Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.
Josef Langerman, Standard Bank的IT转型主管,回顾了他所在组织的IT团队最近经历的非凡转型。在过去的三年中,Standard Bank的IT团队已经从相对较好接受的系统开发生命周期/瀑布模型转变为革命性的大规模敏捷方法。结果令人满意。但它留下了一个悬而未决的问题。既然情况开始稳定下来,下一步应该做什么?拥有154年历史的标准银行是非洲最大的银行集团,也是总部设在南非的第五大公司。该银行提供一系列公司、商业和个人银行业务以及金融服务。其49,000名员工为非洲大陆20个国家以及全球其他国家的1500多万客户提供服务。
{"title":"Standard Bank: The Agile Transformation","authors":"K. Johnston, T. Gill","doi":"10.28945/3923","DOIUrl":"https://doi.org/10.28945/3923","url":null,"abstract":"Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.
{"title":"SiteWit Corporation: SQL or NoSQL that is the Question","authors":"D. Berndt, Ricardo Lasa, J. McCart","doi":"10.28945/3908","DOIUrl":"https://doi.org/10.28945/3908","url":null,"abstract":"This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath
In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.
{"title":"Behind Enemy Lines","authors":"J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath","doi":"10.28945/3928","DOIUrl":"https://doi.org/10.28945/3928","url":null,"abstract":"In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen
Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.
T. Grandon Gill博士是南佛罗里达大学信息系统和决策科学系的教授,当他和家人在英国旅行时,他收到了一条奇怪的电话短信。由于无法回应,他忽略了它,直到几天后,他接到通知,他的个人网站已被暂停访问(见表1)。Grandon.com再次被黑客入侵,这是第七次。
{"title":"Grandon.com Got Hacked!","authors":"Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen","doi":"10.28945/3914","DOIUrl":"https://doi.org/10.28945/3914","url":null,"abstract":"Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.
{"title":"Employing Dynamic Logic in Cybersecurity","authors":"T. Gill, Bernardo Rodrigues","doi":"10.28945/3915","DOIUrl":"https://doi.org/10.28945/3915","url":null,"abstract":"Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.
南佛罗里达大学(USF)穆玛商学院(Muma College of Business)工商管理博士项目(DBA)学术主任格兰顿•吉尔(Grandon Gill)仔细考虑了他刚刚发给学院院长莫兹•利马耶姆(Moez Limayem)的那封邮件(见表1)。在那封邮件中,他提出了开发一个专门针对网络安全专业人士的、非常成功的学院DBA项目的可能性。他还指出,有可能从美国国家科学基金会(NSF)获得资助,以帮助支付启动该计划的费用。
{"title":"A Cybersecurity Executive DBA?","authors":"Utkarsh Shrivastava, Taufeeq Mohammed","doi":"10.28945/3925","DOIUrl":"https://doi.org/10.28945/3925","url":null,"abstract":"Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle","authors":"Kaasiefa Gasant, J. V. Belle","doi":"10.28945/3921","DOIUrl":"https://doi.org/10.28945/3921","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger
After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.
{"title":"These Models Need Enterprise Data Management!","authors":"J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger","doi":"10.28945/3651","DOIUrl":"https://doi.org/10.28945/3651","url":null,"abstract":"After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}