EMC Corporation Analysis
How would you describe the core competency of EMC Corp? What is the significance of understanding core competencies? Do core competencies provide competitive advantages or value to organizations?
The core competency of EMC Corporation is the research and development, selling, implementing and supporting of their virtualization technologies incouding IT infrastructure systems and platforms. EMC's depth of expertise in virtualization and infrastructure technologies has made the company one of the leading providers of cloud computing platforms, one of the fastest-growing segments of the enterprise computing industry today (Horsburgh, 2003). EMC has structured their business into two major categories incouding EMC information infrastructure and VMWare virtual infrastructure, which provides the company the ability to better serve its global base of customers (McCarthy, Capuanuo, Picotte, 2002). The information infrastructure business is comprised of three different segments including information storage, information intelligence group and the RSA information security group. The VMWare virtual infrastructure group is a stand-alone business unit as it is focused on the rapidly changing cloud computing market (EMC Investor Relations, 2012). EMC reports that their information infrastructure business generates on average 81% of total revenues and the VMWare virtual infrastructure business, 19% (EMC Investor Relations, 2012).
The significance of understanding core competencies is that when they are taken together, the complete competitive advantage of a business can better to seen from the vantage point of the industry they compete in. Analyzing core competencies of EMC for example shows how successful the company is in quickly translating research and development (R&D) into virtualization systems and platforms that enable greater performance of cloud computing and Software-as-a-Service (SaaS) applications (EMC Investor Relations, 2012). These two...
Organizational Change of Northrop Grumann Corporation Analysis of Change Northrop Grumman: Interview in relation to Program Mergers & Acquisitions Comparisons Looking to the Future Organizational Change of Northrop Grumann Corporation Although acquisitions did not prove to improve the performance of firms the activities of acquisition persists and government policy toward the industry of defense has approved consolidation for the purpose of cost savings that are nominal at best. Mergers and acquisitions are events that greatly modify the
EMC IT Strategic Plan EMC: Strategic IT Plan The corporate IT governance environment of EMC Corporation was analyzed in the previous papers and it was indicated that the firm is challenged with issues related to data security, data mobility, and data backup for cloud customers. For the highlighted issues of IT governance, some solutions were also recommended that included encryption of data, application of Firewalls, VLANs and other securitization throughout the EMC
Organizational Case Analysis Organization Overview Apple Inc. is a multinational companies specializing in the designing, manufacturing and marketing of mobile communication devices such as personal computers and digital music players. The company also sells varieties of mobile telecommunication devices such as iPhone, iPod, iPad, and Mac. Additionally, Apple Inc. sells some professional software application such as Mac OS, iOS, iCloud and other varieties of communication accessories. Apple Inc. sells its products through
Fault Tolerant Analysis of RAID Redundant Array of Independent Disks (RAID) describes array configuration and applications for multiple inexpensive hard disks, providing fault tolerance (redundancy) and improved access rates (RAID concept). RAID provides a way to access multiple individual disks as if the array were one larger disk, spreading data access out over these multiple disks, reducing the risk of losing all data if one drive fails, and improving access time.
Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to
2). The company has demonstrated this effect time and again as it enters new, standardized product categories, such as network servers, workstations, mobility products, printers and other electronic accessories; in fact, almost 20% of every standards-based computer system sold in the world today is a Dell: "This global reach indicates our direct approach is relevant across product lines, regions and customer segments" (Dell at a glance, 2007, p. 3). Today,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now