Thursday, December 13, 2007

Weekly Blog #16



This week in class we were to learn about ethics and technology. It is a shame to see how many of the new technologies are used unethically. The most recognizable unethical behavior includes computer fraud: identity theft, email spam, phishing, hacking and many more. Some others are debatable. Some people argue that peer to peer file sharing its legal the same way as if you make a copy of a CD for a friend. On the other hand, others argue that file sharing is stealing and should not be allowed. Computer technology and information systems have improved our lives tremendously. You can now instantly view, send, share or store all kinds of data, including email, pictures, video, medical diagnostics etc. Of course there are those who use it to take advantage of others. The following article: P2P Botnets pose Fresh Network Threat shows how a new type of malware: Botnets can be used unethically. It explain how a botnet can spread itself on a P2P network and launch and attach which since it is not located on any specific location, uses hundreds of computers on the P2P network they are very difficult to detect and stop.

Friday, December 7, 2007

Individual Blog Assignment #5



How did your group make the decisions? What problems did you encounter in the process? Did your group make decisions in a different way than the whole class did? Why? What kind of information system do you need to design to support such a process of negotiation? Provide a simple hardware/software configuration.

At the beginning our group decided to send me all the value tables to create an Excel spreadsheet with all the possible combination solutions in order to find the one that would maximize the best outcome for everyone. We then decided to delete any combinations that would give any of the members of the group less than 20 points we ended up with 2 possible combinations. The first option would give myself the lowest score with 26 points and a total for the whole group of 264 points. The second option would give John the lowest score of all with only 20 points but will give a total of 375 points to the group. After intense negotiation, the whole group, John included, agreed to select the second option since with the exception of John everyone else in the group will benefit much more than with the first combination. Then, after speaking to the professor we realized that we weren’t limited to just find the best combination. As long as the whole group agreed, we had the power and ability to trade, pool the points given by the professor among ourselves. In other words there weren’t any restrictions and you could go outside the box. Right then we decided to pool all the points given by the professor and redistribute them evenly among all members of the group, even though some members had way more points than others, in a combination that would give us all a maximized result.
After speaking with several other groups they had all done what we did originally. They also created spreadsheets and chose a combination that everyone agreed on. I also saw a group before class where all its members were discussing and trying different combinations. They were the only ones that I know that did not use an Excel spreadsheet. I am assuming that they didn’t want to share their results with their group.
To support this process of negotiation I would design a server-based system with an internet linked interface to make it easier for all parties to access and communicate. We would then need an application that would allow all parties to communicate, negotiate, share and disclose data if wanted. After all parties input their data, the system automatically calculates the best options for each member and also identify the best options for the groups as a whole to ease negotiations.

Weekly Blog # 15




This week in class we learned about the system development life cycle, and more specifically about system design. The first step of the design is to create a blueprint, or blueprints. The two most important models are Data Flow Diagram and the Entity Relationship Diagram. The Data Flow Diagram shows how the data and processes flow and can have different levels. You can Zoom in or out for example from the concept all the way to the programming language for each of the steps. The Data Relationship diagram is not dynamic. It does not show the flow of information. All information on the system is organized in objects which are easier to describe. Each object has attributes which can have different formats. Both these two models can be made using the UML language which already defines the guidelines and rules of the diagrams.
The following article: QuickUML 3.0 - UML Design Tool for Universal Binary Mac OS X and Windows Vista announces release of quick UML. This new 3rd version adds new diagram presentation features, code generators for other programming languages and many other features. Its new presentation features allow attributes, operations, properties and events to be define for each class and each project can be presented as one multi-panel window.

Saturday, December 1, 2007

Weekly Blog #14


This week in class I learned about information system development and system reengineering. It involves several steps like identify inputs and outputs, flow of activities, resources etc. We also learned about the types of improvements that can be done, including from sequential to parallel, enhancing the decision authority, information sharing, eliminate buffering, automation and changing from batch to continuous. Another thing we learned was about the system development life cycle, which comprises of the following components: planning, analysis, design, development, testing, implementation and maintenance. The following article: Planned Systems Intenational Wins Contract to Provide Enterprise - Wide Provider Database to Military Health System talks about the contract Planned Systems International won to provide Enterprise-Wide Provider Database to Military Health System. The $2.5 million contract will help integrate functions that consolidate data and cross-link them to multiple business operations, processes and applications. The contract will provide a variety of services including technical management, system development, system integration, and formal testing.

Tuesday, November 20, 2007

Weekly Blog #13


This week in class we learned about Time Warner and it network. I was surprised to learned that most of their network is not wired with fiver optics but rather with the old coaxial cable which has much less quality and bandwidth. Like both groups explained in class I really think that an upgrade of their network could give them a competitive edge over other providers. Verizon already offers Fios, an all-digital services through a five optic network. I have a friend who has it and he mentioned the Internet speed and the quality oh his TV signal is amazing. He used to have Hi-Fi channels though Comcast but Fios has a much superior picture and sound quality. The following article: Fios available to 1 million homes, offices mentions how Verizon already has it fiber optic network available to over $1 million customers in NJ, and plans to add an additional $400,000 next year. Thanks to that, Verizon has been gaining customers at an incredible pace. It reported a penetration rate that far exceeded the average penetration rate of 15% (in all other states were it offers services) Verizon bet heavily in it fiber optic network, the infrastructure expense is very high but it is already paying off. Conventional cable providers will need to step up their game if they want to keep up.

Saturday, November 17, 2007

Interactive Assignment #4

Suggest two other business cases in which this method can be used to collect information. What problems do you see besides the ones mentioned in the Background information section? What kind of information system do you need to design to support this method of collecting information? Provide a simple hardware/software configuration.

There are two other business cases other than Hewlett Packard’s where an electronic market could be used to collect information with information aggregation:

1- Market research, more specifically, product testing or research.

For example, a market like the one used on this case could be used to compare two products against each other and see which one has the better ratio of trading and thus figuring out which product has better potential before it is even launched

2- Commodities’ prices for various products, including gold or utility prices and or currency exchange.

In this case an electronic market can be used to find out how a particular utility or commodity is expected to perform in the future. For example if an international, company is planning to invest into a factory in a particular country but has concerns about the possible appreciation of the local currency which will make exports very expensive. If can predict that the currency is going to appreciate or not it may decide to do the investment or not.

On both cases derive several problems. First, actual results may not reflect accurately future results or real performance of the products being tested or traded. Even if you get what look good feedback from the market it may not reflect what it will really happen. Additionally, the format of the electronic market has to be design to give the most appropriate feedback. For example, the market for the product research has to be designed what is going to be exchanged in order to work and in a auction or trading format that gives the best feedback

The class project only involves several people and professor Vragov keeps track of the results on a spreadsheet. Of course if this method of collecting information involves many people an automatic information system is needed. The only hardware needed would be an on-line server or virtual server with an interface allowing participants to access it and trade. That interface could be configured for different market types, allowing for different auction types and or for posting bids and puts. All transaction will automatically be recorded and executed after they are confirmed by both parties without human interaction. The results will then be recorded into a database where the relevant information can be extracted.

Weekly Blog #12


This week in class I learned about McGraw Hill and how piracy, including P 2 P, the Internet and electronic publishing are hurting their conventional printing business. It is true that all kind of conventional publications, including regular books, magazines and newspapers are in general on the decline. I don’t think they are going to disappear on the near future but they eventually will. The new generations will get used to the electronic media: laptops, electronic book tablets, PDAs, smart phones etc, and will not longer use regular publications. Especially since it is much easier to storage books in electronic format than in shelves or take on backpacks.
The following article: Amazon to Unveil E-Book Reader on Monday Explains how Amazon plants to launch its closely guarded mobile e-book reader this Monday. They are just following the current trend. The reader will have Wi-Fi connection so you can buy and download any publication at the Amazon.com book store while sitting at Starbucks having your morning coffee. It also comes with headphones for listen to audiobooks. As we can see, McGraw Hillneeds to change their strategy the same way other publishers are doing and migrate to the trend and offer more electronic options.