HYBRID
CLASS Group Projects
for Fall 2013:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group 1: |
Role of CIO |
|
|
1 |
Katherine Dodd |
||
|
2 |
Jonathon
Anderson |
||
|
3 |
Marissa Denehy |
||
|
4 |
Ryan Hader |
||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Eric Westmoreland |
||
|
2 |
Ann Griner |
||
|
3 |
Kenneth Stecher |
||
|
4 |
Paul
Rhea |
||
|
|
Group 3: |
RFID |
|
|
1 |
Jason Calvird |
||
|
2 |
Jamie Thomas |
||
|
3 |
Suzanne Shinstock-Rains |
||
|
4 |
|||
|
|
Group 4: |
Green IT |
|
|
1 |
Cliff Heeley |
||
|
2 |
Almedina Topalovic |
||
|
3 |
Maggie Schamber |
||
|
4 |
Aliya Mauch |
||
|
|
Group 5: |
Security & Privacy |
|
|
1 |
Chelly
Mitchell |
||
|
2 |
Jennifer Kuehl |
||
|
3 |
Renee Vierling |
||
|
4 |
Amanda Chrismer |
||
|
Group 6: |
Corporate Uses: Social Networks |
||
|
1 |
Alicia Brave |
||
|
2 |
Anthony Cluchey |
||
|
3 |
Jonathan Stern |
||
|
4 |
William Eubanks |
||
|
Group 7: |
Cloud Computing |
||
|
1 |
Antonio Reyes |
||
|
2 |
James Hill |
||
|
3 |
Scott Manns |
||
|
4 |
Reed Eason |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Anna O Shea-Newton |
||
|
2 |
Katie Fogerty |
kmfty5@umsl.edu |
|
|
3 |
James Truschel |
||
|
4 |
Femi Oluwafemi |
DAY
CLASS Group Projects
for Fall 2013:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group 1: |
Role of CIO |
|
|
1 |
Jing Jiang |
||
|
2 |
Yang Xue |
||
|
3 |
Jin Ah Eun |
||
|
4 |
Tiantian Xie |
||
|
5 |
|||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Zhennan Liu |
||
|
2 |
Parimal Kulkarni |
||
|
3 |
Yinglong Wang |
||
|
4 |
Chanya Vonghirunpinyo |
||
|
5 |
Robert Hadley |
||
|
|
Group 3: |
RFID |
|
|
1 |
Jason Koogler |
||
|
2 |
Ala Al-Lozi |
||
|
3 |
Nicole Little |
||
|
4 |
Saleem Chauhan |
||
|
5 |
Amp Boonhai |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Gabriella Agotai |
||
|
2 |
Kai Yu |
||
|
3 |
Shuqin Chen |
||
|
4 |
Yanting Wang |
||
|
5 |
Kai-Lin Cheng |
||
|
|
Group 5: |
Security & Privacy |
|
|
1 |
Hongyun Liu |
||
|
2 |
Olivia Fugate |
||
|
3 |
Matt Hundt |
||
|
4 |
John Teepe |
||
|
5 |
Chad Corno |
||
|
Group 6: |
Corporate Uses: Social Networks |
||
|
1 |
Su Xu |
||
|
2 |
Hisaki
Miura |
||
|
3 |
Yu Han Cheng |
||
|
4 |
Brady Polec |
||
|
5 |
Daniel Bernstein |
||
|
Group 7: |
Cloud Computing |
||
|
1 |
Jeewan Bastola |
||
|
2 |
John Doyle |
||
|
3 |
Benjamin Heimann |
||
|
4 |
Patrick Heisinger |
||
|
5 |
Haishan Zhao |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Clement Odhiambo |
||
|
2 |
Justin Scott |
||
|
3 |
Barbie Ying |
||
|
4 |
Daniel McMillen |
||
|
5 |
John Mueller |
Group
Projects for Spring 2013:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group 1: |
Role of CIO |
|
|
1 |
Pat Aylward |
||
|
2 |
Cat Cook |
||
|
3 |
Jay Culpepper |
||
|
4 |
Laura Hill |
||
|
5 |
Brandon Forte |
||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Colleen Mann |
||
|
2 |
Brandon Richter |
||
|
3 |
Cole Stripling |
||
|
4 |
Robin Thiele |
||
|
5 |
Yao Zhang |
||
|
|
Group 3: |
RFID |
|
|
1 |
Anthony Alexander |
||
|
2 |
Michael Boyer |
||
|
3 |
Matthew Hanebery |
||
|
4 |
Ryan Knibb |
||
|
5 |
Jim Pope |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Anna Curran |
||
|
2 |
Chris Frimel |
||
|
3 |
Robert Levitt |
||
|
4 |
Marc Phillips |
||
|
5 |
Lujun Wang |
||
|
|
Group 5: |
Security & Privacy |
|
|
1 |
Celia Pearson |
||
|
2 |
Mike Purcell |
||
|
3 |
Sarah Rosen |
||
|
4 |
Sruthi Sirpur |
||
|
5 |
Tao Xu |
||
|
Group 6: |
Corporate Uses: Social Networks |
||
|
1 |
Rachelle Cochran |
||
|
2 |
MingMing Ding |
||
|
3 |
Jing Liang |
||
|
4 |
Duangporn Maneesri |
||
|
5 |
Monikka Rinehart |
||
|
Group 7: |
Cloud Computing |
||
|
1 |
Tyler Althage |
||
|
2 |
Paul Buencamino |
||
|
3 |
Taylor Flynn-Elhoffer |
||
|
4 |
Derek Stripling |
||
|
5 |
Yingxing Wang |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Christopher Bettonville |
||
|
2 |
Brian Chackes |
||
|
3 |
Carlos Cuartas |
||
|
4 |
Ngan Nguyen |
||
|
5 |
Group
Projects for Fall 2012:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group 1: |
Role of CIO |
|
|
1 |
Dominguez, Shayelle |
||
|
2 |
Li, Ruyue |
||
|
3 |
Lin, Chia-Chen |
||
|
4 |
Shalenko, Lacey |
||
|
5 |
Zheng, Kangkang |
||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Bannister, Michael |
||
|
2 |
Dou, Han |
||
|
3 |
Liu, Shudi |
||
|
4 |
Mason, Ronald |
||
|
5 |
Jones, Theresa |
||
|
|
Group 3: |
RFID |
|
|
1 |
Dabyshuk, Liudmila |
||
|
2 |
Flynn, Patrick |
||
|
3 |
Long, Jiehan |
||
|
4 |
Naggi, Andrew |
||
|
5 |
Talluto, Peter |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Gavin, Joseph |
||
|
2 |
Han, Shuang |
||
|
3 |
Wang, Hongyuan |
||
|
4 |
Wang, Ruitian |
||
|
5 |
Yu, Tianhui |
||
|
|
Group 5: |
Security & Privacy |
|
|
1 |
Boutaugh,
Bradley |
||
|
2 |
Chen, YingChen |
||
|
3 |
Gomez, Joseph |
||
|
4 |
Sun, Qian |
||
|
5 |
|
|
|
|
Group 6: |
Corporate Uses: Social Networks |
||
|
1 |
El-Shafei, Nadine |
||
|
2 |
Olgundeney, Fahri |
||
|
3 |
Weindel, Cory |
||
|
4 |
Zhang, Jie |
||
|
5 |
Zhang, Min |
||
|
Group 7: |
Cloud Computing |
||
|
1 |
Lehrer, Kurt |
||
|
2 |
O Neill, Timothy |
||
|
3 |
Tran, Tam |
||
|
4 |
Zhang, Ji |
||
|
5 |
Chang, Yu-Chen |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Comrey, Amy |
||
|
2 |
Shah, Vaishali |
||
|
3 |
Yakstis, William |
||
|
4 |
Zhang, Xiao |
||
|
5 |
Group
Projects for Spring 2012:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group: |
Business Intelligence |
|
|
1 |
Mudd Gary |
||
|
2 |
Tham Austin |
||
|
3 |
Chen Ying |
||
|
|
Group: |
Green IT |
|
|
1 |
Doan Mai |
||
|
2 |
Fang Zhen |
||
|
|
Rahn
Diana |
|
|
|
3 |
Ji Tao |
||
|
Group: |
Cloud Computing |
||
|
1 |
Wang Liqi |
||
|
2 |
Zhou Xun |
||
|
3 |
Zhou Ying |
||
|
|
Group: |
IT Entrepreneurs |
|
|
1 |
Brinker Stephen |
||
|
2 |
Ma Teng |
||
|
3 |
Toemsetthacharoen Narinthorn |
Group
Projects for Fall 2011:
|
|
Name: |
Web Address: |
Email Address |
|
|
Group 1: |
Role of CIO |
|
|
1 |
Lawrence
Carson |
||
|
2 |
Jin
Wang |
||
|
3 |
Kai
Wang |
||
|
4 |
Yisu
Liu |
||
|
5 |
|||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Jeremy
Killmer |
||
|
2 |
Curtis
Richards |
||
|
3 |
Yang
Zong |
||
|
4 |
Titan
Sun |
||
|
5 |
|||
|
|
Group 3: |
RFID |
|
|
1 |
Meg
Laflin |
||
|
2 |
Phuc
Tran |
||
|
3 |
Liangwu Xu |
||
|
4 |
Matthieu
Euzenat |
||
|
5 |
Shan
Shen |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Aaron
Bobb |
||
|
2 |
Andrea
Wilson |
||
|
3 |
Yun-Ping
Chen |
||
|
4 |
Jie
Shi |
||
|
5 |
Shea
Mccabe |
||
|
|
Group 5: |
Security & Privacy |
|
|
1 |
Matt
Sinak |
||
|
2 |
Robert
Noonan |
||
|
3 |
Yuan
Chen |
||
|
4 |
Lili Zhao |
||
|
5 |
Zhuojing
Zhang |
||
|
Group 6: |
Corporate Uses of Social Networks |
||
|
1 |
Melanie
Tobin |
||
|
2 |
Maggie
Gotszling |
||
|
3 |
Grace
Geng |
||
|
4 |
Pei-Wen
Hung |
||
|
5 |
Amanda
Libera |
||
|
Group 7: |
Cloud Computing |
||
|
1 |
Jonathan
Ralston |
||
|
2 |
Trevor
Hill |
||
|
3 |
Tanawat Saiyawan |
||
|
4 |
Wanli Chen |
||
|
5 |
Brett
Howell |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Arias
Richie |
||
|
2 |
Nicole
Chamberlain |
||
|
3 |
Patience
Kanyi |
||
|
4 |
Li
Qian |
||
|
5 |
Group
Projects for Spring 2011:
|
|
Last name,
preferred first name |
Web Address: |
Email Address |
|
|
Group 1: |
RFID: |
|
|
1 |
Zellmer, Andy |
||
|
2 |
Aubuchon,Cathleen |
||
|
3 |
Hayashi,Masashige |
||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Kahrs,Mark |
||
|
2 |
Hastings,Corey |
||
|
3 |
Chen, Wei Hsiang |
||
|
|
Group 3: |
Corporate Uses of Social
Media |
|
|
1 |
Woodford,Jennifer |
||
|
2 |
Tumminia,Melissa |
||
|
3 |
Takashima,Yuki |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Hollett,Chloe |
||
|
2 |
Davydenko,Yelena |
||
|
3 |
Abraham, Jino |
||
|
4 |
Pan,Songwei |
||
|
|
Group 5: |
Cloud Computing |
|
|
1 |
Dunham,Erik |
||
|
2 |
Russell,Cara |
||
|
3 |
Ivaniuc,Vladimir |
||
|
4 |
Aryeetey,Gifty |
||
|
|
Group 6: |
IT Entrepreneurs |
|
|
1 |
Awan,Shehak |
||
|
2 |
Daniels,Christine |
||
|
3 |
Rini,Rizwana |
||
|
4 |
Kanjanapradit,Samaporn (Pooh) |
Group
Projects for Fall 2010:
|
|
Last name,
preferred first name |
Web Address: |
Email Address |
|
|
Group 1: |
Role of the CIO: |
|
|
1 |
Kim,Jaebong |
||
|
2 |
Zeng,Xi |
||
|
3 |
Emig,Adam |
||
|
4 |
Min,Yunwei |
||
|
5 |
Jo,Dong Je |
||
|
|
Group 2: |
Business Intelligence |
|
|
1 |
Wan,Xiao |
||
|
2 |
Faradhy,Mohammad |
||
|
3 |
Wacker,Matthew |
||
|
4 |
Crow,Gina |
||
|
5 |
Meyer,Timothy |
||
|
|
Group 3: |
Emerging Technologies:
RFID |
|
|
1 |
Tang,Hao |
||
|
2 |
Shaweddy,Vici |
||
|
3 |
Rudolph,Ashley |
||
|
4 |
Diecker,Daniel |
||
|
5 |
Clark,William |
||
|
|
Group 4: |
Green IT |
|
|
1 |
Li,Chenhao |
||
|
2 |
Wang,Hao |
||
|
3 |
Nicoloff,Scott |
||
|
4 |
Krebs,Alan |
||
|
5 |
Nowicki,Caitlin |
||
|
|
Group 5: |
IT Security & Privacy: |
|
|
1 |
Lin,Jhih-Jie |
||
|
2 |
Ho,Cheng-Hsuan |
||
|
3 |
Daboul,Radwan |
||
|
4 |
Fu,Yongjie |
||
|
5 |
Millstein,Mitchell |
||
|
|
Group 6: |
Emerging Technologies:
Corporate uses Social Networks |
|
|
1 |
Yang,Zhuo |
||
|
2 |
Cai,Linmei |
||
|
3 |
Reynolds,Caitlin |
||
|
4 |
Walker,Colleen |
||
|
5 |
Patel,Nishit |
||
|
|
Group 7: |
Cloud Computing |
|
|
1 |
Chen,Yuewei |
||
|
2 |
Li,Li |
||
|
3 |
Bliven,Victoria |
||
|
4 |
Hilton,Jason |
||
|
5 |
Wolf,Timothy |
||
|
|
Group 8: |
IT Entrepreneurs |
|
|
1 |
Pang,Josephine |
||
|
2 |
Tseng,Chiu Yi |
||
|
3 |
Zhang,Ye |
||
|
4 |
Zhang,Zheng |
||
|
5 |
Kartodirdjo,Krishna |
Group
Projects for Fall 2009:
|
Last name,
preferred first name |
Web Address: |
Email Address |
|
Group 1: |
Role of the CIO: |
|
|
Sands,
|
||
|
Salem,
Dianne |
||
|
Zhang,
Wenyu |
||
|
Halbert, John |
||
|
Chen,
Yiran |
||
|
Group 2: |
E-business |
|
|
Steinbach,
Marie |
||
|
Yunibhand, Papinya |
||
|
Qian,
Jing |
||
|
Zhang,
Jingyao |
||
|
Dai,
Wei |
||
|
Group 3: |
Emerging Technologies:
RFID |
|
|
Schiber, Robert |
||
|
Singh,
Reyesh |
||
|
Li,
Jin |
||
|
Simon,
Lanae |
||
|
Mallikaarachchi, Varuni |
||
|
Group 4: |
Green IT |
|
|
Bray,
Brian |
||
|
Jiang,
Shan |
||
|
Howell,
Louis |
||
|
Baird,Robert |
||
|
|
|
|
|
Group 5: |
IT Security & Privacy: |
|
|
Rottler, Jason |
||
|
Pongtippun, Vijak |
||
|
Huang,
Weiwei |
||
|
Zhao,
Mengmeng |
||
|
Yang,
Ju |
||
|
Group 6: |
Emerging Technologies:
Corporate uses of Blogs & Social Networks |
|
|
Ferguson,
Megan |
||
|
Wongiriyawong, Viwan |
||
|
Wang,
Fan |
||
|
Hoette, Curtis |
||
|
Mirza, Waqas |
||
|
Group 7: |
Open Source Software |
|
|
Mathis,
Mark |
||
|
Raksawin, Chotirat |
||
|
Fang,Su |
||
|
Guo, Jialou |
||
|
|
|
|
|
Group 8: |
IT Entrepreneurs |
|
|
Adeborna, Esi |
||
|
Ge, Peng |
||
|
Hefti, Matthew |
||
|
Pornrutchakit, Athinaree |
||
|
Shi,
Youshun |
Group
Projects for Spring 2009:
|
|
|
|
|
|
|
|
|
|
|
|
|
Last name,
preferred first name |
Web Address: |
Email Address |
|||
|
Group 1: |
Role of the CIO: |
|
|||
|
Adams, Travis |
|||||
|
Grodzinskiy, Lev |
|||||
|
Orange, Aaron |
|||||
|
Blythe, Mark |
|||||
|
Wikandjojo, Poernomo |
|||||
|
Group 2: |
E-business |
|
|||
|
Zhao, Lin |
|||||
|
Grana, Joseph |
|||||
|
Hantal, Shannon |
|||||
|
Mcnamee, Jennifer |
|||||
|
Arifin, Zainal |
|||||
|
Group 3: |
Emerging Technologies:
RFID |
|
|||
|
Kim, Julie |
|||||
|
Harbin, Kristin |
|||||
|
Baker, Nikki |
|||||
|
Tipp, Jessica |
|||||
|
Bright, Lauren |
|||||
|
Group 4: |
Green IT |
|
|||
|
Morris, Stephanie |
|||||
|
Vincenz, Brian |
|||||
|
Herendeen, David |
|||||
|
Cahalin, Matthew |
|||||
|
Fluckey, Jason |
|||||
|
Group 5: |
IT Security & Privacy: |
|
|||
|
Budiono, Irene |
|||||
|
Bruns, Michael |
|||||
|
Rodelas, Christopher |
|||||
|
Hardey, Natalia |
|||||
|
Boyce, Christopher |
|||||
|
Group 6: |
Emerging Technologies:
Business Blogs |
|
|||
|
Ewe, Hong |
|||||
|
Horenkamp, Joseph |
|||||
|
Leesman, Jonathan |
|||||
|
Grzybowski, David |
|||||
|
Painter, Nick |
|||||
|
Group 7: |
Open Source Software |
|
|||
|
Steingrubey, Jacob |
|||||
|
Gao, Shuang |
|||||
|
Jiang, Xianjin |
|||||
|
Hovis, Janice |
|||||
|
Benz, Andrew |
|||||
|
Group 8: |
IT Entrepreneurs |
|
|||
|
Robbins, Craig |
|||||
|
Cave, Abby |
|||||
|
Brown, Jerrod |
|||||
|
Cahill, Ann |
|||||
|
Chimakurthy, Harshavardhan |
|||||
Group
Projects for Fall 2008:
|
Last name, preferred
first name |
Web Address: |
Email Address |
|
Group 1: |
Role of the CIO: |
|
|
Wilkinson,
Sarah |
||
|
Maynard,
John |
||
|
Tsokova, Rositsa |
||
|
Bonnet,
Carine |
||
|
|
||
|
Group 2: |
E-business |
|
|
Allan,
Erin |
||
|
Pan,
Xiaowen |
||
|
Xu,
Elly |
||
|
Chen,
Chen |
||
|
Pak,
Yuliya |
||
|
Group 3: |
Emerging Technologies:
RFID |
|
|
Sengur, Donald |
||
|
Tippett, Allison |
||
|
Claeys, Charlotte |
||
|
Gamu, Tolu |
||
|
Fong,
Teresa |
||
|
Group 4: |
Green IT |
|
|
Dorn,
Mary |
||
|
Turner,
Kris |
||
|
He,
Shixing |
||
|
Lin,
Jia-Ching |
||
|
Motari, Fred |
||
|
Group 5: |
IT Security & Privacy: |
|
|
Shiels, Amy |
||
|
Ataei, Mehdi |
||
|
Xu,
Liang |
||
|
Hargis,
Kyle |
||
|
Lang,
Tom |
||
|
Group 6: |
Emerging Technologies:
Business Blogs |
|
|
Goetz,
Stephanie |
||
|
Lu,
Lu |
||
|
Zhou,
Chun-min |
||
|
Han,
Wendy |
||
|
|
|
|
|
Group 7: |
Open Source Software |
|
|
Faramarzi, Soraya |
||
|
Moon,
Trisha |
||
|
Aditya,
Aditya |
||
|
He,
Henry |
||
|
Vogler, Daniel |
||
|
Group 8: |
IT Entrepreneurs |
|
|
Sprague,
Fletcher |
||
|
Schafers, Jeffrey |
||
|
Sankaran, Sankaran |
||
|
Choketaworn, Kanokwan |
||
|
King,
Michael |
Group
Projects for Winter 2008:
|
Last Name: |
Web Address: |
Email Address |
|
Group 1: |
Role of the CIO: |
|
|
Smith,
Kristen |
||
|
Qu, Qing |
||
|
Dominic, |
||
|
Teske-Black,
Nora |
||
|
Page,
Jennifer |
||
|
Group 2: |
E-business |
|
|
Kazadi,
Mujinga |
||
|
Karaya
Jecinta |
||
|
|
||
|
Safrillah, Nur |
||
|
Group 3: |
Emerging Technologies:
RFID |
|
|
Ladenberger,
Amy |
||
|
Nelson, Kelly |
||
|
|
||
|
Beltran, |
||
|
Godfrey, Stacy |
||
|
Group 4: |
Knowledge
Management/Business Intelligence: |
|
|
Mclain, Cari |
||
|
Becker, Andy |
||
|
Nababan, Baringin |
||
|
|
||
|
Group 5: |
IT Security & Privacy: |
|
|
Meyer, Eddie |
||
|
Wibbenmeyer, Scott |
||
|
|
||
|
|
||
|
|
||
|
Group 6: |
Emerging Technologies:
Business Blogging |
|
|
Gillham, Ben |
||
|
Smith, Matt |
||
|
Gray-lecoz,
Chloe |
|