Software Design for Customers Check in System

Software Design for Customers Check in System You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to
check customers in quickly.

Software Design for Customers Check in System
Software Design for Customers Check in System

They would like for the system to allow customers to self-check-in during busy times but have receptionists check customers in
the rest of the time. Your company puts a bid in for the project and wins.
Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf.
Write a four to five (4-5) page paper in which you:
Suggest the prototyping technique you would use for this system and support your rationale.
Create a management plan containing eight to ten (8-10) stages for proper design of such a system.
Explain each stage of the management plan and justify your rationale.
Estimate the length of time it will take to complete each stage of the management plan.
Compare and contrast the self-check-in interface with the interface a receptionist would use.
Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not included in the required page length.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Managing Technology & Innovation (MTI)

Managing Technology & Innovation
Managing Technology & Innovation

Managing Technology & Innovation (MTI)

In order to do this assignment, you will have to do 4 questionnaires, 1 is for myself doing it(23, Asian), and others 3 questionnaires. You can make all the
questionnaires up by yourself (the questionnaires sheet will be uploaded, do not for get to make 1 questionnaire up by 23 years old, Asian).
After you finish doing questionnaire, you will have to calculate as in examples in excel file that will be uploaded.
Once you finish doing questionnaires and rate them, you can do the assignment.
If you have any questions, feel free to contact me by email, I always check my email 24/7.
Use charts/figures as appropriate. For calculations show formula; data; workings and results.

We can write this or a similar paper for you! Simply fill the order form!

Business Analysis Review and Report on Blackberry

Business Analysis Review and Report on Blackberry Order Instructions: CLIENT IS FROM AUSTRALIA
About HR assessment example: Assessment Task 1: Business analysis review and report

Business Analysis Review and Report on Blackberry
Business Analysis Review and Report on Blackberry

Conduct an analysis of business strategy, framework, and performance, as well as an analysis of industry/market conditions, using appropriate templates/tables and compile a report of approximately 1200 words

Business Analysis Review and Report on Blackberry Sample Answer

Abstract

Initially known as Research in Motion, BlackBerry Limited surprised the technology industry with its innovative and advanced technology. The BlackBerry wireless email solution became very popular to people, especially to business people. The company was an enormous giant in innovating devices that are businessmen-friendly. However, with the birth of iPhones and Androids, BlackBerry Limited slowly exited the industry and silently sit on the sidelines. What used to be on top, now seemed to be slowing down in the world of technological competence. Business competition in today’s corporate world is very high. Big and small business firms should continue to modify and improve their products to compete with the innovative products launched differently by several corporations. Thus, BlackBerry might want to opt to change its strategy. The risk may be high, but the results outweigh the efforts.

Keywords: Blackberry, business competition, the technology industry

 Looking into a Technological Giant: A Business Analysis Review and Report of Blackberry

 Introduction

Blackberry Limited initially started as Research in Motion (RIM). It is a Canadian telecommunication and wireless equipment company founded by Mike Lazaridis. Lazaridis is an engineering student from the University of Waterloo, who founded the company in 1984. He was just twenty-three years old at that time when he created RIM. Another engineering student from the University of Windsor, Douglas Fregin, co-founded the company. RIM has its roots as an electronic and computer science consulting company. In 1988 the company became the first wireless data developer in America. It was also the first ever company, outside Scandinavia, to evolve connectivity products for Mobitex wireless packet-switched data communications network.

RIM became famous for introducing innovative technologies such as the DigiSync™, Film Keykode™ Reader, the first Mobitex protocol converter, and the BlackBerry wireless email solution.  The BlackBerry wireless email solution became very popular to people, especially to business people. The device allows workers to send and receive e-mails while away from the office. As what authors describe it, BlackBerry became the indispensable accessory of business executives, heads of states, and Hollywood celebrities (Gillette, Brady, & Winter, 2013). However, BlackBerry’s fame wavered when iPhone and Android came to the picture. The global economic condition affects all kinds of businesses (McQuerrey, 2016).

The upsurge in the economy proffers new business prospects for small operations. On the other hand, a declining economy can have a lasting impact on the firm. In a robust and better economy, businesses prosper, people have a high income, and low unemployment; on the other hand, a sluggish economy poses many challenges to investors. Shareholders may suffer from profit losses which will urge the company to cut their workforce. Furthermore, the high competition in the business world is prevalent. Companies gain an advantage against the world’s biggest competitor because of pressure. It pushes companies to improve their products and be continually competitive. It is in this light that the analysis of Blackberry was created.

Blackberry Company Analysis

The BlackBerry Limited (BlackBerry) is a supplier of mobile communications devices. The company is engaged in providing BlackBerry wireless solution that includes smartphones, software, and services. The core areas of the company are on Enterprise Services, Messaging, Devices business and BlackBerry Technology Solutions (“Company Profile”, 2016). BlackBerry Limited is considered a global leader in mobile communication. The company continues to inspire its customers by producing innovative products which the market will surely patronize. The company operates across continents such as North America, Asia-Pacific, Europe and Latin America. There are 20 executives and directors of Blackberry under the leadership of John Chen, Executive Chairman of the Board and Chief Executive Officer. (“About BlackBerry”, n.d.).

Due to high competition and economic recession, the company incurred a negative growth in sales. Thus, it experienced a loss of its profits. In the year 2013, the company laid off thousands of its employees and sold the company to about US $4.7 billion (“BlackBerry timeline: A look back at the tech company’s history”, 2013). The company which is considered a technology giant, slowly shrink its stakes in the global smartphone market share by 3 percent. In the last few years, the company continues to have negative growth (Sturgeon, 2013).

Engineers and technicians are brainstorming about new technologies to incorporate into blackberry phones. With its new Blackberry 10 (BB 10) launched in 2013, the company is positive to increase its sales. The new product has an innovative design, and its system has multimedia, applications, and touchscreen features. This product is said to be a crucial determinant to the long-term sustainability of the company (Radio-Canada, 2013). BlackBerry 10 sees the implementation of a whole new user interface, doing away with the conventional BB system that people are used to in favor of something that resembles the likes of Androids and iOS (McCann, 2013).

Industry Analysis

In doing an industry analysis of BlackBerry Limited, it is essential to look into the company’s political environment, economic advantage, social relations, technological advancement, legal policy6, and environmental (PESTLE) contexts. PESTLE enables one to assess the risks that they are facing, and seeing what impacts do current factors have (PESTLE Analysis: Strategy Skills, 2013). Moreover, PESTLE is used to examine the many factors in the macro-environment that may affect the decision of the managers in organizations (PESTEL Analysis of the Macro-environment, 2011).

The nature of Blackberry business is risky because of the rapidly changing technology. Now and then there are new innovative product lines that are readily available in the market. Competition is very high among its industries. Among its competitors who are also familiar with the market include LG Electronics Mobile Communications Company, Apple Inc., Microsoft Corporation, Google, Lenovo Group Ltd., Huawei Technologies Co., HTC Corporation, ZTE Corporation, and Nokia. Other competitors are Xiaomi Inc., IBM, SAP AG, Citrix, VMware, Inc., Mobile Iron, Inc., Good Technology Corporation, Green Hills Software, Intel Corporation, Mentor Graphics Corporation,  and Sysgo AG. Some internet media are also in the competition such as Facebook, WeChat, Viber, Kik, Kakao Talk, Telegram, Snapchat, Cumulocity, Exosite, IBM, and MontaVista Software.

With the presence of its equally technologically advanced competitors, standing in the communication technology industry is a challenge to BlackBerry Limited. The company should create one of a kind innovative product which is more advanced compared to others. Its marketing strategies should also be strengthened.

Looking at the situation of BlackBerry Limited in the competitive world of technology, it can be said that the company has a failing technological strategy. Apple and Android have already taken BlackBerry from the limelight. The two companies are now ruling the gadget world. This condition is primary because of the rapid pace of technology; BlackBerry Limited was not able to hop on the train of innovation faster than the other companies. The company never saw it coming that what was once impossible may be a common trend at some time. Below is a table of the growth rate of BlackBerry Limited in comparison to industry and sector.

  Company Industry Sector
Sales (MRQ) vs Qtr. 1 Yr. Ago -29.70 6.37 13.66
Sales (TTM) vs TTM 1 Yr. Ago -35.23 3.74 12.06
Sales – 5 Yr. Growth Rate -35.87 15.04 11.18
EPS (MRQ) vs Qtr. 1 Yr. Ago -956.68 45.89 32.42
EPS (TTM) vs TTM 1 Yr. Ago 23.87
EPS – 5 Yr. Growth Rate 39.16 14.52
Capital Spending – 5 Yr. Growth Rate -42.31 -2.30 9.91

Table 1. Blackberry growth rate in comparison to industry and sector

It is shown in the table above that the company recorded a negative growth rate in sales by 35.87 percent during the last five years. These results mean that the firm is losing profits. Regarding growth rate in capital spending the company also incurred a negative growth of 42.31 percent. The situation is alarming. If the condition continues, the company will have to lay off more employees in the future.

SWOT, Gap, and Cost-Benefit Analysis:

            SWOT analysis is a device that aids business personnel to assess the strengths, weaknesses, opportunities, and threats involved in any business enterprises (Ommani, 2011). Moreover, SWOT can help us gain insights into the past and think of possible solutions to existing or potential problems for an existing business or for an existing venture (USDA as cited in Ommani, 2011). To better understand the situation of BlackBerry Ltd, it is also necessary to look into its strengths, weaknesses, opportunities, and threats, coupled with the gap and cost-benefit analysis.

SWOT Analysis

Strength

·         Adequate assets and equipment

·         Skilled and enough human resource

·         Excellent marketing strategies  

Weaknesses

·         Financial Capability

·         Employee Turnover

 

Opportunities

·         Billions of customers

·         Development of new and high-tech communication products that could compete globally

Threats

·         High competition

            Table 2. SWOT Analysis

            As we can see in the diagram, BlackBerry is on the edge when it comes to its resources such as the equipment, assets, and human resource. Moreover, the company has an excellent marketing strategy. Just last year 2010, the company hired a new CEO, who is a Hong Kong -born British-American business person and an electrical engineer. This new CEO is none other than John Chen, known for his many achievements and for turning around failing companies. The said CEO pushes hardware profitability as the next big thing in BlackBerry Ltd and as an answer to the threats that the firm is facing. Furthermore, the company sees opportunity in developing new and high-tech communication products that could compete globally with other international corporations.

High competition is seen as one of the threats to the company, but despite this, BlackBerry Limited sees opportunities in the near future. As what the CEO of the business stated (in an interview) last June 2015, the company’s smartphone unit will turn profitable in the short term (Rathinavel, 2015). BlackBerry Limited has many customers even before the advent of iPhones and Android, thus innovating will only make the company attract even more billions of customers.

Gap analysis

            Based on all the data gathered, it is feasible to say that BlackBerry Limited is indeed a company who had reached its peak at some point in time. The SWOT analysis in the above shows the strengths that the company can muster in the competition field. However, despite the good record of BlackBerry Limited, we cannot deny the gaps in the strategies of the enterprise. One thing is the failure of the company to innovate in time with the fast-paced development of its competing companies. With the advent of iPhone and Android, BlackBerry has lost its fame in the technology market. The problem here may not be the marketing strategy of the company but in the workers.

As a solution to this, the company should hire more reliable and credible workers so as to step back again to the world of technological competition. Moreover, it will be of advantage to the company itself and its employees if they will initiate training. Differentiation by skill, knowledge, and motivation of workforce, takes on increasing importance as organizations strive to compete in the worldwide economy (Aguinis & Kraiger, 2009). Hill and Lent (as cited in Aguinis and Kraiger, 2009) mentioned that training-related changes are believed to improve job-related performance and other positive changes such as the acquisition of new skills.

In addition to this, BlackBerry Limited might also want to consider outsourcing employees or engineers that will help improve the declining status of the company. Outsourcing is said to be a common practice in both private and public organizations (Kremic, Tukel, & Rom, 2006). Kremic, Tukel, and Rom also revealed that most organizations nowadays are perhaps already using outsourcing as a function to perform efficiently. The benefit of outsourcing to the company is the additional knowledge that outsourced employees can offer. Moreover, outsourcing enables the company to learn new insights, improve strategy, and look at things from a different perspective.

Another solution to the challenges that BlackBerry Limited is facing is to initiate partnerships with other big companies. With the work connections that their present CEO has, doing this strategy is plausible. Partnering and making ties with businesses, both local and abroad, will enable BlackBerry Limited to expand its scope of activities, consumers, and resources. Such ties can also be a leeway for BlackBerry Limited to improve their innovative efforts and technological advancement.

Cost-Benefit Analysis           

   

Solutions/Initiatives

Key Steps to Implement  

Cost Benefit (est. cost, expected benefit, time to realize)

 

Impact (which part of business)

1. Trainings Initiating training for all employees  US$ 3,000

Improve knowledge, skills, and abilities of employees, improvement of innovative efforts and technological advancement

1 -2 weeks, twice to thrice a year

Human Resource, Employee production
2. Recruitment Recruiting credible and trained employees US$ 3,000

Increased productivity, efficient and innovative workers.

2-3 months

Labor force, operations
3. Outsourcing Hiring employees from outside the organization US$ 10,000

More insights and innovative ideas, more skilled, additional workforce

Strategic planning
4. Partnership with other Companies Making ties with businesses, both local and abroad US$ 100,000

Business, consumer, and resource expansion, improvement of innovative efforts and technological advancement

Strategic planning, operations

Table 3. Cost-Benefit Analysis

            The table above shows the cost-benefit analysis of the measures above in addressing the present condition of BlackBerry Limited. Note that training, recruitment, outsourcing, and partnership with other companies are real solutions for the current situation that BlackBerry Limited is encountering. The whole plan will take a more than a hundred thousand US dollars to implement. We can also note that despite the significant sum that improving BlackBerry Limited entails, the benefits still outweigh the costs.

Industry feedback

At the height of Blackberry popularity, there are about 80 million users which include high ramming government officials and celebrities. There have been significant changes and improvements that the company is implementing over the past years. Its sustainability in the industry could be attributed to the continued patronage of its loyal customers. BlackBerry could face its downturn, and the company is not yet out of the market.

Conclusion

BlackBerry is a technologically innovative company which is undergoing a rough road since the emergence of iPhones and Android. Its current situation is not healthy based on statistics. If it continues to happen, the company will experience great losses that could lead to layoff in its workforce. The situation is not good for the sector and the industry itself because BlackBerry is a giant company. The company might need to re-engineer their processes and operations and conduct a thorough analysis of its current condition so it could withstand the challenges in the technological industry.

Business Analysis Review and Report on Blackberry References

About BlackBerry. Ca.blackberry.com. Retrieved 4 June 2016, from

http://ca.blackberry.com/company.html

Aguinis, H., & Kraiger, K. (2009). Benefits of Training and Development for Individuals and Teams, Organizations and Society. Annual Review of Psychology.

BlackBerry timeline: A look back at the company history. (2013). Global News. Retrieved

4 June 2016, from http://globalnews.ca/news/860689/blackberry-timeline-a-look-back-at-the-tech-companys-history/

BlackBerry 10 aims to catch up the competition. (2013). Cbc.ca. Retrieved 4 June 2016, from

http://www.cbc.ca/news/technology/blackberry-10-aims-to-catch-up-with-competition-1.1371481

Company Profile. (2016). Reuters. Retrieved 4 June 2016, from

http://www.reuters.com/finance/stocks/companyProfile?symbol=BB.TO

Gillette, F., Brady, D., & Winter, C. (2013). Retrieved from Bloomberg: http://www.bloomberg.com/news/articles/2013-12-05/the-rise-and-fall-of-blackberry-an-oral-history

History.Bloomberg.com. Retrieved 4 June 2016, from

http://www.bloomberg.com/news/articles/2013-12-05/the-rise-&-fall-of-blackberry-an-oral-history

Kremic, T., Tukel, O., & Rom, W. (2006). ‘Outsourcing decision support: a survey of the benefits, risks, and decision factors.’ Supply Chain Management: An International Journal, 11(6), 467-482.

McCann, J. (2013). Retrieved from Techradar: http://www.techradar.com/reviews/pc-mac/software/operating-systems/blackberry-10-1090522/review

McQuerrey, L. (2016). The Economy’s Effect on Small Businesses. Retrieved from Small Business: http://smallbusiness.chron.com/economys-effects-small-businesses-10269.html

Ommani, A. (2011). Strengths, weaknesses, opportunities and threats (SWOT analysis for farming) system businesses management: Case of wheat farmers of Shadervan District, Shoushtar Towship Iran. African Journal of Business Management, 5(22), 9448-9454.

PESTEL Analysis of the Macro-environment. (2011). In Foundations of Economics. Oxford University Press.

PESTLE Analysis: Strategy Skills. (2013). Retrieved from www.free-management-ebooks.com

Radio-Canada. (2013, January 29). BlackBerry 10 aims to catch up with the competition. Retrieved June 6, 2016, from http://www.cbc.ca/news/technology/blackberry-10-aims-to-catch-up-with-competition-1.1371481

Rathinavel, P. (2015). BlackBerry CEO John Chen Says Hardware Unit will Make Money Again. International Business Times. Retrieved from International Business Times.

Sturgeon, J. (2013). ‘BlackBerry cuts a third of workforce; faces a billion-dollar loss.’ Global

News. Retrieved 4 June 2016, from http://globalnews.ca/news/854194/blackberry-to-cut-4500-jobs-expects-major-q2-loss/

Managing Digital Devices and Carts Effectively

Managing Digital Devices and Carts Effectively Order Instructions: In 150 to 250 words, describe how you manage (or would manage) digital devices and a cart in your classroom effectively to maximize learning.

Managing Digital Devices and Carts Effectively

Provide specific details of your device management plan.

Managing Digital Devices and Carts Effectively Sample Answer

Managing Digital Devices and Carts in Classrooms Effectively

The management of carts and digital devices like iPods and computers can be an extremely demanding job and time-consuming as well. It also becomes intimidating for some teachers particularly those who are not comfortable with the use of such devices in classrooms. It may take time to develop the routine of using these digital devices but the moment it is established, it works effectively and ensures maximum learning (Esquivias, Munoz, Acosta, Moreno, & Navarro, 2016). The establishment of these routines requires the use of behavioral strategies like reinforcement and repetition mostly in the beginning. This paper, therefore, seeks to analyze and establish different methods of managing digital devices and carts in classrooms.

According to my point of view, it is important for the teacher to prepare effectively for the lesson. An efficient lesson plan should keep a student involved to help minimize classroom problems. The use of distinct tasks instead of huge projects helps the students to practice what has already been taught (Avilés-González, Piernas, & González-Férez, 2014). The teacher should also ensure that the devices are not used for the wrong purposes to avoid destruction in the classrooms. I have also noticed that going through a technology lesson before presenting it helps the teacher to have concrete information to pass to the learners. It is also crucial for a teacher to consider having extra lessons in case technical problems are experienced during a lesson.

In my understanding, establishing a culture of effective use of those digital devices aids in respecting the rules of the classroom as well as using the devices for the right purpose. This means that students who uphold good conducts in their technology lessons should be praised while those who break rules should be held accountable.

Managing Digital Devices and Carts Effectively References

Avilés-González, A., Piernas, J., & González-Férez, P. (2014). Scalable Metadata Management Through OSD+ Devices. International Journal Of Parallel Programming, 42(1), 4-29. doi:10.1007/s10766-012-0207-8. Retrieved From: http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=93463972&site=ehost-live

Esquivias, P. M., Munoz, C. M., Acosta, I., Moreno, D., & Navarro, J. (2016). Climate-based daylight analysis of fixed shading devices in an open-plan office. Lighting Research & Technology, 48(2), 205-220. doi:10.1177/1477153514563638. Retrieved From; http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=113832391&site=ehost-live

Use of Technology in Assisting Learning in Maynard

Use of Technology in Assisting Learning in Maynard Order Instructions: use of technology in assisting learning in Maynard Evans High School in the Orange County school district.

Use of Technology in Assisting Learning in Maynard
Use of Technology in Assisting Learning in Maynard

Use the Internet to research one (1) topic. Justify your topic selection by highlighting its relevance to your chosen district being able to successfully meet its K-12 assessment goals. Your research should also focus on locating current issues, applications, assessment strategies, and tools related to your selected topic.

Write a five to seven (5-7) page paper in which you:

Propose your research topic in which you detail its relevance to meet one (1) or more K-12 assessment goals in your chosen school district, focusing on a specific grade level, discipline, or target student population (gifted students, students with special needs, etc.).
Examine at least three (3) key political, legal, and/or current issues related to your chosen topic.
Describe at least three (3) specific needs of the students in the school district including students with special learning needs.
Propose at least three (3) applications your topic has to K-12 assessment in your chosen school district.
Provide at least four (5) sources that document detailed information about your proposed topic. The sources must be written within the last five (5) years.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Assess various measures for assessing learners’ progress, including formal, test-based measures, and informal and observational measures.
Analyze traditional theories of assessment.
Evaluate alternate forms of assessment for special populations.
Use technology and information resources to research issues in educational assessment.
Write clearly and concisely about educational assessment using proper grammar and mechanics.

Use of Technology in Assisting Learning in Maynard Additional Information

The School selected for this research is Maynard Evans High School, in the Orange County school district. Glade level of focus: 9th grade.

Some current issues with Maynard Evans HS are:
1. Students are struggling with the transition from the Florida Comprehensive Assessment Test (FCAT) to Florida Standards Assessment (FSA)

2. Lack involvement of parents in the educational development of their students

3. Insufficient funds from the government to create more programs which would meet the educational needs of students

Use of Technology in Assisting Learning in Maynard Sample Answer

Introduction

This paper seeks to present several findings in relation to the use of technology in assisting learning in Maynard Evans High School in the Orange County school district. The paper, therefore, provides an in-depth analysis of the trends that have emerged and the best practices developed in relation to computer-based assessment in an effort that also seeks to apply these principles on K-12 learning and on students of the 9th-grade level.

It is important to consider the fact that many jurisdictions have been developed to support technology-based learning in students with disabilities because of its cost-effectiveness. On the other hand, this approach is considered to improve teaching and learning outcomes through a digital form of education. This clearly suggests the fact that disabled students are more likely to learn through the inclusion of technology.

The potential for a computer-based learning approach in catering to the special needs of students with disabilities is, therefore, an effective approach that would aid in meeting the learning needs of the students. This is attributed to the fact that digital learning has the capacity to provide a platform for these students to learn, test and receive immediate feedback as they prepare for their examination.

Students with Special Learning Needs

It is important to determine the fact that difficulties in recognizing and solving problems, reading, writing, and even math in students in students at Maynard Evans High School County school district remains one of the challenges that are common considering the fact that this remains the period in which learning disabilities are mostly diagnosed (Langova, Anna. n.d). During this phase, some students are bound not to know their learning disability and would later realize this in their jobs, families, and relationships.

In general, it is imperative to determine that students with learning disabilities are considered to be average in intelligence, a factor that affects their success in education (Ault, Bausch, & McLaren, 2013). These learning short comes are also referred to as hidden disabilities since the students may pose as intelligent and brilliant. In order to determine the manner in which technology can be used to assist students in this institution to learn, it is imperative to determine that the focus of this paper will focus on three types of students with learning disabilities:

Students with Auditory Processing Disorder (ADP)

This condition has an adverse effect on the flow of sound through the ear and how it is processed and interpreted within the systems of the brain. Individual students with this disorder find it difficult to recognize the differences between sounds in words even when they are clear and loud.

Dyscalculia

This is considered a specific learning disability that has the capacity to have an effect on a student’s ability to understand numbers during math lessons. Students with this type of learning disability are likely to have challenges in comprehension of in clearly identifying arithmetical symbols including the challenges in memorizing numbers.

Dysgraphia

This is another kind of disability that affects a student’s ability to write, thus affecting the motor skills of an individual. As a result of this, a student is bound to experience illegibility in writing, poor spatial planning on a paper, spelling errors, inconsistent spacing, and challenges in composing clear writing as well as thinking while writing.

Specific Needs of the Students

It is therefore essential to consider the fact that this remains the primary reason as to why some of the students of Maynard Evans High School in Orange County are struggling to make a transition to Florida Standards Assessment (FSA), a factor that remains one of the student’s needs. The students are currently undertaking the Florida Comprehensive Assessment Test (FCAT) within the education system in this county.

It is additionally important to consider that the students would also require the involvement of their parents and guardians in their educational development (Ault, et.al.2013). This would be appropriate in assisting them to make efforts towards achieving their education goals as determined in K-12.

The students with special learning needs, on the other hand, would also want to achieve their personal education goals within this institution, a factor that would also improve their classroom involvement and social lives (Zcool.com. n.d). Additionally, students with special learning needs would also achieve better standards of communication with their peers within the institution.

 Assistive Technology in aiding the Process of Learning in Students with Special Learning Needs

It is essential to consider the fact that the students with special learning need account for 5% of the total population In the United States of America (Zcool.com. n.d). However, the vast growth of ICT in the United States of America and the government’s initiatives directed towards meeting the learning needs of this population have seen the need of using Assistive Technology (AT) in enhancing the process of learning among this population.

The Assistive Technology (AT) is defined as an electronic device that can be used in increasing, maintaining and improving the abilities of individuals with different disabilities (Young, 2012). There are a number of AT devices and software are that can be included in enhancing the course of learning that can be achieved through careful planning in order to benefit the students and to meet the goals of K-12 in Maynard Evans High School.

It is therefore important to note that in order to meet the goals of K-12; the Assistive Technology will be used in this institution to help the students with different learning needs in learning how to complete some of their tasks in order to pass areas of difficulties (Young, 2012). For instance, when a student uses an AT in listening to a digitalized version of a book, this helps them in passing an area of challenge.

Political, Legal, and Issues Related to the Inclusion of AT

According to the law, the element of inclusion in a classroom should be a factor that educational facilities need to consider when teaching both the students with disabilities and those with special learning needs to other normal students (Vasquez III Forbush, Mason, Lockwood, & Gleed, 2011). In this case, the element of inclusion is aimed at educating students within a regular classroom rather than in special chosen schools.

In this case, the students with different disabilities and learning needs, including those with severe impairments are able to be included in a general class sitting, with the required support services and aids to ensure these students achieve success academically, behaviorally and socially (Vasquez et.al.2011)

On the other hand, the federal state has developed appropriate measures for students with special learning needs and disabilities through an approach that allows equal access to education to all the students irrespective of their disabilities, gender, age through a publicly funded education system programs and opportunities.

Applications of This Topic to K-12 Assessment

It is essential to consider the fact that education remains the primary objective of the K-12 assessment. In order to ensure that the goals of K-12 are achieved in Maynard Evans High School in Orange County, there is a need to take consideration of the students who have different learning needs and well as those who present disabilities.

In this case, it will be essential to ensure that the system introduces assistive technology in aiding the process of learning in students with special learning needs. Through this, Maynard Evans High School may ensure a blend of computer-assisted instructional programs that infers to software’s and applications that are developed to provide instructional and practical opportunities for several devices such as iPads, mobile phones, computers, and laptops to aid the students in learning.

These systems would, therefore, provide immediate feedback to the students with different learning disabilities who in turn may be in a position to benefit from such nonjudgmental computerized practices. This technology will, therefore, assist the students with special learning needs as well as those with disabilities in this institution to develop knowledge on how to spell, write, solve and construct expressions and mathematical symbols, a factor that would assist the students in coping with math drills.

Use of Technology in Assisting Learning in Maynard Conclusion

As determined, the potential for a computer-based learning approach in catering to the special needs of students with disabilities is, therefore, an effective approach that would aid in meeting the learning needs of the students. This, therefore, determines the need to introduce assistive technology in aiding the process of learning in students with special learning needs. Through this, Maynard Evans High School may ensure a blend of computer-assisted instructional programs that infers to software’s and applications that are developed to provide instructional and practical opportunities for several devices such as iPads, mobile phones, computers, and laptops to aid the students in learning.

Use of Technology in Assisting Learning in Maynard References

Ault, M. J., Bausch, M. E., & McLaren, E. M. (2013). Assistive technology service delivery in rural school districts. Rural Special Education Quarterly, 32(2), 15-22. Retrieved from http://search.proquest.com/docview/1420524203?accountid=6180

Langova, Anna. (n.d.) Word help. [Photograph] Retrieved from http://all-free-download.com/free-photos/word_help_185278_download.html

Vasquez III, E., Forbush, D. E., Mason, L. L., Lockwood, A. R., & Gleed, L. (2011). Delivery and Evaluation of Synchronous Online Reading Tutoring to Students At-Risk of Reading Failure. Rural Special Education Quarterly, 30(3), 16-26.Retrieved From: http://search.ebscohost.com/login.aspx?direct=true&db=tfh&AN=74530433&site=ehost-live

Young, G. (2012). Examining assistive technology use, self-concept, and motivation, as students with learning disabilities transition from a demonstration school into inclusive classrooms. Unpublished Doctoral thesis, Western University, London, Ontario, Canada. Retrieved from http://ir.lib.uwo.ca/cgi/viewcontent.cgi?article=2316&context=etd

Zcool.com.cn. (n.d.) Modern science and technology picture 02 HD pictures [Photograph]. Retrieved from http://all-free-download.com/free-photos/modern_science_and_technology_picture_02_hd_pictures_168754_download.html

Exploration of an Integration Matrix

Exploration of an Integration Matrix Order Instructions: After your exploration of the Technology Integration Matrix (http://fcit.usf.edu/matrix/),

Exploration of an Integration Matrix
Exploration of an Integration Matrix

where would you place yourself on the Matrix? In 150 to 250 words, reflect on your placement and explain what you could do to move to the next level.

Exploration of an Integration Matrix Sample Answer

Exploration of an Integration Matrix

Technology integration refers to the incorporation of technology resources and practices into the everyday routine, jobs as well as schools management. These resources include specialized software, computers and communication systems while practices refer to communication, retrieval of data and internet-based research (Aviles, Piernas, & Gonzalez, 2014). While reflecting my knowledge and use of technology, I have realized that I have not yet achieved the goals that have been set in this field of technology. Therefore, I have decided to improvise methods and strategies that would help in achieving these goals.

During my research, I came up with the following methods that will help to move from the authentic level to the next. Firstly, I have realized that it is essential to establish and identify the advantages that are related to technology. This would be achieved by performing an assessment then search for the most effective method in order to accomplish the need (Aviles, Piernas, & Gonzalez, 2014). It is equally important to find out the main objectives and assessments as well. The main purpose of this step is to equip me with the ways of evaluating the effectiveness of my integration plan. The third method is to prepare the environment in which I carry out my assessment in order to have accurate results after my research.

The most crucial method is to analyze the results of the assessment even after the whole integration plan. In this strategy, it is important to analyze the objectives that have been realized together with the diverse assessments that have been used and finally make a conclusion about what has been achieved. The major key to an effective integration plan is the ability to change the procedures with the change of technology. It is also crucial to note that analyzing results and as well as revising the practices help in avoiding frustrations as a result of failure.

Exploration of an Integration Matrix References

Avilés-González, A., Piernas, J., & González-Férez, P. (2014). Scalable Metadata Management Through OSD+ Devices. International Journal Of Parallel Programming, 42(1), 4-29. doi:10.1007/s10766-012-0207-8. Retrieved From: http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=93463972&site=ehost-live

Module Information System for Printing and Internet

Module Information System for Printing and Internet Order Instructions: The module Information System introduces the student to the use and management of information systems in varied organizational settings.

Module Information System for Printing and Internet
Module Information System for Printing and Internet

It adopts social science and a management perspective to appreciate the history, function, and impact of Information Systems.

Technology I choose:
Printing press (1450)
Internet (the 1990s)

Essential readings
1. Brown, S. J. & Duguid, P. (2000) The Social Life of Information. Harvard Business
2. Newell, S. et al (2009) Managing Knowledge Work and Innovation, 2nd edition. Palgrave
3. Kallinikos, J. (2010) Governing Through Technology: Information Artefacts and Social
Practice. Palgrave Macmillan

Recommended readings
1. MacKenzie, D. & Wajcman, J. (1999) The Social Shaping of Technology. 2nd ed. Open University Press
2. Suchman, L. (2007) Human-Machine Reconfigurations: Plans and Situated Actions. 2nd Edition. Cambridge University Press
3. Scarbrough, H. & Corbett, M. (1992) Technology and Organization: power, meaning, and design. Routledge.
4. Bouwman H. et al (2008) Information & Communication Technology in Organizations, SAGE
5. Nonaka I. & Tackeuchi H. (1995) The knowledge-creating company: how Japanese companies create the dynamics of innovation. Oxford University Press
6. Walsham, G. (1993) Interpreting Information Systems in Organizations. John Wiley & Sons Inc
6. Winner, L. (1999) ‘Do artifacts have politics?’ in The Social Shaping of Technology. 2nd ed. Open University Press. (Chapter 2). [Electronic]. Available at:
http://www.nyu.edu/projects/nissenbaum/papers/Winner.pdf
7. Clegg, S. et al (2008) Managing and Organisations: An Introduction to theory and practice, 2nd edition, London: Sage
8. Latour, B. (2007) Reassembling the Social: An Introduction to Actor-Network Theory. Oxford University Press.
9. Zuboff, S. (1989) In The Age Of The Smart Machine: The Future Of Work And Power. Basic Books
10. Jonhs, A. (2002) ‘How to Acknowledge a Revolution’, The American Historical Review, vol. 107, no. 1, pp. 106-125
11. Eisenstein, E. (2002) ‘An Unacknowledged Revolution Revisited’, The American Historical Review, vol.107, no.1, pp. 87-105
12. Latour, B. (1992) ‘’Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts’’ In Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge MIT Press. pp.225-258. [Electronic] Available at:
http://www.bruno-latour.fr/sites/default/files/50-MISSING-MASSES-GB.pdf
13. Grint, K. & Woolgar, S. (1997) The machine at work: technology, work, and organization. Cambridge, UK; Malden, MA, Polity Press?; Published in the USA by Blackwell.

Academic journals
Information and Organization
MIS Quarterly
Information Systems Research
?Information Systems Journal
New Technology, Work & Employment
Journal of Information Technology
European Journal of Information Systems

Module Information System for Printing and Internet Sample Answer

Introduction

Since the reception of technology, there has been socio techno debate emanating from different perceptions of people. Socio techno debate comes as a result of different orientations of people towards a certain technology. When a technology makes its way to the society, there is usually a confusion of the benefits and the harmful effects of the technology, (Vaast, Davidson & Mattson, 2013). This aspect leads to the occupation of different positions when it comes to the effects of such a technology to the society, and to a greater extent, a debate on whether the technology should be absorbed or not. This paper discusses application of socio techno debate on emergence of printing press as well as the internet. Implication of the analysis is given in understanding the technological innovations.

Printing press

Technology is one of the controversial aspects in the society. When a technology emergences, it comes with mixed reactions in as far as its reception is concerned. The society receives a technology with mixed reactions depending with their perception especially in terms of the advantages as well as the demerits associated with it, (Baek, Meroni, & Manzini, 2015). Before the emergence of printing press, no one had imagined the ease that such a technology would bring to the society.

On the other hand, there are some demerits of such technology, which still had not been imagined. With the emergence of the printing press technology, there came with it the socio technical debate on its acceptance or resistance, (Scarbrough & Corbett,1992). As it is with emergence of technologies and their reception in the society, there was debate on whether the printing press as new technology should be fully accepted and availed to the whole society or there should be limitations.

The printing press came with a lot of advantages in terms of making work easier. It is very difficult to even imagine how tiring it was to make many copies of documents before the emergence of the printing press technology, (Grint & Woolgar, 1997). With manual duplication of documents, there was bound to be many errors and it was almost entirely impossible to produce many documents with the same information in the required clarity. With the absence of a printing press, there was wastage of time and also loss of clarity of documents. But with its emergence, there was all possibilities of saving time as well as producing exactly similar documents hence avoidance of loss of prudence of document.

However, as is always with technology, there was the other side emerging from socio technical orientations. As earlier indicated, the socio technical debate emanates from a consideration of the demerits of a technology. Every technology usually has its negative side, (Eisenstein, 2002). As for the printing press, there were the issues associated with it such as a lot of noise. Consideration of the noise as an issue in the emergence of printing press may be considered as trivial, but it is one of the issues that led to the debate on the acceptability of printing press, (Reig-Otero, Edwards-Schachter, Feliú-Mingarro & Fernández-de-Lucio, 2014).

The socio technical debate over printing press was fuelled by the future focus of the younger generation at the time, which was foreseeing a better mode of doing the work with more efficiency and with little or no noise. A consideration of the cost of the printing press technology equipment was also a fuelling factor of the debate. In as far as some part of the society was concerned, it was not worthwhile to consider acceptance of the printing press due to the high cost of the equipment especially in comparison to the less need of printing in the time. However, in the absence of other better method, the printing press was retained for a while until the emergence of the more efficient technology.

Internet

It has been argued that; no new technology has brought socio technical debate as long and strong as the internet. Emergence of the internet came with many facets that influenced its reception in the society. As it is usual with every technology, the positive side is seen first. The negative side of a technology is usually there, right from the time a technology emerges in the society, but it is not noticed right away. It is after a while that the society notices the negative side of a technology, and there the socio technical debate begins, (Brown & Duguid, 2000).

With the internet, there was first full acceptance of the technology with little consideration of the negative side that could be detrimental to the society. The internet came as a great relief to the society especially in terms of easing communication, (MacKenzie & Wajcman, 1999). For instance, bulk information could be sent from one place to the other using the internet, such as by use of email. The Internet has enabled people in the society to share information in a more efficient manner. Here two aspects come into play.

Due to the efficiency of the internet, it is possible to share bulk information. For instance, many online books could be sent through the internet. This kind of endeavor would not be possible if the information was to be sent manually. There is also the issue of saving time. The internet makes it possible for information to be shared within a very short period of time, (Suchman, 2007).  With a click of a button, it becomes possible to share so much information. The divergence of the modes of using the internet added the advantages of this technology/For instance, it is not limited to the computer. It is possible to make use of the internet through other simpler and cheaper devices such the phones. This diversification enables people in the society to make use of the internet in a more efficient manner.

However, there are varied disadvantages associated with the internet. It is such disadvantages that brought the socio technical debate on the internet, (Jonhs, 2002). For instance, the internet was associated with addiction. When one gets to use the internet for long periods of time each day, there is the danger of getting addicted to it.  A person gets to feel very much uncomfortable when they happen to miss the sessions of the internet.

Many people, including internet users, take the issue of internet addiction as a light matter, (Lewis, Mengersen, Buys, 2015). What they do not realize is that internet addiction is a very critical condition. A person could get addicted to the internet such that; to reverse the condition, hospitalization is required. It becomes advisable to people to limit the usage of the internet so as to avoid addiction. It is such conditions that bring in the socio technical debate. There is a debate on whether an entity that is capable of bringing such degrees of addiction should be acceptable in society.

Another ill associated with the internet is the cost. Supply of the internet comes at a cost, (Tiropanis, Hall, Crowcroft et al, 2015). At times, it is costly to use the internet especially in situations where one needs to make use of it for a longer period of time. A consideration of the cost of usage of the internet has led to some part of the society being of the opinion that the internet is not of a positive impact and therefore should be done away with.

At times, the cost of the internet itself is not the issue of concern but rather the cost of the devices for facilitating internet usage, (Clegg et al, 2008). For instance, computers, which are meant to facilitate usage of internet are not cheap devices. The phones that are capable of anchoring internet usage are neither cheap. As such, some part of the society feel that the internet is not useful especially in ruining ones economic realms. Even when it comes to organizational level, there has been misgivings when it comes to adoption of usage of the internet due to the initial cost involved especially in installing the required devices.

Another ill of the internet that has fuelled the socio technical debate on this technology involves fraud and cheating, (Facer, 2012). There has been online cheating whereby; through the internet, people lie about their real identity and end up making people hook up with them only for them to realize that they are not the real people they had portrayed in the internet. With such lies, people have travelled even long distances to meet new friends only for them to receive the shock of their lives when they realize that they have been duped.

Implication

Analysis of socio technical debate point to the realization that; every technology comes with its merits and demerits. It is the merits that are first and easily observed. With time people come to realize the demerits of the technology, (Stratford, 2015). It is at such point that the society creates the socio technical debate whereby; some part feels that the new technology should be embraced due to the positive side of it, while the rest of the society feels that the new technology should be abandoned.

The debate by itself is not a bad thing. However, it is crucial that the society looks for ways of mitigating the ills associated with a technology. For instance, it would be viable if the society would be educated on the ills of technology such as internet addiction. When the society gets aware of internet addiction, it becomes possible for them to limit their usage of the internet such that they do not happen to be addicted, (Bouwman et al, 2008).

It is crucial for the society to come up with ways of mitigating the ills associated with a technology, (Newell, et al (2009). For instance, for the noise that was associated with printing press technology, usage of asbestos went a long way in ensuring that the noise did not go beyond the walls of the building housing the technology equipment.

It is also crucial for the society to be well enlightened on means of curbing the ills of technology instead of doing away with the technology. For instance, to mitigate the high cost associated with internet, it is crucial that the society is advised on usage of cheaper devices of internet connection such as phones instead of computers. The technology of shared internet should also be embraced to curb the high cost.

 Module Information System for Printing and Internet References

Baek, J. S., Meroni, A., & Manzini, E. (2015). A socio-technical approach to design for community resilience: A framework for analysis and design goal forming. Design Studies, 4060-84. doi:10.1016/j.destud.2015.06.004

Bouwman H. et al (2008) Information & Communication Technology in Organizations, SAGE

Brown, S. J. & Duguid, P. (2000) The Social Life of Information. Harvard Business

Clegg, S. et al (2008) Managing and Organisations: an Introduction to theory and practice, 2nd edition, London: Sage

Eisenstein, E. (2002) ‘An Unacknowledge Revolution Revisited’, The American Historical Review, vol.107, no.1, pp. 87-105

Facer, K. (2012). Taking the 21st century seriously: young people, education and socio-technical futures. Oxford Review Of Education, 38(1), 97-113.

Grint, K. & Woolgar, S. (1997) The machine at work: technology, work, and organization. Cambridge, UK; Malden, MA, Polity Press?; Published in the USA by Blackwell.

Jonhs, A. (2002) ‘How to Acknowledge a Revolution’, The American Historical Review, vol. 107, no. 1, pp. 106-125

Kallinikos, J. (2010) Governing Through Technology: Information Artefacts and Social Practice. Palgrave Macmillan

Lewis, J., Mengersen, K., Buys, L., Vine, D., Bell, J., Morris, P., & Ledwich, G. (2015). Systems Modelling of the Socio-Technical Aspects of Residential Electricity Use and Network Peak Demand. Plos ONE, 10(7), 1-21. doi:10.1371/journal.pone.0134086

MacKenzie, D. & Wajcman, J. (1999) The Social Shaping of Technology. 2nd ed. Open University Press

Newell, S. et al (2009) Managing Knowledge Work and Innovation, 2nd edition. Palgrave

Reig-Otero, Y., Edwards-Schachter, M., Feliú-Mingarro, C., & Fernández-de-Lucio, I. (2014). Generation and Diffusion of Innovations in a District Innovation System: The Case of Ink-Jet Printing. Journal Of Technology Management & Innovation, 9(2), 56-76.

Scarbrough, H. & Corbett, M. (1992) Technology and Organization: power, meaning and design. Routledge.

Stratford, E. (2015). A critical analysis of the impact of Island Studies Journal: retrospect and prospect. Island Studies Journal, 10(2), 139-162.

Suchman, L. (2007) Human-Machine Reconfigurations: Plans and Situated Actions. 2nd Edition. Cambridge University Press

TIROPANIS, T., HALL, W., CROWCROFT, J., CONTRACTOR, N., & TASSIULAS, L. (2015). Network Science, Web Science, and Internet Science. Communications Of The ACM, 58(8), 76-82. doi:10.1145/2699416

Vaast, E., Davidson, E. J., & Mattson, T. (2013). TALKING ABOUT TECHNOLOGY: THE EMERGENCE OF A NEW ACTOR CATEGORY THROUGH NEW MEDIA. MIS Quarterly, 37(4), 1069-A2.

Cloud Computing to the Rescue Essay Paper

Cloud Computing to the Rescue
                         Cloud Computing to the Rescue

Cloud Computing to the Rescue

The cost of building and maintaining an organizational computing ecosystem has become a bigger part of most organizations’ budgets. Organizations have been looking for ways to reduce this cost. One of the solutions has been to look to the delivery of computing as a service by outside vendors. The delivery and provisioning of computing as a service by vendors such as Amazon, Microsoft, IBM, Google, and many others is known as Cloud Computing. There are public, private, and hybrid cloud computing environments. In this assignment, consider only the public cloud computing environments.
Cloud computing provides scalable computing resources, software applications, data storage, and networking infrastructure at cost below what would cost an organization to provide an equivalent infrastructure internally.
Write a two to three (2-3) page paper in which you:
Describe the hardware, software, and network architectural design of the infrastructure used to build cloud computing infrastructures. Use Microsoft Visio to generate the architectural diagrams. Note: The graphically depicted solution is not included in the required page length.

  • Compare and contrast scalability, disaster recovery, benefits, and opportunities for businesses when using cloud-based computing environments compared to a non-cloud-based environments.
  • Analyze hardware virtualization (virtual machines, virtual desktops, and virtual networks) used by most Cloud Computing environments.
  • Determine if you would prefer a virtualized environment to a non-virtualized environment for a mid sized business or organization. Explain why or why not.
  • Compare the cloud computing cost models used by Amazon EC2 and Microsoft Azure.
  • Choose the cloud computing cost model that you would use for a public cloud solution and support your selection.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate the importance of application maintenance for an organization.
  • Demonstrate how processing and storage components communicate in a computing environment.
  • Explain the types and role of distributed software architecture.
  • Use technology and information resources to research issues in computer architecture.
  • Write clearly and concisely about computer architecture using proper writing mechanics and technical style conventions.

We can write this or a similar paper for you! Simply fill the order form!

Information Security Consulting Research Paper

Information Security Consulting
  Information Security Consulting

Information Security Consulting

Order Instructions:

I need a Pricing Strategy completed .I need a Pricing Strategy for a BUSINESS SEMINAR COURSE AT KELLER WHICH IS A MGMT 600 COURSE

PLEASE VIEW THE ATTACHED FILE

SAMPLE ANSWER

Information Security Consulting

Introduction

The main responsibility of an information security consultancy firm is to monitor, analyze, translate, and decode data for both foreign and counter foreign objectives. The firm has the mandate to protect systems that deal with both communication and information and belong to the US government. These systems are protected against hacking and unauthorized entries. It does all these activities while maintaining high levels of confidentiality. Some of these secret activities involve placing bugs to collect data. It also destroys and intercepts data using complex software and algorithms. The firm, however, does not have any authority in conducting human intelligence. This function is run by government agencies like the FBI and the CIA (McAvoy, 2010). In the US, the information security consulting industry is stable and growing fast. The occurrences of security breaches in the US gives investors confidence in investing in the country’s information security industry. The industry has faced a tremendous upward growth with estimates close to fifteen percent over the last decade. Within the next half decade, the securities companies expect a growth rate of over ten percent. To enjoy this enabling business environment in information security, firms have to come up with efficient pricing strategies. This move coupled with good product marketing will assist the company to enjoy maximum profits in the already lucrative industry (Winkler, 2011).

KOPSS’ pricing strategy

Pricing is one of the major elements in marketing that KOPSS, an information security consulting company,must be conscious. The price of a product proves an important factor because it relates to where the product will be positioned in the market. The price also has effects on promotion, product features, and channel divisions that are also key elements of the market mix. A pricing strategy can, therefore, be described as an action plan to come up with pricing objectives. Such strategies are essential when marketers such as KOPSS are setting prices for their goods and services. There are numerous ways for the marketers to set prices for various products. The products may be new in the market or may have been existent in the market (Wasserman et al., 2009).

KOPSS can adopt couple of strategies for setting prices for new products to ensure that they remain competitive in the market. These are penetration pricing or skimming prices. They can be used simultaneously or each used alone and calculation done for a set duration of time. Price skimming is where they charge the highest price for the product. This price is usually for a short duration when the new product that is either innovative or improved is launched into the market. The key objective is to get the most out of client that are willing to pay extra for the product within the shortest time possible. However, the price is lowered once the product has settled into the market, or its demand has fallen. Penetration pricing, on the other hand, is setting a lower price for the product during the initial market introduction period. The key aim of this move is to establish and maintain a market share for the product fast. The seller’s aim is to discourage their competitors from market entry by establishing a large market share within the shortest time possible (Cohen, 2011).

New Information Security Consultancy firms often make an initial mistake of setting very low prices for their products. They often fall for this move because most of their competitors do not divulge their trading prices. Another reason could be that new consultants have a relatively low number of clients. This reason could be due to the minimal barriers to entry into the industry. They also have to compete with industry giants like McKinsey and Co. The small companies like KOPSS, therefore, compete for clients by offering lower product prices than their established competitors. Many of these new consultants are usually oblivious of the production and operating costs in their businesses. These consultants are in most cases unable to pay bills. The companies may also be unable to raise their prices in the future due to their initial product pricing. This scenario happens when they fail to convince their clients fully on the quality of their services. Product prices are varied by the location and the industry they are targeting. However, a methodology commonly used to come up with a pricing structure exists. This methodology creates an attractive price to both KOPSS and its potential customers (Lassiter, 2010).

KOPSS has its own pricing strategy that has contributed to its success. One of the strategies is penetration, especially when the company is focusing on winning over new customers. The charges are low when the company enters a new market. It has also maintained low prices on its services as a strategy to retain its customers and win over new customers. The prices areaffordable coupled with flexible payment options offered through its state of art services. The company focuses on the most important aspects or services and this has enabled it to manage its costs effectively compared to other players in the industry. It also negotiates for competitive prices for its innovative hardware and software technological products something that keeps its administrative and operating costs low. This therefore, ensures continuous provision of quality services and products to its customers at affordable prices at the same time.

The pricing of the company also puts into consideration the location of the agency. Agencies in the urban or coastal areas charge relatively higher prices than their counterparts in other geographic and demographic locations. It does not come as a surprise to realize that the name and expertise of the company determine the pricing of their products. More experienced companies charge higher than the newbies in the industry (Weiss, 2011).

It is common for most consultants in the information technology to charge hourly. Some high-level consultants, on the other hand, charge according to the entire project. Accountancy, Law and wealth managers also charge on an hourly basis (Weiss, 2011). New arrangements are typically more viable and agreeable to charge on an hourly basis. This arrangement is also easier to manage. On deciding the amount to charge, high-end consultants ask for the steepest fees. Due to the level of secrecy in consultancy prices in the market, deciding the actual amount to charge is very tricky. Most consultants, therefore, set a price for their products by doubling or tripling the average hourly rate charged by similar consultants (Wasserman et al., 2009). As mentioned earlier, KOPSS charges will vary and the charges will only be negotiated in case other products or services are innovative.

Some firms use a daily rate to come up with the price of their products. The daily rate can be randomly selected after looking at the cost of operations and the profit margin expected. The hourly rate can also be decided by multiplying the hourly rate determined above and then multiplying with the number of working hours. Daily rates may seem expensive to clients if they are randomly selected. However, a factor of the hourly rate is an acceptable way to charge for consulting services in the information security industry (Weiss, 2011).  KOPSS, however, does not use this pricing strategy.

Information security consultants can set their product prices according to a set project. They first have to estimate the number of hours they think they will spend on the project. The number of hours is then factored into the hourly rates the company has uses. Some consultancy firms can set the prices depending on how much money their clients will make from the services they offer. This method takes a certain percentage of the benefits accrued by the company resulting in the consultant’s advice (Lassiter, 2010). KOPSS should consider using this strategy as it would give it a wider dimension when consulting for other companies.

KOPSS may decide to receive payment for their services by accepting a share of the client’s future profits or commissions. Here, the consultancy will be pushed to receive payment according to their level of performance. Some clients may offer the firm a commission on the service performance benefits based on the results of the work done by the consultant. This pricing strategy is, however, risky. The client’s performance may directly affect the manner in which KOPSS works resulting to underperformances. The client may also not be fully cooperative to adhere to the consultants recommendations. The company, however, has not adopted this strategy when deciding the amount to charge for its services.

KOPSS may make the decision to use real-time data when determining the amount to charge a client. The data may involve checking the client’s bad debt rate where a client with a higher rate of accruing debts is given stricter payment terms. A payment structure can also be set by using the number of actual working hours. A working and competitive structure cut costs to some amount on the hours the consultant may be paid for just being present and doing nothing. The consultant may also charge for the actual days that they have to work and leave out days they are not actively working for the client (Lassiter, 2010). However, KOPSS may find this strategy expensive and time consuming. Data collection may prove expensive and strain the company’s small operational costs even further.

The consultancy may also decide to charge what all other consultancy firms are charging for their services. This way the firms compete on the quality of services they offer to get clients rather than charging discretely. KOPSS has adopted this strategy in part, as it focuses on quality services but charged at an affordable price. This strategy can only be possible where the rates are open to all. However, this is not often the case, as most consultants to client rates are kept confidential (Winkler, 2011).

A more viable long-term strategy would be to settle for a price that represents the kind of service the firm offers. Such a strategy allows the firm to move from the limitations of hourly charges to a more open scope in business (Cohen, 2011). KOPSS pricing strategy is actually essential in enabling it achieve its goals. Even though the prices are low, the quality of services is high. It is also able to negotiate for higher prices on products and services that it deems innovative, something that helps it mange its costs.

Conclusion

Coming up with an initial pricing strategy may seem difficult at first for an Information Security Consulting Services such as KOPSS. However, once a working strategy that is attractive to both the company and the clients has been designed, then the business is ready to grow. KOPSS can occasionally revise its pricing strategies by considering experience, feedback from clients, and the activities of its competitors. Regardless of how it chooses to set its consultancy fees, the pricing structure, and contract agreement have to be followed to the latter. KOPSS indeed has adopted a low price strategy as well as negotiated strategy that has enabled it to remain competitive in the market. It offers quality products and services that meet the threshold of its customers too.

References

McAvoy, N. (2010). Coded messages: How the CIA and NSA hoodwink Congress and the people. New York: Algora Pub.

Winkler, V. J. R. (2011).Securing the Cloud: Cloud Computer Security Techniques and Tactics.Burlington: Elsevier Science.

Lassiter, P. (2010). The new job security: The 5 best strategies for taking control of your career. Berkeley, CA: Ten Speed Press.

Cohen, W. A. (2011). How to make it big as a consultant.New York: AMACOM.

Wasserman, P., McLean, J. W., & Gale Research Company.(2009). Consultants and consulting organizations directory. Detroit, Mich: Gale Research Co.

Weiss, A. (2011). The consulting Bible: Everything you need to know to create and expand a seven-figure consulting practice. Hoboken, NJ: Wiley.

We can write this or a similar paper for you! Simply fill the order form!

FireEye Cyber Security Essay Paper Assignment

FireEye Cyber Security
              FireEye Cyber Security

FireEye Cyber Security

Order Instructions:

see attached file
DAY TO DAY OPERATIONS OF INFORMATION SECURITY FIRMS

THE SECOND TAB IN THE EXCEL SPREADSHEET

SAMPLE ANSWER

FireEye Cyber Security

Introduction and Background

FireEye Cyber Security is an information technology security firm that deals in combating advanced persistent threats; providing security that is far beyond the usual firewalls, antivirus and sandbox tools. FireEye assists over 2,200 organizations in 60 countries in storage, protection and management of vital information. The company’s vision is to ensure that the clients’ most valuable information is protected and runs by the mantle ‘Security Reimagined’. FireEye aims at investing in the best technology to detect and fix malware; in such a way that its innovation strategies are as quick as attackers.

The main activities at FireEye include information technology security, aimed at protecting clients’ data from malicious possession including hacking; protection from cyber attacks; resolving data security issues; information technology risk assessment; debugging of information systems; data back up; and installation and provision of technical support for information security systems.

Process flows

On typical day, engineers at FireEye spend their day doing surveillance on client systems to detect any bugs, threats, potential attacks and hacks on client data. The aim is to move from ‘alert to fix’ in the shortest time possible through timely detection, analysis and threat elimination. Brewer (2015) notes that in the current in the face of rising cyber criminal activities, companies providing data security services should aim at reducing the time period between detection and response to reduce damage; an aspect that FireEye uses to maintain its current niche in the market. The figure below is an illustration of FireEye’s approach to managing IT security.

Once a threat has been detected, the team goes ahead to launch an investigation and eventually clear the threat to save the clients data. A flow chart showing how an information breach is addressed is shown by the diagram below:

The process begins by detection of an incident, followed by a notification to the owner.  The team then goes ahead to investigate whether to quarantine the hosts that have been compromised. In the event that the hosts are in the white list, the team requests the system owner to contain the incident using predesigned plans. The incident handler then goes on to recover the data once it has been identified not to be of high criticality. Data with high criticality and restricted data have to go through the critical incident response; a process that involves a series of investigations and corrective measures including confiscation of hardware, up to the point where data breach is confirmed. The critical incidence flow is illustrated as follows:

Besides solving data breach issues, employees at FireEye must ensure that the clients’ needs are addressed as far as information management is concerned. Activities at FireEye on a day to day basis can therefore be summarized as follows:

  1. Risk assessment and tactical planning to ensure protection of data
  2. Evaluation of system bug reports
  3. Incidence preparedness including initial set up of systems to support security of information such as virus detection systems, software licenses, content filtering systems and firewall among others
  4. Review of security exploit reports, system bug reports and security alerts in systems and mails
  5. Information security program management
  6. Management of projects meant to respond to unexpected breaches of information security.
  7. Provision of technical support and consultancy for clients on matters related to information security
  8. Email and data backup services

Responsibilities and Interfaces

FireEye’s activities are mostly executed by data handlers, who consist of engineers and IT specialists, under the authority of the chief technology officer. Data handlers can be considered the ‘ground men’, whose role is to capture all threat signals and re-direct them to the right channels to ensure they are resolved as soon as possible. The chief technology officer and chief information work together, to ensure continuous investment in research to promote the company’s ability to resolve data threats.

FireEye data handlers take attack notification as the input to begin investigating the process. The user and the system are at the same time prompted to manage process execution by checking the possibility of dealing with the attack using the installed security programs. The system at this juncture may invoke external applications and other predesigned programs with the possibility of blocking the attack. The data handlers and chief information officer continue to monitor the process to establish the need for further action if the attack is not automatically managed by the system. These interfaces are outlined in the diagram as below:

Equipment and logistics

Being a service company, FireEye interacts directly with customers and therefore employs over 2000 staff to ensure that the needs of clients are well addressed. The company does not advocate for outsourcing because the management believes in providing first hand service to clients and thus assure quality service delivery. This philosophy can be explained by Parliament of Australia (2015), who notes that the use of intermediaries in the service sector to a large extent distort the quality of service, hence the relevance of direct service.

Servers and computers remain the most equipment in managing IT security. Servers can be described as computers whose primary role is to provide a location for shared storage. A single server can connect several computers in a network, allowing authorized persons to access available information. FireEye’s high capacity servers ensure that data handlers, IT security manages and other IT security staff can access client files and thus easily detect and correct any attacks on data.

FireEye has invested in both cable and wireless internet to ensure that data is always accessible when needed and that attacks can be remotely accessed at any time. The company also ensures that the clients have reliable internet connection as this helps in sending signals to FireEye’s server whenever there is an information threat on their side (Castelluccio, 2015). In consideration of how important internet connection is, FireEye has a team of engineers whose role is to ensure that all servers and rooters are connected and that any mishap disconnection is addressed immediately before it can compromise client data.

Quality control

In a field that is highly competitive, quality assurance cannot be underestimated (Sherry, 2014). In this regard, FireEye seek to maintain the highest possible standards through investing in the most current technology. FireEye aims at providing clients with the best value for their money and thus constantly engages in research to identify new trends in information technology management. FireEye has invested in winning technologies to ensure that threats are detected and blocked in a matter of minutes. Engineers and IT specialists are trained to be vigilant and move in the same speed or even faster than attackers to ensure that they can manage any kind of new threat. This to a large extent reduces the need to physically deal with the malware or visit client offices, except during installation; thus saving time and increasing customer satisfaction. Borrett, Carter and Wespi (2013) notes that investing in innovative technology should be the main concern for IT security companies that seek to succeed and FireEye has been successful in achieving this. Sherry (2014) further maintains that organizations must now be vigilant in identifying new threat intelligence to promote detection of  cyber threats.

References

Borrett, M., Carter, R., & Wespi, A. (2013). How is cyber threat evolving and what do organisations need to consider? Journal of Business Continuity & Emergency Planning, 7(2), 163-171. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=d0818f10-b671-44bf-9e03-6e37c54a7683%40sessionmgr4002&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=94779805&db=bth

Brewer, R. (2015). Cyber threats: reducing the time to detection and response. Network Security, 2015(5), 5-8. doi:10.1016/S1353-4858(15)30037-4. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=668fa877-1bd4-479a-9453-7df590d4da7a%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bth&AN=102880763

Castelluccio, M. (2015). Emerging Cyber Threats. Strategic Finance, 97(4), 55-56. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=8eb5bc86-174b-4c03-b883-dc7e26044cd0%40sessionmgr4004&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=101901017&db=bth

Parliament of Australia. (2015). Outsourcing for and against. Retrieved on September 8, 2015 from http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/CIB/cib0001/01CIB18

Sherry, J. D. (2014). How Can Threat Intelligence Help the Battle Against Cyber Attacks. Financial Executive, 30(4), 93-94. Retrieved on Sept, 9, 2015 from http://eds.a.ebscohost.com/ehost/detail/detail?sid=e340779d-e268-40c7-965c-bf4b50e5366e%40sessionmgr4001&vid=0&hid=4202&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=99862939&db=bth

Wang, S., Liu, J., Shon, T., Vaidya, B., & Chen, Y. (2015). Security and privacy information technologies and applications for wireless pervasive computing environments. Information Sciences, 321147-149. doi:10.1016/j.ins.2015.07.037

We can write this or a similar paper for you! Simply fill the order form!