Thursday, January 29, 2009
I don't think so. For me, the very purpose of engaging in online trade is not the facility of buying (I LOVE SHOPPING. I LOVE VISITING THE STORES! Nothing beats the real thing and being able to experience the merchandise!!!) but in the ACCESS. It is the access to more sources of merchandise, access to specific items, access to unique items. Most of the online traders/sellers purchase their items abroad or online as well. They are the ones who probably bear the brunt of security concerns... but at the same time, they are also the ones who make a profit off buyers like me. High risk, high return I suppose.
For me, the online shops serve the purpose I want it to. I won't buy an LV online - where's the fun in that? But the last pair of backlined fishnet stockings I picked up, now THAT was a damn good find online. :)
Just "google" it!
The search engine has become an indispensable part of the research prowess of the researchers today. It is now used instead of the old card catalog. From the library to the internet cafe, the computer can be used to search for those materials needed for your paper, or just some trivia that you want to know.
It is now just a few clicks away to an article published in another country. We have more access to more resources. Journals and books are published online, making them more available and easier to use with the "find" function.
Computers indeed make life easier.
In the Philippines, Rule 14 Section 15 of the Rules of Court allow for personal service, publication in a newspaper of general circulation, service by registered mail or "in any other manner the court may deem sufficient" for extraterritorial service of summons.
In this day and age when most everyone has access to the internet, is it possible to serve summons through email or facebook or multiply or friendster? This would be interesting to test in our courts someday. Will the Philippine courts eventually find this option sufficient for extraterrritorial service of summons?
It would be interesting to have e-summons. By then, no one can hide from the law.
I usually don’t accept invites from people who I don’t know personally. I find it creepy to just randomly add people to my friend list if they are not really my friends. My site is like a mini journal, I keep all my pictures, posts, random thoughts in it, so I make sure that those people who have access to my site know me.
BUT…because we have a month before Tryst the Series Presents: RENDEZVOUS… and I need to get the word out, I have been adding people to my network like crazy.
The downside with organizing a big event is trying to get the invite out to as many people as possible since most of the organizers are tied down with law school…so to get around it, we decided to use all media…from print media to mass textbrigs, to the social networks on the internet...and soon we will be having our radio rounds.
I’m still not a big fan of adding random people… but considering that the goal of these sites are precisely to connect everybody.
And…if it means I get to invite more people to join us…then…I’m going to add as many people as I can.
I have given this question a lot of thought, but it seems that I cannot, by myself, come up with an answer. Maybe because when it comes to issues like these, I always would like to reach a compromise, but because of the vastness of the technological field and the monetary considerations that must be kept up with, even I find myself questioning the possibility of a compromise.
At the end of the day, however, I would still want to believe that should technological investments be paired with positive insights and persistent learning, compromise can happen. I'm keeping my fingers crossed.
According to the group, instead of sending merely a string of characters, you describe the person you want to receive the email. This semantic technology analyzes phrases and relationships between words, and then searches the internet to find the intended email recipients.
So, for example, if I want female law students of the Philippines to receive my advertisement regarding the HYLA, then I would indicate such description in my message. Then, ideally, only they could receive such email, saving other people from annoyance that I have brought their inboxes.
With respect to the concerns of "semantic spam", the defenders of the system say that there would be less need for spam because instead of sending the email to everyone, you send it to people who actually might be interested in what you sent.
Makes sense to me.
Maria Cristina Yambot
* Haydee Yorac Leadership Award. Deadline for submission of nomination is on Feb. 14, happy Valentines day.
Eighty six year-old Pope Benedict The XVI recently launched the Vatican's first You Tube channel. According to the Vatican, this is a way of "involving people in the dialogue of truth." The move is aimed at bringing the message of the Catholic Church to a wider (and perhaps younger) audience. Now, the Faithful from all over the world can have access to the Pope's messages through this multi-lingual site. The launch was done in true Vatican fashion: with a warning- that while social networking has its advantages, its obsessive use may lead to division and isolation. Only time will tell if the Pope can get as much hits as SNL's Special Christmas Box, Ken Lee, or Paris Hilton Meets Lady Gaga but having his own channel is definitely a start. According to the head of Vatican's Social Communications Office, the Holy See is contemplating a similar presence on Facebook. It's not impossible to have the Pope as your virtual pal. Blasphemers like my grade school friend beware: with the Pope as his agent, God will indeed be everywhere.
To vary our otherwise monotonous life, my friends and I decided to learn a new language – French. So early one Saturday morning, we drove to Makati and along with twenty five others, enrolled in a level one class. We’re basically learning what the kids (aged 7-11 years old) in the next room were learning. Our instructor is a Filipino who has been teaching French for 11 years in the institute and previous that, in UP Diliman. He began by saying that he teaches French, well, in French.
As most of my classmates are multi-lingual, I felt a little behind in the learning curve and decided to look up other materials to keep up. As always, the internet came to my rescue. I goggled “learning French” and was pointed to several website, including Wikibooks, with useful materials. Google and yahoo (Translate and Babel Fish, respectively) in fact, provide for phrases and website translations. The torrent sites were even more helpful with available audio copies of the Living Language and the Rosetta Stone series. Like the compulsive pack rat that I am, I booked marked every relevant page and downloading every e-book and audio book I could find. By my estimate, I now have enough materials to last me for 6 months, more than the two months I enrolled for in the Institute. Hmm…Maybe I should have thought of this before enrolling.
I’m not really sure but I think the way they work is that they entice companies (legit or otherwise) to avail of their services, then they use the credit card info of these companies’ customers to siphon their funds away little by little. Since the charges are relatively small and the customer presumes they’re from the company they’re transacting with, they let the charging go on until they realize that it doesn’t stop and in most cases, they don’t receive the product they purchased. Sneaky sneaky.
To be continued next week.
How long do you think will it take for this technology to reach our shores? The hybrid-power cars haven't been commercialized very well yet so I reckon we've still got a long way to go. And I realize the "teleporting car" from the movie Back to the Future might not be that impossible anymore, though I'm quite sure they will be needing more than Physics and other scientific knowledge.
I beg to disagree.
Several months ago, I got home from bringing my youngest son to the pediatrician and after picking up my older kids from school and discovered that the door to our bedroom had been forced open, the door to my closet ajar and all my jewelry and cash gone.
One of the maids took off and was later found in the vicinity of a mall.
Upon investigation by the village security and after several trips to the police sub-station and Camp Karingal until almost midnight, the police report simply states that we were victims of a dugo-dugo gang operation.
To rub salt into the wound, I had to pay PLDT the P3k worth of phone calls that the maids made to a pre-paid number.
Truly, reality is stranger than fiction.
No telenovela will compare to those surreal moments.
To this day, we are not certain exactly what happened and a criminal case is still in the offing.
But one thing is for sure, the cellphone and the landline share equal billing when it comes to being a tool for crime.
I'm a "computer engineer" from Greenhills and I do house calls to fix computers. That’s precisely what I try to do but since:
1. it takes me more than the 2 hours I promised I can have your computer up and running, and
2. you have to go to work, and
3. no one else available to keep watch over me (of course you do not trust me alone in your house),
you grudgingly allow me to bring your computer back to my shop in Greenhills. Before I leave though, you make a curious comment "May mga makikita ka jan na weird, kse weird ang taste ng kapatid ko."
As I work on your computer, I see a file which is (curiously) titled "XXX." I remember your comment and open the directory. In it I find pages of file names describing children performing sexual acts. I review a number of the files and determine that children depicted in the images were between the ages of 10 and 15. I call the police on December 23, 2008 and they go to my house on December 28, 2008. I show these filenames to them and turn over your computer.
Thereafter a search warrant for your computer is obtained by the police and you are charged with violating the Anti-Child Pornography Law*
Your s(l)ick lawyer now wants to suppress the computer files for being a fruit of an illegal search. He argues the fact that your computer filenames were viewed amounts to an unreasonable search without warrant.
And I cry because you might just be right.
*In reality this is still pending in Congress.
Wednesday, January 28, 2009
It is typically considered a breach of net etiquette to link to anyone else image through an IMG link without permission. Even more important, unauthorized IMG linking may well be a violation of the right to make a derivative work under copyright law. Consequently, one should always obtain permission (preferably in writing) from the copyright owner of the image prior to creating the link. (Brad Bolin of www.bitlaw.com)
[Part I] [Part II] [Part III] [Part IV] [Part V] [Part VI] [Part VII] [Part VIII] [Part IX] [Part X]
For example, my brother Andrew has a comic called “Kare Kare Komiks” found in “The Chemistry Set” (http://www.chemsetcomics.com). Every week you’ll find new posts for your reading pleasure. Interestingly enough, he discovered that after a few installments a site was created called Kare Kare Komiks with absolutely no relation with his comic. In addition, he discovered that a site called “AndrewDrilon” had also been created.
I suppose that this point in time, he doesn’t see the need to hunt down these cybersquatters and buy back his name or comic’s name. Which leads me to wonder how much these cybersquatters think they can gain by “impersonating” my brother on the internet. At the same time, I wonder whether there will be a price difference between now and the future in the event that my brother chooses to “buy back” his name and whether by that time he’ll have to resort to legal action in order to protect his rights.
I’ve gotten into the habit of leaving my phones in the car when I’m not at home. Whether I’m at school or reading at a coffee place it seems more logical to leave it in the car so that it would not disturb me. I’m not expecting any text messages or phone calls during the time I’ll be in school or at the coffee shop anyway. It usually just distracts me to text mundane things like seeing this old dude exhibiting his butt cleavage. It’s just a waste of load really. My only concern is that if someone has an emergency and they were trying to reach me because they need my help. I guess it boils down to discipline or decorum. We just need to learn how to not get disturbed by it.
Refusing to call my friend who informed me of this device (this blog being typed at 4:00 in the morning), and knowing that the device was similar to Voice Over Internet Protocol, I finally typed “voip usb” in the google search box. At last, the name I have been looking for. Magic Jack.
I have got to get me one of these devices to call some of my relatives in the US. Luckily, the very first link in the google search page was a link to buy such device at eBay.ph. But because I only have P70.00 left from my weekly allowance, and it’s only Thursday, and I have to eat sometime, I could not at the moment afford the device of P3000.00, f***!
Rivera, Jan Michael A.
I finished the writing course, and still am broke. I realized belatedly that my parents had a point. But how is my sob story related to ICT? It isn’t, but J.K. Rowling is.
She’s made gazillions from Harry Potter. And probably more, if e-books weren’t invented. Now, you can just download books off the net, without shelling out any amount, save maybe for the P20 for each hour of internet at the netcafe.
Even some serious publications (such as law books) are on the internet now. Googlebooks and Amazon allow browsing through the pages of a certain book, enticing people to buy it (or just look for the pages they need, without buying).
So royalties that should be going to writers are now spent on just paying the electric bill, or maybe replacing a slow computer, but the bottom line is information is free now, more or less.
Egad. Now my parents have more reason to nag me about making stupid career choices.
Efforts to further popularize political processes and the allocation of funds for this purpose should be given our full support since making informed decisions on the part of the electorate is key to achieving meaningful change in our society. It's good that the COMELEC is tapping the power of information and communications technology to creatively address the goal of getting Filipinos to responsibly participate in the electoral process. Let's see if Filipino netizens will take advantage of this added presence of their government in the blogosphere.
It is important, especially in a developing country like the Philippines to increase awareness of the public not only in protecting but also applying their rights against intrusions made by other people or even by our government. Despite the issuance of writs of amparo and habeas data by the Supreme Court, the best way to ensure that people are protected is for them to know and care about their rights. For until people are truly informed and capable of discussing their rights, then rules and laws would be nothing but ink on paper.
A friend of mine (from one of the major telecoms) told me that he is handling one of their text-gambling promotions. I was a bit surprised that telecoms had even been allowed to peddle such a service.
In a country where mobile phones are readily accessible to minors, I pondered if there were any precautions to prevent children from availing of these gambling services. This problem, although not realized at the moment, is a question that I would want to address to the NTC, DTI and even Congress. All forms of gambling should be distanced from minors. Haphazard regulation is unacceptable. Limitations must be set. Otherwise, make sure your children will never own a cell phone.
The use of Information and Communication Technology has been a common trend among public service shows and broadcasts and the use of the government of such means to fight for a clean environment for Filipinos is a step that would encourage people to use such technology. However, the legal implications of the new system against possible infringement of privacy rights is yet to be truly tested, considering that it is a newly launched system. Indeed, only time will tell if such move by the government would be a boon or burden.
This is supposed to be a good thing for all of us who want to feel protected from the psychos out there. Through their efforts, many have been successfully prosecuted and incarcerated. But the show has also been met with a lot of criticism, particularly on the manner by which the offenders’ identities are exposed to the public, the show’s partnership with the police and a private organization called Perverted Justice, with others viewing the motives of the network as nothing more than ratings-driven. Many of the men who have been caught in flagrante delicto are respected members of the community including a 6th grade teacher, a rabbi, a military staff sergeant, a church music director, among others. Arguably, the most controversial would be an assistant district attorney who shot and killed himself when police went to his home to serve him with a search warrant. His case was different, as he refused to show up at the undercover operations and ceased communicating with the alleged minor online, the police, instead, sought him in his own home. His sister filed a multimillion dollar lawsuit against the show, which resulted in a settlement. While the vigilante in me couldn’t care less about the human rights of sex offenders, I can’t help but feel alarmed at what lengths the show could go. Constitutional rights are guaranteed not only to law-abiding citizens, but even to scumbags and perverts, as undeserving as they may be. We thank the fine men from the media and the police who try to protect society from these predators. But when it is the authorities themselves who become the predators, who, now, will protect us from them?
Tuesday, January 27, 2009
On this score, Negroponte got it right. Nowadays, artists have learned to harness the utility of today's technological advances particularly the Internet to further their crafts. In the same vein, many of today's technologists and scientists produce innovations with the view to it being used in the field of art.
In short, science and technology is not antithetical to art but the two fields can actually be complementary to each other.
One example of the science-art symbiotic relationship can be seen in the popular social networking called "Multiply". This website from the time it was launched in 2004 has been a spawning pool for budding artists with the creation of customized web layouts and many more.
Raymond R. Roque
Beware! It could just be another form of spear phishing.
What is spear phishing?
Unlike traditional spams, spear phishing is a personalized spam which does not get filtered in your e-mail. Those who send it, steal email addresses and send their spam messages using legitimate email addresses.
While there are 200 billion spam messages sent every day, 0.4 percent of it is personalized spam which amounts to 800 million a day attempts to try to steal personal information online.
Phishing, usually is easy to prevent. You just need to look at the sender, if you do not know the sender then don't click on the links. But, if you are a bit of a risk taker at least check the content. Some phishing messages are easy to spot when they have grammatical errors. Or copy the link to your address bar while not clicking into it, the true link would appear by then.
The best way to prevent phishing is to always keep in mind that you have common sense. Ask yourself, how did the person sending the email know about your email address? If you don't know the person then don't take the offer. If it is a banking institution, why would it ask for sensitive information online? This are just some of the simple questions that one needs to keep in mind whenever s/he encounters spear phishing. Again, vigilance is the key.
Baguilat, Raymond Marvic C.
Sunday, January 25, 2009
After all the fuzz as to whether Obama gets to keep his Blackberry, it seems that the parties have somewhat reached a compromise. According to reports, Obama doesn’t get to keep his Blackberry but instead, would get a new Blackberry-type one. Meet Sectera Edge, developed specially for the National Security Agency. His new personal digital assistant can be used in a classified mode with just a touch of a button. When used in such mode, the screen turns red and it can communicate only with similar handsets.
While his new gadget boasts of fantastic features, I doubt it if he’ll be as happy if they just let him keep his Blackberry. While I do understand the security concerns, it’s just really sad that Obama’s call to keep his beloved Blackberry to maintain communication with people outside the White House bubble is unheeded. The president and his family should have personal lives and personal telephones. Give back his Blackberry and not some high-tech £2,465 screening machine.
Thursday, January 22, 2009
But as I listened to the report further, a man named Arthur Young as head of an organization dealing with these IT companies here in the Philippines stated that the closure of these companies' businesses can also be attributed to the fact that the Philippines cannot keep up with its Southeast Asian neighbors it terms of offering these companies competitive investment environment. The Philippine government has so far neglected to solve problems relating to infrastructure, power costs and power supply efficiency which are critical for these companies to maintain their viability and profitability.
As I reflect on Young's comment, I just imagine how backward the country is when it comes to IT competitiveness. It is preposterous to train our people in the field of ICT when problems as basic as power costs and supply efficiency are yet to be addressed. Much has to be done on the part of the government before they should ever think about putting up an expensive government IT project such as the junked ZTE fiasco.
Raymond R. Roque
I personally feel though that the study presents a rather dangerous contextualization of the mindset of the kids who go online. Saying that children know the risk that they are taking does not in any way tone down the risk that face them. The fact that the law presumes minors to be unable to fully understand and comprehend a lot of situations surrounding them means that knowledge of the danger does not equate to proper appreciation of the intensity of the said danger.
The report is helpful, I'd agree. However a lot should be done in expanding the understanding of kids with regard to their online behavior. As well as the psychology of sexual predators who use the internet as their tool to lure victims. Furthermore, I do believe that no amount of technology would be able to protect a child when a sexual predator is determined to lure its victims but the presence of a parent would always be an almost sure way to prevent such possibility.
Baguilat, Raymond Marvic "Ice" C.
[Part I] [Part II] [Part III] [Part IV] [Part V] [Part VI] [Part VII] [Part VIII] [Part IX] [Part X]
Content developers were therein defined as "persons or entities creating contents;" while content referring to "all types of contents delivered to/accessed by the users/subscribers such as music, ring tones, logos, video clips, etc." Now for example, a student makes a short video presentation for her class and decides to upload it to the class e-group, for better accessibility. Does that automatically make her a content developer? Well, she did create the content which is accessed by users of the e-group, right? Now wouldn't that definition just subject us ALL to the licensing requirements?
Of course, the MC seems to direct its application only to commercial content developers. So that means content developers who derive profit from creating contents. Ah! But what if, as in the usual trend now, I write blog articles and get paid for every view that I get. That certainly makes me a commercial content developer, which means that, under the MC, I will have to pay P6,000 annually!
Maybe the NTC should consider a second draft, for better definition of words and for a clear scope of its application. And in addition, they should consider the feasibility of enforcement of such regulation device. I certainly hope that the public hearing did not go as chaotic as I imagine it would be.
I have witnessed several hackings in progress. We would talk to our friends’ characters and when they sound weird, we texted our friends to confirm if they were really the ones piloting. If not, we would try to keep the hacker busy until our friend can do some countermeasures, e.g. changing passwords. Sometimes, we’re successful and sometimes we aren’t.
For those times that an acquaintance’s account does get hacked, no one bothers to report it to the NBI. It would just be an increased hassle and it will result to nothing. We knew we would only be reporting to people who probably knew less about using a computer and would also probably care less.
Without making the process of complaining better, and without making the NBI more credible in actually knowing what to do in those cases, a lot of hackers and crackers would be able to get away with more. And there’s nothing that can be done except look.
The Natalie Dylan story has sparked countless debates over the blogosphere, covering issues such as whether this is akin to prostitution, whether it is even legal to "sell" your virginity, and whether the woman is really a virgin in the first place.
And this isn't the first time that a woman's virginity was put up for auction. Back in 2004, a 18-year old student named Rosie Reid also sold her virginity via online auction. (See BBC news article here) Just like Natalie, Rosie also had student loans to pay for.
After reading about Natalie and Rosie, I can't help but feel happy that I'm studying at the UP College of Law. :-P
Another problem is how his personal e-mails and other messages would fit into public record laws, like the Presidential Records Act, which requires records to be preserved in the National Archives. If Obama insists on keeping his blackberry, even his personal messages may be put on record.
Obama claims that he fights to keep his blackberry in order to have other voices reaching out and updating him on the status of America. But when the choice is between interconnectedness and national security, which will give way?
Blu-ray’s success may be attributed to Sony’s corporate synergy. In marketing, we use the term synergy to refer to the promotion and sale of a product (and all its versions) throughout the various subsidiaries of a media conglomerate. The best example of corporate synergy is the Walt Disney Company, which own motion picture studios, record labels, cable television networks, radio networks, hotels and theme parks all over the world. (Think of Hannah Montana’s success. Disney Channel created her tv show, Hollywood Records produced her album, and Radio Disney played her songs). With the Blu-ray disk, the moment Sony committed to developing the technology, the war was half-way over. Sony, like Walt Disney Company, had its finger in all the pies in the industry that uses the technology: Sony Pictures Entertainment (tv and film production house), Sony Computer Entertainment (video games), Sony Music Entertainment (the record label), and of course, the Sony brand commands brand recognition in consumer electronics. With each business feeding the other, Sony had a definite consumer of the technology – Sony can manufacture the discs, their record label, production house, and video games can consume it, and the electronic appliances they produce can play it.
The format war is an interesting insight on how technology development can be dictated by many that turned out to be only one. Interestingly enough, synergy the term is also used to describe a situation where the final outcome of a system is greater than the sum of its parts.
I sometimes spell words incorrectly, and there are times when I had to recite the " “i" before "e" except after "c" or when sounded like "a" as in neighbor or weigh; and except seize and seizure and also leisure, weird, height, and either, forfeit, and neither ” just to make sure that I got the spelling right. Texting has made me lose the ability to spell the words correctly without relying on crutches like that grade school poem.
I just bought a new laptop and was really excited about loading all my hard-earned music into it. Lo and behold, I couldn’t play some of my music on my new laptop because apparently, the account I was using had already reached the limit of authorized machines. An iTunes account allows you to play and share the music you bought to five computers. Only. As I am on my fifth Mac, and earlier in the day, I allowed my significant other to use my iTunes account, I couldn’t authorize my new baby to play my old music. If I had known that my love and generosity would later backfire on me, I should’ve let the significant other listen to his own (horrible) music.
I cursed at the genius named Steve Jobs and his people, for making a policy such as this. Thinking about my property rights, I thought, “I bought the music, I should be able to listen to it on every machine I like”, but they’ve limited it to five. How did they come up with that number anyway?
Before I lost my cool, I fiddled around some more and found an option to deauthorize all previously authorized computers. I clicked on that option, hoping that my significant other would never realize that I have divorced him from my digital realm.
After learning how the system works and its costs, I asked the attendant if it was actually legal to get free sattelite TV broadcasts. “Libre naman yan ser, mga Free-to-Air channels lang naman ang kasama” she said in a matter-of –factly tone with a matching chinese accent. I asked what the Free-to-Air channels are, and she gladly showed me the complete list of available channels.(which was almost the same as that of a mid range cable tv subscription).
I have doubts about the legality of setting up such a system, because the major providers charge a hefty sum for their subscriptions. And I really didn't quite understand if "Free-to- Air" channels really are meant to be free. But, in the off chance that it is indeed legal, it’s a great way to get your favorite sattelite/cable channels almost free.
FPS refers to frames per second. The higher the FPS the smoother the animation of the game. FPS matters in games like first person shooters where smooth movement and quick reaction spell the difference between landing a headshot or getting plugged up the nether regions by an MP5 spray. This is the reason why gamers make companies like Nvidia or ATI richer by investing in high end video cards (a component that increases a PC's graphic capabilities) specifically to make their gaming experience much better. I would consider 25-30 fps as "playable" but in my gaming rig which is an 8800 gt in SLI format, i only get 15-20 fps., where as in Crysis (another graphically demanding game) i could get around 80-90. This means that when I pan the camera, the game stutters like i'm watching some 80's stop motion animation flick. Even players with more expensive video cards like the GTX 280 (P23,000) have the same problem.
Second, the game crashes after playing it for around 2 hours. I have about 4 gigs of ram in my rig which runs on windows vista so this shouldn't have been a problem. However, research on the forum reveals that the game suffers from memory leaks which can cause system crashes. I had to reinstall windows because the game froze and somehow ruined my other installations (vista problem)
Third, in order to curb piracy, Rockstar requires you to log in to their website in order to play the game. Also you have to have games for windows live running in the background. That's two processes that you have to have running in your system while GTA IV runs too! For those who don't have an internet connection, there is an offline mode but you can't save the game! So unless you plan to spend 80 hours straight just playing the game, this feature is utterly useless especially for students like me (ahem) who need "time" to "study for law school." As of this writing I have seen pirated copies of the game being sold so I don't see how these features make the game harder to pirate. If anything, it makes the game harder to enjoy for gamers who buy the original product.
Fifth, the game automatically adjusts your graphic settings for you and does not allow you to change them manually. For some players, like me, we don't mind giving up settings like high quality texture rendering or screen resolution if it will increase our FPS. But GTA IV won't let you do this and you are stuck with the setting the game chooses for you. Even for gamers with P100,000 rigs are unable to run the game at full settings (don't even get me started at anti-aliasing). Rockstar says that it's because there isn't any hardware available now that can handle the full graphical requirements. What's the point of releasing a game that doesn't allow you to enjoy all of the features? I'm not going to wait for 3 years for technology to catch up and invest another sh*t load of money to upgrade my hardware just to play a game that by then, would have already been 3 years old!
In closing, this could have been one of the best games to ever come out on the PC for 2008 but well, rockstars will be rockstars...
Wanting to see Gulbis play, I desperately searched the net for any site that shows live tennis being played. Luckily for me, in a tennis blog, there is a link to a broadcast of live plays in different courts in Melbourne Park. I hurriedly clicked the link and lo and behold, the site is for real (knowing the internet, I was pleasantly surprised).
I do not know the extent of the lawfulness of the service that was provided because at the back of my head, I kept on thinking that I should be paying for this broadcast while watching the match. But quite frankly, I did not really care. I was watching the match that I wanted and though I would prefer to watch it in Australia, my current financial state would not let me.
And even though Gulbis lost the match, I am quite content knowing that the next time I want to watch a particular match, I know where to go.
Rivera, Jan Michael A.
A new generation of cellphones pop out every three or so months, a slight upgrade from what just came out, and we drool to kingdom come dying to get our hands on it.
That sparkling new laptop makes us lose sleep. Gaming devices, digicams, handycams, SLRs, Mp4s and what-have-you come out as frequently.
Not many though can satisfy one’s lust for all things techie and new, especially during these difficult times.
For those who are able to go ahead and indulge in their techie fantasies, the novelty wears off quickly, the paroxysms of pleasure from cracking open the box and fidgeting with the new acquisition is soon forgotten.
And the cycle starts anew.
What happens then to the discarded toys?
Good if they end up with a sibling or a child or some relative all too willing to inherit the downgrade.
Recently, one of the more popular cellphone manufacturers came out with a recycle program. But it’s basically CSR ergo BS.
In reality they become junk, creating the need for some new landfill, further downgrading our already deteriorating planet.
I then remembered my theory that the internet oiled the way for stalking. I’ll admit that I have used it one time too many to look up certain individuals but I think twitter-ing is a whole new level. I’m not saying all twitters are stalkers. I just have a feeling that I’ve stumbled upon THE stalker’s lair. Mwahahahaha.
Apart from making money and staying afloat, businesses these days have to contend with IT security threats. As experts would say, the impact of a security breach may be far greater than one would expect. Losing sensitive information directly may not only affect one's competitiveness and cash flow but also damage one's reputation -- something that would be quite hard to restore as it is to create it. It really poses a problem considering that cybercriminals have become highly sophisticated, driving a flourishing underground economy and dealing in the organized theft and transmission of sensitive business and personal data. No choice but to factor all of these in. Data protection could spell the difference between business success and failure.
*For the stats, click http://www.clickz.com/3455061
As of yesterday, I am officially a Facebook member and active “networker”. The reason for this sudden interest in networking in general has been due to the fact that I am co-heading the HYLA* for the Portia Sorority. These past days I have been flooding Friendster, Multiply, Facebook, Pinoylaw, the Association of Law Students in the Philippines, and all my yahoogroups with information regarding the HYLA. If in the past, I was just a casual observer and invisible lurker, now I am as loud and post-crazy as my high school brother.
The idea of using Facebook was suggested to me by a high school friend. He said that Facebook provides easier access to people who are, and who might be in your network. And every move you make, the network (direct and extended) knows about it. As he aptly put it “bawat hinga mo, alam.” On a normal day this would really freak me out; I don’t need (and want to know) that such and such are now friends, or that so and so became a fan of something, etc. But considering the fact that HYLA has gone national, I need as much publicity as I can.
HYLA is Haydee Yorac Leadership Award is given to one woman student leader selected from any law school in the Philippines. Please nominate one now. For more information, see us at the Portia Room, or read the black poster/tarpaulin with a nasty smell.
Maria Cristina Yambot
She came across a seller who seemed promising, and his positive feedback from previous clients let her agree for arrangements for an iPod to be had. Messages were exchanged, a deposit was made and confirmation was had. He said that the tracking number would be sent to my friend in a moment. That was, however, the last she heard from him. He had since cancelled his account with the popular online store, changed his mobile number or had turned off his phone, and refused to answer instant messages. That was it.
It's thieving sellers like these who give online shopping a bad reputation. Ripped off buyers don't have much to do as authorities appear to be helpless.
I've made countless transactions online. Thankfully, I have yet to come across someone as this man.
While not as dominant in the gaming console industry, Microsoft is likewise a fierce competitor. It comes in fourth in unit sales, behind the Wii, the DS handheld, and the PS3. The company claims however, that consumer spending on Xbox and accessories equal total spending on the PS3 and the Wii combined in the period that these consoles have shared the market.
The behemoth, however, is under siege. A deceptive practices suit filed against Microsoft in 2007 was granted class-action status last year. The suit claims that Microsoft misled consumers by allowing PC vendors to label units as "Vista Capable" when, in fact, the vast majority of these machines could run only the low-end version of Vista, called Home Basic, and did not have the specs necessary to run the high-profile Aero interface. The court has already opened embarrassing internal communications to public scrutiny, including documented discussions on whether the Home Basic OS should have been labelled Vista at all.
The Xbox has also given rise to a multiplicity of class-action suits. Reports published last year claimed that Microsoft was aware of quality control issues in the manufacture of the Xbox 360, yet chose to release the console anyway. The absurdly high rate of console failures, damaged discs and consumer frustration that followed predictably led to litigation. Likewise, class-action suits have been filed over frequent Xbox Live server outages, and separate class actions over an Xbox software update that allegedly "bricked" consoles.
While I am a vocal critic of the litigation-happy culture that prevails in the US, I cannot help but feel a certain degree of satisfaction as Microsoft collectively squirms in their undoubtedly cushy seats. I have used their products since the days of MS-DOS, when hard drives had 600Mb of memory and processors had 16Mb of RAM. What Microsoft needs to realize is that their products and their services are such a ubiquitous part of daily life that irresponsible behavior on their part causes inconvenience and frustration for millions of people all over the world. If Microsoft learns a lesson about their responsibility to consumers, I'll be happy. Never mind if the fools get paid.
Sounds fancy, huh? In case you didn’t already know (I didn’t), back in 2007, the DOJ created a task force to deal with cybersecurity issues in legislation and investigation. It was developed to pursue the e-government agenda, institutionalize a cybersecurity regime and implement laws. The task force works closely with the Council of Europe, a private organization, and local experts composed of IT practitioners and other stakeholders. The task force is expected to work with the NBI and PNP. One of its objectives is to push for the swift passage of the cybercrime prevention act.
The first cybercrime case for 2008 was filed with the Department of Justice Task Force on Cybercrime. It was a hacking case filed by the NBI Anti-Fraud and Computer Crimes Division. It involved a former employee of a local manufacturing company accused of stealing company secrets using a universal serial bus thumb drive. Hacking is punishable under Section 33a of the E-Commerce Act. The accused also faces other charges for qualified theft, libel and revelation of secrets under the RPC. So if you’re thinking of stealing information, write it down instead. It’ll save you a few years in prison.
And then the inevitable happened, super-skilled Glyneth probably advanced in the corporate ladder and she was no longer there to entertain my questions. And THAT was the best thing she did for my internet-using life. I began tinkering with the settings by myself. I would search Yahoo for other people who had the same problems, for programs I wanted, for viruses I needed to get rid of. Its amazing how empowering the Internet can be in terms of providing you with an access to the stream of common knowledge and experience. Troubleshooting forums are heaven-sent (if you know how to find the good ones at least.) Its even more gratifying and empowering to be able to post your own suggested solutions and later on find out that they work.
So to you, Glyneth Dinggal, thank you. I now know how to fix an IP address conflict (turn the PS3 off! He he he!)
Wednesday, January 21, 2009
As time passes, more and more kids, especially students, spend time in computer shops. Even the jocks make friends with the nerds when playing warcraft and similar games. Grade school students even get to know law students during their playtime. The young and the old all get to communicate through the game they love. When you are new at a place, hanging out at computer shops has been known to be a good means of making friends with the locals.
Yes, they get to meet more people. However, it seems that these relationships are only connected by the internet and video games.
At the end of the day, do they really make friends? Could they have truly communicated? Are these toys REALLY interactive?
One of my solutions is to use my account's filter options. While it doesn't lessen my e-mail backlog, it gives me some (false) assurance that I'm being organized still. This categorization also ensures that I'll be able to find an e-mail from a particular e-group easily.
However, Yahoo Mail only provides 15 filters and I've used them all up. Now I'm thinking maybe I should unsubscribe from my inactive groups... Maybe that'll cause my unread messages to dwindle down to 3,000! Yey!
It can be argued that our laws may be broad enough to accommodate instances of “modern crime,” such as this. Nonetheless, I can just imagine the difficulty entailed in proving the elements of the crime, especially when the judge is technologically-challenged. To complicate matters, it’s like trying to hunt down a terrorist in the borderless realm of the Internet – one who doesn’t play fair, and if he’s pretty good, the victim may never prove, much less, know his true identity. This is a problem not only for celebrities, but even for private individuals because there will always be psychos out there who can easily take advantage of the Net’s convenience and anonymity to further their nefarious purposes. My friend never did anything to retaliate. She doesn’t need to, anyway. B has suffered a fate far worse than unwittingly being advertised as a mail-order bride -- that is, actually being married to a guy who will never love you back.
Bad faith characterizes this practice since the name is taken with the intent to profit from a trademark owned by someone else. The profit is earned by selling these names with prices far beyond the amounts the Cybersquatters may have paid when they registered the domain name. The use of defamation or slander, made regarding businesses the name is suppose to represent, is only one of the methods these squatters use in order to compel the owners to purchase the domain name from them.
It is one of the many legal issues that needs to be addressed by legislation, particularly in the field of Intellectual Property Law. One might ask “may this be considered a crime? “Does the fact that bad faith is involved make the act criminal or may the problem be properly addressed by civil remedies?”
Now I realize cyber word wars are actually less complicated than actual girl-to-girl collisions. No screaming, no hair-pulling, no oral name-calling. More importantly, they could end as soon as you realize the stupidity you’ve gotten yourself into. Don’t view the profile, change your settings to private or delete your account. And it’s so easy to forget all the brainless activity you’ve just allowed yourself to do. Just click Delete or Edit. So much for all the emotional trouble.
Craigslist is a mini neighborhood. You get job postings, apartment listings, the ever-amusing personals, everything for sale, and you can even share about the day you had.
If your about to go on vacation, check craigslist first and see if the place you're visiting has a site there, you'll get to know the humor and culture of the place quickly.
Be cautioned though, some sites are still in the early stages and have pretty lame postings.