Case study: Taiwan Taxis iCall System – Realizing the Value of GPS-Dispatch Systems Solution

You may read the case here: Taiwan Taxis iCall System: Realizing the Value of GPS-Dispatch Systems Solution

1. Why do you think Comfort Taxi was able to attract 16,000 taxi drivers to adopt the GPS dispatch system within two years, whereas Taiwan Taxi managed to recruit only 6,700 members over a seven-year span? 

How Computer-Mediated Social Interactions Stop SOPA

What is SOPA

SOPA, the Stop Online Piracy Act, is a bill introduced by U.S. Representative Lamar S. Smith (R-TX) to expand the ability of U.S. law enforcement to fight online trafficking in copyrighted intellectual property and counterfeit goods. Provisions include the requesting of court orders to bar advertising networks and payment facilities from conducting business with infringing websites, and search engines form linking to the websites, and court order requiring Internet service providers to block access to the websites. The law would expand existing criminal laws to include unauthorized streaming of copyrighted content, imposing a maximum penalty of five years in prison. 1

Continue reading “How Computer-Mediated Social Interactions Stop SOPA”

Privacy and security threats on the Internet

As for human’s nature, on one side, everyone seems pretty much to take his or her privacy into serious consideration. However, on the other side, everyone is curious about others’ secrets or say privacy(This sentence is translated from the opening words to this article: “How to encrypt yourself”, XinhuaNews,, June 4, 2004).As broadcasting information becomes easier, personal privacy is becoming easier to collect. I’ll talk about a few common traps and threats around the internet.

1. Signing up. On the internet, signing up usually requires users to offer various amount of personal information to certain software providers or service providers, which would give providers a convenient way to collect some data and do statistics in order to provide better services. Those personal information may includes the user’s real name, age, gender, address, phone number, Continue reading “Privacy and security threats on the Internet”

Some Thoughts on IT Doesn’t Matter: What IT Really Is

Let’s be straight forward, omitting the tedious and boring introductions.

Carr generally put forward two points in <IT Doesn’t Matter>.

  • Most companies are over-investing money on IT facilities.
  • IT doesn’t matter, because the advantages of it are shrinking for the Commoditization of IT.

I partially agree with the first assertion.

It is true that some companies nowadays spend too much on IT and get very little in return. Continue reading “Some Thoughts on IT Doesn’t Matter: What IT Really Is”

Pros and Cons of Open System vs. Closed Systems

In the opening words, I think it is appropriate to correct your mighty misconceiving, Open source does not necessarily have to mean free.
What does it mean by open?
It means people can see the source code, have full access to the hardware underlying the system and edit or control them.
Android is open source, however it is absolutely not free (the Phone companies have to pay some fees to Google Inc. for using its Android System).

Case Study: impact of illegal P2P file sharing on the Media Industry

Read the Case here: Impact of Illegal P2P

What is the best strategy for the media industry to follow? You can base your response on one particular part of this industry (e.g. music or movies).

In addition to keep on fighting the threat from Internet piracy through new legislation, better enforcement, and public education, the media industry also needs to consider new business Continue reading “Case Study: impact of illegal P2P file sharing on the Media Industry”

Thoughts on Google Health and Microsoft HealthVault

Intro and Basic functionality:

This is a slight difference between the two.

Microsoft HealthVault is a web-based platform from Microsoft to store and maintain health and fitness information for both individuals and healthcare professionals. A HealthVault record stores an individual’s health information. Access to a record is through a HealthVault account, which may be authorized to access records for multiple individuals, so that a mother may manage records for each of her children or a son may have access to his father’s record to help the father deal with medical issues. Access to the account is through Windows Live ID or a limited set of OpenID Continue reading “Thoughts on Google Health and Microsoft HealthVault”