Wikipedia Entry – Radio-Frequency Identification (RFID)

Posted by & filed under RFID/Radio-Frequency Identification.

Description:  Wikipedia definition of RFID.  Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use. Source: Wikipedia     Date: 12/3/2010 Link: http://en.wikipedia.org/wiki/Rfid Discussion Questions: 1. What are the benefits to the consumer of RFID usage? 2. Define RFID & give examples. 3…. Read more »

Moore’s Productivity Paradox

Posted by & filed under Productivity Paradox.

              Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue.  Advances in network technologies & storage, compared to those in chip technology, even more profound.  Source: Gordon Moore, intel Link: http://www.intel.com/technology/mooreslaw/ Discussion Questions: 1. What is the productivity paradox?  Give examples. 2. Productivity paradox: a. Price-to-performance… Read more »

YouTube Video – Porter’s Five Competitive Forces That Shape Strategy: Interview with Michael Porter

Posted by & filed under Competitive Advantage, Video.

Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness. Source: Harvard University, YouTube Video Date: 6/30/2008 Link: http://www.youtube.com/watch?v=mYF2_FBCvXw Discussion Questions: 1. Based on… Read more »

YouTube Video – Pervasive Computing

Posted by & filed under Pervasive Computing, Video.

Description: 1:45 minutes. Video that provides great foundation for discussion of future trends in technology. Source: Business Tech, YouTube Video Date: 10/17/2007 Link: http://www.youtube.com/watch?v=KsKne-fw-X0 Discussion Questions: What is pervasive computing?  What is its business application?

YouTube Video – Big Brother, Part 2

Posted by & filed under Pervasive Computing, Video.

Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing).  Source: Adam Greenfield, YouTube Video Date: 8/4/2008 Link: http://www.youtube.com/watch?v=SKZm34jsNHY Discussion Questions: What is ubiquitous computing?  Is it ethical?

YouTube Video – Big Brother, Part 1

Posted by & filed under Pervasive Computing, Video.

Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology.  While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands.  There is extensive application for the good of humanity in such areas as… Read more »

Wikipedia Entry – Pervasive Computing

Posted by & filed under Pervasive Computing.

Description: Definition of pervasive computing is foundational to understanding and application in a business context and is the basis for discussion.  It is technology in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone “using” ubiquitous computing engages many computational devices and systems simultaneously, and may… Read more »

Myths About Open Source

Posted by & filed under Open Source.

            Description: Whitepaper with the myths about open source and opportunity to discuss what open source is not. Source: Emma McGrattan, SVP of Engineering, Ingres Corporation Date: 2008 Link: http://www.wiley.com/college/turban/0470287489/pdfs/six_myths__about_open_source.pdf Discussion Questions: What is the most common myth about open source software?

Cnet News – Perspective: The Hidden Risk in Outsourcing Overseas

Posted by & filed under Business Process Outsourcing, Offshoring, Outsourcing.

                  Description: Cnet News article related to the hidden risks of outsourcing & especially to overseas locations.  The article focuses thought around the potential loss of intellectual property in outsource arrangements.  Students should be guided to think critically about this risk & ways to minimize it, if that… Read more »

Wikipedia Entry – Location Based Services (LBS)

Posted by & filed under Mobile Computing.

Description: Discusses how GPS technologies differ from LBS.  Identifies the five key concepts of L-commerce: location, navigation, tracking, mapping & timing. Source: Wikipedia Date: 11/25/2010   Link: http://en.wikipedia.org/wiki/Location-based_service Discussion Questions: 1. What is L-commerce? 2. Servers that manage location information sent from position determining equipment: a. MPC b. PDE c. location based technology d. location specific content 3…. Read more »