Thursday, February 20, 2020

Baskin Robins Research Paper Example | Topics and Well Written Essays - 250 words

Baskin Robins - Research Paper Example Organizations within that industry can then access the information for a certain fee. Basin-Robins require syndicated data concerning organizations within its industry, especially those that serve the same or similar market. The information must be based on organizations that have changed their logo in the past. The effects the change had on customers’ purchasing patterns and overall sales and profitability can guide Basin-Robins on deciding whether changing the logo is a worthwhile venture or not. The secondary and syndicated data would serve to give insights on the viability of changing the logo for Baskin-Robins. Qualitative research provides information on changes that have been effected in organizations in a certain industry. The information obtained through qualitative research on competitors would inform Baskin-Robins on the expected reactions from customers upon changing its brand. Moreover, the impact of the reactions on profit margins and sales volume can be estimated using the qualitative research (Kolb, 2008). There are customers who have established an identity with the existing brand. These customers may be reluctant to accept the new brand. Changing the brand without considering its impact on such customers may be detrimental to the organization’s performance. On the other hand, the research can insightfully establish the need for brand change. The brand change may bring in more customers and persuade existing ones from seeking competitors’ products by taking care of their changed tastes and

Tuesday, February 4, 2020

Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words

Class student dicussions answers - Assignment Example Pavitor, you could have added a definition and elaborated a bit more of asymmetric cryptography in order to make it easier to differentiate the two concepts. I agree with you Jusin G that symmetric key distribution can pose to bring lots of insecure communication or message interception between the involved organizations. Asymmetric cryptography is also known as public key cryptography. It makes use of two keys, a private key to decrypt messages and a public key to encrypt messages. I agree with you Jusin G that the asymmetric cryptography can be adopted by two organizations which want to send sensitive messages more securely. This is because; the asymmetric cryptography avoids the drawback of exchanging the key by distribution of the public key in a non-secure mechanism while at the same time, the private key is not transmitted. Thanks Pavitor For the good analysis of the different technologies. But I rather disagree with you that WEP is secure. Let me say that WEP is an older technology in wireless networks. This makes it easily hacked and cannot guarantee security within one’s business premise. You gave the advantage that users shun the network ones it prompts for wireless security key, this is not always the case but depends on an individual’s motif. User may be determined to think of more other ways of getting into the network. I agree with you about interoperability, it is a great feature provided by the WEP. WPA and WPA2 form part of the recommended solutions to WEP security issues. I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of passing data across a wireless network than WEP. Also to note is that WPA2 was as a result of implementation of 802.11i. Good analysis of the encryption for wireless networks you Pavitor. I disagree with you Jusin G