Reference no: EM131069641 , Length: word count:800
Portfolio Tasks
1 Use an essay format to answer the assigned task. The prescribed structure is given below.
2. Write an introductory paragraph that provides a brief profile of the video-case.
Briefly describe the positions of the organisations in the video based on the model-elements of Strategic Management. End the introductory paragraph with objectives of the portfolio.
3. The main body of your video-reaction is the Content and Analysis. It should be supported with applicable theories and concepts complying the following sub-tasks:
a) Analyse and compare the competitive advantage of both Coke and Pepsi using the conceptual parameters of: (a) Sustainability; (b) Inimitability, and (c) Brand Management.
b) Apply Porters Five Forces Model to analyse the Cola industry.
c) Recommend the best strategic options for Coke and Pepsi at the height of the so-called "Cola War" keeping in view the speed of change for business environment. Support it with relevant theoretical citations.
4. Make a conclusion of your reaction.
5. Acknowledge the contributors of your work according to Harvard Referencing system. In-text reference is a must aside from the list of references provided at the end of the manuscript to assure consistency.
Structure of this Portfolio:
I. Introduction:
Should include the following:
- Relevant theories/concepts based on Strategic Management model.
- Brief profile of the reviewed video.
- Objectives of the portfolio (refer to the tasks)
II. Content and Analysis: (520 words)
Should include the following:
1. Analyses and comparison of the competitive advantage of both Coke and Pepsi using the conceptual parameters of: (a) Sustainability and (b) Inimitability.
2. Application of Porter's Five Forces Model to analyse the Cola industry.
3 Recommendation of the best strategic options for Coke and Pepsi at the height of the so-called "Cola War-, keeping in view the speed of change for business environment with the support of relevant theoretical citations.
III. Conclusion: (150 words)
Provide a summary of the important points of the discussion. It should be drawn according to the objectives of the portfolio mentioned in the introduction.
IV. References:
Required number of references must not be less than 10, applying the accurate Harvard Referencing system.
Distinguish between hardware and software
: Do you see technology progressing to the point that we may no longer distinguish between hardware and software and thus no longer perceive differing physical and intellectual interfaces?
|
Calculate the overall percentage
: Calculate the overall percentage (sum of the total points earned divided by the total points possible) and output it as a percentage. Sample input and output is shown below.
|
Fitter snacker sales department
: Suppose you are a manager of Fitter Snacker's Sales Department. What Human Resources information do you think you would need to manage your sales force?
|
Risks and benefits of the leadership arrangement at google
: What, in your opinion, are the risks and benefits of the leadership arrangement at Google, where the two founders (Larry Page and Sergey Brin) elected to bring in Eric Schmidt to be the CEO while they function as presidents under him?
|
Briefly describe the positions of the organisations
: Briefly describe the positions of the organisations in the video based on the model-elements of Strategic Management. End the introductory paragraph with objectives of the portfolio.
|
Transfer files between different platforms
: What protocol can be applied when you want to transfer files between different platforms, such between UNIX systems and Windows servers?
|
Maximize shareholder value by maintaining a long-term focus
: While attending Stanford University, Larry Page met Sergey Brin, a native of Moscow, and together they launched Google in 1998. With CEO Eric Schmidt, who joined in 2001, they have built Google into one of the industry's most powerful companies.
|
Important aspect of information systems security
: Identity and access management is an important aspect of information systems security. One of its crucial functions is to help determine who should get access to the system and who should not.
|
Discuss the advantages and disadvantages of each
: Also discuss the experimental procedures you would use for the calibration of crack length and crack closure, where appropriate, for each of the above methods.
|