Software Piracy has become a pressing and prevalent issue nowadays. The propensity of this problem has already gone beyond breaking the natural and geographical boundaries of every nation, regardless of economic conditions and growth, be it in a developed or developing environment. But the problem of software piracy has also been a subject of arena for discussion especially on the Ethical issue and its moral uprightness, though some defend its propriety in view of economic and business reasons.
Now, we are confronted with this basic question whether is it reasonable to blame someone for using pirated software when it costs two months’ salary to buy a legal copy of MS Office? My answer would be in the negative.
With all humility, I say no (as to the issue of reasonableness of blaming), as long as the purpose of the Computer user to avail of or use of a Pirated software is merely for personal development, advancement and academic exercises, and not for monetary or business gains. I believe that for all intents and purposes, the same can validly justified. The dictum which states that: “The end can justify the means” may squarely find its application in the question/issue given.
Simply put, what is more important, (setting aside the issue of morality and legality), is the intention and the purpose of the user to use pirated software. After all, it is a recognized basic and universal right that every person has right to know and to have access to information.
As to the second question, and if I maybe allowed to recommend that the best approach that a software companies can use to combat the piracy problem apart from punitive measures is to strengthen its media campaign to instill in the minds of every user that Software Piracy is a form theft, or simple act of Stealing of another’s property.
Stealing is a crime. But its true sense of meaning does not simply results to an act of taking the property of another person without his/her knowledge or consent crime but also a violation of the rule of law—the law of man, natural law and above all, the Divine Law. In fact, “Thou shall not Steal” is among the prohibited acts in the Ten Commandments.
To impose unto the minds of every software users that the observance of computer ethical standards and be conscious with one’s action is the supreme good one can discharge as a mission in the cyber world.
Blog # 5- Knowledge Power
An Illustrious Man has once said, (thou I pray, may his soul rest in eternal peace) “Knowledge is Power… Pag walang knowledge, walang Power”.
True enough, in this highly competitive world, one must have the required knowledge to be on top or to remain on top. Knowledge is indeed a source of power, and that there being no knowledge, this world may still on the state of darkness, voidance and emptiness. But how could we sustain the gift or the innate knowledge if we fail to manage sensibly such knowledge in order to survive not only for this present generation but more importantly to the future ones. The antidote to this perceived dilemma is to create a system called Knowledge Management- a transfer knowledge, sharing with what you’ve got—an act of kindness and altruism…
Academically, Knowledge Management (KM) refers to a multi-disciplined approach to achieving organizational objectives by making the best use of knowledge. KM focuses on processes such as acquiring, creating and sharing knowledge and the cultural and technical foundations that support them.
But could this Knowledge Management benefit much to the organization I am working now? My answer would be on the affirmative. By and large, the development of Knowledge Management within my organization (Pag-IBIG Fund) will sustain the success of its operations and the continuity of the proficiency, aptitude, competence at work. While it is currently practice that we maintain the so called “repository of all applicable and pertinent jurisprudence and opinion, yet a formal training for a transfer, and sharing of knowledge is about to institutionalized. Creating an milieu of mentorship by developing a program for knowledge receiver and provider can enormously systematize the management.
In one of the authority article, it lays down the following benefits that can be drawn up from Knowledge Management, and in simple terms can best be discussed as: In today’s information-driven economy, companies uncover the most opportunities — and ultimately derive the most value — from intellectual rather than physical assets.
To get the most value from a company’s intellectual assets, KM practitioners maintain that knowledge must be shared and serve as the foundation for collaboration. Yet better collaboration is not an end in itself; without an overarching business context, KM is meaningless at best and harmful at worst. Consequently, an effective KM program should help a company do one or more of the following:
- Foster innovation by encouraging the free flow of ideas
- Improve decision making
- Improve customer service by streamlining response time
- Boost revenues by getting products and services to market faster
- Enhance employee retention rates by recognizing the value of employees’ knowledge and rewarding them for it
- Streamline operations and reduce costs by eliminating redundant or unnecessary processes
On the other hand, I believe that among the biggest barriers in Knowledge Management is that the Users perceived lack of incentives to share knowledge: This barrier arises out of the structural imbalance between knowledge seekers and knowledge providers. The knowledge provider, while able to provide knowledge, typically has little or no incentives to do so, i.e. why would anyone in the organization benefit from my experiences and knowledge? The knowledge seeker is highly incentives to receive knowledge but unable to do so without the cooperation of knowledge provider.
Blog #4
Business Intelligence represents the tools and systems that play a key role in the strategic planning process of the corporation. These systems allow a company to gather, store, access and analyze corporate data to aid in decision-making. Generally these systems will illustrate business intelligence in the areas of customer profiling, customer support, market research, market segmentation, product profitability, statistical analysis, and inventory and distribution analysis to name a few.
Today, most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to use a wide range of software programs, such as Excel, Access and different database applications for various departments throughout their organization. Using multiple software programs makes it difficult to retrieve information in a timely manner and to perform analysis of the data.
In the retail organizations and other companies with large vendor pools, they often struggle to differentiate products and services to their own end customers. Creating rewards program is one of the efficient methods to increase popularity in the market spectrum and running a branded awards program allows companies to increase brand exposure and revenue by engaging and marketing to existing customers and prospects.
On the other hand, a punitive program can work both ways for the advantage and disadvantaged of the organization. For one, a punitive program can be helpful to safeguard the business secrets of the corporation as well as deter unauthorized use of the confidential datas and leakages of its well-kept information. Providing a punitive program thru the business intelligence can pose a warning on the employees and other interested users to be apprehensive in using the system since it is coupled with corrective and punitive features. This may however, work to the organization’s disadvantage when the punitive program creates a unreceptive environment to the employees, leaving them with no further room for development by minimizing their optimum potentials.
While raising the pay based on job performance that would require employees to make use of BI applications is good effort for the organization to set a smart incentive. By using the BI application will reduce the delay and muddling of information causing loss in the business operation, operational system and the entire organization.
Blog # 3
Shopping spree is indeed an exciting activity to avert stress and loosen up from bustles of life. The architectural façade of shopping centers, the modernity of facilities, luxury and arresting charm of items being sold, fascinating mall personnel; relaxing and comfortable ambiance, keeps the customers mesmerized and drives them going back to shopping malls and commercial complex.
Yet, in these modern times, shopping has been made too easy and so convenient without need of going physically to the malls merely to buy your needs. With the correct access and assistance of the Information Technology via the Internet, shopping is just a click and finger tips away from home. By browsing in the various sites and surfing within the galaxy of product being offered for sale, these items can even be delivered straight to your door steps.
The modern facility of shopping using the internet really helps a lot for those consumers who lack the luxury of time to go mall and commercial centers to do shopping. Convenience and time saving are among the practical benefits can be drawn from this modern facility.
But practical as it seems to be, this only applies to those who have enjoyed the cyber literacy and techie donkey, and thus less convenient to those still living under the state of antiquity and archaic psyche. However it be so convenient and fitting to enjoy internet shopping but if power outage looms the community, coupled with slow connectivity and old-age IT infrastructure, the same can negate its innate simplicity.
With this in mind and without hesitation, I would rather go on Internet shopping of this product such as the electronic gadgets, e.g., cellphones, laptop and tablets. But with a second thought, I wouldn’t venture to buy the following: animals, plants and cars. And more importantly, I won’t dare to thru the internet personal inner garments such as brief, lingerie’s, panties, bras, and the like. You can never tell that these items might have been a use by other persons and passed on at a second hand form.
Blog #2 Outsourcing IT Security
Nowadays, it is but a common practice by the business enterprises, government entities and agencies to resort to outsourcing its minor or major business processes for practical, budgetary, legal, and economic reasons by hiring experts on IT to formulate program and computer system to suit their business need. This may sound good thou in the business world, but the fear for piracy of confidential information and the exposure of business secrets will dominate as one of major issues on outsourcing of security code on organizations Information Technology.
Legal consequences and consideration will likewise sets in particularly on the royalty and intellectual property rights. While it is an accepted terms and conditions in the Service Contract on formulation of IT system and program that upon conclusion of the services rendered, the ownership and property right over the created program will belong the client, still, it will drew peril and risk on the client. At very least, the secured and confidential information of the client will no longer be protected as it will exposed to danger of plagiarism and unwarranted reproduction.
This being a new concern on the IT industry that calls upon our lawmakers to craft a legislation that will protect the rights and interest of the organization hiring the services of the IT experts from unwarranted and unscrupulous larceny of information and trade secrets.
IT and Me
Information Technology, or IT for brevity, has indeed taken over the lives of humanity. Undeniably, the advent of the computer age, thru the cyber era of Information Technology has enormously influenced our day by day routine. We have been predominantly reliant with the use of computers, so much so that our day will never be complete without logging-in in the social media or browsing in the internet or surfing in our favorite sites. This reality now becomes inevitable and for this reason that I wish to share my thoughts on the topic IT and Me.
To begin with, the existence and availment of Information Technology has its own innate Perks and Perils just like other facility of modern device – a call of Loss and Gain Principle. The use of Information Technology has created an immeasurable world by going beyond territorial boundaries and exchange of knowledge becomes limitless. The information around the globe can easily be access and dispatched in a matter of seconds thru your fingers tips. Convenience and comfort in the acquisition of knowledge and information are among the greatest benefits that humanity can receive from the use of Information Technology.
On the other, too much dependency on the use of IT will also adversely affect our lives. Using the technology beyond moderation, with a smear of being irresponsible will result to loss of privacy and time vis-à-vis some other important activities. The presence of incessant and regular power outage posed a great threat to the user of Information Technology as the facility will never be available if there is no electricity. This renders the machine and system idle.
Thou the foregoing are mere tip of the iceberg– as I believe that more things and matters has to be said and done, yet let me post this as a matter of simple insight on IT and Me.