ISPs defend plans for two-tier net

Posted by & filed under Business Analytics, Business Intelligence, Civil Liberties, Competitive Advantage, E-Business, E-Commerce, IT Standards, IT Strategy.

Discussion: The debate continues between net neutrality advocates – those who believe all net traffic should be treated equally – and Internet Service Providers (ISPs) who argue that content providers should be able to pay to get their traffic prioritized on the network.  Net neutrality has become a hot legislative topic in Europe and ISPs… Read more »

Market research and the primitive mind of the consumer

Posted by & filed under AI/Artificial Intelligence, Business Analytics, Business Intelligence, E-Business, E-Commerce, Internet Advertising, IT Planning, IT Projects, IT Strategy, IT Trends, Wireless.

Discussion: Manual techniques of market research require hours of viewing slow motion video and logging mind-numbing facial expressions, a labor-intensive process that greatly limits the number of people that can be tested.  But new technology is replacing these traditional techniques with computerized emotion recognition that can analyze thousands of faces at the same time.  If… Read more »

Conan 2.0

Posted by & filed under Business Intelligence, E-Business, IT Strategy, Mobile Computing, Social Computing, Social Networks, Web 2.0, Wireless.

Discussion: How does a self-proclaimed computer Luddite go from host of The Tonight Show to unemployed to a sold-out national comedy tour?  The power of social media transformed Conan O’Brien’s career from a late night television host with no show to an improv sensation on stages across the country.  And the numbers are impressive: Conan,… Read more »

Sites Like Twitter Absent From Free Speech Pact

Posted by & filed under Business Analytics, Business Intelligence, Civil Liberties, E-Business, IT Governance, IT Standards, IT Strategy, Privacy, Search Engine, Social Computing, Social Networks.

Discussion: In 2008 human rights groups and politicians condemned top Internet companies for complying with China’s restrictive laws and censorship requirements.  In response, Google, Microsoft, and Yahoo signed a code of conduct intended to protect online free speech and privacy in restrictive countries and hoped other technology firms would follow suit.  But social media giants… Read more »

Apple Moves In on Your Wallet

Posted by & filed under App Economy, Business Analytics, Business Intelligence, E-Business, E-Commerce, IT Investment, IT Strategy, IT Trends, NFC/Near-Field Communication, Wireless.

Discussion: The genius of Apple – taking existing ideas and refining them – continues with NFC (Near-Field Communication), a microchip that can send and receive data across a very short distance.  Industry speculators believe Apple has plans to take this technology, which has been around for several years, and roll out “iCash.”  Instead of swiping… Read more »

Will shoppers be enticed by new ways of paying?

Posted by & filed under App Economy, Business Analytics, Business Intelligence, E-Business, E-Commerce, IT Strategy, IT Trends, Mobile Computing.

Discussion: The Future Store, a supermarket near Düsseldorf, Germany, aims to discover profitable links between technology and shopping habits.  Thanks to Near Field Communication (NFC) chips in their smart phones, shoppers will soon be able to scan the barcodes of items as they pick them off the shelves and a final barcode will be generated… Read more »

BYOC: Should employees buy their own computers?

Posted by & filed under Business Analytics, Business Intelligence, Cyber Security, E-Business, IT Infrastructure, IT Investment, IT Planning, IT Security, IT Strategy, IT Trends, Mobile Computing, Virtualization, Wireless.

Discussion: Struggling to keep up with ever-changing technology and the cost of IT provisioning, companies are adopting the “bring your own computer” (BYOC) policy.   Not only do employees have the freedom to choose their own devices, they also have the freedom to access their office desktop remotely.  Both Microsoft and Intel subsidize hardware, while Citrix… Read more »

Facebook, Twitter and Groupon: The Next Economy or the Next Tech Bubble?

Posted by & filed under App Economy, Business Analytics, Business Intelligence, E-Business, E-Commerce, Interview, IT Investment, IT Strategy, IT Trends, Mobile Computing, Social Computing, Social Networks.

Discussion: Beverly Macy, technology writer and author of The Power of Real-Time Social Media Marketing, discusses the rise of social media and whether it’s a mainstream, revenue-generating business or the next dot.com crash.  While companies like Facebook and Groupon are indeed making money, what’s concerning is the amount of money chasing the next big thing… Read more »

10 new open source projects to watch

Posted by & filed under Business Analytics, Business Intelligence, Business to Business, Cloud Computing, E-Business, IT Governance, IT Trends, Open Source.

Discussion: Black Duck Software, a company that helps automate the management, governance, and security of free and open-source software, recently announced its 2010 open-source “Rookies of the Year” list.  Evaluating the popularity of each open-source project and using a weighted scoring system, it named ten winners, including number one on the list Diaspora, an open-source… Read more »

Broadband world: Connecting Africa

Posted by & filed under Business Analytics, Business Intelligence, E-Business, IT Governance, IT Investment, IT Planning, Wireless.

Discussion: Thanks to three undersea Internet cables that began to arrive in June 2009, East Africa’s tech sector scored a major confidence boost.  As a growing number of private entrepreneurs work to establish Kenya as East Africa’s high-tech hub, the relatively stable government oversees a three million dollar pot of money to reward promising start-ups. … Read more »