Posted by & filed under Mobile Computing.

 

 

 

 

 

 

 

Description: Link to article with chronology of mobile computing development.  The history helps us to better understand perhaps where we are going, and future trends.

Source: Natalie Aranda, eZine

Link: http://ezinearticles.com/?A-Brief-History-of-Mobile-Computing&id=505215

Discussion Questions:

  1. What have been the advantages & disadvantages associated with the development of mobile computing technology

Posted by & filed under Uncategorized.

 

 

 

 

 

 

 

 

 

Description: Link to Business Link article for expanding discussion related to Location Based Services & Commerce.

Source: Business Link

Link: http://www.businesslink.gov.uk/bdotg/action/detail?type=RESOURCES&itemId=1075386967

Discussion Questions:

  1. Compare & contrast LBS to GPS technology.

Posted by & filed under MDM/Master Data Management, Video.

Description: 2:37 minutes. YouTube video describing the MDM process in which companies integrate data from various sources or enterprise applications to provide a more unified view of the data.  The data is consolidated from various data sources into a master reference file, which then feeds data back to the applications, thereby creating accurate and consistent data across the enterprise.

Source: TIBCOSoftware, YouTube Video

Date: 10/22/2008

Link: http://www.youtube.com/watch?v=xVWt-CsNBnU

Discussion Questions:

  1. What is Master Data Management?

Posted by & filed under MDM/Master Data Management, Video.

Description: 9:22 minutes. YouTube video for discussion is focused around data integration, data quality and data warehousing.  An MDM includes tools for cleaning and auditing the master data elements as well as tools fro integrating & synchronizing data to make the data more accessible. 

Source: Ted Friedman, YouTube Video 

Date: 10/20/2008

Link: http://www.youtube.com/watch?v=nm6O6_6bOcs

Discussion Questions:

  1. What must be done with raw data?

Posted by & filed under MDM/Master Data Management.

Description: Article from CIO.com for further discussion surrounding the topic of MDM.  Organizations must understand that improving their data—and building the foundation for MDM—requires them to address internal disagreements and broken processes.

Staff must agree on exactly what constitutes a “customer” or a “partner,” and how to resolve any disagreements across business units. Departments and divisions need to agree on hierarchies of customers and products and how to resolve duplicate records across sources. Rather than a technology-focused effort, the project becomes one of political strategy and consensus building.

Source: Tony Fisher, CIO Magazine

Date: 4/30/2007

Link: http://www.cio.com/article/106811/Demystifying_Master_Data_Management

Discussion Questions:

  1. What are some of the universally applicable techniques for resolving disagreements within business units?

Posted by & filed under IT Security.

 

 

 

 

 

 

 

 

Description: Link to IT Security article.  Hot links to articles on this slide that will extend/further explain concepts presented in the text.

What are some reason why employees fail to follow internal security policies & procedures?  How might they be more motivated?  Use incentives.  Recognition of employees/business units for following policies, without security violations, secure ideas brought forward, etc. 

Employees may believe they are too busy for the additional steps that may be required such as passwords, door entry, data authentication procedures, etc.  It is important that employees be fully aware of risks & penalties; penalties should be enforced consistently.

Source: Cindy Waxer, IT Security

Date: 4/12/2007

Link: http://www.itsecurity.com/features/the-top-5-internal-security-threats-041207/

Discussion Questions:

1. Do you recommend employee incentives?

2. Most big company security breaches originate from:

a. hackers

b. viruses

c. missing security patches

d. internal sources such as employees

3. Method to identify a person based on a biological feature:

a. authentication

b. access control

c. biometrics

d. countermeasure

 4. Worms:

a. spread with human intervention

b. spread using networks to propagate

c. cannot spread via instant or text messages

d. none of the above

Posted by & filed under IT Security.

Description: In this article authors focus on 25 of the most common and easy to fix mistakes that people make when it comes to email security. The article is designed with the new internet user in mind, so if someone is an email expert, they may want to pass this along to their more novice friends

This article provides good support for discussion of guarding against external threats and the dissemination through internal sources.

Source: Info Security

Date: 2/28/2007

Link: http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/

Discussion Questions:

  1. Brainstorm guarding against email threats to develop some best practice tips.

Posted by & filed under IT Security, No Discussion Questions.

 

Description: Positive security, in which it whitelists everything from entire applications down to specific functions before allowing access, sounds extreme. Unfortunately, the desktop environments we know and love prioritize ease of use over security, and we’re all feeling the pain: More than half of respondents to our 2008 InformationWeek Analytics Strategic Security poll have been hit by a virus this year, and nearly 30% have been attacked through OS vulnerabilities.

Source: Jordan Wienes, InfoWeek

Date: 9/20/2008

Link: http://www.informationweek.com/news/security/management/showArticle.jhtml?articleID=210602257

Posted by & filed under IT Infrastructure, No Discussion Questions, Supply Chain Management.

 

 

 

 

 

 

 

 

Description: From ordering to manufacturing to inventory control, Mary Kay enjoys new visibility

Source: Richard Gincel, InforWorld

Date: 11/12/2004

Link: http://higheredbcs.wiley.com/legacy/college/turban/0470287489/visual_lib/Chapter2/InfoWorld_Article_Mary_Kay_Rejuvenates_SCM_2_7_B.htm