Description: Wikipedia definition of RFID. Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use. Source: Wikipedia Date: 12/3/2010 Link: http://en.wikipedia.org/wiki/Rfid Discussion Questions: 1. What are the benefits to the consumer of RFID usage? 2. Define RFID & give examples. 3…. Read more »
Posts By: David Firth
Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue. Advances in network technologies & storage, compared to those in chip technology, even more profound. Source: Gordon Moore, intel Link: http://www.intel.com/technology/mooreslaw/ Discussion Questions: 1. What is the productivity paradox? Give examples. 2. Productivity paradox: a. Price-to-performance… Read more »
Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness. Source: Harvard University, YouTube Video Date: 6/30/2008 Link: http://www.youtube.com/watch?v=mYF2_FBCvXw Discussion Questions: 1. Based on… Read more »
Description: 1:45 minutes. Video that provides great foundation for discussion of future trends in technology. Source: Business Tech, YouTube Video Date: 10/17/2007 Link: http://www.youtube.com/watch?v=KsKne-fw-X0 Discussion Questions: What is pervasive computing? What is its business application?
Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing). Source: Adam Greenfield, YouTube Video Date: 8/4/2008 Link: http://www.youtube.com/watch?v=SKZm34jsNHY Discussion Questions: What is ubiquitous computing? Is it ethical?
Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology. While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands. There is extensive application for the good of humanity in such areas as… Read more »
Description: Definition of pervasive computing is foundational to understanding and application in a business context and is the basis for discussion. It is technology in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone “using” ubiquitous computing engages many computational devices and systems simultaneously, and may… Read more »
Description: Whitepaper with the myths about open source and opportunity to discuss what open source is not. Source: Emma McGrattan, SVP of Engineering, Ingres Corporation Date: 2008 Link: http://www.wiley.com/college/turban/0470287489/pdfs/six_myths__about_open_source.pdf Discussion Questions: What is the most common myth about open source software?
Description: Cnet News article related to the hidden risks of outsourcing & especially to overseas locations. The article focuses thought around the potential loss of intellectual property in outsource arrangements. Students should be guided to think critically about this risk & ways to minimize it, if that… Read more »
Description: Discusses how GPS technologies differ from LBS. Identifies the five key concepts of L-commerce: location, navigation, tracking, mapping & timing. Source: Wikipedia Date: 11/25/2010 Link: http://en.wikipedia.org/wiki/Location-based_service Discussion Questions: 1. What is L-commerce? 2. Servers that manage location information sent from position determining equipment: a. MPC b. PDE c. location based technology d. location specific content 3…. Read more »