Evaluate this new technology for your company

Assignment Help Management Information Sys
Reference no: EM1324744

National Courier Company picks up and delivers packages across the country and, through its relationships with couriers in other countries, privdes international package delivery services. Each afternoon couriers pick up packages, The late afternoon, the packages are returned to the couriers's terminal, where they are placed in bins and shipped by air to National Courier Company's hub. In the hub, these bins are emptied. The packages are sorted and put into different bins according to their destination terminal. Early the next morningi the bins arrive at the various destination terminals, where they are sorted by route, put onto trucks, and delivered.

An operations study determined that about $2 million of employee time could be saved each year by using a scanning system. Each package's bill of lading would have a bar code that the courier would scan with a handheld scanner when teh package is picked up. The shipment would be scanned again as it reaches the terminal, when it leaves the terminal, when it reaches the hub, when it is placed into a bin at the hub, when it arrives at the destination terminal, when it is srted onto a courier's truck for delivery, and when it is delivered to the customer. Each scanning would eliminate the manual and less accurate completion of a for, thereby providing courier time savings.

The total cost of the scanning system is estimated to be $10 million. It is thought to have a life of 6 years, after which the equipment will be eplaced with new technology. The salvage value of the equipment in 6 years is estimated to be $500,000.

At the end of each shift, the information from all the scanners will be loaded into Natioanl Courier Company's main computer, providing the exact location of each shipment. This tracking information provides for increased security, a lower mis-sort rate, and improved service in tracing shipments that habe been mis-sorted. The reduced time spent tracing missing shipments accounts for the balance of the estimated employee time savings. The marketing manager believes that the increased security and service will result in an increased contribution margin of about $1 million per year if competitors do not adopt this technology and National Corier Company does. If competitors buy this technology and National Courier Company does not, it will lose $1 million contribution margin. If every one buys this technology, each competitor will maintain its current sales level. Assume all cash flows except the $10 million outflow occur at the end of the year.

Required:

Evaluate this new technology for your company. Would you adopt this new system or not ? If not, why ? Also, discuss the assesment of the effect of different assumptions about the uncertainty of technology adoption by the competitors.

Reference no: EM1324744

Questions Cloud

Ethics-morality-virtues and values : What are examples of virtues, values, and moral concepts? How do each of these relate to one another? In what ways are they separate and in what ways are they connected?
Potential security threats to managing information : What are some of the potential security threats to managing information related to these activities across multiple locations?
Enplain business management : Enplain Business Management and how people feel toward you and your competitors' products
Compare the performance of your most commonly used browser : Compare the performance of your most commonly used browser, whatever it might be, to at least two others that you can either download or access directly online, in terms of the way they perform on several basic kinds of Internet tasks.
Evaluate this new technology for your company : Evaluate this new technology for your company. Would you adopt this new system or not
Explain the importance of written and oral communication : Explain The importance of written and oral communication within the work environment and apply the basic communications model to virtual communications media
Procedures encourages fraudulent behavior : What about this organization's operating procedures encourages fraudulent behavior
Compare the three top browsers : Compare the Three Top Browsers: Chrome, MS IE and Firefox - indicate whether or not you changed your position based upon the discussion.
Explain the type of data that businesses process : Explain the type of data that businesses process and correlate for us how that data is transformed into information.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discusses rfp and its role in the purchasing process

What is an RFP, and what critical tasks does it facilitate in the purchasing process? and Discusses RFP and its role in the purchasing process.

  Structured vs. unstructured decisions

Structured vs. unstructured decisions - List the four stages of decision making that are required for all decision making.

  Developments in technology and government regulations

Determining HRIS Needs - developments in technology and government regulations

  How an it governance archetype

IT Governance Archetypes and Cloud Computing - Discusses how an IT governance archetype can be good for one type of IS decision but not for another.

  The use of a decision support system

The use of a decision support system - system in a business guarantee a better decision?

  Information and organization

Information and Organization - communication and information are critical to the effective operation of an organization,

  Responsibility of managers to implement sudden

Global Issues on technology - Responsibility of managers to implement sudden, drastic organizational changes within their scope of responsibility.

  Explain internal controls and risk management

Internal Controls and Risk Management - The separation of the programming and operating functions is explained step-by-step in this solution. The response also has the sources used.

  Explain the process within public key systems

Role of Technology, etc. and Explain the process within public key systems if you want to support non-repudiation and securing the message.

  How to select appropriate software

Select Appropriate Software - Who else from the company should be on the selection team? .

  Sdlv versus agile explained in detail

SDLV versus Agile Explained in Detail - The SDLC methodology uses a cascading flow in the process phases of conception, feasibility and analysis, design and development, implementation, testing, release and maintenance.

  Social media and icloud and why it is important

The Internet - social media and iCloud and why it is important - Take a moment to reflect on The Internet as a social media / iCloud and why it is important to you.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd