Maribeth

Wednesday, May 13, 2009

Intellectual Property right and Technology Commercialization. Organized by IP Philippines’ training arm, the Intellectual Property Research and Training Institute, the workshop is designed to keep innovation moving forward. It brings together technology creators and those with the means to bring these technologies to the commercial market into one venue where they can interact with each other and discover ways to work together.

Intllectual property right

are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secretThe majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Wednesday, April 29, 2009

Prepetator

Police and reporters often incorrectly use the word the suspect when referring to the actor, or perpetrator of the offense (perp for short). The perpetrator is the robber, assailant, counterfeiter, etc. -the person who actually committed the crime. The distinction between suspect and perpetrator recognizes that the suspect is not known to have committed the offense, while the perpetrator [who may not be a suspect yet] is the one who actually did. The suspect may be a different person from the perpetrator, or there may have been no actual crime, which would mean there is no perpetrator.A common error in police reports is a witness description of the suspect (as a witness generally describes the perpetrator, while a mug shot is of the suspect). Frequently it is stated that police are looking for the suspect, when there is no suspect; the police may be looking for a suspect, but they are surely looking for the perpetrator, and very often it is impossible to tell from such a police report whether there is a suspect or not.Possibly because of the misuse of suspect to mean perpetrator, police have begun to use person of interest to mean suspect.

Cyber Crime

The Internet is a worldwide electronic computer network that connects people and information. It has changed the way Americans communicate, purchase goods and services, educate, and entertain themselves. Possibilities for Internet use seem unlimited. Communication anywhere in the world takes only seconds with electronic mail, or email. Pictures and sound files are easily sent by email. People in areas far from cities can buy as many goods off the Internet as are available in shopping malls. Those who live far from colleges can take courses through the Internet or do research without going to a library. Searching databases such as encyclopedias or directories takes only minutes. News is available online almost as soon as it happens. Anyone can set up a Web site and post information for the whole world to see. The Internet has also become a major way for companies and the government to conduct business and provide information. By 2004 a serious disruption of computer systems in either a business or government agency can virtually stop all transactions until the problem is corrected. In 1998 65 million Americans at work and at home used the Internet.

Cyberterrorism

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more seCyberterrorism is the leveraging of a target's computers and information , particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.Cyberterrorism is defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This definition was created by Kevin G. Coleman of the Technolytics Institute.


Wednesday, April 15, 2009

ARE INFORMATION THECHNOLOGY (IT) WORKERS PROFESSIONALS?


ANSWER:Yes because information technology (IT) are professtional some estudents now is taken up about computer like the coures (IT) Infornation Technology.They have some people interested in computer. Because bieng as an I.T is not all about in program all I.T has knowlege in software and hardware,some I.T are works in office and call center.The I.T work professionals because they have some different knowlege all about in computer.They work harder and honest in his job.I.T workers are know in his job and as an professional workers.I believe that I.T is a nice programmer and follower,have an good ethics in life especially in thier jobs.The I.T are professional they work all about in computer like create program, microsofe words,power point and so many others.IT are know also in electrical and elictronic many IT are bacome a engineers and administrators.

Tuesday, April 14, 2009

THE TEN COMMANDMENTS FOR COMPUTER ETHICS
by: the Computer Ethics Institute

1.Thou shalt not use a computer to harm other people.
2.Thou shalt not interfere with other people's computer work.
3.Thou shalt not snoop around in other people's computer files.
4.Thou shalt not a computer to steal.
5.Thou shalt not use a computer to bear false witness.
6.thou shalt not use or copy software for which you have not paid.
7.Thou shalt not use other people's computer resources with authorization.
8.Thou shalt not appropriate other people's intellectual output.
9.Thou shalt think about the social consequences of the program you write.
10.Thou shalt use a computer in ways that show consideration and respect.



My cute friends

My cute friends





Followers