Retrieved from https://studentshare.org/information-technology/1615909-amazon-evolution
https://studentshare.org/information-technology/1615909-amazon-evolution.
The fact that Amazon plays the role of a leading books retailer; requires the brand to stick with books, to flourish in the market. Similarly, Amazon is now producing service, a shift from the original production of books which serves as retail items. This way Amazon has created new competition with companies like Google, Microsoft amongst other internet services. Although the shift appears ridiculous, the company is moving towards market growth (Rainer, 2008).
The creation of the search engine by Amazon.com operates like Google and helps ease the internet search. The system (A9.com) has been installed in a personalized manner that allows users to create and save and control their previous visits. Amazon also created the SQS system; the system stores the queues and message data in Amazon’s network making it reliable and available in various data centers. Amazon has also installed bookmarking equipment and a toolbar that enables users to browse the search results.
A9 relies heavily on Google for the applied technology while; Amazon focuses on improving consumers’ experience. Amazon, therefore, has created its core capability for consumers with its convenience and ready access, personalized services, and competitive prices amongst other consumer base benefits (Rainer, 2008).
In recent times, data management strategy is changing to data service resulting from the increased distribution lines. Consumer ignores the database cover on the thought that; it concerns architectures. In the case of the SQS, Data services move from source A to B via an incorporating process. Therefore, the data volumes and the rush for timely information mount pressure on the consolidating application resulting in reduced data duplication. The ultimate results involve issues concerning consistency, recoverability, and access which need resolutions (Rainer, 2008). Issues of Data SecuritySecuring information proves easier than maintaining the security levels of information. Security modification utilizes techniques like the APIs, and web services amongst other integration methods.
Users remain responsible for controlling data access by an unauthorized person by the protection system applied, in some cases, the users forego the ownership of DVDs and software that protects their systems. There was an issue around the year 2009 on how security can advance in a way that groups of information can maintain security even when the users leave the system open (Rainer, 2008). Question 5Data refers to raw facts and figures, which are processed by a computer system to produce information.
The information secured is used as knowledge. Amazon applies the use of the three components in that knowledge is combined to form a decision. Knowledge can also be used to attain a competitive advantage like the one employed by Amazon. Amazon transformed the knowledge of retail selling into an idea of service providers their knowledge is difficult to imitate in the market proving the corporation with a spirited edge greater than its competitors (Rainer, 2008).
Read More