tag:blogger.com,1999:blog-72640202195197279462024-03-19T03:14:02.587-07:00Law and ICTrandom thoughts on the impact of law and policy on ICT... and vice versaUnknownnoreply@blogger.comBlogger2959125tag:blogger.com,1999:blog-7264020219519727946.post-54089911749472475532012-03-15T06:50:00.006-07:002012-03-15T22:42:16.477-07:00Technology and Piracy: Two Sides of the Same CoinWith all the laws being passed to protect against piracy, one would think that piracy is necessarily a bad thing. We are taught that piracy deprives individuals of income and are that violators would be subject to a hefty fine and/or imprisonment.<br /><br />Its always big news whenever there are new developments in the patent battle between Apple and Samsung. Each company makes it appear that the other is the copycat and that each has sole rights to the different designs that they came up with.<br /><br />The fact of the matter is, in the technology and electronics business, each new idea spurs from an idea that was borrowed and maybe even copied from a rival technology corporation.<br /><br />The film Pirates of Silicon Valley is a perfect example of what a little bit of piracy, patent infringement or copyright infringement can do to help make everyone's life better and to spur innovation.<br /><br />Here we have Bill Gates who "copied" Steve Jobs' Mac Operating System to develop what we now use as the Windows Operating System.<br /><br />We have Steve Jobs who "copied" the technology for the mouse from xerox and integrated it into "Lisa" and the "Macintosh."<br /><br />In the movie, we also see how the drive to innovate and succeed can make one a very wealthy individual. Enjoy!<br /><br /><span style="font-weight: bold;">The Battle of Silicon Valley </span><span style="font-style: italic;">(please click on link below)</span><br /><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:donotshowrevisions/> <w:donotprintrevisions/> <w:donotshowmarkup/> <w:donotshowcomments/> <w:donotshowinsertionsanddeletions/> <w:donotshowpropertychanges/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> <p class="MsoNormal"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:donotshowrevisions/> <w:donotprintrevisions/> <w:donotshowmarkup/> <w:donotshowcomments/> <w:donotshowinsertionsanddeletions/> <w:donotshowpropertychanges/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} </style> <![endif]--> </p><iframe src="http://www.youtube.com/embed/wO4criRWMoQ" allowfullscreen="" frameborder="0" height="360" width="640"></iframe><br /><br />http://www.youtube.com/watch?feature=player_embedded&v=wO4criRWMoQ<br /><br />Group Project:<br /><br />Ocana, Prado, Tiopianco<br /><br />Norman Roland E. Ocana IIIJJ Ocanahttp://www.blogger.com/profile/05798300566904695261noreply@blogger.com8tag:blogger.com,1999:blog-7264020219519727946.post-70944112001133913212012-03-14T23:56:00.006-07:002012-03-15T00:08:55.781-07:00Identity Theft (Credit Card Fraud)What is Identity Theft?<br /><br />Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. And although most people might think that identity theft is a crime that proliferated with the advent of the Internet, it has been around for probably as long as there have been identities to steal. Here’s a little bit of information about it.<br /><br /><iframe width="560" height="315" src="http://www.youtube.com/embed/GSGk0RqK2Q4" frameborder="0" allowfullscreen></iframe><br /><br />**We had a hard time figuring out why the video was cut in half when we embedded it in this blog. Please refer to this link to see the whole video - http://www.youtube.com/watch?v=GSGk0RqK2Q4&list=HL1331794480&feature=mh_lolz.<br /><br />Team Members:<br /><br />Maricor Estrella<br />Joni Gomez<br />Aris MascenonJoni Gomezhttp://www.blogger.com/profile/05827284226401258735noreply@blogger.com7tag:blogger.com,1999:blog-7264020219519727946.post-12436888877114344012012-03-14T23:55:00.000-07:002012-03-16T06:57:05.674-07:00Another version: Cyber Crimes: Destroy Others, Destroy Yourself<iframe width="420" height="315" src="http://www.youtube.com/embed/6babCxx4MnQ" frameborder="0" allowfullscreen=""></iframe><div><br /></div><div><span class="Apple-style-span" style="color: rgb(51, 51, 51); font-size: 13px; line-height: 20px; ">Team Members: Jan Bunag, Adrian Bustos, Mary Rhauline Lambino, Entry No. 13</span></div>Unknownnoreply@blogger.com7tag:blogger.com,1999:blog-7264020219519727946.post-91696839895592516062012-03-14T23:45:00.001-07:002012-03-15T01:59:26.567-07:00Cyber Crimes: Destroy Others, Destroy YourselfIt is undeniable that ICT is now part of a large portion of the world's population's lifestyle. Yet the ordinary person, at least in the Philippines, is bereft of any real remedy from stalking, bullying, false accusations, identity theft, and other forms of harassment gathered from or spread through the Internet.
This music video is our take on cyberstalking and cyberbullying and how it can make or break an individual. May you be entertained.
<iframe width="420" height="315" src="http://www.youtube.com/embed/UFhoz_NKSOA" frameborder="0" allowfullscreen></iframe>
Team Members:
Jan Bunag
Adrian Bustos
Rory LambinoAdrian Francis S. Bustoshttp://www.blogger.com/profile/00448100271540955682noreply@blogger.com1tag:blogger.com,1999:blog-7264020219519727946.post-74503884594295462992012-03-14T20:23:00.000-07:002012-03-14T20:25:03.859-07:00FOE<p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">When death becomes a wanted friend, the foe must be a terrifying one.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">The Internet can be a terrifying foe. By itself, it is largely a neutral arena. But in the hands of an individual or a group of people motivated by nothing but acrimony, the Internet can be wielded in such a manner it transforms into the scythe of death.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">A ‘cyberbully’, more often than not, has no intentions of inflicting death. However, depending on the emotional disposition of the targeted victim, the words or actions of the cyberbully may lead the victim to seek death as the ultimate deliverance. When untimely death, or even emotional distress, is caused by cyberbullying, the malice of some coupled with the immense reach of the Internet creates an incomparable foe like no other.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">What cyberbullying does is to animate the terrifying foe inside the mind of an individual unto the Internet and transforming the Internet into another terrifying foe of an unimaginable attitude. And perhaps that is how to beat cyberbullying: by tempering the foe inside the minds of so many before it spills over into the Internet.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">Let this be our way of joining the fight against this foe. <a href="http://www.youtube.com/watch?v=QStIlcKROss">http://www.youtube.com/watch?v=QStIlcKROss</a></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; line-height: 14px; ">Aldan S. Avila and Nathan Marasigan, Entry No. 13</span></p>Aldan S. Avilahttp://www.blogger.com/profile/17591830861519917960noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-2895784159960046772012-03-14T16:29:00.000-07:002012-03-14T16:29:15.964-07:00Don't believe everything you see online.Not everything you see or hear online is true. Not all the people you meet can be trusted. There are cyberpredators looking to take advatage of your naivete. Some people hide viruses, worms or bots which will attack your computer, sometimes even in links which point out your computer's vulnerabilities. Some forms asking for your information, no matter how legitimate, are actually used for phishing and identity theft. And don't even get us started on all the links, emails and advertisements promising that you won something. As the Filipinized English saying goes, "It's true good to be true."<br />
<br />
You've seen and heard all about the shit people say. However, shit doesn't just come out, it also goes in. Here's a video of shit that people actually believe online.<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/CwlL5AmUR7A" width="420"></iframe><br />
ICT class video, group #1<br />
Video by Christine Gomez, Daniel Luis Convocar, Christopher Columna<br />
With thanks to "actors" Tony Oposa, Doms Obias and Rex Regis<br />
<br />
<br />Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-45734788439037521632012-03-14T16:14:00.002-07:002012-03-14T16:28:49.379-07:00Group Buying Sites: Secret's Out!<div><div id="yui_3_2_0_5_1331765836787536" style="margin-bottom: 0in; "><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><span id="yui_3_2_0_5_1331765836787535" style="color:#000000;"><span id="yui_3_2_0_5_1331765836787534"><span id="yui_3_2_0_5_1331765836787533">Wondering why Deal Grocer can offer a vacation package at almost 70% off? </span></span></span>Intrigued about how Metro Deal can offer you a branded watch at almost 65% off its original price? Curious about why Clever Buy sells a lipolite session only for a price 60% off its clinic price?</span></div><div id="yui_3_2_0_5_1331765836787554" style="margin-bottom: 0in; "><span id="yui_3_2_0_5_1331765836787553"><span id="yui_3_2_0_5_1331765836787552" style="font-family:verdana;font-size:78%;"><br /></span></span></div><div id="yui_3_2_0_5_1331765836787554" style="margin-bottom: 0in; "><span id="yui_3_2_0_5_1331765836787553"><span id="yui_3_2_0_5_1331765836787552" style="font-family:verdana;font-size:78%;">We've seen those ads too. And like you, we were also dying to know the 5Ws and 1H of their industry. So we investigated and got answers. Watch our video and, like us, be informed. </span></span></div></div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><br /></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><iframe width="420" height="315" src="http://www.youtube.com/embed/KdQfNYnRADc" frameborder="0" allowfullscreen=""></iframe></span></div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><br /></span></div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><br /></span></div><div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><br /></span></div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 19px; ">Group 3 Members:</span><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 19px; "><div style="font-style: normal; "><span>Diana Lutgarda P. Bonilla</span></div><div style="font-style: normal; "><span>Agnes M. Santiago</span></div><div style="font-style: normal; "><span>Candice See</span></div><div style="font-style: normal; "><span><br /></span></div></span><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 19px; ">Diana Lutgarda P. Bonilla, Entry #13</span></span></div></div><div><span class="Apple-style-span" style="font-family:verdana;font-size:78%;"><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 19px; ">Previous Entries: <a href="http://www.lawandict.blogspot.com/2012/03/maximum-nakedness-online.html">12</a>, <a href="http://www.lawandict.blogspot.com/2012/02/bar-exam-results.html">11</a>, <a href="http://www.lawandict.blogspot.com/2012/02/pinoy-power.html">10</a>, <a href="http://www.lawandict.blogspot.com/2012/02/case-for-sopa.html">9</a>, <a href="http://www.lawandict.blogspot.com/2012/02/technology-threat-to-mental-health.html">8</a>, <a href="http://www.lawandict.blogspot.com/2012/02/whats-google-up-to-these-days.html">7</a>, <a href="http://www.lawandict.blogspot.com/2012/01/nice-one-wikipedia.html">6</a>, <a href="http://www.lawandict.blogspot.com/2012/01/ghost-protocols-indeed.html">5</a>, <a href="http://www.lawandict.blogspot.com/2012/01/black-eyed-peace.html">4</a>, <a href="http://www.lawandict.blogspot.com/2012/01/rip-galunggong.html">3</a>, <a href="http://www.lawandict.blogspot.com/2011/12/naked-online.html">2</a>, <a href="http://www.lawandict.blogspot.com/2011/11/fb-bf-fight.html">1</a></span></span></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7264020219519727946.post-68821751340780904972012-03-14T15:20:00.000-07:002012-03-20T00:41:02.090-07:00On Cyber bullying.<div style="font-family: Georgia, serif; "><br /></div><span><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dzctzMa2Dm5H-CtsO1xLqiHRBW0CE3Vw5KoA8GcZto-_cGuaSng_C3AL9MCgli8irSlTwq1sJs4sLk36XYu_w' class='b-hbp-video b-uploaded' frameborder='0'></iframe></span><div style="font-family: Georgia, serif; "><br /></div><div><p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family:"Times New Roman","serif""><o:p> </o:p></span></p><p class="MsoNormal" style="text-align:justify"><br />I remember back in elementary school, bullying meant being harassed face to face-whether physically or verbally. What was essential was that the bullying had to be done in your presence, or with you being physically there. Nowadays the term bullying has moved on to an entirely different sphere-cyberspace. In many ways the bullying that occurred back in my day was much more tolerable.</p> <p class="MsoNormal" style="text-align:justify">Why? Bullied kids back then had the weekend away from school so they had some respite from their tormentors. Victims of cyberbullying, meanwhile, have no refuge. The harassment is constant and may be done through SMS or websites. What’s worse is the information spreads like wildfire and is often very difficult to remove. </p> <p class="MsoNormal" style="text-align:justify">Perhaps the biggest disadvantage in cyberbullying as opposed to traditional bullying is the difficulty of attributing the wrong to a single person. No one specific person can be held accountable. Punishing those responsible for the offense become problematic thus there is absolutely no deterrent for the abusive behavior.</p> <p class="MsoNormal" style="text-align:justify">It is in light of this problem that my partner (Aldan Avila) and I chose to make this video on cyber-bullying. Consider it our contribution in the fight against this growing problem : )</p> <p class="MsoNormal" style="text-align:justify"><o:p> </o:p></p> <p class="MsoNormal" style="text-align:justify">Nathan J. Marasigan and Aldan Avila, Entry No. 13</p> <p class="MsoNormal" style="text-align:justify"><o:p> </o:p></p></div>Nathan Marasiganhttp://www.blogger.com/profile/11173277633293406575noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-72220504923788119342012-03-14T14:11:00.002-07:002012-03-14T14:45:12.024-07:00To buy or not to buy?<div style="font-style: normal; ">Group buying sites have become so popular!</div><div style="font-style: normal; "><br /></div><div style="font-style: normal; ">the amazing discounts on travel, food, luxury items...</div><div style="font-style: normal; ">the tempting deals...</div><div style="font-style: normal; ">the so-good-to-be-true offers...</div><div style="font-style: normal; "><br /></div><div style="font-style: normal; ">It's no wonder one can easily be lured to just click "Buy!" deal after deal after deal. But are consumers really informed of the nature of these sites and why these deals are offers at low prices?</div><div style="font-style: normal; "><br /></div><div style="font-style: normal; ">Our group decided to make a video on what group buying sites are, how they work, and what consumers can do in the unfortunate event that they do not get the deal they wanted and paid for.</div><div style="font-style: normal; "><br /><br /><iframe width="420" height="315" src="http://www.youtube.com/embed/KdQfNYnRADc" frameborder="0" allowfullscreen></iframe><br /><br /></div><div style="font-style: normal; "><span>Group 3</span></div><div style="font-style: normal; "><span>Members:</span></div><div style="font-style: normal; "><span><br /></span></div><div style="font-style: normal; "><span>Diana Bonilla</span></div><div style="font-style: normal; "><span style="font-size: 100%; "><span>Agnes M. Santiago</span></span></div><div style="font-style: normal; "><span>Candice See</span></div><div style="font-style: normal; "><br /></div><div style="font-style: normal; "><br /></div><div style="font-style: normal; "><br /></div><div style="font-style: normal; "><br /></div><div><div style="font-style: normal; "><b>Agnes M. Santiago, Entry No. 13</b></div><div style="font-style: normal; "><i style="font-size: 100%; "><br /></i></div><div style="font-style: normal; "><i style="font-size: 100%; ">Previous entries: #<a href="http://lawandict.blogspot.com/2012/03/ipaidabribecom.html">12</a>, #<a href="http://lawandict.blogspot.com/2012/03/globe-e-commerce.html">11</a>, #<a href="http://lawandict.blogspot.com/2012/02/track-me-not.html">10</a>, #<a href="http://lawandict.blogspot.com/2012/02/pinteresting.html">9</a>, #<a href="http://lawandict.blogspot.com/2012/02/so-sue-me.html">8</a>, #<a href="http://lawandict.blogspot.com/2012/02/fbs-5b-ipo.html">7</a>, #<a href="http://lawandict.blogspot.com/2012/01/meralco-prepaid.html">6</a>, #<a href="http://lawandict.blogspot.com/2012/01/no-wikipedia.html">5</a>, #<a href="http://lawandict.blogspot.com/2012/01/its-more-fun-in-philippines.html">4</a>, #<a href="http://lawandict.blogspot.com/2012/01/ipassport.html">3</a>, #<a href="http://lawandict.blogspot.com/2011/12/googling-santa.html">2</a>, #<a href="http://lawandict.blogspot.com/2011/11/grouponholic.html">1</a></i></div><div style="font-style: normal; "><span><br /></span></div><div style="font-style: normal; "><span><br /></span></div><br class="Apple-interchange-newline"></div>Agnes Margarita M. Santiagohttp://www.blogger.com/profile/08379678207742899966noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-36196834018689202522012-03-14T08:00:00.003-07:002012-03-14T08:07:11.930-07:00Group Buying Sites: Deal or No Deal<div style="text-align: justify;">Wondering why Clever Buy can make you pay only P19998 for a Coron adventure for 4, including roundtrip airfare, transfers and 3D/2N accommodation with daily breakfast? (That's 62% off!)</div><span><div style="text-align: justify;"><br /></div><span><div style="text-align: justify;">Curious about how Metro Deal can sell a Fabulous Hair Rebonding & Blow Dry, including Wash, Haircut and Hot Oil Treatment, for only P999 instead of the usual price of P8,000? (Only 1,211 coupons were sold.)</div><span><div style="text-align: justify;"><br /></div><div style="text-align: justify;">How about a beginners class on Firearm Handling and Target Shooting offered by Deal Grocer? (There's still 10 days left for those who are interested.)</div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">Well, we were curious too and we made a video of the findings of our amateur sleuthing. It exposes their system, spots issues and risks, identifies applicable legal provisions and points to responsible agencies.</div><br /><div style="text-align: center;"><iframe width="420" height="315" src="http://www.youtube-nocookie.com/embed/KdQfNYnRADc?rel=0" frameborder="0" allowfullscreen=""></iframe></div><br /><br /></span></span></span><div><div style="text-align: justify;">Be informed how this growing industry is making money. Know how it works and learn how to be cautious. Make your purchases wisely.</div><div style="text-align: justify;"><span><span><span><br /></span></span></span></div><div><div style="text-align: justify;"><br /></div><span><div style="text-align: justify;">Diana Lutgarda P. Bonilla</div></span></div><div style="text-align: justify;"><span><span><span>Agnes M. Santiago</span></span></span></div><div style="text-align: justify;"><span><span><span>Candice See</span></span></span></div><div style="text-align: justify;"><span><span><span>Blog Entry #13<br /></span></span></span><div style="font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; "></div></div></div>Candice Seehttp://www.blogger.com/profile/08654527788749165982noreply@blogger.com5tag:blogger.com,1999:blog-7264020219519727946.post-70706733450294987312012-03-14T07:37:00.005-07:002013-04-26T05:15:27.131-07:00Jobs v. Gates<div>
Was it all just friendly rivalry?</div>
<div>
<br /></div>
<div>
Steve Jobs on Bill Gates:</div>
<div>
"He really never knew much about technology, but he had an amazing instinct for what works."</div>
<div>
<br /></div>
<div>
Bill Gates on Steve Jobs:</div>
<div>
"What I can't figure out is why he is even trying (to be the CEO of Apple)? He knows he can't win."</div>
<div>
<br /></div>
<div>
Jobs on Gates:</div>
<div>
"Bill is basically unimaginative and has never invented anything, which is why I think he's more comfortable now in philanthropy than technology. He just shamelessly ripped off other people's ideas." </div>
<div>
<br /></div>
<div>
Gates on Jobs:</div>
<div>
"He faced, several times at Apple, the fact that their products were so premium priced that they literally might not stay in the marketplace. So the fact that we were succeeding with high volume products, you know, including a range of prices, because of the way we worked with multiple companies, it's tough."</div>
<div>
<br /></div>
<div>
Watch how it all began and ended.</div>
<div>
<br /></div>
<div>
The Battle of Silicon Valley</div>
<div>
<br /></div>
<div>
<iframe allowfullscreen="" frameborder="0" height="225" src="http://www.youtube.com/embed/wO4criRWMoQ?feature=player_embedded" width="400"></iframe></div>
<div>
<br /></div>
<div>
Group project by: Tiopianco, Prado, Ocana</div>
<div>
<br /></div>
<div>
C M Prado, Entry # 13</div>
caloyphttp://www.blogger.com/profile/00474321002794507094noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-91407144163273632782012-03-14T01:42:00.008-07:002012-03-14T02:19:22.697-07:00The Battle of Silicon Valley<span style="font-family:verdana;">"Good artists copy, great artists steal."</span><br /><span style="font-family:verdana;">The semi-fictionalized story of the battle to create the computer age.</span><br style="font-family:verdana;"><br style="font-family:verdana;"><div style="text-align: justify;"><iframe style="font-family: verdana;" src="http://www.youtube.com/embed/wO4criRWMoQ" allowfullscreen="" frameborder="0" height="243" width="420"></iframe><br style="font-family:verdana;"><br style="font-family:verdana;"><br style="font-family:verdana;"><span style="font-family:verdana;">Inspired by the movie "<a href="http://www.imdb.com/title/tt0168122/">Pira</a></span><span style="font-family:verdana;"><a href="http://www.imdb.com/title/tt0168122/">tes of Silicon Valley</a>" (1999), the video shows how two of the most important men of the past three decades purloined their way to immortality. Forget about Zuckerberg duping the Winklevoss twins. Steve Jobs did it to Xerox first; and Bill Gates, well, did it to Steve.</span><br style="font-family:verdana;"><br face="verdana"><span style="font-family:verdana;">Group project by: Tiopianco, Prado, Ocana</span><br /><br face="verdana"><span style="font-family:verdana;">Francis Paolo Tiopianco, Entry #13</span><br /></div><span style="font-family:verdana;">Previous Entries<span style="font-family:verdana;">:</span> <a href="http://lawandict.blogspot.com/2011/11/zuckerberg-admits-to-facebook-mistakes.html">1</a>, <a href="http://lawandict.blogspot.com/2011/12/uk-prosecutors-get-techy-to-infinity_08.html">2</a>, <a href="http://lawandict.blogspot.com/2012/01/spanish-government-adopts-anti-internet_05.html">3</a>, <a href="http://lawandict.blogspot.com/2012/01/marvel-lawyers-deny-humanity-of-mutants.html">4</a>, <a href="http://lawandict.blogspot.com/2012/01/google-wiki-others-go-black-to-protest.html">5</a>, <a href="http://lawandict.blogspot.com/2012/01/feds-sink-megaupload-ship.html">6</a>, <a href="http://lawandict.blogspot.com/2012/01/next-gen-xbox-threatens-to-kill-used.html">7</a>, <a href="http://lawandict.blogspot.com/2012/02/super-bowl.html">8</a>, <a href="http://lawandict.blogspot.com/2012/02/prelude-to-end-of-free-manga-viz-goes.html">9</a>, <a href="http://lawandict.blogspot.com/2012/02/digital-age-of-sports.html">10</a>, <a href="http://lawandict.blogspot.com/2012/02/does-fifth-amendment-protect-encrypted.html">11</a>, <a href="http://lawandict.blogspot.com/2012/03/start-up-company-attempts-to-circumvent.html">12</a></span><br style="font-family: verdana;"><br style="font-family: verdana;"><br style="font-family: verdana;">FPTiopiancohttp://www.blogger.com/profile/09925152443032034662noreply@blogger.com2tag:blogger.com,1999:blog-7264020219519727946.post-21524869871835570892012-03-14T00:22:00.002-07:002012-03-14T00:24:47.545-07:00CyberThieves<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/U6rlf2mwrEA?fs=1" width="480"></iframe><div><br /></div><div>This Video shows how sometimes internet users may become vulnerable and fall victims to identity theft and credit card fraud. </div><div><br /></div><div>Danjun Lucas</div><div>Blog Entry 12</div><div><br /></div>Danjun Lucashttp://www.blogger.com/profile/01282184773683462801noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-35332146779528669192012-03-14T00:14:00.003-07:002012-03-14T00:17:52.708-07:00CyberThievesThis Video shows how sometimes internet users may become vulnerable and fall victims to identity theft and credit card fraud. <div><br /></div><div><a href="http://www.youtube.com/watch?v=U6rlf2mwrEA&feature=youtu.be&noredirect=1">http://www.youtube.com/watch?v=U6rlf2mwrEA&feature=youtu.be&noredirect=1 </a></div><div><br /></div>Danjun Lucashttp://www.blogger.com/profile/01282184773683462801noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-54649551225294421812012-03-13T08:57:00.000-07:002012-03-13T08:57:09.134-07:00Youthieves<style>
<!--
/* Font Definitions */
@font-face
{font-family:Times;
panose-1:2 0 5 0 0 0 0 0 0 0;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Cambria;
panose-1:2 4 5 3 5 4 6 3 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin-top:0cm;
margin-right:0cm;
margin-bottom:10.0pt;
margin-left:0cm;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-ascii-font-family:Cambria;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:Cambria;
mso-fareast-theme-font:minor-latin;
mso-hansi-font-family:Cambria;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
@page Section1
{size:612.0pt 792.0pt;
margin:72.0pt 90.0pt 72.0pt 90.0pt;
mso-header-margin:36.0pt;
mso-footer-margin:36.0pt;
mso-paper-source:0;}
div.Section1
{page:Section1;}
-->
</style><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">When going online and creating your own mini world of information such as what school you went to, what sites you usually check and join, the people you add, the pictures you upload, we rarely think about the implications of filling up the simple preliminary forms they usually require. These forms are usually disguised as a marketing tool or even just as a database of the site we are attempting to join or enter. These information in fact, now become part of the property of the site and are free to use it whichever way they want since we gave the information on a silver platter.</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><br />
</div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">What more when you go online shopping.</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><br />
</div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">When shopping in this medium, being a delicate one involving contracts and money, we are required to give away our credit card information our home address and our personal telephone or mobile phone in order to verify the sale as being a valid one. These information, although usually guaranteed by the company involved to be kept confidential, retain their inherent vulnerability and keeps the online shoppers exposed to possible identity theft or fraud.</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/U6rlf2mwrEA?feature=player_embedded' frameborder='0'></iframe></div><div class="MsoNormal" style="margin: 0.1pt 0cm;"><br />
</div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">The video above shows a concrete example of a man who's identity was stolen with some serious repercussions. Enjoy.</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><br />
</div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">Group Members: </span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">Danjun Lucas</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">Trisha Fernandez</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">Angeli Serapio</span></div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><br />
</div><div class="MsoNormal" style="margin-bottom: .1pt; margin-left: 0cm; margin-right: 0cm; margin-top: .1pt; mso-para-margin-bottom: .01gd; mso-para-margin-left: 0cm; mso-para-margin-right: 0cm; mso-para-margin-top: .01gd;"><span style="font-family: Times; font-size: 10.0pt; mso-bidi-font-family: "Times New Roman";">By Trisha Isabelle F. Fernandez Entry #13</span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-73980222876433398422012-03-10T19:10:00.003-08:002012-03-10T19:10:51.542-08:00<div style="text-align: justify;">
Shogun Total War</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Back in 2000, the most popular RTS titles came from then gaming giant Westwood or the up and coming Blizzard. RTS or Real Time Strategy games had a common formula that was popularized in the early 90's hit "Dune" by Westwood. You start out with a base, gather resources, build structures and then produce units to engage in combat. The immediate success of Westwood's Dune was followed by the Command and Conquer series which made the RTS a firm genre in the gaming scene. Game Developer Blizzard was quick to come into the scene with a Tolkienesque RTS series entitled Warcraft, (yes Warcraft was an RTS before an MMORPG). In 1998 Blizzard came out with arguably the best RTS of all time, Starcraft which pretty much relied on the Warcraft formula but was set in outer space. All these games more or less followed the pattern of Dune, build a base, gather resources etc. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijbbvUYNCKpl1rNmuG43jnhXiTnSpPgzuBs3KcYPA3Dur2w0ln8XMP9dxsJXvzzHCS0mIq-AumwdUTfeORAnzbMow_qb_u_iBWbAaOVfzYBGVPl-mX4e0olhnmY9iekpjydwZQ7qsOmtQ/s1600/cc.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijbbvUYNCKpl1rNmuG43jnhXiTnSpPgzuBs3KcYPA3Dur2w0ln8XMP9dxsJXvzzHCS0mIq-AumwdUTfeORAnzbMow_qb_u_iBWbAaOVfzYBGVPl-mX4e0olhnmY9iekpjydwZQ7qsOmtQ/s320/cc.jpg" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="text-align: justify;">
And so in 2000 when a small British company called Creative Assembly came out with a title called Shogun Total War, it received scarce attention since all the big developers had titles that were at the top of their game. </div>
<div style="text-align: justify;">
Most mainstream RTS gamers remember Rome Total War (came out around 2004), as their first Total War Game but this wasn't the first. </div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMk9-ZAiR_K2xYNHXbsz110JXWgwFU7h3FuMV3nNcZVrruvidHV3Zmw3_bOt4CGFbmhc4zIoPtC7CnEgLZ0bzPZAuAgHqNvNmDfVAAFn4T4O7F9US6AdsmVmrYdkj87Q2t8BrvkBOtHK0/s1600/Shogun_Total_War.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMk9-ZAiR_K2xYNHXbsz110JXWgwFU7h3FuMV3nNcZVrruvidHV3Zmw3_bOt4CGFbmhc4zIoPtC7CnEgLZ0bzPZAuAgHqNvNmDfVAAFn4T4O7F9US6AdsmVmrYdkj87Q2t8BrvkBOtHK0/s1600/Shogun_Total_War.jpg" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
I remember playing Shogun for the first time in the States when my uncle (an avid flight simulation gamer) let me use his PC. What first strikes you about Shogun is the amount of creative effort put into immersing you in the Japanese setting during the 1560's. Everything from the sound to the artwork are all taken from the period and provide an excellent background to the gameplay itself. What was revolutionary about total war was its synthesis of an RTS and a Civilization type game. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The Civilization series was a turn based (as opposed to Real Time) strategy game where you settled lands, built cities, researched technologies and then engaged in warfare. It was also a very popular title series but formed an entire genre distinct from RTS games. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI32XYDLo6kdIm1dddGHbf5E3GwzRtDLrjtHIbd17eSLH-_TFdjTe7tfuEk9JWI1H7pZ5EmjfGJYq1JqNSY7YlbF62EWIl7i-eRSULtaeYgk3-5GcfS6HFkyZ3rCasUYrrdFxd4_wz32g/s1600/civ.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI32XYDLo6kdIm1dddGHbf5E3GwzRtDLrjtHIbd17eSLH-_TFdjTe7tfuEk9JWI1H7pZ5EmjfGJYq1JqNSY7YlbF62EWIl7i-eRSULtaeYgk3-5GcfS6HFkyZ3rCasUYrrdFxd4_wz32g/s320/civ.jpg" width="320" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Shogun Total War managed to meld the two genres into what has become a trademark of the Total War Series, a turn based game with Real time battles. The Campaign map in Shogun Total War is similar to a Risk board, or a map divided into provinces and locations. Each Province you control grants you resources and you are allowed to build structures and units in that area. The production is turn based and done in an interface similar to the Civilization Series. Your armies move from one province to another, each movement taking up one turn. The fun starts when you invade an enemy province or are invaded yourself. </div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5dT9IaJHax0gaXqNLtuusG7_EXMNyNnXNuL3agaTldJMN48aU3RBaNrv7x6Ij7FqDEOfdw1AxEti_w9gcDkoGx5ETqFHzGRcPZQp-2AotOcd863ufEuQT-4MB0pDKL2yCoh-_IfaqbGk/s1600/shogun_total_war_warlords_edition_hir0510_04.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5dT9IaJHax0gaXqNLtuusG7_EXMNyNnXNuL3agaTldJMN48aU3RBaNrv7x6Ij7FqDEOfdw1AxEti_w9gcDkoGx5ETqFHzGRcPZQp-2AotOcd863ufEuQT-4MB0pDKL2yCoh-_IfaqbGk/s320/shogun_total_war_warlords_edition_hir0510_04.jpg" width="320" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
When a battle takes place in Shogun, it happens in real time. The screen moves from the campaign map into an actual rendering of the battleground. Hills, rivers, forests and farmlands are rendered as well as the troops you have. Shogun was also the first to translate actual tactical advantages into gameplay values in an RTS setting. To illustrate, in other RTS's the game was mostly a drop down view of the action with the battleground completely flat and fighting was mostly a rock paper scissors affair. In Shogun, if you placed your units on the high ground, combat bonuses were added. If your archers were on a hill, they could fire farther, if your infantry was in a forest, they could hide and engage cavalry better. The permutations were endless. It all provided for one the first and accurate tactical simulations in a video game. </div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4izMmH_sEVwQEwjmkh-wWTGn5nVw3JrDXob0_3HYasuwq3q_ds0RC-eodTY3_kjRr9AEVIoLZPDZ-AxvvCR-2ZIFqt5z9h9esuUZKdIwf2-FWZRm7k8UteaPgIopZz8Vso_YQPxG1nPg/s1600/shogun2010061310265703.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4izMmH_sEVwQEwjmkh-wWTGn5nVw3JrDXob0_3HYasuwq3q_ds0RC-eodTY3_kjRr9AEVIoLZPDZ-AxvvCR-2ZIFqt5z9h9esuUZKdIwf2-FWZRm7k8UteaPgIopZz8Vso_YQPxG1nPg/s320/shogun2010061310265703.jpg" width="320" /></a></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Shogun went largely unnoticed because the graphics were not as "colorful" as the prevalent RTS game at the time. However, Creative Assembly successfully tested their game model and acquired a loyal fan base. Shogun paved the way for CA to eventually release its much more renown hits like Medieval and Rome Total War. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Ernesto Mario S. Mascenon Jr. </div>
<div style="text-align: justify;">
Blog Entry</div>aris20598http://www.blogger.com/profile/06729837081219067056noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-51151194507376525782012-03-10T18:26:00.001-08:002012-03-10T18:26:35.840-08:00Access Devices Regulation Act<br />
<br />
Aside from the penalty provisions of the E-Commerce Act to punish cybercrimes, there exists RA 8484 otherwise known as the Access Devices Regulation Act. The declaration of policy of this law states that the government "recognizes the recent advances in technology and the widespread use of access devices in commercial transactions. Toward this end, the State shall protect the rights and define the liabilities of parties in such commercial transactions by regulating the issuance and use of access devices". An access device is most usually a credit card or like instrument. A majority portion of the law sets out details that credit card companies must set forth and disclose to its customers. The pertinent provisions of the law regarding cybercrime are found in sec. 9 which enumerate the<br />
<br />
Prohibited acts:<br />
<br />
"(a) producing, using, trafficking in one or more counterfeit access devices;<br />
<br />
(b) trafficking in one or more unauthorized access devices or access devices fraudulently applied for;<br />
<br />
(c) using, with intent to defraud, an unauthorized access device;<br />
<br />
(d) using an access device fraudulently applied for;<br />
<br />
(e) possessing one or more counterfeit access devices or access devices fraudulently applied for;<br />
<br />
(f) producing, trafficking in, having control or custody of, or possessing device-making or altering equipment without being in the business or employment, which lawfully deals with the manufacture, issuance, or distribution of such equipment;<br />
<br />
(g) inducing, enticing, permitting or in any manner allowing another, for consideration or otherwise to produce, use, traffic in counterfeit access devices, unauthorized access devices or access devices fraudulently applied for;<br />
<br />
(h) multiple imprinting on more than one transaction record, sales slip or similar document, thereby making it appear that the device holder has entered into a transaction other than those which said device holder had lawfully contracted for, or submitting, without being an affiliated merchant, an order to collect from the issuer of the access device, such extra sales slip through an affiliated merchant who connives therewith, or, under false pretenses of being an affiliated merchant, present for collection such sales slips, and similar documents;<br />
<br />
(i) disclosing any information imprinted on the access device, such as, but not limited to, the account number or name or address of the device holder, without the latter's authority or permission;<br />
<br />
(j) obtaining money or anything of value through the use of an access device, with intent to defraud or with intent to gain and fleeing thereafter;<br />
<br />
(k) having in one's possession, without authority from the owner of the access device or the access device company, an access device, or any material, such as slips, carbon paper, or any other medium, on which the access device is written, printed, embossed, or otherwise indicated;<br />
<br />
(l) writing or causing to be written on sales slips, approval numbers from the issuer of the access device of the fact of approval, where in fact no such approval was given, or where, if given, what is written is deliberately different from the approval actually given;<br />
<br />
(m) making any alteration, without the access device holder's authority, of any amount or other information written on the sales slip;<br />
<br />
(n) effecting transaction, with one or more access devices issued to another person or persons, to receive payment or any other thing of value;<br />
<br />
(o) without the authorization of the issuer of the access device, soliciting a person for the purpose of:<br />
<br />
1) offering an access device; or<br />
<br />
2) selling information regarding or an application to obtain an access device; or<br />
<br />
(p) without the authorization of the credit card system member or its agent, causing or arranging for another person to present to the member or its agent, for payment, one or more evidence or records of transactions made by credit card."<br />
<br />
According to the PNP Handbook, these prohibited acts can be generalized into two common forms of credit card fraud: Account Take Over and "Skimming". Account take over is usually done by a person getting your personal information and billing statements (like stealing from your real-life mailbox). This person then usually redirects the credit card delivery to his or her own residence and subsequently impersonates and uses your account.<br />
<br />
Skimming is a far more insidious manner of fraud. When we use credit cards, the machine they use to swipe the card reads the magnetic strip and subsequently forwards the data to your bank or whatnot. Unscrupulous persons can actually rig these machines to not only read but also copy the data on the magnetic strip. Once the data is acquired, its an easy task to create a fake card with a copy of the strip. Experts can make cards of such quality that its almost impossible to detect the fraud on the face of the card.<br />
<br />
Ernesto Mario S. Mascenon Jr.<br />
Blog Entry<br />
<div>
<br /></div>aris20598http://www.blogger.com/profile/06729837081219067056noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-50014213732264888532012-03-09T04:51:00.000-08:002012-03-09T04:51:16.326-08:00Google Play<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 16px;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicTdtr4Ml8iwHST01aMqUkrYkpUIjHhB5oAozk-yWYWacrY_Y5URUkvM6nRf3OgaSkq5PZyRFre38haS6mEgzIYHCi-NM4G2_c4fAw6kSJ4POdX9Sn0l95LNyrxKSSLHoXhziEoEQ9-fQ/s1600/google_play_teaser.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="178" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicTdtr4Ml8iwHST01aMqUkrYkpUIjHhB5oAozk-yWYWacrY_Y5URUkvM6nRf3OgaSkq5PZyRFre38haS6mEgzIYHCi-NM4G2_c4fAw6kSJ4POdX9Sn0l95LNyrxKSSLHoXhziEoEQ9-fQ/s320/google_play_teaser.jpg" width="320" /></a></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;">It is obvious in this generation that what we seek is
convenience in everything. We like to do things in a speed of light. We like “automatic”.
We like “instant”. We like “express”. Everything that will make our lives
easier will definitely find a market in us. This is what Google is trying to do
with its offerings in the Android Market. <span style="font-size: small;"> <o:p></o:p></span></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;">Google rebranded its Android Market, Google Music, and its
online eBookstore into Google Play. Google will upgrade its Android Market app
to Google Play and Google Play Music, Google Play Books, and Google Play Movies
will be the names that will be used by Google's music, books, and movie storefronts.
For some reason, this new branding will not take effect to some countries like
Canada, U.K., Australia, and Japan. <o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;">This rebranding does not go with significant technical
changes. Everything else will operate the same except that all the Google Play
services will be consolidated by a cloud. This means that content can be shared
across every Google device like Android phones, tablets, and Google TVs. All
the user has to do is to log in to his Google account. That easy. No more
hassle of syncing your devices every time one of those devices gets an update.
You can now enjoy and even share your movies, books, music and apps on the web
and on your Android phone or tablet. Google Play is entirely cloud-based. This
means that all your movies, books, music and apps are stored online. So they
will always be available to you. You don’t have to move them from a device to
another device and you will never lose them. These are the functional benefits which
go along with the rebranding.<span style="font-size: small;"><o:p></o:p></span></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif;"><span style="font-size: x-small;">source:www.pcmag.com</span><span style="font-size: small;"><o:p></o:p></span></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 115%;"><span style="font-family: Verdana, sans-serif; font-size: x-small;"><br /></span></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="line-height: 16px;"><span style="font-family: Verdana, sans-serif;">Adrian Francis S. Bustos, Entry #12</span> </span></div>Adrian Francis S. Bustoshttp://www.blogger.com/profile/00448100271540955682noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-26037102147890492442012-03-08T18:41:00.000-08:002012-03-19T18:42:17.447-07:00Chronicles of the Anonymous: Cons<p class="MsoNormal" style="text-align: justify; "><span style="background-color: white; font-family: 'Times New Roman', serif; font-size: 100%; ">Proceeding from the premise that hacktivism is aggression, anti-hacktivists would also argue against the freedom of speech aspect raised by pro-hacktivists. Since by their destructive acts, they can be considered as using force in their aggression-critics assert that this can hardly be considered a promotion of the freedom of speech. How so?</span></p> <p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family: 'Times New Roman', serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">Freedom essentially means the right to be left alone. When a hacktivist vandalizes a website, automatically there is an invasion of the right to freedom of speech of another individual, or group of individuals. Thus, there can only be <i>promotion </i>in its truest sense where each individual acknowledges, and more importantly, respects the freedom of another. Promotion necessitates tolerance of other views.<o:p></o:p></span></p> <p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family: 'Times New Roman', serif; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: white; background-position: initial initial; background-repeat: initial initial; ">Perhaps the greatest criticism against hacktivism then is that it <i>does not</i> promote freedom of speech, rather it encourages and uses invasions of freedom. With a supposed “noble” cause that is more apparent than real, hacktivists really engage in acts that have always been at a great cost to others. Fuelled by a misplaced sense of justice and egged on by the mob, hacktivists in their quest to solve the ultimate problem, have themselves become part of it.<o:p></o:p></span></p> <p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family:"Times New Roman","serif"">This blog does neither condemns nor discourages hacktivism, but only seeks to present both sides of the coin and document the exploits of the hacktivist group Anonymous. It should be said, however, that cybercrime of any sort cannot and should not be endorsed. Overall, millions of Internet users around the world are affected each year by cyberattacks, with many resulting in identity theft and massive financial losses. The fundamental question really (disregarding technicalities, legal jargon and stripping it down to the bare issue) is: should hacktivism be considered a cybercrime?<o:p></o:p></span></p> <p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family:"Times New Roman","serif"">Nathan J. Marasigan, Entry No. 12<o:p></o:p></span></p> <p class="MsoNormal" style="font-family: Georgia, serif; text-align: justify; "><span style="font-family:"Times New Roman","serif""><o:p> </o:p></span></p>Nathan Marasiganhttp://www.blogger.com/profile/11173277633293406575noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-64823386902022621742012-03-08T09:06:00.004-08:002012-03-08T09:28:29.424-08:00The Same, but DifferentIf there is one thing that cannot describe student politics in the University of the Philippines, it is the word boring. Year in and year out, neatly-dressed (well, most of them) individuals of various personalities with funny tag lines make their way around their respective colleges.<br /><br />For candidates vying for University-wide positions, the task is even harder since they have to campaign in all of the colleges in the campus. This particular year, nostalgia hit me as I realized that some things never ever change. (by the time I graduate, I would have spent a decade of my life as a student in UP Diliman) <br /><br />Things like, creating a tag line. Given the number of classrooms that they have to enter and the limited time they have (usually around 5 mins) each candidate has to leave a lasting impression or name recall. This is usually done by coining a funny quip to say at the end of the spiel.<br /><br />The passion of students supporting their respective parties also never diminishes. As familiar faces come and go, there is always some party member who appears ready to go to war for the party they represent. <br /><br />Black propaganda is also something that has been part of the culture of UP Politics. Although it is roundly condemned by the University, the fact of the matter is all political parties engage in it at one time or another. Particularly if they are threatened by a seemingly strong candidate. <br /><br />This year saw the first transgender USC chairperson. Mr./Ms. Gabriel "Heart" Dino won by around 500 votes over the next candidate. This year also produced an openly bisexual vice-chairperson. The win of these two candidates is a big step forward for the LGBT movement in and out of the university. By having the incoming chair and vice chair of the premiere State University among their ranks, the plight of this sector will surely be given its share of the spotlight. Oh, and for the first time in a long time, STAND-UP is the minority party. It would be interesting to observe the working dynamics of the next student council. <br /><br />Hmm... perhaps some things do change.<br /><br /><br /> Norman Roland E. Ocana III, Entry # 10JJ Ocanahttp://www.blogger.com/profile/05798300566904695261noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-83222954490425775912012-03-08T08:06:00.004-08:002012-03-08T08:50:56.555-08:00Saving GasPump prices have steadily gone up since after Christmas.<br /><br />I remember, going into January, the price of regular unleaded gasoline was something like 51.90 Pesos to a liter. Just this morning, the big 3 (Petron, Shell and Caltex), announced another round of oil price hikes. As if the current price of 57.15 Pesos to a liter for unleaded gas was not high enough. The government refuses to exempt oil from among those which are subject to VAT, thus resulting to even higher pump prices as the price of imported crude goes up.<br /><br />So... aside from taking the train, jeep or other forms of public transportation to get to and from places, I decided to find out the easiest ways to maximize fuel consumption which I am sharing here with everybody:<br /><br /><h3>1. Slow down</h3>One of the best ways to save gas is to simply reduce your speed. As speed increases, fuel economy decreases exponentially. (Just be sure you keep to the right, so you won't impede the less-enlightened.)<br /><br /><h3>2. Check your tire pressure</h3>Under-inflated tires are one of the most commonly ignored causes of crummy MPG. Tires lose air due to time (about 1 psi per month) and temperature (1 psi for every 10 degree drop); under-inflated tires have more rolling resistance, which means you need to burn more gas to keep your car moving. Buy a reliable tire gauge and check your tires at least once a month. Be sure to check them when they are cold, since driving the car warms up the tires along with the air inside them, which increases pressure and gives a falsely high reading.<br /><br /><div class="lsItm"><h3>4. Accelerate with care</h3>Jack-rabbit starts are an obvious fuel-waster -- but that doesn't mean you should crawl away from every light. If you drive an automatic, accelerate moderately so the transmission can shift up into the higher gears. Stick-shifters should shift early to keep the revs down, but don't lug the engine -- downshift if you need to accelerate. Keep an eye well down the road for potential slowdowns. If you accelerate to speed then have to brake right away, that's wasted fuel.</div><div class="lsItm"><h3>5. Hang with the trucks</h3>Ever notice how, in bad traffic jams, cars seem to constantly speed up and slow down, while trucks tend to roll along at the same leisurely pace? A constant speed keeps shifting to a minimum -- important to those who have to wrangle with those ten-speed truck transmissions -- but it also aids economy, as it takes much more fuel to <i>get</i> a vehicle moving than it does to <i>keep</i> it moving. Rolling with the big rigs saves fuel (and aggravation).</div><div class="lsItm"><h3>6. Get back to nature</h3>Consider shutting off the air conditioner, opening the windows and enjoying the breeze. It may be a tad warmer, but at lower speeds you'll save fuel. That said, at higher speeds the A/C may be more efficient than the wind resistance from open windows and sunroof. (Just make sure your not about to meet a client or something)<br /></div><div class="lsItm"><h3>7. Back off the bling</h3>New wheels and tires may look cool, and they can certainly improve handling. But if they are wider than the stock tires, chances are they'll create more rolling resistance and decrease fuel economy.<br /></div><div class="lsItm"><h3>8. Clean out your car</h3>Periodically go through your car and see what can be tossed out or brought into the house. It doesn't take much to acquire an extra 40 or 50 lbs. of stuff, and the more weight your car has to lug around, the more fuel it burns.<br /><br /><h3>9. Don't drive</h3>reiterating what i mentioned earlier at the start of this article.. Take the train, carpool, and consolidate your shopping trips. Walking or biking is good for your wallet <i>and</i> your health. And before you get in your car, always ask yourself: "Is this trip really necessary?"<br /><br />Norman Roland E. Ocana III, Entry # 9<br /></div>JJ Ocanahttp://www.blogger.com/profile/05798300566904695261noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-37635303101107506392012-03-08T05:45:00.002-08:002012-03-08T05:48:53.256-08:00Trial Pad<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyWRLaJEbw4CU84k-vy9Ry6OZafNfMVGc4acOmFKg30YfYQ_AnRuEoKoNh-hWuhF95dRqF_1S3HsmikdZi8dhzNNQdNmxT4mZ8B3Yf-ZYXaA2-1EWZpNHTtQX1tYNHM_AC0C_VhAvkZs8B/s1600/TrialPad.png.jpeg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 133px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyWRLaJEbw4CU84k-vy9Ry6OZafNfMVGc4acOmFKg30YfYQ_AnRuEoKoNh-hWuhF95dRqF_1S3HsmikdZi8dhzNNQdNmxT4mZ8B3Yf-ZYXaA2-1EWZpNHTtQX1tYNHM_AC0C_VhAvkZs8B/s400/TrialPad.png.jpeg" border="0" alt="" id="BLOGGER_PHOTO_ID_5717522666008817330" /></a><br /><!--StartFragment--> <p class="MsoNormal" style="text-align:justify">There has been so much fuss about the third generation iPad these days that I decided to read about it a little. Interestingly enough, I came across an application (app) that was created for lawyers to be used in trial as a tool for presenting evidence. The app is called Trial Pad. I was curious; what was this exactly? According to the website, Trial Pad “is a powerful legal document management and presentation tool developed for the legal profession for use in a trial, hearing, or ADR setting. Using TrialPad you can organize, manage, annotate, and store your documents and video while leveraging the portability of your iPad. TrialPad was designed by professional trial consultants who have helped lawyers present at trial for more than a decade. Unlike PDF readers, it lets you create separate case folders, organize and sort important documents, and dynamically annotate and present them via its flexible output options. TrialPad's plug and play simplicity, and intuitive user interface, literally puts your next presentation into your hands.” <i style="mso-bidi-font-style:normal">(http://www.trialpad.com)</i></p> <p class="MsoNormal" style="text-align:justify">Another writer describes it as “a form of presentation software that displays evidence (or other documents) and allows lawyers to seamlessly cycle between different parts, as well as easily annotate (highlight, sticky notes, etc). It connects directly from your iPad to the standard projection software available in most courtrooms, enabling lawyers to easily review, annotate, and scroll through digital files directly before the jury. Think of it like a Powerpoint that’s much easier to annotate before a group and doesn’t require the forced linearity of the presentation.” <i style="mso-bidi-font-style:normal">(http://lawwithanapple.com)</i></p> <p class="MsoNormal" style="text-align:justify">This is interesting because it does away with so much of the hassle of having to physically produce so many pieces of documentary evidence in court during trial. It also seems like a better way to manage cases, and to present evidence in a clear and organized manner. Of course, so many issues begin to creep up the moment we introduce pieces of evidence in digital form. And unfortunately, although this sort of technology seems like a great way to handle the hundreds of cases that lawyers deal with on a daily basis, I really think that we are hardly prepared to welcome it in the Philippine context.</p><p class="MsoNormal" style="text-align:justify"><br /></p><p class="MsoNormal" style="text-align:justify">Joni R. Gomez, Blog Entry # 12</p> <!--EndFragment-->Joni Gomezhttp://www.blogger.com/profile/05827284226401258735noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-12699185012488902442012-03-08T05:32:00.002-08:002012-03-08T05:33:24.057-08:00RICHEST FILIPINOS<div style="font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; text-align: justify; "><span style="font-size: 100%; ">Early this week, Forbes Magazine released their annual list of billionaires in the world. For 2012, the list included 1,226 billionaires all over the world who have a collective net worth of US$4.6 trillion. Among these are 6 Filipinos: Henry Sy, Lucio Tan, Andrew Tan, Enrique Razon, Eduardo Cojuangco, and Roberto Ongpin.</span></div><div style="text-align: justify;"><span ><br /></span></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">According to Forbes, 87-year old Henry Sy is the richest Filipino, whose new worth is about US$8 billion. Henry’s success story started out in his father's bodega in Quiapo where he opened a shoe store in 1946. He now controls the Philippines' largest mall developer. He also founded the SM Investments Corporation, one of the largest conglomerates in the Philippines.</span></div></span><div style="text-align: justify;"><br /></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">Next in line is 77-year old Lucio Tan, who has a net worth of US$3.5 billion. Among the companies which Tan controls are Asia Brewery, the second largest brewery in the Philippines, Tanduay Holdings, one of the world's largest rum makers, Fortune Tobacco, the largest tobacco company in the country, Philippine Airlines, the Philippines' flag carrier.</span></div></span><div style="text-align: justify;"><br /></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">Andrew Tan is the third richest Filipino, with a net worth of US$2.1 billion. An immigrant from China, he did odd jobs to put himself through college. He saved money he earned as a kitchen appliance salesman to buy a distillery and made his first fortune in brandy. He now owns Megaworld Corporation, a real estate corporation engaged in developing condominiums, Emperador Distillers Incorporation, which is best known for its brandy, and Golden Arches Development Corporation, which possesses the McDonald's franchise.</span></div></span><div style="text-align: justify;"><br /></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">Enrique Razon, who has a total net worth of US$1.9 billion, is the fourth richest Filipino. He is engaged in the port business as the owner of International Container Terminal Services, a Manila-listed company which has operations in 17 countries.</span></div></span><div style="text-align: justify;"><br /></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">The 76-year old Eduardo Cojuangco is the fifth richest Filipino. He is the chairman of San Miguel Corporation, the largest food and beverage corporation in the Philippines. His total net income is US$1.3 billion.</span></div></span><div style="text-align: justify;"><br /></div><span ><div style="text-align: justify;"><span style="font-size: 100%; ">Rounding up the list is Roberto Ongpin. This 75-year old businessman is worth US1 billion. He has investments in property, gaming, mining and telecommunications. He also heads Top Frontier, an investment company, which has a controlling interest in San Miguel Corporation.</span></div></span><div style="text-align: justify;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; "><br /></div><div style="text-align: justify;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; ">Angeli I. Serapio, Entry #12</div>Angeli I. Serapiohttp://www.blogger.com/profile/16047287103545892180noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-22340682891969187212012-03-08T04:51:00.002-08:002012-03-08T05:05:37.251-08:00DECLARATION<p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">“I’M SORRY.”<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">These words greeted an unsuspecting high school class one fine morning. All seven letters, formed from cut newspaper, were taped to the wall outside the classroom. It turned out to be a dramatic attempt of one member of the class to apologize to one classmate (who incidentally was his girlfriend as well) for previous transgressions he caused her. The apology though was not immediately accepted, and the incoming teacher told the perpetrator of this ruse to remove everything off the wall once he accomplished whatever purpose he had in mind.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">If Mr. Public Apology had Facebook then, perhaps he would not have had to do such silly stunt.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">The explosion of online social networking has effectively transformed personal expression of emotions unto other people into public declarations of emotions for others. With Facebook and Twitter, all netizens effectively are drawn to the emotional communications going on between different people at different periods in time. Any individual who has no qualms of publicizing his or her emotions for others need not resort to any publicity stunt to do so; the Internet is his or her own personal loudspeaker and amplifier.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">Does it pay to profess your love for your special someone over cyberspace?</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">Cyberspace provides the perfect avenue to dispense with issues of composure and certitude that comes with confrontations. At best the struggle would come only in crafting a meaningful message of love; otherwise the conveyance of the message is instant and hassle-free. Once the decision is made to declare your love over the Internet, a choice is also made not to restrict the consequences of such an emotional declaration within the confines of a private relationship, but also to bare everything out into the public cyber sphere.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">But perhaps, there is sense to laying down giant letters that form the words “I LOVE YOU” over the Sunken Garden.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; ">A declaration of great love is always a momentous occasion full of untold significance and depth. It is not a product of acts done overnight, but rather the accumulation of different encounters and moments of incomparable meaning. To resort to foolhardy ways of saying “I love you” may be unnecessary or improper, and yet, such means show there is also that greater need to exert a certain amount of effort to channel the <i style="mso-bidi-font-style: normal">essence</i> behind those words. Others may see that Facebook is enough, while others may feel that a special someone deserves to see, hear and feel how much love fills that declaration of love.</span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" ><span class="Apple-style-span" style="font-size: 13px;"></span></span></p><span class="Apple-style-span" ><p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">“I love you…” Nope, no declaration of love here.<o:p></o:p></span></p></span><p></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align: justify;line-height:normal"><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 13px; line-height: 14px; ">Aldan S. Avila, Entry No. 12</span></p>Aldan S. Avilahttp://www.blogger.com/profile/17591830861519917960noreply@blogger.com0tag:blogger.com,1999:blog-7264020219519727946.post-37088932471755323472012-03-08T04:42:00.000-08:002012-03-15T07:22:35.374-07:00Ethics and Technology<p>Apparently, the Pakistani Telecommunication Authority (PTA) released a Request for Proposals (RFP) for the development, deployment, and operation of a "National-Level URL Filtering and Blocking System," calling on institutions to submit a feasible proposal that would allow the government to institute a large-scale filtering system. The RFP requires "[e]ach [filtering] box should be able to handle a block list of up to 50 million URLs with processing delay of not more than one millisecond." While content filtering and blocking has existed in Pakistan for the past few years, it has been executed manually and has thus been inconsistent and intermittent.</p>
<p>So far, five major information technology vendors have pledged not to submit proposals to the PTA RFP: Sandvine, Cisco, Verizon, Websense, and McAfee. Of the five, Websense issued the strongest statement of opposition: "We call on other technology providers to also do the right thing for the citizens of Pakistan and refuse to submit a proposal for this contract x x x Broad government censorship of citizen access to the internet is morally wrong."</p>
<p>What is happening to information technology in Pakistan right now and the reaction to that of the providers mentioned above is a perfect illustration of the nexus between ethics and technology. The refusal to participate in the RFP is an acknowledgment on the part of the firms of the ethical dimension of business. Here, their message was that they will not allow information technology to be used to curtail the right of the Pakistanis to information.</p>
--Jan Nicklaus S. Bunag, Entry No. 12Anonymoushttp://www.blogger.com/profile/06474937153307773456noreply@blogger.com0