Description: CIO.com article with tutorial related to SCM Knowledge. Consider the tutorial as an in-class activity with this slide. Source: Thomas Wailgum, CIO Magazine Date: 11/20/2008 Link: http://www.cio.com/article/40940/Supply_Chain_Management_Definition_and_Solutions Discussion Questions: Describe SCM knowledge & give examples integrating what has been learned from the tutorial.
Posts By: David Firth
Description: CreditCards article for example of TPS being utilized by major airlines as a service to their customers. Source: Lisa Rogak, CreditCard Date: 8/4/2008 Link: http://www.creditcards.com/credit-card-news/credit-cards-airlines-inflight-purchases-1273.php Discussion Questions: Describe TPS & utilization at “point of sale” such as described in this article.
Description: Article with specific stated purpose to clarify what Web 2.0 really is. Discusses the exponential growth of technology and the internet, changes to business overall, and global neighborhoods. Web 2.0 is platform for social computing. Social computing has revolutionized business opportunities with the formation of communities for like-interest participants. Source: O’Reilly… Read more »
Description: Article about the tremendously successful strategy by Toyota to use live chat technology to capture the market of 18 to 24 year old consumers. Source: Marketing Vox Date: 1/22/2004 Link: http://www.marketingvox.com/toyota_uses_chat_to_promote_scion-015059/
Description: Imagine tailgating at an NFL stadium without having to sit in traffic, buying a hot dog and beer without having to open your wallet and walking along the concourse without feeling like the player on the receiving end in one of those “NFL’s Hardest Hits” videos. Source: Associated Press,… Read more »
Description: 11:03 minutes. YouTube video about importance of IT to criminal investigations. Basic best practices, security 101. Source: YouTube Date: 1/1/2007 Link: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related Discussion Questions: How can IT facilitate forensics investigations?
Description: Article listing the top 10 security surprises faced by nine executives running top software security programs. Source: Gary McGraw, Brian Chess, and Sammy Migues, Informit Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/Informit_Article_Security_Software_Top_10_Surprises_2_43_A.htm Discussion Questions: At what price should we pay for security?
Description: InfoWeek article for discussion to do with denial of service (break downs beyond company control). An online payment processor’s Web site recovered from a two-day denial-of-service (DoS) attack that knocked it out of commission, a U.K.-based Internet performance measuring company reported. StormPay.com’s site was unavailable for several hours… Read more »
Description: Link to How Stuff Works for discussion about how to protect from phishers. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing3.htm Discussion Questions: Is the protection against phishers effective?
Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?