...Bettley-3283-02.qxd 6/6/2005 5:06 PM Page 10 2 Operations-based Strategy Robert H. Hayes and David M. Upton Strategic planning tends to be thought of as a high-level game of chess: a ‘grand plan’ is formulated in the executive suite, and then the implementation of the different moves (the ‘easy part’ of the job) is down loaded to the operations organization. However, the world of strategy from the perspective of operations is usually much messier. The ‘strategy’ is seldom evident until after its implementation is well along. Instead, people throughout the organization are continually identifying opportunities, developing new knowledge and capabilities, and testing out their ideas. Initiatives are undertaken, changed in midcourse as new information becomes available and better ideas surface, and sometimes abandoned so that energy can be focused on a different approach. The battle is won not in the boardroom but in the laboratories, on factory floors, at service counters, and in computer rooms. Operations’ role is larger than just that of implementer of strategy; it is the foundation for – indeed, the driver behind – successful strategic attacks and defenses. The important implication for company leaders: companies that fail to exploit fully the strategic power of operations will be both hampered in their own attacks and vulnerable to those of competitors that do exploit this power. Nowhere is this clearer than in cases where large companies that have established...
Words: 8394 - Pages: 34
...Topic: - Study of various RISC and CISC processors ABSTRACT:- This term paper presents two instructions set architectures, particularly the CISC and the RISC, which have been developed as computer architects aimed for a fast, cost-effective design. Included in this paper are the arguments made for each architecture, and of some performance comparisons on RISC and CISC processors. These data are collected from various papers published concerning the RISC versus CISC discussion. INTRODUCTION: - RISC, or Reduced Instruction Set Computer is a type of microprocessor architecture that utilizes a small, highly-optimized set of instructions, rather than a more specialized set of instructions often found in other types of architectures. Though it may seem less effective for a computational task to be executed with many simple instructions rather than a few complex instructions, the simple instructions take fairly the same amount of time to be performed, making them ideal for pipelining. CISC is an acronym for Complex Instruction Set Computer and are chips that are easy to program and which make efficient use of memory. Since the earliest machines were programmed in assembly language and memory was slow and expensive, the CISC philosophy made sense, and was commonly implemented in such large computers as the PDP-11 and the DEC system 10 and 20 machines HISTORY:- The first RISC projects came from IBM, Stanford, and UC-Berkeley in the late...
Words: 837 - Pages: 4
...First, Dell happened. Dell Computer (www.dell.com) pioneered a new way of making and selling personal computers. Its customers “custom design” their computers over the Internet or phone. Dell reengineered its “supply chain”: It coordinated its efforts with its suppliers and streamlined its order-taking and production process. It can ship a computer within two days of taking an order. Personal computers lose 1 percent of their value every week they sit on a shelf. Thus, having virtually no inventory is a great advantage to Dell. Compaq tried to adopt Dell’s approach, but with limited success. The second shock to Compaq came when it acquired a company even larger than itself—Digital Equipment. Mr. Pfeiffer believed that the purchase of Digital, with its huge and respected technical sales force, opened new opportunities for Compaq as a global service company. But combining the two companies proved to be hugely expensive and extremely complicated. Ultimately Compaq decided to merge with Hewlett-Packard (HP) (www.hp.com) in order to survive. After this merger, HP lost significant market share to Dell because its higher cost structure made it hard to compete with Dell on price. Dell created a buzz in the financial press when it decided to enter the computer printing business—a segment that HP had long dominated. Many predicated that Dell would soon take over printers as well. But just when it appeared that Dell could not be beat, HP regained its footing and...
Words: 283 - Pages: 2
...Immense Dilemma Studying in College Alexander Ontiverios Research Paper March 2012 My Immense Dilemma Studying at School For some students a clean, organized, and quiet environment is essential in order to study, or do research. Recently, I decided to attend DeVry to pursue a very challenging Computer Electronics Engineering program that requires arduous hours of study. Unexpectedly, I found the library to be very problematic and cause me tremendous anxiety because there are too many loud and obnoxious students, too many unclean computer stations, and too many distractions. There are three solutions to this problem such as establishing rules of order, providing clean workstations, and adding more computer stations and laptops. I propose the library establish “Rules of Order” for students to follow, to prevent disruptive, disrespectful, and rude behavior. They should designate quiet zones for serious students who want to study. Students who want to gather and talk to each other can sign up to use the conference rooms a, b, and c for group meetings and discussions. This solution will solve the problem of loud and obnoxious students by having library staff enforce the rules and not tolerate this behavior. Some of these students can be loud and boisterous arguing, or laughing out loud over silly things, engaging in loud serious personal discussions on the phone, and brutally destroying the English language with their odd colloquial speech (unusual mixture of profanity...
Words: 658 - Pages: 3
...When a string of mixed alphabets and numerals is presented for human interpretation, ambiguities arise. The most obvious is the similarity of the letters I, O and Q to the numbers 1 and 0. Therefore, depending on the application, various subsets of the alphanumeric were adopted to avoid misinterpretation by humans. In passenger aircraft, aircraft seat maps and seats were designated by row number followed by column letter. For wide bodied jets, the seats can be 10 across, labeled ABC-DEFG-HJK. The letter I is skipped to avoid mistaking it as row number 1. In Vehicle Identification Number used by motor vehicle manufacturers, the letters I, O and Q are omitted for their similarity to 1 or 0. Tiny embossed letters are used to label pins on an V.35/M34 electrical connector. The letters I, O, Q, S and Z were dropped to ease eye strain with 1, 0, 5, 3,and 2. That subset is named the DEC Alphabet after the company that first used it. For alphanumerics that are frequently handwritten, in addition to I and O, V is avoided because it looks like U in cursive, and Z for its similarity to 2. When a string of mixed alphabets and numerals is presented for human interpretation, ambiguities arise. The most obvious is the similarity of the letters I, O and Q to the numbers 1 and 0. Therefore, depending on the application, various subsets of the alphanumeric were adopted to avoid misinterpretation by humans. In passenger aircraft, aircraft seat maps and seats were designated by row...
Words: 397 - Pages: 2
...dominated by managers who ruled their enterprises from the top down.. Executives were motivated by power, status and money at the expense of the customer and employees. Hierarchical control of the decision-making process resulted in people losing trust in the ability of their leaders to build businesses dedicated to serving the customer. Instead, executives served their financial interests and those of the shareholders. Customers and employees rarely factored into the equation. Ken Olsen, the founder and CEO of Digital Equipment Corporation, was a visionary in many ways. i The products Digital Equipment Corporation produced set the stage for what exists in the computing world today. DEC was a pioneer in computer networking. Digital’s Alta Vista Internet search engine was 30 years ahead of its time, and the VAX minicomputer brought computing out of the large data centers and into the business. Under Ken’s watch, Digital Equipment Corporation grew to $14 Billion in sales and employed 120,000 people, second only to IBM. Ken integrated his personal values and developed a set of principles that he practiced while at the helm of DEC. At the core of Ken’s leadership style were his belief in integrity, truth and honesty. He believed that everyone’s ideas were valuable, and that open discussion would lead to the best solution for the problem at hand. Ken encouraged all employees to go wherever and speak with whoever they needed to to derive the best solution to the...
Words: 1268 - Pages: 6
...It is very important to go through the process of hardening your network. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I choose the network layout workgroup. First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have installed reputable anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then begin the process of hardening it. After you have one good hardened workstation you can use it as a model for all other workstations and laptops. As for the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password for added protection. For the cable modem you should keep all unwanted and unused ports closed. I would also schedule a regular scan of all the systems as part of my maintenance processes. These processes and procedures apply for all hardware devices. Disable remote administration, administration of your router / access point should be "local only", namely, there is no reason to let people from another country have access to your network hardware and If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check...
Words: 290 - Pages: 2
...COMPAQ – DIGITAL MERGING CASE COMPAQ DIGITAL MERGING CASE 1 CONTENTS I. INTRODUCTION II. BEFORE THE MERGER III. DIFFICULTIES OF THE MERGER IV. SUGGESTIONS FOR THE ACHIEVEMENT OF THE MERGER V. CONCLUSION 2 I. INTRODUCTION Jan/1998: Official announcement the merging between Compaq Computer Corporation and Digital Equipment Corporation p g q p p 11/Jun/1998: The approval of the stockholder, the Day-One objective achievement: hi t Over 100,000 employees of the new Compaq were able to access a single email directory via a corporate network that linked it worldwide sites within 60 first minutes of the stockholder vote. 3 II. BEFORE THE MERGER DIGITAL EQUIPMENT CORPORATION: A minicomputers manufacturing 1957 Transferred from computer manufacturing to computing services During 1990s g Mid of 1980s The world’s secondlargest computer maker Jun 1998 The third largest provider of corporate computer services with $1.3 billion profits (at the merger time) Organization and resource: • • In 1997, it had 1,000 sales, production, and service sites all over the world. 70,000 employees (at the merger time) 4 II. BEFORE THE MERGER COMPAQ COMPUTER CORPORATION: Established in 1982 as a manufacturing in clone and sell personal computers. Located in Houston with around 20,000 employees, a haft of total, working there. 20 000 employees total there Competitiveness was as a high-volume and low-cost manufacturer, As the growth of market demand on service characteristic...
Words: 803 - Pages: 4
...Riordan Manufacturing Business Systems Riordan Manufacturing is global plastics manufacturer currently having 550 employees. Riordan Manufacturing is owned by Riordan Industries which is a Fortune 1000 company and has revenue exceeding $1 billion. Riordan Manufacturing has plants in Georgia, Michigan, and China. The company’s research and development teams are located at the corporate headquarters in San Jose, California. Riordan has many customers but their major ones are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers. The plant in Georgia produces plastic beverage containers. Michigan’s plant produces custom plastic parts and China produces plastic fan parts. Riordans future goal is to be focused in reaching and maintaining profitability in assuring the financial and human capital sustains growth. Riordan Manufacturing have three separate entities with their own Finance and Accounting Systems. All input from these locations are kept at the corporate office in San Jose. Each system has all the same components other than EDI (Electronic Data Interchange) and EDSS (Executive Decision Support System) which is only available at the San Jose location. The components each system has is: General Ledger Accounts Payable Accounts Receivable Order Entry Procurement Sales and Purchasing History Payroll Financial Reporting Bar Code Reading As each location was acquired the F&A system’s...
Words: 551 - Pages: 3
...SEIS 640 Paper spring 2013 BAZALIRWA DENIS In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. What are two such problems? A time sharing environment or multi programming is one in which a computer system provides direct communication between the user and the system. It allows many users to share the computer at the same time. One of the problems that may result from the fact that resources are being shared is information theft, this is because all the users are able to access the files that are being shared on the system and so one can easily copy a file and modify it without the knowledge of all the other parties. Such scenarios can result into loss of security confidentiality and integrity since the owner of a file Without being aware of the system used as time-sharing and multiprogramming, may insert or have a secret or confidential data that he wants to remain at the file and also other users may change, add, or even remove some information in the file if they want to, since they have access to all files running on the system The other problem resulting from using such systems is the fact that there could be loss of storage space. Since users have equal privileges to create and access files on the system, then there could be a possibility that the users will create numerous files and eat up the storage space on the system without the...
Words: 1053 - Pages: 5
...Q.1: In Summer 1998, what is the position of the Enterprise Server Group (ESG) in its industry? How has it evolved? Why? Ans: ESG was formed in May 1997, and had an installed base of more than 1.3 million UNIX Systems known was HP-UX, worldwide. On the other hand, Independent software vendors were struggling to cover the development costs for new versions of HP-UX operating systems because HP’s commitment to IA-64 was another challenge for the company. By 1997, HP’s sales were recorded as $10 billion and the total market share was approximately worth more than $60 billion. HP was the leading the category of UNIX server vendor in comparison with revenue from 1993 to 1997. By summer 1998, Sun was leading the UNIX server vendor category. Sun converted the small independent competitors into Solaris UNIX operating systems. The installed base business of these vendors was about 40% of the total market in 1997. Sun had gained the market share with the help of independent vendors by creating a dominant position in Internet market space and taking and advantage of their focus on UNIX. ESG was formed by HP when the company refocused its efforts and resources on enterprise computing. HP innovated ESG, in a unique way of combining both RISC and UNIX which resulted in better performance for the computer systems in comparison with the standard product supplied by third-party suppliers. ESG systems were capable of running complex, mission critical applications used by their customers...
Words: 821 - Pages: 4
...Kudler Fine Foods ACC/542 February 6, 2012 Kudler Fine Foods Kudler Fine Foods (KFF) was founded in 1998 by Kathy Kudler with the opening of the La Jolla, California store. Due to that stores’ success, KFF was able to open a second store in 2000 in Del Mar, California and a third store in 2003 in Encinitas, California. Since its inception in 1998, KFF has proven to be a successful company with continued growth. Resulting from this growth, the need has arisen to evaluate KFF’s current accounting operations as well as how computer systems could be more integrated into the day to day business operations of KFF. As a member of the accounting firm retained by KFF, I will use this brief to assess your current systems, discuss possible technology options, and evaluate potential threats related to your current business model. Business and Accounting Needs of KFF In looking at the business and accounting needs of KFF, I determined you currently use a comprehensive Retail Enterprise Management System (REMS) that has the following financial modules: • General Ledger – Used for financial reporting, budgeting and chart of accounts • Accounts Payable – Used for check printing, cash purchases and tax and freight allocations • Point of Sale (POS) – Captures and reports all retail sales • Bank Reconciliation – Reconciles checks, account deposits, and account balances The REMS has imbedded security features such as passwords, dollar...
Words: 1149 - Pages: 5
...UNIX internet commands have remained mostly the same since the creation of the internet because UNIX is an operating system that can be run on any network server or workstation. From the beginning UNIX was the backbone of the internet. UNIX is what keeps the internet functioning today. The commands have remained mostly the same because even though the internet has emerged the commands have remained the same. UNIX was developed over the past 25 years. The commands are still the same partly because UNIX has a reputation for scalability and stability. This helps to keep up with the times of today’s operating system. I don't believe there was or is a need for change of commands. The same commands are still accessible as they were over 25 years ago. If we take it a step further looking at today’s atmosphere schools for example don’t receive the same funding as they have in the past. Meaning n educational environment their budgets are limited. With UNIX commands remaining the same there is no need for schools to spend resources they don’t have. I also think that the commands have remained the same because computers were not as advanced before as they are now. Computers now can handle UNIX and others alike along with possible upgrades. Unlike many others UNIX can adapt to technology changes without changing itself. However, the internet hasn’t changed since the beginning of time. Throughout the life span of UNIX new protocols were developed and new applications implemented...
Words: 354 - Pages: 2
...Before our beloved operating systems we know today from Microsoft and Apple, the world was introduced to arguably the first operating system when Robert L. Patrick implemented a very primitive operating system for General Motors Research in 1956. His operating system design, labeled GM-NAA I/O (General Motors – North American Aviation Input/Output), consisted of three parts. It received an input, made a computation, and submitted an output. This early operating system allowed each of the (approximately) 40 IBM 704 mainframes to process jobs simultaneously one after another. This was the start of a beautiful component that would give computers a much needed brain and allow man and machine to communicate. Since the time of GM-NAA I/O in 1956, operating systems have quickly, and continuously, evolved to handle the wants and needs of businesses and consumers with little disappointment (The History of Operating Systems). The type of operating system Robert L. Patrick helped develop is called a Batch Operating System, because it runs one job after another in succession without interruption from users. In that time, and with this particular type of operating system, an entire corporate office might utilize a single computer which would be managed by an operator. Anyone requesting a job from the computer would take a punch card to the operator and return later to receive the results of their card. These punch cards were physical cards with holes strategically punched into them...
Words: 979 - Pages: 4
...Kubutona Letuka Week 1 - Homework Exercise 5 Investigation about Kevin Mitnick Background PT2013-0675 C_ITSS311 Born 6-Aug-1963, Kevin Mitnick reached his adolescence in late 70s while living in Los Angeles, when the computing industry was in its infancy and beginning to grow. Kevin grew in a lower-middle-class environment, with his parents having divorced while he was still young. He had an interest in how the telephone network worked and how he could use the telephone network for his benefits (i.e. hacking). By using a personal computer and a modem Kevin was able to commandeer a phone company’s digital central office switch by dialling in remotely, this simple technique allowed Kevin to make free calls and eavesdrop all communications made by every individual. This was the start of his hacking “career”. At the of 17 years old, Kevin was arrested and charged with “destroying data over a computer network”, he spend three months in jail. What did he do? Instead of using his knowledge to explore the various computer adventures, Mr Kevin preferred to rather have a run-in with the police. Time after time he had a collision with the police. His next arrest was in 1983 at the University Southern California, where he was caught trying to gain illegal access to ARPnet using the university’s computer. For the crime committed he was sentenced to six months in prison. When he was released, he had the number plate of his car printed “XHACKER”, but he still had a hacking appetite. A couple...
Words: 935 - Pages: 4