Monday, April 24, 2017

Who am I?

“Who am I ?”



I’m Alleza Mae P. Guatno, 20 years old. I was born on April 13, 1996. I live in New Millennium Village Bunawan, Davao City. My parents are Nilo B. Guatno, my father, and Maybel P. Guatno, my mother. My father worls as a laborer at Pacific Oil Farmers Inc. while my mother is a proud housewife. I have two siblings, one older sister and one yourger brother. My sister’s name is Sazzy May Guatno Queque and my brother’s namre is Neil Jan Pacetes Guatno. I’m currently studying Bachelor of Science in Electrical Engineering at University of Southeastern Philippines. Currently, I’m staying with my aunt at Bangkerohan, Davao City. I happy to share to you that I am now a graduating student of my chosen course and currently I am striving hard to reach my dreams. I am a STEP scholar and because of this I have the chance to study to reach my dreams.

My favorites includes singing which is my stress escape and I love eating, sleeping and studying a lot. My favorite singer is Whitney Houston, who was an icon in the industry. My favorite sports is badminton. I don’t have a particular favorite food but I especially like all sweets. As of now I am a student so it also became my hobby to study, read and solve during my free time. I am a big fan of anime which my favorite anime is Fushigi Yugi, since after watching it, it made me want watch another anime movies and series more. I am also a musical inclined person. I love playing guitar and flute. It was my father who thought me the basics in playing guitar and my sister thought me how to play the flute. I have a lot of favorites and I can’t write it down here one by one.

The world is beautiful because God created it. God gave me a wonderful and loving family who I cherish the most. I also have a lot of true friends who became like my sisters and brothers. There’s a lot of wonders that God created in this world, one of these are the mountains, seas and other forms of scenery in the nature that no one can ever deny that all of this are the only evidence that God exist. I’m a superstar for the reason that I am unique and have my own shining and bright characters in me. I want to be an electrical engineer because I want to financially help my family and also it has become my passion to innovate for the world to have brighter lights and unlimited power source. Being an engineer was also my father’s ultimate dream when he was young but he failed to achieve it and no I am following and finishing what he just started.

My Top 10 characteristic
 Kind
 Beautiful
 Friendly
 Approachable
 Hardworking
 Family Oriented
 God Fearing
 Goal oriented
 Awesome
 Honest

Monday, April 3, 2017

Republic Act No. 10173

 Republic Act No. 10173

Reflection


With the advances in information technology, privacy in personal data has become deceptive. For the right price or with good connections, private information disclosed in confidence to companies or government offices can be made available to or accessed by interested parties. With the power that follows information, it is in the interest of the State to govern the parameters by which such power will be held, while at the same time ensuring the free flow of information to promote innovation and growth. Data protection is important because of increased usage of computers and computer systems in certain industries that deal with private information, such as finance and healthcare. Because people have rights to privacy in their personal medical and financial information, it is vital that administrators in charge of systems handling this information are capable of protecting that data, according to the Department of International Law for the Organization of American States.

The Republic Act No. 10175 or the cyber-crime prevention act is is a Philippine Republic Act signed by President Aquino on 12 September 2012. It aims to address legal issues concerning online interactions. Among the cyber crime offenses included in the bill are cyber squatting, cyber sex  child pornography, identity theft, illegal access to data and libel. But the new Act received mixed reactions upon its enactment especially on the grounds of freedom of expression, freedom of speech and data security. Several petitions are currently submitted to the Supreme Court of the Philippines questioning the constitutionality of the Act. Personal information is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information.” Data Privacy Act of 2012 protects all forms of information that are personal, private or privileged. It covers all persons, whether natural or juridical, with particular emphasis to companies or juridical entities involved in the processing of protected information.

It applies to the processing of all types of personal information and to any natural or juridical person involved in personal information processing including those personal information controllers and processors who, although not found in the Philippines, use equipment that are located in the Philippines or those who maintain an office, branch or agency in the Philippines subject to succeeding paragraph; provided that the requirements of section 5 are complied with.

Data privacy can be a juggling act in multinational organizations when it comes to fulfilling the needs of the organization and complying with local privacy laws. Ultimately, data privacy boils down to protecting the information held about individuals to prevent others from accessing their personal information and/or stealing their identity.

From the perspective of citizens and individuals, the State also protects their fundamental human rights to privacy of communication. And with the exponentially increasing availability of ways and means to access personal data and information, it becomes the duty of the State to guard against transgressions of the individual’s rights. Any person violates this act shall be penalized according to its  Section 33 - Combination or Series of Acts : Any combination or series of acts as defined in section 25-32 shall make the person subject to imprisonment ranging from 3-6 years and a fine of not less than 1 Million but not more than 5 Million pesos.


PIRATES OF SILICON VALLEY

PIRATES OF SILICON VALLEY

 Reflection Paper

This movie is actually more of a documentary about the men behind the birth and rise of two of the famous computer technology legends - Apple and Microsoft. The story revolves around the experiences and struggles faced and the actions made by Steve Job and Steve Wozniak in Apple Computer Corporation and Bill Gates and Steve Ballmer in Microsoft Corporation with the founding of the companies to what they are now. Basically the film makes an effort in comparing the operations of the two firms and their founders. Several events mostly happened with misadventures in college, the circumstances where the actors had made attempts in building electronic gadgets like the computer, writing its first program, involving it entrepreneurial and advertising schemes of their inventions, that led into pirating schemes and the like.

There were lots of great things that lead to the achievement of Steve Jobs. First is that he loves what he is doing or simply he has an enthusiasm in his field of being an inventor and computer techno-preneur. One cannot attain something when one doesn’t love that something. Because sometimes you just have to have that little inspiration for you to move on and strive harder. Steve Jobs even at times when he was younger; he never gets tired of exploring, learning and discovering new things from pieces of scratch. He always thought that small things always have a greater impact when it is studied and concealed. As what his friend Steve Wozniak (who soon became the co-founder of Apple) says, “Steve always saw things differently”. Though there were so many times that he had been rejected and experienced failures, he never once gave up on the things that he loved to do. His enthusiasm pushed him to become innovative and creative. It also became his bloodstream that keeps him alive and continues to move on.

The second man of the Silicon Valley is no other than Bill Gates. Who wants to compete with other companies and wants a triumph. We saw Bill Gates in the story to be a classic businessman. But not only a businessman, a successful businessman. Truly, I like the arrogance of Bill Gates in comes of work. But the only thing you will hate on him is his self-indulgence. He made an offer to IBM with no assurance on his hand. He takes his own menace in making an agreement on Steve Jobs that he will work for Apple Inc as a developer. You will see Bill Gates in the movie to be a person with no other things on his mind but to compete on Apply and win the competition. This is the Bill Gates I know. The person that faced many cases because of his business. But I know Gates is a good man. He is just obsessed on matching what Apple does have at that time. But overall in the movie, Bill Gates is a reasonable man. 

What was really amazing about the film was that the two contenders actually worked together until Steve Jobs realized that Bill Gates developed Windows using the software that Apple had programmed for their computers. The movie is really interesting for it caters the audience not only the development of the two largest computer companies but also the curious students specially students studying computer-related courses. The character of Bill Gates was quite hard to understand and I just kept seeing him as that nerdy kid who is nuts about computers but the characters of Steve Jobs and Bill.

Operating System Comparison

 Operating System Comparison 


The operating system (OS) is the most important program that runs on a computer. Every general purpose computer must have an operating system to run other programs and applications. More specifically, an operating system allows a computer's hardware components, including processors and drives, to communicate with its software components, such as applications and data instruction sets. In modern personal computers, workstations and other computing devices, operating systems are components, which computers cannot function without. Computer operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as printers. The performance of the computer itself also relies in what computer system has been utilized by the computer. There are 3 popular computer systems that our computers these days had been using - The Linux, Windows and Apple Macintosh Operating System, namely. They have also common and different features in their ability to be customized support for connectivity for portable media, security, stability, reliability, ease of management, associated utilities, cost and support for the user. In terms of their ability to be customized, Linux is the most customizable, because it is an open source and you can alter the codes for it. DOS can also be an open source, but there is no GUI to customize. Windows is relatively customizable but not fully. You can mainly just change the colors and looks of things slightly. In terms of support for connectivity for portable media, Windows has more connectivity available and expansions available to enable more connectivity because it is the most popular among the three. In terms in security, Linux is the most secured OS because of its ability to be customized; viruses would not be able to access the computer because it wouldn’t be specific. Windows on the other hand is the least secured among them. In terms of stability, any OS would be stable but also depending on the computer specifications and numbers of running software. In terms of reliability, Linux is the most reliable out of the three because it doesn’t need rebooting or crash all of the time. In terms of ease in management, Windows is probably the easiest to manage because of its tutorials available to teach users and how most people are taught to use windows. In terms of associated utilities, windows has the most associated utilities developed by Microsoft and many other companies In terms of cost, Apple Macintosh is the most expensive while Linux is free of charge. Lastly in terms of support for the user, there is most support available for windows, with a help section actually in the OS and with many websites and books and other sources. Based on the comparison in the previous paragraph, I would definitely encourage for the University of Southeastern Philippines’ Bachelor of Science in electrical engineering to use the Windows as its official operating system because of its advantages that are mentioned which are very much desired in the practice of the degree. 

Reflective Summary on "Reasons, Relativity, and Responsibility in Computer Ethic" - by James H. Moor

Reflective Summary on
"Reasons, Relativity, and Responsibility in Computer Ethic" - by James H. Moor

            Computer technology, nowadays, emerged rapidly and plays an important role in the modern and globalized era in many field of application. The swift spread of information through computerized communication and the smooth commercial transactions are just some of the few advantages it has contributed to the global village. But as the computer evolution accelerates, life and routine of the global village will also progressively be dependent to computers which made the quest for computer ethics becoming more difficult and important. Like any other technology, computing has also a positive and negative impact on human life and it is vital to establish computer ethics to control its negative impacts and the flow of information. The global village must be guided and protected for the negative impacts of computing for mutual benefit will be achieved.

            There are two nature of computer ethics that the author disagree with, those were Routine Ethic and Cultural Relativity, namely. Those ethics became disagreeable for him because computer ethics is much more complex than what it is for the reason of computer technology. Computer technology is evolving and like the World Wide Web it crosses cultural boundaries which made the application of the two ethics mentioned impossible.

            In his paper, he cited that computer ethics comes in two main parts ; first is the analysis  of the nature and social impact of computer technology and second is the corresponding formulation and justification for ethical use of such technology. For him, computer ethics is unique in terms of the overall range, depth and routine of ethical issues generated by technology, given the fact that computers are logical malleable and concepts can be informationally enriched by computers. And what made it more challenging is that it has a continually large number of evolving situations which are difficult to conceptualize clearly and form justified policies. Therefore, computer ethics is definitely a demanding field of ethics which requires more than routine of application of principles.

            All interesting human enterprises, including computing, are conducted within framework of values. These frameworks of values, such as those emerging in computer science, undergo rapid evolution and made the establishment of relative values more difficult. But in another aspect of values, human values are relative but not simply in the shallow of cultural relativism. Given the relativity of values there is a hope for rational discussion in the computer ethics. It should also be stressed out the role of non-ethical values in our decision making in an interesting human activity, including computer science. To achieve relativism in frameworks there should be a consensus to what is valuable. Our core values also provide standards with which to evaluate the rationality of our actions and policies that could be our grounds for ethical judgment. Customs might not be relative but it's everyone's core value to respect others. Therefore, to adopt ethical point of view one must respect others and their core values with that relativism in computer ethics can be achieved then by applying a core value framework.


Who am I?

“Who am I ?” I’m Alleza Mae P. Guatno , 20 years old. I was born on April 13, 1996. I live in New Millennium Village Bunawan, Dava...