Wednesday, July 29, 2009

A wishful thinking…



I am starting to lose my friends. I feel empty. Every time I am alone, I had this feeling of being left behind. It keeps on making me sad every time I think of it. Sometimes it gives me the impression that I can’t have the right to keep my friends within my reach every single day. I can now barely find someone to talk to just like those old days. I just can’t believe that they seem afar. I know it sounds selfish, but I want to have those moments again with my friends.

There are times when I just sit alone pretending that everything was okay. Why do I have these feeling of being neglected? Perhaps we are really getting older. We are in the midst of getting what we want in life. We are now adults with more important things to prioritize to the extent of losing time for acquaintances and social gatherings.

If there’s one thing in my life was missing, it’s the time that I spent with my friends having never-ending talks. Nothing can ever replace their mean but sweet words when giving me advices.

I terribly miss my friends, enough to die. Hope we can have those old times. I’d really love to see my friends giving me smiles again. But it can’t be what it was before.

Time falls, everything changes. Now is the time for me to learn on living a life on my own. Hugging and comforting yourself is a bit crazy, but it can be learned.



Emote mode: to let them know they are missed…

1 liter of tears



A drama series that will rip your heart into pieces and at the same time gained consciousness about the importance of being strong. We don’t know what will be God’s plan for us. After watching this Japanese drama series overnight causing my eyes to grow bigger I was left into conclusion. If the lead actress was me, I’d rather die early than being laughed at because of my disease. But her eagerness and strength to recover amazed me. But I know even if her mind already accepts the fact that her disease is incurable, deep within her heart is a part that won’t accept that she was dying. But despite everything, the people talking behind her back, the intent looks; she keeps on hoping that someday her doctor could find ways for a cure.

How I wish I could be as strong as her. Well, pretending to be alright is never that easy. In times like this, you will be questioning your love and faith with the Lord. It has been said that Lord God is the healer. That his name is more powerful than any disease you can name. is he being unfair if someone got a disease which is incurable?


A true story based on her own life, was originally written in first person. It is about a girl coping with her teenage life along with a degenerative disease. She keeps a diary of not only what she does but how she feels and the hardships she must endure. Initially, the diary's purpose was for Kitô to chronicle impressions she had about how the disease was affecting her daily life. As the disease progressed, however, the diary became Kitô's outlet for describing the intense personal struggles she underwent in coping, adapting, and ultimately trying to survive her disease. As she notes in one entry, "I write because writing is evidence that I am still alive."
Aya Kito was diagnosed with a disease called spinocerebellar Degeneration when she was 15 years old. The disease causes the person to lose control over their body, but because the person can retain all mental ability the disease acts as a prison. Aya discovers this disastrous news as the disease has already developed. There is no cure.

Through family, medical examinations and rehabilitations, and finally succumbing to the disease, Aya must cope with the disease and live on with life until her death at the age of 25.

start reading her diary...
http://onelitre.xanga.com/

Monday, July 27, 2009

computer science researches



Computer Science Researches has done many great things to improve lifestyles here on earth. Although computer science researches may have seen to be the core foundation for tomorrows’ foundation for development, it is still facing many problems that are oblivious to a person who is blinded by the impact it has brought. Computer Science Research could be the very beginning of future technological development. It has touched every single inch of areas they could examine and apply corresponding studies they could think of. Researchers are growing rapidly to cope up to the fast evolution of technologies and to the needs of the user.

Computer Science has been thought of as way of getting rich that is why many students have enrolled in this field. Schools and universities had crosses its boundaries. There are people who are engaged in researching from students to teachers. Also, the government has over-funded the life of science research because they think computer increases our intelligence, not our life span. This kind of approach to computer science researches would really work well since different aspects would be traced by different disciplines.

I have a friend who keeps on telling me that computer science researches could really go a long way in inventing something that could really improve the way we live. No one knows that with just a blink of an eye computer science researches could be one of the ways to take hold of immortality.

The article I have read is about the computer science research conducted by the research and development department in University of Georgia. They were trying to intersect computer science to almost all branches of sciences addressing the most difficult state in managing data and information as well as in providing algorithms that can be used to get the optimal solutions in any difficult problems. The department of computer Science in University of Georgia has faculties whose interest cover many of the growing and emerging research areas in computer Science. Particular strength includes theory, systems, information systems, and artificial intelligence. The application of computer science have been a big step to any field of specialties, from a traditional state processes to a more automated and systematic one, promising a great chance for progress and expansion of each field in terms of heir capability and scope.

One example of these researches is artificial intelligence, which also awakens my interest. Perhaps, we already know that artificial intelligence is the computer modeling of intelligent behavior, including but not limited to modeling the human mind. Artificial intelligence can be called as intelligent agents that demonstrate the functional essence of intelligent. Artificial intelligence is a science and engineering of making intelligent machines. The core areas of researches like these are about the presentation of knowledge, reasoning and learning, planning and decision making. It seeks to enable computers and machines to mimic human intelligence and sensory processing ability, and models human behavior with computers to improve our understanding of intelligence.

Another area of computer science that has found wide practical use is robotics, the design and development of computer controlled mechanical devices. Robots range in complexity from toys to automated factory assembly lines and relieve humans from tedious, repetitive, or even dangerous task. Robots are also employed where requirements of speed, precision, consistency, or cleanliness exceed what humans can accomplish.

The main focus of the robotics research group is the development of autonomous mobile robots (AMRs). With AMRs there are two primary issues to deal with: (1) cognitive behavior, and (2) motion. Cognitive behavior addresses problem solving using sensory inputs and desired goals. Motion deals with aspects of movement from simple robotic arm movement to autonomous rovers in unknown environments. Cognitive behavior is the current focus of the research group. Two projects currently underway involve on-board image processing of video camera inputs for decision making, and the development of an evolutionary computing approach to controller configuration (possibly using field programmable gate arrays). In addition, the controller evolution project is attempting to provide for automatic (rule directed) behavior specification.

Scientist involved in the field of robotics study the many aspects of controlling robots. These aspects includes modeling the robot’s physical properties, modeling its environment, planning its actions, directing its mechanisms efficiently, using sensors to provide feedback to the controlling program, and ensuring the safety of its behavior. They also study ways of simplifying the creation of control programs. One area of research seeks to provide robots with more of the dexterity and adaptability of humans, and is closely associated with AI.

According to Ronald Arkin, director of the mobile robot laboratory at Georgia Institute of Technology, “Robots are good explorers because you don’t have to deal with life support systems that human would need. They’re easier to take care of and much more adaptable for hostile environments than people.” The presence of this technology is also making its name in our usual standard of living.

It’s really true that the intelligence of human is beyond what we can imagine. I remember a Japanese drama series entitled ‘absolute Boyfriend’. It was all about a new invention of Mr. Namikiri, using a revolutionary system it will ensure the happiness of the next generation. A robot solely dedicated to love. Love is by nature a sorrowful thing, and with this robot, there won’t be any more women suffering. Having these kind of ideal boyfriend type, life will really change. But it turns out that this robot develop real human emotions enabling him to truly love Riiko but also resulting in system malfunctions. It started having a will of his own and a heart that feels love. But is it really true that a robot that possesses emotions, intelligence, consciousness, and ego is a broken machine and defective merchandise or the programming of the one who invented it was just fantastic and intelligent?

List of active research areas:

• Algorithm and Combinatorics
• Artificial intelligence
• Bioinformatics and Health Informatics
• Compilers
• Computational Genetics
• Computational intelligence
• Computer vision and image processing
• Computer networks
• Databases and Distributed information systems
• Parallel and distributed computing
• Parallel processing
• Real-time systems
• Robotics
• Scientific computation
• Semantic web and semantic web processes
• Simulation
• Operating systems

Above all these, I was amazed of the rapid progress of the development of computer science researches. Not only in the production of excellent computer systems and developing programming languages but also it is spreading its limitations of work to become more functional in any fields of life.


References:
http://www.cs.uga.edu/research/index.htm#top
Related links:
http://www.space.com/businesstechnology/technology/space_robots_030820.html

Thursday, July 16, 2009

short report of a published scientific paper 3

Survivability: Protecting Your Critical Systems
Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson
Thomas A. Longstaff, Nancy R. Mead
CERT® Coordination Center
Software Engineering Institute, Carnegie Mellon University
Pittsburgh, PA 15213-3890



Summary
Nowadays internet use is growing progressively more than the price of gasoline and the society has also increased growth dependence on it. Internet is one good example of a highly distributed system that operates in unbounded network environments and it is known that it has no integrated security policy. The paper describes the survivability approach to guarantee that systems that operate in an unbounded network is dynamic in the presence of attack and will survive attacks that will result in successful interruptions. It also included in the paper some discussions of survivability as an integrated engineering framework, the current state of survivability practice, the specification of survivability requirements, the strategies for achieving survivability, and some survivability solutions.
The paper also talks about the capability of a survivable system to fulfill its mission in a timely manner is thus linked to its ability to deliver essential services in the presence of an attack, accident or failure. It is stated that a system is prone to attacks because internet itself has no central administrative control causing unauthorized persons to access a system.

Evaluation
It is been clearly stated in the paper that even hardened systems can and will be broken. Thus survivability solutions should be incorporated into both new and existing system to help them avoid the potentially devastating effects of compromise and failure due to attack. I find it very helpful especially in organizations in order to fully understand things with regards to protecting a system.
The paper explains everything. It is well presented enough for the reader to comprehend and it is doesn’t strain you eyes because the text are well presented.

References:
http://www.cert.org/archive/html/protect-critical-systems.html

short report of a published scientific paper 2

Can Cryptography Prevent Computer Viruses?
John F. Morar, David M. Chess
IBM Thomas J. Watson Research Center
Hawthorne, NY, USA


Summary
Cryptography is one essential aspect to secure communications. There are lots of aspects to security, ranging from secure commerce and protecting passwords but cryptography can also prevent computer viruses. The paper will provide an overview of the ways that encryption technology imposes on virus protection and related security efforts, and provide some understanding of how encryption can help.
It is also included how viruses use encryption in order to spread faster with more protections for them to be more difficult to detect and analyze and the ways encryption can be very and useless in some cases for it can make virus protection more difficult. Cryptography can also be a barrier to effective virus prevention. There are a number of situation in which encryption of potentially infected data prevents the data from being examined for the presence of viruses. In particular, whenever encryption has been used to restrict the ability to read a dataset to some set of entities, and the entity attempting to check the dataset for viruses is not in that set, the encryption will prevent the virus check.
It is also briefly stated the use of cryptography in viruses, in antivirus software, and in general security systems. In some cases, he authors believe that cryptography will play an important role in the way our systems are secured in the future, both against viruses and against the more general class of emerging threats.

Evaluation
Cryptography is a particularly interesting field because of the amount of work that is done in secret. I now understand why there are a continuous flow of experts from other fields who offer cryptographic variations of ideas. There are in fact many extremely intelligent and well educated people with wide-ranging scientific interest who are active in this field. With the title alone, it can really awaken the interest of many people. It is clearly stated that even if cryptography is needed for secure communications, it is not by itself sufficient.
With regards to the format, it is not that awe-inspiring to look at. Perhaps it’s because it is not written the way it should be, in a professional and presentable format instead the text is just written in a simple manner. on the other hand, the main finding of the study is clearly stated and I found it impressive and informative, enough for me to understand what’s bugging on my mind.

References:
http://www.research.ibm.com/antivirus/SciPapers/VB2000JFM.htm
http://www.garykessler.net/library/crypto.html

short report of a published scientific paper...

Virus Bulletin 2010: A Retrospective
Steve R. White
IBM Thomas J. Watson Research Center



Summary
The paper assesses the most important viral disasters in the past ten years to show how they could have been foreseen and avoided from these technology trends. Mr. White shows an abstract on how antivirus companies take actions. Some sited virus problems are internet based spread, administrative overhead, rapid epidemics, complex viruses, and small devices but there were already emerging solutions to address this virus problem.
It has been said that there are four technology trends that were responsible for significant changes in the computing environment, which formed scenery for the virus problem. These are the (1) pervasive computing devices, (2) the decline of Moore’s Law that resulted to falling chip prices, (3) broadband access to the Internet, and (4) the rise of the e-commerce.
The paper attempts to take a humorous look at what might happen in the next ten years of the anti-virus field by simply looking back at the last ten years in the antivirus industry, from the new millennium until the next year 2010. The author imagines a simple view of the future where antivirus industries have been working on for solutions which effects to a year without major virus incidents and no overblown virus hoaxes.

Evaluation
Upon reading the entire paper, I was impressed by the way the author presented his paper. Although it was more on a simple review on the histories of viruses for the past years, it is still clearly stated in which it will be easier for the reader to read and understand. I also admire the author since he has a positive vision of what might be the possible things to happen in the year 2010.
In regards to the way it is presented, by just reading the abstract itself, you can easily comprehend what’s the paper is all about. But I don’t think that introducing your name is included in the introduction since I haven’t tried of it yet. The language used in the paper are easy to understand, that even if a person reading is not quite familiar with the concept may understand what the writer is trying to explain.

References:
http://www.research.ibm.com/antivirus/SciPapers/Retrospective.htm

Wednesday, July 15, 2009

about triple E tactics...

In relation to open standards, the Triple E or the EEE can be taken advantage by some vendors because it has been said that it can avoid vendor lock-in. This three E is Embrace, Extend, and Extinguish. In some cases, some vendors tried to make the most of open standards to their own with a view to lock in customers to their products by setting up these triple E tactics.


Embrace
Like what Hanna explained, it supports a particular open standard and it then applies the standards in its product and promotes them.

Extend
In implementation of the standard, the vendor add some enhancements to its original specification asserting that it is needed to address the needs of the customer in which it can make difference from other competitors. But it is usually made in areas where the specifications are not well distinct. But if ever the standard has scope for different implementation to distinguish itself, improved implementation should be done in which a necessary implementation can still interoperate with it.

Extinguish
In this case, if the improved presentation or execution of the standard turns out to be so generally used that majority of implementations support it, instead it effectively becomes the de facto standard. The vendor has now basically take control that open standard and made it proprietary.

According to Nah Soo Hoe
“A vendor that is using EEE tactics will not ensure this and as a result, products from other sources may not be now compatible with this vendor's products. The problem really arises if the vendor's products are widely used. If that is the case, other implementations of the standard may have to be modified so as to make them compatible with this enhanced implementation since the latter is dominant.”

Tuesday, July 14, 2009

governments also adopts open standards..



In government, the use of open standards is important and IT implementations are vital to ensure that it has adequate and reliable information to enable it to rule the country effectively. I look for a government that adopts open standards over the internet and I read that government of Croatian adopts an open source software policy and issued guidelines for developing and using open source software in the government institutions.

The Croatian government is concerned that proprietary software leads to too much dependence on the software suppliers. Open source software will make more transparent, according to the government’s document, entitled “Open Source Software Policy”

Domagoj Juricic, deputy state secretary at the Central State Administrative Office for e-Croatia and the leader of this project, explains what made the government publish the policy: "The use of information technology in government administration bodies is increasingly becoming important. So far, most of the software we use is proprietary software, so we cannot modify or complement it, or link software from different vendors. These software products impose rigid commercial conditions of use and limit our possibilities. In this way, government administration bodies may be led into a dependent position on the supplier of the software. This could lead to closed information systems, which make the success and efficiency of our eAdministration project more difficult.

Croatia is a country of southern Europe along the northeast Adriatic Coast

To read more on the policy, click the link below..
http://www.linux.com/archive/articles/56376

COMDDAP Davao Expo 2009



Last July 2 this year, some IC students including myself attended a seminar showcasing the new innovations of technology. COMDDAP or Computer Manufacturer Distributors and Dealers Association of the Philippines held an annual IT event, COMDDAP Davao Expo 2009. It was held at the Grand Ballroom of Apo View Hotel in the city that will last until July 4, 2009. As expected, I was entertained as I keep on seeing the sights of all the technologies or products exhibited in every booth from different companies. That event was really interesting because it not just let somebody see the new technologies but it also give someone the idea that technology is one good example of a thing we called fast changing.

Want to know the shortcut to brilliant? In my journey during that day was the fact that I am amazed and the one who attracts my attention is the products of ADOBE. Through their product you can always communicate that way you wanted to.
However, behind these successful event is an association of the country’s top information technology businesses. I have here an introduction of this organization. To promote the sustainable development of the country’s information technology industry through voluntary collaboration of its member companies as their primary objective. The associations objectives are: promote the use of information technology and elevate its standards in the Philippines; make computers affordable and available to the masses; provide and create opportunities for users to develop themselves to their fullest potentials; supply the market with quality products at reasonable prices with good after-sales support; to work closely with the government, the private sector, and international entities in promoting the use of information technology; provide a forum of discussion on matters relating to the computer industry; and foster and cultivate harmony, cordiality and camaraderie among the members so that they can work together as one for the benefit of the industry.

The vision of promoting and elevating the standards of Information technology (IT) in the Philippines fueled a group of prominent computer companies to form the Computer Distributors and Dealers Association of the Philippines or COMDDAP. Its initial member-companies represent the world's leading makers and providers of computer products, solutions and peripherals. COMDDAP holds regular exhibits, more popularly known as the COMDDAP EXPO, which has become a consistent crowd drawer and has in itself set new records in terms of the quality of the exhibit area, of its exhibitors, visitors, and venues. The annual COMDDAP endeavor encourages its participants to launch their products and services, as well as hold seminars with a variety of topics in the areas of technology, trends, applications, and information management. Indeed, COMDDAP has gone a long way from a mere assemblage of premier IT companies and enthusiasts. With the support and enthusiasm of its member-companies, COMDDAP expects and looks forward to accomplishing more worthwhile projects in the future as COMDDAP is committed to the stable growth of the Philippine computer industry.

Seminars are also one of the highlights during the COMDDAP Davao Expo 2009. It has two sets, three sets actually, but the last one is for those people who are invited. The first one was conducted by the Jupiter Systems Inc. and it was presented by Mr. Celmer Santos in which they presented their system, the Empowerment Resource Information and Control Dealer Management System or ERICDMS to make it short. The system was said to be an end to end software solution for automotive dealer operation, parts and other service businesses. The system also covers the full range of dealer activities from marketing to sales and services. DMS also includes a full Enterprise Resource Planning and completely automates and integrates back office operations all the way to financial reporting aside from its core business operations. According to Mr. Santos, with ERIC DMS you can have a full visibility over all operations and achieve total control over your dealership business schedule prospects for test drives and follow an appointment, monitor and increase sales, delight customers with gentle reminders for appointments, manage vehicle inventory, deliver impeccable service, control parts and consumables cost, monitor and correctly implement warranty for parts and service and report your financial bottom line.

The next session in the seminar was entertaining and you will really force to listen because they will be giving freebies like USB, T-shirts and mouse. The second speaker is a Market Development Manager from HP, Mr. Leonardo Zap. It was all about the new technology from HP which is the HP Thin Clients. A thin client or a slim client is a client computer or client software in client-server architecture networks which depends primarily on the central server for processing activities, and mainly focuses on conveying input and output between the user and the remote server. He also differentiates a thick desktop client from thin clients. As what I understand, in thick desktop clients, an application generally runs locally while applications run remotely in thin clients. Thin Clients has enhanced security, easy manageability, high reliability, environment friendly and has lower overall cost. HP Thin Clients can run well virtually on all types of applications it can run applications from stand-alone, to client-server, to web-based. One of its unique features is that it does not have any moving parts like the hard drive and fan but still it is more capable of performing most of the normal functions of a personal computer. Because the HP thin Client does not have movable parts, the machine can run on a lower power and more robust and can boot faster. Heavy lifting for processor or disk intensive applications can be done on the server. Thin clients have a much longer lifespan than standard computers and use significantly less power. Lower maintenance costs are another benefit as software application updates, virus scanning and patches can be executed on the server. Deployment costs are also reduced as thin clients can be remotely configured and do not need to be set up individually. Break-fix simply requires replacing the thin client.

This event is one of the best, so far, event I have attended. I learn a lot from it and hoping that there will be lots of the same kind of event to happen.
PS. The CR is nice..

Sunday, July 12, 2009

living on a prayer...


Last day, I was on a bus. At first, it looks as if everything’s okay. I did the things I usually do. I started my trip with a prayer, hoping that I will arrive safely at my destination. I won’t let the rough road which is always under construction makes me mad so I let myself sleep for a while since it will going to be a long trip.

The deafening voice of the passengers woke me up. Because I fall asleep, I am still in the process of summarizing the whole story. But whoah, they are talking about bombing and someone is being ambushed. All the buses bound to Davao oriental and going to Davao are all trapped and advice not to go on because the ‘crime scene’ is still in the process of clearing by some soldiers and police.

I’m trying to calm myself because panic won’t help solve what’s happening. But I’m already losing my self control when I saw one old couple who choose to go back to Davao and won’t want to risk losing their life. Without doubt, I started to call all the saints that could help and gave us safety.

We are stranded for about thirty minutes in a terminal sharing exaggerated stories about the bombing and the civilians involved. People really love to talk exaggerated stories. Kaya hindi umaasenso ang pilipinas. When the crime scene is already cleared, we started again our journey. This journey differs from my past journey because it might be the end of the world. I’d rather choose to see a witch than die. I started to fill my sense of beautiful things to make myself calm.

Even though it is already cleared, it was still no assurance that we are totally safe. I remember a story that people ensure all the lights in a certain area are turned off to prevent them from being seen. No one knows that behind the dark road due to black out is a full assurance of safety.

To make this story short, I arrive at my destination, safe and sound but with a little bit of fright. But I know lord God won’t let bad things happen. Just live your life with a prayer and you can at lease help things from happening.

a place without adults

I live in the place where they live. I do laundry and try to eat alone. I live a life that starts and ends inside a four corner room. Sometimes, living alone makes me realize to stop the longing for independence. It’s not that easy and it is always been never easy. Not unless, I guess, you have all the wealth.

I live in a dorm where students used as living and sleeping quarters. But for me it’s not just an ordinary place. It’s a home, a place where I can find refuge and safety, a place without adults.

Saturday, July 4, 2009

need to be observant...sometimes

Assuming you were tapped by the university president to evaluate the new enrollement system implemented this semester, enumerate your observations/comments and suggest possible areas and ways where improvements can be made. Your observations/suggestions should be properly validated with facts and literatures... (You may start with the diagrams posted in the strategic locations of the university)... (3000words)

I am such an observant person. I should start with the diagrams posted all over the school premises. To be honest, the first time I have seen that tarpaulin demonstrating the enrollment process, I did compare it to my own illustration when we have our assignments in one of my subjects the previous semester. It was awful because I really feel upset because for me it was good compared to what I have done. Then by this time, I came to realize that was it really that good? Maybe it will be much nicer if the university will use my work and perhaps it would be the start of my career. Char. How boastful I am. Well, I must be the one to appreciate my work, right?

On the other hand, when I saw it again these past days, I am already in a doubt. Being straightforward won’t kill me. Other than being frank I also need to see the other side of it. On the safe side, yes it was good since it was made and planned by the teachers. If you know how to read and appreciate pictures then you can reach till the last step.

I was thinking that compared to other universities, when you want to enroll in our school, you need to waste at least three days before officially enrolled. Why is it? Is it because the university has lots of enrollees to cater? Or we have lack of staffs to attend the needs of the enrollees? Or perhaps, the process itself is the problem and we don’t just realize it?

Enrollment Steps:
This is the old enrollment steps for old students:
1. Signing of clearance and other miscellaneous fees
2. Validate scholarship for scholars
3. Advising of subjects
4. Encoding of subjects
5. Students accounts for scholars
6. Cashier for payments of tuition fees for non scholars
7. Registrar
8. Library for library card validation

This is the old enrollment steps for new students: (based on my experience)
1. Pay miscellaneous and other fees
2. Filling up students record at the UGTO
3. Apply for a scholarship at the Office Student Services for those students who have scholarship grants
4. Enroll in ROTC or CWTS
5. Go to your college adviser for advising of subjects
6. Encoding of subjects for you to have Certification of Registration
7. Verify student accounts at the bookkeeper for scholars
8. Pay tuition fee at the cashier for non scholars
9. Registrar for the submission of all the necessary documents for the students to be officially enrolled
10. Apply for a library card
11. Picture taking for school id

This is an image of the new enrollment steps:






When you will compare it, there is no difference. We are still following the same steps. The only thing that matter is that the enrollment system we are using is new. For old students, during enrollment time, students need to pay local fees first before any other transactions specifically headlight and other local council fees. Student’s clearance which is processed prior the scheduled enrollment is a must. In case that said clearance is not completely signed then she/he will not be entertained by the assigned class adviser. The students are obliged to bring all the receipts and the student’s clearance during advising as a requirement. During this period, the adviser will give a form commonly known as PRF for the student to write the subject he/she is advised to enroll for the semester.

When the student is already advised as to what subject he/she will enroll, encoding of the advised subjects will be the next step. In every college there are assigned offices or encoders who will handle this task. Sometimes this is where the students are stuck due to number of students per one encoder. After this, the student now have the COR or Certificate of Registration which consist of the said amount the student will pay.
If the student is a scholar, she needs to go to the bookkeeper window for the approval of their scholarship and for records purposes also. Otherwise, if you are just an ordinary student (katong scholar sa parents) you need to fall in a long line. This is where the student will pay his/her tuition fee. You also need to prepare coins because the cashier sometimes doesn’t provide coins. Partial payments are also accepted.

After paying the tuition fee, we need to go to the registrar’s office. There are assigned windows every college or department. The enrollee needs to present her receipts (headlight, local council fees and tuition fee) and also the student’s clearance before you will be officially enrolled.

When you are already officially enrolled, you need to go to the university library for the library card validation.

Nothing changes when it comes to the steps we need to follow because it is still the same. Even though the school has already constructed additional windows in the registrar it is still not enough to make the enrollment process faster. Students still experiences to line up in a long line and experience also the thing we called “singit-singit”.

Enrollment Procedure:
The first time the new system was applied to our enrollment last summer it was better though because there are only plenty of students enrolling. But in the start of this school year where in there were many enrollees, the new system was not doing so well. First factor is that the faculty and staffs still has to adjust to it thus making the enrollment process slow. Second, not only the staffs had to adjust but the new enrollees as well. But I strongly believe that students and staffs will soon be used in this system. Perhaps this is the first stepping stone to finding ways in improving our university. This institution has to stick not only with the high academic standards but also with the many method, system or structuring in order for the school to produce a smooth sailing system in all department.

Last semester, enrolment procedure in different colleges is different. Because there are only a small number of students in Institute of Computing, student doesn’t have to wait for their names to be called at the registrar’s office. But for the other colleges, they have to wait for them to be called. The problem with this kind of method is the students don’t have any idea when their names will be called.
I asked some of my friends who belongs in the college of education. According to them, the enrollment this school year is much better compared to the last one. Since there is a priority numbers given to each students. With this, you have already the idea if it is already your turn.

For IC students who are already used to directly going to the registrar’s office, the new scheme is making them feel embarrass.

I also have some observation with regards to the enrollment flow and that huge tarpaulin.
• With regards to the distribution of the certificate of registration, compared to the old system, there are four copies of COR, for the cashiers copy, registrars copy and for the students copy. But with the new system, there are just two copies given. In my own point of view, this kind of scenario makes the process time consuming. Since we have to wait for another extra time to wait for another copy. But I am happy with the paper they are using.

• On the other side, the new printer in IC department is a big help since it prints faster than the old one and it is not noisy.

• I also want to comment about the information printed in the COR. Instead of making it fourth year it is indeed third year. It hurts because I tried very hard in order for me to reach this year but suddenly in the COR I was still third year. I want this problem to be given an urgent solution for the reason that it affects the feeling of the students.

• About the tarpaulin, do we need to have that? According to my friends, it will be much better if they will just ask some friends than wasting time reading that tarp. It is easier for me to understand the old sheet they are using. Those enrollment process written in a simple coupon bond.

• The presentation of the diagram is not that so good also. As an IC student, I am more knowledgeable with regard to the diagrams given that it is taught in one of our subjects. Like what Kate said, the variance of the size of the arrows because there are different meanings to every shape and symbol or size.

• To give some credit about the good things, the chairs in the cashier, registrar and book keeper are the best things or help that the university have produce for students.

Since the university has always lots of enrollees every start of school year, I think it would be the center of attention for the school administration to create or build a new enrollment process that would solve the problem of “a three days enrollment”.

Nevertheless, if I were tapped by the university president to evaluate the new enrollment system implemented this semester I won’t hesitate to suggest to update not just the enrollement system but also the enrollment process. The administration is not aware about this problem, I think because if they do, they have already conducted some solutions. I will let them know and realize at the same time the sentiment of the students with regards to the enrollment procedure.

• Additional staffs or windows would be a big help especially in the cashier and book keepers office. Two windows over thousands of students are impossible to make a rapid process during enrollment.

• Additional staff in OSS that will entertain scholars upon validation and renewal of scholarship. In my years of existence in the university, this school year is the worst line of students I have encountered.

Forgive me if I am too much observant. A solution starts when there are mistakes and before you discover errors, it started by being observant. Being a student is not a lame excuse to keep on listening and watching and not doing anything because it is also our right to let them see what they haven’t seen. Let the higher administration hear the voice of the students because it takes two to tango.
I hope that this will serve as a stepping stone to improvements. Like what I have posted in the last assignment, I also believe that soon enough this university will develop far more better structure to make not just the enrollment process faster but with other systems or method that will contribute to the welfare of the school and to produce excellent and quality graduates always in the future. I just hope that with the university’s decision to make slight changes and development as well would lead to something that will function better.

a comparison..hahahha

Friday, July 3, 2009

I am getting crazy.


I am getting crazy.

It’s getting harder each day. I have so many unfinished assignments. I still have to think of a better research idea to think that I also need to imagine 3000 words. hmmm….I am still not used to it maybe because my mind is still at rest.

I realize that I have so many things in life way back those times which I spend foolishly away. Every person inside the family circle is already disappointed. They expect a lot from me. Instead of giving me strength they are doing the other way around.

Still, I’m thankful because I am still alive…