Sunday 27 January 2013

Chapter 5

Chapter 5

FIVE CHIEF in ORGANIZATION


      In order to achieved successful of the strategic initiatives, a company should have a good organization so that the will reduce the miss communication problem amongst their workers. Most organization will have Chief Executive Officer (CEO), Chief Financial Officer (CFO), and Chief Operation Officer. These organization will add some officer who are more related to the IT strategic which are Chief Information Officer (CIO), Chief Security Officer (CSO), Chief Technology Officer (CTO) , Chief Privacy Officer (CPO), and Chief Knowledge Officer. 

1.Chief Information Officer (CIO)
CIO is responsible overseeing all uses of information technology and ensuring the uses of IT is related with business goal and objectives. CIO will report directly to the CEO. Under CIO there will be a manager who are conduct all the IT project to be on time and within budget. There will also have a leader so that the strategic vision of IT is in line with the company strategic vision.

2.Chief Technology Officer (CTO)
CTO is the person who responsible about the throughput, speed, accuracy and availability. The function of CTO are similar with CIO except the CIO have additional responsibility which is make sure IT are aligned with company strategic initiatives.

3.Chief Security Officer (CSO)
CSO is like the policeman of the company's IT system. They are responsible to make sure that the IT system of the company are safe against attack from hackers and viruses. The employment of the CSO are being increased every year because of the number of hackers and viruses. Most CSO must have the ability to create a security system and also the ways to solve the attack and viruses.

4.Chief Privacy Officer (CPO)
CPO are responsible to ensure the ethical and legal use if information within an organization. Usually they are only dealing with the internal staff because only them are using the information. This position is the newest position in IT. Many CPO employed are lawyers by training which enabling them to understand the often complex legal issue surrounding the use of information.

5.Chief Knowledge Officer (CKO)

CKO are responsible in collecting, maintains and distributing the organization's knowledge. CKO also will create the system so that the information can stored easily and can be reuse knowledge. The CKO also must make sure that all the employees are update the organization.

Effectiveness Of Facebook Advertising

                      Effectiveness Of Facebook Advertising


One of the main reasons for which Facebook advertising can be effectiveness for your business is that you can reach hundreds of millions of Internet users in one place. More than that, you have the tools to choose the people you want to advertise to according to many different criteria, in a way that it is almost guaranteed that only the people interested in your business will view your ad. This doesn't happen with Google AdWord advertising service, for example, where targeting options are a lot less limited. 

While many people complain about Facebook’s ever-evolving privacy policies related to users’ data, businesses can benefit tremendously from all the specific information available. Facebook uses the data that people provide and makes it available to businesses for advertising purposes. And Facebook users give away a lot of information, from where they live and work, their birthday, schools attended, to interests, hobbies, favorite movies and music.


If for example, you tell Facebook that you want to advertise to highly educated men, ages 20 to 35, living in France, who enjoy fishing, Facebook will show your advertisement specifically to those people. Of course, you can choose a broader target group. But by being able to design a target group according to various criteria, the chances of converting your Facebook advertising investment into profits will increase significantly.
When you create a Facebook ad, you can pick your target group according to location (country, state and city), age, gender, education level, relationship status, language, and likes and interests. You can choose your target group at step 2 during the ad creation process and once you select the criteria, Facebook will tell you how many people are in your target group.





As a whole, the study should be encouraging for Facebook. As someone who has never clicked on a Facebook ad in five years, I was skeptical. But the study contains empirical evidence showing that certain kinds of Facebook advertising, particularly earned media, can be effective. With nearly one billion users, Facebook has achieved massive scale, and thanks to “amplification” across such a huge network, marketing messages can spread to a degree unprecedented in the history of online media. Against the backdrop of a pretty dismal few months, that’s something Facebook can look forward to.

Businesss Process Re-engineering

Business process re-engineering 

  Business process re-engineering is the process where analysis and redesign the workflow within between the enterprise.This workflow is most systematic ,disciplined improvement approach that critically examines, rethink ,redesign and implements the redesigned process of an organization . (BPR) goals is to achieve dramatic improvement in performance in areas important to customer and other stockholders .

Use of Business Process Re-engineering

#Can save a company which is running at a loss.
#By changging the presents proces through BPR a losing business can make profit.
#Can find new business dimension
#Improves quality in service delivery and customer satisfaction.
#Bpr will open new dimension into the existing business
#Overall change could enchance the performance of the business

Wednesday 19 December 2012



Assalamualaikum this time I would like to discussing about the common problem or question that frequent rise among traitional company because of the technology

Question

1.Do you view this technology as a potential threat to traditional telephone companies? If so what counter- strategies could traditional telephone companies adopt to prepare for this technology?

Yes definitely this develop technology will become threat to traditional telephone company because the people needs always change for the better life so to solve this problem this kind of situation the company needs to upgrade or invented new telephone with latest technology create creative design model to attract the people to buys.

2.Using porters five force describe the barriers to entry for this new technology?





·         Supplier Power: The power of suppliers to drive up the prices of your inputs.
·         Buyer Power: The power of your customers to drive down your prices.
·         Competitive Rivalry: The strength of competition in the industry.
·         The Threat of Substitution: The extent to which different products and services can be used in place of your own.
·         The Threat of New Entry: The ease with which new competitors can enter the market if they see that you are making good profits (and then drive your prices down).

3.Which of porter  three generic strategies is the new technology following?

The company needs to focus strategies which the company should compete based on cost leadership or differentiation. In either case, the basis of competition will still be either cost leadership or differentiation.  Apple also targets the mass market with its iPhone and iPod products, but combines this broad scope with a differentiation strategy based on design, branding and user experience that enables it to charge a price premium due to the perceived unavailability of close substitutes.

4.describes the value of chain of the business of using cell phone as a payment of method

The value chains must manage the two sides of their businesses: their customers and direct sales, and their channel partners and suppliers. Each requires its own management channels and practices.
To sell directly to customers (direct sales), value chains usually include a storefront, where customers can purchase cell phone directly.


5.What type of regulatory issue might occurs during due this type of technology?


 The regulatory issue might happens is people will find a ways to hack into call phone 


Assalamualaikum as usual i would like to tell all of you guys about chapter 2 porter of  5 forces model which the purpose to works as a frameworks for industry and business strategy development. it is important tool for assessing the potential for profitability in an industry and it is also useful as way of assessing the balance of power in more general situation.  


Below is the diagram of 5 model:






·         Supplier Power: The power of suppliers to drive up the prices of your inputs.
·         Buyer Power: The power of your customers to drive down your prices.
·         Competitive Rivalry: The strength of competition in the industry.
·         The Threat of Substitution: The extent to which different products and services can be used in place of your own.
·         The Threat of New Entry: The ease with which new competitors can enter the market if they see that you are making good profits (and then drive your prices down).



Understanding Tools

1.        Supplier Power:  it is for suppliers to drive up prices. This is driven by the number of suppliers of each key input, the uniqueness of their product or service, their strength and control over you, the cost of switching from one to another, and so on. The fewer the supplier choices you have, and the more you need suppliers' help, the more powerful your suppliers are.
2.        Buyer Power: Here you ask yourself how easy it is for buyers to drive prices down. Again, this is driven by the number of buyers, the importance of each individual buyer to your business, the cost to them of switching from your products and services to those of someone else, and so on. If you deal with few, powerful buyers, then they are often able to dictate terms to you.
3.        Competitive Rivalry: What is important here is the number and capability of your competitors. If you have many competitors, and they offer equally attractive products and services, then you'll most likely have little power in the situation, because suppliers and buyers will go elsewhere if they don't get a good deal from you. On the other hand, if no-one else can do what you do, then you can often have tremendous strength.
4.        Threat of Substitution: This is affected by the ability of your customers to find a different way of doing what you do – for example, if you supply a unique software product that automates an important process, people may substitute by doing the process manually or by outsourcing it. If substitution is easy and substitution is viable, then this weakens your power.
5.        Threat of New Entry: Power is also affected by the ability of people to enter your market. If it costs little in time or money to enter your market and compete effectively, if there are few economies of scale in place, or if you have little protection for your key technologies, then new competitors can quickly enter your market and weaken your position. If you have strong and durable barriers to entry, then you can preserve a favorable position and take fair advantage of it.

Saturday 8 December 2012

Chapter 1 Business Driven Technology



       Assalamualikum I wanna show all about the the important of the important of technology in our daily life which will solve our problem easier daily work communicate with other distant people in no time and for the business case will reducing cost increasing productivity generate growth of the business.

      Actually information technology is a field cornered with the use of the technology in meaningful processing information. Besides that it covering many get it field that deal with the use of the electronic computer and computer software to convert store process transmit and retrieve information technology. It also important table the business successful and information which it not useful unless the right people know how to use and manage with more efficient.MIS is information system which help to solve business problem which it is a business function just as marketing finance operation and human resources. The three type of elements of MIS is data information and business intelligence IT resources and IT cultures. Data is a raw fact that describe the characteristic of an event characteristic of sales which the data is converted into a meaningful and useful context such as information from sales events could include best selling item worst selling item best customer and worst customer.Business intelligence is applications and technology that are used to gather provide access to analyses data and information to support decision making effort. It enable companies gain more comprehensive knowledge of the factors affecting their business. People information and information technology is a key of it resources. It culture is the will to influence people way use of information and will reflect the importance that company leaders attribute to the use of the information in achieving success or avoiding failure.

     Organization information culture diving into four part to smooth the system more systematic. Information functional culture is an employee use information as a means of exercising influence or power over others. Information sharing culture is an employee across department trust each to use information about problem and to improve performance. Information inquiring culture is an employee across department search for information to better understanding the future and align themselves with current trends and new directions. Information discovery culture is an employee across department are open to new insight about crises and radical changes and seek ways to create competitive advantages.