Dell Business Model

1633 Words7 Pages

The structure of the Organisations
Dell Business Model

Dell is one of the largest multinational computer technology companies in the world.
Dell was ranked #51 in fortune 500 in 2013. Recently, however CEO Michael Dell has changed Dell Inc. into a private company. As a successful company, dell has utilised and combined several business models and a dynamic sales and support operation in order to keep pace with the changing technological requirements of its customer and client base across the world.

Dell uses a combination of the following business models

 Direct Sales
 Build to Order Production

This combination of concepts is quite simple, it is however, quite complex to execute and maintain. While most computer manufacturers rely …show more content…

 Dell must fill each order individually to meet customer specifications, a process that poses enormous pressure on logistical systems, suppliers, employees and information systems.

Dell also separates its customers into Relationship, Transaction and public/International customers.
This separation helps Dell as a company to respond to rapid changes in customer requirements and demands and to design new profitable business approaches. Dell customers also have the advantage of an advanced field based sales and support team and a reliable online support system for all dell products
Build to Order Production

Dells build to order production business model has several distinct advantages over most of its competitors. Dell uses a production system using ‘Lean Manufacturing’ and ‘Just in time Production’ Methods. These methods have the advantage of lowering inventories and requiring suppliers to restock parts only as they are required. Build to order production also allows dell to improve the efficiency and speed of its production. It is also the most common communications point for sales, production and …show more content…

Dell Security Recommendations

Identify verify and Protect secure Data and the flow of data

Identify the flow of data and the nature of the data and then determine which data will be generated on, accessed from, stored on, or transmitted. Once secure data has been identified, organizations can decide on the best strategy to protect the data within the legal requirements. Heavily sensitive information will require a multifaceted strategy, including a combination of techniques

 Encryption to keep sensitive data safe in the event of a security breach;
 Secure workspaces to keep sensitive data from contaminating personal information;
 Virtualization for more secure IT control of applications and the data they process
 Data leakage protection (DLP) to control which data mobile employees can transmit through mobile devices and to prevent the transfer of secure data from a secure application to an insecure application.
 The ability to remotely wipe data from a

More about Dell Business Model

Open Document