MANTECH
Martes, Disyembre 13, 2011
Miyerkules, Nobyembre 16, 2011
Unethical Marketing Strategies
Unethical Marketing Strategy can also be known as false advertisement. showing great deals to consumers but in fact it's not the same as the ad. these involves "Buy 1 Take one" but the price is equivalent for 2. another is showing "additional percentage of grams/quantity" but does not really give the amount stated on the packaging. and the worst is showing how effective their product even though its not, this mostly occur on soaps.
A good example of this unethical Marketing strategy is KFC's double down.If you’re unaware what the Double Down is, it is KFC’s sandwich that substitute bread/buns with meat(chicken meat). when they first show this ad on TV, it will really get your get your attention because of its unique presentation of Sandwich which normally serve with 2 piece of buns, and aside from its unique presentation you will also get your mouth watered with the picture on this ad.

For me, as a meat lover i decided to drop by KFC and buy some of this Double down sandwich to satisfy my curiosity. but my excitement was changed to disappointment because the picture in the ad and the freshness of the sandwich which is stated at the ad was all not true. because the real Double Down that was served to me was exactly or even wort with this picture.
Another good example of this Unethical Marketing Strategies is the Famous soap brand Ariel, who shows incredible cleaning power as shown in this video
(Disclaimer: I do not own this video)
I'm a very active person and its not new to me having heavy stains and dirt with my clothes, so i did recommend our Helper to use Ariel to clean my clothes as if they were brand new. but the ad on TV is not even close to reality because all i got is a yellowish(dirty white) colored T-shirt which makes me mad and disappointed.
Me and my friends are fun of drinking liquors with a "pulutan" mostly junk foods. we always buy those big packed junk food because of its great deal, it says 30% more chips and is larger and cheaper than other. but the reality is that it only contains few chips and a lot of air.
For me, this Strategies are really bad. Fooling their consumer for their own sake. but i guess this has already become a culture of advertising not only in the Philippines but also in other countries.
Reference:
A good example of this unethical Marketing strategy is KFC's double down.If you’re unaware what the Double Down is, it is KFC’s sandwich that substitute bread/buns with meat(chicken meat). when they first show this ad on TV, it will really get your get your attention because of its unique presentation of Sandwich which normally serve with 2 piece of buns, and aside from its unique presentation you will also get your mouth watered with the picture on this ad.
For me, as a meat lover i decided to drop by KFC and buy some of this Double down sandwich to satisfy my curiosity. but my excitement was changed to disappointment because the picture in the ad and the freshness of the sandwich which is stated at the ad was all not true. because the real Double Down that was served to me was exactly or even wort with this picture.
Another good example of this Unethical Marketing Strategies is the Famous soap brand Ariel, who shows incredible cleaning power as shown in this video
I'm a very active person and its not new to me having heavy stains and dirt with my clothes, so i did recommend our Helper to use Ariel to clean my clothes as if they were brand new. but the ad on TV is not even close to reality because all i got is a yellowish(dirty white) colored T-shirt which makes me mad and disappointed.
Me and my friends are fun of drinking liquors with a "pulutan" mostly junk foods. we always buy those big packed junk food because of its great deal, it says 30% more chips and is larger and cheaper than other. but the reality is that it only contains few chips and a lot of air.
For me, this Strategies are really bad. Fooling their consumer for their own sake. but i guess this has already become a culture of advertising not only in the Philippines but also in other countries.
Reference:
- http://www.youtube.com/watch?v=qnA6V1Y8T_U
- http://barmait.com/2010/09/23/kfcs-double-down/
- http://www.google.com.ph/imgres?q=kfc%27s+double+down+fail+picture&um=1&hl=en&biw=1280&bih=685&tbm=isch&tbnid=utyuHsJ7y0wc9M:&imgrefurl=http://naiveson.com/%3Ftag%3Dhealth%26paged%3D3&docid=XhJdAaDcRlTkmM&imgurl=http://naiveson.com/wp-content/uploads/2009/08/kfc-doubledown4.jpg&w=602&h=400&ei=_ZHnTr2_OYjxrQeAhPmbBw&zoom=1&iact=rc&dur=309&sig=109478873867610403771&page=1&tbnh=159&tbnw=220&start=0&ndsp=15&ved=1t:429,r:2,s:0&tx=112&ty=95
Miyerkules, Nobyembre 2, 2011
IT related Scams
IT related scam can be experience mostly online. i have experience this kind of scamming in game through loads and applications. another is spamming a site wherein it offers great discount and bonuses among PHP / load items.
how they do the scamming:
1. First, They will talk to you and convince you with a good deal.
2. Second, They will offer a price that is good enough to reject the deal.
3. Third, They change their mind and not deal with you. (you're automatic response is: to deal with him even with a cheaper offer than the first offer but still good than the price of it on the market)
4. Fourth, They will deal you using an application. the application is named "Force Deal". once you accept the trade you cannot cancel it and once u try to alt + f4 the game or reset your computer it will automatically be given to the one using the application.
"if your a newbie, the first thing that will pop on your mind is to reset/close your game/computer. but if you now how it works then you will not do this"
5. Fifth, if you now how the application runs, another application will be open. it is called the "disconnector". this application works after 3mins of opening it, it will disconnect the one who is targeted by the application.
6. Sixth, after they get your item. another person will pm(private message) you and will tell you to ( ADD me in your Ym i'll help you to retrieve your item i'll lend you my Anti-Force deal )
"since you are so obsessed to get your item back you will entertain it: not the person will ask you to inactivate you firewall/anti-virus to run the program"
7. Seventh, after running the program all the information from you're account will be send real time to the person who send to you the application and hack all your items including your account.
"but they will allow you to retrieve you're account and allow to change password it: the purpose is to keep track on you. because players that are hooked in this online games will use PHP to recover what is lost"
8. Eighth, disguising as a new reliable person they will offer u to avail there PHP promo together with their bonuses and etc. but all of these are scam.
These thing happened to me before when i was starting to play an online game, experiencing this several times lead me on Scamming other players too.
how they do the scamming:
1. First, They will talk to you and convince you with a good deal.
2. Second, They will offer a price that is good enough to reject the deal.
3. Third, They change their mind and not deal with you. (you're automatic response is: to deal with him even with a cheaper offer than the first offer but still good than the price of it on the market)
4. Fourth, They will deal you using an application. the application is named "Force Deal". once you accept the trade you cannot cancel it and once u try to alt + f4 the game or reset your computer it will automatically be given to the one using the application.
"if your a newbie, the first thing that will pop on your mind is to reset/close your game/computer. but if you now how it works then you will not do this"
5. Fifth, if you now how the application runs, another application will be open. it is called the "disconnector". this application works after 3mins of opening it, it will disconnect the one who is targeted by the application.
6. Sixth, after they get your item. another person will pm(private message) you and will tell you to ( ADD me in your Ym i'll help you to retrieve your item i'll lend you my Anti-Force deal )
"since you are so obsessed to get your item back you will entertain it: not the person will ask you to inactivate you firewall/anti-virus to run the program"
7. Seventh, after running the program all the information from you're account will be send real time to the person who send to you the application and hack all your items including your account.
"but they will allow you to retrieve you're account and allow to change password it: the purpose is to keep track on you. because players that are hooked in this online games will use PHP to recover what is lost"
8. Eighth, disguising as a new reliable person they will offer u to avail there PHP promo together with their bonuses and etc. but all of these are scam.
These thing happened to me before when i was starting to play an online game, experiencing this several times lead me on Scamming other players too.
Lunes, Oktubre 17, 2011
Law And Order : Access Nation
Access Nation, an episode of Law & orders shows some IT related scenes like “Breaking Passwords”. Breaking passcodes is a form of hacking wherein you’re trying to guess the password by means of Trial and Error. The easiest form of hacking is “Social Engineering”, is the art of manipulating people into performing actions or divulging confidential information.
A scene from this episode shows the investigators found that the hacker send a Worm to the computer of the victim allowing him to monitor every move of the victim. Actually worm does not operate online. Worm can only be active through networks. Worm is a program (virus) that moves through a computer system randomly changing or overwriting pieces of data as it moves.
There are a lot of ways to avoid hackers and Viruses. Changing your passcodes frequently will make you avoid hackers, also by making your own words, words that does not exist in the dictionary and also by no telling your passcode to anyone. Viruses can be prevented by means of anti-virus but it will make your computer speed slower, the best thing to do to avoid viruses is to know its nature, viruses are executable file so don’t just run an executable files you don’t know or click any malicious looking files. It would also benefit you if you know your system processes very well.
Ref:
Ref:
Miyerkules, Setyembre 14, 2011
THE FIVE GENERATIONS OF COMPUTERS
First Generation (1940-1956) Vacuum Tubes
The first generation computer are so enormous that it occupies the whole room and its very expensive and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions.
This type of computers used vacuum tubes and magnetic drums for memory. magnetic drums, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on which data and programs can be stored. Magnetic drums were once used as a primary storage. First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. Input was based on punched cards and paper tape, and output was displayed on printouts.
![]()
This type of computers used vacuum tubes and magnetic drums for memory. magnetic drums, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on which data and programs can be stored. Magnetic drums were once used as a primary storage. First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. Input was based on punched cards and paper tape, and output was displayed on printouts.
ENIAC(Electronic Numerical Integrator And Computer)
computers are examples of first-generation computing devices
computers are examples of first-generation computing devices
Second Generation (1956-1963) Transistors
Transistors replaced vacuum tubes and ushered in the second generation of computers. The transistor was invented in 1947 but did not see widespread use in computers until the late 1950s. The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to damage, it was a vast improvement over the vacuum tube. Second-generation computers still relied on punched cards for input and printouts for output.
Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-Level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN . These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology.
2nd generation computer TRANSISTORS
Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-Level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN . These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology.
Third Generation (1964-1971) Integrated Circuits
The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors.
Third generation computers are much faster and easier to use for its improved features than the previous 2 computers.
Fourth Generation (1971-Present) Microprocessors
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the central processing unit and memory to input/output controls—on a single chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors.
As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse and handled devices.
Fifth Generation (Present and Beyond) Artificial Intelligence
Fifth generation computing devices, based on artificial intelligence are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum Computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.
Why is it important today?
Because of this invention it makes the human life easier. It has become very important nowadays because it is very accurate, fast, and can accomplish many tasks easily. Communication is also an important aspect of computer and has become very easy through internet and e-mail. Through e-mail we can send messages to anybody in any part of the world in just a second while if we write letter it would take days or weeks to reach the receiver.
Differences, importance and applications :
Differences of the first generations - fifth generations can be notice in their size because it all reduce sizes also their speed became more faster and the memory got higher.
Computers can be apply/use in every thing that we can imagine.
Ref:
- http://www.webopedia.com/DidYouKnow/Hardware_Software/2002/FiveGenerations.asp
- http://theriseofthecomputer.blogspot.com/2010/03/generations-of-computer.html
- http://lifeofchoonyik.blogspot.com/2011/02/second-generation-1956-1963-transistors.html
- http://orgs-evolution-knowledge.net/Index/ApplicHolyWars/FullProjectToNow/ApplicationHolyWarsWeb/generation3.htm
- http://computer4help.blogspot.com/2010/01/fourth-generation.html
Mag-subscribe sa:
Mga Komento (Atom)

