Description: Business Week article for further discussion about surveillance innovations. Starting with the first stone tools used thousands of years ago, technology has always had its pros and cons. Stones could grind corn — or split skulls. Such is the case with many of the sensors now being developed to protect civilized people from modern barbarians: terrorists.
Description: Discussion of the pros & cons of higher security levels. Tomorrow’s surveillance technology may be considerably more effective, but each uptick in protection will typically come at the cost of more intrusion into the privacy of ordinary people. For now, the public seems to find that trade-off acceptable, so scientists around the world have intensified efforts to perfect the art of surveillance, hoping to catch villains before they strike.
Research laboratories envision tools that could identify and track just about every person, anywhere – and sound alarms when the systems encounter hazardous objects or chemical compounds. Many such ideas seem to leap from the pages of science fiction: An artificial nose in doorways and corridors sniffs out faint traces of explosives on someone’s hair. Tiny sensors floating in reservoirs detect a deadly microbe and radio a warning. Smart cameras ID people at a distance by the way they walk or the shape of their ears. And a little chemical lab analyzes the sweat, body odor, and skin flakes in the human thermal plume — the halo of heat that surrounds each person.
Description: A “dashboard” pulls up everything the CEO needs to run the show, or rather what they need to assess performance, tool to identify where adjustment is necessary, who is performing and who isn’t. This article is about how the concept of the dashboard began.
The results of IBM’s online survey of 556 IT managers from around the world are in: while 66% of the survey participants rated their organization’s overall approach to IT risk as good to expert, only about half of the companies surveyed have a formal risk management department in place. The number one concern of those surveyed is IT security, specifically vulnerability to hackers and unauthorized access of the company systems. And of the five emerging technologies, 64% cite social networking tools as their biggest worry. Survey says: while companies around the world readily acknowledge the necessity of IT risk management and improvement, few are actually prepared for it.
Description: EE Times article link meant to stimulate discussion about the B2B technology companies and an indication of financial magnitude. The companies that received a portion of the $23 million from Intel were:
One97 Communications Pvt. Ltd., an independent provider of telecom-managed value added services in India. The firm’s existing investors also participated in the funding. IndiaMART.com, an online B2B marketplace connecting Indian suppliers with domestic and international buyers. Global Talent Track, a vocational educational institute. Intel said Helion Venture Partners also participated in the funding for Global Talent Track
Description: HBR article for discussion that presents the competitive advantage related to appropriate use of business analytics. Analytics competitors use sophisticated data-collection technology and analysis to wring every last drop of value from every available business processes. With analytics, one discerns not only what the customers want but also how much they’re willing to pay and what keeps them loyal. One must look beyond compensation costs to calculate the respective workforce’s exact contribution to an organization’s bottom line. And it isn’t enough for one to just track existing inventories; it is essential, as indicated here, the importance to also predict and prevent future inventory problems. The article takes the position that this use for IT is critical to organizational health and success.
Description: General purpose of outsourcing is to increase efficiency, reduce costs & to acquire innovative capabilities quickly-by buying the capabilities instead of developing them. Outsourcing can be a source of strategic advantage. It can be a disadvantage if cost begins to spiral upward.
Description: Link to Wikipedia BI definition & clarification. Business Intelligence (BI) – Common functions of business intelligence applications are reporting, OLAP, analytics, data mining, business performance management, benchmarks, text mining, and predictive analytics. BI is computer-based decision analysis usually done online by managers & staff.