Posted by & filed under IT Security, IT Trends.

 

 

 

 

 

 

 

 

 

 

Description: Article listing the top 10 security surprises faced by nine executives running top software security programs.

Source: Gary McGraw, Brian Chess, and Sammy Migues, Informit

Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/Informit_Article_Security_Software_Top_10_Surprises_2_43_A.htm

Discussion Questions:

  1. At what price should we pay for security?

Posted by & filed under DoS/Denial of Service, IT Security.

 

 

 

 

 

 

 

Description: InfoWeek article for discussion to do with denial of service (break downs beyond company control).  An online payment processor’s Web site recovered from a two-day denial-of-service (DoS) attack that knocked it out of commission, a U.K.-based Internet performance measuring company reported.  StormPay.com’s site was unavailable for several hours late Thursday and most of Friday, said Netcraft, when it was overwhelmed by a DoS that aimed as much as 6 gigabytes of data a second at the URL.

Source: Gregg Keizer, InfoWeek

Date: 2/13/2006

Link: http://www.informationweek.com/news/internet/ebusiness/showArticle.jhtml;jsessionid=3IN2OZDRCRDVCQSNDLPSKHSCJUNN2JVN?articleID=180200785&_requestid=276636&_requestid=276859

Discussion Questions:

  1. How can an organization avoid such disasters?

Posted by & filed under RFID/Radio-Frequency Identification, Video.

Description: 2:31 minutes. YouTube video on topic of how RFID works.  Link is to YouTube video that gives visual examples of RFID applications & uses.

Source: CBN, YouTube Video

Date: 1/1/2007

Link: http://www.youtube.com/watch?v=yNPDgudPmXE

Discussion Questions:

1. How can RFID help supply chain management?

2. Supply chains driven by customer demand:

a. traditional supply chains

b. demand driven supply networks

c. real time SCM

d. none of the above

3. DDM provides customers with:

a. what, where, when they want

b. great flexibility

c. better control of internal processes

d. all of the above

e. none of the above

4. Revolutionary solution to supply chain problems:

a. SCM

b. RFID technology

c. EFT

d. DDM

Posted by & filed under RFID/Radio-Frequency Identification.

 

 

 

 

 

Description: Demonstration of Kiva Systems.  The article discusses the utilization of robots in performing distribution & handling of inventory. 

Source: KIVA Systems

Link: http://www.kivasystems.com/demo/index.html

Discussion Questions:

1. How effective is distribution & handling of inventory when performed by robots?

2. Ordering, shipping & receiving materials:

a. inventory management

b. logistics management

c. quality control

d. none of the above

3. May be used to collect data:

a. Six Sigma

b. RFID

c. TQM

d. VMI

4. Total quality management effort:

a. Six Sigma

b. Web-based sensors

c. RFID

d. None of the above

Posted by & filed under RFID/Radio-Frequency Identification, TPS/Transaction Processing System.

 

 

 

 

 

 

 

Description: All Business Topics article about self-check-out system in place at Home Depot.  Describe the typical customer at Home Depot & the significance of such a change in terms of cost, efficiency, customer service.

Source: Retail Merchandiser / All Business Topics

Date: 1/31/2002

Link: http://www.allbusiness.com/retail-trade/4294050-1.html

Discussion Questions:

  1. How has the self-check out concept been accepted by customers?

Posted by & filed under RFID/Radio-Frequency Identification.

Description:  Wikipedia definition of RFID.  Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use.

Source: Wikipedia

 

 

Date: 12/3/2010

Link: http://en.wikipedia.org/wiki/Rfid

Discussion Questions:

1. What are the benefits to the consumer of RFID usage?

2. Define RFID & give examples.

3. Technology used in enterprise supply chain management to improve the efficiency of inventory tracking and management:

a.      barcodes

b.      battery transmitted signals

c.       external source to provoke signal transmission

d.      RFID

e.      Antenna

4. Most RFID tags contain:

a.      integrated circuits & antenna

b.      antenna

c.       IFF transponders

d.      auto ID system

Posted by & filed under Productivity Paradox.

 

 

 

 

 

 

 

Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue.  Advances in network technologies & storage, compared to those in chip technology, even more profound. 

Source: Gordon Moore, intel

Link: http://www.intel.com/technology/mooreslaw/

Discussion Questions:

1. What is the productivity paradox?  Give examples.

2. Productivity paradox:

a. Price-to-performance ratio

b. Discrepancy between measures of investment in IT & measures of output at the national level

c. Doesn’t exist

d. None of the above

3. Does the productivity paradox matter?

a. Yes

b. No

c. It doesn’t exist any more

d. None of the above

4. IT projects should be justified using:

a. Non-traditional methods

b. Cost-benefit analysis

c. ROI models

d. None of the above