COMDDAP

The class is advised to attend the COMDDAP seminar at the Apo view hotel. COMDDAP stands for Computer Manufacturers, Distributers and Dealers Association on the Philippines, Davao City on July 2-4, 2009. This event is allowing consumer and businessman to converge on the new and more innovative technologies and gadgets that are available in the market. The seminar invited everyone. Setting aside the purpose of marketing and profit, they indulged public awareness that technologies is only at hand. They looked forward on inviting students for the benefit of spreading around shrewdness to new and up coming individuals that will governs to the society in coming years, and it is us! Indeed.

The event has attained the purpose of public awareness, but for some who’s most likely the same as me that knows nothing it really screwed up. It triggered me that the world is now competes what the best, most expensive and efficient technologies the worlds introducing us. I found out it is not precisely the latest of today if give emphasizes on global aspects but still is new to us, for the factor of belonging on being on the third-world country. But still, the seminar was good and nice.

However, the set-up about the venue is not conducive for me, lack of marketwise for having difficulty on recognizing their products because unmanaged and unwise disseminating and allocating their individual booth for displaying. Somehow, other booths lack of good personnel that could helped in communicating and accommodating students like us, to explain and extend student awareness of how and what the gadgets all about and how to deal with it. It was on the display area.

The following are some company ventures and products display in the COMDDAP:

1. LCD monitors Shootout. Exposing top LCD monitor brands in the world in a showdown of their most brilliant features in terms of graphics, photo and video display.

2. Adobe for network publishing software with tools that help users create, manage and deliver graphics.

3. Corel which produces full-featured, easy to use productivity, graphics and digital imaging software.

4. The Canon Marketing Philippines Incorporated introduced their newest cutting edge imaging products, solutions and services to aid its customers in producing superior quality graphics and prints for more than a decade.

5. Ng Khai Development Corporation which provides ICT infrastructure, solutions and digital lifestyle products and services Exposing their partnership with as IBM, Microsoft, HP, Lenovo, Cisco, Intel, Imation and Symantec. Ng Khai Development is authorized reseller of top brands of projectors, surveillance equipment and PABX systems.

6. Smart Communications Incorporated showcased their wireless broadband service the SmartBro. It is a high-speed broadband internet connection that wirelessly delivers internet service to your PC. It runs on Smart’s newest and fastest mobile network and is available in Postpaid Plans and Prepaid Units.

7. Autodesk, Fox chit Business Systems, Symantec, Trinity Marketing, Word text Systems Incorporated, McAfee and etc.



Meanwhile, weary feet needs some rest, in this moment we decided to precede in the main course which the seminar itself. Though, not really conducive because of the small size of the venue it still did not disturb on the intention of the spectators. The discussion that retained on my mind and lesson learned were the following:

The Jupiter Systems, Incorporated was the host of the 1-2pm exposition. It told and discussed about Enterprise Resource Information and Control (ERICDMS) Brilliant Dealer Management System which involves car dealerships and service transactions. Jupiter Systems, Inc., is a 24- year old software company and one of the members of the ERP systems of the Philippines. Mitsubishi, Honda, Mazda, Volvo, and Nissan are some of the car companies that are using their system. Their Database Management Systems process flow starts with the pre-sales, then the vehicle sales and last is the after sales. The Jupiter Systems Service Management General Features are Advance bookings or Customer appointments, Operation maintenance or FLAT rates, Repair orders, Repair Estimates, Customer Service History, Technician Time-in or Time-out, Parts requisitioning and picking, Service invoicing, Warranty claims and processing and Field Service Actions(Campaigns).


The next host shared and exhibited was the Thin Client computing introduced by the representative from HP company with tag line HP: Think Big; Go Thin” .Simply tackled about how efficient having this computer than a desktop. They boastfully credited their product as the best and somewhat nicer than the others. Thin Client is of small packages but with great benefits like efficient design and longer life span.

Research from WIKIPEDIA.COM
______________________________________________________________________________
"Thin clients are computing devices that function as an access device on a network. These solid-state devices connect over a network to a server where the bulk of the processing takes place. Thin clients have no hard drive, allowing for more secure storage of data and applications on the server. In fact, keystrokes, mouse events and screen images are all that is sent between the client and server. This makes the device much more secure than a standard desktop or notebook computer. A thin client is a computing device without a hard drive, which displays data and applications from remotely located servers, blade PCs, and virtual desktops. As the speaker discussed about the features of the HP Thin Client, we couldn’t help but be overwhelmed of its capabilities as a device. The thin client is primarily designed for task-based users, or those who only had 1 or 2 applications running on their machines, such as ticketing offices, internet kiosks, and the like. It is also to address the concern of IT professionals who are faced with challenges in providing information security (i.e. loss of data due to hardware/software failures, virus and malicious attacks, theft and natural disasters), deployment and maintenance, and total cost of ownership (TLO).
With no hard drive, fan or other moving parts, thin clients have a much longer lifespan than standard computers and use significantly less power. Lower maintenance costs are another benefit as software application updates, virus scanning and patches can be executed on the server. Deployment costs are also reduced as thin clients can be remotely configured and do not need to be set up individually. Break-fix simply requires replacing the thin client."






Comment:

During all the exposition I attended it was all boring for I’m not familiar with all of these but I still managed to comprehend due to the classmates I asked and I thank them, and further readings…My only regrets is not being attended on the last exposition that involved the issue of proprietary and open source…Don’t cry over spilled milk right?! My only consolation was just my classmates attended with that seminar told us something about the discussion and shared their knowledge…Lesson learned aside from stated above is that grab the opportunity of free seminars and symposiums…hehehe

Assignment 2

What are the possible risks if you have a system change?

Changes is a completely or partially migrating or transforming from old one into a new one. Everything is changing even people change, no one is exempted. Changes is inevitable. Only thing that doesn't change is changes itself. Change is important, but change must be controlled so risk does not escalate to unacceptable levels. Because more change may mean more opportunity but also more risk. Not only do different parts of the enterprise maintain different views and definitions of risk — within the IT department a fragmented approach to defining and managing risk exists. This does not only involve IT but also involve the company. And it is very important to be aware of it because this can affect the organization.


System change for good of the company to improve accounting, finance, operations management, marketing, human resource management, or any other major business function. The blending of technologies and traditional business concerns is impacting all industries and is really the latest phase on the on going evolution of business. All companies need to update their business infrastructure and change the way the work to respond more immediately to customer needs.

Common Risk in the Company.

1. Lack of top management commitment to the project - employers shifting system for the improvement of their company but forgot to consider some requirements. Employer involvement is not that strong to address the new uprising problem while dealing the new technology. Employer cut down their support because limited management commitment.

2. Lack of adequate user involvement- in newly introduce system only few may know that the company has already shifted to a new system in which few users have been train for it. The possibility that some user may have difficulty in analyzing and dealing with the new system for lack of adequate user involvement and may lead to misinterpret.

3. Failure to manage end user expectations- end-user are important factor to be considered if there will be a shifting of system cause they are the responsible of manipulating transactions. Failure to manage end user expectations may cause downfall of the company in which before implementing new it must see to it that it fits on the end-user and end-user must properly be oriented the new produce system.

4. Lack of required knowledge or skills in the project personnel- this problem maybe address through prover training and assistance.

5. Introduction of new technology- In introducing the new technology to the end-user it might that easy or it needs time for adjustment in which some might can't go after it. Some personnel might become hard for them to shift from the system that they were being comfortable with.

6. Insufficient or inappropriate staffing- some staffs like oldies personnel that fun of using manual operation might not be capable on using the new implemented technology which leads to failure to gain user commitment.

7. Conflict between user departments- the conflict may be visible in every department lead by Misunderstanding the requirements and unclear requirements.

8. LOSS. The risk of loss resulting from inadequate or failing internal processes, people, and systems, or from external events.” While the potential for loss is the centerpiece of risk, some organizations have broadened the scope of their risk definitions to including the loss itself. By coupling the loss with the risk, risk becomes more urgent and quantifiable. In addition, an impact assessment becomes the natural output of an identified risk.



9. UNCERTAINTY. Uncertainty, so often tied to events or forces outside of the organization’s immediate control, opens a Pandora’s box of risks that organizations must recognize and mitigate. By acknowledging the importance of uncertainty and planning for it, firms convert a risk management strategy from the defensive to offensive. The COSO framework describes this as enterprise risk management.
1. Loss of Integrity. System and data integrity refers to the requirement that information be secured from inappropriate alteration. Integrity is lost if unauthorized changes are made to the data or IT system by either intentional or accidental acts. If the loss of system or data integrity is not corrected, continued use of the contaminated system or corrupted data could result in inaccuracy and incorrect decisions. In addition, violation of integrity may be the first step in a successful attack against system availability or secrecy. For all these reasons, loss of integrity reduces the assurance of an IT system.
2. Loss of Availability. If a mission-critical IT system is unavailable to its end users, the organization’s mission may be affected. Loss of system functionality and operational effectiveness, for example, may result in loss of productive time, thus impeding the end users’ performance of their functions in supporting the organization’s mission.
3. Loss of Confidentiality. System and data confidentiality refers to the protection of information from unauthorized disclosure. The impact of unauthorized disclosure of confidential information can range from the jeopardizing of national security to the disclosure of Privacy Act data. Unauthorized, unanticipated, or unintentional disclosure could result in loss of public confidence, embarrassment, or legal action against the organization.


10. SERVICE DISRUPTION. Service disruption approaches the issue of risk from effect rather than cause — forcing IT to recognize the consequences of service disruption on non tangibles such as its reputation and business expectations.


11. Job loss- it is really possible that many may loss their jobs if new technology be introduced for machine may manage and take place the task which was worked by the workers. Employer may favor on the machine for machine for it do task faster and more efficient. This is might unfair but still being practice in business firm.

These presented above risk are just the common and easy detected ones. In the long run many problem may arises but it can be minimized if it will be address as early as possible and find the best suitable solution for the problem. These risk must taken by granted cause it can be reason for company's downfall. It arises in any form of business firms it might be a small enterprise or the giant one.


Reference:
http://mariechelleit.blogspot.com/2008/09/what-are-risks-associated-with-business.html
http://ladyinstinct.blogspot.com/2008/07/it-risks-know-them.html

Journal 3

August 15, 2009

It was our second interview with the corporation. Before the interview had done we already forwarded our questions via email and do updating with their system. We asked about the Information System that the company had.