Pages

Thursday, May 26, 2011

On Marriage...

Pessimistic Views...


Marriage is a gamble!
Marriage is a punishment;
Marriage is an evil that most can't accept


Optimistic views...


Marriage is a gift of God;
Marriage is a blessing,
Marriage is an employment,
We make the best of it.


Truths:


Marriage is so wonderful;
Marriage is so fulfilling;
Marriage is so wholesome,
Marriage is an endless love,
More priceless than all wealth!


Marriage is a way of life;
Marriage is so natural;
Marriage is the better way,
for two, to reach heaven...


(This poem is a gift to me and Charry from our friend, Munik. Thank you!)



Two_left_hands_forming_a_heart_shape_copy

(Photo from Wikimedia Commons)

Tuesday, May 24, 2011

Storms of Submergence

      Typhoon season is once again upon us bringing gale force winds and dumping of tons of rainwater on our cities.


      Just yesterday, rains spawed by typhoon Chedeng (International code name: Songda) submerged some of Metro Manila’s streets and transformed non-submerged streets into instant parking lots with thousands of vehicles stranded and unable to move due to the floods.


      This Interactive flood map from gmanews.tv shows the areas within Metro Manila that are susceptible to floods or landslides. It even shows the expected flood height in case of Ondoy-like rainfall event.



Image001


      Another informative website is nababaha.com, a non-profit project by members of the Volcano-Tectonics Laboratory of the National Institute of Geological Sciences, University of the Philippines.


      With improved information such as this, people can plan ahead to protect themselves and their families better.


      People who are planning to invest in real estate can also use this as a guide to know which areas are deemed safe and which areas are risky.


~florent flora

Friday, May 20, 2011

Keeping Children Safe Online

Sharing this for all the parents our there…


 Cyber Security Tip ST05-002


Keeping Children Safe Online



Image001

      Children present unique security risks when they use a computer. Not only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can dramatically reduce the threats.


What unique risks are associated with children?


      When  a  child  is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and  fear  of  punishment.  You need to consider these characteristics when determining how to protect your data and the child.


      You may think that because the child is only playing a game, or researching a term paper, or typing a homework assignment, he or she can't cause any harm. But what if, when saving her paper, the child deletes a necessary program file? Or what if she unintentionally visits a malicious web page that  infects  your computer with a virus? These are just two possible scenarios. Mistakes happen, but the child may not realize what she's done or may not tell you what happened because she's afraid of getting punished.


      Online predators present another significant threat, particularly to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick other users (see Avoiding Social Engineering and Phishing Attacks for some examples). Adults often fall victim to these ploys, and children, who are usually much more open and trusting, are even easier targets. Another growing problem is cyberbullying. These threats are even greater if a child has access to email or  instant  messaging programs, visits chat rooms, and/or uses social networking sites.


 What can you do?





  • Be involved - Consider activities you can work on together, whether it be playing a game, researching a topic you had been talking about (e.g., family vacation spots, a particular hobby, a historical figure), or putting together a family newsletter. This will allow you to supervise your child's online activities while teaching her good computer habits.



  • Keep  your  computer  in  an  open area - If your computer is in a high-traffic area, you will be able to easily monitor the computer activity. Not only does this accessibility deter a child from doing something she knows she's not allowed to do, it also gives you the opportunity  to intervene if you notice a behavior that could have negative consequences.



  • Set rules and warn about dangers - Make sure your child knows the boundaries  of  what  she  is allowed to do on the computer. These boundaries should be appropriate for the child's age, knowledge, and maturity, but they may include rules about how long she is allowed to be on the computer, what sites she is allowed to visit, what software programs she can use, and what tasks or activities she is allowed to do. You should also talk to children about the dangers of the internet so that they recognize suspicious behavior or activity. Discuss the risks of sharing certain types of information (e.g., that they're home alone) and the benefits to only communicating and sharing information with people they know (see Using Instant Messaging and Chat Rooms Safely, Staying Safe on Social Network Sites, and the document Socializing Securely: Using Social Networking Services for more information). The goal isn't to scare them, it's to make them more aware. Make sure to include the topic of cyberbullying in these discussions (see Dealing with Cyberbullies for more information).



  • Monitor computer activity - Be aware of what your child is doing on the computer, including which websites she is visiting. If she is using email, instant messaging, or chat rooms, try to get a sense of who she is corresponding with and whether she actually knows them.



  • Keep lines of communication open - Let your child know that she can approach you with any questions or concerns about behaviors or problems she may have encountered on the computer.



  • Consider  partitioning your computer into separate accounts – Most operating systems give you the option of creating a different user account  for  each  user.  If  you're  worried that your child may accidentally access, modify, and/or delete your files, you can give her a separate account and decrease the amount of access and number of privileges she has. If you don't have separate accounts, you need to be especially careful about your security settings. In addition to limiting functionality within your browser (see Evaluating Your Web Browser's Security Settings for more information), avoid letting your browser remember passwords and other personal information (see Browsing Safely: Understanding Active Content and Cookies). Also, it is always important to keep your virus definitions up to date (see Understanding Anti-Virus Software).



  • Consider implementing parental controls - You may be able to set some parental controls within your browser. For example, Internet Explorer allows you to restrict or allow certain websites to be viewed on your computer, and you can protect these settings with a password. To find those options, click Tools on your menu bar, select Internet Options, choose the Content tab, and click the Enable... button under Content Advisor.




      There are other resources you can use to control and/or monitor your child's online activity. Some ISPs offer services designed to protect children online. Contact your ISP to see if any of these services are available. There are also special software programs you can install on your computer. Different programs offer different features and capabilities, so you can find one that best suits your needs.


Additional information


       The following websites offer additional information about protecting children online:



_________________________________________________________________


 Authors: Mindi McDowell, Allen Householder


_________________________________________________________________


 Produced 2005 by US-CERT, a government organization.


 Note: This tip was previously published and is being re-distributed to increase awareness.


 Terms of use 


 This document can also be found at http://www.us-cert.gov/cas/tips/ST05-002.html

Wednesday, May 18, 2011

It pays to know your customer!

A disappointed salesman of a famous Cola brand returned from his assignment to Saudi Arabia.    


A friend asked,   "Why weren't you successful with the Saudis?"


The salesman explained, "When I got posted, I was very confident that I would make a good sales pitch.   But I had a problem. I didn't know how to speak Arabic. So I planned to convey the message visually through three posters."



Customer

First poster: A man lying in the hot desert sand totally exhausted and fainting.


Second poster: The man is drinking Cola.  


Third poster: Our man is now totally refreshed.  


And then these posters were pasted all over the place. 


 


"Terrific! That should have worked!" said the friend.


"The hell it should have!" said the salesman.


"No one told me they read from right to left!"

Tuesday, May 10, 2011

A Souvenir-a-holic's Paradise

      For the souvenir-a-holics out there, a visit to the Baguio Public Market is replete with so many stuff, both big and small, to bring home with you and to remind you of one of your most memorable vacations in this mountain city.


      The various items on sale at the market never fail to amaze me. One is sure to buy at least one of these items to bring home as a keepsake or to give as a gift to a famiy member or to a friend.


1. Sweets and Delicacies



01_delicacies


2. Fresh Strawberries



02_strawberries


3. The ever-reliable "walis"



03_walis


4. Woodcarvings



04_woodcarvings


5. Figurines



05_figurines


6. Wall Carpets



06_wall_carpets


7. Various dry goods



07_the_market_dry_goods_section


8. "Tapis" (some would use this as a table runner)



08_tapis


9. Wall displays and decors



09_wall_displays


10. Keychains



10_keychains


11. Refrigerator Magnets



11_ref_magnets


12. Ear ornaments



12_ear_rings


13. Beads and Necklaces



13_beads_and_necklaces


14. Native-inspired bags



14_native-inspired_bags


15. Petrified Frogs



15_petrified_frogs


16. Fresh Veggies! Yum!



Copy_of_13102007783


17. Sleveless!!!



Copy_of_13102007782




     Just go downtown to Magsaysay Avenue and you surely won't miss the market :-)


~Florent Flora