What are trade offs that dianrong is facing

Assignment Help Basic Computer Science
Reference no: EM133058616

Read the Dianrong case study and answer the following questions with substantive answers in a cohesive essay.

1. What are the trade offs that Dianrong is facing? How should the company prioritize its objectives? What should Soul Htite do?

2. As detailed in Exhibit 1 of the case, there are different collaboration models that Dianrong has adopted in working with various parties on technological development. How should the company decide on the nature of collaboration for technological developments in the future (via organic and in-house developments, partnerships, joint ventures, or acquisitions)?

3. Assuming that the company manages to raise an additional US$100 million, how should Dianrong allocate the capital across its many business units to maximize value in the long run? Should the company spend the money on internal R&D initiatives or M&A pursuits? Or both?

4. How should the company work with the local regulations in China? Should the company focus on reviving the P2 industry in China in the process? If so, how?

5. Are there other technologies that Dianrong should consider adding to its already expansive portfolio of technologies? In contrast, are there technologies that may seem redundant at the firm at the moment? How should Dianrong manage this to improve its competitive edge with its "technology DNA?"

Reference no: EM133058616

Questions Cloud

Information System-Project-Process Modeling : How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?
What is industry structure of UBER : What are the competitive strategies of UBER? What are the pros and cons to a "sharing economy?" What is the industry structure of UBER?
Digital forensic analysis and investigations : Expand on investigation and of digital forensic analysis and investigations.
Discuss how business intelligence : Discuss how Business Intelligence (BI) can assist organizations in the decision making process.
What are trade offs that dianrong is facing : What are the trade offs that Dianrong is facing? How should the company prioritize its objectives? What should Soul Htite do?
Discuss the LEED certification process : Discuss the LEED certification process. Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area
Primary recommendations regarding passwords : Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords:
Define business intelligence : How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?
Sensitive and financial information : Identify the required security needed to ensure personal, sensitive and financial information is kept private and secure, and device identity is preserved.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Research the facebook user data breach

Research the Facebook user data breach. Did Facebook have the necessary policies and procedures in place? Did Facebook adhere to their policies?

  Class mean as simple euclidean distance

K-means (in its common simple form) implicitly assumes that all dimensions are comparable, since it measures distance of a sample to each class mean as simple

  Business intelligence to gain dominance

Provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance

  Write the pseudocode for the flowchart

Write the pseudocode for the flowchart below, and list what the output will be if the input fornum is 8.

  Level of total reserves

a) the level of required reserves, excess reserves, and the level of total reserves.

  Base of the number system for this civilization

Many of the artifacts contain inscriptions that appear to be mathematical, and the first to be translated (with limited away-team gear) comes out as the equation

  What is networking

What is networking? What are the different layers that together form the networking platform?

  Iot device attacks-current landscape of cybersecurity

IOT device attacks. Current landscape of cybersecurity and cyber-attacks in the world today

  Use case description versus activity diagram

Compare a use case description and an activity diagram.

  Create an address book demo object

Open the address-book-v1g project and create an Address Book Demo object. Call its show Inter face method to display the GUI and interact with the sample address book.

  Describe windows azure capabilities for virtual machines

Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure's Internet as a Service (IaaS)

  Describe market-basket analysis

Define and describe market-basket analysis, providing real-world examples. Discuss tools you would use to perform such analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd