Mobile Device Unlock app

Have you had trouble in troubleshooting your phone with a device unlock app?

Or do you question yourself what is a mobile device unlock app?

According to this article here “a device unlock is an Android app that allows you to request and apply a mobile device unlock directly from the device. This allows you to automatically apply Mobile Device Unlock to the device without using a manual code. When your phone is locked with Mobile Device Unlock and  it’s totally useless to order an unlock code”.

Apparently troubleshooting is not that hard if you only follow the steps. Just keep on trying and let yourself get into trouble, anyway google is always there to help  you.

Hope this helps 🙂

Intellectual Property and the War over Software Maintenance

1. According to Oracle, how was TomorrowNow violating intellectual property law?

Based on Oracle, TomorrowNow violates the intellectual property law by:

– Using expired and soon-to-be-expiring passwords were retrieving information and code from every library on the Web site with much greater frequency than usual.

– Downloading thousands of documents from Oracle’s Customer Connection Web site in late 2006 and early 2007.

– TomorrowNow purportedly downloaded copyrighted material containing software updates, patches, bug fixes, and instructions for PeopleSoft and JD Edwards products.

– Downloaded an extensive collection of Oracle’s copyrighted software and support materials onto SAP computers.

– Used “non-production” copies of People-Soft software to develop support solutions.

2. Why do you think Oracle sued SAP?

Since SAP bought Oracle, Oracle include SAP to the list of the violators and Oracle think that SAP already knew of these improprieties when it purchased TomorrowNow.

3. What do you think should be done, if anything, to open the maintenance contract market to third-party contractors?

– For me, just simply do the legal things in business and make a good quality of goods and/or services.

The online reputation war

1. Do you think it is ethical to pursue a strategy to counter online criticism and defend your organization’s reputation? Why or why not?

-Its not ethical to counter online criticism to protect the company. Maybe online criticism is made to see what the organization lacks, and its one way to better understand what we can do to improve the organization. Its better for the organization to have good moral and trust from its people.

2. What steps do you think businesses should take when promoting their products and services online? What tactics, if any, should businesses avoid?

To promote the business products, just simply show what is in the company and improve it by placing something unique to others to prevent criticism.

3. How should IT professionals and others respond to people with hidden agendas who post negative comments about them on social media sites? What should online visitors do to detect misinformation posted in blogs?

If a person wants to tell the untruthful things about the company, just simply ignore them. But if the same person does it again many times, that’s the time where it must taken an action about this, which is to tell that this person wants to destroy the company, and also the company will prove that these gossips are not true. Another thing is, I think IT professionals should not be affected by this negative comments because we are professionals, if this things comes to us we must face it and be honest to our self and to the people. I think online visitors must confirm first if comments that posted are true for them not to misunderstood whats really happening relevant to the negative comments.

how secure is our healthcare data.

1. What type of security breaches of medical records are common today?

The main breaches are viruses, lack of security, and many others.

2. What measures are being taken by the government and private industry to safeguard EHRs?

One of the things that the government dis was having Health Insurance Portability and Accountability Act (HIPAA). HIPAA is an act of which is to protect the confidentiality of electronic transactions within the healthcare system. The HIPAA Security Rule safeguards the confidentiality of electronic patient information. Another is The Health Insurance Portability and Accountability Act (HIPAA), commonly called the Administrative Simplification Provisions, mandates the creation of standards to protect the confidentiality of electronic transactions within the healthcare system. The HIPAA Security Rule afeguards the confidentiality of electronic patient information. In implementing the Security Rule, the U.S. Department of Health and Human Services (HHS) regulated enforcement tasks to the Centers for Medicare and Medicaid Services (CMS). CMS has the uthority to interpret the provisions, conduct compliance reviews, and impose monetary penalties on organizations that do not comply with HIPAA security regulations.

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

American Recovery and Reinvestment Act (ARRA) is very dangerous to the medical records since maybe it will have easily hacked like stealing money, properties, and even records.

The implementation of ARRA will improve the protection of personal and medical data since it is made to support the HIPPA.I think it really affects the patients.Since the data are digital and with the kind of technology we have, there is really a high risk that the data is highly accessible. But since ARRA extends the privacy provision of HIPAA as well as the Security Rule among healthcare institutions there is a great chance to forestalled this breaches. As well as implementing a highly secured place for the EHR and also the limitation of user accessibility within the system.

Chapter 3 case study 2

1. What harm does a worm cause to the public, Internet service providers, and e-mail service providers? Are there other reasons why many people object so strongly to the spread of worms?


A computer worm harms a computer in a way that  it copy itself, but does not change any files on your computer. However, worms can still cause disorder by multiplying so many times that they take up your computer’s available memory or hard disk space. In this way the owner of the computer will no longer have space to save his own files.

2. What would you say or do if you received an e-mail that guaranteed you $20 per month if you agreed to permit your computer to be used to send e-mail during hours you are not using it?


I would refuse and mark it spam. I will not allow this type of transactions because I know that this would harm me in the long run because they are using my email with my name on it in all of there transactions in the internet.

3. Do you feel it is objectionable to let others use your computer to execute files without your prior knowledge or consent? What if it were for a good cause, such as destroying a worldwide botnet, such as that created by the Storm worm, or running an application that analyzes research data related to finding a cure for cancer?


For me the idea intention is good because it is for a good cause, but still they should always ask my consent first because the computer is my property.

Case Study 2: Waste Management Sues SAP for Alleged Fraud and Breach of Contract

Discussion Questions
1. What actions should WMI have taken to lessen the risk of this project and avoid these

Answer: To lessen the risk of this project and to avoid these problems, Waste Management, Inc. (WMI) together with SAP should understand each other and the both parties should have an agreement so that there would be no conflict or any problems between them.

2. What sort of losses has WMI incurred from the delay of this project? How has the lack of success
on this project affected SAP?

Answer: Aside from losing their clients, they will also lose their sales. As a result, they will gonna lose their job.

3. Do research on the Web to find out the current status of the lawsuits between WMI and SAP.
Write a brief report summarizing your findings.

Answer: Waste Management’s lawsuit against SAP for a “complete failure” of a $100 million software implementation boils down to promises. What did SAP promise Waste Management? And how much responsibility does Waste Management bear for believing those promises?
As background, news surfaced last week that Waste Management filed a complaint against SAP in the district court of Harris County, Texas. The suit, filed March 20, was fairly well publicized, but many of the accounts were thin on detail. Typically, IT failures aren’t black or white. There are many shades of gray. Projects change, there’s scope creep and often the vendor and the customer share some of the blame.
With that in mind, I’ve been perusing Waste Management’s complaint against SAP. For its part, SAP doesn’t comment on ongoing litigation. If this spat ever does get to court, it will highlight the enterprise software sales process, which really revolves around promises. According to Waste Management’s complaint, SAP said it could offer an out-of-the-box ERP system with no customization. Waste Management’s reality was different. That disconnect isn’t all that noteworthy. Enterprise software companies typically say there is no customization required and customers still need to tweak. What’s interesting is that Waste Management is going after SAP in a very public manner. I’m familiar with Waste Management from a previous case study on the company. In a nutshell, it’s a giant company that has been built via acquisition. Legacy systems were everywhere and a good chunk of them were outdated. From 2003 to 2005, Waste Management was becoming more than an army of small waste hauling firms and an integrated company. In 2005, Waste Management was looking to overhaul its order-to-cash process–billing, collections, pricing and customer set-up.


Chapter 2 Case Study

By john emerson buenviaje

1.This incident illustrates some of the potential problems for small software developers working
with giant software manufacturers to extend or enhance their products.Provide two good
reasons why small developers should still consider working closely with large software

– So they could use the connection of large software firms. Because if the belong to a large software firms people will see their product as good as the firm itself. Also this is one way to advertise their product, good connection means good publication for their products. I think this is one way they still consider working closely with large software firms.

2.What measures could LimitNone have taken to better protect itself from Google’s alleged
actions ?What measures could Google have taken to protect itself from this lawsuit?

– For LimitNone, they should be more careful for giving information for their products. As we all know people today will do anything to take advantage to anyone to gain more money. Information is not safety anymore, it needs more security as we know. As for google, they should buy the product from LimitNone.

3.Do research on the Web to find out how this case is proceeding in the courts.Write a short
summary of your findings.

– Google will not admit any of accusations. Google as we know is a very large company now, whatever the problems is they can face it as nothing. I think Google wins this one.


Computer Associates: A Firm with a Scandal-Riddled Past



Discussion Questions

1. CA executives involved in the accounting scandal were not accused of reporting bogus contracts or hiding major problems in the business. The contracts that were backdated were real sales agreements. Was this really a crime? Should the individuals have been punished so harshly?

This thing is a crime even it is legally agreed. But this should not be punished harshly because it is only the previous executives that are responsible for this, not the newly appointed ones.

2. In December 2004, CA appointed Patrick J. Gnazzo as senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically. Gnazzo served in this role at United Technologies for 10 years and had been a member of the board of directors of the Ethics Officers Association. Gnazzo reported to a new executive vice president and general counsel at CA as well as the board’s Compliance Committee. Outline some of the actions Gnazzo might have taken in his first six months on the job.

Gnazzo performs some other actions on his job like checking CA’s performance in both the company itself and the workers worked there.

3. John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and president. His first few months with the firm were rough—major customers threatened to dump the firm; some products were behind schedule and were of poor quality; executives had to be fired for breaking company rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. What sort of leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?

Swainson should protect CA from their previous mistakes to make it just like before when CA is not still having any crimes committed.

4. CA has been hit with numerous scandals since the late 1990s. These scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on these distractions. Compare the revenue growth and stock price of CA to that of some of its competitors over the time period 2004–2008. (Be sure to use CA’s corrected figures!) Can you detect any impact of these scandals on CA’s performance? What else might explain the difference in performance?

Most things mentioned in the third question—firms dumped, poor quality products, unethical employees and executives, and many others—are the impacts on CA’s performance.

My Reaction on Tom Ischgrund Quote

by: john Emerson Buenviaje


“Most important to you above everything else are your integrity and personal values. You always can lose a job and get another one. You always can lose money and make more. But once you compromise your integrity and personal values, they can never be regained. “

by : Tom Ischgrund

One of the most important thing in our life is our integrity, as the quote say we may lose money and our job but we could always find another but when we lose our integrity it could never be replaced. Our integrity is also one of the basis of some companies or organization in hiring us for our services. When it is ruined one will trust us or they might hesitate to employ us.

In the last two companies that I worked for, a fortune 100 company and a start-up beverage company, there have been issues with professional integrity. In both instances my bosses-a marketing executive at one company, and the CEO at the other-were fired for lying on their expense reports. There is a much uglier, legal term for what they did. But semantics aside, the end result is the same. They lost their jobs, and irreparably damaged their reputations. Having professional integrity means more than just not committing a crime. The American Heritage Dictionary defines integrity as “steadfast adherence to a strict moral or ethical code.” In the workplace, this can be as simple as honoring your word. (

Are you ready to work after graduation?

by john Emerson Buenviaje

All graduates often face this type of dilemma: What’s next after graduation? Should I start working after graduation? Well to avoid this, I should prepare myself first before I graduate. Plan. Yeah. Plan what to do and ask for advices. Getting advice is very important since it’s going to be my first time out on the “real world”.

Are you ready to work after graduation? Hmm. After planning anf getting some advices, YES! And if you ask me what is my work after graduation, well this is my answer: As we said that, our bread and butter are our work, through our job we can earn our own money for us to survive. After my graduation the real battle to seek a better job is at stake. Being an information technology graduate I would rather invest my talent and skills in a company where in I can practice what I have learned in my college days so that it would be advantageous for me. A company whose primary service is Business Process Outsourcing (BPO) or a multinational company who needs my expertise. In a computer era that we have today, it is impossible for an Information Technology graduate will become jobless. There are many opportunities for them, just like becoming an instructor in a college or university. And if given a chance for my further studies, I could also be a competent IT instructor. Well, those are just only few of my career path after my graduation.