Skip to main content

Home/ ITGS News/ Group items tagged Business

Rss Feed Group items tagged

Jackie C

Photo Editing Service | Photo Retouching Services | Edit Photos Online - 2 views

  •  
    Like in the situation given in our case study, this business offers a variety of services, but these focus mainly on photo retouching and editing. The site's design incorporates several elements which our own "client" business in the Case Study must deal with -- namely making site services and prices known to browsing users, and having customer help or an FAQ page on the website. In this site's case, the tour is also helpful for serving as a guide for new members, the role of which in the case study can be replaced by an about page or a help page instead.
Madeline Brownstone

BBC - BBC World Service Programmes - Digital Planet, 04/11/2008 - 0 views

  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
Mark Gakin

RFID Business Applications - 2 views

  •  
    RFID, radio frequency identification, is changing the ways companies and organizations operate. For the first time, they can create value in their products. In simpler terms, RFID is enabling companies to do so many different things they could not do before. It's important to know that RFID is used to identify people and objects. Each RFID tag has a tiny microchip within its body that can be recognized by a reader antenna. Even though this is bringing more business to companies because they have made it possible to shop much easier, it also is bringing them many issues because these antennas are permanently integrated into the tag, which can be tracked from anywhere. Given that the shopper purchased the item, the item can also be traced back to the shopper at any given time. Things like this can be dangerous in the real world because people's privacy becomes at stake. Either way, shopping is so much easier now thanks to RFIDs. The truth is, it's only a matter of time before they become a real problem.
helen g

RFID Applications in Supply Chain Management | RCD Technology - 1 views

  •  
    This article talks about the many uses of RFID in Supply Chain Management. There are various ways which businesses are benefited by RFID. In distribution, the ability to track the location of a product is very beneficial for both customers and businesses selling an item. The same tactic is also used with cargo and other items being moved, whether the distance is long or short. This is a useful application of RFID and also a cost efficient way of executing this procedure. Inventory counting is also made alot easier through RFID, since the product count is automatically updated. In the realm of retail and marketing.
Mariam B

Another Day, Another RFID Trial-Debate about using RFID on DVDs - 0 views

  •  
    This article discusses the issue of individual security and invasion of ones privacy through the use of RFID tags. With RFID tags on almost ever retail item, customers who are main stake holders, are questioning the motives of these tracking codes. A major item that is being tracked is a DVD from when it is first put into its cover and sent to the store, till the costumer purchases it. However the question remains, What is the purpose of this? Is it necessary to track how the costumer uses the items that they buy? Other stake holders include the large business corporations such as Walmart, who use these RFID codes to profit from studying the purchases and trends in other stores and areas. Additionally another stakeholder that is seen as a threat is the government who may eventually be able to spy or track down individuals based on these RFID codes on the items that they purchase. This issue relates to business and employment because companies are able to economically profit through this even though the individual privacy remains a threat. These RFID tags allow businesses to profit because they can use the codes to efficiently organize the purchasing of stock and selling of items. The RFID can be considered a network that allows the hardware which is the actual code to work. Without the network tracking and creating the code, the device is unable to function. Although the customer is able to open the wrapper such as in the case of buying a DVD and throw it away, the thought still remains of what will happen in the future with these tags? There is constant dispute and consideration on how the alternate user who is the customer that purchases these items, may become a victim of privacy invasion.
Mariam B

Intel and J.P. Morgan Chase to Expand Indian Operations - 1 views

  •  
    Intel is a company that develops processing technologies such as chips that are put into computer hardware. However recently they have decided to outsource certain necessary business operation to India instead of in the US. Additionally Intel has agreed with an investment banker named Morgan Chase, to invest about 1 billion of the company's money into this plan. Intel already has many of it's workers in India however wants to expand the business by increasing its workers within the company. Workers will be needed to help expand the company a long with workers both qualified and graduates due to the increased opportunities and positions. The reasoning as to why Intel continues to offshore work to India is because they are able to find high quality workers and can get work done at cheaper/lower costs. The organization affected mainly is Intel who is able to make a profit through investing in the workforce in India. Additionally the people who are in India that are given the jobs are able to benefit because more jobs are becoming available. The negative side to this is that, they are not paid as much as Intel workers in the US. Additionally another stakeholder is the U.S government itself that frowns upon the idea of offshoring jobs due to the knowledge that by doing this, job oppertunities available to Americans will decrease. The social and ethical issues and impacts of these are related to globalization and its impacts on both the country (India) and the United States. Although workers are given jobs the pay that they receive is not as much as a worker in the U.S would. This is done for the economic benefit of the country Intel itself, allowing them to create a greater profit by off shoring jobs to India. However those who are highly qualified and trained are able to find a job at Intel that matches their level of training. Thus they become employed if they need money. A positive impact to globalization is getting rid of the digital divide in a sense because fr
Yuval S

Outsourcing to India Draws Western Lawyers - 2 views

  •  
    There is a huge increase in India's Legal outsourcing business. Many of these companies use hundreds Indian lawyers who do the hard work that young lawyers in the United States usually have, at a fraction of the cost. Some Lawyers in the Unites States go because "they say they stay for the opportunities to build a business and manage people." Some issues of this is that the Westerners must adapt to India's environment. Managers estimate that "About 5 percent of Western transplants cannot handle it and move back home."
Madeline Brownstone

BBC NEWS | Business | Personal data exposed on website - 2 views

  • Last month, it was revealed that a laptop computer with details of 109,000 members of six pension schemes had been stolen from offices in Marlow in Buckinghamshire. The data, which was not encrypted, included names, addresses, dates of birth, employers' details, national insurance numbers, salary details and, in the case of those receiving their pensions, their bank details too. Last October, a laptop containing personal details of more than 100,000 members of the Network Rail and British Transport Police pension schemes was stolen from the accountancy firm Deloitte. And in November 2007, HM Revenue and Customs lost two computer discs that held the entire child benefit database, including the personal details of 25 million people, covering 7.25 million families. If a business regularly fails to safeguard sensitive information, it can be served with an enforcement notice by the Information Commissioner. Any breach of such a notice is a criminal offence.
Kristin O

BBC NEWS | Business | HSBC bank 'to offshore more jobs' - 0 views

  •  
    This article is about HSBC's pplans to keep outsorucing clerical jobs in diferent countries. This has many owrkers upset because they feel this is eliminating their jobs and putting caps on their wages. THe social and ethical issues involved are Equality of Access and Policies and Standards. There are impacts on the Bank as well. There is the economic impact, they are saving alot of money for setting up call centers they save about $20,000 - $30,000 per job it moved into the call center. There is a psycological impact the bank has to deal with and that is of their unhappy workeres in their base country. Finally there is a global impact, with more call centers the bank may be able to gain new customers in those countries. THe relevant stakeholders besides the banks are, the workers of HSBC bank, customers of the bank, politicians and media, other countries where centers are set up. This includes, India, China, Malaysia, Phillipines, Sri Lanka and Vietnam. The primary IT System are the call centers. This involves the use of WANs and LANs. There are also vairous ways in which call centers can be set up. They can use cloud computing or even be created virtually through the development of software as a service. The employee would only have to susbscirbe to a software that would allow them to work in the center, this makes it easier to receive updates as well.
Carmen M

Home Office Data Security: Protect Customer Info - And Your Small Business - 0 views

  •  
    This article talks about Data security regarding information kept in a computer. The stakeholders in this case are the employee and the customer. The IT system is, like previously mentioned, a computer. The issue regarding the system is reliability. If you have a customers information such as credit card numbers and other personal data, then security and reliability definitely come up as an issue. Computers are prone to get viruses which could wipe out all the information stored on your hardrive. Hackers and other spyware can also be another concern. Your customer is trusting you with their information. The article also proposes a solution. The solution would be to have two separate computers, one for personal uses and the other for work. That way, eliminating visiting websites that might have viruses.
Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Madeline Brownstone

NOVA Online | Cracking the Code of Life | Watch the Program - 7 views

  •  
    Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
  • ...10 more comments...
  •  
    Criterion A- The IT system (research DNA database) that allows medical researchers to record and track medical histories throughout generations, arise a variety of issues. One of these issues is privacy, where the database holds genetic information that many ethical doctors call a "future diary". These medical databases can be analyzed by a variety of people and those who have access to this information are handling private information. The major stakeholders were those patients who gave up their DNA because their genetic information put into the hands of these medical doctors creates the privacy issue. This information needed to be well stored and doctors take implications such as encoding social security numbers and no names are used. Criterion B- These research DNA databases begin with the obtainment of genetic information. In a relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. Criterion C- From the point of view of the major stake holders (patients who given up their genetic information) the IT system (research DNA databases) (Not done)
  •  
    Criterion A) The IT system is a database. This database is a link of DNA records, health records, and family trees. Major stakeholders of this issue are citizens of Iceland who agree to let their information be put on these databases and analyzed. Criterion B) The database works in parts. First, there is already a database of family trees in place. This family tree generator works by inputting an individual's social security number. After this is in place, the name of many generations of ancestors of this individual is shown in a tree. Then, the creator of the database asks for the permission, of family members, to add the DNA code and the health record of each person. This allows for a social security number and a disease to be input at the same time. With this, the scientist can see those who have it, and those who don't. Then, with the use of the DNA codes, they can "hunt down" genes that cause certain diseases. The database is related to an issue of privacy. This is because those who allow their health records and DNA code, are letting the medical team and users of the database know all things about them. With just a social security number, a user that has access to the database may learn more things about you than you may want: such as your family, what diseases you may have, and many other things. Another issue is in reliability. There is the possibility that the medical teams that try to track genetic code differences between those with a disease and those without it, may come to realize that a difference they find is only a coincidence and not helpful. (not completed)
  •  
    The IT system being used is the DNA database that are being kept on the Icelandic people. The DNA database holds a lot of information of the people in the database and even things that they do not know such as their DNA and what it means. The major stakeholder is the people that are sending their DNA information, blood samples, medical histories and family trees. The issue of privacy is then involved because of the personal information that others can go through by accessing the database. The database is run by first getting the blood sample of the patient who willingly gives permission to give their DNA information to the company, deCODE. The information is then entered into the database which organizes the information by each person's social security number. The relational database is used to organize the information. (Cont.) The impacts of the database is both negative and positive. The database can be
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. * The IT system described in this video is a medical database. The major stakeholder are the doctors who manage the data of patients in the relational databases. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). * A relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. * One of the positive impacts of these medical databases are that the family tree is in a database and all health records can be found for each patient and because this is a relational database, all of the patient's information is linked to their families and other people who have similar diseases. This is beneficial because experts can see trends in the people who have a certain disease and once they figure out the "spelling" of the genetic code with the disease, they can work on coming up for cures for that particular disease. A negative impact of the medical databases can be privacy. The doctors have access to every patients information and they can know everything about a certain person or family if he/she wanted to. This would then raise an issue of integrity.
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system is the database and the issue is who has access of the Database which has medical records of individuals. The major stakeholders are the Doctors and Patients. Doctors are trying to find information on specific DNA that create sickness and diseases. Finding the relationship between the family members and there DNA, can possibly improve medicine and also allow doctors figure out what an individual can have(sickness) in future references, making inferences of what might happen. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). A data base function is that it is a computer stored software that contains tables of various information and organizes all the data into categories. One subject/category can be related to another with little difference. This is why the database makes it easier for information to be viewed and interpreted much faster. By entering data on the tables one can interlink topics in order to find specific information needed. The person who enters the data can use software like Openoffice to create a database to view DNA and the relationship with the other individuals. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. The primary issue of the negative impact on Databases, have on the skateholders for DNA purposes is Privacy. Privacy has a big part in the stakeholders because many of the patient give away there Social Security number which is something private to them. With the Social Security Number the doctors can have access to other information not related in there investigation of finding a cure. This can cause reliability with the doctors to decrease. The database would have information of all sort on there medical records which should not be something that would be public for eve
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues: The IT system in these videos were medical databases containing records of many patients. Specialists use these databases to help them identify where a certain disease came from and whether or not it could be treated. they do this by viewing the patients ancestors records and seeing who had the disease in that family tree. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). Specialists (with the permission of the patient) insert a patients social security number into the medical database and let the database generate the patients entire family tree. Using this family tree, doctors were able to "hunt" down the origin of diseases, by looking at the genes of the ancestors. That way, by matching the DNA of the patient affected by a certain disease with the DNA of one of his/her ancestors DNA that suffered the same disease, and looking for similarities or patterns. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. There were several positive and negative impacts regarding this "hunting down" of diseases. By looking at family trees specialists and doctors would be able to determine what caused the disease and possibly come up with a cure or treatment for it. However, many patients are concerned with doctors going through their records and DNA due to there being a lack of privacy. If patients grant permission, specialists would be able to find out and know absolutely everything about their health history. Specialists argue that it would be of great benefit to detect diseases early so they could be treated by doing this. Chips are being created were thousands of babies genes could be looked at to look for any abnormalities. Some people argue that even if a disease were detected, there's two possibilities, one
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system involved is the DNA database system, identified as an organized collection of age old family trees, accompanied by state of the art DNA analysis and computer technology. Systematically, genetic information (DNA) is stored in related tables, distinguished by individuals' own security number codes. One centralized ethical and social consideration is privacy, mainly a major concern of the involved DNA suppliers (the public), that place their given personal information (genetic data, reference to family origins, medical history etc) in a national database system, from which the accessing of medical records and history of one's entire family can become manipulated or misused. In addition to the elevated risk of data misuse, once the involved participants (Icelandic citizens) give access to their personal information, there are no limitations placed on the utilization of the data within the national database, as it becomes accessible for the government, medical researchers and operating staff. Thus, the implications are straining to the individual donor, unable to determine when, how and to what extent the information given is shared amongst other groups. Furthermore, the privacy of the participants undesirably opens access to the medical information of related family members, as cross-referencing and data matching give the research staff operating the DNA database, access to retrieve a plethora of other members' data mainly for the purpose of effective data mining (the retrieval of hidden predictive patterns, as a diagnostic tool to decode the occurrence of genetic disorders/diseases). CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). With the possession of participant's medical data, including blood type, isolated samples of DNA, medical health records e
  •  
    The primary IT system in use is a DNA database, which includes information about patients, illnesses, and virtually one's make up as a human. DNA databases allow researchers to find patterns in a human genome, by looking at the DNA from various family members and determining the difference or similarities between the DNA of family members. This is done through database functions such as data mining, and data matching. Locations such as Iceland, have a database that traces back all of the people within the country to their Viking ancestors. These family trees have been paired with DNA analysis in order to trace diseases back to their start. Some more tests could be conducted in order to determine which of the living relatives of one family with arthritis, for example, have the disease. Then, the DNA can be compared in order to identify the exact gene that is at fault for the disease. This process is very easy to do because the database with all of the ancestral information is accessible with the presence of one of the family member's SSN. A simple data query can then bring together all of the person's information. Moreover, DNA, health records, and the family trees of Iceland were proposed to be linked. This could be very beneficial because new drugs could be made available to suit the specific disease of a patient. It could also be a way for diagnosed patients to take early preventative measures. This could increase the probability for a cure, and in general this would increase the life expectancy of certain areas. However, some doctors in Iceland opposed to this linkage, because the information is representative of each person's medical history, and potentially their future medical history. This information, according to the plans of the linkage of medical records and the family tree, would be available on a central database that would bring together private information about a person and connect it to all of their family members, past, present, and future. T
  •  
    There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
  •  
    Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
Mark Gakin

Portofinos - 1 views

  •  
    This website would be very similar to one Carmen would have because it is also a small business that is trying to grow. Carmen is trying to create a website that will attract many customers, but it is important for her to get organized. This seems to be a well organized website that appears to be attractive to customers. I have some first hand knowledge on this because i have been to Portofinos many times and it is usually packed. Clearly their advertisement has an impact on their business, and this is something Carmen needs to improve on. This site is very neat and includes a variety of information such as their menu, events, history and more. It pretty clear that e-commerce has had a big impact on business and will hold a greater importance in the near future. I learned that since Carmen wishes to optimize commerce by minimizing loss and maximizing profit, she should follow a good example, such as this one. If all goes well, she may be looking at a brighter future.
T Graham

PIA Information Services - Philippine Information Agency - 0 views

  • SM, NOKIA partner for cellphone waste collection
    • T Graham
       
      This is an interesting topic because the actual cell phone providers are helping to recycle their own products. Usually it's a private group or organization.
  • promote promise of electronic recycling.
    • T Graham
       
      Promotion is the key because it educates large numbers of people, making it easier to enforce the movement. Promotion from large companies makes it eaiser to reach the stakeholders.
  • She said this activity is in support to the earlier tie up of SM Supermalls where collaboration was made with concerned institutions and entities last September 2007
    • T Graham
       
      With the large coporations and the concerned private groups joining together they will make a bigger difference. The coporations can easily pitch recycling ideas to their costumers and the organizations will provide information and ideas.
  • ...2 more annotations...
  • "This we can say that SM is no longer just a business enterprise but is a partner in helping the environment," she added.
    • T Graham
       
      This is where business and environment fuse together, to create an extremely helpful supercause. The business is not just making money its making money and saving the environment.
  • As we use, lose, abuse, and eventually upgrade our electronic tools we are leaving behind a massive transistor-filled leftover known as e-Waste. Thousands of mobile phones and all its accessories goes along with other e-Waste
    • T Graham
       
      E-waste can affect our water, air and soil. The waste that comes from cell phones can also takes hndreds of years to completely disentegrate.
Madeline Brownstone

UPN Repository - 0 views

  • Buying organizations, such as the US Department of Defense (DOD), require all manufacturers doing business with them to identify and bar code their products with the UPN. The objective is to make the UPN the single ordering number for medical/surgical products.
  •  
    US Govt requires UPN to do business with them
Madeline Brownstone

BBC NEWS | Technology | Slump prompts workplace snooping - 3 views

  • He warned that continued unauthorised access to confidential data could mean all kinds of problems for companies. Data leaks might damage customer relationships, leave a firm in breach of regulations or hand vital data to competitors. "Businesses must wake up and realize that trust is not a security policy," he said.
    • Madeline Brownstone
       
      Although this is a juicy article. It is not bringing up an issue in the context of a a busness or group of businesses that have suffered any real impact. It is written in a very general way.
  •  
    "The global economic slump is prompting IT staff to snoop on colleagues, suggests research. A survey of IT workers by Cyber-Ark found that 35% of those questioned had viewed confidential information, such as salaries and redundancy lists. "
  •  
    Could this be a good lead article?
Madeline Brownstone

Unboxed - I.B.M Tries to Help Cities Work Smarter - NYTimes.com - 0 views

  •  
    "Local governments, like many businesses, are struggling with a data glut. Agencies collect huge amounts of information about topics as diverse as building permits, potholes, Medicaid cases and foster-child placements. Technology, according to computer experts and government officials, can be a powerful tool to mine vast troves of government data for insights to streamline services and guide policy."
helen g

Armies of Expensive Lawyers, Replaced by Cheaper Software - NYTimes.com - 2 views

  •  
    "Science * World * U.S. * N.Y. / Region * Business * Technology * Science o Environment o Space & Cosmos * Health * Sports * Opinion * Arts * Style * Travel * Jobs * Real Estate * Autos "
  •  
    This article discusses advances in artificial intelligence which have allowed for legal documents to be read and processed by computers, rather than teams of lawyers. The major stakeholders in this scenario are the lawyer, who'se jobs are being taken by computer e-discovery software,such as Blackstone Discovery, due to the effiiency offered by computers as well as the fact that the services are much cheaper. The obvious concern in this situation is if computers are taking the jobs of actual people. Many argue that this is not the case, since jobs are always available. However, higher paying and more demanding jobs seem to be decreasing due to artificial intelligence. This puts an obvious restriction on people. It seems as though as time progresses, these jobs will start decreasing more and more on the job market.
T Graham

Our New Robot Overlords Technological progress doesn't have to be a job killer - 2 views

  •  
    The stakeholders mentioned in this article include businesses and their employees. The social and ethical issue is people and machines. The area of impact is business and employment. In this article the IT system is never specifically referred to but the author make several references to "technological advances" that involve artificial intelligence enabled software. The issue raised in this article is the issue of technological advancements relating to artificial intelligence becoming a threat to people's jobs. In the article the examples of manufacturing and low skill labor but more significantly A.I.'s threat to white collar jobs. With the invention of software that can sift through documents at speeds that humans could never challenge, lawyers and their document analysis skills are less in demand. Radiologists are quickly losing their jobs to machines that can analyze medical scans faster. This new danger to not only blue collar jobs but also white collar jobs is alarming to the public. The article provides a one sided point of view that rejects the issue of machines taking jobs from people. The author argues that machines do us the favor of taking over boring jobs that no one wants. What the author fails to recognize is the fact that a lot of these jobs (especially the low skill ones) are want working class citizens depend on to pay their bills and feed their families. If machines are taking jobs that require none or very little education they are threatening the livelihoods of a large part of the population of this country. This issue could pose a big threat to the survival of the lower and middle classes.
‹ Previous 21 - 40 of 129 Next › Last »
Showing 20 items per page