ABDUL HANNAN CHOWDHURY, Ph.D. Professor and Dean, School of Business North South University, Dhaka, Bangladesh E-mail: hannan@northsouth.edu Phone: 8852000, Ext.1717 (O), Cell: 01713063097 Permanent Address: Mailing Address: House # 35, Road # 24, Suite # 504 House # 3, Road #78, Apt # 403, Gulshan 2, Dhaka, Bangladesh Gulshan 2, Dhaka-1212, Bangladesh EDUCATION: Post Doctoral Industrial Statistics, (Concentration: Quality Improvement) September 2002 University of Calgary, Alberta
Words: 10312 - Pages: 42
Organizations UC Irvine Title: Competing in Book Retailing: The Case of Amazon.com Author: Shrikhande, Aarti; Gurbaxani, Viijay Publication Date: 11-01-1999 Series: I.T. in Business Publication Info: I.T. in Business, Center for Research on Information Technology and Organizations, UC Irvine Permalink: http://escholarship.org/uc/item/67p057vv Citation: Shrikhande, Aarti, & Gurbaxani, Viijay. (1999). Competing in Book Retailing: The Case of Amazon.com. UC Irvine: Center for Research on Information Technology
Words: 10707 - Pages: 43
curricula in the School of Management at Rensselaer and at other universities who have adopted our teaching materials. As a pioneer in interactive leaning material on product development and manufacturing, I have developed several interactive multimedia cases and collaborated on the development of simulations designed to teach marketing principles and bridge management and engineering disciplines. The simulations teach marketing, design and manufacturing concepts by exposing students to tradeoffs inherent
Words: 9701 - Pages: 39
It is quite normal though for M&A deal communications to take place in a so called 'confidentiality bubble' whereby information flows are restricted due to confidentiality agreements (Harwood, 2005). In the case of a friendly transaction, the companies cooperate in negotiations; in the case of a hostile deal, the takeover target is unwilling to be bought or the target's board has no prior knowledge of the offer. Hostile acquisitions can, and often do, turn friendly at the end, as the acquiror secures
Words: 4999 - Pages: 20
The media’s watching Vault! Here’s a sampling of our coverage. “For those hoping to climb the ladder of success, [Vault's] insights are priceless.” – Money magazine “The best place on the web to prepare for a job search.” – Fortune “[Vault guides] make for excellent starting points for job hunters and should be purchased by academic libraries for their career sections [and] university career centers.” – Library Journal “The granddaddy of worker sites.” – US News and World Report “A killer app
Words: 46382 - Pages: 186
firm a sustained advantage over rivals. Examples of resources are: □ a patent or combination of patents □ ownership of an abundant or especially valuable natural resource □ an established brand □ a dedicated distribution network. Some resources, such as a patent or geographical location, can retain their value over time with little
Words: 11209 - Pages: 45
between equipments 4 Satellite television communication Ans: 3 Q. Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime Record Bureau is the nodal agency mandated to implement the network in all the states. Select the correct answer using the code given below1 2 3 4 1 only 2 only Both 1 and 2 Neither 1 nor 2 Ans: 1 Q. One byte
Words: 9709 - Pages: 39
by grants from the CISE/IRIS/CSS Division of the U.S. National Science Foundation, and the NSF Industry/University Cooperative Research Center, whose members include: ATL Products, The Boeing Company, Canon Information Systems, IBM Global Services, Nortel, Rockwell, Seagate Technology, Sun Microsystems and Systems Management Specialists (SMS). The authors would like to acknowledge the research assistance of Bryan MacQuarrie. They would also like to acknowledge the cooperation and assistance of numerous
Words: 12392 - Pages: 50
CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5
Words: 239887 - Pages: 960
value chain activities, the competitive forces, mobile network portability, and national telecom policy etc. We have conducted the risk analysis of the industry in terms of different analysis tools that is SWOT, PESTEL etc. We have covered in and out of the industry in the part A of our report. In part B, we have analyzed the industry players. We have done TTF of our respective company that we have chosen. Then in part C, we have written the case of the respective company that the group members have
Words: 27987 - Pages: 112