The study of the material offered in this class was rather enjoyable for me. “The World is Flat” was an excellent book to read, it re-invented new thoughts in my mind that up to this point, really never entered it, or thoughts that I never took time to stop and think about. Although the title of the book left something to be desired in my opinion, it offered up plenty of material that allowed me to view the world economies in a different manner. World economies are defiantly very much intertwined whether you like it or not. We live in an age where communication is very complicated or simple, depending on your perspective, and if you fall behind in technology, you are simply missing the boat. Technology is an essential part of most everyone's lives, not only are we connected in on a local or national platform, it virtually encompasses the entire world, and as the title of the book suggest, minimizes the shear size, and makes us all feel we can simply reach out and touch anyone or anything at the touch of our fingers.
The Netscape story was an interesting read for me, this, is some fashion is where it all began. As I look back at what was then Netscape, and where we are today, it's simply overwhelming to think about. Back when Netscape was developed, sure computers were around, and they were a nice convenience, today they are simply essential, and what I once had sitting in my computer room, that sold for close to $2000 before the turn of the century, now I hold in my hand in the form of a smart phone, which is also mobile.
The concept of outsourcing, offshoring, and free trade were one's that I always approached with mixed emotions. Friedman went into great detail and explained the cons as well as the pros of all concepts, and he gave real world examples of how each operated. I appreciated his devotion and time he has spent on this book, and his research. I felt for the most part, it was well written and very beneficial to anyone who choose to study his work. The one thing that I did find very interesting about Mr. Friedman, is he always knew the right people in the right course of study.
Id have to say my favorite part of this class is the papers we had the opportunity to write on research with computer networks and how computers have effected our education. It's always enjoyable when your able to take a subject that you really enjoy, and expand on it.
Another very interesting part of this class was the study of why are some countries or regions are better at doing some things than other countries or regions. This was fascinating to me, the reasons Friedman points out have really never occurred to me, nor had I really ever stop to think about them. After giving them some thought they made perfect sense, they changed my view on
developing oil rich countries, and to the reason they really never can get out of there own way. Really it is very sad that the people of those countries must suffer at the hands of these dictatorships, where they could have so much more to offer and develop for themselves.
The movie review was wonderful, I really enjoyed taking the opportunity to watch the film “War Games” again, this was a childhood favorite of mine, but as I stated in my paper, one I really never fully grasped at that age. This class afforded me the opportunity to watch it again and really think about how realistic the movie presented itself, and what was purely science fiction.
Having the opportunity to read others post about the same material I had study was a great benefit, it offered a different perspective which I believe is always a good idea. In closing, I'd have to state that this class has certainly offered new perspectives on the world economy as a whole, and just how small the world has become with all the technology that we enjoy today. It has taught me that I am not only competing with people in my area, I am also competing with people potentially all around the world, and as such I need to fine tune my skills to continually keep up with this ever demanding, and changing world.
Sunday, April 8, 2012
Sunday, April 1, 2012
Module 12
As I began reading this article, I couldn't help to think that this is going to dive into another science fiction story, like all the movies that Hollywood has come out with depicting computers, robots, and technologies in general taking over the world. The author of this article, Bill Joy, appears to be a very intelligent individual. He claims he was already reading by the age of 3, which is something very hard to imagine given that I myself have a 4 year old who is just beginning to learn her letters. Not only did he begin to read early, he skipped a grade and immersed himself into books. While growing up, he was very interested in science and technologies, and excelled in mathematics. While attending the University of Michigan as an undergraduate student, he discovered computers and found something that was much more interesting. He described computers as “a machine into which you could put a program that attempted to solve a problem, after which the machine quickly checked the solution. The computer had a clear notion of correct and incorrect, true and false”.
Mr. Joy defines GNR, which stands for genetic, nanotechnology, and robotics, and is claimed to be potentially so powerful that it can spawn entire new classes of abuse and accidents. He theorizes that robots could conceivably, one day, be an upgrade to the human body, and that humans could begin to resemble robots. This is a little far fetched in my opinion. Yes, prosthetics could conceivably play a larger part in medicine, giving the opportunity to some individuals of a better standard of life, but to suggest that we may all one day become part robots is a quite improbable.
Genetic engineering is also on his road-map for what the future may hold. Crop engineering increases crop yield, and by the same token, reduces harmful pesticides. This could bring about the creation of new plants, animals, bacteria, and viruses. These changes in biological science are immense, and could bring about real change to what we consider to be life. We must determine to what extent we should explore such innovations. To me, this is a very valid concern; who knows what the limits of genetic engineering may be, or to what extent they may change life as we know it. Where is the line in the sand drawn to conclude science has gone far enough, and what governing body will govern this revolution?
The nuclear, biological, and chemical agents created in the 20th century have produced weapons of mass destruction and have primarily been the product of government and military laboratory deployment. Now that we have arrived in the 21st century, this has become commercialized as science has shown clear commercial use. Anyone can appreciate its potential for destruction. Even in today's world, the thought of such technology falling into the wrong hands is a terrifying prospect, and one that is very real.
The numerous concerns that Mr. Joy lays out are well founded. As technology marches on, and new inventions streamline our modern world, concerns as to where they may take us, and what dangers might await us are real issues that will, and must, be addressed. In the article, it referred to President Reagan's missile defense system called Star Wars, which was conjured up to protect us from our own destructive inventions. This was a shield that would reflect away any attempt by the Soviet Union to launch a nuclear attack on the United States. As we all know, this was never actually implemented, but is serves as a stern reminder of how destructive our own inventions could be, and the steps that may be necessary in the future to protect us from our own inventions.
The world and technology will continue to march on, and for each new invention, or the progression of existing technologies, there will inevitably be good and bad that arrive from both. What mankind chooses to do with those technologies is totally up to us. In my view, there is real concern for what the future may hold, and how governments will meet the challenges of these problems. But, as in anything, the hope for a better tomorrow and an improved world will, hopefully, be the outcome as we move into the future.
Mr. Joy defines GNR, which stands for genetic, nanotechnology, and robotics, and is claimed to be potentially so powerful that it can spawn entire new classes of abuse and accidents. He theorizes that robots could conceivably, one day, be an upgrade to the human body, and that humans could begin to resemble robots. This is a little far fetched in my opinion. Yes, prosthetics could conceivably play a larger part in medicine, giving the opportunity to some individuals of a better standard of life, but to suggest that we may all one day become part robots is a quite improbable.
Genetic engineering is also on his road-map for what the future may hold. Crop engineering increases crop yield, and by the same token, reduces harmful pesticides. This could bring about the creation of new plants, animals, bacteria, and viruses. These changes in biological science are immense, and could bring about real change to what we consider to be life. We must determine to what extent we should explore such innovations. To me, this is a very valid concern; who knows what the limits of genetic engineering may be, or to what extent they may change life as we know it. Where is the line in the sand drawn to conclude science has gone far enough, and what governing body will govern this revolution?
The nuclear, biological, and chemical agents created in the 20th century have produced weapons of mass destruction and have primarily been the product of government and military laboratory deployment. Now that we have arrived in the 21st century, this has become commercialized as science has shown clear commercial use. Anyone can appreciate its potential for destruction. Even in today's world, the thought of such technology falling into the wrong hands is a terrifying prospect, and one that is very real.
The numerous concerns that Mr. Joy lays out are well founded. As technology marches on, and new inventions streamline our modern world, concerns as to where they may take us, and what dangers might await us are real issues that will, and must, be addressed. In the article, it referred to President Reagan's missile defense system called Star Wars, which was conjured up to protect us from our own destructive inventions. This was a shield that would reflect away any attempt by the Soviet Union to launch a nuclear attack on the United States. As we all know, this was never actually implemented, but is serves as a stern reminder of how destructive our own inventions could be, and the steps that may be necessary in the future to protect us from our own inventions.
The world and technology will continue to march on, and for each new invention, or the progression of existing technologies, there will inevitably be good and bad that arrive from both. What mankind chooses to do with those technologies is totally up to us. In my view, there is real concern for what the future may hold, and how governments will meet the challenges of these problems. But, as in anything, the hope for a better tomorrow and an improved world will, hopefully, be the outcome as we move into the future.
Sunday, March 25, 2012
Module 11
The movie I chose to watch is War Games. This is a movie that I really enjoyed watching as a kid, but one that I did not fully grasp or follow at that age. After watching the movie again, the plot and story line made much more sense with my background in computer science.
The story begins with a simulation of a nuclear attack against the United States from the Soviet Union. A large computer named the “WAPR” sits at NORAD and monitors and simulates WWIII, and how to respond to such an attack. A teenage boy named David, who is a computer junkie, breaks into his school database via a dial-up connection and changes his grades, along with his friend Jennifer's, after hacking the password from the principal's office. He also breaks in to the Pan-AM database and creates reservations for himself and Jennifer to fly to Paris just for fun. His computer is constantly dialing phone numbers, and finds a response from a computer in Sunnyvale, California which has a list of games to play. However, he is unable to access them due to being unable to get past the security. He visits a couple of his computer programming friends and they suggest the concept of a back door; one that is placed to bypass front end security and is simply accessed by a password of the programmer's choice. David researches the developer of the program, Professor Falken, and finds out he is deceased, and that his family was killed in an auto accident. He also learns his child’s name is “Joshua” and uses that as the password and successfully enters the back door.
He begins interaction with the computer, as it is one that can think for itself, much like we as humans can think and make decisions on our own. He suggests playing a game, “Global Nuclear War”, and the computer begins by asking him if he would like to be on the side of the United States or the Soviet Union. He responds he would like to be on the side of the Soviet Union, and that he would like to launch a missile attack targeting Las Vegas and his hometown of Seattle. This sets off a fury of excitement at NORAD, as they don’t know this is a simulation and are preparing for an actual attack by the Soviet Union.
At this point, “Joshua”, the program running the whole operation, has stolen the launch codes from NORAD, and is simply waiting for Death Con 1 which is required to launch the missiles. David and Jennifer find out that Professor Falken is actually still alive, and pay him a visit at his home on a small Island off the coast of Oregon, as they believe he is the only one who can stop “Joshua” from going through with the game and launching the nuclear missiles. “Joshua” begins another simulation that launches 300 missiles, which takes NORAD to Death Con 1, and enables a full scale nuclear response. Professor Falken and David make an entrance into NORAD just in time. As all the gates and doors are closed, they convince the general that this is simply a simulation and not an actual attack by the Soviet Union. As the screens at NORAD reflect missiles striking the United States at various points, it becomes clear that this is just a simulation. Eventually, David and Professor Falken convince “Joshua” to play a game of tic-tact-toe and teach “Joshua” the notion of futility. This is an important concept of the movie, as when Professor Falken programmed “Joshua”, he was unsuccessful in teaching “Joshua” this concept. This concept is what is necessary for “Joshua” to understand that not all games are winnable.
The use of computers in the movie are for the most part realistic. Back in 1983 when this movie came out, computers and networks were rather elementary compared to today's technologies, but in my estimation, hacking of computer equipment and causing problems was a real problem, just as it is today. The back door notion that was suggested by David's friends is also realistic. This is a concept I have heard of quite a bit though my education in computer science. What classifies as fiction in the movie, is the depiction that a program could actually be developed that can think and make decisions on its own. Even today, I believe this is out of the scope of what technologies are capable of.
The social issue this movies brings up is security. Even though this was simply a game that a young teenager wanted to play, the impact of such a breach of the nuclear network is very frightening. In today's world, with essentially all major components of life tied to networks, databases, and computers, the possibility that an essential infrastructure such as the electric grid being exposed by a terrorist, or a criminal network, is very real, and one that government and business alike should take very seriously. It has been discovered recently that Iran's nuclear program has been compromised by the efforts of US and Israeli personnel who devised a virus to penetrate the Iranian networks and set their nuclear program astray. This is an example of how hacking technologies actually benefit us, but that same virus and technology could just as easily be used in creating destruction. There are already concerns that now the Iranian breach has gone public, this virus could be studied by terrorists to create their own destructive plot against the United States.
The story begins with a simulation of a nuclear attack against the United States from the Soviet Union. A large computer named the “WAPR” sits at NORAD and monitors and simulates WWIII, and how to respond to such an attack. A teenage boy named David, who is a computer junkie, breaks into his school database via a dial-up connection and changes his grades, along with his friend Jennifer's, after hacking the password from the principal's office. He also breaks in to the Pan-AM database and creates reservations for himself and Jennifer to fly to Paris just for fun. His computer is constantly dialing phone numbers, and finds a response from a computer in Sunnyvale, California which has a list of games to play. However, he is unable to access them due to being unable to get past the security. He visits a couple of his computer programming friends and they suggest the concept of a back door; one that is placed to bypass front end security and is simply accessed by a password of the programmer's choice. David researches the developer of the program, Professor Falken, and finds out he is deceased, and that his family was killed in an auto accident. He also learns his child’s name is “Joshua” and uses that as the password and successfully enters the back door.
He begins interaction with the computer, as it is one that can think for itself, much like we as humans can think and make decisions on our own. He suggests playing a game, “Global Nuclear War”, and the computer begins by asking him if he would like to be on the side of the United States or the Soviet Union. He responds he would like to be on the side of the Soviet Union, and that he would like to launch a missile attack targeting Las Vegas and his hometown of Seattle. This sets off a fury of excitement at NORAD, as they don’t know this is a simulation and are preparing for an actual attack by the Soviet Union.
At this point, “Joshua”, the program running the whole operation, has stolen the launch codes from NORAD, and is simply waiting for Death Con 1 which is required to launch the missiles. David and Jennifer find out that Professor Falken is actually still alive, and pay him a visit at his home on a small Island off the coast of Oregon, as they believe he is the only one who can stop “Joshua” from going through with the game and launching the nuclear missiles. “Joshua” begins another simulation that launches 300 missiles, which takes NORAD to Death Con 1, and enables a full scale nuclear response. Professor Falken and David make an entrance into NORAD just in time. As all the gates and doors are closed, they convince the general that this is simply a simulation and not an actual attack by the Soviet Union. As the screens at NORAD reflect missiles striking the United States at various points, it becomes clear that this is just a simulation. Eventually, David and Professor Falken convince “Joshua” to play a game of tic-tact-toe and teach “Joshua” the notion of futility. This is an important concept of the movie, as when Professor Falken programmed “Joshua”, he was unsuccessful in teaching “Joshua” this concept. This concept is what is necessary for “Joshua” to understand that not all games are winnable.
The use of computers in the movie are for the most part realistic. Back in 1983 when this movie came out, computers and networks were rather elementary compared to today's technologies, but in my estimation, hacking of computer equipment and causing problems was a real problem, just as it is today. The back door notion that was suggested by David's friends is also realistic. This is a concept I have heard of quite a bit though my education in computer science. What classifies as fiction in the movie, is the depiction that a program could actually be developed that can think and make decisions on its own. Even today, I believe this is out of the scope of what technologies are capable of.
The social issue this movies brings up is security. Even though this was simply a game that a young teenager wanted to play, the impact of such a breach of the nuclear network is very frightening. In today's world, with essentially all major components of life tied to networks, databases, and computers, the possibility that an essential infrastructure such as the electric grid being exposed by a terrorist, or a criminal network, is very real, and one that government and business alike should take very seriously. It has been discovered recently that Iran's nuclear program has been compromised by the efforts of US and Israeli personnel who devised a virus to penetrate the Iranian networks and set their nuclear program astray. This is an example of how hacking technologies actually benefit us, but that same virus and technology could just as easily be used in creating destruction. There are already concerns that now the Iranian breach has gone public, this virus could be studied by terrorists to create their own destructive plot against the United States.
Sunday, March 11, 2012
Module 10
First off, I will have to say this was a very difficult read for me. The grammar left much to be desired and I had to read the first few paragraphs multiple times just to figure out what the author was talking about. Joe appears to be a futuristic robot that was not yet invented, and merely a story derived from someone's imagination long ago.
Logic appears to be the internal workings of the robot, the “Motherboard” in terms of today's technologies. It provides all of the thinking and decision making for the robot, and processes the inputted information to a state that is comprehensible to the users. This seems to coincide a lot with today’s modern computer. The logic also appears to be capable of input from something similar to a keyboard, as the author eludes to “It looks like a vision receiver used to, only it's got keys instead of dials and you punch the keys for what you wanna get”. I interpreted the tank to be a big database, possibly connected to other databases, that provides information on any subject matter you would like to explore, and even provides current information such as the weather. This appears to me to be a direct relationship with the thought of having information at the touch of your fingertips, which would have been very convenient for someone to conceive that notion long ago. Of course we know this to be very true today; it's called the world wide web. Yesterdays imagination has becomes today's reality. The author also points to a "Station SNAFU" which appears to be like today's modern web cam. This device enabled the robot to connect to other robots across a network and appears to allow live viewing in some fashion or another.
I found it interesting that even back at the time this was written, they were talking about counterfeiting, and the demand for it was one of the popular searches. This is probably something we would think of today as modern Google searches, and while tracking the most popular subjects searched for on the web, counterfeiting seems to come out on a consistent basis. However, we all know this popular search is much different than counterfeiting.
Online baking also appears to be a foretold tale, as there is an instance where circuits are are transferring credit card balances from bank to bank, possibly causing people to go bankrupt. I would have to think that credit cards probably existed back then, or at least the notion of them, but this story goes a step further in the assumption that credit card use was wide spread, maybe to the extent they are used in modern times. This also fits right in with the modern day hacking of computer equipment. Someone appeared to be breaking into the “tank” causing destruction to the banking system. The tank is ordered for immediate shutdown, but it just can not happen. The tank has been doing the computing for businesses for years. This reminds one a lot of today's networks. The loss of technologies or the network to a business would be catastrophic. We have grown so accustomed to technology that our daily lives are immersed in them, so you have to wonder if society could carry on if for some reason it all disappeared one day. It certainly would have a profound effect on the economies of the world, and it may be thought of in terms of large natural disasters like the Great Depression.
Logic in this story is not compatible with what we deem to be computer technologies; it seemed to have a mind of its own, like something that you might consider in a science fiction story of a robot being created that can think and make choices on its own. I'm sure there are programs advanced enough to begin this process, but they are not wide spread and leave a lot to the imagination about the future. It's interesting to think of how advanced and technology driven the world is today, then after reading a story like this, thinking of what someone thought the future may look like, and comparing it to what we may have to look forward to, is just mind boggling. It's hard to imagine that in 50 years we may look back at today’s technologies and laugh at them.
Logic appears to be the internal workings of the robot, the “Motherboard” in terms of today's technologies. It provides all of the thinking and decision making for the robot, and processes the inputted information to a state that is comprehensible to the users. This seems to coincide a lot with today’s modern computer. The logic also appears to be capable of input from something similar to a keyboard, as the author eludes to “It looks like a vision receiver used to, only it's got keys instead of dials and you punch the keys for what you wanna get”. I interpreted the tank to be a big database, possibly connected to other databases, that provides information on any subject matter you would like to explore, and even provides current information such as the weather. This appears to me to be a direct relationship with the thought of having information at the touch of your fingertips, which would have been very convenient for someone to conceive that notion long ago. Of course we know this to be very true today; it's called the world wide web. Yesterdays imagination has becomes today's reality. The author also points to a "Station SNAFU" which appears to be like today's modern web cam. This device enabled the robot to connect to other robots across a network and appears to allow live viewing in some fashion or another.
I found it interesting that even back at the time this was written, they were talking about counterfeiting, and the demand for it was one of the popular searches. This is probably something we would think of today as modern Google searches, and while tracking the most popular subjects searched for on the web, counterfeiting seems to come out on a consistent basis. However, we all know this popular search is much different than counterfeiting.
Online baking also appears to be a foretold tale, as there is an instance where circuits are are transferring credit card balances from bank to bank, possibly causing people to go bankrupt. I would have to think that credit cards probably existed back then, or at least the notion of them, but this story goes a step further in the assumption that credit card use was wide spread, maybe to the extent they are used in modern times. This also fits right in with the modern day hacking of computer equipment. Someone appeared to be breaking into the “tank” causing destruction to the banking system. The tank is ordered for immediate shutdown, but it just can not happen. The tank has been doing the computing for businesses for years. This reminds one a lot of today's networks. The loss of technologies or the network to a business would be catastrophic. We have grown so accustomed to technology that our daily lives are immersed in them, so you have to wonder if society could carry on if for some reason it all disappeared one day. It certainly would have a profound effect on the economies of the world, and it may be thought of in terms of large natural disasters like the Great Depression.
Logic in this story is not compatible with what we deem to be computer technologies; it seemed to have a mind of its own, like something that you might consider in a science fiction story of a robot being created that can think and make choices on its own. I'm sure there are programs advanced enough to begin this process, but they are not wide spread and leave a lot to the imagination about the future. It's interesting to think of how advanced and technology driven the world is today, then after reading a story like this, thinking of what someone thought the future may look like, and comparing it to what we may have to look forward to, is just mind boggling. It's hard to imagine that in 50 years we may look back at today’s technologies and laugh at them.
Sunday, March 4, 2012
Module 9
The Dell laptop build is rather interesting, and one I have often wondered about with the amount of business I perform with them in my job. Dell computers are in constant change to keep up with the changing technologies in the industry. The laptops are engineered and redesigned approximately every twelve months. These Dell engineers are referred to as “original design manufacturer” (ODM). These teams design computers to meet the needs of Dell's customers.
Dell has six factories throughout the world, which are located in Limerick, Ireland; Xiamen, China; Eldorado do sul, Brazil; Nashville, Tennessee; Austin, Texas; and Penang, Malaysia. These factories are closely tied to a supplier logistic center (SLCs), which are owned by suppliers that Dell contracts with and are staging areas for the various parts that make up Dell computers. A Dell laptop begins with a customer order either by phone, or by Dell's website. As soon as that order comes in, the SLCs are aware of it, and prepare what needs to be delivered to the factory based on the components needed to build that specific order. Because of the quantity of Dell computers ordered every day, those suppliers are required to deliver parts to the Dell factories every two hours to keep up with the demand. The various parts that make up a laptop come from hundreds of manufacturers and range from power cords, to motherboards, to wireless cards, and so on. The laptop is then assembled manually by teams within the factories where all the parts are put in place, and any appropriate labeling is placed on the laptop. The laptop is then sent down a conveyor to be burned, this refers to the actual downloading of the operating system, and any software that was ordered with the laptop. Dell has huge banks of servers supplied with the latest software and operation systems it uses to build their computers. The laptop is then placed in protective foam, boxed up and placed on a pallet, and a specific shipping manifest is labeled on the box to detail which pallet it will be on and what the customer's shipping address is. Dell has large 747 aircraft carriers that ship out six days a week from Penang, Taiwan to Nashville, Tennessee, and deliver around 242,506 pounds of computers on a daily basis. The laptop is then shipped to its final destination via UPS.
Unfortunately, Al-Qaeda has benefited from supply chaining in an effort to spread terror to countries and people of the world. Their destructive forces have been brought out largely on the fact they have been so successful in building their terror networks through mobile, self-financing mutant supply chains and collaboration. These supply chains have raised the money necessary to recruit followers, and to stimulate and disseminate ideas for terror. They have also brought upon tools to undertake their acts of violence. Thanks to the internet and satellite, Al-Qaeda has been able to solidify the Muslim identity and solidarity within Muslim countries. This has brought about sympathy for Al-Qaeda and new recruits for its cause of destruction of the western world.
The curse of oil refers to countries who are underdeveloped, anti-democratic, and opposed to drilling the talents and energies of the people. These monarch leaders do not get their revenue from the people through taxation, they simply get it from drilling, so this makes the relationship between ruler and rules highly distorted. Countries who do not focus on tapping the resources of the people have weak, or nonexistent institutions. Countries who do focus on tapping the resources of the people have real institutions, property rights, and the rule of law. It was interesting to read the quote from Nancy Birsdsall in the essay “Saving Iraq from Its Oil” as she points out that “34 less developed countries now boast significant oil and natural gas resources that constitute at least 30 percent of their total export revenue. Despite their riches, however, 12 of these countries annual per capita income remains below $1500” (pg 626). Friedman's argument that countries that have rich oil supplies are cursed because of their lack of effort and resources put in the people, and not solely on the oil, is one that has never really entered my mind. After reading this chapter, I agree with Friedman's assessment that these monarch's will likely continue to thrive with disregard for their people, and without the people benefiting from the natural riches of its resources.
Dell has six factories throughout the world, which are located in Limerick, Ireland; Xiamen, China; Eldorado do sul, Brazil; Nashville, Tennessee; Austin, Texas; and Penang, Malaysia. These factories are closely tied to a supplier logistic center (SLCs), which are owned by suppliers that Dell contracts with and are staging areas for the various parts that make up Dell computers. A Dell laptop begins with a customer order either by phone, or by Dell's website. As soon as that order comes in, the SLCs are aware of it, and prepare what needs to be delivered to the factory based on the components needed to build that specific order. Because of the quantity of Dell computers ordered every day, those suppliers are required to deliver parts to the Dell factories every two hours to keep up with the demand. The various parts that make up a laptop come from hundreds of manufacturers and range from power cords, to motherboards, to wireless cards, and so on. The laptop is then assembled manually by teams within the factories where all the parts are put in place, and any appropriate labeling is placed on the laptop. The laptop is then sent down a conveyor to be burned, this refers to the actual downloading of the operating system, and any software that was ordered with the laptop. Dell has huge banks of servers supplied with the latest software and operation systems it uses to build their computers. The laptop is then placed in protective foam, boxed up and placed on a pallet, and a specific shipping manifest is labeled on the box to detail which pallet it will be on and what the customer's shipping address is. Dell has large 747 aircraft carriers that ship out six days a week from Penang, Taiwan to Nashville, Tennessee, and deliver around 242,506 pounds of computers on a daily basis. The laptop is then shipped to its final destination via UPS.
Unfortunately, Al-Qaeda has benefited from supply chaining in an effort to spread terror to countries and people of the world. Their destructive forces have been brought out largely on the fact they have been so successful in building their terror networks through mobile, self-financing mutant supply chains and collaboration. These supply chains have raised the money necessary to recruit followers, and to stimulate and disseminate ideas for terror. They have also brought upon tools to undertake their acts of violence. Thanks to the internet and satellite, Al-Qaeda has been able to solidify the Muslim identity and solidarity within Muslim countries. This has brought about sympathy for Al-Qaeda and new recruits for its cause of destruction of the western world.
The curse of oil refers to countries who are underdeveloped, anti-democratic, and opposed to drilling the talents and energies of the people. These monarch leaders do not get their revenue from the people through taxation, they simply get it from drilling, so this makes the relationship between ruler and rules highly distorted. Countries who do not focus on tapping the resources of the people have weak, or nonexistent institutions. Countries who do focus on tapping the resources of the people have real institutions, property rights, and the rule of law. It was interesting to read the quote from Nancy Birsdsall in the essay “Saving Iraq from Its Oil” as she points out that “34 less developed countries now boast significant oil and natural gas resources that constitute at least 30 percent of their total export revenue. Despite their riches, however, 12 of these countries annual per capita income remains below $1500” (pg 626). Friedman's argument that countries that have rich oil supplies are cursed because of their lack of effort and resources put in the people, and not solely on the oil, is one that has never really entered my mind. After reading this chapter, I agree with Friedman's assessment that these monarch's will likely continue to thrive with disregard for their people, and without the people benefiting from the natural riches of its resources.
Sunday, February 26, 2012
Module 8
With the ever increasing population of computer technology, it is almost impossible to find an educational establishment that does not use them in one fashion or another. Computers are becoming more important within education as a learning tool for students and educators alike.
As an IT Manager, computers serve a very useful and meaningful purpose in my career, as well as in my day to day life. As my career began about six years ago, I was but an employee, not unlike any other, who was simply doing his best to perform his responsibilities to the best of his ability. I had always had a passion for computers and networks, and desired to work in the field, but with little to no education in the field, the positions I applied for never amounted to much. After a few years of working at my present company, another employee who was primarily responsible for the IT, was let go. The day after he was let go, I was asked to step in and fulfill the void that was now there. I promptly accepted the position, and hit the ground running. It soon became apparent to me that I was truly struggling with the day to day operations that I was confronted with, and knew that I would need to gain a better understanding of the new responsibilities in order to be successful. I decided to go back to school and work towards a degree in the computer science field. I felt this would not only help me with the current challenges I faced at work, but also ensure that I would have a solid foundation for the future, and keep me in the field that I had come to enjoy so much.
As I began my education, I took classes that would prepare me for the A+ exam. These classes were entry level and taught me the fundamentals of hardware and software of the modern computer. Even though I had thought these classes were not necessary for me, I truly learned many different concepts that I might not have ever learned otherwise, and they also gave me a better understanding of troubleshooting concepts that I had been lacking up to that point. After certifying in A+, I moved on to more in-depth classes pertaining to Microsoft, the client and server relationships in Windows XP, and Server 2003. These classes taught me concepts such as implementing and deploying Active Directory policies, DHCP, DNS, FTP, TCP/IP Web Servers, file sharing, TCP/IP and much, much more. These were enjoyable classes as they really dug into the advanced management of the Microsoft operation systems.
As my education continued, I took classes to suit networking and security requirements. These classes, although difficult at times, gave me the knowledge and understanding to tackle and implement networks and security across my environment. The toughest part for me to grasp were the concepts behind symmetric-key and asymmetric-key cryptography, as there are a multitude of different algorithms, hashes involved in encrypting data, and remembering them all and how they function was a real challenge for me. In some of my more recent classes, I have been challenged with programing in C++, Visual Basic, HTML, Java and Java Script. At one point, I felt that it would be a good idea to take an in-depth course on Java, since it seems there is an ever increasing demand for Java developers. However, as one of my professors told me, there is just too much to learn and it would be best to stick with one side of the field. I completely agreed with his assessment, and quickly moved on from that thought in my mind. Even though programming is not my core course of study, I do use and continue to study HTML and Java scripting, as I develop the company's intranet site for the employees.
Up to this point, I would have to say that my favorite class has been studying the open source community, and more specifically, Linux. The class actually had to do with a kernal that I had never used before called Fedora. Although different from Ubuntu, which is the kernel I am used to using, many of the concepts and commands used in Fedora were a great benefit to me. I still refer back often to the notes and key concepts I learned from that class. Mysql, Apache, SAMBA, and SSH are all open source technologies that I have been fortunate enough to study. They have served me well since the core software my employer uses was developed and runs in these environments.
A higher education institution, such as Weber State University, is a great way to gain an education in computer science, but I have come to learn that, at least for me, even with all the education in the world, it's tough to actually implement without the day to day interaction with the terms and concepts that are taught. In this modern age where information that seems to be everywhere, it's hard to discount the opportunities to enhance one's education with books and resources across the web. I have completely taught myself many things that I use today, such as SQL, and continue to do so in other areas that I know will only benefit me down the road. I often tell my coworkers that without my decision to go back to school, I would not be able to perform the responsibilities my job places on me each day, and I am grateful I made the decision to do so.
As an IT Manager, computers serve a very useful and meaningful purpose in my career, as well as in my day to day life. As my career began about six years ago, I was but an employee, not unlike any other, who was simply doing his best to perform his responsibilities to the best of his ability. I had always had a passion for computers and networks, and desired to work in the field, but with little to no education in the field, the positions I applied for never amounted to much. After a few years of working at my present company, another employee who was primarily responsible for the IT, was let go. The day after he was let go, I was asked to step in and fulfill the void that was now there. I promptly accepted the position, and hit the ground running. It soon became apparent to me that I was truly struggling with the day to day operations that I was confronted with, and knew that I would need to gain a better understanding of the new responsibilities in order to be successful. I decided to go back to school and work towards a degree in the computer science field. I felt this would not only help me with the current challenges I faced at work, but also ensure that I would have a solid foundation for the future, and keep me in the field that I had come to enjoy so much.
As I began my education, I took classes that would prepare me for the A+ exam. These classes were entry level and taught me the fundamentals of hardware and software of the modern computer. Even though I had thought these classes were not necessary for me, I truly learned many different concepts that I might not have ever learned otherwise, and they also gave me a better understanding of troubleshooting concepts that I had been lacking up to that point. After certifying in A+, I moved on to more in-depth classes pertaining to Microsoft, the client and server relationships in Windows XP, and Server 2003. These classes taught me concepts such as implementing and deploying Active Directory policies, DHCP, DNS, FTP, TCP/IP Web Servers, file sharing, TCP/IP and much, much more. These were enjoyable classes as they really dug into the advanced management of the Microsoft operation systems.
As my education continued, I took classes to suit networking and security requirements. These classes, although difficult at times, gave me the knowledge and understanding to tackle and implement networks and security across my environment. The toughest part for me to grasp were the concepts behind symmetric-key and asymmetric-key cryptography, as there are a multitude of different algorithms, hashes involved in encrypting data, and remembering them all and how they function was a real challenge for me. In some of my more recent classes, I have been challenged with programing in C++, Visual Basic, HTML, Java and Java Script. At one point, I felt that it would be a good idea to take an in-depth course on Java, since it seems there is an ever increasing demand for Java developers. However, as one of my professors told me, there is just too much to learn and it would be best to stick with one side of the field. I completely agreed with his assessment, and quickly moved on from that thought in my mind. Even though programming is not my core course of study, I do use and continue to study HTML and Java scripting, as I develop the company's intranet site for the employees.
Up to this point, I would have to say that my favorite class has been studying the open source community, and more specifically, Linux. The class actually had to do with a kernal that I had never used before called Fedora. Although different from Ubuntu, which is the kernel I am used to using, many of the concepts and commands used in Fedora were a great benefit to me. I still refer back often to the notes and key concepts I learned from that class. Mysql, Apache, SAMBA, and SSH are all open source technologies that I have been fortunate enough to study. They have served me well since the core software my employer uses was developed and runs in these environments.
A higher education institution, such as Weber State University, is a great way to gain an education in computer science, but I have come to learn that, at least for me, even with all the education in the world, it's tough to actually implement without the day to day interaction with the terms and concepts that are taught. In this modern age where information that seems to be everywhere, it's hard to discount the opportunities to enhance one's education with books and resources across the web. I have completely taught myself many things that I use today, such as SQL, and continue to do so in other areas that I know will only benefit me down the road. I often tell my coworkers that without my decision to go back to school, I would not be able to perform the responsibilities my job places on me each day, and I am grateful I made the decision to do so.
Sunday, February 19, 2012
Module 7
Friedman begins chapter 10 in reference to how once productive countries, such as Mexico, at one time had a tight lid on their exports to the United States. Since the flattening of the world, Mexico has seen a sharp decline in typical goods Americans were accustomed to being seen as Mexican imports. These have now been replaced with exports from China. The same holds true in Egypt, where the fawanis, which has long stood as a traditional lantern in that country, has now been replaced by a Chinese export that is of higher quality and cheaper price. This begs the question, why has China taken a strangle hold on exports to foreign markets? Mexican and Egyptian markets both have cheap labor, so why can they not duplicate China's success? Freidman begins by stating that countries need to be honest with themselves. It's a bit like attending an alcoholic anonymous class; they must first admit to themselves that they have a problem and that they have underperformed in the global market.
Friedman states to answer this question, it really comes down to a country's decision to develop when the world becomes flat. There are four major aspects to accomplish this. First, a county must have the right infrastructure to connect to the rest of the world. The second is the right education system to get more, and the most, out of its people. The third is the governance of the people, meaning the correct fiscal policies and the rule in law must be in place. This one actually makes a lot of sense, but at the same time, China is not a country I associate with having perfected the science of human rights, and getting the most out of its people. The fourth is having the right environment. Countries that preserve their environments, in other words lean towards being “green”, have a much higher probability of attracting knowledgeable workers who are decisive in turning around developing countries. One quote from the book that resonated well was me is “Productivity, growth and, hence, the way out of poverty, is not simply a matter of throwing resources at a problem, say Klein and Hadjimichael. More important, it is a matter of using resources well” (pg 412). I think this holds true in many aspects of a flatter world, and is a simplified answer to why some countries outperform others.
"And the big shall act small” is a quote from Friedman's rules about how companies shall cope. In this respect, companies need to be increasingly mindful about customization on the consumer's part. By “enabling their customers to act very big”, giving the consumer choice is what Friend refers to as the “self-directed consumer”. To answer the question, am I a self-directed consumer? The answer is a resounding yes. The very first thing that enters my mind when I think of this philosophy is Burger King, “have it your way”. Just the other day, I was given the assignment of purchasing some color printers for a couple of our branches. The two main things I was interested were that it could print color, and that it could scan to an FTP site. As I did some comparisons on just one brand (Brother), searching for those features I was in need of, I went through the list and there must have been 30 different models with those options. I thought to myself, why are there so many? This simply complicates my decision. Customization is found in a lot of things we buy, from computers and cars, to food at the grocery store. The options seem to be endless, and I think we, as consumers, demand these type of options in today's flatter world.
In the little bit of international traveling I have done, I did see familiar sites that resonate with American culture, such as McDonalds, Coke, and Hollywood. I would have to say at this point in time, “globalization” does mean “Americanization”. But as Friedman writes, uploading is a powerful tool, one that will continually evolve the way people interact with others at all levels, and I believe this could be a factor in changing the so called “Americanization” in global markets.
Friedman states to answer this question, it really comes down to a country's decision to develop when the world becomes flat. There are four major aspects to accomplish this. First, a county must have the right infrastructure to connect to the rest of the world. The second is the right education system to get more, and the most, out of its people. The third is the governance of the people, meaning the correct fiscal policies and the rule in law must be in place. This one actually makes a lot of sense, but at the same time, China is not a country I associate with having perfected the science of human rights, and getting the most out of its people. The fourth is having the right environment. Countries that preserve their environments, in other words lean towards being “green”, have a much higher probability of attracting knowledgeable workers who are decisive in turning around developing countries. One quote from the book that resonated well was me is “Productivity, growth and, hence, the way out of poverty, is not simply a matter of throwing resources at a problem, say Klein and Hadjimichael. More important, it is a matter of using resources well” (pg 412). I think this holds true in many aspects of a flatter world, and is a simplified answer to why some countries outperform others.
"And the big shall act small” is a quote from Friedman's rules about how companies shall cope. In this respect, companies need to be increasingly mindful about customization on the consumer's part. By “enabling their customers to act very big”, giving the consumer choice is what Friend refers to as the “self-directed consumer”. To answer the question, am I a self-directed consumer? The answer is a resounding yes. The very first thing that enters my mind when I think of this philosophy is Burger King, “have it your way”. Just the other day, I was given the assignment of purchasing some color printers for a couple of our branches. The two main things I was interested were that it could print color, and that it could scan to an FTP site. As I did some comparisons on just one brand (Brother), searching for those features I was in need of, I went through the list and there must have been 30 different models with those options. I thought to myself, why are there so many? This simply complicates my decision. Customization is found in a lot of things we buy, from computers and cars, to food at the grocery store. The options seem to be endless, and I think we, as consumers, demand these type of options in today's flatter world.
In the little bit of international traveling I have done, I did see familiar sites that resonate with American culture, such as McDonalds, Coke, and Hollywood. I would have to say at this point in time, “globalization” does mean “Americanization”. But as Friedman writes, uploading is a powerful tool, one that will continually evolve the way people interact with others at all levels, and I believe this could be a factor in changing the so called “Americanization” in global markets.
Sunday, February 12, 2012
Module 6
Free trade is a policy set by governments that do not discriminate or attempt to control imports or exports to other countries. To determine if free trade is a good or bad policy, is highly dependent on one's perspective.
As an American, the cons against free trade are plentiful. First off, unemployment rates are already high in this country, and in my mind, free trade has something to do with that. Technical jobs, such as phone support, are already being sent in large numbers over to foreign markets such as India. These are American companies that could be supplying American jobs, giving back to the very people that keep them in business. Sure, the wages are much lower overseas, but that does not help a family here in America that has bills to pay. A quote from Friedman resonates with me in this chapter when he states “When you lose your job, the unemployment rate is not 5.2 percent; it's 100 percent” (pg 264). Although I myself have been fortunate enough to have never suffered such a hardship, I feel for those who have. I have had several friends and family members suffer through just an event. One was even directly related to free trade, as it was cheaper to have electrical wire made in another country, so his job was moved.
The positives I see resulting from free trade are lower overall cost for consumers, continued innovation of products, and higher exports for the United States. The increase in exports counteracts some of jobs lost to overseas companies. Free trade also helps developing countries pull out of poverty, as it brings their people opportunities and that they might not have had otherwise and improves their standard of living.
So when asked whether free trade is a good or bad policy, this is a question I have always struggled to answer. I'm not sure that I have completely made up my mind, but I would have to lean toward free trade being the best for all involved in the long run. I believe in freedom and capitalism, and those two things involve free trade.
As the world continues to flatten, free trade opens up, and the types of jobs that were once thought to be untouchable have slowly been reduced. Freidman refers to the “new middler” as the new middle class that will be less vulnerable to downward wage pressures of outsourcing, automation and technological change. He identifies eight traits that will hold up to this logic which I will briefly summarize. Great Collaborators And Orchestrators: This is defined as employees, and especially managers, who communicate well with others, and can orchestrate 24/7 supply chains. The Great Synthesizers: The next new hot selling item or product. People who innovate products or service in ways which you might not necessarily think would go together. The Great Explainers: As we gain more great synthesizers, these jobs will involve people who can explain the complexity, but with simplicity. The Great Leveragers: This refers to people who can design ways of leveraging technology to compete with cheaper foreign labor. The Great Adapters: Are employees who are willing to be adaptable and versatile. People are less likely to have one job that they are loyal to their entire career or the company loyal to the employee. People willing to adapt to change are more likely to find opportunities for success. The Green People: These jobs will involve terms such as “sustainable” and “renewable.” These jobs will become important with the amount of consumption the world experiences every day. Math Lovers: People skilled in math will be required to design and operate the technologies of today, as well as the future. The Great Localizers: This refers to businessmen who operate local small and medium size businesses. They have a major impact on the economy as a whole, and tailor to local needs of the community. Although I feel many of these jobs are an important part of the middle class today, I can certainly see Freidman's point of customizing your traits to satisfy the economies that keep one employed.
Friedman concludes that the equation CQ+PQ>IQ is important in the new flat world. Essentially spelled out, curiosity and passion surpass IQ. This is an interesting theory and one that has not really entered my mind. I would tend to agree with Freidman that curiosity and passion equal production in my mind. IQ is simply a measurement of intelligence, but that does not necessarily translate to productivity. With the wealth of knowledge that is accessible at our fingertips, new passions and curiosities are born. I can relate to this equation in my own life. I certainly do not consider myself to be as intelligent as many others out there, but my passion for my job and curiosity to learn new things in the IT world have driven my productivity and have provided opportunities with my employer which I enjoy today.
As an American, the cons against free trade are plentiful. First off, unemployment rates are already high in this country, and in my mind, free trade has something to do with that. Technical jobs, such as phone support, are already being sent in large numbers over to foreign markets such as India. These are American companies that could be supplying American jobs, giving back to the very people that keep them in business. Sure, the wages are much lower overseas, but that does not help a family here in America that has bills to pay. A quote from Friedman resonates with me in this chapter when he states “When you lose your job, the unemployment rate is not 5.2 percent; it's 100 percent” (pg 264). Although I myself have been fortunate enough to have never suffered such a hardship, I feel for those who have. I have had several friends and family members suffer through just an event. One was even directly related to free trade, as it was cheaper to have electrical wire made in another country, so his job was moved.
The positives I see resulting from free trade are lower overall cost for consumers, continued innovation of products, and higher exports for the United States. The increase in exports counteracts some of jobs lost to overseas companies. Free trade also helps developing countries pull out of poverty, as it brings their people opportunities and that they might not have had otherwise and improves their standard of living.
So when asked whether free trade is a good or bad policy, this is a question I have always struggled to answer. I'm not sure that I have completely made up my mind, but I would have to lean toward free trade being the best for all involved in the long run. I believe in freedom and capitalism, and those two things involve free trade.
As the world continues to flatten, free trade opens up, and the types of jobs that were once thought to be untouchable have slowly been reduced. Freidman refers to the “new middler” as the new middle class that will be less vulnerable to downward wage pressures of outsourcing, automation and technological change. He identifies eight traits that will hold up to this logic which I will briefly summarize. Great Collaborators And Orchestrators: This is defined as employees, and especially managers, who communicate well with others, and can orchestrate 24/7 supply chains. The Great Synthesizers: The next new hot selling item or product. People who innovate products or service in ways which you might not necessarily think would go together. The Great Explainers: As we gain more great synthesizers, these jobs will involve people who can explain the complexity, but with simplicity. The Great Leveragers: This refers to people who can design ways of leveraging technology to compete with cheaper foreign labor. The Great Adapters: Are employees who are willing to be adaptable and versatile. People are less likely to have one job that they are loyal to their entire career or the company loyal to the employee. People willing to adapt to change are more likely to find opportunities for success. The Green People: These jobs will involve terms such as “sustainable” and “renewable.” These jobs will become important with the amount of consumption the world experiences every day. Math Lovers: People skilled in math will be required to design and operate the technologies of today, as well as the future. The Great Localizers: This refers to businessmen who operate local small and medium size businesses. They have a major impact on the economy as a whole, and tailor to local needs of the community. Although I feel many of these jobs are an important part of the middle class today, I can certainly see Freidman's point of customizing your traits to satisfy the economies that keep one employed.
Friedman concludes that the equation CQ+PQ>IQ is important in the new flat world. Essentially spelled out, curiosity and passion surpass IQ. This is an interesting theory and one that has not really entered my mind. I would tend to agree with Freidman that curiosity and passion equal production in my mind. IQ is simply a measurement of intelligence, but that does not necessarily translate to productivity. With the wealth of knowledge that is accessible at our fingertips, new passions and curiosities are born. I can relate to this equation in my own life. I certainly do not consider myself to be as intelligent as many others out there, but my passion for my job and curiosity to learn new things in the IT world have driven my productivity and have provided opportunities with my employer which I enjoy today.
Sunday, February 5, 2012
Module 5
Friedman defines “Triple Convergence” as the convergence of all ten previously discussed flatteners all rolled into one around the year 2000. They work in way that creates a new, flatter global playing field. Businesses and individuals adopted new skills and processes to get more out of what they had.
In convergence I, the ten flatteners had to spread out, take root and converge with others to be most effective. In Friedman's example, “Southwest Airlines realized that there were enough PCs around, enough bandwidth, enough software know-how for Southwest to create a work flow system that empowered its customers” (pg 203). You might also simulate this too home banking, where no longer do you need to visit a bank to perform a transaction. Instead, banking is available online, and can be accessed from computers and mobile devices for the same reasons Southwest was able to offer e-tickets to their customers.
Convergence II is the process of habits changing to get the most out of the new technology. Friedman points to electricity and the main frame computers as examples. Productivity did not instantly improve on either front, it took time for habits to change and old technology to wither its way out. This is a good point Friedman makes, as any time new technology comes out, it does not provide instant gratification. Time and habits must change to make the most of it.
Convergence III is the explosion of new players in the playing field. China, India, and the Soviet Union now joined North America, Western Europe and Japan on this playing field. This created new processes and collaboration that has had a great impact on the global economy.
In the story about India and Indiana, who is the exploiter and who is the exploited party? That is a tough question to answer. First off, I believe it was simply political suicide for any politician to even remotely consider the notion of awarding a huge software contract to an agency that completely owes its existence to the very act that created it in the first place. Not only was the State of Indiana and the department it needed the software for adding to their workload by awarding the contract to India based Tata Consultancy Service, it could have minimized its own cost in the size of the project by putting Indiana citizens to work. As I read the chapter, it came as no surprise to me the outrage and political wrangling that followed. If not for the death of the late Governor, he probably would have never seen another term anyway. As stated in the book, it all depends on one's perspective. From the Indian's perspective, they were simply bidding for a contract in which they were in business to perform. If you're an auto mechanic, you give bids to fix vehicle, regardless of whose car it is. This contract was to bring in new opportunities for employment for the India based company, and bring new profits for the company itself. From the perspective of Indiana state, this was only a partial win. Sure, they would have saved millions of tax dollars, but were they helping out the very citizens that put those dollars in the tax bucket, and they were serving the very people who put those state officials in office. I believe in the end, the people of Indiana were being exploited, and the government was not serving the people they were sworn to serve. The decision simply came down to the almighty dollar, and from a business perspective, that is generally what it is about, and most times rightfully so. However, from a government perspective, this can not, and should not, be top priority.
Intellectual property is the property of an individual or company that potentially requires protection for the financial benefit. It becomes important by the fact that as more and more resources become digitized, and shared across the web, ideas and innovations become exploited by others. In becomes an important question as to where the line is drawn, at what point does a an idea or invention become property of an individual, and when is it simply the open source to those who learn about it and exploit it for there own benefit. This brings to mind the story of Facebook. You may have heard about the lawsuit against Facebook founder Mark Zuckerberg by three of his former Harvard classmates who accused Zuckerberg of stealing their ideas. A fourth student filed a petition with the U.S. Patent and Trademark Office, claiming he created an online facebook first. This sort of legal rambling will only continue to grow as the line between invention and ownership remains a gray issue.
In convergence I, the ten flatteners had to spread out, take root and converge with others to be most effective. In Friedman's example, “Southwest Airlines realized that there were enough PCs around, enough bandwidth, enough software know-how for Southwest to create a work flow system that empowered its customers” (pg 203). You might also simulate this too home banking, where no longer do you need to visit a bank to perform a transaction. Instead, banking is available online, and can be accessed from computers and mobile devices for the same reasons Southwest was able to offer e-tickets to their customers.
Convergence II is the process of habits changing to get the most out of the new technology. Friedman points to electricity and the main frame computers as examples. Productivity did not instantly improve on either front, it took time for habits to change and old technology to wither its way out. This is a good point Friedman makes, as any time new technology comes out, it does not provide instant gratification. Time and habits must change to make the most of it.
Convergence III is the explosion of new players in the playing field. China, India, and the Soviet Union now joined North America, Western Europe and Japan on this playing field. This created new processes and collaboration that has had a great impact on the global economy.
In the story about India and Indiana, who is the exploiter and who is the exploited party? That is a tough question to answer. First off, I believe it was simply political suicide for any politician to even remotely consider the notion of awarding a huge software contract to an agency that completely owes its existence to the very act that created it in the first place. Not only was the State of Indiana and the department it needed the software for adding to their workload by awarding the contract to India based Tata Consultancy Service, it could have minimized its own cost in the size of the project by putting Indiana citizens to work. As I read the chapter, it came as no surprise to me the outrage and political wrangling that followed. If not for the death of the late Governor, he probably would have never seen another term anyway. As stated in the book, it all depends on one's perspective. From the Indian's perspective, they were simply bidding for a contract in which they were in business to perform. If you're an auto mechanic, you give bids to fix vehicle, regardless of whose car it is. This contract was to bring in new opportunities for employment for the India based company, and bring new profits for the company itself. From the perspective of Indiana state, this was only a partial win. Sure, they would have saved millions of tax dollars, but were they helping out the very citizens that put those dollars in the tax bucket, and they were serving the very people who put those state officials in office. I believe in the end, the people of Indiana were being exploited, and the government was not serving the people they were sworn to serve. The decision simply came down to the almighty dollar, and from a business perspective, that is generally what it is about, and most times rightfully so. However, from a government perspective, this can not, and should not, be top priority.
Intellectual property is the property of an individual or company that potentially requires protection for the financial benefit. It becomes important by the fact that as more and more resources become digitized, and shared across the web, ideas and innovations become exploited by others. In becomes an important question as to where the line is drawn, at what point does a an idea or invention become property of an individual, and when is it simply the open source to those who learn about it and exploit it for there own benefit. This brings to mind the story of Facebook. You may have heard about the lawsuit against Facebook founder Mark Zuckerberg by three of his former Harvard classmates who accused Zuckerberg of stealing their ideas. A fourth student filed a petition with the U.S. Patent and Trademark Office, claiming he created an online facebook first. This sort of legal rambling will only continue to grow as the line between invention and ownership remains a gray issue.
Sunday, January 29, 2012
Module 4
In today's world, electronic data is growing and compounding at ever increasing rates. The majority of us deal with electronic data on a daily basis, whether it be through songs, pictures, documents on one's own computer, to banking account information, electronic transactions, websites, e-mail, Facebook, and of course all the data that is produced at businesses on a daily basis. The challenge is how to protect that data from potential loss.
Most computer users are familiar with the problem of lost data. Fortunately, most incidents are relatively inconsequential, representing only a few minutes of lost work or the deletion of unnecessary files. However, sometimes the nature of the lost data is critical, and the cost of the data lost is substantial. As reliance on information and data as economic drivers for businesses continues to increase, owners and managers are subject to new risks. One study reports that a company that experiences a computer outage lasting for more than 10 days will never fully recover financially, and that 50% of companies suffering such a predicament will be out of business within 5 years.
The cause for data loss varies, but can be broken down into six distinct categories, according to a study done at Pepperdine University. The most significant cause for data loss is hardware failure, which accounts for approximately 40% of all data loss incidents. Typically, as you might expect, most of these losses are a result of hard drive failure, which causes the data to be unreadable. In second place is human error, which accounts for 29% of all data losses. After human error, the remaining four reasons drop off considerably; 13% are caused by software corruption, 9% by theft, 6% by viruses, and 3% from hardware destruction.
I, myself, being in the IT industry and the primary person responsible for data protection for the Credit Union I work for, I understand the the challenges and immense responsibility placed upon me for protecting our data from a variety of scenarios that may arise. Fortunately for me, I have had many hours of training in this area, and I am lucky enough to have a good friend Micah Marsden who is a graduate of Weber State University with a BA in telecommunications administration, and who I was fortunate enough to interview for this project. He is now a Sustaining Engineer at Quantum Corporation, and helps IT managers like myself deal with backup issues and design on a daily basis. He stated that data protection is a key issue of concern and cost for businesses. Not only does it consume a large amount of resources and time for companies, the potential devastating impact from poor design or implementation is all too widespread. He pointed out a problem far to many companies neglect to take seriously, which is that they simply set up their backup plan, implement it, and forget about it. Protecting data is an ongoing job, and requires daily monitoring and intervention. First off, he said one the simplest things any backup administrator can do is to observe the backup logs on a daily basis. Jobs that are supposed to run daily can run into problems, or simply not run at all. Another aspect that is neglected far too often is disaster recovery drills. He encourages IT staff to perform mock disaster recovery drills on at least an annual basis, and preferably more often than that. Practice makes perfect, and in a stressful situation where data is required to be recovered quickly, there is no substitute for actually performing the job at hand. He further states, the technologies out there are numerous, and can be tailored to fit budgets, recovery time and expertise. They can range from a simple home backup plan of taking personal computer data and backing up to a second hard drive, to backing up to the cloud, to complicated and expensive disk and tape based solutions.
Micah's favorite technology used today is what is referred to as data deduplication. This technology allows companies to backup to a local disk by either gigabyte cat5 or fiber channel, and uses what is referred to as block-level deduplication. Block-level data deduplication operates on the sub-file level. As its name implies, the file is typically broken down into segments that are examined for redundancy when compared to previously stored information. This allows backups to be much more efficient when it comes to retention and cost. I, myself, have been so impressed with this technology that I have implemented it in my own environment and have been very happy with the results. I am now able to keep approximately four months worth of backups on a single unit and without having to use an exorbitant amount of disk space to accomplish it. Not only does this save storage, I am also able to duplicate the data to tape for off-site storage.
Most computer users are familiar with the problem of lost data. Fortunately, most incidents are relatively inconsequential, representing only a few minutes of lost work or the deletion of unnecessary files. However, sometimes the nature of the lost data is critical, and the cost of the data lost is substantial. As reliance on information and data as economic drivers for businesses continues to increase, owners and managers are subject to new risks. One study reports that a company that experiences a computer outage lasting for more than 10 days will never fully recover financially, and that 50% of companies suffering such a predicament will be out of business within 5 years.
The cause for data loss varies, but can be broken down into six distinct categories, according to a study done at Pepperdine University. The most significant cause for data loss is hardware failure, which accounts for approximately 40% of all data loss incidents. Typically, as you might expect, most of these losses are a result of hard drive failure, which causes the data to be unreadable. In second place is human error, which accounts for 29% of all data losses. After human error, the remaining four reasons drop off considerably; 13% are caused by software corruption, 9% by theft, 6% by viruses, and 3% from hardware destruction.
I, myself, being in the IT industry and the primary person responsible for data protection for the Credit Union I work for, I understand the the challenges and immense responsibility placed upon me for protecting our data from a variety of scenarios that may arise. Fortunately for me, I have had many hours of training in this area, and I am lucky enough to have a good friend Micah Marsden who is a graduate of Weber State University with a BA in telecommunications administration, and who I was fortunate enough to interview for this project. He is now a Sustaining Engineer at Quantum Corporation, and helps IT managers like myself deal with backup issues and design on a daily basis. He stated that data protection is a key issue of concern and cost for businesses. Not only does it consume a large amount of resources and time for companies, the potential devastating impact from poor design or implementation is all too widespread. He pointed out a problem far to many companies neglect to take seriously, which is that they simply set up their backup plan, implement it, and forget about it. Protecting data is an ongoing job, and requires daily monitoring and intervention. First off, he said one the simplest things any backup administrator can do is to observe the backup logs on a daily basis. Jobs that are supposed to run daily can run into problems, or simply not run at all. Another aspect that is neglected far too often is disaster recovery drills. He encourages IT staff to perform mock disaster recovery drills on at least an annual basis, and preferably more often than that. Practice makes perfect, and in a stressful situation where data is required to be recovered quickly, there is no substitute for actually performing the job at hand. He further states, the technologies out there are numerous, and can be tailored to fit budgets, recovery time and expertise. They can range from a simple home backup plan of taking personal computer data and backing up to a second hard drive, to backing up to the cloud, to complicated and expensive disk and tape based solutions.
Micah's favorite technology used today is what is referred to as data deduplication. This technology allows companies to backup to a local disk by either gigabyte cat5 or fiber channel, and uses what is referred to as block-level deduplication. Block-level data deduplication operates on the sub-file level. As its name implies, the file is typically broken down into segments that are examined for redundancy when compared to previously stored information. This allows backups to be much more efficient when it comes to retention and cost. I, myself, have been so impressed with this technology that I have implemented it in my own environment and have been very happy with the results. I am now able to keep approximately four months worth of backups on a single unit and without having to use an exorbitant amount of disk space to accomplish it. Not only does this save storage, I am also able to duplicate the data to tape for off-site storage.
Sunday, January 22, 2012
Module 3
When I first read the question asking what offshoring was, I really had no idea. Was it maybe something to do with oil, I asked myself? After reading the assigned chapters, the answer became quite clear. As stated before, outsourcing is the contracting out of services or goods, that a lot of times is not central to the business, or that the business simply does not have the expertise in. An example is outsourcing payroll due to budgetary or expertise restraints. Offshoring is quite different, offshoring is when the entire operation of a company is physically moved to a new location to produce a product in the very same way. Obviously, the reason for moving is for cheaper cost to produce the product. This comes through cheaper labor, lower taxes, government subsidization, and lower health care cost. In Friedman's example, China has been the beneficiary of such practices. He states that China will soon be setting the global floor for lower wages and workplace conditions; this is as known as “the China price”. Products being produced at rock bottom prices in China have proven to be damaging to the US economy and it's job market. On the flip side, the benefit to consumers in the US has been significant. I, being a consumer, enjoy the reduced pricing of these goods, but they come at a cost, and that cost may ultimately be continued reduction of jobs in this country.
Supply-chaining is a method of collaboration among retailers, suppliers, and customers to keep a competitive edge. In Freidman's example, he uses the largest, most well known, retailer to deliver his point, that being Wal-Mart. Wal-Mart does not create a single product, but simply acts as a supply chain to deliver products at the most competitive price possible. The key is “global optimization”, which means Wal-Mart focuses on all aspects of delivering the product to market. For example, If I'm the product manager, you want to do business with the most reliable trucking company. If I'm the transportation manager, I'm looking for the lowest cost of transporting goods. Those two trucking companies might not necessarily be the same. One key aspect of Wal-Mart's success is its ability to coordinate distribution supply with hard to predict demand. Wal-Mart wants their customers to find what they need when they want it, but at the same time they don't want any particular product stacking up at one location, while having too few of the same product at another location. These same aspects could certainly be applied to other large retailers in the industry. Home Depot, Lowe's, and Best Buy are all likely to have been built on the same type of business model, and is probably a big reason they are so successful today.
How has Google affected business? Friedman describes it as “informing”. Informing is uploading, outsourcing, insourcing, supply-chaining, and offshoring all rolled into one. It can also be described as simply searching for knowledge. Google has essentially change the way consumers search for products. Seldom do we reach for the yellow pages to find the a local repair shop, or locate a restaurant in an unfamiliar area. What do we do? We get on the computer, or a mobile device, and simply Google it. Not only can consumers search for a particular business on demand, they can also research product. When you wanted to find in-depth information about a particular product before Google, there were essentially three methods; one being word of mouth, second was what the sales associate told you about the product (an we can certainly rely on them), and third was maybe a magazine like Consumer Reports. Now what do you do if you want specific information about a product, or you want to find what the best brand is? Well, you simply Google it, look at specifications, and see what others have had to say about the product. When buying a brand new car, it's not difficult to go out and find what a car dealership paid for the vehicle, and this becomes a huge bargaining chip. It was interesting to note that Friedman stated “Google hopes that in time, with a Palm Pilot or a cell phone, everyone everywhere will be able to carry around access to all the world's knowledge in their pockets”. Well, today as we read this assignment, we are at that point. Android devices and iPhones have changed the way we live, and information is portable like never before. I often chuckle anytime I see an expensive set of encyclopedias sitting on a bookshelf or laying around. I think to myself, why do you need that, the world now has Google and the Internet, where anything you could possibly want to know is instantly at your fingertips, and is current.
Supply-chaining is a method of collaboration among retailers, suppliers, and customers to keep a competitive edge. In Freidman's example, he uses the largest, most well known, retailer to deliver his point, that being Wal-Mart. Wal-Mart does not create a single product, but simply acts as a supply chain to deliver products at the most competitive price possible. The key is “global optimization”, which means Wal-Mart focuses on all aspects of delivering the product to market. For example, If I'm the product manager, you want to do business with the most reliable trucking company. If I'm the transportation manager, I'm looking for the lowest cost of transporting goods. Those two trucking companies might not necessarily be the same. One key aspect of Wal-Mart's success is its ability to coordinate distribution supply with hard to predict demand. Wal-Mart wants their customers to find what they need when they want it, but at the same time they don't want any particular product stacking up at one location, while having too few of the same product at another location. These same aspects could certainly be applied to other large retailers in the industry. Home Depot, Lowe's, and Best Buy are all likely to have been built on the same type of business model, and is probably a big reason they are so successful today.
How has Google affected business? Friedman describes it as “informing”. Informing is uploading, outsourcing, insourcing, supply-chaining, and offshoring all rolled into one. It can also be described as simply searching for knowledge. Google has essentially change the way consumers search for products. Seldom do we reach for the yellow pages to find the a local repair shop, or locate a restaurant in an unfamiliar area. What do we do? We get on the computer, or a mobile device, and simply Google it. Not only can consumers search for a particular business on demand, they can also research product. When you wanted to find in-depth information about a particular product before Google, there were essentially three methods; one being word of mouth, second was what the sales associate told you about the product (an we can certainly rely on them), and third was maybe a magazine like Consumer Reports. Now what do you do if you want specific information about a product, or you want to find what the best brand is? Well, you simply Google it, look at specifications, and see what others have had to say about the product. When buying a brand new car, it's not difficult to go out and find what a car dealership paid for the vehicle, and this becomes a huge bargaining chip. It was interesting to note that Friedman stated “Google hopes that in time, with a Palm Pilot or a cell phone, everyone everywhere will be able to carry around access to all the world's knowledge in their pockets”. Well, today as we read this assignment, we are at that point. Android devices and iPhones have changed the way we live, and information is portable like never before. I often chuckle anytime I see an expensive set of encyclopedias sitting on a bookshelf or laying around. I think to myself, why do you need that, the world now has Google and the Internet, where anything you could possibly want to know is instantly at your fingertips, and is current.
Sunday, January 15, 2012
Module 2
Friedman gives a very good example of work flow software on a larger scale than what I am going to discuss in my essay, but it serves as a different perspective in the varieties of circumstances that could pertain to this subject. I work at a local credit union, and was fortunate enough to actually be part of the designing phase team. As you might expect, the credit union's primary business goal is to make loans. Up until a few years ago, our core software lacked some critical functions that we felt were needed, not only for our membership, but for the employees as well. The piece of software I am referring to is built on Java, and has four major steps involved; I'll simply refer to it as our loan module.
Step one of our loan module begins when a member either fills out a loan application online, or applies in person at one of our branches. Once the application is entered online and submitted, it then becomes an XML file, which serves as a stream line to the core software. Once the application is received, step two occurs, which is pulling a credit report on the applicant. When a report has successfully been pulled, different scoring models then load up and take into account several different factors. One major one you may be familiar with is the FICO score, which is better known as your credit score. Once these complicated calculations take place, it then proceeds onto step three, which is the review stage. This stage involves another set of complicated calculations which is called a scoring model. This model either approves or denies the loan based off of a variety of data. Should an application be automatically denied (which a large percentage are, unless very strict guidelines are met), and it exceeds the loan officer's lending limit, the application will be placed in a queue for a manager review and decision. At any point during this process, should an application need to be put on hold, or information needs to be gathered at a later date, the application can be placed in a pending status, and any loan officer an any one of our branches may take ownership of the application and finish it up for the member. The final step in this process involves distribution of the loan. Should the application be approved, checks are disbursed, and the loan created. Conversely, should the loan be denied, the proper paperwork is created and distributed to the member. This, of course, is a broad view of the process, but one that I hope serves as a good example of how real world work flow software operates.
Open source software is the result of combined effort on the part of millions of computer programmers, end users, and vendors who all collaborate in an effort to build free software. These open source communities believe software should be free, and used to enhance the lives of users around the world. One of my favorite quotes I have ever read happened to be in this chapter on open source software. In this chapter, Mr. Cohen has just learned about a new piece of software called “Apache”, and he discusses it with his development director who reveals to him it is open source and is free. In his astonishment, he asks the question “well, who supports it if something goes wrong?” And he responds, “I don’t know it just works!” I could not have said it better myself; it just works. Open source software is important because it gives millions of users the ability to freely use and enhance it. Open source software source code is freely distributed, and can be built upon by all those that choose to. It also enables a wider perspective of enhancement, unlike proprietary software, which is developed by a narrow group of developers. It also serves as a start-up, as companies can then develop bells and whistles for open source software that can then be sold for company profit.
Outsourcing is the contracting out of services or goods, generally at a price. In Friedman's example, the Y2K phenomenon required skilled workers to fix the internal clocks that could only read six digits instead of the required eight. The job at hand was so large, the only reasonable answer was to hire India's skilled workforce to fix the problem. This also held benefit, since the cost of outsourcing to India was much cheaper and faster than anything the Americans could accomplish. Outsourcing is important because it allows a business to focus on what it does best, and generally comes with higher quality, and a cost benefit.
My favorite part of this reading assignment was the focus on open source software. As you might have guessed from some of my previous comments, I'm a huge fan. Any time I have the option to use either a proprietary product, such as Microsoft, or open source, the winner is almost always open source. I use it on almost a daily basis. In fact, the very word processor I use to do the majority of my school work on is open source, that being open-office. There is a variety of wonderful open source software available to the public, and I'd encourage all to get familiar with it, and enjoy what software communities have to offer.
Step one of our loan module begins when a member either fills out a loan application online, or applies in person at one of our branches. Once the application is entered online and submitted, it then becomes an XML file, which serves as a stream line to the core software. Once the application is received, step two occurs, which is pulling a credit report on the applicant. When a report has successfully been pulled, different scoring models then load up and take into account several different factors. One major one you may be familiar with is the FICO score, which is better known as your credit score. Once these complicated calculations take place, it then proceeds onto step three, which is the review stage. This stage involves another set of complicated calculations which is called a scoring model. This model either approves or denies the loan based off of a variety of data. Should an application be automatically denied (which a large percentage are, unless very strict guidelines are met), and it exceeds the loan officer's lending limit, the application will be placed in a queue for a manager review and decision. At any point during this process, should an application need to be put on hold, or information needs to be gathered at a later date, the application can be placed in a pending status, and any loan officer an any one of our branches may take ownership of the application and finish it up for the member. The final step in this process involves distribution of the loan. Should the application be approved, checks are disbursed, and the loan created. Conversely, should the loan be denied, the proper paperwork is created and distributed to the member. This, of course, is a broad view of the process, but one that I hope serves as a good example of how real world work flow software operates.
Open source software is the result of combined effort on the part of millions of computer programmers, end users, and vendors who all collaborate in an effort to build free software. These open source communities believe software should be free, and used to enhance the lives of users around the world. One of my favorite quotes I have ever read happened to be in this chapter on open source software. In this chapter, Mr. Cohen has just learned about a new piece of software called “Apache”, and he discusses it with his development director who reveals to him it is open source and is free. In his astonishment, he asks the question “well, who supports it if something goes wrong?” And he responds, “I don’t know it just works!” I could not have said it better myself; it just works. Open source software is important because it gives millions of users the ability to freely use and enhance it. Open source software source code is freely distributed, and can be built upon by all those that choose to. It also enables a wider perspective of enhancement, unlike proprietary software, which is developed by a narrow group of developers. It also serves as a start-up, as companies can then develop bells and whistles for open source software that can then be sold for company profit.
Outsourcing is the contracting out of services or goods, generally at a price. In Friedman's example, the Y2K phenomenon required skilled workers to fix the internal clocks that could only read six digits instead of the required eight. The job at hand was so large, the only reasonable answer was to hire India's skilled workforce to fix the problem. This also held benefit, since the cost of outsourcing to India was much cheaper and faster than anything the Americans could accomplish. Outsourcing is important because it allows a business to focus on what it does best, and generally comes with higher quality, and a cost benefit.
My favorite part of this reading assignment was the focus on open source software. As you might have guessed from some of my previous comments, I'm a huge fan. Any time I have the option to use either a proprietary product, such as Microsoft, or open source, the winner is almost always open source. I use it on almost a daily basis. In fact, the very word processor I use to do the majority of my school work on is open source, that being open-office. There is a variety of wonderful open source software available to the public, and I'd encourage all to get familiar with it, and enjoy what software communities have to offer.
Monday, January 9, 2012
Module 1
Globalization is defined by Friedman as three great eras, with the first beginning in the year 1492. Friedman calls this first era Globalization 1.0. The important event that began this era was the sailing of Columbus and his discovery of the New World. This event opened trade between the Old World and the New World, which shrank the world from size large to size medium. This era was defined by countries and their muscles. The focus was on how much horsepower, wind power, and steam power the countries could produce. Countries asked themselves how they fit in and how to collaborate with other countries. This was prevalent until the year 1800.
The second era, Globalization 2.0, began in 1800. This era was marked by three great events: World Wars I and II, and the Great Depression. This era shrank the world from a size medium to a size small. Driving this era was the introduction of multinational companies. These multinational companies went global for labor and their markets. Global integration was powered by the steam engine, railroad, and later on by diminished communication cost thanks to new technologies such as telegraph, telephones, satellite, and the birth of the World Wide Web. This era marked the true beginning of what we now see today as a global economy. Questions asked in this era were, where does my company fit in this global economy, and how to take advantage of its opportunities. This era lasted until the year 2000.
The third era, Globalization 3.0, began in 2000. This era shrank the world from a size small to a size tiny. This era is driven by a new found force; the power for individuals and small groups to collaborate and compete globally. This phenomenon, which empowers and enjoins individuals and groups globally, is defined by Friedman as the flat-world platform. This convergence of the personal computer and fiber optic communication enabled individuals to become their own author. It enabled endless access to digital content around the world at next to no cost.
In this new era in globalization, companies are ever more outsourcing their needs and resources to more economical and philosophical business needs. With the onset of this new era's developing technologies, it allows for your accountant to be on a sunny California beach while he prepares your taxes, or he might even want to outsource the preparation of them to a company in India. It allows companies to decrease cost by implementing call centers where it is most feasible and cost effective.
Friedman finds that the fall of the Berlin Wall tipped the balance of power across the world toward those in favor of a democratic, consensual, free-market-oriented governance. It took movement away from those who are in favor of an authoritarian rule and centrally planned economies. This brought forth more economies who would be governed from the ground up, by people's interests, demands and aspirations.
The internet, otherwise known as the World Wide Web, was originally designed for scientists to share their research more easily. It was not very useful to the average person upon its invention. The World Wide Web simply consisted of computers, cables, protocols, an imaginary rooms of space containing information. It contained documents, videos, sounds and information, but unless you knew how to specifically access that information through URLs, it had little use. A tiny start-up company in Mountain View, California created a new piece of software that was easy to install and use called Netscape. After its invention, the world would not be the same. The Netscape browser brought the internet alive, and made the internet accessible to everyone. Suddenly, all of those documents, videos, and sound files had a place, and an easy way to access them.
Since the beginning of the third era, as Friedman puts it, things have taken off rather rapidly. In the prior eras, it took years and years for countries and companies to learn how to adapt and evolve. With the speed that information moves in today, it takes a lot more effort to stay on the cutting edge of these technologies. This has brought forth good and bad. It's great to be able to access information whenever one wants or needs it, but it has also brought forth companies moving jobs from the USA to countries with lower wages to save cost. This can be frustrating on two levels; one, the absence of jobs in this country, and second, having to deal with those people over the phone for technical issues.
The second era, Globalization 2.0, began in 1800. This era was marked by three great events: World Wars I and II, and the Great Depression. This era shrank the world from a size medium to a size small. Driving this era was the introduction of multinational companies. These multinational companies went global for labor and their markets. Global integration was powered by the steam engine, railroad, and later on by diminished communication cost thanks to new technologies such as telegraph, telephones, satellite, and the birth of the World Wide Web. This era marked the true beginning of what we now see today as a global economy. Questions asked in this era were, where does my company fit in this global economy, and how to take advantage of its opportunities. This era lasted until the year 2000.
The third era, Globalization 3.0, began in 2000. This era shrank the world from a size small to a size tiny. This era is driven by a new found force; the power for individuals and small groups to collaborate and compete globally. This phenomenon, which empowers and enjoins individuals and groups globally, is defined by Friedman as the flat-world platform. This convergence of the personal computer and fiber optic communication enabled individuals to become their own author. It enabled endless access to digital content around the world at next to no cost.
In this new era in globalization, companies are ever more outsourcing their needs and resources to more economical and philosophical business needs. With the onset of this new era's developing technologies, it allows for your accountant to be on a sunny California beach while he prepares your taxes, or he might even want to outsource the preparation of them to a company in India. It allows companies to decrease cost by implementing call centers where it is most feasible and cost effective.
Friedman finds that the fall of the Berlin Wall tipped the balance of power across the world toward those in favor of a democratic, consensual, free-market-oriented governance. It took movement away from those who are in favor of an authoritarian rule and centrally planned economies. This brought forth more economies who would be governed from the ground up, by people's interests, demands and aspirations.
The internet, otherwise known as the World Wide Web, was originally designed for scientists to share their research more easily. It was not very useful to the average person upon its invention. The World Wide Web simply consisted of computers, cables, protocols, an imaginary rooms of space containing information. It contained documents, videos, sounds and information, but unless you knew how to specifically access that information through URLs, it had little use. A tiny start-up company in Mountain View, California created a new piece of software that was easy to install and use called Netscape. After its invention, the world would not be the same. The Netscape browser brought the internet alive, and made the internet accessible to everyone. Suddenly, all of those documents, videos, and sound files had a place, and an easy way to access them.
Since the beginning of the third era, as Friedman puts it, things have taken off rather rapidly. In the prior eras, it took years and years for countries and companies to learn how to adapt and evolve. With the speed that information moves in today, it takes a lot more effort to stay on the cutting edge of these technologies. This has brought forth good and bad. It's great to be able to access information whenever one wants or needs it, but it has also brought forth companies moving jobs from the USA to countries with lower wages to save cost. This can be frustrating on two levels; one, the absence of jobs in this country, and second, having to deal with those people over the phone for technical issues.
Subscribe to:
Posts (Atom)