Saturday, February 29, 2020

No need for topic PowerPoint Presentation Example | Topics and Well Written Essays - 750 words

No need for topic - PowerPoint Presentation Example This paper discusses the business as well as marketing plans for Apple Inc. as the main points that will affect its presentation in the imminent. Business strategy. Hotelling, Steve, Joshua, and Brian, (p.12) says that an expert by the name Gil Amelio recognized why Apple was deteriorating stating lack of cash, quality hardware as well as software, focus as some reasons. Apple has reached leadership in its target market via the constant invention of new products. It came up with iPods and iTunes around 2003 thereby making them obtainable for Microsoft Windows systems. Research shows that by around 2011 in the worldwide market, iTunes accounted for 70% for the download of music. iPad, Mac, iPod are samples of good quality products Apple has produced than its contestants in the market attracting a lot of customers like the iPod that is easy to use due to its fast mover benefit. Again, its success has come through developing high quality ground breaking yields that are easy to use and t hat provide clear differentiation. Apple got its first advantage in the market due to the provision of online music through the use of iTunes as well as iPods. By the time other industries were coming into the market, Apple had relished benefits with a low degree of competition. The high level of growth has enabled the Apple company to be difficult to catch by other contestants therefore product growth and propagation plans has benefited the industry. This tells that the company will constantly lead the PC industry as long as the benefits stand. However, the accomplishments of sales benefits are not automatic. One fault in the proliferation plan may result to difficulty in strategy being realized. For the strategy product growth as well as a proliferation strategy to be successful, detailed info is needed from the producer regarding the new thing about the product. Most PC users and other groundbreaking yields do not know a lot of info about the company and the new thing about the p roduct. Apple should create ways to let people know as well as persuade customers from the entry of their groundbreaking yields in the market. Marketing Strategy According to Hotelling, Steve, Joshua, and Brian, (p. 13), Apple began a marketing movement around the iMac scheme known as No Beige with a view to distance its design from the other beige box of the time. Again, Apple has hired effective marketing plan where customer group may be forced by demographic, budgetary and others. At this moment of time, its products are made to target businessmen, students, doctors and many more. While Windows PCs came loaded with temporary software, Mac came with valuable and creative programs that consist of processor, spreadsheet amongst others. Hotelling, Steve, Joshua, and Brian, (p. 15). The position of the Apple is to aim brand loyalty as well as less price subtle customer like for instance, it has claimed on developing Unibody MacBook as well MacBook Pro. Marketing strategy is built arou nd different components. The first thing is to create a groundbreaking product to keep customers absorbed. Apple has driven a lot of clients in the worldwide market to choose its product because some have been developed for watching videos as well as producing products or mp3. Above all, the industry created numerous websites so that consumers can

Wednesday, February 12, 2020

Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words

Technology of Information Security - Essay Example As technological advancement keeps coming, several reliable cryptography methods are continuing to emerge. Data encryption has a number of advantages and disadvantages. Its disadvantages come mainly because the technology is sometimes not used as required. Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions. Information needs to be shared in order to make various decisions that govern various activities. For this reason, information should be as confidential as possible for sustainability and accuracy of its use. Data encryption techniques offer a solution for the protection of information against all third parties. The techniques are basically needed for information to be encrypted whereby one party shares its information with a recipient. On the other hand, enemies can hack into people’s accounts and plot violence against a country with knowledge of cryptography. Some governments want to restrict its use for fear of criminals and spies using the technology for their good and to the disadvantage of the nation. How Encryption Technique works Encryption is a process whereby messages are converted into a form that has been created that without decrypting or deciphering, they cannot be read. Encryption uses a systematic procedure or algorithm which converts messages or data to their original form. The cryptologists are engaged in competition that will never end in a bid to create better and stronger techniques that will be used by parties to protect their data. Although other methods of deciphering exist, the recent systems are more powerful to an extent that they are almost unbreakable even with the use of powerful computers. The new cryptosystems use mathematical formulae that are very complex and which effectively resist breakthroughs. The Use of PGB There are several popular encryption systems used in the world today. They include the data encryption standar d (DES), pretty good privacy (PGB), and the Rivest Shamir, Adleman (ARS) system. The DES system uses a single key and it has been developed in the USA. The RSA on the other hand uses two keys and was generally made just for the public use and named after the people who developed it (Frazier2004). Pretty Good Privacy (PGB) helps internet users to keep all their communications private. It is a two key system which enables a computer to send encrypted messages using a chosen private key that only the sender knows. All the computers that will receive the email message are given a copy of the private key which later establishes the message sender. When using the public key method, the one who sends the message and the receiver are both able to authenticate each other and also protect the message which is usually secret. Advantages of Encryption Techniques Encryption techniques make information unreadable to people who are not supposed to access the information. This is very important to many organizations because no third party can access information without being allowed to do so by the sender. The information cannot be accessed even through the administrator’s server leave alone other computers. This improves loyalty and secrecy in the organization or any governments in the world today. Data encryption is regarded as a national issue by governments because it majorly