Indicate how your SSM company strategy integrates key elements of the Formulation and Implementation model (Exhibit 8.1, page 237)
Carpenter and Sanders (2008) point out that good strategies enable organizations to achieve their objectives, where strategy formulation is deciding what to do, while strategy implementation is the process of executing what the firm has planned to do (pp 237). Firm A strategy is to produce the highest quality vehicles by deploying Six Sigma methods, achieve the lowest costs through lean manufacturing, keep overhead costs low by utilizing just-in-time (JIT) inventory methods while gaining the leading market share in the vehicles our customers prefer. Firm A has had significant difficulty successfully implementing above strategy, particularly in terms of reaching desired results. Text lists three questions fo firms that are experimenting difficulty with strategy formulation and implementation: a. Is the strategy flawed?, b. Is the implementation of the strategy flawed?, c. Are both the strategy and implementation flawed? (Carpenter, 2008, pp 237). Firm A stock price has plummeted over last several periods, market share has steeply declined, net income and cumulative net income have similarly trended negative. Inventory for Ace and Alfa is significant, over 100k ea for both models which points to failure to effectively utilize Just-In-Time production. Despite efforts for reduced production costs each period, we are not the leader in terms of lowest Cost of Goods Sold (COGS). Further, even though Firm A had focus on quality from the beginning, we are not the leader in quality vehicles where every competitor has a vehicle with higher quality ratings than we do. My perception is Firm A is a victim of straddling, where we spent significant resources to differentiate with the Apprise (AEV) and Accel (high performance truck), and simultaneously tried to reduce COGS while increasing quality. In this case, do not believe the strategy was flawed, do believe the implementation of strategy was flawed by pursuing too much differentiation resulting in straddling position.
Hansen, Nohria & Tierney (1999) study displays the error in straddling strategy with example of Knowledge Management, key for consulting industries where some firms focus on strategy centers around computers where it knowledge is carefully stored and codified (codification strategy) vs. other firms who focus on the knowledge shared between individuals through direct person-to-person contacts where the chief focus is on communicating knowledge (personalization strategy) as opposed to storing the knowledge (pp 56). This is not unique to consulting where study notes that healthcare and and computer companies operate similarly (Hansen, 1999, pp 56). Some key examples from the case for codification strategy were Earnst and Young and Anderson Consulting who deploy a people-to-documents approach which removes client sensitive information and develops knowledge objects such as interview guides, work schedules, benchmark data, and market segmentation info which is then stored in electronic repository (Hansen, 1999, pp 56). Main advantage of codification strategy is knowledge is stored without need to contact person who originally developed it (Hansen, 1999, pp 56). Case examples of personalization strategy were Bain, Boston Consulting Group and Mckinsey who focus on dialog between individuals rather than information in a database, so they invest heavily and focus on building networks of people (Hansen, 1999, pp 58). Interestingly, both strategies have success and merit and there is some crossover, but in both cases successful firms focus on one strategy or the other to avoid straddling (Hansen, 1999, pp 58). Example is the personalization firms also do not provide knowledge objects but consultants can scan documents to see what work has been previously done on the topic, then approach the individuals directly (Hansen, 1999, pp 58). To avoid straddling firms choose one strategy then use the other second strategy to support the first; they call this the 80-20 split where 80% of knowledge sharing follows one strategy and 20% to the other (Hansen, 1999, pp 63). In the case of our Firm A in SSM simulation, we may have benefited from pursuing an 80-20 strategy in terms of low cost and differentiation, where instead of pursuing two different new models we may have just pursued one and focused the other resources on achieving lowest possible costs in line with our stated strategy.
What causes the Knowing-Doing Gap?
Carpenter and Sanders (2008) describe the Knowledge-doing gap as a phenomenon where firms tend to be better at generating new knowledge than at creating new products based on that knowledge (pp 238). Insightful statistic from the text was study that found 46% of firms survey regarded themselves as good or excellent at generating new knowledge, while only 14% of the same firms reported having launch new products based on the application of new knowledge (Carpenter, 2008, pp 238). In terms of cause for Knowledge-doing gap, text points out that often strategy-formulation process itself is not shared with those stakeholders, including lower-level managers who will be integral in rolling out the strategy (Carpenter, 2008, pp 238). For case example, Grover & Davenport (2001) further investigate knowledge management and show that closing the knowledge doing gap firms should not seek stand alone businesses but should seek to embed knowledge management into other aspects of their business (Grover, 2001, pp 5). Study notes that many firms have repositories of knowledge accumulated since the advent of the computer but in terms of strategically deploying this information in optimal fashion has proved difficult (Grover, 2001, pp 6). Despite the chief importance of knowledge in terms of relevance to decisions and actions, the use of knowledge typically requires the minds of human beings to disseminate and apply in correct way (Grover, 2001, pp 6). Reminds me of my good friend Stephen who works for Tealium whos advanced online data metrics and tools enable them to optimize information in ways that are deemed most useful for executives of client firms. Study found the following key points with regards to storage and use of key industry knowledge: a. Personalization vs. codification (see above), b. Knowledge markets (folks capitalizing on their personal knowledge, c. communities of practice ie. networks of people with same work interests, and d. Intangible assets, such as valuable knowledge and intellectual capital (Grover, 2001, pp 8). Knowledge managers are proposed who perform the following tasks 1. Facilitate knowledge-sharing networks and communities of practice, 2. Creation, editing, and pruning of knowledge objects in repositories, 3. Incorporating knowledge oriented job descriptions, motivational approaches, and evaluation/reward systems into Human Resource Mgt. processes, 4. Redesigning knowledge work processes and incorporating knowledge tasks and activities into them (Grover, 2001, pp 10). Seems the key to successful deployment of knowledge to action involves continuous effort, systems, processes and roles to ensure that knowledge acquired is transferred into actionable items and results.
References:
Carpenter, M. A., & Sanders, W. G. (2008). Strategic Management: A Dynamic Perspective. Upper Saddle River, NJ: Pearson Prentice Hall.
Integrated StratSim Simulation Experience
Hansen, M. T., Nohria, N., & Tierney, T. (1999). What’s Your Strategy For Managing Knowledge? Harvard Business Review, 77(2), 55-69. Retrieved from http://link.galegroup.com.library2.csumb.edu:2048/apps/doc/A54077794/AONE?u=csumb_main&sid=AONE&xid=dcb50466
Grover, V., & Davenport, T. (2001). General Perspectives on Knowledge Management: Fostering a Research Agenda.
Journal of Management Information Systems,
18(1), 5-21. Retrieved from
http://www.jstor.org/stable/40398515
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
assignment1 5
/in Uncategorized /by Josephi have attached the file…………………………………………………………………………….
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
answer the questions 115
/in Uncategorized /by Josephall what you need to answer these questions. Also, you don’t need to be logic.
…………………
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
statistical concepts and market returns
/in Uncategorized /by JosephStatistical concepts and market returns, spreadsheet work required. Statistical assemsent of markets
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
can you please respond to this post below you need to provide your own credible sources as a response 21
/in Uncategorized /by JosephIndicate how your SSM company strategy integrates key elements of the Formulation and Implementation model (Exhibit 8.1, page 237)
Carpenter and Sanders (2008) point out that good strategies enable organizations to achieve their objectives, where strategy formulation is deciding what to do, while strategy implementation is the process of executing what the firm has planned to do (pp 237). Firm A strategy is to produce the highest quality vehicles by deploying Six Sigma methods, achieve the lowest costs through lean manufacturing, keep overhead costs low by utilizing just-in-time (JIT) inventory methods while gaining the leading market share in the vehicles our customers prefer. Firm A has had significant difficulty successfully implementing above strategy, particularly in terms of reaching desired results. Text lists three questions fo firms that are experimenting difficulty with strategy formulation and implementation: a. Is the strategy flawed?, b. Is the implementation of the strategy flawed?, c. Are both the strategy and implementation flawed? (Carpenter, 2008, pp 237). Firm A stock price has plummeted over last several periods, market share has steeply declined, net income and cumulative net income have similarly trended negative. Inventory for Ace and Alfa is significant, over 100k ea for both models which points to failure to effectively utilize Just-In-Time production. Despite efforts for reduced production costs each period, we are not the leader in terms of lowest Cost of Goods Sold (COGS). Further, even though Firm A had focus on quality from the beginning, we are not the leader in quality vehicles where every competitor has a vehicle with higher quality ratings than we do. My perception is Firm A is a victim of straddling, where we spent significant resources to differentiate with the Apprise (AEV) and Accel (high performance truck), and simultaneously tried to reduce COGS while increasing quality. In this case, do not believe the strategy was flawed, do believe the implementation of strategy was flawed by pursuing too much differentiation resulting in straddling position.
Hansen, Nohria & Tierney (1999) study displays the error in straddling strategy with example of Knowledge Management, key for consulting industries where some firms focus on strategy centers around computers where it knowledge is carefully stored and codified (codification strategy) vs. other firms who focus on the knowledge shared between individuals through direct person-to-person contacts where the chief focus is on communicating knowledge (personalization strategy) as opposed to storing the knowledge (pp 56). This is not unique to consulting where study notes that healthcare and and computer companies operate similarly (Hansen, 1999, pp 56). Some key examples from the case for codification strategy were Earnst and Young and Anderson Consulting who deploy a people-to-documents approach which removes client sensitive information and develops knowledge objects such as interview guides, work schedules, benchmark data, and market segmentation info which is then stored in electronic repository (Hansen, 1999, pp 56). Main advantage of codification strategy is knowledge is stored without need to contact person who originally developed it (Hansen, 1999, pp 56). Case examples of personalization strategy were Bain, Boston Consulting Group and Mckinsey who focus on dialog between individuals rather than information in a database, so they invest heavily and focus on building networks of people (Hansen, 1999, pp 58). Interestingly, both strategies have success and merit and there is some crossover, but in both cases successful firms focus on one strategy or the other to avoid straddling (Hansen, 1999, pp 58). Example is the personalization firms also do not provide knowledge objects but consultants can scan documents to see what work has been previously done on the topic, then approach the individuals directly (Hansen, 1999, pp 58). To avoid straddling firms choose one strategy then use the other second strategy to support the first; they call this the 80-20 split where 80% of knowledge sharing follows one strategy and 20% to the other (Hansen, 1999, pp 63). In the case of our Firm A in SSM simulation, we may have benefited from pursuing an 80-20 strategy in terms of low cost and differentiation, where instead of pursuing two different new models we may have just pursued one and focused the other resources on achieving lowest possible costs in line with our stated strategy.
What causes the Knowing-Doing Gap?
Carpenter and Sanders (2008) describe the Knowledge-doing gap as a phenomenon where firms tend to be better at generating new knowledge than at creating new products based on that knowledge (pp 238). Insightful statistic from the text was study that found 46% of firms survey regarded themselves as good or excellent at generating new knowledge, while only 14% of the same firms reported having launch new products based on the application of new knowledge (Carpenter, 2008, pp 238). In terms of cause for Knowledge-doing gap, text points out that often strategy-formulation process itself is not shared with those stakeholders, including lower-level managers who will be integral in rolling out the strategy (Carpenter, 2008, pp 238). For case example, Grover & Davenport (2001) further investigate knowledge management and show that closing the knowledge doing gap firms should not seek stand alone businesses but should seek to embed knowledge management into other aspects of their business (Grover, 2001, pp 5). Study notes that many firms have repositories of knowledge accumulated since the advent of the computer but in terms of strategically deploying this information in optimal fashion has proved difficult (Grover, 2001, pp 6). Despite the chief importance of knowledge in terms of relevance to decisions and actions, the use of knowledge typically requires the minds of human beings to disseminate and apply in correct way (Grover, 2001, pp 6). Reminds me of my good friend Stephen who works for Tealium whos advanced online data metrics and tools enable them to optimize information in ways that are deemed most useful for executives of client firms. Study found the following key points with regards to storage and use of key industry knowledge: a. Personalization vs. codification (see above), b. Knowledge markets (folks capitalizing on their personal knowledge, c. communities of practice ie. networks of people with same work interests, and d. Intangible assets, such as valuable knowledge and intellectual capital (Grover, 2001, pp 8). Knowledge managers are proposed who perform the following tasks 1. Facilitate knowledge-sharing networks and communities of practice, 2. Creation, editing, and pruning of knowledge objects in repositories, 3. Incorporating knowledge oriented job descriptions, motivational approaches, and evaluation/reward systems into Human Resource Mgt. processes, 4. Redesigning knowledge work processes and incorporating knowledge tasks and activities into them (Grover, 2001, pp 10). Seems the key to successful deployment of knowledge to action involves continuous effort, systems, processes and roles to ensure that knowledge acquired is transferred into actionable items and results.
References:
Carpenter, M. A., & Sanders, W. G. (2008). Strategic Management: A Dynamic Perspective. Upper Saddle River, NJ: Pearson Prentice Hall.
Integrated StratSim Simulation Experience
Hansen, M. T., Nohria, N., & Tierney, T. (1999). What’s Your Strategy For Managing Knowledge? Harvard Business Review, 77(2), 55-69. Retrieved from http://link.galegroup.com.library2.csumb.edu:2048/apps/doc/A54077794/AONE?u=csumb_main&sid=AONE&xid=dcb50466
Grover, V., & Davenport, T. (2001). General Perspectives on Knowledge Management: Fostering a Research Agenda.
Journal of Management Information Systems,
18(1), 5-21. Retrieved from
http://www.jstor.org/stable/40398515
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
see description 28
/in Uncategorized /by JosephThe film review is an exercise in informal writing style, reporting your reaction to the film you have just seen the bone collector) . It should include a brief summary of the plot, characters and events, and a critical assessment of the major issues covered in the film. More importantly, include in your critique three core Forensic Science techniques that impacted you, and why.
Audience: an academic audience and all others interested in the topic
Purpose: explain and inform
Length: 2-3 typed pages double spaced (see general instructions above)
Format : APA Style
DUE: March 22nd, 2018
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
competetive profile matrix efe matrix and ife matrix
/in Uncategorized /by JosephCreate a Competitive Profile Matrix, an EFE Matrix, and an IFE Matrix for the company Facebook. Write in APA format. Description and example of a Competitive Profile Matrix, EFE Matrix, and IFE Matrix is below:
The Competitive Profile Matrix (CPM) identifies a firm’s major competitors and its particular strengths and weaknesses in relation to a sample firm’s strategic position. The weights and total weighted scores in both a CPM and an EFE have the same meaning. However, critical success factors in a CPM include both internal and external issues; therefore, the ratings refer to strengths and weaknesses, where 4 = major strength, 3 = minor strength, 2 = minor weakness, and 1 = major weakness. The critical success factors in a CPM are not grouped into opportunities and threats as they are in an EFE. In a CPM, the ratings and total weighted scores for rival firms can be compared to the sample firm. This comparative analysis provides important internal strategic information. Avoid assigning the same rating to firms included in your CPM analysis.
An Example Competitive Profile Matrix
Note: The ratings values are as follows: 1 = major weakness, 2 = minor weakness, 3 = minor strength, 4 = major strength. As indicated by the total weighted score of 2.20, Company 3 is weakest overall. Only eight critical success factors are included for simplicity; in actuality, however, this is too few.’
An External Factor Evaluation (EFE) Matrix allows strategists to summarize and evaluate economic, social, cultural, demographic, environmental, political, governmental, legal, technological, and competitive information, illustrated earlier in Figure 3-2. The EFE Matrix can be developed in five steps:
Example of EFE Matrix for a Local 10-Theater Cinema Complex
A summary step in conducting an internal strategic-management audit is to construct an Internal Factor Evaluation (IFE) Matrix. This strategy-formulation tool summarizes and evaluates the major strengths and weaknesses in the functional areas of a business, and it also provides a basis for identifying and evaluating relationships among those areas. Intuitive judgments are required in developing an IFE Matrix, so the appearance of a scientific approach should not be interpreted to mean this is an all-powerful technique. A thorough understanding of the factors included is more important than the actual numbers. Similar to the EFE Matrix and the Competitive Profile Matrix (CPM) described in Chapter 3, an IFE Matrix can be developed in five steps:
Example of IFE Matrix for a Retail Computer Store
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
risk management is355
/in Uncategorized /by JosephVulnerability Scanners
Imagine a system administrator learns of a server’s vulnerability, and a service patch is available to solve it. Unfortunately, simply applying a patch to a server is not assurance enough that a risk has been mitigated. The system admin has the option of opening the application and verifying that the patch has raised the version number as expected. Still, the admin has no guarantee the vulnerability is closed, at least not until the vulnerability is directly tested. That’s what vulnerability scanners are for.
Two vulnerability scanners available to the system administrator are Nmap® and Nessus®, which produce scan reports. The purpose of using Zenmap® GUI (Nmap) and Nessus® reports is to enable you to create network discovery port scanning reports and vulnerability reports. These reports can identify the hosts, operating systems, services, applications, and open ports that are at risk in an organization.
In this lab, you will look at an Nmap® report and a Nessus® report. You will visit the http://cve.mitre.org Web site, you will define vulnerability and exposure according to the site, and you will learn how to conduct searches of the Common Vulnerabilities and Exposures (CVE) listing.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
writing assignment 145
/in Uncategorized /by JosephBe 800 words in length
Be type-written, double-spaced, and in 12-pt font
Have a title page that includes the assignment title, your name and student number, the number and name of the course, the names of the professor and your teaching assistant, and the due date
I drop a file below, you can choose one of the title to write in this file. I’d prefer the first one “the raising of the minimum wage to $15 per hour”
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
descriptive writing 1
/in Uncategorized /by JosephDescriptive Writing
This is the Week where you submit a Descriptive piece, with app 300-350 words
Do your research first to make sure you know what this writing style encompasses.
Grammatical and punctuation errors will be penalized.
Italicize your thesis statement and topic sentences.
Have a creative title to draw readers to your piece, not the name of the assignment (e.g. Descriptive Essay)
YOUR PAPER MUST NOT HAVE MORE THAN A 20% SIMILARITY RATING!!!
Be sure to AVOID CONTRACTIONS in formal writing.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
history question 333
/in Uncategorized /by Josephsee the uploaded file to do the work
these are two labs for general history class. the fist one is really too easy and you should answer the questions.
the second one is about the Four Myths, for this you should write two pages ( double space, 1 inch margins, 12 pt font )
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.