0% found this document useful (0 votes)
22 views23 pages

Ite Finals

ITE finals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views23 pages

Ite Finals

ITE finals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

WEEK 13 framework addressing IP

Nicholas Ciarelli ownership.


Defining and controlling the appropriate
● an avid fan of Apple.
level of access to intellectual property are
● operated the Apple website
complex tasks .
(www.thinksecret.com) since he was
13.
Copyrights
● a student at Harvard and the editor
Copyright and patent protection
of The Crimson, the university's
● specifies that the government shall
newspaper.
have the power "to promote the
Intellectual Property Progress Science and useful Arts, by
securing for limited Times to
● refers to works of the mind, such as
Authors and Inventors the exclusive
art, books, films, formulas,
Rights to their respective Writings
inventions, music, and processes.
and Discoveries.”
● These works are distinct and
● PURPOSE: grants creators of original
"owned" or created by a single
works of authorship the exclusive
person or group.
rights to their creations.

Types of Intellectual Property Protection: Term of Protection

● Copyright Law: Protects 1. The copyright in works shall be

authored works like art, protected during the life of the

books, films, and music. author and for fifty (50 yrs. after his

● Patent Law: Protects the death) Also applies to posthumous

success of inventions. works (a work published for the first

● Trade Secret Legislation: time after the death of the author)

Along with copyright and 2. In case of works of JOINT

patent laws, forms a AUTHORSHIP, the economic rights

comprehensive legal shall be protected during the life of


the last surviving author and for 50 years from the date of publication
yrs. After his death. and if unpublished, from the date of
3. In case of ANONYMOUS OR making.
PSEUDONYMOUS WORKS
● Copyright protection lasts for 50 Protection for Performers, Producers and
years from the date of first lawful Broadcasting Organizations
publication. 1. The rights granted to performers and
● If the author’s identity is revealed or producers of sound recordings under this
is no longer in doubt before the law shall expire:
expiration of the 50 years period, (a) For PERFORMANCES NOT
the standard copyright provisions INCORPORATED IN RECORDINGS, fifty (50)
apply. years from the end of the year in which the
● If such works are not published performance took place; and
before the initial 50 years period (b) For SOUND OR IMAGE AND SOUND
expires, they are protected for 50 RECORDINGS AND FOR PERFORMANCES
years from the creation of the work. INCORPORATED therein, fifty (50) years
4. In case of works of APPLIED ART the from the end of the year in which the
protection shall be for a period of 25 recording took place.
years from the date of making. 2. In case of BROADCASTS, the term shall be
5. In case of PHOTOGRAPHIC WORKS twenty (20) years from the date the
the protection shall be for 50 years broadcast took place. The extended term
from publication of the work and, if shall be applied only to old works with
unpublished, 50 years from the subsisting protection under the prior law.
making.
6. Incase of AUDIO-VISUAL WORKS Software Copyright Protection
including those produced by process ● The use of copyrights to protect
analogous to photography or any computer software raises
process of making audio-visual complicated issues of interpretation.
recordings, the term shall be 50 ● TO PROVE INFRINGEMENT
○ Copyright holders must holder to use the patented
demonstrate a striking invention.
resemblance between their ● PRIOR ART is the existing body of
software and the allegedly knowledge that is available to a
infringing software. person of ordinary skill in the art.
○ This resemblance must be
such that it could only be An invention must pass the following four
explained by copying. tests to be eligible for a patent:
○ If it can be shown that the • It must fall into one of five statutory
software was developed classes of items that can be patented:
independently, there is no PROCESSES, MACHINES, MANUFACTURES
infringement. (such as objects need by humans or
Patents machines), COMPOSITIONS OF MATTER
● a grant of a property right to (such as chemical compounds), and NEW
inventors. USES in any of the previous four classes.
● permits its owner to exclude the • It must be USEFUL.
public from making, using, or selling • It must be NOVEL.
a protected invention, and it allows • It must NOT BE OBVIOUS to a person
legal action against violators. having ordinary skill in the same field.
● also prevents independent creation, The Court has ruled that three classes of
unlike a copyright. items cannot patented:
● Even if another person ● abstract ideas
independently invents the same ● laws of nature
item without any prior knowledge of ● natural phenomena
the original invention, they are still
excluded from using the patented Patent infringement
device. ● occurs when someone makes
● The SECOND INVENTOR must obtain unauthorized use of another's
permission from the original patent patent
● no specified limit to the monetary accepted as a DE FACTO
penalty STANDARD by the industry
● if a court determines that the ○ useful because they enable
infringement is intentional, it can hardware and software from
award up to three times the amount different manufacturers to
of the damages claimed by the work together.
patent holder ● A technology, process, or principle
● defense against patent infringement that has been patented may be
is a counterattack on the claims of included within a standard, either
infringement and the validity of the knowingly or unknowingly.
patent itself ● SUBMARINE PATENT
● plaintiff must is still prove every ○ patent that is hidden within a
element of at least one claim and standard and does not
that the infringement caused some surface until the standard is
sort of damage broadly adopted.
● PATENT FARMING
Software Patents ○ A strategy where a patent
● claims as all or substantially all of holder influences a standards
invention some function, or organization to adopt its
embodied instructions are executed patented item without
on a computer disclosing the patent.
● Even electronic font and icons have ○ Later, the patent holder
been patented. demands royalties from all
parties using the standard.
Submarine Patents and Patent Farming
● Standard ● Owned by the University of
○ format that has been California and licensed exclusively to
approved by a recognized Eolas Technologies, Patent No.
standards organization or is 5,838,906 describes how web
browsers can utilize external Trade Secret Laws
applications. ● unknown to the public, and is kept
● The patent holder did not disclose confidential
the existence of the patent for years. ● information, including a formula,
● Legal Outcome (August 2003): A pattern, compilation, program,
federal jury found Microsoft's device, method technique, or
Internet Explorer browser to have process, that:
infringed the patent. The University ○ Derives independent
of California and Eolas Technologies economic value, actual or
were awarded $520 million in potential
damages. ○ subject of efforts that are
● Challenge to Patent (November reasonable under the
2003): Following a request from Tim circumstances to maintain its
Berners-Lee, the father of the World secrecy
Wide Web, the patent office began ● Information is considered trade
reviewing the patent's validity. secret ONLY IF companies take steps
Berners-Lee argued that the patent to protect it.
should be invalidated due to the ● Trade secret protection begins with
existence of prior art. identifying all information that
● Legal Decision (January 2004): needs to be safeguarded.
Despite the review, a federal judge ● This can include undisclosed patent
upheld the original decision. applications, market research,
Microsoft was required to pay $520 business plans, proprietary formulas,
million in damages, and the judge customer lists, and more.
also ordered the payment of over ● EMPLOYEES are the greatest threat
$45 million in interest. to the company trade secrets.
● Trade secret information should be
labeled clearly as CONFIDENTIAL
and should only be accessible by a ● Limiting access to a small number of
limited number of people. people on a need-to-know basis
● Another option for preserving trade ● Requiring employees to sign
secrets is to have an experienced nondisclosure agreement that
member of the Human Resources specifically mentions customer lists
Department conduct an exit Second, did the firm spend money or effort
interview with each departing to develop the customer list?
employee. ● The more firm invested to build it
● Employees can also use customer list and the more the list
noncompete agreements to protect provides the firm with a competitive
intellectual property advantage, the more likely the
courts are to accept the list as a
LEGAL OVERVIEW trade secret.
● The Battle Over Customer Lists
○ Losing customer information KEY INTELLECTUAL PROPERTY ISSUES
to competitors is a growing Plagiarism
concern in industries in ● the theft and passing off someone's
which companies compete ideas or words as one's own.
for many of the same clients. ● has become an issue from
If a company doesn't treat the list as elementary schools to the highest
valuable, confidential information internally, levels of academia.
neither will the court. The courts must ● Also common outside academia.
consider two mains making this ○ Authors
determination. First, did the firm take ○ Playwrights
prudent steps to keep the list secret by ○ Musicians
taking the following actions? ○ Journalists
● Labeling confidential ○ software developers
● Storing in locked facility or in a have been accused of it.
password-protected computer
Reverse Engineering that either duplicates the original or
● the process of taking something that will interface with the program.
apart in order understand it, build ● reverse engineering PROVIDES a way
copy of it, or improve it. to gain access to information that
● was originally applied to computer another organization may have
hardware but is now commonly copyrighted or classified as a trade
applied to software as well secret.
● Reverse engineering of SOFTWARE
involves analyzing it to create a new Open-Source Code
representation of the system in a ● refers to any program whose source
different form or at a higher level of code is made available for use or
abstraction. modification as users or other
● reverse engineering ISSUES involve developers see fit.
tools called compilers and ● when programmers can read,
decompilers. redistribute, and modify code, the
● COMPILER - a language translator software improves, can be adapted
that converts computer program to meet new needs, and bugs can be
statements expressed in a source the rapidly identified and fixed.
language into machine language that ● advocates believe that this process
the computer can execute. produces better software than the
● TOOLS called reverse engineering traditional closed model.
compilers or decompilers can read
the machine language and produce Competitive Intelligence
the source code. ● gathering of legally obtainable
● DECOMPILERS and other reverse information to help a company gain
engineering techniques can be used an advantage over its rivals.
to analyze a competitor's program ● requires continual gathering,
by examining its coding and analysis, and evaluation of data with
operation to develop a new program controlled dissemination of the
useful information to decision
makers.
● often integrated into a company's
strategic plans and decision making.
● not INDUSTRIAL ESPIONAGE
(Industrial espionage is a serious
crime that carries heavy penalties.)
● Failure to act prudently with
competitive intelligence can get
analysts and companies into serious
trouble.

Cybersquatting
● A trademark is anything that enables
a consumer to differentiate one
company's products from another's.
● A trademark may be a logo, package
design, phrase, sound, or word
● Cybersquatter’s register domain
names for famous trademarks
company names to which they had
no connection, with the hope that
the trademark’s owner would buy
the domain name for a large sum of
money.
WEEK 14 went back to the use of keyboard and
ARTIFICIAL INTELLIGENCE TRENDS AND mouse because of convenience in using
ISSUES them.

Artificial Intelligence Understanding natural language


● A branch of computer science ● allows computers to understand natural
concerned in making computers behave human languages.
like humans do ● Natural-language processing offers the
● systems that mimic human thought, greatest potential rewards because it
understand speech, and beat the best would allow people to interact with
human chess player and countless other computers without needing any
feats never before possible specialized knowledge.
● programming computers to understand
APPLICATION OF AI natural languages has proved to be
Game playing more difficult than originally thought of.
● refers to programming computers to
play games such as chess and checkers. Computer vision
● IBM had developed a computer chess ● makes useful decisions about real
player named Deep Blue which won physical objects and scenes based on
over the defending world champion sensed images.
Gary Kasparov in 1997. ● This is to make images and objects as
real as it can be.
Speech recognition
● a technology where computers Expert systems
recognize human language to perform ● refer to programming computers to
such task. make decisions in real life situations
● supposedly will replace the use of such as helping doctors diagnose
keyboard because you will just give disease based on symptoms.
instructions to the computer. But human ● early 1980s, expert systems were
believed to represent the future of Turing’s test if the panel believes
artificial intelligence and of computers that the entity possesses humanlike
intelligence.
in general.
● Turing’s test is sometimes referred
● Many expert systems help human to as behavioral tests for the
experts in such fields as medicine and presence of mind, or thought, or
intelligence in putatively minded
engineering, but they are very expensive
entities.
to produce and are helpful only in ● ALAN TURING proposed a test in a
special situations. 1951 paper called “The Imitation
Game” which he thought would
settle the issue of machine
Heuristic Classification intelligence.
● one of the most feasible kinds of expert ● The first version of the game
systems given the present knowledge of involved no computer intelligence
whatsoever.
AI. ○ Imagine three rooms, each
● This will put some information in one of connected via computer screen
a fixed set of categories using several and keyboard. In one room sits a
man, in the second a woman, and
sources of information.
in the third sits a person who will
● example is advising whether to accept a serve as the "judge" who will
proposed credit card purchase. decide as to which of the two
people talking to him through the
Information is available about the owner
computer is the man.
of the credit card, his record of payment ○ The man will attempt to help the
and the item he is buying and about the judge, offering whatever evidence
he can (the computer terminals
establishment from which he is buying it
are used so that physical clues
cannot be used) to prove his
AI HISTORY man-hood.
Turing’s Test ○ The woman's job is to trick the
judge, so she will attempt to
● A test proposed by a British
deceive him, and counteract her
mathematician which analyzes or
opponent's claims, in hopes that
examines whether a computer has a
the judge will erroneously identify
humanlike intelligence.
her as the male
● The computer is said to pass the
○ Later, Turing proposed a
modification of the game. allow users of a research computer at
○ Instead of a man and a woman as one university to be able to "talk to"
contestants, a human of either research computers at other
gender at one terminal, and/or a universities.
computer at the other terminal ● they wanted to protect the messages
will participate. that are being routed or rerouted in the
○ The game has recently been event of a military attack or from any
modified so that there is only one other disaster that can destroy their
contestant, and the judge's job is communication.
not to choose between two
contestants, but simply to decide Intranet
whether the single contestant is ● a private network contained in an
human or machine. enterprise that includes connections
through one or more gateway
WEB HISTORY computers to the outside Internet.
Internet ● Its purpose is to share company
● refers to a collection of computers and information and computing
cables forming a communications resources among employees.
network, just like telephones and cables ● It can also facilitate working in
forming the telephone system. groups and teleconferences.
● Internet is intended to carry computer
data, like telephone network which is Extranet
intended to carry conversations. ● is a private network that uses the
● Internet carries various data including Internet technology and the public
email, videoconferences, and instant telecommunication system to
messages. securely share a part of a business's
● WEB PAGE contents are another type of information or operations with
data that is carried over the Internet. suppliers, vendors, partners,
● In other words, the Internet is a customers, or other businesses.
network of all networks where a user at ● can be viewed as part of a
any computer, with permission, can company's intranet that is extended
access and get information from any to users outside the company.
other computer. ● It has also been described as a "state
● Internet was envisioned by the of mind" in which the Internet is
Advanced Researched Projects Agency perceived to do business with other
(ARPA) of the US Government where companies as well as to sell products
they called it as ARPANET then. to customers.
● aim to create a network that would ● WEB BROWSER is an application
software allowing users to access permit readers to comment and annotate
and view web pages.(most popular what they read.
web browsers s nowadays are ● Every Web page is based on a document
Microsoft Internet Explorer and stored in a file identified by a unique
Mozilla Firefox which is address, called a Uniform Resource
downloadable for free) Locator (URL) or a web address.
● WEB PAGE is a page consisting of ● HTTP and HTML are the two basic
HTML documents stored on a web building blocks from which today’s
server Web-style hypertext is crafted.
● WEB SITES are a collection of ● two (2) major ingredients that define the
connected web pages stored on a Web are HTTP and HTML.
web server.
For higher versions of browsers, the Web server
animation and appearance of the page and ● stores one or more Web pages of a
site are more enhanced because of their Web site. Each page is saved as an
added support for animation, virtual reality, HTML document.
and sound files. ● stores one or more Web pages of a
Web site. Each page is saved as an
Hypertext Transfer Protocol (HTTP) and HTML document.
Hypertext Markup Language (HTML) ● runs a Web server software that
● are the two most important carries requests for specific Web
elements of the Web. pages.
● Hypertext is a key concept for ● the Web server is “listening” for any
understanding the Web. HTTP requests.
● e idea of hypertext originated much
earlier than the Web, or even the Web client software
Internet. ● e called a browser is used to surf the
Web (as defined above).
An article called “As we may think” written
● The browser forms a request for the
by an engineer named Vannevar Bush, , in
specified file using a command
1945 described a microfilm-based machine
provided by the HTTP
called the Memex that could link associated
communications protocol.
information or ideas through “trails”.
● idea became known in the mid-1960s
Email (Outlook and Outlook Express)
when Harvard graduate, Ted Nelson,
● short for electronic mail, is the
conceived the term “hypertext” to
transmission of messages via a
describe a computer system that could
computer network.
store literary documents, link them
● Email programs are used to create,
according to logical relationships, and
send, received, forward, store, print, ● USENETis what they call the
and delete messages. collection of tens of thousands of
● Before, only the scientists and newsgroup about multitude topics.
researchers that work for
government- sponsored projects to Mailing Lists
communicate to their colleagues ● is another online service where
based on other locations uses this email addresses are stored.
service ● a mailing list is like a distribution list
● Today, email is said to be the usually used to group certain email
primary source of communication addresses.
whether for personal or business ● All email addresses stored in it
purposes. receives the message when a user
uses it.
File Transfer Protocol (FTP)
● is an Internet service that allows a Chat Rooms
user to upload and download files ● are a technology that consists of
from other computers on the online and live communication over
Internet. the Internet.
● UPLOADING refers to the process of ● a location in the Internet server that
transferring a file to the Internet allows users to have almost like a
while downloading refers to the real-time communication which
process of obtaining a file from the usually is specific to a particular
Internet. topic.
● FILE refers to documents, graphics, ● Before you can enter a chat room,
and other objects from a computer you must be connected to a chat
server. An FTP server is a computer server through a program called
that allows you to upload/download chat client which can also be
files downloaded from the web
● FTP SITE e is a collection of files that
reside in an FTP server. Instant messaging
● is in essence a chat but you can
Newsgroups and Message Boards choose certain users that you want
● is an online area that allows a group of to communicate with all the topics
users to discuss a particular topic. In that you want.
such a discussion, one will send a ● Many users make use of IM for
message to a group then the other personal purposes but be sure to
group will read and respond to the always observe “Netiquettes”.
message.
Internet Telephony Informational web sites
● commonly known as Voice over IP ● contain factual information.
(Internet Protocol), allows the user
to speak to other users over the Business/Marketing web sites
Internet using computers, mobile ● provide you marketing and business
computer, or mobile devices. contents that promotes and sells
● You will need a high- speed Internet products and services.
connection, Internet telephone
service, and a microphone or Educational web sites
telephone to be able to use this ● offer you exciting and challenging
technology and place a call. course in formal and informal
teaching and learning.
Various types of web sites to choose and
search.
Entertainment web sites
● offer users an interactive and
Portals
engaging environment.
● are sites that offers you a variety of
● offer music, videos, sports, games,
Internet services such as:
ongoing web episodes, and the likes.
○ search engine/or subject
directory, news, sports and
Advocacy web sites
weather, free web publishing
● provide contents that describe a
services, reference tools such
cause, opinion, or idea.
as yellow pages, stock quotes
● Its purpose is to convince the reader
and maps, shopping malls
of the validity of the cause, opinion,
and auctions, email and
or idea.
other forms of online
● These web sites usually present
communication.
views of a particular group or
News web sites
association.
● provides you newsworthy material
including stories and articles relating
Blog, short for web log
to current events, life, money,
● is a journal format regularly updated
sports, and weather.
that reflect to the interests,
● Newspapers, televisions, and radios
opinions, and personalities of the
are the ones that maintain the news
author and sometimes the site
web sites.
visitors.
● Most news that is uploaded on the
● These consist of ideas and collection
Internet is not included in the print
of thoughts in an informal style of a
because it is the most updated
single individual.
media.
● Personal web sites are a private Yahoo!
individual’s site usually not ● stands for Yet Another Hierarchical
associated in any organization. This Officious Oracle
is usually about someone’s interest ● the first navigational portal to the
that may contain their own images, web created by Jerry Yang and David
favorite music and videos, and the Filo, both electrical engineering
likes for some personal reasons. graduates at Stanford University.
● They built this portal by creating and
Search Engine organizing their own favorite web
● is a program that finds web sites and sites in 1994.
pages. ● The next year, Yang and Filo,
together with some fellow students
Search Text Box named it Yahoo! and released it to
● It is where you enter a topic, a the Internet community.
subject or a keyword which can be a ● Yahoo! unique than the others is
simple word or phrases that will that its staff members build the
define the item about which you directory by assuming the role of a
want information. typical web researcher

Google
● is the largest search engine in the
web whose purpose is to organize
the world’s information and make it
universally accessible and useful.
● Queries received by Google reaches
several hundred millions each day.
As of February 2004 = 2.5 billion
queries.
● uses an algorithm called PageRank
that ranks web pages which matches
a given search string.
● Aside from indexes and HTML that
Google caches, there are other 13
file types that it can search: PDF,
Word documents, Excel
spreadsheets, Flash SWF, plain text
files, among others.

WEEK 15 business transactions and
workflow.
E- Commerce Trends and Issues - Service Perspective
- Tool that addresses desire of
Electronic Commerce (EC) firms, consumers, and
- Emerging model of new selling and management to cut service
merchandising tools in which buyers costs while improving quality
can participate in all phases of a of goods and speed of
purchase decision, while stepping service delivery
through those processes - Online Perspective
electronically rather than in a - Provides capability of buying
physical store or by phone. and selling products and
- Enables customer to: information on the internet
- Access product information and other online services.
- Select items to purchase
- Purchase items securely EC application started in the early 1970’s
- Purchase settled financially - Such innovation as electronic fund
transfers (EFT)
Kalakota and Whinston (1997) Defined EC: - Limited to large corporations,
financial institutions, and a
- Communications perspective few daring small businesses.
- Delivery of info, - Reason for rapid expansion of
products/services or technology:
payments over telephone - Development of networks,
lines, computer networks, protocols, software, and
electronic means specifications
- Business Perspective - Increase in competition and
- Application of technology other business pressures
toward automation of Ubiquity
- Internet tech available everywhere: - Technology allows personalized
at work, at home, and elsewhere via messages to be delivered to
mobile devices, anytime. individuals as well as groups.
- Marketspace is created
Benefit of EC to merchants or organizations:
Global Reach ● Expands marketplace to national
- Technology reaches across national and international markets
boundaries around the earth ● Decreases the cost of creating,
- Marketspace includes billions of processing, distributing, and
customers and millions of businesses retrieving paper-based information
● Reduces time between outlay of
Universal Standards capital and the receipt of products
- 1 set of technology standards and services
“internet standards” ● Improved image, customer service
● Simplified process
Richness ● Increase productivity and flexibility
- Video, audio, text are possible
Benefit of EC to consumers
Interactivity ● Enables customers to shop for 24
- Technology works through hours a day all year round from
interaction with the user almost any location
● Provides customer with more
Information Density choices
- Technology reduces information ● Provides less expensive products
costs and raises quality and services
● Receive relevant and detailed info in
Personalization/Customization seconds rather than days or weeks
Disadvantages of EC Business-to-Business (B2B)
● Cost and Justification - Serves businesses
● Security and Privacy - Important activity: purchasing
● Lack of trust and user resistance
● Other limiting factors Advantages of B2B
● Lower:
Major Types of EC ○ Purchasing Costs
Business-to-Consumers (B2C) ○ Sales Costs
- Serves direct consumers ○ Marketing Costs
- Important activity: Buying ● Reduced Inventory
● Efficient Logistics
Benefits of B2C to Business ● Lower cycle time
● Lower distribution costs ● Better customer support
● New business opportunities
● More accurate and up to date B2B EC: Areas of Growth
consumer data ● Goods
● Opportunity for added value ○ Computing and electronics
services ○ Motor vehicles
● Better customer support ○ Petrochemicals
● Lower operating costs ○ Utilities
● Services
Benefits of B2C to Consumers ○ Financial
● Convenience ○ Professional
● Information ○ Administration
● Ability to compare and choose ○ Travel
among many offers ○ Telecom
● Lower prices, at times
● Personal Services Consumer-to-Consumer (C2C)
- Consumers selling directly to -
consumers.

Benefits of C2C:
● Increased liquidity (products,
services, advice)
● Reduced search costs

Peer-to-Peer (P2P)
- Links users, enabling them to share
files and common resources without
a common server
- Ex: Kazaa and Groove Networks

Challenges in P2P
● Developing viable, legal business
models

Mobile Commerce
- Uses wireless devices or transactions
like cellphones, and palms.
- Popularized in Japan and Europe

Key Technologies used in Mobile Commerce


● Telephone-based 3G
● Wi-Fi
● Bluetooth
WEEK 16 - Education Article
Trends in Education - Printed materials, online classes
1. Online Education “most preferred” for distance
a. New frontier in the philippines learning - DepEd
b. Higher education is also slowly
adopting the digital area 2, Integrated Learning Solutions
c. Online certifications, additional - aiming to provide optimum digital
certifications, professional infrastructure requirements while
education, and executive keeping traditional textbooks as the
management courses are becoming base
popular 3. Personalized Learning
- changes the way of education
New normal in the PH educational system: delivery or learning process and
● Internet allowed school operations students can learn without a barrier
● Teachers meet online with the of their strength, weakness or pace
students to stay connected with of understanding.
them 4. Professional Development of Teachers
● School administration meets online - The educators are of course an
to follow-up on tasks integral element of the learning
● Online classes to ensure that ecosystem. And that is why it is
students continue to receive the important to familiarize them with
intervention needed and to facilitate present generation competencies
skills across different platforms and and skills so that students can
settings experience the best of the
● Instructional materials technologies available now.
5. Formative Assessment Solutions
- learning makes an impact as it tests
the student’s progress together with
curriculum delivery and
- analyzes personal and social 2. Public education system was first
competencies. established
6. Cost Management in Education Problems of the philippines educational
- As the technology is rising in the system:
education sector, administrations
will require in-depth planning to 1. Quality of Education
ensure relevant investment. With 2. Budget for Education
the correct strategy, education 3. Affordability of Education
industry will see a great 4. Drop-out Rate (Out-of-school youth)
improvement in terms of cost 5. Mismatch
management. 6. Brain drain
7. The Changing Role of a Teacher 7. Social divide
- The 21st century has changed the 8. Lack of facilities and teacher
concept of a teacher too. More than shortage in public schools
a data feeder, the teacher has Issues regarding the K-12
become someone who nurtures the
learners adequately.

Issues Regarding the Educational System


- Educational system has been
affected immensely by:
- the country’s colonial history:
- Spanish Period
- American Period
- Japanese Rule
American Occupation (1898)
1. English was introduced as the
primary language of instruction
Week 17 ● Nature Language Processing:
Artificial Intelligence (AI) ○ creating, understanding, and
- is defined as a branch of computer ○ classifying clinical documents
science that aims to enable and published research.
computer systems to perform ● Robotics
various tasks with intelligence ○ physical robots are enabled
similar to humans. with AI to perform different
In healthcare, AI is: tasks in the healthcare
● used to analyze the treatment sector. Surgical robots.
techniques of various diseases and ● Rule-Based Expert System
to prevent them. ○ : collection of it-then rules
● used in various areas of healthcare and is most widely used in
such as diagnosis processes, drug the commercial sector.
research sector, medicine, patient ● Robotic Process Automation (RPA)
monitoring care center, etc. ○ used to perform repetitive
● helps to gather past data through tasks such as updating
electronic health records for disease patient records or billing.
prevention and diagnosis.
IT Trends in Healthcare:
AI Technologies used in healthcare: ● Radiology
● Machine Learning (Neural Network ● Screening
and Deep Learning): ● Psychiatry
○ the main use is precision ● Primary Care
medicine, which means to ● Disease Diagnosis
predict the best treatment ● Dermatology
protocols ● Drug Interaction
● Manufacturing of Drugs
● Electronic Health Records

You might also like