Saturday, January 25, 2020

SWOT analysis of paint manufacturer Dulux

SWOT analysis of paint manufacturer Dulux ICI Dulux paints is the worlds largest manufacturer of paints and industrial coating.ICI Dulux trade paints is one of the leading paint manufacturers in Britain and has about 130 outlets in the UK. With the increase in demand for broken colour decorative paints effect, dulux trade paints have launched three new products i.e. Duette, sonata, and acrylic scumble glaze in order to meet the demand and customer preferences. These newly launched are targeted at trade customers in the UK. In this case study we will be discussing various stages of marketing. It consists of three crucial stages, SWOT analysis, Market Segmentation and Branding. TASK 1: The marketing audit is the process of taking stock of an organisations internal and external factors. The marketing audit is a fundamental part of the marketing process. The marketing audit is a major exercise which ranges over all the internal and external factors. There are number of tools which can be used such as PEST, Five Forces Analyses and SWOT Analysis. The first two focuses on external environment and SWOT Analysis is used for both internal and external environment. (Brassington and. Pettitt, 2006a) SWOT analysis is one of the best tools in marketing audit. It involves both internal and external environment. It is the overall evaluation of companys strengths, weaknesses, opportunities and threats. The strengths and weaknesses are internal factors and opportunities and threats are external factors. SWOT Analysis enable a business to focus into those areas that present the greatest opportunities and those competencies in which it is strongest. (Pinson, 2001) SITUATIONAL ANALYSIS: SWOT Analysis of Dulux Trade Paints: STRENGTHS: It is an internally controlled factor. It enhances the performance of the company. Some of the strengths are as follows: It has a strong brand name and positive reputation in the minds of customers so far them its a great strength of the company ICI Dulux Trade Paints has well established infrastructure. It has a wide range of distribution (merchants and retailers) It has 130 outlets in the UK, the largest of any trade supplier. It provides vide range of colours (52 two-tone colourways). All products are uniquely water-based. WEAKNESSES: It is also an internally controlled factor. It minimizes the performance of the company. Some of the weaknesses are as follows: The major weakness of Dulux Paints is that they dont have their own distribution channels. They have dealers which sell their products in different cities. The public awareness about Dulux paints is not high, mainly because of lack of advertisements and promotions. OPPORTUNITIES: It is an externally controlled factor. Some of the opportunities are as follows: One of the greatest opportunities for Dulux Paints is to increase awareness among the customers regarding high quality paints and newly launched products. Advertisements and promotions can play an important role in achieving it. THREATS: It is also externally controlled factor. Some of the threats are as follows: The biggest threat of Dulux Trade Paints is the increased number of competitors. They are other companies producing the same products; they have captured the market share. So it is a great threat for Dulux Trade Paints. (Kotler. and Keller 2009 ) TASK 2: MARKET SEGMENTATION Market segmentation is defined as the process of identifying different groups of users within a market who could possibly be targeted with separate products or marketing programmes. It can also be defined as dividing the market into groups of potential customers with similar needs and purchase behavior. The idea of dividing market into various segments and targeting each segment with a distinct product is the heart of marketing theory. (Croft 1994.) The main objective of market segmentation is to analyse market fully, finding opportunities and to improve companys competitor position and serve the needs of customers. Management must segment the market according to benefit sought. In this case we will apply business to business segmentation. In B2B segmentation we can focus on organisation as well as on individual buyers within it. B2B market segmentation can involve two stages: Macro segments: are those in which we have to identify subgroups within whole market and Micro segments: are those in which we have to select target segments based on specific buying characteristics. In this case we will define few market segments which are most important in this type of industry and upon which Dulux Trade Paints should consider and target. Size of organisation: The size of an organisation is important in any organisation. As far as Dulux Trade Paint is concerned it must fully focus on large organisation because they consume large percentage of goods as compared to small organisations. Dulux is a brand name, they always come up with innovative ideas and new products like Duette, Sonata and Acrylic Scumble glaze so it will be easier to target large organisations like real estate companies, big organisations, hotels, hospitals etc as large organisations need new products time to time in order to be in competition. Dulux has 52 two tone colour ways available which they can offer to company. Dulux paints need to come up with exciting new offers and promotions so as to attract large organisations like free samples, credit facilities, better quality, discounts etc Purchase Organisations: It can be defined as those organisations which purchase goods and services either for themselves or for other purposes. This is an important segment on which Dulux paints must work. These may include Contractors, Interior designers, Architectures. Contractors: A contractor is an individual or group of people that constructs or renovates a building, road etc. Dulux paints must target contractors for supply of paints required for construction purposes. It covers a large area of market. As these newly launched products are very popular so these products must be in demand for contractor also. Dulux must target contractors depending upon nature size and type of contractors. They should come up with new schemes, promotions, discounts and delivery of goods on time so as to ensure demand and supply. Interior Designers: They are professionals who decorate and organise the interior of any house, building etc. nowadays paints are important part of interiors, Dulux paints come up with decorative paints like Duette which is the latest trend in paint industry. So they must target interior designers to use their products in their projects which will increase the popularity of Duette, sonata and acrylic and helps in creating brand name. Trade Outlets: They are important in any organisation. Dulux trade paints have 130 retail outlets in the UK known as Dulux decorator centres, largest number of outlets of any trade supplier. These outlets should be managed properly. Newly launched products such as Duette, Sonata and Acrylic must be available in those outlets so that they will be easily available as there demand is increasing day by day. Their must be proper contact between company and outlets, moreover there must be proper balance between demand and supply. Customers should be provided with proper guidance regarding colour schemes and good product knowledge. If these outlets are properly targeted and maintained it will be the strength of company and also a great threat for competitors. Hence if all those segments are properly targeted and achieved then the company will reach ahead of its goals and will be a huge success. ( Brassington and. Pettitt,2006b) TASK 3: BRANDING AND POSITIONING Once target market segmentation is selected, we have to promote the organisational offerings to its target markets in a better way. This process is called branding and positioning strategy. The organisation must have an offering that differentiates it from the competitors. It should give a clear identity in the mind of the consumers. Branding: A brand is a name, symbol, design or term, or a combination of them used by manufacturers to identify its products from those of competitors. Today, a brand is the result of a synaptic process in the brain. A brand differentiates a product form those of competitors. It can simply be defined as customers perception about your business. (Bed bury and fenichell, 2002) Dulux is a market leader in the paint industry. The consumer is aware about the Dulux brand name It is much easier for Dulux to market its newly launched products like Duette, sonata and Acrylic. However there are some fundamental principles of branding are as follows: Flexibility: Dulux trade paints are flexible with the changing demands and supply. As the demand for broken colours rise they launched new products in the market. It helped the company in achieving good brand name. The customers are aware about the Dulux brand name Quality: The qualities of the products are fair enough as these products are manufactured by other manufacturers. This helps in maintaining good brand name and increase in sales. Product differentiation: The products differ in price, quality and design as compared to competitors. As Duette comes in 52 two-tone colour ways. These products offer all the benefits of traditional glaze. Consistent: Dulux maintain brand promise and brand standard. These products leave a good effect on consumers. The customer is aware about the quality standards. (Kumar and Mittal, 2002) Positioning: The act of designing the organisations image and offer so that it occupies a distinct place in the target customers. It is about the position a brand occupies in the minds of consumers. It starts with the choosing of a segment in which to compete. (Adock, Bradfield and Ross, 1995) Every product needs a positioning strategy so that it gives a clear position about a specific product in the minds of consumers. In this case there are some strategies which can be targeted. Positioning Against or Associating with another product: Dulux trade paints has to position itself as the ultimate solution for achieving the luxury look with great quality. Its main customers are contractors, large organisations, retailers etc. It has to differentiate itself from other paint companies in order to achieve good name and high volume of sales. Benefits/ Needs: Dulux paints have to provide better benefits to the purchaser so that he will stick to the companys products like huge profit margins discounts etc. Quality/Price: They have to provide better quality and low price as compared to their competitors in order to gain orders from large organisations. Product Features: They have to position it as, the presenting classics. They have to identify product features and differentiate it from other products. (Kotler and Scheff, 1997) Hence if position strategy is constructed on those bases then it will prove fruitful to the company. It will help in achieving good brand name and taking the company ahead of its competitors. REFRENCES: Adock, D. Bradfield, R. and Ross, C. (1995) Marketing Principles and Practice (2nd edn.), p 126-129. London, Pitman Publishing Bedbury, S. (2002) A New Brand World: 8 principles for Achieving Brand Leadership in the 21st century, p11-12. USA, Penguin Group. Croft, M.J. (1994) Market Segmentation. London, Solidus Limited. Kumar, N. and Mittal, R. (2002) Advertising Management. India, Anmol Publications Ltd. Kotler, P. and Scheff, J. (1997) Standing Room Only, p115-118. USA, Harvard Business School. Kotler, P and Keller, K.L. (2009) Marketing Management (13th edn.). USA, Pearson International. Pinson, L. (2001) Anatomy of a Business Plan (5th edn.). USA, Dearborn Trade. Pettit, S. and Brassington, F. (2006) Principles of Marketing (4th edn.). London, Prentice Hall.

Friday, January 17, 2020

Poetry Analysis Essay

What types of things come to mind when you think about success? When I think of someone being a success I think of someone who achieved some type of goal or obtained an honor of some type. The three poems I found talk about what success means to each of the individual writers of these three poems. Each writer has their own personal opinion on what success means to them. These poems are all about success, but you will notice how they are all very different from one another. The first poem is called Success in the Twenty-First Century by Sharon Esther Lampert. This poem talks about all of the things in life we should accomplish before we die and all the things we need to be successful in our goals in life. When I read this poem it reminds me of the things that I have always wanted to do but am yet to accomplish. It is like the author is telling me life is too short to wait, I have to act on my dreams and goals now. Be who you are and do the things that make you happy because one day it will be too late. Success is a very hard thing to come by with all the different obstacles life throws at us all. Make a meaningful contribution to yourself† (Sharon), stay true to who you are and know that you can make it. This is the feeling and emotion I got from Success in the Twenty- First Century by Sharon Ester Lampert. Next is a poem titled Successful Failure by Robert William Service. In the beginning Robert says †I wonder if successful men are always happy? † When I was reading this poem I thought just because you have everything does not necessarily make you happy. The most successful people may have great wealth and nice belongings, but Robert makes a point in saying success can also be a failure. In the simple thought that maybe not being successful in everything is also a good thing. â€Å"Let cottage comfort be my lot with well-worn britches† (William) success is not measured in wealth, this poem made me see that success is being comfortable with who you are and what you have, whether it be success in small goals or large goals. Success should come with happiness not fame and riches. â€Å"I think of all I’ll never own,-I’m laughing† in other words be happy with what you have, some people never get to have half of what you have and they are happy with that. Lastly there is a poem by Emily Dickinson called Success is Counted Sweetest. This poem uses a few different metaphors explaining that those who succeed never truly appreciate it. On the other hand, the one who fails or lacks something is the one who truly appreciate success. These are the type of people who truly appreciate success and how wonderful it would be if they had succeeded. The dilemma in this poem is that those who strive longer to reach a point of success are the ones who appreciate their victory more â€Å"who took the flag today can tell the definition so clear of victory† (Emily). Those who almost succeed but do not can look at their near success as sweet. Think of it due to being so close to success but yet never fully got to the finish line, it’s a sweet feeling to know you were close. Like saying to enjoy nectar and to truly understand all the wonderful aspects of nectar and be satisfied by it not just to scarf it down â€Å"To comprehend a nectar requires sorest need. † (Emily) So have you thought about what success means to you? Success comes in all sorts of different types of forms. There are big success like becoming the CEO of a large company and there small victories like winning first place in a spelling competition, which we also call being successful. Although these poems describe success from different aspects, they all show the emotion behind the moments of success and victory. Success is never a negative thing, but it can become negative if you lose focus on who you are and why you wanted this success to begin with. Be successful for no one else but yourself, after all that is how we accomplish success, on our own. Success in the Twenty-First Century by Sharon Esther Lampert Be Born.

Thursday, January 9, 2020

The Cybercrime Convention and the Criminalisation of Child Pornography Related Crimes - Free Essay Example

Sample details Pages: 8 Words: 2442 Downloads: 8 Date added: 2017/06/26 Category Law Essay Type Research paper Tags: Cyber Security Essay Did you like this example? INTRODUCTION: The use of computers as an instrument to commit crimes is in the increase in this modern age. It is very easy for one to possess and access child pornographic material, particularly through the use of the internet. The cybercrime convention amongst others places a responsibility on member states to make a concerted effort of an acting legislation to combat child pornography related crimes. Don’t waste time! Our writers will create an original "The Cybercrime Convention and the Criminalisation of Child Pornography Related Crimes" essay for you Create order It is important for one to understand what is meant by child pornography and what acts are criminalised or prohibited. It is also important to note that Section 28 of the Constitution of the Republic of South Africa Act, 108 of 1996 which is the supreme law of the Republic of South Africa guarantees the protection of childrenà ¢Ã¢â€š ¬Ã¢â€ž ¢s rights. The need for this protection was further echoed in the case of De Reuck v Director of Public Prosecutions, Witwatersrand Local Division and others where in the matter in was reiterated that an intrusion into perpetrator private domain is justified since child pornography and child abuse, happens in the privacy of their homes[1] RELEVANT LEGISLATION. In South Africa the legislation presently dealing with the prohibition of child pornography is the Films and Publications Amendment Act, 3 of 2009. This Act repeals some of the sections of the former Films and Publications Act, 65 of 1996, which also dealt with issues relating to c hild pornography. Child pornography is defined in Section 1 of the Films and Publications Act 65 of 1996 as: à ¢Ã¢â€š ¬Ã…“Includes any Image, real or simulated, however created, depicting a person who is or who is shown as being under the age of 18 years, engaged in sexual conduct or a display of genitals which amounts to sexual exploitation of participating in, or assisting another person to engage in sexual conduct which amounts to sexual exploitation or degradation of children.à ¢Ã¢â€š ¬Ã‚ [2] Before the enactment of the Films and Publications Amendment Act [3] the legislation dealing with the combating of child pornography was the Films and Publications Act of 1996. Section 27 (i) (a) states that any person who knowingly creates, produces, imports or possess a publication with visual representation of child pornography shall be guilty of an offence. Section 27 (i) (b) prohibited the creation, distribution, production, importation and /or the possession of a film with scenes of child pornography. Furthermore the distribution of a publication that contains visual presentation of amongst others child pornography was prohibited in terms of Section 28 of Act 65 of 1996. The Act defines publication so widely that it includes computer software that is not a film and includes and message or communication including visual presentations placed on any network including but not limited to the internet. OFFENCE CREATING PROVISIONS According to the Films and Publications Amendment Act à ¢Ã¢â€š ¬Ã…“any person who unlawfully possess ,creates ,produces or in any way contributes to, or assists in the creation or production of; imports or in any way takes steps to procure, obtain or access or in any way knowingly assist in, or facilities the importation, or procurement, obtaining or accessing of any film , game or publication which contains depictions, descriptions or scenes of child pornography or which advocates, advertises, encourages or promo tes child pornography or the sexual exploitation of children shall be guilty of an offenceà ¢Ã¢â€š ¬Ã‚ [4]. Section 24B(2)(a) criminalises the failure to report to the South African Police Services any knowledge or the suspicion of the commission of any of the offences referred to in sub section (i) LEGALITY AND CRIMINAL LIABILITY One of the key critical issues in taking a decision to prosecute is ensuring that the conduct of the perpetrator complies with the principle of legality and the definition of the crime whether under Common Law or based on a statutory provision[5]. Another aspect that is of critical importance in ensuring a successful prosecution is to establish that the conduct of the perpetrator conforms to the requirements of criminal liability namely; Actus reus Mens rea Unlawfulness Culpability All these requirements must be present at all times and if anyone of them is lacking the perpetrator cannot be held criminally accountable for his deeds. If the perpetrator unknowingly accessed a website containing child pornographic material and immediately closes it, it can easily be argued that he did not have mens rea, in other words that he did not have a guilty mind and that he therefore did not commit any crime. However if he knowingly accessed the said website with the full knowledge that his conduct is wrongful/unlawful and reconciles himself with such insight, it can be argued that he acted with the necessary mens rea and a guilty mind. In other words there has to be no grounds of justification available at the disposal of the perpetrator of the crime. It is clear that even in international jurisdictions perpetrators of child pornographic crimes will always raise fancy defences such as lack of possession, unwittingly accessing a child pornography website, accidental vi ewing etc. In the light of what has been postulated above it is clear that the ability to prosecute successfully will always be influenced amongst others by the way the investigation was conducted Critical to any cybercrime investigation is preserving the integrity of the evidence, it is important to decide and know the following: What to look for( identify the evidence you are looking for); Where to look for the evidence; How to look for the evidence; How to handle the evidence ( for authenticity, credibility, admissibility and evidential value/ weight) By whom was the evidence gathered. It is equally important to ensure that the evidence gathering process is done in a credible way taking into account the due process of the law. Bearing in mind that electronic evidence is very fragile and volatile in nature, every effort must be made to ensure that whatever technique or method is used to obtain or analyse such evidence does not modify, manipulate, alter and/or damage such evidence. Original evidence must preserved in the same condition in which it was found EVIDENCE GATHERING PROCESS A.THE SEARCH Section 20 of the Criminal Procedure Act[6] states the goods or articles which may be seized by the police namely: Articles concerned in the commission of an offence; Articles which may afford evidence of the commission of an offence; Articles intended to be used in the commission of an offence. The Criminal Procedure Act empowers the police to search and seize under the authority of a warrant provided all the requirements have been complied with[7]. Section 22 of the Criminal Procedure Act serves as an exception to the effect where possible the search a seizure should be carried out on the strength of a search warrant, in terms of this section the police may search and seize without a valid warrant under the following circumstances: By obtaining a valid consent; When the police believes on reasonable grounds that if he were to apply for a search warrant it will be issued to him ; When time is of the essence, this will be when circumstances are such that any delay in obtaining the warrant is going to defeat the object of the search ( the destruction of the evidence) CYBER INSPECTORS Section 83 of the Electronic Communications and Transactions Act[8] makes provision for a search by cyber inspectors who are appointed by the Director General of the Department of Communications in terms of Section 80 of the said Act. Section 82 (i) of the Electronic Communications and Transactions Act gives cyber inspectors wider powers of search and seizure in the performance of their duties. Critical to these powers is the authority to enter nay premises or access any information system that has a bearing on the investigation. Another interesting aspect of the Electronic Communications and Transactions Act is that it makes provision for the SAPS and or any statutory body with the authority to search and seize conferred on them by any other law to enlist the help of cyber inspectors to assist in an investigation. THE DYNAMICS OF POSSIBLE DEFENCES In order to effectively address the issues pertaining to possible defences involving the use of a compu ter that are likely to be raised in cases of child pornography particularly issues in relation to lack of possession, unwittingly accessing child pornography websites and accidental viewing, it is critical during the investigation process for one to know once again what to look for, where to look for it, how and why we are looking for it (the consideration of specific issues). It is also important to have regard to international law and precedents, which more often than not prove to have invaluable guidance when dealing with defences of this nature Key to the examination of the computer will be firstly to take photos or video footage of the scene and proceed with the process of the search seizure of the computer and any electronic devices, including floppy disks, cdà ¢Ã¢â€š ¬Ã¢â€ž ¢s, memory stick, digital cameras, zip disks and hard drives. Look also for any photographs and or any magazines in the surrounding area. The collection of the volatile data to its completion will be t he next step followed by a decision whether to unplug the computer from the network of shut down the device. It will also be equally important to make copies of the hard disk, which will be used for analysis purposes whilst preserving the original information on the main computer or hard drive in its original form. In order to rebut some of these possible defences as indicated earlier it will important during the investigation or the analysis process to look at the following: How long does Mr Perver stay on the website; Check for evidence of any delete files; Check for evidence for files moved to the recycle bin; Check for evidence of temporary files downloaded from the internet; Check for additional evidence in the history folders; Investigate the likelihood of Mr Perver having an account on the internet, Investigate Mr Perverà ¢Ã¢â€š ¬Ã¢â€ž ¢s knowledge of the computer, Check whether any child pornographic material was retrieved form the cache, Check for hidden files that have been renamed, Check whether he has ever reported his discovery of child pornography to the police, Check his banking details for payment of his subscription to news groups to access child pornographic websites, Check emails sent and received relating to child pornography, Investigate the number of times the websites were visited, Investigate whether any thumbnail images have been manipulated or enlarged, Check for any evidence for any deletion and how often it is taking place, Investigate whether Mr Perver has a specific password, that allows him access to child pornographic websites , and Look for evidence of any attempt to delete cache. CONCLUSION In the light of what has been postulated above it is clear that Mr Perver accessed six child pornographic websites on 25/01/2015. Section 24 B (1) prohibits any act of possession and or access to child pornography. Mr Perver will therefore have to be charged with six counts of the contravention of Section 24 B (1)(a) for the possession of child pornographic material. In addition to that he can also be charged with six counts of the contravention of Section 24 (1)(c) in that he accessed six pornographic websites on the day in question. It is also respectfully submitted that based on his knowledge of the prohibited acts being carried out in that having accessed the six pornographic websites he became aware that prohibited acts of child pornography are taking place, but failed to report that to the police that he may also be charges with six counts of the contravention of Section 24 B (2)(a). It is respectfully submitted that it is highly unlikely that Mr Perver will unwittingly access six child pornography websites on the same day. The probabilities are that he knowingly and intentionally access these websites. ADMISSIBILITY The issue regarding the admissibility of evidence is a world- wide phenomenon. In the South African context, it is the State that bears the onus of proving the Accusedà ¢Ã¢â€š ¬Ã¢â€ž ¢s guilt beyond a reasonable doubt. This entails presenting all relevant evidential material before the court. Critical to this exercise is the admissibility and evidential weight of the evidence that is being presented before court. Admissibility simply refers to the acceptance of the evidence. It is important when presenting evidence for one to made a determination as to the type of evidence one is dealing with, the reason why such evidence is being presented and how to present it. This determination will always have an effect on the admissibility requirement of such evidence. Evidential material may consist of oral evid ence, written, documentary and/or real evidence. The admissibility and evidential weight of electronic evidence is regulated by: i)Common Law; ii)Electronic Communications and Transactions Ac, 25 of 2002; iii)Criminal Procedure Act, 51 of 1977; iv)Law of Evidence Amendment Act, 45 of 1988. It is important as initially mentioned to decide when presenting electronic evidence whether it is being presented as real evidence or as documentary evidence, since the admissibility requirements of such evidence is not the same. DOCUMENT Both the common law as well as various other pieces of legislation including the Criminal Procedure Act provide us with a definition of what is a document. What is important to note is that amongst others they define a document in such a way that is has either an ordinary meaning or an extended meaning. (sections 1 and 221(4),(5) of CPA, section 33 of the Civil Proceedings Evidence Act, 25 of 1965. PLUS Case Law) DOCUMENT CLASSIFICATIO N A distinction has to be made between various types of documents since the requirements for admissibility varies depending on the type of a document. Documents may be classified as follows: i)Public documents; ii)Official documents (either public or private) and iii)Private documents. The general rule pertaining to documents is that one has to prove originality, authenticity and the truth of the contents but there are however exceptions to this rule in certain circumstances. There are however exceptions to the requirement of originality in certain circumstances under either the common law or some statutory provisions. When presenting a public document it is not necessary to prove the requirements mentioned above. Section 234 of the Criminal Procedure Act, regulates how an official document is to be presented in court. It needs to be mentioned at this stage that if it is a private official document, one still has to prove the truth of the contents. [1] 2003 (2) SACR 445 (CC) [2] Section 1 of the Films and Publications Act 65 of 1996 [3] Act 3 of 2009 [4] Section 24 B (i)(a)(c) [5] Snyman [6] Criminal Procedure Act 51 of 1977 [7] Section 21 ( see also the following case law THINT (PTY) LTD v NATIONAL DIRECTOR OF PUBLIC PERSECUTIONS AND OTHERS; ZUMA AND ANOTHER v NATIONAL DIRECTOR OF PUBLIC PROSECUTIONS AND OTHERS 2008 (2) SACR 421 (CC); MINISTER OF SAFETY AND SECURITY v VAN DER MERWE AND OTHERS 2011 (2) SACR 301 (CC) [8] Act 25 of 2002

Wednesday, January 1, 2020

Computer System Upgrading - 566 Words

Issue: Due to the rapid technological advances in computer systems as well as operating systems in the business world, we must upgrade our computer systems throughout our company in order to gain an edge on our competitors. We need to replace the central processing units in every division of our company with newer units that are in line with the most sophisticated computer systems also being used by every one of our competitors. Background: The computers currently in question have been in use for approximately 12 months as of November 2011. The computers we currently use are of lower quality and were most likely purchased at a bargain price. The result of this approach has been a computing system that is quite unreliable. Since the beginning of the summer of 2012, employees have reported a number of technological setbacks including: †¢ Malfunctioning audio cards †¢ Inadequate Memory †¢ Failed ventilation. †¢ Malfunctioning power supplies. Audio card malfunction continues to be an on-going problem with the current computer systems in our company and in many situations our computers are rendered completely useless when the job requires sound. Failed ventilation also continues to be a huge problem with many, if not all, of the computers used throughout our company. When computer fans malfunction, it can cause the computer to overheat and permanently damage it and all of the information in it, which raises a drastic level of concern due to the fact that we store all of ourShow MoreRelatedThe System Administrator Essay1476 Words   |  6 PagesThe System Administrator The System Administrator (SA) is responsible for the effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure. Typically assigned to team, the system administrator is a qualified subjectRead MoreThe Basic Parts That Make Up A Computer1337 Words   |  6 Pageslooking to upgrade or purchase a new set of computers, I would like to discuss the basic parts that make up a computer. It is important for everyone to have a basic understanding of what makes a computer. As technology advances, it’s important that you be able to make an educated decision on whether to upgrade or to replace your current systems. The difference can be a good deal of your hard earned money. Therefore, I will be detailing the Operating System, Processor, Memory, RAM, and a few other thingsRead MoreUpgrading Data Communication At The Classroom1662 Words   |  7 PagesUpgrading data communication in the classroom would be an appropriate technological advantage because research indicates that broadband and cloud computing are transforming education. The outdated teaching tools that we grew up with (i.e. chalkboards and hardback books) are now being replaced with interactive digital content delivered through high-speed broadband using blackboard and e-books. This means elementary school students can explore the surface of the sun through high-definition video asRead Moremanagement tasks that might help the organization to prepare to administer the network operating system:776 Words   |  4 Pagesorganization to prepare to administer the network operating system: Network and computer systems administrators are responsible for the day-to-day operation of an organization’s computer networks. They organize, install, and support an organization’s computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. Being a System or Network Administrator of a large computer network can be a difficult, and time consuming taskRead MoreBenefits And Limitations Of A New Information System And Upgrading The Hospital s Network1416 Words   |  6 Pagestechnology is outdated and doesn t meet current healthcare standards. The hospital s network bandwidth is capped because of the antiquated equipment and problematic wiring. Advantages and disadvantages of the current network are that the current system will work with outdated technology. A disadvantage is if the hospital is unable to acquire newer technologies which can have an effect on effectiveness and effic iencies when the hardware and capabilities are not able to keep up. Security is alwaysRead MoreA Report On Computer System842 Words   |  4 Pageshighlighting improvements that need to be made on Mr John Opolot’s computer system and I will be explaining why these improvements are needed. These improvements following suggested improvements will be later implemented onto the computer system as this will aid him to combat the disabilities as well as increasing the speed of his system to make it more efficient and reliable as well as the performance being smooth whilst the system is operating. Software Improvements Software can be replaced withRead MoreUpgrading Computer Equipment in a Management Setting1058 Words   |  4 PagesUpgrading Computer Equipment in a Management Setting Name Institution Professor Course Date Introduction Background Technology is an evitable change that cannot be averted. It is changing every bit of the worlds development and hence it should be adopted by every person irrespective of place and role in universal development. Organizations are obliged to upgrade their equipment to fit into efficient and high quality production of their operations. Most upgrades are done to IT equipmentRead MoreComputer Systems : Setting Up The System1360 Words   |  6 PagesUnit 3 Computer Systems Assignment 3 Setting up the System Lucy Valentine-Ketchum 12/11/2014â€Æ' Table of Contents Table of Contents 2 Introduction 3 Findings 4 References 5 Bibliography 6 Findings Task 1, Task 2, Task 3, Task 7 [P5] [P6] [P8] Font Size Windows menu Control Panel Appearance and Personalization Display Custom DPI Setting Set font size percentage Install and run the CCleaner software or similar The internet was restricted on the machine so we put the CCleanerRead MoreThe New Windows 8 Operating System876 Words   |  4 PagesHACKM, LLC will be improving the overall customer experience in the very near future by upgrading all of its computer systems to the latest technology. This upgrade will provide the employees a simple, easy, fast, and complete upgrade to the new Windows 8 operating system. Utilizing both desktops and tablets will require a clear and concise migration plan for 500 employees. This desktop migration proposal outlines all requirements along with the process and procedures that will take place. FollowingRead MoreEssay on Capturing and Deploying an Image1608 Words   |  7 Pagesoperating system over a network to one or many computers by creating an image. There are multiple ways to install an operating system on a computer. The way that is chosen depends on the installer’s situation. One scenario would be if the installer is only dealing with a s ingle computer that needs an operating system installed. The other scenario is if there are many computers that need operating systems installed at one time. An operating system is a set of programs that manage computer hardware