Sunday, October 17, 2010

Case 8

5 current issue

1.)A new report by the Commission on Higher Education (CHED) shows that the number of tertiary population in schoolyear 2002-2003 was 2.4 million compared to 1.87 million in 1994-1995. It cites however that while state institutions had their population soar by 415,972 (from 399,623 to 815,595 during the same period), private colleges and universities could only absorb an additional 139,357 enrolees (or from 1.472 million to 1.611 million).It is true that in 1997, enrollment in private tertiary schools grew by 6.47 percent. By 2002 however the figure plunged drastically to a -2.8 percent. Enrollment figures in private schools fell by 46,354 in schoolyear 2002-2003 from 1,657,735 in the previous year.The exodus of college students enrolled in private schools to state universities and colleges (SUCs) over the last two decades is also shown in other CHED records. In 1980, only 10 percent of college students were studying in SUCs. By 1994, the number went up to 21 percent and in school year 2002-2003, it already accounted for 34 percent of tertiary population.
>>Opinion - Five years from now, the Philippines’ tertiary education will likely face a crisis if the current trends in college enrolment and dropouts will continue. Due to continuing tuition hikes more and more students enrolled in private colleges and universities find themselves either dropping out or forced to transfer to state institutions.

2.)The navy, the newest of the services, traces its ancestry to the Offshore Patrol, which was formed as part of the army in February 1939. It became autonomous and was redesignated the Philippine Naval Patrol in 1947. After the armed forces reorganized in 1950, the force became known as the navy. Naval personnel strength of approximately 25,000 in 1990 included marine, coast guard, and naval air units. Naval headquarters was in Manila, close to its major base at Cavite, south of the city. Other major naval bases were located in Zamboanga City, Cebu City, and at Subic Bay on Luzon, west of Manila. The Subic Bay facility, probably without peer as a deep-water port in the region, was used almost exclusively by the United States Navy. The navy was commanded by a rear admiral, known as the flag officer in command, who was supported by vice and deputy flag officers in command. Major naval operating forces came under the commander of the fleet, who directed the naval air, special warfare, assault craft, amphibious, and patrol groups. The navy also maintained six naval districts that supervised deployed naval forces under the operational control of the area unified commanders. The naval headquarters controlled the training command, coast guard and marine commands, and the naval support group which provided supply and maintenance support to the fleet.
>>Opinion - Many of the navy's ships, however, were in poor repair and of questionable operational capability. Roughly one-third of the ships were said to be serviceable, and only about twenty of them put to sea regularly. Because of these operational deficiencies, which the navy attributed to budget shortfalls, the navy embarked on a modernization program in 1990. Plans called for the overhaul of some ships and for the acquisition of thirty-five new patrol craft. Several older ships, including four frigates, had been decommissioned in the late 1980s, and more retirements of inoperable ships were planned.

3.)The individual income tax consists of taxes on compensation income (from employment), business income, and passive income (interests, dividends, royalties, and prizes). In 1998 compensation income tax rates were restructured into 6 bands with marginal rates ranging from 5% to 35%. Exemption levels are 20,000 pesos (about $400) for individuals, and 32,000 pesos (about $640) for married couples. In 2000, the business income tax rate was lowered from 33% to 32%. The tax rate on passive income is 30%. For resident foreign corporations, after-tax profits remitted abroad are subject to a 15% tax, except for corporations registered with the Philippine Economic Zone Authority (PEZA), the Board of Investment (BOI), the Bases Conversion Development Authority, or operating in independent special economic zones (ecozones), all of which are eligible for special tax and customs incentives, exemptions and reductions designed to attract foreign, new, necessary and/or export-oriented foreign investment. The Omnibus Investment Code of 1987 lays out tax incentives administered by the BOI of the Department of Taxation and Development, and the annual Investment Priorities Plan (IPP) sets out the investment areas, national and regional, to which these incentives currently pertain. In 2002 the national list included export activities, industrial development and mining, agricultural/fishery production and processing, logistics, drugs and medicine, engineered products, environmental projects, IT services, Infrastructure, mass housing projects, R and D activities, social service, tourism, patriotic and documentary motion pictures and new projects with a minimum cost of $2 million. Special economic zones (SEZs) can be designated as export processing, free trade and/or information technology (IT) parks, each designation providing a schedule of tax holidays, exemptions from import duties on capital goods and raw material, and preferential income tax rates with more favorable treatment accorded pioneer industries over nonpioneer or expanding companies.
>>Opinion - There are several views on how to "cure" our economic ills. I've been thinking on it a lot. I know that one view is to increase taxes on the rich to help balance the budget and provide for those in need. That seems to be Obama's idea. Here's the problem: The rich are the people that hire. And when they get taxed, they stop hiring, which only ends up hurting those we hoped to help. That is an endless cycle. My question is, if you are in favor of the method I just discussed, how do you figure it can work?

4.)The Manila hostage crisis occurred when a dismissed Philippine National Police officer took over a tour bus in Rizal Park, Manila, Philippines on August 23, 2010. Disgruntled former senior inspector Rolando Mendoza, from the Manila Police District (MPD) hijacked a tour bus carrying 25 people (20 tourists and also a tour guide, all from Hong Kong, and four Filipinos) in an attempt to get his job back.[3] He said that he was summarily dismissed without the opportunity to properly defend himself, and that all he wanted was a fair hearing.[4]After about ten hours into the siege, the Filipino bus driver was able to get out of the bus by falling through the driver's bus window and was shown on television saying "patay na lahat (everyone is dead)" before being whisked away by police.[5][6] The ensuing rescue assault mounted by the MPD and resulting shoot-out was watched by millions on live television news and took around 90 minutes.[7] At the end, eight of the hostages and Mendoza were dead and nine other people were injured. The Hong Kong Government soon after issued a top-level "black" travel alert for the Philippines.[8] The assault on the tour bus to rescue the hostages was widely regarded by pundits at home and abroad as "bungled" and "incompetent"; the Philippine government also admitted that errors had been made and promised a thorough investigation, which they would report to the People's Republic of China and Hong Kong SAR governments.
>>Opinion - Aquino said prudence prompted him to give a copy of the report first to the Chinese government before revealing its content to the public. He said if the official report would be disseminated to the public first, the report could be given a media twist that could be misunderstood by Chinese authorities, leading to further problems in China-Philippines ties.
But with the report in Chinese hands first, such possible misunderstanding could be ruled out, he said.

5.) THE Commission on Higher Education (CHED) yesterday said the government’s plan to add two more years to the 10-year basic education system is encountering resistance from some higher education institutions (HEI) as there is a possibility they may end up with no enrollees, especially in the first year level.CHED chairperson Dr. Patricia Licuanan said many HEIs are worried this scenario may happen since the K+12 (Kinder plus 12) plan would add one year in the elementary level and another year in high school.She said that many of these HEIs are pushing for the adoption of a "pre-university" or pre-baccalaureate scheme that will act as a transition program.Licuanan said she supports the K+12 plan because it would also help address the need for a skilled workforce.Former CHED chairman Dr. Emmanuel Angeles has said it would do well for the government to implement a "pre-university" scheme adding it is more "doable, practical and advantageous" to the government.
Angeles said adding two more years to the elementary and secondary education will cost the government an additional P57 billion while the pre-university scheme will cost only P11.5 billion since there are facilities, adequate number of faculty and learning materials in the tertiary education compared to the primary education.
Experts who made studies on the plan including former DepEd Undersecretary Juan Miguel Luz estimated that the K+12 plan will cost P100 billion spread out over five years.DepEd data showed only 66 percent of the total high school population managed to graduate. Only 27 percent were able to enroll in college or university and only 16 percent finished college.
>>Oponion - according to this issue we must to dis- agree on this issue because we know that it is so hard to earn money to pay a tuition fee of our son or daughter . Including on this payments are enrollment fees, project and others. etc.

Saturday, September 18, 2010

Case 7

The following are:

1.)Do not run programs from unknown origins.
- Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

2.)Consider making a boot disk on a floppy disk.
- In case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.

3.)Secure Servers for Communicating
-Using publicly viewed and accessible applications like webmail leaves a business vulnerable to hack attacks. A secure server, like a hosted exchange, can provide a higher level of security. Many businesses prefer to use secure servers to access communications platforms to reduce the possibility of the public viewing secure information.

4.)Be prepared for individual security problems.
- For example, calling your Internet service provider in case you lose connection, preparing fire extinguishers and alarms near the computers, and using power surge protectors.

5.)SECURE COMPUTER SYSTEMS
-A number of systems have been built and designed which attack the general problem of
security in some form and to some extent. In some cases, privacy of data is the principal objective; in others, the prime objective is access control. For the security criteria which we shall establish, however, no existing system of which we are aware is adequate.

6.)Phishing
-Phishing attack is another growing threat for the online computers. Phishing is a type of online deception techniques that is designed to steal your confidential information, passwords, credit card information and important login and password through the fraudulent emails. The best solution to avoid this treat is to not open the email attachments from the unknown and unreliable sources. Secondly, never give your personal information to anyone even the emails claim to be delivered from big sources.

7.)Employee’s Sabotage
-An organization’s employees are most familiar with the computers inside an organization. There are a lot of examples where the annoyed employees of a company are involved in sabotaging the computer system. Employee’s sabotage include entering data incorrectly, destroying system hardware, deleting data, changing data, changing the passwords and entering the data incorrectly. The best way to avoid the situations like these is to delete the employees’ account after they leaves the company so that they can’t no more access company’s systems. Secondly, regularly monitor the activities of the employees and restrict their access to the sensitive resources in the overall IT infrastructure.

8.)Human Error
-Errors and the omissions are the great threats to the integrity of the data and the computer system. Data entry operators, programmers, system administrators often make errors that can compromise the system’s security. The effect of the various security threats caused by the human errors varies. Employee’s training and awareness training should be given to the employees to avoid such kinds of errors that can lead to the financial losses for a company.

9.)Physical Threats
-The physical threats to a computer involves the physically damage to the computer components with the fire, water and destructions. The best solution to avoid the physical threats to your important computer system and data is to set an off-site replication. Replicate your data regularly at some remote location.

10.)Make Backups of Important Files and Folders
-Whether you know it or not, you’ve divided everything you own into two broad categories: those items you can replace and those you can’t. For the items you can’t replace, you’ve probably stored them in a safe place, either somewhere in your living space or elsewhere, in a lockbox at a bank, for example. In either case, you’ve probably also bought insurance that provides the funds you’d need to buy replacements. Your insurance policy covers almost everything you own.

Friday, September 3, 2010

Case 6

The Consumer Act of the Philippines
-It means protection to the people,it seems that they recognizing the rights of many people.It is the policy of the State to protect the interests of the consumer, promote his general welfare and to establish standards of conduct for business and industry. Towards this end, the State shall implement measures to achieve the following objectives, a)protection against hazards to health and safety; b)protection against deceptive, unfair and unconscionable sales acts and practices; c)provision of information and education to facilitate sound choice and the proper exercise of rights by the consumer; d)provision of adequate rights and means of redress; and e)involvement of consumer representatives in the formulation of social and economic policies.Procedures for the issuance, amendment or repeal of regulations pursuant to clause (2) or paragraph (g) of this Article shall be governed by the rules and regulations promulgated by the Department of Health; Provided, That if the Department of Health finds that the distribution for household use of the hazardous substance involved presents an imminent hazards to the public health, it may publish in a newspaper of general circulation a notice of such finding and such substance shall be deemed to be a "banned hazardous substance" pending the issuance of regulation formally banning such substance.

-The consumer act of the Philippines had diiferent definition of terms there are:Advertisement, Advertising, Advertising agency or Agent, Advertiser, Agricultural purpose, Amount financed, Banned hazardous substance, Batch, Business name, firm name, or style, Cash price or delivered price, Chain distribution plans" or "pyramid sales schemes, Closing out sale, Commerce, Consumer, Consumer credit, Consumer loan,Consumer products and services,Consumer product safety rule, Consumer transaction, Corrosive, Cosmetics, Counterfeit product, Credit card, Credit Sale, Credit transaction, Creditor and there are many more of consumer act of the philippines definition of terms. For this purpose, the concerned department shall adopt existing government domestic product quality and safety standards: Provided, That in the absence of such standards, the concerned department shall form specialized technical committees composed of equal number of representatives from each of the Government, business and consumer sectors to formulate, develop and purpose consumer product quality and safety standards. The said technical committees shall consult with the private sector, which may, motu proprio, develop its own quality and safety standards that shall be subject or agencies after public hearings have been conducted for that purpose; and shall likewise consider existing international standards recognized by the Philippine Government.

-The Department may, at any time upon his own initiative, issue a regulation prescribing, with respect to any particular food additive, the conditions under which such additive may be safely used and the reasons thereof, and cause the publication of the same.The Department shall promulgate regulations for exempting from the operation of this Article drugs and devices intended solely for investigational used by experts qualified by scientific training and experience to investigate the safety and effectiveness of drugs and devices.If the Department finds that for good and sufficient reasons, full compliance with the labeling requirements otherwise applicable under this Chapter is impracticable or is not necessary for the adequate protection of public health and safety, it shall promulgate regulations exempting such substances from these requirements to the extent he deems consistent with the objective of adequately safeguarding public health and safety, and any hazardous substance which does not bear a label in accordance with such regulations shall be deemed to be a mislabeled hazardous substance.

Sunday, August 15, 2010

Case 5

1.Outsourcing
-In the recent times Outsourcing has become a very popular. It means “acquiring a product or service rather than producing it your self”. According to the Wikipedia Outsourcing means “transfer or delegation to an external service provider the operation and day-to-day management of a business process”. It is used by every organization in one way or the other. The functions being outsourced by the business are basically considered non core to the business itself.For instance, a car company requires a variety of screws and bolts. Rather than manufacturing screws and bolts themselves, the company might outsource their production to some other company or firms that specialize in making screws and bolts. Such outside companies or firms that provide the outsourcing services are referred to as “third-party providers”, or as they are more commonly called, “service providers”.Even though outsourcing exists ever since work specialization, but in the recent past, companies have started employing the outsourcing model for functions, like payroll, billing and data entry. These functions can be carried out more efficiently and cost-effectively, by the companies that acquire specialized tools and facilities and specially trained personnel for such functions.

2.Dis-advantages and Advantages of Outsourcing.
"Advantages"
*The benefits of outsourcing are:

*Less capital expenditure - For example, by outsourcing information technology requirements, a company does not have to buy expensive hardware and software.

*Less management headache - For example, by outsourcing business process such as accounting, a company no longer has to hire and manage accounting personnel.

*Focus on core competencies - Outsourcing non-core related processes will allow a business to focus more on it's core competencies and strengths, giving it a competitive advantage.

"Dis-advantages"
*Before deciding on outsourcing your company's business process, keep in mind the disadvantages of outsourcing:

*Less managerial control - It may be harder to manage the outsourcing service provider as compared to managing your own employees.

*Outsourcing company goes out of business - If your outsourcing service provide goes bankrupt or out of business, your company will have to quickly transition to a new service provider or take the process back in-house.

*May be more expensive - Sometimes it is cheaper to keep a process in-house as compared to outsourcing.

*Security and confidentiality issues - If your company is outsourcing business processes such as payroll, confidential information such as salary will be known to the outsourcing service provider.

3.Implication of Outsourcing.
-The discussion on high technology has been concerned with advanced capitalist economies. Developing countries have been unable to alter radically their industrial structure due to numerous internal institutional and external technological barriers. Consequently, they have sought global participation through outsourcing activities. This is indeed a welcome break from previous orthodox "self-reliant" approaches. However, excessive dependence on outsourcing limits the synergy between vibrant domestic and foreign markets. Using the Indian experience, this paper argues that international outsourcing of software, while commercially lucrative, is discouraging firms from taking on more complex projects at home. It highlights the shortcomings of outsourcing from India and suggests that software development must be rooted in a high technology policy that is integrated with the broader strategy of development. The study illustrates not only the relative success of a developing country but also underscores the persistent unequalising structural mechanisms that developing countries must contend with to foster local development.

Case 4

How New Technology is Rewiring our Brains?

Rewiring the brain as a result of the increasing amount of technology at our disposal? and is unlikely to do so because some new technology comes along, whether television, mobile phones or the internet.Touchscreens. TiVo. The Undo button. These new technologies and others have changed the way we interact with the world.

These sound like concerns from worried parents. But they're coming from brain scientists.While violent video games have gotten a lot of public attention, some current concerns go well beyond that. Some scientists think the wired world may be changing the way we read, learn and interact with each other.There are no firm answers yet. But Dr. Gary Small, a psychiatrist at UCLA, argues that daily exposure to digital technologies such as the internet and smart phones can alter how the brain works.When the brain spends more time on technology-related tasks and less time exposed to other people, it drifts away from fundamental social skills like reading facial expressions during conversation, Small asserts.
So brain circuits involved in face-to-face contact can become weaker, he suggests. That may lead to social awkwardness, an inability to interpret nonverbal messages, isolation and less interest in traditional classroom learning.Small says the effect is strongest in so-called digital natives - people in their teens and 20s who have been "digitally hard-wired since toddlerhood." He thinks it's important to help the digital natives improve their social skills and older people - digital immigrants - improve their technology skills.

Saturday, July 24, 2010

Case 1

Google is a highly successful internet business.
Recently they browden their scope with a multitude of new tools.
Research google business model and answered the following questions below.
You may add additional INFORMATION not included in this question.

1.Who are their competitors?
-Although the technology looks promising, Teoma and Wisenut may have some difficulty wooing partners away from more established players, search experts said. “Teoma’s technology looks very good, and its results are relevant,” said Danny Sullivan, editor of SearchEngineWatch.com. “That’s hopeful because if they are trying to compete with Google they’re not at an immediate disadvantage. But its big weakness is that its database isn’t very large...Their real challenge will be to win new customers, and it’s going to be harder to try to convince some of them that they should come away from Google.The rivals have surfaced at a time when the face of Internet search is changing. Many major search services are taking on paid listing models to fuel their results and boost revenues while advertising dollars remain scarce. Inktomi, AltaVista and Fast Search are just a few companies allowing marketers to pay for prominence in search results—a trend that came into vogue with the success of for-fee engine GoTo.com.Signaling the widespread acceptance of the model, Microsoft’s MSN and AOL Time Warner’s Netscape are licensing search technology from paid-listing services. But the practice has come under fire by consumer-advocacy group Commercial Alert, which faults MSN and others for failing to adequately disclose that many of the top search results are bought.


2.How have they use information Technology to their advantage.
-Back in the day, when PC stocks were kings on Wall Street, a pesky college kid named Michael Dell figured out that he could do an end run around the then-established PC makers by developing a smarter way of making and selling boxes. His strategy was simple: get components and PCs from the factories in Asia to the U.S. as fast as possible, but only after he had charged for the machine.By squeezing the supply chain as hard as he could, he turned Dell into a fearsome (and loathsome) competitor. With his help, the supply chain for the PC era came to consist of foundries, ships, U.S. assembly plants and UPS trucks. Google (GOOG), with over $200 billion in market capitalization, is following a similar strategy, fine tuning and adapting it for the Web & broadband.Instead of trucks and assembly plants, however, Google’s supply chain is made up of fiber networks, data centers, switches, servers and storage devices. From that perspective, its business model is no different than that of Dell’s (DELL): Google has to deliver search results (information, if you want to be generous about their other projects) as fast as possible at as low a cost as possible.

3.How competitive are they in the market?
-Google Analytics has now been around for some time. Google Analytics is a free web application that helps web masters learn everything they want to know about how their visitors found their site and how they interact with their site. They are able to focus on their marketing resources on campaigns and initiatives that deliver ROI, and improve their site to convert more visitors.But what can Google get in return: Competitive Market Research regarding the Search marketplace.Using Google Analytics Aggregated data Google can collect statistics regarding other search engines and how they refer you to sites.In effect what keywords they refer, vs. what keywords others refer. They also can get raw counts in the number of unique visitors and total visitors by referrer


4.What new services do they offer.
-Google supports a large ecosystem of partners capable of delivering unique solutions and value to users who want independent support in customizing or deploying Google enterprise search. These partners offer a range of services including deployment, connector development, security customization, and other custom services across a wide range of industries, vertical markets, and user types.Ask someone in the software industry which company they want to emulate and they will likely say Google.Obviously, if it was easy to emulate Google, everyone would have done it or would be doing it by now.Certainly you can steal some of their ideas and what they’ve pioneered and put it to use in your company, but outright copying Google is going to be near impossible.

5.What makes so unique?
-Previously I’ve written about the corporate culture at Google and how it isn’t likely to be an easy thing to emulate. Today at work, my coworker, Jackson, showed me this post that links to a slide show that delves into Google’s internal processes. Another post that I recently read was Steve Yegge’s post on Good Agile, Bad Agile, in which Steve explores Google’s version of agile.Needless to say, it all adds up to a lot of Google on the brain. Google, at the moment, is held up as the gold standard of software companies. They have achieved massive success and are the company almost every developer wants to work for. Ask someone in the software industry which company they want to emulate and they will likely say Google.Obviously, if it was easy to emulate Google, everyone would have done it or would be doing it by now. The more I think about Google, the more and more I think it is going to be impossible to emulate them. Certainly you can steal some of their ideas and what they’ve pioneered and put it to use in your company, but outright copying Google is going to be near impossible.Having touched on Google’s corporate culture, let’s look at something else that makes Google even more unique: how it grows.One thing that has become evident to me is that Google grows in an organic fashion, unlike any other company I know of. Google develops tools that are internally useful and then releases them to the world. Google does not develop products to sell to the world. Google does not have external contracts, at least in the traditional sense, as far as I can tell.Let me elaborate on this. Google is obviously best known for search and for ads associated with search. This is in essence Google’s one true product. It is the one feature Google developed for the outside world. When Google developed search it was no different from a small company. It is what Google has done since then that makes Google different.

6.How competitive are they in International Market?
-Having studied Google abroad somewhat significantly, I believe this article provides a very naïve view on Google’s success abroad. Absolutely, Google, as any American company, needs to be extremely aware of the impression they make when entering foreign grounds, as the risk as being seen as arrogant – the ugly American – is omnipresent. And, yes, Google should continue to grow their in-country teams significantly in order to best overcome cultural and sales hurdles and take advantage of unique opportunities and the gigantic world market that is growing at a quicker pace than the U.S. market.Recent stats point to European e-commerce in a position to surge past U.S. e-commerce.Yet, don’t attempt to fool anyone here: Google has enormous international market share. Though I’m on a plane and not able to access these stats immediately, I believe that Google has approximately a 10-point higher share of search in Europe than they do in the States. I attended an online and multi-channel retail conference in London earlier this year, and Google was constantly mentioned, and never in a bad light. I am attempting to arrange a dinner in Paris later this year or early next with top French e-commerce companies, and Google is the likely sponsor, due to their relationship with the French agency that I am in contact with and their relationship with the likely invitees. Google is dominant in most countries, with their distant following to Baidu in China and the Russian example in the article notable exceptions.

Friday, July 23, 2010

Case 2

CIO(Chief Information Officer)
-Chief Information Officer (CIO) is a job title commonly given to the person in an enterprise responsible for the information technology and computer systems that support enterprise goals. As information technology and systems have become more important, the CIO has come to be viewed in many organizations as a key contributor in formulating strategic goals. Typically, the CIO in a large enterprise delegates technical decisions to employees more familiar with details. Usually, a CIO proposes the information technology an enterprise will need to achieve its goals and then works within a budget to implement the plan.

Global Warming
-Global warming is when the earth heats up (the temperature rises). It happens when greenhouse gases (carbon dioxide, water vapor, nitrous oxide, and methane) trap heat and light from the sun in the earth’s atmosphere, which increases the temperature. This hurts many people, animals, and plants. Many cannot take the change, so they die. ts implications, and what action is being taken about it. In dramatic photographs and quotes from world climate science leaders, this book shows how the earth is being changed right now. Earth Under Fire ends with a vision of how we can slow global warming and improve the lives of people everywhere.

Effect of Computers
-While we all love our computers and there isn't much debate to the wonders they give us in our everyday lives a problem exists and has existed for some time. The problem is pollution. Yup our handy little buddies are part of a global problem just as much as a solution. What is the extent of the pollution? Try 90 Billion pounds of carbon dioxide a year spewed into our atmosphere in America alone.your computer doesn't necessarily run on carbon fuels however the electricity it uses to run daily does and the amount used has been piling up over the past few decades now as more people buy home PC units to enjoy the world of computing.

Effect of Computers in a Certain Company and in Our Planet
-The effects of computers in a certain Company and in our Planet is our technology grows and more people using computers and it can cause so much heat to our planet. In any company computers are more important. Data center in a company is used to facilitate computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices. IT department in a company is a major source of negative environmental impacts. The best way to reduce heat in our planet is to less consume of power because the IT is the biggest consumer of power.

Data Center Server that Consume Less Energy
-The server’s tantalizing power claims align with SeaMicro’s aim to “revolutionize the data center landscape” by slashing the power used in IT operations.SeaMicro has also designed an interconnection and switching fabric that links the 512 “mini-motherboards” in the SM10000. SeaMicro says its network fabric can support Ethernet, fibre channel and data center Ethernet.Startup server maker SeaMicro today unveiled a new low-power server that promises to slash power costs for companies running large Internet services and cloud computing platforms. SeaMicro’s multi-core x86 server runs on Intel’s low-power Atom chips, whose energy efficiency has made them the processor of choice for many mobile phones and laptops.


.