Description: Moore’s Law & the Productivity Paradox. New technologies will likely allow phenomenal growth to continue. Advances in network technologies & storage, compared to those in chip technology, even more profound.
Description: 13:12 minutes. Video of interview with Michael Porter to discuss the components of his famous strategic model. Porter’s competitive forces model has been used to develop strategies for companies to increase their competitive edge. It also demonstrates how IT can enhance competitiveness.
1. Based on Porter’s model, what are the impact & importance of IT upon corporate strategy implementation and success?
2. According to Porter, IT enhances competitiveness of a firm most critically in:
a. Bargaining power of suppliers, bargaining power of buyers & distribution channels
b. Threat of new entrants & substitute products or services
c. Rivalry between companies
d. All of the above
3. While implementing Porter’s competitive forces model, companies can identify the forces that influence competitive advantage in their marketplace and then develop a strategy. The three classical strategies are:
a. Cost leadership, growth, and differentiation
b. Differentiation, niche, and alliance
c. Differentiation, niche and cost leadership
d. Customer orientation, time, and entry barriers
e. Cost leadership, niche, and increase switching costs
4. Porter’s value chain model divides activities conducted in any manufacturing organization into two parts: primary and support. The goal of value-adding, primary activities is to:
a. Deliver a product or service to the customer.
b. Purchase materials.
c. Process materials into products.
d. Make a profit for the company.
e. Create demand through marketing and sales.
5. Porter’s value chain model divides activities conducted in any manufacturing organization into two parts: primary and support. The primary goal(s) of support activities is to:
a. Enhance the firm’s infrastructure efficiencies (accounting, finance, management)
b. Provide human resources with tools needed to maximize strategic advantage through employees and performance.
c. Engine to power technology development (R&D) and procurement initiatives/activities.
Description: 5:55 minutes. Video with discussion related to the surveillance that is possible through the Internet and unobserved by the one whom is the target of the observation with such things as embedded sensors (ubiquitous computing).
Description: 10:29 minutes. Video with in-depth discussion about the surveillance possible through the use of chips and pervasive computing technology. While there is a security issue associated with this capability, there is a tremendous opportunity for marketers to anticipate needs and future demands. There is extensive application for the good of humanity in such areas as health care, childcare and care of senior citizens. There is also great danger seen by many with the capability to know where someone is at all times.
Description: Definition of pervasive computing is foundational to understanding and application in a business context and is the basis for discussion. It is technology in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone “using” ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so.
Description: Cnet News article related to the hidden risks of outsourcing & especially to overseas locations. The article focuses thought around the potential loss of intellectual property in outsource arrangements. Students should be guided to think critically about this risk & ways to minimize it, if that is even possible. For instance, don’t outsource what can be stolen such as intellectual property. Instead, outsource things that are routine & that can be automated.