Posted by & filed under Pervasive Computing.

Description: Definition of pervasive computing is foundational to understanding and application in a business context and is the basis for discussion.  It is technology in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone “using” ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so.

 

Source: Wikipedia

Date: 11/22/2010

Link: http://en.wikipedia.org/wiki/Pervasive_Computing

Discussion Questions:

  1. What are the ethical issues surrounding pervasive computing?

Posted by & filed under Business Process Outsourcing, Offshoring, Outsourcing.

 

 

 

 

 

 

 

 

 

Description: Cnet News article related to the hidden risks of outsourcing & especially to overseas locations.  The article focuses thought around the potential loss of intellectual property in outsource arrangements.  Students should be guided to think critically about this risk & ways to minimize it, if that is even possible.  For instance, don’t outsource what can be stolen such as intellectual property.  Instead, outsource things that are routine & that can be automated.

Source: Reed Taussig, Cnet News

Date: 8/24/2005

Link: http://news.cnet.com/The-hidden-risk-in-outsourcing-overseas/2010-1071_3-5842317.html

Discussion Questions:

1. What are the advantages & disadvantages of outsourcing?  Give examples  of successful & unsuccessful situations.

2. Failure rates of outsourcing relationships are:

a. High

b. Low

c. Acceptable

d. Insignificant

3. Shirking occurs when a vendor:

a. develops a strategic application for a client & then uses it for other clients

b. deliberately underperforms while claiming full payment

c. client enters into a long-term contract with a vendor & the vendor changes financial terms d. at some point or overcharges for unanticipated enhancements

e. none of the above

4. Poaching occurs when a vendor:

a. develops a strategic application for a client & then uses it for other clients

b. deliberately underperforms while claiming full payment

c. client enters into a long-term contract with a vendor & the vendor changes financial terms at some point or overcharges for unanticipated enhancements

d. none of the above

Posted by & filed under Mobile Computing.

Description: Discusses how GPS technologies differ from LBS.  Identifies the five key concepts of L-commerce: location, navigation, tracking, mapping & timing.

Source: Wikipedia

Date: 11/25/2010

 

Link: http://en.wikipedia.org/wiki/Location-based_service

Discussion Questions:

1. What is L-commerce?

2. Servers that manage location information sent from position determining equipment:

a. MPC

b. PDE

c. location based technology

d. location specific content

3. Location-based services are beneficial to:

a. consumers

b. businesses

c. consumers & businesses

d. none of the above

4. LBS offers:

a. safety

b. opportunity to sell more

c. convenience

d. all of the above

Posted by & filed under Mobile Computing.

 

 

 

 

 

 

 

Description: Link to article with chronology of mobile computing development.  The history helps us to better understand perhaps where we are going, and future trends.

Source: Natalie Aranda, eZine

Link: http://ezinearticles.com/?A-Brief-History-of-Mobile-Computing&id=505215

Discussion Questions:

  1. What have been the advantages & disadvantages associated with the development of mobile computing technology

Posted by & filed under Uncategorized.

 

 

 

 

 

 

 

 

 

Description: Link to Business Link article for expanding discussion related to Location Based Services & Commerce.

Source: Business Link

Link: http://www.businesslink.gov.uk/bdotg/action/detail?type=RESOURCES&itemId=1075386967

Discussion Questions:

  1. Compare & contrast LBS to GPS technology.

Posted by & filed under MDM/Master Data Management, Video.

Description: 2:37 minutes. YouTube video describing the MDM process in which companies integrate data from various sources or enterprise applications to provide a more unified view of the data.  The data is consolidated from various data sources into a master reference file, which then feeds data back to the applications, thereby creating accurate and consistent data across the enterprise.

Source: TIBCOSoftware, YouTube Video

Date: 10/22/2008

Link: http://www.youtube.com/watch?v=xVWt-CsNBnU

Discussion Questions:

  1. What is Master Data Management?

Posted by & filed under MDM/Master Data Management, Video.

Description: 9:22 minutes. YouTube video for discussion is focused around data integration, data quality and data warehousing.  An MDM includes tools for cleaning and auditing the master data elements as well as tools fro integrating & synchronizing data to make the data more accessible. 

Source: Ted Friedman, YouTube Video 

Date: 10/20/2008

Link: http://www.youtube.com/watch?v=nm6O6_6bOcs

Discussion Questions:

  1. What must be done with raw data?

Posted by & filed under MDM/Master Data Management.

Description: Article from CIO.com for further discussion surrounding the topic of MDM.  Organizations must understand that improving their data—and building the foundation for MDM—requires them to address internal disagreements and broken processes.

Staff must agree on exactly what constitutes a “customer” or a “partner,” and how to resolve any disagreements across business units. Departments and divisions need to agree on hierarchies of customers and products and how to resolve duplicate records across sources. Rather than a technology-focused effort, the project becomes one of political strategy and consensus building.

Source: Tony Fisher, CIO Magazine

Date: 4/30/2007

Link: http://www.cio.com/article/106811/Demystifying_Master_Data_Management

Discussion Questions:

  1. What are some of the universally applicable techniques for resolving disagreements within business units?