A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. This blog provides an insight on few of the exciting offerings on green mobile phone technology and how companies are gearing to tend to this emerging urgency.
A serious concern on the usage of electronics and more importantly cell phones, is the ecological implications they have. The digital wastes have a lot of negative impact which is basically a cumulative recipe for disaster for our planet earth. Continue reading “Green mobile phones: is it here to stay?”
There is no one best approach to analysis of an management case study. However, a number of general steps and guidelines can be followed to ensure better case analysis. Although the following steps are presented sequentially, it may be necessary during a specific case analysis to reorder or modify them, as they are intended to provide a general framework. Continue reading “How to analyze business case studies”
The Internet is a world-wide network of computer networks that use a common communications protocol, TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP provides a common language for inter operation between networks that use a variety of local protocols. To support such a system, two costs are involved. One is to maintain the routing table, to specify the path that information packets need to travel, to reach from the source to the destination. Keeping these tables organized and up-to-date is not a trivial task. Second issue facing the internet usage is the speed of service that is to be provided, and at what price should such a service be charged. Continue reading “How to price internet services”
Information systems research has long been an area of interest for researchers as it started evolving as a discipline with its own identity, since the late 20th century, since the early 1970s. IS scholars had been researching and teaching a set of diverse topics associated with information technologies, IT infrastructures and IT-enabled business solutions (i.e., information systems), and the immediate antecedents and consequences of these information systems (e.g., managing, planning, designing, building, modifying, implementing, supporting, and/or assessing IT-based systems that serve, directly or indirectly, practical purposes), ever since IS evolved as a discipline of its own. Ever since the inception IS research has evolved to incorporate more contemporary areas of research in the recent times. This paper attempts to analyze the research trends in information systems research in contemporary times, by analyzing publications for 8 years, of the top three academic journals in the discipline.
E-business is a term used to describe businesses run on the Internet, or utilizing Internet technologies to improve the productivity or profitability of a business. In a more general sense, the term may be used to describe any form of electronic business – that is to say, any business which utilizes information technology. This usage is somewhat archaic, however, and in most contexts e-business refers exclusively to Internet enabled businesses.
As Google says, Google Wave is an online tool for real-time communication and collaboration. A wave can be both a conversation
and a document where people can discuss and work together using richly formatted text, photos, videos, maps, and more. People can communicate and work together with richly formatted text, photos, videos, maps, and more. Any participant can reply anywhere in the message, edit the content and add participants at any point in the process. Then playback lets anyone rewind the wave to see who said what and when. With live transmission as you type, participants on a wave can have faster conversations, see edits and interact with extensions in real-time.
Data security is a major concern in the banking industry where over the years technology has been used to implement various standards to facilitate the implementation of security in the various transactions and internal processes in the industry. Post 1996, banks started implementing data security in transactions using EDI or Electronic data Interchange standards. Financial EDI standards were developed to cater to the requirements of financial institutions like banks.