Skip to main content

Home/ ITGS News/ Group items tagged companies

Rss Feed Group items tagged

Madeline Brownstone

NOVA Online | Cracking the Code of Life | Watch the Program - 7 views

  •  
    Please use this bookmark to post your reflections. Using a Paper 2 style approach, CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. CRITERION D) Evaluate the efficacy of a solution to the problem.
  • ...10 more comments...
  •  
    Criterion A- The IT system (research DNA database) that allows medical researchers to record and track medical histories throughout generations, arise a variety of issues. One of these issues is privacy, where the database holds genetic information that many ethical doctors call a "future diary". These medical databases can be analyzed by a variety of people and those who have access to this information are handling private information. The major stakeholders were those patients who gave up their DNA because their genetic information put into the hands of these medical doctors creates the privacy issue. This information needed to be well stored and doctors take implications such as encoding social security numbers and no names are used. Criterion B- These research DNA databases begin with the obtainment of genetic information. In a relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. Criterion C- From the point of view of the major stake holders (patients who given up their genetic information) the IT system (research DNA databases) (Not done)
  •  
    Criterion A) The IT system is a database. This database is a link of DNA records, health records, and family trees. Major stakeholders of this issue are citizens of Iceland who agree to let their information be put on these databases and analyzed. Criterion B) The database works in parts. First, there is already a database of family trees in place. This family tree generator works by inputting an individual's social security number. After this is in place, the name of many generations of ancestors of this individual is shown in a tree. Then, the creator of the database asks for the permission, of family members, to add the DNA code and the health record of each person. This allows for a social security number and a disease to be input at the same time. With this, the scientist can see those who have it, and those who don't. Then, with the use of the DNA codes, they can "hunt down" genes that cause certain diseases. The database is related to an issue of privacy. This is because those who allow their health records and DNA code, are letting the medical team and users of the database know all things about them. With just a social security number, a user that has access to the database may learn more things about you than you may want: such as your family, what diseases you may have, and many other things. Another issue is in reliability. There is the possibility that the medical teams that try to track genetic code differences between those with a disease and those without it, may come to realize that a difference they find is only a coincidence and not helpful. (not completed)
  •  
    The IT system being used is the DNA database that are being kept on the Icelandic people. The DNA database holds a lot of information of the people in the database and even things that they do not know such as their DNA and what it means. The major stakeholder is the people that are sending their DNA information, blood samples, medical histories and family trees. The issue of privacy is then involved because of the personal information that others can go through by accessing the database. The database is run by first getting the blood sample of the patient who willingly gives permission to give their DNA information to the company, deCODE. The information is then entered into the database which organizes the information by each person's social security number. The relational database is used to organize the information. (Cont.) The impacts of the database is both negative and positive. The database can be
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. * The IT system described in this video is a medical database. The major stakeholder are the doctors who manage the data of patients in the relational databases. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). * A relational database, there are several tables containing various information. Each table contains data that all have attributes related to the subject of the table. All of the tables might be interconnected, as well. For example, a retail business using a relational database would likely have one table containing data regarding employees, another with data regarding customers, another table listing inventory and so on. A database user could run a report to find connections between data in different tables, such as the customer table and the inventory table. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. * One of the positive impacts of these medical databases are that the family tree is in a database and all health records can be found for each patient and because this is a relational database, all of the patient's information is linked to their families and other people who have similar diseases. This is beneficial because experts can see trends in the people who have a certain disease and once they figure out the "spelling" of the genetic code with the disease, they can work on coming up for cures for that particular disease. A negative impact of the medical databases can be privacy. The doctors have access to every patients information and they can know everything about a certain person or family if he/she wanted to. This would then raise an issue of integrity.
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system is the database and the issue is who has access of the Database which has medical records of individuals. The major stakeholders are the Doctors and Patients. Doctors are trying to find information on specific DNA that create sickness and diseases. Finding the relationship between the family members and there DNA, can possibly improve medicine and also allow doctors figure out what an individual can have(sickness) in future references, making inferences of what might happen. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). A data base function is that it is a computer stored software that contains tables of various information and organizes all the data into categories. One subject/category can be related to another with little difference. This is why the database makes it easier for information to be viewed and interpreted much faster. By entering data on the tables one can interlink topics in order to find specific information needed. The person who enters the data can use software like Openoffice to create a database to view DNA and the relationship with the other individuals. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. The primary issue of the negative impact on Databases, have on the skateholders for DNA purposes is Privacy. Privacy has a big part in the stakeholders because many of the patient give away there Social Security number which is something private to them. With the Social Security Number the doctors can have access to other information not related in there investigation of finding a cure. This can cause reliability with the doctors to decrease. The database would have information of all sort on there medical records which should not be something that would be public for eve
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues: The IT system in these videos were medical databases containing records of many patients. Specialists use these databases to help them identify where a certain disease came from and whether or not it could be treated. they do this by viewing the patients ancestors records and seeing who had the disease in that family tree. CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). Specialists (with the permission of the patient) insert a patients social security number into the medical database and let the database generate the patients entire family tree. Using this family tree, doctors were able to "hunt" down the origin of diseases, by looking at the genes of the ancestors. That way, by matching the DNA of the patient affected by a certain disease with the DNA of one of his/her ancestors DNA that suffered the same disease, and looking for similarities or patterns. CRITERION C) Evaluate the impacts on society -- both positive and negative or from differing stakeholder's P.O.V. There were several positive and negative impacts regarding this "hunting down" of diseases. By looking at family trees specialists and doctors would be able to determine what caused the disease and possibly come up with a cure or treatment for it. However, many patients are concerned with doctors going through their records and DNA due to there being a lack of privacy. If patients grant permission, specialists would be able to find out and know absolutely everything about their health history. Specialists argue that it would be of great benefit to detect diseases early so they could be treated by doing this. Chips are being created were thousands of babies genes could be looked at to look for any abnormalities. Some people argue that even if a disease were detected, there's two possibilities, one
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    Criterion A) The IT system at work here is the database run by the company deCODE. This company created a medical database in order to determine human diseases present amongst family. This leaves the stakeholders to be the Iceland citizens who use this system. The relationship between the Iceland citizens who use this system and the issue is that there is a security issue. The company, deCODE, paid a sum of one million dollars to the government for access to the medical history's and information of the Iceland citizens. This could be stolen by others or it could be hacked by an outsider. Criterion B) This system works through a series of steps to figure out what medical diseases are passed on throughout the family tree. In this case it would be a relational database. This database works by first obtaining permission from the Icelandic citizen to use their social security number and their medical history. This is put into the system and the medical records are accessed. Then the family records and past can be seen. This is multiple tables containing different pieces of information. Each table has something that is related to the previous table. Then make sure that the database is easily navigational. When the social security number is entered into the database the company must have it in the record. If the social security number is not properly encoded then the social security card could be stolen by and employee of an outside hacker. This is related to security if the hardware or software is not properly secured it can be obtained by a criminal. This can lead to identity theft and loss of financial security. Another issue would be privacy. The medical records and DNA code is allowed full use to the company. The social security number could be used in ways that the civilian did not agree to and is not known by the civilian. Criterion C) This system can cause many positive and negative impacts. One positive impact would be that this would help the patient know who e
  •  
    CRITERION A) identify the IT system and describe the issues. Identify the relationship of the major stakeholders to the issues. The IT system involved is the DNA database system, identified as an organized collection of age old family trees, accompanied by state of the art DNA analysis and computer technology. Systematically, genetic information (DNA) is stored in related tables, distinguished by individuals' own security number codes. One centralized ethical and social consideration is privacy, mainly a major concern of the involved DNA suppliers (the public), that place their given personal information (genetic data, reference to family origins, medical history etc) in a national database system, from which the accessing of medical records and history of one's entire family can become manipulated or misused. In addition to the elevated risk of data misuse, once the involved participants (Icelandic citizens) give access to their personal information, there are no limitations placed on the utilization of the data within the national database, as it becomes accessible for the government, medical researchers and operating staff. Thus, the implications are straining to the individual donor, unable to determine when, how and to what extent the information given is shared amongst other groups. Furthermore, the privacy of the participants undesirably opens access to the medical information of related family members, as cross-referencing and data matching give the research staff operating the DNA database, access to retrieve a plethora of other members' data mainly for the purpose of effective data mining (the retrieval of hidden predictive patterns, as a diagnostic tool to decode the occurrence of genetic disorders/diseases). CRITERION B) Describe step-by-step how the system works and describe how the system is related to the issue(s). With the possession of participant's medical data, including blood type, isolated samples of DNA, medical health records e
  •  
    The primary IT system in use is a DNA database, which includes information about patients, illnesses, and virtually one's make up as a human. DNA databases allow researchers to find patterns in a human genome, by looking at the DNA from various family members and determining the difference or similarities between the DNA of family members. This is done through database functions such as data mining, and data matching. Locations such as Iceland, have a database that traces back all of the people within the country to their Viking ancestors. These family trees have been paired with DNA analysis in order to trace diseases back to their start. Some more tests could be conducted in order to determine which of the living relatives of one family with arthritis, for example, have the disease. Then, the DNA can be compared in order to identify the exact gene that is at fault for the disease. This process is very easy to do because the database with all of the ancestral information is accessible with the presence of one of the family member's SSN. A simple data query can then bring together all of the person's information. Moreover, DNA, health records, and the family trees of Iceland were proposed to be linked. This could be very beneficial because new drugs could be made available to suit the specific disease of a patient. It could also be a way for diagnosed patients to take early preventative measures. This could increase the probability for a cure, and in general this would increase the life expectancy of certain areas. However, some doctors in Iceland opposed to this linkage, because the information is representative of each person's medical history, and potentially their future medical history. This information, according to the plans of the linkage of medical records and the family tree, would be available on a central database that would bring together private information about a person and connect it to all of their family members, past, present, and future. T
  •  
    There is another issue along with this involving the ability of researchers to have full access to the information about anyone. Many people want to maintain their right to privacy, but others argue that this could lead to new knowledge about diseases, and the development of new medicines. For those who are afraid of risking their privacy, there are standards developed in order to protect them. Their information, such as SSNs are encoded for security reasons and the DNA part of the project is voluntary, and not imposed. However, ethicists are still afraid of this database. They claim that the future of DNA is a valuable thing because it can predict the probability of diseases, life expectancies, etc. But all copies can be made available to the FBI, schools, etc. at the time of birth. For the Biotech Industry, this is seen as a huge advantage because people an be tested for hundreds of diseases. The awareness of the disease is a great thing, because it could lead to early prevention. However, the system is faulty because it sometimes doesn't provide certainty of a disease and it limits a person's privacy. Other times, there is no cure for the disease, so the patient cannot do anything even if they know. In relation to this, there also will arise severe psychological impacts of a person knowing that they have the possibility for getting a life threatening disease. If this is a disease that will affect them later on in life, it would be detrimental for a person to live their life without the hope of a prosperous future. A solution to this problem could be giving patients the choice of knowing or not.
  •  
    Criterion A - The IT system is the DNA database containing information about the genetic past, present, and future of the patients. The primary issues associated with this database are of privacy and anonymity. These issues arise when patients, who are one of the major stakeholders, feel that that the information in these databases shouldn't be accessible to others, or anyone for that matter. While some believe this is private information, others believe that the information should not be known by anyone because of the ethical issues associated with knowing what will come in the future. Criterion B - The medical database is a relational database meaning that it establishes relationships between different tables in the database. The smallest building blocks of a relational database are items. Items are individual pieces of information in tables. These items are organized into fields and records. Fields are columns in a table that that represent different categories of information. Records are rows that represent all the information for a specific patient. At the cross-section of a particular record and field lies the item associated with a specific piece of information related to the specified patient. These tables are related to each other through links which are established by unique primary keys assigned to each patient. This system is related to the issue of privacy because the information contained within it is considered by many to be privileged and access to it should be very limited or altogether eliminated. Criterion C - The impacts of such a database on society are varied. Some people are very against the entire idea of a genetic database because of its ethical concerns. When people have their blood analyzed for DNA, they are giving up their genetic make-up. The information that can be obtained from such tests is considered by many to be privileged, and by others to be completely unethical in every way. Often people are against very private medical
Madeline Brownstone

Tieto Gets Outsourcing Contract From Nokia Siemens - WSJ.com - 3 views

  •  
    This article is primarily concerned with the announcement of two companies, Tieto and Siemens, joining in an outsourcing contract. According to the article this is done in order to increase the business benefits. In the perspective of business, the move is more profitable, and allows both companies to expand globally in term of the audience. The two companies are well known, especially for certain groups of people, so by joining some aspects of their business, they will be able to join their individual audiences. By the companies working together and using employers from both businesses then they will be able to generate a larger acceptance and recognition. Globalization makes this possible, and optimizes the profit and efficiency of both companies. However, it can lead to problems involving the jobs of the people who work at either of the two companies. Tieto, specifically, is using forty of the workers from Nokia Siemens. This means that jobs will be lost from the people who work at the original company. Instead of giving the jobs to people at the headquarters, the jobs will go to the people off site. This will benefit the companies, as it is the most beneficial business scenario, but will take a toll on the lives of the unemployed. However, the amount of jobs that are being added in one company and taken away in the other company is very small in comparison to a much larger company that needs to expand greatly. The use of VOIP and the internet itself allows the smooth interaction between the two companies and with the growth of IT, more and more methods will be introduced for the companies to interact without leaving their respective office. Because Nokia and Tieto have been partners for several years, they have been utlizing these methods of communication that are different from having everything on site and going to meetings in person. Yet, they have decided that the partnership, using outsourcing, is the best possible way for both companies to grow. Thus, outs
Karen M

BBC NEWS | Business | India faces battle for outsourcing - 0 views

  •  
    This article is about the issues that India is now facing because they are the world leader in IT outsourcing. The IT system in this article is the call centers that are located in India. The area of impact is Business and Employment. Outsourcing provides jobs for the citizens of India. Their employment is at risk because of the fact that India now has to compete against other countries for the same outsourcing jobs. The stakeholders are the Indian workers, global customers, competitors, and the companies who are outsourcing. The Indian workers now need to work even harder to keep their jobs because there are other countries who are trying to step up their people so that they could be capable of doing the same work. For example, Africa is starting to become well-known in the world of outsourcing because they have the same amount of talent and can also speak English. India is no longer the first country that comes to mind when companies are thinking about outsourcing. Other countries are willing to do the same job for less money, leading for companies to choose them over India. There have also been cases where the customers are not satisfied by the calls that they make offshore. This would play into the decision of the company of whether they want to move their outsourcing site or not. One issue mentioned in the article is security. There have been instances in which a customer's financial information has been sold by unscrupulous employees. By outsourcing, the head company is putting a lot of trust in the company they hire to do the job. They are risking their customers' satisfaction by allowing foreign countries manage their operations. Although a call center may not seem really important in the company, the workers are still dealing with customers of the company and should make sure to keep them satisfied. If the customers are not satisfied, they would probably take their money and invest in another company who would give them a more secure experience.
Noreen C

TAGSYS Develops Airline Industry's First Reusable RFID Baggage Tag for Qantas | Busines... - 1 views

  •  
    In airports nationally and internationally, flyers have to stand in line to wait to check in. The process is anything but welcoming for those who are running late, dislike crowds, and are just simply impatient. The process is just has grueling for the workers who have to deal witht the annoyed customers day after day. Luckily, the ticket kiosks have made the check in time shorter, being great for those who have no luggage to check in, but still just a part of the process for those who do. With RFID tags, the check in process isn't as dreadful. Companies are now begining to use reusable RFID tags that can track up to four flights at a time for each luggage, and can be programmed to track upcoming flights. This technology reduces the check in time, and increases effciency as the luggage is already associated with the flyer, and it's location is known at all times. Lost luggage can be found easier, and the manual labor needed for check in is cut down. There is also less paper being used, since the RFID tags only involve electronic mediums. For both the flyer and the company, the RFID tags can be a bright future. However, with more and more ways to eliminate time and human error, it is possible that the jobs of the people at the check in will be reduced. This seems to be a problem with many technologies, but this is the way in which our future is going. But, even though technology seems to be super efficient and a lot better than humans, it has it's flaws. RFID tags are read by radio rignals. If the tags are broken, or placed in an area where the radio signals cannot reach, then the tags are useless. There also needs to be new technology that allows airline companies to begin to use the tags, which may be costly. Another major issue is that in order to increase efficiency, all of the customers must be on board. There is no guarantee that this will happen any time soon, or that all of the airline companies will wish to use the technolgy.
Mark Gakin

Outsourcing: Its Effects on the U.s Economy and Leadership - 0 views

  •  
    This article is about how companies use outsourcing and offshoring as a way to reduce costs and as a method for cheap labor. One of the articles' main points about outsourcing is that the decision to outsource is often in the interest of the company to reduce costs, divert or energy-saving measures aimed at making the skills of a particular company or for the more efficient use of labor, capital, technologies and resources. One problem that arises from outsourcing is that it takes much-needed jobs from the U.S. economy. It is not too different from offshoring, because both are beneficial for companies and used to cut costs. When a company chooses to offshore, it means that it does its business in another country. This 'other' country is usually a developing country because rates tend to be much cheaper there, which is exactly how businesses save money. One of the main issues, again, lies within the U.S. economy. Since US businesses are leaving to do business in other countries, the US economy is suffering quite a blow because less companies are becoming dependent on it. This is a big problem and could lead to an even bigger one for the business because third world countries cannot always be trusted. Even though they are saving so much more money by offshoring, the business they now perform is unreliable and could possibly be affected my many more problems. The main stakeholders in this issue are the businesses who are offshoring and outsourcing, the US government, and the countries the businesses now rely on. Also, depending on the company, people in America tend to suffer as well because since the main issue that arises is reliability, the users or owners of the product may not have the same service. For example, if Time Warner decides to station in India, the workers there may be inexperienced and the company will not be able to do anything about it. This means that when the users of Time Warner call their main number, someone in India will pick up. The probl
helen g

The Hindu Business Line : ArcelorMittal may tap Indian IT cos for infrastructure play i... - 0 views

  •  
    The issue of globalization and cultural diversity is raised in this article which deals with the realm of business. Steel Maker ArcelorMittal is planning to outsource certain IT infrastructure to India and smaller European countries such as Poland in order to be able to save money and reduce costs. The stakeholders in this situation are the CEO's of ArcelorMittal, the local IT companies in India and the small European countries being outsourced to, as well as the governments of India and the small European countries, the current IT workers of ArcelorMittal, the IT workers in India and the small European Countries, and the people who buy steel from ArcelorMittal. The IT systems involved in this scenario are PCs, servers, data centers, and networks. IT workers in India and small European countries such as Poland will be working with ensuring privacy on these systems as well as taking care of their maintenance. A positive issue that results from the outsourcing of ArcelorMittal is that the company will be able to save money by paying its workers less. This would lead to a decrease in steel prices as well, which would be beneficial for the consumer. Also, outsourcing gives good job opportunities to people in the countries being outsourced to. However, through outsourcing many current IT workers of the company will most likely loose their jobs. Indian workers are also being exploited due to the fact that they are being payed less than a worker in a more developed nation would be payed. Lastly, local IT companies need to compete for workers.
Kevin S

Google wins YouTube case in Spain - 1 views

  •  
    Google is being blamed by a Broadcasting company for people posting things that were copyrighted to its Youtube affiliate.
  • ...3 more comments...
  •  
    This article is about Google being blamed by a broadcasting company in Spain for people posting copyrighted things, such as videos, on youtube. There are many people who post things they shouldn't on Youtube but Google shouldn't be condemned for a bunch of individuals that don't have anything better to do. Google won the lawsuit against Telecinco, and Telecinco even had to pay the case charges to Google. When Google is a big search engine on the internet, and you have stupid people posting things on it, but that isn't google's fault when people decide to post things that are copyrighted.
  •  
    Google wins a big court case in Spain against a Spanish television company. Allegedly You tube was airing shows before they aired on the actual television company costing them big bucks.
  •  
    Google wins a case in Spain for You Tube. A Spanish television company was accusing You Tube of breaking their company because You Tube was releasing their shows before they aired on the Spanish television company
  •  
    hey mike, how do you think that youtube is affiliated in any way with Google and why is google getting blamed for what happened on youtube?
  •  
    Google owns YouTube
Daniell S

Data Security Is No Longer an Option - 0 views

  •  
    This article starts off with the actions of a small travel site. This article speaks of the price they had to pay to upgrade the security. This company has to make big changes to their security in order to do business with larger companies. In this situation there are both positive and negative impacts. One big negative impact is the price to pay for this upgrade in security. In order to be on par with the security of higher level businesses smaller businesses have to pay large amounts of money to gain this security. This would require a lot of faith in the big businesses from the smaller business. As said in the article "The connection, and everything transmitted over it - financial, customer and product data - has to be secure and out of the reach of hackers, cyber thieves and even disgruntled employees." This shows how secure the website has to be. This is so that bigger companies can trust the smaller companies to handle business. However, through this impact can come a positive one. By having security equal to those of bigger businesses customers will have an easier time trusting the company. Another issue that comes up is reliability. A question that can be asked is whether or not the security is strong enough against hackers? This would give customers right to question whether or not this website would be trustworthy or not. In this situation the important stakeholders would be the bigger businesses and the smaller businesses. In order to do business both companies need to have the same level security. This would require one or both companies to upgrade their systems greatly to be on par with each other. Another important stakeholder would be the customer. The customer would need to know whether or not they could use the website without worrying too much about being hacked. If the customer knew the security was stable it would make them more comfortable about using it.
Daniell S

'One app for all' effort launches - 1 views

  •  
    This is an article about a European team creating an app can be downloaded on to any internet connected communications device. However, even after being presented with 10m euros, this group of 22 organizations hasn't yet received help from companies such as Apple. Apple still wishes to be different from others.
  •  
    This meets the requirements for the IT triangle because within the article it refers to some companies not accepting this application. Within strand 1 the issue of The digital divide and equality of access comes up. Within the article i learned about the organizations who are trying to make this app for all people with internet connected devices. This shows that the Apple company is at a sort of disadvantage for being behind in this new "App for all" program. By staying out of they will not be allowing the app created to the devices the company has created. This also related to Strand 2. In this app it will created to work on what ever people desire the app to work on. This is expressed in the article through "The idea would enable a given app to work, for example, on a web-ready television, in a car and on a mobile, no matter the makers of the devices." It would work on all of these things listed. This is represented through "Home and Leisure" and "Political Process". It would relate to "Home and Leisure" because the app can connect to computers and cell phones. It can also relate to the political process, with Apple not really wanting to get involved with the project. The relation between this article and Strand 3 is that this article involves Personal and Public Communications. This app can be downloaded by just about anyone with a internet connected device. The stakeholders in this situation would be the people using the apps. Another stakeholder would be the 22 organizations creating the app. The other stakeholders would the Companies who are allowing this app into their device;.
Elisavet M

TECHNOLOGY; Companies in Radio Tag Business Broaden Legal Dispute - 0 views

  •  
    Discussion about the agreement to integrate the new process of product tracking in company supply chains (RFID technology), continues to widely expand and challenge the business mentality as it has become reinforced by major companies such as Wal Mart and the Defense Department. A dispute transpired between two alliance companies, Symbol (a leader in bar code systems) and Intermec, as both were unable to consider possessing concurrence upon licensing proposals for RFID technology usefulness. Initially, Intermec Technologies, accused Symbol of infringement transgressions in regards to six Intermec patents that were being sold by Symbol; such products included the utilization of RFID technology, an investment that was supported upon by both business partnerships. Such accusations had been followed after Symbol had also charged Intermec for infringing patents including Wi-Fi technology. The issue of integrity as well as reliability resurfaces in this particular case, directly conveying the disadvantages of business collaboration, that must embed mutuality in justly managing shared information, equality of confidentiality and a clear understanding about each businesses' ideas and plans for profit purposes. It is significant to have fluidity in exchanging perspectives, in order to establish a solid foundation of trust that stands as a promise to future investments and processes.
Elisavet M

Offshore Outsourcing's Next New Wave: How High? - 1 views

  •  
    The emergence of Business process outsourcing has transfigured the ways in which companies in developed nations, expand their services globally to businesses in developing nations. Although the cost for labor to support the extension of company engagement in third world countries is acknowledged as being relatively low (a beneficial advantage to most established business corporations), it has come to the attention of the participants (Businesses of developed countries) that it is of major importance to fully recognize the boundaries of business practices, culture, and level of intellectuality and experience within the hired portion of developing nation populace. Companies of information technology services, such as Dell, have come to form heightened concern about such global barriers, having attempted to transition call center labor in India and then deciding upon the withdrawal of such communication employment (due to the lack of consideration of business and cultural differences that impact business results). Based upon the data provided by NASSCOM (Indian software and services trade association), the conclusions drawn positively indicate that Business offshore processing has an overwhelming potential to grow in the next couple of years; although there is much room needed for consistent business growth (developing businesses, such as BPO in India, must rise at least 30 percent), the progression lies mainly upon the driving increase of skillful and educated information technology workers within India. The stakeholders, Information technology businesses in developed nations, surely stand by their statement supporting the increased use of qualified employers in the business environment of developing nations' companies (considered to also be additional stakeholders), for this will lower the cost involved in the off shoring process. The main social and ethical considerations lie upon reliability of developing nations'
  •  
    My entire post was not posted on diigo, so here is the continuation: business functions, as developed countries' companies increasingly form reliance and trust upon the promise of the elevating skilled labor class, for it is a major component that supports the foundation of software and hardware services and networks on a globally connected basis. The reliability built within the business partnerships and bonds established in two differing cultural environments, is founded upon the agreement of mutual advancement and progress in regards to the establishment of skill by developing nations' employees. Although, the system of globalization and cultural diversity surface the obstacle of continuous intellectual and business development for developing nations, it is the gesture of surpassing cultural and business ideology that will truly trial both stakeholders involved.
Madeline Brownstone

BBC NEWS | Technology | Workers 'stealing company data' - 1 views

  • "The industry has concentrated on the protection of the containers where the data is stored like firewalls, access, controls and end point security systems. "The end result is that most security teams are protecting the containers not the data itself. And that is a core flaw in the security methodology of many practitioners today," claimed Mr Rowney.
    • Madeline Brownstone
       
      With so many employees who have access to the data, what's to block it's flow?
  •  
    "He added: "The intellectual property of a company can represent the crown jewels and are almost worth more than the building. This is the core asset of a company and any breach or loss can be very expensive." "
Olivia M

India Outsourcing Companies Ramp Up Hiring As US Demand Grows - 1 views

  •  
    In this article, the author talks about how companies are relying on outsourcing to hire employees. Its odd because the companies think it is better for US mainly because they are able to keep their workers and not that they are able to provide Americans with cheaper service. It also made me realize the small percentage that Americans make up of the workforce. This means that there is huge competition between American and Indian workers because they are both competing for the same jobs. But Indian workers have an advantage because they have lower wages. Companies want to choose Indians because they get to save money even though its putting Americans out of work. This is a disadvantage because then Americans won't have money to pay for the services or products.
Kim T

RFID Implants Found to Cause Cancer Tumors - 0 views

  •  
    It would seem like a great idea to be able to see patient's medical records on the spot, clearly and accurately. However, RFID's should not be the technology used to do so. Some patients have had RFIDs implanted into their skin for doctors to scan but in rats, no less humans, there have been cases where links between the use of RFIDS under the skin and cancer has been linked together. Many people would know about this, especially if they were to have the procedure done but this isnt the problem. Companies using the technology are practicing it on those who cannot protect themselves from its  harm. Patients who have Alzheimer disease are commonly practiced on. The question that poses from this is what and will the government do anything to stop these companies, why was it approved of and is it worth the medical advantages?
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
Michael M

Video Conferencing and Audio/Visual News 4/05: Surviving the Storm - 0 views

  •  
    There are many patients that lack the specific care because of natural disasters, such as tsunamis and earthquakes, even blizzards. Companies such as polycom and Tandberg both provide this service that was originally meant for bigger businesses, and now these new markets are being serviced by the companies first made for these businesses. As a matter of fact, even telepsychiatry is also offered, or mental health care is also offered. If someone is from afar and needs care right away, then they will get it that easy, instead of waiting for days, they can wait have access to doctor help right away.
Madeline Brownstone

BBC NEWS | Business | Twitter 'costs businesses £1.4bn' - 1 views

  • Staff who use Twitter and other social networking sites while at work are costing UK businesses £1.38bn every year, a report has said.
  • Although many businesses have banned the use of Facebook in the workplace
    • Madeline Brownstone
       
      I infer that Facebook bans can be enforced through proxy server settings.
  • Over three-quarters of respondents said that their employer had not issued them with specific guidelines with regards to using Twitter. "Without guidelines and usage polices businesses are leaving themselves wide open to a reduction in productivity, brand damage and security risks," Morse said.
    • Madeline Brownstone
       
      If company policies need to specify this site or that site, they will drive themselves crazy with writing and rewriting regulations. It is just not a practical solution.
  • ...1 more annotation...
  • It added that companies should think about protecting the reputation of their brand. A third of workers admitted they had seen sensitive information posted on social networks. However, 84% said they felt it should be up to them what they posted online
    • Madeline Brownstone
       
      a secondary issue is inferred here. The author implies that there are some workers who revealy company business through social networking sites and that is potentially harmful for the company's reputation. A twist here: the company wants privacy!
  •  
    Seem like this has potential as a lead article.
Madeline Brownstone

BBC - BBC World Service Programmes - Digital Planet, 04/11/2008 - 0 views

  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
  •  
    ACKLING GLOBAL CENSORSHIP Last week tech companies and human rights groups launched guidelines designed to tackle censorship. Google, Yahoo! and Microsoft have all been heavily criticised for their business strategy in countries such as China. All have signed up to the new Global Network Initiative which aims to promote privacy and freedom of speech on the internet.
Mark Gakin

RFID Business Applications - 2 views

  •  
    RFID, radio frequency identification, is changing the ways companies and organizations operate. For the first time, they can create value in their products. In simpler terms, RFID is enabling companies to do so many different things they could not do before. It's important to know that RFID is used to identify people and objects. Each RFID tag has a tiny microchip within its body that can be recognized by a reader antenna. Even though this is bringing more business to companies because they have made it possible to shop much easier, it also is bringing them many issues because these antennas are permanently integrated into the tag, which can be tracked from anywhere. Given that the shopper purchased the item, the item can also be traced back to the shopper at any given time. Things like this can be dangerous in the real world because people's privacy becomes at stake. Either way, shopping is so much easier now thanks to RFIDs. The truth is, it's only a matter of time before they become a real problem.
Daniell S

The Pain of Change at Boeing - 0 views

  •  
    This article is about a book, and how it has ended the friendships between companies and employees. The article then goes into the topic of building a Boeing plane. A survey was sent out to the employees by the authors of this book to see if the company would make changes to its structure. However, many employees were laid off due to outsourcing. In the words of the article "Two aims of the outsourcing were to cut costs and to gain access to more foreign markets; both of those goals were largely achieved. " This shows that with outsourcing many people lost their jobs but the quality of the product was better than before. The 787Dreamliner had become much better with the technology used instead of the employees creating it. The employees were once treasured and considered themselves a family of sorts, but being replaced by Boeing they were obsolete and were easily expendable. The authors of the book say that anyone in top management should read this book and rethink their strategies for running the business. The book should also be read by the employees so they can work together to restore this idea of a family. The ethical issues in this idea of getting rid of workers so that better quality work can be done. By outsourcing jobs this allows the company to save more money than it would with having employees.
1 - 20 of 74 Next › Last »
Showing 20 items per page