Question

In: Operations Management

To what end have billions of dollars have been spent on computer hardware, software, network communications,...

  • To what end have billions of dollars have been spent on computer hardware, software, network communications, and all the other requirements of having world-class technology.
  • Has the money spent on technology allowed businesses to become more profitable?
  • Has the implementation of information technology led to a sustainable competitive advantage?

*300 words

Solutions

Expert Solution

ANS.

Every business owner must decide where to allocate funds, and it can be difficult to reconcile spending a huge amount on IT without seeing immediate returns. But IT is an integral part of nearly all organizations, and can offer widespread and lasting benefits.

Technology should be viewed as both a cost of doing business, and an opportunity to do more.

Some gains that come from well-invested IT dollars are:

  • The ability to reach more potential customers and develop a better business relationship with your consumer base
  • Providing better and unique service to customers
  • Supporting better relationships with key partners
  • Using customer demand to better guide the business
  • Streamlining operations, reducing costs, improving efficiency, maximizing profit, minimizing waste, devoting talent to core business instead of overhead
  • Rising above competitors to establish your business as the most progressive and forward-thinking in the industry

Customer expectations are rising quickly and the bar is always climbing; technology allows your business to compete and rise above in this digital world.

he information revolution is sweeping through our economy. No company can escape its effects. Dramatic reductions in the cost of obtaining, processing, and transmitting information are changing the way we do business.

Most general managers know that the revolution is under way, and few dispute its importance. As more and more of their time and investment capital is absorbed in information technology and its effects, executives have a growing awareness that the technology can no longer be the exclusive territory of EDP or IS departments. As they see their rivals use information for competitive advantage, these executives recognize the need to become directly involved in the management of the new technology. In the face of rapid change, however, they don’t know how.

The information revolution is affecting competition in three vital ways:

It changes industry structure and, in so doing, alters the rules of competition.

It creates competitive advantage by giving companies new ways to outperform their rivals.

It spawns whole new businesses, often from within a company’s existing operations.

An important concept that highlights the role of information technology in competition is the “value chain.”1 This concept divides a company’s activities into the technologically and economically distinct activities it performs to do business. We call these “value activities.” The value a company creates is measured by the amount that buyers are willing to pay for a product or service. A business is profitable if the value it creates exceeds the cost of performing the value activities. To gain competitive advantage over its rivals, a company must either perform these activities at a lower cost or perform them in a way that leads to differentiation and a premium price.


Related Solutions

To what end have billions of dollars have been spent on computer hardware, software, network communications,...
To what end have billions of dollars have been spent on computer hardware, software, network communications, and all the other requirements of having world-class technology. Has the money spent on technology allowed businesses to become more profitable? Has the implementation of information technology led to a sustainable competitive advantage?
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure...
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure your data from hacking? 2-How often do you back up critical data files such as homework files? What type of device do you use for backing up files? Where do you store the backups to ensure they won’t be destroyed if a major disaster (such as a fire) destroys your computer? Do you use online sites for file backups?
What is hardware? What is software? What are the ways that hardware and software communicate with...
What is hardware? What is software? What are the ways that hardware and software communicate with each other? Now, let's go a little further. Can you suggest some things that people do to a computer that they should never do?
List some examples of Computer Hardware and Software and what they would be used for
List some examples of Computer Hardware and Software and what they would be used for
Define wearable technology. Identify the major hardware, software and communications components of Google Glass. What are...
Define wearable technology. Identify the major hardware, software and communications components of Google Glass. What are some of the advantages of using Google Glass, and how will they add value to a customer’s life? What are the major risks associated with Google Glass?
Exponential Functions Computer viruses have cost U.S. companies billions of dollars in damages and lost revenues...
Exponential Functions Computer viruses have cost U.S. companies billions of dollars in damages and lost revenues over the last few years. One factor that makes computer viruses so devastating is the rate at which they spread. A virus can potentially spread across the world in a matter of hours depending on its characteristics and whom it attacks. Consider the growth of the following virus. A new virus has been created and is distributed to 100 computers in a company via...
You are an IT company and want to get a daycare's network design, hardware, software, and...
You are an IT company and want to get a daycare's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. DMZ Architecture: What is your DMZ architecture? What devices and their function are included? How are DMZ devices connected? How are you planning to provide security to protect the DMZ and at the same time maintaining friendly access to customers?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. What’s the difference between IDS and Firewall? What is a promiscuous mode in IDS? What is an in-line mode in IDS? When is appropriate to use one or the other in your network? Specific to a travel agency what firewall & IDS vendors’ such as Palo Alto Networks, Check Point, Cisco, etc., and select product(s) suitable for the travel agency. Justify your...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT