passwords can be tricky, so using a password manager such as KeePass or LastPass can help keep you safe and secure.

    Both KeePass and LastPass are free, but they store your information in different ways. KeePass keeps an encrypted database file on your computer, while LastPass stores your credentials in the cloud. There are pros and cons to each approach, but both services are completely secure.

  8. Turn on Your Firewall

    Most OS’s include a built-in firewall, which monitors incoming and outgoing connections. A firewall won’t provide complete protection, but it’s a setting that should always be enabled.

    On a Windows notebook, locate your firewall settings in the Control Panel under System And Security. Click on Windows Firewall, then click Turn Windows Firewall On or Off. Enter your administrator password, then verify that the Windows Firewall is on.

    These settings are in System Preferences, then Security & Privacy on a Mac. Navigate to the Firewall tab and click Turn On Firewall. If these settings are grayed out, click the padlock icon in the lower left, enter your password, then follow these steps again.

  9. Run Anti-Virus Software

    Always running up-to-date anti-virus software can help provide the first alert if your system has been compromised while connected to an unsecured network. An alert will be displayed if any known viruses are loaded onto your PC or if there’s any suspicious behavior, such as modifications to registry files.

    While running anti-virus software might not catch all unauthorized activity, it’s a great way to protect against most attacks.

 

For other safety tips, you may check out Microsoft’s website: https://www.microsoft.com/en-us/safety/online-privacy/public-wireless.aspx.

 

In summary, wireless network has become very useful in our organizations yet it also imposes threat. That said, employees and employers should be observant in safety usage of networks especially those that are public, in which may steal or delete critical information for the growth of the organization. There should always be precautionary measures in the use of such networks so our respective organizations could maximize such technology.

6b7b6050a79dc085766e0728784a9d8537a05f165a9f0dc595d72e23c971897d

 

REFERENCES:

  1. Wireless Network. Techopedia. Retrieved from https://www.techopedia.com/definition/26186/wireless-network
  2. Goodman, P. (2016, November 22). Wireless Network vs Wired Network: Advantages and Disadvantages. Retrieved from: https://turbofuture.com/computers/Wireless-Network-vs-Wired-Network-Advantages-and-Disadvantages
  3. ITServices. Retrieved from https://itservices.uchicago.edu/page/using-wireless-networks-safety-tips
  4. Berg, D. (2013, February 1). 9 Tips to Stay Safe on Public Wi-Fi. Retrieved from http://www.laptopmag.com/articles/9-tips-to-stay-safe-on-public-wi-fi

 

 

Search for Meaning

(Part 1)

Left my dreamland but I feel heavy as I manage to cover myself with blanket though it is not a cold morning. Before I say a word, my thoughts consumed me and stopped me from moving – “What am I here for?” Life is a deep slumber where our minds freely move with always out of our control. When you reached the point of consciousness, you began to search the meaning of its existense and will then be left with no answers.
I’ve been with people of my generation who live their lives circulating on their respective careers, where others choose to settle for marriage first. I’m with people who’s at the peak of achievements but continually mentors us to live a simple life because they regretted how they focused their time on accomplishing.

I am not doubting God or his existence but may I ask permission to question hardly: Why were we born in this world at such a particular time, on-going events and culture? Why do we have to exist? Why do we choose to live? May we just die if we could discover no meaning for living? What is meaning and where can I find it? When one cannot find it, it doesn’t then mean it is not existing. I have lived a quarter and I want to trek the route where meaning leads me assuming there is. Should there be no sense in living, better that I start to rest forever.

Managers in Making I.S. Decisions

Definitely a manager’s most valuable commodity is time and his most important asset is human resource. In organizations especially in corporations where different fields are required and practiced, managers are expected to effectively collaborate all their skills to achieve the org’s goals. With minimal knowledge on Information Systems (IS) and with the irreturnable attribute of time, managers should have the ability to quickly decide. There are three primary skills that managers should have to be effective in making IS decisions.

1. Effective Questioning

meme

During discussions, the most effective way of capturing the focus of each participant is to throw them questions in which they will most likely tend to think. Given the adrenaline of their thoughts during such situation, one may not be able to control the speed of the popping ideas one has. Thus, there is a need for managers to lead the thoughts of his members through effective questioning.

In relation to the foreign (somehow) subject of IS, managers must be able to think of questions which are key for his members to strategically unlock certain confusions or misconceptions which bars them from fully understanding such IS concept.

2. Facilitative Learning

facilitate

One of the admirable skills of a manager is his ability to spur the learning drive of his members. Without such drive, people become disinterested and eventually inactive in particular discussions especially that which is related to IS.  Easier said than done, how are managers able to do such facilitative learning? The best way so far is to make everyone participate by soliciting their ideas and in that way you will also be able to ensure that they correctly understood the subject and are indeed actively thinking.

3. Ability to Simplify

learn

Aside from critical thinking which is prelude to the following skill, managers should also be able to simplify especially the most difficult to grasp IS-related concepts. Among the three skills I have mentioned, this I think is the most difficult one to develop because it requires the manager to understand such new concepts first than his members. And that entails quick rationalization because that you understand is that you can only simplify.

“…that you understand is that you can only simplify”

 

These listed skills are just a few of the needed ones in collaborative decision-making related to IS but such are important and vital in the growing manager.