Spring 2012 Seminar Course Invites You!


The MIS Seminar Course is being scheduled with a diverse group of information systems practitioners and experts from industry and academia. This course is to familiarize you with contemporary challenges in information systems management. All of you are expected to listen attentively, think critically, and pose constructive questions about the presentations.

Seminar Schedule

1/30 (Mo) Prof. Abbe Mowshowitz


This talk is about the meaning, advantages and disadvantages of virtual organization. Computer-based information systems that can act as mediators and brokers support far reaching innovations in organization and management. Computers mediate between individuals by providing channels of communication in the form of messaging systems; they act as brokers in matching buyers and sellers, employees and employers, resources and work processes, etc. The explosive growth of electronic commerce on the Internet has made such functions commonplace. Computer-based mediation and brokerage lie at the heart of virtual organization, a powerful and flexible mode of organization founded on a separation of requirements from the ways in which requirements are met. Separating these elements allows managers to switch easily from one way of meeting a requirement (e.g., for an employee, a supplier, partner, etc.) to another. Used systematically, switching brings huge increases in productivity provided transaction costs are held in check. The price of this increased efficiency is that, practiced regularly, switching weakens personal loyalty and trust. We will examine socio-technical foundations of virtual organization, some applications of switching, and directions for further research.
2/6 (Mo) Ariful H. Mondal

Analyst, MIS Division, NYPD

Role of Information Technology to Fight Crime The research of criminal activities and study of its uniqueness and inclinations in 21 century is impossible without utilizing the power of information technologies. New information technologies allow dynamically map out the activity of delinquent groups at the fundamentally new level hence, helps to prevent sophisticated delinquency. Knowing where about of an offender no longer requires hours of investigation but, merely few button clicks on a computer. The New York City Police Department (NYPD), established in 1845, is currently the largest municipal police force in the United States (According to USDOJ 2003). Law enforcement and investigation within the five boroughs of New York City is the primary responsibility of NYPD. With the help of Information Technology, NYPD members are capable of solving sophisticated crime faster than ever before. Using Entity Analytics Solutions NYPD monitors the activity of delinquents in real time and by doing so NYPD notifies law enforcement officers, via email, of any new criminal activity of a known recidivist as soon the new data is entered into computer system. Law enforcement officers are also notified when an offender goes to prison, released from prison or moved from one prison to another prison. All these things are possible because todays information technology let us connect to different data source across different Agencies countywide. There are many other computer applications like ADW, RTRD, OMNIFORM in NYPD’s arsenal to fight different types of crime. Today’s world where criminals are committing sophisticated crime using many different means, it is vital to use the muscle of information technology to fight those crimes.
2/21 (Tu) Prof. Kyriacos C. Mouscos

Assoc, Director, CUNY ITS UTMSC

Traffic Simulation Systems We present the basics of the Visual Interactive System for Transport Algorithms (VISTA) software and Dynamic Traffic Assignment (DTA). The CUNY ITS UTMSC has used VISTA for various research projects around the country and in Europe. We will present a few applications of the model that we did to support evacuation, incident management and emergency operations. An evacuation model was developed in Alabama, for the I-65 corridor to evaluate contra flow lanes. In addition, an emergency operations model was developed for Birmingham, Alabama that included the response of emergency agencies to the scene of an accident. In New Jersey we modeled the use of Variable Message Signs to support incident conditions.
2/27 (Mo) Nelson Montesdeoca

Senior Consultant, CAST, Leader in Software Analysis and Management

Analysing Systems at Organizations This talk covers the evolution and evaluation of Information Systems in various technologies in the last twenty years. Our computation techniques have changed from batch process to on-line process, single thread to multi-thread, mainframe to client server, linear sequential programming to object oriented programming and hence to functional programming. How and what companies are doing to centralize process using code analyzer to unify business functions and procedures in order to improve Robustness, Security, Performance, Transferability and Changeability. These factors are directly tied with off-shore development and out sourcing of application in various industries. This talk will basically cover what has happened the last 20 years in the world of computer science and particularly to the programming and analysis of systems in industries, including the current needs to overcome the outsourcing factor that has been happening in the last 5 years.
3/5 (Mo) Gregory Soto

Consultant, Applications Development
Avanade, Inc.

So, you can program, but do you understand my business needs? Management Information Systems have drastically changed the way that organizations make critical decisions that impact day-to-day operations, as well as the long-term strategic roadmaps. Public and private sector organizations have embraced various kinds of information systems, ranging from custom off-the-shelf Enterprise Resource Planning (ERP) products to fully customized solutions developed in-house, in order to be better positioned to more efficiently provide products and services. In this talk, we will be going over case studies that explore some of the challenges that organizations face in embracing new technologies.
3/12 (Mo) Sheng-Min Chen

Analyst, Goldman Sachs

Privacy and Data Security in Business Privacy is a “right” that people no longer are taking for granted. People want to have control over their personal information. They want to be able to choose how third-parties collect, use, and store their information. The growth in electronic communication and data transfer has changed how individuals view privacy and how organizations must protect it. Organizations must use information security principles to make sure they respect a person’s individual privacy choices. Consumer financial information is valuable. In the wrong hands, it can be used to commit identity theft. The U.S. federal government regulates how this information can be used. Private industry also takes steps to guard this information. These laws and standards work together to protect consumers from identity theft. The talk shows how data breach affected major companies such as Epsilon and Choice Point, focusing on the effects of data breach on the companies and the repercussions of data and security breaches on the general public. In addition, it examined the post breach legal obligations related to this issue and how companies have dealt with it.
3/19 (Mo) Odoaren Olivares

QA Automation Analyst,
Bank of America Merrill Lynch

Quality Assurance - Automation Test automation is an important component, and many times, an essential component of a quality assurance framework. For most companies, accelerating the time to market and increasing cost efficiency are critical in obtaining a competitive advantage. QA Automation can help minimize the need of manual testing to achieve Quality Assurance, reducing the cost and improving productivity. This talk will discuss the role of test automation in QA; will go over some of the automation tools, test management tools and frameworks currently being used and how they can be integrated as part of a quality assurance framework.
3/26 (Mo) Off schedule – reserved for schedule change and adjustment.
4/2 (Mo) Dr. Cem Safak Sahin

Senior Research Engineer, BAE Systems

Machine Learning: A Tour through some favorite machine learning techniques, challenges and applications. Machine learning, an important part of practical artificial intelligence applications, is broad research area focused on pattern recognition. This talk will explore the brief introduction to Machine Learning and different applications of machine learning techniques to the fields of robotic, space, finance, etc.
4/16 (Mo) Prof. Abbe Mowshowitz


IBM Gaian Database This talk covers IBM’s Gaian database concept and related research work at the CCNY.
4/23 (Mo) Prof. Jianting Zhang


Recent GIS Applications This talk is about GIS applications with a focus on visual analytics of large-scale public geo-referenced data.
4/30 (Mo) Dr. James Doyle

Client Technical Advisor, IBM

Global Technology Outlook This talk covers various technology predictions from IBM research.
5/7 (Mo) Dr. Daniel Lieuwen

Google Inc.

Google Sqaured Google Squared performs open domain information extraction at massive scale. This talk gives an overview of the techniques used and the user interface developed to help users navigate complex information about multiple comparable entities.
5/14 (Mo) Tony Hon

IBM Global Services

Data Center Networking This talk will explore data center infrastructure challenges organizations facing today. We will discuss traditional and new approaches in design data center networking (DCN) using fabric switching. We will check into design concepts to see how we can address the business needs and challenges. Finally, we will explore some use cases to layout what may be the future of DCN.

Title is tentative until abstract is filled in. Abstract is filled in at least one week before the scheduled talk.

Leave a Comment

Powered by WP Hashcash

59 queries. 0.306 seconds.