Posted by & filed under Business Intelligence, Software, System development.

Description: I.B.M.’s announcement Monday that it is buying Netezza for $1.7 billion highlights how much the fast-growing field of business intelligence is increasingly both a hardware and a software technology.


Date: Sept 20, 2010

The term “business analytics,” of course, is the branding upgrade that has been given to business intelligence.

Whatever. Both terms, in English, refer to using computing to pluck useful answers and business insights from the explosion of data that is being created by the Web, sensors, e-mail, purchase transactions, call center reports and other sources.

Until recently, business intelligence had been seen as mainly a software technology. Data was stored in data bases, and the clever business intelligence software was sent in to probe the data bases for answers. Click here for rest of story

Questions for discussion:

  • What is B.I and why is it important to an organization?
  • What is the evidence that this is a growing market and area of concentration for businesses?
  • Do you consider the B.I. tools “disruptive technology”? Why? or Why not?

Posted by & filed under ERP, Software, Supply Chain Management.

Description: It’s common knowledge that training is a key reason why large-scale ERP implementations fail. Knowing the symptoms of insufficient planning, execution or poor training delivery is the first step to diagnosing the greater problem


Date: Oct 29, 2010

When outside training consultants assess ERP implementations already in progress, they act very much like doctors. First they ask the patients (in this case the CIO, project teams, HR and training leads, etc.) what they are experiencing. Then they poke into a few areas looking for pain points and performance issues. They run a few tests to see if the surface symptoms match the deeper issues, and go further to uncover underlying training issues that might not yet have appeared as symptoms to the naked eye. Click here for rest of story

Questions for discussion:

  • Why should you get a third-party review of the ERP training plan and process?
  • Why is training a disappearing resource in ERP implementation?
  • How would you consult your organization in relation to having a successful ERP implementation?

Posted by & filed under Cloud Computing, Ecommerce, SaaS, Security, wireless networks.

Description: Not all businesses flock to cloud computing, though. What its proponents tout as its main benefit – applications and data on the internet – its critics impugn as a potential weakness

Source: CBC News

Date: Oct 26, 2010

Cash-strapped startups and small companies like cloud computing for various reasons. Clients can rent hosted versions of enterprise-class systems like Microsoft SharePoint and Exchange (as well as industry-specific applications like myJDesktop), often for manageable monthly fees. This helps them avoid big up-front payouts to buy servers and software, as well as maintenance fees for things like updates, data backup and general IT costs.   Click here for rest of story

Questions for discussion:
• What are the benefits of Software-as-a-Service (SaaS)?
• What are the downsides of adopting  Software-as-a-Service (SaaS)?
• Why would a small business look to specifically adopt SaaS strategy in their organization?

Posted by & filed under Cloud Computing, Security, Uncategorized.

Description: Thousands of websites and millions of pieces of private data are increasingly in one big cloud, where some of the old rules of data security are out the window.

Source: Fortune

Date: Sept 24, 2010

With the rise of cloud computing companies, and the ferocity with which tech’s biggest companies are snatching those firms up, it’s no secret that a good chunk of our user data is already stored in the cloud. Our emails, our documents, our social network profiles and hundreds of thousands of tiny startups already rely on cloud services like to be more productive and cost-effective. Click here for rest of story

Questions for discussion:

  • Why factors contribute to the growth of cloud computing in the enterprise?
  • What risk’s are businesses exposed to when they choose to use cloud computing?
  • If you were in charge of IT infrastructure of your university, what advice would you give to your university if they were looking at going to a cloud computing model?

Posted by & filed under Ecommerce, M-commerce, Supply Chain Management, wireless networks.

Description: Square, an application that turns a smartphone into a mobile cash register, is open for business.

Source: TechDate: Oct 25, 2010

Created by Twitter co-founder Jack Dorsey, Square uses a free download and plastic card reader to let users accept credit card payments.
The app charges users 2.75 percent of the transaction cost plus a 15-cent fee — a rate Dorsey said is in line with what retail stores pay for accepting cards. Click here for rest of story

Questions for discussion:

  • List five specific business applications that this technology would benefit?
  • If you were a small mobile business, why wouldn’t you adopt this technology?
  • What are are the substitutes or competition to Square?

Posted by & filed under Cloud Computing, M-commerce, Security, wireless networks.

Description: Thousands of websites and millions of pieces of private data are increasingly in one big cloud, where some of the old rules of data security are out the window.

Source: CNN.Tech

Date: Oct 23, 2010

Google admitted in a blog post Friday that external regulators have discovered that e-mails, URLs and passwords were collected and stored in a technical mishap, while the vehicles for Google’s Street View service were out documenting roadway locations.

According to Google, data was mistakenly collected in more than 30 countries, including the United States, Canada, Mexico, some of Europe, and parts of Asia.      Click here for rest of story

Questions for discussion:

  • Did Google handle this breach of privacy correctly from a public relations point of view?
  • Does Google’s breach of trust influence your decision to use their products? Why or Why not?
  • Who should police companies to make sure that privacy and security is ensured for all?

Posted by & filed under Ecommerce, M-commerce, Software, wireless networks.

Description: A survey by online job board Dice shows that tech employers and recruiters face a shortage of qualified mobile-software designers


Date: Oct 21, 2010

Almost 57 percent of employers and outside recruiters that hired for mobile-related jobs this year plan to boost such hires in the next 12 months, the survey, conducted on behalf of Bloomberg, showed. More than half the respondents described the supply of quality mobile-software designers and engineers as “scarce.”  Click here for rest of story

Questions for discussion:

  • Why factors contribute to the mobile  app market growing so fast and large?
  • How should educational institutions respond to this market indicator of a shortage off app developers?
  • What options does business have to deal with this surge in demand and lack of supply  in this area of mobile commerce?

Posted by & filed under Cloud Computing, Ecommerce, Security, Social Media, Uncategorized.

A Facebook representative said in a statement was taking steps to “dramatically limit” exposure of users’ personal information to companies.
Source: Tech
Date: Oct 18, 2010

Many of Facebook’s most popular apps are sharing personally identifiable information of their users with dozens of advertising and Internet-tracking companies, in violation of the social-networking giant’s own rules, according to a Wall Street Journal report.

The issue provides access to users’ names and, in some cases, the names of the app user’s friends to at least 25 advertising and data firms, the Journal reported    Click here for rest of story

Questions for discussion:

  • Is there anything wrong with sharing Facebook info with marketers? Why or Why not?
  • Do you feel that this issue will scare away Facebook  users or reduce usage of Facebook?  Why or Why not?
  • What should Facebook do as a result of this situation? Is this a technical issue or a branding issue?

Posted by & filed under Ecommerce, M-commerce, Uncategorized, wireless networks.

Description: The term “smartphone” may sound cool and hip, but it’s actually been around since at least the mid-1990s.

Source: Tech

Date: Oct 18, 2010

The ’90s version of the smartphone was nothing like the gadgets many of us tote around in our pockets today. It was the size of a brick, it didn’t have a color screen and, according to a phone market analyst, users could see only one line of e-mail at a time, meaning they had to scroll down a dozen times just to get to the start of a message.

Yet, when we talk about our present-day, touch-screen mobile computers — with their app stores, GPS services and other invented-since-the-’90s whizbangs — many of us still call them smartphones. Click here for rest of story

Questions for discussion:

  • Should a business’s e-commerce model be the same as the company’s M-commerce model?
  • Do the new smartphones deal sufficiently with the issues of M-commerce ie. Input and output, bandwidth and security?
  • Do you feel that mobile computing will be the dominant segment of e-commerce market in the future?

Posted by & filed under Ecommerce, M-commerce, Security, Software.

Description:  Mobile devices are becoming bigger targets for malware creator


Date: Oct 14, 2010

In early 2009, Citigroup (C) launched a new mobile banking application for the iPhone. It let customers check their account balances and pay bills while on the go. Thanks to a bit of sloppy code, it also could have let hackers access the banking information for 118,000 customers who downloaded the app.

This story has a happy ending—Citi discovered the security flaw in June, before hackers could exploit it, and the bank says no customer lost money. However, experts say hackers may be quicker to exploit shoddy coding the next time around.   Click here for rest of story

Questions for discussion:

  • Comment on the quote “ The bad guys follow the money” in relation to m-commerce.
  • Who should be responsible for security protection on smartphone apps, hardware makers or software makers?
  • Does Apple have an advantage in relation to other smartphone venders in regards to protecting clients from malware? Why?