tag:blogger.com,1999:blog-42813722062641855282024-03-19T12:46:11.501-07:00My BlogBasith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.comBlogger22125tag:blogger.com,1999:blog-4281372206264185528.post-80128698735635764982009-12-13T04:45:00.000-08:002009-12-13T04:52:46.538-08:00<div align="justify"><span style="font-weight: bold; color: rgb(255, 255, 51);">The nature relationship of the Business plan and the IS plan... </span><br /><br />Before anything else i would the discuss first the definition of business plan and IS plan according to the source that i've gather<br /><br /><strong style="color: rgb(255, 255, 51);">Business Plan</strong><br /><br />A business plan is a formal statement of a set of business goals, the reasons why they are believed attainable, and the plan for reaching those goals. It may also contain background information about the organization or team attempting to reach those goals.<br /><br />The business goals may be defined for for-profit or for non-profit organizations. business plans typically focus on financial goals, such as profit or creation of wealth. Non-profit and government agency business plans tend to focus on organizational mission which is the basis for their governmental status or their non-profit, tax-exempt status, respectively—although non-profits may also focus on optimizing revenue. In non-profit organizations, creative tensions may develop in the effort to balance mission with "margin" (or revenue). Business plans may also target changes in perception and branding by the customer, client, tax-payer, or larger community. A business plan having changes in perception and branding as its primary goals is called a marketing plan.<br /><br /><strong style="color: rgb(255, 255, 102);">Business Systems Planning (BSP):</strong><br /><br />This methodology, developed by IBM, combines top down<br />planning with bottom up implementation. The methodology focuses on business processes which in<br />turn are derived from an organization’s business mission, objectives and goals. Business processes<br />are analyzed to determine data needs and, then, data classes. Similar data classes are combined to<br />develop databases. The final BSP plan describes an overall information systems architecture as well<br />as installation schedule of individual systems<br /><br />(c) there is a problem of bridging the gap between top down planning and bottom up<br />implementation.<br />(d) it does not incorporate a software design methodology.<br />(e) major weakness of BSP is the considerable time and effort required for its successful<br />implementation.<br /><br /><strong style="color: rgb(255, 255, 0);">IS Planning</strong><br /><br />Planning for information systems, as for any other system, begins with the identification of<br />needs. In order to be effective, development of any type of computer-based system should be a<br />response to need--whether at the transaction processing level or at the more complex information and<br />support systems levels. Such planning for information systems is much like strategic planning in<br />management. Objectives, priorities, and authorization for information systems projects need to be<br />formalized. The systems development plan should identify specific projects slated for the future,<br />priorities for each project and for resources, general procedures, and constraints for each application<br />area. The plan must be specific enough to enable understanding of each application and to know<br />where it stands in the order of development. Also the plan should be flexible so that priorities can be<br />adjusted if necessary.<br /><br /><strong style="color: rgb(255, 255, 0);">Strategic Systems Planning (SSP): </strong><br /><br />Also known as PROplanner and developed by Robert<br />Holland, this methodology is similar to BSP. A business functional model is defined by analyzing<br />major functional areas of a business. A data architecture is derived from the business function<br />model by combining information requirements into generic data entities and subject databases. New<br />systems and their implementation schedules are derived from this architecture. This architecture is<br />then used to identify new systems and their implementation schedule. Although steps in the SSP<br />procedure are similar to those in the BSP, a major difference between SSP and BSP is SSP’s<br />automated handling of the data collected during the SISP process. Software produces reports in a<br />wide range of formats and with various levels of detail. Affinity reports show the frequencies of<br />accesses to data and clustering reports give guidance for database design. Users are guided through<br />menus for on-line data collection and maintenance. The software also provides a data dictionary<br />interface for sharing SSP data with an existing data dictionary or other automated design tools.<br />Steps in the SSP procedure are shown in figure 5. In addition to SSP, Holland System’s<br />Corporation also offers two other methodologies - one for guiding the information system<br />architecture and another for developing data structures for modules from the SISP study. The<br />strengths and weaknesses of BSP apply to SSP as well.<br /><br />Conclusion:<br /><br />Both Business and IS planning are aiming for a good and effective output both of them are usually used in the business. Business planning is dealing with the goal of the company which is to earn more profit while the IS planning are the one who help the business plan to be more competitive in the sense of making the system to be automated so that business process will be more faster than ordinary transaction or manual transaction.<br /><br /><strong>Issue for the business and IS planning:</strong><br /><br />One of the key elements of strategic planning for information systems (IS) is the integration of information systems planning (ISP) with business planning (BP). This integration enables IS to support business strategies more effectively. Although this issue has received significant attention in recent years, empirical research focusing specifically on BP-ISP integration is still relatively sparse. This research extends existing results by examining the evolution of BP-ISP integration and the contingency variables that may influence BP-ISP integration.The results confirmed the existence of an evolutionary pattern that can be defined in terms of movement through four types of BP-ISP integration: administrative integration to sequential integration to reciprocal integration to full integration. Only a few firms indicated that they had reached full integration. Bypassed phases and reverse evolution, though observed, were uncommon. Among the contingency variables, the business competence of the IS executive appeared to be a key factor in influencing the extent of integration.<br /><br /><br /><a href="http://en.wikipedia.org/wiki/Business_plan" target="_blank">http://en.wikipedia.org/wiki/Business_plan</a><br /><a href="http://viu.eng.rpi.edu/publications/strpaper.pdf" target="_blank">http://viu.eng.rpi.edu/publications/strpaper.pdf</a></div><br /><br /><input name="attach_sig" value="" type="hidden"><input name="mode" value="reply" type="hidden"> <input name="sid" value="fd956dcf64ff586eb6740afcd7b4c503" type="hidden"> <input name="p" value="" type="hidden"><input name="t" value="147" type="hidden"> <input name="lt" value="2754" type="hidden"><input name="notify" value="0" type="hidden"> <input name="subject" value="" type="hidden"><textarea name="message" style="display: none;">[justify]The nature relationship of the Business plan and the IS plan... Before anything else i would the discuss first the definition of business plan and IS plan according to Wikipedia.. [b]Business Plan[/b] A business plan is a formal statement of a set of business goals, the reasons why they are believed attainable, and the plan for reaching those goals. It may also contain background information about the organization or team attempting to reach those goals. The business goals may be defined for for-profit or for non-profit organizations. http://usep-ic.forumsmotions.com/post.forum?mode=reply&t=147For-profit business plans typically focus on financial goals, such as profit or creation of wealth. Non-profit and government agency business plans tend to focus on organizational mission which is the basis for their governmental status or their non-profit, tax-exempt status, respectively—although non-profits may also focus on optimizing revenue. In non-profit organizations, creative tensions may develop in the effort to balance mission with "margin" (or revenue). Business plans may also target changes in perception and branding by the customer, client, tax-payer, or larger community. A business plan having changes in perception and branding as its primary goals is called a marketing plan. [b]Business Systems Planning (BSP):[/b] This methodology, developed by IBM, combines top down planning with bottom up implementation. The methodology focuses on business processes which in turn are derived from an organization’s business mission, objectives and goals. Business processes are analyzed to determine data needs and, then, data classes. Similar data classes are combined to develop databases. The final BSP plan describes an overall information systems architecture as well as installation schedule of individual systems (c) there is a problem of bridging the gap between top down planning and bottom up implementation. (d) it does not incorporate a software design methodology. (e) major weakness of BSP is the considerable time and effort required for its successful implementation. [b]IS Planning[/b] Planning for information systems, as for any other system, begins with the identification of needs. In order to be effective, development of any type of computer-based system should be a response to need--whether at the transaction processing level or at the more complex information and support systems levels. Such planning for information systems is much like strategic planning in management. Objectives, priorities, and authorization for information systems projects need to be formalized. The systems development plan should identify specific projects slated for the future, priorities for each project and for resources, general procedures, and constraints for each application area. The plan must be specific enough to enable understanding of each application and to know where it stands in the order of development. Also the plan should be flexible so that priorities can be adjusted if necessary. [b]Strategic Systems Planning (SSP): [/b] Also known as PROplanner and developed by Robert Holland, this methodology is similar to BSP. A business functional model is defined by analyzing major functional areas of a business. A data architecture is derived from the business function model by combining information requirements into generic data entities and subject databases. New systems and their implementation schedules are derived from this architecture. This architecture is then used to identify new systems and their implementation schedule. Although steps in the SSP procedure are similar to those in the BSP, a major difference between SSP and BSP is SSP’s automated handling of the data collected during the SISP process. Software produces reports in a wide range of formats and with various levels of detail. Affinity reports show the frequencies of accesses to data and clustering reports give guidance for database design. Users are guided through menus for on-line data collection and maintenance. The software also provides a data dictionary interface for sharing SSP data with an existing data dictionary or other automated design tools. Steps in the SSP procedure are shown in figure 5. In addition to SSP, Holland System’s Corporation also offers two other methodologies - one for guiding the information system architecture and another for developing data structures for modules from the SISP study. The strengths and weaknesses of BSP apply to SSP as well. Conclusion: Both Business and IS planning are aiming for a good and effective output both of them are usually used in the business. Business planning is dealing with the goal of the company which is to earn more profit while the IS planning are the one who help the business plan to be more competitive in the sense of making the system to be automated so that business process will be more faster than ordinary transaction or manual transaction. [b]Issue for the business and IS planning:[/b] One of the key elements of strategic planning for information systems (IS) is the integration of information systems planning (ISP) with business planning (BP). This integration enables IS to support business strategies more effectively. Although this issue has received significant attention in recent years, empirical research focusing specifically on BP-ISP integration is still relatively sparse. This research extends existing results by examining the evolution of BP-ISP integration and the contingency variables that may influence BP-ISP integration.The results confirmed the existence of an evolutionary pattern that can be defined in terms of movement through four types of BP-ISP integration: administrative integration to sequential integration to reciprocal integration to full integration. Only a few firms indicated that they had reached full integration. Bypassed phases and reverse evolution, though observed, were uncommon. Among the contingency variables, the business competence of the IS executive appeared to be a key factor in influencing the extent of integration. http://en.wikipedia.org/wiki/Business_plan http://viu.eng.rpi.edu/publications/strpaper.pdf[/justify]</textarea>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-39442499868437178112009-11-18T20:23:00.000-08:002009-11-18T20:28:11.641-08:00Assignment #1 MIS2<span><span style="color:red;">Think about yourself worthy to be called as IT professional, how do you see yourself 10 years from now, what are your strategies to get there?<br /><br />Worthy IT Professional? Am I belong to this group? how can i become an worthy IT professional? can i be a worthy IT professional? this are the question coming from my mind when i heard a word worthy IT professional. this question challenge me to face the consequences and trials coming to my life as an IT student because i want to become an worthy IT professional.In this world there is a lot of an IT professional claiming themselves as an worthy IT professional.. I don't know what kind of skills or characteristics does the worthy IT professional have. As an IT student I'm looking forward that may be in the future i will become a worthy IT professional if i will graduate in my course BSIT with the proper discipline and attitude.Sooner if i'm already working in a big company i can properly manage myself and my carrier as an worthy IT professional. I Think you will be called as an worthy IT Professional if you have a good manner, discipline and responsible to every job that you have. Honesty i think, is also one of the reason on how to become an worthy IT professional. I know that i will become a worthy IT professional if i will strive hard to reached this.<br /><br />I see my self 10 years from now as a developer of the integrated system of all automated and manual system that the Philippine government offer. Just one website and you can access everything that you want to surf regarding the national and local government services. So that our country will be known as one of the country who implemented this kind of integrated system. the question is how can i do this? it is possible for to achieve my dream? do i have a capacity to handle this kind of project?<br /><br />My strategic plan to achieve this dream is to <u>finish my study</u>, <u>proper training and discipline to my self</u>, <u>to become an a system analyst</u>, <u>a good programmer</u>, <u>and a lot of experienced.</u>:<br /><br /><u><strong>how to finish my study?</strong></u><br /><br />Of course I must be responsible for the every task, to do this perseverance is the characteristics that i need.<br /><br /><u><strong>proper training and discipline</strong></u><br /><br />Some guidelines to consider are:<br /><br />* Thoroughly investigate the situation which includes obtaining the employee's explanation or response prior to administering discipline.<br /> * Document the process and results of your investigation.<br />* It is acceptable to repeat a step if you feel that it will correct the problem. This may be the case if some time has passed since it was last necessary to address the issue and the situation has only recently reappeared. Or perhaps, the employee misunderstood or you feel there is value in doing it again in a clearer fashion. If repeating the step works, the situation has been resolved without escalating it unnecessarily. However, be aware that an employee may be led to believe that nothing worse will happen if you continually repeat a step. If repeating a step does not resolve the problem, you can then move on to a higher step.<br />* The goal is to modify the unacceptable behavior or improve the performance. The goal is not to punish the employee but to more strongly alert the employee of the need to correct the problem.<br />* There is no rigid set of steps nor is there an inflexible rule that all steps must be followed before terminating an employee. The circumstances of each case and your judgment as to the least severe action that is necessary to correct the situation will help determine which step to use.<br />* Early, less stringent, measures are skipped for serious offenses such as theft, fighting, drug or alcohol use or sale. All steps are typically used for attendance or general work performance problems.<br />* While usually unnecessary, it is acceptable to have a witness or note taker present when meeting with the employee during the progressive discipline process. Your witness/note taker should never be a peer of the employee. university policy permits the employee to have a witness if he or she wishes.<br />* Human Resources is available for consultation at any step of the process, but it is especially important at the steps of suspension and termination.<br /><br /><strong>To Become an a System Analyst</strong><br /><br />The development of a computer-based information system often comprises the use of a systems analyst. When a computer-based information system is developed, systems analysis (according to the Waterfall model) would constitute the following steps:<br /><br />* The development of a feasibility study, involving determining whether a project is economically, socially, technologically and organisationally feasible.<br />* Conducting fact-finding measures, designed to ascertain the requirements of the system's end-users. These typically span interviews, questionnaires, or visual observations of work on the existing system.<br />* Gauging how the end-users would operate the system (in terms of general experience in using computer hardware/software), what the system would be used for etc.<br /><br /><strong><u>A Good Programmer</u></strong><br /><br />Here are the following steps to improve my skills in programming:<br /><br />1. Gather complete requirements.<br />Take the time to write down what the end product needs to achieve. Clarity of thought at this stage will save a lot of time down the line.<br />2. Write an implementation plan (or model).<br /><br /> * For something small and self-contained, this might just be a basic flowchart or an equation.<br />* For larger projects, it helps to break it into modules and consider what job each module must do, how data gets passed between modules, and within each module how it will function.<br />* Although it is fun to dive straight into code, it is equally tedious to spend hours debugging. By taking the time to design the structure on paper, you will drastically reduce your debugging time (and you may also spot more efficient ways of doing things even before you write the first line of code).<br /><br />3. Add Comments to your code.<br />Whenever you feel your code needs some explanation, drop some comments in. Each function should be preceded by 1-2 lines describing the arguments and what it returns. (Comments should tell you why more often than what. Remember to update the comments when you update your code!)<br />4. Use naming conventions for variables.<br />It will help you keep track of what type the variable is and also what it's purpose is. Although this means more typing than x = a + b * c, it will make your code easier to debug and maintain. One popular convention is Hungarian notation where the variable name is prefixed with its type. e.g. for integer variables, intRowCounter; strings: strUserName. It doesn't matter what your naming convention is, but be sure that it is consistent and that your variable names are descriptive. (See Warnings below)<br />5. Organize your code.<br />Use visual structure to indicate code struture. i.e. indent a code block that sits within a conditional (if,else,...) or a loop (for,while,...) Also try putting spaces between a variable name and an operator such as addition, subtraction, multiplication, division, and even the equal sign (myVariable = 2 + 2). As well as making the code more visually elegant, it makes it much easier to see the program flow at a glance. (See tips on indentation below)<br />6. Test.<br />Start by testing it with inputs that you would typically expect. Then try inputs that are possible but less common. This will flush out any hidden bugs. There is an art to testing and you will gradually build up your skills with practice.<br />Write your tests to always include the following:<br /><br /> * Extremes: zero and max for positive values, empty string, null for every parameter.<br />* Meaningless values, Jibberish. Even if you don't think someone with half a brain might input that, test your software against it.<br />* Wrong values. Zero in a parameter that will be used in a division, negative when positive is expected or a square root will be calculated. Something that is not a number when the input type is a string, and it will be parsed for numeric value.<br /><br />7. Practice. Practice. Practice.<br />8. Be prepared for change.<br />In a realistic working environment, requirements change. However, the clearer you are at the start about the requirements and the clearer your implementation plan, the less likely those changes will be down to misunderstanding or "Ah, I hadn't thought of that" scenarios.<br /><br />* You can take an active role in improving clarity of thinking by presenting your requirements document or your implementation plans before coding to ensure that what you are planning to create is actually what's been asked for.<br />* Structure the project as a series of milestones with a demo for each block. Approach the programming one milestone at a time - the less you need to think about at any moment, the more likely you will think clearly.<br /><br />9. Start simple and work towards complexity.<br />When programming something complex, it helps to get the simpler building blocks in place and working properly first.<br />For example, let's say you want to create an evolving shape on screen that follows the mouse and where the degree of shape change depends on mouse speed.<br /><br /> * Start by displaying a square and get it to follow the mouse, i.e. solve movement tracking on its own.<br /> * Then make the size of the square relate to mouse speed, i.e. solve speed-to-evolution tracking on its own.<br /> * Finally create the actual shapes you want to work with and put the three components together.<br />* This approach naturally lends itself to modular code writing, where each component is in its own self-contained block. This is very useful for code reuse (e.g. you want to just use the mouse tracking in a new project), and makes for easier debugging and maintenance.<br /><br />Through all of this i can say that i can reached my ambition for the next 10 years. hoping that there's no barrier in the middle of this plan..<br /><br /><a href="http://www.wikihow.com/Improve-your-Skills-as-a-Programmer" target="_blank">http://www.wikihow.com/Improve-your-Skills-as-a-Programmer</a><br /><a href="http://www.indiana.edu/%7Euhrs/training/ca/progressive.html" target="_blank">http://www.indiana.edu/~uhrs/training/ca/progressive.html</a><br /><a href="http://en.wikipedia.org/wiki/Systems_analysis" target="_blank">http://en.wikipedia.org/wiki/Systems_analysis</a></span></span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-75036060418270758792009-11-14T00:00:00.000-08:002009-11-14T00:01:34.787-08:00Introduction in MIS2<hr />welcome back to sir... Once again i want to introduce my self again I'm Basith J. Jumat a 3rd year BSIT Student and currently studying in University of Southeastern Philippines. I know that there is a similarity between the MIS1 but im expecting a lot of changes in terms of industry analysis. i think this subject will give me more pressure than MIS1.. I'm also hoping that this subject will enlighten my mind on what is my strategic plan for the coming year. once again welcome back sir nice to see you again..Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-55389682325416234542009-10-10T23:23:00.000-07:002009-10-10T23:27:05.044-07:00Assigment #8 in HRM(On the assumption that you heard/read the SONA of the President last month (July 2009), identify at least 3 areas related to Huma)<div align="justify">I.) Trade and Investment<br />In the trade and investments sector, we envisioned to raise investments<br />to 25-28% of GDP by 2010 from 19.5% in 2003. Financial support to<br />public infrastructure shall be pursued through greater private sector<br />participation. We shall likewise continue to aim for a minimum 10%<br />annual growth in the export sector, even though the Government has<br />met the target to increase exports for food and services in 2006.<br />Towards this end, we have accomplished the following:<br />Promoted entrepreneurship<br />From 2001 to April 2008, microfinance loans to the low and middle<br />income men and women who want to start their own businesses have<br />reached P102 billion or 29 times more than the P3.49 billion we started<br />with in 2001.<br /><br />• The Government’s initiative to enhance the SME Unified Lending<br />Opportunities for National Growth (SULONG) more than quadrupled<br />the P26.76 billion released in 2003 to P130.24 billion as of April 2008.<br />New jobs generated therein almost tripled from 200,783 in 2003 to<br />590,462 as of April 2008.<br />• Despite the setbacks in the global economy that affected our small<br />exporters, the One Town, One Product (OTOP) Program performed<br />respectably. Beefed up by DTI’s strong marketing program, earnings<br />by small exporters went up by 14%, from US$92.23 million in 2006 to<br />US$105 million in 2007. Local economic activity likewise markedly<br />improved, with OTOP domestic sales surging by 53%. Investments<br />inflow also improved by 23% supporting 70,733 jobs.<br />Since its inception in late 2004, OTOP had generated a total of P5.60<br />billion in investments, supported 212,960 jobs, earned US$283<br />million in exports and P5.88 billion in domestic sales, and assisted<br />17,149 small and medium enterprises.<br />Table 5. OTOP PERFORMANCE: 2004-2007<br />Performance Indicators<br />2004 2005 2006 2007 Total<br />Investments (P Million)<br />565.04 814.09 1,891.34 2,330.53 5,601<br />Employment<br />1,431 70,439 70,357 70,733 212,960<br />Exports<br />(US$ Million)<br />0.17 85.19 92.23 105.40 283.0<br />Domestic Sales (P Million)<br />1,302.40 1,808.25 2,773.79 5,884.44<br />SMEs Assisted 4,396 5,968 6,785 17,149<br /><br />II.Completed the P10.6 million La Trinidad Fruit and Vegetable<br />Minimal Processing and Packaging Plant on 30 December 2008,<br />which shall start operating in July 2008. Dole Philippines<br />Incorporated, the project’s operator, is in the process of recruiting<br />and training personnel for the plant. The project shall contribute<br />into increasing the shelf-life and marketability of the upland<br />vegetables, lessen post harvest losses, and the Government’s food<br />security program.<br /><br />III. Completed the P96.83 million Dingalan Port Development<br />Project in Aplaya, Aurora on 30 January 2008, which includes<br />port development and construction of a passenger terminal<br />building. It is expected to boost productivity of the agriculture,<br />aquatic, and mining industries in the Dingalan area and nearby<br />municipalities.</div><br /><br />Talking about the Trade and Investment it will gives a big impact to the human resources because it will give a lot of opportunities to the workers so that the jobs opportunities will grow.<br /><br /><span class="postbody"></span><a href="http://www.gov.ph/sona/sona2008.pdf" target="_blank">http://www.gov.ph/sona/sona2008.pdf</a>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-35392001614558054912009-10-10T23:00:00.000-07:002009-10-10T23:31:33.258-07:00Assignment in HRM #7("Human beings are the most important, potent and critical, resource of any organization, and yet the least understood and the wo)<span style="color: rgb(255, 255, 0);">Human resources is an increasingly broadening term that refers to managing "human capital," the people of an organization. The field has moved from a traditionally administrative function to a strategic one that recognizes the link between talented and engaged people and organizational success. The field draws upon concepts developed in Industrial/Organizational Psychology and System Theory. Human resources has at least two related interpretations depending on context. The original usage derives from political economy and economics, where it was traditionally called labor, one of four factors of production although this perspective is changing as a function of new and ongoing research into more strategic approaches at national levels.This first usage is used more in terms of 'human resources development', and can go beyond just organizations to the level of nations. The more traditional usage within corporations and businesses refers to the individuals within a firm or agency, and to the portion of the organization that deals with hiring, firing, training, and other personnel issues, typically referred to as 'human resources management'. </span><br /><br /><span style="color: rgb(255, 255, 0);">Human beings are definitely the most important resource in an organization. Above everything else humans are the most superior in an organization. We all know that humans are essential in every organization because without them organizations would definitely not work out. If the technology or the department wherein IT id present is said to be the brain of an organization, human are the heart of every organization and without them the organization could not live and stand on its own. Human beings are also, to a certain extent, selfish, both by nature and by environment. A person who is an altruist is one who has regard for; and is devoted to the interest of others than himself alone. Altruism is a desirable trait to be aspired for but is, generally, hard to find among people in its ideal form. There are some people who seem to lack even a trace of altruism in their makeup; still others believe that there is such thing as enlightened self-interest, which may be made to benefit everybody through cooperation. Thus,</span><br /><span style="color: rgb(255, 255, 0);">self-interest and the welfare of others do not have to conflict with each other.</span><br /><span style="color: rgb(255, 255, 0);">Both can be achieved or satisfied at the same time.</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com2tag:blogger.com,1999:blog-4281372206264185528.post-54398218085040063162009-10-10T22:52:00.000-07:002009-10-10T22:53:17.444-07:00Assignment#9 in MIS<span style="color: rgb(255, 0, 0);">Improving Coal Efficiency and Reducing Environmental Pollution</span><br /><br /><span style="color: rgb(255, 0, 0);">The main objective of the TA is to assist the government in developing suitable environmentally friendly technologies for improving domestic coal utilization efficiency and reducing pollution in the building materials, metallurgy,coal, and chemical sub sectors. The TA will evaluate ways to improve energy efficiency in and reduce pollution from industrial enterprises of these four sub sectors and will recommend appropriate policy measures,institutional mechanism and financial incentives</span><br /><span style="color: rgb(255, 0, 0);">The TA through surveys, will ascertain the major problems prevalent in each subsector, including inefficiencies resulting from the use of outdated process design and technology ,inappropriate plant size equipment, and inefficient plant operations. Based on the results of the survey, one enterprises from each subsector, representing the common problem of the subsector.</span><br /><span style="color: rgb(255, 0, 0);">Technology plays important roles in our life. It enables us to do our activities easier. Something that might be so difficult to do in the past can be done easily with the technology innovations. No want will argue that technology also give huge impact in educational field. With technology, teaching and learning activities can be more interesting and fun. It may also help the learners to get the lesson objectives faster than the manual and conventional way.</span><br /><br /><span style="color: rgb(255, 0, 0);">• What should be your role within this environment?</span><br /><br /><span style="color: rgb(255, 0, 0);">As an IT student i have a big role within this environment because I can be a part of implementing this program through the learning that i got from the school i can expand my knowledge on how to be more efficient with this kind of program. Learning is a lifelong process that sometimes we encountered a problems that make as self pity but through this learning we can be strong enough to face consequences. working in this kind of environment I will not abuse any of its benefits. i will make use of its sites opportunities so that i can contribute a lot even though it is difficult.</span><br /><br /><span style="color: rgb(255, 0, 0);">And as a student I am aware that learning is a lifelong process. That is why information is abounding – never stops and never ends. As an IT student, I’ve had panoramas of several companies’ information systems. I have learned how information could be very crucial in a workplace and even at home. And I have also seen localities and circumstances where there is scarcity or outdated information. I know many of us are relying heavily on basic information exchange and getting just a bit of it at a time is not enough in this rapid competent world.</span><br /><br /><span style="color: rgb(255, 0, 0);">• How can the principles of information organization and representation help you in performing this role?</span><br /><br /><span style="color: rgb(255, 0, 0);">The TA make this program to help the government of china to reduce using of coal because it is not good of over used of it. With this goal, the organization help me on how to manage the benefits of this program and those opportunities that can give to all the people will be properly grab.</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">• What are the challenges facing you in performing the role? How will you address these challenges?</span><br /><br /><span style="color: rgb(255, 0, 0);">There are many challenges that I will be facing when I will be in an information environment. I will just state here the challenges that come to my mind right now.</span><br /><br /><span style="color: rgb(255, 0, 0);">Myself. If I will be working in an information environment, I must have discipline for myself. I have to be hardworking in my work, just like all my fellow workers will be doing. I mustn’t be late in work. I must follow what my boss says to me and must do it in time for the deadline, if there is. And I’ll just be absent if I really have an important excuse for it.</span><br /><br /><span style="color: rgb(255, 0, 0);">In an information environment, I must expect that I will be working with a team or if not, then other personnel. There are issues sometimes that fellow workers have arguments, and I must not be one of those workers. I have to a develop a camaraderie between my fellow workers so there will be no hindrance to the flow of work in our department. In short, there has to be chemistry,hehe.</span><br /><br /><span style="color: rgb(255, 0, 0);">Also, you have to be particular with the hardware and software that you’ll be dealing with when you work. What the company provides you; you have to make use of it. If you complain about it, then it’ll be a possible “kick out” for you. You’re just a worker following orders, and you really have a thick face (bagag nawong in bisaya) or in serious terms, boastful if you do that.</span><br /><br /><br /><br /><br /><br /><span style="color: rgb(255, 0, 0);">http://www.adb.org/Documents/TARs/PRC/26351-PRC-TAR.pdf</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-76785969484321486882009-10-10T03:06:00.000-07:002009-10-10T03:08:11.038-07:00Assignment #6 in MISIf you were hired by the university president as an IT consultant, what would you suggest (technology, infrastructure, innovations<span class="postbody">If I were hired as an IT consul;tant i would like to suggest the following for a benefits of the University..<br /><br />• The Information Technology Consultant works with user groups to solve business problems with available technology including hardware,<br />software, databases, and peripherals. Services may include studying and analyzing systems needs; systems development; systems<br />process analysis, design, and re-engineering; feasibility studies; developing requests for proposals; evaluating vendor products and<br />making recommendations on selection. Enterprise support may require knowledge of business management, systems engineering operations research, and management engineering. Duties are performed at various levels within the defined category<br /><br />• Probably focus your technical skills on predictable technologies: Microsoft server and desktop OSs, Microsoft Office software, e-mail platforms, and TCP/IP. Particularly ambitious IT consultants might add VoIP, Cisco, SonicWALL, and other network technologies to their plate, too.<br />But you may be missing a cash cow if you overlook Intuit products. The company recently reported a 9 percent increase in quarterly revenue vs. the third quarter 2008. With third quarter 2009 revenue of $1.4 billion, someone is buying Intuit products, and many of those people could be your clients.<br /><br />• A consultant is a professional that provides expert advice in a particular domain or area of expertise such as accountancy, information technology, the law, human resources, marketing, medicine, finance or more esoteric areas of knowledge, for example engineering and scientific specialties such as materials science, instrumentation, avionics, and stress analysis. See related Certified Management Consultant and MBA.<br />• An expert in a specialized field brought in to provide independent professional advice to an organization on some aspect of its activities. A consultant may advise on the overall management of an organization or on a specific project, such as the introduction of a new computer system. Consultants are usually retained by a client for a set period of time, during which they will investigate the matter in hand and produce a report detailing their recommendations. Consultants may be established in business independently or be employed by a large consulting firm. Specific types of consultants include management consultants and internal consultants.<br /><br />I would like to suggest the following for the Infrastructure which is the computer hardware and sofware infrastructure: Computers should be running at least Pentium-2.0Ghz w/48.8K modem. Computer technician would use different "internet software" ( pick and choose what works better ). Network technician would also use different operating systems ( WinXP or WinVista or Linux ). Host computers should upgrade to faster hardware ( Pentium 4, Dual Core, Core 2 Duo, AMD Sempron, AMD Athlon ) and upgrade to faster connection ( DSL or Full T1,T2 ).<br /><br />University internet server needs to have a 24 hour dedicated connection to the internet and it should be internet server == a "unix machine" + firewall + router + phone lines to ISP. Another suggestion is to switch to a "better/faster/larger" ISP ( not the slow commercial online services ).<br /><br />I would suggest the innovations in cable modem/router tweaking to improve university internet connection speed. All modems make it possible for established communications channels to support a wide variety of data communication. Similar to other modems, a cable modem receives and sends data by modulating and demodulating signals. However, cable modems differ from other modems because they also function like routers. Broadband Internet data is delivered into the home or office over a coaxial cable line that also carries television signals. The information travels like a TV channel through the coaxial cable line. The cable modem separates the data from the television signals and directs the data to the PC and video to the television.<br /><br />Local traffic is the biggest speed cap that plagues cable modems or a source of a slow cable internet connection. Cable modems work on a network/grid that connects to a T3 router running at 45 Megabits per second. Depending on where computers placed, they could have a busy grid, or a not-so-busy one. Then there is Internet traffic. Network administrator’s best bet if he really needs the speed is to pick a time where not as many people are on. There is a noticeable difference in traffic between 2 AM and 6 PM.<br /><br />There are a number of ways to improve the performance of university cable modem/router. Unlike old fashioned dial-up modems, there isn't a whole lot he can do to increase the speed of computer cable connection. He can tweak the way the broadband Internet cable connection sends the data/packets back and forth. If he is new to this whole thing, there are a number of programs that will automatically set the best values for the connection. Some of the most popular programs are EasyMTU, I-Speed, Intelli Dial-Up, Smartalec, Smartplay.<br /><br />There’s also Web browser called Voyager 5000 made by Smartalec that’s much faster than regular Internet Explorer. Updating the drivers on computer’s (Network Interface Card) can give the most noticeable speed boost above everything else. Some good places to check for drivers would be: <a href="http://www.drivershq.com,/" target="_blank">www.drivershq.com,</a> <a href="http://www.download.com,/" target="_blank">www.download.com,</a> and even <a href="http://www.altavista.com./" target="_blank">www.altavista.com.</a><br /><br />Improving university cable internet speeds with connection teaming is also an option. Midpoint has a feature called connection teaming. Connection teaming combines multiple connections to the Internet for increased bandwidth. Along with connection teaming, the software splits large files being downloaded into multiple smaller parts and downloads each part at the same time along each connection. Cable modem companies sometimes allow network technician to purchase additional IP address for a monthly fee. @Home does this for $5 per IP address. @Home caps the bandwidth per account, not IP address - but at the very least, it might increase the efficiency of internet connection and allow the throughput to closer reach the capped maximum speed.<br />On a very basic level, host computer’s performance also affects the Internet performance as well. If university computer isn't running at its best, neither will the broadband Internet connection.<br /><br />VOICE OVER IP-INTERNET TELEPHONY<br /><br />VoIP (Voice over Internet Protocol) is a technology used for sending sound via network based on IP protocol, which is e.g. Internet. It allows for integration of telephony and data transmission into one net thanks to treating sound as an ordinary stream of data. This technology is more and more often perceived as an alternative to casual telephone networks due to its numerous advantages. VoIP enables making phone calls also to subscribers who do not have Internet and use traditional telephone network or a mobile.<br /><br />The basic principle of the technology\'s operation is relatively simple, namely the speech signal is transferred to digital representation, it undergoes compression with a proper codec and then it is divided into packets and sent via IP protocol. Many new technologies are used here, including logical elements and special protocols. Logical elements are necessary for, among others, managing notifications and storing information on it, routing packets etc. New protocols are mainly signal protocols, which means that they are used for making connections and multimedia sessions, determining user\'s location, translation of addresses, negotiations of parameters of the notification link, disconnecting and managing notifications, billings and realizations of safety mechanisms. At present two main protocols are used for VoIP, namely H.323 and SIP.<br /><br />H.323 Protocol<br />The first version of the protocol was adopted over 10 tears ago, namely in 1996, the second one in 1998. It belongs to the family of H.32x protocols, which describe multimedia connections inside various networks:<br />H.320 - narrow-band digital networks ISDN<br />H.321 - broad-band digital networks ISDN and ATM<br />H.322 - packet networks with guaranteed band<br />H.323 - packet networks with no guaranteed band<br />H.324 - analogue POTS networks<br /><br />All of these protocols support various sets of audio and video codecs, depending on the band made available in the network. They can operate with transmission control (TCP) or without it (UDP), where in VoIP connections no control protocols are used due to additional delays. H.323 supervises the process of sending multimedia data in packet networks, performing this task in real time. Components of H.323 precisely define how particular components of the system, operating according to the protocol, initiate multimedia sessions and how working posts exchange compressed audio and video data between themselves. H.323 supervises processes of sending multimedia data in packet networks, performing this task in real time. Architecture of telephone IP network, base on H.323 standard, consists of four basic elements: terminals, gatekeepers, gateways and MCU (Multipoint Control Units).<br />Terminals are clients who have the possibility of initiation and receiving notifications. They are also used for sending and receiving two-way stream of data. A terminal can be both, software operating on a PC and a special device designed for this purpose. All terminals should make carrying out a telephone conversation possible, while data or video service is optional.<br />Gatekeepers manage the so-called zone, which is a collection of terminals, gateways and MCU. H.323 standard divides the net into these zones. Notifications inside a net are managed by a gatekeeper. Inter-zone notifications can engaged many gatekeepers. A gatekeeper, when present in the net, supervises the course of all telephone conversations carried out in a zone. Its basic tasks are the following: control of the available band, routing notifications, receiving, refusing notifications in a zone, translation of addresses and user authorization. Gatekeeper is also an interface to other H.323 networks. A \"gatekeeper\" is an optional element of the network but if it is present in a given subnetwork, then the terminals can use it.<br />A gateway is responsible for connecting the telephone IP network to other types of network. For example, a gateway can connect H.323 network with SIP, PSTN (Public Switched Telephone Network) or ISDN networks. The gateway must provide an interface of real time between various transmission formats and communication procedures. Moreover, it is responsible for establishing and disconnecting connections in both connected networks. The gateway must therefore have mechanisms converting various formats at its disposal and it must operate networks based on various technologies. MCU runs conferences in which at least three end points participate. An MCU unit manages conference resources, runs negotiations between end points (agreeing on, for instance, the method of encoding audio and video data) and it can steer streams of packets containing multimedia data. MCU consists of two basic elements: Multipoint Controller (MC) and optionally a few Multipoint Processors (MP). MC is responsible for exchange of information and for negotiation of communication parameters between the end points, it runs H.255.0 signaling MP is among others responsible for mixing various multimedia data, format translations and eventual redistribution of streams from users.<br /><br />What is very often possible is integration of network elements in one physical device. For example, functionality of a gatekeeper can be combined with functionality of a gateway and an MCU or an MCU can be built into the terminal so as to make conference connections possible without additional devices.<br /><br /><br />LINUX ROUTER<br />Everything takes place in Linux environment (distribution practically does not matter but personally I recommend Slackware). I presume that people reading this article are equipped with basic knowledge on compilations, patching and software installation in Linux systems and that they are familiar with basic principles of working with packet filter iptables and a tool for queuing tc. The following elements influence the system so that it manages the band properly:<br /><br />- linux kernel in version 2.6.15.x<br />- patch to linux kernel -2.6.14-imq6.diff<br />- patch to kernel esfq-kernel.patch<br />- latest iptables (1.3.5 currently)<br />- patch for the iptables iptables-1.3.0-imq1.diff<br />- ipp2p module for iptables<br />- packet iproute2<br />- patch for iproute2 esfq-iproute2.patch<br /><br />I suggest installation of the software in the above-stated order. Kernel 2.6.x is much more stable than series 2.4.x. The above configuration was tested by me on a big group of routers (10 ) and it has been working perfectly well. Needles to say, in Linux, you can only limit the output movement from a given interface with tc (Traffic Control). What we need then is a virtual mediation interface (the so-called IMQ) to which the Input movement should be redirected (the so-called Input). Thanks to such an operation, the input movement could be limited as output movement from a virtual IMQ. Obviously, queuing of solutions can be done without IMQ but I do not recommend this method because it is based up feigning packets, which makes later classification and prioritization impossible. I need to say a few more words on the interfaces. No network card based on Realtek\'s chipset should be used (especially RTL 8319), as they are devices designed for working posts and they lose work stability when there are more connections, which is manifested in an increase of the \'pings\' and in many other awkward phenomena. Instead of them I recommend cards based upon Intel Pro or 3com.<br />Another aspect is the ESFQ mechanism (Enhanced Stochastic Fair Queuing) for the WAN router. In comparison to the traditionally used SFQ mechanism, it enables just division of links with a view to connections from the source and target address (hash src, hash dst - upload, download to WAN). Thanks to this, we are able to make WAN interfaces totally independent from LAN interfaces. Briefly speaking - no queuing is necessary for LAN, the whole movement will be justly separated between them. All of the above solutions refer obviously to HTB mechanism (Hierarchic Token Bucket).<br /><br />The University must ensure that the networks are maintained by their IT personnel and or technicians and the connection is monitored from time to time.<br /><br />Today's networks have a significant impact on our lives - changing the way we live, work, and play. Computer networks - and in a larger context the Internet - allow people to communicate, collaborate, and interact in ways they never did before. We use the network in a variety of ways, including web applications, IP telephony, video conferencing, interactive gaming, electronic commerce, education, and more.<br /><br />What are the benefits of networking? In a network, information and resources can be shared. This brings a number of advantages: You can share expensive peripherals, such as printers. In a network, all the computers can access the same printer. You can pass data between users without using floppy disks. Transferring files over the network eliminates time wasted copying files onto a floppy disk and then onto another PC. Also, there is less restriction on the size of file that can be transferred over a network. You can centralize key computer programs, such as finance and accounting. Often users need to access the same program so they can work on it simultaneously. One example would be a ticket booking office system where it would important to prevent a ticket being sold twice. You can institute automatic file backup. A computer program can be used to back up key files automatically, saving time and ensuring that all your work is safe.<br /><br />In a Wide Area Network, information and resources can be shared over a greater geographical area. This brings a number of advantages: You can send and receive e-mail from all over the world, communicating messages and announcements to many people, in many different areas, quickly and inexpensively. You can transfer files to and from colleagues in other locations, or access the company network from home. You can access the vast resources of the Internet and the World Wide Web.<br /><br />Internet has great effects in every people on earth that makes the people saw the as the useful tool for basically information for news, events, browsing for people and for history and many more. Internet has changed the way we communicate with our loved ones across the country because it offers more benefit than the old communication technologies. In education Internet has become a virtual assistant for students who wants research be done easily and hassle free.<br /><br /><a href="http://www.cio.com/article/131600/The_Role_of_IT_in_Innovation_Friend_or_Foe_/4" target="_blank">http://www.cio.com/article/131600/The_Role_of_IT_in_Innovation_Friend_or_Foe_/4</a></span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com5tag:blogger.com,1999:blog-4281372206264185528.post-37735731923292054552009-10-07T04:05:00.000-07:002009-10-07T04:07:19.748-07:00Assign #6 HRM(What do you think will the 21st -century corporations look like?)<span style="color: rgb(255, 0, 0);" class="postbody">Hmm!! The 21st century look like?<br /><br />for me the 21st century look like the modern corporation compare to the corporation in the past century, because the 21st century is the technology era in which the corporation are aiming for a good and competitive corporation through the help of technology. A technology gives a big contribution to the corporation specifically for the fast and reliable transaction, with this reason the company can provide a good relationship to the world of business..<br /><br />The advancement in information technology generates huge potential for moving business and production up the value-chain, and improving the quality of life of citizens. At the same time, it brings about new challenges in areas such as information security, protection of intellectual property rights and privacy in the digital environment and the appropriate mode of regulation in the face of increasing media convergence. Leading digital economies need to embrace both opportunities and challenges brought by the technology development in order to stay in the forefront of the league.<br /><br />The Digital 21 Strategy was first published in 1998 as the blueprint for Technology development. It was updated on a regular basis to take into account technological and socio-economic changes.<br /><br />Achieving the vision of enhancing Company's status as a leading digital corporation requires collaboration amongst all stakeholders in the community, including the Government. That is why the formulation of the Digital 21 Strategy has all along been integrated with a thorough public consultation process to strive for a balanced view on the future direction of technology development in a corporation.<br /><br />The 2008 Digital 21 Strategy has now been finalized after undergoing public consultation. It contains five key action areas:<br /><br /> * Facilitating a digital economy;<br /> * Promoting advanced technology and innovation;<br /> * Developing Company's for a good in technological cooperation and trade;<br /> * Enabling the next generation of public services; and<br /> * Building an inclusive, knowledge-based society.<br /><br />With the advent of information societies, a robust information infrastructure, just as essential physical infrastructure, is crucial to supporting and propelling the growth of economies. I believe Company's has a solid Information and Communication Technology foundation which allows the company to move further ahead. The penetration rates for broadband Internet connection and mobile phones can be become competitive. A technology can built up a substantial e-business presence over the years and will endeavor to increase the user-friendliness of the company electronic public services. The initiative to install Wi-Fi hotpots in major Business premises to provide free access to broadband Internet further demonstrates the commitment to enhancing the Communication Technology capabilities of the community.<br /><br />Rapid economic development in the Mainland, particularly with the emphasis on technological advancement in the Nation's 11th Five-Year Plan, opens up immense opportunities for the corporation to serve as a hub for fostering cooperation amongst local, Mainland and overseas Information and Communication Technology enterprises. The availability of excellent professional and financial services, a rigorous intellectual property protection regime and advanced infrastructure such as Cyberport and Science Park enable corporation to play this unique role.<br /><br />The ability to leverage technology is an important attribute of a world city in the modern era. The Commerce and Economic Development is firmly committed to furthering the technology development of a corporation having regard to the aspirations and needs of the businesses and citizens.<br /><br /><br /><a href="http://www.info.gov.hk/digital21/eng/strategy/2008/Foreword.htm" target="_blank">http://www.info.gov.hk/digital21/eng/strategy/2008/Foreword.htm</a></span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-8031784300335887252009-10-04T20:38:00.000-07:002009-10-04T20:39:26.833-07:00Outsourcing/ In-sourcing<span class="postbody"><div align="justify">Choosing between the outsourcing and In-sourcing its really hard for me to decide. But let’s us see what will be my stand after discussing this topic. Let’s me first define in-source and out-source. The Second, advantages and disadvantages of both for me to decide weather I stand in outsourcing or In-sourcing,<br />What is Insourcing?<br /><br />The opposite of outsourcing can be defined as in-sourcing. When an organization delegates its work to another entity, which is internal yet not a part of the organization, it is termed as in-sourcing. The internal entity will usually have a specialized team who will be proficient in the providing the required services. Organizations sometimes opt for in-sourcing because it enables them to maintain a better control of what they outsource. In-sourcing has also come to be defined as transferring work from one organization to another organization which is located within the same country. In-sourcing can also mean an organization building a new business centre or facility which would specialize in a particular service or product.<br />Organizations involved in production usually opt for in-sourcing in order to cut down the cost of labor and taxes amongst others. The trend towards in-sourcing has increased since the year 2006. Organizations who have been dissatisfied with outsourcing have moved towards in-sourcing. Some organizations feel that they can have better customer support and better control over the work outsourced by in-sourcing their work rather than outsourcing it. According to recent studies, there is more wok in-sourced than outsourced in the U.S and U.K. These countries are currently largest outsourcers in the world. The U.S and U.K outsource and in-source work equally.<br /><br />To make it shot, in-sourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.<br /><br />What is Outsourcing?<br /><br />Outsourcing began in the early eighties when organizations started delegating their non-core functions to an external organization that was specialized in providing a particular service, function or product. In outsourcing, the external organization would take on the management of the outsourced function.<br />Most organizations choose outsourcing because outsourcing offers a lot of advantages. When organizations outsource to countries like India, they benefit from lower costs and high-quality services. Moreover organizations can concentrate more on core functions once they outsource their non-core functions. Outsourcing can also help organizations make better use of their resources, time and infrastructure.<br />In outsourcing, the outsourcer and the outsourcing partner have a greater relationship when compared to the relationship between a buyer and a seller. In outsourcing, the outsourcer trusts the outsourcing partner with vital information. Outsourcing is no longer confined to the outsourcing of IT services. Outsourcers in the US and UK now outsource financial services, engineering services, creative services, data entry services and much more.<br />Most organizations are opting to outsource because outsourcing enables organizations to access intellectual capital, focus on core competencies, shorten the delivery cycle time and reduce costs significantly. Organizations feel outsourcing is an effective business strategy to help improve their business.<br /><br />Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.<br /><br /><br />The Advantages of outsourcing:<br /><br />• Outsourcing your non-core activities will give you more time to concentrate on your core business processes<br /><br />• Off shoring can give you access to professional, expert and high-quality services<br />• With outsourcing your organization can experience increased efficiency and<br />• Productivity in non-core business processes<br /><br />• Outsourcing can help you streamline your business operations<br /><br />• Offshore outsourcing can help you save on time, effort, manpower, operating<br />• Costs and training costs amongst others<br /><br />• Outsourcing can make your organization more flexible to change<br /><br />• You can experience an increased control of your business with outsourcing<br /><br />• Your organization can save on investing in the latest technology, software and infrastructure as your outsourcing partner would be investing in these<br /><br />• Outsourcing can give you assurance that your business processes are being carried out efficiently, proficiently and within a fast turnaround time<br /><br />• Off shoring can help your organization save on capital expenditures<br /><br />• By outsourcing, your company can save on management problems as your offshore partner will be managing the team who does your work<br /><br />• By outsourcing, you can cater to the new and challenging demands of your customers<br /><br />• Outsourcing can help your organization to free up its cash flow<br /><br />• Sharing your business risks is possible with outsourcing<br /><br />• Outsourcing can give your business a competitive advantage as you will be able to increase productivity in all the areas of your business<br /><br />• Outsourcing can help your organization to cut is operational costs to more than half.<br /><br />In addition to the above mentioned benefits on outsourcing, I have here some to take on consideration:<br />• Ability to focus on core competencies. By handing over noncore activities to a trusted third party, a company can concentrate on activities central to its value proposition and increase its competitive positioning.<br /><br />• Faster and higher-quality service and improved efficiency. Vendors’ economies of scale, combined with service level guarantees, translate into increased operational efficiency for a company. For<br />Example, outsourcing vendors typically offer service level agreements (SLAs) for availability of at least 99.9%, and many include financial penalties for downtime. Along with higher-quality service, many<br />Outsourcers claim to reduce cost of management by up to 25%.<br /><br />• Access to new skills and technology. Outsourcing gives a company access to resources not available internally, such as modern, up-todate technology and skilled human capital.<br /><br />• Greater flexibility. The flexibility gained through outsourcing helps a company react quickly to changing market conditions, fluctuating demand cycles, and increased competition.<br /><br />• Staff reallocation. Personnel whose job responsibilities are reduced or eliminated by outsourcing can be reassigned to other, more strategic tasks.<br /><br />• Lower long-term capital investments. In a typical IS outsourcing contract, the vendor takes ownership of and responsibility for managing all or part of the client’s IS operations or infrastructure, thus eliminating the client’s ongoing investments in computer equipment. The capital funds previously allocated for computer equipment are freed for spending elsewhere.<br /><br />• Improved predictability of costs. Outsourcing provides a company with predictable yearly costs for the management of all or part of the IS infrastructure.<br /><br />• Assistance with organizational changes. A third-party IT service firm can help build new infrastructures or merge two existing infrastructures during or shortly after a merger, acquisition, or<br />joint venture.<br /><br />• Assistance with globalization. A company looking to move into international markets can rely on a global outsourcer for assistance in broadening infrastructure and operational reach.<br /><br />The Disadvantages of Outsourcing<br />• At times, it is more cost-effective to conduct a particular business process, rather than outsourcing it<br /><br />• While outsourcing services such as payroll processing services and tax preparation services, your outsourcing provider will be able to see your company’s confidential information and hence there is a threat to security and confidentiality in outsourcing<br /><br />• When you begin to outsource your business processes, you might find it difficult to manage the offshore provider when compared to managing processes within your organization<br /><br />• Off shoring can create potential redundancies for your organization<br /><br />• In case, your offshore service provider becomes bankrupt or goes out of business, your organization will have to immediately move your business processes in-house or find another outsourcing provider<br /><br />• The employees in your organization might not like the idea of you outsourcing your processes and they might express lack of interest or lack of quality at work<br /><br />• Your outsourcing provider might not be only providing services for your organization. Since your provider might be catering to the needs of several companies, there might be not be complete devotion to you and your company<br /><br />• By outsourcing, you might forget to cater to the needs of your valuable customers as your focus will be on the business process that is outsourced<br /><br />• In outsourcing, you may lose your control over the process that is outsourced<br /><br />• Outsourcing, though cost-effective, might have hidden costs, such as the legal costs incurred while signing a contract between companies. You might also have to spend a lot of time and effort in getting the contract signed<br /><br />• With outsourcing, your organization might suffer from a lack of customer focus<br /><br />• There can be several disadvantages in outsourcing, such as, renewing contracts, misunderstanding of the contract, lack of communication, poor quality and delayed services amongst others.<br /><br />The advantages of in-sourcing:<br /><br />Low risk is perhaps the primary advantage of insourcing: Direct control over the resources doing the work permits better control over the results. An internal LPM directly coordinates and manages each activity with resources that can be in nearby offices. In this model, the people doing the work also directly coordinate it.<br /><br />Direct control over the localization resources can produce noticeable cost savings. At one point when employing the total out-sourcing model, we discovered we were paying for as many as six levels of management and coordination on a project—the files, instructions, and other information passed through six other people on the supplier end before reaching the linguist<br />doing the translation. One can easily understand why messages were so different by the time the worker received them. Direct control of the resources also allows greater flexibility over such factors as resource utilization, staff selection, and labor cost. For example, paying a higher<br />wage to linguistic resources may result in lower workforce turn-over, higher quality, and a greater ROI (return on investment).<br /><br />Factors to consider include:<br /><br />• Reduce recurring costs associated with managing a Help Desk including staffing and training<br />• Improve service levels and increase professionalism among Help Desk staff<br />• Realign your staffing as necessary <br />• Take advantage of existing Help Desk infrastructure and recent call management software implementation<br />• Predictable monthly service charge for service<br /><br />• Scalable<br />• Company retains control<br />• Company owns technology and data<br />• Direct knowledge transfer of best practices to your company<br />Pros<br />• Scalable<br />• Company retains control<br />• Company owns technology and data<br />• Direct knowledge transfer of best practices to your company<br />• Allows 2nd Level Support to focus on more difficult technical problems<br /><br /><br />The Disadvantages of In-housing<br /><br />A potential major disadvantage is the sheer volume of personnel needed to meet the localization requirement. This model can be perfectly viable when localizing into<br />just a few languages but becomes less so—if not economically infeasible—when localizing products into many languages.<br /><br />Factors to consider include:<br /><br />• Work frequency in each language – in-house personnel must have enough work on a regular<br />basis to remain cost effective.<br />• Infrastructure – in-house personnel need offices, computers, telephones, office supplies, and so forth to function properly. The key to success is keeping these resources utilized on value-add activities. Under-utilization means excess capacity that can quickly consume the savings that insourcing provides over out-sourcing.<br /><br />• Will require significant staff changes<br />• Must invest time in management of insourcing company<br />• Investment in technology and process<br />• Facility and technology must be provided and managed by your company<br /><br />Cons<br />• Will require significant staff changes<br />• Must invest time in management of in sourcing company<br />• Investment in technology and process<br />• Facility and technology must be provided and managed by your company<br /><br /><br />What is best for our organization?<br /><br />Here are some tips for us to be able to decide on what to choose: insource or outsource.<br /><br />• If your organization has a number of non-core processes which are taking plenty of time, effort and resources to perform in-house, it would be wise to outsource these non-core functions. Outsourcing in this case, would help you save on time, effort, manpower and would also aid you in making quicker deliveries to your customers.<br /><br />• If you require expertise services in areas which do not fall under your core competency, then outsourcing will be a good option as you can get access to expertise services. For reducing costs and making faster deliverables, outsourcing is again a good option.<br />• If your work involves production, then it would be more ideal for your organization to opt for insourcing, as you can save on transportation costs and exercise a better control over your project.<br /><br /><br />Hybrid Model<br /><br />As I had doing my researches with this topic I had discover that we can do three approaches to project resourcing; out-sourcing (using external agencies), insourcing (using internal resources), or a combination of the two, we can called the hybrid model. Intel IT has adopted a hybrid model that combines the advantages of both out-sourcing and in-sourcing. But Intel IT uses this approach for large corporations whose documents require localization.<br /><br />This approach may not applicable to our school as it stated above it is used in large corporation or big organizations or companies. But I just want it to include to this topic.<br /><br /><br />Hybrid Model<br /><br />Historically, large corporations often vacillate between total out-sourcing and total in-sourcing. While these shifts may seem appropriate based on changing economic factors, constant switching adds costs and delays the return on the investment each time it occurs. Intel IT has adopted a successful hybrid approach that has helped break this cycle.<br /><br />A hybrid model combines in-sourcing and out-sourcing and is configured to meet the localization project’s specific needs. We constructed the Intel Linguistic Services (ILS) as part of our localization effort. ILS consists of a large,<br />worldwide network of freelance linguists covering over 30 languages. ILS also maintains a few in-house linguists for the core (high demand) languages. Translators, editors, desktop publishers, and so forth populate the freelance base according to language specific needs. Most freelancers reside in the target countries to ensure their work conforms to the latest vocabulary and cultural adaptations.<br /><br />The small number of in-house linguists provides overall direction, consistency, consulting, and advanced expertise in their respective languages.<br /><br />Advantages<br /><br />Advantages to this hybrid model include:<br /><br />• High resource utilization – freelance base works on an as-needed basis, avoiding the possibility of large amounts of excess capacity sitting unused.<br />• Competitive cost – freelance base is PPV and allows us to directly contact the workforce, saving middle-man costs.<br />• Managed risk – direct access gives us greater control of the quality and timeliness of our deliverables.<br /><br />We use a simple database to track all of these efforts. Our LPMs use the database to access individual name, language, contact information, quality rating, and other data. For payroll issues, we hire individual freelancers through sponsoring suppliers that handle most of the payroll activities.<br /><br />Disadvantages<br /><br />Managing individual assignments for so many workers is certainly more effort for the project manager than under a total out-sourcing model. Internal localization teams are responsible for understanding and handling such factors as individual availability and the no-work holidays of specific countries. This duty requires a more intensive ability and overall discipline to organize and track data than out-sourcing requires. Managing a network of freelancers also requires in depth skills in mass communication and management. At times, style guides, encryption keys, and other kinds of non-project specific information must go out to the entire network.<br /><br />In a large corporate environment, a company has three models for completing its localization projects. Intel IT developed and adopted a hybrid model that combines in-house linguists with a worldwide network of freelance<br />resources. This combination optimizes risk management, resource utilization, and cost savings. Depending on the scope of work and number of target languages, this model may be well suited for implementation at other large companies whose content requires localization.<br /><br />My opinion:<br /><br />There is a big debate going on at the moment and people are constantly arguing whether or not it is better to outsource or to in-source. Even me I still get confuse with is best and preferable to apply in our school. We can mention a lot of good reasons and bad reasons for both at the end of the day what is important stand in our own personal needs.<br /><br />If I have to look above In-sourcing is gives a lot of benefits to the company but let us look or defined what kind of organization that we are trying to criticize. The University of Southeastern Philippines (USEP) is a state university owned and controlled by the Philippine government. Meaning the USEP is a centralized organization. They can not decide or easily approved the budget for their system. In outsourcing although it is so expensive but in the long run they can save in outsourcing.<br />For me the best way for the USEP is to outsource their system. It’s hard for the faculty and Staff of the IC to program at same time teaching, If the university will suggest to In-source their system possible for them to add a new employee which to expensive for the government in the long run.<br />That’s all about this topic. See you guy’s for the next topic…. Thank you for reading!!!<br /><br /></div><br /><br />please try to visits my blog:: <a href="http://0514vashtrigger.blogspot.com/" target="_blank">http://0514vashtrigger.blogspot.com</a><br /><br /><a href="http://www.outsource2india.com/why_india/articles/outsourcing-versus-insourcing.asp" target="_blank">http://www.outsource2india.com/why_india/articles/outsourcing-versus-insourcing.asp</a><br /><a href="http://www.google.com/search?hl=en&safe=strict&q=outsoucing+vs.+in-sourcing&aq=f&oq=&aqi=" target="_blank">http://www.google.com/search?hl=en&safe=strict&q=outsoucing+vs.+in-sourcing&aq=f&oq=&aqi=</a></span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com8tag:blogger.com,1999:blog-4281372206264185528.post-79322915387458986302009-09-29T14:22:00.000-07:002009-09-29T14:27:31.839-07:00a company website that has undergone HR downsizing.<span style="color: rgb(255, 0, 0);" class="postbody"><br /><br /></span><span style="color: rgb(255, 0, 0);font-family:Tahoma;font-size:85%;" >Downsizing, restructuring, rightsizing, even a term as obscure as census readjustment has been used to describe the plague that has been affecting corporate America for years and has left many of its hardest working employees without work. In the 1980’s, twenty-five percent of middle management was eliminated in the United States (Greenberg/Baron 582). In the 1990’s, one million managers of American corporations with salaries over $40,000 also lost their jobs (Greenberg/Baron 582). In total, Fortune 500 companies have eliminated 4.4 million positions since 1979 (Greenberg/Baron 627). Although this downsizing of companies can have many reasons behind it and cannot be avoided at times, there are simple measures a company can take to make the process easier on the laid-off employees and those who survive with the company.<br /><br />STAGES OF DOWNSIZING<br /><br />The downsizing process can generally be broken down into three distinct stages. The first stage is called the diagnostic stage. In this stage, management staff pulls together and determines the amount of costs and expenses that need to be reduced, and how much can come out of layoffs (Moore 49). This stage usually takes about two to three months to complete. During this time, the upper management reviews all financial records in order to determine how much must be cut from salary expenditures (Moore 50). This stage is concluded when the senior management has a detailed plan on who will be let go, and who will remain with the company. During this stage, there is one common mistake many companies make: lack of communication. The middle management is usually left out of all downsizing plans. This is wrong and creates a big mistake. Middle management should be looked upon as a valuable tool for giving input where cuts should be made (Moore 51). The next stage of downsizing is the implementation stage. During this stage the employees are laid off. The time between an announcement and the actual layoff should be as short as possible. This will almost insure that a panic will be avoided, and give a clear view of the situation at hand without causing mass-hysteria. In a managerial position, it is difficult to explain to an employee that he or she is being laid off, but Terrence Moore gives a guideline on how it should be done. Small talk should be avoided. Management should clearly explain that the employee is being laid off and be prepared to answer questions directly; avoid beating around the bush. It is extremely important to detail all employee benefits and severance pay, also the employee should be encouraged to come back with any questions that he or she may have (Moore 52). An important note is that the employee should not be given false hope. It should be made clear, from the start that the employee is being laid off and doesn’t have a chance of being rehired. Finally, you should not lie to the employee stating that you know how they may feel if you don’t. The final stage is the post-implementation stage. This is dealing with the survivor syndrome and helping displaced employees find jobs throughout placement sources. Sadly, management usually expects the remaining employees to return to their jobs as if nothing had happened. However, this is not usually the case. Survivors suffer with negative feelings of resentment, frustration, irritability, fatigue and burnout. They may also undergo feelings of insecurity with their company. A way to help survivors deal with their problems is to offer personnel workshops (or programs) that offer support to help cope with the anxiety that adjustment brings (Moore 53).<br /><br />REASONS FOR AND EFFECTS OF DOWNSIZING<br /><br />There are many reasons why a company might need to downsize. In today’s corporate America, it is a plain fact that far fewer employees are necessary to maintain a successful operation. Many times, it is the case where a technological advance or breakthrough makes it possible to replace a previously human job. It is also an all-too-common scenario that outside influences such as sudden shifts in the market or changed government policies force corporate executives to make coinciding decisions regarding their staff and these external changes. Another one of the major problems in today’s business world are the salaries being paid to the workers. Since employers are not paying their workers high wages, the workers have little to put back into the economy. This causes the system to plummet and forces companies to downsize to keep from going under. The downsizing of a company can affect employees before, during and after it occurs. Employees usually know of a possible downsizing (care of the almighty grapevine) months before it is supposed to happen. Thus, employees may become paranoid and self-absorbed, and their top priority is their own career rather than the bottom line of their employer. This causes them to be unfocused and prevents them from performing their jobs efficiently. Many workers would also be perfectly willing to stab their peer(s) in the back in hopes of keeping their job. Usually when a downsizing is complete, the company is at an all-time low. This is due to the fact that in almost every merger, acquisition or downsize, employees are faced with uncertainty about their jobs before and after the restructure. After a large percentage of downsizes, ten percent of the remaining workforce will easily adapt to the change, while another ten percent will never adapt (Hollreiser 27). Workers who survive the downsize often have feelings of anger, fear or distrust. Further internal problems result from employees who survive with the company, but cannot adapt to their new settings and expectations, and eventually quit their job. Many steps can be taken to ease the transition of the employees after downsizing occurs. For the employees who were let go from the company, reasonable severance packages should be offered to help the person until a new job is found. Downsizing not only affects workers that have been terminated, but also affects the survivors. This is commonly referred to as the survivor syndrome. Many people who survive as a result of downsizing often live with the fear that they too will be terminated. They are often shell shocked and distrustful. They are mentally scared survivors of an economic restructuring that they have never seen before. In this constant climate of economic insecurity, their jobs are constantly being redefined. They are forced to meet new levels of production criteria requiring them to do more work in less time and the notion of job security (because of expandability) is obsolete (Caudren 52). As for the remaining employees, simple means of communication can be very important. One of the major reasons for employee problems after a downsizing is the mistrust in the management and lack of knowledge regarding their own job status. If the employees are informed of what is transpiring within their company, they might not be fearful of losing their job, or so quick to stab a fellow employee in the back. This problem has affected millions of families in America and has forced good, decent workers to settle for lower wages and little or no benefits in exchange for supposed higher job security. I also have some personal experience with this subject. My father currently works for AT&T and survived the recent downsize and split the company underwent. However, he was not so lucky with his previous employer, Nabisco, Inc.. In 1988 Nabisco, Inc. and RJ Reynolds, Inc. Merged and downsized, laying off thousands of employees of which my father was one.<br /><br />POSITIVE EFFECTS OF DOWNSIZING<br /><br />Although downsizing can have devastating effects on those people on the negative side, the remaining employees can have tremendous opportunities for growth and skill development. After a restructure, there are many ways an employee can grow vertically and horizontally within their company. Since so many positions are eliminated in such a process, the remaining employees sometimes need to learn new skills and adapt to handling greater amounts of work than ever before. While this may be an inconvenience at first, these skills and abilities can assist these people in future job searches.<br /><br />CONCLUSION<br /><br />The downsizing process is a fact of life. It affects all people from managers to laid off employees and their families as well as those who remain with the company. It is something that will continue to occur with no end in sight. As long as our world market continues to grow, so too will the concept of downsizing grow. This process can lead to psychological problems, and creates anxiety and frustration for those of both ends of it. This is a problem that most likely will not have an easy solution, or at least not any time soon. It is something that we all must deal with in one way or another, and as for the victims of downsizing, the only thing they can do is try to piece their lives back together and hope for the best. </span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-29148287652608326812009-09-15T03:12:00.000-07:002009-10-04T20:40:41.230-07:00<div style="text-align: left;"><span style="color: rgb(255, 255, 51);" class="postbody"><strong><span style="color: rgb(255, 0, 0);">SONA(State Of the Nation Address) Assignment #7 In MIS</span><br />Investment and Trade</strong></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"> Investment. The investment climate created by the Arroyo Administration’s fiscal consolidation and establishment of strong macroeconomic fundamentals continued to support investment inflows in the country. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">In 2001, the institution of the Investments Relations Office (IRO) under the Bangko Sentral ng Pilipinas (BSP) developed and improved a coordinated approach to the dissemination of timely and comprehensive economic information for the use of analysts and investors in making investment recommendations and decisions. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">Additionally, the Administration’s policy to simplify investment registration procedures, such as the establishment of the National Economic Research and Business Assistance Centers (NERBACs), helped improve investment transactions in the country. From 2007 to May 2009, fifteen (15) NERBACs were established nationwide to facilitate investment promotion in the regions and assist Investment Promotion Units (IPUs). It also enhanced the system of linkages and networking between and among government agencies in tackling investment-related issues and concerns affecting foreign and local investors in the Philippines, among others. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody">As a crucial component to improve industry competitiveness and reduce cost of doing business, investors’ concerns on modernizing infrastructure facilities in the country were addressed by prioritizing projects in the construction and rehabilitation of toll roads (e.g. Daang Hari-SLEX Link Road Project), expressways, among others.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">Cyber Corridor</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">The Cyber Corridor, which aims to create an information and technology-based knowledge economy through facilities that enhance interconnectivity and research and development initiatives, traverses all four geographic super regions from Baguio to Cebu to Davao.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody">The Cyber Corridor is being developed through public and private investments in the areas of ICT, education, and training.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody">The pilot-testing of a major ICT project, the Bureau of Internal Revenue’s (BIR) Revenue Watch Dashboard prototype system, was completed in May 2009. This web-enabled revenue monitoring tool aims to provide real time collection figures from the national level down to the Revenue District Office level.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">Aside from the priority infrastructure projects in the Cyber Corridor, the Government also pursued other Information and Communication Technology-related projects that supported the development theme of the Cyber Corridor. The Government has established public calling stations, telecenters and community e-centers to address the uneven distribution of fixed telephone lines in the regions.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody">By 2008, the Administration has installed facilities to areas without communication channels yet, such as 875 telegraph stations for telegraphic transfer and social telegram; digital telephone exchanges in 103 localities; 538 public calling stations which serves people who cannot afford to subscribe telephone services and areas not covered by fixed line facilities; 1,422 Telepono sa Barangay (TSB) stations; and a Regional Government Telephone Service in Cauayan, Isabela.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">Cyber Corridor is one of the Administration’s priority projects in which under the super regional development strategy of the Administration. This aimed at linking up the nation’s countryside with its growth centers through Information and Communication Technology (ICT) and the knowledge economy.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">The Administration has been harnessing information and communications technology through the Cyber Corridor to promote e-governance to simplify and expedite transaction of frontline services.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"><strong>BOI-PEZA Approved Investments </strong></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">(Board of Investments-Philippine Economic Zone Authority)</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• Investments approved by the Board of Investments-Philippine-Export Zone Authority (BOI-PEZA) grew almost three-fold from PhP182.84 billion in 2001 PhP443.15 billion in 2008. Some of the top investors from 2001 to 2008 include GN Power Ltd. Co., Masinloc Power Partners Co. Ltd., Globe Telecom, Emerald Energy Corporation, PNOC Petrochemical Development, JG Summit, Smart Communications Inc., Global Business Power Corp., Cebu Air, and Texas Instruments Philippines. The Manufacturing Sector remained to be the leading source of employment opportunities. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• The telecommunications industry gained momentum in 2001 when telecom giants such as Globe Telecom, Smart Communications and Digitel Communications poured in their investments which ventured towards Short Message Service (SMS) or commonly known as text messaging. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• In 2007, Texas Instruments (TI), considered as the world’s biggest mobile chip maker, invested US$1 billion worth of expansion project in the country. Described as one of the single biggest investments in the Philippine’s economic history, this gave signal that the country had found its niche as one of the best investment destinations in Asia. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• The continued expansion of the services sector is largely due to the rising investments in the call/contact centers and business process outsourcing (BPO) particularly in the areas of Software Development, Animation, Medical Transcription, and outsourcing services in Human Resources, Customer Service and Procurement, among others. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• From four (4) call centers operations with 2,400 employees in 2000, the industry remarkably grew in 2008 to 191 call centers in major areas in the country, generating 227,000 in local employment. Top contact centers in the country include Sykes, Convergys, Ambergis, and People Support. Moreover, companies that have set-up internal BPO operations in the country include HSBC, AIG Business Processing Services, Chevron Texaco, Procter and Gamble Asia Pt. Ltd., Shell Services, among others.</span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">• Being significant drivers to growth and employment, the BPO and information technology-enabled services (ITES) sectors were prioritized in the government’s Investment Priorities Plan (IPP). Under the IPP, investors enjoy fiscal incentives such as income-tax holidays, exemption from taxes and duties on spare parts, among others. </span><br /><span style="color: rgb(255, 255, 51);" class="postbody"></span><br /><span style="color: rgb(255, 255, 51);" class="postbody">The government also provided non-fiscal incentives to ICT investors, which include employment of foreign nationals in supervisory, technical, or advisory positions; simplified customs procedures; and, duty-free importation of consigned equipment.</span></div>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-19277100631967783622009-08-02T01:13:00.000-07:002009-08-02T01:15:15.696-07:00the university can help me to achieve my dream through all of these..<span style="color: rgb(255, 255, 0);" class="postbody">Hi guys..<br /><br />Actually I'll take long time before i answered this question.. I don't have any idea on how the university help me but in the fast few days during the sharers discuss their topics i got an idea on how will the university help me.. In fact The university are already helping me since the first day that i came here and became a USEPIAN because this institution have a big place to achieve my dream for somehow university was the one who molds me on what I'm right now and for the nearest future on what path will I'm going to choose for me to be guided for my better future.. Actually the university its not like, they can provide me anything that i want but in the sense that university are the one who taught me for what is needed and not what i wanted> And also make me strong and give me an idea on what I'm going supposed to do as a student because I'm not here to become a liabilities of this institution but Instead I came here to become an asset of this institute. That's why this university give me a good example on what is perseverance means. And I know that Everything that i learned in this institute and the knowledge that i got from my teacher, classmates and friends will be my intangible asset in my life forever and it will become an instrument for me to achieve my dream..<br /><br />that's all!!!!</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-3505818962099157462009-08-02T00:07:00.000-07:002009-08-02T01:11:07.318-07:00The Three URL Implementing Green Campus<span style="color: rgb(255, 0, 0);">1. http://www.theorion.com/2.691/green-campus-pushes-energy-saving-program-1.3253</span><br /><br /><span style="color: rgb(255, 0, 0);">They are implementing A simple computer program could save Chico State thousands of dollars, save on energy and reduce greenhouse emissions. </span><br /><br /><span style="color: rgb(255, 0, 0);">2. http://www.clemson.edu/studentaffairs/housing/living_green/index.php</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">Its mission is to promote a “green” campus by coordinating and sponsoring events that further Clemson’s commitment to the environment and sustainability. The goals of Solid Green are to raise awareness of littering on campus, recycling, energy and water conservation and other environmental issues; to promote clean-up activities and other events; and to support student groups that promote environmental awareness.</span><br /><br /><span style="color: rgb(255, 0, 0);">Teaching and Research</span><br /><br /><span style="color: rgb(255, 0, 0);"> * Strengthen and prioritize undergraduate, graduate, and post-grad environmental studies, research, and policy programs.</span><br /><span style="color: rgb(255, 0, 0);"> * Teach environmental literacy to all students.</span><br /><span style="color: rgb(255, 0, 0);"> * Expand opportunities for using the campus physical plant and business operations as a “learning lab” for students.</span><br /><span style="color: rgb(255, 0, 0);"> * Develop community environmental education programs and participate in public dialogue on environmental issues in the wider community</span><br /><br /><span style="color: rgb(255, 0, 0);">3. http://ssi.ucsd.edu/esiportal/index.php?option=com_content&task=view&id=228&Itemid=101</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">Relocate a college's server computers next to a solar-power generator. Replace AC power with DC power. Cool the servers only where they get the hottest. Put the servers in the ocean and power them with waves.</span><br /><br /><span style="color: rgb(255, 0, 0);">Those were a few of the ideas discussed last week at a conference, "Greening the Internet Economy," that was designed to address the problem of the soaring financial and environmental costs of information technology. The event, held by the University of California at San Diego, offered a sampling of a new generation of technologies that promise to help colleges make their IT departments both more efficient and more sustainable.</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">Regarding for the URL number 1. Saving an energy using an application software it is good for the university because we are implementing to save energy. this Software can reduce your monthly bill for electricity, but it must be that in every department must used this software. It's amazing right therefore our problem as a student for using or switching our laptop are being resolve.. Right? u just install the software in your laptop and you can't give a big charge for the university electricity charge.. for the URL number 2, As i observe a lot of student here in the university are using the outside source for their studies, which is to expensive specially to the less fortunate student who don't even know where to get their allowance for the next day or week..Why we don't expand opportunities to the students to used the campus for learning activities. University must use our campus for our focus of studies if our topic can be found inside the campus to save money or to consider the other students right. For the URL number 3, we must Relocate a college's server computers next to a solar-power generator, it is really cool right we can save more energy. The university must do this for a better way on how to implement green campus computing in USEP. Because if we implement all of this, not only the administration can get the benefits but also the student in the university can get a lot of benefits from using the electricity to conducting a proper studies. this all i can suggest!!!</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">hehehe!!!!</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-60688313173565280012009-07-16T02:10:00.001-07:002009-07-16T02:14:26.040-07:00On-Line Jobs That is best for me...<span style="color: rgb(204, 0, 0);">One of my dream is to become one of this jobs position:</span><br /><br /><span style="color: rgb(204, 0, 0);"> [b]NETWORK AND SECURITY ADMINISTRATOR[/b]</span><br /><br /><span style="color: rgb(204, 0, 0);">QUALIFICATIONS</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Graduate of Computer Engineering, Computer Science, Information Technology or its equivalent</span><br /><span style="color: rgb(204, 0, 0);"> * With at least 2 years experience as Network Administrator, with extensive work experience in network design, management and operations experience in LAN and WAN protocols</span><br /><span style="color: rgb(204, 0, 0);"> * Experience in set-up and administration of checkpoint firewall</span><br /><span style="color: rgb(204, 0, 0);"> * Experience in the design and built of infrastructure security</span><br /><span style="color: rgb(204, 0, 0);"> * Understanding of security policy standards</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge in server configurations with Unix Windows, Linux Platform</span><br /><span style="color: rgb(204, 0, 0);"> * Independent, technology-savvy, very observant, fast learner with an inquisitive mind, willing to be abreast with development related to network and system</span><br /><span style="color: rgb(204, 0, 0);"> * Highly organized and detail-oriented</span><br /><br /><span style="color: rgb(204, 0, 0);">[b]IT Application Architect; TAOS/TCS[/b]</span><br /><br /><span style="color: rgb(204, 0, 0);">About the Job:</span><br /><span style="color: rgb(204, 0, 0);">Provider of satellite entertainment programming to U.S households</span><br /><br /><span style="color: rgb(204, 0, 0);">Summary:</span><br /> <br /><span style="color: rgb(204, 0, 0);">¨ Provide the conceptual design and fundamental operational structure for Tracking Activation Offer system (TAOS) and Telco Credit System (TCS) application systems.</span><br /><span style="color: rgb(204, 0, 0);">¨ Analyze, design, and recommends changes and enhancements to existing and new application programs, business procedures and functions of TAOS and TCS.</span><br /><span style="color: rgb(204, 0, 0);">- Interfaces effectively with developers, business analysts and business organizations to evaluate business requirements and design feasible solutions.</span><br /> <br /><span style="color: rgb(204, 0, 0);">Primary Duties and Responsibilities</span><br /> <br /><span style="color: rgb(204, 0, 0);">¨ Responsible for analyzing, designing and documenting technical solutions to meet business requirements for TAOS and TCS as well as participating in Enterprise Offer Management System architecture design.</span><br /><span style="color: rgb(204, 0, 0);">¨ Provide business and technical expertise in credit management, commitment management, and hardware non-return fee management areas.</span><br /><span style="color: rgb(204, 0, 0);">¨ Develop blueprints for migrating TAOS and TCS into an integrated, event-driven, and real-time offer management system.</span><br /><span style="color: rgb(204, 0, 0);">¨ Assist business users to follow system framework and making right decisions on offer requirements.</span><br /><span style="color: rgb(204, 0, 0);">¨ Define and maintain TAOS and TCS systems framework.</span><br /><span style="color: rgb(204, 0, 0);">¨ Adheres to DIRECTV SDLC methodology to ensure that applicable standards, requirements, and committed timeframes are met.</span><br /><span style="color: rgb(204, 0, 0);">¨ Meeting with IT and business users to determine their needs for new software, as well as describing the options that can be provided.</span><br /><span style="color: rgb(204, 0, 0);">¨ Help developers to conceptualizing the architecture design and breaking it down into its basic components.</span><br /><span style="color: rgb(204, 0, 0);">¨ Assist the developers to ensure that the program is developed correctly and review with the final product to ensure that there are no flaws or inaccuracies in the architecture.</span><br /><span style="color: rgb(204, 0, 0);">¨ Researching and keeping current with software architecture designs.</span><br /><span style="color: rgb(204, 0, 0);">- Make sure the software design is of the highest possible level.</span><br /><br /><span style="color: rgb(204, 0, 0);">¨ Comprehensive working knowledge of programming languages used to code, debug and document application programs.</span><br /><span style="color: rgb(204, 0, 0);">¨ Broad analytical knowledge, ability to use design and development tools and techniques required in system design and requirements analysis.</span><br /><span style="color: rgb(204, 0, 0);">¨ Good communication and interpersonal skills</span><br /><span style="color: rgb(204, 0, 0);">¨ Extensive experience of Oracle DBMS and UNIX operating system. Knowledge of XML, SOAP, Java, and middleware are needed.</span><br /><span style="color: rgb(204, 0, 0);">¨ Thorough understanding of software development methodology, software, hardware, and networks are required.</span><br /><span style="color: rgb(204, 0, 0);">- Time management and organizational skills are required.</span><br /><br /> <br /><br /><span style="color: rgb(204, 0, 0);">SUCCESSFUL CANDIDATES SHALL BETASKED TO:</span><br /><br /><span style="color: rgb(204, 0, 0);">• Install, configure, maintain and monitor servers, workstations, routers, hubs, printers and other vital network appliances.</span><br /><span style="color: rgb(204, 0, 0);">• Install, configure and update software (e.g. databases, anti-virus, security patches and device drivers)</span><br /><span style="color: rgb(204, 0, 0);">• Provide network and security administration and establish comprehensive security policies for the company</span><br /><span style="color: rgb(204, 0, 0);">• Perform data back-up and archiving</span><br /><span style="color: rgb(204, 0, 0);">• Monitor internet bandwidth and coordinate with ISPs if necessary</span><br /><span style="color: rgb(204, 0, 0);">• Document, troubleshoot and fix networks and software issues encountered</span><br /><span style="color: rgb(204, 0, 0);">• Train and provide technical support to users and clients. </span><br /><br /><span style="color: rgb(204, 0, 0);"> http://www.jobsonline.com.ph/component/option,com_neorecruit/task,offer_view/id,360/</span><br /><br /><br /><br /><span style="color: rgb(204, 0, 0);">[b]Information Security Analyst</span><br /><span style="color: rgb(204, 0, 0);">[/b]</span><br /><br /><span style="color: rgb(204, 0, 0);">The position is responsible for the daily secure operation and secure administration of the network, including maintaining reliability, performance, and availability in a 24 x 7 environment.</span><br /><br /><span style="color: rgb(204, 0, 0);">Must have's</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Deployment and administration of RSA enVision</span><br /><span style="color: rgb(204, 0, 0);"> * Deployment and administration of Symantec Endpoint Protection (SEP)</span><br /><span style="color: rgb(204, 0, 0);"> * Deployment and administration of RSA SecurID</span><br /><br /><span style="color: rgb(204, 0, 0);">Work Experience</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Qualified and successful candidates will have at least 5 years of IT experience with at least 3 years of experience working extensively on network and data security.</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of Identity Management a plus</span><br /><br /><span style="color: rgb(204, 0, 0);">Essential Functions:</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Responsible for providing advice, research support, project management services, and information security expertise to assist in designing security solutions for new and existing systems, applications, application administrators, development teams, system engineering teams, and network engineering teams.</span><br /><span style="color: rgb(204, 0, 0);"> * Assist in the testing, selection, placement, implementation, documentation, operation, and maintenance of various information security technologies.</span><br /><span style="color: rgb(204, 0, 0);"> * This person will be expected to assist the information security team in monitoring and evaluating new security vulnerability alerts, perform vulnerability assessments on networks and systems; make recommendations for improving security, and implementing those recommendations.</span><br /><span style="color: rgb(204, 0, 0);"> * Use a combination of automated tools, manual methods, and interviewing techniques to gather the information necessary to report on security risks. Author written reports summarizing findings and recommendations.</span><br /><span style="color: rgb(204, 0, 0);"> * Project management capabilities to ensure the accurate, efficient, and documented delivery of solutions that meet defined deadlines and stay under budget.</span><br /><span style="color: rgb(204, 0, 0);"> * Respond to critical incidents 24x7.</span><br /><span style="color: rgb(204, 0, 0);"> * Provide technical leadership to team members.</span><br /><br /><span style="color: rgb(204, 0, 0);">Education/Training:</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Familiarity with IT Security and Industry related regulations (Sarbanes-Oxley, Healthcare Information Privacy Protection Act (HIPPA), Payment Card Industry (PCI) Data Security Standard (DSS), SB 1386 desirable).</span><br /><span style="color: rgb(204, 0, 0);"> * Limited training will be provided.</span><br /><br /><span style="color: rgb(204, 0, 0);">Knowledge/Skills/Abilities:</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using security monitoring, tracking, and scanning tools.</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using Network Operating Systems: Windows 2000/2003 Server, Red Hat Enterprise Linux, IBM iSeries, and others as needed</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using Electronic Messaging Systems: Microsoft Exchange</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience architecting secure wired and wireless networks with technologies such as those offered by Aruba, Cisco, and Juniper, including the use of Network Access Control (NAC) capabilities.</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using SIEM technologies: RSA enVision</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using anti-malware technologies: Symantec Endpoint Protection (SEP)</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using cryptography and enterprise class encryption key management technologies.</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using multi-factor technologies: RSA SecurID</span><br /><span style="color: rgb(204, 0, 0);"> * Knowledge of and experience using IDS, IPS, and WIPS technologies: Aruba, ISS RealSecure and Proventia Server</span><br /><span style="color: rgb(204, 0, 0);"> * Reasoning and problem-solving skills.</span><br /><span style="color: rgb(204, 0, 0);"> * Participate in professional society activities.</span><br /><span style="color: rgb(204, 0, 0);"> * Strong interest in security analysis.</span><br /><span style="color: rgb(204, 0, 0);"> * Ability to work independently with limited supervision as well as participate/contribute in a team environment.</span><br /><span style="color: rgb(204, 0, 0);"> * Ability to recognize and deal appropriately with confidential and sensitive information.</span><br /><span style="color: rgb(204, 0, 0);"> * Participate in conferences and meetings.</span><br /><span style="color: rgb(204, 0, 0);"> * Accepts ownership and accountability for areas of responsibility.</span><br /><br /><span style="color: rgb(204, 0, 0);">http://jobview.monster.com/getjob.aspx?JobID=81605475&brd=1&q=IT&cy=us&lid=316&re=130&AVSDM=2009-07-16+00%3a44%3a00&pg=1&seq=2&fseo=1&isjs=1&re=1000</span><br /><br /><span style="color: rgb(204, 0, 0);">Senior IT Support Engineer</span><br /><span style="color: rgb(204, 0, 0);">About the Job</span><br /><br /> <br /><br /><span style="color: rgb(204, 0, 0);">ZenithOptimedia</span><br /><br /><span style="color: rgb(204, 0, 0);">Senior IT Support Engineer</span><br /><br /><span style="color: rgb(204, 0, 0);">PRIMARY RESPONSIBILITIES:</span><br /><br /> <br /><br /><span style="color: rgb(204, 0, 0);">%of Time</span><br /><span style="color: rgb(204, 0, 0);"> Description Of Responsibility/Activity</span><br /><br /><span style="color: rgb(204, 0, 0);">40% Executive VIP Support</span><br /><br /><span style="color: rgb(204, 0, 0);"> Rapid response (24/7) to executive VIP IT issues</span><br /><br /><span style="color: rgb(204, 0, 0);"> Work closely with Executive Administrative Assistants on IT issues</span><br /><br /><span style="color: rgb(204, 0, 0);"> Prepare equipment and training materials</span><br /><br /><span style="color: rgb(204, 0, 0);"> Coordinate closely with shared service IT staff on VIP issues and escalations</span><br /><br /><span style="color: rgb(204, 0, 0);"> Provide stellar service to VIPs including expectation setting, full solution deployment and micro and macro management of issues and initiatives</span><br /><br /> <br /><br /><span style="color: rgb(204, 0, 0);">15% Project Management and Operations</span><br /><br /><span style="color: rgb(204, 0, 0);">· Assist with projects such as Business Continuity, Disaster Recovery and facilities relocations</span><br /><br /><span style="color: rgb(204, 0, 0);">· Prepare budgets and plans for IT-related operations and capital expenses</span><br /><br /><span style="color: rgb(204, 0, 0);">· Coordinate with shared services IT on company wide installations, new software deployments, scheduled maintenance and troubleshoot during outages</span><br /><br /> <br /><br /><span style="color: rgb(204, 0, 0);">25% Equipment & Mobility Management</span><br /><br /><span style="color: rgb(204, 0, 0);">· Responsible for coordination of laptop, desktop, monitor, blackberry, network multi-function devices, aircard and telephone inventory recordkeeping, deployment, upgrades and strategic planning</span><br /><br /><span style="color: rgb(204, 0, 0);">· Deployment, ordering, troubleshooting all mobility devices</span><br /><br /><span style="color: rgb(204, 0, 0);">10% Administration </span><br /><br /><span style="color: rgb(204, 0, 0);">· Handle requests and troubleshoot for auxiliary software and services</span><br /><br /><span style="color: rgb(204, 0, 0);">10% Desktop Support & Training</span><br /><br /><span style="color: rgb(204, 0, 0);">· Provide hands-on training or materials to key employees for software, productive tools, work at home solutions.</span><br /><br /><span style="color: rgb(204, 0, 0);">· Escalate trouble tickets, manage through to completion</span><br /><br /><span style="color: rgb(204, 0, 0);">QUALIFICATIONS NECESSARY:</span><br /><br /><span style="color: rgb(204, 0, 0);">· Desktop support experience in large enterprise, 2-4 years</span><br /><br /><span style="color: rgb(204, 0, 0);">· Direct experience with senior executives, 1-2 years</span><br /><br /><span style="color: rgb(204, 0, 0);">· Ability to problem solve in fast paced environment and manage multiple deadlines and priorities</span><br /><br /><span style="color: rgb(204, 0, 0);">· Familiarity with network and email structures (Notes and Active Directory)</span><br /><br /><span style="color: rgb(204, 0, 0);">· Strong oral and written communication skills, able to communicate with all levels in IT and the business</span><br /><br /><span style="color: rgb(204, 0, 0);">· Project management experience 5 years</span><br /><br /><span style="color: rgb(204, 0, 0);">· Excellent customer service skills</span><br /><br /><span style="color: rgb(204, 0, 0);">· Accurate recordkeeping</span><br /><br /><span style="color: rgb(204, 0, 0);">BACKGROUND & EXPERIENCE:</span><br /><br /><span style="color: rgb(204, 0, 0);">· Desktop support or tenure in Operations/Technology team support function</span><br /><br /><span style="color: rgb(204, 0, 0);">· Bachelor's degree – Computer Science</span><br /><br /><span style="color: rgb(204, 0, 0);">· Previous media industry experience a plus</span><br /><br /><span style="color: rgb(204, 0, 0);">http://jobview.monster.com/getjob.aspx?JobID=82254117&brd=1&q=IT&cy=us&lid=316&re=130&AVSDM=2009-07-15+14%3a03%3a00&pg=1&seq=24&fseo=1&isjs=1&re=1000</span><br /><br /><span style="color: rgb(204, 0, 0);">[b]</span><br /><span style="color: rgb(204, 0, 0);">IT Security Analyst[/b]</span><br /><br /><span style="color: rgb(204, 0, 0);">About the Job:</span><br /><br /><span style="color: rgb(204, 0, 0);">N-Tier Solutions Inc. is presently recruiting for an IT Security Analyst for a 3 month + contract position (with a possibility of converting to perm) with our direct client, an international insurance company with offices in Wilmington, DE.</span><br /><br /><span style="color: rgb(204, 0, 0);">The Systems Administrator (Security Analyst’s) primary responsibility is to ensure that proper information security controls are defined and implemented within ALICO’s domestic as well as International IT environments. The role holder must have the ability to review and recommend security safeguards and configurations in a highly complex system infrastructure with demonstrated ability to recognize and appropriately incorporate layered security safeguards within the network perimeter, internal network, application, and data layers.</span><br /><br /><span style="color: rgb(204, 0, 0);">Resposibilities: The role holder’s responsibilities will include (but not be limited to):</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Assessing third party vendor security controls</span><br /><span style="color: rgb(204, 0, 0);"> * Performing information systems vulnerability assessments and penetration testing (including recommendations for remediation)</span><br /><span style="color: rgb(204, 0, 0);"> * Assessing application security controls (using both automated and manual tools)</span><br /><span style="color: rgb(204, 0, 0);"> * Participation in information security architecture designs, performing information security incident investigations</span><br /><span style="color: rgb(204, 0, 0);"> * Identifying opportunities for security control continuous improvement.</span><br /><br /><span style="color: rgb(204, 0, 0);">Minimum Education: Undergraduate degree (4 years) in Computer Science, Information Systems, Information Assurance, or related discipline</span><br /><br /><span style="color: rgb(204, 0, 0);">Minimum Experience: 5 Years</span><br /><br /><span style="color: rgb(204, 0, 0);">A qualified candidate will:</span><br /><br /><span style="color: rgb(204, 0, 0);"> * Demonstrated experience conducting network and application security vulnerability assessments.</span><br /><span style="color: rgb(204, 0, 0);"> * In depth working knowledge of network (i.e. Foundstone or QualysGuard) and application (i.e. APPSCAN) security vulnerability tools</span><br /><span style="color: rgb(204, 0, 0);"> * Past experience in identifying and prioritizing information security risks and recommending mitigating controls</span><br /><span style="color: rgb(204, 0, 0);"> * Excellent written and oral communications skills; ability to communicate with departmental division and executive leaders within the organization</span><br /><span style="color: rgb(204, 0, 0);"> * Strong organizational and analysis skills</span><br /><span style="color: rgb(204, 0, 0);"> * Certifications in any of the following preferred (CISSP, CISM, CISA, GIAC, etc.)</span><br /><span style="color: rgb(204, 0, 0);"> Minimum Knowledge and Skills</span><br /><br /><span style="color: rgb(204, 0, 0);">Minimum Knowledge and Skills:</span><br /><br /><span style="color: rgb(204, 0, 0);"> * 5 years experience within IT Audit or IT Security role for a public accounting firm, a professional services firm, or within the insurance industry</span><br /><span style="color: rgb(204, 0, 0);"> * 3+ years experience with Information Security technologies, tools, and practices</span><br /><span style="color: rgb(204, 0, 0);"> * 1+ years experience performing network and application vulnerability scans</span><br /><span style="color: rgb(204, 0, 0);"> * Oral and written communication skills</span><br /><br /><span style="color: rgb(204, 0, 0);">http://jobview.monster.com/getjob.aspx?JobID=81583171&brd=1&q=IT&cy=us&lid=316&re=130&AVSDM=2009-07-15+16%3a26%3a00&pg=1&seq=16&fseo=1&isjs=1&re=1000</span><br /><br /><br /><span style="color: rgb(204, 0, 0);">If i will going to chose one this five On-line jobs I'm going to chose the choice number 3, the [b]IT Security Analyst[/b]</span><br /><span style="color: rgb(204, 0, 0);">because this is one of my dream to become an a security analyst. i like this job because i want to fight all the cracker.. the people who view or manipulate your files without the consent of the owner and with the bad intention. i want to minimize this kind of cyber attack.. hehehe!</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-19439160951873955082009-07-12T23:55:00.000-07:002009-07-12T23:59:00.135-07:00The Jobs that i want to hold in the Future...<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 12"><meta name="Originator" content="Microsoft Word 12"><link style="color: rgb(51, 255, 51);" rel="File-List" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"><link style="color: rgb(51, 255, 51);" rel="themeData" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"><link style="color: rgb(51, 255, 51);" rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="0" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:"Cambria Math"; panose-1:0 0 0 0 0 0 0 0 0 0; mso-font-charset:1; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Arial","sans-serif"; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:145127788; mso-list-type:hybrid; mso-list-template-ids:-273769348 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} </style> <![endif]--> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">
<br /><o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">They have a lot of job that I want to handle specially to the job that deals with computer, because in most cases right now the job that deals with computer is the most challenging and most important to a business group. A computer literate is now more needed to the different kind of profession because everywhere you are weather you like or not you can deal with technology. And the most important of it is to have more knowledge about this. This are the most jobs that I really want to handle in the future:<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <ul style="margin-top: 0in; color: rgb(51, 255, 51);" type="disc"><li class="MsoNormal" style=""><span style="">Web Developer<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="">Database Administrator<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="">Call center Agents <o:p></o:p></span></li></ul> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><u><span style=""><o:p><span style="text-decoration: none;"> </span></o:p></span></u></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><u><span style="">Why Web Developer</span></u><span style="">? <o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">Web Developer is the most in demand job right now in fact there is a lot of company looking for a web developer.<span style=""> </span>Sooner, the population of a web developer will grow fast and be more challenging for<span style=""> </span>me to manage just like call center, a web developer company is also a twenty four hours in service. So we can see through this that this can be a good scoop of the Human Resource student in the coming year. For the Human Resource Manager this is the most challenging for them to manage the employee especially in night shift. . .<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><u><span style="">Why Database Administrator</span></u><span style="">? <o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">Database Administrator, is the profession that I really like most, because this profession can develop my ability to manage database and also a database Administrator are the most important person in the system. There is a lot of money involve in this job, wow!! Imagine if you are a database administrator and you are managing a different database you’re easy to gain money. So if I’m the Human Resource Manager I just have a one hundred Database administrator of course it’s a challenge for me to manage them because in every database Administrator there is a minimum of one and more than one database that they manage. So therefore, My Company has a lot of applicants that makes transaction to maintain their system and that’s jobs transaction is under the Human Resource-Department because the database administrator is belong to the Human Resource-Department.<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">Why Call Center Agents?<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">Call Center Agents is the most challenging jobs for the Human Resource- Department especially to the large amount of the employee in the call center because a lot of strategy are going to impose and plan on how to become their employee more productive even in the night shift are still energetic and how to maintain the right mood of answering the phone call of the caller. This would be the important thing for the Human Resource Department that needs an attention for a call center company. That’s why a call center company is looking for a good Human Resource Manager because they know how hard to manage the employee in a call center.<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style="">This are the jobs that I really want to handle because like what I’ve explain in the upper part of this column for me this is the most challenging jobs that I really wants to handle and hope sooner I can handle even one of this.<o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><span style=""> </span><o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><span style=""> </span><o:p></o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><span style=""><o:p> </o:p></span></p> <p style="color: rgb(51, 255, 51);" class="MsoNormal"><o:p> </o:p></p> Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-23093676545196623402009-07-10T10:29:00.000-07:002009-07-12T23:55:43.281-07:00Reflection/Learnings COMDDAP<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi42qv9IwixERp2e8n8PxbozsJU_B6Oh4d1k3Bi8XnzfT1RuPvvQkU9qDJFlXbLAQ9CLhcvXibhSFNdlJK59BjdLhfBQDGHBroSKuy6ik6RSHIeL2lO-IptJFYNxT5jb5-C4ylqFx7GA7r9/s1600-h/IMG0397A.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 176px; height: 220px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi42qv9IwixERp2e8n8PxbozsJU_B6Oh4d1k3Bi8XnzfT1RuPvvQkU9qDJFlXbLAQ9CLhcvXibhSFNdlJK59BjdLhfBQDGHBroSKuy6ik6RSHIeL2lO-IptJFYNxT5jb5-C4ylqFx7GA7r9/s320/IMG0397A.jpg" alt="" id="BLOGGER_PHOTO_ID_5357800872567698194" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiST5xZ1_aYtYSr2mRf5rnqFuePSH30St3K_OFDP1m-LkktYWGqPgqg-sVtDIMMDfeOLcdbjk1Z4oWQEozO3YJyAMkwNfZrxqrsUR_3E8cN4iSwFdsADF_CgG83HuqxiRNWGxnt7x5lHLwR/s1600-h/IMG0398A.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 316px; height: 246px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiST5xZ1_aYtYSr2mRf5rnqFuePSH30St3K_OFDP1m-LkktYWGqPgqg-sVtDIMMDfeOLcdbjk1Z4oWQEozO3YJyAMkwNfZrxqrsUR_3E8cN4iSwFdsADF_CgG83HuqxiRNWGxnt7x5lHLwR/s320/IMG0398A.jpg" alt="" id="BLOGGER_PHOTO_ID_5357800587499403170" border="0" /></a><br /><br /><div style="text-align: justify;"><span style="color: rgb(255, 0, 0);">Hi guys..! Hi sir..!</span><br /><br /><span style="color: rgb(255, 0, 0);">July 02, 2009, In the Apo View hotel the exhibition of Computer’s Manufacturer’s Distributor’s Dealers Association of the Philippines (COMMDAP) was held. Most of the technology company participates in this event they launch the new and the latest technology that we have now in our country, it’s a big opportunity for us student to be a part of this event because not only for exposing our selves to saw the latest technology but we gain knowledge through the free seminar that they were conduct. This seminar is open to all participants, visitors and students, for main reason that they can introduce their new product. I gain more knowledge in that seminar, especially to the session that I attended. The Jupiter System and the HP- thin clients. </span><br /><span style="color: rgb(255, 0, 0);">First, the Jupiter System: Jupiter Systems is the leading worldwide supplier of visualization solutions for command and control applications. Jupiter's display wall processors are designed for continuous, 24x7 operation and are used in more than 6000 network operation centers, electric power generation and distribution control rooms, boardrooms, intelligent traffic control centers, 911 dispatch centers, financial operations, surveillance and security centers, and fixed and mobile military operations control centers around the world. In that day, Jupiter System Inc. introduced their new and upgradable system that can be applicable to most of the Operating System that we have been using now specifically the Windows XP, Windows Vista, Linux, Mac OS IX.. Their system is all about the system that can be use in the business company specifically to the dealer of automobile. It can also be applicable to the auto shop that repair or maintain car machines; it has a lot of features including the time of employee while they are repairing the car. And it will be take effect to their Daily Time Record (DTR). Obviously this System is communicating to the database but we amaze the advantages of their system it is really amazing and a good application software for the business group like rubberland or other company that are dealing with automobile business weather they are a dealer of a brand new car, surplus, or even in a parts of a car. It will be helpful because of the advantages that will give to the customer’s and to the owners of the business. </span><br /><span style="color: rgb(255, 0, 0);">Second, the HP- Thin Clients was known with their flexibility and functionality with broad choice of models and operating systems. </span><br /><span style="color: rgb(255, 0, 0);">• Genuine Windows® CE </span><br /><span style="color: rgb(255, 0, 0);"> Embedded SP2 </span><br /><span style="color: rgb(255, 0, 0);"> • Linux operating system </span><br /><span style="color: rgb(255, 0, 0);">• Simplified central management</span><br /><span style="color: rgb(255, 0, 0);">•3-year limited warranty</span><br /><span style="color: rgb(255, 0, 0);">HP-Thin client categories can meet your unique needs: high performance, mobile, and all-in-one.</span><br /><span style="color: rgb(255, 0, 0);">High performance thin clients provide PC power with thin client benefits </span><br /><span style="color: rgb(255, 0, 0);">• Mobile thin clients for portability and flexibility in and out of the office </span><br /><span style="color: rgb(255, 0, 0);">• All-in-one thin clients for customer facing or space-constrained environments (ideal for kiosks, carts, front office).</span><br /><span style="color: rgb(255, 0, 0);">Actually this HP-thin client are widely use because of their advantages compare to desktop client specially to the business who are using a lot of desktop client, but for the people who are using for home sake it’s better to an desktop client because in using a thin client you are using a server to connect to the thin client. In the long run you can save a lot energy fee and it is free from viruses because the data are store in the flash drive and not in the hard drive. For me as a student it’s better for me to use a desktop client because it so expensive if I will use this HP-thin client. Just imagine the worth of the server is php 45,000 and the thin client is php 20,000 to php 30,000, the server can accommodate sixty thin client compare to one thin client and you expend a big amount for just one thin client. For this reason we can evaluate the advantage of using a desktop client but if you are talking the number of user’s it’s better for you to use a thin client. Hp- thin client have a good software as we can see there two of it that I Understand is the key component of HP’s overall management strategy, First, HP Device Manager allows you to track, configure, upgrade, clone, and manage up to thousands of thin client devices with ease. Dramatically simplify device deployment, task automation, compliance management, and policy-based security management for greater business agility. Second, HP Image Manager are also part of hp- thin client software, one single software image with the operating system, applications, and drivers is streamed on-demand from your streaming appliance to your organization’s thin clients. Imagine the simplicity of managing just one software image, instead of dozens or hundreds of images, as with other deployment methods.</span><br /><span style="color: rgb(255, 0, 0);">After the Seminar we sight seeing in the ballroom ground of Apo View Hotel on where the exhibition was held. They have a lot of a technology that really amaze me especially the neo laptop it only cost 17,000 and that’s for COMDDAP price only. Not only the hardware that they exhibit even the software like the anti-viruses, Application System for the business group was already their. The Copier Machine, like printer, photo copier and also the different type of biometric technology. After roaming around in the exhibit we captured some picture in the different booth.</span><br /><span style="color: rgb(255, 0, 0);">I’m so thankful for this opportunities that was given to me by Computer’s Manufacturer’s Distributor’s Dealers Association of the Philippines (COMMDAP), because it open my mind that technology are really evolved by time to time. As an Information Technologies it easily for me to adopt this kind of changes of the technology because it is a part of my field. They help me also to develop my skill in observing things for me to appreciate more or to give a comment those thing that I’ve see even though I don’t like it. Now, I can say to my self that the improvement cause by the Computer’s Manufacturer’s Distributor’s Dealers Association of the Philippines (COMMDAP) is now a part of my progress in my field. </span><br /><br /><br /><br /></div>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-60333224952633387642009-07-09T05:33:00.000-07:002009-07-10T10:07:14.926-07:00the risks associated with business and IS/IT change<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.anflocor.com/images/anflobldg2.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 770px; height: 289px;" src="http://www.anflocor.com/images/anflobldg2.jpg" alt="" border="0" /></a>
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj9bAUjL44CwomWpBYe8_s_RSWULyPdlmOwoUi-j_K9HBVj05osINI6ZHCcV930TThF-6HNGYjP8Yf-DZNCVR4ZeDrGeHzEbfpYy6I3AQ9vaLr_yYZoJp-bAqTU_Vs66oB9bwks_NdZ7im/s1600-h/DSC04405.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj9bAUjL44CwomWpBYe8_s_RSWULyPdlmOwoUi-j_K9HBVj05osINI6ZHCcV930TThF-6HNGYjP8Yf-DZNCVR4ZeDrGeHzEbfpYy6I3AQ9vaLr_yYZoJp-bAqTU_Vs66oB9bwks_NdZ7im/s320/DSC04405.JPG" alt="" id="BLOGGER_PHOTO_ID_5356878500120702274" border="0" /></a>
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilNXyHmvZdwM6MrqAegc7dCoeDnBCgqfI4uz8uxIjMlfNwwLu9-pXS9lbmV8pIzHYELFhRuW-wR5V06xAGP60JE3gntXxWC2pH5nwCEuzLVO0zOLv6g-A8Kw3tWe40MSPtULbT3Ze0pShA/s1600-h/DSC04397.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilNXyHmvZdwM6MrqAegc7dCoeDnBCgqfI4uz8uxIjMlfNwwLu9-pXS9lbmV8pIzHYELFhRuW-wR5V06xAGP60JE3gntXxWC2pH5nwCEuzLVO0zOLv6g-A8Kw3tWe40MSPtULbT3Ze0pShA/s320/DSC04397.JPG" alt="" id="BLOGGER_PHOTO_ID_5356877404013758434" border="0" /></a>
<br />
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2YiM_9Ueyb_Jp-620d4tikJnFVQO-GwYUiGaYprkGHNgoCAuM12I2tN4iSrlL6ITbXH4bu3c_ADgVXsG4eGaof0gB4CkRBRxju3QndMn37tnuKfiSm2Bl3JPdXUcgfRs6R_I4YR-PfV7I/s1600-h/DSC04395.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2YiM_9Ueyb_Jp-620d4tikJnFVQO-GwYUiGaYprkGHNgoCAuM12I2tN4iSrlL6ITbXH4bu3c_ADgVXsG4eGaof0gB4CkRBRxju3QndMn37tnuKfiSm2Bl3JPdXUcgfRs6R_I4YR-PfV7I/s320/DSC04395.JPG" alt="" id="BLOGGER_PHOTO_ID_5356876903771969986" border="0" /></a>
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh19_GRLvdUcaTgmQPVNXPfFAo1igvjmQTnXgchbY0CjmQRIA3WKwGyLP22VbZIlZ9LSmSiC3ozJUAmY_ZoO3XHnOFDbkaHlUdhQ1_d-sSLS2f81_HAaSqJBDSSN2NfQjI0uHN2kUds232F/s1600-h/DSC04389.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh19_GRLvdUcaTgmQPVNXPfFAo1igvjmQTnXgchbY0CjmQRIA3WKwGyLP22VbZIlZ9LSmSiC3ozJUAmY_ZoO3XHnOFDbkaHlUdhQ1_d-sSLS2f81_HAaSqJBDSSN2NfQjI0uHN2kUds232F/s320/DSC04389.JPG" alt="" id="BLOGGER_PHOTO_ID_5356876485518637986" border="0" /></a> <span style="color: rgb(255, 0, 0);"> The Senior Manager of IS/IT Department</span>
<br />
<br /><div style="text-align: justify;">
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 12"><meta name="Originator" content="Microsoft Word 12"><link style="font-family: arial; color: rgb(51, 51, 255);" rel="File-List" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"><span style="color: rgb(51, 51, 255);font-size:100%;" ><o:smarttagtype style="font-family: arial;" namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="place"></o:smarttagtype><o:smarttagtype style="font-family: arial;" namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="City"></o:smarttagtype></span><link style="font-family: arial; color: rgb(51, 51, 255);" rel="themeData" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"><link style="font-family: arial; color: rgb(51, 51, 255);" rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="0" name="Normal (Web)"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id="ieooui"></object> <style> st1\:*{behavior:url(#ieooui) } </style> <![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:0 0 0 0 0 0 0 0 0 0; mso-font-charset:1; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} @font-face {font-family:Tahoma; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:1627400839 -2147483648 8 0 66047 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman";} p {mso-style-unhide:no; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman";} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";} </style> <![endif]--> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;">Hi Sir…<o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;">I and my group chose the ANFLOCOR for our individual study about the risks of changing an Information System.. It’s hard for us to set an appointment for their manager because he was to busy with his career. I thought choosing the ANFLOCOR as our adopt company is a big opportunity for us to catch up knowledge for our module and major paper but unfortunately we got mistaken because some of our question regarding Information System are hanging. He didn’t answer the question well; I don’t know if he has an idea on what are we talking about or he just don’t want to share his knowledge to us, but we really thankful to him that some of our question was answered by him. <o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><span style=""> </span><o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;">Actually ANFLOCOR it’s one of the top exclusive company here in <st1:city st="on"><st1:place st="on">davao</st1:place></st1:city>. The rise of the ANFLO Group business empire started from a vision of one man, Don Antonio O. Floirendo, Sr., or AOF, as he is fondly called by his employees. AOF's business acumen, inspired by his foresight and gut-feel, enabled him to build a business conglomerate which is proudly <st1:place st="on">Mindanao</st1:place> based.As the number of companies grew, the need to organize a company that would be en tasked to manage the vast business empire became inevitable. Thus in 1977 ANFLO MANAGEMENT & INVESTMENT CORPORATION or ANFLOCOR was organized. </span><span style="font-size:100%;">Today</span><span style="font-size:100%;">,</span><span style="font-size:100%;"> ANFLOCOR manages several companies engaged in growing and exporting of bananas and pineapples, real estate development and leasing, beach resort operation, manufacturing of corrugated boxes, plastic products and labels, processing and/or supplying fresh meat products, growing of citrus fruits, trucking, arrastre and stevedoring, cold storage rental, automotive dealership, financing, retailing, breeding of race horses, hog raising and production of bottled preserves. <o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;">The risks of changing an Information System, Actually everybody has a risk in changing an Information System basically for ANFLOCOR was the cost and some of their employee who was not updated for the new technology. As we all know one of the major disadvantages of having Information System in the organization or in the business group was the cost. Same with ANFLOCOR they experience this kind of disadvantage. Using Database Management System (DBMS) was too expensive for a business group like ANFLOCOR because they have a lot of company to manage and they need a better and good server so that their business transaction done on time. For the employee parts, their programmer and Data Administrator (DA), even their regular employee under the MIS Department, are necessary to update but a good news is they are conducting a seminar for their employee on what is the proper used of the Information System. The first Language that they used in their system was COBOL and then they upgrade it to Visual Basic 6.0, and now they are currently using a Visual Basic.NET for their front end and MS-SQL for their back end. Also the Integrity of their data was not maintained because of some changes in their Business system but it’s just for temporary. They can resolve it faster but we can’t avoid for that thing. Hehehe!<o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;">I learned a lot in this topic even the manager was not answered our question well but I still understand on what they are trying to say. Hoping that I can use it in the near future or even after taking this subject I can apply it to my other subject. <o:p></o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"> </div><p style="margin: 0in 0in 0.0001pt; color: rgb(51, 51, 255); text-align: justify;font-family:arial;"><span style="font-size:100%;"><o:p> </o:p></span></p><div style="text-align: justify;"> </div><p style="color: rgb(51, 51, 255); text-align: justify;font-family:arial;" class="MsoNormal"><span style="font-size:100%;"><o:p> </o:p></span></p> Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-47301519939339531262009-07-06T10:39:00.000-07:002009-07-10T09:45:49.226-07:00HR-best practices<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW-jKFVu9bi6U7J3j9Ld-kK-m_ofPLKBd9yBvbk0NZ8UUA5l4beaF4L1POWhVMXqrJ_Erw-XcMDA17S7z-bOb3LJf4sckfDYvRdmIfCWEjR7woaopVAEGgoVdrId_XrXFsVvarG5TooSlY/s1600-h/DSC04381.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW-jKFVu9bi6U7J3j9Ld-kK-m_ofPLKBd9yBvbk0NZ8UUA5l4beaF4L1POWhVMXqrJ_Erw-XcMDA17S7z-bOb3LJf4sckfDYvRdmIfCWEjR7woaopVAEGgoVdrId_XrXFsVvarG5TooSlY/s320/DSC04381.JPG" alt="" id="BLOGGER_PHOTO_ID_5356873610339809746" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJWMYpQRqD2a38rED1s9FT2EWcHlVpnRxz848_-FvhqR5B4Yh-qmQYNF_nDVgU1fzJUUnSOqwljRNwy8IY_1FMDjJOaJunxW7FAuQrSQaPv5AHdF4vCeoOApCsCOsMNGjOZuHUKw3MXMZ1/s1600-h/DSC04380.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJWMYpQRqD2a38rED1s9FT2EWcHlVpnRxz848_-FvhqR5B4Yh-qmQYNF_nDVgU1fzJUUnSOqwljRNwy8IY_1FMDjJOaJunxW7FAuQrSQaPv5AHdF4vCeoOApCsCOsMNGjOZuHUKw3MXMZ1/s320/DSC04380.JPG" alt="" id="BLOGGER_PHOTO_ID_5356873393476340658" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9U2rkiEJ1yxlMvXsKifieP0rvxldl7zCAr9ZBeOWcY7Po0dcS_IccCTpbIKvl9eEFmek4i0w85ZHoe6fmVYbi6IsgyzAPLipoL-eoSwImGOu9M5fzheIpmKEnBtoKtt-EiCzVyGSTUxhP/s1600-h/DSC04377.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9U2rkiEJ1yxlMvXsKifieP0rvxldl7zCAr9ZBeOWcY7Po0dcS_IccCTpbIKvl9eEFmek4i0w85ZHoe6fmVYbi6IsgyzAPLipoL-eoSwImGOu9M5fzheIpmKEnBtoKtt-EiCzVyGSTUxhP/s320/DSC04377.JPG" alt="" id="BLOGGER_PHOTO_ID_5356873145295910482" border="0" /></a><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl2EhwAghmtdc0H3i4RShyphenhyphenrl4-PQccXy9WCRRy101_kG3nCVaiJiTP6qbcL04SOwrB7nBrnr91GuMMNMGOuW_najVffzN96OsRRuT289DnUCJRIa4KyBXcQ6FfHfPgKQJEyV4GKp5b8oBo/s1600-h/DSC04376.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 213px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl2EhwAghmtdc0H3i4RShyphenhyphenrl4-PQccXy9WCRRy101_kG3nCVaiJiTP6qbcL04SOwrB7nBrnr91GuMMNMGOuW_najVffzN96OsRRuT289DnUCJRIa4KyBXcQ6FfHfPgKQJEyV4GKp5b8oBo/s320/DSC04376.JPG" alt="" id="BLOGGER_PHOTO_ID_5356872630806136978" border="0" /></a><br /><div style="text-align: center;"><br /></div><div style="text-align: center;"><br /></div><br /><br /><div style="text-align: left;font-family:georgia;"><div style="text-align: justify;"><span style="color: rgb(204, 0, 0);" class="postbody"><div style="margin: auto; text-align: center; width: 100%;">Hi! Sir.. Hi! guys.. </div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;">We chose EMCOR for our company in this Subject. EMCOR is a 100% Filipino-owned retail business corporations specializing in appliances, furniture, IT products, motorcycles, and money transfer through its network of specialty chain stores in the Visayas, Mindanao, and Palawan areas. With the launching of their on-line store, EMCOR will now be making its presence known in the online industry and promote its company’s goals and vision to the global community.They carry a wide array of product lines like Panasonic, JVC, Philips, Sony, Sharp, Samsung, Electrolux, La Germania, Whirlpool, FS Furniture, Sanyo, Canon, Brother, Epson, Toshiba, Acer, Kawasaki, Honda, Suzuki and many others.</span></div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;">They have also partnered with Western Union for our money transfer services. The core of their existence is their ability to provide high quality service to their customers by providing the right products at the right time, in the right place and at the right price. They believe that as responsible members of their society, EMCOR should pursue their profit objectives in the spirit of service to the community. They believe in reconciling the profit motive of their Company with service to the nation. Thus, they strive to maintain a balance between the interests of their customers, employees, shareholders and the government by supporting national and local agenda for economic development, social reform, educational/scientific research, healthcare and environmental sanitation and preservation. To date, the JVR Foundation has given more than PhP200 Million in philanthropic work. </span></div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;">I with my group went to EMCOR last July 03, 2009 to have an interview to their Assistant manager for the best practices of Human Resource in their company. It was the craziest day that I have encountered on complying this requirement for this subject because we walk from USEP-Obrero to EMCOR-Bajada under the heat of the sun. I thought the heat of the sun would not irritate my skin while walking to our target place but unfortunately I got mistaken, it makes me feels sleepy after we reach our target place. Huhuhu!!!! As a group representative I am the one who first entered </span></div></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;">to the office of Human Resource- Department and communicate to the In-charge of that office. Fortunately they entertain us and automatically prepared their self to answer the question that we've prepared. I call my group while waiting outside the office.</span></div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;"><span style="color: rgb(255, 0, 0);">First </span>, I ask the assistant manager on what is the importance of Human Resource- Department to their company? He answered that Human Resources is very important to the Organization or Business Groups like EMCOR because all of the transaction regarding the employee can be found in the Human Resource-Department for example like the processing of the Salary, Accounting Division, assist the employee for their basic needs like medication,loan etc. Human Resources- Department also concerned to the status of the company in terms of financial crisis like for example five months before the global financial crisis the Human Resource-Department propose for the optional retirement of the older employee. For almost 2200 employee of their entire branch here in the Philippines, 400 of them got this optional retirement opportunities for some reason that may be their employee want to build up a little business for their family. </span></div></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;"> </span></div></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;"><span style="color: rgb(255, 0, 0);">Second,</span> as assistant manager how did you take over the responsibilities if the manager are on leave to their duties? He answered that if In case they encountered a problem regarding their employee they automatically resolve it, example, if the employee was caught in the act for stolen some amount or product in the company, Human Resources-Department are the one who settle this kind of problem and of course they would have an hearing for the justices purposes, the employee have the rights to defend their self for the certain act that they've done, after the hearing they do not automatically fire the employee for the first offense. They suspend it.</span></div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;"><span style="color: rgb(255, 0, 0);">Third </span>, what is the best practices of Human Resource that did you apply in this company? They answered us may be is the disciplinary act for the employee like what they've said to the second question it considered a best practices of their company on how to handle the situation like that, they also have an scholarship for their employee and the children of their employee. Most of their employee was done their master in the famous institute in ASIA in terms of accounting, they also have a cooperative for the employee so that if some one wants to apply the loan they can, Actually this cooperative was own by the employee and manage by the HR-department. Although the owner of EMCOR was given them a pot of money cost of two million pesos for their cooperative but the employee are the one who manage it, Even their canteen own by the cooperative. And also, In case of emergency regarding the payment of the bill for the medication of the employee, the company would assist those payment if ever the bill will exist to the budget of the company for each employee, the company will lend them a certain amount in a very low interest.</span></div></span><br /><span class="postbody"></span><br /><span class="postbody"><div style="margin: auto; text-align: center; width: 100%;"><span style="color:blue;">Thats all I can say for this topic.. thank you so much for reading my column. Hahaaha!!! I've learn a lot on this topic.. see you guys for another topic.!!</span></div></span><br /><span class="postbody"></span><br /><span class="postbody"></span><br /><span class="postbody"><a href="http://www.emcor.com/" target="_blank">http://www.emcor.com</a><!-- google_ad_section_end --></span><span class="gensmall"></span><br /></div><span class="gensmall"></span></div>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-31630133781387845862009-07-06T10:28:00.000-07:002009-07-06T10:34:27.992-07:00Automated Election Reflection<div style="text-align: center; color: rgb(51, 51, 255);"><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 12"><meta name="Originator" content="Microsoft Word 12"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml"><link rel="themeData" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx"><link rel="colorSchemeMapping" href="file:///C:%5CDOCUME%7E1%5CAlsader_%5CLOCALS%7E1%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} @font-face {font-family:HelveticaNeue-BoldCond; panose-1:0 0 0 0 0 0 0 0 0 0; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-format:other; mso-font-pitch:auto; mso-font-signature:3 0 0 0 1 0;} @font-face {font-family:TimesNewRoman; panose-1:0 0 0 0 0 0 0 0 0 0; mso-font-charset:0; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:auto; mso-font-signature:3 0 0 0 1 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]--> </div><p style="text-align: center; color: rgb(204, 0, 0);" class="MsoNormal">Automated elections!!!???</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(51, 51, 255);" class="MsoNormal">Before I start to share my insight about this “AUTOMATED ELECTION” I first discuss on what automated Election really is? Does it give an advantage or Disadvantage to the Filipino citizen? <span style=""> </span>What benefits we can get using this kind of modern type of election system? Hmmm! <span style=""> </span>Come and join me on exploring this topic.</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: left; color: rgb(204, 0, 0);" class="MsoNormal">What is automated election? </p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-size: 10pt; font-family: "HelveticaNeue-BoldCond","sans-serif";"><span style="color: rgb(255, 204, 0); font-weight: bold;">I. SITUATIONER</span><o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">The conduct of elections in the Philippines for the past four decades has remained largely<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">unchanged. Philippine elections rely heavily on manual tallying and canvassing of votes thus making<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">them vulnerable to control and manipulation by traditional politicians and those with vested interests.<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">The cost of winning an elective post is highly expensive, and the absence of mechanisms to check<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">and limit sources of campaign funds become fertile grounds for corruption and divisiveness.<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">In recent years, initiatives to reform the electoral system included the enactment of the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">following laws: Republic Act (RA) 8046, establishing a pilot program modernizing the registration<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">and vote counting process in the Autonomous Region in Muslim Mindanao, the Party List Law,<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Fair Elections Act and the Absentee Voting Act. To address the inadequacies and limitations of the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">electoral process, RA 8436 or the Election Automation Act of 1997, was passed authorizing the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Commission on Elections (COMELEC) to use automated election system for vote counting and<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">canvassing in the national and local polls. The law provided for the generation of a national<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">computerized voters list, establishment of a voters identification card system and the automation of<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">the vote counting.<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">However, sectoral issues still hinder reform efforts in the electoral process. The following<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">have been identified as basic problems afflicting the electoral system: (a) outdated electoral<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">process; (b) failure to implement the electoral modernization law; (c) limited administrative and<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">regulatory capabilities of the COMELEC; (d) ineffective educational/information campaigns on<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">new laws and policies; (e) weak political party system; (f) unaccountable political financing; and<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">(g) defective party list system (Governance Assessment, 2003).<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(255, 204, 51); font-weight: bold;"><span style="font-family: "TimesNewRoman","serif";"><o:p> </o:p></span></p><div style="text-align: center; color: rgb(255, 204, 51); font-weight: bold;"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-size: 10pt; font-family: "HelveticaNeue-BoldCond","sans-serif";"><span style="color: rgb(255, 204, 51); font-weight: bold;">II. GOALS, STRATEGIES AND ACTION PLANS</span><o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">To ensure a credible and transparent electoral process, the modernization of the electoral<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">system through computerization shall be supported to ensure the credibility of polls and correct the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">deficiencies in the electoral system. Likewise, the Omnibus Election Code shall be further revised<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">and amended to respond to the needs of the present electoral system.<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Measures to strengthen the party system and regulate the activities of political parties shall<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">be created. State financing of political parties shall also be considered through the passage of the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Campaign Finance Bill.<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">The COMELEC’s capacity to raise the level of political discourse and educate citizens<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Regarding their right to vote will be enhanced. This will be done through conduct of continuing<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Citizen and voter education through partnership with civil society groups and other government<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Institutions, the electorate must be empowered with information that would help them vote<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Intelligently, the challenge is to develop the people’s appreciation of their vote as a means to<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Reform the government and receive better services from it. Part of this challenge is the need to<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Raise the awareness of the electorate on relevant issues and the corresponding platforms of the<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal; text-align: center; color: rgb(51, 51, 255);"><span style="font-family: "TimesNewRoman","serif";">Candidates, if the country is to shift from the politics of personality to the politics of party<o:p></o:p></span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(51, 51, 255);" class="MsoNormal"><span style="font-family: "TimesNewRoman","serif";">Programs</span></p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(204, 0, 0);" class="MsoNormal"><o:p> </o:p></p><div style="text-align: center; color: rgb(204, 0, 0);"> </div><p style="text-align: left; color: rgb(204, 0, 0);" class="MsoNormal">Does it give an advantage or Disadvantage to the Filipino citizen?</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(51, 51, 255);" class="MsoNormal">Automated election was commonly implemented to the country who wants a clean and a fair result of election. Because as of now we are in the technologies era in which most of the country who wants to be modernize their election for a certain Advantage of using a technology, especially in dealing with the integrity of the vote of each citizen in the country. As of now our country are trying to embrace this automated election for some reason, the Filipino citizen wants to maintain the security of the vote and hoping that one day they really feel their vote. And the cheating during election will be minimize, we can not say that cheating were totally vanished although we are using an electronically election system but some of political candidates are trying to buy the vote of the voters. The Philippines will hold automated presidential elections next year after the partners of a joint venture that won a $150 million deal to supply counting machines patched up their differences on Friday, officials said. Now we can differentiate the advantage and the disadvantage. Although it so expensive to have this kind of electronically base of election system but the important for us voters is our votes will be count to the corresponding candidates that we are going to vote. </p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: left; color: rgb(204, 0, 0);" class="MsoNormal">What benefits we can get using this kind of modern type of election system?</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(51, 51, 255);" class="MsoNormal">If we can meet the goal of this automated election we can say that there is a lot of benefits that we can get from this. One, we can establish to other country that we have a good election system in our country. Second, the tourist will be fascinating to visits our country because we have a leader that really voted by the majority. Third, the integrity of COMELEC will be maintain and so for..</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: left; color: rgb(204, 0, 0);" class="MsoNormal">As an IT student do I care on this matter?</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="text-align: center; color: rgb(51, 51, 255);" class="MsoNormal">Yes, of course this is one of the hottest issues in the country today regarding the usage of technologies. If I have been choose weather manual or automated. I go for automated because being an IT, I saw the big advantage of having an electronically base of election system. In my insight through using this kind of technologies can provide a leader who are really voted by the voters. For short, cheating during the counting of ballots will be prevented and the fairness to the candidates will reign. So, the confidence of the voters will become more strong and same with the trust for the leader that they have been vote.<span style=""> </span>Actually before adopting this kind of system I know that we can encounter a big problem in terms with the financial needs. we are not blind on what is the real status of our economics right now, we are affected by the global financial crisis but we are hoping that through investing this kind of election system will help our country to develop.</p><div style="text-align: center; color: rgb(51, 51, 255);"> </div><p style="color: rgb(51, 51, 255); text-align: left;" class="MsoNormal">http://www.neda.gov.ph/ads/mtpdp/mtpdp2004-2010/pdf/mtpdp%2020042010%20neda_chapterx13_elections.pdf</p><div style="color: rgb(51, 51, 255); text-align: left;"> </div><p style="color: rgb(51, 51, 255); text-align: left;" class="MsoNormal"><o:p> </o:p></p> Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com1tag:blogger.com,1999:blog-4281372206264185528.post-36186899910908465982009-06-25T04:14:00.000-07:002009-06-26T00:08:40.103-07:00Assignment 1<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikRNbdpsBN6pgn7GRa7hyphenhyphenBdi_aF7Qu8tntNxWy8vDadWP_REjs2hOz5QLR_6dXXR2il8AZUC4M60ENc5bGd1ypGbDgifYeRYPQL6nCrYLwS8PUQmrOQPgVqTlVa8ZpuN15zsJIWzhB2Xzc/s1600-h/bajadaprofile.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 497px; height: 251px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikRNbdpsBN6pgn7GRa7hyphenhyphenBdi_aF7Qu8tntNxWy8vDadWP_REjs2hOz5QLR_6dXXR2il8AZUC4M60ENc5bGd1ypGbDgifYeRYPQL6nCrYLwS8PUQmrOQPgVqTlVa8ZpuN15zsJIWzhB2Xzc/s320/bajadaprofile.jpg" alt="" id="BLOGGER_PHOTO_ID_5351288175542872210" border="0" /></a><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9AU-u52EWTBc30G8CQy5-17-Eb4wRbp8f3S6Z0DT8vBypa5z8jqHN5bbYfJS7rmLJEYfiYxl0gTYZifupyV-tLbAi7iWuMv_S3iwmbM2b9_bOmrvbTjblKG8ipP40fZviMuxaKJ60n-xX/s1600-h/1_800311612l.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 310px; height: 233px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9AU-u52EWTBc30G8CQy5-17-Eb4wRbp8f3S6Z0DT8vBypa5z8jqHN5bbYfJS7rmLJEYfiYxl0gTYZifupyV-tLbAi7iWuMv_S3iwmbM2b9_bOmrvbTjblKG8ipP40fZviMuxaKJ60n-xX/s320/1_800311612l.jpg" alt="" id="BLOGGER_PHOTO_ID_5351284247901655650" border="0" /></a> <span style="color: rgb(51, 102, 255);">Maan Took me a picture when we are in lobby..</span><br /></div><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSbkLl3TZOvcQYPY6-m2ta6Uor1AO2a8LjiBdYxHgaTy7hXfh4oThX8Nii5n_TBrnppLpJuoUj3KCk3HmPhjedOyaJSNMKaO5stWOSJwPAXOKJbSzV059yWSel3o_xXkn2moKgCeyUM7z4/s1600-h/1_285876125l.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 323px; height: 244px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSbkLl3TZOvcQYPY6-m2ta6Uor1AO2a8LjiBdYxHgaTy7hXfh4oThX8Nii5n_TBrnppLpJuoUj3KCk3HmPhjedOyaJSNMKaO5stWOSJwPAXOKJbSzV059yWSel3o_xXkn2moKgCeyUM7z4/s320/1_285876125l.jpg" alt="" id="BLOGGER_PHOTO_ID_5351283511050736098" border="0" /></a> <span style="color: rgb(51, 102, 255);">This is Sir Alex the HR-Department Manager of EMCOR</span><br /></div><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_ocMOtXGTZsuvzgNRAV-hj0I-461UnHR-Fpvrv78kYll1AWbOhA9L-U6gEgyC2hCuwk1aaSUq4k6NSeyksSlYk4Ial2z63np7LgXzR5khGowH6ws_ToB5F0yrMXvBKKylMDbTZWW-QJ-/s1600-h/1_704369496l.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 345px; height: 263px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD_ocMOtXGTZsuvzgNRAV-hj0I-461UnHR-Fpvrv78kYll1AWbOhA9L-U6gEgyC2hCuwk1aaSUq4k6NSeyksSlYk4Ial2z63np7LgXzR5khGowH6ws_ToB5F0yrMXvBKKylMDbTZWW-QJ-/s320/1_704369496l.jpg" alt="" id="BLOGGER_PHOTO_ID_5351282985782000162" border="0" /></a><span style="color: rgb(51, 51, 255);">This is our ID When we are In EMCOR.</span><br /></div><br /><br /><span style="color: rgb(255, 0, 0);">Hi! Sir Randy! I and Ma.Ann Kristine Tomada chose the same company. We went to many companies all of them were declining us to have an ambush Interview. Some of them don't have an IT/IS, some of them required us a letter for us to be able to conduct an interview, some of them just an In-charge in their store. But fortunately one company accommodates and gave us a minute to answer some question that we provide for them. The name of the Company that we Interview was the EMCOR (Engineering’s Machinery Corporation)</span><br /><br /><span style="color: rgb(255, 0, 0);">EMCOR was founded by JESUS V. del ROSARIO in 1958 and they are currently under the JVR Foundation Inc.—one of the many companies of the JVR Group of Companies. Others include: </span><br /><span style="color: rgb(255, 0, 0);">• Kawasaki Motors (Philippines) Corporation</span><br /><span style="color: rgb(255, 0, 0);">• K-Servico Trade, Incorporated</span><br /><span style="color: rgb(255, 0, 0);">• Wodel Incorporated</span><br /><span style="color: rgb(255, 0, 0);">• Delsa Chemicals and Multi Products Incorporated</span><br /><span style="color: rgb(255, 0, 0);">• International Wiring Systems Philippines Corporation</span><br /><span style="color: rgb(255, 0, 0);">• Hecny Forwarders Incorporated</span><br /><span style="color: rgb(255, 0, 0);">• Wodel Manpower Services</span><br /><br /><br /><span style="color: rgb(255, 0, 0);">EMCOR is a 100% Filipino-owned retail business corporations specializing in appliances, furniture, IT products, motorcycles, and money transfer through its network of specialty chain stores in the Visayas, Mindanao, and Palawan areas. With the launching of their online store, EMCOR will now be making its presence known in the online industry and promote its company’s goals and vision to the global community.They carry a wide array of product lines like Panasonic, JVC, Philips, Sony, Sharp, Samsung, Electrolux, La Germania, Whirlpool, FS Furniture, Sanyo, Canon, Brother, Epson, Toshiba, Acer, Kawasaki, Honda, Suzuki and many others. They have also partnered with Western Union for our money transfer services. The core of their existence is their ability to provide high quality service to their customers by providing the right products at the right time, in the right place and at the right price. They believe that as responsible members of their society, EMCOR should pursue their profit objectives in the spirit of service to the community. They believe in reconciling the profit motive of their Company with service to the nation. Thus, they strive to maintain a balance between the interests of their customers, employees, shareholders and the government by supporting national and local agenda for economic development, social reform, educational/scientific research, healthcare and environmental sanitation and preservation. To date, the JVR Foundation has given more than PhP200 Million in philanthropic work. </span><br /><br /><span style="color: rgb(255, 0, 0);">We ask them if they Have an IS in their company, the MIS System Analysis said Yes, they have a payroll system, accounting system, HR System etc. Their transaction were already electronically base. They are currently using a Microsoft Visual Fox pro for their front-End and a MS-SQL for their Back-End. They don't have any agencies who maintain their system but they have an own maintenance officer for their system.<br /><br />As an advantage having an IS(Information System) help it a lot to their company.<br /><br />1.)They can easily transact into one another especially when transacting the customers cares.<br /><br />2.)For the benefits of the employee their salary are on time because they have an own payroll System.<br /><br />3.)Retrieving some files is not hustle for them because of the help of databases.<br /><br />Additional for the advantage of having the IS(Information System) in their company was they are more competitive to other company’s. The programmer and the DA (Data Administrator) was an ordinary employee like accountant, clerk who they sent to Manila to studied a programming language like visual fox pro so that their employee would have an idea to maintain or make a system for them. As a part of their development in their IS(Information system) they are now trying to link all of their 110 branch from mindanao,visayas to palawan into one Interconnection. Actually they are already linking each other but the point is the company want to try the web base. Their programming language is trying to convert into Internet programming language so that it can easy to access their entire branch. One of their target to develop their IS are the SAP R/3 . </span><span style="color: rgb(255, 0, 0);">SAP R/3 is arranged into distinct functional modules, covering the typical functions in place in an organization. The most widely used modules are Financials and Controlling (FICO), Human Resources (HR), Materials Management (MM), Sales & Distribution (SD), and Production Planning (PP). Those modules, as well as the additional components of SAP R/3, are detailed in the next section.</span><br /><span style="color: rgb(255, 0, 0);">Each module handles specific business tasks on its own, but is linked to the others where applicable. For instance, an invoice from the Billing transaction of Sales & Distribution will pass through to accounting, where it will appear in accounts receivable and cost of goods sold.</span><br /><span style="color: rgb(255, 0, 0);">SAP has typically focused on best practice methodologies for driving its software processes, but has more recently expanded into vertical markets. In these situations, SAP produces specialized modules (referred to as IS or Industry Specific) geared toward a particular market segment, such as utilities or retail. Their maintenance officer can be found at their main office located at Bajada.</span><span style="color: rgb(255, 0, 0);"><br /><br />For the Best Practices that they were Implemented for their IS, They plan it well and carefully analyze those System before launching it. They train some employee to used that system and make a daily recovery,weekly recovery, monthly recovery and yearly, of course their backup was placed in the outside of the company maybe in the other building or other place on where the server can be found in case of emergency like fire. Their Internet connection cost php 400,000</span> <span style="color: rgb(255, 0, 0);">monthly and their IBM server cost of php 30,000,000.00. Wow!!! That so expensive, all i can say EMCOR have a great IS in their Company. </span><br /><span style="color: rgb(255, 0, 0);"><br /></span><span style="color: rgb(255, 0, 0);">I learned a lot in this assignment because I got a lot of Ideas on what is the best practice of Information System. And having an IS(Information System) give a big advantages for the business companies like EMCOR because all of their transaction was make them simple and easy to used. Although that was so expensive but thats the one disadvantage of using database.<br /><br />Regarding the deadline that you gave Sir we didn’t complied it on time for the reason of. First we communicate the san pedro branch yesterday we got some problems regarding the topic that I want to know from him, the person that I talked to yesterday was not the IT/IS In-Charge. And they told us that we can return by this day. Unfortunately, we have some misunderstanding with the staff that I have talked. One of their staff told me, that san pedro branch are for sales only. Their main branch is the bajada branch. Their HR Department </span><span style="color: rgb(255, 0, 0);">and the MIS/EDP branch </span><span style="color: rgb(255, 0, 0);">is located in Bajada . Suddenly, the ISO officers conduct a seminar for the MIS Staff and HR Department. That’s the reason why we past this assignment late. Hope you consider us Sir. hehe! God Bless!!!</span><br /><br /><span style="color: rgb(255, 0, 0);">http://www.emcor.com.ph</span><br /><span style="color: rgb(255, 0, 0);">http://en.wikipedia.org/wiki/SAP_R/3</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-73578199085758380212009-06-25T00:21:00.000-07:002009-06-25T00:23:42.643-07:00Introduction on MIS and HRM<span style="color: rgb(0, 153, 0);">Hi! Sir Randy..</span><br /><br /><span style="color: rgb(255, 0, 0);">Hi! I'm Basith J. Jumat, I live at Jacinto Ext, Boulevard Davao city "The Land Of Flying Daggers" . hahaha! Just Kidding,. hmm! I'm a working Students,currently working at ALJB durian Factory, as a chef... actually I'm not a Dabaweño, My parents was born in tapul,sulu.. and I was born at tawau,sabah malaysia.. Hmm! I'm the youngest of a four children of Hji. Muin Jumat and Hja. Aliya Julkanain.. Your wondering why my parents don't have the same family name its because thier already annul. hehe! and i grew up in Zamboanga city, until I'm done my secondary level.. and im here with all of you guys to be part of this subject... Hope that we will be more competitive after taking this course. God Blesss All!!!!</span>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0tag:blogger.com,1999:blog-4281372206264185528.post-23043628636473076682009-06-22T09:13:00.000-07:002009-06-22T09:17:21.701-07:00<div style="color: rgb(51, 51, 255);" align="justify"><div style="text-align: center;"><strong style="color: rgb(204, 0, 0);">Reflection On the First day of class</strong><br /><strong></strong></div><strong><br />Hi! guys... by the way I\'m Basith J. Jumat ... HMmm!! well, When I heard that sir Gamboa was our facilitator in this subject.. I\'m worry for what will gonna happen in this subject, because this is my first time that under sir Gamboa supervision.. Somebody told me that when he was a staff of UIC, the student called him \"THE TERMINNATOR\", but the first day of the class was enlighten my mind for our facilitator. He is the man that with a full of joy and happines.. PEACE Sir!!!! hehehe!!! MIS? is it the right course description? hmmm! as what sir gamboa discussed us about the management which follow PDOC(Planning,Directing,Organizing,Controlling).. I appreciate it so much because i got a knowledge on how to manage problem,phenomenon. I also got an idea on how to properly manage my self.. WOW!!!! its amazing i dont expect that this subject will manage my self to... hehehe!! Its really cool ryt.. What is IT? hmm! first,I understand IT, stands for Information Technology.. but during the first day of class,i learned IT has a formula which is HARDWARE+SOFWARE=IT.. hahaha!! Wow! now i know what really IT is.. hehhe!! and i also learned what system is.. So MIS, is it a right course description?For me No it May be LIS.., because the people are the one who manage the software and the hardware so that it will function well.. We people dont want to manage by others.. only a computer can be manage in this subject not the people ware... hehehe!! tnx... I hope that i will enjoy this subject.. Im looking forward for it.. GOd Bless Guys!!!!</strong><br /></div>Basith jumathttp://www.blogger.com/profile/13897727292149178129noreply@blogger.com0