'Technology at the Margins' Excerpt

383 KB | 3 files |  PDF, DOC

Creating technologies that reach a wide range of users and consumers is key in attacking world markets This book excerpt discussed issues surrounding accessibility and usability of your technology products.

In "Technology at the Margins: How IT Meets the Needs of Emerging Markets," authors Sailesh Chutani, Jessica Rothenberg Aalami and Akhtar Badsha explore how organizations in the public, private and nonprofit sectors can remain competitive by offering affordable, accessible and relevant information technologies that meet the needs of the mass market.

Our excerpt comes from the first chapter, entitled "Information and Communication Technologies for Everyone." This chapter examines innovative ways to reach the majority of the world, barriers to success, the current state of information and communication technologies and draws on insights from key areas such as health, education, the environment and finance.

Reprinted with permission of John Wiley & Sons, Inc. Sailesh Chutani, Jessica Rothenberg Aalami, Akhtar Badshah, "Technology at the Margins: How IT Meets the Needs of Emerging Markets," 2010.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Technology at the Margins Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.