Does IT really matter?

Image result for information technology GIF

                Human beings are normally not comfortable when they are subjected to unfamiliar conditions or situations. Although new things might bring fascination but its uncertainty can create fear in us as well. Starting with these premises would lead me to the discussion of the over-used concept of “comfort zone”.  Information Technology is somehow a threat to someone who is conventional. Being exposed to its complexity would create rejection from others who prefer the “old way”. I can say that I am one of those who fear of being left behind in terms of knowledge about technological advancement. However, as I become familiar with the convenience of IT and introduce myself to the ease and comfort it provides, I realized that IT really matters. It opens a lot of opportunities for me to develop skills which I never thought I could learn. Those skills that have relevant impact in my personal growth and professional capabilities. IT has ignited my resourcefulness and creative imagination. The various topics made me think also outside the box and new discoveries about the power of IT had amazed me surprisingly. It freely allows me to express my ideas and let me take different point of views in making decisions.Image result for information technology GIF

                The laboratory activities have definitely help me improve my professional skills especially in making group presentations with collaboration technique through Google docs, structuring marketing or statistical surveys through Google Form and creating database of company information. These knowledge and skills can also be used for future plans of putting up a business. Granting that IT does not only has advantages, I can say that the benefits outweigh the marginal costs. We just have to be responsible and careful in using it. IT has almost an infinite  power. However, it is still us – human beings, have the ultimate power to either control IT or destroy IT under the guidance of the omnipotent One from above.

Photo Credit/s:

https://bit.ly/2ITmoWw

https://bit.ly/2H2Xofh

Socia Media: A New Platform for Robbery

Who among us will not be fascinated by social media? Even a 6-year old child has a Facebook account. However, social media does not only create the possibility of robbery of our personal information but it also robs our precious time and attention from our loved ones. Here are some of the benefits and problems that a social media can bring us.

 

Software Piracy: A legal matter or a social problem?

Image result for GIF software piracy    The famous Machiavellian theory states that “the end does not justify the means”. It emphasizes that the doer cannot be vindicated from his or her unethical act even if she/he has a noble cause. Nowadays, especially in the Philippines, it seems that piracy is being accepted by many as something “legal” like buying stuffs which are classified as class A or imitation. Piracy is defined as the unauthorized use or reproduction of another’s work or in simple terms “illegal copying”. For example, although there is an anti-piracy campaign in the country, people still purchase pirated CDs and DVDs. These people if asked why they choose to buy pirated copies of movies or music would say that they’d rather spend their money to food for their family or purchase something more important than buying original copies of DVDs/CDs. Piracy could cost a lot to business owners, artists, or to companies who have the right for the reproduction and profits for selling their very own masterpiece. However, this kind of piracy is just in a smaller scale. Software piracy is the next big thing for perpetrators. For me, no matter how self-sacrificing the reasons of these culprits, they should be liable for their doings since they rob billions of money from the software owners or developers. Although companies have implemented complex and aggressive solutions to address       the problem, customers are somehow irritated or pissed off by the safety measures that go along with the software usage. These could discourage customers from buying the said software and put the business into impending loss.Image result for GIF software piracy

Many sites recommend various ways on how to combat software piracy. One of which that I think could be effective for companies is doing a regular software inventories. Just like making inventories of consumer goods, software should also be given the same attention. Product name of each piece of software, version number and serial number must be recorded during installation in each computer. Random or unannounced audits could also be done. By doing so, we’re not just helping the software owners or developers protect their rights but we’re are also keeping the confidentiality of our own organization’s vital information. The organization should also emphasize the value of integrity to employees. Ethical standards should be established to remind employees of the company rules in using its IT resources.

Reference:

https://tek.io/2pDeb1y

Photo Credits:

https://autode.sk/2G3DRig

https://bit.ly/2pCKugu

 

“Sharing is Loving” with Knowledge Management

Image result for GIF knowledge management

“Knowledge is power! Kung walang knowledge, walang power!” is a famous line for Filipinos popularized by the late Ernie Baron, a weather reporter of ABS-CBN TV Channel. Knowledge is undeniably a magnanimous power that could move mountains. Now, the question is “How can we harness and manage knowledge if it intangible and oftentimes uncontainable? Knowledge Management has been developed as a practice to answer this question. KM is concerned with increasing awareness, fostering learning, speeding collaboration and innovation, and exchanging insights. Its impact could be maximized with the use of technology. The major goal of KM is to somehow capture and document the valuable work-related tacit knowledge of others and convert it into explicit knowledge that can be shared with others. As an employee working for a pharmaceutical company (UNILAB), I could say that KM would be very beneficial in formulating marketing strategies and seizing sales opportunities. This could be used in gathering the best practices in each region. However, the geographical location of medical representatives and the demographics of each territory  could be the barriers of implementing KM in UNILAB or in any pharmaceutical company. It will be costly for the company to hold a regular assembly or conference to deliberate, solicit ideas and strategize for core business processes because employees are assigned in different provinces.

Image result for knowledge is power gif

Knowledge could be utilized at its full potential if it is being shared. “Knowledge is power but knowledge sharing is empowerment”. Sharing of ideas can stimulate everyone’s innovative skills. We know that two heads are better than one. It is beneficial that there’s someone who can be the devil’s advocate and criticize one’s idea. By doing so, the best ones emerge. Knowledge contained in a nutshell is futile.

Photo/Video Credits:

http://bit.ly/2G23X4s

http://bit.ly/2DzL0AH

Business Intelligence: A tool for predicting the future

Image result for tumblr business intelligenceBulk of company processes are now dependent to business intelligence tools especially those organizations in developed countries. A lot of ease is being provided by business intelligence in the extraction, analysis and presentation of various data to come up with a wise decision for the company. Thus, the application of Business Intelligence must be incorporated to core business processes in order to expedite operation. However, encouraging other members of the organization to effectively use BI tools could be challenging since it is perceived to be another call for “change”. Related image

Proper orientation and training on using specific BI tools could bridge the gap and lessen resistance from employees. A thorough discussion of the advantages or convenience of BI tools should be tackled for the entire organization in order to clarify vague areas and remove the fears from the employees. For example, the top management can cite numerous uses of data mining in predicting the future conditions, forecasting sales, and analyzing customer buying behavior. They can further emphasize that improved decision making for business opportunities is attainable with the help of business intelligence. Image result for tumblr business intelligence

Reward programs could help worried employees to entice them and ignite their interest to learn about new things such as BI tools. Instead of punishing employees who cannot immediately grasp the whole procedure, it’s better to motivate them in a positive way. Maybe, at first, the progress of developing employees’ skills is slow in pace. But once each of them will have an open mind and the willingness to carry on company goals, then it’s going to be beneficial for the organization in the long-run. Pay raises based on job performance for the duration of adapting the new process of BI tools could also stimulate the eagerness of employees to support company direction. Yet, we cannot do this always because it could lead to misinterpretation of the compensation system. It’s possible that employees would demand salary increase every time a new policy or process will be injected to their job function. They should understand that innovation is always part of the company objectives as it evolves through the years. Business intelligence could be used as a weapon to combat competition and survive the global market.

Photo credits:

http://www.fabcomlive.com

https://financesonline.com/business-intelligence-software-analysis-features-benefits-types-pricing/

http://www.dpipartners.co.uk/blog/2015/11/25/outsourcing-story

Online Shopping: Offers pure convenience?

Shopping has come to a new level and platform. Consumers now have the option of buying stuff online instead of doing it traditionally, avoiding the long lines at the mall or cashier counters for payment. However, does online shopping offers pure convenience only. How safe it is to engage in such kind of shopping? Have a glimpse of the different perceptions of two online shoppers I know personally….

              So based on my friends’ feedback about online shopping, this has given them a lot of convenience when it comes to choosing stuff at the comfort of their homes. They could just read reviews and product descriptions online to give them a background of the items they would like to buy. There are some things that they are resistant to buy though such as clothes, shoes, jewelry and gadgets. So just like normal consumers, some people have their own preferences when it comes to buying. All I can say is “be wise as a consumer” or just like the famous line goes about social media “think before you click”.

“Work of Magic or it is just wireless network?”

The power of wireless network technologies for me is like “magic”. Everything is instant in a blink of an eye. I can’t completely imagine how faster our voices over the phone (cellphone) travel from one place to another. It gives us the opportunity to hold virtual meeting and web conferencing even our clients are miles away from us. Furthermore, it provides so much convenience that we can do a lot of things in a paperless manner. We can also save plenty of time through digital collaboration like using the Google docs. A very simple example of wireless network power is an electronic mail. Every email you receive is a by-product of a wireless network technology. Can you imagine how much time is being saved if we will just compare e-mail with a snail mail?

Quickly list every gadget using your wireless network

If any of you have seen the TV advertisement of HITACHI, you will be amazed how wireless network technology made them popular and trending. They hype on their primary message to the public that they can predict the future, inspire the next.

Image result for hitachi inspire the next logo

Any organization can benefit from the wide-range of opportunities being offered by wireless network technologies. A reputable company can get closer to its customer or clients through wireless network technology. You can deliver training initiatives to your employees, shareholders and business partners around the world at a most convenient time for all. Nowadays, we can do a lot of things online like banking, hotel reservations, postgraduate studies, among others.

However, every opportunity of WNT should be paired with utmost responsibility or accountability. Before we drown ourselves to every comfort it provides us, we must be guided to ensure safe usage. For instance, if you have your WIFI connection at home or at work, you should secure your network with a unique password on your router to avoid unauthorized users or access. Here a few simple things that you should do to secure your wireless network:

  1. Open your router settings page. …
  2. Create a unique password on your router. …
  3. Change your Network’s SSID name. …
  4. Enable Network Encryption. …
  5. Filter MAC addresses. …
  6. Reduce the Range of the Wireless Signal. …
  7. Upgrade your Router’s firmware.

Reference:

https://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/

Photo Credits:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRosdi3XOsEYtrS8DTF_f4GQjfOCFvQ91II7fdVaeKmOC0uzSKObg

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSrbPTdkRLYd2aCiZxExEINk53XuGSukr_YM5VmmU2m8ryTa4wB

Warning: Data Breach Detected!

         threat

IT has brought storing of information to a new level in this modern time. Organizations now have adopted various IT systems and applications to keep the confidentiality of their information. However, we should always be reminded that human is still the main driver, master and great creator of all these IT stuff. Thus, nothing about IT is completely secure when human intervention manipulates everything. Human could also be the ultimate destroyer of what he has created.

                Now, if you are a manager, will you advise the top management to outsource its IT security?  If you can develop your own IT system and secure it through your competent and trustworthy IT specialists (take note, trustworthy), then MAYBE it’s an advantage for your company for cost saving purposes. You can’t say that it’s purely favorable situation for the organization because it entails a lot of risks. Personal interest of those IT specialists from within the organization might prevail at some point if they are not satisfied with their working condition and company direction. They might sell the internal information with the competitors in order to get even with the company. Integrity of IT group might be challenged if the decisions of the organization do not favor their goals. It’s possible also that if the IT system of the company contains strategic planning, the IT specialist might put up his own business and use the company’s data or strategies for his own advantage.

security

                If the company has to entrust its IT security to an outside organization, palpable risks couldn’t be avoided as well. A service provider might also divulge confidential information to other organization in the same industry at a certain cost. The leak of information could destroy the entire business. It could result to scandalous law suit against the global service provider and magnanimous losses for the company. The situation might be triggered by an intense and unhealthy competition in the market.

                However, if the company is left without a choice but to outsource its IT security, certain agreements must be made and binding between the outsourcing organization and service provider. Just like any other contracts between two parties, sanctions or legal punishments must be equated to any violations or breach of agreements being committed. If I have to recommend stipulations, I will hold the service provider be liable for any amount of company’s internal information being shared in public or for personal use without the consent of the principal or outsourcing organization. Both parties should enter into legal contract in order to preserve the confidentiality of the transactions, processes and strategies.

References (Images):

http://www.motionelements.com/stock-video-11023481-security-breach-computer-screen-login-and-password-alert-security-warning

http://www.benefitspro.com/2017/08/07/accidental-data-breaches-remain-the-leading-cause

Information System : A powerful tool for managers’ decisions

 

A certain organization which aspires to be globally competitive must be well-equipped with the advancement of Information System. Managers must have the necessary skills to carry out the company’s goals through the power of IS. For me, basic technical skills, interpersonal skills and conceptual skills are the three (3) most important skills needed by the managers in dealing with IS decisions.

 

Image result for a manager's technical skills

Basic technical skill is a must to have at least a simple understanding of Information System. A manager doesn’t have to be an IT genius for him to be effective in his function.  What he needs is a clear picture of the company’s processes and the relevant variables that affects the whole operations.  Only by then, he will know what information or data the Information System of his organization should contain.

 

Related image

Interpersonal skill is another skill a manager must have before he/she can participate in any decision for the organization. Making decision on what kind of Information System to invest on is a very vital just like other decisions that a manager should make. However, a manager should have good relationship with those people in the organization who have the technical expertise. He must know how to build a team with combined skills. He should bring out the best in other people and motivate them to reach their full potential. A good manager must maximize the skills available in the organization. He can only do it if he has the capacity to connect with those people and be able to make them move for the benefit of the whole organization. Others would say, if you can’t do it (IT processes), let the experts do it for you.

 

Image result for puzzle and manager

Conceptual skill is also important in choosing what kind of Information System must be adopted for the organization. Robert Katz defines conceptual skills as the ability to diagnose and analyze complex situations within the organization and its external environment that affects the operation. No matter how huge or substantial the information is being stored by an organization but the managers don’t have the skills on how to utilize this information wisely and express their ideas; these resources will remain to be purely numbers and sets of words. Managers must analyze the data available and create competitive advantage out of it for the organization. If you don’t have the conceptual skill, it’s like you have all the pieces of the puzzle but you can’t form the whole picture out of the pieces of it.

 

 

References:

Fundamentals of Management: Essential Concepts and Applications. 5th Edition by Robbins, S.P. and D.A. DeCenzo; Pearson Education Inc., New Jersy

http://www.google.com.ph/images

IT and Me

       Image 1         Information Technology is being feared by people who are used already to the routine in doing their daily tasks. Getting out of your comfort zone is undeniably challenging and risky. These are the people who are hesitant to embrace change.

                Honestly, at first I am one of those people who are not comfortable of adopting the complexities of Information Technology because some IT concepts, applications, terms and procedures seem to be foreign for me. In short, it’s not my line of interest. No wonder why I am not a fan of online video games. For me, it’s a waste of time. I’d rather sleep than spend couple of hours with the screen monitor. However, I came to realize that it was a misconception. IT has offered a lot of help in making life easier. It’s up to us how we use it and set our priorities. What I need is to understand and identify first the advantages of using it. It has made my job a lot easier. It definitely maximizes my time. For example, we used to have a manual liquidation of our various transactions in the organization. Since we adopted an IT system, we were able to liquidate transactions on time because of the online process of doing it. Furthermore, we are able to track now lost receipts easily.

Facebook is a great product of IT. We now have social media that gives us the opportunity to communicate to our friends and loved ones around the globe in real time. IT makes communication faster despite the distance. Even we are miles apart; we can reach anyone by just logging in to social media websites.

In long-range planning and forecasting of sales, IT has been also an effective tool for me. I can simply create mathematical formula and drag the numbers then get the projection right away. I have saved a lot of time from doing it manually or solving it with a calculator.

As everyone says that there is only one thing in this world which is constant – change. But we don’t have to fear change. Sometimes, change is good only if we can spell it correctly and understand the real meaning of it.