Tuesday, February 25, 2020

Please answer the four questions about marketing Research Paper

Please answer the four questions about marketing - Research Paper Example Thirdly, each of the exchanging parties has to exude confidence in the value of the items exchanged. For instance, when purchasing a vehicle, the customer has to have confidence that the vehicle would perform beyond their expectations and offer the required utility. Lastly, r both parties have to meet the high expectations as a way to build trust in the transaction, in addition to making the marketing activity successful. A recent marketing exchange that I participated recently was purchasing a mobile phone recently. In the transaction, I had to visit a local distributor dealing in some of the leading phone brands, which actualized the first requirement of a marketing exchange; two parties have to be involved in the exchange. Secondly, I was attracted to the mobile phone due to its enhanced functionality, which promised to be of much value. In this case, I was confident that the phone could satisfy my needs while the distributor would be satisfied by having a piece of his stocks sold at a profit. Thirdly, I was very confident that after reviewing the phone and listening to earlier users, the phone could deliver more value to exceed my satisfaction as I had been disappointed by some earlier models. Lastly, I had to bargain to get the best possible price for the best product, while we finally settled on the last price with each of us meeting and exceeding the expectations. As a result, we established a strong buyer-seller relationship that would be considered for another transaction in the future. Q.2 In strategic planning, an organization sets its mission, goals and a corporate strategy that guides in all its operations until establishment of a sound marketing plan to seal transactions. As such, Pride & Ferrell (2012) detailed the important components to be considered in strategic planning. The first step involves identification of the organization’s strengths,

Saturday, February 8, 2020

Network Infrastructure Planning Research Paper Example | Topics and Well Written Essays - 750 words

Network Infrastructure Planning - Research Paper Example In a bid to reduce the cost of setting up new systems for each of the satellite branches, the company can opt to use New Technology File system (NTFS) permissions or Active Directory (AD) permissions (Abel, 2009). Whereas both permission systems would provide considerably reliable control of access of the files at the head office server, there are principle differences in their best use capabilities and modes of authentication control. Active Directory is a domain controller that authorizes and authenticates all computers and users in Windows domain type internetwork. It assigns and enforces security policies for computers and installs or updates software on remote computers from the server. For example, a user logs into a computer in the satellite branches that is part of the Windows domain, the Active Directory examines the passwords and usernames submitted to discern whether the user is a normal user or system administrator. Active Directory employs the use of LDAP-Lightweight Dir ectory Access Protocol (Computer Architecture Association, 2011). On the other hand, NTFS is a product of Microsoft Company that can be set to allow or deny users access to a particular data domain. Using NTFS, users have the capacity to add, move, delete, and modify files and their associated directories. They can as well Read & Execute, Read and Write. NTFS includes Traverse Folder/Execute File gives users permission to navigate through folders and files to gain access to files and other folders. Traverse Folder Permission only takes place when user or group lacks Bypass Traverse Checking right in the Group Policy snap-in (Bruce & Smith, 2011). NTFS has Everyone Group that has permission for Bypass Checking user right. These permission levels will enable the IT department at the head office of the fashion-ware company grant different degrees of access to computers and groups of various satellite branches. Computers and users identified to be of administrative role will have extens ive permission to perform delete, modify and add functions in their respective files and folders stored in the main office servers. The main need of the company is to operate in different countries from a central office. It needs to keep a good record of sales transactions for its fashion-ware all over its expanse market. The company will need to put in place application servers (servers designed and dedicated to running particular applications). The IT department will most specifically take great care in deciding which application server to consume the larger portion of ROM and RAM depending on its significance to the company. Windows Application Server and Appaserver are the application servers that are recommended for the use in the company (Bruce & Smith, 2011). These servers have an advantage of data and code security. Integrity of codes and data is imperative given the company centralizes all its business logic on small number of server machines or one server at the head offic e to serve the entire global market. The application servers also enable the company to centralize its configurations (Fredrich, 2011). The use of Windows server and Appserver would enable the company to monitor the security of its data as all the data is stored centrally. The total cost of ownership of the company becomes less as the company does not have to install hardware infrastructure all over the satellite branches to run its businesses. The major disadvantage with Windows application server