Infotech Philippines

DigitalFilipino.com's Infotech featuring I.T. news, developments, and features. PinoyTopBlogs.com

Entries "September 2005":

Sunday, September 25, 2005

Handbook for Bloggers and Cyber-dissidents

I have a lot to be personally thankful for with blogs. In a limited time, I have come to understand a lot of issues by just reading the right blogs. The highest recognition will go to the Philippine Center for Investigative Journalism. Their purpose has convinced me so much to the point that I subscribed and even willing to include their subscription in my club membership package. (I hope Alecks will be able to get back to me soon about the rates on that.)

As a nation, Filipinos are going through tough times. This is not only in terms of economics but also in terms of values. The current power play among our politicians creates great confusion and gives a sad reflection on the kind of leaders and political players we have. Nevertheless, vigilance among Filipinos will be vital to our society's survival. We need more Internet users who will blog and report the right and wrong-doings happening in their community. This level of awareness and transparency, although hard and confusing at times, but is part of the rude awakening Filipinos had to do go through in order to make better decisions today and in the future.

For those who don't know how to get started, help is on its way.

Reporters Without Borders published a Handbook for Bloggers and Cyber-Dissidents (in English, French, Chinese, Arabic and Persian), in which experts and bloggers from all over the world advise Internet users, especially those in repressive countries, how to set up their own blogs and get them known, while preserving their personal anonymity.

Reporters Without Borders has produced this handbook to help prospective bloggers, with handy tips and technical advice on how to remain anonymous and to get round censorship, by choosing the most suitable method for each situation. It also explains how to set up and make the most of a blog, to publicise it (getting it picked up efficiently by search-engines) and to establish its credibility through observing basic ethical and journalistic principles.

Many Internet experts helped produce this manual, including US journalist Dan Gillmor, Canadian specialist in Internet censorship Nart Villeneuve, US blogger Jay Rosen and other bloggers from all over the world.

The Handbook for Bloggers and Cyber-dissidents can also be downloaded in five languages (English, French, Chinese, Arabic and Persian) from the Reporters Without Borders website: www.rsf.org.

»9:07 AM    »11 comments (0 )    

Posted by: janette    in: Internet
Saturday, September 24, 2005

8 Must-have books!

Okay, we haven't been posting that much books lately. Fortunately today, we got the chance to scour through several book listings and found the ones we like.

Must have books!

1. Using Moodle by Jason Cole
In recent years, Course Management Systems (CMSs) have matured to the point that they're now considered critical software for many colleges and universities. At a basic level, a CMS gives educators the tools to create a course web site and provide access control so only enrolled students can view it. Beyond access control, a CMS typically offers a wide variety of tools to make a course more effective: an easy way to upload and share materials, hold online discussions and chats, give quizzes and surveys, gather and review assignments, and record grades.  In other words, it's a suite of tools that enhance teaching by taking advantage of the Internet without replacing the need for the teacher.

Moodle is the open source CMS used by more than two thousand educational organizations around the world. Available for free on the Web, (http://www.moodle.org), Moodle can scale from a single-teacher site to a 40,000-student university. Its tool set and features are comparable to those of the leading commercial packages, and the system has the added benefit of being built on a sound education philosophy with a huge, active community that supports and develops it.

The name "Moodle" is both an acronym (Modular Object Oriented Development Learning Environment) and a verb (to let the mind or body wander and do something creative but without particular purpose). Martin Dougiamas, a computer scientist and educator who spends time supporting a CMS at a university in Perth, Australia, created Moodle. Increasingly frustrated with the existing system, Dougiamas learned that engineers, not educators, had designed it. He surmised that a system built by someone who started with the educational process, rather than an engineering process, would be infinitely better than what he had to work with, and so he began to develop Moodle.

"Using Moodle" is written for instructors learning how to use Moodle. The book is more than just a how-to manual; each chapter includes suggestions, case studies, and best practices for using Moodle effectively. The book also exposes little-known but powerful hacks for the more technically savvy users.

2. Behind Closed Doors: Secrets of Great Management by Johanna Rothman (blog) and Esther Derby (blog)
Getting the computer to do the right thing can be difficult at times, but getting people to do the right thing is even harder. If you've ever wondered what real management is all about, or if you're currently working as a manager or tech lead, you need this book. Full of tips and practical advice on the most important aspects of management, this is one of those books that can make a lasting and immediate impact on your career.

3. RT Essentials by Jesse Vincent, Robert Spier, Dave Rolsky, Darren Chamberlain, and Richard Foley
In a typical organization, there's always plenty to be done: Vendors need to be paid. Customers need to be invoiced. Sales inquiries need to be answered.  Bugs in hardware or software need to be fixed. And when the end of the day rolls around, someone has to keep track of who wanted what, who did it, when it got done, and most important, what remains undone.

This is where a ticketing system comes in.  A ticketing system allows you to check the status of various tasks: when they were requested, who requested them and why, when they were completed, and more.  RT (Request Tracker) is a high-level, open source ticketing system that allows a group of people to efficiently manage tasks, issues, and requests submitted by a community of users.

The book starts off with a quick background lesson about ticketing systems, and then explains how to install and configure RT.  Readers will learn how to perform day-to-day tasks that turn their RT servers into highly useful tracking tools.

4. Open Source for the Enterprise by Dan Woods and Gautam Guliani (blog)
If using open source were as easy as simply installing Linux and learning to use a few free tools and applications, the world would have completely converted to open source by now. Large and small businesses alike that are enticed by open source's possibilities--saving money on license fees, reducing support and integration costs, gaining access to the functionality of thousands of programs, and much more--must necessarily hesitate when they consider its incumbent risks and responsibilities.

Woods and Guliani describe their book as "a sober reflection and a pragmatic approach to an ocean of opportunity." Written from an IT department's perspective, "Open Source for the Enterprise" is organized around the common problems facing those who struggle in the trenches. Rather than plunging into the popular, spirited debate of why open source is superior to proprietary software, the authors offer an intelligent discussion aimed to help technology and business executives determine whether they can benefit from using open source in their environments.

As Woods and Guliani point out, in order to make open source work, businesses will need to have a clear understanding of what open source is and what it is not. They'll need to understand the fully loaded costs of using open source and have a strategy for acquiring and maintaining the needed skills. This will involve crafting a hybrid tack of open source and commercial software that makes sense for the organization. "Open Source for the Enterprise" approaches these and other issues in ten succinct chapters, beginning with a discussion of the nature of open source; the book concludes with a series of appendixes that identify the most promising open source applications.

5. Agile Web Development with Rails: A Pragmatic Guide by Dave Thomas (blog) and David Heinemeier Hansson (blog) with Leon Breedt (blog), Mike Clark (blog), Thomas Fuchs (blog), and Andreas Schwarz
Developers the world over are talking about Ruby on Rails, a new approach to web development that makes it easier than ever to create rich, sophisticated, and maintainable web applications.

The book was written by leaders in the field: As one of the authors of The Agile Manifesto, Dave Thomas understands agility. As the author of Programming Ruby he understands Ruby and how to describe writing Ruby applications. David Heinemeier Hansson is the creator of the Rails framework. Leon Breedt wrote the web services component of Rails. Mike Clark is an international expert on testing techniques. Thomas Fuchs contributed much of the AJAX support for Rails. Andreas Schwarz wrote the online manual on security for Rails. This is the dream team for writing not just the first Rails book, but the definitive Rails book.

6. Security and Usability edited by Lorrie Faith Cranor and Simson Garfinkel (blog)
Conventional wisdom dictates that there must be a tradeoff between security and usability.  To illustrate the point, Lorrie Faith Cranor, DSc, and Simson Garfinkel, Ph.D., contrast a computer with no passwords with one "that makes you authenticate every five minutes with your password and a fresh drop of blood." The former is usable, but not secure, while the latter is secure but holds little appeal for most users.

In the first book to be focused entirely on the subject of usability and security, Cranor and Garfinkel present thirty-four groundbreaking essays from leading security, usability, and human-computer interaction (HCI)
researchers around the world. Balancing theory and fundamental principles with practical advice, they examine this important issue in detail.

"Security and Usability" offers a window into the future of computer security where usable design and secure systems are no longer at odds. Topics include:

-Realigning usability and security: psychological acceptability, designing for actual (not theoretical) security, tools for usability evaluation, and trust designs and models

-Authentication mechanisms: password memorability, challenge questions, graphical passwords, biometrics, keystroke dynamics, smart cards, and USB tokens

-Secure systems: secure interaction design, anti-phishing, sanitization and usability, usable PKI, compartmentalized security, and ethnographic analysis

-Privacy and anonymity systems: privacy design pitfalls, the Privacy Space Framework, the Platform for Privacy Preferences (P3P), web bugs, informed consent on the Internet, social approaches to security, and anonymizing
 technologies

-Commercializing usability: vendor experiences in addressing usability issues at Microsoft, IBM/Lotus, Firefox, Zone Labs, and Groove Networks

"Security and Usability" brings together research findings, actual implementation experiences, practical advice, and recommendations for constructing next-generation operating systems. This volume is sure to become a classic reference and an inspiration for further research.

7. Digital Identity by Phillip J. Windley (blog)
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, and not always for the better. Offering services, conducting transactions, and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

The experienced book authors provides a rich, real-world view of the concepts, issues, and technologies behind a key concept known as "identity management architecture" (IMA). According to Windley, IMA is a method to provide ample protection against malicious attacks while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is critical:  it provides a set of standards, policies, certifications, and management activities that enable companies to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Windley likens IMA to good city planning:  cities define uses and design standards to ensure that buildings and city services are consistent and workable. In "Digital Identity," CIOs, other IT professionals, product managers, and programmers will learn how security planning can support their business goals and opportunities, rather than holding them at bay.

8. The eBay Survival Guide: How to Make Money and Avoid Losing Your Shirt by Michael Banks
Now more than 114 million members strong, according to company data, eBay attracts all kinds of buyers and sellers and an unimaginable variety of items up for auction. Unfortunately, a lot of trashy products and unscrupulous people are mixed in with the legitimate business. This book faces this reality head-on and shows readers how to get the best experience from the online auction site while steering clear of the bogus offers and shady characters.

Others worth checking out!

1. Programming Windows Presentation Foundation by Chris Sells (blog) and Ian Griffiths (blog)
As part of the forthcoming Windows Vista operating system, Microsoft has included a brand-new graphics subsystem called the Windows Presentation Foundation (WPF) for building user interfaces. With this vector-based framework, application interfaces will be well suited for the new generation of high-resolution monitors and able to take advantage of the graphics capability in the latest video cards, which aren't used much now outside of computer games. In other words, WPF--formerly known as "Avalon"--will put the vista into Windows Vista, and even put a little extra into Windows XP. The book introduces readers to the powerful set of tools for managing the visual layout of their applications, describes WPF features for connecting the user interface to the underlying data, and shows them how to use styles and control templates to customize the appearance of their user interfaces. There are also chapters on using WPF's drawing tools, writing custom controls, and using the framework's animation facilities.

2. Visual Basic 2005 Jumpstart by Wei-Meng Lee
Three years after Microsoft introduced the .NET platform, millions of Visual Basic programmers have resisted the call to upgrade. They still prefer the Rapid Application Development features of VB 6, the last version released before Microsoft radically transformed Visual Basic into an object-orientated language called VB .NET. This year Microsoft hopes to win over reluctant VB 6 developers with Visual Basic 2005, the new version intended to bring together the best of both programming worlds. Lee's new book is written specifically to help VB 6 programmers make the transition to VB 2005, and it arrives at a crucial time. Microsoft also chose this year to end mainstream support for VB 6, and those who stick with the older version will have to pay a premium for extended support. "Visual Basic 2005 Jumpstart" offers them a concise test drive of VB 2005, complete with hands-on projects and dozens of code examples to help readers learn the new syntax quickly. The book also shows them how to migrate existing VB 6 applications.

3. Programming .NET Components, Second Edition by Juval Lowy
With its ability to simplify and add flexibility to complex enterprise applications using reusable code, it's no wonder that component-oriented programming has established itself as the predominant software development methodology over the last decade.  There are a number of tolerable and even outstanding component technologies to choose from, such as CORBA and JavaBeans. Packed with helpful code examples, tips, warnings, design guidelines, and original utilities from Lowy, the new edition of "Programming .NET Components" not only teaches the skills developers need to design and develop component-based .NET applications, but also explains the rationale behind them.

4. Perl Testing: A Developer's Notebook by Ian Langworth and chromatic
Perl has a strong history of automated tests. The earliest release of Per1 1.0 included a comprehensive test suite, and it has only improved since then. The beauty of it, however, is that you don't have to be a die-hard, free and open source software developer who lives, breathes, and dreams Perl to put these automated tests to use. You just have to want to do your job better. With today's increased workloads and short development cycles, unit tests are more vital to building high-quality software than ever before. Once mastered, the lessons in "Perl Testing: A Developer's Notebook" will help developers ensure low-level code correctness, reduce software development cycle time, and ease maintenance burdens.

5. Learning Perl, Fourth Edition by Randal L. Schwartz, Tom Phoenix, and brian d foy (blog)
The Llama is back! The fourth edition of the book includes new exercises with solutions so readers can practice what they've learned while it's still fresh in their minds. Readers will learn about data structures, minimal matching, threading, data parsing, references, objects, modules, package implementation, and more.  The authors have reengineered the pace and scope of the lessons with today's Perl student in mind, while retaining the detailed discussions, examples, and eclectic wit for which the book is famous. Although Perl was first known as the "toolbox for Unix," knowledge of Unix isn't required; the lessons in the new book apply equally well to most modern implementations of Perl.

6. Perl Best Practices by Damian Conway
The guidelines in "Perl Best Practices" cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging.  Above all, it's a set of practices that actually works, and that many developers around the world are using already. Much like Perl itself, the guidelines are about helping programmers get their jobs done, without getting in the way.

7. Windows Server 2003 Network Administration by Craig Hunt and Roberta Bragg
Hunt's new book, coauthored with Roberta Bragg--a Windows networking MVP and expert on information security--is a practical, step-by-step guide to configuring and managing TCP/IP networking software on Windows server
systems. Written specifically for experienced system administrators, "Windows Server 2003 Network Administration" covers the issues that are most important to those building or managing a Windows network.

8. Cisco IOS in a Nutshell, Second Edition by James Boney
"Cisco IOS in a Nutshell" consolidates the most important commands and features of IOS into a single volume. The new edition has been revised an expanded to cover features that were integrated into Cisco's latest major release, 12.3, along with highlights from minor release 12.4.  Some of the new features are AutoSecure, AutoQoS, and the new IOS naming model. Other sections have been expanded to include IS-IS routing, MPLS, new hardware types, while new chapters have been added to cover quality-of-service and multi-casting. Unlike the previous edition, the book also covers non-routing topics, such as VLANs and switching.

9. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols by Charles M. Kozierok
Packed with over 300 illustrations that explain the finer points of this complex topic, and over 500 tables for easy reference, "The TCP/IP Guide details the core protocols that make TCP/IP internetworks function, as well as the most important classic TCP/IP applications. The book's personal, user-friendly writing style makes plain English of the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more.

10. The Debian System: Concepts and Techniques by Martin F. Krafft
Written by Martin F. Krafft, an experienced developer and a faithful Debian supporter since 1997, "The Debian System" is intended for those who want to understand and get more out of their Debian installation(s) - both
Linux/UNIX admins switching to Debian and existing Debian users alike. Co-published with Open Source Press of Munich, Germany, "The Debian System" gives readers a peek into the experience level and sophistication that
have shaped the various system components and shows why this system's pure elegance makes it a desirable choice of many. Krafft introduces the system's concepts and analyzes the techniques that comprise the Debian Way of system administration and explains why Debian developers have chosen certain approaches to development that differ from other Linux distributions.

11. Windows XP Cookbook by Robbie Allen (blog) and Preston Gralla (blog)
From installation, configuration, and maintenance, to disk management, editing the Windows Registry, and more, "Windows XP Cookbook" is useful for anyone who has to use, administer, or automate this OS--not just administrators of Windows networks, but also power users who want to tweak home PCs.  Among hundreds of tasks, readers will find ways to turn off XP's annoying balloon messages, stop mysterious tasks from running, turn a PC into a jukebox, run multiple OSes simultaneously, and tackle network settings when moving a laptop from one wireless network to another.

12. Linux in a Nutshell, Fifth Edition by Ellen Siever, Aaron Weber (blog), Stephen Figgins, Robert Love (blog), and Arnold Robbins
Considered by many to be the most complete and authoritative command reference for Linux available, "Linux in a Nutshell" covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. The material in "Linux in a Nutshell, Fifth Edition" was tested on Fedora, Novell/SUSE, and Debian systems (with some testing on other distributions as well. No single volume can cover all the commands provided by even on of the popular Linux distributions, but readers will find most of the commands they are likely to need with the major distributions are contained in this volume.  It's the one reference book that every Linux user will want to have close at hand.

13. Nokia Smartphone Hacks by Michael Juntao Yuan (blog)
For everyone who wants to make the most of mobile technology and unlock their Nokia's full potential, "Nokia Smartphone Hacks" delivers innovative and powerful hacks.

»5:38 PM    »Write comment    

Posted by: janette    in: Computing

Modified on September 25, 2005 at 10:21 AM
Saturday, September 24, 2005

Lucasfilm selects HP technology to create digital entertainment assets

HP and Lucasfilm Ltd., known in visual effects and sound engineering for feature films, recently announced a global, three-year, multi-million dollar technology and marketing agreement.

Lucasfilm will use HP Adaptive Enterprise solutions to generate new video games, visual effects and animation. The HP technology, also being used to store and manage LucasFilm’s business applications, will be deployed at Lucasfilm's new Letterman Digital Arts Center in the Presidio of San Francisco and at the company's Singapore operations.

Lucasfilm will roll out up to 1,000 high-performance HP workstations powered by Dual-Core AMD Opteron™ processors for the production of its visual effects and video games. The HP xw9300 Workstation environment at Lucasfilm will run both Linux and Windows® XP operating environments in both 32-bit and 64-bit modes, with in-house software applications for creation and editing.

In addition, HP Services is working closely with Lucasfilm to deploy a storage environment to securely store and archive critical business information.

Lucas visual effects and game development requires the most powerful workstation configurations available. The 64-bit dual processor, dual-core and dual-graphics HP workstation is designed for customers with such intensive computing demands.

The HP xw9300 Workstation's performance and visualization capabilities are enabled by the processing power of two AMD Opteron™ processors and advanced 3D graphics capabilities made possible by NVIDIA's dual PCI Express x16 graphics.

LucasArts' long-term relationship with nVidia remains intact. Each workstation uses nVidia's dual PCI Express x16 graphics cards, enabling advanced 3-D graphics capabilities, and every one can support multiple graphics cards.

Lucasfilm selected the latest HP StorageWorks offerings for its business applications. With a 35-terabyte capacity, the HP StorageWorks XP12000 Disk Array and Cisco MDS 9509 is a high-end disk storage system delivering “zero downtime” for mission-critical environments.

The system incorporates HP software innovations for single-system management, remote copying and cross-continental disaster recovery. The HP StorageWorks XP12000 Disk Array offers Lucasfilm an advanced solution available to ensure business continuity and asset protection.

»9:09 AM    »Write comment    

Posted by: janette    in: Computing
Thursday, September 22, 2005

IronMail

CipherTrust, a startup formed by ex-Novell execs, distributed a product review and testimonial video at the MediaConnect Security Summit 2005.

I like startups, I hate spam, and funky accents amuse me -- so I'm posting the video here.

»9:24 PM    »Write comment    

Posted by: Mike    in: Internet
Sunday, September 18, 2005

Where's the Next Missile?

Hey all, Mike here. I've been thinking of switching from my current antivirus and firewall solutions, so it's a good thing I checked out the MediaConnect Security Summit 2005 in Singapore last week. IT security vendors came together to discuss how to beef up the Asian digital fortress.


Samantha Bond lookalike Samia Rauf of Workshare discusses where the next missile's coming from.


MessageLabs' Andy Lake estimates the number of bugs per line (5-50 per 1,000) in Windows XP's forty million lines of code. You do the math.


McAfee's Nigel Stewart shows us why multilayered security...


...is really nothing new.


Let's play visual charades! Guess what's on that screen. For the answer, click here.


SurfControl's Matthew Gyde, protecting Asian workers from pr0n.


No, the biohazard symbol in the sixth crosshair does not mean SurfControl now kills germs and controls genes. Matthew says it represents viruses. But yes, as the fifth crosshair implies, Clippy is evil.


I asked VeriSign's Ed Eliff which portal best protects it's users identities. His reply: "Would you really trust a search engine with your private information?". He was last seen battling the Googlebot with Sarah Connor. Check out VeriSign's presentations, In or Out and Who Are You?


PureHacking's ex-cop Rob McAdam does penetration testing for his clients. Stop snickering. His most l33t haxx0r was simulating an extortion attempt on a financial institution.


Joey Alarilla (left) concurs with Joel Pinaroc that Internet attacks getting more targetted, with even the blogosphere now at risk. Erwin Oliva (right) predicts IT security as regulatory compliance, APAC catching up in IT security outsourcing, and VoIP hacking.

»4:29 PM    »1 comments (0 )    

Posted by: Mike    in: Internet

Modified on September 19, 2005 at 5:19 PM
Saturday, September 17, 2005

Kudos to ManilaCon 2005

Kudos to Information Systems Security Society of the Philippines for their successful ManilaCon event. My sincerest thanks to Jun Malacaman for inviting me to participate in this conference. I really learned a lot.

On its 4th year, ManilaCon attained the stature of being the country's premiere Internet Security event. I hope that in their future activities, they will be able to integrate demonstration of commitment initiatives. I'm certain that with the revenue that they were able to generate from the conference, year after year, they will be capable soon of donating equipment to law enforcement agencies or sponsor them to trainings abroad.

That, I believe, will give their event greater social relevance and commitment to a community whom they have helped increased awareness in the area of security.

»9:24 AM    »Write comment    

Posted by: janette    in: Networks
Sunday, September 11, 2005

All Systems Go for ManilaCon 2005

I just word from Jun Malacaman that ISSSP's 4th Philippine I.T. Security Conference is all systems go this September 13 and 14 at the Grand Ballroom, Hotel Intercontinental, Makati City. With the theme Privacy@Risk, the conference aims to help participants in improving and increasing their ability to prevent intrusions by creating awareness and arming with the necessary security tools and know how in defending information systems.

Download the conference flyer for more details. See you there!

 

»10:58 AM    »Write comment    

Posted by: janette    in: Computing
Friday, September 9, 2005

APC Supports Van Aralan Education Program

American Power Conversion, a global provider of high-availability systems for network-critical physical infrastructure, recently gave its support to the Education on Wheels/Van Aralan initiative. The education program, organized by the AiHu Foundation, a non-government organization founded by Sterling Paper Group of Companies President Joseph Lim Bon Huan, aims to educate underprivileged kids in poverty-stricken areas of the Philippines.

Operating around Metro Manila and nearby provinces are air-conditioned container vans equipped with computers that impart basic PC skills training to numerous children from poor communities. Currently, 1,982 people from Bulacan and Quezon City have graduated from the project. Computer Van Aralan (CVA), a TESDA-recognized program (Technical Education and Skills Development Authority), is also considered a stepping stone by the foundation members as students who finish from any of their courses pursue Information Technology and Computer Engineering degrees, others have found jobs, while some open their own business.

APC has extended support by donating 42 UPS units for use in the Computer Van Aralan vehicles, once again honoring its commitment to contribute to the improvement of education in the country.

»2:20 PM    »1 comments (0 )    

Posted by: janette    in: Computing

Modified on September 9, 2005 at 2:25 PM
Friday, September 9, 2005

HP gains revenue market share year-on-year in the Philippines x86 server market in Q2 2005

HP demonstrated strong x86 server revenue growth in Q2 2005 and was the No. 1 vendor in Philippines x86 server shipments for the 12th consecutive quarter, according to second quarter 2005 figures released by the International Data Corporation (IDC). 

In total x86 server units and revenue, HP grew more than the market in Q2 2005 compared to Q1 2005. HP led the x86 server market in Philippines with a 30.3% unit shipment and 37.9% revenue share in Q2 2005. HP was also No.1 in Windows®, Linux and UNIX x86 server segments in Q2 2005 both in unit shipment and revenue terms. The Windows®, Linux and Unix segments contributed to the bulk of x86 server unit shipments and spending in the Philippines in Q2 2005. Additionally, HP gained 7.2 percentage points revenue market share year-on-year in the x86 server market in Q2 2005. HP was also the only vendor to gain revenue share in the x86 blade server market in the Philippines in Q2 2005 compared to the year-earlier period.

Other highlights of the analyst firm’s report include:

HP was No. 1 in total x86 server Linux revenue in Q2 2005;

In Windows x86 servers, HP was placed at the No. 1 position in unit shipments and revenue terms in Q2 2005;

HP was No. 1 in x86 server units and revenue, gaining revenue market share year-on-year in Q2 2005;

HP also emerged as the No.1 x86 blade server vendor in the Philippines in revenue terms in Q2 2005.

»11:49 AM    »1 comments (0 )    

Posted by: janette    in: Computing
Friday, September 9, 2005

i.PH now free

I just found out that i.PH is now for free to everyone. Each i.ph blog is loaded with a content management system. It also has a multimedia gallery that allows one to share pictures, videos, and music as well. It is a single point of communication with its own i.PH email, close integration with Instant Messengers (AIM, ICQ, MSN, Yahoo), VOIP (FWD, Skype), Friendster, SMS (Chikka and other international SMS gateways) plus a tagboard. Posting blog entries can be done on the control panel or sent in by email.

Everyone can now also earn from their blogs with the Pay4Access feature. Once activated, the blog becomes an e-magazine or e-zine where readers pay to view the special contents. The owner of the blog decides what items to include, how much to charge and for what duration. Payments can be made by PayPal; and soon G-Cash.  Remittance can by by PayPal or a StandardChartered ATM/debit card (and soon, G-Cash).

You can find out more about i.PH at http://www.i.ph.

»11:43 AM    »4 comments (0 )    

Posted by: janette    in: Internet
Friday, September 9, 2005

Avaya Announces Global Availability of First Enterprise Fixed Mobile Convergence Applications Jointly Developed with Nokia

Avaya, a prominent vendor in business communications applications, systems and services,  recently announced the global availability of the first phase of its enterprise fixed mobile convergence  (FMC) applications, jointly developed with Nokia, for Series 60 platform devices.  These downloadable applications transform Series 60 platform mobile devices into virtual desktop phones by enabling mobile workers to access the features and functions of their Avaya Communication Manager office desk phone through an easy-to-use onscreen interface. 

This is the first tangible result of a strategic collaboration between Avaya and Nokia to deliver enterprise FMC solutions, announced earlier this year, and delivers on their promise to enable mobile workers to productively manage their voice communications with clients and colleagues while reducing enterprise telephony costs.   The Series 60 Platform is a widely adopted smartphone platform, with millions of devices already in use.

Avaya Mobile for Series 60 platform devices extends the reach of enterprise IP telephony by integrating the ubiquity of mobile communications with the reliability and features of enterprise telephony services. The application enhances accessibility of mobile workers with a feature that enables workers to be reached at a single business phone number that rings the desk phone and mobile phone simultaneously, enabling people to be  easily reached and productive regardless of their work location.

The applications integrate mobile phones into an enterprise’s business operations, providing centralized intelligence and control of policies between enterprise fixed and mobile voice communications.  For example, through the one business number feature, calls made or received on both the desktop phone and the mobile phone can now be recorded or accounted for, which supports compliance with federal regulations, an issue of particular interest to financial services companies and institutions.

With the application, workers can receive calls either on their desktop or on their mobile phone, switching between them transparently as needed.  Calls made from a mobile phone appear as if they came from the desktop phone.  The intuitive user interface of the mobile phone provides easy access to business telephony features such as abbreviated extension dialing, multi-party conferencing, call transfer, voicemail forwarding, group call features, and call forward to coverage for executive support. Mobile workers also have the flexibility to turn off the business profile as needed while remaining accessible for personal calls, enabling them to separate their business and personal communications on their mobile phones.

Avaya Mobile for the Series 60 platform is available globally through Avaya’s direct sales force and authorized Avaya BusinessPartners. Avaya Mobile for the Series 60 platform is currently supported on the following Nokia Mobile Devices:  Nokia 3230, 6600, 7610, 6620, 6260, 6630, 6680, 6681, 6682.

»11:37 AM    »4 comments (0 )    

Posted by: janette    in: Networks
Thursday, September 1, 2005

Autodesk’s Asia Pacific Design Competition Launched

Autodesk Inc. announced the launch of the ASEAN leg of its Asia Pacific Design Competition 2005, a new platform for Asian designers, engineers and students to showcase their talents and be recognized for their creativity, innovative thinking, and design expertise.

Filipino students, working professionals and companies are invited to join the competition and encouraged to submit  their entries now.  Deadline of entry submissions is on October 30, 2005.

The competition, sponsored by Hewlett-Packard Asia Pacific, will be conducted both at the country and Asia Pacific levels, with two segments.

The industry segment of the competition is open to working professionals, amateur groups, companies and individuals, and will accept submissions for any of the three separate categories – Manufacturing Design; Civil Design; and Building Design. Contestants will be judged on design and technical excellence, creativity and innovation, and business impact.

The education segment is open to the individual tertiary student or groups of students for participation. Students can get entry-forms from their respective universities, colleges or from the competition website at www.autodesk-apac.com/design_competition.

Registration for the Autodesk Asia Pacific Design Competition is free at www.autodesk-apac.com/design_competition. No purchase of Autodesk products is necessary for entry.

All entries will be judged on their use of Autodesk Inventor®, Autodesk® Civil 3D™, or Autodesk® Revit® Building software in problem-solving, and the aesthetic appeal of their entry designs.

Interested contestants may request for free trial software of Autodesk’s latest family of cutting-edge 3D design solutions - Autodesk Inventor, Autodesk Civil 3D, or Autodesk Revit Building - from their Autodesk reseller or email [email protected]. All contestants will enjoy hardware promotions from major sponsor Hewlett-Packard.

From ASEAN to the Asia Pacific Finals

The competition will be conducted at two stages – the regional level and  pan Asia-Pacific level.

The regional level will see a competition in each of 5 geographies – ASEAN, ANZ, Japan, Korea and China. Finalists  from each geography will automatically qualify for the pan Asia-Pacific competition. At each stage, Autodesk will give away five awards in each of the three Industry categories, and another five awards for the Education category.

Country-Level Competition:

Industry Segment (same set of awards for each category):
1st Prize: US$ 2000 (PhP110,000)  worth of prizes
2nd Prize: US$1000  (PhP55,000) worth of prizes
3rd Prize: US$ 800   (PhP44,000)  worth of prizes
Consolation Prizes (x2): US$ 500  (PhP27,500)   worth of prizes each

Education Segment
1st Prize: U$ 1000 (PhP55,000)  worth of prizes
2nd Prize: US$ 500  (PhP27,500)  worth of prizes
3rd Prize: US$ 300   (PhP16,500)  worth of prizes
Consolation Prizes (x2): US$ 200  (PhP11,000)  worth of prizes each

Asia Pacific-Level Competition:

Industry Segment (same set of awards for each category):
1st Prize: US$ 3000  (PhP165,000)   worth of prizes
2nd Prize: US$ 2000 (PhP110,000)  worth of prizes
3rd Prize: US$ 1000   (PhP55,000)   worth of prizes

Education Segment
1st Prize: US$ 1500 (PhP82,500)  worth of prizes
2nd Prize: US$ 1000  (PhP55,000)   worth of prizes
3rd Prize: US$ 500 (PhP27,500)  worth of prizes

»3:45 PM    »1 comments (0 )    

Posted by: janette    in: Computing
Thursday, September 1, 2005

Cisco and Intel Collaborate to Improve Wireless and Security Solutions for Businesses

Intel Corporation and Cisco Systems, Inc. announced recently an expansion of their existing alliance to deliver new capabilities that enhance the reliability of wireless LANs and deliver higher-quality services, and allow enterprises to use computers and the network as a combined defense against security threats. 

Cisco and Intel have jointly produced a new set of features, called Business Class Wireless Suite, designed for companies using Cisco’s Unified Wireless Architecture and Intel® Centrino mobile technology. The Suite includes:

  • Optimal access point (AP) selection technology to enable Intel Centrino mobile technology-based clients to scan for the best AP for faster, reliable and efficient roaming within a business wireless LAN.
  • Enhanced Voice over IP (VoIP) quality of service (QoS) technology to improve the audio clarity and enable reliable voice communications for laptops.

Business Class Wireless Suite provides an enhanced set of capabilities that makes wireless LANs more robust for the enterprise, supporting enhanced roaming and business applications such as Voice over IP. Business Class Wireless Suite reinforces the previous efforts between Intel and Cisco with regard to the development of the Cisco Compatible Extensions (CCX) program for wireless LAN client interoperability. 

Business Class Wireless Suite features will be available from Cisco and Intel in the first quarter of 2006.  

Intel will join the Network Admission Control (NAC) program, an industry effort led by Cisco to help customers identify, prevent, and adapt to security threats, and Cisco will join the Intel® Active Management Technology (AMT) program. With Cisco NAC interoperating with Intel AMT, enterprises will be better able to defend against security threats, helping to maintain user and business productivity and reduce the cost of security attacks and improve system remediation 

Customers can expect Cisco NAC and Intel AMT to be compatible in the fourth quarter of this year. 

Through their global alliance, Cisco and Intel intend to enable organizations and consumers to improve the way they do business, interact and stay connected through innovative, standards-based solutions. Joint efforts include bringing end-to-end wireless solutions to enterprise customers, accelerating the transition to Gigabit Ethernet networks and simplifying the operation of secure home networks. For more information, please visit: http://www.ciscointelalliance.com 

»6:22 AM    »Write comment    

Posted by: janette    in: Networks
Thursday, September 1, 2005

Pilipinas Anti-Piracy Team Launched To Combat Software Piracy

The National Bureau of Investigation (NBI), the Optical Media Board and the Philippine National Police (PNP), together with the Intellectual Property Coalition, have banded together to launch the “Pilipinas Anti-Piracy Team,” a campaign that aims to curb software piracy in the Philippines. The Business Software Alliance (BSA) is supporting the campaign.  


The five organizations signed a memorandum of understanding that spelled out the objectives and action plans of the campaign. 

The Pilipinas Anti-Piracy Team started with a 30-day countdown that began on August 16 and will end on September 15. It will be followed by a crackdown phase in which a series of raids against software copyright violators will be conducted nationwide. Companies are expected to correct license misuse before the crackdown begins. 

A recent study conducted by the IDC for BSA placed the Philippines’ software piracy rate at 71% with losses amounting to P3.7 billion in 2004. Software piracy exists in many forms including corporate end-user piracy, hard disk loading, retail CD-ROM piracy and Internet piracy. The most noticeable among these is the sale of counterfeit CD-ROMs in retail outlets. However, software piracy has remained rampant amongst corporate end-users - this occurs when businesses utilize more copies of software than it has licenses for. 

Individuals who wish to report software piracy cases may get in touch with the BSA through its anti-piracy hotlines at 819-5897 for Metro Manila residents and the toll-free 1-800-1-888-8787 for those residing outside Metro Manila. BSA gives a reward of up to P1 million for reports on companies using unlicensed software.

»6:03 AM    »4 comments (0 )    

Posted by: janette    in: Computing
Search
 
RSS-Feed
  For all categories