Wednesday, December 12, 2007

Computer Ethic

As professor mentioned, I am going to talk about “Computer Ethic” in my blog. According to Wikipedia, Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications.
I have search couple of articles which relate to our topic Computer Ethic. “The iPhone Hacking Kit, step by step” is the one I like because iPhone is the hottest topic recently. The author teaches everyone hacking iPhone step by step. People can install other applications after unlock the iPhone. It is free software, just taking 30 – 45 minutes.
This is good news for publics, who have iPhone, but it is painful for AT&T. Publics will be more flexible about using their phone; however, AT&T will lose the ability to hold their customer using their service.
Reference link:
http://iphone.macworld.com/2007/08/the_iphone_hacking_kit_step_by.php

Saturday, December 8, 2007

Negotiation

According to Wikipedia.com, broadly speaking, negotiation is an interaction of influences. Such interactions, for example, include the process of resolving disputes, agreeing upon courses of action, bargaining for individual or collective advantage, or crafting outcomes to satisfy various interests. Negotiation is thus a form of alternative dispute resolution.
Last class we did negotiation in class. Professor gave us 1 group assignment which divided by 2 steps. First of all, each individual had their own values sheet. Everyone knew which solution the best for his/her is. After discussion, because we wanted to make us to be “win-win” status, our group decided to share our value sheets and use Microsoft Excel to calculate one best solution which makes everyone to get maximum value. However, we had a problem. There was one student’s score having a very low score. Excel gave us two best solutions for solving our question. First one the score average was great. It was 4.7. Two of us got around 9 points, but one of us just got 2 points. Second one, the average was 4.3, but the two guys’ 9 points changing to be 6-7 points. The one who got only 2 points in the first method got 4 points. Because this problem, we did grouped negotiation. Finally, the lower score student decided chose the first one. She wanted to keep other student with a high score.
Later, professor gave each group another values sheet. Students tried to use the same strategies as the first step. We shared the value sheets importations; however, this time the rule had changed a little bit. The score was based on the difference of the each group’s choice. Based on this rule, we used a lower score. Fortunately, we got a nice score at the end of this class.
Through this class, we learned that negotiation involves three basic elements: process, behavior and substance.
The process refers to how the parties negotiate: the context of the negotiations, the parties to the negotiations, the tactics used by the parties, and the sequence and stages in which all of these play out.
Behaviors to the relationships among these parties, the communication between them and the styles they adopt.
The substance refers to what the parties negotiate over: the agenda, the issues (positions and - more helpfully - interests), the options, and the agreement(s) reached at the end.Skilled negotiators may use a variety of tactics ranging from a straight forward presentation of demands or setting of preconditions to more deceptive approaches such as cherry picking. Intimidation and salami tactics may also play a part in swaying the outcome of negotiations.

Systems Development Life Cycle

Last class professor mentioned about program life cycle. It is a very interesting topic. Systems Development Life Cycle (SDLC) or sometimes just (SLC) is defined by the U.S. Department of Justice (DoJ) as a software development process, although it is also a distinct process independent of software or other information technology considerations. It is used by a systems analyst to develop an information system, including requirements, validation, training, and user ownership through investigation, analysis, design, implementation, and maintenance. SDLC is also known as information systems development or application development.
I searched some articles about SDLC. “Using the Program Life Cycle Can Increase Your Return on Time Invested” is one which shows the benefits of SDLC. It truly describes how SDLS works and increases the return on time invested. It gives some examples about each SDLS steps to explain why SDLC is worth. It claims that maximizing the quality and quantity of programs is key to an Extension educator's success. I believe this is a very helpful article for who is first time touching SDLC and who is developing a software.

Reference:

http://www.joe.org/joe/2001june/a2.html

Saturday, December 1, 2007

Brigadoon Bed and Breakfast

The most interesting thing I learned in this week is Brigadoon Bed and Breakfast. Two teams pointed out lots of problem they have. There is one problem I am really interested in which is Website homepage. Theirs homepage just simply has Links to other Brigadoon Ads, Request more info on Brigadoon B&B, and How to find us. It is a very boring and unfriendly homepage. They are refusing customers who want to order room through WWW. I look up other hotel’s homepage such as Sheraton. They offer on-line reservation and vacation ideas. It makes customer more satisfied and friendly. People even have not been there, they have already experienced home feeling. Sheraton’s homepage uses orange as the main color. It make people feel warm even thought it’s now winter. In contrast, Brigadoon Bed and Breakfast still using blue and gray as the main color. We have to say that Brigadoon B&B does not pay attention on their image and customer service.
These two website are good for people or travel agency who want to order room, because they can directly get information from these two web pages. It is good for Sheraton, but Brigadoon B&B. Sheraton will gain more customers since their homepage.
Inference link:
http://www.starwoodhotels.com/sheraton/index.html?PS=GWS_aa_Google_sheraton_hotel_122505

Friday, November 23, 2007

Time Warner agrees to carry National Geographic in high definition

During the last class, peers discussed about Time Warner. Time Warner Inc. (NYSE: TWX), formerly two separate companies as Warner Communications, Inc. and Time Inc. before the Time-Warner merger in 1990, is the world's largest media and entertainment conglomerate headquartered in New York City, with major operations in film, television, publishing, Internet service and telecommunications. Among its subsidiaries are AOL, Home Box Office, New Line Cinema, Time Inc., Time Warner Cable, Turner Broadcasting System, The CW, Warner Broos Entertainment, Cartoon Network, and CNN. After class, I have searched some articles about Time Warner. “Time Warner agrees to carry National Geographic in high definition” is the latest one new. Time Warner Cable San Antonio has added National Geographic HD to the company's digital line up.
I totally agree with them to add one more channel for their customers because Time Warner has lost a lot of money since 2000. They need to build up strong product and customer service; therefore they can get more market share and make more profits. This article is good for some stock holders. Stock holders can get clew from every new.
Reference:
http://www.bizjournals.com/sanantonio/stories/2007/11/19/daily31.html

Friday, November 16, 2007

Collecting Information

First of all, I believe this method is good for companies such as Google or Apple. But here, I want to give an example to explain. Professor Vragov gives us an assignment which is talking about HP’s EPS price. I have searched couple of website and some news about them. To be honest, I have no idea about which I am going to buy, because I might miss some comment or news which are very important. After all, I decided use our whole class’s search result to make my decision. I analyses the trend of exchanging. In the first day, basically it was 50 & 50. Now, there is a huge difference between green tickets and red ticket. It seems 60 & 40. Someone offers 10 green tickets for 15 red tickets. In this case, I think that I am doing information aggregation.
Based on study, I feel that there is no correct answer for information aggregation. Every answer is opposite. In my opinion, I think we can use some information to estimate the future sales or profits. However, it is not always correct. People now make the prediction but use the information gained months ago or years ago. There are considerable errors. Also, in this brutal business battlefield, lots of fake information makes you get in a trap. People do not have any tool to judge the reliability of information. For example, the information I got from our student Blackboard could be fake. Perhaps the student wants to people get in the green and he gets the red. Then he can obtain the largest benefits.
For building a system for collecting information, first of all, the system must have a search engine. System can automatically search the relevant information about key words. This system also needs a filter. Filter is very important, because there are too much fake or unvalued information on the Internet or the real word. The system can analyzes information well and truly. It will save lots of money and time for the collectors.
For building this system, we still need a very strong hardware system such as a huge storage device and huge memory system and processor, besides the hardware, software is more important. We need a stable system to running for 24 hours because we have different time zone. I recommend Linux system as the operation system. Last, we need the collecting information system which we designed in last paragraph.

United HealthCare Now Enrolling Providers for EPS

The most interesting thing I learned this week is that United Healthcare uses Electronic Payments & Statement (EPS). Since naturally a lot of people do not believe pay money through internet or other electronic system, I have searched couple of articles about this system. “United HealthCare Now Enrolling Providers for EPS” is the most interesting one. Electronic Payments and Statements (EPS) is a practical solution to provide delivery of electronic claims payments and remittance advice information. Hospitals, laboratories, physicians and other health care professionals receive and reconcile thousands of claims payments and paper. Explanation of Benefits (EOBs) each year, creating countless stacks of checks and paperwork, resulting in hours of staff time spent on manual processing and reconciliation. EPS allows for easier reconciliation, less paperwork and greater efficiency. Since United HealthCare has some problem about their claim processing, they do need a better system to improve their service to their clients. I agree about this article, because I can see they want to enhance efficiency. This article is good for suppliers and the companies who are focusing in producing EPS system.
Reference: https://www.navinetclaims.com/content.html?story=UHC-EPS.story

Saturday, November 10, 2007

Duane Reade lays plans to create a profit hub with central-fill facilities

As an international student, at the very beginning of the last class when I heard something about Duane Reade, I did not know what it was. After class, I learned that Duane Reade is the largest drug store in New York. Founded in 1960, the chain started with three stores, named after the location of the company's warehouse between Duane and Reade Streets on Broadway in lower Manhanttan. It completed its initial public offering (IPO) on February 10, 1998. It traded on the New York Stock Exchange under the ticker symbol DRD until August 2, 2004, when it was acquired by Oak Hill Capital Partners and taken private.
I have searched some articles about Duane Reade. “Duane Reade lays plans to create a profit hub with central-fill facilities” is a very meaningful one. Duane Reade has expended or initiated several programs designed to enhance the profitability of the pharmacy and to make the practice of pharmacy more satisfying to its pharmacists. The central-fill is set up so that some of the work flow for processing and filling scripts can be routed to select remote stores in an integrated system. Duane Reade hopes to have transformed other select stores, primarily low volume sores that have not reached peak capacity, into central-fill/ central-processing hubs that can handle stores in other Duance Reade markets. This system will make Duance Reade working more effective.
I think that some stock buyers and shareholders will be very interested in this article because it’s talking about the stock price.

Reference:
Link: http://findarticles.com/p/articles/mi_m3374/is_11_23/ai_77579198
Author: Liz Parks

Friday, November 2, 2007

Learn How To Maximize Profits at Online Auctions

Auction is the most interesting thing I learned from last class. Professor has mentioned there are kinds of auction style, which are English acution, Dutch auction, Sealed-bid-first-priceauction, and All-pay acution. We tried to use it to earn profit during the class time. I was thinking how to get a considerable profit when you do an auction. I search some article about this question. “Learn How To Maximize Profits at Online Auctions” is an article which introduces several steps to get profit. I totally agree with it.
I believe that selling information products on the Internet must be the easiest business in the world. Hardly any product or delivery costs and practically 100% profit on any sale. In fact you would think it is the kind of business you could not fail in, but thousands of people do. Why? Perhaps it appears so simple that people do not think there is any need to do any preparation or gain any knowledge. As someone who has been selling information online for quite a few years now let me tell you that if you take this attitude then you are wrong. The more you know about the business before you start, the fewer mistakes you will make and the more likely you are to become a successful information seller.
This article is very good for those people who are selling items in eBay or other websites. Also is good for the buyers.

Reference:
Link: http://www.auctionessentials4u.com/MaxProfit.htm

Saturday, October 27, 2007

The differences between Artificial Intelligence and Human Intelligence

According to definition, artificial intelligence (AI) is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. For example, a simple computer program for solving mate-in-one chess problems might try moves at random until mate is found. The program might then store the solution with the position so that the next time the computer encountered the same position it would recall the solution.
What are the differences between Artificial Intelligence (AI) and Human Intelligence (HI)? The success of AI so far has only been in the simulation of intelligence; not the creation of true intelligence. And to that extent, AI is somewhat incorrect, since the people who are developing a true intelligent system are yet far from the real thing. The difference appears to arise because in AI there is only a simulating system, which seems to resemble some characteristics of intelligence.
The question is how to scientifically approach AI in order to be able to come very close to HI. For this, it is important to the human brain and how intelligence works in the brain. These show up as intellectual functions that have to be performed in order to complete a task.
Since any scientific thoughts must first be theorized, those attempting to mimic HI must first create a theory about the phenomena of the brain. This would certainly make the starting point adventitious. Intelligence is only a functional capability of the brain. What about other things like emotion, pain, dreams, extra sensory perception, which are also functional capabilities of the brain? To predict a function is to be able to produce the function by other mimicking it. The theory to explain how humans perform their tasks will be a system for performing a task intelligently. The phenomena are functional capabilities, from realizing to exploring knowledge. So, the system will predict that humans exhibit these phenomena by themselves exhibiting them. The development of artificial intelligence has begun to explore the wide nature of intelligence. However, a theory that only highlights functional capabilities of intelligence will not serve the purpose. It should also conform to human intelligence. Definitely not in ways that are far from human intelligence, yet call it intelligence.





Reference:
Link: http://www.origins.org/articles/mellichamp_artificialintelligence.html http://www.britannica.com/eb/article-9009711/artificial-intelligence

SupplySolution and Covisint

Last class, the professor mentioned about Covisint. Through the class, I was very interested about this company. “Real-Time Software Drives Covisint's Supply Chain” discusses that the relationship between this company and SupplySolution Inc., a supply-chain software vendor whose customers include 10 of the largest automotive-industry suppliers and more than 700 smaller ones.
SupplySolution and Covisint will jointly develop supply-chain execution applications that may include real-time ordering, planning, and logistics software. Under the agreement, SupplySolution's i-Supply Service, i-GetIt, and Global Infrastructure products will be used to create an integration infrastructure, or hub, that will let suppliers and automakers use their existing supply-chain management, customer-relationship management, and enterprise resource planning applications to do real-time business with one another via Covisint.
SupplySolution's offerings will be available immediately to all Covisint customers on a subscription basis. Pricing was not disclosed.
I think this article is very useful for those automakers because it is showing the supply chain management of Covisint or Supplysolution will be stronger than they use to be. Therefore, they will increase production and potential marketplace for those automakers.


Reference:
Link: http://www.informationweek.com/830/covisint.htm
Author: Steve Konicki

Saturday, October 20, 2007

Virtual reality

The most interesting thing that I learned from last class this week was Virtual reality (VR). VR is a technology which allows a user to interact with a computer-simulated environment, be it a real or imagined one.
“Is Virtual Life Better than Reality?” is a very interesting article which indicates VR has a big influence right now. It gives evidence that proves how people use second life to chase their dreams. However, I think VR has caught the eye of the general public for more reasons. If people use it correctly, VR will aid society in many ways. In the past, virtual reality has been nothing more than a small step beyond video games. However, it is now apparent that this technology can be used for more practical purposes. These purposes include national defense, surgical procedures and various other applications. Society has not fully acknowledged the benefits of virtual reality because it is still under development. The reason for virtual reality remaining in its development for so long is mainly due to its complexity. The hardware that has developed so far is unable to make the large calculations required by a virtual reality based machine. However, as apparent in recent years, technology is advancing at an extreme rate. This is another reason why society's hopes for virtual reality have and still should remain steady.

Reference:
Article: Is Virtual Life Better than Reality?
Link: http://www.cbsnews.com/stories/2006/07/31/eveningnews/main1852600.shtml

Saturday, October 13, 2007

News From My Homeland China(Assignment 5)

Last class, the professor mentioned Customer Relationship Management (CRM). I searched some articles about this topic. “China Telecom (Jiangsu) Selects PacificNet Epro for CRM Telemarketing Services” was one of them. Since China is my homeland, I was very interested in this article. China continues to be the world's fastest growing economy at 11% annual growth with the largest consumer population, the largest population of mobile phone users with over 400 million, and the second largest Internet- enabled population with over 120 million online, so I think China Telecom really needs a mature CRM system to improve their service and marketing.
Through a CRM system and the availability of customer data, marketers can finally see clearly who their customers are, what they are purchasing when they are purchasing it, and where it is being purchased. Marketers can apply statistical analysis to predict future purchase behavior. CRM systems also calculate the lifetime value of customers, which can allow marketers to categorize customers and pursue the high-value segment.
Through CRM systems, marketers can better understand and shape the customer experience in all phases of the relationship, from leads to prospects to customers to (worst case) former customers. Marketing and CRM work so well together because they basically have the same mission: to identify, acquire, foster and retain loyal, profitable customers.
Through CRM, the company will know more about what the customer might be interested in and will send specific offers only to those with the highest possible interest and readiness to buy.

Reference
Article: China Telecom (Jiangsu) Selects PacificNet Epro for CRM Telemarketing Services
Link: http://www.tmcnet.com/usubmit/-china-telecom-jiangsu-selects-pacificnet-epro-crm-telemarketing-/2007/10/08/2997645.htm

Saturday, October 6, 2007

How do you secure your wireless network?(Assignment 4b)

Because of the convenience of a wireless network, people using wireless to access the internet is now very popular and advantageous. However, beginner computer users usually do not understand how to secure their wireless networks. It is not very hard to eaves drop a wireless network if the owner of the wireless network does not set a password or other identification.
There are several ways to secure your wireless network all of which can be done together to prevent unauthorized network access:
1. Turn off broadcasting of your Service Set Identifier (SSID). The SSID is a broadcast message notifying every device within range of your network’s presence. Most wireless routers have the option to turn off broadcasting your SSID. This is by far the easiest way to prevent hackers from accessing your network.
2. Change the default settings of your router’s Web-based administration. Changing your admin login won’t stop anyone from intercepting your wireless traffic, but it will prevent them from changing your settings. Most wireless routers allow you to change your admin name and password. While you’re at it, change the name of the SSID. If someone detects your SSID as being named “Linksys,” they can assume that your default username is “admin” and your default password is “admin” because that is the factory setting.
3. Enable WEP (Wireless Equivalent Privacy) or WPA (Wireless Protected Access) encryption. WEP and WPA are ways of forcing users to enter a password, which is encrypted, before they can access a wireless network. WEP is the most commonly used, but some experienced hackers can still break the protection after a while. WPA is so far not crackable and is offered on the latest WiFi devices.
4. Allow access based on MAC (Machine Access Code) address. A MAC address is a unique number that every network-enabled device can be identified by, such as a fingerprint. Most wireless routers will allow you to set up access based on MAC addresses, allowing access to only the computers or devices which you have entered into the table. This can be more time-consuming but will certainly prevent all but the best equipped crackers from accessing your network. These four ways are powerful and effective ways to solve the problem, and are totally free. Everyone could just do it easily by themselves.

Why DW is necessary for a company?(Assignment 4a)

During this past week, our professor talked about Data Warehouse and Data Base. I am very interested in them because I worked for a real estate consultant company which was a new company and needed Data Base to manage information and customers’ files. After class, I found a corresponding article titled: “Do You Need a Data Warehouse Layer in your business Intelligence Architecture?”
It introduces some information about Data Warehouse and how it works. It also explains why companies need Data Base Manage System or Data Warehouse. I totally agree with it. There are many reasons for an enterprise to implement Data Warehousing, such as competitive advantage, improving business operations and regulatory compliance. We should include data warehousing along with Business Intelligence and Performance Management, both of which are built on data warehousing, since the IT enables many business-driven initiatives.
In my opinion, however, Data Warehouse project also takes a long time to finish, and it is not always successful. Data warehousing projects take time because they generally involve consolidating data from many sources to an enterprise. This consolidation involves ensuring data consistency, integrity and quality. This process means talking to various business groups across the enterprise.


Article: Do You Need a Data Warehouse Layer in your business Intelligence Architecture?
Link: http://www.datawarehouse.com/article/?articleid=5672
Author: Steven K. Ball Published September 27, 2005

Saturday, September 29, 2007

Release Core Code To Public(Assignment 3a)

During last class, the professor mentioned the usage of databases. I was very interested in it; therefore, I tried to search some websites online to gain some articles about databases.
There is an interesting one which states that PolyServe planed to release software to help companies consolidate their growing legions of SQL Servers. I think it is a very good idea, because this decision will make PolyServe’s software much stronger than before. More people and companies will welcome this decision because they would benefit directly from it.
For instance, Linux was a very professional operating system for some IT companies. Since Linux opened core code, IT enthusiasts started to work on Linux. Now, we are able to use Linux on regular or family computers as well. This contribution totally comes from the open core code.
However, there are some problems still existing. People and companies surely do not need to pay any charge for their software, but they need to be careful with their free software. Because it is free, they will lose a lot of service such as tech support. Once their databases have problems, they might have huge expenses.
Still, this article still is useful for some small companies and IT fans. They do need this kind of free software to offer them a new way to manage and discover.

Reference:
http://proquest.umi.com.remote.baruch.cuny.edu/pqdweb?index=2&did=1029214801&SrchMode=1&sid=9&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1191018250&clientId=8851
Author: John Fontana

Friday, September 21, 2007

How to set up LAN, and its benefits(Assignment 3b)


The most interesting things I learned from the last week in CIS class are local-area networks (LAN) and wide-area networks (WAN), because I can use this knowledge to build my personal LAN which is connected to a WAN. During our class, the professor mentioned that LAN connects computers in a short distance, and WAN connects computers in a long distance. I set my desktop up as a network server, and I directly connect it to my modem. Since I only have 3 computers, my modem satisfies my needs. I connect another 2 computers to the modem and give IPs to them. After I use PING to ensure I can reach other computers, I open share documents for every computer. Then the computers can use each others’ hard drive space and information. After setting up my LAN, I connect to the internet, the WAN. Then all my computers reach the internet through LAN. I easily and quickly build a nifty home network with Internet access and file-sharing capabilities.

Based on the 2003 Wireless LAN Benefits Study (see link below), LAN brings huge benefits, such as financial returns and greater accuracy, to people. In the business world, 1+1>2 is a reliable fact that supports my idea. Linking computers correctly not only helps managers maintain companies, but also make customers satisfied because of effective work among individuals.

Reference:

Link: http://en.wikipedia.org/wiki/LAN

http://newsroom.cisco.com/dlls/2003_NOP_WLAN_Benefits_Study.pdf

Friday, September 14, 2007

Wireless Network & Hotel (Assignment 2b)

Wireless networks play a very important role nowadays. How can a wireless network influence a hotel? Generally, wireless brings lots of benefits to hotels and guests in three ways. Wireless increases hotel revenue, improves a hotel’s image, and helps mangers keep hotels in good management.

First of all, wireless service will increase hotel revenue and save internet setting charges. Once a hotel has wireless service, occupancy rates will be higher than before because customers feel more comfortable to reside in this hotel. It also increases attendance in public areas in hotels such as restaurants, coffee shops and souvenir stores since residents would stay in the hotel grounds for their needs. For instance, people would set up a meeting in a restaurant since they would be able to access the wireless network. Moreover, wireless is easy to set up. In contrast with traditional cable, wireless saves lots of charges such as telephone lines and fitment fees.

Wireless service also distinguishes a hotel from its competitors. Easy access to check E-mail or having a convenient meeting in the hotel lounge can make customers’ satisfaction increase. As a result, the hotel’s image has been increased as well. For example, a hotel having a wireless network service can make people feel it has more advantages than a hotel does not have one.

Last, it helps managers to maintain their hotel. Keeping a hotel in a good management requires a manager to master emergencies quickly. Managers can get information anywhere through a wireless network. Managers also can give feedback or orders to their employees. For instance, when an emergency happens, but a manager is not at his or her office, the best way is that send a message to him or her is through a PDA. That way, the manager can react quickest.

However, wireless still has some disadvantages. For example, not all guests have laptops which have a Wi-Fi function. In this situation, guests still need wired network service. Also, some desktops do not have Wi-Fi function as well.

For installation of a wireless network, people need some appropriate equipment. Here is a list about necessary and optional equipments:

1. Access Point (necessary)

Access Points, Residential Gateways, DSL & Cable Products

2. Cellular Convergence (necessary)

Enable both Wi-Fi and cellular communications

3. Embedded Client (optional)

Notebooks, PDA, etc.

4. Ethernet Client Device (optional)

Wireless-to-Ethernet Station Adapters & Converters

5. External & Internal Card (optional)

PC Cards, PCMCIA Cards, CardBus & SD Cards MiniPCI Cards & PCI Cards

6. USB Client Device (optional)

Dongles & Adapters

Windows & Linux (Assignment 2a)

In our last class, our professor mostly discussed computer software and some hardware usage. I was very interesting in Windows Vista and Linux operation system because I recently bought a laptop which uses Windows Vista as its operation system, and I used to work at an I.T. company which offers VOD service from a Linux server. I searched for some articles about these two systems, and “Linux Will Get Buried” (Tom Yager, 4/9/06) is very interesting. It indicates that Linux will not be used like general operations systems such as Windows’s or Apple’s; however, Linux can thrive in embedded solutions because it has a very mature kernel.

I strongly agree with author’s opinion. He discloses the reason why Linux gets buried in a commercial situation, and the advantages of Linux. It is not that “friendly” because it is really hard to use if you are a beginning user. However, based on my working experience, I believe that Linux is a very stable and reliable system. People could resize it, and it could be embedded to computer hardware. In contrast, Windows systems have a very nice interface, but its kernel is not so stable. Lots of computer users have experienced windows system down. This article is very useful for Linux fans and Linux programmers.

Reference:

Article: Linux Will Get Buried

Author: Tom Yager

Date: 4/9/06

Source: EBSCOhost

Link: http://web.ebscohost.com.remote.baruch.cuny.edu/ehost/pdf?vid=10&hid=3&sid=0c7f9d9a-f47c-40c3-9437-b6c587db9770%40sessionmgr9

Friday, September 7, 2007

iPhone and supply chain (Assignment 1)

In class this week, students discussed the 17-year-old young man who unlocked the iPhone, and they also discussed supply chain management. Unlocking the iPhone and supply chain management are subjects that interest me greatly. iPhone is the latest cell phone produced by Apple, which AT&T provides service for. Based on my brief research, I believe that the relationship between Apple and AT&T is a supply chain partnership, and iPhone only compacting with AT&T is an example of supply chain management. Once iPhone is unlocked by hackers, it can be used in any company’s wireless service such as T-mobile or Orange. An unlocked iPhone could be sold for more than $1,000. The market price of iPhone through signing a contract with AT&T is only $399. Who pays the price difference? AT&T. Therefore, unlocking iPhone hurts these both Apple and AT&T.

“Why Apple Can’t Stop iPhone Hackers?” is an article which discusses iPhone’s hacker and iPhone’s carrier. This article not only discloses that the sole authorized supplier of the iPhone is AT&T in the U.S., but also reveals the reason why the law is unclear regarding Apple and AT&T stopping iPhone hackers. I strongly agree with the author because a very similar example was when the U.S government stopped automakers from only allowing authorized radio channels in cars. I believe this article is very helpful for iPhone hackers, because it encourages them to break through.

Reference
Database: EBSCOhost
Title: Why Apple Can't Stop iPhone Hackers?
By: Kharif, Olga. Business Week Online, 8/29/2007, p17-17, 1p; (AN 26403857)
Link: http://web.ebscohost.com.remote.baruch.cuny.edu/ehost/detail?vid=3&hid=6&sid=78731cd7-7867-475f-95d1-9ae800c47958%40sessionmgr2