Premium Essay

Connector 2001 Case

In:

Submitted By ldysunny
Words 1082
Pages 5
MKTG 4120 Case Study – Positioning the ConneCtor 2011
Prepared by LI Danyang Sunny 1155002138

Question 1:

Two dimensions were applied in this case since the third dimension did not capture significant variance compared with the sum of first two. (See Figure 1)

The variance explained by the horizontal dimension (46.6%) was two times more than the vertical horizontal (20.8%), so the horizontal dimension was more than twice important in explaining customer perceptions than the vertical one. The horizontal axis associated mostly with attributes “Multimedia”, “Stylish” and “Monitor” while the vertical axis associated mostly with “Sturdiness”, “Light Weight” and “Connectivity”. (See Figure 2)

From the perception map, Connector 10L performed the best in terms of Connectivity, Data Entry and Third Party Support. Moreover, it also had advantages on its weight. However, Connector 10L was not attractive enough to customers in terms of Multimedia Function, Stylish and Monitor Quality. It is noticed that there was a lack of other brands near Connector 10L’s position (Only Palm VII), which indicated a potential opportunity for new positioning – wireless access feature. (See Figure 2)

Question 2:

In the positioning map with Preference Vector, it could be found that Connector 10L is the 5th preferred brand chosen by participants, ranked after HP Jornada, Casio Cassuioeia, Compaq IPac and Palm VII. Overall preference for handheld devices increased with Memory, Software and Connectivity, while Connector 10L performed best only in Connectivity. However this was not the very most important attribute for participants to determine their preference. Moreover, other advantages Connector 10L had including Weight and Third Party Support were even unaffected to participants’ preference. (See Figure 2) To conclude, participants in this study preferred PocketPCs than other

Similar Documents

Free Essay

Interprocesscommunication

...Indian Journal of Science and Technology, Vol 7(6), 839–847, June 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A New Approach for Inter Process Communication with Hybrid of Message Passing Mechanism and Event based Software Architecture Farhad Soleimanian Gharehchopogh*, Esmail Amini and Isa Maleki Computer Engineering Department, Science and Research Branch, Islamic Azad University, West Azerbaijan, Iran; bonab.farhad@gmail.com, es.amini56@gmail.com, maleki.misa@gmail.com Abstract In this paper, we use software architecture style based on event-driven and message passing communication method and determine a framework for interaction among practicable processes on Operating System (OS). In the proposed method, the required data are sent to the process or other processes in a standard message frame and with determined structure to the OS, then, the OS distributes the received message considering its recipient processes in the system, rather a process communicates directly with other specific process. The major features of the proposed method include the synchronization among the processes, the simplicity of implementation, easy extensibility, remote access which finally can improve the interaction between the OS and processes. Along with producing the systems based on an integrated frame, we obtain a determined standard in Inter Process Communication (IPC) by mediating an OS. 1. Introduction Keywords: Event-driven, IPC, Message Passing, OS, Software...

Words: 6185 - Pages: 25

Premium Essay

Business

...Design principles Unit 2 Learning outcomes •  Introduce concepts of usability and user experience •  Understand fundamental design principles •  Develop –  awareness of how to apply them in design –  Critical ability to evaluate other people design 2 Usability •  “Extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.” –  ISO 9241-11:1998 Ergonomic requirements for office work with visual display terminals (VDTs) -- Part 11: Guidance on usability. 3 Usability •  Usability is a quality attribute that assesses how easy user interfaces are to use. •  Five quality dimensions: –  Learnability: How easy is it for users to accomplish basic tasks the first time they encounter the design? –  Efficiency: Once users have learned the design, how quickly can they perform tasks? –  Memorability: When users return to the design after a period of not using it, how easily can they reestablish proficiency? –  Errors: How many errors do users make, how severe are these errors, and how easily can they recover from the errors? –  Satisfaction: How pleasant is it to use the design? –  http://www.useit.com/ 4 Usability •  Quality = absence of problems –  discover usability problems and reduce their frequency and severity. –  It can be measured –  Objective data (performance data derived by behavioural data, user observations) –  Subjective data (self-report, questionnaire...

Words: 1298 - Pages: 6

Premium Essay

Miss

...could no longer rely on Bullock's and King's representa-tions, and would be unable to complete its review of the first quarter results until representations were received from a new CFO and in all likelihood a new CEO. MOLEX BACKGROUND AND MANAGEMENT Founded in Lisle, Illinois in 1938 by Frederick Krehbiel, Molex Inc. designed, man-ufactured and distributed electronic connectors that were used by a wide range of industries.1 For example, in the computer industry its connectors were used to pro-duce computers, servers and printers; in the telecommunications industry they were used to produce mobile phones and networking equipment; the consumer products industry used Molex connectors to manufacture CD and DVD players, cameras, plasma and LCD televisions; and the automotive industry used them for the produc-tion of engine control units and adaptive breaking systems. In 2003, Molex was the second largest firm in the connector industry, with a worldwide share of 6.9%, and production and distribution facilities located throughout the world.2 12-24 Professor Paul Healy prepared this case. This case was developed from...

Words: 2777 - Pages: 12

Premium Essay

Business Forum

...Chapter 2 The Machinery: Build, Track and Maintain Your Network 2.1 Networking: The Machinery That Drives Business M y wife took her wrist watch to the local jeweler for repair. The store was very busy, but eventually she found her way to the glass display case with a smiling salesman behind it. “How can I help you?” he asked. {Graphic Insertion Point} GIP_chap02_sec2-1.jpg Stop. What an utterly brilliant question! “How can I help you?” “ What can I do for you?” “Is there some way I can be of service to you?” “ What is it that I can do to help you achieve your objectives?” Theoretically, you could read that last paragraph, study it, let it penetrate into the deepest crevices of your mind, then move on to Chapter 3 because you’ve just captured the essence of good, solid business networking! That’s right — the secret to great networking lies in what you can do to help others! But now that you know this, don't skip ahead; in fact, don't skip anything. Why? You’d be surprised how many people still cling to the belief that networking is all about “connecting with others so they can help me find a job.” Unfortunately that’s not networking, that’s spamming a fellow human being. People who do this should put themselves in the role of the spamee and consider how it might feel if the roles were reversed. Let’s just think of it as the Golden Rule of Networking and to be an effective networker, it’s a rule you must follow. What it comes down to is this: You must discover what...

Words: 4674 - Pages: 19

Premium Essay

Quality Assurance in It

...Quality Systems in IT Assignment Implementing Quality Assurance in IT Systems Name: Elise Xuereb Group: 1HND6 Table of Contents Question 1 (P1.1) 2 ISO 9000:2005: ‘Quality Management Systems - Fundamentals and Vocabulary’ 2 ISO 9001:2008: Quality Management Systems - Requirements 3 ISO 19011:2011: Guidelines for auditing management systems 3 Question 7 (D2.1) Take responsibility for managing and organizing quality assurance activities. For 2 quality assurance practices in each stage identified above, you need to do a plan of implementing it. You need to discuss at least 3 people involved and the work operations that need to be done. Criteria: • Correctly write a plan of action for 2 quality assurance practices including 3 people involved and work operations involved. Plan of Action: System Initiation People involved: Project Manager, System Analyst and Quality Assurance Tester. Work that needs to be done and a plan of how it needs to be implemented: 1. Developing a Quality Assurance (QA) Plan: As indicated in Question 6, this step should be implemented by, initially having an exploration phase. In this phase, the client comes up with the procedures that ensures that quality assurance is present in the project. For instance, when having a robust and secure system, the performance of the system should be constant so that no system downtime will take place. Here, one must take into consideration whether the stakeholders have experience with...

Words: 6690 - Pages: 27

Free Essay

Physcal

...Engineering and Technology Published by The Institution of Engineering and Technology, London, United Kingdom © 1985, 1989 Peter Peregrinus Ltd © 2007 The Institution of Engineering and Technology First published 1985 (0 86341 048 0) Second edition 1989 (0 86341 184 3) Third edition 2007 (978 0 86341 735 1) This publication is copyright under the Berne Convention and the Universal Copyright Convention. All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication may be reproduced, stored or transmitted, in any form or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licences issued by the Copyright Licensing Agency. Inquiries concerning reproduction outside those terms should be sent to the publishers at the undermentioned address: The Institution of Engineering and Technology Michael Faraday House Six Hills Way, Stevenage Herts, SG1 2AY, United Kingdom www.theiet.org While the authors and the publishers believe that the information and guidance given in this work are correct, all parties must rely upon...

Words: 32727 - Pages: 131

Premium Essay

Leadership

...group, but rather was a property of the network, both technologically and organizationally. As Operation Iraqi Freedom so vividly illustrated,2 battle plans can now be changed very rapidly, affecting all aspects of operations—strategy, tactics, logistics and PSYOPs, operations, kinetics, and all types of forces. The competencies that make NCW a success are network properties; they are no longer solely the province of charismatic leaders or chance, but the result of diverse competencies and a new understanding of the role and growth of network leadership, and how it is learned and rewarded. 1 Roberts, Andrew. Napoleon and Wellington: Battle of Waterloo and the Great Commanders Who Fought It. New York, NY: Simon and Schuster. 2001. 2 Hoagland, Jim. “The Franks Strategy: Fast and Flexible.” The Washington Post. Washington, D.C....

Words: 8475 - Pages: 34

Free Essay

London Victoria Station: the Railway Concourse: ‘Intelligible’ and ‘Place Making’ Environments, an Analysis of London Victoria.

...__________________________________________________________________________________________ LONDON VICTORIA STATION an analysis of the spatial complexity of the railway concourse. SHRUTI S SHETTY Advanced Architectural Studies University College London, UK. ABSTRACT With the development of the railways, the identity of the railway concourse has changed over the last century. The design of railways stations is one of the most challenging practices and the concourse design must provide for large fluid spaces to facilitate rapid movement. In addition to these, the modern station demands much more from a railway concourse. The National Rail has chalked out the key requirements for every station with Security, Information, Navigation and Facilities as one of the few Basic needs followed by Higher-level needs such as Retail and Catering. In the life of all cities, the railway station plays an important role in the day-to-day life of its citizens and thereby a constant effort has been made to keep up with increasing requirements of the concourse yet maintaining the fluidity of spaces. This report discusses the effect of a concourse layout and its relation with the urban context on the process of ‘navigation’ and ‘way finding’ in the system. Another aspect of railways stations is the way it fits into the urban system which determines the nature of the concourse and the way people interact with the space. Liverpool street station gives an impression of it being an enclosed...

Words: 6997 - Pages: 28

Premium Essay

System Unit

...memory and out of memory Differentiate among the various Differentiate among the various types of memory types of memory Describe the types of expansion slots and Describe the types of expansion slots and adapter cards adapter cards Explain the difference among aaserial port, aa Explain the difference among serial port, parallel port, aaUSB port, and other ports parallel port, USB port, and other ports Describe how buses contribute to aa Describe how buses contribute to computer’s processing speed computer’s processing speed Identify components in mobile computers Identify components in mobile computers and mobile devices and mobile devices Chapter 4 The Components of the System Unit Next The System Unit What is the system unit? Case that contains electronic components of the computer used to process data Sometimes called the chassis system unit system unit system unit The System Unit What are common components inside the system unit? Processor Memory Adapter cards Sound card Modem card Video card Network card power supply drive bays processor memory ports system unit...

Words: 3218 - Pages: 13

Free Essay

Apis to Affordances

...From APIs to Affordances: A New Paradigm for Web Services Mike Amundsen mca@mamund.com amundsen.com, inc. ABSTRACT The ecosystem of services on the Web continues to grow and evolve while, at the same time, the number and diversity of connected devices increases; challenges lie ahead for both providers and consumers of Web services. This paper is presented as a ‘what-if’ proposal; an alternate paradigm for dealing with an increasingly heterogeneous network. Drawing from diverse sources including physical architecture, industrial design, the psychology of perception, and cross-cultural mono-myth, a new implementation paradigm is proposed to help software architects and developers meet these challenges; one that invites participants to shift their mental model from that of programming network devices to programming the network to which those devices are connected. To accomplish this goal an “affordance-rich message” is proposed; one that is based on shared understanding through network-oriented affordances instead of device-oriented APIs. A working model based on this approach is offered, examples given, and areas of related work identified. Figure 1: From Ericsson : 50b devices by 2020 Keywords HTTP, WWW, hypermedia, networks, SOA, REST, distributed computing, web services, usability, evolvability 1. BACKGROUND In the last several years, the landscape of the Internet has changed noticeably. There are many more connected devices, more connected applications, and thousands...

Words: 6657 - Pages: 27

Premium Essay

Securing and Protecting Information

...Securing and Protecting Information Instructor: April 24, 2014 Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public networks as well as private networks (including the Internet), use authentication to utilized or authorize logins and passwords. Data is required and ran through the password database to ensure that the user is authentic. Before anyone is allowed to access an organization’s intranet, they must first register or be registered by someone that has the appropriate credentials to perform these tasks. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: ...

Words: 1469 - Pages: 6

Premium Essay

Securing and Protecting Information

...CMGT 400 Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public and private networks, utilize authorized logins and passwords. Data is ran through the password database to ensure that the user is someone that has the credentials to access the network. In order to allow access a company’s intranet, they must register or be registered with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: Create a strong password policy Establish an account lock out policy Assign logon hours Create a ticket expiration policy Establish network authentication...

Words: 1442 - Pages: 6

Free Essay

Issc361 Quiz

...concepts regarding the ISDN and DSL technologies, definition, usage, benefits overall and costs. We will also compare to newer technologies overall to understand where our connections capabilities were and where they are over today’s date and where it is going. ISDN (Integrated Services for Digital Network) is a standard way to communicate digital transmission of data, voice, video and other network devices at the same at the same time over the traditional ‘’phone lines’’, basic telephone copper wires, called RJ-48 connectors. Prior to ISDN, the telephone system was only related to voice transportation, with very limited to none data service availability. The ISDN has the capability to support at least two or more connections at the same time, in any combination of voice, data, fax and video over a single line. At first ISDN speeds were only at max 128 kbits over download and upload speeds. Eventually carried over an E1, speed rates could be at 2048 kbps. (PC Magazine, 2001) ISDN-BRI (Basic Rate Interface), service is delivered through a pair of standard telephone copper wires at 128 kbps rate. Following available interfaces and their characteristics: * U Interface, usually a non-North American network, two wired interface between the network terminating unit and the exchange. * T Interface is a serial interface between a terminal adapter and a computer device, a digital very similar to a modem. * S Interface is usually implemented as a single interface called S/T ...

Words: 2573 - Pages: 11

Premium Essay

Importance Of Fiber Optic Communication

...development was spurred by the discovery of Indium gallium arsenide and the development of the Indium Gallium Arsenide photodiode by Pearsall. Scientists overcame this difficulty by using dispersion-shifted fibers designed to have minimal dispersion at 1.55 µm. These developments eventually allowed third-generation systems to operate commercially at 2.5 Gbit/s with repeater spacing in excess of 100 km. The fourth generation of fiber-optic communication systems used optical amplification to reduce the need for repeaters and wavelength-division multiplexing to increase data capacity. These two improvements caused a revolution that resulted in the doubling of system capacity every 6 months starting in 1992 until a bit rate of 10 Tb/s was reached by 2001. In 2006 a bit-rate of 14 Tbit/s was reached over a single 160 km line using optical amplifiers. Fig. 1.2 Evolution of Fiber communication systems (a) 1st Gen. multimode fiber using LED at 0.8µm wavelength (b) 2nd Gen. single mode fiber using multi longitudinal (MLM) lasers at 1.3µm. (c) 3rd Gen. single mode single longitudinal mode (SLM) laser at 1.5µm (d) WDM systems using ROADM instead of regenerators FIBER OPTIC CABLE 3.1 BASICS OF FIBER OPTIC CABLE An optical fiber is a flexible filament of very clear glass capable of carrying information in the form of light. Optical fibers are hair-thin structures created by forming pre-forms, which are glass rods drawn into fine threads of glass protected by a plastic coating....

Words: 7807 - Pages: 32

Premium Essay

Quantitative Marketing

...Marketing engineering work report By jiahang 2012.6. Team members 唐田伟 09093914 (leader) 任静 09093926 高承明 09093904 雷鹤 09093907 想开林 09093972 BrainCell Internet Advertising • Solver Introduction BrainCell is positioned to sell cell phones, call plans, and mobile services to end-user customers using the Internet exclusively as its unique sales channel (though it also will employ call centers to some extent, mostly for technical upport and billing questions). Partneri ng with one of the largest available communication networks in Europe, BrainCell follows the same business strategy for its cell phones that Internet banks use with their banking operations: reducing its operational costs through the absence of physical branches and local infrastructure and then using these saved costs to reduce prices and increase competitiveness. As a relatively new offering, one of the challenges facing the company is identifying and targeting prospective customers. Market research shows that the customers who are most likely to go to the Internet to fulfill their mobile communication needs tend to be well educated, wealthier than the average population, heavy Internet users, and already technically familiar and equipped with cell phones. Given this target population, it seems natural (and cost effective) to use the Internet as a key communication channel to advertise the offerings and launch a promotional campaign. BrainCell recently began to develop promotional...

Words: 4697 - Pages: 19