...been very successful because “The online channel has proved very effective for the sale of computer hardware and by 2009 represented about half the sales in this category. After more than a decade of tremendous success selling its PCs only online, Dell started to sell PCs through retail stores such as Wal-Mart in 2007.” Dell’s online supply chain manages through supplier, Dell, and customer. In addition to the retail supply chain, Dell manages through the supplier, Dell, retail store, and customer. Therefore, they are hitting their targets on every end of the market share by being successful in every way. The main supply chain challenges that Dell is now facing is the low-cost hardware. Chopra and Meindl stated, “For low-cost, standardized hardware, however, the online channel is significantly less attractive because its main strength, inventory reduction through aggregation, is not as valuable for low-cost, standardized configurations.” Therefore, Dell is not strong in this area and they are aware of this. In addition, it appears that Dell is not focused in this area as well. Chopra and Meindl suggested, “Online sales allow Dell to significantly improve its performance for high-value, customized hardware in terms of both responsiveness and cost.” Dell is more focused on their success on what they are doing so well which is continuing selling their high-value customized hardware. In fact, if I was a part of their supply chain team I would continue to keep doing the right...
Words: 567 - Pages: 3
...The computer hardware industry consists of companies that manufacture and assemble personal computers, computer hardware, and computer peripherals. This industry is highly competitive, which means that companies must continuously be innovative in order to sustain a competitive advantage. The major companies of this industry include Oracle, IBM, HP, Dell, Apple, and Toshiba. This analysis will focus on computer manufacturing since it is the largest component of the industry, containing 43.7% of the market’s total value. The computer industry has been rapidly growing and shows no signs of slowing despite the recent economic downturn. This report relies on secondary research sources. Many of them from online sources such as; company websites, S&P Net Advantage industry reports and IBISWorld. Primary research includes the IBC mentor and additional faculty and library staff. PEST Political Beginning with the political and legal aspect of PEST, this industry is subject to several regulations. First, like any company in the US, the companies in the computer manufacturing industry must follow GAAP accounting laws. Some companies are subject to regulations regarding ethical business practices such as the Foreign Corrupt Practices Act and the Fair Labor Standards Act. The American Inventors Protection Act of 1999 addresses the rights of inventors as well as how they can effectively submit and use patents. Legal battles among major firms in the industry are quite common and depending...
Words: 2922 - Pages: 12
...Business System Advantage Industry-related computer systems are an important aspect of every business. Every company’s system has specific features that differ from other companies. The two main aspects that make up a company’s computer systems are software and hardware. Depending on the type of company, their software and hardware may be high-end, or low-end. In regards to my company, I usually use high-end software and hardware. Running an online retail store requires the use of many programs at once. Although running an online store might not seem like much work, it requires a great deal of attention. Using high-end hardware and software places my company at an advantage. According to Technology Guide 1: Computer Hardware, the author states, “In many industries, exploiting computer hardware is a key to achieving competitive advantage” (Rainer & Cegielski, 2011, Technology Guide 1: Computer Hardware). Business System Specifications In regard to my company’s personal computing software and hardware, we use several devices that run off different applications. One of the hardware devices we use is a phone system called MagicJack. “Magicjack is a device about the size of your thumb which plugs into a USB drive in your computer” (Block, 2010, para. How does the magic work?). This hardware device requires a software application to be installed on our computers that enable a phone to be connected to receive phone-calls. Whenever a customer calls our toll-free number, a dial-pad...
Words: 758 - Pages: 4
...SITUATION ANALYSIS In 1984, at the age of 19, Michael Dell founded Dell Computer with a simple vision and business concept; that personal computers could be built to order and sold directly to customers. Michael Dell believed his approach to PC manufacturing had two advantages: (1) bypassing distributors and retail dealers eliminated the markups of resellers, and (2) building to order greatly reduced the costs and risks associated with carrying large stocks of parts, components, and finished goods. Now, that concept picked up and arrived at Dell being the multi-billion dollar leading computer manufacturer in the world with 2001 revenues reaching $32 Billion and return on investment of 335%. However, things started to plummet by 2001 and Dell experienced, for the first time, a -10% decline in sales and unprecedented cutthroat competition from HP and IBM. Dell Corp. had to make difficult decisions on how to sustain its profitability in light of its broad product portfolio - PCs, workstations, servers and storage products for a broad cross-section of customers in the United States and worldwide. Fueled with ambition and determination, Michael Dell is set to maintain his company's leading position in these tough times. Dell, facing a predicament of whether they should maintain their strategic course or fundamentally change it in order to achieve the targeted growth rates, managed to acquire three important strategic options: 1) Focus only on the four major core products (Desktops...
Words: 1665 - Pages: 7
...Have you ever wondered how using a computer actually accomplishes tedious tasks? Tasks including connection to the internet, moving a file from one location to another, or having the ability to use a video application that helps interact with family in remote locations. If the needs of a computer were adequate enough to produce one specific function, such as typing, than the technologies we have now would not exist. The computers of today need to perform expeditious data processing for extensive data tasks. That’s approximately three billion calculates per second on just your average household computer. (Tymann 2008). This is all accomplished by programmable chip sets known as central processing units. Programmable codes within the central processing units are known as complex instruction set computing and reduced instruction set computing. Technologies in the present and the future depend on these architectures for expedited growth, without them society will halt in technological advances. These computing architectures provide the foundations of computer processing, although each having their specific advantages, disadvantages, pros, and cons. Information technology is rapidly growing, providing users and businesses a means to share digital data. Businesses gear towards investing money in all aspects of information technology systems to provide services for their customers. Users use computers as a means to communicate with family or watch the latest movie over the internet...
Words: 2285 - Pages: 10
...objectives of a security program that must be used in harmony to assure an information system is secure and usable. 2. If the C.I.A. triangle is incomplete, why is it so commonly used in security? The CIA triangle is commonly used in security because it addresses the fundamental concerns of information: confidentiality, integrity and availability. It is still used when not complete because it addresses all of the major concerns with the vulnerability of information systems. 3. Describe the critical characteristics of information. How are they used in the study of computer security? Availability - enables users who need to access information to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format. Accuracy- free from mistake or error and having the value that the end-user expects. If information contains a value different from the user’s expectations due to the intentional or unintentional modification of its content, it is no longer accurate. Authenticity - the quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. Confidentiality - the quality or state...
Words: 1295 - Pages: 6
...(NAS) is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance, a specialized computer built from the ground up for storing and serving files, rather than simply a general purpose computer being used for the role. All depends how much money you have to spend. The high end commercial stuff is actually where the fastest networking interfaces in the world exist. The way manufacturers make NAS devices can be classified into three types: Computer based NAS—Using a computer (Server level or a personal computer), installs FTP/SMB/AFP... software server. The power consumption of this NAS type is the largest, but its functions are the most powerful. Some large NAS manufacturers like Synology, QNAP and ASUStor make these types of devices. Max FTP throughput speed varies by computer CPU and amount of RAM. Embedded system based NAS—Using an ARM, MIPS... embedded system and RTOS to run a NAS server. The power consumption of this NAS type is fair, and functions in the NAS can fit most end user requirements. Marvell, Oxford, and Storlink make chipsets for this type of NAS. Max FTP throughput varies from 20 MB/s to 120 MB/s. ASIC based NAS—Provisioning NAS through the use of a single ASIC chip, using hardware to implement TCP/IP...
Words: 375 - Pages: 2
...Chapter 11: Green Computing Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Prof. Chih-Shun Hsu Department of Information Management Shih Hsin University Outline 1. 2. 3. 4. 5. 6. Abstract Green computing architecture Regulations and industry initiatives Approaches to green computing Conclusion Reference 2 1. Abstract 1. Abstract • In 1992, the US Environmental Protection Agency launched Energy Star, a voluntary labeling program which is designed to promote and recognize energy efficiency in monitors, climate control equipment, and other technologies. • “Green computing" was probably coined shortly after the Energy Star program began. • Energy management has always been an important topic for laptop manufacturers, who have been working on this for years as they struggled to manage weight versus battery life issues. 3 1. Abstract Definition of Green Computing • Green computing is the study and practice of using computing resources efficiently. • The primary objective of such a program is to account for the triple bottom line (or "People, Planet, Profit"). • Modern IT systems rely upon a complicated mix of people, networks and hardware; as such, a green computing initiative must be systemic in nature, and address increasingly sophisticated problems. 4 1. Abstract Green Computing Regula-ons and industry ini-a-ves Government Industry Green Compu-ng Approaches ...
Words: 4836 - Pages: 20
...The ESP servers as a way to identify risks and to ensure a contingency plan is in place to protect the availability, integrity, and confidentiality of the Riordan organization's information technology (IT) system. The ESP benefits all employees however it is most beneficial to information resource managers, computer security officials, and administrators as it is a good tool to use for establishing computer security policies. The ESP in its basic form is a systematic approach to addressing the company’s network, its capability, the threats it is susceptible to and a mitigation strategy that addresses those threats if and should they occur. In addition to addressing the threats the ESP will also make provisions for establishing contingency plans in case of a disaster. The information covered by this plan includes all information systems, IT resources, and networks throughout the Riordan global organization owned or operated by employees in the performance of their job duties, whether written, oral, or electronic. Further it establishes an effective set of security policies and controls required to identify and mitigate vulnerabilities that exist in practically all computer systems and in the current security policies and controls that guard them. This ESP will focus on four (4) primary vulnerabilities, their risks, and the associated threats to the areas of: • Equipment Security • Network Security • Database Security • Physical security A list of all the risks identified...
Words: 2085 - Pages: 9
...Practical 1 Practical 1.1 : Basic of Cluster Computing 1. INTRODUCTION 1.1 Background study Parallel computing has seen many changes since the days of the highly expensive and proprietary super computers. Changes and improvements in performance have also been seen in the area of mainframe computing for many environments. But these compute environments may not be the most cost effective and flexible solution for a problem. Over the past decade, cluster technologies have been developed that allow multiple low cost computers to work in a coordinated fashion to process applications. The economics, performance and flexibility of compute clusters makes cluster computing an attractive alternative to centralized computing models and the attendant to cost, inflexibility, and scalability issues inherent to these models. Many enterprises are now looking at clusters of high-performance, low cost computers to provide increased application performance, high availability, and ease of scaling within the data center. Interest in and deployment of computer clusters has largely been driven by the increase in the performance of off-the-shelf commodity computers, high-speed, low-latency network switches and the maturity of the software components. Application performance continues to be of significant concern for various entities including governments, military, education, scientific and now enterprise organizations. This document provides a review of cluster computing, the various types...
Words: 5312 - Pages: 22
...Questions: 1. Use a table to identify the software products sited above that fall within the following categories of software: a. System software • An operating system built up to control and operate the hardware system • Low -level software – manage computer resources at low level • Running application software • CRM • Ie. Linkers, loaders, compilers, b. General purpose software • Allowing users to accomplish simple computer related tasks • Word processing software • Internet explore c. Application specific software • For an end user • Document and management system • Ie. Database system, communications, games, operating system 2. Use a second table to identify and explain the various elements in the total cost of software ownership and then list the steps taken by the CIO to limit the firm’s software TCO expenditures. Elements in the total cost of software ownership: Software and Hardware upgrades Specific time for IT people renew their hardware and software. For example, the company was using windows 6, they might seek for a better system, thus, they purchase windows 7. Training Hiring MIS or IT personnel Training employees with their technology Sale Price Original price, licensing Steps: CIO to limit the firm’s software TCO expenditures: (Development) Estimating -> Collecting -> Analyzing -> innovating (Procurement )> Training -> Established Estimate scope and establish...
Words: 565 - Pages: 3
...serves overseas customers from worldwide and target mainly USA and European markets. UCP has adapted many information technology (IT) systems on product design, packaging design. However, the protection on intellectual property is not safety enough that makes UCP loss much on product design being stolen. Moreover, due to UCP aged system infrastructure, UCP was suffered from high cost on power consumption, slow system response on reporting and low reliability support. This term paper would describe the current business problems related to IT and provide suggestions in order to operate in effectively and efficiency. 2. Background of United Chinese Plastics International Limited 3. Basic Operation Work Flow: I. Customer requests quotation 3D plastic drawings II. Designers prepare their design work out based on requests via CAD software III. After confirmed by customer, UCP would produce prototype as confirmation. IV. Customer confirms prototype as mass production V. Production process planning and material planning VI. Computer-aided manufacturing (CAM) 4. IT systems in UCP There are mainly four major systems for plastic manufacturing plus five people design team works system a.) SCM (Supply Chain Management System) b.) MRP (Material Resource Planning System) c.) ECNs (AutoCAD) d.) OMS (Order Management System) 5. Current IT Problems on UCP a.) The designed projects file without being well protected There are five designers who are responsible to product...
Words: 1405 - Pages: 6
...Capital IQ INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals April 2015 ANGELO ZINO, CFA Equity Analyst www.spcapitaliq.com 2 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals PERFORMANCE Sector Overview Industry Overview Revenues Expenses Profits & Margins Valuation Capital Markets INDUSTRY PROFILE Trends INQUIRIES & CLIENT SUPPORT 800.523.4534 clientsupport@standardandpoors.com SALES 877.219.1247 wealth@spcapitaliq.com Key Ratios And Statistics CONTACTS How The Industry Operates How To Analyze This Industry Glossary Industry References Comparative Company Analysis MEDIA Michael Privitera 212.438.6679 michael.privitera@spcapitaliq.com S&P CAPITAL IQ 55 Water Street New York, NY 10041 All of the views expressed in these research reports accurately reflect the research analyst’s personal views regarding any and all of the subject securitiesor issuers. No part of the analyst’s compensation was, is, or will be, directly or indirectly, related to the specific recommendations or views expressed in this research report. For important regulatory information, go to www.standardandpoors.com and click on Regulatory Affairs and Disclaimers. Copyright © 2015 Standard & Poor’s Financial Services LLC, a part of McGraw-Hill Financial. All rights reserved. 3 April 2015 INDUSTRY SURVEYS Technology Hardware, Storage & Peripherals TOPICS COVERED...
Words: 29719 - Pages: 119
...1 The volatility and evolution of computer industry Starting from 1976, Apple computer created the personal computer (PC). After IBM transformed the PC from proprietary systems into open structure, PC has been dominated by Wintel (Windows + Intel) structure. Apple insists in adopting proprietary and niche market strategies made them keep losing market share till less than 3% in 2001. However, its strategy with ignoring the market trends makes it lose the market after years. 1.1 Industrial changes: Apple lost PC market because of ignoring industrial changes The PC industry has evolved in the past decades. There are 3 phases. Let’s take a look at these phases and Apple’s position in each phase. Before 1981: Proprietary Systems. Every PC producer had to develop self own hardware and software. It was proprietary. Most buyers were technical people. There were 2 main streams in the market: Apple style machine and IBM style machine. During this period, Apple was the leader. Its strong developing ability made the Apple II became a family commodity. However, Apple didn’t use patent or trade secret to protect its products. Many computer companies re-engineered Apple II and made cheaper similar products to compete in the market. For example, Acer copied Apple II and developed the Little Professor Series. 1981- 1997: Open structure. IBM turned the PC into open structure. Compaq, HP and many other producers started to show in the market to produce IBM compatible PC...
Words: 3744 - Pages: 15
...Case 5: "Dell Inc. in 2008: Can it Overtake Hewlett Packard as the World Leader in Personal Computers?" 1 Question 1: a. 1992: Michael Dell becomes the youngest CEO of a Fortune 500 company at age 27 b. Michael Dell has been the key factor for Dell, Inc. growing into the corporation it is today. In my oppinion, his top 5 key strengths that helped Dell, Inc. grow include: i. Competitive nature ii. Foresight & Vision iii. Willingness to take risks iv. Aggressiveness v. Ability to execute c. 5 Tasks of Crafting and Executing Strategy: i. Developing a Strategic Vision: Dell's vision was to be the low cost provider. This is arguably the most important key to Dell's success. He decided this was the direction the company was going to go and stuck with it, and his ability to reduce overhead allowed him to achieve it. ii. Setting Objectives: Dell's objective was focused on increasing margins, while keeping the end price low. He was able to achieve this by cutting out the middle-men and selling directly to the end user. iii. Crafting a Strategy: All of Dell's strategies were geared towards increasing the bottom line. If it didn't align with the overall goals, the idea was rejected. iv. Implementing and Executing: Dell's ability to stay ahead of the curve by offering completely customizable PCs build to the customers specification allowed the company to maintain the explosive growth it saw in the early years of...
Words: 1839 - Pages: 8