Posted by & filed under IT Security.




 Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with surprising ease. Even the e-commerce giants are no sturdier than any others. All it takes is a well-directed “denial of service” attack to blow away the edifices, at least on a temporary basis. And when you try to track the culprit, it turns out that all you can find is a shield–the dummy computers through which the cyber vandal laundered his poisonous computer code.

Source: Steve Levy, NewsWeek

Date: 1/21/2000


Discussion Questions:

  1. What defenses, if any, are there against cyber vandalism?

Posted by & filed under IT Planning.




Description: article about common mistakes related to strategic planning by IT professionals. 

Source: Derek Slater, CIO Magazine

Date: 6/1/2002


Discussion Questions:

1. Discuss the importance of IT-business alignment for CIOs.

2. IT initiatives may fail if:

a. IT is not aligned to the overall business strategy

b. CIO is not a member of the top executive level

c. Poor communication of the initiative

d. Lack of support at all levels

e. All of the above

3. Top issues facing CIOs:

a. Reducing costs

b. Attracting & retaining top talent

c. Managing change

d. All of the above

e. None of the above

4. Organized planning of IT resources:

a. Business strategic planning

b. IT strategic planning

c. Quarterly forecasting

d. Sourcing

Posted by & filed under IT Governance, Video.

Description: 7:36 minutes. YouTube video about the “governance,” or management, of information.  Many companies govern “money, finances, risks.”   This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done.

Source: YouTube

Date: 10/23/2008


Discussion Questions:

  1. What is different about this direction of thinking versus the IT function as we know it?

Posted by & filed under IT Governance.






 Description: Whitepaper from IT Governance Institute, providing a discussion of IT governance trends by a panel of experts. The IT Governance Institute (ITGI) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. ITGI developed Control Objectives for Information and related Technology (COBIT), now in its fourth edition, and Val IT, and offers original research and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.

Source: IT Governance Institute

Date: 2007


Discussion Questions:

  1. Identify challenges to leaders for IT governance models to be implemented.

Posted by & filed under Grid Computing.











Description: Considered one of the largest grid computing projects in the world, J.P. Morgan Chase Investment Bank’s pioneering effort to combine seven separate financial risk management systems to share computing power is on target to lower costs while increasing flexibility and service to internal customers.  Grid computing provides communication among devices.  Coordinates use of large number of servers & storage, acting as one computer by sharing & coalescing the computing power.

Source: Matt Hamblen, Computer World

Date: 3/15/2004


Discussion Questions:

1. What are some practical applications with grid computing?

 2. Grid computing:

a. is designed to provide communication among devices.

b. coordinates the use of a large number of servers and storage

c. acts as one computer by sharing & coalescing computing power

d. requires maintaining reserve capacity

 3. Conventional networks are designed to:

a. provide communication among devices

b. support the concept of grid computing

c. operate efficiently

d. all of the above

e. none of the above

 4. Grid computing is distinguished from conventional cluster computing systems by:

a. the application of several computers to a single problem at the same time

b. grids that tend to be more loosely coupled, heterogeneous, and geographically dispersed

c. construct with the aid of general-purpose grid software libraries and middleware

d. all of the above


Posted by & filed under Green Technologies, Video, Virtualization.








Description:  Green computing is a mindset that asks how we can satisfy growing demand for network computing without putting undo stress on the environment. 

Data centers are commonly filled with large numbers of servers that require a tremendous amount of time and money to maintain. Dan Chu of VMware shows how virtualization can optimize fewer servers to run at higher performance levels.

Source: Dan Chu, Zdnet 

Date: 1/6/2006


Discussion Questions:

1. Define & give examples of green computing.  What is the value to business overall?

2. Study & practice of eco-friendly computing resources:

a. Green economics

b. Green computing

c. Eco-friendly business practices

d. All of the above

 3. Benefits of telecommuting:

a. Improves job satisfaction & productivity

b. Decreases involvement in office politics

c. Reduces need for facilitates

d. Increased labor pool

e. Conserves energy & lessens dependence upon foreign oil

 4. Concept of green computing requires:

a. World-wide effort for greatest effectiveness

b. Must begin somewhere

c. Can benefit third world countries by increasing standard of living conditions

d. All of the above

e. None of the above

Posted by & filed under Green Technologies, Video.

Description: Video describing innovative approaches to making technology less harmful to the environment.

Source: YouTube



 Discussion Questions:

1. What are some of the benefits of green technology?

 2. Examples can be appropriate disposal of obsolete equipment; technology that will not emit dangerous elements into the environment.

 3. Efficient utilization by using power save features.

 4. Green software refers to software products that help companies:

a. Save energy, or comply with EPA requirements.

b. Save money.

c. Reduce cycle time.

d. Continuously improve quality.

 5. The responsibility to dispose of discarded PCs and other outdated computer equipment resides with:

a. Manufacturers.

b. Users.

c. Government agencies.

d. Organizations.

e. All of the above.

 6. With an increased awareness about the damage to the physical environment and ecosystem, organizations and individuals are looking at potential improvements and savings that can be made within the IT industry.  These efforts are known as:

a. Eco-friendly initiatives.

b. Energy-efficient data centers.

c. Virtualization technologies.

d. Green IT.

e. None of the above.

Posted by & filed under Fraud, Video.

Description: YouTube video for discussion about system vulnerabilities that organizations may know nothing about and that is the modern day organized crime.

Source: Fredric Golding, YouTube

Date: 1/7/2008


Discussion Questions:

  1. How has the Internet increased our vulnerability to criminal activities?

Posted by & filed under Fraud, Video.

Description: 3:47 minutes.  Cyber crime is pervasiveness, and it is one of the “safest” forms of crime because criminals are invisible.

Source: YouTube

Date: 6/9/2008


 Discussion Questions:

  1. How has the Internet increased our vulnerability to criminal activities?  Has overall criminal activities increased or just assumed a new perspective?