Posted by & filed under Supply Chain Management.

 

 

 

Description: CIO.com article with tutorial related to SCM Knowledge.  Consider the tutorial as an in-class activity with this slide.

Source: Thomas Wailgum, CIO Magazine

Date: 11/20/2008

Link: http://www.cio.com/article/40940/Supply_Chain_Management_Definition_and_Solutions

 Discussion Questions:

  1. Describe SCM knowledge & give examples integrating what has been learned from the tutorial.

Posted by & filed under TPS/Transaction Processing System.

 

 

 

 

 

 

 

 

 

Description: CreditCards article for example of TPS being utilized by major airlines as a service to their customers.  

Source: Lisa Rogak, CreditCard

Date: 8/4/2008

Link: http://www.creditcards.com/credit-card-news/credit-cards-airlines-inflight-purchases-1273.php

Discussion Questions:

  1. Describe TPS & utilization at “point of sale” such as described in this article.

Posted by & filed under Social Networks, Web 2.0, Wireless.

 

 

 

 

 

 

 

 

Description: Article with specific stated purpose to clarify what Web 2.0 really is.  Discusses the exponential growth of technology and the internet, changes to business overall, and global neighborhoods.  Web 2.0 is platform for social computing.  Social computing has revolutionized business opportunities with the formation of communities for like-interest participants.

Source: O’Reilly Media

Date: 9/30/2005

Link: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

Discussion Questions:

1. Give your own examples of social sites to which you belong, why do you, and how often do you, use them.

2. Discuss importance of Web 2.0 technology to business overall after reading the article.

3. Web 2.0 versus Web 1.0 environments:

        a. Wikis from content management systems.

        b. Participation to publishing.

        c. Cost per click to page views.

        d. Search engine optimization to domain name speculation.

        e. Wikipedia to Britannica Online.

4. Harnesses collective intelligence effectively:

        a. E-Commerce

        b. Web 2.0.

        c. Hyperlinking.

        d. Amazon.

        e. Google.

5. Web 2.0:

        a. Has a hard boundary.

        b. Has a gravitational core.

        c. First generation of Internet-based services that let people collaborate and share information online.

        d. Buzzword in the technical and marketing communities.

Posted by & filed under No Discussion Questions, Social Networks.

 

 

 

 

 

 

 

Description: Article about the tremendously successful strategy by Toyota to use live chat technology to capture the market of 18 to 24 year old consumers.

Source: Marketing Vox

Date: 1/22/2004

Link: http://www.marketingvox.com/toyota_uses_chat_to_promote_scion-015059/

Posted by & filed under No Discussion Questions, Social Networks, Uncategorized.

 

 

 

 

 

 

Description: Imagine tailgating at an NFL stadium without having to sit in traffic, buying a hot dog and beer without having to open your wallet and walking along the concourse without feeling like the player on the receiving end in one of those “NFL’s Hardest Hits” videos.

Source: Associated Press, CNY Central

Date: 11/22/2008

Link: http://www.cnycentral.com/sports/sports_story.aspx?id=226077

Posted by & filed under IT Security, IT Trends.

 

 

 

 

 

 

 

 

 

 

Description: Article listing the top 10 security surprises faced by nine executives running top software security programs.

Source: Gary McGraw, Brian Chess, and Sammy Migues, Informit

Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/Informit_Article_Security_Software_Top_10_Surprises_2_43_A.htm

Discussion Questions:

  1. At what price should we pay for security?

Posted by & filed under DoS/Denial of Service, IT Security.

 

 

 

 

 

 

 

Description: InfoWeek article for discussion to do with denial of service (break downs beyond company control).  An online payment processor’s Web site recovered from a two-day denial-of-service (DoS) attack that knocked it out of commission, a U.K.-based Internet performance measuring company reported.  StormPay.com’s site was unavailable for several hours late Thursday and most of Friday, said Netcraft, when it was overwhelmed by a DoS that aimed as much as 6 gigabytes of data a second at the URL.

Source: Gregg Keizer, InfoWeek

Date: 2/13/2006

Link: http://www.informationweek.com/news/internet/ebusiness/showArticle.jhtml;jsessionid=3IN2OZDRCRDVCQSNDLPSKHSCJUNN2JVN?articleID=180200785&_requestid=276636&_requestid=276859

Discussion Questions:

  1. How can an organization avoid such disasters?