Reference no: EM131311163
Week - Domino's Pizza Case Activity
In this activity, you will be looking at the Domino's combined technologies are used in their daily operations and how well it fits their overall business strategy. This will be done by looking at each technology individually, identifying the technology's function, observing the technology's impact on the organization, and connecting them to the strategic intent. Use all of the provided information (articles, videos, etc.). See the sample completed activity provided in the course.
Use your own observations and opinion. There are no right or wrong answers. Not all of the pieces will fit together nor will all strategies be explicated. You will need to think like a detective and link the connections together to form, in your opinion, a logical overall technology strategy.
Step 1 - Technology/Application Identification - Complete the grid to identify the technologies used, their function, and who is involved in their use or what process do they contribute to. (Feel free to add rows.)
Technology/Application
|
Function
|
Who uses/Process involved
|
|
|
|
|
|
|
|
|
|
Comments:
Step 2 - Impact on Organization and Process - Copy the list of technologies/applications in this grid. Have you observed any impact on the organization and/or process. Impact on the organization could be changes in normal job roles (duties, responsibilities, etc), changes in organization structure, or changes in management structure. Impact on process could include changing responsibilities of data collection, automating duties that were once completed by employees or customers, or changes in rules governing the process.
Technology/Application
|
Organization Impact
|
Process Impact
|
|
|
|
|
|
|
|
|
|
Comments:
Step 3 - Connecting to Strategy - Does the organization have a stated technology strategy? Is their approach documented in the business strategy phrases (mission statement or motto? If it is stated, please restate in your own words. If not explicitly expressed, what do you think the strategy is?
Comments:
Step 4 - Look at competitors in the marketplace. Compare their use of technology to the case company. What is similar? What is different? (Pick one or two that best emphasize similar or dissimilar traits).
Competitor Name
|
Technology
|
Similar
|
Dissimilar
|
|
|
|
|
|
|
|
|
|
|
|
|
Comments:
Step 5 - What is your evaluation of the case companies use of technology? What would you change?
Determining the firm total fixed costs
: A competitive firm in a perfectly competitive market produces and sells hats. Last year, it produced and sold 1,000 hats at the equilibrium price of $10. It incurred average variable costs of $6 and earned total economic profits of $1,000. What ..
|
How to build digital trust within community and market place
: CIS8011 - Business Major Report 1 & 2 Assignment. They are interested in understanding which technology needs to be adopted, how it can be integrated, any structural or managerial changes which are needed and how to build digital trust within the c..
|
Economic concepts of marginal revenue and marginal cost
: Does it make sense for a restaurant to offer early-bird specials and senior citizen discounts? Explain your answers in terms of the economic concepts of marginal revenue and marginal cost, as applicable.
|
Distinguish message authentication and entity authentication
: Alice signs the message she sends to Bob to prove that she is the sender of the message. Which of the following keys does Alice need to use?
|
Compare their use of technology to the case company
: you will be looking at the Domino's combined technologies are used in their daily operations and how well it fits their overall business strategy. This will be done by looking at each technology individually, identifying the technology's function,..
|
Potential entrants residual demand curve
: Suppose the inverse demand is given P=75-0.5Q if the incumbent continues to produce 20 units output, which of the following equations best summarizes the potential entrants residual demand curve?
|
How many secret keys are needed to allow secret messages
: In a club with 50 members, how many secret keys are needed to allow secret messages to be exchanged between any pair of members?
|
Decrypt the message to get the original plaintext
: Encrypt the message "this is an exercise" using additive cipher with key = 20. Ignore the space between words. Decrypt the message to get the original plaintext.
|
Find the type of cipher and key
: Suppose that the alphabet is divided into halves and the letters in the first half are encrypted as the letters in the second and vice versa. Find the type of cipher and key. Encipher the plaintext "an exercise" using the Atbash cipher.
|