CIO – SCM Knowledge Tutorial

Posted by & filed under Supply Chain Management.

      Description: CIO.com article with tutorial related to SCM Knowledge.  Consider the tutorial as an in-class activity with this slide. Source: Thomas Wailgum, CIO Magazine Date: 11/20/2008 Link: http://www.cio.com/article/40940/Supply_Chain_Management_Definition_and_Solutions  Discussion Questions: Describe SCM knowledge & give examples integrating what has been learned from the tutorial.

CreditCards – Many Airlines Inflight Accepts Credit Cards

Posted by & filed under TPS/Transaction Processing System.

                  Description: CreditCards article for example of TPS being utilized by major airlines as a service to their customers.   Source: Lisa Rogak, CreditCard Date: 8/4/2008 Link: http://www.creditcards.com/credit-card-news/credit-cards-airlines-inflight-purchases-1273.php Discussion Questions: Describe TPS & utilization at “point of sale” such as described in this article.

O’Reilly Media – What is Web 2.0?

Posted by & filed under Social Networks, Web 2.0, Wireless.

                Description: Article with specific stated purpose to clarify what Web 2.0 really is.  Discusses the exponential growth of technology and the internet, changes to business overall, and global neighborhoods.  Web 2.0 is platform for social computing.  Social computing has revolutionized business opportunities with the formation of communities for like-interest participants. Source: O’Reilly… Read more »

YouTube Video – Computer Security 101

Posted by & filed under IT Security, Video.

Description: 11:03 minutes. YouTube video about importance of IT to criminal investigations.  Basic best practices, security 101. Source: YouTube Date: 1/1/2007 Link: http://www.youtube.com/watch?v=_E4DO4ADCqw&feature=related Discussion Questions: How can IT facilitate forensics investigations?

Informit – Security Software Top 10 Surprises

Posted by & filed under IT Security, IT Trends.

                    Description: Article listing the top 10 security surprises faced by nine executives running top software security programs. Source: Gary McGraw, Brian Chess, and Sammy Migues, Informit Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/Informit_Article_Security_Software_Top_10_Surprises_2_43_A.htm Discussion Questions: At what price should we pay for security?

InfoWeek – E-Payment Provider Hit with Denial of Service

Posted by & filed under DoS/Denial of Service, IT Security.

              Description: InfoWeek article for discussion to do with denial of service (break downs beyond company control).  An online payment processor’s Web site recovered from a two-day denial-of-service (DoS) attack that knocked it out of commission, a U.K.-based Internet performance measuring company reported.  StormPay.com’s site was unavailable for several hours… Read more »

How Stuff Works – Protection from Phishing

Posted by & filed under IT Security, Phishing.

                  Description: Link to How Stuff Works for discussion about how to protect from phishers. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing3.htm Discussion Questions: Is the protection against phishers effective?

How Stuff Works – Phishing

Posted by & filed under IT Security, Phishing.

                    Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?