The course touched on a lot of things I am familiar with (databases, transaction processing, enterprise systems, etc.) and some of the latest technologies I was not so familiar with (wi-fi, IEEE standards). But it also got me into blogging. I had always thought that this was for folks who didn’t have much to say, or didn’t bother writing to “letters to the editor” of their local print media. But I have come to find out, as mentioned in one of my articles, blogging is now part of the cultural landscape, moreso than I expected.
Monday, May 28, 2007
So Long, Farewell, auf Wiedersehen, Goodnight
The course touched on a lot of things I am familiar with (databases, transaction processing, enterprise systems, etc.) and some of the latest technologies I was not so familiar with (wi-fi, IEEE standards). But it also got me into blogging. I had always thought that this was for folks who didn’t have much to say, or didn’t bother writing to “letters to the editor” of their local print media. But I have come to find out, as mentioned in one of my articles, blogging is now part of the cultural landscape, moreso than I expected.
Friday, May 25, 2007
Getting a Decent Return on Your IT Investment
The answer is simple “to improve a facet of your business, whether it makes or saves money”. The 1 million dollar communication system may be outdated in terms of the latest product on the market, but did it solve any of the businesses’ problems and improve the bottom line of the company? Was it better than the old system in creating cost savings, or increasing productivity? If the answer to questions like this is yes, then the investment has generated a return, and done its job. The technology need not be the fastest, most powerful, best in its class in order to be implemented. If it keeps in line with the strategic goals of the company, any IT investment can be a good one. And as long as it wasn’t training seminars stored on laser discs.
Tuesday, May 22, 2007
The Magic of IT Empowerment?
Just as that Vancouver lawyer can communicate in real time with his Toronto counterpart, he can communicate with his even newer counterpart in Bangalore just as easily. Offshoring and outsourcing are by-products of improved information and communications technology. Obviously, this has greatly impacted the call-centre industry at first, but now, complex software systems once developed and maintained in the western world are now being built in developing nations, primarily India. In fact, it is estimated that India is the number one destination for IT outsourcing. The country has coupled modern information and communications technology with a skilled, English-speaking workforce with a lower cost of living than all western nations, to grow their information technology sector. Other countries, such as Ireland, China, Russia, and in some cases Canada, are following suit.
So it appears that this technology can either empower a worker to do his job more effectively, or move it to a low-cost center all together. Obviously, there have been many drawbacks to outsourcing on both sides of the ocean, too many to get into here.
The Magic of IT Empowerment
Consider the following scenarios: A lawyer in a Vancouver office works with a co-worker in Toronto on a fraud case using NetMeeting, Instant Messenger, and other instant communication tools; these very same tools are used by an introverted software programmer to communicate with a gregarious tester sitting in the adjacent cube, who normally resents the programmer’s lack of verbal communication.
In both scenarios, the following has occurred:
1. Barriers to communications, both physical and sociological, have come down.
2. It seems that distance is not much of a problem, as long as the infrastructure is in place to allow seamless communication. However, as in the first case, time difference can be.
Due to this, organizations can flatten out, cutting costs of bureaucratic channels of communication and oversight between groups. Finally, the worker can make informed decisions regarding colleagues, customers, supervisors, and any other stakeholders involved in their daily activities. Empowering workers can lead to business success.
If it’s Too Good to be True, Then There Probably Isn’t a Nigerian Official Being Detained
Over time, the scammers have become more sophisticated, with phishing scams and lottery number scams becoming the ‘fraud of choice’ for those folks who operate less than honestly. In the wireless world, a major concern is that these fraudsters can spam you not only on your PC, but on handled devices as well, so there is little reprise from them. And fraud is just the tip of the iceberg, not to mention the other crimes including identity theft, sexual exploitation, and blackmail.
To combat this, police forces worldwide have created cyber-crime task forces to deal with this. However, these criminals across legal jurisdictions, which makes law enforcement that much trickier.
Delegates from the Asia-Pacific Economic Cooperation (APEC) group have recognized this problem as a threat to not only to the citizens of their countries, but as a threat to international trade and economic well-being. They agreed that all APEC economies need to develop legal frameworks that include laws and policies that do the following:
1. Criminalize conduct such as gaining unauthorized access to computer systems and causing damage to computer systems.
2. Allow law enforcement authorities to collect electronic evidence.
3. Allow economies to cooperate with each other in investigating and prosecuting cybercrime.
The European Union is also looking to cross-jurisdictional solutions in dealing with cybercrime as well. Because this is a new type of crime, new approaches must be taken to deal with it. The three points above are just a start. As the internet becomes embedded in our civilization, the harm that it can cause must be mitigated though the legal systems of all nations on the planet.
Monday, May 21, 2007
RFID - Retiring the Barcode, or a Potential Invasion of Privacy?
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be attached to an object for the purpose of identification using radio waves. All RFID tags contain at least two parts:
1. An integrated circuit for storing and processing information, modulating and demodulating a radio frequency (RF) signal and perhaps other specialized functions.
2. An antenna for receiving and transmitting the signal.
In 2005, more than 1.3 billion RFID tags were produced. By 2010, 33 billion tags will be manufactured according to a report by In-Stat. From a supply chain perspective, most of this is driven by Wal-Mart, who has mandated that its top 100 (and, later its top 300) suppliers begin to use RFID." This will eventually replace the barcode reader as a means of identifying merchandise.
However, this has raised the ire of many privacy advocates. Plans to put RFID in US Passports have met with resistance , as a person could unwillingly broadcast all their personal information (age, sex, date of birth, etc.), and could lead to a rash of identity theft. So until the wireless security is fool-proof, maybe it is a good idea to stick to tagging clothes on a rack before getting around to the person who wears them. Then and only then can it be used for things such as keeping away any "undesirables" (such as the ones seen below) from a particular establishment.
Saturday, May 19, 2007
Are Blogs Legitimate News Sources?
Even though major news networks, such as CNN, have integrated blogging as a part of their news delivery, they have also argued that there are no adequate checks and balances when it comes to “breaking news” that originates from blogs. However, a blogger by the name of Charles Johnson also proved the converse true. In 2004, Johnson, who operates the Little Green Footballs blog, helped prove beyond a reasonable doubt that the documents raising questions about President Bush's National Guard service, presented by Dan Rather on CBS' "60 Minutes" were fakes. Many agree that this ultimately led to the resignation of Rather, the star anchor of the network.
So it looks like blogging is here to stay, and slowly it is becoming a legitmiate source of news. But like anything, one always has to take the credibility of the source in mind, whether it is a major broadcaster, or some guy sitting home in his den in a housecoat.