Thursday, October 31, 2019

Human Resource Development at Tesco Case Study Example | Topics and Well Written Essays - 2000 words

Human Resource Development at Tesco - Case Study Example Tesco, a UK leader in the food retailing industry, was founded in 1924 by Sir Jack Cohen in London's East End. Today, it operates around 2,318 stores and employing over 326,000 people. In the UK, Tesco has opened 1878 stores which operate under Extra, Superstore, Metro, and Express trademarks. Tesco replaced Sainsbury and became #1 food retailer in the UK in the mid-1990s (www.tesco.com). Recent years apprenticeship becomes a very popular technique in different sectors of business in the UK. Apprenticeship programs are very effective as they benefit both employers and employees allowing young employees to acquire skills and knowledge during paid employment. To take part in this program a job seeker should: For Tesco branch, this program allows developing a high-skilled working staff employing young people who are eager to work hard and achieve a high position within the company. It will help to sustain a strong brand image and deliver better services to customers. For Tesco, this program ensures an adequate supply of staff who are technically and socially competent, and capable of career advancement into specialist departments or management positions. In this very case, training is, therefore, a key element of improved organizational performance as it increases the level of individual and organizational competence. It helps to reconcile the gap between what should happen and desire-targets and standards of performance; and what is happening and levels of work performance. The advantage of this program is that modern apprenticeship can be started at any time of the year (Modern Apprenticeships, 2006). Special attention should be paid for a contract for apprenticeship. Although this is to be seen as a contract of employment for the purpose of accumulating employment rights, it is a form of legally-binding working relationship that pre-dates all current legislative rights in employment, and the apprentice, therefore, has additional rights at common law relating to training. An employer cannot lawfully terminate an apprentice's contract before the agreed period of training is complete, unless there is closure or a fundamental change of activity in the business to justify redundancy. If Tesco trains people and continually ensures they have up-to-date knowledge and up-to-date skills, it follows that it shall able to compete effectively, and reasonably expect to prosper.

Tuesday, October 29, 2019

Effects of Organic and Conventional Management Practices on Soil Assignment

Effects of Organic and Conventional Management Practices on Soil Quality - Assignment Example The different crop management practices involved in conventional farming that include mixing of soil by tillage frequently and then leaving the soil exposed during significant periods of time lead to rising oxidation of organic matter and also reduces the levels of organic matter significantly thereby increasing the risks of soil erosion (Glinski, Horabik & Lipiec, 2011, p.527). It was during the 1990s that the crop management practices involved in conventional farming were questioned owing to the heavy use of chemicals. These chemicals had the potential ability to cause environmental degradation (Hunter, 2004, p.45). Studies have revealed that the quality of the soil under such farming practices have been poor thereby increasing the costs of the products as well as health. Considering these effects the long term sustainability of the conventional farming has been questioned against the alternative practices being available. Indirect costs including the offsite damage from erosion of soil, pollution in the surface and ground water, hazards to health of both human and animal, and damage to wildlife from conventional farming practices are at the moment tolerated by the humanity (Reganold, n.d.). Conventional farming has proved to have certain negative effects of the quality of the soil. Owing to the exposed nature of the soil, the productivity of the soil tends to get reduced due to wind and water erosion, compaction of soil, soil organic matter getting lost, accompanied by losses in water holding capacity and biological activity.

Sunday, October 27, 2019

Report About 3G And 4G Technologies

Report About 3G And 4G Technologies Write a report about 3G and 4G technologies. Your report should cover: The main (both in definition and technically) differences between 3G and 4G. Are they both addressing the same things? The main attributes and differences between WiMax and LTE. Which kind of companies are implementing which type of technology? Under what circumstances would one be preferable over the other? Dependence on underlying infrastructure. You must submit the assignment via safe assign under blackboard and also via the registry. Introduction Wireless communication is part of todays world and is greatly in demand as such resources are preferred in todays world and so the sales are increasing day by day with equipment which involves wireless communication. The G which means generation, in the technology today amongst phones covers the technology improvement in the last few decades. The first mobile phone technology started with 1G which involved analogue technology. In the early 1990s the next generation of communication developed named 2G which was in a digital technology which also had text messaging with the idea of SIM cards coming into practice. SIM is short for (Subscriber Identity Module). Other technologies that evolved were CDMA(Code Division Multiple Access) and GSM (Global System for Mobile Communication). The next generation which followed made the data carrying better, making it potential to carry information such as websites as how they were originally. In 3G technology the iPhone has become the latest. As of today the agreement of 4G technology has not yet been established. It has been planned to have fast transfer speeds and should have good security. Something else that the 4G technology should meet is that it should reduce blips in transfer of the device when moving between different networks. The 4G mobile network should also be able to use the networks like the ones on the internet with IP addresses. 4G mobile is not yet implemented as an approved set of standards, so its characteristics are at present simply goals rather than requirements. As well as considerably desired increasing data transfer speeds, 4G mobile as well as should use improved security measures, When a device moves one place to another place between this area covered by different network reduce the blips in transmission is the another goal .4G mobile networks should also use a network based on the IP address system used for the internet. Two major systems using 4G technologies are WiMax and Long Term Evolution. WiMax began testing its 4G technology in Baltimore in 2008. The opposite system LTE was expected to be ready to be tested in 2010 and is expected to be ready for use in 2013. All this information above is described in detail in this research. All the topics covered above are broadened below. 3G 3G technology comes with better features than previous mobile network technologies. It has transmission which is at high speed, better multimedia access as well as connection globally.3G used with mobile phones a connects the phone with the internet and other IP connections which allow voice as well as video calls to be accessed. Not only this but also helps to download and surf the internet. From lower mobile technologies, 3G technology has higher data speed, better audio and video access, video calling support, Web use at quicker speeds and TV through the Internet. In 3G networks the transfer speed is between 128 and 144 kbps for devices that are fast and 384 kbps for slower ones. Wireless fixed LANs have a sped beyond 2Mbps. W-CDMA,TD-SCDMA, WLAN and cellular radio, among others are some of the technologies that 3G includes.[1] WCDMA The third-generation Universal Mobile Telecommunications System (UMTS) will be able to deliver high data rates of up to 384 kb/s at widearea applications or even 2 Mb/s indoors . This is achieved by using wide-bandwidth signals with Code-Division for Multiple Access (W-CDMA). The user data are multiplied by a fast pseudorandom spreading sequence before phase modulating the radio-frequency (RF) carrier. The resulting signals which are then broadcast have a bandwidth of approximately 4.5 MHz. Parameter W-CDMA Uplink 1920-1980 MHz Downlink 2110-2170 MHz Access DS-CDMA Duplex procedure FDD Modulation QPSK Pulse shaping Root-raised cos, Chip rate ÃŽÂ ± = 0:22 User data rate 384 kb/s; 2 Mb/s Bandwidth/channel 5MHz Max. output power 21 dBm (Class IV) TD-SCDMA It was proposed by the China Wireless Telecommunication Standards group to the ITU in 1999.60MHz has been reserved for CDMA2000 and UMTS, but TD-SCDMA has reserved 155MHz.In common with UMTS-TDD,TD-SCDMA does not require separate uplink and downlink and offer speeds from as low as 1.2kbps up to 2 Mbps. Uplink and downlink traffic can be transferred in the same frame but in different time slots, and there can be up to 16 codes allocated per slot, more time slot can be devoted to downlink transfer than in the uplink. This allocation of time slots is dynamic and if a symmetric allocation is required, which is usually the case for a telephone call, then this will also be allocated the required resources. The minimum frequency band required for this system is 1.6 MHz and the chip rate is 1.28Mcps.it does not have soft handover mechanism but has a system similar to GSM where the mobile device are tightly synchronized to the network, and it is from here that the term syschronous is derived. it is designed to work with a GSM core network is similar way to WCDMA and can also use the UTRAN signalling stack when it is deployed as a complementary technology. The frame is 5 ms rather than 10ms in WCDMA and split into seven slot. [2]. 4G The future system technology of 4G should bring something that is very enchancing when compared to the previous technologies. 4G yet does not have a meaning as it has not yet been established. However the current targets for it are as follows: system interoperability:-flexible interoperability of the various kind of existing wireless network, such as satellite, cellular wireless, WLAN, PAN and system for wireless access to the fixed network. It ability to roam between multiple wireless and mobile standards. Due to the interoperability of different mobile and wireless network through the same terminal we can identify the three possible configuration. There are 1.Multimode terminals:-this is obviously achieved by incorporating multiple interfaces to the terminal, one for the access methods of every different kind of wireless network. The ability to use many access methods will enable users to use a single device to access the 4G network irrespective of the particular access method used. 2.Overlay network:- In this architecture user will access the 4G network through the Access Points of an overall network. The AP will perform protocol translation and Qos negotiation for the connections. Since APs can monitor the resource used by a user, this architecture supports single billing and subscription. 3.Common access protocol:-this choice calls for use one or two standard access protocol by the wireless networks. A possible option is for the wireless networks to use either ATM cells with additional headers or WATM cells. Terminal bandwidth and battery life:- Future generation network will be covering a large range of banwidths from about a couple of kbps to about 100 Mbps or above. The battery life is expected to be about a week. This will happen with a reduction of the size of the battery. Packet-switched fixed network.:- This 4G technology will use wireless IP based fixed networks which will be able to connect the mobiles with the wireless networks effectively. Varying quality of bandwidth for wireless access:- Having a range of networks together will cause it to overlap with other networks. Due to where they are, the user will be abl to use different qualities of wireless by the change of bandwidth. Distribution layer: This layer of the network will be able to help with digital video as well as broadcasting and due to a good coverage will cover all areas. Cellular layer: This layer of the wireless network will give a load of capacity providing many users as well as provide good coverage in highly populated areas. It will allow data sizes of over 2 Mbps. The cell size will also be small compared to the distribution layer, and will support good mobility. Hot-spot layer: This layer will help with good service over a short distance. It will include WLAN systems like IEEE 802.11 and HIPERLAN. This layer will not provide great coverage in particular as it is a short distance however roaming should be available. Personal network layer: This layer will include wireless connection however in short ranges say through the use of Bluetooth. Mobility will be less but roaming should be available. Fixed layers: This layer uses an access system which is fixed. Advanced base stations: In the future for networks, the new smart antennas will make the capacity bigger as well as base stations having self-configuration not needing the need for employment. This would reduce costs. They will include a good range of terminals. High data rates: The 3G system will be changed using what it has already to form the new 4G generation. The 4G generation will offer higher speed than the 3G generation. The introduction of 4G needs specific targets which are named above. To get to these targets, 4G needs the basis on how to achieve this which is explained in detail below.[1]. How 4G works: In the networks which have the 4G wireless technology, each one will be given an IP address which will have a home IP address and an address which represents its real location. When the computer in the Internet wants to communicate with another device perhaps a mobile phone in the wireless network. The computer will be able to send packets to the IP address of the 4G technology getting to know the home address too. To the phones address, the directory will send the packet through a tunnel, or a mobile IP, whilst on the meantime the directory server would also let the computer know that the phones address is correct. After this the other packets can be sent. The use of4G-IP address (IPv6) is that it will be able to carry more info than in the past with the IP address (IPv4). In this IP address, software can use them to tell the differences between services and to communicate with network areas of different sorts. This could be with the computer and the phones network. An example includes Moreover which uses 4G technology not only has this transmission way but also uses OFDM, MC-CDMA, LAS-CDMA, UWB *7 and Network-LMDS.[4] Orthogonal Frequency Division Multiplexing abbreviated as OFDM, passes on figures on a great quantity through a radio wave. Changing the radio signal into many small signals then transferred at the same time through different frequencies to the receiver is the method in which this is carried out. OFDM is a digital technology through modulation which increase strength of these signal; this is good for high digital data transition. This is a great digital technology method in which through the process of modulation increases the strength of the signal and is good for a transition of high quality digital data.[2] Orthogonal Frequency Division Multiplexing simple function In this time, users might have a good question about how theses waves targeted the correct destination. A OFDM makes the radio wave target the right place though a couple of devices which are wireless, which make a connection tunnel when they start communication. After connecting the target, the radio wave splits into smaller signals which have the correct direction towards the target. MS-CDMA stands for Multi-Carrier Code Division Multiple Access, which is actually OFDM with a CDMA overlay. The users are multiplexed with orthogonal codes to differentiate users in MS-CDMA and single-carrier CDMA systems. It allows flexible system design between cellular system and signal cell system. However, in MC-CDMA, each user can be allocated several codes, where the data is spread in time or frequency. LAS-CDMA the shortened form for Large Area Synchronized Code Division Multiple Access, is made through by LinkAir Communication which is basically wireless technology through the developed 4G technology. LAS-CDMA makes voice capacity better, with high speed and the latest original solution called Code-Division Duplex (CDD) which combines the LAS-CDMA technology with the greater data transmission type of Time-Division Duplex (TDD). This combination makes Code-Division Duplex to be very spectrally efficient as well as having high speed available today as a great system. LAS-CDMA is seen as being the great 4G technologys World Cell. If two wireless devices for instance are a quite big distance apart then using this protocol which has IPv6 to create the connection. In the 4G world, UWB radio which solves the multi-path weakening matters through its clever use of electrical impulses which has all frequencies at one time. Due to its low-power condition though, this UWB cannot be used outside of being indoors or underground. UWB should be used however with OFDM which cal transfer digital data on a large scale. This is positive though as the UWB would be running insides equally as the OFDM runs outside which means that the signal can stay strong. UWB also needs to be used in small distances inside the buildings through 4G technology. The broadband technology which is wireless used to carry video, data Internet as well as voice in 25 GHz is the Network-LMDS Local Multipoint distribution system. This method makes sure all these things are carried together at once, and this can be the result in the fading issue locally. [4] Differences between 3G and 4G: The main factors in which 3G and 4G technologies vary is due to their services, their ways of transmission, access to the web, the rates of transfer, security as well as quality. 3G technology can only carry upto the speed of about and up to 2 Mbps however 4G technology can go much higher to a better speed. 4G technologies can provide global connection whereas for 3G markets it is difficult to roam globally. Technology which uses 4G can provide global roaming at a lower price. 3g is based on the notion through circuits and packets through things like WCDMA, CDMA and TD-SDMA. However 4G uses the use of packets. As mentioned above about the differentiation between the 3G and 4G, this has been broadened in the tab le below. Feature 3G wireless technology 4G Wireless technology Speed Up to 2Mbps Full-mobility: up to 100Mbps Low-mobility:up to 1Gbps Service Difficult of global roaming Expensive good for voice transmission roaming smoothly inexpensive good for any type of transmission Core Network Wide-area concept Circuit and packet switching broadband IP-based Entirely packet switching Technologies WCDMA CDMA TD-SDMA All access convergence Main: OFDM MC-CDMA LAS-CDMA UWB Network-LMPS Wimax Wimax which stands for Worldwide Interoperability for Microwave Access was made to give a ordinary structure for wireless connectivity in permanent, moveable, and mobile environments. WiMAX is a wireless technology intended to give high throughput over a distance. It gives the quick broadband of link. It also provides wireless access which reduces costs which involves the fibre and making buildings. It has a range that goes beyond WiFi. A WiMAX uses two hardware components a WiMAX tower as well as WiMAX receiver. This tower covers a 30 mile radius. The tower joins to the Internet using a wide connection through a wireline, or it offers a wireless link to other WiMAX towers with Line Of Site (LOS for short) microwave links. The receiver could be anything. NLOS (non-line of sight in full) connections join devices to the tower using a frequency range of 2-11 GHz as low wavelength signals are strong. LOS connections however do not cover as large area but covers and area of 4-6 miles. QoS is the aspect in a technology to deliver high bandwidth services. Examples of such include VoIP and IP video services as well as other services as such. To provide such QoS service, the WiMax need to make sure they have a low latency.[4] WiMAX security is defined in the Privacy Sub-layer in the MAC Layer, as specified by WiMAX standards. Fixed WiMAX (802.16-2004) typically uses X.509 certificates for authentication and 56-bit Digital Encryption System (DES), while Mobile WiMAX (802.16e-2005) uses EAP for authentication and Advanced Encryption System (AES) for encryption. Both employ Privacy Key Management (PKM) for authentication between base station and subscriber station.[5][9]. LTE Long Term Evolution (LTE) is a 4G wireless broadband technology made by the Third Generation Partnership Project. LTE has many benefits for not only the consumer but also the workers too: Performance and capacity one request that the LTE is to provide downlink rates of a minimum of 100Mbit/s and needs the technology to allow for speeds that are over 200Mbit/s. Simplicity 1. From below 5MHz up to 20MHz, LTE supports carrier bandwidths. LTE also supports both FDD (Frequency Division Duplex) and TDD (Time Division Duplex). Ten paired and four unpaired spectrum bands have so far been identified by 3GPP for LTE. it is easiest to deploy 10MHz or 20MHz carriers, and eventually deploy LTE in all bands. 2.plug-and-play, self-configuration and self-optimization will simplify and reduce the cost of network roll-out and management. 3.LTE will be deployed in parallel with simplified, IP-based core and transport networks that are easier to build, maintain and introduce services on. Wide range of terminals- LTE supports hand-over and roaming to existing mobile networks, all devices can have ubiquitous mobile broadband coverage from day one[6].[9] COMPARSION BETWEEN WIMAX AND LTE Aspect Wimax LTE Access technology Downlink(DL) Uplink(UL) OFDMA OFDMA OFDMA SC-FDMA Frequency band 2.3-2.4GHz,2.496-2.69GHz ~2GHz Bit-rate: DL UL 75Mbps(MIMO 2TX 2RX) 25Mbps 100Mbps(MIMO 2TX 2RX) 50Mbps Channnel bandwidth 5,8.75,10MHz 1.25-20MHz Cell radius 2-7km 5km Cell capacity 100-200 users >200 users in 5MHz >400 users for large BW Spectral efficiency 3.75[bits/sec/Hz] 5[bits/sec/hz] Mobility: Speed Handovers Up to 120km/h Optimized hard handovers supported Up to 250km/h Inter-cell soft handovers supported Legacy IEEE802.16a through 16d GSM/GPRS/EGPRS/UMTS/HSPA MIMO DL UL No. of code words 2Tx X 2Rx 1Tx X NRx(Collaborative SM) 1 2Tx X 2RX 2Tx X 2Rx 2 Standardization coverage IEEE 802.16e-2005 PHY and MAC CN standardization in Wimax RAN(PHY+MAC)+CN Roaming framework Wimax forum Auto through existing GSM/UMTS [7].Verizon has devoted to using Long Term Evolution starting by soon, ensuring to deliver ten times the data throughput of 3G technologies in the current time. Others, including NTT DoCoMo in Japan, France Telecom, Vodafone in the UK, ATT, and T-Mobile have said also they will use LTE rather than WiMAX. Meanwhile, Sprint, Clearwire, and Comcast in the U.S., UQ Communications in Japan, and Yota in Russia are all competitively using 4G networks suitable for mobile networks using todays edition of WiMAX, 802.16e (2 to 10 Mbps), in inner-city markets where they will without doubt compete with 3G (and later, LTE) sources. The WiMAX Forum declares that 504 operators in 145 countries have organized WiMAX, but many use older 802.16d technology that however cannot provide mobile services, and many are small operators in developing countries or pastoral areas.[8] Conclusion:- In every generation, when there is a default, the next following generation gets rid of this and a new idea or notion is found as a result. However at some points this may be difficult to happen due to several reasons. The world is looking forward for the most intellectual technology that would bond the full earth. New ideas are being introduced by researchers throughout the world, but new ideas introduce new challenges. There are several issues yet to be solved like integrating the mobile world to the IP based core network, resourceful billing system, and smooth hand off mechanisms.

Friday, October 25, 2019

Was Macbeth A Traitor :: essays research papers

'Macbeth deserved to die because he was totally responsible for the betraying the Scottish king, Duncan, and the Scottish people';. Write an analytical essay in which you explore the forces behind Macbeth's murdering ways. Macbeth deserved to die for betraying the Scottish king, Duncan, and the Scottish people; however, he was not totally responsible for his actions. Lady Macbeth and the three Witches also played a major role. They were responsible for convincing Macbeth to begin the series of events, which eventually led to the destruction of order in Scotland. Once she had received news of the three Witches' prophecies, Lady Macbeth was intent that she would eventually become Queen of Scotland. Initially, Macbeth had decided not to murder Duncan, 'We will proceed no further in this business'; (Macbeth, Act I, scene vii). However, Lady Macbeth was determined to continue with her original plan. She repeatedly insulted Macbeth's manhood, provoking him to continue with the plans to murder Duncan, 'When you durst do it, then you were a man; and to be more than what you were, you would be so much more the man'; (Lady Macbeth, Act I, scene vii). She appealed to Macbeth's 'vaulting ambition'; so as to intensify the effect that the Witches' prophecies had on him, 'Great Glamis! Worthy Cawdor! Greater than both, by the all-hail hereafter'; (Lady Macbeth, Act I, scene v). She convinced Macbeth that the rewards of the murder would far outweigh the drawbacks and clear their conscience, 'A little water clears us of this deed'; (Lady Macbeth, Act I, scen e ii). Although Macbeth dearly loved his king, Lady Macbeth yielded such a persuasive power over him that he was convinced the Witches' prophecies of Duncan's murder and the resulting kingship were his rightful fate. The three Witches deceived Macbeth by proclaiming ambiguous prophecies, which led him to believe that he would be a powerful and loved king. The second apparition, 'Be bloody, bold, and resolute; laugh to scorn The power of man, for none of woman born shall harm Macbeth'; (a bloody child, Act IV, scene i) led him to believe that he would never be harmed, as nobody alive can be 'none of woman born';. Macbeth failed to realise that the apparition was referring to Macduff, who was born by caesarean. The third apparition, 'Macbeth shall never vanquished be until Great Birnam Wood to High Dunsinane hill shall come against him'; (a child crowned with a tree in his hands, Act IV, scene i) also fooled Macbeth into believing that he would not be harmed as king.

Thursday, October 24, 2019

Advanced Technology Boon or Curse

CURRICULUM VITAE VANDANA KOLI E-MAIL:[email  protected] com CONTACT NO: 08816993499 Address: H. NO 1615 near gymkhana club Sector- 4, Rewari OBJECTIVE: To establish myself as a successful professional by executing my skills acquired from my academic qualifications, rich experience by personal approach to a given problem.Application of my talents and skills in the new atmosphere, with challenging outlook to gain the desired result in a given field. EDUCATION:- Professional Qualifications: Completed MBA in HR & Marketing from SITM Rewari (affiliated to MDU University Rohtak Haryana) Academic Qualifications: Completed Bachelor of Arts from M. D. University ( Rohtak) in 2010. Completed Senior Secondary from C. B. S. E in 2007. Completed Higher Secondary from C. B. S. E in 2005. KNOWLEDGE ACQUIRED DURING JOB :- 1. Related essay: Internal Competition: A Curse for Team Performance?Develop interpersonal skill to interact with different kind of peoples. 2. Enhance knowledge . 3. A way of working . 4. How to work with team. AREA OF INTEREST: †¢ Interact with new people to share her views.. †¢ Internet surfing . PERSONAL SKILLS: †¢ Self Confidence & Willingness to Work. †¢ Good learner about new project or work. COMPUTER SKILLS: †¢ Basic Knowledge about computer †¢ Knowledge of MS Office and Internet. PERSONAL DETAILS: Father’s Name : Mr. Ranbir Singh Mother’s Name : Mrs. Sushila DeviDate of Birth : 9th March 1989 Sex : Female Nationality : Indian Marital Status : Single Languages Known : English, Hindi , Punjabi Permanent Address : H. NO. 1615 near gymkhana club Sector – 4, Rewari Pin No. -123401 Haryana DECLARATION: I, VANDANA KOLI Solemnly declare that the information given above are all true to the best of my Knowledge & believe. Place: REWARI Signature VANDANA KOLI

Wednesday, October 23, 2019

The Impact of Information Technology Infrastructure Flexibility on Strategic Alignment and Applications Implementation

The Impact of Information Technology Infrastructure Flexibility on Strategic Alignment and Applications Implementation Sock H. Chung Department of Computer Information Systems College of Business Eastern Michigan University Ypsilanti, MI 48197 sock. [email  protected] emich. edu R. Kelly Rainer, Jr. ** Department of Management College of Business Auburn University Auburn, Alabama 36849 (334) 844-6527 [email  protected] auburn. edu Bruce R. Lewis Calloway School of Business Wake Forest University Winston-Salem, NC 27109 (336) 758-7195 [email  protected] edu ** Corresponding Author: Kelly Rainer The Impact of Information Technology Infrastructure Flexibility on Strategic Alignment and Applications Implementation Abstract IT infrastructure flexibility is now being viewed as an organizational core competency that is necessary for organizations to survive and prosper in rapidly-changing, competitive, business environments. Utilizing data from 200 U. S. and Canadian companies, this study examines the impact of the four components of IT infrastructure flexibility (compatibility, connectivity, modularity, and IT personnel) on strategic IT-business alignment and the extent of applications implementation within an organization. The findings from analysis of a structural model provide evidence that connectivity, modularity, and IT personnel have significant, positive impacts on strategic alignment and that all four components have significant, positive impacts on the extent of applications implementation. The study reinforces the importance of IT infrastructure flexibility to organizations as one source for sustainable competitive advantage. Key Words: IT infrastructure flexibility, strategic IT-business alignment I. INTRODUCTION In the early 1990s, Johnson & Johnson faced new business pressures when large customers, such as Wal-Mart and K-mart, made new demands on the company, such as cost savings and just-in-time stock replenishment. Johnson & Johnson’s business and IT managers acted in partnership to develop a new set of information technology (IT) infrastructure capabilities which enabled the company to provide the necessary services for its large customers while at the same time reducing costs at Johnson & Johnson [Weill & Broadbent, 1998]. In the late 1990s, Charles Schwab focused on delivering customized information to its investors in a timely manner. Using the company's IT infrastructure and applications aligned with its business focus, Schwab became a full service brokerage firm. The firm was able to provide information and process transactions in meeting its business objectives. Customers could retrieve stock quotes and place orders via Schwab's Web site. As a result, the corporation continues to be an industry leader. These two examples demonstrate that an organization’s IT infrastructure can provide tangible benefits and a continuity of business practices [Kettinger, Grover, Subanish, & Segars, 1994]. A particularly important characteristic of IT infrastructure is flexibility [Byrd & Turner, 2000]. Researchers have stated that IT infrastructure flexibility should be viewed as an organizational core competency and that IT infrastructure flexibility is necessary to handle increased customer demands without increased costs [Davenport & Linder, 1994; Weill, 1993]. As we discuss next in developing the theoretical framework for our study, two important aspects of IT infrastructure flexibility emerge from previous research: the core business applications of an organization and the strategic IT-business alignment. That is, an organization’s IT infrastructure flexibility should be reflected in its implementation of core business applications and the extent of its strategic IT-business alignment. Therefore, the purpose of this study is to empirically examine the relationship between IT infrastructure flexibility and the extent of applications implementation in the organization and the relationship between IT infrastructure flexibility and strategic IT-business alignment. II. THEORETICAL FRAMEWORK We develop our theoretical framework by first reviewing definitions of IT infrastructure and its components. We then define the concept of IT infrastructure flexibility and its relationship to strategic IT-business alignment and to applications implementation in the organization. Information Technology Infrastructure The topic of IT infrastructure has been a key issue for both researchers and practicing managers for some time [see e. g. , Brancheau, Janz, & Wetherbe, 1996]. The organization’s IT infrastructure basically integrates technology components to support business needs but the IT infrastructure concept is more complicated. The definition of IT infrastructure encompasses a variety of components. Based on previous studies, Duncan [1995] stated that IT infrastructure includes a group of shared, tangible IT resources that provide a foundation to enable present and future business applications [Broadbent & Weill, 1997; Davenport & Linder, 1994; Earl, 1989; Keen, 1991; McKay & Brockway, 1989; Niederman, Brancheau, & Wetherbe, 1991; Weill, 1993]. These resources include: (1) computer hardware and software (e. g. , operating systems); (2) network and telecommunications technologies; (3) key data; (4) core data-processing applications; 5) shared IT services. Duncan [1995] also stated that IT infrastructure includes the alignment of IT plans to business objectives, the IT architecture, and the skills of IT personnel. Broadbent and Weill [1997] noted that IT infrastructure capabilities enable the various types of IT applications required to support current and future business objectives, and enable the competitive positioning of business initiatives. McKay and Brockway [1989] describe d IT infrastructure as the enabling foundation of shared IT capabilities upon which the entire business depends. This foundation is standardized and shared by business functions within the organization, and typically used by different organizational applications. Byrd and Turner [2000, p. 172] provided a thorough definition of IT infrastructure as: â€Å"†¦ the shared IT resources consisting of a technical physical base of hardware, software, communications technologies, data, and core applications and a human component of skills, expertise, competencies, commitments, values, norms, and knowledge that combine to create IT services that are typically unique to an organization. These IT services provide a foundation for communications interchange across the entire organization and for the development and implementation of present and future business applications. † As can be seen from these definitions, the IT infrastructure is composed of two components: a technical IT infrastructure and a human IT infrastructure. The technical infrastructure consists of the applications, data, and technology [Broadbent & Weill, 1997; Broadbent, Weill, O'Brien & Neo, 1996; Henderson & Venkatraman, 1993]. The human IT infrastructure consists of the knowledge and capabilities required to manage organizational IT resources [Broadbent & Weill, 1997; Lee, Trauth & Farwell, 1995]. Davenport and Linder [1994] suggested that a robust IT infrastructure enables employees to be able to perform their respective jobs, both from having the available technology and the necessary technological skills. Information Technology Infrastructure Flexibility Early work on IT infrastructure flexibility described the concept without actually defining it. Weill [1993] asserted that an IT infrastructure should be flexible to be able to handle increased customer demands without increased costs. Davenport and Linder [1994] stated that IT infrastructure flexibility should be viewed as a core competency of the organization and suggested that an effective IT infrastructure is flexible and robust. Duncan [1995] observed that one organization’s IT infrastructure may enable strategic innovations in business processes, while another’s IT infrastructure may limit such innovations. She referred to this characteristic as IT infrastructure flexibility and suggested that both business and IT application development capabilities reflect the flexibility of infrastructure components. She suggested that infrastructure flexibility improves systems developers' ability to design and build systems to meet organizational business objectives. She described IT infrastructure flexibility through the characteristics of connectivity, compatibility, and modularity. She maintained that an organization with high modularity, compatibility, and connectivity would have high technical IT infrastructure flexibility. Compatibility is the ability to share any type of information across any technology component throughout the organization [Duncan, 1995; Keen, 1991]. Tapscott and Caston [1993] noted that IT compatibility helps span organizational boundaries, empower employees, and make data, information, and knowledge readily available in the organization. Connectivity is the ability of any technology component to communicate with any of the other components inside and outside of the organizational environment [Duncan, 1995]. Tapscott and Caston [1993] emphasized that IT connectivity enables seamless and transparent organizations that are independent of time and space. Connectivity facilitates the sharability of IT resources at the platform level. Modularity is the ability to easily reconfigure (add, modify, or remove) technology components [Duncan, 1995]. She also stated that modularity is the standardization of business processes for sharability and reusability (e. g. , structured programming and component-based software architectures). Schilling [2000] suggested that modularity is a continuum describing the degree to which a system's components can be separated and recombined. Byrd and Turner [2000, p. 172] defined IT infrastructure flexibility as â€Å"†¦the ability to easily and readily diffuse or support a wide variety of hardware, software, communications technologies, data, core applications, skills and competencies, commitments, and values within the technical physical base and the human component of the existing IT infrastructure. Historically, the flexibility of the IT infrastructure has been viewed as necessary to accommodate a rapidly changing business environment [Byrd & Turner, 2001]. This flexibility enables businesses to effectively use IT to prosper in dynamic environments. The literature review points out that strategic IT-business alignment and core business applications are embedded in the definitions of IT infrastructure and IT infrastructure flexibility. However, the actual relationships between IT infrastructure flexibility and strategic IT-business alignment and between IT infrastructure flexibility and business applications have not been empirically tested. We test these relationships through our conceptual model. III. CONCEPTUAL MODEL IT Infrastructure Flexibility and Strategic IT-Business Alignment Strategic IT-business alignment refers to the extent to which the IT mission, objectives, and plans support, and are supported by, the organization’s mission, objectives, and plans [Hirscheim & Sabherwal, 2000]. This alignment creates an integrated organization in which every function, unit, and person are focused on the organization's competitiveness. Sambamurthy and Zmud [1992] suggested that IT management is a problem of aligning the relationship between the business and the IT infrastructure to take advantage of IT opportunities and capabilities. Duncan [1995] first included the alignment of IT plans to business objectives in her description of IT infrastructure. She continued by noting that an organization’s IT infrastructure could be considered flexible if it enabled strategic innovations in business processes. Broadbent and Weill [1997] stated that IT infrastructure capabilities provide the foundation for â€Å"†¦competitive positioning of business initiatives. † From this discussion, we propose the following hypothesis: Hypothesis 1: Each component of an organization's IT infrastructure flexibility will positively affect the organization's strategic IT-business alignment. IT Infrastructure Flexibility and Applications Implementation Today, IT applications not only process data and provide management information reports. Corporations now use IT applications to gain competitive advantage [Earl, 1989; Porter & Millar, 1985; Powell, 1992; Saunders & Jones, 1992; Smith & McKeen, 1993]; to create new business opportunities [Earl, 1989; Rockart & Scott-Morton, 1984; Smith & McKeen ,1993]; to improve customer service; to enhance product and service quality; and to integrate supplier and customer operations [Luftman, Lewis, & Oldach, 1993]. Several studies have included business applications as part of IT infrastructure [see e. . , Broadbent & Weill, 1997; Byrd & Turner, 2000; Duncan, 1995]. Duncan [1995] addressed business applications when she asserted that IT infrastructure flexibility enabled organizations to build applications that more closely satisfy business objectives. Broadbent and Weill [1997] stated that IT infrastructure capabilities are the â€Å"base for computer applications. † Byrd and Turner [2000] noted that IT infrastructure flexibility enabled organizations to â€Å"†¦easily diffuse and support†¦core applications. For this study, we use the extent to which organizations have implemented a variety of business applications to examine the concept of â€Å"applications implementation. † These eleven business applications in our study include transaction processing systems, management information systems, executive information systems, decision support systems, expert systems, data warehousing, data mining, interorganizational information systems (e. g. , electronic data interchange), knowledge management, network management, and disaster recovery. From this discussion, we propose the following hypothesis: Hypothesis 2: Each component of an organization's IT infrastructure flexibility will positively affect the organization's extent of applications implementation. Conceptual Model This study utilizes four previously identified measures of IT infrastructure flexibility: the technical components of modularity, compatibility, connectivity, and IT personnel skills [see Duncan, 1995; Byrd & Turner, 2000]. The conceptual model representing the relationships addressed in this study is presented in Figure 1. [pic]* p