Tuesday, October 20, 2009

0
journal_14

SEPTEMBER 16, 2009

SECOND INTERVIEW…

The interview today is focused on rudimentary SWOT (Strength, Weakness, Opportunities, Threats) and STEEP (Sociological, Technological, Economic, Environmental and Political) analysis.

The analysis was focused on their IS but we also asked the SWOT and STEEP of the company as a whole.
During this interview we also did some observation on their company transaction and took a look at their current system. The MIS officer also showed us their computers and server.



SEPTEMBER 17, 2009

We divided our task and started organizing the data we gathered from our interviews and observations. Each one of us is assigned to a certain topic and designated to start drafting his/her part in the paper.

We also did some research to help us in our task.
^^

0
journal_13

SEPTEMBER 14, 2009

FIRST INTERVIEW…

Upon our arrival at Wilcon Builder’s Supply, we were referred to their MIS officer/technician for our interview.
The focus of our interview today is about the basic information of their company like their basic elements (products, services, competitors, etc.), the basic of their MIS such as software and hardware components.
We also get to know each other and we explained the purpose of our interviews.

He (MIS officer) gladly told us that he is willing to help us in our paper and we just have to call if ever we need more information so that he could schedule our interview.

…thank you so much!
^^

Wednesday, October 14, 2009

0
Assignment #9

Information Environment

Information is a definite knowledge acquired or supplied about something or somebody.

Environment is the surrounding influences or all the external factors influencing the life and activities.

- - - - -

Having defined the terms we can say that information environment is a surrounding wherein a definite knowledge is acquired and supplied.

There are many kinds of information environment wherein information is being gathered, processed, used, stored, and updated according to the specifications of the one in need of the information. Classic example of this information environment is the internet.

Presently, I am part of the information environment of the University of Southeastern Philippines. My role in this environment is a student learning and aiming to gather skills and information I could use when I graduate (hopefully…). In this information environment I gather information through the aid of my instructors and classmates. Gathering the said information and knowledge is very tough…
And to address these challenges I use more information environment. For my assignments and projects I consult the library and internet. As a user of this information I will set a better example for the students to follow. Libraries are a really great place it has been my solace since elementary. When you are in the library you can be anyone or anywhere you want. It took you places you’ve never been. Information’s are flowing in the library all you have to do is grab a book and read. Because of my attachment to the library it really took a long time for me to trust information from the internet. It is because news spread that there are many fraud information placed in there. Other than that wikipedia does strike me because in there information could be edited, so we student are not certain if the information is correct and accurate. We students could prevent this happening by posting only credible information and avoid distorting the information in the page.

Another challenge in this information environment is the difficulty of subjects and tasks. To address this challenge is a tough fight indeed. Personally just being in USEP is a challenge and at the same time pressure. Since difficulty in the subjects cannot be helped I just study harder to get a passing grade. Part of this study is the tutorials me and my classmates attended. From time to time we also did some group study to understand recent mind puzzling lessons. In this way we share information and learning’s providing more areas in development.

Facilities have also become a challenge for me in this information environment. On my first arrival here in the university we are so many in the section therefore the computer units available do not suffice our number. Also we don’t have our own building and it’s difficult for us student to look for a room where we can stay or have classes.

But recently problems in the facilities have been addressed in terms of additional and new computer units. Now we could use a computer one by one during laboratories (I think its because almost one fourth of our population is gone…bwahaha…).

Information environment is made up of three interrelated dimensions: physical, informational, and cognitive. The physical dimension is composed of the command and control systems, and supporting infrastructures that enable individuals and organizations to conduct operations. In the university physical dimension includes the equipments we use in learning such as the monitor, system units, mouse, keyboard and programs. The informational dimension is where the information is collected, processed, stored, displayed and protected. In addition, in Informational Dimension it is where the automated decision takes place. The Informational dimension links physical and cognitive dimensions. So in short, the informational dimension serves as the medium for the first and the third dimension. The key characteristics are as follows: information content and information quality. Information has its own criteria to ensure its quality and validity. Example of which is accuracy, whether the information given is expressing the true situation. Next will be the relevance of the information, this will answer the question of whether the information can be applied or used in the current situation. Then, usability, it refers to the information that is in common and easily understood. Completeness refers to the information that provides the decision maker with all the date needed. And lastly security, it refers to the information that has been afforded adequate protection when required. Last dimension is cognitive this the period wherein we apply our learnings through making programs, implementing it and developing our critical thinking skills.

After graduation hopefully, I really want to pursue art. I think most likely this is the information environment I will and want to be in. Since art is very broad I would like to define that I’m more interested in designing. True I could use what I’ve learned from IT in designing and developing web sites. Fusing art and information technology I could apply it in multimedia industry. I could create and innovate new forms of showcasing interior designing which I would really love to do. Multimedia industry also includes advertisement, graphics, audio and video, and most especially animations. Back then I really wanted to be an anime artist and I believed that nowadays creating anime uses new technologies and animations. I’m still not definite on what I will specialize in this type of information environment but I want to learn more and grow in art with the aid of information technology.


I hope that everyone will be successful in their chosen information environment.^^

0
Assignment #8


OUTSOURCING FOR THE UNIVERSITY

Actually, I’m a little torn between insourcing and outsourcing for the university.

It’s very difficult to take a stand on the issue since I have a very limited knowledge on what is the present and real situation of the university’s information system. Other than that there are many factors involved in the decision that I do not grasp.

In this case a thorough and extensive study must be done on which action the university must do in order to maximize benefits.

I mean, at a given time insourcing could be more advantageous and beneficial than outsourcing, at another situation it could be another way around.

With my position right now I think the university should outsource its Information System.
Why?

First, outsourcing is cheaper than insourcing.
While insourcing has the advantage of high degree control over system since the developer is insource. Aside from the fact that insource programmer knows the requirement and just what the university exactly needs, I don’t think that the administration is willing to spend more money in this particular matter. If we do the system insource it means that the university will provide all the necessary needs in completing the project.
If we outsource it will be less costly since we have different options in the market and system vendors nowadays competes. Commonly systems are now package complete with support.
In the light of the university’s recent event insourcing, (I think…) it causes resistance from some of the high ranking officials in the school.

Second, while insourcing boost the morale of the faculty the extra work distracts them from teaching.
The university is a learning institution therefore it must prioritize the students. If we insource and something went wrong with the system the faculty are pulled out from their classes to attend the problem leaving the student hanging. This practice is really not good in learning. Whereas if we outsource, all the troubleshooting, maintenance and check up of the hardware and software (the likes…) will be the problem of the provider this also means that with outsourcing we get support for the IS.

With outsourcing the professor can perform their primary role which is teaching in the university.

on the other hand…

About insourcing…
Insourcing is also a good option for the university, since we have competent faculty for the job why not use our resources. With insource the system is more secured and the university can have high degree of control over it.

In the end the final decision is still in the hands of the university administration. Presently, I think we are insourcing…but I don’t know what’s happening now with the system.

According to last update about the information sytem which was used last semesters enrollment, it is being modified for errors…(from what I’ve heard…)


We hope for a better enrollment next sem…^^

0
Assignment #7

Identify at least three areas related to ICT and identify how these areas can improve our quality of life.

- - - - -


State Of the Nation Address

After reading the SONA of our president here are the three areas related to ICT that I found:

TELECOMMUNICATIONS
"Sa telecommunications naman, inatasan ko ang Telecommunications Commission na kumilos na tungkol sa mga sumbong na dropped calls at mga nawawalang load sa cellphone. "

Telecommunication is used to transmit information electronically. One of the most important medium of telecommunication today is through cell phones using load. However, some telecommunication network steal load and dropped calls. I know some people think that cell phone load is not as important as education or crisis (so why would the President mention this?...) ...but still every Filipino uses cell phone load .We paid for the cell phone loads therefore it is only right that we get the value of our money.
So how can telecommunication improve our quality of life?
Telecommunication bridges our gap, through this we could get in touch to people in the fastest and efficient way possible.


ICT DEPARTMENT
"Kung noong nakaraan, lumakas ang electronics, today we are creating wealth by developing the BPO and tourism sectors as additional engines of growth. Electronics and other manufactured exports rise and fall in accordance with the state of the world economy. But BPO remains resilient. With earnings of $6 billion and employment of 600,000, the BPO phenomenon speaks eloquently of our competitiveness and productivity. Let us have a Department of ICT…"

Having a government sector intended for information and communications technology will help the country to be flexible with the latest evolution of information technology.

BPO also provides greater chance for more Filipino's to have work and generate more income.


AUTOMATED ELECTIONS
"As the process of fundamental political reform begins, let us address the highest exercise of democracy…voting!

In 2001, I said we would finance fully automated elections. We got it, thanks to Congress…."
I believe it should have been a long time that our country practice automated election. So it is really good to know that the government is taking step towards implementing automation.
Using automated machines for the elections, people will experience a fast and reliable election results.
Knowing that people has their 'highest exercise of democracy' done in a clean and reliable process, Filipino's will have more trust and unity in the government.

...good luck philippines ^^

“Some say that after this SONA, it will be all politics. Sorry, but there’s more work…”

-PGMA

0
Assignment #6

If you were hired by the university president as an IT consultant, what would you suggest (technology, infrastructure, innovations, steps, processes, etc) in order for the internet connectivity be improved?

- - - - -

If I were hired by the university president as an IT consultant I would suggest that in order to improve the internet connectivity we must identify the factors involved in the problem. If you look at the university here are the problems you can see:

Lack of computers

Hardware

Computer viruses

Bandwidth allocation

As for me it is really difficult to give answer to this question because I’m not really good at this field however I will give my best opinion to help the university.

First things first…

If the president wants change in our present internet connectivity the university must allocate budget to resolve this problem.
It is undeniable that the university lacks computer units therefore I suggest that the university upgrade and add more units for the student to use. It is lucky that recently our department purchase new units and LCD monitors. These way students feel motivated to learn and they get the value of what they pay in the university.
Besides even if the internet connection is fast and still the computers are not change and they remain in their current condition we could not feel and appreciate the service provided.

The university’s computer hardware is also outdated and has a very slow processor. If we could not change the whole computer units at least the university should upgrade it. For example it would really help the internet connectivity if we improve the RAM of the university’s computers.

Another big problem in the university is the computer viruses. Viruses are main contributor in slowing down the process of connection. Therefore I would recommend that the university tighten their security in terms of computer virus. We should install effective and updated anti virus software in every computers.

Bandwidth allocation is also a problem in school. We already know that the university increased the bandwidth again but the internet connection is still turtle-paced. Even if we keep increasing the bandwidth, nothing will happen if it is not properly allocated. We should implement proper bandwidth allocation one solution to this is applying the correct network topology. From what I have read implementing an extended star network topology that has a ring topology in its lowest level is good for the university.

This is how will the topology work…
Within one major cluster, the bandwidth should also be divided into smaller clusters that are connected to each other using a ring topology. Let’s take for example the IC laboratory (NODAL), each computer should be included in a smaller group (cluster) that is connected to each other via a ring topology. Each cluster is connected to a central node that will give it the number of bandwidth it needs. The bandwidth allocated for a certain cluster should be distributed to the different smaller clusters within the department. By doing so every smaller cluster within the laboratory would only have a maximum bandwidth to use up and would not take up the bandwidth allotted for the other clusters. A ring topology is used at the lowest level because of the ring topology’s unique characteristic: the token. Within the ring only the one holding the token can use the services of the net within a maximum given time. No one computer would be able to monopolize the usage of the bandwidth because it is already controlled by the topology.

In addition we could also improve internet connectivity through boosting the computer. We could also use caching proxy server, it can reply to service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. Another option is to use proxy server, a proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that, among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.
Of course the students should be oriented on the proper usage of the computers and the internet connectivity.

I hope that with these suggestions I could help the university improve its internet connectivity. I really look forward to be able to use this improved internet connection.^^


0
Assignment #5

During information system implementation any organization however good, big or small experience implementation barrier.

What is a barrier?
A barrier is an obstacle which prevents a thing to be implemented, or limits the way in which it can be implemented.

What is implementation?
Implementation is putting something into practice or operation.

So generally, Information System (IS/IT) implementation is the process of changing into a new information system and putting this new system into operation.

According to the information that I gathered from our interview with our prospect companies I have enumerated here the most common implementation IS/IT barrier an organization experiences in changing into new system.

These barriers are congregation of the data gathered from our interview with Ford Davao and Wilcon Builder's Supply.The barriers are as follows:

INEXPERIENCED or NOT KNOWLEDGEABLE END USER. This barrier is experienced after the system is set up and installed, meaning it is now made available to the end user. One of the reason of ineffective implementation is that end user are not knowledgeable enough about the newly implemented system.

That is why it is very important to include end user training in every IS/IT implementation plan. Another barrier related to end users is resistance.

There are some people that tend to be reluctant to go out of their comfort zones which would make them refuse to accept change. If there is an implementation of IS/IT, it should be expected that there can be resistance by some traditionalist who are not comfortable or threatened with the change. This resistance can be a problem especially if your company spends a considerable amount of financial resource for the implementation but the end users are not utilizing it making the implementation ineffective. In this case, the implementation of IT/IS will be considered a liability instead of an asset for the company. This barrier can be avoided by proper planning, education and communication in order for end users to appreciate the new system.

COST. Perhaps one of the most fundamental barriers any organization experience in implementing system change is the cost. Change is only as good as the cost. A lot of factors in the implementation process are affected by cost. Hardware and software for instance are determined by cost. It is an unchangeable fact that money is an instrument needed to implement any drastic change at any sector of the organization. Without proper financial budget resources and materials required in the actual implementation are not made available inhibiting possible changes.

POOR IMPLEMENTATION PLAN. The implementation methodology is not properly planned. The cost, time of implementation, materials, hardware/software, testing and all necessary approach to arising problem are not properly planned and thought about. No measures of solutions are provided if ever one of these problems occurs.

It is very important to understand that implementation of IS/IT doesn’t stop from installing the whole system, even the testing of system is still part of the implementation.

From what I gather in our interview, barriers in Information System (IS/IT) implementation are unavoidable but can be lessened. An organization before doing drastic change must identify and plan carefully the changes they want to implement.

- - - - -

I will also present some of the data I gathered from my research, here are some of the most common barriers experienced in implementing new IS/IT.

Common Barriers

  • Studying the problem too long without acting
  • Trying to get everyone's agreement first
  • Educating without changing structures or expectations
  • Tackling everything at once
  • Measuring nothing or everything
  • Failing to build support for replication
  • Assuming that the status quo is OK

More Barriers to Change

  • Lack of such resources as time and commitment
  • Resistance to change
  • Lack of senior leadership support or physician champion
  • Lack of cooperation from other agencies, providers, departments, and facilities
  • Ineffective teams
  • Burdensome data collection

Essential Elements for Change Effort

  • Define the problem
  • Define the target population
  • Define effective treatment strategies and establish procedural guidelines
  • Establish performance measures; set goals
  • Define effective system changes and interventions
  • Develop leadership and system change strategy

So what does learning the barriers to IS/IT implementation?

By identifying and anticipating the possible barriers that may occur during system change an organization can develop strategies to minimize barriers impact or may avoid it altogether. By knowing the potential obstacles that we may experience during transition we could brainstorm for the best possible solution thereby making a good start in making the implementation plan.

0
COMDDAP 2009

COMDDAP 2009

Last July 3-4 2009, we attended the COMDDAP's IT expo held in the Apo View Hotel, Davao City. This the 46th year show of COMDDAP,the giant of all Philippine IT.

With the speed that IT is evolving and becoming ever more pervasive in our everyday lives COMDDAP continues year after year to to step up to the challenges of bringing something new to its market with every show. They showcase the latest IT products and software for computing, imaging, printing, connecting and communications, security, entertainment and lifestyle applications. As a matter of fact, COMDDAP Davao stages the LCD Monitor Shootout, and brings together the top LCD monitor brands in the world in a showdown of their most brilliant features in terms of graphics, photo, and video display.

Also part of its regular event is the Technology
Update series of seminars and workshops, and product demos.

As part of our real world education, we took part in the Technology Update session. The session we attended is the The ERIC Dealer Management Systems, The HP Thin Client, and Retailer Management
System Overview and Open Source For Business Applications.

We arrived at the Apo View Hotel around 1 o'clock in the afternoon. After getting our identification sticker as students we eagerly went to see the exhibits. Exhibitors include the Wordtext Systems. Inc., Trinity Marketing, Tills n' Labels Systems Marketing, Symantec, Smart Communications, Inc., Novell, Ng Khai Development Corp., Neo Manufacturing & Services, Microdata Systems & Management Inc., Metropreneur Trading, McAfee, Glee Electronics, Inc., Foxchit Business Systems, Faire Technologies Inc., Envision LCD Display, Danpro Computer Inking System Co., Cogent Consulting(CCSTC), Chase Technologies Corporation, Canon Marketing Phils. Inc., Autodesk, Astech Pengson Distributors Inc., Asiantech, and Adobe.
After exploring, we went to the function room for the session which has already started.

The Eric Dealer Management System
-presented by Jupiter Systems Inc.

According to the presenter, “The ERIC Dealer Management System is an end to end software solution for automotive dealer operation.” In the session they showed us on how to implement the ERIC DMS as well as it features which are the Costumer Relationship Management (CRM), Vehicles Sales and Administration (VSA), and Service Management (SVA).


The HP Thin Client
-presented by Nexus Technologies, Inc.

From the HP Thin Client brochure…“Thin clients are computing devices that function as an access device on the network. It provides solution to issues such as desktop replacement costs, network security, supporting application software on diverse hardware, or ensuring your data remains accessible and secure.”

The speaker also mentioned that Thin Client is designed with no hard drive and fan making it less bulky than normal PC system units.

Microsoft Retail Management System
-presented by Nexus Professional Services and Solutions

The next session is the Microsoft Retail Management System. In this session we were given an overview of the Retail Management System, its solutions and key benefits to retail industry. According to the slides that the speaker showed us “RMS is a software for retailers with multi-branch store. The key benefits it provides are:

  • streamline operations - RMS automatically generate POs
- view inventory status and best-price suppliers
- speed checkouts
- receive shipments and update inventory
- track inventory offline
- share reports

  • improve profit margins - easily adjust pricing
- identify best selling items
- track ROI from marketing
- eliminate card payment terminal and fees
- increase employee productivity
- up sell and cross-sell your costumers

  • build customer loyalty - customize receipts and price labels
- reduce out of stock
- accept multiple tenders
- use flexible pricing structures
- tailor marketing to customer preferences
- reprint receipts

  • manage business not technology - RMS is easy to install and use
- train employees in minutes
- gain insights and make decisions
- tailor POS screens
- manage different inventory types
- add new lanes or stores

In terms of the RMS headquarters or the main office, it can control pricing, purchasing and inventory across stores, view and analyze data company wide, set and monitor policies and procedures for every store.”

Open Source for Business Applications

The last session we attended is the Open Source for Business Applications.
By definition…“Open Source is an approach to the design, development, and distribution of software, offering practical accessibility to software’s source code. Open Source software is licensed software that meets the Open Source definition.”
Some of the Open Source Technologies mentioned by the presenter during the lecture are Ubuntu, OpenOffice, Mozilla Firefox, Thunderbird, Pidgin, GIMPshop, Transmission, LimeWire, VLC, LAMP, Drupal, Joomla,Wordpress,OS Commerce, Zen Cart, Ruby on Rails, PHP Cake, Civi CRM, and Moodle.



Reflection and Learning’s

From the exhibits I get the chance to see the new technologies present in the market.

During our participation in COMDDAP we meet IT people such as programmers, web developers and projects managers and through them I get a little picture of what I’m heading into. (ohhHhh..?)

True, I didn’t really appreciate the importance and beauty of ERIC DMS and Microsoft RMS since I’ am still a student. But I guess the information might still prove useful someday. (hehe…^^)

Perhaps the most exciting and informative session I’ve attended is the Open Source…
Actually that was my first time to meet open source (not heard, but meet…) and I found out that I’m already using some of its software and technology..(VLC, LimeWire, OpenOffice, PHP).

Let me tell you the story…

After meeting open source the presenter showed us a business case and ask two of the audience to analyze it. The task is to estimate the development time for each feature in days of the Anchor website, as well as the estimated total of days of project completion. After assessing the task both representative came up with the analysis that they can finish the project within 30 days. However the presenter told us that using Open Source (Ubuntu) they can finish the task in 16 days.
To accentuate his point the speaker told us the “MAC Analogy…” to explain the advantage of Open Source Technologies from Proprietary Software.

It goes like this… “If you were to buy a macbook from two stores that has the same specs, features and price but the other store can give it to you a day earlier, in which store would you likely buy a macbook?”

Of course, I’d go for the store that can give it to me earlier…who will not? And with that I was amazed and so impressed with open source technology…for a moment I believe it was the solution to whole world…(hehe…)

Just then, a handsome gentleman asked the speaker a question…
“If you were to choose from Open Source Technology and Proprietary Software, which would you use in a mission critical event like the 2010 election?”
The speaker answered that he could not choose between the two because there are many factors to be considered.
So the gentleman asked if he could address the crowd at large. He told us that he is a representative from Microsoft Company and that he is not against open source technology in fact if he were a student himself he would choose to use open source for practicality.

He emphasized that one of the important thing to consider in choosing a software is the level of liability. In the case of mission critical events open source is not the best and only option in all situations, because technically you can’t sue someone when your system fails in open source especially that you get it for free unlike in proprietary software.
And he left us with these words… “Remember that there is no such thing as free in this world. Everything has its own consequence. In Microsoft, you might pay more now but we’ll support you later…while in Open Source you might get it free now but you may pay more later.”
So interesting were his points that it left me thinking…
And that’s the best part of education…when it leaves you thinking.

We returned the next day, July 4 (particularly because of that gentleman…hehe…) but unfortunately I did not attend any seminar because of our interview.

Oh…and did I mention that flash drives and t-shirts are effective motivators?. I applaud HP for that and of course congratulate some of my school mates who win the prizes…hehehe…

Getting the general picture of the real thing is much better than theories alone.


…the first day…
that was GREAT!...^^


0
Assignment #3

On Philippine's 2010 Automated Election

Recently, the Commission on Elections announced that on 2010 the Philippines will be having their first automated election. After the long process of preparations, budget and provider of the system has been named.

Smartmatic with its Filipino partner TIM won as the highest bidder and will be our provider for the Automated Election System (AES) and with the budget of 13.9 billion everything is rolling...
The Comelec promises a clean, honest and fast election...

If I will be ask if I want an automated election...
Yes, definitely!

But if ask if Philippines is ready for 2010 Automated election...
hmmm...I must say no...

What I found out being an IT student is that implementing a new system is not easy. Extensive and thorough research must be done.

Here are points that I want to share why I think our country is not yet ready for the automation in 2010.

CREDIBILITY
Credibility of the provider...
Not long after Smartmatic and TIM has been named as the highest bidder a conflict between the companies arise jeopardizing the automation of election. According to reports TIM president wanted a 500 million php 'up front' from its foreign partner, which Smartmatic took as deal breaker.
The very words of TIM president is this "If you give me a half a billion pesos, all of these problems will be solved.”
So what are the problems to be solved?

First point, at this very early stage of the implementation the Comelec experience a problem in pushing the contract. And even before finalization of contract providers are against each other.

FRAUD
First let us identify what are the Automate Election Systems planned to be used in the coming election. There are two technologies:

  • Optical Mark Reader (OMR)
  • Direct Recording Electronic (DRE)

The beauty of the old system of writing names of candidates voted for, public reading of votes in front of watchers and citizens, tallying and manual preparation of election returns was that it was visible.
At times there could have been fraud. But it was visible.

In the new OMR system voters will feed the ballot into the machine the next thing they will see is the printed election return. On the other hand DRE is a touch-screen or touch-pad machine. No paper ballot is necessary as the names of the candidates and the offices for which they are running will all be displayed on the computer screen. The voter directly enters his choices electronically into a memory cartridge, a diskette or a smart-card that will be added to the precinct, municipal, provincial and national tallies also electronically.
Whether votes were properly casted and counted we will not know.

Comelec claims that the Automated Election System (AES) cannot be hacked and the source code will be open for inspection. But the thing is we’re not talking about outside intrusions, the greatest danger of fraud in the 2010 automated elections will be if it come from insiders in Comelec and system providers.

Second point, automating the election doesn’t mean that it will be fraud free.

I know that one could argue if both type of election cannot be fraud free why not go for something which produces fast result?..


Actually, I am not against the automation of election...
I commend the government for coming up in such a good innovative idea for our election. Personally, I believe that we should have implemented this a long time ago...

However Commission on Election are rushing things up, there is a very little time intended for implementing the AES.

TIME AND END USER TRAINING
Testing cannot be done in just months, to get a reliable result this must be performed for years. To assure the voters of clean, honest and reliable election the AES must be tested if it has no flaws. Through testing we could also prevent fraud in the incoming elections offering more credibility.

Other than that, it’s only months away before election but still the citizen do not how to use the system. How will we vote if we do not know how to use the machine. We must consider that not all people know how to use a computer. If people will not be able to use the machine properly there might be a big chance that their votes will not be counted or will be invalid.

If something like this happens, losing opponents will most likely file a case and call for reelection.
There is no need to say that cost is a very important factor in this type of situation.

Therefore I believe that the Philippines is not yet ready for an automated election.

It is good that our government is changing into AUTOMATED ELECTION SYSTEM, I adhere that they continue to implement this for the next election. I suggest that they plan the implementation carefully towards a credible, reliable, fast and better election.

Monday, October 12, 2009

0
journal_16

OCTOBER 1, 2009

Submission of our major paper INFORMATION SYSTEMS NEEDS ASSESSMENT.

...gud luck to us!

0
journal_15

SEPTEMBER 30, 2009

THIS IS THE DAY!

No class for today…its family day! Yey!...
So glad there was no class for today, because today is the last day to finalize and finish our ISNA major paper.

Last day we decided to meet in our house in the morning to continue making the parameters, SWOT, and STEEP analysis of our paper.
Around 5pm we still haven’t finished the recommendation, implementation plan, and projected cost so we resolved that they stay for the overnight to finish everything.
It was almost 2am when the Information Systems Needs Assessment was done.
…yep yey!

We took rest and hope for the best later that day…^^

0
journal_14

SEPTEMBER 27, 2009

We successfully finished the first part of our ISNA today.

…first part done!


SEPTEMBER 29, 2009

We continued on our task and did some more research today.
Furthermore we finished some part of our documentation and observation.

The parts we finished are:
• Flow Diagram of the Major Business Flow
• Matrix of the Functionality of the IS

Now we only have one day left to finish our major paper…
Oh…I can’t say I’m not stressed…^^

0
journal_3

JULY 7, 2009

Macondray Plastics, Inc. and Ford Davao were approved today by our instructor to be our prospect companies for the ISNA.
Immediately we made the necessary request letters so that we can conduct our interview in those companies. The letter is needed to be signed by our instructor, college dean and the university’s OSS Director.

the signing was tough…

For the succeeding week we also started making the draft for our Gantt chart. Gantt chart serves as our guide for the activities and topics we will make in our ISNA.

0
journal_2

Last week of JUNE to first week of JULY

Throughout this span of time our group looked and listed for companies to be our prospect for our ISNA.We researched for the profile of these companies and made a hard copy for our instructor to approve.

Some of our prospect companies are… Macondray Plastics, Inc. and Ford Davao.