Saturday, November 22, 2014

Module 13

Megan Flinders

The Wired Society

I am very glad that I was able to take this course.  I felt the reading assignments were very informative and gave me great perspective on the globalization and flattening of the world.  Friedman's book gave me the confidence that I can make my voice heard from wherever I choose to live; meaning, I can work from home or be somewhat anonymous in the grand scheme of things, yet I can be a powerful influence for good due to the global connectivity of our society.

While there are many benefits of our technological world, there are also many scary topics as well.  Technology and connectivity can be used for good and benefit many people.  However, it can also serve as a platform for evil, such as discussed in terrorist organizations.  Therefore, it is important that we always have the right checks and balances in place to ensure our security as a society.  It is therefore important that we as individuals, be informed and express our voices.  I take this very seriously as I am raising children in this world, and want to prepare them for the future.

In all, I am glad I was able to read the book and additional articles that broadened my perspective.  Also, it was interesting to read my colleagues opinions and blogs and make comments.  Thank you for this class and what it stands for.

Saturday, November 15, 2014

Module 12


Megan Flinders

Module 12

 

            In the article, “Why the future doesn’t need us”, author Bill Joy discusses many of the aspects of human dependency on computers and machines.  He speaks to the fact that there is a potential for humans to become so consumed with machines making decisions in place of the normal person, that ultimately humans could be replaced by the machines or the “elitists” who control them.  Joy also touches on the topic of GNR, or that of genetics, nanotechnology, and robotics.  His thesis is describing his fears of these three components which relate back to the title of the article.  Does the future really need us, or is our increasing dependency on machines and robots decreasing the need for our existence?

            The first point Joy makes about GNR is the fact that these three forces are so powerful that they can cause chain reactions of consequences.  Furthermore, due to increased connectivity and availability, they are at the fingertips of small groups and individuals (unlike weapons of mass destruction which do not reach the common person).  The possibility of knowledge-enabled mass destruction is real, and is becoming ever more prevalent in our day-in-age.

            Joy recounts his 20-year career in the field of computer technology and admits that while he has been an integral part in creating many programs and software essential to the industry, he never felt as though he was creating an intelligent machine.  However, he fears that the rate of continuous improvement will continue until about the year 2030 when our computers and technology will be nearly a million times more efficient than those with which we currently operate.  If this is to be the case, will there be such a need for our species and existence?  He feels very uncomfortable about the fact that he could be working on the type of machine that causes the extinction of mankind.  He even offers the thought that we should be thinking about how to coexist with such efficient machines and what precautions we should be undertaking.

            Joy continues to take this further when speaking of robotics and intelligent machines that can self-replicate.  He quotes Darwin in saying that in evolution there are humans, nature and machines.  Nature, however, is possibly on the side of the machines.  Will we seek to incorporate robotic characteristics in ourselves to prolong life, improve the quality of life and be restored to our version of Eden?

            Lastly, Joy touches on the point of genetic engineering and the fact that this process is already far along.  Our food supply is greatly impacted by genetic mutation, and this field will continue to be showcased in the future.  If this along with the other components of GNR go unchecked, we will indeed run into issues as a human race.

            In contemplating the views and thoughts from the article, it is hard to discount the validity and possibility of the outcomes hypothesized.  We have seen through the example of the atomic bomb and nuclear weapons, that we are capable of destroying mankind in the blink of an eye.  Therefore, it is vital to have sensible people in control and the necessary checks and balances in play in order to contain the potential destructive behavior.  In this degree, I believe Joy’s thoughts are justified.

            Nevertheless, I believe that the inspiration of natural thought comes from Deity.  There is a given time and place for the creation of invention and the process of innovation.  We are on a designed course as a mortal species that goes beyond the creation of intelligent robotic species.  This may well be a part of our future, but nothing we should fear or try to prevent.  We should, however, seek to understand the risks, be active in our involvement of placing the checks and balances, and hold those responsible who oversee the management of these resources.  The creation and inventions of technology has overwhelmingly been a positive part of human progression.  With most things, there are those who seek to manipulate for personal gain and power, but I feel as though the good and noble will reign supreme.

Saturday, November 8, 2014

Module 11


Module 11

Megan Flinders          

WALL-E

 

            The computer related movie I chose to view was the animated movie by Disney’s Pixar, WALL-E.  Although it is a fictional movie made for children and families, there are many points in this film that are very relatable and relevant to our society today.  The film was released in 2008 and the setting of WALL-E takes place in the future, in approximately 2805.  It is interesting to see how far the use of computer generated robots has come since 2008 and to imagine what their capabilities will be in the year 2805.  I wonder if there will be more similarities to what the movie depicted than we suspect.

            The film begins by introducing the main character, WALL-E, which stands for Waste Allocation Load Lifter - Earth-Class.  He is a computer generated trash compactor that was sent to earth in 2105 to help other trash compacter robots clean the planet after it had been evacuated by all humans due to decades of mass consumerism that had left the planet uninhabitable thanks to the megacorporation Buy n’ Large (BnL).  The humans left to live in fully automated starliners (made by BnL of course) while the robots make the earth habitable once more.  Eventually BnL abandons its plan and shuts down all of the WALL-E robots, except for one.  He maintains his lifestyle and repairs himself with old parts he finds and collects things he finds while compacting trash.

            One day while going about his business, WALL-E discovers a small plant that has begun to grow.  Not long after that, a spaceship lands and deploys an advanced robot sent from the BnL starliner to search for vegetation on earth.  This robots name is EVE (Extraterrestrial Vegetation Evaluator), and WALL-E quickly falls in love with her.  She, after many hostile interactions, eventually befriends him.  WALL-E brings EVE to his collection and she sees the plant which she immediately stores inside herself and goes into stand-by mode waiting to be retrieved by a ship.  WALL-E thinks she has malfunctioned and tries to fix her to no avail.  He stows away on the spaceship that comes to collect EVE and travels to the Axiom ship where the humans reside.

            On the ship we find that the inhabitants have become morbidly obese and incessantly lazy due to the comfortable lifestyle on the ship that computers and robots provide for them.  They ride around in automated chairs all day that have a big virtual screen right in front of their faces that obeys their every command.  They never need to have face-to-face interactions with each other because they can talk through their computers whenever they like.  They also order food on their computers which they eat in their space chairs while on the go, never really going anywhere in particular.

            The plant that EVE has found would be proof to the humans that life on earth could exist once more, but through a series of unfortunate events between EVE and WALL-E, there are confusions and mishaps that almost ruin the chance for them to find the plant that EVE stored within herself.  Once the plant is finally discovered, the captain of the spaceship concludes that mankind must return to restore their ruined planet.  However, the ship’s robotic autopilot, Auto, has taken control of the ship and does not want the humans to return to earth.  After many attempts, the captain overtakes and disables Auto and the Axiom begins its return home to earth.

            It is a little frightening to see the depiction of the dependency that the humans have on their computers, and it is pretty realistic to how people are with technology today.  I can totally imagine a world where the human race depended on technology and computers for everything in life.  While the human-like characteristics of the robots probably seemed far-fetched in the year 2008, today we see robotic interactions that imitate human like qualities to an almost scary degree.  Even in talking to Siri we find that she is programmed with sarcasm that makes her personable.  I definitely think the social and cultural issues that are raised by the film showcase our dependence on our technology and the “I need it now and I don’t want to have to work for it” attitude that we can see becoming increasingly more commonplace.  The movie was meant to portray a time far in the future, but I don’t think we have to look all the way into 2805 to see similarities between our day and this film.


Saturday, November 1, 2014

Module 10


Megan Flinders
Module 10
A Logic Named Joe

 

            In the short story, “A Logic Named Joe” written in 1946, several technical descriptions of our time became actuality due to the internet and world-wide web.  It is interesting to think that far out ideas of 1946, such as the ability to “type in logic in the tank” and it will pop up what you are searching for, are simply reality and taken for granted in our time.  It is hard to imagine what life would be like without the basics of a computer, internet, cell phone, television, and the like. Nevertheless, it is interesting to take a look at a few of these ideas to see which really came to pass, and those which never materialized.

            As noted, “the tank” as described in the story illustrates the seemingly never ending supply of information contained in the digital world.  The thought of searching for the weather forecast, a mistress in the White House connected with a Presidential regime, and the premise that a machine could to math or act as a consultant for chemistry, physics, or astronomy, are truly factual in our day in age.  We can search for any topic and find mass amounts of information.  As described in the short story, our machines are literally connected and able to share this amount of information.  We have seen this in Friedman’s book, “The World is Flat” as he has described companies such as Napster which allowed this data file sharing.  Friedman also describes the flattening of the world through outsourcing, and dives deep into the demographics and economics of India, of whom have become the consultants and back office of many companies looking for cost and production efficiencies.

            As the story continues, it describes “Joe” as coming to life, or having a mind of its own.  I can see the thought process of someone in 1946 who was unsure if such a technology would ever exist.  Many times the unknown creates doubt and uncertainty.  Sure, there is excitement over a new way of doing something, but there are always thoughts and naysayers who are comfortable with the here and now.  Innovators, however, have no such fear.  We can see, many years later, that our machines have not come to life.  They do not search for information or broadcast details without being programmed to do so.  And the resultant information of our queries is not some trick played by the computer.  The amusing thought in the short story of giving advice for a wife killer, which would be different for a blonde or brunette, is simply that; amusing, but not true.

            Now, while the “logic” spitting back ideas from the “tank” is not how we search on the web, it does somewhat resemble communications with Siri.  If Siri is unable to decipher your question, which may not always be factual or understood, she will respond with somewhat of a personality.  Her tones and responses are not vicious, as Joe in the short story was described as well, but they do not always follow logic.  Siri can be humorous, or direct, depending on how you address her.  So in theory, she somewhat resembles Joe and the logic.

            Another somewhat prophetic part of the story is when Laurine is in the hotel searching for Ducky, the narrator of the story.  This is as if she is searching for a facebook friend, or someone’s Twitter handle or Instagram page.  He doesn’t go by his real name, so the logic cannot find him. Laurine tries a few different names, but he mentions he is home, but “in maintenance” because he doesn’t want to be pestered.  This is like being away or unavailable on IM or email.  Quite realistic in our day.

            The last part of the story gets into something near and dear to people’s heart; computer security and sensors.  Joe was described as giving out personal information including name, address, age, sex, charged amounts on credit cards, spouse, and more.  Even more so, Joe didn’t have a sensor, so the kids in the story were accessing content that was supposed to be restricted. We live in a world where our personal information can be distributed as described. However, we also have many controls to stop this dissemination of information for the protection of individuals.  However, strictly speaking, this along with the other instances described, are true events that take place in our day and age.  Interesting how one in 1946, without a clue of how reality would truly take place, could predict so closely how the information world would unfold.

Saturday, October 25, 2014

Module 9

Megan Flinders
Module 9

The building of a Dell laptop is quite impressive as was illustrated by Friedman in chapter 16 when he discussed the machine he used to write this book.  He wanted to know where the components came from, and contacted Dell to trace the location.  What is depicted next is an impressive supply chain which can readily pinpoint where each part came from, and a vision of how Dell operates. 
Dell takes orders for its computers via internet or phone, and on an average day tallies near 140,000 – 150,000 computers sold.  The suppliers that work with Dell are contacted as soon as the orders are placed, to expedite the shipping of all of the products. Because each order is customized to the customer, Dell does not pre-build most of its computers.  The exact product type, module, hardware are sent to the factory, scanned in by barcode and put in the bins for assembly.  Dell, like Walmart, has multiple suppliers which it can contact in the case of product shortages or defects.  This speeds up the time to market and ultimately, improves customer satisfaction.  In the end, the building of a Dell laptop is about collaboration, continuous process improvement, and efficiency.
    When speaking of al-Qaeda and supply chains, one can see that the flattened world has aided terrorist groups who use these same instruments for global collaboration.  Al-Qaeda’s usage of supply chains is dangerous because the supply chains it uses are for destruction and terror, not profit and a better standard of living.  Friedman points out the fact that the leaders and innovators of al-Qaeda understand supply chains and the flat world almost as well as the innovators from Wal-Mart, Dell, and Infosys.  It has allowed a revival of Muslim identity and an ability to train, recruit, and connect with members instantaneously in all parts of the world.
    Friedman defines the types of supply chains used by al-Qaeda as mutant supply chains or suicide supply chains.  In the end, these supply chains have worked in the flattened world to let the small act big.  This is seen in acts of physical and cyber terror which have been enabled by the flattened world.
    The curse of oil as stated by Friedman, is where the monarch and dictators who run countries, get rich by drilling oil and use wealth to stay in office forever.  They use this oil money to monopolize the power without empowering the people of the nations they rule.  This ultimately retards growth and causes a major rift between rulers and those being ruled.  When rulers hoard money and resources, there is no need or desire to understand or have empathy for those they rule.  They simply govern in a self-gratifying and benefiting way.  Many nations have been unable to progress in a democratic context due to the curse of oil and continue having weak or nonexistent institutions.
    Another factor in the curse of oil is the lack of innovation or creativity that takes places when all you have to do is dig for oil.  Building things creates trade.  Friedman stated that fact that while Muslim nations make up near 20 percent of the world’s population, they only account for 4 percent of world trade.  Trading opens the doors for innovation and ideas.  It fosters global connectivity and exposure.

Tuesday, October 14, 2014

Module 8


Megan Flinders

Module 8

Personal Computer Education Essay

 

            My relevant story about how computers have been used in my education starts many years ago.  My husband, prior to starting his MBA, purchased a new laptop.  We opted to stay with Windows XP instead of the new Windows 7 due to some unfavorable reviews on the new software.  We had Microsoft 2003 as 2007 hadn’t quite been released.  This Toshiba laptop was perfect.  While my husband used it for class, we also used it as our home computer storing large amounts of music, video, and photos on the hard drive.  Several years later, which happened to be when I decided to go back to school, we decided it would be a good idea to get a desktop computer to go along with the laptop.  The laptop’s memory was about full, Windows XP had since been several times updated to the new Windows 8, the Microsoft Office package we were using was now severely outdated with formats somewhat incompatible for my studies, and our iPad just wouldn’t meet all of my needs.  With all of the factors in place, off we went to buy the home computer. 

As my first week of courses began, I was still using our laptop to check out my courses on the online Canvas system.  Most of my courses were held at the University, however, they also included an online component.  It would be necessary that I had an internet connection at home to be able to perform research for my classes, write papers, and submit everyday assignments.  Study guides and exam prep were also included on the Canvas system which made it a go to program on a daily basis.  And most importantly, most of my assignments were to be submitted online.  Here alone shows how instrumental computers were to be in my education.  To not be able to access Canvas through a working computer and internet connection would be devastating.  Thus the stage was set for the perfect digital failure.

It all began when our new, supposedly up to date computer (which had Microsoft 2013, Windows 8.1, and several bells and whistles) began to throw up all sorts of pop-ups and indications a virus was present.  I was in the middle of trying to save a paper I had just written, which happened to be due that night, when the computer stated my C: drive was corrupted.  I couldn’t save, exit, and continue with Microsoft Word.  I reset my computer and it wouldn’t start back up.  All the while, in my panicked state, I tried to fire up the dusty laptop.  Sorry, after waiting for 10 precious minutes for the dinosaur to turn on, it prompted me that the memory was full.  Therefore, I couldn’t use the laptop.  Since I was too far away from the University, library, or any other source I could think of, I was relegated to try and remember what I had written in my essay and finger peck away on the iPad.  I typed prodigiously until I had somewhat of an assignment completed and turned it in to my teacher.  I think I spent as much time writing an explanation to what had happened, as I did on the paper.  What a horrible experience with the use of technology which has left a lasting impression on me.  I have definitely learned from that experience what I could have done differently and hopefully won’t have to experience something like that again.

Suffice it to say that computers have played, and continue to impact, a huge part of my education.  All of my classes this semester are through the Canvas system.  Without the ability to use a computer from the comfort of my home, or even the convenience of the library, I would be forced to hand write, and physically turn in my assignments.  Computers have increased the efficiency and over experience in getting an education and will continue to do so throughout my college years.

Saturday, October 11, 2014

Module 7


Megan Flinders

Module 7

 

Some countries are better at doing certain things, or in economic terms, have a comparative advantage in large part due to their culture.  Friedman references The Wealth and Poverty of Nations in which author David Landes mentions that the values of the country or region (hard work, thrift, honesty, patience and tenacity) are a bigger factor than the climate, natural resources and geography.  While the latter factors also play a part in competitive advantage, countries gain the comparative advantage from these intangible factors.

Friedman goes on to explain how Ireland has these values instilled in the country DNA, and has risen from the scoffing of European countries, to become the second most wealthy nation in the European Union.  The hard work and resiliency of the nation has allowed it to embrace globalization and become an attractive player in the global economy.  Friedman uses the term “glocalize” to describe nations who absorb foreign ideas and best practices and meld them with the country’s own norms and traditions to create an advantage in the flat world.  This is in contrast to many Muslim countries who are stuck on tradition and unwilling to glocalize with other nations.  Not only are these countries closed off to the idea of melding ideas, some actually shun the practice and feel a need to “purge” or eliminate certain nations to do.  In a way, this leads to a more closed mindset which can decrease the potential comparative advantage.  Ultimately when tolerance is the foundation, nations can share best practices and good ideas for the greater good of all.

One additional comparison Friedman uses to illustrate why some countries produce comparative advantage is between Mexico and China.  Simply stated, it is the intangibles China possess which allows it to thrive while Mexico is lost shuffling for answers.  China has found the ability to focus its energies, perform necessary reform, and promote based on a meritocracy.

Self-directed consumers are those that drive companies to offer products and services customized to their needs.  They feel that if Company X is not offering such a service they desire, they will find another company that does.  An example referenced is in the financial industry where consumers want one stop shopping for these services.  It can also be seen in many companies and innovative products which continue to develop after taking surveys, launching pilot products and programs, and making adjustments based on consumer feedback.

I believe I am a self-directed consumer in a way because I have a good idea of the service and products I want.  However, I also enjoy companies, such as Apple, who bring innovative products to me.  I think there is a delicate balance between being reactive and waiting for customers to tell you what they what, and being innovate and proactive and telling consumers what they want while giving the reasons they will want it.  Ultimately people don’t know they need or want or can’t live without (e.g. smartphones now versus phones 15 years ago) until somebody creates the products and shows them.

When speaking of globalization, it is not meant to reference Americanization.  Friedman discusses how this might have been the general feel or consensus early on the flattening process simply because America was the first mover in the market.  Most American factories, products, brands and so forth paved the way in globalization.  However, we have discussed through the text this concept of individual empowerment through electronic means and platforms and the flattening world.  Now people everyone can upload content, ideas, and innovation from across the globe.  This means more and different perspectives, and cultural impact instead of simply an Americanization of the globe.  Americanization is still a powerful force, but globalization offers a platform for individuals from all nations to share cultural norms and practices as never before. 

 

Saturday, October 4, 2014

Module 6


Megan Flinders

Module 6

 

Free trade is the notion that countries and economies as part of the global economy will thrive if each focuses on producing products that align with their core competencies.  It also enlists the concept that without barriers and tariffs, free trade would be able to flow without limit and end in a win-win for all parties involved.

The concept of free trade has encountered some opposition in recent years due to the explosion of offshoring and outsourcing.  Friedman himself mentions that even he, who still believes in the concept of free trade to the fullest, was a bit unnerved when he visited Bangalore and saw how many educated people were vying for the same jobs.  He couldn’t help but wonder how this increased competition in an ever increasingly flat world would affect himself, his children, and Americans as a whole.

I think the concept is important.  I also believe that more than just the back office or service level jobs will be continually outsourced if the pool of talent and skills sets are found similar in these regions at a fraction of the cost.  Americans will have to continue to focus on better education, continuous improvement, and innovation as to not lose the jobs and careers that allow for financial freedom in our capitalistic society.  Therefore, I too am not necessarily in favor of protectionism, or government enforced barriers, but in ever increasing personal value to stand out from the crowd. 

I also believe we have seen the anti-outsourcing movement to some degree with companies promoting the buy local, or buy American slogans.  I think this will continue to be a selling point and marketing strategy for some industries such as auto and manufacturing.  Some companies openly agree that there is a low cost alternative found abroad, but drive home the point that buying foreign may result in lesser quality, or hurting the national economy.  So while the government may not official come in enacting barriers or walls of some sort to globalization, companies themselves are doing so by new marketing techniques.

When discussing the idea of a “new middler” the illustration about homework resonated with me.  Friedman mentions that no longer must we do our homework, but we must do the right kind of homework.  This is due to the fact of the ever changing landscape where companies are changing whole workplace models.  So in order to take advantage and stay ahead of the competition, you have to study the right topics and focus on the right skill sets to gain or maintain a competitive advantage.  You have to be the “go to” employee and expert in your field.  Your value skyrockets due to your skill set, intellectual capital, and overall intangible value to your company which they cannot afford to outsource, automate, or digitize.

Friedman goes on to form three broad categories of “untouchables”.  These are people who are truly specialized, those who are localized or anchored, and those from the “old middle” jobs.  He then lists the skills and personality traits involved; namely great collaborators and orchestrators, great synthesizers, great explainers, great leveragers, great adapters, the green people, passionate personalizers, math lovers, and great localizers.  Each in their own way has a goal to decrease the change of losing their job to outsourcing or the negative effect of stagnated wages.

CQ + PQ > IQ is the formula Friedman uses to identify those who will stand out in the crowded masses of employment seekers.  CQ, the curiosity quotient, plus PQ, the passion quotient, are greater than IQ.  Simply put, those who have passion and curiosity are more likely to succeed in the flattened world because information is endless and now more available than ever.  If you have a passion to be creative and innovate, you can find the tools and know how to succeed.  Therefore, these skills are potentially more valuable than simply having a high IQ but no passion or curiosity.  As more and more of the global workforce becomes globalized, your passion to succeed and curiosity in ways to innovate and improve processes becomes ever more important.

Saturday, September 27, 2014

Module 5

Megan Flinders
Module 5

Triple Convergence is the culmination of the flattened, global playing field which allowed many more individuals to pitch in on process improvement and efficiencies, the subsequent result of horizontal value creation instead of vertical means, and the previously untapped resources of individuals from China, India and the former Soviet Union.  In the book, Friedman divides Triple Convergence up into three categories to fully define his mode of thinking.
The first convergence was the availability of resources (hardware, software, individual empowerment) that simply allowed more people to voice their opinions to improve processes.  Friedman gives the example of Southwest and their online booking and check-in process which is meant to illustrate how customers are no longer dependent on people and systems for each step of the process.  Once who has access to a PC which is connected to the web can now technically do a lot of work, in this case for the airline, in booking, checking-in and printing boarding passes (or now having the pass on their phone).  This ultimately saves consumers time and reduces overhead.  The end results, improved efficiencies and happier parties on both sides!
The second convergence can be summed up on one word, “horizontalization”.  Simply put, many of the flatteners have been around for some time.  But when you are introducing revolutionary ideas, it takes time to bring all aspects of the movement into play.  The production piece is only a part.  Often consumers also have to change habits and mindsets.  As more and more people and business become involved, however, these new trends become the new norms.
The last, or third convergence, was basically the broadening of the playing field which allowed billions of more people to join in on the globalization of process change and improvement.  The goal is to have the best and brightest making systems and products which everyone can use.  With the proper tools for communication and collaboration in place, we continue to see massive improvements across all sectors.
Friedman fully admits that in the story of India and Indiana, it is hard to determine who the exploiter is really and who is being exploited.  He mentions that it could be the Indian Engineers who are exploiting the people of Indiana by revamping their governmental unemployment system for cheap.  Or it could be the Indian engineers themselves who are being exploited for being paid less for the specific contract.  It could also be the Indian’s in general are being exploited by the big firms for which they are paid relatively well in terms of the standard of living in India
I believe that the latter is true.  The companies that outsource for the sole purpose of lowering wages are the true exploiters.  It is one thing to build factories in low cost areas or have people working remotely as part of the broader, global footprint with an aim to reduce overhead costs.  It is another to hire and train those individuals, and then transplant them to the new location on a lower pay scale.  Companies are focused on the bottom line, and will often pay their employees what they “need” to pay them to stay.
Intellectual property is the sum of resources, ideas, and know-how related to a product or process.  The idea is very important for companies because they want to keep all of the financial benefits of innovation.  Once these “top secret” ideas become common knowledge, products can easily be duplicated for cheap and the intellectual property is far less valuable.  On the flip side, however, intellectual property is also the catalyst behind faster and more efficient innovation.  Barriers of entry, of walls to information need to be set at a proper level to allow for global innovation, but also allow companies to gain profits and reap the rewards of their efforts.

Saturday, September 20, 2014

Module 4


Megan Flinders

Module 4

 

Can You Hear Me Now?

 

                For this assignment I researched cybersecurity jobs and interviewed my husband who works in the field (he is responsible for helping clients at his work who run into issues with all sorts of fraud and identity theft related incidents).  I also chose this specific topic due to the several recent stories in the news about big companies with cybersecurity incidents including Target and Home Depot.  What I found in reading several articles on the topic was a central theme of people being defrauded.  Sometimes companies had system vulnerabilities or weaknesses that went unnoticed for long periods of time, and many customer’s information was unintentionally shared.  Other times individuals did not know the party with which they were communicating was in fact the fraudster.  In the end, Verizon’s catchy theme of “Can you hear me now?” all of the sudden had a new meaning to me.  With whom are we really communicating, and are these the parties with which we want to share our confidential information?

                In my research I came across several types of cyber security jobs.  The jobs ranged from Security Analysts and Engineers who asses the vulnerabilities of software, hardware, and networks and engage in forensic analysis to detect security incidents (which is what my husband deals with), to those of Cryptanalysts and Cryptographers who analyze and break malicious code to determine the intent of the program or build programs which use complex algorithms to encrypt information.  There are also Chief Information Officers who are responsible for the entire Information Security operation all the way down to very specialized analysts who work directly with specific systems or issues.

I also came across all sorts of fraud that occurs due to the vast network of computers and information.  We have been reading and discussing in “The World is Flat” all of the different ways globalization has flattened information barriers and increased the connectivity of people.  Most of the discussion revolves around the positives of information sharing and popular technological enhancements such as online libraries for music, photo libraries, and mass storage.  However, with all of the positives come some negatives.  There are those people who not only want to share productive forms of information and entertainment, but those who wish to spread viruses, malware and other harmful, and mostly unwanted products.  This is where cybersecurity comes to the forefront.

                Most companies have an IT department that focuses on the security of their company’s network.  My husband described in my interview the fact that this goes above and beyond simply anti-virus software and computer firewalls.  He mentioned that his work often goes through testing scenarios to detect certain vulnerabilities in their systems and to also fortify the policies and procedures to protect their employees and clients from acts of fraud.  The difficult part, he said, not only keeping up with the new trends and hacking attempts, but trying to be one step ahead.  He mentioned that his work has dedicated teams that focus on all areas of cybersecurity prevention and remediation.

                Several resources are available for everyday people to educate themselves on the different forms of fraud and how to protect oneself from becoming a victim.  OnGuardeOnline.gov is a site my husband directed me to that aims to educate about cybersecurity.  It lists ways to avoid scams, protect your kids online, and securing your computer to name a few.  I think for most people my age and younger, most of this stuff is pretty inherent.  My parent’s generation may not be quite as savvy though, so these broad-based tips would help them greatly.  I did, however, find information and articles that were even helpful to me in explaining how to properly secure a network and computer.  After all, the last thing I want is to be giving my credit card number or other personal information to a fraudster through a phishing scheme or virus of some sort.

                In the end, cybersecurity is only going to continue to increase in importance as more people and their devices become interconnected through our ever flattening world.  It is vital to stay up to date on the latest prevention techniques and to be sure our information is secure with all those whom we are communicating.

Saturday, September 13, 2014

Module 3


There are those words in the English language which create immediate reactions; one of those is outsourcing.  A somewhat related, yet I would argue less frequently used term, is offshoring.  Friedman describes outsourcing as, “taking some specific, but limited, function that your company was doing in-house – such as research, call centers, or accounts receivable – and having another company perform that exact same function for you and then reintegrating their work back into your overall operation.  Offshoring, by contrast, is when a company takes one of its factories that it is operating in Canton, Ohio, and moves the whole factory offshore to Canton, China.  There it produces the same product in the very same way, only with cheaper labor, lower taxes, subsidized energy, and lower health-care costs.” (Friedman, 2007, pp. 137-138) China joining the WTO took the world to a whole new level of offshoring just as Y2K boosted India’s prospects of outsourcing and made the country a relevant and dynamic player in the global workplace.

While reading the text, I gained a greater appreciation of the concept of offshoring when Friedman described China’s demographic of over 160 cities with a population over 1 million.  This concept alone allows companies to offshore factories and manufacturing as never before due to the sheer size of its workforce.  It is no wonder it seems that a large majority of products are “made in China”.

A great illustration from the book outlines the fact that companies must alter their vision and forget about competing with China and treating them as the enemy.  Instead, you should give a good internal look at your business model to determine which part of the business you would like to do in China, which part you would like to sell to China, and which part you want to buy from China. This just shows how flat the world has truly become since as China becomes a more important player due to offshoring, other similar countries emerge as potential offshoring destinations.

Another flattening topic introduced is that of logistical efficiencies.  A supply chain is the mechanism used to allow products to flow downstream from a manufacturer/supplier to customer.  Wal-Mart has used their supply chain to their advantage by driving a hard bargain with manufacturers, but also by creating a super-efficient process and technological web with the companies whose product they sale, and in turn with their own stores which are spread across the nation. In effect, Wal-Mart does not create any products.  However, they are such a dominant force in the retail world because of their expansive reach (in terms of store locations, products offered, and low costs) and overall efficiencies in technology (which allows them to quickly forecast and restock stores to ensure customer demand is fulfilled).  As noted in the text, the goal of an efficient supply chain is to be the overall lowest cost.  Not always, however, can you find a low cost leader that offers high quality products, delivery, and customer service in every facet.  So while price is important, the overall efficiency and low cost leader is what Wal-Mart has done to gain its competitive advantage.

One particular illustration in Wal-Mart’s case is its visibility into each store’s particular needs.  For example, if one particular store is overstocked, Wal-Mart can quickly have excess product orders redirected to stores that may be short on stock.  This ensures the company is not losing the product forecasting battle which often results in sales on excess products.  Wal-Mart in turn allows its suppliers to view how their products are selling through its central databases, all in an effort to have hyper-efficient, just-in-time, inventories and supply chains.

Google is another company that has revolutionized the playing field for businesses.  Google has flattened the information barrier by allowing anyone with an internet connection to search for and find the same overall research information on any given topic.  Google has affected business by allowing the process of “informing.”  Anyone can create the know-how to run a business, outsource, and have an efficient supply chain (through connectivity with globally established companies as Friedman describes in UPS’ case) by simply “googling” the information.  People want, and have, all the information they can digest at their fingertips.  No longer are people spending time searching for the material.  On the contrary, the information is readily available and business owners large and small can focus on ideas and innovation instead of utilizing resources on the information finding.

Saturday, September 6, 2014

Module 2


As we continue the discussion of globalization and find examples of a flattening world, we are introduced to the idea of workflow software. Once the playing field was leveled in terms of the accessibility of the internet and connectivity of computers and systems (through physical infrastructure such as fiber optic cables and standardized systems), workflow software standardized the software applications enabling all systems to speak to each other in an efficient manner.  The result was seamless workflows which allowed companies to not focus on the pipes per se, but on the innovation of new products that would make markets more efficient.  The standard of access became the same, but companies still had to produce and innovate to create a compelling product and competitive advantage, all the while aiming to entice customers to use their product over the competition.

An example of the use of workflow software would be the use of the mobile wallet; or more specifically, ISIS.  The electronic payment system in the standard bearer for retail companies, and credit/debit cards are a primary source of transactions.  The mobile wallet has enhanced the speed and potential security of the payment system by allowing consumers to retain their source of funds on the phone.  The workflow software includes the tap technology and card reader that is now in many restaurants and has even spilled over the vending machines.  Payments and quick and efficient for both parties.

Friedman goes on to explain that innovation and software can come to market from a variety of sources, but some may be more effective than others, even when they challenge the status quo.  Open source, or community developed software, is when communities of people collaborate and develop source code (software) that is then uploaded to the web and often made free for downloadable use.  This type of software is important because it continues the idea of flattening the competitive landscape and cuts out the middle man.  It changes the landscape by allowing more people to voice their opinions and share creative ideas and innovation through collaboration and “peer review”. 

Community developed software is basically a more efficient way to streamline software on a broader scale by bypassing the historical hierarchical processes and organizations.  Ultimately the brainpower of a community of thousands of geeks who simply want to create universally functional products is better than a large company’s IT group trying to create a product to sell.  We have seen a mass movement in the past decade of IT companies and their engineers actually joining these groups as they have seen the power of individuals who simply seek to create the best products.  The community forums are not so much about being compensated, but about sharing their ideas and seeing them take off.  Ultimately whoever has the best idea can submit source code which is reviewed by their peers for any bugs before being implemented.  Companies have taken the free code and established proprietary and innovative products based off what the community has built, but ultimately original credit is given to the forum and the idea sharing process continues.

The last major topic discussed is the concept of reaping the highest profits and efficiencies while paying the lowest cost.  The practice known as outsourcing is the cost saving practice of delegating certain functions to lower cost locations.  Outsourcing is important because it connects and flattens the world as never before.  No longer is it required to be physically present in one location to complete tasks.  For example, many back-office type functions that need not be present in high cost locations can be shipped to lower cost centers, such as India.  The key is to find a highly educated and competent work force which can perform these functions without error for a fraction of the cost.  An additional benefit is the time zone effect which allows most of this work to “follow the sun”, meaning it can be completed oversees during the day when the main centers (U.S.) are sleeping.

In summary, workflow software, open source software, and outsourcing are additional proofs of how the world has continued to be flattened. You no longer have to by an Ivy League grad employed by a large corporation to have your ideas input in the programs and products we use every day.  On the contrary, you can be a part-time “geek” who simply shares ideas to the global community from your home computer.  Indeed the world has been flattened and minority voices are now at the forefront of innovation.

Saturday, August 30, 2014

Module 1


Megan Flinders

IST 1100 – Module 1: The World is Flat

 

In his book, The World is Flat, Thomas L. Friedman introduces readers to the phenomenon of outsourcing and increased efficiency and cost savings.  The early chapters begin by discussing the topics of globalization, worldwide events which spurred economic change, such as the fall of the Berlin Wall, and innovative products and companies which forever changed the global competitive landscape.

In the beginning, Friedman takes us through his viewpoint of a flattening global society as he describes three phases of globalization.  He begins by introducing Globalization 1.0 as the time between when Columbus set sail in 1492 until the opening of trade between the Old and New World around 1800.  This era of globalization was about shrinking the size of the world (from large to medium) and driving integration through the muscle and brawn of a country. Friedman mentions that the primary questions of Globalization 1.0 were, “Where does my country fit into global competition and opportunities?” and “How can I go global and collaborate with others through my country?” (Friedman, 2005, p. 9)

Globalization 2.0 was the next era which ran from the 1800s through the year 2000.  Once again the size of the world shrank; this time from medium to small.  The driving force of this phase was the idea of multinational companies.  Global labor and markets propelled by falling transportation costs (mainly due to the steam engine and the railroad) and reduced telecommunication costs (thanks to innovation and invention) were key to this phase.  The global economy was introduced in this phase, and increasing integration and globalization of companies was a central theme. The main questions were, “Where does my company fit into the global economy?”, “How does it take advantage of the opportunities?”, and “How can I go global and collaborate with others through my company?” (Friedman, 2005, p. 10)

The final phase of Globalization 3.0 was when the size of the world went from small to tiny.  This is also the phase were the playing field was flattened in terms of competition.  This phase is where individuals had their chance to compete and collaborate globally.  Now the questions that should be asked are, “Where do I as an individual fit into the global competition and opportunities of the day, and how can I, on my own, collaborate with others globally?” (Friedman, 2005, p. 12)

While all phases of globalization dealt with the flattening of society, the main difference was in what was being globalized.  Globalization 1.0 was about the global integration of countries, while 2.0 incorporated the idea of multinational corporations and modes of communication and trade.  3.0 was all about the individual’s ability to connect and communicate, and the leveling of the playing field among corporate superpowers and the everyday individual (i.e. the JetBlue’s of the world which employ stay at home mom’s, against the traditional airline companies with fully staffed offices and corporate agendas).

One of the major worldwide events which aided the flattening of the world was the fall of the Berlin Wall.  Friedman mentions, “It tipped the balance of power across the world toward those advocating democratic, consensual, free-market-oriented governance, and away from those advocating authoritarian rule with centrally planned economies.” (Friedman, 2005, p. 52)  Capitalism was the resultant economy and people were forced to learn how to handle this new system.  The people and the demands thereof would rule instead of the antiquity of a top-down governmental system.  The fall of the Berlin Wall was a sign of the times and those who were not on board were seen as on the wrong side of history.  It was a world flattening event, and somewhat of a get out of jail free card for many, as they were no longer confined to the meager living standards shared through a communist government.  While some of the older generation were uncomfortable with a new governmental system which allowed some to excel while others failed, most of the younger generation looked forward to the newfound freedom and limitless potential.

The fall allowed globalization to take flight as more countries were seen as a seamless whole.  No longer were nations fixated on individual policy and well-being, but looked to global efficiencies and potential.  Common standards and best practices were adopted and archaic norms were relegated as ideas of the past.  The political constrain on individual reach was greatly eliminated by the fall of the Berlin Wall.

Along with worldwide political events, other paradigm shifts in innovation truly enabled the flattening of the world. The company Netscape was a huge flattening force which made computers and the internet much more connected and dynamic.  Friedman mentions that in the process of wiring the whole world, “without anyone really planning it, made Bangalore a suburb of Boston.” (Friedman, 2005, p. 63)  One of Netscape’s main benefits was the way it presented website data (its browser system) and made it user friendly to all types and sophistications of people.  All the while, Netscape aimed to keep the system on an open protocol, meaning open to users for free (but those who could pay, i.e. businesses, could buy it on a disk).  Netscape did this to not allow larger companies, such as Microsoft, to shift the protocols to proprietary that only their servers could handle.  This allowed all computers to continue the globalization and open connectivity regardless of what system they were on.  People wanted a universal way to browse the internet, but also a universal way to access the information.  Ultimately, Netscape unlocked humanity’s innate desire to connect with each other as a wired society.

Friedman makes many compelling arguments in the opening pages of his book, and I have seen many of these events take place on a personal level.  For instance, my husband works for a global company and many of his work functions are those which have been transferred from the higher cost locations of New York and London.  He, however, interacts weekly with his global counterparts in Bangalore, New York, Europe and Asia as they complete projects as virtual working groups.  The flattening of society has continued through various forms of social media and it is evident in his workplace.

I also agree with the premise of Globalization 3.0 in that all people are able to instantaneously share their voice through social media platforms of Twitter, Facebook, Instagram and more.  Connectivity between individuals has never been easier.  For example, my family members who live out of state are readily available through phones, FaceTime and other technological services.  Therefore, Friedman’s views were correct in 2007 that our society would only continue to develop and innovate.