Premium Essay

Sw Case Answers

In:

Submitted By LDP1982
Words 653
Pages 3
It is a creative essay (about 1500 words) based on the analysis of the case that formulates vision of the company’s growth strategy and addresses the following questions: 1. Would you consider the airline industry as attractive to compete in? NOTE: analyze industry’s dynamic evolution; apply Porter’s Five Forces model; explore opportunities and threats for being in the industry. Today? No, the airline industry is not attractive (cost structure – 80% fixed cost-, high barriers to enter – route, gates, …, etc.) 2. Why and how Southwest Airlines was able to grow into the industry leader? NOTE: make five key statements and provide supporting arguments for each statement. Southwest Airlines was able to grow into the industry leader mainly for the following reasons: a) Short-haul and point-to-point routes Southwest airlines reevaluated the traditional model hub-and-spoke used by major players based on a different point of view: the customers’ one. Indeed, customers prefer a trip point to point, especially on routes below 500 miles. Besides they generally prefer airports near as possible to the center of the destination city. Understanding these elements, Southwest airlines focused its attention on building an offer of domestic short-haul (less than 500 miles), point-to-point flights. b) High frequency flights Southwest airlines increased the number of flights per day through a reduced turnaround time. Indeed the company was able to unload a waiting plane and load it again for the next flight in about 15 minutes, compared with the industry average of 45 minutes. c) Low fares Southwest airlines, leveraging on its operative efficiency, was able to offer lower fares to its customers. The main efficiency drivers were the turnaround time, Southwest’s limited participation in computerized reservation systems, and essential

Similar Documents

Premium Essay

The Hypothetico-Deductive Approach

...THE HYPOTHETICO-DEDUCTIVE APPROACH The purist hypothetico-deductive perspective "...emphasizes universal laws of cause and effect on an explanatory framework which assumes a realist ontology; that is that reality consists of a world of objectively defined facts" (Bullinga, M. (2012). In the deductivist tradition the researcher starts "....with an abstract, logical relationship among concepts then move(s) towards concrete empirical evidence", (Arnesen, 2013). Thus in deductivist research there is a well-established role for existing theory since it informs the development of hypotheses, the choice of variables, and the resultant measures which researchers intend to use. Within this paradigm the scientist formulates a particular theoretical framework and then sets about testing it. In an example of this approach, which was relevant to our research, Bres in 2015 study the factors that determine users’ trust in their researchers. Their theoretical framework shows that various antecedents influence ‘user trust’ in the researcher and, in turn, this influences the utilization of market research information. For example "perceived researcher interpersonal characteristics" are antecedents to trust; one of the components of these is the ‘perceived expertise’ of researchers. Their theory hypothesizes a relationship between user trust in the researcher and researcher expertise. The basis for the hypothesis lies in previous work by Crosby Evans and Cowles (1990). Since the researchers have...

Words: 1658 - Pages: 7

Premium Essay

Joinjoin

...www.hbrreprints.org HBR CASE STUDY AND COMMENTARY Should Harbinson recommend further investment in Seven Peaks? Four commentators offer expert advice. Good Money After Bad? by John W. Mullins • Reprint R0703A Jack Brandon’s initial idea has not panned out, and the cash is nearly gone. But he’s got a new plan. Will you back him a second time? HBR CASE STUDY Good Money After Bad? by John W. Mullins COPYRIGHT © 2007 HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION. ALL RIGHTS RESERVED. From a rocky perch overlooking the sparkling lights of San Francisco, Christian Harbinson gazed across the bay to the hills above Sausalito. “There’s nothing like a vigorous hike,” he thought, “to clear the mind before a crucial meeting.” It was a mild March evening, and the 35-year-old venture capitalist was reflecting on the recommendation he would have to make to his firm’s investment committee the next morning about Jack Brandon’s young company, Seven Peaks Technologies. Seven Peaks had developed an innovative device for cauterizing blood vessels during electrosurgery, and although the feedback from surgeons had been excellent, sales had been slow. The Palo Alto–based venture capital firm where Harbinson worked, Scharfstein Weekes, had invested $600,000 in Seven Peaks from its newly raised second fund of $100 million. SW’s current investment strategy focused on early-stage medical technology companies, and Seven Peaks was a typical investment for the firm, which liked...

Words: 5599 - Pages: 23

Premium Essay

Investigating the Presentation of Speech

...Investigating the presentation of speech, writing and thought in spoken British English: A corpus-based approach1 Dan McIntyre a, Carol Bellard-Thomson b, John Heywood c, Tony McEnery c, Elena Semino c and Mick Short c a Liverpool Hope University College, UK, b University of Kent at Canterbury, UK, c Lancaster University, UK Abstract In this paper we describe the Lancaster Speech, Writing and Thought Presentation (SW&TP2) Spoken Corpus. We have constructed this corpus to investigate the ways in which speakers present speech, thought and writing in contemporary spoken British English, with the associated aim of comparing our findings with the patterns revealed by the previous Lancaster corpus-based investigation of SW&TP in written texts. We describe the structure of the corpus and the archives from which its composite texts are taken. These are the spoken section of the British National Corpus, and archives currently housed in the Centre for North West Regional Studies (CNWRS) at Lancaster University. We discuss the decisions that we made concerning the selection of suitable extracts from the archives, the re-transcription that was necessary in order to use the original CNWRS archive texts in our corpus, and the problems associated with the original archived transcripts. Having described the sources of our corpus, we move on to consider issues surrounding the mark-up of our data with TEI-conformant SGML, and the problems associated with capturing in electronic form the CNWRS...

Words: 10539 - Pages: 43

Premium Essay

Zzz Sss Rff

...NATIONAL UNIVERSITY OF SINGAPORE NUS BUSINESS SCHOOL Department of Finance BMA5318: Investment Banking (Summer I: May-June 2012) Instructor: Banikanta Mishra Office: BIZ 1 Level 7-77 Telephone: +91-943-707-5075 E-mail: banikant@ximb.ac.in Prerequisite: BMA5008 (Financial Management) COURSE SYNOPSIS: This course is a blended introduction to Investment Banking (IB). It would combine theory and practice. To buttress our understanding of practice, we would do some case studies and also have practitioners give a Street Talk every week; some of them may discuss live projects and I may pitch in with my experience with past ones I have been directly involved in. Moreover, we would have both qualitative and quantitative discussions on most topics, the latter mainly being numerical examples (not any rocket science or high-flying calculus). Though we would talk about the global scenario, our focus, whenever possible, would be on Asia. After gaining an idea into what IB is and understanding the basics of Trading, we would study in detail the capital-raising process, mainly Underwriting and Syndication. Here, we would learn about IPO and SEO and ADR and GDR as well as about NIF and RUF. We would also get familiar with Euromarket and the innovative Euro instruments like Euronote and Euro-CP as well as Eurobond and Euroequity. This would also give an opportunity to get a glimpse into Financial Engineering in debt and equity instruments as well as about Structured...

Words: 1772 - Pages: 8

Premium Essay

Critical Thinking in Customer Service

...Critical Thinking in Customer Service: Making Rational Decisions for Conflict Resolution Introduction At one time in their lives or another, most people in the United States of working age have held employment positions where customer interaction was a necessity. While it can be argued that some personality types are better suited to human interaction than others, customer service positions maintain some of the highest turnover rates of any industry. Customer service positions expose employees to a wide range of people with unique personalities and motivations, often mixing in feelings of disappoint and/or anger regarding their particular situation (Ivancevich, 2010, p 392). Employees in customer service positions often perceive themselves as being “ineffective, unwanted or unneeded, without the tools needed to truly service customers.” As many customer service representatives are faced with the daily task of providing conflict resolution to often angry customers, it is very important that they feel empowered and trusted to make decisions that not only impact a company’s bottom line, but that also satisfies the customer’s original request or complaint (Ivancevich, 2010, p 393). Discussion of the Literature While many individuals utilize some type of customer service on nearly a daily basis, the majority of people do not understand the job competencies and necessary qualifications that are needed to be able to effectively handle inquiries and diffuse tense situations...

Words: 2358 - Pages: 10

Free Essay

Trust Mechanisms

... Keywords-component; semantic web;Trust; Policy Based Systen; Reputation Based Sytems Introduction The idea behind semantic web seems great and offers a lot but why one should trust in semantic web. Who would trust such a system where anyone can say anything. We say that it is going to be a smart web, it will be intelligent and it will know the semantics. It will know what we are looking for. But what happens when a person says that x is yellow and another person says x is not yellow. Would semantic web fall apart? The idea behind SW is its authenticity of information which isn’t available in today’s web. Information comes from different sources which could be wrong or write and for a specific situation. So how are we going to determine which is reliable and whom should we believe? To tackle these kinds of situations we have semantic web trust. In this paper we are going to discuss different methods of implementing trust in SW. 1 Day to Day trust policies Trust policy is a subjective practice used for the evaluation of the trustworthiness of information in a particular situation. For example ➢ Try pizza hut’s pizza but not pasta. ➢ Trust Abdullah on...

Words: 3887 - Pages: 16

Premium Essay

Adobe Systems Case Discussion

...Adobe Systems SYSM6332- summer 2015 Discussion Case 1 David Reboredo Daniel Torres Background: * Adobe Systems was founded in 1982 by John Warnock and Charles Geschke. Initially the company was operating only in the graphics and publishing market. First they introduced PostScript as a desktop publishing application, followed by Illustrator, Photoshop and InDesign, all of which turned out to be exceptionally successful. The next step was introducing Acrobat and the PDF document format, which also quickly became an industry standard. * In the subsequent years Adobe added to its product mix successful products like PageMaker, After Effects and GoLive by acquisition. Despite all these achievements, the company experienced substantial difficulties during 1998. Important product delivery date was missed, sales declined and the stock price plummeted encouraging a takeover attempt by one of their direct competitors, Quark, Inc. * Bruce Chizen, who was appointed as a CEO later in 2000, managed to stabilize the situation. This was not an easy task, as most of Adobe's executive management left the company while he had to lead a drastic restructuring of the business. Adobe had to carry out a major reform in order to be more profitable. Case Overview: * This case describes the early success Adobe had establishing Postscript as the preferred software application for printing documents. The case describes the strategy Adobe set in motion to secure script position as the...

Words: 1807 - Pages: 8

Premium Essay

Analyze Search Warrant

...Week 2 Project 1: Analyze a Search Warrant Review the affidavit and search warrant for the search of a computer suspected to be evidence in a crime (provided by your instructor), and answer the following questions: 1. What is the affidavit asking the judge to authorize (specifically)? The affidavit is asking the judge to authorize the search of Mr. Yup I. Didit’s Dell Precision T3500 desktop computer, black in color, serial number 5V678QR, containing Electronic Media Storage (e.g., hard drive(s)) and four (4) Memorex recordable compact discs currently located at the Kansas State Highway Patrol Evidence Room, 122 SW 7th, Topeka, KS 66603. 2. What was good about this affidavit? What, if anything, could have been done to strengthen this affidavit? The affidavit itself is very specific about what is to be searched – the computer and the additional four CDs. As well as what information they are looking for. To make this affidavit stronger they should have included going to the residence of Mr. Didit’s to look for additional storage media that could contain evidence of the crime. 3. If you are the forensic examiner in this case, and this warrant was given to you with Mr. Didit's seized desktop and removable media, what do you have the authority to search? For what do you have the authority to search? You have the authority to search the entire desktop and removable media. You are looking for any data or information (including but not limited to files, folders, emails...

Words: 575 - Pages: 3

Free Essay

Infs Assignment

...cu MOVEIN BUSINESS INTELLIGENCE AND ANALYTICS REPORT me nt ap A  Business  Plan  on  the  Role  of  Business  Intelligence  and  Analytics  for   MoveIn  Pty  Ltd               Th ink sw Do   TABLE  OF  CONTENTS   Executive  Summary   ........................................................................................................................  2   1  -­‐  Introduction  ..............................................................................................................................  3   2  -­‐  Role  of  Business  Intelligence  .....................................................................................................  3   2.1  -­‐  Business  Intelligence  -­‐  Overview  ...............................................................................................  3   2.2  -­‐  Business  Intelligence  Tools  ........................................................................................................  4   2.2.1  -­‐  On-­‐line  Analytical  Processing  ..............................................................................................  4   2.2.2  -­‐  Data  Mining  ........................................................................................................................  5 ...

Words: 4854 - Pages: 20

Free Essay

Investment

...equally matched.) This corresponds to the case when the game is symmetric. (Time and Newsweek get the same payoff when both magazines cover the same story.) Newsweek Time | | Impeachment | Financial Crisis | | Impeachment | 45, 45 | 90, 40 | | Financial Crisis | 40, 90 | 20, 20 | * Does the game have dominant strategies for both players? If yes, describe them. Can the game be solved by dominant strategies? Answer: Yes, Time’s dominant strategy is “impeachment,” and Newsweek’s dominant strategy is also “impeachment.” So the game can be solved by dominant strategies: both Time and Newsweek will choose “impeachment.” Analysis: For Time, who is the first player and the row player, we compare its rows: (45, 90) to (40, 20). 45>40, 90>20, the first row (impeachment) is always the best, so impeachment is the dominant strategy for Time. For Newsweek, who is the second player and the column player, we compare its columns: (4590) to (4020). 45>40, 90>20, the first column (impeachment) is always the best, so impeachment is the dominant strategy for Newsweek. * Determine all Nash equilibria. Newsweek Time | | Impeachment | Financial Crisis | | Impeachment | 45, 45 | 90, 40 | | Financial Crisis | 40, 90 | 20, 20 | Answer: Using the double check method that I...

Words: 936 - Pages: 4

Premium Essay

Managerial Accounting

...000 Security 12,000 Consulting 10,000 Community Mental Health Services Salaries (two s w) 46,000 ;Trans 10,000 Outpt mental health tx Salaries:Psychiatrist 86,000 2 SW 70,000 Give a Give a dollar range of costs to reduce budgets (worst and best case analysis). You need to cut $94,000 in cost. Prioritize those cuts that can be made withwithout impacting the operation or quality care of the organization.How would you advise Dr. White to prepare for reduced budgets? excel spread sheet Solution To be able to answer the questions and decide on costs that could be cut, we must divide costs into discretionary and committed costs. Discretionary Fixed Costs (also known as Managed Fixed Costs) usually arise from annual decisions by management to spend in certain fixed costs. There are basically 2 differences between Discretionary and Committed Fixed Costs; 1) The planning horizon for Discretionary Fixed Costs is fairly short-term, usually a single year; and 2) Discretionary Fixed Costs can be cut for short periods of time with minimal damage to the long-run goals of the organization. In the attached excel sheet I listed all costs & divided them into Committed and Discretionary. Some of the costs that I have listed as Discretionary (Transportation, for example) might be on a long-term contract, and in that case they would become Committed. 1. Give a dollar range of costs...

Words: 581 - Pages: 3

Premium Essay

Internet Influence

...Internet Influence The internet is a network of computers that offers access and information. It is an advancement that holds numerous opportunities. The internet has transformed our lives and made our activities, communication and the technologies faster than ever before. Overall it has affected our lives as a whole and made our lives complex and stressful in every single aspect of human society. “The advent of the Internet has been one of the most exciting major events in the second half of the 20th century. The ancient dream of a scholar knows all things happening in the world without venturing outdoors have finally become a reality.” (Guangrong, 1998). So at the very beginning of this century people could understand the impact of the internet. With the period of time the internet became powerful because it contains the biggest resource of information in the entire world and people can instantly communicate with each other. The internet consists of rapid and smooth access to a boundless amount of information and it has both positive and negative aspects but this paper deals with the negative influences of the internet. The internet is one of the most used search tools on the Earth. Over uses of the internet separate people from the real world. People’s face to face or direct communication is decreasing. They communicate...

Words: 1698 - Pages: 7

Free Essay

Mis 650: Internal Corporate Social Networks

...Case Study: 1. Identify the people, organization , and technology factors responsible for slow adoption rates of internal corporate social networks. Currently internal networks are average or below average usually built on outdated technology. Social networks not become the core of collaboration at the companies. Inertia in organization, many do work as they used to do from upper management to employees. Without realization that it would help to do their jobs, employees feel too time pressed to learn a new software tool also lacking incentive to use as necessary tool to complete work. Companies usually lack the analytic capabilities measure the performance and value created by their internal social network. 2. Why the most of the companies described in the case been successful in implementing internal social networks? It did not require big capital investment. CSC: Software allowed the company both to network within the company as well as with suppliers, partners, and customers which stratified a supply chain and customer feedback. Created “champions”, advocates to help in adoption, first tested over 200 groups before widespread implementation. Red Robbin refine recipes and operational procedures in restaurants in the franchise with fast turnaround and quick feedback on recipes change and operational decisions. Den-Mat Switched from 30 y.o. legacy system and paper, from e-mail to Chatter updates. Allowed some workers work from home. 3. Should all companies implement internal enterprise...

Words: 643 - Pages: 3

Free Essay

Cfd Modelling

...Impact Analysis of Overflow Spillway on U/S Flows & Hydraulic Structure using CFD Technique – A Case Study of Marala HPP Ali Nawaz Khan1, Muhammad Kaleem Sarwar2, Dr. Sajid Mehmood3, Azhar Bashir Magsi4 1. 2. 3. 4. Research fellow and corresponding author, Centre of Excellence in Water Resources Engineering, University of Engineering and Technology Lahore, Pakistan. E-mail: alinawaz.ce@gmail.com, Assistant Professor, Centre of Excellence in Water Resources Engineering, University of Engineering and Technology Lahore, Pakistan. E-mail: eng_Kaleem@yahoo.com Assistant Professor, Centre of Excellence in Water Resources Engineering, University of Engineering and Technology Lahore, Pakistan. E-mail: smahmoodpk@yahoo.com Project Manager, Sinotec Co., Ltd., Lahore, Pakistan. E-mail: azhar_magsi@yahoo.com Abstract Barrages and canal falls are considered as a readily available option for hydropower generation as the pre-requisites of water and head are conveniently available on such sites. Most important aspect of such scheme is to set the levels of hydraulic structures so that there is absolutely no disturbance to the irrigation flows which is the basic purpose of the barrage and canal network. At the same time finding the optimum level for the proposed structures so that the maximum hydropower benefits are yielded through the scheme without compromising the safety. Present study intends to investigate the same for Marala Hydropower Project (MHP) proposed on Upper...

Words: 3280 - Pages: 14

Premium Essay

8 Common Types of Computer Viruses

...Howard Mayo NT1230 4/3/12 8 Common Types of Computer Viruses Dictionary.com defines a computer virus as “a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network (“Virus,” 2012).” The term virus has become more generic over the years and has come to represent any type of malware, or malicious software. There are many types of malware that can be classified as viruses but it is the intention of this paper to examine 8 of the most common types. These types are virus, worms, trojans, adware/pop-up ads, spyware, keyloggers, rootkits, and scareware. * Virus- as defined above, a virus is self-replicating code planted in a computer program. This malware’s sole purpose is to destroy or shut down systems and networks. (“Virus,” 2012). * Worms- These are standalone programs whose sole purpose is to replicate and spread themselves to other computers. Their main use is to search for and delete certain files from computers. * Trojans- This malware is designed to look like a useful program while giving control of the computer to another computer. It can be used for several malicious things: * As part of a botnet to use automated spamming or distribute denial-of-service attacks. * Electronic money theft * Data theft * Downloading or uploading of files to the computer * Deletion or modification of files * Crashing the computer * Watching the viewer’s screen * Anonymous...

Words: 642 - Pages: 3