Sunday, October 11, 2009

1St Generation Of Programming Language

A first-generation programming language is a machine-level programming language. It consists of 1s and 0s. Originally, no translator was used to compile or assemble the first-generation language. The first-generation programming instructions were entered through the front panel switches of the computer system.
The main benefit of programming in a first-generation programming language is that code a user writes can run very fast and efficiently since it is directly executed by the CPU, but machine language is somewhat more difficult to learn than higher generational programming languages, and it is somewhat more difficult to edit if errors occur, or, for example, if instructions need to be added into memory at some location, then all the instructions after the insertion point need to be moved down to make room in memory to accommodate the new instructions. Doing so on a front panel with switches can be very difficult. Furthermore portability is significantly reduced - in order to transfer code to a different computer it needs to be completely rewritten since the machine language for one computer could be significantly different from another computer. Architectural considerations make portability difficult too. For example, the number of registers on one CPU architecture could differ from those of another.
Current uses 1GL is mainly used on now very ancient computers, machine level programming still finds a use in several areas of modern programming. First and foremost, any native-code compiler creates machine language. This is done without user interaction, usually from a higher-level language as Fortran, C/[[C++]] or Pascal, often with intermediate byte code or assembly code.
Another use is for so-called virtual machines. In essence, each virtual machine just creates a translation bridge between machine code and byte code. The byte code is the same across all platforms and the translator module of the virtual machine then translates just-in-time each byte to the corresponding native machine instruction.
Computer viruses often inject code in a certain spot in memory. When tracing the logs of your internet server, you may find several entries of very long urls. Often, the encoded part of the url is equal to a certain set of machine level instructions to be executed on the computer. It is notoriously hard to create such pieces of code, unless the coder makes use of assemble and disassemble helper programs.
A little less recently, in the early to mid 80s, code-injection was often used to overcome certain limitations of programming languages like the interpretive QBasic. This language had no means of inserting assembler code or to link to libraries made by other languages. By using the BLOAD (Binary Load) instruction, one was able to inject a certain piece of machine instructions in memory and then execute it.
The opposite instruction was BSAVE, with which any part of computer memory could be retrieved.
By being highly unportable, this was a very dangerous way of coding. Any typing error could result in a crash, or even worse, damage to the video controller or other equipment.

To 500 Mhz

Steve Wozniak and Steve Jobs, two good friends from high school, started a revolution that will never end. They invented the first Apple computer (Slater 3) The Apple I, they called it, ran on one megahertz and had eight thousand bites of memory and only eight bits of pixels on the screen (Levey 5). By today's standards that is absolutely nothing. Much like people of today, the first testers of the computer did not even take it seriously.
It wasn't until the Apple II came out in 1977 that people paid attention to the Apple computers. The Apple II was almost exactly like the Apple I, but it was comparatively inexpensive, at $1,298 (Levey 11). From 1977 to 1993 Apple Computer produced and extension to the Apple II series. Based on the MOStek 6502 microprocessor, the first Apple II was the first personal computer with the ability to display color graphics and to come in a stylish plastic housing (Levey 15). From then on, Apple updated the Apple II line further creating the Apple II+ with increased memory, the Apple IIe, which is the only Apple computer to date to have been produced for more than a decade, the Apple IIc, a compact version of the Apple IIe with a faster processor and expanded memory, the Apple IIc+, a later version of the Apple IIc, and the Apple IIgs, the first, last and only 16-bit Apple II, designed to produce enhanced graphics and sound, with a much more powerful microprocessor, and still compatible with the older 8-bit
Apple II software (Levey 24).
Even the new Apple III could not top the outstanding performance of the Apple II series. Because of it's outrageous price of $4,000 - $7,000, and minimal improvements the Apple III is considered one of the biggest bombs in the history of Apple Computers. The next computer, the "Lisa", which was named after Steve Jobs's daughter, whom he neglected, was a giant leap from
the Apple III. It had five megahertz, and five megabytes of hard drive, and most importantly a Graphic User Interface (History of Apple). (Which by the way a man by the name of Bill Gates stole to make "Windows".) This ancestor of the Macintosh was not a complete success.
Even though it was the best computer yet, it did not set well with the general public. However, it was the model for the Macintosh 128k. The Macintosh 128k was one small chip for mankind, but a giant leap for all computers to come. It integrated the new Motorola 68000 chip, and had
an amazing eight megahertz, and four hundred thousand byte floppy disk drive. This wondrous machine sold only for $2,495, which was actually a lot of money, but comparatively cheap (History of Apple).
Sadly, Steve Wozniak, was injured in a plane accident, and that's when Apple Computers began a long downward spiral. Because of this, Steve Jobs took complete control of the company, and like Napoleon from Animal Farm, he became corrupt, and caused Steve Wozniak to quit, and Apple Computer split in half. One half was the Macintosh side, and the other strictly Apple. As a
result of this, Steve Jobs lost his job (Levey 138). This slump lasted until 1996 when Steve Jobs recomposed himself, and came back to Apple Computers and turned the downward spiral into an upward skyrocket (History of Apple) . No Apple or Macintosh computer has sold as much
as the Apple II series until Jobs brought on the "Power Mac", the "iMac" the "G3 Power Mac", and the newest PC, the "G4 Power Mac, with 500 megahertz and a twenty-seven
Gigabyte hard drive. The rest is yet to come.

Works Cited

Slater, Robert. 1987. Portraits in Silicon, MIT Press, Cambridge, MA
Levey, Steven. 1984. Hackers: Heroes of the Computer Revolution, Anchor Press/ Doubleday, Garden City, NY

Help Desk Standard Operating Procedures (Sop)

1
Help Desk Standard Operating Procedures (SOP)
The purpose for this document is to describe the procedures and standards of performance associated with the Turnpike Traffic Operations Help Desk section. 1.1 Current Operations Help Desk operations is a function of the Traffic Operations network team. The Help Desk specialist is responsible for maintaining a database with current status of all trouble calls. 1.2 General Duty
Description
 Provide telephone and desk-side support for all software programs and applications supported by the Florida’s Turnpike Enterprise.
 Log all calls and incidents into the help desk tracking database.
 Prioritize, analyze, route and resolve problems in a timely manner.
 Handles end user requests for hardware and software support communicating via -telephone, Web, e-mail, and/or in person.
 Creates and oversees the knowledge deployment process, including gathering source information for the knowledge base and interviewing knowledge holders.
1.3 Level of Service
 Provides support during the designated operational shift hours and offers on-call and after-hours support.
 Utilize a logical and structured approach to troubleshooting and decision making with an emphasis on superior customer service.
 Coordinates the solution of system errors with the implementation team and internal and external technicians.
 Escalate unresolved calls to the lead technician or the helpdesk manager.
 Follow-up with IT staff and end-users on open customer service requests and unresolved issues.
 Close and document all calls in a timely fashion.
 Provide one on one training when needed and offers basic user education related to the use.
1.4 Reports and Statistics
 Tracks issues and trends and presents reports on a monthly basis.
 Reports trends to the project team; performs other duties as assigned.
 Maintain accurate documentation of systems, utilizing tools like MS Visio and Change Management and Outage reporting system.
 Provides and maintain current technical documentation of designs, topology and procedures.
 Work on special projects and assignments as needed.
The ideal candidate will be passionate about technology and will want to learn and grow within the environment. Provides a proactive approach to customer service issues;

“Informatio Technology Can’T Really Give A Company A Strategic Advantage, Because Most Competitive Advantages Don’T Last More Then A Few Years And Soo

EXECUTIVE SUMMARY
Since introduction of computer in 1950 to organizations, information technology has been deploying to gain competitive advantage for business organization. According to Ward and Griffiths, (1996), that information technology (IT) has gone through three evolutions. Today is third era of IT, organization view IT to support existing business strategy, create new opportunities for business, competitive advantage and new strategy opportunities leads to new markets and products and survival in this quick and challenge environment. The affects of IT
felt across entire organization such as accounting software for Accounting process, Customer Relationship Management (CRM) system to understand customers needs and wants, SAP solutions for supply chain model linking process of purchasing, manufacturing, logistics and order-fulfilment activities and deliveries. With the rapid change in the IT environment, planning is essential. Therefore, today organization leaders need to develop strong understanding of IT as transformation agent and value contributor. On the other hand, there is
another school of thought, for example, Nicolas G Carr commented in “IT Doesn’t Matters” that IT already vanishing it advantage because another company can easily copy any advantages obtained by one company and further, it is affordable. Hence, IT has becomes commodity based on internet standard whereby is easily available; it is no longer
differentiating factor in organization performance. He viewed that no companies could use IT to obtain the strategic advantage over its rivals any more than it could with electricity, telephone or any infrastructure. In conclusion of Carr “IT Doesn’t Matter” that company should reduce IT spending, be a follower to reduce risk of computer outages and privacy and security breaches and avoid deploying IT in new ways. This paper will divide into two portion of the impact of IT in
business organization. First section covers two topics that are gaining competitive advantage in IT and sustaining competitive advantage. In Gaining Competitive Advantage in IT, this topic will described Michael Porter five competitive forces strategic system and illustrated methodology of a company uses IT to thwart some of these forces, for example, cost leadership and differentiation in generic strategies. The other element by Porter cover here is business value chain model. Its will described five functions individually of value chain on how IT supports those function that create business value. Second topic of this section, describe how companies sustaining competitive advantage by applying strategic alliances concept. In second section, it covers topic of IT Don’t Last Long and IT Becomes Strategic Necessities. In IT Don’t Last Long topic, this paper will describe why IT have lost it competitive advantage and has becomes commodities using Nicholas G. Carr theories and its also explain why company finds keeping proprietary technologies a secret is very difficult with comments from Clemons & Knez, and Lieberman & Montgomery. As for second topic of this section, it explain why IT has becomes necessities and brief explanation on why companies still invest in IT even-thou its only give strategic necessities. TABLE OF CONTENTS Page No. EXECUTIVE SUMMARY 1-2
1.0 INTRODUCTION 4 SECTION I 2.0 GAINING COMPETITIVE ADVANTAGE ININFORMATION TECHNOLOGY
2.1 Porter’s Five Competitive Forces Model
 Porter’s Generic Strategies a. Cost Leadership Strategy
b. Differentiation Strategy
2.2 Business Value Chain Model 2.2.1 Porter’s Value Chain Model 5-11
5-7
8-11
3.0 SUSTAINING COMPETITIVE ADVANTAGE 11-12 SECTION II 4.0 INFORMATION
TECHNOLOGY DON’T LAST LONG 13-14
5.0 INFORMATION TECHNOLOGY BECOMES STRATEGIC NECESSITIES 15-16
6.0 CONCLUSION 17 LIST OF REFERENCES 18-20 1.0 INTRODUCTION
Information technology (IT) is hardware and software applications that are interrelated components that collect or retrieve, store and accessing or distribute information to support business structure, decision-making and competitive advantage (Huff, 1994, Laudon & Laudon, 2006). Since introduction of computer in 1950 to organizations, information technology has been deploying to gain competitive advantage for business organization. According to Ward and Griffiths (1996), that IT has gone through three evolutions. First era, the computer is to automatic labour-intensive processes to reduce labour costs. In the second era, emphasize in development of management information system that provides information for decision-making. Today, in third era, organization view IT to support existing business strategy, create new opportunities for business, competitive advantage and new strategy opportunities leads to new markets and products and survival in this quick and challenge environment. A variety of factors have been shown to have an important impact on the ability of the firms to gain competitive strategy advantage and sustaining competitive advantage, including the relative of cost positioning (Porter, 1980), products differentiation (Caves & Williamson, 1985, Porter, 1980) and the ability of firm to cooperate in strategic alliance (Chen & Chen, 2003, Lee & Vonortas, 2002).
The complexity of IT is transforming Porter’s value chain theory and is affecting the competition. It changes the industry structure and rules of competition (Porter & Millar, 1985). IT no longer a competitive advantage (Carr, 2003, Clemons & Knez, 1987 & Lieberman & Montgomery 1988) it had become strategic advantage (Carr, 2003 & Loudon & Loudon, 2007) The purpose of this paper is to explain further whether information technology can or cannot really give a company a strategic advantage, because most competitive advantages do not last long. In additional, it is also explain whether information technology becomes strategic necessities.
SECTION I
2.0 GAINING COMPETITIVE STRATEGY ADVANTAGE IN INFORMATION TECHNOLOGY
Business competitive strategy advantage in information technology is vital for successes of both large corporation and small businesses. According to Barney (1996) that companies uses IT resources to help implement a wide range of strategies, including cost leadership, product differentiation, strategic alliance strategies, diversification strategies and vertical integration strategies to gain competitive advantage. Furthermore, new technologies will continue to give
companies the chance to focus on improving cost saving and efficiencies, incremental improving of organisation structure, products and services, creation of strategic advantage through expanding competitive scope, Partnerships (customers and other parties) and provision of new IT-based services to extend the customer value proposition (Brown & Hagel, 2003).
This paper used two business models from Michael Porter: (3.1) Porter’s five competitive forces model and (3.2) Business value chain model to analyze a business and identify strategic advantage and how companies gain competitive advantage in information technology.
2.1 Porter’s Five Competitive Force Model Michael Porter (1980) provide framework for understand the relationship between a firm’s uses of IT and the nature of that firm output. He
proposes a five-force model for business competition strategies: (1)bargaining power of buyers, (2) bargaining power of suppliers, (3), threat of new entrants (4) threat of substitute products or services and (5) rivalry among existing competitors. The following is a brief description of these five forces and their connections with the possibility of new entry.
(1) “Bargaining Power of Buyers” refer to ability for customer to demand lower price, reduce product delivery cycle time, expectation for higher quality and efficient and effective services. Porter identified 7 factors, which suggested that buyers are powerful whenever there are
many alternative available and low entries for new products. On the contrary, buyers are weak when higher entry barrier, which may result in higher concentration of market
(Porter, 1980).
(2) “Bargaining Power of Supplier” refer to ability for suppliers to increase raw materials price, increase product delivery cycle time and reduce quality of product supplied which have significant impact on firm profits especially when the firm cannot rise price as fast as supplier (Porter, 1980).
(3) “Threat of New Entrants” is in a free economy, there are number and quality of potential competitors may enter the industry. In theory, with high number of new entry would reduce and hence the bargaining power of customer and supplier (Porter, 1980).
(4) “Threat of Substitute Products or Services” refers to switching of products or services from customer. The more substitute products or services in the market, the organization will have less control of the pricing and thus lower profit margin. Therefore, the threat of substitute products or services and threat of new entrants should be treat equally the same (Porter, 1980). (5) “Rivalry among Existing Competitors” is a competition among the same industry players. Here are some of example that companies applied to compete in the market i.e. price-cutting, and new product development (Porter, 1980).
Thus, firms must adopt some forms of IT to survive in a quickly changing environment to confront five competitive forces. If successfully, IT will change industry structure, creates competitive advantage, spawns completely new business and literally transforms industries by actuating new approaches to competitive behaviours (Porter, 1980).
Manufacturer and service providers need to capitalize on their strength to sustain and secure position of market leadership for years to come.
Porter’s (1980) viewed that company strength comes from cost advantage and differentiation. By applying these strengths, Porter has identified three generic strategies (see Figure 1.0).
Porter’s Generic Strategies
Target Scope Advantage
Lost Cost Product Uniqueness
Broad
(Industry Wide) Cost Leadership
Strategy Differentiation
Strategy
Narrow
(Market Segment) Focus
Strategy
(low cost) Focus Strategy
(differentiation)
Figure 1.0
Source: Porter (1980)
(a) Cost Leadership Strategy
Cost leadership strategy calls for lowest operational costs and the lowest price to gain market share uses IT to achieve the objective. The low-cost leadership strategy will allows companies to make profit for long time and will not effected any of these conditions such as price war, industry mature or price decline (Porter, 1980).
(b) Differentiation Strategy
Differentiation strategy calls for new products and services that offer uniqueness feature that valued by customers or perceived the products or services is better than similar product or services in competition (Caves & Williamson, 1985, Porter, 1980). Here is one of example demonstrate an American airline company leveraging on IT in applying cost leadership strategy and differentiation strategy. Southwest Airlines has re-invested it profit in its operation infrastructure (i.e. supply chain) and its business model perceive as automobile instead of normal airlines targeting market for infrequent airline travellers. The company only purchased Boeing 737’s inline with the concept of using one standard price of equipment allows maintenance, labour / repairing, training, technology and fuel costs easy to managed. Targeting at lowering operating costs and an internal ticketing system that developed efficient and customer-friendly, Southwest Airlines is effectively targeting and sustaining it niche market for budgeted travellers where other airlines initiative had failed (Guzak & Hill, 1998).
2.2. Business Value Chain Model
Michael Porter’s (1980) described the fundamental of Value Chain Model is interdependent activities in the business that add margin of value to products and services to customers. The value chain framework helps to analyze specific activities within the organization to create value
and competitive advantage. IT can profoundly affect the effectiveness and efficiency of this value-added processing and thus enhance it competitive advantage. According to Charles Wiseman’s Strategic Thrusts model (Wiseman, 1988), implementing IT in business value helps focusing on processes that directly contribute value across organizational functions. This model
identifies that individual or groups within the organization often have opportunities to contribute competitive value to business. Business value can be gained through operational changes, for example lowering the cost or improve product quality to convince and change customers or suppliers buying behaviour, which had impact on competitive environment. The “Thrusts” model as follows: differentiation, cost, innovation, growth and alliance.
Both Porter and Wiseman approaches to planning methodologies are well known and to be found effective (Bergeron, 1991). However, based on study conducted to comparing both methodologies by Bergeron, Porter’s value chain approach was found to generate more opportunities for innovation, but fewer opportunities for growth. 2.2.1 Porter’s Value Chain Model The value chain model and industry value chain (see figure 2.0) focuses on identifying activities within the organization and its value partners where IT can be activated to contribute value. Figure
2.0 � The Value Chain Model and Industry Chain Model Sources: Porter (1985) and Louden & Louden (2006) The five functions to create business value are:
2.2.1.1. Inbound Logistics encompasses the sourcing and procurement that capture input of resources for distribution to production. This concept includes much more than raw materials for manufacturing environment. The Automatic Warehouse System enable procurement efficiencies such as suppliers are aware of the schedule of the manufacturing, electronic data interchange, e-Procurement and Supply Chain Management. It also contributes to cost reduction value whereby the firm able to source for competitive pricing in internet (Louden & Louden, 2006). 2.2.1.2. Operations focus on organization processes, its transforms raw materials into products. Redesign the processes from manual to automatic computer controlled machining can significantly improve quality, reduce cost for example, wastage or labour costs and can speed up the process i.e. conveyer belt. These contributed directly increase value (Louden & Louden, 2006).
2.2.1.3. Outbound Logistic refers to ways of delivery of finished goods to customer. With IT innovation, its changes in outbound logistics enable firm to automatic shipment scheduling through internet technologies. The flexibility and easy to adapt to changes in supply and demands, provide companies likes Amazon.com and Dell, an upper hand to response to market conditions and make quick decision to provide the best price and efficient and effectively next day delivery for their customers (Louden & Louden, 2006).
2.2.1.4. Marketing and Sales functions include promoting and selling the firm’s products and services. IT has contributed business value to reduce sales and marketing cost and conduct business via internet. In additional, the firm gain global economies of scale (Levitt, 1983). For
example, Dell provides products directly to the end user with better level of service and supports, reviewing feedback and dealing with customer effectively and efficiently through its direct distribution system to distinguish themselves from its competitors. Maintaining customer direct support gives Dell another avenue of selling opportunities to existing customer. Dell will be able to introduce new product/services offering exactly at the right time (Magretta, 1998).
2.2.1.5. Customer Service is today business focus. IT enables customer relationship management systems add value through increased knowledge of who are their customers’, anticipate the needs of current and potential customers and another avenue for customer to reach the
company (Bateman & Snell, 2007). For example, Maybank put themselves in MSN and Windows
Live to provide convenient and easy avenue for its customers to get in touch with Maybank (, June 2008).
3.0 SUSTAINING COMPETITIVE ADVANTAGE
Sustainable competitive advantage is difficult to achieve through IT because its can be copied and it do not necessarily last long enough to ensure long term profitability, it is important for the firms to obtain sustained competitive advantage in cost positioning (Porter, 1980), products differentiation (Caves & Williamson, 1985, Porter, 1980) and to cooperate in strategic alliance (Chen & Chen, 2003 & Lee & Vonortas, 2002).
Earlier in this paper, cost positioning and products differentiation of Porter’s Generic Strategy, had already been discussed and shown example of Southwest Airlines adopting these concept to gain competitive advantage using IT. The other attribution of sustaining competitive advantage is companies have the abilities to corporate in strategic alliance.
Strategic alliances create synergies among companies to complement and share resource and capabilities and also reshape and/or enhance competition in the market (Chen & Chen, 2003). Lee & Vonortas (2002) supported this theory that alliance strategy with vague goals to define the collaboration structure for present or future needs, market position and technologies capabilities whether it is for short or long-term contract. This paper will highlight two successful story of corporation adopting alliance strategy to gain experience, increase market share and profitability.
 Cisco Systems Inc and BearingPoint alliance for streamlined business consulting and network solutions that help improve productivity, reduce costs, secure assets and promote better connectivity to their customers and partners and exploit new technologies to enable business faster return on investment. In this collaboration, Cisco Systems Inc invested a $1 billion (19.9%) ownership of BearingPoint. In return, BearingPoint will increase skilled IT human resources to deliver Cisco solutions to clients, to develop new solutions, customizing and demonstration of solution to clients and provide customer service support for Cisco’s
growing Service Provider market (, viewed June 2008).
 Ericsson and Sony Corporation alliance with mission to established
Sony Ericsson as the most striking and pioneering global brand in the
mobile handset industry. Sony Ericsson Mobile Communication is owned
equally by Sony Corporation and Ericsson. Hence, the company supplies
globally mobile multimedia devices. The company endeavours to be a
cutting edge provider of application for example, bringing the best and
latest in entertainment contents to its users by partnering with Sony
BMG (, June 2008)
Information technologies such as intranets, extranet connection with
customers and suppliers and the World Wide Web, the world becoming
globally linked in terms of migration of production, technology,
capital, human resources and information and business makes strategic
alliances synergy possible (Kotler, Brown, Adam, Burton &
Armstrong, 2007).
SECTION II
4.0 INFORMATION TECHNOLOGY DON’T LAST LONG
Information technology don’t last long because the increase of
technically literate population, and the rising integration of computer
into everything, which means window to gain competitive advantage is
only for short time (Carr, 2003). According to Carr’s (2003) in “IT
Doesn’t Matters” that no companies could use IT to obtain the strategic
advantage over its rivals any more than it could with electricity,
telephone or any infrastructure and he suggested that company should
reduce IT spending, be a follower instead of leader and avoid deploying
IT in new ways. Carr’s (2003) commented that IT already vanishing it
advantage because another company can easily copy any advantages
obtained by one company. Several researchers indicates that it is
relatively difficult to keep a firm’s proprietary technology secret due
to workforce mobility, reverse engineering, and formal and informal
technical communication all act to reduce the secrecy of proprietary
technologies (Clemons
& Knez, 1987, Lieberman & Montgomery, 1988). Thus, if one firm
find itself at the competitive disadvantage due to IT proprietary
application, the company can employed one or more individuals who
developed the proprietary application, it can purchase the application
and discover its character through reverse engineering or it could read
published report about the nature of the proprietary application and
duplicate it in the way. Therefore, an Innovator may only gain
temporary competitive advantage from its proprietary IT application
(Mata, Fuerst, Barney, 1995).
Now, IT becomes commodity in particular internet. Internet technologies
based on open system, thus intensifying the rivalry among competitors
and it is no longer differentiating factor in organization performance.
In additional internet technologies tend to reduce variable costs and
tilt the cost structures toward fixed cost, creating significantly
effect on price competitive. With easily accessible of information
about products and suppliers, thus increase bargaining power of
consumers (Carr, 2003 & Porter, 2001). Michael Porter (2001)
provides a framework of how internet influences industry structure is
determined by fiver underlying forces of competition: the intensity of
rivalry among existing competitor, the barriers to entry entrants,
threat of substitute products or services, and bargaining power of
suppliers and buyers. Internet technology provides buyers with easily
available information about the products or services, which increase
bargaining power of buyers, that effect company bottom line. Because of
it open system, companies find it harder to maintain it proprietary
products, thus intensity of rivalry among existing competitor. Anything
internet technology eliminates reduced barriers to entry such as the
need of sales force, access to channels and physical assets. Beside,
the internet technology makes the market open 24 hours and globally
accessible, thus increasing number of competitors and lower variable
cost relative to fixed cost, hence the pressures of price discounting
(Porter, 2001). For example, Amazon.com being the e-commerce leader but
now faces competition from eBay, Yahoo!, and Google, therefore by
depending solely on IT will not provide an enduring business advantage
(Louden & Louden, 2006).
As infrastructure technologies are losing it competitive potential
because it accessible and affordable, companies is taking “defense”
action instead of “offense” action. IT risk facing most companies is
more prosaic than a catastrophe. IT may be a commodity, and its cost
may fall rapidly to ensure new capabilities are quickly shared, but the
fact is entwined with the entire organizational functions that will
continue to consume a large portion of corporate spending. Therefore,
the opportunities for gaining strategic advantage from information
technology rapidly disappearing, company should reduce its spending in
IT investment, be a follower instead of leader, and focus on
vulnerabilities, not opportunities (Carr, 2003). 5.0 INFORMATION
TECHNOLOGY BECOMES STRATEGIC NECESSITIES
Strategic necessities are a system that must be installed to remain
competitive and, survival in today’s business world (Louden &
Louden, 2006). Sometimes these necessities are driven by industry-level
changes. For example, the automatic teller machine (ATM) which was
introduced by Citibank 1977 to attract customers. Today, nearly all
banks had this feature, which become a bank’s necessity to stay in
business. Therefore, IT has become essential tool for business
organization to compete and operate in a global economy (Louden &
Louden, 2006).
As IT’s core functions interpreted in value chain model, have become
cheaper, more standardized and easily to replicable, its ability to
provide competitive advantage has steadily eroded. Hence, IT
capabilities will not add value to competitive advantage but
competitive necessity (Carr, 2003). IT in business has been a history
of increased interconnectivity and interoperability. In spite of all
the hype, wireless systems
and new advance technologies implement will not create lasting
strategic advantage and its will become strategic necessities (Carr,
2003, Skaistis, 2003).
Nevertheless, in today business world, IT has becomes essential tools
to support business organization to conduct business in this dynamic
global market. Business organization are capitalizing the power of IT
in order to be more competitive and efficient where nearly all core
business processes and relationship with customers and suppliers, and
employees are digitally enable (Loudon & Loudon, 2006).
The complexity of information technologies is transforming Porter’s
value chain theory. IT is advancing faster than technologies for manual
processing whereby the companies can expand faster within it limitation
than manager can explore the opportunities, generating in-depth data
analysis of company activities and products and/or services and
enhances the ability exploit linkages between internal and external
activities and allows companies to coordinate activities without
geographical boundaries. In additional, IT manages the flow of
information, storage and data analysis for company to survive (Porter
& Millar, 1985).
However, the turbulent market conditions and competitive environment,
IT investment either because of they hoped to capture a first mover
advantage or because feared being left behind (Carr, 2003). 6.0
CONCLUSION
This paper had demonstrated that gaining competitive advantage through
IT is easy but to sustain competitive advantage is difficult to
achieve, even-thou, IT provides information for the company to
understand their customer better, applying the understanding into the
products and/or services and processes, and integrating all these
processes to deliver greater value to customers. Therefore, it is
important for business organization finds its methodology for
developing new or innovative ideas that create business value to
sustain competitive advantage.
Secondly, internet technologies could not give competitive advantage
for long because internet technologies based on universal standards
that any company can use, creates new entrances and competing in price.
Despite of this, internet continues to create brand building and
building very large and loyal customer based for the products and/or
services. The advantage of internet technologies is flexibility and
easy to adapt to changes in supply and demands, provide companies likes
Amazon.com an upper hand to response to market conditions and make
quick decision to provide the best price and efficient and effectively
next day delivery for their customers.
Thirdly, the growing interdependence between firms’ abilities to use IT
internally and externally is essential when conducting business in this
twenty first century. Despite of challenges face by companies deploying
IT, which does not give competitive advantage, it is essential for
companies to install a system to remain competitive and survive in
today’s business world. Lastly, heavy capital investment of IT at the
initial stage does not rise with increased of sales. It means, in
accounting any investment of IT will depreciated throughout the year
and eventually asymptotically toward zero. Therefore, deployment of IT
can make information technology investments enormously profitable and
can generate a rising strategic value. Thus, IT has become VALUE still
of cost. LIST OF REFERENCES
Barney, J.B., (1996), “Gaining and Sustaining Competitive Advantage”,
Addison Wesley, Reading
Bergeron, F., (1991), “Identification of strategic information systems
opportunities: Applying and comparing two methodologies”, MIS
Quarterly, Vol. 15 No. 1 Brown, J.S. & Hagel, J., (2003), “IT Does
Matter? An HBR Debate” Harvard Business Review
Carr, N.G., (2003), “IT Doesn’t Matter”, Harvard Business Review
Caves, R.E. & Williamson, P.J., (1985), “What is Product
Differentiation, Really? Journal of Industrial Economics, Vol. 34 No. 2
Chen, H. & Chen, T.J., (2003), “Governance structure in strategic
alliances: transaction cost versus resource-based perspective”, Journal
of World Business, Vol. 39
Clemons, E.K. & Knez, M., (1988), “Competition and Cooperation in
Information Systems Innovation”, Elsevier Science Publishers B. V.,
Amsterdam
Collaboration, viewed 2 June 2008, Guzak, R.J. & Hill, D.M.,
(1998), “Operations Franchise: Leveraging Your Supply Chain for
Profitable Growth”, Supply Chain Management Review
Huff, C. & Thomas F., (1994), “Social Issues in Computing: Putting
Computing in its Place”, McGraw-Hill, New York
Kotler, P., Brown, L., Adam, S., Burton, S. & Armstrong, G. (2007,
Seventh Edition) “Marketing”, Pearson Education, New South Wales
Laudon, K.C & Laudon, J.P, (2006, Tenth Edition), “Management
Information Systems � Managing The Digital Firm”, Pearson Prentice
Hall, New Jersey
Lee, C.S. & Vonortas, N.S., (2002), “Toward an integrated model of
strategy formulation for strategic technical alliances”, International
Journal of Technology Transfer and Commericailisation, Vol. 1 No. 3
Levitt, T. (1983, Fourth Edition) “The Global Marketing Management”,
Prentice Hall International, Hemel Hempstead
Lieberman, M.B. & Montgomery, D.B. (1988), “FirstMover Advantages”,
Strategic Management Journal, Special issue: 9
Magretta, J., (1998), "The Power of Virtual Integration: An Interview
with Dell Computer’s Michael Dell”, Harvard Business Review
Mata, F.J., Fuerst, W.L. & Barney, J.B., (1995), “Information
technology and sustained competitive advantage: A Resource-based
Analysis”, MIS Quarterly, Vol. 3 No. 4
Maybank2u now accessible through MSN and Windows Live, viewed 2 June
2008, Pablo, J., (2007), “Sony Ericsson P990i”, viewed 2 June 2008,
Porter, M.E., (1980), “Competitive Strategy: Techniques for Analyzing
Industries and Competitors”, The Free Press, New York Porter, M.E.
& Millar, V.E., (1985), "How Information Gives You a Competitive
Advantage", Harvard Business Review
Porter, M.E., (2001), “Strategy and the Internet”, Harvard Business
Review
Skaistis, B., (2003) “IT Does Matter? An HBR Debate” Harvard Business
Review
Ward, J. & Griffiths, P.M., (1996) “Strategic planning for
information systems”, John Wiley and Sons, New York
Wiseman, C., (1988), “Strategic information systems”, Richard Irwin,
New York

‘Afghanomics’- Etisalat In Afghanistan?

Case 2.1: ‘Afghanomics’- Etisalat in Afghanistan? Afghanistan is a multi-ethnic country, which consist of a large number of ethnic groups (Pashtuns, Tajiks and Hazaras being the three biggest
of them). It was founded as a large independent state in the middle of the 18th century. During the 19th century Afghanistan became part of the British Empire until it re-gained full independence in 1919. Sixty years after its independence Afghanistan was invaded by the Soviet
Union, which occupied the country until 1990. After ten years of civil war and a theocratic dictatorship by the Taliban, a coalition force led by the US invaded Afghanistan in 2001 to end the Taliban regime, which supported the Al Qaeda terrorist group. After the US-led invasion and
the end of the Taliban regime, the United Nations Security council created the International Security Assistance Force (ISAF) to bring political stability to the country. In 2005 the ISAF forces supervised a peaceful democratic election, which led to the formation of the government under President Hamid Karzai. The civil wars and the invasion of the Soviet Union resulted in the destruction of Afghanistan’s main physical infrastructure like housing, road systems, health facilities etc. Since 2001 foreign donor countries pledged to invest billions of dollars to re-build Afghanistan’s economic and political system. According to a report by the Asian Development Bank the project to re-establish Afghanistan as a stable and politically functioning country with a strong and growing national economy would be conducted in a two phases process: in phase one, the build-up of the vital physical national infrastructure and, in phase two, the creation of modern public sector institutions to promote a capitalist, market-led development of Afghanistan. So far the economy has been growing at around 16% per annum since 2003.
The Afghan currency has become relatively stable with an inflation rate of around 10%. Foreign companies are invited to invest in the country and they are attracted by billion-dollar contrast of the national governments and donor nations. The major home industries are agriculture, mineral resources and the production of poppy and the opium trade; around one third of Aghanistans’s GDP comes from growing illicit drugs such as opium, heroine and hashish. Since the Soviet invasion in 1979 the population of Aghanistan has shrunk to 29m people with more than 5m Afghans having fled the country to neighboring Pakistan, Iran and other Gulf countries; 180,000 Afghans are living in the UAE . Since the formation of the government of President Karzai one important driver for economic growth has been the return of millions of former refugees; they bring with them money, fresh energy and entrepreneurship. The Afghans, however, who have
stayed in Afghanistan until the present, are amongst the poorest in the world with two thirds of the population living on less than US $ 2 a day; the majority of workers is poorly skilled with a literacy rate of just 28% of 15+ year olds.
The telecommunication system in Afghanistan is based on 100,000 main lines and two million mobile cellular phones in 2005. This means that only four in 100 Afghans have access to wireless phones. By 2005 the telecommunication market consisted out of three telecommunication
companies: Afghan Wireless, Roshan and foreign-owned Areeba. Looking to the economic future, one has to mention Afghan’s richness in mineral resources. The country has huge amounts of gas and oil, on the one hand, and precious metals like gold and silver on the other hand.
The Afghan government hopes that with the help of new technologies more resources will be discovered. Until now Afghanistan still imports most of its energy including its electricity from outside the country so that the development and processing of its own resources will help the
growth of its economy enormously.
Sources:
CIA fact book
Wikipedia
Gulf News

.Bin & .Cue Simple Tutorial

There always seems to be the question "what do I do with a .bin and .cue file" in these forums so I figured I would write a quick and simple tutorial. Please feel free to add more. So you have downloaded two files, one with a .bin extension and one with a .cue extension. "What do I do with these?" you ask. There are a number of options. BURN TO CD You will need either NERO, CDRWIN or FIREBURNER to burn the file. To burn with NERO: Start NERO, choose FILE, choose BURN IMAGE, locate the .cue file you have and double click it. A dialog box will come up, for anything other than music make sure you choose DISC-AT-ONCE (DAO). You can also turn off the simulation burn if you so choose. Then burn away. To burn with CDRWin: Start CDRWin, choose the button on the top left, choose LOAD CUESHEET, press START RECORDING. To burn with Fireburner: Start Fireburner, click on the button on the bottom left corner "VISUAL CUE BURNER/BINCHUNKER", press the right mouse button and choose LOAD TRACKS FROM .CUE and choose the correct .CUE file, press the right mouse button again and chooseselect "Burn/Test Burn", choose DISK AT ONCE (DAO), disable TEST BURN and MULTISESSION, press OK. .CUE ERRORS The most common error you will get with a .cue file is when it points to an incorrect path. This is easily fixed. Find the .bin file, copy
the exact title including the .bin extension. Now find the .cue file, open the .cue file using notepad. It should look similar to this: FILE "name of file.bin" BINARY TRACK 01 MODE2/2352 INDEX 01 00:00:00 TRACK 02 MODE2/2352 INDEX 00 00:04:00 INDEX 01 00:06:00 Delete everything in the quotes, in this case we would delete name of file.bin. Now place the title you copied in between the quotes. Save the changes and close out. Thats it, your .cue file should work now. OTHER WAYS TO USE .BIN & .CUE FILES VCDGear: This program will allow you to extract MPEG streams from CD images, convert VCD files to MPEG, correct MPEG errors,
and more. Daemon Tools: This program creates a virtual drive on your PC which will allow you to "mount" the .cue file and use whatever is in the .bin file without having to burn it to a cd. ISOBuster: This program will allow you to "bust" open the .bin file and extract the
files within the .bin.