A winning framework for market entry strategies

A market entry strategy is the planned method of delivering goods or services to a new target market and distributing them there. When importing or exporting services, it refers to establishing and managing contracts in a foreign country. Few companies successfully operate in a niche market without ever expanding into new markets but most businesses achieve increased sales, brand awareness and business stability by entering a new market. Developing a win-win market entry strategy involves a thorough analysis of  multiple factors, in a planned sequential manner. Continue reading A winning framework for market entry strategies

Beowolf Clusters: Cheap supercomputers for poorer pockets

The demand for faster calculations can’t be met by only relying on the speed increase resulting from advances in computer technology as high end super computers are that much costly. One of the solutions to this problem for ‘not-so-deep-pockets’ is the distribution of the numerical tasks to a set of machines. So how to provide supercomputer capabilities cheaply? The answer is Beowolf Clusters. This process is called parallelization because the computers complete their tasks in parallel instead of the traditional step‐by‐step (serial) execution. As computer codes have been updated to use this new paradigm, the demand for parallel computers has grown. In general, such computers need to have: Continue reading Beowolf Clusters: Cheap supercomputers for poorer pockets

7 reasons why Apple’s I-Pad may fail.

Amidst a lot of hype as always, today 27th January, 2010, Apple launches the I-Pad. While it is being viewed as the product that will rejuvenate Apple’s revenues for years to come, a question many staunch Apple fans (and those who are not fans of course) will ask, is it really worth the hype? Apple has always created a market even when there is none. Will it be successful yet again this time?

Continue reading 7 reasons why Apple’s I-Pad may fail.

How to tackle the problem of security breaches in call centers

Outsourcing is the mantra of the day. Today, many large MNCs, all across the globe, outsource activities like customer relationship management activities to cheap labor countries where English speaking skills are not a problem. A major concern in such outsourcing is the security in customer’s sensitive data.

Continue reading How to tackle the problem of security breaches in call centers

Top 10 trends in Information Management technologies

Information management appears to be the talk of the day amongst all technology buzz. Information management or IM is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Management means the organization of and control over the structure, processing and delivery of information. Continue reading Top 10 trends in Information Management technologies

Speech technologies: The way ahead for inclusive development

Research institutes like IBM Research Labs, Media Labs Asia, NCST, C-DAC, institutes like the IITs, IIMs among others, have taken up dozens of challenging projects to try filling the gap of ‘Digital Divide’. The private sector is not behind, with companies like NIIT, HCL, Infosys, Wipro and TCS having demonstrated cases for taking computers to the common man. Continue reading Speech technologies: The way ahead for inclusive development

Understanding mobile commerce: How can it be successful

Mobile Commerce (m-commerce) refers to any transactions conducted through a variety of mobile devices over a wireless telecommunication. M-commerce was initially expected to experience a substantial growth for  rapid proliferation of mobile device adoption and the obvious advantages of accessibility of service anywhere, anytime. Continue reading Understanding mobile commerce: How can it be successful

Can we get computer security for free

Gone are the days when you needed to shell out a huge amount of money to buy security for your laptop or personal computer. Today, most of the anti-virus developers provide anti-viruses and anti-spyware for free. The revenue generation model for these companies have undergone radical changes and transactional viewpoints have become a talk of the past. Continue reading Can we get computer security for free

Google’s Nexus One vs Droid: A comparison of the current top two G-Phones

The Nexus one was launched amongst all the attention and hype by HTC collaboration vis-a-vis the Droid (Motorola) with the onset of 2010.  Both sport Google’s OS to begin with. So whats the hype about? This article makes a comparison between the key offerings of these top 2 phones. Continue reading Google’s Nexus One vs Droid: A comparison of the current top two G-Phones

Security for Mobile: It matters

Today, with the rise of popularity of ubiquitous computing and enterprise mobility, more and more professionals have started using PDAs and smart-phones for conducting business. A major risk is that such usage exposes one to attacks through the less secure WiFi or Edge. The cipher used by the General System for Mobile Communications (GSM) has been cracked by a German researcher Karsten Nohl who presented his findings Sunday at a hacker conference in Berlin. So there is a reasonable cause for most users to worry as the security scheme used by 80 percent of the world’s cellular telephones has been compromised. Continue reading Security for Mobile: It matters

How to analyze business case studies

There is no one best approach to analysis of an management case study. However, a number of general steps and guidelines can be followed to ensure better case analysis. Although the following steps are presented sequentially, it may be necessary during a specific case analysis to reorder or modify them, as they are intended to provide a general framework. Continue reading How to analyze business case studies

How to price internet services

The Internet is a world-wide network of computer networks that use a common communications protocol, TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP provides a common language for inter operation between networks that use a variety of local protocols. To support such a system, two costs are involved. One is to maintain the routing table, to specify the path that information packets need to travel, to reach from the source to the destination. Keeping these tables organized and up-to-date is not a trivial task. Second issue facing the internet usage is the speed of service that is to be provided, and at what price should such a service be charged. Continue reading How to price internet services

The Past, Present and Future of Information Systems Management Research

Information systems research has long been an area of interest for researchers as it started evolving as a discipline with its own identity, since the late 20th century, since the early 1970s. IS scholars had been researching and teaching a set of diverse topics associated with information technologies, IT infrastructures and IT-enabled business solutions (i.e., information systems), and the immediate antecedents and consequences of these information systems (e.g., managing, planning, designing, building, modifying, implementing, supporting, and/or assessing IT-based systems that serve, directly or indirectly, practical purposes), ever since IS evolved as a discipline of its own. Ever since the inception IS research has evolved to incorporate more contemporary areas of research in the recent times. This paper attempts to analyze the research trends in information systems research in contemporary times, by analyzing publications for 8 years, of the top three academic journals in the discipline.

Continue reading The Past, Present and Future of Information Systems Management Research

Web enablement implications for business strategy

E-business is a term used to describe businesses run on the Internet, or utilizing Internet technologies to improve the productivity or profitability of a business. In a more general sense, the term may be used to describe any form of electronic business – that is to say, any business which utilizes information technology. This usage is somewhat archaic, however, and in most contexts e-business refers exclusively to Internet enabled businesses.

Continue reading Web enablement implications for business strategy

The best online business management blog