How Stuff Works – Phishing

Posted by & filed under IT Security, Phishing.

                    Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?

YouTube Video – How Radio-Frequency Identification (RFID) Works

Posted by & filed under RFID/Radio-Frequency Identification, Video.

Description: 2:31 minutes. YouTube video on topic of how RFID works.  Link is to YouTube video that gives visual examples of RFID applications & uses. Source: CBN, YouTube Video Date: 1/1/2007 Link: http://www.youtube.com/watch?v=yNPDgudPmXE Discussion Questions: 1. How can RFID help supply chain management? 2. Supply chains driven by customer demand: a. traditional supply chains b. demand driven… Read more »

KIVA Systems – Robots Perform Distribution & Handling

Posted by & filed under RFID/Radio-Frequency Identification.

          Description: Demonstration of Kiva Systems.  The article discusses the utilization of robots in performing distribution & handling of inventory.  Source: KIVA Systems Link: http://www.kivasystems.com/demo/index.html Discussion Questions: 1. How effective is distribution & handling of inventory when performed by robots? 2. Ordering, shipping & receiving materials: a. inventory management b. logistics management c. quality… Read more »

All Business – Home Depot Employs Self Checkout

Posted by & filed under RFID/Radio-Frequency Identification, TPS/Transaction Processing System.

              Description: All Business Topics article about self-check-out system in place at Home Depot.  Describe the typical customer at Home Depot & the significance of such a change in terms of cost, efficiency, customer service. Source: Retail Merchandiser / All Business Topics Date: 1/31/2002 Link: http://www.allbusiness.com/retail-trade/4294050-1.html Discussion Questions: How has the… Read more »

Wikipedia Entry – Radio-Frequency Identification (RFID)

Posted by & filed under RFID/Radio-Frequency Identification.

Description:  Wikipedia definition of RFID.  Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use. Source: Wikipedia     Date: 12/3/2010 Link: http://en.wikipedia.org/wiki/Rfid Discussion Questions: 1. What are the benefits to the consumer of RFID usage? 2. Define RFID & give examples. 3…. Read more »

Moore’s Productivity Paradox

Posted by & filed under Productivity Paradox.

              Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue.  Advances in network technologies & storage, compared to those in chip technology, even more profound.  Source: Gordon Moore, intel Link: http://www.intel.com/technology/mooreslaw/ Discussion Questions: 1. What is the productivity paradox?  Give examples. 2. Productivity paradox: a. Price-to-performance… Read more »

YouTube Video – Porter’s Five Competitive Forces That Shape Strategy: Interview with Michael Porter

Posted by & filed under Competitive Advantage, Video.

Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness. Source: Harvard University, YouTube Video Date: 6/30/2008 Link: http://www.youtube.com/watch?v=mYF2_FBCvXw Discussion Questions: 1. Based on… Read more »

YouTube Video – Pervasive Computing

Posted by & filed under Pervasive Computing, Video.

Description: 1:45 minutes. Video that provides great foundation for discussion of future trends in technology. Source: Business Tech, YouTube Video Date: 10/17/2007 Link: http://www.youtube.com/watch?v=KsKne-fw-X0 Discussion Questions: What is pervasive computing?  What is its business application?

YouTube Video – Big Brother, Part 2

Posted by & filed under Pervasive Computing, Video.

Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing).  Source: Adam Greenfield, YouTube Video Date: 8/4/2008 Link: http://www.youtube.com/watch?v=SKZm34jsNHY Discussion Questions: What is ubiquitous computing?  Is it ethical?

YouTube Video – Big Brother, Part 1

Posted by & filed under Pervasive Computing, Video.

Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology.  While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands.  There is extensive application for the good of humanity in such areas as… Read more »