Posted by & filed under RFID/Radio-Frequency Identification.

 

 

 

 

 

Description: Demonstration of Kiva Systems.  The article discusses the utilization of robots in performing distribution & handling of inventory. 

Source: KIVA Systems

Link: http://www.kivasystems.com/demo/index.html

Discussion Questions:

1. How effective is distribution & handling of inventory when performed by robots?

2. Ordering, shipping & receiving materials:

a. inventory management

b. logistics management

c. quality control

d. none of the above

3. May be used to collect data:

a. Six Sigma

b. RFID

c. TQM

d. VMI

4. Total quality management effort:

a. Six Sigma

b. Web-based sensors

c. RFID

d. None of the above

Posted by & filed under RFID/Radio-Frequency Identification, TPS/Transaction Processing System.

 

 

 

 

 

 

 

Description: All Business Topics article about self-check-out system in place at Home Depot.  Describe the typical customer at Home Depot & the significance of such a change in terms of cost, efficiency, customer service.

Source: Retail Merchandiser / All Business Topics

Date: 1/31/2002

Link: http://www.allbusiness.com/retail-trade/4294050-1.html

Discussion Questions:

  1. How has the self-check out concept been accepted by customers?

Posted by & filed under RFID/Radio-Frequency Identification.

Description:  Wikipedia definition of RFID.  Task students to come up with examples with which they come into contact daily or routinely. Discusses advantages & disadvantages of its use.

Source: Wikipedia

 

 

Date: 12/3/2010

Link: http://en.wikipedia.org/wiki/Rfid

Discussion Questions:

1. What are the benefits to the consumer of RFID usage?

2. Define RFID & give examples.

3. Technology used in enterprise supply chain management to improve the efficiency of inventory tracking and management:

a.      barcodes

b.      battery transmitted signals

c.       external source to provoke signal transmission

d.      RFID

e.      Antenna

4. Most RFID tags contain:

a.      integrated circuits & antenna

b.      antenna

c.       IFF transponders

d.      auto ID system

Posted by & filed under Productivity Paradox.

 

 

 

 

 

 

 

Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue.  Advances in network technologies & storage, compared to those in chip technology, even more profound. 

Source: Gordon Moore, intel

Link: http://www.intel.com/technology/mooreslaw/

Discussion Questions:

1. What is the productivity paradox?  Give examples.

2. Productivity paradox:

a. Price-to-performance ratio

b. Discrepancy between measures of investment in IT & measures of output at the national level

c. Doesn’t exist

d. None of the above

3. Does the productivity paradox matter?

a. Yes

b. No

c. It doesn’t exist any more

d. None of the above

4. IT projects should be justified using:

a. Non-traditional methods

b. Cost-benefit analysis

c. ROI models

d. None of the above

Posted by & filed under Competitive Advantage, Video.

Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness.

Source: Harvard University, YouTube Video

Date: 6/30/2008

Link: http://www.youtube.com/watch?v=mYF2_FBCvXw

Discussion Questions:

1. Based on Porter’s model, what are the impact & importance of IT upon corporate strategy implementation and success?

2. According to Porter, IT enhances competitiveness of a firm most critically in:

a. Bargaining power of suppliers, bargaining power of buyers & distribution channels

b. Threat of new entrants & substitute products or services

c. Rivalry between companies

d. All of the above

3. While implementing Porter’s competitive forces model, companies can identify the forces that influence competitive advantage in their marketplace and then develop a strategy.  The three classical strategies are:

a. Cost leadership, growth, and differentiation

b. Differentiation, niche, and alliance

c. Differentiation, niche and cost leadership

d. Customer orientation, time, and entry barriers

e. Cost leadership, niche, and increase switching costs

4. Porter’s value chain model divides activities conducted in any manufacturing organization into two parts: primary and support.  The goal of value-adding, primary activities is to:

a. Deliver a product or service to the customer.

b. Purchase materials.

c. Process materials into products.

d. Make a profit for the company.

e. Create demand through marketing and sales.

5. Porter’s value chain model divides activities conducted in any manufacturing organization into two parts: primary and support.  The primary goal(s) of support activities is to:

a. Enhance the firm’s infrastructure efficiencies (accounting, finance, management)

b. Provide human resources with tools needed to maximize strategic advantage through employees and performance.

c. Engine to power technology development (R&D) and procurement initiatives/activities.

d. Support primary activities

e. All of the above.

Posted by & filed under Pervasive Computing, Video.

Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing). 

Source: Adam Greenfield, YouTube Video

Date: 8/4/2008

Link: http://www.youtube.com/watch?v=SKZm34jsNHY

Discussion Questions:

  1. What is ubiquitous computing?  Is it ethical?

Posted by & filed under Pervasive Computing, Video.

Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology.  While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands.  There is extensive application for the good of humanity in such areas as health care, childcare and care of senior citizens.  There is also great danger seen by many with the capability to know where someone is at all times.

Source: YouTube Video

Date: 7/31/2008

Link: http://www.youtube.com/watch?v=2I3T_kLCBAw

Discussion Questions:

  1. What are the possible future uses for pervasive computing technology?

Posted by & filed under Pervasive Computing.

Description: Definition of pervasive computing is foundational to understanding and application in a business context and is the basis for discussion.  It is technology in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone “using” ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so.

 

Source: Wikipedia

Date: 11/22/2010

Link: http://en.wikipedia.org/wiki/Pervasive_Computing

Discussion Questions:

  1. What are the ethical issues surrounding pervasive computing?