Monday, December 15, 2008

Our Project Update - Past Technology

Universal Wireless Charger

That is the title of our project in Future technology subject. We were supposed to present and display our diorama to the public last December 8, 2008 but unfortunately because of inevitable events we hadn't anticipate, the display was moved to another date which is on January 6, 2009. So, to all the people who we wanted to witness our arts and knowledge regarding the subject matter, here is our diorama presented to you:



So, This how the past technology of universal wireless charger would looked like...
This an unfinished product yet but we (the GROUP) would really try our very best to finished it before January 6, 2009.

Good Luck to US!


Sunday, December 14, 2008

The Events that Influenced the Innovation in Technology

Relation of events in society to the innovation in technology:

Innovations in technology are provided due to the necessity of the society about something which could help them make the life better. Technology of today has the aim to help preserved the environment and with the motivation to lessen the harm the technology could contribute to the rising destruction it can give to the environment. Global warming as what I have known was the result of the too much exploitation in technology.

Since before, technology as we cannot deny it, is the major contribution of pollution and/or the major pollutant maker in earth’s atmosphere. In space technology, the space shuttle is one of the world’s innovations in technology when the human race begins to explore the galaxy and the world beyond the outer space. It all begun when humans get curious on what kind of place is beyond the stars and what the stars, what kind of matter does the moon have and can the human race survive to live there, and what the other planets looked like when the Apollo 11 spacecraft successfully launched and landed on the moon. The discoveries on the moon motivate the scientists to explore more on the outer space and yet send other modern spacecraft to do missions of discoveries in space. With these space technologies, we had picture out the galaxy and the Milky Way. But did you know that when these spacecraft technology leave the space of the earth left millions of dust when launched to their mission? Yes, launching the spacecraft or space shuttle can cause air pollution and harm millions of people around the globe. So, recognize why the craft is being launch in an isolated dusty area. Just think of it being lunch in a city or near the city. Picture it out in your mind and you will find the answer.

Another event in the society that as one of the bases in innovation in technology is war, as it is always. I say so because it is what reality propel. Since the World War 1, technology innovates from the other to another more modern and high-tech. As what we have learned, Internet was invented in the time of war between the Soviet and United States. From then on, rise of new technology increases and the innovation goes on and on until the present time. War is the major contributor to the innovation of technology from then. Developed countries around the world continued to grow because of the technology they had invented such as Europe, United States, Japan, etc. Just like what I have watched in the ZDnet.com. The organization is under invention of new technology to make the life of the battery of a radio the military used in wars. The technology I am talking about was introduced during the presentation of our group in our Future Technology subject. The innovation in the technology is that, to be able to make the energy of the battery restored, it will only be placed in a charger and shake for a minute of time. After such short time of charging, the battery has gained its energy back and is ready to be use again to its purpose.

Weaponry technology innovation is the fastest of all innovations in technology. I think so because this innovation is for the preparation of incoming World War three? Actually, there is a possibility of such prediction because China and North Korea, as what I have heard in the news, displays the new innovation of their weaponry in parades not only for publicity and to aware the society also. Not only had the two mentioned countries are dynamic in technology innovation. Japan is one of the major distributors of high-tech gadget all over the world. And as we all know since the World War one, Japan is already in innovation of their technology and adhere to the fast modernization of the other countries like United States and Europe. Because of there main distribution in digital technology gadgets like Nintendo, Humanoid Robots and virtual receptionist, Japan is a country that is really fully developed in technology. In our country, the only innovation in weaponry that I had heard was about the automated police dog of the Philippine National Police in Quezon City. Though the technology is not totally high tech in physical attributes, but it has the capability and ability to do its purpose such as looking for bombs. I heard that it is the technology used in the investigation in Glorietta Mall but was not really sure if that was really true.

Well, I really think that the purpose of innovation in technology is just to make the work faster and more efficient. The Election technology in the United States is another innovation. Since the country is composed of fifty-one states, it is very slow and intimidating to make the people vote in old fashion way and/or ‘ancient’ procedure of election like our country is still on application. Instead, they had decided to conceive an electronic voting system where it is easy and does not take time to vote. Yet the result will automatically reflect after each vote from the voters. I was glad when I heard that the Autonomous Region of Muslim Mindanao area had introduced an electronic election system intended only for their region boundaries. I thought it was the same as the United States has but I was quite disappointed when a hard copy of voting result came out from the system. I was mistaken when I conclude that once the voter votes, the result will reflect to the total votes of the running politician’s count. Well, the expectation I had in mind was not applied because of some factors I had to anticipate. Maybe lack of fund is one. Our country does not have the innovation in election technology and is still using the ‘ancient’ and inefficient voting system application.

I have observed also that because of the worse result of global warming to the environment, technology now a day is innovated not only to make efficient and accurate works but also to minimize the side effect of technology to the environment and not worsen the present status of global warming to the world. In short, technologies are now eco-friendly in terms of its purpose and its goal. I think the quote that says, ‘what something has brought will be its downfall’ will be realize. Because of human’s eagerness to make life better with the innovation in technology, it resulted to too much negative effect to the society especially to the environment. Other technology were sought to destroy the natural resources supposedly present in our planet. Because of these results, environment friendly technology was introduced to the world.

In our country, the innovation in technology which is eco-friendly and has the aim to help preserve the cleanliness of the air and minimize pollutants that cause air pollution from cars, trucks, jeepneys, etc are the water-based car engine and the smoke regulator. The former uses water as its gasoline in order to start the engine and run the car. While the latter uses a regulator connected to the smoke pipe of the car to control the smoke content before it is whipped out to the air. But unfortunately, the former technology was now being adapted in Japan in their public buses. Why is that so? It is because of lack of funding to implement the innovation in our country so it was sold in Japan by its inventor. The latter was in application here in the country but is privately sold and manufactured by its creator.
Another one is the innovation in medical technology, the manufacturing of high-tech gadgets for hospital and medical use and application; just like the gadget used in checking for the pre-natal status of a pregnant woman. Now a day, an incoming mother and/or a mother could actually see the figure of its unborn child in a screen in more realistic three dimensional ways. This application is now very present in hospitals locally located here in Davao and nationwide.

But I had this question that lingers in my mind since I started typing this journal. Does the innovation in technology stop? Well, to answer my own question I think it will never as long as the society and the world are in need and the geniuses are not satisfied about what they had discovered, innovations in technology will continue to grow and become more modernized. But I had also observed that once a technology is innovated, the innovation of other technology closely follows because of the relationship between them. Just like when computers had new specs, mobile phones will also have new innovations. Cars had innovated to using of Geographical Information System, televisions turn slim to save the use of too much space in the household, Mobile phones applied digital cameras and other applications such as internet, Bluetooth, infrared, etc to make the transfer of media in a fast and easy way. Innovation in technology as a conclusion is just a mere result from a competition of countries, organization and/or corporations. It is surely okay for innovations and modernizations but not to the extent that we will lose our planet and make our world dreadfully wired to the technology we invented.

*Assignment 3 due December 12, 2008

Wednesday, December 10, 2008

Validation Processing

what is really the validation processing?

I looked for an adviser and i got one, he is just around the University perimeter and is easy to approach. I already got my research instrument advised and approved by my adviser, and is undergoing validations but i think it will take time before i got my research instrument fully validated...

I only got two research validators and my question is; do i need another one to complete the required three? well, i think and i don't think so... i think because it is the required minimum number of research validator. i don't think so because i cannot look for another one. why? it christmas and the other professors are on-leave for christmas vacation... true?

But still to come up and meet the requirements i don't think I have a choice... I must look for another one is my option... hayyy...


I Change

I got bored with my old blog template when i visit my blog today. Recently, I loved what it look like but later on i realized that the color is so boring...I am not that artistic and I don't have time exploring the net for blog templates.

Well. I thought it is time for me to change the color of my blog template. I go for black... and change the rest components such as font style and color, etc. It looks nice to me then...

Change for another beginning... hmmmm, better do it before it too late...

Monday, December 1, 2008

What Lies Ahead?

Are you afraid of your future?
Am I afraid?
I am not Afraid.... not afraid of facing the future... Events will happen if it will really happen. All of the happenings that will come in the future are intended to come and yet is inevitable to happen. It will continue to happen because we choose it to happen in our lives.
Our technology in the future lies in our hands. It will be in high demand and will be in the stage of SUPERB in application and standards in structures. In the coming days, we are riding in jet shoes. Wow! we would be flying! Such a very high standard technology. Robots may appear in a more humanoid structure and figure with more human behavior. Cars may fly, building will rotate, farmiung can be in skycraper and payments could be done by scanning the barcodes tattoed to our wrist. Wow!
BUT could we live a life in a world like that? Can you imagine your self riding in a plane where your destination is the galaxy? I think I can igmagine that... huh?
What I am afraid in the technology to come is the evolution of humas and robot into one figure. Human brain with robotic body... uhmmm, possible to happen but frightening, I guess. The question is are we still unique in the future? In the present, we are losing our identity by pretending to be someone else on the other side of the virtual world of mobile phones. And besides I believe that technology evolves as war evolves... Technology are best invented for weaponry in the wars to come...

Sunday, November 30, 2008

Technology contribution as an IT Professional

The Idea of Household Innovation

If I would think my self as an IT professional, first I should be worthy of the title and the situation I am in. If in that case I am, I would introduced of a technology that would make human life mush better but not to the extent that they would become worthless and useless in terms of doing their chores. The technology would be a garbage scanner and segregator. This technology will help the environment because of its eco-friendly goal and applications.

The technology will improve the human’s way of garbage disposal. With this, people can just throw garbage in the machine and the machine will take charge of the rest. I thought of this idea because of the fact that even I, myself, do not think of segregating my own garbage at home. And another is we, Filipino are throwing our garbage without caring if the ones we threw can be recycled to a new material for another purpose or can be turn into organic fertilizers that we could use to fertilize plants, crops and trees which could lessen our expenses in buying those costly commercial fertilizers which for sure is composed of chemicals and preservatives.

The technology I think about is just in our home. Located in our backyards It is intended for household waste management to lessen the hustle of disposing sack of garbage to those timely garbage trucks and workers. The technology will be like an ordinary cabinet in your household but with control buttons as an option of task. There will be a pair of stainless bucket inside, one for the biodegradable and the other for the non-biodegradable waste. A person will throw its garbage by putting it inside and then the machine will automatically respond. The machine will speak as a response like a robot does.

First, it will scan what kind of object is inside and will identify if that object could be recycled or trashed automatically. If the object can be organically recyclable, then it will be automatically crushed down into powder like entity before being thrown into a bucket intended for biodegradable in the lower part of the machine. When the thrown object cannot be recycled like plastic, then it will grinded into small pieces before being thrown into another bucket for non-biodegradable.

The idea of making human life better but not to the extent that they would become worthless and useless in terms of doing their chores is maintained in the technology because the house owner will still throw the entities inside the non-biodegradable buckets to the garbage collectors for recycling. The organic garbage will be used after being crushed as fertilizers to our gardens in the backyard. The technology will be a new household innovation and additional technology in the kitchen. It would be nice if we have that kind of innovation in our home but their will still a big BUT if the idea of doing such technology will come true.

Wish ko lang....

Another is a mobile phone that does have to charge its battery for energy restoration. Because I recognize that cellular phones and mobile phones battery are fast to deteriorate its preserve energy so it is really necessary to recharge the battery for how many hours., maybe one or two hours with the use of fast charging battery chargers. To resolve this situation, why not thought of a battery that is kinetically charge. Kinetically charge is the word because it will only be shake or swayed to simulate the energy and restore. Then you can use the mobile phone in a minute of shaking and swaying the battery with your hands. Hmmm, why not! It would only not lessen the usage of electricity and too much waste in energy but it would also motivate to your body to move and exercised through the shaking and swaying way. It could be, because sooner there would be a charger just like this idea. Just look for ZDNet.com and watch the new generation wireless charger. Try! Actually there are so many futuristic technology being invented nowadays but is not yet implemented for censorship and limitations of information. Censorship is applied!

I also though of this technology but I doubt it would be possible to implement in our world today. It would be transportation technology that would make our way of transporting form place to place in a fast and more convenient way. This is no flying car but we can fly. If you think of a jet pack, it is also a big NO. The idea is having a Jet shoes. Fantastic, is not it? Fantastic because we could fly to our destination without any more hustle in waiting for buses or jeepneys or trains for several minutes up to hours in a terminal or bus stop. With this technology, we only need to wear it in our feet, and then we FLY! This technology could also lessen the pollution in our air. Jeepneys and buses as we all know contribute air pollution because of the smoke that came out from them. But I think we cannot afford of such technology because of the fact that we have NO funding and the government have to intentions of supporting any research that would be useful not only in our country but in our lives. Just like the new technology present in Japan today. Water based engines for cars and buses. The idea come from a Filipino scientist and was also proven and tested. But it was neglected by the government when he proposed it to them. Instead, Japan bought his idea and now is implemented and in progress in their country. There are so many technologies we can think about in terms of being eco-friendly, energy-saving, fast-transport, waste managing, etc. the only problem with the implementation of these ideas in technology is the financial assistance and support from the higher authority or the government. We all know that the main purpose of proposing a technology is to help make our life better with no intentions of destroying our environment and our world. But we also know that what we could make could also be the one to destroy us. A reality that we should remind our self about.


Assignment 2 : December 5, 2008

Friday, November 28, 2008

Technology in our LIFE: Reasons and Influences

There are Reasons WHY We use technology:


Technology is always part of our households and is always connected with our life's necessities. For technology are invented to help us in terms of:

1. making our life easier
2. Entertainment
3. lessen heavy work loads
4. fasten our work / work accuracy
5. trend

The Influenced of technology in our LIFE:

Humans used technology since before time of Christ. Technology is a fast process which reflect the progress and development of inventions and engineering. Technology influenced us because it is part of our daily life and will always be part of it. technology influenced one's self in terms of: Character, lifestyle, social development, and its race. Technology is fast changing because of the global change also.

Technology change as our necessity for it change. It change because of the trends around it that it need to evolve from its current development to another development to cope with the trend humans are engaged into. But sometimes technology can be the one that could make us dependable to. Somehow, it make our chores easier and fast but because of that we became more dependable to them. Though technology is around us, we always depend to our self and the things that we can do with or without it in our hands.

We should take control of the technology around us and make sure that we can benefit from it. Not only us but specially our grandchildren in the coming generations. Let's make our world GREEN and at least CLEAN! :]


Assignment 1: November 28, 2008

Monday, November 24, 2008

How did we get here?

The reflection:
How do I get here? a question that i had difficult time to answer in deep confusion. Well, I get here in my present condition and situation because i chose to be here and accept all the things that happen to me in the first place.
After all the trials i Get into and all the trials that would come, I think of myself as a woman of little maturity in me. A mother and student at the same time, TIME management is really the big thing to manage about. School is a hassle that should be taken in schedule and home is a place where my time should be divided into my child, to his father and to the chores a mother should do.
I became a little unprofessional and quite in tardiness because of the unevitable things and situations that come in my way. It is really difficult for me to be a mother and student at time but I am really trying and doing my very best and effort to do the job without dropping either of them.
I hope i can do more and the best to both! May The One help me in everything...

Update in need

About my research

The gantt chart: my research time frame should now be strictly followed in terms of consultations and updates. and anything that happen on the progress of my research.

The Paper: my research in on the process of drafting the research instrument which is the survey questionnnaire. I have draft it but I am quite in doubt about its content. So I really and badly needed someone to help me in terms of suggestions and corrections about the content. And yet that someone is not yet found.

The Collaborators: Well, i am still searching for them. I have chosen an adviser but i haven't received any feedback form her since i send her my Request letter. I came to her table but my letter is unfounded. I think its was threw to garbage. then if that's the case, I have to look for another one, I think...
I dont have validators of my research instrument. I dont know who to approach to be my validator... i am in deep confusion right now... huhuhu

The other things: Well, Last Sat is our class reporting sked and we received a sermon from our professor... he has the right to do so, I think... WE prepared like turtles in the preparations for our class reporting. We were very sorry during that time... tsk! tsk!

The fellow researchers: I dont know their progress in their research but Good Luck to them and to all of us!

The Professor: He would be strictly considerate from now on so I should better watch out!

God bless us all!

Thursday, November 20, 2008

Historicizing Cyberspace

What is Cyberspace?
All I know about cyberspace is a connection and collaboaration between humans and computers. This is a space of information humans have stored to share, connect and collaborate to other humans in a network... that is what i think.
But according on my reference,"Cyberspace is a term used to describe a new kind of "space" that has been made possible by the Internet.[1]" Yes, a space where people can be connected and gather information about something they wanted to look for. Possible connection made by the internet like what we used to see nowadays.
another is the term cyberspace gained notice after William Gibson's use of it in his science fiction novel Neuromancer (1984). "The portion of Neuromancer cited in this respect is usually the following:
Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts... A graphic representation of data abstracted from banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding".[2] The meaning is just a representation of data banked in a computer in the computer systems connected in network. That would be, i think...
THe History

The cyberspace history began in the Cold War days of Eisenhower adminmistration in the USA with the Russian. To respond to the technology launched by the Russian - Sputnik, US created Advanced Research Project Agency (ARPA) in 1958. the following are the person engaged to ARPA with the idea of making a connection between computer systems:
•J.C.R. Licklider – relationship between computers & humans
•Robert Taylor – idea of networking multiple computer systems
Taylor's idea was approved by the ARPA and sooner call for help with Larry Roberts – computer scientist (long distance computer networking) to make his idea possible. The latter came to ARPA in 1967, and ARPANet connection came together in 1969.

When the ARPANet is on air, one of biggest discoveries during the time was when Ray Tomlinson used @ symbol to delemit the domain name in an e-mail address. He was the first person to send E-mail. The major problem with ARPANet is in 1973, when it has encountered heavy internet traffic. Vinton Cerf & Bob Khan developed Transmission Control Protocol/Internet Protocol (TCP/IP) to face the problem.With this new transmission protocol, the Internet continued to grow until today.
Many have engaged to internet since then, even the white house. E-mail is one of the hottest applications use in the Neteven today. File attachment such as multimedia files can now be attached when making e-mails. the Mostly used E-mail applications are: MS Inbox, MS Outlook or MS Outlook Express and Netscape Mail or Netscape Messenger.
The Web is nothing but exciting! It can generates lots of money and when lots of money come - excitement then follows. Nowadays, the Web is even more convenient and user-friendly. there are emergence of web portals such as Yahoo!, Excite, Lycos, Infoseek, etc.
In the future, the internet could be converge to other applicaitons such as televisions, news, etc. like intercasting for example. Intercasting combines the interactive nature of the Web with television programming. Users can use the Internet to access information that complements a participating television program.
So, let us see what excitement the internet and the web could do for us in the future or as sooner as possible!

References:
1. Encyclopedia of Science, Technology, and Ethics.Cyberspace. Copyright © 2001-2006 by Macmillan Reference USA, an imprint of the Gale Group. All rights reserved.
2. Retrieved from "http://en.wikipedia.org/wiki/Cyberspace"Categories: Cyberspace Internet history Virtual reality William Gibson last modified on 17 November 2008, at 18:10.
3. Dodd, Jeff. Before You Begin.March 1999 • Vol.5 Issue 3
Retrieved from http://www.smartcomputing.com/editorial/article.asp
?article=articles%2Farchive%2Fl0503%2F02nb%2F02nb.asp&guid=ml2vnh7a&WordList=
November 18, 2008

Friday, November 14, 2008

THIS IS IT!

THe Core of the research is coming near...and is already here...

WEll, I am very much in the depth of my thinking what to do with the implementation of my study. I am choosing who would be my research collaborators. I am looking for persons to validate my research instrument before it would be preesented to the forum for approval to distribute. Well, now I am looking after my research adviser. I already chose one but I do not know if she would permit herself to be my adviser... hahay... I hope she will...

Future technology:

Another expensive subject. hehehe!

VEry much! Anyways, I did a gantt chart for the two subject, yet the gantt chart is in total disaster and there are tasks to be corrected. hahay....

I did another one and I will passed it on Monday. I hope this time, it is correct and very much OK to sir gambs... hehe

GOOD LUCK TO ME!

God bless to all!

Monday, November 10, 2008

Another Burden?

I am back in the track!

I missed this task of typing my ideas and posting it in my blog corner. we'll now I am back! Not only me but all of the students enrolled under the subject Elective 2. We are required to continue the implementation of our research proposal in the subject CS Research Method we enrolled last semester.

Another expensive subject...but it is required yet we are obliged to accomplished what we had started. And since the classes in the university has started, it is also the time to begin the study... and this time surely we should follow what we had indicate in the gantt chart.

hahay... go! go! go!

To my blog, i missed you! hahaha! you will be updated from now on... :]

God bless to me and to my fella researcher!

Monday, October 27, 2008

to treat or to trick?

I want to congratulate all researchers under our cs research method subject! our handwork already bear fruitful success... but don't celebrate too much because another challenge will come on hand.... the continuation of our research proposal will be coming SOON...

thus, in regard with the incoming paperwork trials, let us not be disturbed. let us enjoy the remaining time to enjoy and live our lives to its fullest! our future is in our hands! let's be optimistic and persevere!

to our love ones who supported us morally and financially, big big thanks to you all!

to my baby boy 'elay', i love you baby...

to my hubby, thanks for being there! mwah!

to my fellowmen, if you believe to yourselves, nothing will be impossible!

To God be the Glory. May HE bless us all!


Sunday, October 5, 2008

Hard Copy: Proof of Work

I had already completed the research proposal outline but i don't know if the content for the proposal are the precise information needed in accordance for my passage on the research subject...

I have been out for a week for the reason that I encountered family problem and haven't done the hard copy for my proposal... I could not do the docu properly because of the depression caused by the problem that arised.

I go home in my hometown and faced the confrontation with the relatives of my mother. It was a hard time and make havoc in my mind... until now, I have the aftershocked of the happenings... but that's too personal and I'm unable to post it here in the blog site... maybe, later if its not that destructive to me... (hope you get what I mean folks).

So, today, I am doing the drafting of the proposal documentation and checking for corrections and additional info...the hard docu would be my proof that I did my job as student and researcher... hmmm...

I'll be passing it to the instructor for consultation and more corrections... hope it's satisfactory for my professor... he's the man of the research subject, you know... if he doesn't like the content, he would do some 'drawings' in your paper. Ouch! that would hurt me for sure... but I would thank him still... hehehe

God bless to me and to my fellow newly baptized researchers! :]

Tuesday, September 30, 2008

Research Work and Budget Plan

Outline of Proposed Research Workplan

  1. Analytical Framework Analysis
    1.1 Interpretation of Variables
    1.2 Preparation of problem outline
  2. Choosing of Research Collaborator
    2.1 Letter of Request and Approval
  3. Formulation of Research Instrument
  4. Submission of Research Instrument to the Forum Committee
    4.1 For Corrections and Suggestions
    4.2 For Validation and Approval
  5. Data Gathering through through the Research Instrument
    5.1 Informing the Respondents
    5.2 Letter of Request for distribution of Research Instrument
    5.3 Distribution of Research Instrument
  6. Tabulation, Analysis and Interpretation of Gathered Information

*Working days and date to the tasks listed above are not included.

Outline of Proposed Research Budgetplan

Tasks Budget Amount

Transportation Php 1,000
Internet Fees Php 250
Printing and Photocopy Php 250
Meetings and Consultations Php 1,000
?Snacks Php 500

Total Budget Amount Php 3,000

*Changes to the proposed budget amount are possible and are negotiable.

The above information are the proposed work and budget plan for the research proposal.

To God be the Glory. GBUA!

Am I Late for my Research Proposal?

Its been tough for new researchers like me to compose a research proposal. It's new, it's technical. I am not familiar in technical writing and I am a bit hesitant to check my Research grammatization or grammar.

Its my dead line tomorrow in accordance with my gantt chart/time frame, but I newly composed my research work and budget plan; in which I am hesitant also about it. ummm, I don't think It is the appropriate work and budget plan format. Uhmmm, I don't know. I do my work and budget plan because that's how I understand it... I hope my work is satisfactory to the viewers...

My budget plan, its quite a big amount but i am only considering the real situation i got into. Besides it is only a proposal and changes to the amount of budget would also be possible.
Uhmm, (wag sana sila magalit kung medyo malaki mga amount.)

I hope, i could cope with the requirements of this research subject. Good luck to me and to my fella researchers...God bless us all!

Tuesday, September 23, 2008

What to expect?

What to expect? thats the question i cannot answer. hayy, Research proposal ko. Im confused about it jud.

I can't expplain the confusion i feel in making the proposal for my research. Who will help me in case i have questions. aside from using the net for querries and our subject's forum, no one guide me jud...

VOIP is broad and new and... and... and... hayyy... About the proposal, I am blind what is the structure of a Work plan and budget plan, that's why i cant make any of them... hahayy

People are you knowledgeable of VOIP? Can someone help me there? HELP!!!!

Can do it still... am not losing hope! hehehe

The Expected Research Output

Expected Output

The expected output to be generated in the research would be precise information about the issues of VOIP identified in the research particularly in the integrity issues, vulnerability and security measures.

The output would also be an assessment on the level of awareness of the community with VOIP technology and services.

The issues in VOIP are a continuous process and are under study and research. The output information would be set as additional information with the existing information of VOIP and its issues.

The output information would be beneficial for students enrolled with IT, and to the educators for additional information. The consumers and future users of VOIP would benefit to the information generated for their awareness and advance security preparations.

The output would also be beneficial to other and future researchers for review, references and as the baseline information for related topic.The output would be appreciated by organizations related to VOIP in the local and if successfully in the national.

The output would be accessed by any individual; male and female. The individual can be a professional or student searching for information about VOIP, its services and issues.

Friday, September 19, 2008

Thoughts to ponder

I've been working on my research proposal this past few weeks, and I am quite worried of the possible results from the informations I gathered. Actually, I've been to a confusion of my research procedures. I have been confused on the methods I would use in order to attain the results. I don't even know what to do.

No one, yes, someone who would guide me aside from sir RSG, no one (knowledgeable about research) helps me. So, difficult.... hahayyy...

Thanks to search engines, these online information database really is a great help! haha. They've been my best guide and buddy in my research proposal. Such a helper...

My topic, about VOIP. So new in the business industry. Not yet widely expose what it is, but yet widely in use. Users just not aware about it. They're using VOIP but not aware of it. I've observe the advertisement of GLOBE. The new 24ever advertisement, I think that product use VOIP. Phone-to-PC internet connectivity? hmmm? I think so... SO NEW!

So, I think that I will really have difficulties in this research of mine. But to the people close to me, Please do help and I badly need your guide and knowledge! hehehe

To my classmates, please comment to my research update thread if you have info or readings about my topic. it will be highly appreciated. Your names will be mention in my acknowledgment! hahaha...

Kidding aside, Let's look to the bright side. Let's pursue this research, and will gain knowledge...and additional infos...
good luck to my fellow researchers!



Analytical Framework

















For more understandable illustration, please consider the figure 2 below:

Figure 2 shows the independent and dependent variables identified in the study. The box on the left identified the independent variables which were the VOIP service factors. The box on the right identified the variables dependent on the factors identified.

Research Methodology

Methodology


Research Design


This study would used descriptive and qualitative research method. According on the site (http://www.petech.ac.za/robert/resmeth.htm), “Descriptive research is thus a type of research that is primarily concerned with describing the nature or conditions and degree in detail of the present situation (Landman 1988)”. The emphasis is to describe, rather than to judge or interpret.


However, the researcher should observe the strict research requirement to acquire the possible results/output accurately.


According on the site (http://www.joe.org/joe/2002december/a1.shtml), “Qualitative research aims more at thoroughly describing a situation or explaining reasons for a problem or circumstance. It is typically thorough and provides in-depth understanding of a situation or group of people but does not attempt to quantify results”.


Thus, in the study to be conducted, it would merely describe the issues on VOIP services and the level of awareness of the chosen individuals in the community about the matter.


Research Instrument


The data in this study would be gathered through survey questionnaires to groups of people and a secondary data source through the data acquired from the World wide web and search engines.


Sampling technique


The sampling technique would be perform to the respondents knowledgeable or not about the study; but is aware of using the World Wide Web. The respondents could be working professionals and students of IT. The sampling would be intended to at least 50 respondents from either specified occupations.

Tuesday, September 16, 2008

VoIP Technology in the Philippines



The Philippines like no other nations, is a country manage to adhere with the fast evolution of technology even though it belongs to the third world of underdeveloped countries. It was just in recent times that VoIP was introduced in the Philippines.

In May of 2006, a deregulation bill was passed and was approved to the House of Representatives according on the site (www.voipcentral.org/entry/house-passes-voip-deregulation-bill-in-the-philippines/). The bill indicates that VoIP has been accepted and widely spreading in the country.

In September of the same year, MozCom released a product integrated with VoIP services which was known as ‘VCall’ according on the site (http://www. blogcrm.com/voip-in-the-philippines-killer-dude.php). Mozcom is the Philippines’ very first commercial ISP (Internet Service Provider), and received the license to operate VoIP service in August 2006 from the National Telecommunications Commission. The product integrates a web casting technology. In order to use the VoIP service, a user account must be established in http://www.vcall.ph/ site.

SMART communication, as one of the leading GSM network in the country has been engaged to VoIP to widen its communication service. According to Alec Barton in May 2006, SMART chooses Nortel’s international gateway solution to offer a wireless VoIP services to its consumer in the country and abroad. The gateway solution will increase the bandwidth efficiency and widen the network’s geographical contact (www.developingtelecoms.com/content/view/430/26).

VoIP technology in the country works in the contact or call center industry; to promote better solution in attend to the customer’s concerns. According to Roberto L. Bacasong, a Customer Interaction Associate which is locally known as ‘call center agent’, “It is no doubt that the Philippines is one of the leaders in using VoIP services, as the country is known to be the key leaders in outsourcing.” (http://ezinearticles.com/?VoIP-Technologies-in-the-Philippines&id=707232)

Call center industry is quite spreading in the country and yet the same with VoIP technology. Sooner, VoIP services would be widely applied in home and businesses in the Philippines.

VoIP phone VS. Traditional Phone



For many years until the present, traditional phone which is commonly called telephone, was widely use in businesses and households. But recently, it has been phased out by the technology and features offered by the VoIP.

VoIP is better than a telephone in features and application. A telephone is only used for call connection to other telephone. It has directory lists of telephone numbers of the telephone subscribers. Better yet, cost is payable monthly depending on the type of call; if it is local or a long distance call. When doing a landline call, area code is added for local or national call and in long distance calls. Calls made can only be occupied by one caller at a time.

While in VoIP, calls can be made to any mobile numbers, to the same VoIP phone or through the computer. Some VoIP providers allow user to use traditional phone but with the use of adaptor. Costs are also the same of that of the traditional phone but with the additional monthly bill for the broadband service. VoIP has no directory assistance and no access to emergency call number unlike the traditional telephone. VoIP can take up many phone calls; and there is no need for the recipient to answer all the calls.

Telephone conversation with VoIP is more efficient and cost saving than those of the traditional telephone. Many VoIP providers offer services which can be less of charge than the usual telephone charge.

Integrity, Vulnerability and Security in VoIP




Integrity of VoIP
VoIP phones and infrastructure are connected to the internet through routers and servers; and is accessible by the availability of electricity or any power generator. In occurrence of power outage, connections between networks can fail. In this instance, VoIP providers arrive into using Uninterrupted Power Supply (UPS) to maintain electricity; but with the length of time of availability.

According on the site, (http://en.wikipedia.org) to deal with VoIP’s power dependency, VoIP providers needs to improve there connectivity through backup DSL and providing UPS or power generator on the site where VoIP are present.

Further, VoIP call is executed by sending voice over the internet; the conversation is broken up into packets. Then the packets are sent over the same network. This procedure could lead the network to congestion and Denial-of-Service. When this occurs, VoIP can be vulnerable to DoS attacks and threats; and attackers may take the opportunity to interfere in the conversation.

According to Paul Curran, calls could be corrupted by interrupting the RTP (Real-time Transmission Protocol) packets and changing the contents or execute delay into the call before it is received by the recipient (http://www.microsoft.com/uk/business/ security/VoIP.mspx). This may result to the disruption of VoIP call integrity.

To maintain integrity in VoIP, message or packet should be authenticated; and the packets should retain its content unchanged. Phones with caller ID should reveal the identity of the caller and calls should be recorded and guarded. If not so, the phone number can be hacked and used as a stolen account with the calling bills at the victim’s expense.

According on the site, (http://www.frost.com/prod/servlet/market-insight-top.pag? ocid=42936783) DoS attacks can be prevented by protocol tuning, buffering, configuring tags and port blocking. VoIP providers should provide failover session control service for backup in case of network failure or if the network is under Denial of Service. Authentication of network elements, such as the packet and message, can make the hackers difficult to interrupt in the conversations. The user needs to improve the communication security to lessen the threat occurrence.
With strong security build-up over the internet connection, it has less opportunity for the VoIP to be hacked.

Vulnerability of VoIP
"VoIP networks are known to be particularly susceptible to DoS and Distributed DoS attacks," says Butler Group Senior Analyst, Andy Kellett. "The convergence of voice and data networks means that successful virus-based attacks could be used to bring down the entire business with both voice and data channels potentially being paralyzed by a single attack model.” (http://www.microsoft.com/uk/business/security/VoIP.mspx)Convergence of voice and data networks makes the VoIP organizations cost efficient and process improve in the services they offered.

The susceptibility of VoIP through Denial of Service attacks and other threats is due to the organizations which install VoIP services which focus of the deployment of service is the throughput and the quality of service; and security of service is just the second option.

According to the Internet Security System in their article on “VoIP White Paper”, the quality of service is and always be an important component of voice transmission whether in analog or digital form. However, it must be realize that VoIP is also a data to be transmitted. To be able to transmit, the voice and message will be broken into packet first before being sent over a network; and this procedure is highly susceptible to number of attacks.

The primary types of attacks commonly associated with the vulnerability of VoIP are the following:
1. Theft of service which also known as ‘Toll fraud’
2. Eavesdropping
3. Impersonation
4. Phishing

Aside from these major attacks in VoIP, there are also other types of attacks according to the Internet Security System (ISS):
1. Call Re-direction
2. Information theft
3. Call Integrity compromise

Further, VoIP service is open and available as much as the connection with the broadband is highly present. Because of service availability, some attacks to VoIP could also be encountered, such as the:
1. DoS or Denial of Service Attacks
2. Spamming
3. Internet Virus
4. Worms
5. Hacking

In addition, since VoIP is vulnerable to all problems associated with broadband services, the vulnerability could affect the call quality in VoIP. This quality can be identified as the following according on the site (http://communication.howstuffworks. com/ip-telephony11.htm):
1. Latency
2. Jitter
3. Packet Loss

Because of these threats and attacks, phone conversation become corrupted, distorted and lost due to transmission errors. In order to deal with these, internet stability and strong security should be guaranteed and provided.

Security in VoIP
When conversation is performed, a session between caller and recipient is being initiated. According on the site, (http://www.securiteam.com/securitynews/ 5MP0C00GAM.html) the network layer that holds the session is the Session Initiation Protocol (SIP) which is responsible for creating, modifying and terminating sessions either with one or more participants.

According to the researchers of Royal Institute of Technology in Stockholm, Sweden, only few users of VoIP with SIP based telephony pay attention to call security. Most users overlook on how vulnerable VoIP service can be. Users of VoIP services today are primary concerned to the quality of service such as voice quality, latency and interoperability. But some security organizations, like ISS, are sending cautions to users about the dangers brought by unsecured VoIP services.

However, in order for VoIP to be adopted globally in the market, security facilities must be provided to address the worst security vulnerabilities of VoIP. "VOIP security needs to be handled in the overall context of data security," Krauthamer says, director of IT at Advanced Fiber Communications Inc. (AFC), a Petaluma, Calif.-based manufacturer of telecommunications equipment. AFC is using limited VOIP communications according to the article of Jaikumar Vijayan in the site (http://www.computerworld.com/).


But according to Maxine Kincora, “VoIP security measures won’t stop hackers”. (http://searchcio.techtarget.com) Because of VoIP’s vulnerability and unreliability, hackers were able to spread attacks in VoIP. Consumer could take cautions in order to protect their network from being susceptible to attacks and hackers. The other technologies could be protected basically; but with VoIP, no one is doing such protection.



However, there are things to consider in making secure VOIP which were the following according on the site (http://voip.about.com/gi/dynamic/offsite.htm):

1. Using of Firewalls

2. Enforcing Authentication

3. Using Encryption

4. Secure Service Provider



Security issues were the challenge for VoIP network, there are other steps to protect and prevent VOIP network from attacks according on the site (http://www.voiplowdown.com/2007/ voip-security-challenges-25-ways-to-secure-your-voip-network):

1. Restrict all VoIP data to one Virtual Local Area Network (VLAN)

2. Monitor and track traffic patterns on your VoIP network

3. Lock down your VoIP servers

4. Use multiple layers of encryption

5. Build redundancy into VoIP networks

6. Put your equipment behind firewalls

7. Update patches regularly

8. Keep your network away from the Internet

9. Minimize the use of softphones

10. Perform security audits on a regular basis

11. Evaluate physical security

12. Use vendors who provide digital security certificates

13. Secure your gateways

14. Manage servers separately

15. Sort SIP traffic

16. Examine call setup requests at the application layer

17. Isolate voice traffic

18. Use proxy servers

19. Run only applications that are necessary to provide and maintain VoIP services

20. Configure applications against misuse

21. Add endpoint security layers

22. Restrict access according to certain criteria

23. Avoid remote management

24. Use IPsec tunneling rather than IPsec transport

25. Secure your VoIP platform



With the help of these cautions, attacks could be lessened and later would be prevented; and the ‘vulnerable’ term to VOIP would be abandoned. With these steps and cautions, network hardware and software requirements should also be considered. Security measures would be useless if the network specifications were poor to accommodate the security demands. Thus, in order to secure VOIP, the network specification should be good enough to serve VOIP services.

Definition and Services of VOIP

Review of Literature

This chapter presents the concepts, facts, and studies related to the present study.

Related Literature

Voice-over-Internet Protocol is an interesting fact that makes a change in the world of telecommunications. It has almost banished the traditional phone lines from the business and home use all over the globe.

Definition and Services of Voice-over-Internet Protocol

VoIP or Voice-over-Internet Protocol is a protocol that makes the transmission of voice via internet connection possible or to other networks which uses packet switching method. It works through broadband and uses the internet to direct its calls. Packet – switching works in sending data packets through a network down into thousands of possible paths. VoIP converts the voice signal from the caller into digital signal before the recipient answers the call.

According on an internet site, (http://www.whichvoip.com/voip/articles/voip_ history.htm) VoIP technology begun in the mid 90’s when the Voltech Company released the software called Internet Phone which was designed to run on a home PC and uses the H.323 protocol instead of an SIP (Session Initiation Protocol) protocol that is used today; and was utilized by a microphone, which is commonly called headphone today, speakers and sound cards. This software represents as the first internet phone.

The site (http://en.wikipedia.org) held, VoIP transmit telephone calls over the same broadband connection. It has advanced telephony features such as call routing, screen pops and IVR implementation. VoIP are portable and work in any location with strong broadband signals and connections; and can access a phone line from many places. VoIP offers unlimited local and international calls with a fixed price; and can allow the consumer to have more than one phone number. There is almost zero charge for its conference calls, call forwarding, automatic redial, and caller IDs.

VoIP is an interesting technology with interesting services. The common services it offers are the following from the site (http://communication.howstuffworks.com/ip-telephony11.htm):
1. ATA (Analog Telephone Adaptor)
2. IP Phones
3. Computer to Computer

The first service allows connecting the ordinary telephone to the computer with internet connection in order to use VoIP. ATA converts the analog signal into digital signal before it is being sent over the internet. The IP phones are specialized phones for use with IP calls. It uses RJ-45 Ethernet connector which connects directly to the internet router and has the necessary software and hardware devices that enable an IP call. The VoIP service over computer-to-computer is the easiest way to use VoIP as long as the in internet connection is present; and the necessary hardware equipments are present such as the microphone, speakers and sound cards. Call cost is totally free no matter the distance in this type of VoIP service.

But there is also a limitation with the services offered by VoIP. According on the site, (http://www.onguardonline.gov/topics/ voip.aspx) in VoIP, there is no need to change for another phone number when the consumer wanted to keep its old regular phone number; but the processing is time costly. Temporarily, the consumer will take the option of using a new phone number. However, Phone numbers of VoIP is not included in a telephone directory listing unlike with that of a telephone registered to a local phone company. Thus, the VoIP user does not have an access to any directory assistance service.

With VoIP service, it is possible to call to an ordinary telephone connected to an adaptor, to a special VoIP phone, or directly from the computer to another computer. With that, anyone can call the number from any regular phone without using any special software and equipment.

Finally, from an internet site, (http://articles.directorym.com/VoIP_Phone_ Service_Vermont-r800278-Vermont.html#8001277) whether the computer is turned off, as long as the connection in the internet is active, VoIP is still available for access and usage. Whether in travel, VoIP can also be in use as long as the adapter or the special software and hardware is present, and the connection to the internet is activated.


Research: Significance and Objectives of the Study



Significance of the Study


The research study could provide information on the issues of Voice-over-Internet Protocol technology particularly on the integrity, vulnerability and security of VoIP calls.

Further, this study would also be a review on the VoIP Technology present and service providers based in the Philippines particularly in local Davao City area.

This study would be beneficial to the Commission on Telecommunication in the city as this study enhance the knowledge of the telephony providers and users about the possible issues on VoIP Technology.

Furthermore, this study would be beneficial to the telephony providers and the users as this study would provide the necessary information on the different threats and attacks in VoIP technology. This would expectedly heighten the awareness of the providers and the users to equip a counterattack to possible threats.

To the future researchers, this study can provide baseline information on the recent status of VoIP technology.


Objectives of the Study


This study aimed to determine the issues on the integrity, vulnerability, and security of phone call in VoIP Technology.

This study is designed to identify the possible types of attacks and threats on VoIP Technology and its measures.

This study would specifically persuade the following objectives:

1. To determine the integrity of phone call from Voip Phones
2. To determine the vulnerability of VoIP Phone calls
3. To determine the types of attacks from Voip phone calls.
4. To determine the measures of security from phone call attacks.
5. To realize awareness on VoIP services and issues to the future users.

Research: Introduction

Situational Analysis

In today’s global change in technology, every individual depends on things to make almost everything possible and easy in a fastest and effective way especially when communication is on hand.

Decades back, telephone is most commonly used for landline long distance communication which uses phone switching technology. Then mobile phone was introduced with dual functionality; for text messaging and voice calls. The internet also offers chatting and instant messaging communication; and even internet-to-internet voice chat with the utilization of headphones, sound cards and speakers.

To satisfy the demand of technology, VoIP (Voice over Internet Protocol) technology was introduced to make PC-to-PC connection possible; and later phone-to-phone connection that change the traditional telephony into IP telephony. According on the site (http://www.roseindia.net/voip/voip-history.shtml), VoIP works through broadband technology and uses the World Wide Web to direct its calls.

Though VoIP come out to the market, only few are knowledgeable of it. Many individuals have not heard of VoIP and its functions. It had been out in the business world since prepaid calling cards were introduced. Caller IDs used VoIP technology which is present in telephones used in homes and businesses today. Call centers are one of the user and providers of VoIP.

Many VoIP providers offer the use of VoIP technology and other telecommunication services with VoIP applications. Telecommunication industry is wide spreading. Phones with VoIP are commonly in used; but consumers were not aware of the issues related to the VoIP technology.

Since, Voip uses internet in order to function and deliver voice messages to various recipients. Depending on the internet means depending to the power of electricity. If there is a power outage, which means there, is no VoIP; and this instance can hinder VoIP call integrity and security. Internet nowadays is an attack-prone to hackers and also VoIP. Hacking the internet can make VoIP vulnerable to this attackers and threats; and is more prone to not secure phone calls and voice messages.

Further, attackers and threats may come everywhere at any given time; geniuses which past-time is to prank someone over the internet and send messages that are believable to the victims. Others use codes to implement hacking to one’s privacy; and some interrupt the connection between the caller and the recipient.

Consider the political intrigue the Philippine President got into during the 2004 presidential elections. The Presidential call was wire-tapped and was recorded; and later was engaged in controversy and was familiarized by the Filipino masses as the “Hello Garci” scandal. VoIP also can be picture-out like this.
Thus, it is important to provide adequate information in the context of awakening the community about VoIP and its related issues.

However, in propelling this opportunity, further reading is required; and research is essential.



Let us support FOSS!

But what is FOSS?

According to wikipedia.com, FOSS stands for Free and open source software, "is software which is liberally licensed to grant the right of users to study, change, and improve its design through the availability of its source code."

That's FOSS and let's indulged with it!