The Anti-cyber sex law

cyber sex

Many Asian countries are now passing laws and bills to strengthen the fight on an already rampant cyber sex industry across the continent. The law that most of these countries passed is defined by a law that makes cybersex between husband and wife, two concenting adults, or two voluntary and involuntary minors illegal to be published and streamed on the internet for profitable gain. Any people associate with the willful engagement, maintenance, control, or operation, directly or indirectly of any of these lascivious exhibitions of sexual deeds and activities with the aid of a computer system, is also liable to be doing illegal business.

This cybersex law has been made in many different Asian countries to prevent an industry that targets minors who are looking for quick money as their main source of income. Cybersex has been a rising through the years as the number of internet users has gone up as well. Compared to handling a gentle’s man club or a strip club joint, a virtual cybersex business is relatively easier to handle and maintain since there is no actual place of meeting and money transactions. All operations are done through the internet, meaning clients have the power to keep their names secure while seeking these services. Many cybersex business owners feel that they are gaining an upperhand in the recruitment of their employees or show people by stating that they are not actually prostitutes since they don’t directly give sexual favors for cash in return. It is even commonly stated that they are simply entertainers and dancers who perform exotic deeds for other people’s enjoyment.

a funny ad for cyber sex

Many technologically developed countries such as Japan, Singapore and Hong kong are the three primary countries to run these operations finding their employees in far flung cities of third world countries as well having their own local arrangements. This has been the new trend and most of these technologically inclined countries and has eradicated old forms of prostitution such as Japanese comfort women and Hong Kong trading sex slaves. The modern times have no called for a change in the prostitution business and laws are now inclined to make a change as well to stop these illegal business to occur.

images by and


Microsoft Office Apps Free for iPhone and iPad Users

Office App for iPhone Users now free

In the latest news in the technology industry, the big software tycoon Microsoft has made a move that will excite Office users. Microsoft has just made a variety of Office apps free for download and use on the iPhone and the iPad. Now, Microsoft Word, Microsoft Excel, and Microsoft PowerPoint is free for anyone who wants to avail of it. Normal users can create and edit Office documents, Excel spreadsheets, and create flashy power points or slideshows. Not long ago, a year long subscription was required for users who wanted a handle on the Office app. Meanwhile, for those who want better and more advanced functionality, particularly business customers, subscriptions are still needed. Android users need not fret because the Office suite is also coming to Android with beta access. Dropbox has also been integrated in the Office suite for Android and iOS thanks to the strategic partnership formed by the two companies.

The Office App interface featuring its files

Microsoft application products for free almost seems unbelievable but for Microsoft, they are just on the right track. The Microsoft Office suite has brought most of its profits from this product line. Almost every home, school and workplace has this Office suite. It took a long time before Office apps could be viewed in other platforms but now that Microsoft has changed its strategy, Office apps are now free for users worldwide. As the digital age is moving in its rightful way, more and more individuals are on their phones and tablets than on their desktops. Microsoft has adjusted to the people’s behavior towards technology and has reassessed their strategy to move with the changing times of the digital age.

Images from


Manage projects better through Huddle

Huddle’s web interface featuring its task schedule

Free web-based project management systems are scarce especially competent software at that. This new web service called Huddle is free for one manager account with an additional 100MB of storage. This free account is supported with ads while more storage space is available for a mere fee of $8 a month. Managing files has never been so easy until Huddle. Businesses can use this to store and manage files in an organized and easy manner. To store and manage files, upload a file to the workspace in Huddle. These files will automatically be added to the Files tab in the project that you create in Huddle. Easily organize these files by storing them to folders that you can add. There is also a to do tasks list in which files can be attached to it as well. Not only that but comments can be directly added to the file, allowing business colleagues to easily discuss about the topic in one place.  This helps organize all discussions in one tab. 

Huddle’s calendar feature for scheduling tasks

Users that act as project managers also have complete control access to work spaces. Project managers can decide who can see which projects and what tasks and who cannot see the files. This can be set through viewing or editing permissions on folders, sub folders and entire work spaces in the program. Other members of the teams can get permission to see the folders, files and tasks individually or there is also an option to add members to a team to allow adjustments for permission to see certain files. For project managers, it is easy to manage what each member of the team should do. 
Huddle makes group work much easier through a simple way of sharing files, holding discussions, and managing projects in one workspace.
Images by

Empowering Comfort Women through Online Communities

Filipino comfort women abused by the Japanese Army

Web services has not only contributed in making businesses more successful internally and externally but it has also given a voice to those who have none. Comfort women were women and young girls who were forced to become sexual slaves by the Japanese Army before the start of World War II and during the war itself. These comfort women were sexually abused by soldiers to “keep their moral and spirits motivated” .  Women and young girls would be kidnapped from their homes, on the streets, and taken away to be sexually abused. Not only were these comfort women physically abused but emotionally and spiritually as well. Some were not paid back for the abuses that they suffered. Different women from different nationalities suffered from this kind of prostitution namely from occupied countries such as Korea, China, and the Philippines. Other nations that were also occupied by Japan also had comfort women sought after by the Japanese such as Indonesia, Taiwan, East Timor, Burma, Thailand, and Vietnam

Former comfort women protesting against the injustices of war

Social media is a platform that can be used to voice out and spread awareness for these comfort women. Social networks are basically web-based services that individuals who have access to the Internet can create profiles, connections, and share information like photos, videos, and texts. Online communities are formed therefore generating online community services that allow people to interact with other people on the same network through instant messaging, e-mail, and more. Sharing the stories of comfort women is a way to help raise awareness and ultimately reach out to these women who seek the love and warmth from people to heal their wounds of abuse. Web based services such as Facebook, Twitter, Google + are powerful networks that can help raise awareness for issues that have been overshadowed by time like the slavery of comfort women.

Images from

Your Personal Virtual Receptionist for Business

A “Book now!” button will embed on your business’ website for easy booking.

Many web services help businesses to manage people or their schedule more. One of these web services is Genbook, a personal virtual receptionist.  Genbook was launched in 2008 and is being used by over 5000 small or medium enterprises all around North America. Appointments all over North America have been made via Genbook with an increment of a thousand every month. Using the Genbook service embeds a “Book Now” button on the company’s website, providing an easy way for customers to schedule appointments while the web interface of the program provides a simple way to schedule and confirm appointments.

Set staff hours through the program whether they are -online or away

Appointments for businesses is easy to accomplish by selecting a time slot. Meanwhile, to make a new booking, choose a service and a drop-down menu will allow the program to fill in the other fields automatically. A client name can be looked for in the search engine. Preexisting clients will be field in automatically as well.

For clients who repeatedly book for the business’ service, the program allows you to add credit card information as well. Adding credit-card information is a feature that can be helpful in case charging fees for clients who don’t show up is an option and confirming clients’ whenever they book online. Genbook is a great web service that allows customers to book online to your business while at the same time also gives protection to the business from false appointments or client no-shows.  Although it is not a tool to manage promotions or deals, it is a great web service tool to track schedules or bookings.

Images from and

MailChimp’s Email Marketing Web Service

Turrene Tactical increased their sales through MailChimp services

Email marketing has been one of the successful forms of digital marketing and web services have sprung up for businesses who are in need of these types of services. One email marketing web service is MailChimp and it is one very interesting way to launch email campaigns especially for small business owners. Turenne Tactical and World Spice are small businesses that have sought out MailChimp’s services.

Turenne Tactical is a small business that called on MailChimp for their email campaigns. Their database had about 900 emails of return customers who have bought some of their products before. Turenne Tactical began using MailChimp. The results were fairly well as aside from many unsubscribes that were very much expected, the campaign resulted with over 300 opens (of emails) and more than 100 direct clicks throughs that link to the product Turenne Tactical was featuring for that month. The end result was an increase in product sales.

World Spice Merchants increased their sales with the use of email marketing

Another small business that used MailChimp’s services was Word Spice.  This small business’ first campaign sectioned the campaign into batches due to the long lists of customer contacts in their databased that were unused for a long time. These untouched contacts were generated from the business’ online store and in-store sign ups. Some of the customers wanted to receive monthly newsletters therefore World Spice sought the web service of MailChimp. The first email campaign started with a newsletter containing a blog article, a recipe, and a direct click through link of the spice featured in the recipe. It was a simple article that resulted into the small business’ biggest sale since Christmas.

Using the web service of email marketing is one successful way to keep in touch with return customers. It encourages them to take a look at your products without having to hard sell anything. Small businesses to large businesses can truly benefit from the gift of email marketing.

Images by Amazon and Youtube


Requirements for a JAX-end endpoint

What WS requires

Certain JAX-WS endpoints ought to follow the following requirements and these are as follows:

The class that will be annotated must be annotated using the javax.jws. Webservice; or alternatively, the javax.jws.WebServiceProvider annotation. Secondly, having a JAX-WS endpoint requires that the implementing class have an explicit reference through the endpoint Interface element of the @Webservice annotation. However, contrary to what you may think, it is not required to do so. An SEI will be implicitly defined for the implementing class if it is provided that no endpoint Interface is going to be specified in the WebService. Thirdly, another requirement for having a JAX-end endpoint is that the business methods of the implementing class shout strictly be public, and should, at all costs, not be declared static or final. Furthermore, business methods are required to be exposed to web service clients. These business methods also ought to be exposed to web service clients and have JAXB-compatible parameters and certain return types. Surely, it will be a very helpful tool to aspiring businessmen as well. It may sound complicated but is definitely very useful. In addition, the implementing class must not be made abstract, and should be declared unfinal. It should not, more importantly define the finalize method, but instead, have a default public constructor. In doing so, the implementing class may use the javax.annotation.PostConstruct of the javax.annotation.PreDestroy annotations for lifecycle event callbacks. This method is usually called in by the container before the implementing class can even begin to respond to the web service clients.


JAX-WS starting point

Web services

If you are going to start out developing a JAX-WS web service then the starting point would be to have a Java class annotated with the javax.jws. WebService annotation. What will define the class as a web service endpoint is simply the @WebService annotation. The service endpoint interface or what can be also called the service endpoint implementation, or as a shortcut for it (SEI), is what can be described to be a certain Java interface or class. This certain Java interface or class will declare the methods that a client can impose on the service. When you are building a JAX-WS endpoint, it does not really so much require a JAX-WS endpoint, it only simply needs a web service implementation to define the SEI. If you are attempting to specify an explicit interface, this is what you can do. Simply add the endpointInterface element to the @WebService annotation in the implementation class. If you are going to create a web service and client, be sure to firstly code the implementation class. Second, after coding the implementation class, you should then compile the implementation class. After compiling the implementation class, you can then package the files into a WAR file. After packaging the files into a WAR file, you should then deploy the WAR file. Web service artifacts will be generated by the Glass Fish server during deployment. After deploying the WAR File, you may then start coding the client class, and successively start using a wsimport Ant task in order to generate and compile the web service artifacts which are needed to connect to the service.
Image by: java.globinch

Why you should use web services

Easy Web Service

One should make use of web services for four fundamental reasons. The first, being that web services expose the existing function on to the network. The second fundamental reason is that web services connect different applications’ interoperability. The third is because web services make use of standardized protocol. Finally, last of all, web services make it possible to have a low cost of communication. To elaborate, a service that exposes existing functions onto the network works via a unit of managed code that is capable of being remotely invoked using HTTP. This means that  several and varying web services can be activated using HTTP requests, allowing people to expose the functionality of the existing code which you made over the network. You want this to happen so that other applications can make use of your program. Because Web Services have the capacity to connect different applications, different applications are allowed to communicate with each other, thus being able to share data and services among themselves. This allows other applications to make use of the services of the web services, which in turn allows applications and other technological platforms independent. Service Transport, XML Messaging, Service  Description, and the Service Discovery layers use a standard industry protocol for communication, helping a lot of businesses reduce costs because of competition and at the same time, be able to increase the quality. Such are the advantages of having a standardized protocol when it comes to the protocol stack in Web Service.
Image by:

What are Web Services anyway?

How it works

A web service is a a piece of self-contained software which is a collection of open protocols and standards which are used to exchange data between applications or systems. The information of these web services are XML-based information. XML allows the usage of a language which can be used as a connection between different platforms and programming languages and still be capable of expressing several different complex messages and functions. This provides the infrastructure of the World Wide Web a means for their software to connect to other software applications. These different software applications can capably access different Web Services through HTTP, XML, or SOAP without encountering any form of trouble with regard to how these different Web services will be implemented. This helps solve interoperability challenges. This is done by giving your applications a means to integrate their data and business processes.  For instance, when somebody uses a web service by sending an XML message, they will in turn wait for a corresponding XML response. Recalling the fact that web services use XML to communicate, Java applications can talk with Perl; similarly Unix applications can communicate with Windows. Therefore, web services are not tied to using certain or specific operating systems or programming language. Simply said, software applications which are actually written in various programming languages and running on different platforms can use these web services to exchange data over the Internet. This similar to the inter-process communication that occurs on one computer. Lastly, it is discoverable through simple find mechanisms.