Premium Essay

Management in Microsoft

In:

Submitted By Kennedy93
Words 1561
Pages 7
-------------------------------------------------
Management project on microsoft

Judith Breen
Submission date 4/12/2012
I declare that this work is my own and of the highest academic integrity. Where the work of others has been used, it is properly acknowledged and referenced.

-------------------------------------------------
Management project on microsoft

Judith Breen
Submission date 4/12/2012
I declare that this work is my own and of the highest academic integrity. Where the work of others has been used, it is properly acknowledged and referenced.

Andrew Kennedy
Student number:20057880

Andrew Kennedy
Student number:20057880

Table of Contents
Introduction 2
Executive summary 3
Organisation profile 4
Management profile 5
Macro analysis 6
Micro Analysis 7
Management theory 8
Conclusions 9
References 10

Introduction
I am doing my project on Microsoft. I decided that I would go my project on them because I am a big fan of them and I have brought a lot of their products over the years. The research that I will be doing for this project will consist of secondary research. Secondary research is research through the internet and it can also consist of reading an academic article or reading a newspaper article the main aims for this project is the find out as much information on the company as possible.

Executive summary
This project I will go through the organisation profile of Microsoft and the 7 different areas that it is broken up into.
I will be also doing a management profile on Bill Gates founder and former CAO of Microsoft. I will talk about what he did a t Microsoft and what made him a great leader.
I will also do a micro and macro analysis of Microsoft.
Then I will talk about what management theory practices they use and how they implement them
The finally I will do my conclusion to this project and give the

Similar Documents

Premium Essay

Management of Google and Microsoft

...Jose R. Sanchez Financial Management Strayer University, March 19th, 2012 Prof. Coleman, Contemporary Business, 2012 In contemporary business within the technology industry, the digital technology age has grown into one of the most profitable industries, especially centered around Silicon Valley. Google, widely considered the leader in information technology, has recently enjoyed particularly tremendous success. The company's strong diversification policy, in correspondence with the increasing demand of Internet applications, has allowed it to venture into operating systems for Smartphones, office applications, email support, and a host of other products. By contrast, Microsoft, widely considered the leader in software solutions for businesses worldwide, has recently diversified into other products and services,most notably highlighted by its recent launch and success of own search engine, Bing. Both businesses have recognized our increasingly technological society and have thus profited enormously. In this writing we well evaluate the  annual reports and financial statements of Google and Microsoft,  as well as each company's business model, leading products and services, management/leadership style, and innovation track record. Based on this established criteria, we will evaluate which company has the ability to withstand a major recession and recommend which company to invest in to guarantee the highest equity return. Google and Microsoft’s overall financial health within...

Words: 3036 - Pages: 13

Premium Essay

Microsoft Canada: Sales & Product Management

...MICROSOFT CANADA: SALES & PRODUCT MANAGEMENT WORKING TOGETHER INTRODUCTION Doug Taylor, national sales manager, Home & Entertainment Division (HED), for Microsoft Canada, was considering PC Marketing’s move to launch a consumer education website. Barry Zeidenberg, group product manager for PC Marketing, believed that the website (his idea) was key to the long-term development of Microsoft’s personal computer (PC) user base. The cost for the creation and maintenance of this site, “Microsoft Home Magazine,” was estimated at $1 million per year, or 10 per cent of sales’ and marketing’s combined promotional budget. Taylor’s initial reaction was that the money would be better spent in the sales channels, boosting overall sales. Microsoft Canada – Home & Entertainment Division The Home & Entertainment Division (HED) was the consumer side of Microsoft Canada’s business (the other side, enterprise, dealt with the needs of corporations such as General Electric and Bell Canada). The HED division had two businesses: Xbox and PC. HED’s PC business consisted of consumer software, commercial software and hardware. Consumer software consisted of brands such as Encarta, Money and Works. Commercial software included applications such as Windows, Office and Excel. Hardware included mice and keyboards. HED had performed extremely well, and Microsoft Canada depended on it for a significant portion of its revenue and profits from consumers. Taylor and Zeidenberg had both worked...

Words: 1190 - Pages: 5

Premium Essay

Use of Microsoft Sharepoint for Configuration Management in It Organizations

...Use of Microsoft SharePoint for Configuration Management in IT Organizations In the contemporary business marketplace, the requirement for a technology-based system to provide the tools for global organizations to archive and manage information has become an increasingly present issue. The use of a corporate-wide portal, supported by a collaborative, content management platform, provides an Information Management System (IMS) that culminates organizational information and intellectual capital, document storage, and collaborative workspaces into a single resource, accessible through a centralized portal interface (Microsoft, 2006, p. 14). Configuration Management (CM) encompasses the management of requirements, production, testing, technical documentation, and organizational processes during the lifecycle of a software system’s development. Within Information Technology (IT) organizations, CM defines a series of systematic controls for changes and developments to the software system, which ensure the integrity and traceability of the environment and software configuration throughout the development lifecycle. The CM process is a culmination of activities and support from each level of the organization, ensuring compliance with all applicable standards and guidelines for software development and production. Figure 1. Overview of Configuration and Change Management Process Integral to effective employment of CM processes is collaboration amongst the following cross-functional...

Words: 990 - Pages: 4

Free Essay

Xbox and Microsoft Strategic Management Case Study

...team recommends that Microsoft develop the software for non-gaming set-top boxes and partner with a hardware company. This option is likely to produce the greatest ROI for Microsoft because Microsoft’s core competency is developing operating software and this option carries the least amount of risk. Background The consumer demand for the ability to seamlessly integrate and connect devices and data that they use in their daily life is growing rapidly. The ability to connect mobile phones, television sets, tablets, and personal computers has provided consumers with an unparalleled opportunity to the access to information (I), communication (C), and entertainment (E), collectively known as ICE. The struggle amongst Microsoft and archrivals like Apple and Google is to develop the “must-have” product that would redefine the way content is consumed in the living rooms around the world. While streaming content via game consoles has been on the rise, the introduction of streaming content via non-gaming set-top boxes has become increasingly popular. Microsoft must choose how to position itself in this rapidly changing market so that it does not render itself irrelevant and so that it can capitalize on this shift in the way that content is being consumed. Ultimately Microsoft can make one of four choices. Microsoft can: (1) keep the status quo, (2) develop the software for non-gaming set-top boxes and partner with a hardware company, (3) develop a Microsoft branded non-gaming set-top...

Words: 3776 - Pages: 16

Free Essay

Financial Management: Comparing Google’s Business Model/ Financial Management with Microsoft

...Running head: FINANCIAL MANAGEMENT Financial Management: Comparing Google’s Business Model/ Financial Management with Microsoft By: Zanthe Gillison Strayer University Financial Management: Comparing Google’s Business Model/ Financial Management with Bing Google is doing bigger and better things in the world of internet media searching. Despite the challenges with other big names in Internet technology, Google and Microsoft have still remained to be leaders. In this paper, I will show comparison views of Google’s business model and financial management with Microsoft’s launch with Bing. Taking a look into Google and Microsoft core business, leading products and services, management and leadership styles, and innovation track record we will have the opportunity to compare the two businesses in and appendix. Google is known to be the leading internet media website’s in the world. Google and Microsoft are well-known internet information websites. Although, Microsoft is in business for more than searching the internet, Microsoft is known to be the world’s leading producer and marketer of computer software. Google’s product line and services are for Google products only. Google’s products include services that will enhance your desktop features such as Google Chrome and Google desktop which is an organizational tool that gives the customer the option to design and edit photos, organize personal and business information, search, and communicate with...

Words: 660 - Pages: 3

Free Essay

Is4680 Week 1 Lab

...to do business with the DOD. These guides serve as a baseline for the company in regards to the technology specifications they should have in place in order to lock down their systems and network to make them less vulnerable to malicious attacks (Defense Information Systems Agency, 2015). Among these STIGs is one written specifically for the Windows 8 / 8.1 operating system (Information Assurance Support Environment, 2015). This STIG outlines some of the changes made by Microsoft to Windows 8 / 8.1 as well as their recommendations for securing computers, which use that operating system. Tools Windows 8 / 8.1 comes with many tools built into it that allow for the administrator to use in order to do a security audit. A keyboard shortcut of pressing the Windows key plus another key will often bring up a tool for the administrator to use such as Win + x which lists numerous tools including, but not limited to: * Programs and Features * Event Viewer * System * Device Manager * Computer Management * Command Prompt (Admin) * Control Panel * File Explorer Win + c will bring up the charms bar which includes:...

Words: 855 - Pages: 4

Premium Essay

D.Doc

...Knowledge Assessment Fill in the Blank Complete the following exercise by filling in the blanks with the appropriate terms from this lesson. 1. The leftmost pane in a Microsoft Management Console window is called the __________ pane. 2. The Terminal Services license included with Windows Server 2008 enables administrators to connect to distant servers using __________. 3. When you run the Mmc.exe program with no additional parameters, a blank __________ appears. 4. To enable the computers on a network to download operating system updates from a server on the local network, you must install __________. 5. The two types of snap-ins that you can add to an MMC console are __________ and __________. 6. To manage permissions for an Active Directory object, you can open the object’s Properties sheet or use the __________. 7. The Windows Vista feature that enables computers on the same network to share updates is called __________. 8. The Terminal Services client included with Windows Server 2008 is called __________. 9. __________ is a shell application that Windows Server 2008 uses to provide access to most of its system and network management tools. 10. The first window that appears when you start a Windows Server 2008 computer is called __________. Answers 1. scope 2. Remote Desktop 3. console 4. Windows Server Update...

Words: 1499 - Pages: 6

Free Essay

Msquiz

...In Microsoft Windows, what is Administrative Tools? Set specific functions for computer, to see what services To manage and configure the system What is the Microsoft Management Console (MMC) and how does it relate to Computer Management? Central place to manage How would you access Windows Task Manager and what could you learn there? Right click taskbar What part of the Windows user interface can show you the programs that are currently active? Task manager Which part of the Windows user interface contains a group of configuration utilities? Control panel If you're not sure what parameters that you should employ with a command from the Windows command line, how could you get help? Use “help” or [command]/? If you wanted to adjust the programs that run during system startup, what utility would you employ? MSCONFIG What command line utility would you employ if you wanted to locate or fix disk errors? chkdsk /f and/or chkdsk /r If you were at the command line and you wanted to see what was in the directory, what command would you use? DIR What command would you employ to see your network configuration? ipconfig If you wanted to see if the Google DNS servers were up, what command would you employ? ping 8.8.8.8 If you suspected that some of your windows systems files may have been modified by malware, what command could you run to confirm this? sfc /scannow With what utility can discover the IP address of a computer if...

Words: 369 - Pages: 2

Premium Essay

Windows Server 2003

...(IAS), network bridging and connection sharing just to name a few. This OS was primarily designed for setting up a server on large businesses or corporations focusing on file and print sharing, secure internet connectivity, centralized desktop policy management. System requirements: * 133+ MHZ processor (a maximum of two processors is supported) * 1.25+ GB free hard disk space * 128+ MB of RAM (a maximum of 4 GB is supported) * VGA or higher resolution monitor * One or more network adapters (required for a network based installation) * 12x CD-ROM drive (not required for network based installations) * Mouse, keyboard Key features * “Headless server operations” This is a feature that allowed you to run without a keyboard, mouse, or monitor. You are able to remotely control and restart the system via a serial connection. * Active Directory Domain Rename—Win 2003 lets you change domain 'DNS and NetBIOS names, This allowed you to create a new domain without having to transfer all of the old objects over. * “Microsoft Volume Shadow Copy Service (VSS)— A volume shadow copy is a point-in-time copy of a given storage location. You use either the Microsoft Management Console (MMC) Disk Management snap-in or the MMC Shared Folders snap-in to enable VSS. This feature provides a better...

Words: 603 - Pages: 3

Free Essay

Simplify and Enhance Management of Windows Server 2008

...Microsoft has introduced numerous administrative tools to simplify and enhance management of Windows Server 2008. One of the functions is Active Directory Federation Services. Active Directory Federation Services (ADFS for short) is a software component developed by Microsoft that can be installed on Windows Server operating systems to provide users with Single Sign-On access to systems and applications located across organizational boundaries. It uses a claims-based access control authorization model to maintain application security and implement federated. Claims based authentication is the process of authenticating a user based on a set of claims about its identity contained in a trusted token. Such a token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims based authentication. In AD FS, identity federation is established between two organizations by establishing trust between two security realms. A federation server on one side (the Accounts side) authenticates the user through the standard means in Active Directory Domain Services and then issues a token containing a series of claims about the user, including its identity. On the other side, the Resources side, another federation server validates the token and issues another token for the local servers to accept the claimed identity. This allows a system to provide controlled access to its resources or services to a user that...

Words: 1556 - Pages: 7

Free Essay

Computer

... | 1. Advises me that I have reached limit.?.? 2. [pic] |Exercise 9.2 |Creating a Volume Using Share and Storage Management | |Overview |In this exercise you will use create a Volume on your server to store shared files and folders using | | |the new Share and Storage Management console in Windows Server 2008. | |Completion time |15 minutes | 10. Take a screen shot showing the Volumes tab in the Share and Storage Management console, showing the volume you just created by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab09_worksheet file in the page provided by pressing Ctrl + V. |Exercise 9.3 |Creating a Share Using Share and Storage Management...

Words: 627 - Pages: 3

Free Essay

Active Directory

...1.By using SYBEX, please write step by step to A) Create new subdomain named by KualaLumpurCampus B) Create site name TimaBuilding C) Create new TWO (2) server object within TimaBuilding site, type ExamUnitTima & AdminTima D) Create another site name BlockA with a server object name BlockALibrary E) Create OU structure F) Create Active directory object G) Create and publishing printer H) Create and publishing shared folder 2. Find step by step how to assigning user privileges using Active Directory. 1. Go to Start} Programs} Administrative Tools} Active Directory Users and Computers. 2. Double-click the domain node in the console tree. 3. Click the Users folder. 4. Right-click on the GFI_ESEC_Floppy_ReadOnly folder and click Properties. 5. Click the Members tab and click Add. 6. Click Look in to display a list of domains from which users and computers can be added to the group. 7. Select your domain. 8. Click on your user name and then click OK. Testing Since the user groups created by GFI EndPointSecurity are already configured (and assigned privileges) in the default protection policies. You will be automatically assigned read privileges as soon as you add your name to the GFI_ESEC_Floppy_ReadOnly group, without having to bring up the GFI EndPointSecurity user console. To verify this: 1. Insert a formatted floppy disk...

Words: 735 - Pages: 3

Premium Essay

Domain Structure

...Managing Access to an Active Directory Environment Managing Access to an Active Directory Environment A group is a combination of users and computers with some authentication to control usage. The group is controlled by IT administrators who manage everything including users, data, and computers. At the time of creating a group, there are certain limitations that are set to decide who and how access will be delegated to a resource. With these limitations, it makes it very easy and effective to mitigate discrepancies as there are certain authentications to each user. There are two types of such groups that Microsoft Windows has: * Security Group * Distribution Group Distribution groups can be used only with email applications, such as Exchange to send email to user pools. Distribution groups are not security-enabled, which means that they cannot be listed in discretionary access control lists (DACLs). The resources on a network are secured via security groups. This group determines to give authentications and user permissions to reach the data on the Active Directory, and such groups give authentications to access the resources and are to be found on Discretionary Access Control Lists. The group can have a control that encompasses everything, can be limited to a certain extent or can be further narrowed down as well. It has a universal level of control that share data with every domain on the network. The Active Directory administrator can manage the groups as...

Words: 621 - Pages: 3

Free Essay

Software Development

...Software Deployment Options The first step in any group policy-based software installation is obtaining the installer file for the software you are deploying. It is a requirement that this installation file be in Microsoft Software Installer (MSI) format. "Once you have obtained the appropriate MSI file, you must create a distribution point for the software to be deployed from. Your distribution point needs to be a centralized location, preferably on a server, where a shared folder can be created that all users have read access to. Once you have created this shared folder, you need only to copy the MSI file into it." "Now that we have prepared our installation file we are ready to create the group policy object that will push out the installation. To do this, we will be using the Group Policy Management Console (GPMC), which is a free download from Microsoft. Create a new GPO by opening the GPMC, clicking on 'Group Policy Objects' in the left pane, and right-clicking in the center pane and clicking 'Create New Group Policy Object.' Finally, type a name for this GPO and hit the Enter key. The name of your GPO should be something brief but descriptive, such as a 'Virus Protection Installation.' "Having a fresh clean GPO to work with, we can now proceed to assigning the installation packing to it. You will begin this by right-clicking your newly created GPO and clicking 'Edit.' Under the Computer Configuration heading, expand 'Software Settings.' Right-click 'Software...

Words: 368 - Pages: 2

Premium Essay

Pt2520 Lab1

...Task Command 1. Slmgr.vbs -ato 2. Slmgr.vbs -did (note the GUID). 3. Slmgr.vbs -dli 4. Verify License status is set to Licensed (activated). Quick Reference for WS08 Server Core Installations Print and fold this guide to have convenient access to common commands and procedures for configuring and maintaining Server Core installations of Windows Server® 2008. Activate a server remotely Task Join a computer to a domain Command 1. Type: netdom join %computername% /domain: /userd:\ /passwordd:* 2. Restart the computer. Install an update Remove an update Type: wusa .msu /quiet Configure your server to use a proxy server Type: netsh Winhttp set proxy : Note: You cannot access the Internet through proxy servers that require a password to allow connections. Change a computer name in a domain Type: netdom renamecomputer %computername% /NewName: /userd: /passwordd:* Type: netdom renamecomputer /NewName: Type: slmgr.vbs- ato 1. Type: expand /f:* .msu c:\test 2. In C:\test, open .xml in a text editor. 3. In .xml, replace Install with Remove and save the file. 4. Type: Pkgmgr /n:.xml Change a computer name in a workgroup Activate a server locally Configure automatic updates To verify updates: : Scregedit.wsf /AU /v To enable updates: Scregedit.wsf /AU 4 To disable updates: Scregedit.wsf /AU 1 Task Change to a static IP address Command 1. Type ipconfig /all and record relevant information or redirect to a text file (ipconfig /all...

Words: 421 - Pages: 2