Samsung takes Filipino mobile users to the unlimited realm of imagination with the launching of ph.samsungmobile.com.
The web portal features Samsung mobile products which allows me to check phone specifications and even compare to other units. Of course, I can make quick searches of Samsung mobile phone which fitted to my lifestyle. For example, I can tick on 3G checkbox to view 3G Samsung mobile phones. It really makes my searches easy.
Of course, ph.samsungmobile.com also features Support, Downloads, Member Services, Community, and Promotion pages. It makes the portal a complete realms of what I need and what I imagine. It truly justifies that Samsung nurtures one’s imagination.
The Software and Information Industry Association (SIIA) released on February 19, 2008 the list of most frequently pirated software as part of the 2007 Anti-Piracy Year In Review report. SIIA is the principal trade association for the software and digital content industry based in Washington, DC.
The report observes:
The largest share of software titles pirated fall in the productivity categories – word processing, office suites, report design, web design, etc. – the software used most often in business.
We print information in blocks like this post. We traditionally write and print this way – blocks or by paragraph. But a research indicates that the human brain is not “wired” to read text in the traditional way we print it, which is in blocks.
A company called Walker Reading Technologies, conducted scientific research that would revolutionize online publication and reading. The study concluded that “the natural field of focus for our eyes is circular, so our eyes view the printed page as if we’re peering through a straw.” 
The Pilipinas Anti-Piracy Team (PAPT) pursues all-out war against all forms of software piracy, SunStar Cebu (online) reports today. PAPT is a government-led initiative composed of the National Bureau of Investigation (NBI), the Optical Media Board (OMB) and the Philippine National Police (PNP).
We heavily invest on hardware and software, and to IT support personnel. But how do we deal with persons who initiate acts that compromise our IT infrastructure? How do we deal with persons who hack our system? How about those who spread malware like the “I love you” virus that heavily harm computer networks in the world? How about those who invade our intellectual property right?As much as there is a need to act on street crimes, there is also a great need to act on cybercrimes.