One secret to maintaining a thriving business is recognizing when it needs a fundamental change. 50 Harvard Business Review | December 2008 | hbr.org Business Reinventing Y our by Mark W. Johnson, Clayton M. Christensen, and Henning Kagermann Model IN 2003, APPLE INTRODUCED THE IPOD WITH THE ITUNES STORE, Jim Frazier revolutionizing portable entertainment, creating a new market, and transforming the company. In just three years, the iPod/iTunes combination became…
Americans love their automobiles, and we've all had chips and scratches in our automobile paint. Not only can they distract from your car's beauty, but they also make your car susceptible to rust and environmental damage. Scratches and auto body damage can come from a rock being thrown from a semi or from someone who is in a hurry at the grocery store who dings your car with a shopping cart. The truth of the matter is that most of these accidents are avoidable, here's how to properly fix auto…
American multinational corporation, which designs, manufactures and sells personal computers, consumer electronics and software, and provides related services. The company has experienced a tremendous growth from 2001 when it has introduced its iPod mp3 player (Jurevicius, 2013). Apple Inc. is considered to be the most successful electronics company in the world. Internal environment analysis – SWOT analysis Strength (S) - Customer loyalty combined with expanding closed ecosystem. Apple has…
Moreover, in early 2006 there were already 350 million mobile phones in use in China and that number was projected to grow by about 57 million annually.21 Before choosing to launch Google.cn, Google was already a player in this Chinese market. Since the site’s inception in 1999, U.S.-based Google.com had been available to Chinese users as it had been to users worldwide. Unlike its major U.S. competitors, though, Google did not rush to set up a China-based version of its search engine, and thus…
While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…
When using information systems, it is essential to ask, “What is the ethical and socially responsible course of action?” A MODEL FOR THINKING ABOUT ETHICAL, SOCIAL, AND POLITICAL ISSUES Ethical, social, and political issues are closely linked. The ethical dilemma you may face as a manager of information systems typically is reflected in social and political debate. One way to think about these relationships is given in Figure 4-1. Imagine society as a more or less calm pond on a summer…
Unfortunately, some companies have mismanaged their greatest asset—their brands. This is what befell the popular Snapple brand almost as soon as Quaker Oats bought the beverage marketer for $1.7 billion in 1994. Snapple had become a hit through powerful grassroots marketing and distribution through small outlets and convenience stores. Analysts said that because Quaker did not understand the brand’s appeal, it made the mistake of changing the ads and the distribution. Snapple lost so much…