Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Management Information System Expert

Attempt all the problems.

Section-A

problem1) People are usually not comfortable adapting to new technologies and systems. In light of this statement, what wouldbe your recommendation to ease and quicken adoption of a new computerized IS in the organization whose executives have never worked on a computer earlier? Support your recommendations with the description of the benefits each of them is expected to provide.

problem2)a) What are the steps involved in design and development of an information system? Describe each step in detail.

b) What are the pros and cons of developing an information system in-house as compared to customizing a similar system procured from market?

problem3) What do you mean by an information system? How many types of information systems are used at different levels of an organization? Describe in detail.

problem4) How could information technology support a company’s business operations & decision making, and give them competitive advantage? Elaborate with appropriate exs

Section-B

Case Study

Microsoft, whose fortune has been built around computer operating system, is gaining influence on how things get down in hospital operating rooms by hiring doctors, nurses, and other health care professionals in the effort to establish internal expertise about the medical industry’s IT needs. Microsoft has customized sales & support teams for industry segment in the past. Now Microsoft is expanding number of industries it targets, injecting industry-specific codes directly into its core software platforms & hiring business technology professionals steeped in the sector at which it’s aiming. CEO describes a two-pronged of selling customizable applications directly to small & medium-sized companies via Microsoft’s business solution division, while serving larger companies through partnership with other technology companies.

Microsoft engineers are creating soft-ware add-ons, called accelerators, aimed at business processes common to companies in the given industry. And Microsoft Business Solutions has begun inserting what it calls “Industry-enabling layers”-software which serves the requirements of broad base companies in the particular sector-into its enterprise application. Microsoft has the major edge in extending its strategy: Call it Microsoft Foot in the Door advantage. Cooper Tier & Rubber Co., a 90 years-old maker of aftermarket tires, for designing & building new products, it assessed software from PLM specialist, custom software and Microsoft. Cooper Tire choose a Microsoft approach, using company’s Share Point portal software, Project project-management application & Visio diagramming program

Another industry in which Microsoft has well-established customers is retail-it estimates 70% of the computing infrastructure in stores runs on Microsoft software.

Microsoft is moving quickly, expanding industry-specific sales & support teams, developing application accelerators & industry-enabling layers, & seeking more partnership with vendors that have deep industry roots. Big problem for Microsoft is whether customer’s familiarity breeds comfort-or contempt.

problems:

a) How successful would Microsoft be in competing with software vendors who specialize in vertical market?

b) Do you agree with Microsoft strategy to develop industry-specific partners to capitalize on opportunities in both large & small business sectors? Is there an advantage or a disadvantage to being one of Microsoft’s partners in this type of relationship? Describe.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93324
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question? 


Related Questions in Management Information System

Intrusion detection system policieskey assignment draftthe

Intrusion Detection System Policies Key Assignment Draft The project is going well so far, and the analysis and discussion of the vulnerabilities was well-received. You realize that when vulnerability scanning takes plac ...

Research workusing the internet newspapers journals and

Research work Using the Internet, newspapers, journals, and magazines, identify 3 terror attacks where social media was used as an instrumental tool. Describe how the new technology was employed. Paper Submission Require ...

Term paper organizational reportyou have been hired as the

Term Paper: Organizational Report You have been hired as the CIO of a large multinational Internet advertising company. The president of the company is entertaining a major new software development project to keep track ...

Dicussionagile versus process maturity approaches please

Dicussion "Agile versus Process Maturity Approaches" Please respond to the following: • From the e-Activity, define CMMI, explain its purpose, and describe how two process areas of CMMI deliver on its purpose. • Give an ...

I need help with a 1-2 page short paper see info below for

I need help with a 1-2 page short paper. See info below for details. 3-2 Short Paper: (Crowd) Surfing The Internet Chapter 13 contains a reading about a company called ModCloth using 'crowdsourcing' as a tool to build a ...

Discussion boardthe discussion board db is part of the core

Discussion Board The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interacti ...

Term paper a key concept in information systemsuse the

Term Paper: A Key Concept in Information Systems Use the Internet to research one (1) concept in information systems that you have studied in this course. You may select a topic of your choice or you may use one (1) of t ...

This case takes a horizontal slice through a number of

This case takes a "horizontal" slice through a number of coexistent issues. As a result, the challenge is "knowing where to start" - just as it is in real organizations - and this requires detective work. For your unders ...

Assignmentwrite a three to four page paper in which

Assignment Write a three to four page paper in which you: 1. Explain the four major categories of computer crimes, and provide at least one example for each. 2. Explain the most common forms of digital crime. 3. Determin ...

System security certification and accreditation cs662

System Security Certification and Accreditation (CS662 -1604B -01) Official (ISC)2 Guide to the CAP CBK 2 Howard Taylor & Francis 9781439820766 Individual Project Deliverable Length: 3-4 Pages, Microsoft Word document De ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro