1.CASE STUDY-E - Official - Ses 21-22
1.CASE STUDY-E - Official - Ses 21-22
1.CASE STUDY-E - Official - Ses 21-22
CASE STUDIES
Although baseball is a sport, it’s also big business, requiring revenue from tickets
to games, television broadcasts, and other sources to pay for teams. Salaries for top
players have ballooned, as have ticket prices. Many fans now watch games on television
rather than attending them in person or choose other forms of entertainment, such as
electronic games. One way to keep stadiums full of fans, and to keep fans at home happy
as well, is to enrich the fan experience by offering more video and services based on
technology. When the New York Yankees built the new Yankee Stadium, they did just
that.
The new Yankee Stadium, which opened on April 2, 2009, isn’t just another
ballpark: It’s the stadium of the future. It is the most wired, connected, and video-enabled
stadium in all of baseball. Although the new stadium is similar in design to the original
Yankee Stadium, built in 1923, the interior has more space and amenities, including more
intensive use of video and computer technology. Baseball fans love video. According to
Ron Ricci, co-chairman of Cisco Systems’ sports and entertainment division, “It’s what
fans want to see, to see more angles and do it on their terms.” Cisco Systems supplied the
computer and networking technology for the new stadium.
Throughout the stadium, including the Great Hall, the Yankees Museum, and in
stadium restaurants and concession areas, 1,200 flat-panel high-definition HDTV
monitors display live game coverage, up-to-date sports scores, archival and highlight
video, promotional messages, news, weather, and traffic updates. There is also a huge
monitor in center field that is 101 feet wide and 59 feet high. At the conclusion of games,
the monitors provide up-to-the moment traffic information and directions to the nearest
stadium exits.
1
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
The monitors are designed to surround fans visually from the moment they enter
the stadium, especially when they stray from a direct view of the ball field. The
pervasiveness of this technology ensures that while fans are buying a hamburger or a
soda, they will never miss a play. The Yankees team controls all the monitors centrally
and is able to offer different content on each one. Monitors are located at concession
stands, around restaurants and bars, in restrooms, and inside 59 luxury and party suites. If
a Yankee player wants to review a game to see how he played, monitors in the team’s
video room will display what he did from any angle. Each Yankee player also has a
computer at his locker.
The luxury suites have special touch-screen phones for well-heeled fans to use
when ordering food and merchandise. At the stadium business center, Cisco interactive
videoconferencing technology will link to a library in the Bronx and to other New York
City locations, such as hospitals. Players and executives will be able to videoconference
and talk to fans before or after the games. Eventually data and video from the stadium
will be delivered to fans’ home televisions and mobile devices. Inside the stadium, fans in
each seat will be able to use their mobile phones to order from the concessions or view
instant replays. If they have an iPhone, an application called Venuing lets them
communicate with other fans at the game, find nearby facilities, obtain reviews of
concessions, play pub-style trivia games, and check for news updates.
The Yankees also have their own Web site, Yankees.com, where fans can watch
in-market Yankees games live online, check game scores, find out more about their
favorite players, purchase tickets to games, and shop for caps, baseball cards and
memorabilia. The site also features fantasy baseball games, where fans compete with
each other by managing “fantasy teams” based on real players’ statistics.
2
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
Can you run your company out of your pocket? Perhaps not entirely, but there are
many functions today that can be performed using an iPhone, BlackBerry, or other
mobile handheld device. The smartphone has been called the “Swiss Army knife of the
digital age.” A flick of the finger turns it into a Web browser, a telephone, a camera, a
music or video player, an e-mail and messaging machine, and for some, a gateway into
corporate systems. New software applications for social networking and salesforce
management (CRM) make these devices even more versatile business tools.
The BlackBerry has been the favored mobile handheld for business because it was
optimized for e-mail and messaging, with strong security and tools for accessing internal
corporate systems. Now that’s changing. Companies large and small are starting to
deploy Apple’s iPhone to conduct more of their work. For some, these handhelds have
become necessities.
Doylestown Hospital customized the iPhone to provide doctors with secure mobile
access from any location in the world to the hospital’s MEDITECH electronic medical
records system. MEDITECH delivers information on vital signs, medications, lab results,
allergies, nurses’ notes, therapy results, and even patient diets to the iPhone screen.
“Every radiographic image a patient has had, every dictated report from a specialist is
available on the iPhone,” notes Dr. Scott Levy, Doylestown Hospital’s vice president and
chief medical officer. Doylestown doctors also use the iPhone at the patient’s bedside to
3
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
access medical reference applications such as Epocrates Essentials to help them interpret
lab results and obtain medication information.
Doylestown’s information systems department was able to establish the same high
level of security for authenticating users of the system and tracking user activity as it
maintains with all the hospital’s Web-based medical records applications. Information is
stored securely on the hospital’s own server computer.
In this type of production environment, it’s absolutely critical to know the exact
moment when delivery trucks will arrive. In the past, it took many phone calls and a great
deal of manual effort to provide customers with such precise up-to-the-minute
information. The company was able to develop an application called ChainLinq Mobile
for its 30 drivers that updates shipment information, collects signatures, and provides
global positioning system (GPS) tracking on each box it delivers.
As Morgan’s drivers make their shipments, they use ChainLinq to record pickups
and status updates. When they reach their destination, they collect a signature on the
iPhone screen. Data collected at each point along the way, including a date- and time-
stamped GPS location pinpointed on a Google map, are uploaded to the company’s
servers. The servers make the data available to customers on the company’s Web site.
Morgan’s competitors take about 20 minutes to half a day to provide proof of delivery;
Morgan can do it immediately.
4
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
The Apple iPad is also emerging as a business tool for Web-based note-taking, file
sharing, word processing, and number-crunching. Hundreds of business productivity
applications are being developed, including tools for Web conferencing, word processing,
spreadsheets, and electronic presentations. Properly configured, the iPad is able to
connect to corporate networks to obtain e-mail messages, calendar events, and contacts
securely over the air.
5
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
TELUS is a Canadian telecommunications company that has been around for a century,
and it wants to ensure that every Canadian is connected to the rest of the world, whether
that connection is through wireless devices, the Internet, television, or traditional
telephone lines. The company has 12.7 million customer accounts.
The company decided to focus on making team member education more “continuous,
collaborative, and connected” through informal and social learning, using mentoring,
coaching, job rotations, videos, blogs, and wikis. TELUS set a 2010 learning budget of
$21 million, 40 percent of which was for informal and social learning and 60 percent for
formal learning. (The year before, formal learning had accounted for 90 percent of the
firm’s $28.5 million learning budget.)
To support the new learning initiative, TELUS harnessed the capabilities of Microsoft
SharePoint Server 2010, which provides team members with a single point of entry to
shared knowledge within the company and the ability to search all the company’s
learning assets simultaneously. TELUS used the SharePoint MySites feature to enable
team members to create their own Web pages that describe their areas of expertise and
special skills. Team members are able to see their positions and those of others in the
6
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
organizational hierarchy, connect with colleagues, and establish informal groups with
other people with similar skills. An Expert Search capability provides ranked search
results identifying TELUS employees with expertise in specific areas. MySites also offers
blogging tools for team members to build their own blogs and contribute to those of
others. Through these blogs, a team member can locate an expert, discuss his or her
experiences, share advice, and find the answers to questions without having to take a
class or interrupt a colleague.
TELUS used SharePoint to develop team sites called My Communities, where project
teams, departments, and other groups can work together and share documents and other
content. They are able to create categories for classifying and tagging user-generated
content. TELUS Tube allows team members to post and view user-generated video of
their accomplishments on the job or questions to ask col-leagues. Over 1,000 videos have
been posted. A new learning management system working closely with SharePoint Server
2010 enables team members to track and display the formal learning courses they have
taken as well as the courses other team members have taken.
TELUS recognized that moving from formal learning to acquiring knowledge through
employee collaboration and participation required a shift in company culture. “This is not
a scenario in which we can flip a switch and have everyone change their work habits
overnight,” observed Dan Pontefract, Senior Director of Learning for TELUS. To
encourage acceptance of and participation in the new social learning processes, the
company set up an internal site showing tangible examples of the new collaboration tools
and launched a wiki to facilitate employee discussion. Pontefract includes information
about the new learning initiative on his blog to help prepare team members for the shift.
The new SharePoint system gives TELUS team members much faster access to the
specific skills and knowledge areas where they need help—they don’t need to wait for the
next formal learning class. Instead, team members can immediately reach out to
colleagues who have expertise in a specific area, or they can read wikis and blogs, watch
7
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
8
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
Verizon and AT&T are the two largest telecommunications companies in the
United States. In addition to voice communication, their customers use their networks to
surf the Internet; send e-mail, text, and video messages; share photos; watch videos and
high definition TV; and conduct videoconferences around the globe. All of these products
and services are digital.
For a number of years, Verizon has tried to blunt competition by making heavy
technology investments in both its landline and wireless networks. Its wireless network is
considered the most far-reaching and reliable in the United States. Verizon is now
pouring billions of dollars into a rollout of fourth-generation (4G) cellular technology
capable of supporting highly data-intensive applications such as downloading large
streams of video and music through smart phones and other network appliances. Returns
from Verizon’s 4G investment are still uncertain.
Verizon’s moves appear more risky financially than AT&T’s, because its up-front
costs are so high. AT&T’s strategy is more conservative. Why not partner with other
companies to capitalize on their technology innovations? That was the rationale for
AT&T contracting with Apple Computer to be the exclusive network for its iPhone. Even
though AT&T subsidizes some of the iPhone’s cost to consumers, the iPhone’s
streamlined design, touch screen, exclusive access to the iTunes music service, and over
9
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
250,000 downloadable applications have made it an instant hit. AT&T has also sought to
provide cellular services for other network appliances such as Amazon’s Kindle e-book
reader and netbooks.
The iPhone has been AT&T’s primary growth engine, and the Apple relationship
made the carrier the U.S. leader in the smartphone carrier market lspace. AT&T has over
43 percent of U.S. smartphone customers, compared with 23 percent for Verizon. Smart-
phone customers are highly desirable because they typically pay higher monthly rates for
wireless data service plans.
The iPhone became so wildly popular that users overstrained AT&T’s networks,
leaving many in dense urban areas such as New York and San Francisco with sluggish
service or dropped calls. To handle the surging demand, AT&T could upgrade its wire-
less network, but that would cripple profits. Experts con-tend that AT&T would have to
spend $5 billion to $7 billion to bring its network up to Verizon’s quality. To curb
excessive use, AT&T moved to a tiered pricing model for new iPhone users, with data
charges based on how much data customers actually use.
Adding to AT&T’s woes, its monopoly on the iPhone may be ending. Apple
reached an agreement with Verizon in 2010 to make an iPhone that is compatible with
Verizon's network. Allowing Verizon to offer iPhone service will more than double
Apple’s market for this device, but will undoubtedly drive some AT&T iPhone customers
to Verizon in the hope of finding better net-work service. Verizon is further hedging its
bets by offering leading-edge smartphones based on Google’s Android operating system
that compete well against the iPhone. With or without the iPhone, if Verizon’s Android
phone sales continue to accelerate, the competitive balance will shift again.
10
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
If you enjoy cycling, you may very well be using a Cannondale bicycle.
Cannondale, headquartered in Bethel, Connecticut, is the world-leading manufacturer of
high-end bicycles, apparel, footwear, and accessories, with dealers and distributors in
more than 66 countries. Cannondale’s supply and distribution chains span the globe, and
the company must coordinate manufacturing, assembly, and sales/distribution sites in
many different countries. Cannondale produces more than 100 different bicycle models
each year; 60 percent of these are newly introduced to meet ever-changing customer
preferences.
11
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
12
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
Facebook is the world’s largest online social network, and increasingly, the
destination of choice for messaging friends, sharing photos and videos, and collecting
“eyeballs” for business advertising and market research. But, watch out! It’s also a great
place for losing your identity or being attacked by malicious software.
How could that be? Facebook has a security team that works hard to counter
threats on that site. It uses up-to-date security technology to protect its Web site. But with
500 million users, it can’t police everyone and everything. And Facebook makes an
extraordinarily tempting target for both mischief-makers and criminals.
Facebook has a huge worldwide user base, an easy-to-use Web site, and a
community of users linked to their friends. Its members are more likely to trust messages
they receive from friends, even if this communication is not legitimate. Perhaps for these
reasons, research from the Kaspersky Labs security firm shows malicious software on
social networking sites such as Facebook and MySpace is 10 times more successful at
infecting users than e-mail-based attacks. Moreover, IT security firm Sophos reported on
February 1, 2010, that Facebook poses the greatest security risk of all the social
networking sites.
13
Course: Global Economic Information Systems - Nguyễn Kim Hạnh; Semester 1, 2021-2022
enter information into their computers. The hackers, most likely an Eastern European
criminal group, stole as many as 68,000 login credentials from 2,400 companies and
government agencies for online banking, social networking sites, and e-mail.
The Koobface worm targets Microsoft Windows users of Facebook, Twitter, and
other social networking Web sites in order to gather sensitive information from the
victims such as credit card numbers. Koobface was first detected in December 2008. It
spreads by delivering bogus Facebook messages to people who are “friends” of a
Facebook user whose computer has already been infected. Upon receipt, the message
directs the recipients to a third-party Web site, where they are prompted to download
what is purported to be an update of the Adobe Flash player. If they download and
execute the file, Koobface is able to infect their system and use the computer for more
malicious work.
For much of May 2010, Facebook members and their friends were victims of a
spam campaign that tries to e-mail unsolicited advertisements and steal Facebook users’
login credentials. The attack starts with a message containing a link to a bogus Web page
sent by infected users to all of their friends. The message addresses each friend by name
and invites that person to click on a link to “the most hilarious video ever.” The link
transports the user to a rogue Web site mimicking the Facebook login form. When users
try to log in, the page redirects back to a Facebook application page that installs illicit
adware software, which bombards their computers with all sorts of unwanted ads.
14