RSS

Current Political Issues in the Philippines and International

Credibility key to Philippines luring investors - ADB

MANILA, Philippines - The government must provide a predictable and secure business environment if it wants investors to commit billions of dollars to its planned infrastructure projects, the Asian Development Bank (ADB) said.
The poor Southeast Asian nation is trying to attract private funds for long-term infrastructure projects, but corruption, red tape, procedural hassles and regulatory uncertainties are significant deterrents for potential investors.

"It needs to go that extra mile and create that credibility that I am taking the right actions, I am addressing taxation issues, I am assuring you, as the investor, that my policies are predictable... my judicial system will uphold your contractual rights," Neeraj Jain, the ADB's country director for the Philippines, told Reuters on Friday.

Constrained by a budget deficit forecast at 3.9% of gross domestic product this year and pressing social spending needs, the government is banking on public-private partnerships (PPP) to fund infrastructure investments that it hopes will lift economic growth to 7% to 8% in 2011 and beyond.
"I encourage you to participate in the building of airports, roads and rail projects, transport terminals, water supply, and agriculture support facilities, among others," President Benigno Aquino said at a business conference in Manila on Friday.

Last month, the government identified 10 priority PPP projects, including 7 worth nearly P128 billion ($3 billion), and Aquino said the plan would be launched next month.
"We are simplifying the process of establishing a business... stamping out red tape, as well as in improving infrastructure, and relaxing regulations on air travel to and from the country," he said.
Foreign funds are pouring into the Philippines but in favor of the more volatile portfolio investment rather than longer-term investment, such as in factories.

This year's foreign direct investment up to July totalled $954 million, an average of $136 million a month, while net portfolio inflows up to September were $1.42 billion, an average of $157 million a month.
FDI is lower than the same year-earlier period, while portfolio investment is more than six times greater.
The stock market hit a record high this week and is up 38% this year. The peso has gained about 7% against the dollar and risen to its strongest in 2-½ years.
"The new administration has set the right tone, is taking the right actions, it has set its sights in the right direction, it is inspiring confidence of the investors... it needs now to take action on the promises that it is making," the ADB's Jain said.


Aquino: 43,650 new jobs from US investments

MANILA, Philippines - President Benigno Aquino III returned from his US trip on Tuesday and said the US$2.4 billion new investments secured during the trip would create 43,650 new jobs in the next 3 years.
"It's good to be home. In the last week, during our visit to the US, we were able to send our message across: the Philippines is open for business," Aquino said after his flight arrived at around 3:45 a.m. from California at the Ninoy Aquino International Airport Terminal 2.

Among the business firms that have committed to make new investments are: Coca-Cola, Pfizer, AES Corp., Hewlett-Packard, J.P. Morgan Chase, Global Services Inc., Century Properties, and General Electric.
Aquino said these investments are in power generation, consumer products, business and knowledge process outsourcing, health care, garments, and leather goods.

"We were able to secure a commitment of at least 43,650 new jobs in the next 3 years, including some 4,500 in construction-related jobs. And because of the multiplier effect, we estimate 200,000 more jobs to benefit our countrymen," he said.

Winning bidder AES Corp. will be expanding the capacity of the Masinloc Power Plant 2 by up to 660 megawatts with a project cost of $1 billion.
"This will lead to 1,500 jobs during the 3- to 4-year construction period," Aquino said.
Coca-Cola will invest $1 billion in upgrading and replacement of equipment and creation of new products and processes, he said.

"In short, our visit to the US enabled us to generate $2.4 billion in new investments," Aquino said.
"Furthermore, we received an additional $434 million in the form of a grant from the Millennium Challenge Corp. to expand the coverage of existing social programs that have been performing outstandingly," Aquino said.

He said foreign investors feel the new confidence that has arisen from the new political and economic environment.

He also urged his critics to support the drive for progress.
"Hinihikayat ko ang ating mga kapwa Pilipino na panay pa rin batikos, makiisa sana kayo sa ating pagsisikap," he said. "Kararating lang po namin at medyo pagod, pero talaga naman bale wala po yon kung maganda naman ang dalang balita."

Meanwhile, Executive Secretary Paquito Ochoa said the Palace legal team has finished its review of the Incident Investigation and Review Committee (IIRC) and is ready to present its recommendations to the President.

He declined to reveal details since he has not taken up the matter with the president.  "I'm not sure if we can discuss it today," he said. -- with a report from Ruby Tayag, dzMM

Pinoys urge PNoy to address corruption, human rights

MANILA, Philippines - Corruption, human rights violations, migrant concerns, and the President's personal life were the prime topics among the participants of Global Town Hall live-chat on Monday as part of President Benigno Aquino III's first visit to the United States as the country's chief executive.
Majority of the Filipinos who participated in the chat want the new administration to focus on curbing corruption and to properly spend the US$434 million grant from the US Millennium Development Corporation (MCC) to the Philippines last Friday.

The live chat gathered 594 readers and collated 419 comments. It was opened on Sunday (Saturday in the United States) and was still open, as of writing.

Alden American Canyon hoped Aquino would use the money to build and repair infrastructure projects in areas that are hard to reach to make them more accessible.

"I would love to see and I'm sure the rest of the country too, those poor people who don't have bridges, roads and transportation to go to places like schools, hospitals and markets to buy and work. Please make sure that they would [be] blessed [with] one of those projects. We'll be waiting and watching, make us proud. God bless the Philippines," he said.

Liano P. Vacaville from California said he was touched by US Secretary of State Hillary Clinton's speech that praised the Philippines after the  US-run MCC granted $434 million to the country for poverty alleviation projects.

"Please let's not disappoint her and the rest of the people who signed that $434 million check, who trusted our government. Let us show that they can trust us and so more business will come and to open more doors of opportunities for our country. PNoy, we're counting on you," Vacaville said.

Magtanggol Sabayan from Los Angeles left a lengthy piece of advice to the President in terms of corruption. He said that 29 years after the death of Aquino's father, Sen. Ninoy Aquino, things have gotten worse.
"Corruption is so pervasive and ingrained not only in almost all sectors of government right now but also in the Filipino culture itself. Mr. President, we know that you are not God but what are you going to do in your 6 years in office that you would like to be remembered by Filipinos for years to come? I just hope, Mr. President, that your dad's murder was not in vain just like what he said, 'The Filipino is worth dying for.' Mabuhay ka Presidente "Noynoy" Aquino and I can confidently say that the majority of the Filipino people (60% of whom are in the poverty level) are solidly supporting you," he said.

Oneille, on the other hand, said it doesn't take a rocket scientist for the President to purge the illegal numbers game "jueteng" in the country.

"Mr. President I want you to succeed in governing our beloved country and... If you really want to stop jueteng, it doesn't take a rocket scientist to do that don't you think so, let [us] not be naive about it, it could be stop[pped] in an instance if you really wanted it to stop. I don't want to sound to be so realistic, but I think so should do town meeting more in the PI (not only with the elite more so with the tondo smokey mountain people, tambakan in marikina and the impoverised place in the PI to get the real sentiments of the people. We will pray and hope that heads will be rolling as you promised even iat will be your kapamilya.Mr. president why do you think all this politicians would like to win in an election, it's not because of the salary, it's because most of them want to loot the coffers of the town, city and government. We will pray for you," Oneille wrote.
EJ from Lakeforest California said: "Maybe you can also encourage all the senators, congressmen to be more honest and join you to have a clean and honest government."

The high cost of barangay elections

It's the eve of the campaign period for the Barangay and SK elections. At the stroke of midnight, the streets and alleys of the metro will once again take the shape of a 3-dimensional collage, plastered from end to end with faces and promises of the nation's smallest political unit.
In Brgy. Tatalon, Quezon City, incumbent barangay chairman Benedick Banega preoccupies himself with barangay affairs, while in a room nearby, barangay workers and volunteers are busy mounting some 600 tarpaulins on bamboo frames.
"Barangay elections are more expensive now," Banega says. "During my father's time, candidates used to just write their names on old sacks. And hardly anyone wanted to run. But now, with more funds and more autonomy given to barangays, it's become more a more lucrative profession."
By Capt. Banega's estimation, his team has spent more than 50,000 pesos on campaign materials alone. Each kagawad gets 75 tarpaulin posters, while Banega gets 150 pieces. Each of these are priced at 24 pesos. This doesn't include the P45,000 they've allotted for their poll watchers on election day.

"Nowadays, you really have to spend to get ahead in the race," says Banega.
But it's a slightly different picture in Brgy. Baseco, Tondo, Manila. There are no tarpaulin posters at the headquarters of candidate Domingo "A-1" Ramirez, only used posters made of sack that some party-list group left lying around on the streets.

A-1's team was seen turning these old posters over so they could paint their names on the clean back side. In one corner of the room, volunteers are cutting up some old donated cardboard, and using a rubber stamp to mark them with "Vote A-1 for Brgy. Captain."

And plastered on the wall are different-sized, home-made printouts of the running kagawads, with the only thing in common being the face of their candidate for chairman.

"I don't have any money, so the kagawads have adopted my face on their own campaign posters," A-1 Ramirez declares proudly. "Poverty is not a hindrance for me."
By the team's computation, they have spent just a little more than 10,000 pesos, including P1,400 for 2 gallons of paint, P80 for the single rubber stamp, and about P300 for refills of the stamp pad.
Ramirez initially tried to collect 1,000 pesos from each kagawad, but not everyone could come up with the money. Now, they're powered by donations after swallowing their pride.

"All the 3 other candidates for chairman here are millionaires. I'm the only one who's poor. I guess all I can offer is heart," Ramirez chuckles.
But Ramirez concedes that money does matter in any election, big or small. He says he would spend more if he had more.

But with the campaign period starting in just a few hours, and with only 10 days of campaigning allowed, he can only pin his hopes on those in Baseco who can look past the re-used sacks and dirty cardboard giveaways…and see promise behind his persistence.

Rescue near for Chile miners trapped for 2 months

COPIAPO, Chile – Chilean rescuers were close on Friday to ending the ordeal of 33 miners buried alive for 2 months deep underground after a cave-in, and could start evacuating them next week in a survival story that has gripped the world.

In one of the most challenging rescue operations in mining history, engineers hope to finish drilling a shaft about half a mile down to the miners by Saturday. But it will still then take days to hoist them to the surface one at a time in special capsules.

Relatives of the trapped miners sang and prayed around a bonfire at the mine-head in Chile's Atacama desert, waving banners and lighting candles for each of the men.

"We are calm. We've already held on for two months. Now we are in the closing stage," said Samuel Avalos, 70, whose son is among the trapped. "We hope it's over."

Mining Minister Laurence Golborne, spearheading the rescue effort, said engineers must still decide how much of the shaft to line with metal tubing before lifting the miners out in the capsules.
Once the escape tunnel is finished, it would take anything from three to 10 days to get the men out, Golborne told reporters at the mine.

Following the August 5 collapse, engineers first bored tiny drill holes the width of a grapefruit to locate the men stuck in a tunnel 2,300 feet below ground -- equivalent to 233 stories.

The men were found 17 days after the cave-in, miraculously all still alive, when the miners tied a message to the perforation drill, triggering celebrations across Chile.
Rescuers then used the ducts as umbilical cords to pass the miners high nutrition gels, water, medicine and later solid food to keep them alive.

'Cry as a nation'

Trapped for 64 days, the men have set a world record for the length of time workers have survived trapped underground after a mining accident. They are in remarkably good health.
"Hopefully, God willing, in a few days we will be able to cry as a nation in happiness, just as we did when we found out they were alive, when we see them emerge from the depths of the mountain and hug their wives and children," President Sebastian Pinera said.

Pinera's wife, Cecilia Morel, arrived at the mine on Friday afternoon and plans to stay at the settlement called Camp Hope that relatives erected at the mine mouth. She said she would help lend psychological support to the miners' relatives.

Images of the miners caught on a video camera lowered down the drill hole showed them bearded and bare-chested to cope with heat and humidity deep in the small, accident-plagued gold and copper mine in Chile's mining heartland.

The government brought in a team of experts from the US space agency NASA to help keep the men mentally and physically fit during the protracted rescue bid. The men had each lost an estimated 22 pounds (10 kg) during the 2-1/2 weeks before they were found alive.

The miners have been doing exercises and helping clear debris to keep their weight down so that they can fit in the evacuation shaft just two feet in diameter.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Case #7: Computer System Security

Another way of Computer System Security

1. Use electrical surge protectors to ensure your computers will not experience sudden surges of electricity, e.g., during storms, if the quality of your electricity in your building is poor, or is the computer is turned off and on.

2. Develop a disaster recovery plan. The plan should address contingencies. It should include procedures to respond to, e.g., if a disk crashes, if the computer quits working, if the network is down, if the building is somehow destroyed, etc.

3. Make back-up files to avoid losing information stored on your computers when, e.g., a disk breaks (or "crashes"), ensure that computer files are regularly backed up to another media, e.g., backed up onto magnetic tapes, "zip" disk, CD-ROM, etc.

4. Keep your system patched Most vendors provide patches that are supposed to fix bugs in their products. Frequently these patches do what they’re supposed to do. However, sometimes a patch fixes one problem but causes another. For example, did you ever have a repairperson fix an appliance but in the process, they scratched the floor or damaged a countertop during their visit? For a computer, the repair cycle might have to be repeated until a patch completely fixes a problem.

5. Ensure that computers remain working as much as possible (that is, maximum their uptime) by recording and testing detailed procedures for all routine, but critical, tasks performed by staff on the computers and associated peripherals, e.g., for computer backups and restores, fixing recurring problems, etc. Locate and label the procedures in a central location of which all staff are aware.


6. Only run services that you need.  Each network service that is installed on your computer opens a network port that can be probed by hackers and viruses. Resist the temptation to experiment with network services that you are not likely to use. Commonly targeted services are IIS (Microsoft's Web server), ftp (file transfer protocol), telnet (remote login to a command prompt), Upnp (universal plug and play) and Microsoft File Sharing.

7. Use plain old common sense. When in doubt, err of the side of safety. Delete email attachments from people you don’t know (WITHOUT opening them!). Beware especially aware of tempting animations on unprofessional-looking sites. Keep an eye out for strange links or attachments in Instant Messaging (IM) programs—they just might contain malicious code.

8.  Don’t trust foreign networks. This is especially important on open wireless networks such as at your local coffee shop. If you’re careful and smart about security, there’s no reason you cannot use a wireless network at a coffee shop or some other untrusted foreign network, but the key is that you have to ensure security through your own system, and not trust the foreign network to be safe from malicious security crackers. For instance, it is much more critical that you protect sensitive communications with encryption on an open wireless network, including when connecting to Web sites where you use a login session cookie to automate authentication or enter a username and password. Less obviously, make sure you don’t have any network services running that are not strictly necessary, as they can be exploited if there is an unpatched vulnerability. This applies to network filesystem software such as NFS or Microsoft CIFS, SSH servers, Active Directory services, and any of a number of other possibilities. Check your systems both from the inside and the outside to determine what opportunities malicious security crackers may have to attempt to compromise your computer, and make sure those points of entry are as locked down as reasonably possible. In some respects, this is just an extension of the points about shutting down unneeded services and encrypting sensitive communications, except that in dealing with foreign networks you must be especially stingy with the services you allow to run on your system and what communications you consider “sensitive.” Protecting yourself on a foreign, untrusted network may in fact require a complete reworking of your system’s security profile.

9. Get an uninterruptible power supply. You don’t just want a UPS so you won’t lose files if the power goes out. There are other, ultimately more important reasons, such as power conditioning and avoiding filesystem corruption. For this reason, make sure you get something that works with your operating system to notify it when it needs to shut itself down, in case you aren’t home when the power goes out, and make sure you get a UPS that provides power conditioning as well as battery back-up. A surge protector simply isn’t enough to protect your system against damage from “dirty” power. Remember, a UPS is key to protecting both your hardware and your data.

10. Monitor systems for security threats and breaches. Never assume that just because you’ve gone through a checklist of security preparations your systems are necessarily safe from security crackers. You should always institute some kind of monitoring routine to ensure that suspicious events come to your attention quickly and allow you to follow up on what may be security breaches or threats to security. This sort of attention should not only be spent on network monitoring but also integrity auditing and/or other local system security monitoring techniques.


11. Enable MAC Address Filtering Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.

12. Do Not Auto-Connect to Open Wi-Fi Networks Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.


13. Assign Static IP Addresses to Devices Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.

14. Defrag your hard drive Run a utility program to "defragment" your hard drive. The utility will place your files in contiguous cluster and will optimise your hard drive, placing your most frequently used files up front for faster access. This will improve performance over time. You should run your defrag utility frequently to minimize the time required to complete the task. If possible, run the defrag utility once a week, or at a minimum, once a month.

15.  Avoid social networking sites. Sites like MySpace and Facebook are a dream for thieves and stalkers. They allow anyone the ability to gather information about you that may aid them in stealing your identity. Think twice before you post any sensitive or damaging information on these sites.


16. Filling in web forms and registration pages - There may be nobody behind you watching you as you type. But that doesn't stop a keylogger (a program or device that logs all your key-strokes) from collecting your information. Try to keep all sensitive material on your own machine (the one that you maintain and protect), and keep it off those public computers.

17. Disconnect from the Internet when not in use. Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you're not online lessens the chance that someone will be able to access your computer. And if you haven't kept your anti-virus software up-to-date, or don't have a firewall in place, someone could infect your computer or use it to harm someone else on the Internet. and help protect others: disconnect!

18.  Reboot Your Computer Since many of today’s PC’s and Laptops now have Power-Save options, it’s natural to forget that your computer needs to reboot occasionally. When you make changes to your computer’s settings, or install new programs, it can help to reboot your PC to help these changes to take effect.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Republic Act No. 7394 "The Consumer Act of the Philippines"

 "The Consumer Act of the Philippines" 

REACTION/COMMENTS:

       It is the policy of the State to protect the interest of the consumer, promote his general welfare and to establish standards of conduct for business and industry. The objectives of this Act is all focused to the welfare, protection and rights of all the consumer in the Philippines.


      As I read the Consumer Act of the Philippines it is implemented  for the interest of all consumers. We benefit for this Act because all of us is a consumer.

      The Objectives of this Act is the following:

  • protection against hazards to health and safety; protection against deceptive, unfair and unconscionable sales acts and practices;
  • provision of information and education to facilitate sound choice and the proper exercise of rights by the consumer;
  • provision of adequate rights and means of redress; and
  • involvement of consumer representatives in the formulation of social and economic policies.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Case #5: How new technology rewiring our "BRAINS"?

How new technology rewiring our "BRAINS"?


Fractured thinking might be on the rise in our digitally interconnected world of multitaskers. The old adages about all things being in balance and too much of a good thing applies to our brave new world of information overload. Our attention spans as well as the very way we think is being affected - and continues to be affected even after we turn off the computer or smartphone.

By spending so a lot time with e-mail, chat, text messaging, and other forms of communication where information is presented in short bursts but there is so a lot incoming information continuously, we are in fact training our brains to value the superficial and losing the capacity to concentrate and think deeper. Research study after research study shows that despite what people imagine about themselves, human beings grow to be worse cognitively after a life full of instantaneous communications.

Juggling the constant influx of information undermines our capability to pay attention. Bursts of information play into a primitive impulse of our human psychology to immediately respond to threats and opportunities. It echoes our distant past when we were defenseless creatures continuously searching for food while simultaneously searching out for hunters that would eat us.

This sort of simulation provokes a particular type of excitement to which our brains, addled by dopamine as well as adrenaline, become easily addicted. Yet despite the stress that all this excitement produces, we feel bored in its absence.

Thus starts a pernicious cycle whereby we find it harder and harder to concentrate while in effect desiring ever more the fact that we cannot concentrate!

Technology is literally rewiring our brains, because even after people give up all their computers and smartphones it's very tough to reset our brains. Still think you're a multitasker?

How gadgets are rewiring our brains and our behavior

I think the New York Times article on “Attached to Technology and Paying a Price” is a bit overblown. Are we really that addicted to technology?
On average we consume 12 hours of media a day and we surf 40 websites daily.
I have to admit, when I got an iPhone I became more attached to technology — at times, I slept with it in my bed (and from what I hear is not all that uncommon).
The New York Times reports:
“The technology is rewiring our brains,” said Nora Volkow, director of the National Institute of Drug Abuse and one of the world’s leading brain scientists. She and other researchers compare the lure of digital stimulation less to that of drugs and alcohol than to food and sex, which are essential but counterproductive in excess.
So fine, I did get side tracked yesterday while I was surfing the Internet and was late to a brunch. Maybe technology is so habitual that we are unaware of how much we depend on it. I must admit when I didn’t have a smart phone or Internet for 2 weeks, time went by more slowly and I read paperback books.
Now if you are wondering if you spend an unhealthy amount of time on the Internet, you might want to take a self assessment. No doubt, access to the Internet widens the range of temptations — so much so, scientists are finding that people who have a gambling problem also have a “problematic Internet” behavior.
Technology is a utility and we depend on it, so of course, it is changing our habits and our brains.
The NY Times also reports that experts think that this media overload makes us “impulsive, forgetful, and  even more narcissistic.” Oh, and I just thought that was just a part of living in New York.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Case #4: Information Technology OutSourcing

Information Technology Outsourcing (ITO)

It is a company's outsourcing of computer or Internet related work, such as programming, to other companies. It is used in reference to Business Process Outsourcing or BPO, which is the outsourcing of the work that does not require much of technical skills.

Advantages of Information Technology Outsourcing (ITO)

1. Focus On Core Activities 

In rapid growth periods, the back-office operations of a company will expand also. This expansion may start to consume resources (human and financial) at the expense of the core activities that have made your company successful. Outsourcing those activities will allow refocusing on those business activities that are important without sacrificing quality or service in the back-office.
Example: A company lands a large contract that will significantly increase the volume of purchasing in a very short period of time; Outsource purchasing.

2. Cost And Efficiency Savings

Back-office functions that are complicated in nature, but the size of your company is preventing you from performing it at a consistent and reasonable cost, is another advantage of outsourcing.
Example: A small doctor’s office that wants to accept a variety of insurance plans. One part-time person could not keep up with all the different providers and rules. Outsource to a firm specializing in medical billing.

3. Reduced Overhead

Overhead costs of performing a particular back-office function are extremely high. Consider outsourcing those functions which can be moved easily.
Example: Growth has resulted in an increased need for office space. The current location is very expensive and there is no room to expand. Outsource some simple operations in order to reduce the need for office space. For example, outbound telemarketing or data entry.

4. Operational Control

Operations whose costs are running out of control must be considered for outsourcing. Departments that may have evolved over time into uncontrolled and poorly managed areas are prime motivators for outsourcing. In addition, an outsourcing company can bring better management skills to your company than what would otherwise be available.
Example: An information technology department that has too many projects, not enough people and a budget that far exceeds their contribution to the organization. A contracted outsourcing agreement will force management to prioritize their requests and bring control back to that area.

5. Staffing Flexibility

Outsourcing will allow operations that have seasonal or cyclical demands to bring in additional resources when you need them and release them when you’re done.
Example: An accounting department that is short-handed during tax season and auditing periods. Outsourcing these functions can provide the additional resources for a fixed period of time at a consistent cost.

6. Continuity & Risk Management

Periods of high employee turnover will add uncertainty and inconsistency to the operations. Outsourcing will provided a level of continuity to the company while reducing the risk that a substandard level of operation would bring to the company.
Example: The human resource manager is on an extended medical leave and the two administrative assistants leave for new jobs in a very short period of time. Outsourcing the human resource function would reduce the risk and allow the company to keep operating.

7. Develop Internal Staff

A large project needs to be undertaken that requires skills that your staff does not possess. On-site outsourcing of the project will bring people with the skills you need into your company. Your people can work alongside of them to acquire the new skill set.
Example: A company needs to embark on a replacement/upgrade project on a variety of custom built equipment. Your engineers do not have the skills required to design new and upgraded equipment. Outsourcing this project and requiring the outsourced engineers to work on-site will allow your engineers to acquire a new skill set.


Disadvantages of Information Technology Outsourcing (ITO)


1. Loss Of Managerial Control

Outsourcing
Whether you sign a contract to have another company perform the function of an entire department or single task, you are turning the management and control of that function over to another company. True, you will have a contract, but the managerial control will belong to another company. Your outsourcing company will not be driven by the same standards and mission that drives your company. They will be driven to make a profit from the services that they are providing to you and other businesses like yours.

2. Hidden Costs

You will sign a contract with the outsourcing company that will cover the details of the service that they will be providing. Any thing not covered in the contract will be the basis for you to pay additional charges. Additionally, you will experience legal fees to retain a lawyer to review the contacts you will sign. Remember, this is the outsourcing company's business. They have done this before and they are the ones that write the contract. Therefore, you will be at a disadvantage when negotiations start.

3. Threat to Security and Confidentiality

The life-blood of any business is the information that keeps it running. If you have payroll, medical records or any other confidential information that will be transmitted to the outsourcing company, there is a risk that the confidentiality may be compromised. If the outsourced function involves sharing proprietary company data or knowledge (e.g. product drawings, formulas, etc.), this must be taken into account. Evaluate the outsourcing company carefully to make sure your data is protected and the contract has a penalty clause if an incident occurs.

4. Quality Problems

The outsourcing company will be motivated by profit. Since the contract will fix the price, the only way for them to increase profit will be to decrease expenses. As long as they meet the conditions of the contract, you will pay. In addition, you will lose the ability to rapidly respond to changes in the business environment. The contract will be very specific and you will pay extra for changes.

5. Tied to the Financial Well-Being of Another Company

Since you will be turning over part of the operations of your business to another company, you will now be tied to the financial well-being of that company. It wouldn't be the first time that an outsourcing company could go bankrupt and leave you holding-the-bag.

6. Bad Publicity and Ill-Will

The word "outsourcing" brings to mind different things to different people. If you live in a community that has an outsourcing company and they employ your friends and neighbors, outsourcing is good. If your friends and neighbors lost their jobs because they were shipped across the state, across the country or across the world, outsourcing will bring bad publicity. If you outsource part of your operations, morale may suffer in the remaining work force.

Implications of  Information Technology Outsourcing (ITO)

    Areas Specifically Affected

  1. The areas impacted by HR outsourcing include some of the most transaction-heavy functions of personnel. This covers areas such as hiring, payroll processing, health benefits and retirement account management, collections, employee training, and IT areas that support the information and records needed by personnel.
  2. Nimble Staffing

  3. Clearly, one of the most attractive impacts of HR outsourcing is a perceived benefit of staffing flexibility. Companies can add or cut staffing as needed or as workload demands without worrying about being entangled in messy employee terminations and long hiring processes. This assumption generally works with outsourcing as long as the function outsourced is fairly general and standardized. If the tasks involved are highly specialized and require unique training, then the company will find itself in a pickle with perennially under-skilled staff.
  4. Waiting for Results

  5. One of the more common misconceptions is that a company that begins outsourcing its personnel functions will see profit and gains right away. Frequently this does not occur. In fact, the opposite occurs where additional time and costs are realized getting the outsource provider to perform as desired. The benefits of efficiencies and moving redundant tasks outside are seen over a long-term period once the changes settle in.
  6. Immediate Savings

  7. An immediate short-term impact is usually seen in the reduced cost of operation, at first. Many outsource providers will gauge what the cost of the functions are currently for the client company and price below them to be attractive. In the first years of operation this cost comparison will hold true, favoring the outsourcing option. However, as demands increase, specialization is desired, or workload increases, the cost for the outsource provider's services will go up.
  8. Transition Expenses

  9. As noted earlier, another immediate impact will be the expenses associated with getting the outsource provider started in supporting a client company. Few situations allow an outsource provider to just start up cold. There will be training, familiarization, travel, certification that new processes will be correctly followed, and more. Frequently, transition to outsourced personnel support takes about a year to complete, depending on the scope of the services transferred. Simultaneously, there is also the cost and time spent eliminating the home staff that have now become surplus.
  10. Caveat

  11. An assumed impact by some companies who don't understand business law is to assume that once personnel functions are outsourced, the home company management is no longer responsible for them. This is not true; companies who outsource their services are still legally responsible for those functions and their actions under vicarious liability, a legal concept that extends legal responsibility to those who act in the name of a company. This can include both employees and vendors acting as a proxy for management.




  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Case Study No. 3 (FACEBOOK)

Case #3:

Questions and Answers:


    1. What is facebook?

                 - Facebook is a social networking website intended to connect friends, family, and business associates. It is the largest of the networking sites. It is a place to communicate with friends and family, to share photographs, play social game, and chat interactively with your buddies. It was founded by 2004 by Harvard student Mark Zuckerberg. Facebook users create a profile page that shows their friends and networks information about themselves. The profile typically includes the following: Information, Status, Friends, Friends in Other Networks, Photos, Notes, Groups, and The Wall.



    2. Advantage and disadvantage of facebook?

                   - Advantages of Facebook are the following:
· Allows user search for new and old friends
· Accessible to chosen universities having a high level of security
· Makes it less awkward when communicating with strangers or people you are not        familiar with
· Love attraction - can be used as a dating service system
· Makes it easier to join groups having similar likes and dislikes
· Allows members to check students who are taking the same class, living within the same area, or coming from the same academy

                   - Disadvantages of  Facebook are the following:
· Overcrowding
· Weakening long distance relationship
· Contributes wide-range procrastination
· Rampant addiction
· Stalking is possible
· Acquaintances be labeled as friends



    3. What are the charcteristics of facebook why many people engage in this site?

                  - Characteristics of facebook are the following:

  1. Learnability – Facebook is quite easy to adopt for its intended audience, and has a very intuitive and simple user interface.
  2. Efficiency – people can also find an application that will suit their more advanced needs.
  3. Memorability – it has a consistent layout and graphic design. Facebook rarely pulls any surprises.
  4. Error-handling – less errors because of AJAX, users hardly ever see a blank screen with garbage
  5. Satisfaction – more people satisfy of its look and applications or features.



    4. Can you use facebook in e-Commerce?How?Why?

                 - Yes, facebook can be use as e-commerce by means of the following:

  • Advertising: Businesses use this tab to create adverts that will run on Facebook pages
  • Pages: Businesses use Pages to create a presence on Facebook that will let others join your page as a fan
  • Connect: Facebook connect lets users seamlessly connect their Facebook account and information to your site.
  • Facebook Share: Design a button for your site to make joining your Facebook Page easy for your customers 
  • Discussion Boards: Enable your fans to get their ideas out into the open. Discussion boards let you know exactly what your fans and customers think and want.



    5. How facebook important in the society today?

                - Facebook helps our society, humans wants to be social and facebook allow us to be this way, no matter where we are at.
                - Importance of  Facebook in the society are the  following:

Keeping in touch
By maintaining a profile on these sites, your loved ones, friends and distant relatives don't have to call you everytime just to stay in touch with one another

Job hunting
Several companies are taking advantage of Facebook  to get competent employees. On the other hand, job applicants take advantage of these sites to post their resume and credentials. It's a great tool one can use in order to make a good impression to a company. If you're applying for a computer related job, it would be great to maintain a personal profile.

Emergency
Many people consider these sites as a work of the devil. It could be. However, one must realize that anything can become good or bad depending on the person's intentions. Social networking sites has shaped our world whether we like it or not and it will become an indispensable tool if it's used for good purposes.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS