SMG IS 223 Lecture Notes - Lecture 2: Operational Excellence, Competitive Advantage, Ieee 802.1
Key Takeaway: Firms invest heavily in info systems to achieve six strategic business objectives
1. Operational excellence
2. New products, services, and business models
3. Customer and supplier intimacy
4. Improved decision making
5. Competitive advantage
6. Survival
Complementary Assets- assets required to derive value from a primary investment.
Complementary assets include:
1. Organizational assets for example: appropriate business model and efficient business
processes
2. Managerial assets for example: incentives for management innovation and teamwork
and collaborative work environments
3. Social assets for example: the Internet and telecommunications infrastructure and
technology standards
Firms supporting technology investments with investment in complementary assets receive
superior returns. Invest in technology and the people to make it work properly
IS 3-Infrastructure 1 (Info Tech Infrastructure, Hardware and Software)
Review from last lecture
VPN- Virtual Private Network
How is it different from 802.1? Can be accessed from anywhere rather than just on campus
Room 304 Network - Local Area Network
Unencrypted- no security, similar to using morse code, scrambles data and then unscrambles
data to give a response
Operating System Software- tells the computer what to do, directs hardware, makes computer
work
Application software- in order to do useful things with a working computer
ERP (Enterprise Research Planning) Examples:
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Key takeaway: firms invest heavily in info systems to achieve six strategic business objectives: operational excellence, new products, services, and business models, customer and supplier intimacy, improved decision making, competitive advantage, survival. Complementary assets- assets required to derive value from a primary investment. Firms supporting technology investments with investment in complementary assets receive superior returns. Invest in technology and the people to make it work properly. Is 3-infrastructure 1 (info tech infrastructure, hardware and software) Can be accessed from anywhere rather than just on campus. Unencrypted- no security, similar to using morse code, scrambles data and then unscrambles data to give a response. Operating system software- tells the computer what to do, directs hardware, makes computer work. Application software- in order to do useful things with a working computer.