Preview

Lojack Case Summary

Powerful Essays
Open Document
Open Document
2058 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lojack Case Summary
Current Situation (LoJack) and Strategy
“LoJack Corporation markets and licenses the LoJack System, a unique, proprietary system used exclusively by law enforcement personnel to track, locate, and recover stolen motor vehicles.
The problem of vehicle theft has escalated to an epidemic level – estimated to result in an annual loss of almost $8 billion.
The LoJack System has a proven track record of reducing damage, enhancing public safety, and solving serious crimes related to motor vehicle theft, all accomplished within the practical constraints of today's overburdened law enforcement system.” (Daily, 1999) Currently, LoJack has unique patented system
…show more content…
While they both have proprietary technology, they rely on other organizations to leverage these technologies. Lojack’s technology would not have been possible without the alliance with local law enforcement agencies, Motorola, and MicroLogic. MicroLogic’s existence, until recently, had been to partner with organizations to leverage its technical creativity to further develop the companies that it works for. It would take an equity stand in these companies and “take a long term approach”. In order for MicroLogic to be successful in this venture, it would need to rely on LoJack’s distribution and marketing systems. Not only to sell its products but also to ensure its own financial stability. And if LoJack is to review its long term strategy, it must understand that research and development are not at the core of its operation. Motorola is a key component to both LoJack and MicroLogic and has been a strong partner providing vital assistance. However, moving forward, they cannot be relied on to only provide this technology to LoJack. They are a much larger company and will look to broaden their reach. In the fall of 1999 Motorola was already working to become a driving force in the telematics industry and moved to position itself with the major car companies. “Who can you count on to bring the promise of telematics to the world? The same people who have been changing the way we communicate …show more content…
With a strong foothold on the construction market this area would be a logical first step into emerging markets as contraction equipment would usually surpass new car sales. Immerging markets will provide the strongest revenue growths for the company and is possible this may need to be moved into the mid-term focus depending on the success for the technology.

Critical Success Factors

Industry critical success factors need to include a standard platform for technology on both the asset management device and vehicle retrieval systems. If too many technologies exist, it will become confusion for consumers, and they may abandon products all together.
The following list the critical success factors for a LoJack MicroLogic alliance in terms on timing each holds the same importance.

1 The two companies must have a willingness and desire to form an alliance
2 MicroLogic must be able to finish the work on asset management software in the short term and it must be fully compatible with the existing LoJack technology it must come in-line with existing cost estimates
3 LoJack will need to develop a strong marketing and distribution plan to enter the construction market and a strong foothold must be established to keep back

You May Also Find These Documents Helpful

  • Powerful Essays

    The consumer electronics sector – spanning computers, home appliances and mobile communications devices – has been one vibrant sector of the US economy, spurring innovation and both industrial and consumer demand at least since the mid-1960s. Two forces emerged that decade. The first was the conversion of the vacuum tube assemblies that powered gigantic mainframe computers into integrated circuit boards that enabled smaller mini-computers and, a decade later, the desktop microcomputers that are ubiquitous today. The second was the development by Motorola of the “luggable” cellular telephone prototype, to be launched commercially in 1973.…

    • 1218 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    ISSC361 FinalProject

    • 1124 Words
    • 4 Pages

    Computers are a part of everyone’s daily lives and are even a part of everyday use items. Automobiles today are primarily made up of computer systems. Each mechanical device that is in a vehicle today is controlled by a computer system, whether it is entirely controlled or just monitored by a computer system, but it relies on a computer to correctly function. This now causes an issue with the security of today’s vehicles.…

    • 1124 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Another reason these clever criminals escaped Alcarez is that they didn't just steal a boat. There was a report of a stolen car…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I was dispatch to the Public Safety Building in reference to a stolen vehicle. On scene I made contact with Tangela Davenport and she stated that her vehicle was stolen from 107 Azalea Ct. She stated that she came over to 107 Azalea Ct to see the father of her child Reynolds Baldwin. She stated that she and a friend named Scooby had just came back from the casino in Davenports vehicle. While at Baldwin residence, she stated she was inside and that the keys were in the ignition and the vehicle was unlocked. She stated that the vehicle was parked at the residence from 23:00 to 00:00 and that’s when she noticed the vehicle was missing. The vehicle was a 2008 white Suzuki XL-7 SUV. She stated that it did not have a tag, but had a Hello Kitty…

    • 202 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In summary, on 02/21/16 at 1654 hours I was patrolling the area of 1900 S. 59th Ct., at which time I observed listed vehicle 06' silver Chevy IL E526871 traveling southbound on 59th Ct. with an obstructed front windshield.…

    • 233 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Argument Synthesis Paper

    • 1263 Words
    • 6 Pages

    September 11th was definitely one of the grimmest times in America’s recent history. There was security breach at the airports and American planes were hijacked and crashed into the world trade centre. The terrorists were suspected to be al-Qaida and approximately 3000 lives were lost on one day. For the attacks to be staged successful the terrorists had to by-pass the security systems and they succeeded. It is the duty of the government to put in place methods to prevent a recurrence of the event and protect its citizens. Safety of the citizens is far important than individual privacy. Although each individual is entitled right of liberty and privacy, the government may interfere with the privacy of individual for security reasons.…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In 2004, there were an estimated 1,237,114 motor vehicle thefts in the Nation. Two-, 5-, and 10-year trend data showed considerable volatility: the number of motor vehicles estimated to have been stolen in 2004 decreased 1.9 percent from the 2003 estimate, increased 6.6 percent from the 2000 estimate, and decreased 16.0 percent from the 1995 estimate.…

    • 2000 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Uncle Bob

    • 648 Words
    • 3 Pages

    Technology seems to develop at the speed of time. There is always something new and exciting on the horizon that someone is talking about. The last place that you would think you would have a negative experience with technology is on vacation; trying to enjoy the sun atmosphere of a place other than home. This is exactly what happened to my Uncle Bob; he was stopped for speeding in Florida. He answered the Law Enforcement Officers’ questions calmly and was then placed into the back of his cruiser.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Identity theft is one of the fastest growing crimes in the United States. There are many definitions of identity theft, however this type of crime typically involves illegally utilizing somebody else’s personal information for both personal and or financial gain. Thieves acquire personal information through different methods ranging from stealing physical documents all the way to hacking into corporate databases. The consequence of such theft, range from monetary losses to stress, harassment by creditors, and even arrests for crimes that were committed by somebody else. Consumers can protect themselves from such attacks by utilizing caution in the digital world with firewalls, spyware software and credit reporting tools. Businesses can also utilize identity cards, RFID chips, encrypted databases and protection of identifiable information at all times.…

    • 7416 Words
    • 30 Pages
    Better Essays
  • Good Essays

    Project Outline

    • 637 Words
    • 3 Pages

    The current limitation on production capabilities of the company coupled with the current construction boom in south western VC and trade opportunities brought by free trade south of the border creates avenues for the company to both expand production capabilities and equally to capture the growing opportunities presented by the recent market boom.…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Suppose a company's security manager would like to have a system that precisely tells at every moment where the cars of the company are: in the garage or out on roads. The key issue of this task is that the registration of the movement of the vehicles should be done automatically by the system, otherwise it would require manpower.…

    • 1361 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Crime Mapping

    • 726 Words
    • 3 Pages

    Digital crime mapping systems are designed to help law enforcement agencies identify and combat crime by enabling them to correlate and analyze crime data from any given location within their geographical areas of operation. This ability to graphically represent high crime “hot spots” within a city, broken down by type of crime, exact location of crime as well as date and time of day of the crime are allowing police departments to better allocate resources for more effective enforcement and mitigation efforts. The most widely used type of program is the automated pin type, which is essentially the 21st century version of the old wall map full of red pushpins. Most agencies use the data provided from these systems to inform patrol officers and investigators of crime “hot spots” (the areas with the most pins). This intelligence then enables officers to conduct targeted patrols, which have been proven to be extremely effective at reducing crime in a specific area while keeping crime from spreading to surrounding areas. Subsequent to these targeted patrols, the departments can analyze and evaluate the results of their intervention efforts and fine tune them for future operations.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Now days in the modern world, motorized automobiles have either power locked or a remote keyless system which operates by broadcasting radio waves on a particular frequency. Modern systems implement encryption to prevent car thieves from intercepting and spoofing the signal. The system signals that has either locked or unlocked the car usually through some fairly discreet combination of flashing vehicle lamps, a distinctive sound other than the horn or some usage of the horn itself. The functions of a remote keyless entry system are contained on…

    • 736 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Rfid Based App

    • 6311 Words
    • 26 Pages

    With the cost decline in wireless and GPS technology, Auto ID systems can integrate these high-end technologies with IT systems to offer not only the identification functionality but also value added information and service in the applied systems. It can greatly improve the information visibility in the system information flow.…

    • 6311 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    This technology provides super security to your vehicle that enables the user to detect any access to his vehicle by any other through a SMS on his mobile . The user can send “ Locking” instruction to the system ,which will prevent any unauthorized access by an intruder. 5TOP Q.3 - What Do You Mean By Automated Message From The System ?…

    • 752 Words
    • 4 Pages
    Satisfactory Essays