Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?
Posts By: David Firth
Description: 2:31 minutes. YouTube video on topic of how RFID works. Link is to YouTube video that gives visual examples of RFID applications & uses. Source: CBN, YouTube Video Date: 1/1/2007 Link: http://www.youtube.com/watch?v=yNPDgudPmXE Discussion Questions: 1. How can RFID help supply chain management? 2. Supply chains driven by customer demand: a. traditional supply chains b. demand driven… Read more »
Description: Demonstration of Kiva Systems. The article discusses the utilization of robots in performing distribution & handling of inventory. Source: KIVA Systems Link: http://www.kivasystems.com/demo/index.html Discussion Questions: 1. How effective is distribution & handling of inventory when performed by robots? 2. Ordering, shipping & receiving materials: a. inventory management b. logistics management c. quality… Read more »
Description: All Business Topics article about self-check-out system in place at Home Depot. Describe the typical customer at Home Depot & the significance of such a change in terms of cost, efficiency, customer service. Source: Retail Merchandiser / All Business Topics Date: 1/31/2002 Link: http://www.allbusiness.com/retail-trade/4294050-1.html Discussion Questions: How has the… Read more »
Description: Wikipedia definition of RFID. Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use. Source: Wikipedia Date: 12/3/2010 Link: http://en.wikipedia.org/wiki/Rfid Discussion Questions: 1. What are the benefits to the consumer of RFID usage? 2. Define RFID & give examples. 3…. Read more »
Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue. Advances in network technologies & storage, compared to those in chip technology, even more profound. Source: Gordon Moore, intel Link: http://www.intel.com/technology/mooreslaw/ Discussion Questions: 1. What is the productivity paradox? Give examples. 2. Productivity paradox: a. Price-to-performance… Read more »
Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness. Source: Harvard University, YouTube Video Date: 6/30/2008 Link: http://www.youtube.com/watch?v=mYF2_FBCvXw Discussion Questions: 1. Based on… Read more »
Description: 1:45 minutes. Video that provides great foundation for discussion of future trends in technology. Source: Business Tech, YouTube Video Date: 10/17/2007 Link: http://www.youtube.com/watch?v=KsKne-fw-X0 Discussion Questions: What is pervasive computing? What is its business application?
Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing). Source: Adam Greenfield, YouTube Video Date: 8/4/2008 Link: http://www.youtube.com/watch?v=SKZm34jsNHY Discussion Questions: What is ubiquitous computing? Is it ethical?
Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology. While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands. There is extensive application for the good of humanity in such areas as… Read more »