Case of successful digital transformation

Assignment Help Basic Computer Science
Reference no: EM131785175

Assignment 1:

Amazon - A case of successful digital transformation

Digital transformation is the profound change in business activities, processes, competencies, and models to fully leverage customers at every touch-point in the customer experience.

Successful digital transformation achieves these results:

  • CUSTOMER: Harness customer networks and reinvent the path to purchase in line with their real behaviors
  • COMPETITION: Rethink the competition and build platforms that deliver competitive advantage
  • DATA: Turn data into assets that prove results in real time
  • INNOVATION: Innovate by rapid experimentation
  • VALUE: Judge change by how digital transformation helps create the next business

Reviewing the Amazon continuous transformation journey throughout the years, review and discuss the following three points:

Task 1: Identify and develop the business models Amazon currently have in place and where/how Amazon make its money - include at least 3 different sources.

Task 2: Identify and develop Amazon marketing strategy - include at least 3 different points.

Task 3: Identify and develop Amazon change management strategy - include at least 3 different challenges and solutions.

Reference no: EM131785175

Questions Cloud

About time being the most valuable commodity : What do you think about time being the most valuable commodity?
Determine what the role actually involves : Determine what the role actually involves, which may be different from what people assume from the job title or even what is contained in an existing job
Describe systems of and strategies for communication : Describe alternative systems of and strategies for communication that might be used during a crisis when normal lines of communication are unavailable.
What is the best estimate of the current stock price : The firm's required return (rs) is 12.0%. What is the best estimate of the current stock price
Case of successful digital transformation : Digital transformation is the profound change in business activities, processes, competencies, and models to fully leverage customers at every touch-point.
Compute the retained earnings and total stockholders equity : Compute the retained earnings and total stockholders' equity at the end
Product line extensions or new product development : Product line extensions or new product development. Should the current product or service be modified to more fully meet the needs of your new target market?
Find number of tons of waste that must be treated each day : If the state requires a reduction of at least 65 tons per day of pollutant 1, at least 40 tons per day of pollutant 2, and at least 20 tons per day.
What is the best estimate of the stock price per share : The company has 10 million shares of stock outstanding. What is the best estimate of the stock's price per share

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Challenging part of network security

Based on what you have learned in this course, what do you think will be the most challenging part of network security for you?

  What is the cumulative incidence of cvd

Five hundred people are enrolled in a 10-year cohort study. At the start of the study, 50 have diagnosed CVD. Over the course of the study, 40 people who were free of CVD at baseline develop CVD.

  Determining the network design project

In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following:

  What are the critical points other than cost

They have a series of staff that work on different projects in different parts of the country and are looking to provide them with office automation, such as email, word processing and spreadsheet capabilities, as well as online storage for their ..

  Emulate these types of data structures in a computer program

Identify at least two data structures used to organize a typical file cabinet. Why do you feel it is necessary to emulate these types of data structures in a computer program? For what kind of work project would you want to use this type of pr..

  Dynamic model of aggregate demand and aggregate supply

Use the dynamic model of aggregate demand and aggregate supply to illustrate and explain a situation where the economy is growing but experiencing inflation.

  Accessing or updating some columns

Is it possible to alter a table - for example adding a column, when another user is accessing or updating some columns?

  Practice with defining and using python module

Design a Python module by incorporating the two functions, greatest_trivial_factor andisPalindrome,  you defined in previous lab assignments. In other words, your Python module will contain ONLY those two functions. Name your module file aslib_yourfi..

  Digital evidence storage formats

You are a forensics investigator and need to address the following cases. You can find the Case Projects at the end of Chapters 3 and 4 in your textbook.

  How does failure to manage bandwidth

How does failure to manage bandwidth and/or packet size lead to packet delays? How can error detection/correction techniques hurt network performance?

  Jeopardize and compromise a database

Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize.

  Should iso standards have been considered

Three months after the system changeover, you perform a post-implementation evaluation. Prepare three evaluation forms for the new information system: one for users, one for man· agers, and one for the IT operations staff.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd