Information Technology Essay

Information Technologies can advice a business in so abounding means to accomplish aggressive advantage, such as, acid cost, advance articles and services, advance growth, incerase chump achievement etc. The aboriginal purpose of this analysis is to analyze how IT assists in advantageous barriers to access to antagonism in best industries, distinctively tech-centric intustries. The additional purpose of this analysis is to alarmingly analyse how IT helps business to accomplish aggressive advantage, offers solutions to business challenges and accession barriers to access in the market. IT Assists Firms to Access in The Competition Someone can altercate that there are about no barrier for tech-centric business and this altercation is decidedly accurate for the Internet based business, not alternative business such as Bank. Any battling can put up a aggressive Web armpit overnight. A battling can access in the bazaar depending on IT alms procucts and casework that are allready accessible in the market. Relying abandoned on IT or Techonology can be actual alarming (Gallaugher 2010). There are millions of Internet based firms that started business relying abandoned on IT and bootless to sustain in the Industry. For archetype Fiveminfotech. com entered in software industry in Bangaldesh based on few software developers and analysts. Instead of establishing new approaches they aloof produced some aforementioned software accessible in the market. As a result, this close bootless miserably. New competitors and copycat articles actualize a chase to cut costs, cut prices, and access appearance that may account consumers but abrade profits industry-wide. Therefore, it can be said back technology is so accessible to archetype and antagonism is aloof a bang away, IT awfully assists in advantageous barriers to access to competion in decidedly tech-centric industries (Gallaugher 2010). Only IT Does Not Ensure Aggressive Advantage To accept how to accomplish acceptable aggressive advantage, it's advantageous to alpha with Bristles Armament concepts authentic by Michael Porter (Gallaugher 2010). Porter fatigued on cardinal accession rather than operational effectiveness. Operational effectivenessoperational effectivenessPerforming the aforementioned tasks bigger than rivals accomplish them. refers to assuming the aforementioned tasks bigger than rivals accomplish them. The crisis in operational capability is "sameness". Since technology can be calmly copied, that's why operational capability is absolutely chancy for those firms that await on technology for competitiveness. These firms watch a pioneer's efforts, apprentice from their successes and missteps, again access the bazaar bound with a commensurable or aloft artefact at a lower cost. It is rarely a aggressive advantage back technology can be akin so quickly. Operational capability is analytical to firms, but not acceptable abundant to crop acceptable advantage (Gallaugher 2010). Cardinal Positioning On the contrary, cardinal accession is actual analytical to close to actualize acceptable advantage and altered approaches. Cardinal accession can be authentic as assuming altered activities from those of rivals or the aforementioned activities in a altered way (Gallaugher 2010). IT is analytical to the firm's success and cardinal accession has to be tech-enabled to bear success. The close has to body up a set of cardinal assets that not abandoned abode specific needs of a bazaar but should be acutely difficult for any cipher to attempt adjoin (Gallaugher 2010). Therefore, advance in IT can accession barriers to access for alternative firms in the antagonism (O'Brian ; Marakas 2009). A close can admit whether it's cardinal differences are appropriate abundant to crop acceptable aggressive advantage. The resource-based appearance of aggressive advantage can help. According to this appearance a close charge ascendancy a set of accommodating assets that accept four analytical characteristics: (1) Valuable, (2) Rare, (3) Difficult to imitate, and (4) Difficult to acting (Gallaugher 2010). Resourse-based action can advice a close to abstain entering bazaar abominably artlessly because advance is spotted. The telecommunications industry abstruse this assignment in a actual adamantine and aching way. Telecommunications industry acclimated long-haul fiber-optic cables to alteration abstracts over the internet. However, to accommodated growing appeal some telecom firms began digging up the arena and laying webs of fiberglass. But problems arised back rivals started to accomplishing exact aforementioned affair and acclimated addition technology alleged close beachcomber analysis multiplexing (DWDM) enabled absolute cilia to backpack added transmissions than anytime before. As a result, these new assets weren't attenuate and anniversary day they seemed to be beneath valuable. Accurate acceptable advantage comes from assets and business models that are accompanying valuable, rare, difficult to imitate, and for which there are no substitutes (Gallaugher 2010). Although technology abandoned deceit accomplish acceptable compatitive advantage, but a close can advance some strategies to appointment the threats of bristles forces. O'Brien et al (2009) acicular out bristles strategies, such as, Amount Leadership, Differentiation, Innovation, Advance and Alliances strategies. These strategies call how IT can be acclimated calmly in a close to accretion aggressive advantage. For example, Dell accept acclimated amount administration action to body online acclimation arrangement and accustomed itself as lowest-cost ambassador of PC in the bazaar (O'Brian ; Marakas 2009). Apart from aloft bristles strategies a close can use some alternative strategies and can advance in IT to lock in barter and suppliers, lock out competitors, actualize switching costs and accession barriers to access in the bazaar (O'Brian & Marakas 2009). IT can additionally be acclimated in a close to body a customer-focused business, reengineer business process, actualize a basic company, body a knowledge-creating aggregation and become an active aggregation (O'Brian ; Marakas 2009). Conclusion Although a close can access in the bazaar bound with the advice of IT, but it will not sustain in the bazaar after 'right' archetypal or aggressive strategy. If a close is not armed with appropriate aggressive action to adverse the threats of bristles armament , again "IT doesn't matter" (Carr 2003). References Carr, N.(2003),"IT Doesn't Matter," Harvard Business Analysis 81, no. 5. Gallaugher, J. (2010), Information Systems: A Manger's Guide To Harnessing Technology, Flatworld Knowledge. O'Brien, J. A. , ; Marakas, G. M. (2009), Management Information Systems (9th ed. ). New York: McGraw-Hill Irwin. Part C - Case Abstraction Read Real World Case 4: "Best Buy, Medstar Health and Unifi: The Challenges and Benefits of Wireless adaptable applications" from pages 258-259 of the O'Brien & Marakas argument and acknowledgment the three case abstraction questions. It is important that you draw from the abstract in your discussion.

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
Order now and a get a 25% discount with the discount code: COURSEGUYOrder Now!
+ +