Sunday, October 18, 2009
MIS Major Paper Journal
Group decided to start on seeking for probable company to be adopted for this project.
July 03 2009
The group had decided to ask the permission to SSS if we can conduct study and to be our adopted company.
July 06 2009
Monday
We went to SSS and we were able to entertain by Mr. Jesulito Flores, one of the IT support staff of Regional Information System Support Department. He advised us to present a letter address to the branch manager, Mr. Manolito Tagalog.
July 07 2009
After we had drafted the clearance letter, we immediately signed it to our facilitator together with OSS Director and the Dean.
We went back to SSS and present the letter to Mr. Jess. He personally gave it to the branch manager. Unfortunately, Mr. Tagalog, branch manager was not there so, he told us to return in Monday.
July 13 2009
We returned to SSS to verify if our letter was approved by the branch manager. Fortunately, it was granted.
July 15-17 2009
Group Discussion
Planning for Information System Assessment Content
Tentative IS Assessment Content
Introduction
Purpose, Scope And Objective of the Study
Company Profile Definitions
Legislative History
Vision, Mission and Goal
Company Operation
SWOT Analysis
Finding and Observation
Parameters (IT Technology)
Process Work Diagram
Recommendation
July 20-28 2009
Group Activities:
Research - for references
Topics:
§ SWOT Analysis
§ Assessment Tool
§ Related on Hardware
§ Related on Software
Review of Modules
Formulations of Guide Questions
Aug 26 2009
The group had decided to present the formulated questionnaire to the RISS Department Head.
We were told they cannot accommodate us by this month because of the busy schedule they had. So, the group decided to leave the questionnaire for them to answer it in their vacant time for our initial data gathering.
Aug 29 2009
Company Background
Data Gathered:
Guide Book for SSS Members
Social Security Act of 1997
SSS Forms
Visits Web Site www.sss.gov.ph
Aug 30 2009
The group started the documentation of the company background:
Company / Legislative History
Vision, Mission and Goals
Organizational Chart
Read the given Company references:
Guide Book
SSS Booklet
Sept. 17 2009
We were able to conduct an interview to Mr. Jesulito Flores.
Here are the informations he imparted to us:
Regional Information Service Support (RISS) Department
-supports SSS with relates to IT problems
-total control of all systems in Regional Southern Mindanao Branches:
Davao
Toril
Digos
Kidapawan
Tagum
Gensan
Tacurong
Coronadal
Mati
-the first line of Defense
-ICT of Southern Mindanao
-Technical Support to ICT problems
Social Security System
-social support to private company
Service Systems:
-web sites : online inquiries
-Info Kiosk
-main office located in Manila
Network Operating Systems
-Windows Base, currently using XP version
Hardware maintenance
-twice a year
-warranty of hardware purchased
System Problems:
-Electrical Fault
-Internet Connection
Internet Service Provider
-Globe Tel. and PLDT
-RASS (Remote Access Service Search)
Software Proprietary
-SAP
-ORACLE
Departments in main office:
-ADM 1-3 (Application Dev. Management)
-SSA (System Software Administration)
-TRD (Technical Research Dev.)
Sept. 28 2009
This was our second interview with the RISS Department Head and Mr. Jesulito Flores , an IT support.
Sept 30 09
We went to PLDT & Smart Company at Ponciano St. Davao City. We had inquired about upgrading Internet Connection from T1 to T3.
We were entertained by Mr. Rolando R. Cadabas SME Area Sales Head of Mindanao together with his colleague who was a graduate of ECE of USEP. They gave us the idea about cost of upgrading internet connection and the probable cost for installation.
Saturday, October 10, 2009
Information Environment: Virtual Library
The Virtual Library was the first index of content on the World Wide Web and still operates as a directory of e-texts and information sources on the web. It was started by Tim Berners-Lee, the creator of HTML and the Web itself, in 1991 at CERN in Geneva. Unlike commercial index sites, it is run by a loose confederation of volunteers, who compile pages of key links for particular areas in which they are expert. It is sometimes informally referred to as the "WWWVL", the "Virtual Library" or just "the VL".
Information resources or information services that are available over the Internet. At BMCC, the Virtual Library site provides access to a large number of library resources (indexes, journals, and reference materials, for example) and online reference service via the campus computer network. Students access these resources through a browser on a workstation anywhere on campus or remotely from home. A search aid that combines Internet technology with traditional library methods of cataloguing and assessing data.
The individual indices, or virtual libraries live on hundreds of different servers around the world. A set of index pages linking these individual libraries is maintained at http://vlib.org/, in Geneva only a few kilometres from where the VL began life. A mirror of this index is kept at East Anglia (UK). A VL specific search engine has operated for some years and is now (VLsearch) located on its own server at vlsearch.org.
The central affairs of the Virtual Library are co-ordinated by an elected Council. A central index (the 'Catalog') is maintained and joint services provided by the Council on behalf of the association.
My Role in virtual library is Systems Administrator. A system administrator, systems administrator, or sysadmin, is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology department. The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility.
The challenges facing me in performing the role of systems administrator are:
1. Operating Systems and Applications Challenge – I can address this challenge by maintaining a database system, and handling the responsibility for the integrity of the data and the efficiency and performance of the system. I will make sure that the network infrastructure such as switches and routers, and diagnoses problems with these or with the behavior of network-attached computers. I can confront this challenge by analyzing system logs and identifying potential issues with computer systems, introducing and integrating new technologies into existing data center environments, and performing routine audits of systems and software and backups. I can also meet this challenge by applying operating system updates, patches, and configuration changes and performing system performance tuning
2. Problem Solving and Troubleshooting Challenge- I can address this challenge by responding to individual users' difficulties with computer systems, provide instructions and sometimes training, and diagnose and solve common problems. I will perform routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a RAID. Such tasks usually require physical presence in the room with the computer; and while less skilled than sysadmin tasks require a similar level of trust, since the operator has access to possibly sensitive data. I am also ready and to be on the call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it.
3. Software Engineering or Developing Challenge– I will face this challenge by maintaining web server services (such as Apache or IIS) that allow for internal or external access to web sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management. I must understand the behavior of software in order to deploy it and to troubleshoot problems, and generally know several programming languages used for scripting or automation of routine tasks.
4. Computer Security Challenge– I will dare this challenge by engaging into a study and training to make a specialist in computer and network security, including the administration of security devices such as firewalls, as well as consulting on general security measures. Particularly when dealing with Internet-facing or business-critical systems, I must challenge myself to have a strong grasp of computer security. This includes not merely deploying software patches, but also preventing break-ins and other security problems with preventive measures. Computer security administration is also my role that is responsible for overall security and the upkeep of firewalls and intrusion detection systems, but all I must be generally responsible for the security of the systems in their keep.
Reference:
www.wikipedia.org
Wednesday, October 7, 2009
Barriers in IS/IT Implementation in SSS Davao
1. Exceeded budget – This barrier is based on the interviews with the SSS IT personnel that the buys any IT hardware assets that is popular in the market like the Cisco Router. The regional offices of SSS have limited recommendation power in the purchasing of IT equipment due to the centralized management of information systems. I would suggest that the regional offices of SSS must have price and cost monitoring program and department of the hardware purchasing. I believe that this department will save the public money and this savings will go to the benefits its members.
2. Lack of specialized personnel. This barrier is come up from of the interviewee that he trained only once in his 5-year work residency is SSS as an IT Support Staff. I recommend that SSS must have a regular training program for their IT personnel. No technology implementation can be successful without proper training, and many people in today’s workforce are very adept at using the technology at hand and seem to derive much more value from the training they receive because of their high comfort level. Yet there are still those who experience high anxiety at the thought of learning a new application or system, but given the necessary encouragement and support, SSS Information Systems end-users can become productive end-users
3. Use of inexperienced staff.- This barrier is risen from the conversations with the SSS IT personnel that there are information systems end-users who are old enough and ready to retire from the service. These people are difficult to teach the new technology and new innovations of information systems of SSS. I would suggest to SSS to hire young professionals to use the functions and features of its information systems. I would also recommend to extend IT education to current SSS employees and Information Systems end-users. To adapt the competence of the personnel to changing demands, two alternative strategies may be applied. One strategy implies that the existing personnel may receive additional training and education in order to improve their own competence and skills. The other strategy means that new personnel categories are hired, complementing the competence profile of the existing personnel.
4. Opposition from leftist group to the new information particularly to the unified ID system – This barrier is taken from the excerpts of journals of interviews with the IT staff from SSS. The unified ID system aims to consolidate the different ID system of SSS, Pag-ibig, LTO and Philhealth. The leftist group opposes to this information system proposal because they believe that this project can interfere with the privacy of individual members of these government institutions. And they also think that this government project points to the surveillance of activities of leftist group. I would suggest to SSS officials to conduct a public forum for them to explain the advantages of the unified id system. Also, the public will know that this project has a great purpose in their transactions with these institutions and to avoid bad humors to this unified id system.
Thursday, September 24, 2009
I Will Go For The USEP Outsourced Information Systems
Sometime in 2008, the Office of the University President commissioned the IC to develop an enrolment system of the University. This was brought about by the looming prices of outsourced computer systems which the University has been using for three years. The primary objective in developing an enrolment system of the University is to come up with internally developed system for enrolment which is less costly, efficient and flexible. With this, two programmers, Dr. Tamara Cher R. Mercado and Engr. Michael Angelo Cagape were tasked to develop the enrolment system with the guidance of the Dean of the Institute of Computing, Engr. Val A. Quimno.
Summer of SY 2008-2009, the IC has just implemented the newly developed Student Records Management Information System (SRMIS). The SRMIS as a pilot project of IC is eyed as an efficient and effective management information system with minimal cost of development. Also, the SRMIS has a potential of becoming a marketable product that can later be translated as an income generating project (IGP) of the university.
As proposed, the following are the expected outputs of the SRMIS project:
Output 1: Student Records & Registration Module – This module aims to develop an automated system for the registration and record keeping of the student’s records to be handled by the Office of the Admission and Student Records and the Registrar’s Office. All colleges and affected offices are expected to use this module for the loading and retrieval of student records
Output 2: Student Assessment Module – This module will handle assessment of fees per student depending on the number of units taken. Also, additional fees such as laboratory, internet, library, insurance and other fees will automatically be computed and reflected in the student’s certificate of registration. This module is an integral part of the Student Records & Registration Module and Cashiering and Collections module.
Output 3: Cashiering and Collections Module – This module provides a comprehensive range of functions in relation to cashiering and collection. This module will handle all transactions related to cashiering and collection of students fess and other fees. This module will be designed for its future integration in the New Government Accounting System (NGAS) which the Finance/Accounting Department is currently using.
Outsourcing and insourcing can both be described generally as, the acquisition of internally required resources obtained from an external source. With respect to freight transportation management, the following outsourced services are fairly common and some were even available at the beginning: Freight Bill Auditing -- both pre and post, management reports; Loss and Damage claim handling; and Transportation purchasing. Outsourcing firms perform these services, as well as others, at their locations; whereas the insourcing firm would deliver the functional programs over the Internet or intranets for use by the client. Outsourcing tends to be exclusive, that is, client interaction is typically limited to processing and rules questions raised by the vendor. On the other hand, insourcing is inclusive and these firms interact with their clients in order to lead the market through innovation and continuous program improvement. Like the Microsoft business practice of maintaining a high level of program and system operating performance through heuristic client interaction and automated Internet downloads, insourcing firms seem to be mimicking this model. The primary differentiators between insourcing and outsourcing are concept, business model, and delivery methodologies.
Outsourcing has recently become a new hot topic in microfinance, at least among those of us following technology trends. The general idea is that by allowing someone else to manage some or all of your technology, your time is freed up to focus on what you know best, working with clients. Outsourcing would allow small Microfinance Industries (MFIs) to focus their limited human resources on their core business rather than on technology. And just like Salesforce.com and other Software as a Service (SaaS) products have improved the lot of small and medium businesses in the US, outsourcing could change the playing field for microfinance by providing small MFIs with access to more secure and robust systems.
Outsourcing provided a beneficial alternative to the in-house traffic department. With the advent of inexpensive computers and computerization, clever audit firms capitalized on those advantages. Through the economies of scale, the audit firm could afford to channel its intelligence and financial resources to develop and improve the associated practices and services necessary to create transportation management service advantages that individual companies could not or chose not to do. With appropriate customer mass, and because of standardized tariffs outsourcing was a reasonably profitable business for both the provider and the customer. Outsourcing remains a viable business alternative for some in-house tasks and services.
If have to choose between in-source or outsource. I will go for outsourcing the information systems of USEP. As I know, any organization that has an in-sourced information systems must have an IS/IT Department. USEP has no IS/IT Department. Institute of Computing (IC) is not an IS/IT Department. It is a college. There is no team of programmers who will maintain the information systems of the school, the SRMIS. Information systems must go to updating, repairing, modifying, and expanding from time to time in order to accommodate the needs of the clients of the school, e.g. students. In my knowledge, only Engr. Cagape owns the positions of application programmer and systems programmer of the school. Application programmers write programs to handle a specific job, such as a program to track inventory within an organization. He also may revise existing packaged software or customize generic applications which are frequently purchased from independent software vendors. Systems programmers, in contrast, write programs to maintain and control computer systems software, such as operating systems and database management systems. In other organizations, these two information system specialist positions must have a separate individual, handling their duties and responsibilities. At this time, Engr. Cagape in on leave and the question is what happens to the maintenance of the SRMIS of the school.
In my opinion, outsourced information systems are much better than in-source. I believe that outsourced information systems can resolve the problems of in-sourced information systems of USEP through developing new applications, updating outdated custom software, replacing developers/programmers who are no longer available, solving software compatibility difficulties, completing unfinished software development projects, providing support for new IT services personnel, automating organizational processes, fixing problems with proprietary applications, addressing unique business requirements, porting software to web, desktop, and PDA applications, creating custom device drivers for specialized applications.
I also believe that outsourced information systems save time and money. Outsource takes forward thinking, expertise, and innovation to develop high-quality information systems functions and applications that work for any organizations, schools, and universities like information systems should, that are created cost efficiently and timely, and that will serve your needs into the future. Those attributes resulted in a fundamentally different approach to information systems development. I am also convinced that outsourced information systems can offer a more robust and secure core information systems application, increased functionality, such as full integration between portfolio, accounting, and client information modules, ability to network with other university offices and eventually payments systems allowing colleges to offer better services to students, improved reporting capacity, both for internal management purposes as well as reporting to stockholders of the school, and ease of mind from not managing costly and complicated servers in-house.
I have faith in company who offers outsourced information systems in software development which is flexible, which accommodates specific software requirements, and which provides detailed, thorough, clearly-spelled-out estimates you can rely on. The university will work with a software developer who provides documentation that's clear, concise, and error-free. And the school will discover what it's like to work with an experienced programmer who understands the business requirements. Outsourcing remains a viable, but transitioning business alternative to many in-house transportation management tasks and services.
That is my position of the status of information systems of the university. I will go for the outsource.
Saturday, August 22, 2009
SONA and Areas of ICT
1. Creation of a Department of Information and Communication Technology.
The creation of this department will greatly help the sector of information and communication technology (ICT). The Filipino information specialists like the Filipino programmers, software developers, software engineers, computer scientists, and software analysts will benefit to this program of government. I am sure that agenda of this department will be the professionalization of computer programming. The professionalization of programming makes Filipino IT professionals to increase their knowledge, skills and experience in new programming languages, software project management techniques, and application frameworks that is required to produce quality computer softwares and programs. And these computer softwares and programs developed by Filipino IT professionals will improve the quality of life of Filipino people very soon.
2. The Resiliency of the Business Process Outsourcing (BPO) industry in the midst of the Global Financial Crisis.
This industry has employed many Filipinos as call center agents and call customer service representatives have become more and more popular. These jobs have good salary and compensation and this will give a greater help and ease for the poor family of the Filipino workers. And, our government tries and continues to support and improve this industry of information and communication technology.
3. Amendment of the Public Service Law which governs the Telecommunications Industry.
The amendment of this law will strengthen the consumers’ rights to good and right services especially to telecommunication companies like Smart and Globe. These corporations abused the Filipino consumers by stealing the load of celfone users who subscribe to their network services and by rendering poor services in the form of dropped calls and short period of validity time of load. I am favor of this amendment which should be one of the priority amendments of congress to stop the unscrupulous conduct of these telecom giants.
4. The Main Education Highway towards a Knowledge-Based Economy launched by The Presidential Task Force on Education.
This endeavor will further boost the Information and Communication Technology (ICT) environment in the country. The technical education and skills trainings of Technical Education and Skills Development Authority (TESDA) will employ much Filipino people in BPO industry. Courses like computer servicing and maintenance and medical transcription as well as trainings in call center agent and customer service representative are offered in this government institution in a very affordable tuition fee. This program of government also envisions seamless education from basic to vocational school or college.
On the other hand, our educational system should make the Filipino fit not just for whatever jobs happen to be on offer today, but also for whatever economic challenge life will throw in their way. And this educational system should alleviate our poor Filipino family from poverty and hardship.
Thursday, August 20, 2009
My Suggestions/Recommendations in Improving the Internet Connectivity of USEP
I would suggest the the 2.5 STABLE version of Lamit 2Pro Advanced and Lamit 2Pro Mini Power servers to University President. Despite the very small dimensions of the Mini Power server, it maintains all the features and characteristics of the Lamit 2Pro server’s Platform. The new generation of servers includes Wireless connectivity (N type, offering an extended coverage area and maximum transfer rates) providing easier users’ connection. The new servers’ version also offers new encryption facilities, a better control and professional management of the users’ LAN.
The Lamit 2Pro servers were tested in difficult conditions, beside high debit satellite bidirectional connections offered by Lamit, in different regions of the world, at different levels of users, starting with the services for small or middle users and continuing with the broadband communications via satellite offered to romanian and foreign military bases from Iraq, Afghanistan and Kuwait. The servers/routers have advanced functions of acceleration and prioritization of the data transfer between the user’s network and internet, helping the VoIP and VPN communications.
The Lamit Company also offers broadcast services via satellite, occasional or permanent ones, as well as special encrypted governmental connections, dedicated networks, point to point and point to multipoint connections, SCPC/SCPC or SCPC/DVB S2 types.
Military bases, governmental agencies, universities, internet cafĂ©’s, drilling and oil, gas and petroleum companies, as well as various corporations and physical persons from all over the world (USA, Asia, Middle East, Europe and Africa) are using daily the high speed satellite connections offered by Lamit Company for worldwide communication and safe data transfer. The Lamit 2Pro server Platform has been adapted to improve the communication in each of the previously mentioned environments.
Last but not least, it is important to mention that Lamit Company was elected the winner, in 2009, of two international awards: “International Trophy for Technology and Quality” and “Golden Award for Quality and Business Prestige”, the annalists’ conclusions being:
The Selection Committee of Lamit Corporation said that after a deep analysis of the company’s activity they concluded that due to their innovative special capacities, Lamit Co. succeeded to maintain itself in the top of the companies that activates in the transmissions via satellite field.
Lamit Company made itself known due to the innovative solutions and the improvement they made to the quality of transmission services via satellite, fixed or mobile and through its value added networking solutions, reason why it has received multiple appreciations and international awards in the past years.
Steps and Processes:
I would suggest the following tips and improvements to university network administrator, network technicians, university computer technicians, university employees as well as to students:
#1 Ditch the modem. The first tip is to get rid of the modem and move to ADSL. Yes, broadband is available at low cost in most areas. University network technician would visit keyword broadband to see if it's supported by his exchange. If he is on broadband he can probably skip the rest of the top tips because he'll be enjoying life rather than fretting about his connection speed.
#2 Update drivers. University network administrator must love the modem! Perhaps university’s fund is limited or he doesn't have ADSL in his area - read on. Driver files are updated regularly by most modem manufacturers. For some modems, he can also "flash upgrade" the software in the modem to provide the latest (and fastest) communications software. Even so, he should be sure the driver is right for his operating system. To find the latest drivers, he just enter the modem details into a search engine such as www.yahoo.com or www.google.com.ph with the word "driver". So, to find drivers for a USR Sportster modem, enter "USR Sportster driver" and follow any instructions on how to install it. He can check his current modem drivers from Control Panel. With Windows XP, Select Start | Control Panel | Phone and Modem Options | Modems | Properties | Drivers.
#3 Tweak settings. Host computers have some settings that may improve modem throughput. All data sent over the internet goes in data packets. The size of these packets is the Maximum Transmission Unit or MTU. The aim is to send packets that are as large as possible without them needing to be broken down into smaller packets which would slow down their connection speed. A modem user, should set the (MTU) to 1500, the RWIN multiplier to 10 and Time to Live to 35. Download Tweak-Me or Tweak-XP to get this done automatically.
#4 Use FTP download wherever possible. If students want to download files, they can often choose between FTP or HTML download. FTP, (File Transfer Protocol,) is much faster for file transfers so they should choose that when they can.
#5 Use a high speed port. This'll only apply to readers with really old computers. The serial port may use an old, slow chip called a UART. The answer is to fit a high speed serial port with a 16550 UART chip or to fit an internal modem which includes one of these beasties.
#6 Use a download tool. There's nothing more frustrating than losing a connection near the end of a one hour download. The good news is that most downloads are resumable which means they can be restarted from where the connection failed. Universisty computer technician needs the right tool to manage the reconnection - one of the best is shareware Getright. Getright also searches for the fastest download sites and splits the download between several sites with the downloads running in parallel for the maximum possible download speed.
#7 Use a faster browser. Once computer users have connected to Yahoo, they can start any browser and run it in a second window. Opera is one of the fastest so why not download a free copy and give it a test run?
#8 Manage the computer cache. Every time university offices use the internet, images and other files are downloaded onto machine’s hard disk. If a particular image or other file is needed in a subsequent session, it can be pulled from the disk faster than it could be downloaded again. They are kept in a "Temporary Internet Files" folder, often called Cache. When the folder is full, Windows deletes the oldest files. University employees can vary the size of this folder by visiting Control Panel and selecting Internet Options. If they increase it, then more files can be stored on hard disk but if they go too far, then a slow PC may spend too long searching cache! They'll need to experiment to find the right level for their computers and internet connection speed.
#9 Define a blank homepage. Each time students start a browser outside their Google window, the browser will go to the defined homepage. If this is slow, they should change the home page to a fast web site. If they are a real speed nut, set it to blank. To do this, go to Internet Options as above, and select Use Blank. Now their external browser is up and running in record time.
#10 Don't display images. Text only windows are much faster to download. Computer technicians can easily restore images when required. Here's how to set whether to display images: From Internet Options (see above) select the Advanced tab. Scroll down until the multimedia section is seen, then select or deselect "Show pictures." Select Apply then OK to save the change.
If they make these changes and they'll be cruising in the fast lane!
Infrastructure:
I would suggest the following computer hardware and sofware infrastructure: Computers should be running at least Pentium-2.0Ghz w/48.8K modem. Computer technician would use different "internet software" ( pick and choose what works better ). Network technician would also use different operating systems ( WinXP or WinVista or Linux ). Host computers should upgrade to faster hardware ( Pentium 4, Dual Core, Core 2 Duo, AMD Sempron, AMD Athlon ) and upgrade to faster connection ( DSL or Full T1,T2 ).
University internet server needs to have a 24 hour dedicated connection to the internet and it should be internet server == a "unix machine" + firewall + router + phone lines to ISP. Another suggestion is to switch to a "better/faster/larger" ISP ( not the slow commercial online services ).
Innovations:
I would suggest the innovations in cable modem/router tweaking to improve university internet connection speed. All modems make it possible for established communications channels to support a wide variety of data communication. Similar to other modems, a cable modem receives and sends data by modulating and demodulating signals. However, cable modems differ from other modems because they also function like routers. Broadband Internet data is delivered into the home or office over a coaxial cable line that also carries television signals. The information travels like a TV channel through the coaxial cable line. The cable modem separates the data from the television signals and directs the data to the PC and video to the television.
Local traffic is the biggest speed cap that plagues cable modems or a source of a slow cable internet connection. Cable modems work on a network/grid that connects to a T3 router running at 45 Megabits per second. Depending on where computers placed, they could have a busy grid, or a not-so-busy one. Then there is Internet traffic. Network administrator’s best bet if he really needs the speed is to pick a time where not as many people are on. There is a noticeable difference in traffic between 2 AM and 6 PM.
There are a number of ways to improve the performance of university cable modem/router. Unlike old fashioned dial-up modems, there isn't a whole lot he can do to increase the speed of computer cable connection. He can tweak the way the broadband Internet cable connection sends the data/packets back and forth. If he is new to this whole thing, there are a number of programs that will automatically set the best values for the connection. Some of the most popular programs are EasyMTU, I-Speed, Intelli Dial-Up, Smartalec, Smartplay.
There’s also Web browser called Voyager 5000 made by Smartalec that’s much faster than regular Internet Explorer. Updating the drivers on computer’s (Network Interface Card) can give the most noticeable speed boost above everything else. Some good places to check for drivers would be: www.drivershq.com, www.download.com, and even www.altavista.com.
Improving university cable internet speeds with connection teaming is also an option. Midpoint has a feature called connection teaming. Connection teaming combines multiple connections to the Internet for increased bandwidth. Along with connection teaming, the software splits large files being downloaded into multiple smaller parts and downloads each part at the same time along each connection. Cable modem companies sometimes allow network technician to purchase additional IP address for a monthly fee. @Home does this for $5 per IP address. @Home caps the bandwidth per account, not IP address - but at the very least, it might increase the efficiency of internet connection and allow the throughput to closer reach the capped maximum speed.
On a very basic level, host computer’s performance also affects the Internet performance as well. If university computer isn't running at its best, neither will the broadband Internet connection.
Maintenance
I would recommend the following tips on University Wifi Network and Internet Connection Maintenance:
1. Upgrade and Add Equipment
Many have heard of the basic Wi-Fi equipment like network routers (or access points) and wireless adapter cards. While good routers and adapters can last for many years, in general university network technician should periodically consider replacing the old equipment. Newer network gear can be faster, more reliable or offer better compatibility with university offices electronic gadgets.
Some network technicians fail to consider the benefits that more advanced gear like wireless print servers, game adapters and video cameras can bring to the offices and computer laboratories. Before settling for a bare-bones network setup with only a router and a few PCs, research these other types of products also (that can be acquired for very reasonable prices).
2. Move the Router to a Better Location
Some computer technicians quickly assemble their wireless network only to find that it won't function in certain areas of the residence. Others enjoy a working setup at first but find later that their network crashes when a microwave oven or cordless phone is turned on. Perhaps even more common, PCs in a basement, attic or corner room may suffer from chronically poor network performance but the office employees fear attempting to fix it. One easy way to address these common Wi-Fi networking issues is to move the wireless router to a better location.
3. Change the Wi-Fi Channel Number
In most countries, Wi-Fi equipment can transmit signals on any of several different channels, similar to televisions. Most wireless routers ship with the same default channel numbers, and most technicians never think about changing this. However, if they experience radio interference from a nearby offices’ router or some other piece of electronic equipment, changing the Wi-Fi channel is often the best way to avoid it.
4. Upgrade Router Firmware
Wireless routers contain built-in programmable logic called firmware. A version of firmware is installed on the router by the manufacturer, and this logic is essential to the operation of the device. However, many routers also offer a firmware upgrade capability that allows employees to install newer versions. Updating university firmware can provide performance improvements, security enhancements or better reliability. University network personnel should watch for firmware updates from the router manufacturer and upgrade as needed.
5. Increase Signal Strength and Range of the Router
No matter where in a residence a wireless router is installed, sometimes the Wi-Fi signal will simply not be strong enough to maintain a good connection. The likelihood of this problem increases with longer distances and with severe obstructions such as brick walls between the router and the wireless client. One way to solve this problem is to upgrade the Wi-Fi antenna installed on the router. Some routers do not support antenna upgrades, but many do. The alternative involves installing an additional device called a repeater.
6. Increase Signal Strength and Range of the Clients
As with wireless routers, Technicians can also improve the signal strength of wireless clients. They must consider this when dealing with a single Wi-Fi device that suffers from a very short signal range compared to the rest of these devices. This technique can improve the ability of laptop computers to connect to Wi-Fi hotspots, for example.
7. Increase Wireless Network Security
Many network authorized personnel consider their wireless network setup a success when basic file and Internet connection sharing are functional. However, if proper security features are not in place, the job remains unfinished. They should follow this checklist of essential steps for establishing and maintaining good Wi-Fi security on a office and laboratory network.
Reference:
www.broadbandinfo.com
www.sahafa.com
www.thefreelibrary.com
www.practicalpc.co.uk
www.compnetworking.about.com
Saturday, July 18, 2009
MIS and LMIS
The development and management of information technology tools assists executives and the general workforce in performing any tasks related to the processing of information. MIS and business systems are especially useful in the collation of business data and the production of reports to be used as tools for decision making.
Applications of MIS
With computers being as ubiquitous as they are today, there's hardly any large business that does not rely extensively on their IT systems.
However, there are several specific fields in which MIS has become invaluable.
1. Strategy Support
While computers cannot create business strategies by themselves they can assist management in understanding the effects of their strategies, and help enable effective decision-making. MIS systems can be used to transform data into information useful for decision making. Computers can provide financial statements and performance reports to assist in the planning, monitoring and implementation of strategy. MIS systems provide a valuable function in that they can collate into coherent reports unmanageable volumes of data that would otherwise be broadly useless to decision makers. By studying these reports decision-makers can identify patterns and trends that would have remained unseen if the raw data were consulted manually.
MIS systems can also use these raw data to run simulations – hypothetical scenarios that answer a range of ‘what if’ questions regarding alterations in strategy. For instance, MIS systems can provide predictions about the effect on sales that an alteration in price would have on a product. These Decision Support Systems (DSS) enable more informed decision making within an enterprise than would be possible without MIS systems.
2. Data Processing
Not only do MIS systems allow for the collation of vast amounts of business data, but they also provide a valuable time saving benefit to the workforce. Where in the past business information had to be manually processed for filing and analysis it can now be entered quickly and easily onto a computer by a data processor, allowing for faster decision making and quicker reflexes for the enterprise as a whole.
Management by Objectives
While MIS systems are extremely useful in generating statistical reports and data analysis they can also be of use as a Management by Objectives (MBO) tool. MBO is a management process by which managers and subordinates agree upon a series of objectives for the subordinate to attempt to achieve within a set time frame. Objectives are set using the SMART ratio: that is, objectives should be Specific, Measurable, Agreed, Realistic and Time-Specific.
The aim of these objectives is to provide a set of key performance indicators by which an enterprise can judge the performance of an employee or project. The success of any MBO objective depends upon the continuous tracking of progress. In tracking this performance it can be extremely useful to make use of an MIS system. Since all SMART objectives are by definition measurable they can be tracked through the generation of management reports to be analyzed by decision-makers.
Benefits of MIS
The field of MIS can deliver a great many benefits to enterprises in every industry. Expert organisations such as the Institute of MIS along with peer reviewed journals such as MIS Quarterly continue to find and report new ways to use MIS to achieve business objectives.
Core Competencies
Every market leading enterprise will have at least one core competency – that is, a function they perform better than their competition. By building an exceptional management information system into the enterprise it is possible to push out ahead of the competition. MIS systems provide the tools necessary to gain a better understanding of the market as well as a better understanding of the enterprise itself.
Enhance Supply Chain Management
Improved reporting of business processes leads inevitably to a more streamlined production process. With better information on the production process come the ability to improve the management of the supply chain, including everything from the sourcing of materials to the manufacturing and distribution of the finished product.
LMIS
The management of ‘demand’ and ‘supply’ and achieving balance between both is complex. The previous section illustrated that the debate is generally portrayed as alternating between centralization and decentralization. However, the ‘middle ground’ has become an appealing alternative. Von Simson, for example, subscribes to an IS functional design with IS/IT roles played by both a central IS function and the business units and prescribes a ‘centrally decentralized’ IS function with strong dotted-line reporting relationships. He argues that clear structures and distinct roles and responsibilities must be defined with a mix of centralized and decentralized resources. Otherwise, confusion, conflict, duplication of effort and/or inadequate systems integrity will occur. In a similar vein, the federal structure is often seen as capturing the benefits of both centralization and decentralization. With such a structure, business units receive a responsive service from decentralized IS functions, while at the same time a corporate IS function provides groupwide IT services and exerts some degree of central leadership and control of IT activities. While intellectually appealing, little guidance can be found as to what these decision areas are and how to make it work. The key questions are what aspects of IS/IT are best managed centrally and which are best devolved—degree of diffusion in Sullivan’s terms— and whether IS/IT activities are managed by a specialist IS function at all or should they be managed by business management themselves.
IT leadership, which includes IT envisioning, fusing IT strategy with business strategy, and managing IS resources. The leadership exhibited by the information officer is a key aspect in achieving success with IS. Two components of leadership of critical importance for the information officer are:
1. Ability to create a set of value expectations shared across all areas of the business—one sensitive to the realities of competency, competition and culture.
2. Ability to deliver on those expectations measurably information officers must understand and express IT’s value in a way that’s meaningful to all executives.
Success in improving the contribution of IS/IT is initially premised on having strong IS leadership within the IS function and the importance of the IS Director/CIO having credibility within the business. The data from this research highlighted the importance of first getting the basics right—network uptime, availability and reliability of applications, help-desk response times, etc. Leadership by example appears to be key in achieving a truly open knowledge environment. As an emerging topic of study within the field of IS, we have much to learn about how knowledge can be effectively ‘managed’ before we can understand how best to deploy IT to improve the processes involved.
Wednesday, July 15, 2009
My Learnings/Reflections in COMDDAP 2009
I discovered that the Open Source Definition is used by the Open Source Initiative to determine whether or not a software license can be considered open source. Mr. Ben Alegre presented the following criteria of the distribution terms of open-source software to comply with:
1. Free Redistribution
The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.
2. Source Code
The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.
3. Derived Works
The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software.
4. Integrity of The Author's Source Code
The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software.
5. No Discrimination Against Persons or Groups
The license must not discriminate against any person or group of persons.
6. No Discrimination Against Fields of Endeavor
The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research.
7. Distribution of License
The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.
8. License Must Not Be Specific to a Product
The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.
9. License Must Not Restrict Other Software
The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software.
10. License Must Be Technology-Neutral
No provision of the license may be predicated on any individual technology or style of interface.
In the seminar, Mr. Ben Alegre showed many Open Source Technologies and these are Ubuntu, OpenOffice, Mozilla Firefox, Thunderbird, Pidgin, GIMPshop, Transmission, LimeWire, VLC, LAMP, Drupal, Joomla, Wordpress, OS Commerce, Zen Cart, Ruby on Rails, PHP Cake, Civi CRM, and Moodle. I learned that in the Open Source, there is no vendor lock-in, there are large support communities, and it is more secure. Like the Proprietary Software, Open Source is reliable, proven performance, highly scalable, and widely used. And, there are many applications that the Open Source Software (OSS) can apply with in the web. It can apply in Portals, Corporate, Publishing, Government, Education, Art, Music, Multimedia, Social Networking Sites, E-commerce, and CRM.
I also attended the Hewlett-Packard Thin Client Server Computing seminar the same day which was presented by Nexus Technologies, Inc. I imbibed that Thin Client is a client computer or client software in client-server architecture networks which depends primarily on the central server for processing activities, and mainly focuses on conveying input and output between the user and the remote server. In contrast, a thick or fat client does as much processing as possible and passes only data for communications and storage to the server.
I discovered that many thin client devices run only web browsers or remote desktop software, meaning that all significant processing occurs on the server. However, recent devices marketed as thin clients can run complete operating systems such as Debian Linux, qualifying them as diskless nodes or hybrid clients. Some thin clients are also called "access terminals." I realized that many people that already have computers want the same functionality that a thin client has. The presenter of the seminar said that computers can simulate a thin client in a single window (as thru a browser) or with a separate operating system boot-up. Either way, these are often called "fat clients" to differentiate them from thin clients and computers without thin-client functionality.
I find the several advantages of thin clients and these are:
· Lower IT administration costs. Thin clients are managed almost entirely at the server. The hardware has fewer points of failure and the client is simpler (and often lacks permanent storage), providing protection from malware.
· Easier to secure. Thin clients can be designed so that no application data ever resides on the client (just whatever is displayed), centralizing malware protection and reducing the risks of physical data theft.
· Enhanced data security. Should a thin-client device suffer serious mishap or industrial accident, no data will be lost, as it resides on the terminal server and not the point-of-operation device.
· Lower hardware costs. Thin client hardware is generally cheaper because it does not contain a disk, application memory, or a powerful processor. They also generally have a longer period before requiring an upgrade or becoming obsolete. There are fewer moving parts and one upgrades the server and network instead because the limitation on performance is the display resolution which has a very long life cycle. Many thick clients are replaced after 3 years to avoid failures of hardware in service and to use the latest software while thin clients can do the same, well-defined task of displaying images for 10 years. The total hardware requirements for a thin client system (including both servers and clients) are usually much lower compared to a system with fat clients. One reason for this is that the hardware is better utilized. A CPU in a fat workstation is idle most of the time. With thin clients, CPU cycles are shared. If several users are running the same application, it only needs to be loaded into RAM once with a central server (if the application is written to support this capability). With fat clients, each workstation must have its own copy of the program in memory.
· Less energy consumption. Dedicated thin client hardware has much lower energy consumption than typical thick client PCs. This not only reduces energy costs but may mean that in some cases air-conditioning systems are not required or need not be upgraded which can be a significant cost saving and contribute to achieving energy saving targets. However, more powerful servers and communications are required.
· Easier hardware failure management. If a thin client fails, a replacement can simply be swapped in while the client is repaired; the user is not inconvenienced because their data is not on the client.
· Worth less to most thieves. Thin client hardware, whether dedicated or simply older hardware that has been repurposed via cascading, is less useful outside a client-server environment. Burglars interested in computer equipment may have a much harder time fencing thin client hardware.
· Operable in Hostile Environments. Most thin clients have no moving parts so can be used in dusty environments without the worry of PC fans clogging up and overheating and burning out the PC.
· Less network bandwidth. Since terminal servers typically reside on the same high-speed network backbone as file servers, most network traffic is confined to the server room. In a fat client environment if you open a 10MB document that’s 10MB transferred from the file server to your PC. When you save it that’s another 10MB from your PC to the server. When you print it the same happens again — another 10MB over the network to your print server and then 10MB onward to the printer. This is highly inefficient. In a thin client environment only mouse movements, keystrokes and screen updates are transmitted from/to the end user. Over efficient protocols such as ICA or NX this can consume as little as 5 kbit/s bandwidth. This statement makes some very heavy assumptions about the operating environment, though.
· More efficient use of computing resources. A typical thick-client will be specified to cope with the maximum load the user needs, which can be inefficient at times when it is not used. In contrast, thin clients only use the exact amount of computing resources required by the current task – in a large network, there is a high probability the load from each user will fluctuate in a different cycle to that of another user (i.e. the peaks of one will more than likely correspond, time-wise, to the troughs of another. This is a natural result of the additive effect of many random, independent loads. The total load will be normally distributed about a mean and not the sum of the maximum possible loads.
· Simple hardware upgrade path. If the peak resource usage is above a pre-defined limit, it is a relatively simple process to add another component to a server rack (be it power, processing, storage), boosting resources to exactly the amount required. The existing units can continue to serve alongside the new, whereas a thick client model requires an entire desktop unit be replaced, resulting in down-time for the user, and the problem of disposing of the old unit.
· Lower noise. The aforementioned removal of fans reduces the noise produced by the unit. This can create a more pleasant and productive working environment.
· Less wasted hardware. Computer hardware contains heavy metals and plastics and requires energy and resources to create. Thin clients can remain in service longer and ultimately produce less surplus computer hardware than an equivalent thick client installation because they can be made with no moving parts. Computer Fans and disk storage (used for cooling and storage in thick clients) have mean times before failures of many thousands of hours but the transistors and conductors in the thin client have mean times before failure of millions of hours. A thick client is considered old after one or two cycles of Moore’s Law to keep up with increasing software bloat but a thin client is asked to do the same simple job year after year. A thin client, on the other hand will be replaced only when it lacks some feature deemed essential. With audio, video, and USB, thin clients have changed little in 15 years, being essentially, stripped-down PCs.
Reference:
WIKIPEDIA.org
http://www.nexus.com.ph
http://www.spinweb.ph
Tuesday, July 14, 2009
Ways of Green Campus Computing
Putting The University Laboratory’s Computers To Sleep
When you're not using your computer, you can save energy by putting it to "sleep." When your computer is in sleep, it's turned on but in a low power mode. It takes less time for a computer to wake up from sleep than it does for the computer to start up after being turned off.
You can put your computer to sleep right away by choosing Apple menu > Sleep. You can also choose to put the computer to sleep automatically when your computer has been inactive for a specified amount of time. You can also set only the display to sleep. If your computer is in the middle of a task that you want to let finish while you are away (for example, burning a DVD), you should set only the display to sleep.
Open Power Options in Control Panel. In Power Schemes, click the down arrow, and then select a power scheme. The time settings for the power scheme are displayed in System standby, Turn off monitor, and Turn off hard disks. To turn off your monitor before your computer goes on standby, select a time in Turn off monitor. To turn off your hard disk before your computer goes on standby, select a time in Turn off hard disks.
The University Should Go Green to Save Money
Relocate a college's server computers next to a solar-power generator. Replace AC power with DC power. Cool the servers only where they get the hottest. Put the servers in the ocean and power them with waves. To supply computers directly with local DC power. Computers generally use direct current, but the public electricity grid typically supplies alternating current, and 30 percent of the electricity can be lost in the conversion of one form to the other. Intelligent measuring systems like Greenlight should be extended to allow engineers to more precisely determine how to use energy.
The University Offices Computer-Generated Waste Should Properly Disposed
Important steps toward green computing include modifying paper and toner use, disposal of old computer equipment and purchasing decisions when considering new computer equipment.
Paper Waste
• Print as little as possible. Review and modify documents on the screen and use print preview. Minimize the number of hard copies and paper drafts you make. Instead of printing, save information to disks, or USB memory sticks.
• Recycle waste paper, have a recycle bin at each community printer and copier location.
• Buy and use recycled paper in your printers and copiers. From an environmental point of view, the best recycled paper is 100 percent post-consumer recycled content.
• Save e-mail whenever possible and avoid needless printing of e-mail messages.
• Use e-mail instead of faxes or send faxes directly from your computer to eliminate the need for a hard copy. When you must fax using hard copies, save paper using a "sticky" fax address note and not a cover sheet.
• On larger documents, use smaller font sizes (consistent with readability) to save paper.
• If your printer prints a test page whenever it is turned on, disable this unnecessary feature.
• Before recycling paper, which has print on only one side, set it aside for use as scrap paper or for printing drafts.
• When documents are printed or copied, use double-sided printing and copying. If possible, use the multiple pages per sheet option on printer properties.
• When general information-type documents must be shared within an office, try circulating them instead of making an individual copy for each person. Even better, make the document electronically available to the audience and display it on a projector.
Electronic Waste
• Use the campus network where possible to transfer files. This avoids the need to write CDs or DVDs or use floppy diskettes.
• Use USB memory sticks instead of CDs, DVDs, or floppies.
• Use re-writable CDs and DVDs.
• There are hopes of the University Recycling program addressing e-waste in the near future.
Reference:
www.utah.edu
http://greencampus.winserve.org
www.dailyutahchronicle.com
Saturday, July 11, 2009
My thoughts on automated elections with reference to the current situation
The past manually-done Philippine elections rely heavily on manual tallying and canvassing of votes. This kind of election makes the processes vulnerable to control and manipulation by traditional politicians and those with vested interests. As I have searched from www.inquirer.net, I saw the basic problems afflicting electoral system. And these are (a) outdated electoral process; (b) failure to implement the electoral modernization law; (c) limited administrative and regulatory capabilities of the COMELEC; (d) ineffective educational/information campaigns on new laws and policies; (e) weak political party system; (f) unaccountable political financing; and (g) defective party list system (Governance Assessment, 2003). Filipinos are so sick and tired of this manual process of election. And, I do not want to hear another Hello Garci Scandal this coming election.
I hope automated Philippine election will happen in 2010 election to ensure a credible and transparent electoral process. The modernization of the electoral system through computerization shall be supported to ensure the credibility of polls and correct the deficiencies in the electoral system. With recent settlement of differences between Smartmatic and TIM, this is for the betterment of the country. Filipino people have been desiring for automated elections for the past four decades. I hope the reconciliation is genuine so that we have an election system in 2010 that has integrity, security, and veracity. I hope this project of government is not another fraudulent deal like the Mega Pacific contract. Related to this event, the two companies, Smartmatic and TIM agreed to consult a Singaporean neutral arbiter should disagreements arise or to submit to a Singaporean court that would apply commercial arbitration rules, in case of a disagreement in the future. This development is good for the country to solidify the full automation of 2010 election.
With the recent news this week, this 2010 Election will hire almost 80 T nformation technology (IT) people who will assist the Comelec in conducting the automated election and to handle the voting machines. This is a big help in terms of financial aspect to all techiguys in a short period of time. And, it will be great experience for them to serve the country and countrymen in an information technology way.
Truly, our election needs more than an automated election. The Election Code must be further revised and amended to respond to the needs of the present electoral system. Measures to strengthen the party system and regulate the activities of political parties shall be created. State financing of political parties shall also be considered through the passage of the Campaign Finance Bill. The Comelec’s capacity to raise the level of political discourse and educate citizens regarding their right to vote will be enhanced. This will be done through conduct of continuing citizen and voter education through partnership with civil society groups and other government institutions. The electorate must be empowered with information that would help them vote intelligently. The challenge is to develop the people’s appreciation of their vote as a means to reform the government and receive better services from it. Part of this challenge is the need to raise the awareness of the electorate on relevant issues and the corresponding platforms of the candidates, if the country is to shift from the politics of personality to the politics of party programs.
Reference:
INQUIRER.net
Friday, July 10, 2009
The Risks Associated with Business and IS/IT Change in Dole Davao
Company Profile: Dole Philippines
Dole Food Company's worldwide team of growers, packers, processors, shippers and employees is committed to consistently providing safe, high-quality fresh fruit, vegetables, and food products, while protecting the environment in which its products are grown and processed. Dole's dedication to quality is a commitment solidly backed by: comprehensive programs for food safety, scientific crop protection programs, stringent quality control measures, state-of-the-art production and transportation technologies, continuous improvement through research and innovation, and dedication to the safety of our employees, communities and the environment. Dole is committed to nutrition education to communicate to the public the health benefits of eating a diet rich in fruits and vegetables. Dole is a founding member of the National 5 A Day for Better Health Program and is a leader in developing technology-based nutrition education programs for children.
Based on Dole Philippines (Davao) that I visited and its MIS Programmer that I interviewed, the risks associated with business and IS/IT change are:
1. Failure of the new System. This means that the new system does not achieve the full functionality of the old system. It also means that new system does not live up to the expectation of end-users. In this case, Backup, Recovery, and Business Continuity must be addressed by the system analyst. Disaster Recovery Planning is often not sufficiently addressed or is low on the priority list, as there is no immediate, detrimental impact to the entity, until a disaster or other situation preventing normal operations arises. The business entity should develop a Disaster Recovery Plan (DRP) that will cope with the unavailability of the computer application(s) during an unexpected outage. This plan should be written, approved by management and tested on a regular basis. The plan would address how the entity would recover from short or long-term outages, as well as how operations would continue during the recovery effort.
2. End-users will not accept the new System. The employees who will use the new system may not like the interface or the graphical user interface (GUI) because they are familiarized with the old system’s interface. This problem can be solved through proper training. The success of any application is greatly dependent upon the training provided to the end-users initially and on a continuing basis. Continuing education is necessary to ensure employees are aware of, and proficient with, application enhancements and new releases. Recurring education also addresses training needs of new employees. Adequate training curriculum must be available to application users
3. Synchronization of all applications of the new System. Synchronization of the system means that the functions and applications of the system occur at the same time or proceed at the same rate. Synchronization also means simultaneous flow of functions of the new system. In this factor, we have the Program Change Control. The purpose of program change control is to ensure that only appropriate changes to program logic are made, performed in a timely manner, do not negatively impact other logic and ultimately produce the results expected by the user that requested the change. We also have System Interfaces factor. The endless pursuit of efficiency gains has resulted in the ability to transfer data from one system to another electronically rather than expending time keying data into both systems. The exchange of data from one business application to another is considered an interface. The accuracy and completeness of data files transmitted to, or received from, other applications should be assured by a quality control process consistent with the receiving application’s edit standards.
4. Data must change not change in the new System. In this instance, the term Data Integrity arises. The purpose of data integrity is to ensure complete and accurate data, which can be reported in any manner users require, with all fields formatted according to data definition rules and within established ranges (date fields should not allow month>12, day>31, and a code field should only be populated with valid values). The risk of internal fraud increases if individuals are granted the ability to modify program logic as well as production data. Adequate data input edits in place to prevent data corruption (on-line or batch)
5. Upgrading from old system to the new System. Upgrading means to advance or raise to higher a new system. One feature of upgrading is Data Access Security. The purpose of data access security within any application is to grant users appropriate access privileges necessary for the job they perform while restricting privileges not needed for their job or that could create weaknesses in the Internal Control structure of the entity. Duties and responsibilities assigned to each job role should be defined by management that ensure adequate segregation of duties. Those job role definitions can then be used to establish specific application permissions granted and/or restricted. Data access security should also provide an audit trail, which could be utilized to identify specific users that made individual changes to the data. Network environments which allow users to access the data directly (typically via a database utility such as Paradox or MS Access), effectively voids data access security within the application and should not be allowed. This type of access allows users full update capability with no audit trail. Another feature is Network Security. This higher level of security would typically grant users the ability to access an application, then administration of the specific application security would be utilized to grant and/or restrict data access as necessary within the application. Networks become more complex as more efficient, effective and secure products are made available through advances in Information Systems technology. Preventive measures can reduce the risk associated with threats inherently caused by advances in technology.
Saturday, June 27, 2009
Some of IT/IS Best Practices in Dole Davao
Company Profile: Dole Philippines
Dole Food Company's worldwide team of growers, packers, processors, shippers and employees is committed to consistently providing safe, high-quality fresh fruit, vegetables, and food products, while protecting the environment in which its products are grown and processed. Dole's dedication to quality is a commitment solidly backed by: comprehensive programs for food safety, scientific crop protection programs, stringent quality control measures, state-of-the-art production and transportation technologies, continuous improvement through research and innovation, and dedication to the safety of our employees, communities and the environment. Dole is committed to nutrition education to communicate to the public the health benefits of eating a diet rich in fruits and vegetables. Dole is a founding member of the National 5 A Day for Better Health Program and is a leader in developing technology-based nutrition education programs for children.
Mission
Dole Food Company, Inc. is committed to supplying the consumer and our customers with the finest, high-quality products and to leading the industry in nutrition research and education.Dole supports these goals with a corporate philosophy of adhering to the highest ethical conduct in all its business dealings, treatment of its employees, and social and environmental policies.
Some of their best practices in IT/IS Davao:
1. Their systems are not centralized. According to Maam Cristine, their payroll, production, logistics, research and documentation, manufacturing have different systems. That is why they have internal IT personnel. For me, this is good because if one system will fail or crash, the other systems will not be affected. The whole operations of the company will still continue even if one system has failed.
2. When they develop or change any kind of systems, they conduct first a thorough system analysis. Maam Cristine said that the processes of making a system are system analysis, development, testing, and implementation. For me, this right because any single system of a big company like Dole has carried a lot of information and data and it is necessary to conduct a series of system analysis before any changes will be failed.
3. The IT/IS Department is divided into two groups. Maam Tina told us that the technical group is the one in charge of hardware maintenance and networking of hosts/computers. The other one is the application group that is composed of IT/IS software programmers. For me, this grouping of IT/IS personnel is necessary to have a separation and overlapping of responsibilities and duties.
4. The old and reliable systems should stay. Maam Tina mentioned that systems which are built before and still working robustly and perfectly should remain in IT/IS Department. For me, this is a right guideline. Why you change a system if it is still working perfectly according to the company’s needs. This saves money and time.
5. Integration of Systems. Maam Cristine spoke to us that integration of systems is important because for example their logistics system and production system have a common system to have a smooth delivery of company goods and services. For me, this is a right practice. Integration of systems means linking all different systems together to act as one powerful system that makes the whole process of company close to perfection.6. Their IT/IS system is internal not outsourcing. Maam Tina believed that companies which have IT/IS System run by internal IT personnel get cheaper overhead cost in the long run. And it is good for the internal IT people because their programming skills will be honed more. In internal IT/IS System, the data files is more safe and secured. For me, internal IT/IS system is good for the IT employees because they have security of tenure. Unlike, the outsourcing companies, they only keep their employees as long as there are projects to be made. No projects, you are gone IT people.
7. Training is a must for IT/IS people. Maam Galindo expressed that consistent training for themselves is their tool for them to compete with the outsourcing IT people. Dole has annual budget for the training of their IT/IS Personnel. Maam Tina told us that what they learned from their trainings is for them to adopt the knowledge and make the company better. For me, being an IT/IS people is a continuing learning because Information Technology is the fast rising and fast changing technology right now.
8. Dole Asia is maintained by Filipino IT People. Maam Cristine stated that the web services and email services of Dole Latin America, Dole Hongkong, Dole Japan, Dole Korea and Dole Middle East are proudly managed and maintained by Pinoys like her. For me, this is the best. Filipinos can longer be left behind in any technology. Pinoy ITs can excel in information technology more there is proper trainings and seminars.
9. Dole IT/IS Data Security System is checked by respected company. Maam Tina talked that the vulnerability of their systems from hackers is verified by Verisign, a company based in overseas. They also use reliable firewalls for them to be secured from outside threat. For me, it is also better to have an outsourcing in the company once.
10. Making a backup copy of data files. Maam Galindo uttered that making a backup copy is standard operating operation procedures for all data that have stored in a database system. Maam Tina encourage us that we, students, must start from school to make backup copy of our own files just in case of operating system crash or hard disk crash. For me, making a backup copy of files is a must for the recovery of data that is too important for the organization’s stability and growth.Reference:
www.dole.com