A database can be describe as a system whose key concept is simply way of handling data. It is something like a automated way of record-keeping. It can be defined as an organized collection of related sets of data that can be accessed by more than one user by simple means and can be searched to find relevant information. Related data includes:

  1. Entity or attribute - the smallest  component of a database.  This gives the characteristics of an object.  ex. The id number of an employee of LPU - Batangas
  2. Field - contains a specific type of information within a data set or record that can divided.  ex. The name of an employee of LPU - Batangas
  3. Record - is a collection of related fields or information.  ex. The id number, name, address, of an employee of LPU - Batangas.
  4. File - collection of records.  ex. Plantilla of all employees of LPU -Batangas for November 2009.
  5. Database - is an organized collection of related files.  ex.  201 files of all employees of LPU -Batangas.
Databases can have the following properties:
  1. integrated with different applications
  2. eliminates or reduces redundancy of data
  3. independence of data that makes it flexible to changes
  4. allows sharing
  5. provision for centralized access and security control

A Maricopa County Sheriff's Deputy named Adam Stoddard, was caught on video stealing documents from a public defendant during a court Hearing. The deputy claims he wasn't stealing the paper, but was only searching it for contraband. He declared in contempt of court, and the judge has ordered him to apologize with the following conditions:

1) On or before November 30th, 2009, at a time convenient for Ms. Cuccia, a news conference to take place in the plaza on the north side of the central court building where he is to give Ms. Cuccia a sincere verbal and written apology for invading her defense file and for the damage that his conduct may have caused to her professional reputation.

2) If at the news conference, Ms. Cuccia does not state that the apology is sufficient, Stoddard will report to the jail on December 1, 2009 and be detained until further order upon a finding that he has complied with the purge clause.

Maricopa County Sheriff Joe Arpaio responded to the ruling early Wednesday, saying Superior Court judges do not order his staff to hold press conferences.

This is the video taken by a Tom
MCSO officer who took lawyer's paperwork might go to jail

Newsletter Issue#1 from Google Ad Planner. The Issue includes:

Webinar Invitation for Advertisers

Date: Friday, November 20th
Time: 12pm PST
Event number: 967 257 234
Event password: planner
Registration password: agency1
Call-in (US/Canada): 866-699-3239
Register here

Webinar Invitation for Publishers

Date: Tuesday, November 24th
Time: 9am PST
Register here


Google Ad Planner updates for advertisers

  • Research ad placements
  • View subdomain data
  • Access more granular publisher data
  • Visualize audience data with an interactive graph
This aims to help advertisers to build better-targeted media plans. Google Ad Planner has more detailed data which now includes ad placements, subdomains, and publisher-shared Google Analytics metrics. There is also an interactive graph for proper evaluation of sites that shows its reach and relevance.
Google Ad Planner updates for publishers
  • Opt-In additional Google Analytics metrics
  • Claim your subdomains
  • Delegate site management
  • Promote your site profile with the Ad Planner Badge
Publishers will have a better way of promoting their sites in Google Ad Planner. Through Google Analytics metrics, advertisers will be able to view relevant data from a publisher's site. Profile information can be created for publisher subdomains. To attract advertisers, a badge can be displayed on a publisher site. By allowing additional users to access Google Ad Planner, a publisher will have an easier time to manage a site.

Related Sites:
Inside AdWords Blog
DoubleClick Blog
Inside Adsense Blog
Google Ad Planner

A video posted last November 3, 2009 on You Tube by user celebritynationVids shows Manny 'Pacman' Pacquiao driving a car with a girl inside. The girl is covering her face, but everyone believes that it is Krista Ranillo. The video was taken after Pacquiao's appearance at Jimmy Kimmel Live show. Pacquiao is now in a center of controversy over his alleged relationship with Ranillo. The newly crowned seven time champion is said to be very affected with the issue.

The results of the 2009 Licensure Examination for Teachers, held in October was released Monday by the Professional Regulation Commission.

According to the PRC, 8,045 elementary teachers out of 43,086 examinees (18.67%), 26 Accelerated Teacher Education Program (A.T.E.P.) graduates out of 146 examinees (17.81%) and 10,792 secondary teachers out of 38,339 examinees (28.15%) passed the Licensure Examination for Teachers (L.E.T) given by the Board for Professional Teachers on October 4, 2009 in 23 testing centers throughout the country.

The results of the other two thousand eight hundred sixteen (2,816) examinees were withheld as per Board Resolution Nos. 34 & 35 (A) dated October 30, 2009, No. 38 dated November 5, 2009 and Nos. 42 & 44 dated November 13, 2009, Series of 2009.

Based on R.A. No. 7836, also known as the “Philippine Teachers Professionalization Act of 1994”, “Every registrant shall be required to take his professional oath before practicing as a professional teacher” (Sec. 18).

The current Board for Professional Teachers is composed of Dr. Brenda B. Corpuz, Officer-In-Charge; Dr. Reynaldo T. Peña and Dr. Faith M. Bachiller, Members.

Tickets for the oath-taking will be available at the Office of Professional Teachers, 3rd Floor, PRC Annex Building for NCR and Region IV passers starting November 18, 2009 (Wednesday) and at the PRC regional offices for the passers from the other regions.

Reports of Rating will be distributed to successful examinees on the day of the oath taking ceremonies, except for N.C.R. and Region IV.

Registration for the issuance of Professional Identification Card (ID) and Certificate of Registration will be announced later.

The following list are the requirements for the issuance of Certificate of Registration and Professional Identification Card (ID):
1) duly accomplished Oath Form or Panunumpa ng Propesyonal;
2) latest Community Tax Certificate (Cedula);
3) 1 piece 1” x 1” picture (colored with white background and complete name tag);
4) 2 pieces 2” x 2” picture (colored with white background and complete name tag);
5) metered documentary stamp for the Oath Form;
6) Initial Registration Fee of P600 and Annual Registration Fee of P450 for 2009-2012.

Successful examinees should personally register and sign in the Roster of Registered Professionals.

List of Successful Examinees in the L.E.T. - ELEMENTARY - A.T.E.P.- All Regions

Seq. No. N a m e

1 Abdulazis, Pairods Abdullah
2 Adam, Abraham Sanduyugan
3 Alam, Rigan Suhaili
4 Balindong, Jehan Sultan
5 Buat, Samaliya Deong
6 Canacan, Abraham Mamalumpong
7 Dali, Abdulkarim Imam
8 Dimao, Norodin Adim
9 Dud, Hasmin Cabalo
10 Duloan, Abdulgani Gumaga
11 Edris, Abdel Raffi Sali
12 Edza, Abu Hurairah Mangansakan
13 Edza, Doking Juialani
14 Gana, Norhata Adam
15 Garay, Abdulkadir Shariff
16 Gayak, Mohaliden Giuabar
17 Haron, Naima Esmael
18 Hashim, Racma Sabdula
19 Kongkong, Mohamad Guiaplos
20 Mangacop, Faridah Botawan
21 Matangkoy, Datuali Pananggulon
22 Omar, Mosanip Usop
23 Palisaman, Guiahar Kalun
24 Pandarat, Asria Gumander
25 Radzak, Normina Sanday
26 Saracan, Abdullah Abdul

Related articles:
L.E.T. - Elementary Successful Examinees
L.E.T. - Secondary Successful Examinees
Additional Information about the 2009 L.E.T. Result

A computer network can be defined as a collection of hosts that are able to communicate with each other. These host relies on the services of a number of dedicated hosts that relay data between the participants.

Communications between hosts was made possible through a language or code called protocols. This protocol are strict rules that serves as a guide in exchanging messages between hosts.

Protocols includes the most popular Transmission Control Protocol/IP(TCP/IP), User Datagram Protocol(UDP/IP) and Unix-to-Unix Copy Protocol(UUCP). TCP/IP uses a datagram to transmit data and establishes a connection, sends data to and from. Datagram is often used interchangeably with packet. Packet is a part of data transferred from one machine to another machine across the network. UDP is use to send single packets of data to a destination service. UDP is connectionless and does not require the establishment and closure of a session. This protocol is faster and more efficient than TCP/IP but it is not a reliable protocol. UUCP on the other hand is a type of protocol that transfers files over serial lines, schedules the transfer, and initiates the execution of programs from remote sites. UUCP delivers data in batches and uses temporary connections to do this.

Manny Pacquiao wins his seventh title in seven different weight classes by stopping Miguel Cotto at the 2 minute mark of the 12th and Final Round. Pacquiao has again carve his way to boxing glory by becoming the only boxer to achieve such feat! It turned out to be a no-contest as Pacquiao dominated the taller Cotto right from the opening Round. Cotto went down twice and was battered by Pacquiao throughout. Referee Kenny Bayless stopped the fight when Pacquiao launched a persistent attack on Cotto right from the start of the Final Round. Pacquiao took home the WBO Welterweight and WBC Diamond Belt.

The judges of the fight were Adalaide Byrd, Duane Ford and Dave Moretti. La Diva sang the Philippine national anthem while Emilia Rosario sang the Puerto Rican national anthem. US anthem was rendered by Ramiele Malubay.

Pacquiao marches towards the ring while the song "Eye of the Tiger" was being played.
Michael Buffer was the announcer as usual and draw the crowd wild with his popular chant - "LET'S GET READY TO RUMBLE!"

Herewith is the Blow by Blow account of Pacquiao vs. Cotto fight:

Round 1: Cotto starts to jab and connect, while Pacquiao jabs back. Cotto connects with left hook that shook off Pacquiao a bit. Cotto jabs while Pacquiao takes his time. Pacquiao connects with 1-2. Pacquiao tries to slip, attacks, but Cotto holds. Cotto presses attack, Pacquiao lands left hook, wobbles Cotto a bit.

Round 2: Pacquiao starts jabbing and throws a left straight. Cotto fights back, showing some speed over Pacquiao. Pacquiao keeps hands up and shows defense. Pacquiao connects a left straight, and throws some combinations. Cotto appeared to have thrown a low blow. Pacquiao rattles Cotto with big left hooks, explosive punches! Cotto seems to be hurt! Cotto tries to trap Pacquiao in the corner but Pacquiao escapes!

Round 3: Cotto attacks while Pacquiao positions at the center of the ring. Cotto connects with left, Pacquiao throws a 1-2-3, downs Cotto! Cotto was able to get up but Pacquiao attacks again. Pacquiao presses the fight but Cotto recovers. Big punches were thrown by both fighters. Pacquiao jabs in , connects with left, and then dances away from Cotto. Cotto was warned to keep his punches high. It was a big Round for Pacquiao!

Round 4: Cotto jabs, and throws a big left, that back off Pacquiao. Cotto resorts to body punches but Pacquiao throws 1-2, and an upper cut. Pacquiao's attack wobbles Cotto's knees. Pacquiao on the ropes waited for Cotto to attack, but escapes. Another big punch puts Cotto down 20 seconds left in Round 4! Cotto survived the round again!

Round 5: Cotto tries to attack but Pacquiao boxes from the distance, showing some intelligence. Pacquiao lands a combination again, forces Cotto to defend wearily. Pacquiao was hit and moves to the center then jabs and connected. A flurry of punches by both fighters before the round ends

Round 6: Cotto again started jabbing and seems to be in attack mode, but Pacquiao throws a hook, an upper cut and connected with big right hook! Cotto dances away, but Pacquiao chased Cotto hitting him with 1-2 combination. Pacquiao throws another 1-2-3 combination, and Cotto holds on for dear life. Cotto lands jab but Pacquiao attacks again and wobbles Cotto. Cotto taps Pacquiao's cheek.

Round 7: Pacquiao throws a big right, that reeled Cotto. Cotto throws a straight and then a hook but Pacquiao seems unaffected. Pacquiao moves forward while Cotto tries to dance away but Pacquiao hunts Cotto and connects another 1-2 combination before the bell.

Round 8: Pacquiao is showing confidence now as Cotto suffers bruises under his eyes. Cotto dances and keeps backing away from Pacquiao. Pacquiao traps Cotto at the ropes and throws a 1-2-3 combination and then steps back. Pacquiao smelling blood now, keeps following Cotto and connects an upper cut and a hook.

Round 9: Pacquiao hits his gloves showing impatience over Cotto. Cotto attacks with 1-2, but Pacquiao fights back. Cotto's face is a now a mess with his right eye swelling while Pacquiao's face remains clean. The dominating look of Cotto at the start has been translated by Pacquiao into an easy target now.

Round 10: Cotto started to attack again, but Pacquiao shows his preparedness with his defense. Pacquiao attacks again, and Cotto tries to hold on but Pacquiao stays away. Pacquiao walks forward trying to hunt down Cotto who seems to retreat always, and uses the ring to stay away from Pacquiao. Pacquiao attacks again before the round ends. Cotto's face is really a mess, nose bleeding, right eye puffed, and has a small cut in the left brow. Obviously, Cotto is trying to gain some wind by running away from Pacquiao and preparing for one big push later.

Round 11: The fight now reminisces of the Cotto-Margarito fight when the Puerto Rican was trying to stay away from Margarito. Pacquiao still persistent, connects with 1-2-3-4 combinations! Pacquiao tries to trap Cotto in the corner but Cotto moves away, and jogs around. Cotto counter punches, and gets boos from the crowd. Pacquiao is just dominating Cotto, and showing ring dominance. It seems like Cotto has learned a lot from Muhammad Ali's style - dancing away from the opponent. The only difference is that Cotto's style is cowardice.

Round 12: Pacquiao chases Cotto, but Cotto throws a left hook. Pacquiao catches Cotto with 1-2. Now Pacquiao is unstoppable, 1-2, 1-2 combinations! Keny Bayless steps in and stops the fight just seconds over 2 minutes in Round 12!

Manny 'Pacman' Pacquiao of the Philippines shoots for his seventh title in seven different weight divisions today at the MGM Grand Hotel and Casino. He will face World Boxing Organization (WBO) Welterweight Champion Miguel Cotto. If Pacquiao prevails over the bigger Cotto, he will be the first boxer to win a seventh title in seventh weight classes. The face-off is dubbed as 'Firepower' match.

Pacquiao has a boxing record of 49-3-2 (37 knockouts) and weighs at 144 lbs during the weight in yesterday.

Cotto on the other hand has a record of 34-1 (27 knockouts)and tipped in at the catch weight of 145 lbs.

Both fighters said that they have prepared well for this fight. Pacquiao said, together with other biggest names in boxing, that he faces a very tough opponent in Cotto. Many regards Pacquiao as a good boxer but Cotto is a legitimate welterweight and this will definitely pose problems for the Filipino boxing hero. Cotto retained his WBO Welterweight in a split decision win over Ghana's Joshua Clottey in June. Pacquiao on the other hand has just came in a second round knockout of Britain's Ricky Hatton at the MGM Grand to claim the IBO light welterweight crown in May.

To boost the information and acceptability drive of the upcoming 2010 automated elections, the Commission on Elections (COMELEC) and its automation partner Smartmatic, launched two websites - I.B.A Na Ngayon and Bagong Botante.

The first site aims to teach all Philippine registered voters on how the new process will be done through slideshow, and videos. This videos are available in English and Filipino. The whole voting process is broken down in three steps. There is also a demo on how to fill up the new ballot and how a particular precint count optical scan (PCOS) machine operates.

The other website aims to create awareness of the automated elections by involving the Filipino public. The site is similar to a social networking site that allows users to interact with all its members.

With the obvious low internet usage statistics we have in the Philippines, COMELEC and Smartmatic also prepared an offline version of the website. They identified malls and restaurants as key areas where they can place this offline kiosks. The COMELEC also is preparing a caravan as part of educating the Filipino voters.

Related Sites:

Yesterday, I was so upset with Google Adsense. Today, I got a surprise from them. After the "backlash" I gave Google with the way they handled my application, I was thankful that today, November 13, 2009, 12:43pm, less than 24 hours when I resubmitted my application, I received a welcome email from Google Adsense. It was indeed a Lucky Friday the 13th for me. Hooray! Cheers to Google.

Luckily? Or was I able to really convince them to accept my site because I removed all other things within my website except all my posts? I still don't know. It still a big puzzle how one can really pass Google's criteria. But thanks anyway to the Google Adsense team for giving me the opportunity to publish my site together with their ads. I just felt that working with Google this way is really a privilege. With their strict approval, one should really possess a great amount of patience. I must admit that I felt so relieved and proud having been accepted even though I went through a gruelling waiting period and rejection. It's really a better feeling to attain your goal when you work hard for it and fight for it.

For those who are aspiring to apply for Google adsense, maybe I can list down several tips to pass Adsense criteria based on my own experience. But this are all assumptions on my part. As I have said, it is still a great puzzle on my part how they were able to reconsider my site after telling me that my content are unacceptable. Anyway, here is the list of pointers:

  • For new publishers, you must have significant number of posts before applying to Google Adsense.(at least 5, maybe)
  • If you have a new site, do not place links to other sites.(I think Google is worried that you are promoting other sites that might be harmful to their ads)
  • Be consistent with the layout of your site. Do not change the positioning of the site content.
  • If you have a lot but short posts(200-500 words), you better place at least 5 posts on your homepage. But if you have long posts(a thousand words or more), 1 post shown on your homepage or landing page will do.
  • Do not put a lot of widgets within your site that it might look as if they are ads.
  • Have a regular post if you post short posts. Have a more lengthy posts if you are posting irregularly. Google might also be calculating the significant ads to be shown on your site based on the keywords within your posts.
To all upcoming Google Adsense applicants, I wish you luck and remember to be patient. The puzzle within their approval criteria might also be a part of their over-protection of their advertisers.

I resubmitted my site to Google Adsense last November 1, 2009 because of "Unacceptable site content". I waited for 11 days which they said should only took 1-2 days up to a week for their response. Unfortunately, Google replied today, November 12, 2009, 2:28PM and still my site has "Unacceptable site content". I just keep wondering what content do I have that makes it unacceptable. Google could have beeen more friendly by being specific which part of my site makes it unacceptable. After removing all other things except for my posts, I resubmitted again my application today, November 12, 2009, around 8PM. This time I am not expecting them to approve my application because of this post. I just do hope that Google would be friendlier to others who will apply for Google Adsense in the future. I just do hope they will also respect the posts made by publishers and bloggers before saying that their sites are unacceptable. It's like you are accusing someone of a crime but you didn't presented any evidences.

It seems like Google put itself in a bind for announcing its new programming language which it named "Go". It turned out that someone has already use the same two characters as a name of a programming language since 2000. Has Google not been using it's own search engine? Or was it's search engine not good enough to tell them that a software architect named Frank McCabe has a Go! programming language described in book that he published in 2007 and in a research paper published in 2004? Or worst, is Google already leaving its original motto of "Do not be evil"?

I think we need to feel the sensitivity of Google on this issue. Are they too big now that they can't even control themselves? Watch out McCabe.

Last October 31, 2009, the Lyceum of the Philippines University - Batangas (LPU) has renewed its Microsoft License through Shellsoft Technology Corporation, a Microsoft Large Account Reseller. Last November 3, 2009 LPU received its Microsoft Media Kit that includes among others a DVD of Windows 7 Enterprise (x64 and x86). With its aim for higher level of quality education for its students, LPU is very excited to upgrade to Windows 7 and let its students get a feel of the newest operating system of Microsoft.

LPU is the only Autonomous, ISO 9001:2008 Certified University in Southern Tagalog Region.

US Secretary of State Hillary Clinton will be in Manila today. She is expected to talk about solidifying the Filipino American ties. Clinton will visit the Philippines before her scheduled trip to Singapore for the Asia-Pacific Economic Cooperation (APEC) Summit. The Philippines is the only other Southeast Asian country that she will visit. According to Clinton, her Manila aims to show her solidarity with Filipinos, especially those who were affected by the recent typhoons “Ondoy” (Ketsana), “Pepeng” (Parma), “Ramil” (Lupit) and “Santi” (Mirinae). US Ambassador Kristie Kenney said that the country was selected by Clinton because “The Philippines is our longest friend.”

With Clinton's visit, talks on the Visiting Forces Agreement was revived. But Kenney reiterated that Clinton's agenda in the Philippines visit is to oversee the “whole flood-typhoon relief effort here. In fact, she says that's really why she wants to come, to show her solidarity with the Filipino people.” Kenny clarified that it might not be possible that Clinton will get into the details of the VFA.

Microsoft has released six(6) new security updates on Tuesday, November 10, 2009. You can get the updates by setting your computer updates to automatic or you can go to Microsoft Update or Microsoft Download Center.

These updates includes patches for Windows, Windows Server, and Office. The critical updates focuses on remote code execution vulnerability of Windows Kernel and Web Services of Windows Vista and Windows Server 2008. These patches also includes updates for Excel and Word.

List of Security Updates

  • MS09-063 - addresses a vulnerability in Windows (KB 973565)
  • MS09-064 - addresses a vulnerability in Windows (KB 974783)
  • MS09-065 - addresses a vulnerability in Windows (KB 969947)
  • MS09-066 - addresses a vulnerability in Windows (KB 973309)
  • MS09-067 - addresses a vulnerability in Microsoft Office (KB 972652)
  • MS09-068 - addresses a vulnerability in Microsoft Office (KB 976307)

If you recently bought a Nokia mobile phone, then you should check its charger. Nokia is now recalling chargers with types AC-3E, AC-3U (manufactured between June 15, 2009 and August 9, 2009) and AC-4U (manufactured between April 13, 2009 and Oct. 25, 2009).

Nokia discovered a problem during a "routine" check of the chargers manufactured by BYD Electronic Company of China. A "potential product quality issue": a loose plastic cover that could "come loose and separate," exposing the circuitry inside.

A Nokia web site with a Web form that lets you plug in the ID number of your specific charger to see if it's been recalled.

You may also check the following links:

Efren Peñaflorida, 28, a native of Cavite City, Philippines, offers Filipino youth an alternative to poverty through education. Efren and his team of teen volunteers has been teaching street children basic reading and writing Math and English for the past 12 years using pushcart as a classroom tool. Their unusual strategic locations for a classroom setup includes cemetery, and dump sites. He founded the Dynamic Teen Company as an alternative group from gangs that also pester him during his high school days. His group teaches children age 2 to 14. He also includes in his teaching, proper hygiene like taking a bath and how to brush their teeth.

Truly, Efren, is a hero that we Filipinos and even non-Filipinos should be proud of. Let us support our "Kababayan"(Filipino word that means fellow Filipino, countryman, or townmate) - Efren Peñaflorida in his quest to become the first Filipino to be selected as 2009 CNN Hero. Click here to vote for Efren Peñaflorida

Voting continues until Thursday, November 19, 2009 (6 a.m. ET). There is no limit on the number of times you may vote for the Hero of the Year.

See how Efren help the street children.

Server for Lyceum Integrated Management System (LIMS)

P/N: 491332-371


Processor: Intel® Xeon® processor E5540 (2.53 GHz, 8MB L3 cache, 80W, DDR3-1066, HT, Turbo 1/1/2/2)
Sockets: 2
Cache memory: 8MB (1 x 8MB) L3 cache
Standard memory: 6GB (3 x 2GB) PC3-10600R (DDR3-1333) Registered DIMMs
Memory protection: Advanced ECC; Mirrored Memory
Max front side bus: 800 to 1333 MHz

Storage type: Hot plug 2.5-inch SAS
Expansion Slots: Six (6) available - optional PCI-X/PCI-Express or x16 PCI riser
Storage controller: HP Smart Array P410i/256MB Controller(RAID 0/1/1+0/5/5+0)
Storage Controller Cache: 8MB (1 x 8MB) L3 cache
Hard Drives: 3x300 SAS


Rack height: 2U
Dimensions (w x d x h): 3.38 x 17.54 x 27.55 in (8.59 x 44.54 x 69.98 cm)
Weight: 60 lb (27.22 kg)
Networking: Two (2) HP NC382i Dual Port Multifunction Gigabit Server Adapters with TCP/IP Offload Engine, including support for Accelerated iSCSI
Power Sources: Hot plug and redundant power

Unit Price as of November 3, 2009 - Php 151,500.00
note: Price includes 1 HDD HP 300GB 10K 6g 2.5 P/N 507127-B21

It has been a common mistake to many that the internet is the same as the web. The Internet is a large inter-connected network around the world. This network includes all computers that are connected to a network, and this network is connected to other networks. On the other hand, the World Wide Web (Web) is a part of the of the ever growing Internet. The Web is responsible for the integration of text, graphics, sound and video over the Internet.

The Internet was conceptualized during the 1950s. The anticipation of a nuclear war led to the idea of the Internet as a means of communication. Click here for more on History of Internet.

The Web was the idea of Tim Berners-Lee of CERN (a European Laboratory for Particle Physics). Click here for more information about the Web.

The following are some basic elements of the Web:

  • HTML - Hypertext Markup Language(HTML) is the language used for coding the Web. It informs the browser how to display text, links, graphics and other media. This language has been the foundation of all Web pages.
  • Domain Name - All computers registered on the Web is being given a domain name to distinguished it from any other computers in the network. Domain names are structured as two or more terms separated by periods.
  • URL - Uniform Resource Locator(URL) is an identification for all documents over the Web. URL is also called the web page address.
  • Webmaster - The individual who maintains and updates the content of a web page.

The internet has been in existence for so long now, but still a lot of businesses has not dip into cloud as a means of expanding or even starting their transactions. What seems to be holding everyone in the sideline? Here are some of the perceived factors that keeps some people from going to the internet to sell their products:

  • Profitability - A lot of companies does not think the internet will serve as a milking cow for them. Since a lot of "dot com"(.com) companies have closed down due to heavy losses, this has brought down the viability of internet business. Many believe that there is not enough money in the internet.
  • Security - There are a lot of threats in the internet. Virus, spyware and fraud are so prevalent thus bringing down the confidence level of businessmen. Others believe that protections such as anti-virus, anti-spyware are only good for known threats.
  • Competition - Other companies feel inferior to other products. Since the internet is a worldwide scene, makes competition level much higher.
  • Legal Protection - There is not enough law that governs the internet. The internet is being used worldwide but laws are made only in some countries.
  • Loyalty - The internet does not guarantee loyalty for a specific product since transactions are not personal in nature, and sometimes no interaction at all.
  • Acceptance - Businesses believe that it will not be appealing to their customers if they go to the internet. Third world countries for a fact still has a high percentage of digital divide, thus, internet is still not accessible to a lot of people.

Software piracy is an act of using copyrighted and licensed software without paying for its appropriate use and license. Considered as one of the most important technologies of the Information Age, software runs on every computer and through the internet. Since software is so important and computers make it so easy to copy this software, piracy has increased rapidly especially in third world countries. Software piracy has proliferated not only through individual users but also for professional businesses. This piracy can be found at homes, offices, schools, and government institutions. This practice not only bring up losses of software companies and developers but it also depletes funds for future research and development for new and more advance software.

Software piracy can be categorized into three:
  • End User - using a single licensed software to several computers or by reproducing copies of such software and distributing it to other users is a violation of End User Licensing Agreement (EULA).
  • Reseller -this is done by reproducing multiple copies of a single licensed software and distributed by a reseller to unlimited number of customers. This also includes reselling known pirated copies of software.
  • BBS/Internet - piracy is done by redistributing copyrighted software through electronic means.

Computer abuses can be classified as: hacking, flaming, spamming, worms and viruses, denial of service and Internet hoaxes. Some communities/countries consider these abuses as computer crimes and computer frauds. In the Philippines, an E-Commerce Law defines the penalties for computer crimes, hacking and computer fraud, among others.

Worm and Virus

A virus is a software reproducing on its own by attaching itself to other software once it is triggered or executed. We can say that a virus has two phases: infection and attack phase. The action phase is the time it reproduce itself, while, attack phase is the time that it cause damage to other software.

A worm is a software that replicates on its own that usually spread through network without anyone triggering it. Since a worm can act independently, it spreads much faster than a virus.

Internet Hoaxes

Chain letters are the very common hoaxes that almost everyone encounters in the internet specifically in emails. With new technologies now available, this hoaxes usually ends up in our email junk and spam folders. These messages do not really infect our systems the way virus and worms do, but it is time consuming and costly to remove.


Spamming is flooding the internet email inbox of unsolicited email. Majority of this email are commercial advertising. Automated searches are used to retrieve email addresses for spamming. Junk email growth have increased significantly that it has become a headache for users and even for many Internet Service Providers (ISP). In order to combat spammers, ISP now issued policies that spammer accounts will be disabled. Most countries now consider spamming as illegal.


Flaming is considered as one way of abusing computers because it is a way of disrespecting other people's opinion and attacking them personally by sending abusive email and foul languages in chatrooms and other conversations. It is considered as unethical and usually gets blocked in chatrooms, newsgroups, forums and discussion boards.

Denial of Service

An attempt to prevent a legitimate user to access computer services is considered as a denial-of-service attack. This attacks are usually done by:
  • consuming scarce, limited and non-renewable resources
  • altering or destroying configurations
  • altering or destroying physically the network components.
Prevention of hosts or network servers from communicating on the network is an example effect of consumption of scarce resources. This results in denial of connection by legitimate network users. Bandwidth can also be consumed dramatically by intruders by issuing large packets of requests directed to the network.

Improperly configured computer will definitely not perform well or may not operate at all. Networks may be disabled because of routing information problems caused by illegal alterations.

Unauthorized attacks on physical network components such as computers, routers, hubs, switches, and network backbone segments and other critical components will definitely crashed the computer infrastructure thus services will not be available.


Hacking is an unauthorized access of computers, information systems, including its files, programs and databases. Hackers usually do this to steal services, steal confidential information, and because of vengeance or hatred. Some hackers do this for thrill and excitement. Others, do it just to test their skills and for experimentation.

Most government and private organizations are developing ways to protect them from any information attack. Others are even trying to develop tools to attack other systems. Information troopers are trying to capture and destroy information, and processes of the "enemy", while they secure vulnerabilities on systems flaw that attackers already are familiar. Information warfare can exist technically on the privacy of people in different levels such as: personal, corporate(companies) and global(countries).

Cyber-terrorism is a form of attack on information systems that compromises national security. Business-to-business(B2B) transactions over the internet is one type of information system that is vulnerable to Cyber-terrorists.

The following are some of the strategies that Cyber-terrorist use in their attacks, depending on the type of institution:

  • Virus/Spyware - Any company can be attacked by planting a virus into any other software. These virus may destroy valuable and critical information in an organization's network of computers.
  • Alteration of Data - Banks can be attacked by changing bank accounts. Unauthorized fund transfers may cause financial losses and loss in consumer confidence.
  • Communication cut-off - Electronic signals can be jammed to cut communications of airport towers with airlines.
  • Distant Killing - Alteration of patient records can cause wrong diagnosis that may lead to death of patients.
  • Information Dissemination - Disinformation can be very costly to organizations. Using the internet to spread false information is like a wildfire that is very hard to contain.
With the threat of Cyber-terrorism comes preventive measures that organizations can practice to repel attacks.
  • Passwords - Password must be a combination of alphanumeric characters and symbols and should be at least eight(8) characters long. Regular changing of password will be a very good practice.
  • Network - Firewall, proxy and anti-virus are some of the tools that may be used to secure the infrasture of the organization. If possible, network audits can also be done periodically. As a minimum requirement, an anti-virus must have a scanner, shield and a cleaner.
  • Patches - Make it a habit to be updated of certain vulnerabilities of your information systems and acquire regular critical updates from the developer.
  • Audit - Analysis of log files might be necessary and must be done on a regular basis to check the systems health and status.
Everyone must take note that all attacks may not come from outside of the organization. Rather, within the organization, someone may wreak havoc on information systems such as competitors, and former employees.

The Era of E-Business began in the 1990's. Web-based Information systems became more available due to increase in computing power and the decline in the cost of computer technology.

Almost twenty years after, the most important concerns people have about e-business and online transactions remains the same-security. Sensitive data, such as credit cards, telephone numbers and passwords may be transmitted and intercepted by skilled computer experts. Without reliable security measures, many people are reluctant to conduct their businesses through the Web, adding to this is the financial troubles that have swept the world since late last year.

A major concern with the Internet pertains to the identity of users. It is very easy for a person to pretend to be someone else on the Internet. There are even robots or software that can regenerate identities within the web. And even if a person can be identified, it is often not possible to do business without some sort of signature. Already, governments are starting to provide legal frameworks to allow the creation of standardized digital signatures and certificates. But the trust and confidence with the technology is not yet there.

Organizations and individuals who use computers outlines their needs for information security and trust through five major qualifications: confidentiality, integrity, availability, legitimate use and non-repudiation. Confidentiality is necessary to limit and isolate those who get to read the information and to conceal information from all others. Integrity has to do with information being changed only in a specified and authorized manner and assurance that the data is genuine or authentic and not altered during transit. Availability pertains to enabling authorized users to have continued access to information and resources in a timely manner. Legitimate use means that resources cannot be used by non-authorized persons or in an unauthorized way.

Part of Microsoft CEO Steve Ballmer's Message in his visit to South Korea

“The economy went through a set of changes on a global basis over the course of the last year which are, I think is fair to say, once in a lifetime,” Ballmer told a meeting of South Korean executives in Seoul.

Spending on information technology, which accounted for about half of capital expenditures in developed countries before the crisis, was unlikely to rebound fully because capital was more scarce these days, he said.
“While we will see growth, we will not see recovery,” Ballmer said.

This Microsoft outlook seems to be a very negative outlook from the mightiest software company in the world. Does this mean Microsoft will likely to cut more on its spending the way it cut benefits of its executives months back? Does this mean Microsoft has accepted the fact that its downturn is now imminent? Is it really the global crisis that Microsoft is weary about or the challenge brought about by the aggressiveness of search giant Google? Is Microsoft feeling jittery over the pressure that Google is giving on its operating system? I think instead of Microsoft issuing pessimistic outlooks, it should generate interest on Technology market and raise up the level of confidence in the said market. With its vast resources, financially and marketability, Microsoft should take the lead in driving the market to greater heights and lead the market to recovery. I still believe that being optimistic will produce positive results. The Technology market is not dead and it's not the time to sleep. Let Technology lead us to recovery, not just growth.

Lenovo ThinkPad R61i Running Windows 7
My Lenovo ThinkPad R61i has been with me for almost a year now. Windows 7 was officially launched last October 22, 2009. With all the hype about the new and improved features of this new Microsoft Operating System, I can say that based on my over-a-week experience the Redmond based company has done its homework very well this time. The startup time is impressive and is comparable to Windows XP, or better. Shutting down the system is also very smooth and clean much like Linux type of operating system such as Ubuntu and CentOS. Another good thing which I think Microsoft has heeded the call of consumers and the courts is that you can now turn off other features of Windows 7 which you don't like such as Internet Explorer 8, Media Player and so on. This definitely saves up on memory usage which usually makes Windows crawl in opening up other applications. Windows 7 users can now have the feeling of being in control of the operating system and not the other way around. Start up of applications such as the ever popular MS Office 2007 is now more enjoyable. Windows 7 is definitely a fit to my Lenovo R61i and has unleashed its true ThinkPad power. At this point, I congratulate Microsoft for a job well done. Fittingly this day, November 1, 2009, we can bury the memories of the Vista experience.

This is a screenshot of the main menu of Lyceum Integrated Management System(LIMS). The system was acquired to improve customer service and make LPU employees efficient. LIMS is a web-based application developed by Data Pacific headed by Mr. Mike Maske as president and implementation of the system is in collaboration with the Systems Development Department-MIS of LPU. The system is an integration of Human Resource System, Payroll System and Accounting System. The system was launched last October 20, 2009 and the implementation and customization is expected to be finished by April of 2010.

SDD MIS Official logoThis is the logo of the office of the LPU Systems Development Department - MIS. The said department is responsible for conceptualizing, planning, developing, implementing and maintaining all computerized systems of the Lyceum of the Philippines University in Batangas. Currently handling systems such as OPRHA(enrolment system), LIMS(HRIS, Payroll and Accounting systems), OPAC(Online Public Access Catalogue system), and other systems. The department is composed of the Acting Systems Administrator, Senior programmer and a Junior Programmer.

Sotero Laurel, Ka Teroy to his friends, died September 16, 2009 at the age of 90. His remains lie in state at the Heritage Park in Taguig City. A necrological service at the Senate Hall is set September 18, 2009 at 2:30pm.

Laurel is survived by his wife Lorna and their eight children.

I decided to start blogging because I want to share my experiences to inspire and be a guide to others who will read this.