Wednesday, October 22, 2008

The Tayabas City

Province used to occupy the present-day provinces of Quezon, Marinduque, and Aurora. It has three congressional district presently used by thed three provinces, namely: the then-Marinduque, then-Aurora, and then-Quezon. Was noted during the place dotted with "Bayabas" (guava tree). One day, a special couple passing along the area ran out of provisions, and since their destination was still far, they decided to stop and look for food. The guavas were in season then, and the husband, sensing that the fruit could be edible, picked up a few and shared them with his wife. A native of the place happened to pass by and the couple, eager to know what they were eating, asked for the name of the fruit. The native answered "Bayabas", they misunderstood the word "Tayabas"
The founding of Tayabas dates back in 1578 when Franciscan friars, empressed by its healthy climate and amiability of its folks, decided to build a chapel. As recorded, the town’s first government was established in 1620 with Don Lucas as the first executive. In 1651, due to its strategic location and high income, the municipality of Tayabas was made capital of the then province of Tayabas (now Quezon Province)

Friday, October 10, 2008

Risk Management !!!

Risk management involves you, the employer, looking at the risks that arise in the workplace and then putting sensible health and safety measures in place to control them. By doing this you can protect your most valuable asset, your employees, as well as members of the public from harm. During 2004/05, 220 people were killed and over 150,000 were injured at work because of a failure to manage risk.

As an employer, the law requires you to assess and manage health and safety risks - for most businesses this is not difficult to do and HSE has published Five Steps to Risk Assessment to help you. This is not the only way to do a risk assessment, there are other methods that work well, particularly for more complex risks and circumstances. However we believe this method is the most straightforward for most organisations.

Friday, September 26, 2008

Cost (Project Management)

Costing is a calculated cost of something: the cost that has been calculated for undertaking a project

All manufacturing companies sell their products to make profit. The profit on each product sold can be defined as the difference between the selling price of the product and the total cost of making the product. Cost therefore plays a very important role in the product design process. To be successful, a product must not only satisfy a set of functions defined in the product design specification, but it must also be possible to build the product within the cost criteria set out at the start of the project. Before the development of any product begins, it is essential to perform some form of economic analysis on the product to determine if it is worth making. This may involve some form of market analysis to determine what the customer is willing to pay for a product.

Sun Explosion

I heard the Sun is expanding with the time, will it ever explode, if not how big could it get?
It is true that the Sun is very slowly expanding and getting brighter right now. The reason for this is that as it is burning hydrogen to helium in the core the amount of hydrogen there gradually decreases. In order to keep the energy generation rate the same, the temperature and density in the core must rise. This has the effect that the energy can flow to the surface a little faster and it puffs up the outer layers (as well slightly brightening the Sun).
When the Sun runs out of hydrogen in its core completely (which won't be for another 5 billion years or so) nuclear reactions will stop there, but they will continue in a shell around the core. The core will contract (since it is not generating energy) and as it contracts it will heat up. Eventually it will get hot enough to start burning helium into carbon (a different nuclear reaction). While the core is contracting the hydrogen burning around it heats will heat up the outer layers which will expand, and while they do that they will cool. The Sun will then become what is called a Red Giant and its radius will be large enough to envelop the Earth!
Eventually the Sun will also run out of helium in its core. When this happens the core will contract again, but it will never be able to get hot enough to start burning any other elements into anything else. There will still be nuclear reactions of helium and hydrogen in shells around the core though, and these will continue to heat up the outer layers and cause them to move outwards. The core will eventually turn into what we call a white dwarf star, which is an extremely small (roughly Earth sized) dense star. A white dwarf does not generate energy so it will just slowly cool as it shines. The outer layers of the Sun will turn into what we call a "planetary nebula" (although it has nothing to do with planets) and gradually drift out into the interstellar medium. Planetary nebulae are some of the most beautiful objects you can see in the night sky. Shown below is the ring nebula, for some more pictures look here.

So the Sun will never explode (even though more massive stars can and do). The difference is that the Sun isn't massive enough to ignite anything past helium in its core. More massive stars continue nuclear burning until they start making iron. This creates an unstable core which will then explode in a supernova explosion.

ViRUS Prevention

Did you know that if you buy a new PC computer, turn it on, and connect it to the Internet, you will probably be infected with a virus, spyware, or adware within 20 minutes? You have about that long to update Windows (if you're on a PC), turn on a firewall, and update your virus protection software! Macs are much safer against these threats, but all users should read on.

Viruses

A computer virus is a program that "infects" your computer. "Trojans" and "worms" are similar. While many are not dangerous, some can cause extreme damage to your computer system. For example, they can:

  • Delete some or all of your files
  • Send themselves to everyone on your e-mail address list

Here are some steps you can take to prevent a computer virus infection:

  • Every computer should have anti-virus software on it. (This is also true of Macs, although they are much less vulnerable to viruses, especially with the newest OS X operating system.) The virus definitions that the software uses should be updated daily. (Usually, the software does this automatically when you connect to the Internet.) When your annual license run outs, update it immediately. Hundreds of new viruses are discovered each month. Here are links to two leading vendors and a review of some free options.
  • Use your anti-virus software to check every file that you receive from another person, especially files received over the Internet or on a diskette.
  • NEVER open attachments to e-mails you receive unless you are expecting them. That means you knew in advance that it was coming. Even if the e-mail comes from a friend or colleague, do not open it. Many viruses use a person's e-mail address book to spread the virus, so that the virus comes from someone you know (although the person did not knowingly send it to you).
  • The following file types are the most dangerous because they contain programs (as opposed to documents). NEVER open attachment with these extensions:
    • .exe
    • .com
    • .scr
    • .vbs
    • .cmd
    • .bat
    • .reg
  • Don't open attachments with no extension at all. Often, attachments sent from a Mac have no extension, so you cannot tell the type of file.
  • On a PC, by default, Windows does not show extensions. File extensions provide information about the type of file. Change this setting so you can see file extensions. Open Windows Explorer or My Computer. On the menu, choose View > Options to open the Options dialog box. If there is a View tab, click it. If there is not View tab, click the File Types tab. Then uncheck (by clicking its checkbox) "Hide file extensions for known file types." Click OK to close the dialog box.
  • Even Word documents (.doc), Excel documents, and other files can contain macros that functions as viruses. Make sure that you have virus checking turned on (this is automatic in later versions). In Word, choose Tools > Options (PC)/Preferences (Mac) to open the Options/Preferences dialog box. Click the Security tab, if you have one; otherwise, click the General tab. (This depends on the version.)
    • On the General tab, make sure Macro Virus Protection is checked. Click OK to close the dialog box. With this feature, when you open any Word document that contains macros, a message appears warning you about the macros and letting you disable them. When you see this message, you should disable macros if you didn't expect them to be there. Keep them if you created them or know that they were created to add functionality to the document.
    • On the Security tab, click the Macro Security button and choose one of the options, except the Low option, which doesn't protect you. Click OK twice.
  • For Windows, Microsoft keeps downloads on its web site that fix security and virus loopholes. Go to www.microsoft.com and click Downloads. Then look for your version of Windows. If you have Windows XP, choose Start>Help and Support and click the Office Updates link. There you can also turn on Automatic Updates. With automatic updates, whenever you turn on your computer and connect to the Internet, you will be notified if an update is available. Download it for the latest protection.
  • Here are some links to sites that monitor viruses. They provide information on current viruses. When you hear about a virus, before passing on the information, it's a good idea to check at these sites first. They also provide tools for getting rid of a virus.
  • All computers should have a software firewall. An often-recommended free one is Zone Labs' Zone Alarm. (They also have a "Pro" version that you have to pay for.) Another good firewall is Norton Personal Firewall ($49.95). Click the Macintosh link on the same page for their Mac products. If you have an always-on broadband connection, your modem should also include a hardware firewall.
  • Never download software from the Internet unless you are sure you know what you are getting. When a dialog box pops up and asks if you want to install some software (especially when you didn't ask for it), just say No, unless you are sure you need it. Download common free software from the companies' official sites, such as Apple, Microsoft, Macromedia, Adobe, etc.

Many reports of viruses are hoaxes. Here are three links that list hoaxes. Please do not forward any e-mails about viruses unless you check one of these sites first!

Remember that once you have an active virus, it easily spreads to others.

Spyware & Adware

Spyware is software that infects your computer and reports information on the computer back to a Web site or database. Spyware can capture your social security number, passwords, and personal information. It can lead to identify theft. Adware is software that creates pop-up ads when you open your browser, changes your browser's home page, or otherwise finds ways to force you to look at ads. Both can slow down your computer to a crawl. Very little spyware or adware is targeted to Macs. Here are some options:

Many people use both Ad-aware and Search & Destroy. Microsoft's Internet Explorer is very vulnerable to adware, especially, and can even send you viruses. Instead you can use the free Mozilla Firefox, which includes an ad blocker. It is highly recommended by experts. In fact, even Microsoft has recommended disabling JavaScript capabilities in Internet Explorer. However, if you do this, many Web sites will not work properly, as they depend on JavaScript to function. Here's how:

In Internet Explorer, choose Tools>Internet Options. Click the Security tab.

Click the Internet icon and then click the Default Level button. Drag the slider to the High value. You can then click the Trusted Sites icon on the Security tab and add sites that you want to access. These sites will then function properly.

Gantt chart/ Milestone (Project Management)

Gantt chart/ Milestone is a graphical representation of the duration of tasks against the progression of time. Its is a useful tool for planning and scheduling projects. A milestone chart depicts key events along a timescale We have a thesis project Web based Ordering and Renting for the Fashion Designer base in Lucena City. These is our Gant chart.



Gant table



Milestone critical

Milestone Gant
Gantt chart/ Milestone is a graphical representation of the duration of tasks against the progression of time. Its is a useful tool for planning and scheduling projects. A milestone chart depicts key events along a timescale We have a thesis project Web based Ordering and Renting for the Fashion Designer base in Lucena City. These is our Gant chart.

Gant table



Milestone critical

Milestone Gant