Thursday, February 12, 2009
Sunday, January 25, 2009
Computer Ethics
Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Manermid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. in the
Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws.
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute.
1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.
2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.
3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.
4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.
5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.
6) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format.
7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical.
8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.
9) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country's constitution. The discussion, of course, is going on.
10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.
REFERENCE: http://www.geocities.com/lool95/computer_ethics1.htm
Friday, January 23, 2009
2009 Latest trends of technology
Another one is the CES 2009 Minim Plastic Rhythm Gaming Guitar, the RIFF ROCKER. It is small yet powerful, who can imagine that a little thing can play as good as a real Electric guitar.
The third one is the LG's watch phone. It's a touch screen tempered glass face,2 hrs talking Time, 84 grams weight and its a water resistant. You can see the Dialing, Contacts, Tools, Music Text Messaging and Setting in the main menu section of the watch. At the next page, there you can see the strength of the signal, alarm clock, battery indicator, speaker and inbox. at the upper corner of the watch you can see a camera basically use for video calls, then you can see a picture where you can see the person you are speaking with, then you can also see yourself at the other corner, the watch is also blue tooth enabled and it comes with a blue tooth headset which is a primary way that you will receive and make calls. The watch has a three navigation key, the middle button is use to activate the voice recognition features, no need to press anything, you just speak and the phone will recognize your command, well I think this is now the world smallest fully functional 3G phone ever.
Friday, November 21, 2008
Mediatization For The Youth
By: Rev.Fr. Christian Buenafe, O'cram
Media
- the channel through which message is transmitted
- a part of communication process
- "a way of life"
There are many forms of media. First is the folk/traditional Media, this includes drama, dance, rituals, story telling, ballads, chanters, praise singers, meetings, songs, popular theater, drums and the gong's. Second is the Group/Visual Media, this forms includes any visual aid that carries messages, slides, flip arts, poster, stickers, banners, billboard, photos, journal, blackboard, bulletin board, wall paintings, stamps, and video productions. Third is the print Media, this refers to newspapers, magazines, newsletters, manuals, pamphlets, booklets and letters(direct mail). Fourth,is the Broadcast & Electronic Media, this refers to anything that carries messages through sounds and waives,this includes radio, stereos, television, cinemas, video cam, digi cam, CD disks, VCD, DVD, walkman, Mp3, cellular phone, E-mail, i-pod, YouTube and Internet. Fifth is the Non-Communication Media, this refers to face to face conversation, home visits, public meetings, games/contests, group discussion ,role playing, networking seminars and workshops.
"The contribution of Internet, how it became a tool in the world of media and how powerful is computer technology when it comes to it's field"
Nothing is impossible when it comes to media, a channel of information, a way of sending messages from the sender to its receiver and the one which has the biggest contribution to the world of media is the Internet, through world wide connection of internet one would be able to search and locate anything throughout the world with its help. Internet is so important and useful in the world of media, it became a tool and a way of sending messages and spreading out information anywhere in the world. Chatting and meeting new friends, dealing business with your associates abroad, and even shopping through internet is not impossible to do, no need to go in malls and shops. All of these are very easy with the presence of the Internet and that is how powerful the computer technology is in the field of media. Our Contemporary world so called the Miltimedia Age.
The Last Supper Painting "Hapag ng Pag-asa" of Mr. Joey Velasco
A dinner table reveals a lot about hunger, manners and relations. Who sits near the host, who serves the guest or who cares for the youngest, all these are made known at the family dinner.Every child diner at the hapag reveals a story of more hunger than a plate of rice could satisfy. When I first saw the replica of the Hapag painting,the faces and appearances of the children in the painting all look too familiar. I see them everywhere. They march in and out of our consciousness without evoking emotions of pity or disgust. They are simply part of the landscape, their numbers growing everyday. Poverty stares at us in every corner of the land daily that we no longer see it. In the midst of a bleak scenario, Jesus is there. His light shines. His love overflows. Coming from the poor. The reality of Jesus’ love is moving many of us to bring this country from darkness to light, from despair to hope… to rise above division and conflict, to be one people in our journey to our promised land. These are what Mr. Joey Velasco's messages behind his painting. In other ways Mr. Velasco paid those children to pose just for the painting, each child has its own stories in life which can catch the sympathy of his viewers.