Seoul Accord Annual General Meeting

The Seoul Accord’s Annual General Meeting (SAGM2016) was held last June 3-5, 2016 at the Royale Chulan, Kuala Lumpur Malaysia. Read more

PSITE National Board (AY 2016-17)

Due to the recent developments with the PSITE National Board, the board met and reconvened in Manila on 15-March-2016 and held another election. Congratulations to the new set of officers listed below, they will bring PSITE into even greater heights! Soar high, PSITE! Mabuhay!!! Read more

Thailand Educational Benchmarking

Last May 23-28, 2015, I joined the Benchmarking Educational Tour of the PSITE National Board in Bangkok, Thailand. Read more

(ACTIS 2014, Japan) Asian Conference on Technology, Information and Socity

Last November 20-23, 2014, I attended and presented a paper entitled “Best Practices and Challenges of Information Technology Education in the Philippines. Read more

SEOUL ACCORD General Membership Meeting

The Accreditation Board for Engineering Education of Korea (ABEEK) invited me to attend the Seoul Accord General Meeting (SAGM2013(Seoul)), Millennium Seoul Hiiton, Seoul, Korea last June 21 to 23, 2013. Read more

Indonesia Educational Benchmarking

Last May 18-25, 2014, I joined the Benchmarking Educational Tour in Jakarta, Indonesia. Read more

PICAB MOA Signing

Philippine Information and Computing Accreditation Board -- MOA signing Read more

2013 NESRC

Pix taken during the 2013 National Engineering and Science Research Conference (2013 NESRC) held at the Heritage Hotel, Roxas Blvd, Pasay City last March 7, 2013 Read more

PSITE NATCON 2013

PSITE NatCon 2013 Opening Remarks; Read more

SMART SWEEP 2013

A team of four students from the Institute of Computing of the University of Southeastern Philippines clinched the Ideaspace Award and a PhP 100,000 cash prize; Read more

Hongkong Benchmarking Educational Tour

I joined the PSITE National Board Hongkong Benchmarking Educational Tour last January 03-06, 2013; Read more

eGOV Awards 2012

From a shortlist recommended by DOST-ICTO, i was invited to be one of the judges of the eGOV awards final judging last November 8, 2012 at Oxford Hotel, Clark Freeport Zone, Pampanga; Read more

10th National Conference on Information Technology Education

Delivered by Dr. Randy S. Gamboa, PSITE President, during the NCITE 2012 October 19, 2012 in Laoag City; Read more

Top 10 Finalists for the 9th SWEEP Innovation and Excellence Awards!

Two entries from the Institute of Computing had been shortlisted as top 10 finalists for the 9th SWEEP Innovation and Excellence Awards!; Read more

10th Philippine Youth Congress on Information Technology(Y4IT)

The Philippine Youth Congress on Information Technology or "Y4iT" (Youth for IT) is an annual event hosted by UP ITTC and UP SITF in cooperation with the UP ITTC Student Volunteer Corps, JICA, PSITE, CSP, PCS, PSIA, GDAP, EITSC, HSF, and Cyberpress. … Read more

Board Meeting

pix taken during the national board meeting last August 17-19, 2012 at Club Balai Isabel, Barangay Banga, Talisay Batangas.; Read more

Certificate of Recognition: Best Paper

The University of Southeastern Philippines held its 25th University Wide In-House Review; Read more

IBM Web Application Development Training

The Institute of Computing through its extension office with IBM and the Philippine Society of Information Technology Educators-Region X1 … Read more

ARIGATO GOZAIMAS

Konnichiwa , On behalf of the participants both from the Philippines and from other countries, I would like to thank the Association for Overseas Technical Scholarship or ….Read more

Monday, July 30, 2007

DORA's Paper -3

Watershed Rehabilitation with a Community-Based Focus: The Davao City Water District Experience
Rodora Gamboa
July 26-27, 2007, WaterFront Insular Hotel
delivered during 2nd National Convention of the Water Environment Association of the Philippines (WEAP)


It has been more than a decade since davao city water district first embarked on a rather ambitious undertaking that integrated its concerns for the environment alongside its agenda of providing economic opportunities for poor communities as well as its social responsibility to help improve the well-being of those in the uplands.

With this presentation, we hope to demonstrate how DCWD was able to weave these concerns into its watershed rehabilitation project using a participatory approach within a community-based setting.

ON the verdant slopes of the mt. apo natural park quietly nestle TWO of davao city's most important water resources. a visit during a clear day WILL TREAT YOU TO a breathtaking vista of rolling hills and ridges swaddled with dense vegetation as you set foot on their great expanse.

THE LUSH AREAS, WHICH HAVE A COMBINED LAND USE COVER OF ABOUT 39,210 HECTARES, ARE HOME to numerous species of flora and fauna. THEIR OLD-GROWTH FORESTS OFFER SHADE AND SHELTER TO AN ESTIMATED 460,899 PERSONS OR 33 PERCENT OF THE CITY'S POPULATION, WHICH includes CEBUANOS, BOHOLANOS, ILONGGOS, ILOCANOS, AND indigeneous FILIPINOS LIKE THE BagoboS, KalaganS, TausogS, TagabawaS, MaranaoS and ManoboS.

This is THE mt. talomo-LIPADAS watershed, a veritable lifeline that provides water to more than 147,000 households in davao city. LOCATED about 20 kilometers away from the poblacion, it is a dependable resource that benefits both the city's upland and lowland dwellers. AROUND 53 VILLAGES OR BARANGAYS, REPRESENTING 29 percent of the city's 182 barangays, are found inside the watershed.

FOR many years now, THe rehabilitation of this WATERSHED HAS BEEN A SHOWCASE OF THE IMPACT OF PARTICIPATORY DEVELOPMENT on the lives and livelihood of those in the highlands. with the assistance of DCWD, PEOPLE IN THREE UPLAND COMMUNITIES INSIDE the watershed have been working together to rehabilitate a DENUDED PORTION OF THIS VERY CRITICAL WATER RESOURCE. more importantly, the project has helped emplower communities through the creation of robust people's organizations that later on became cooperatives.

AS WE ALL KNOW, Watersheds LIKE TALOMO-LIPADAS are natural drainage areas that hold and store runoff water before it flows to rivers and other bodies of water. THEY portray a crucial role in ensuring the availability of abundant, potable water that utilities supply to communities in different parts of the country.

Because of deforestation, however, many watersheds IN THE PHILIPPINES have been proclaimed by presidential edicts as watershed forest reserves.

To protect them from further harm, philippine congress passed Republic Act 7586 otherwise known as the National Integrated Protected Areas System Act of 1992. the law provided that all areas declared as watershed forest reserves may not be destroyed, exploited or opened for settlement. Despite its passage, there has been, in general, little mitigation in the process of environmental decay.

In the early 1990s, a water crisis brought about BY global climatic changes such as the el niÑo phenomenon threatened to affect many parts of the PHILIPPINES. The grim scenario led the government to pursue more initiatives that would protect the remaining watersheds.

FOR ITS PART, the Philippine Association of Water Districts WENT INTO partnership with the Local Water Utilities Administration and the Department of Environment and Natural Resources in launching Project Evergreen, which was designed to alleviate forest denudation. several utilities soon embarked on their own watershed rehabilitation projects.

One of them was Davao City Water District. Formed on November 3, 1973 pursuant to the provisions of Presidential Decree 198 or the Provincial Water Utilities Act of 1973, DCWD originally functioned as a quasi-public corporation. Starting 1992, however, it operated as a full-pledge government utility by virtue of a Supreme Court decision.

Considered as the Philippines' largest water utility outside Metro Manila, DCWD runs and maintains a water system that distributes and supplies water coming from forty-eight (48) pump wells and two (2) surface water sources that serve 155,238 active service connections found in 104 barangays, which represent 57.14 percent of the city's 182 barangays. Most of the water (98 percent) that DCWD supplies to some 776,190 customers, which represent 55.58 percent of the city's total population, comes from underground sources.

Davao City is blessed with abundant ground and surface water resources. In recent years, HOWEVER, deforestation, unregulated water extraction, unauthorized agricultural conversion, poor waste management and squatting have all conspired to hasten the degradation of these water resources, particularly the mt. talomo-lipadas watershed, which is renowned for its biodiversity.

In light of this, DCWD vowed to protect one of davao's primary water resources, a posture that is not only in keeping with its corporate social responsibility but also an exercise of one of its legal rights.

soon, IT came up WITH an ambitious plan to rehabilitate a critically endangered area within the Mt. Talomo-Lipadas Watershed. the area covered by the community-based project lies inside the Mt. Apo Natural Park, which is considered the headwater of the Lipadas River.

The project sought to attain the following objectives:

Rehabilitate 530 hectares of open denuded land;

Minimize environmental degradation through soil and water conservation measures;

Establish basic infrastructures;

Facilitate the creation of sectoral organizations in the project sites;

Establish a relevant and effective educational program; and

Establish the Ecology and Capital Build-up funds for the sustainability of economic endeavors;

Right from the start, dcwd knew that the people's participation WAS very critical in the rehabilitative effort. Thus, IT adopted community participation as its core strategy to prepare the people in the uplands for the challenging tasks that lay ahead.

SITE SELECTION. selectiNG THE communities that would BECOME dcwd's partners was no easy task. since funds for the project were quite limited, the utility needed to come up with a set of criteria for prioritizing the project sites. these are as follows:

People in the barangays have little or no objection/resistance to the project or to DCWD;

An influential group or person has expressed initial support for the undertaking;

There are few or no ongoing development projects in the upland areas; and

No serious peace and order problems are obtaining in the villages.

FINALLY, DCWD identified three upland communities to be the site of its community-based watershed rehabilitation project. they include the barangays of tungkalan, daliaon plantation and manuel guianga.

PRE-IMPLEMENTATION. dcwd found the collection of baseline data about the communities the most critical activity during the pre-implementation stage.

Information from the said survey, which was completed in 1994, was later used in the preparation of community profiles, development and management plans and strategies, decision-making, monitoring and evaluation, process documentation, and problem identification and solving.

COMMUNITY ENTRY, IMMERSION AND INTEGRATION. because of unpleasant past experiences, upland villagers generally treated government agencies with distrust. hence, It was necessary that an outsider whom the people can trust be sent to immerse and study the three barangays.

To gain entry into the areas, DCWD sought the assistance of the Community Organizing-Davao Experience (CODE) Foundation, one of the more established NGOs operating in Davao City. CODE then dispatched a community organizer (CO) to the sites.

Aside from studying and gathering data, the CO also acted as an intermediary between the communities and DCWD. He stayed and worked with the villagers until they felt that assistance on a daily basis was no longer needed.

Formation of Core Groups. CREATING the core group was an equally crucial phase in community organizing as this body was the basic building block for a people's organization. Upon the CO's departure from the barangay, DCWD expected this group to take over the responsibilities that he will leave behind.

In choosing the members who will compose the core group, the CO considered those who have displayed leadership potentials and have extensive interpersonal relations with other community members. He also selected those who are well respected by the villagers, are open-minded and can clearly verbalize the community's problems and aspirations.

CONDUCT OF CAPABILITY-BUILDING PROGRAMS. dcwd, through the CO, conducted information, education and communication (IEC) activities to keep people updated on the developments relative to the project.

The utility also organized an exposure trip and conducted a number of seminars for them.

Mobilization and networking. Most of the problems facing their respective barangays required the villagers to go beyond the narrow confines of their communities to search for lasting solutions and to forge strategic alliances with other organizations with similar interests who can help boost their efforts at community development. thus, the CO exposed them to mobilization and networking activities to STRENGTHEN their confidence and readiness to take action on whatever problems they encounter.

Formation of people's organizations. after the prerequisites were done, the formation of the three people's organizations was formalized. Thus, the Lipadas Watershed Tungkalan Association (LIPWATA), the Daliaon Plantation Lipadas Watershed Association (DAPLIWATA) and the Sarro Lipadas Watershed People's Organization (SALIWAPO) came into being.

Conversion to cooperatives. In less than five years after their creation, the POs were registered as cooperative enterprises.

As cooperatives, they engaged in money lending, charging the loans with minimal monthly interest.

They also entered into service contracts with DCWD wherein it was stipulated that the fruit-bearing trees planted in the project areas will be owned by the occupants after five years. with this, the utility hopes that the people's desire in keeping the watershed areas protected from encroachment and degradation would be sustained.

Establishment of nurseries/plantations. A year after the project took off, nurseries and plantations were established and managed by caretakers paid by the utility. PO members participated actively in soil gathering and polybagging, establishment of seedbed, sowing of seeds, and installation of nets and dried leaves that served as partial shades of the seedlings.

Monitoring and evaluation. these mechanisms were created to address two key concerns: first, whether or not the project is proceeding as scheduled/planned; and second, whether or not the targets/outputs in terms of number of hectares replanted/rehabilitated, seedlings distributed, community meetings conducted, among others, are being met.

Several valuable gains in the form of lessons and insights can be derived from the project. these may be summed up as follows:

Put premium on people development and empowerment. DCWD saw to it that the financial needs of the communities are addressed first and foremost.

Engaging their services as partners in the planting, replanting and maintenance of trees enabled the utility TO help them financially by compensating their efforts.

Through the project, the grassroots were empowered to do something about their plight, which eventually led to the formation of cooperatives.

Involve community members every step of the way. this meant giving them priority and listening to what they have to say. Their opinions on how the project should proceed must be respected and, if possible, woven into the decision-making process out of genuine concern for their well-being and not mere lip service.

Know and respect the community's social beliefs, customs and traditions. Understanding the way the decision-making structures of community members OPERATE has enabled the utility's project implementers better handle certain situations, ESPECIALLY IN THE CASE OF INDIGENEOUS PEOPLES. Knowledge of the socio-cultural, economic and political conditions of people affected by the project has gone a long way in helping dcwd SUCCESSFULLY MANAGE THE PROJECT.

Build and sustain a climate of trust, fairness and understanding among the stakeholders. To foster goodwill and sustain community interest, involvement and commitment throughout THE WHOLE process, the utility sent its people on a periodic basis to sit and discuss relevant issues, concerns and possible solutions with the stakeholders. These visits, which served as bridges of interpersonal trust and confidence, helped the parties involved voice their perceptions, sentiments and opinions and arrive at a consensus.

Employ various methods to encourage and maintain community participation. There are several techniques that can BE utilizeD to encourage and sustain community participation. Each technique has its pros and cons. EFFECTIVE COMMUNITY PARTICIPATION MEANS EMPLOYING THESE BASED ON CERTAIN SITUATIONS.

To sustain the REHABILITATION project's gains, dcwd LAUNCHED the "Adopt-a-Site" Project, WHICH sought to:

Ensure continuity and sustainability of the watershed rehabilitation project;

Encourage direct and/or indirect involvement of government agencies, NGOs, private corporations, civil society and individuals in managing and developing watershed protection and conservation projects; and

Provide a venue for interested individuals taking their family and friends to an "eco-camp" in the area and enjoy nature through the eco-friendly "mountain trek".

IN SUMMARY, DCWD'S EXPERIENCE HAS SHOWN THAT AN ENTITY WANTING TO PURSUE A COMMUNITY-BASED WATERSHED REHABILItATION PROJECT MUST BE prepared TO GO THROUGH A PAINSTAKINGLY COMPLICATED BUT REWARDING PROCESS THAT INVOLVES THE FOLLOWING:

SITE SELECTION BASED ON A SOUND PRIORITIZATION CRITERIA;

PRE-IMPLEMENTATION ACTIVITIES INCLUDING ESTABLISHMENT OF BASELINE DATA ;

COMMUNITY ENTRY, IMMERSION AND INTEGRATION;

FORMATION OF CORE GROUPS;

CONDUCT OF CAPABILITY-BUILDING PROGRAMS;

MOBILIZATION AND NETWORKING of the project communities;

FORMATION OF PEOPLE'S ORGANIZATIONS;

CONVERSION OF THESE poS TO COOPERATIVES;

ESTABLISHMENT OF NURSERIES AND PLANTATIONS; AND

PERIODIC MONITORING AND EVALUATION AT THE COMMUNITY LEVEL.

IN RETURN, such experience yields SEVERAL VALUABLE LESSONS AND INSIGHTS. hence, it can now be told that in a watershed rehabilitation project it is IMPORTANT TO:

PUT PREMIUM ON PEOPLE DEVELOPMENT AND EMPOWERMENT;

INVOLVE COMMUNITY MEMBERS EVERY STEP OF THE WAY;

KNOW AND RESPECT THE COMMUNITY'S SOCIAL BELIEFS, CUSTOMS AND TRADITIONS;

BUILD AND SUSTAIN A CLIMATE OF TRUST, FAIRNESS AND UNDERSTANDING AMONG THE STAKEHOLDERS; AND

EMPLOY VARIOUS METHODS TO ENCOURAGE AND MAINTAIN COMMUNITY PARTICIPATION.

Community participation as a flexible approach to local development has, to a great extent, enabled the utility to realize that it can also become a "big brother", a social reformer, a change agent at the community level by supporting and allowing ordinary villagers being affected by its undertakings to identify their problems, propose and implement solutions and monitor and evaluate the outcomes of those solutions.

In closing, I WOULD LIKE TO THANK THE PEOPLE BEHIND THE WATER ENVIRONMENT ASSOCIATION OF THE PHILIPPINES FOR MAKING US A PART OF THIS EVENTFUL GATHERING.

AND FOR THOSE WHO WANT TO KNOW MORE ABOUT OUR WATERSHED REHABILITATION PROJECT, WE ARE MORE THAN WILLING TO SHARE OUR EXPERIENCES WITH YOU. YOU MAY CONTACT US THROUGH THE INFORMATION BEING FLASHED ON THE SCREEN.

GOOD DAY TO EVERYONE!

Saturday, July 21, 2007

MCITE - Call for Paper 2

Philippine Society of Information Technology Educators Foundation, Inc.
Region XI


20 July 2007
Greetings from the Philippine Society of Information Technology Educators Foundation, Inc. (PSITE -Region XI Chapter)
Once again, we are inviting you to attend and present papers at the Mindanao Conference on Information Technology Education (MCITE '07). The final schedule is on September 20-21, 2007 at the University of Mindanao, Mini-Auditorium , GET 2 Bldg., Matina Campus, Davao City.
See you all in Davao City.
RANDY S. GAMBOA, PhD
PSITE-XI President

-------------------------------------------------------------------------------

Announcement and 2nd Call for Papers
5th Mindanao Conference on Information Technology Education (MCITE ’07)
September 20-21, 2007
Venue : University of Mindanao, Mini-Auditorium ,
GET 2 Bldg., Matina Campus, Davao City


Organized by:
Philippine Society of Information Technology Educators Foundation Inc. (PSITE XI)

In cooperation with:
Council of Deans in IT Education – Region XI (COD-ITE XI)
The Philippine Society of Information Technology Educators – Region XI (PSITE XI) and the Council of Deans in IT Education, cordially invite you to attend and present papers at the 5th Mindanao Conference on Information Technology Education (MCITE ’07) scheduled on September 20-21, 2007 at the University of Mindanao, Mini-Auditorium, GET 2 Bldg., Matina Campus, Davao City. About 200 delegates, mostly administrators, educators, researchers and students, participated in previous conferences.

Topics for Paper Presentation at the Congress are:

· Computer Science
· Computer Systems
· Modeling and Simulation
· Programming Methodologies
· Mathematics for Computer Science
· Theoretical Computer Science
· Information Management
· E-Learning
· Computational Science
· Software Engineering
· Software Projects
· E-Commerce
· Best Practices in Information Technology
· Information Systems
· Computer Education
· Artificial Intelligence
· Asynchronous Learning
· Authoring tools
· Automata
· Building E-Learning Architectures
· Collaborative Learning
· Community Building
· Compiler theory
· Computer-supported collaborative learning
· Courseware Development
· Customer Training
· Decision support system
· Developing an Organizational e-Learning Strategy
· Developing, Integrating, and Delivering E-Learning Solutions
· Digital divide
· Digital Libraries for E-Learning
· Distance Learning
· e-Academic
· e-Business
· Educational Management
· Educational multimedia
· Educational Park
· e-examination
· e-government
· e-learning
· Electronic Publishing Tools for E-Learning
· e-Research
· e-tutor
· e- University
· Evaluation/Performance Measurement & Assessment
· Expert system
· Good Practice Concepts & Examples
· Human-computer interaction
· Hypermedia
· ICT & Knowledge
· Industry-University Partnering
· Infrastructure of E-Learning Environments
· Innovative Curriculum in E-Learning
· Instructional Design for E-Learning
· Intelligent E-Learning Technology
· Interactive E-Learning Systems
· interactive learning
· Interactive Multimedia Systems
· Knowledge & Education
· Knowledge & Leadership
· Knowledge Management
· Knowledge Management in E-Learning
· Knowledge Modeling
· Knowledge representation
· knowledge-based system
· Knowledge-Based Systems
· Learning & Content Management Systems
· Learning Organization
· Management information system
· Management of Learning Resources
· Marketing/Promoting Learning Activities
· Multimedia-based E-Learning Systems
· Online education
· Online learning
· Organizational E-Learning Strategies
· Pedagogical & Issues
· Policy and Law
· Quality Management and Assessment in E-Learning
· Research Perspectives for E-Learning
· Simulations
· Societal Issues, Including Legal, Standards, & International Issues
· Technology integration
· Virtual Universities, Classrooms, and Laboratories
· Web design
· Web-based learning


Program of Activities:

September 20, 2007 (Thursday)
AM
08:00 – 08:30 – Registration
08:30 – 09:15 – Opening Ceremony
Invocation
National Anthem
Roll Call of Participants
Welcome Address
Opening Remarks
Intermission
Inspirational Talk
09:15 – 10:00 – Plenary Speaker 1
10:00 – 10:15 – BREAK
10:15 – 11:00 – Plenary Speaker 2
11:00 – 11:45 – Plenary Speaker 3
11:45 – 12:00 – Sponsor Time

PM
01:00 – 01:45 – Plenary Speaker 4
01:45 – 02:30 – Plenary Speaker 5
02:30 – 03:15 – Plenary Speaker 6
03:15 – 03:30 – BREAK
03:30 – 04:15 – Plenary Speaker 7
04:15 – 05:00 – Sponsor Time

September 21, 2007 (Friday)
08:00 – 08:30 – Registration
08:30 – 09:15 – Plenary Speaker 8
09:15 – 10:00 – Plenary Speaker 9
10:00 – 10:15 – BREAK
10:15 – 11:00 – Plenary Speaker 10
11:00 – 11:45 – Plenary Speaker 11
11:45 – 12:00 – Sponsor Time
01:15 – 02:00 – Plenary Speaker 12
02:00 – 02:45 – Plenary Speaker 13
02:45 – 03:00 – BREAK
03:00 – 03:45 – Plenary Speaker 14
03:45 – 04:30 – Plenary Speaker 15
04:30 – 04:45 – Sponsor Time
04:45 – 05:00 – Closing Ceremony
Distribution of Certificates
Closing Remarks


Dates to Remember:
Last Day for Submission of Abstracts : 10 August 2007
Notification of Acceptance : 17 August 2007
Full Text Submission
(with Slide Presentation) : 02 September 2007

Fees:
P 1,300.00 – PSITE members
P 1,800.00 – Non-PSITE members
Local Organizing Committee:
PSITE REGION XI
COD-ITE XI

Registration:
MS. RITCHIE MAE GAMOT
University of the Philippines- Mindanao Campus
Email:

Submissions of Abstracts:

MS. MARICAR R. CASQUEJO
CHED-RO XI
Email: rams_0424@yahoo.com

MR. EDWIN MARAÑON
Ateneo de Davao University
Email: evmaranon@gmail.com

MR. VIC CALAG
University of the Philippines-Mindanao
Email: viccalag@yahoo.com

MR. RANDY S. GAMBOA
University of Southeastern Philippines
Email: rsgamboa@usep.edu.ph


Submission Guide and Form

Contributed papers should follow the formatting guidelines based on the ACM Word Template for SIG Site (see attach file)

Monday, July 16, 2007

JOINT PSITE/CDITE Assembly

COMMISSION ON HIGHER EDUCATION XI
COUNCIL OF DEANS FOR I.T. EDUCATION
c/o Ateneo de Davao University, Roxas Ave., Davao City
Telefax (082)224-2957/E-mail: CDITE_XI@yahoogroups.com

ACES, ADDU, AMACC, BC, CCSA, CJC, DNSC, DCSP, DOSCST, EC, HCSD,
ICC, DDC, JMC, JP2CD, PCT, SPAC, SPC, STI, UIC, UM-Main, UP-Min, USEP, and UM-Tagum

04 July 2007


Fellow IT Education Program Head/Administrator:

The Council of Deans for IT Education in Region XI (CDITE-XI) and the Philippine Society of IT Educators-Region XI (PSITE-XI) Core Group are having a Joint Assembly on July 20, 2007, Friday, 1:00-5:30pm at the Dormitory of the University of Southeastern Philippines (USEP), Barrio Obrero, Davao City.

In a nutshell, the Joint Assembly will have the following activities:

· Registration and Preliminaries
· Session on CHED Updates
· Session on E-Learning Trends
· President’s Report (CDITE-XI and PSITE-XI)
· Treasurer’s Report (CDITE-XI and PSITE-XI)
· Election of New Set of Officers for SY 2007-2008 (CDITE-XI and PSITE-XI)
· Closing Ceremonies

We expect to see you and your alternate once again during the Joint Assembly. A registration fee of Php100.00 per participant will be collected to defray the expenses for food, materials and certificates.

We also would like to remind you to pay your institutional membership fee of Php1,000.00 for SY 2007-2008 during the assembly, if possible. For those who have not yet paid for the past schoolyear(s), please do so.

Thank you.


Sincerely,


Edwin V. Marañon
President, CDITE-XI, SY 2006-2007

Noted by:

Dr. Maricar R. Casquejo
ITE Programs, Education Supervisor II, CHED RO-XI

Thursday, July 12, 2007

CASE STUDY 7

CASE STUDY No.7

March 28, 2007 — CIO — The report on global warming issued in February by the United Nations’ Intergovernmental Panel on Climate Change concludes unequivocally that our planet is getting hotter. And, as we approach Earth Day April 22, the evidence that it’s all our fault is stronger than ever.

As we go about our busy lives, running our ever more powerful, ever more ubiquitous computers, we are effectively turning up the planet’s thermostat. Gartner estimates that carbon dioxide emissions related to the operation of servers and PCs account for 0.75 percent of the annual global total, and that’s before factoring in emissions generated by cooling the boxes. Add to that the emissions generated by telecommunications networks, and IT’s contribution to the atmosphere’s greenhouse gas load is “probably in excess of 2 percent,” says Simon Mingay, research vice president with Gartner, adding that that’s “a big number for what is essentially a single device.” In fact, emissions tied to that device, the computer, are comparable to the level of greenhouse gasses being produced by all the world’s airplanes as they crisscross the skies above us. Now what are CIOs doing about that?

Green Goes Mainstream

Companies today face a panoply of environmental issues, from how much electricity they consume (produced by power plants that run on fossil fuels) to how they deal with toxic wastes. But in most enterprises the CIO has played a minimal role in decisions that affect the environment. For the most part, no one has asked them to do anything more. But sooner rather than later, someone—your boss, a big customer or a government agency—is going to want to know what you’re doing to comply with, support or advance your company’s efforts to become more environmentally responsible. This demand will not stem merely from an altruistic desire to behave responsibly (although that’s a fine reason); rather, corporate sustainability (as being cognizant of your impact on the planet is now called) has become a cost of doing business. Global regulations that put limits on toxic chemicals and emissions now reach from the manufacturing floor into the data center.

And having an understanding of and an appreciation for one’s effect on the environment increasingly is proving to be good for the bottom line. A recent report concluded that there’s a direct correlation between good environmental practices and sound overall management. The report’s authors—Marc Orlitzky, a lecturer with the Australian Graduate School of Management, and Frank L. Schmidt and Sara L. Rynes, both professors with the University of Iowa—say good corporate citizenship can help companies build the skills and infrastructure they need to cope in turbulent times, as well as improve efficiency.

Daniel Esty, director of the Center of Business and Environment at Yale University, points to a multitude of examples in which employing IT that attends to the planet helps companies cut costs or raise revenue. “One of the key tools that companies have used to develop an eco-advantage is good data collection,” says Esty, coauthor, with Andrew Winston, of Green to Gold: How Smart Companies Use Environmental Strategy to Innovate, Create Value and Build Competitive Advantage. “Having a strong set of metrics and indicators allows companies to manage inputs better, reduce waste and achieve higher productivity,” Esty maintains.

The Cost-Benefit Analysis

Charity begins at home, and the CIO’s responsibilities start with the IT department. According to Gartner, the pervasiveness of computing equipment in most companies makes the IT department a major source of negative environmental impact. Mitigating that impact will have its cost. All your hardware contains toxic materials that in many places must be recycled. The European Union recently toughened regulations for disposing of old computers; other nations and many U.S. states also have rules for recycling electronics. Meanwhile, new equipment, designed to be energy efficient and comply with regulations for use of toxic substances, may become more expensive if vendors decide to charge a premium for green products.
But the good news is that every company with a data center has a vein of green waiting to be mined. “Any organization that wants to improve its environmental footprint is going to look at power consumption,” notes Mingay. “If the company is a professional services, banking or insurance kind of business, IT will probably be the biggest consumer of power by a long way.”

Fixing the Data Center

As Senior Editor Stephanie Overby writes in “Clean, Green Machines,” data centers consume between 1.5 percent and 3 percent of all the power generated annually in the United States—at the high end, that’s equivalent to the electricity needed to power the state of Michigan for one year. But most IT departments don’t have a good grasp of their electricity bills because they don’t control the facilities their data centers occupy. One company, VistaPrint, where the IT department does manage its data center facilities, discovered that its electric bill was projected to skyrocket if the company, which sells custom printed products online, grew as predicted.
When Cable & Wireless, which hosts one of VistaPrint’s data centers, threatened to charge the company extra to cover the cooling costs for its blade servers, then-CIO Wendy Cebula (now the company’s COO) asked her IT operations director to improve energy efficiency. The project eventually led to the construction of a second, more energy-conscious data center in Canada, where hydropower provides a renewable, lower-emissions source of electricity. The company now projects savings of 70 percent on its electricity bills. It will also save $450,000 annually by replacing its blade servers with virtual machines that use more server capacity and consume less power. Within a year, VistaPrint will be reducing the emissions from its data centers to a degree equivalent to taking more than 100 cars off the road for a year.

VistaPrint has benefited in part from the increasingly heated competition among chip makers and server vendors to out-green each other. But which server provides the greatest power consumption savings for the buck depends on how you plan to use it. Existing benchmarks that measure application performance or CPU utilization aren’t much help because they don’t measure power consumption, notes Brent Kirby, a product manager with AMD. Groups including the Standard Performance Evaluation Corp. and the U.S. Environmental Protection Agency are researching a new generation of benchmarks that address server electricity usage, while an effort among computer manufacturers known as The Green Grid aims to identify best practices for data center power management.

Meanwhile, using more efficient cooling systems, or simply sealing holes in your data center’s floor, can reduce energy consumption and, ultimately, greenhouse gas emissions. Your company wins by lowering its energy costs, and the planet wins too.

The Green Advantage

IT’s contribution to corporate sustainability doesn’t stop at the data center door. New and nticipated environmental regulations are prompting companies to reexamine everything from their business processes to their product lines.

As Associate Staff Writer Katherine Walsh writes in “Can IT Make Your Company Green?”, companies are beginning to pay more attention not only to what goes into their products but how those products are made. And whether they’re tracking systems for monitoring plant emissions, using databases to analyze material use or implementing operational controls, they need IT to do it. These systems can pay dividends beyond keeping companies out of legal trouble, or having their noncompliant products barred from global markets. At Dow Chemical, CIO David Kepler says technology investments that monitor energy use have saved Dow billions.

Other systems are expected to generate top-line revenue growth by helping companies make better products. Both furniture maker Herman Miller and Timberland, which makes outdoor apparel, cater to environmentally conscious customers (and satisfy regulators) by developing products using recycled materials and eliminating toxics from their production processes. IT integrates the databases that track the use of materials with those that manage the production processes in order to optimize the efficiencies the companies reap from these green initiatives.

You have an advantage if your company has already made environmentally sound practices a priority. In Chicago, the law firm Kirkland & Ellis is constructing a green building, with design parameters that include lower power consumption and more efficient air conditioning. (To see the specs for the building, read “Designed for IT,”

“There are regulations, there are savings to the firm and there’s just being a good citizen,” says Kirkland & Ellis CIO Steve Novak. “If there’s any way you can reduce consumption, it’s good for all.”

If your company has not embraced its environmental responsibilities, it’s only a matter of time efore it will be forced to or suffer the consequences. “Green issues are going to be climbing up the consumer and investor and media agenda,” notes Gartner’s Mingay. “At some point in time, this increased focus is going to affect the enterprise.” The question CIOs have to answer is, Will you be ready?

READER FEEDBACK

Syed Raza Thu, 2007-05-03 14:01
I am wondering if all these efforts make any difference in the global warming. As the use of IT and Internet grows the demand for more and more servers and other equipments grows every day. But the point is does going green make a difference or not? Bush has removed us from already signed Kyoto treaty, which has some set goals to get back to a certin CO2 level. Now without any set goal is it going to make any difference? Remember US is the highest source of CO2 emission.

As the demand always grows I think all this will be futile unless we have some International binding treaty. It is like a drop in the ocean - meaningless.


Instruction :

1. Please make your comment/s on the article above in no less than 500 words.

2. Use this thread for your softcopy answer/s. Hardcopy answer should reach my table on July 13, 2007 (Friday) on or before 10:00am.

3. Check this BLOG everyday … new case study might be uploaded

Tuesday, July 10, 2007

CASE STUDY 8

CASE STUDY No.8


Why we hate e-mail


Once a time-saver, the inbox has become a burden. That's why boldentrepreneurs stand to get rich fixing it, writes Business 2.0 columnist Om Malik.By Om Malik, Business 2.0 Magazine columnistJuly 2 2007: 1:10 PM EDT



Business 2.0 Magazine) -- E-mail, what is it good for? Absolutely nothing! But itwasn't always so. A lifetime ago, I signed up for CompuServe and received myfirst exposure to electronic messaging. My reaction: Cool. Now I don't have to callpeople and leave voice-mail. Zapping information back and forth at the speed oflight will be a big productivity boost.


How naive I was. E-mail became the Internet's first killer app -- and therein liesthe problem. As software goes, e-mail is almost socialist: From each according tohis ability, to each whether or not he needs it.


-mail ought to be reinvented to meet the needs of our always-connected lives.Startups like Xobni are trying to make e-mail inboxes easier to handle, but theyjust don't go far enough. What they're doing is akin to giving a New Yorktenement building a makeover by putting on a new facade but not getting rid ofthe termites and roaches.


10 ways to get a grip on your e-mailThat means there's still a mega-opportunity to reinvent the entire medium. Howbig? According to the Radicati Group, a market research firm, there are about 1.2billion e-mail users and 1.8 billion active e-mail accounts worldwide. And in muchof Asia and Latin America, Internet usage is still low. When those people showup in full force, e-mail traffic is going to increase exponentially.And yet, e-mail sucks. If you're like me, you spend hours of your valuable timeseparating the wheat from the chaff. My first cup of coffee is cold by the time I'veeven scanned my inbox. Some people, like venture capitalist Fred Wilson, havedeclared "e-mail bankruptcy": the complete inability to keep up with messages,followed by mass deletion and a plea for legitimate correspondents to send newones.


That even the most tech-savvy among us are unable to cope indicates anunderlying problem: E-mail has become a crutch, a way of passing the buck.Want to make an appointment? That's 10 messages back and forth. Then thereare corporate updates, birthday announcements, forwarded jokes, and (if you'reme) the occasional amorous ditty.


How David Allen mastered getting things done


Here's where e-mail's socialism turns from strength to weakness: It doesn'tmatter if the message comes from a spammer hawking Viagra, your wife askingyou to pick up some wine, your boss telling the company that Monday is aholiday, or a client asking for a meeting at his office at 11 a.m. In today's inboxes, all e-mail messages are equal.


In reality, of course, some are more equal than others. Spam, alerts, andcalendar items all need to be treated separately. A smart inbox would -- all in oneinterface -- catch spam in junk filters, display the wine reminder in an IM, movecompany news to an RSS feed, and intelligently negotiate appointment requests
with your calendar in the background.All these technologies exist -- it's just a matter of pulling them together. Thepayoff could be huge. If Google (Charts, Fortune 500), Microsoft (Charts, Fortune500), and Yahoo (Charts, Fortune 500) aren't up to the challenge, I'm sure one ofyou is brave enough to try. I'll gladly be among the first to sign up for the betatest. Just don't send me an e-mail about it.


Instruction :
1. Please make your comment/s on the article above in no less than 500words.


2. Use this thread for your softcopy answer/s. Hardcopy answer should reach my table on July 14, 2007 (Saturday) before 08:00am.


3. Check this BLOG everyday … new case study might be uploaded

CASE STUDY 5

CASE STUDY No.5

As the use and the advancement of computer networks especially the Internet has increased dramatically during the past few years, I.T. security is fast becoming the top priority for most of the companies implementing and using I.T. as part of their business process.

The National Cyber Security Alliance (NCSA) provided some guides to both the home and corporate users to help prevent their computer systems from being compromised. Here are the top ten security tips that you should always put in mind:

1. Use anti-virus software and keep it up to date.
Make sure you have anti-virus software on your computer. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need regular updates. The more often you keep it updated, the better.

2. Don’t open emails or attachments from unknown sources.
A simple rule of thumb is that if you don't know the person who is sending you an email, be very careful about opening the email and any file attached to it. Should you receive a suspicious email, the best thing to do is to delete the entire message, including any attachment. Remember that even friends and family may accidentally send you a virus or the e-mail may have been sent from their machines without their knowledge.

3. Protect your computer from Internet intruders by using firewalls and internet security appliance. Equip your computer with a firewall and with internet security appliance. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other valid data/request to reach your computer.

4. Regularly download security updates and patches for operating systems and other software. Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. You need to be sure you download and install the patches and getting it from the correct patch update site.

5. Use hard-to-guess passwords. Passwords will only keep outsiders out if they are difficult to guess. Don’t share your password, and don’t use the same password in more than one place. If someone should happen to guess one of your passwords, you don’t want them to be able to use it in other places.

6. Back-up your computer data on disks or CDs regularly. Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network.

7. Don’t share access to your computers with strangers. Unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Don’t share access to your computer with strangers.

8. Disconnect from the Internet when not in use. Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you’re not online lessens the chance that someone will be able to access your computer. Someone could infect your computer or use it to
harm someone else on the Internet.

9. Check your security on a regular basis. You should evaluate your computer security and policies at least twice a year. Look at the settings on applications that you have on your computer. Check what settings you have and make sure you have the security level appropriate for you.

10. Make sure your family members and/or your employees know what to do if your computer becomes infected.

It’s important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password.

Instruction :
1. In your own little way, suggest 10 more ways to help prevent the computer systems from being compromised. Also suggest ways to HELP our laboratory from being compromised.

2. Use this thread for your softcopy answer/s. Hardcopy answer should reach my table on July 13, 2007 (Friday) at exactly 08:00am.

Check this BLOG everyday … new case study might be uploaded

JEDI-1

July 09, 2007

Dear :

Greetings !

WELCOME to Jedi Community!

We wish to invite you and your faculty members to attend the JEDI Phase I Training on August 29-31, 2007 at the Institute of Computing laboratory room, Engineering bldg., University of Southeastern Philippines, Bo. Obrero Campus,

Please be reminded that you need to bring with you printed copies of the JEDI Phase I course materials. You can download these files at :

http://files.filefront.com/Intro_to_Programming_1zip/;6878122;;/fileinfo.htmlhttp://files.filefront.com/Intro_to_Programming_2zip/;6878289;;/fileinfo.htmlhttp://files.filefront.com/Data_Structureszip/;6878320;;/fileinfo.html

As a requirement, please go to http://www.java.net/ and http://developers.sun.com/ and get your ID's. Please email me your ID's on these sites so we can add you to the JEDI Community.

We are providing this training as a supplementary activity to help teachers deliver the JEDI course effectively. In fact, the training is divided into two parts: Technical and Delivery. The technical part will discuss the concepts related to java and object-oriented programming in general. The delivery part focuses more on techniques in teaching the courses.

A registration fee of Php500.00 per participant will be collected to defray the expenses for food (lunch only) and certificates.

Should you have any questions or clarifications, do not hesitate to email me at jedi@sun.com.ph.

Regards,

Hazel Marie Cainglet
JEDI Marketing Coordinator
Sun Microsystems, Phils. Inc.
Mobile: 921-6521435
Tel: 885-7867
Fax: 885-7866
email: jedi@sun.com.ph

JEDI

July 09, 2007


To all PSITE Region XI Institutional Members:

An invitation to become a JEDI Member and attend a JEDI Teacher/ Trainer Training:

Sun Microsystems, Philippines, Inc. with its partner UP-JRDC and in cooperation with PSITE are proud to present JEDi ( Java Education & Development Initiative) .
JEDI is a collaborative project that aims to make high-quality, industry-endorsed IT and Computer Science material available for free to Universities and Colleges in the Philippines. The course material is developed with inputs from industry and conforms to international education standards and requirements of the Commission on Higher Education ( CHED).

BENEFITS OF BECOMING A JEDI MEMBER
· Free access to the courseware and resources for teaching a whole suite of subjects in the Cs and IT curriculums such as teaching slides, teacher and student manuals, sample exercises/exams and various reference materials.
· Free software such as Netbeans, J2SE and various development tools and platforms that are used for illustration and actual hands-on exercises, lab work and research work
· Access to the java.net online community collaborating on JEDI
· Access to a JEDI helpdesk to assist the teachers in using the course materials
· Participation in various JEDI events for students and faculty such as competitions, symposia and other for a
· Opportunity to undergo JEDI TEACHER TRAINING

To those interested, kindly process your application and send it to Dr. Randy S. Gamboa (rsgamboa@gmail.com) or send it via email to jedi@sun.com.ph

You may visit the website http://jediproject.net

Thank you and God bless.

Sincerely,

Hazel Marie C. Cainglet
JEDI Marketing Coordinator
Sun Microsystems, Phils. Inc.
32flr, Philam Life Tower
Paseo de Roxas
Makati City
Tel: +632-885-7867 loc 322
Fax: +632-885-7866

Sunday, July 8, 2007

Research Capsule Proposal-2

I. Program / Project Title :
Development of Information Technology Architecture for the University of
Southeastern Philippines as a Competitive Advantage-Yielding Resource
and Reduce Total Cost of Ownership

II. Proponent :

RANDY S. GAMBOA, PhD – Project Leader

III. Significance of the Project/Study :

The implementation and utilization of an organizational architecture, specifically ITA, can enable better management of Information Technology resources to the university.

The ITA will also have these specific benefits to the university:

1. Provides a comprehensive view on IT policies, principles that indicate direction, services and common solutions, standards and guidelines.
2. Improved ability to share and efficiently process information.
3. Ability to respond faster to changes in technology and business needs, thereby it helps in planning migration to new technologies
4. Helps insure interoperability inside and outside.
5. Consistency in hardware and software platforms, thereby reducing the cost of support, maintainability, and integration

IV. Objectives:

The objective of the study is to develop information technology architecture for the University of Southeastern Philippines as a competitive advantage-yielding resource and reduce total cost ownership.

Specifically, this study is conducted to:

1. Design a model of the information technology architecture that shows the specific
components vis-à-vis the resources of the university;
2. Provide sets of directions and make necessary recommendation for the University’s IT
infrastructure including human resources, hardware, operating systems, networks, databases, and other infrastructure services as well as components, data and other development tools.
3. Establish a strategy that will map out the total model of information systems and corresponding IT resources requirements leading to more responsive services to the university. 4. Guide in the process of planning, acquiring, modifying, interfacing and developing IT resources throughout the University.

V. Review of Literature

Information Technology Architecture (ITA) is a blueprint that is developed, implemented, maintained, and used to explain and guide how an organization’s Information Technology (IT) and information management elements work together to efficiently accomplish the mission of the organization. It is a conceptual design for the implementation of information technology in an organization, including its hardware, software, and network technology platforms, data resources, application portfolio, and information system organization to meet specific organization goals and strategiest In short, it shows the way an organization’s information components should be deployed to deliver its goals. ITA shows how IT components will be used and managed within the organization. It enables better management of Information Technology resources.

Moreover, the ITA of an organization can be an essential reference model that can help administrators in the formulation of their short-term strategic or long-term development plans. One example, the Laredo Independent School District (LISD), Texas, USA, they were able to use the ITA as a springboard to significantly improve the internet and intranet connectivity of all schools within the district. Through the ITA, they were able to analyze and evaluate current IT operations of the whole district. They diagnosed problems and flaws of the current infrastructure and came up with solutions and strategies to further improve the infrastructure. Also, the ITA became one aspect in the formulation of their three-year and five-year purchase plans.

The University of Southeastern Philippines itself recognizes the advantages of IT solutions in the delivery of public service as many other universities have successfully done. Executive Order No. 265 of July 2000 commissioned all government units including State Universities and Colleges (SUCs) to formulate an Information System Strategic Plan (ISSP). An ISSP serves as a framework for the organization’s effort to computerize its operations. It shows the organization’s intention to use information technology to help realize its vision, mission and goals. It aims at directing IT application towards mission critical, public-service-sensitive, development-management-supportive and revenue-generating areas of the government.

As a whole, the ISSP embodies the organization’s overall strategic plan for the development and implementation of information systems, the use of IT and the corresponding resource requirements over a fixed long-term period. It is a natural component of the organization’s planning process and should be considered a tool to ensure IT application in strategic areas of government concern and map out its IT direction.

Early this year, a committee was tasked to review the university’s ISSP for possible implementation and make recommendations. The committee recommended the establishment of an ICT Center and that an actual inventory of ICT resources (manpower, budget, equipment and other peripherals) be conducted.

It is in this respect that this research proposal is conceptualized. This proposal will complement the review of the ISSP of the university. It makes the ITA as an IT resource that would enable the university achieves competitive advantage. By doing this, it is imperative to analyze the university ITA’a ability to yield a competitive advantage through the mediation of IT resources. The study will apply the theories of complementarities and resource-based view.

VI. Analytical Framework/Methodology

As defined in the previous sections, Information technology architecture (ITA) is a conceptual design for the implementation of information technology in an organization, including its hardware, software, and network technology platforms, data resources, application portfolio, and information system organization to meet specific organization goals and strategies. In short, it depicts the way an organization’s information resources should be deployed to deliver certain vision or goals (Martin, et. al., 2002). Thus, ITA depicts conceptually how IT will be used and managed within the business.

Martin classifies components of ITA into technological assets and human assets. The technological assets are the desired specifications about the hardware and operating systems, network, data and data management systems, and application software. The human asset components involve the state of the personnel, values, and management systems aspects of an IT system. Together, these elements specify how the business parts of managing the IS department will be conducted, how business managers will be involved in decisions, and how IS decisions will be made (Martin, 2002). Figure below contains the components of Information Technology Architecture.
VII. Expected Outputs

ITA provides a systemic understanding of the various components of the information system of an organization. It shows how the technological and human components are structured to achieve certain goals. Hence, ITA is like a blueprint of IT resources within the university that can be used as primary reference in information system planning. ITA can be used to guide the process of acquiring, building, modifying, interfacing and deploying IT resources throughout the organization. As such the IT architecture should offer a means of stable evolution by identifying technologies that work together to satisfy the needs of the university users (Pirkola, G., 1995).

VIII. Workplan

There are risks in doing ITA, it can become a time-consuming and potentially expensive task, therefore a define process flow be followed and making sure that the process fits the situation and needs. Although there is no one require process but they all have some things in common. The total duration for this project is one year which will commence immediately after approval from the university research office.

Preliminary plan for the project implementation consist of 5 work tasks which will be fulfilled for a period of 1 year

WT1. Assess the breadth of need for a university ITA, including documenting principles and assumptions of ITA components (hardware, software, databases, information technology Infrastructure, etc.)
WT2. Document existing ITA de facto components
WT3. Develop specific ITA components addressing the university IT environments.
WT4. Develop a process to introduce, justify and formalize new and evolving ITA components.
WT5. Develop a process to routinely review applicability of ITA components and determine their appropriateness.

X. Budget

Personnel Services
Project Leader 12,000.00
Researcher 8,000.00
MOOE
Supplies 4,000.00
Communication 4,000.00
Documentation and Reproduction 4,000.00
Meetings 2,000.00
Contingency (10%MOOE) 1,400.00

GRAND TOTAL 35,400.00

References:

Martin, E.W. et. al. (2002). Managing Information Technology. 4th ed. New Jersey: Pearson Education, Inc.

Pirkola, G. (1995). An Information Technology (IT) Architecture for ITD. Available: http://www-personal.umich.edu/~gpirkola/IT_arch_doc/Phase1Doc. html#ToC1.

Texas School Performance Review on LISD Website, 2002

Wednesday, July 4, 2007

MCITE '07

Philippine Society of Information Technology Educators Foundation, Inc.
Region XI


03 July 2007

Greetings from the Philippine Society of Information Technology Educators Foundation, Inc. (PSITE -Region XI Chapter)

In behalf of the officers and core group members of PSITE-XI, we would like to invite you to attend and present papers at the Mindanao Conference on Information Technology Education (MCITE '07). Tentatively, the schedule is on September 20-21, 2007 at the University of Mindanao, Mini-Auditorium , GET 2 Bldg., Matina Campus, Davao City.

MCITE '07 is a Mindanao-Wide meeting on Computer Science, Information Technology and Information Management. It will feature well-known academic and business leaders as plenary speakers. Paper presentations are invited. We aim to provide a venue for teachers, researchers and graduate students to share and upgrade knowledge in IT.

PSITE is committed to promoting the development of quality Information Technology Education in the Philippines and is a major CHED partner in this endeavor.

Attached are details of said conference including the program, registration and submission details.

We look forward to your participation.

RANDY S. GAMBOA, PhD
PSITE-XI President


-------------------------------------------------------------------------------

Announcement and Call for Papers
5th Mindanao Conference on Information Technology Education (MCITE ’07)
September 20-21, 2007
Venue : University of Mindanao, Mini-Auditorium ,
GET 2 Bldg., Matina Campus, Davao City


Organized by:
Philippine Society of Information Technology Educators Foundation Inc. (PSITE XI)

In cooperation with:
Council of Deans in IT Education – Region XI (COD-ITE XI)
The Philippine Society of Information Technology Educators – Region XI (PSITE XI) cordially invites you to attend and present papers at the 5th Mindanao Conference on Information Technology Education (MCITE ’07). The holding of this congress was inspired by the success of previous MCITEs held annually. About 200 delegates, mostly administrators, educators, researchers and students, participated in previous conferences.

This year, PSITE XI, in coordination with the Council of Deans in IT Education, is holding MCITE ’07. Tentatively, the schedule is on September 20-21, 2007 at the University of Mindanao, Mini-Auditorium , GET 2 Bldg., Matina Campus, Davao City.

Topics for Paper Presentation at the Congress are:

· Computer Science
· Computer Systems
· Modeling and Simulation
· Programming Methodologies
· Mathematics for Computer Science
· Theoretical Computer Science
· Information Management
· E-Learning
· Computational Science
· Software Engineering
· Software Projects
· E-Commerce
· Best Practices in Information Technology
· Information Systems
· Computer Education
· Artificial Intelligence
· Asynchronous Learning
· Authoring tools
· Automata
· Building E-Learning Architectures
· Collaborative Learning
· Community Building
· Compiler theory
· Computer-supported collaborative learning
· Courseware Development
· Customer Training
· Decision support system
· Developing an Organizational e-Learning Strategy
· Developing, Integrating, and Delivering E-Learning Solutions
· Digital divide
· Digital Libraries for E-Learning
· Distance Learning
· e-Academic
· e-Business
· Educational Management
· Educational multimedia
· Educational Park
· e-examination
· e-government
· e-learning
· Electronic Publishing Tools for E-Learning
· e-Research
· e-tutor
· e- University
· Evaluation/Performance Measurement & Assessment
· Expert system
· Good Practice Concepts & Examples
· Human-computer interaction
· Hypermedia
· ICT & Knowledge
· Industry-University Partnering
· Infrastructure of E-Learning Environments
· Innovative Curriculum in E-Learning
· Instructional Design for E-Learning
· Intelligent E-Learning Technology
· Interactive E-Learning Systems
· interactive learning
· Interactive Multimedia Systems
· Knowledge & Education
· Knowledge & Leadership
· Knowledge Management
· Knowledge Management in E-Learning
· Knowledge Modeling
· Knowledge representation
· knowledge-based system
· Knowledge-Based Systems
· Learning & Content Management Systems
· Learning Organization
· Management information system
· Management of Learning Resources
· Marketing/Promoting Learning Activities
· Multimedia-based E-Learning Systems
· Online education
· Online learning
· Organizational E-Learning Strategies
· Pedagogical & Issues
· Policy and Law
· Quality Management and Assessment in E-Learning
· Research Perspectives for E-Learning
· Simulations
· Societal Issues, Including Legal, Standards, & International Issues
· Technology integration
· Virtual Universities, Classrooms, and Laboratories
· Web design
· Web-based learning
Program of Activities:

September 20, 2007 (Thursday)
AM
08:00 – 08:30 – Registration
08:30 – 09:15 – Opening Ceremony
Invocation
National Anthem
Roll Call of Participants
Welcome Address
Opening Remarks
Intermission
Inspirational Talk
09:15 – 10:00 – Plenary Speaker 1
10:00 – 10:15 – BREAK
10:15 – 11:00 – Plenary Speaker 2
11:00 – 11:45 – Plenary Speaker 3
11:45 – 12:00 – Sponsor Time

PM
01:00 – 01:45 – Plenary Speaker 4
01:45 – 02:30 – Plenary Speaker 5
02:30 – 03:15 – Plenary Speaker 6
03:15 – 03:30 – BREAK
03:30 – 04:15 – Plenary Speaker 7
04:15 – 05:00 – Sponsor Time

September 21, 2007 (Friday)
08:00 – 08:30 – Registration
08:30 – 09:15 – Plenary Speaker 8
09:15 – 10:00 – Plenary Speaker 9
10:00 – 10:15 – BREAK
10:15 – 11:00 – Plenary Speaker 10
11:00 – 11:45 – Plenary Speaker 11
11:45 – 12:00 – Sponsor Time
01:15 – 02:00 – Plenary Speaker 12
02:00 – 02:45 – Plenary Speaker 13
02:45 – 03:00 – BREAK
03:00 – 03:45 – Plenary Speaker 14
03:45 – 04:30 – Plenary Speaker 15
04:30 – 04:45 – Sponsor Time
04:45 – 05:00 – Closing Ceremony
Distribution of Certificates
Closing Remarks


Dates to Remember:
Last Day for Submission of Abstracts : 10 August 2007
Notification of Acceptance : 17 August 2007
Full Text Submission
(with Slide Presentation) : 02 September 2007

Fees:
P 1,300.00 – PSITE members
P 1,800.00 – Non-PSITE members
Local Organizing Committee:
PSITE REGION XI
COD-ITE XI

Registration:

MS. RITCHIE MAE GAMOT
University of the Philippines-Mindanao Campus
Email:

Submissions of Abstracts:

MS. MARICAR R. CASQUEJO
CHED-RO XI
Email: rams_0424@yahoo.com

MR. EDWIN MARAÑON
Ateneo de Davao University
Email: evmaranon@gmail.com

MR. VIC CALAG
University of the Philippines-Mindanao
Email: viccalag@yahoo.com

MR. RANDY S. GAMBOA
University of Southeastern Philippines
Email: rsgamboa@usep.edu.ph


Submission Guide and Form

Contributed papers should follow the formatting guidelines based on the ACM Word Template for SIG Site (see attach file)

Sunday, July 1, 2007

CASE STUDY 4

CASE STUDY No.4

RP IT managers admit Internet downtimes remain a problem
By Erwin Oliva

INQUIRER.netLast updated 04:02pm (Mla time) 06/28/2007
MANILA, Philippines --

More than 70 percent of information technology managers in Philippine companies admit to having Internet downtimes one to three times a month, according to a local study cited by Pacific Internet during a briefing on Thursday.

Pacific Internet is a regional Internet communications service provider that has presence in eight countries in the Asia Pacific region, including the Philippines. It currently has about 600 corporate customers.

The study which was done in 2006 also indicated that it took an average of four hours to "resolve" downtimes, which translated to productivity loss and potential revenue loss, said William Cabelin, product management head of Pacific Internet Philippines.

For many Philippine companies running mission-critical applications, downtimes are a scourge that continue to plague them, Cabelin said.

Last year, Pacific Internet embarked on a project to design a premium solution for the local market that continues to experience unnecessary Internet downtimes.

This year, the company said it has signed up 25 customers, including a major Philippine bank, a logistics company and business process outsourcing firm, among others.

"It took us a while to introduce this solution to the local market because we're trying to feel the market," said Rosamarie Pineda, vice president for marketing of Pacific Internet Philippines.
Pacific Internet's business continuity solution has been available since 2003, but it was only in the last two years that demand picked up, the executives said.

Pineda said mid-tier and small and medium enterprises are now the biggest target clients of Pacific Internet's Optimaxx, which is an premium Internet solution that provides about 99.95 percent network availability.

Developed in the Philippines, Optimaxx is a business continuity solution that is Filipino-made since it was developed under the unique requirements and situation in the country, said Jojie Yap, president of Pacific Internet Philippines.

Due to the demands of the growing business process outsourcing industry, the executive believes that 2007 is the right year to become more aggressive in this business.

Pacific Internet is even throwing a rebate program, which Yap said, will be "punitive" to the local operations of the company. "We believe this product works because we co-created it with our customers," she stressed.

Yap explained that Optimaxx will enable local firms to avoid having more headaches from Internet downtimes, while saving them the trouble of dealing with different telecommunications firm.

Currently, most companies chose to set up their redundant networks and acquired at least two dedicated lease lines from different telecommunications firm. One line is used as a primarily link to the Internet, while the other is for backup.

As part of the regional group, Pacific Internet Philippines plans to roll out this solution in other markets, including Singapore, Hong Kong, Australia, India, Thailand and Malaysia.

Instruction :

Please make your comment/s on the news article above in no less than 400 words.

Use this thread for your softcopy answer/s. Hardcopy answer should reach my table on July 06, 2007 (Friday) on or before 10:00am.

Check this BLOG everyday … new case study might be uploaded

CASE STUDY 3

CASE STUDY No.3

Google is a highly successful Internet business. Recently they have broadened their scope with a multitude of new tools. Research Google’s business model and answer the following questions below. You may add additional information not included in these questions.

Instruction :
Answer the following questions found below, minimum of 350 words per question.

Use this thread for your softcopy answer/s. Hardcopy answer should reach my table on July 04, 2007 (Wednesday) before 10:00am.

Check this BLOG everyday … new case study might be uploaded

Questions :

Explain Google’s business model.
1. Who are their competitors?
2. How have they used information technology to their advantage?
3. How competitive are they in the market?
4. What new services do they offer?
5. What makes them so unique?
6. How competitive are they in the international market?