Free Essay

Art of Whitepaper

In:

Submitted By tub1ask1
Words 2701
Pages 11
The Art of the White Paper
July 2003

Executive Summary...................................................................1 What is a White Paper? .............................................................2 White Papers Come in Many Flavors..........................................3 Why Write a White Paper? ........................................................3 Industry Standards for White Papers ........................................4 Who Reads White Papers?.........................................................5 Who Writes White Papers? ........................................................6 Success Factors for White Papers..............................................7 A Gordon & Gordon Success Story.............................................8 Copies of this white paper can be obtained from www.gordonandgordon.com/downloads.html © 2001-2003 by Manuel Gordon and Gordon Graham

Executive Summary
High-tech companies produce a lot of white papers, and many IT managers use them—even if no one can clearly explain what they are. This paper begins by describing the various kinds of white papers, and the various purposes for which they are needed. Although no industry standards exist for white papers, we can make some generalizations. Most white papers are around 10 letter-sized pages with black & white illustrations. They are written with an authoritative, neutral tone. Most are distributed through the Web as PDFs. They can take from 4 to 10 weeks and cost from US$5,000 to US$30,000 to prepare. Marketing departments often turn to writers with a technical writing background to write white papers, because good technical writers are skilled at Understanding, Simplifying, and Explaining complex information of the sort that must go into a white paper. This paper concludes by describing the factors that help ensure success a white paper project. Among these are an in-house sponsor, an immovable deadline, a thorough understanding by the writer(s), ready access to subject matter experts, joint ownership of the project by all participants, and a shared sense of urgency by all involved.

Figure 1: Recent Google Search for “white papers”

The Art of the White Paper

Gordon & Gordon

page 1 of 10

What is a White Paper?
As shown in Figure 1, a recent Web search for the phrase “white papers” generated 2.85 million hits! There are clearly a lot of documents labeled white papers, and most of them are about high technology. But what exactly is a white paper? simple answer.
1

Good question. And there is no

Several dictionaries offer these definitions:
“A communication tool used to explain something about your complex product or service to a particular audience.” 2 Not bad. “A paper written by a lead product designer to explain the philosophy and operation of a product in a marketplace or technology context.” 3 This seems far too specific. “A short treatise whose purpose is to educate industry customers.” That’s OK.
4

And recent comments from two high-tech marketing executives reveal some prevailing attitudes:
“A white paper is that rare tool that can serve many purposes.” “A white paper should be all things to all people.”

At Gordon & Gordon, we think of a white paper as:
A pre-sales document aimed at potential customers who have not yet made up their minds to buy a certain product or back a certain technology. A piece of marketing collateral whose form and content lies somewhere between a glossy brochure and a technical manual.

With our working definition in mind, let’s look at the wide range of documents that are called white papers.

The Art of the White Paper

Gordon & Gordon

page 2 of 10

White Papers Come in Many Flavors
Table 1 describes some of the most common types of white papers:
5

Type
Technology Guide

Purpose Explains the product’s underlying technology, why this technology is valuable to potential customers, and how this technology is different from and better than similar technologies. May not even mention the product by name. Explains and advocates a standard, trend, or technology. Explains why this standard is important to the potential customer. May not even mention the product by name. Explains why potential customers need or want the product. Positions the product and differentiates it from competitors. Provides a thorough explanation of the product’s features and functionality.

Position Paper

Business Benefits Competitive Review Evaluator’s Guide

Table 1: Common Types of White Papers

Why Write a White Paper?
There are many reasons
6

why a company may issue a white paper:

To educate potential customers. To educate the sales force (who may not fully understand the product and its benefits). To educate the media by providing a background document for a press release or press conference. The media in turn will inform potential investors, potential customers, and the public. To be offered as free content to trade magazines or business publications. In this case, the white paper is usually signed by a senior executive. To be offered as a “fulfillment piece” in advertisements, direct mailings, and the Web (“Register here to receive a free white paper on...”). This helps gather leads for the sales force. To redefine the market or the “playing field.” To help give the company an aura of credibility and authority in its market.

The Art of the White Paper

Gordon & Gordon

page 3 of 10

Industry Standards for White Papers
One of the biggest challenges in this area is the fact that there are no industry standards for white papers. But we can make a few generalizations about the typical format and content of white papers today, as listed in Table 2.

Length

White papers can be from 4 to 24 (or more) pages long. They are most often around 10 pages. Most white papers take a neutral, authoritative tone. Some contain a marketing “spin” to boost a certain product or technology. It’s been said that “a white paper is like quality popular science writing, balancing accessibility and accuracy while telling a good story.” 7 Most white papers have illustrations to supplement the text. The illustrations are usually better than you would see in a technical manual or specification, but not as good as in a magazine advertisement. White papers can be produced in full color, but they are more often in black and white. Many white papers make careful use of color, so that they are attractive on the screen, but are still quite readable when laser-printed in black and white. Nearly all are produced as letter-sized pages. Most are desktop-published to use attractive fonts and columns. Most white papers are downloadable from the Web as PDFs. HTML is less often used, because it gives less control over layout. White papers are also given out as printed documents to potential customers, and at trade shows, industry events, and in press kits. One company says that a white paper takes an estimated 4 to 10 weeks to prepare. 8 In our experience, a white paper usually takes as long as the client has before running into their realworld deadline. Companies pay anywhere from US$5,000 to US$30,000+ to commission a white paper from an outside firm. 9

Tone

Illustrations

Production

Distribution

Time to prepare

Cost to prepare

Table 2: Typical White Paper Form and Content

The Art of the White Paper

Gordon & Gordon

page 4 of 10

Who Reads White Papers?
White papers are usually aimed at senior IT managers. White papers with a less technical focus are often aimed at CFOs, operations managers and other non-IT managers. Sometimes these people will make the decision to buy or not to buy the product in question. Sometimes they are “technical recommenders” who advise the decision-makers elsewhere in the company. What is very clear is that managers actually read white papers. In fact, according to a recent survey of 2,500+ IT managers: 10
More than 3 out of 4 say they use white papers to get preliminary information about products and vendors 60% say they look at 1 white paper a month, while 75% look at 1 every 2 months. 93% pass along white papers to others in their organization, including 2 out of 3 who pass them to their higher-ups.

To sum up, IT people read white papers when they’re interested in a new technology or need to select a technology for their organizations. As the survey confirmed, people look at white papers at the start of their search for a complex product. As shown in Figure 2, in terms of what Gordon & Gordon call the universal tasks for complex products, white papers are used for the first two tasks: Research and Selection. In other words, a potential customer uses a white paper to find out what is available in the marketplace, and to select one of the available products or technologies for his organization.

The Universal Tasks
Research Selection Installation Configuration Learning / Training Using Troubleshooting
Figure 2: Universal Tasks for Complex Products

These two tasks often involve white papers. These five tasks do not often involve white papers.

The Art of the White Paper

Gordon & Gordon

page 5 of 10

Who Writes White Papers?
Most white papers are prepared on the request of a marketing department. While a strong advertising campaign can be prepared without fully understanding a complex product, marketing managers realize they cannot pass off emotion-laden “fluff” as a white paper. Marketing writers and advertising copywriters can create the sizzle. But they need help delivering the steak. The project leader from R&D may understand the product better than anyone else, but may not have the necessary writing skills or marketing savvy. Companies often turn to marketing writers with a technical writing background, because a white paper demands technical understanding and clear expression. Good technical writers can USE information: that is, they can Understand, Simplify, and Explain complicated information to diverse audiences. 11 The technical writers may be in-house or from an outside firm. They may work alone or together with a product manager or an in-house marketing writer. And a good illustrator is almost always a necessary part of the team. Again, this can be an in-house person or someone from the outside.

The Art of the White Paper

Gordon & Gordon

page 6 of 10

Success Factors for White Papers
A white paper project is much more likely to succeed when it meets the success factors listed in Table 3.

In-house sponsor

The project has a strong in-house sponsor or co-author who can help the writer navigate through company politics and personalities. The project has a desperately short timeframe with an immovable deadline, such as a trade show. “When a man knows he is to be hanged in a fortnight, it concentrates his mind wonderfully.” 12 The writer begins with a thorough understanding of the product, the technology, the company, or all of the above. The writer has ready access to Subject Matter Experts, reviewers, and approvers. This can be a special problem for outside consultants, who must rely on the in-house sponsor to champion the project. The writer(s), illustrator, development lead, marketing manager, product manager, and all other participants all assume joint ownership of the project. They work together as a team, discuss differences openly, and settle disagreements quickly. 13 There is a shared sense of urgency among all the participants. Everyone must think the project is sufficiently urgent to make time for it in their crowded schedules. Table 3: Success Factors for White Papers

Time box

Through understanding

Ready access to Subject Matter Experts

Joint ownership

Sense of urgency

The Art of the White Paper

Gordon & Gordon

page 7 of 10

A Gordon & Gordon Success Story
Gordon & Gordon recently worked on a white paper for a Montreal software firm called Connectware. Since all the success factors were in place, this project turned out very well. Let’s review how this project went, and why it succeeded so well. At the time, Gordon Graham was working as the full-time VP, Marketing for the firm. He served as the in-house sponsor and editor of the white paper, and helped push it through every stage of production. There was a real-world deadline looming: a trade show featuring the company’s most important product, an add-on to Oracle Applications. Originally GG thought he could write the white paper in-house with the VP of Sales, but as time slipped by everyone realized this was impossible. With only two weeks until company executives had to leave for the trade show, the white paper was urgently needed. It was needed to explain the fundamental architecture of the company’s product to several audiences: to the company’s own sales force, to prospects at the trade show booth, and to their partners at Oracle in Silicon Valley. GG was able to get a PO and a contract signed on short notice, and hire Manny Gordon to research and write the white paper. Manny brought a deep grounding in databases and client/server technology that enabled him to quickly develop a thorough understanding of the product architecture. In fact, he was able to debate and refine some of the nomenclature that company developers were using to describe their product, and bring it in line with industry norms. So Manny displayed a fine ability to Understand, Simplify and Explain the product. One of the most successful aspects of this project was the high degree of teamwork displayed. The team held a number of meetings with the VPs of R&D, Sales, and Marketing plus the team leader for the product all squeezed into the same little room. Through an animated exchange of views, a consensus emerged on how to diagram and describe the basic architecture and the key selling points of the product. The company premises were accessible, with no passes or locks on any of the interior doors, so Manny could range freely through the offices. With ready access to Subject Matter Experts, he was able to engage everyone in the project for spontaneous quick discussions. There was a good sense of people working together on a project and joint ownership of the emerging results. The two-week deadline underscored the sense of urgency and kept the reviews flowing. The white paper team was able to generate new iterations of the white paper with more and more details filled in on each version.

The Art of the White Paper

Gordon & Gordon

page 8 of 10

At the same time, a skilled illustrator, Steve Matthews, was working on the graphics and submitting them rapidly. GG assembled the text and graphics into pages and gave it all a final polish. The results were very positive. The white paper was completed and unveiled at the trade show. The sales force began to put it into the hands of their prospects. They found that the number of repetitive questions they were asked fell off sharply, since most of the answers were contained in the white paper. The same white paper was used without changes for two years.

The Art of the White Paper

Gordon & Gordon

page 9 of 10

Footnotes
Many thanks to Adair Byrd for suggesting many of our sources.
1 The term “white paper” apparently arose in the early 20th century in England. It was used to distinguish shorter government position papers bound in white covers from longer, more detailed reports bound in blue covers called “blue books.” We have located a British government white paper dating from 1922. 2 page 3, The White Paper White Paper from www.trihouse.com 3 from www.whatis.com 4 from the Free Online Dictionary of Computing, referenced by www.dictionary.com 5 Adapted from a similar table in The White Paper White Paper. 6 Adapted from How to Publish: A guide to contributing articles to high technology publications by Randall D. Cronk available from www.tradespeak.com/resources.asp 7 from White Papers at www.batnet.com/forword/ 8 page 8, The White Paper White Paper 9 Ibid. 10 page 4, Executive Survey of IT Professionals, September 2000 from www.bitpipe.com 11 See Manuel Gordon’s article Technical Writers Must USE Information at. www.gordonandgordon.com/USE.html. Versions of this article have appeared in several publications of the Society for Technical Communication, including Intercom. 12 Samuel Johnson, quoted in James Boswell’s Life of Johnson. 13 Gordon & Gordon call this process Joint Documentation Development. See Good-Enough Documentation at www.gordonandgordon.com/good_enough_workshop_details.html

The Art of the White Paper

Gordon & Gordon

page 10 of 10

Similar Documents

Premium Essay

Consumer Behavior

...The Branded Customer Experience … touching lifestyles, desires, and emotions. Whitepaper #5 In this marketing-centric economy of instant e-mail offers, hyped CRM, and endless competing media images [aka: noise, noise, noise] … some, very-select brands actually break through the clutter and create genuine interest, excitement, and loyalty in the marketplace. Beyond simply selling a product … a location … or a service, these “experiential brands” excel at merchandising and selling a relationship. They “connect” with their customers. They engender emotional loyalty. They go beyond transactions and establish true differentiation and value in the customer’s mind. Power brands like Southwest Airlines, MTV, Starbucks, Harley-Davidson, ESPN, Victoria’s Secret, IKEA, Nickelodeon, Disney, Martha Stewart, and Target … and up & comers such as JetBlue, REI, Sephora, and American Girl … deliver visionary and well-conceived “experiences.” They’ve reinvented otherwise intangible, commodity products and services. They’ve got personality. They know how to image, package, and merchandise themselves as experiences. They’ve succeeded in building real trust and connectivity. And, on some level … each is a celebration. As such, intangible brands suffer from a higher perception of “personal risk” in both the purchase decision and bonding processes. As seen in the recent tanking of air travel – United and Delta’s soft under-belly contrasts greatly with Southwest and JetBlue’s structural momentum...

Words: 2845 - Pages: 12

Free Essay

Marico

...5 KEY SEGMENTATION DIMENSIONS                   WRITTEN BY:   ART WEINSTEIN PHD                                                                                                          PROFESSOR OF MARKETING                                                                                                   NOVA SOUTHEASTERN UNIVERSITY                                                                                      ART@HUIZENGA.NOVA.EDU                                                                                                  954‐262‐5097   FRANK JAMIESON MBA                                                                                                       PRESIDENT                                                                                                                  APPLIED DM RESEARCH INC                                                                                                   FRANK@APPLIEDDMRESEARCH.COM                                                                                           415 884 9902        B2B SEGMENTATION STRATEGY DEVELOPMENT   VITAL INGREDIENTS + CREATIVE COOKING     Effective b2b segmentation is like gourmet cooking – you need a nice variety of ingredients to create          a delicious balance of flavors and a certain unexplainable artistic skill to combine the ingredients into            a crowd pleasing experience.   The primary purpose of this whitepaper is to introduce a list of b2b segmentation ingredients that                ...

Words: 2097 - Pages: 9

Premium Essay

Operating Systems Dependency on Penetration Testing

...Process………………………………....………...…….………….6 References…………………………………………………………………………………………7 Abstract This report will encompass penetration testing of operating systems. It first explains the evolution of penetration testing, and what purpose it serves. It then describes techniques and tools used to perform the tests. The report will conclude with an example of a penetration test. Operating Systems Dependency on Penetration Testing History and Purpose of Penetration Testing According to Pfleeger & Pfleeger 2011 in their book titled ‘Security in Computing’, penetration testing, or pentesting, is a technique used in computer security which an individual, or team of experts purposely tries to hack a computer system. Penetration started as a grey art that was often practiced in an unstructured and undisciplined manner by reformed or semi-reformed hackers. They used their own techniques and either their ‘home grown’ tools, or borrowed and traded ideas with associates. There was little reproducibility or consistency of results or reporting, and as a result the services were hard to integrate into a security program. As this practice evolved it became more structured and tools, techniques, and reporting became more standardized. This evolution was driven by papers, articles, and technical notes that were formally published and informally distributed. In the end a standardized methodology emerged that was largely based on the disciplined approach used by the most successful hackers....

Words: 1151 - Pages: 5

Premium Essay

Mgt5000

...RAWSON HOMES PTY LTD. REPORT ON ICT ENVIRONMENT & ADOPTION OF CLOUD COMPUTING PRESENTED TO PETER RAWSON GENERAL MANAGER/CEO RAWSON HOMES PTY LTD. 29 September 2011 September 21, 2011 Peter Rawson  Rawson Homes Pty Ltd Unit 34/11-21 Underwood Rd HOMEBUSH, NSW PH: 02 9764 6442 Dear Mr. Rawson: We are submitting to you the report, due 3rd October, that you requested. The report is entitled REPORT ON ICT ENVIRONMENT & ADOPTION OF CLOUD COMPUTING. The purpose of the report is to inform you of our analysis of your current IT infrastructure as well as the costs and benefits of a cloud computing adoption strategy. The content of this report concentrates on the structural and acoustical aspects of the CSU Performing Arts Center. This report also discusses cable-stayed technology. Sincerely, Kai Minors 1. Executive Summary 2. Part 1: Introduction i. The Organization ii. Corporate structure iii. The major business processes iv. Statement of the problem 3. Current IT Infrastructure and Challenges     i. Ecosystem ii. Current usage and efficiencies 4.  Cloud Computing: Costs and Benefits. i. Overview of Cloud Computing ii. Goals and success factors of an agile IT infrastructure. iii. Benefits/Costs of Cloud Computing iv. Private vs. Hybrid vs. Public Cloud 5. Cloud Adoption Strategy 6. Recommendations 7. Conclusion 8. References 9. Appendix 1. EXECUTIVE SUMMARY ...

Words: 3696 - Pages: 15

Premium Essay

Vulnerability Assessment

...A. Memo of Case Social engineering is a method of gaining access to information by deception performed against human capital. System penetrators and ‘crackers’ know that people, and their desire to be helpful, or their ability to emote, are the weakest links in any program designed to protect information systems. Attackers can trick or persuade their way into systems in any number of ways via remote and physical means, and convince users to reveal information of interest that can cause harm to an organization. A typical social engineering attack can be segmented into physical and psychological stages. The physical segment of the social engineering operation could include phone calls, or returned phone calls from employees back to the attacker (an example of reverse social engineering) that volunteer information, ‘dumpster diving’ for company specific information that can be used to simulate a rapport or relationship with the company if questioned by an employee or security, emails with surreptitious links requesting unique information such as PIN’s or user names, or physical proximity and entry by impersonating an authorized person. The psychological stage of a social engineering attack takes place after the physical foot printing of the organization by using the bona fides that were learned while gathering physical intelligence to manufacture relationships with persons or the company, or by asserting false authority by impersonating persons or departments within the company...

Words: 1868 - Pages: 8

Premium Essay

Week 7 Project Paper

...American Military University All about Network Security: Network Security Means Never Giving an Adversary a Chance. Anthony Portz 4199864 ISSC340 I001 SPR 14 Professor Alidad Jalinous June 16th, 2014 11:55 PM Introduction In this paper I will discuss network security and I will give a detailed description of the area while discussing different technologies that are involved. There are many ways to provide network security and a lot of different aspects to keep in mind. There are a multitude of people who want to attack the internet and everything that it loves. Well luckily there are big security companies like Cisco and Symantec who are there for the user like Tron, and will constantly defend newly discovered loopholes and vulnerabilities. See what global implications network security has and what the future may hold as I discuss the cutting edge technology and applications that new companies are coming out with. What is Network Security? Network security is a terminology that is used to describe any and all actions that are taken to protect and defend a network. Any action that is driven towards network security should be taken to protect the safety, reliability, usability, and the integrity of the network and all of its data. In order to explain network security a little better, I want to define what a network is. A network is defined as a system or grouping of interconnected items or individuals, and as an arrangement of vertical or horizontal lines that...

Words: 3413 - Pages: 14

Premium Essay

Stduent

...University, Lucknow, India EXPERIENCE Marketing Intern May 2012 – Aug 2012 The Lightning Group • Handled marketing, movie activations, advertising, corporate sponsorship and media relations for Taste of the Danforth (largest street festival of Canada) • Handled the Press Release of the Festival and collaborated with Canadian media (newspapers, TV, radio stations) • Formulated and pitched the story ideas for Taste of the Danforth to Canadian media outlets (newspapers, radio, TV) • Generated buzz for the festival – Taste of the Danforth on various websites and social media channels • Handled advertising strategy and corporate sponsorship for Pot Luck Art & Buddy program - innovative digital platform of Stornoway Communications • Devised the concept for ‘Celebrating you Roots’ – Canada’s Multi-ethnic cultural mosaic by Roots • Researched for CRM/Marketing Automation market for 80/20 Solutions Business Development Manager Apr 2011 – July 2011 SKAN DbyDx Software Pvt. Ltd, Noida, India • Addressed...

Words: 546 - Pages: 3

Premium Essay

Cloud Computing

...August 8, 2012 Group: 5 Cloud Computing: Risk Management Introduction The objective if this research report is to help clients make the tough decision in choosing between Amazon and Google as their companies cloud computing provider. We provide a detailed explanation of cloud and why we focused on Amazon and Google. In helping our clients make their decision we will compare and contrast the two providers using three components. The first component is to examine each providers risk based on preventable risk, strategic risk, and the external risk. From here the report moves into the security measures that the companies have in place to deal with the aforementioned risk. The final component used is the benefits that Google and Amazon can offer our clients by using their service. Background This research report will compare the risks of cloud computing, security measures in place, and the benefits associated with cloud computing technology. More specifically, our report will focus on two of the most important companies in cloud computing—Google and Amazon. While conducting introductory research our team realized that cloud computing risk management is too broad of a topic and the report would be un-useful for our clients. The team decided that the best way to help clients would be to do a comparison of the two companies and show why one provider would be better than the other. In choosing companies we decided to examine Amazon which is the number one most important company...

Words: 5340 - Pages: 22

Premium Essay

The Art of Negotiation

...The Art of Negotiation: Best Practices for Success April 2010 © 2010 Denali Group Introduction This whitepaper closely examines techniques that are key to In-Flight Negotiations. Specifically, we will address critical components of successful negotiations, including: 1. 2. 3. 4. 5. 6. The Negotiation Process Key Principles Strategy and Tactics Best Practices Lessons Learned Conclusion 2. The Negotiation Process There are two distinct phases and four critical steps to a successful negotiation process, as illustrated below. Preparation is key to the process to ensure that you are negotiating from a position of strength. The old adage “knowledge is power” certainly holds true when it comes to leveraging timely market intelligence to achieve cost reductions in negotiations. Do More With Less Learn more about how Denali Group can fast track your Procurement Transformation. © 2010 Denali Group 2. Key Principles There are several key principles to consider when engaging in successful negotiations. Understanding these principles beforehand, and knowing the concessions you are and are not willing to make, can provide clear parameters during the process. • It is important to define clear negotiation targets, such as: • LAA – Least Acceptable Agreement • MDO – Most Desired Outcome • BATNA – Best Alternative to a Negotiated Agreement Start LOW! No “presents”, give concessions only with something in return Look for multiple creative concessions to enlarge the pie ...

Words: 1111 - Pages: 5

Premium Essay

File Sharing and the Revenue of the Creative Industries

...File Sharing and the Revenue of the Creative Industries Introduction File sharing hosts, who provide online storage to share various files ripped from media like recorded music, films, and books, have been considered as a type of internet piracy that threatens the creative industries, including films, music, software, and books. (Van Eijk, 2011) However, after the shutdown of Megaupload, one of the most popular file hosting site, a series of ripple effect happened, causing several other file sharing hosts either deleted their files, or set up an access restriction. (Peukert and Claussen, 2012) It appeared to be an impact on the internet piracy and the revenue of the creative industries would go up — But it didn’t. According to Peukert and Claussen (2012), for example, the revenue of the film industry have decrease ever since Megaupload’s shutdown. The purpose of the essay is trying to analyze the relationship between the internet piracy via file sharing hosts and the revenue of the creative industries — how does the former interact with the latter — and a solution to resolve the declined revenue of the creative industries. Internet Piracy and File Sharing As its name suggests, “Internet Piracy” refers to manufacturing and distributing unauthorized copies, ie. “pirate copies”, on the Internet. (Panethiere, 2005) While the term “File Sharing” means to share a file with another person physically, such as storing and distributing a file in a CD, DVD, or a drive, or via uploading...

Words: 1483 - Pages: 6

Premium Essay

Differences Between Aql and Olap

...Differences between AQL and OLAP Auteur Peter den Heijer Adres Veldhofstraat 16 Postcode 7213 AM Plaatsnaam Gorssel Emailadres pdheijer@gmail.com Telefoonnummer 0575-490719 Datum 26 mei 2012 Opleidingsinstituut CAI Opleiding Business Intelligence Opleidingscode BUSI1201UTRx Docent Emiel Caron Versie 3.0 Pagina 1 van 19 Inhoud 1. Introduction ..................................................................................................................................... 3 2. Business Case................................................................................................................................... 3 3. Central Research Question .............................................................................................................. 3 4. Purpose............................................................................................................................................ 3 5. Sub Questions.................................................................................................................................. 4 6. Research Methodology and Scope .................................................................................................. 4 7. Introduction Qlikview ...................................................................................................................... 4 8. Definition of OLAP...

Words: 4959 - Pages: 20

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Premium Essay

Marketing Plan

...Ana Cristina Radtke Ana Cristina Radtke WEBBACAN Web Design, Marketing & Advertising Company WEBBACAN Web Design, Marketing & Advertising Company Table of Contents EXECUTIVE SUMMARY 2 Mission 3 Company Name 3 The Market 4 SITUATION ANALYSIS 4 Market Summary 4 Market Demographics 5 Target Markets 5 Market Needs 5 Market Trends 6 Market Growth 7 MACRO ENVIRONMENTAL ANALYSIS 7 Needs and Trends 7 Demographic Environment 8 Educational Groups and Technological 8 Household Patterns 9 Geographical Shifts 9 Economic Environment 9 CUSTOMER 10 COMPETITION 11 STRENGTHS, WEAKNESSES, OPPORTUNITIES AND THREATS (SWOT) 11 Strengths 11 Weaknesses 11 Opportunities 12 Threats 12 MARKET SEGMENTATION 12 PRODUCT 13 Product Features and Quality 13 1. Core Benefit: 13 2. Basic Product: 14 3. Expected Product: 14 4. Augmented Product: 14 5. Potential Product 15 Services Mix and Quality 15 PRICE 16 DISTRIBUTION 16 PROMOTION 17 PROJECTED COSTS 19 PROJECTIONS 20 CONCLUSION 20 BIBLIOGRAPHY 21 APPENDIX 22 EXECUTIVE SUMMARY WebBacan is a company dedicated to deliver information technology aligned with marketing consulting to family-businesses in Ecuador. Ecuador is one of smallest countries in South America, with an Economy based mostly on exports of primary agricultural products such as bananas, oil, shrimp, and gold. Also, the country’s industry is most entirely focused to fulfill the domestic market (Wikipedia, 2012 ). Due to...

Words: 4753 - Pages: 20

Free Essay

Offshoring the Information Technology

...competiveness. In the last 3 years or so, offshore IT has assumed new forms to include offshoring of business processes. Offshoring of IT is intensifying and firms are strategically leveraging offshore capability and the structural cost savings, while also focusing on deriving operational innovation. Robust models and quality and project management processes are employed to unleash the benefits of offshore IT. The same complexities and challenges still exist, some even growing in their scale and assuming new dimensions. Although many refined and proven managerial and organizational practises and technological tools and infrastructures, are now available, the challenges and constraints involved in managing offshore IT are far from gone. The art of managing offshore IT work is still evolving While there exist tangible and high visibility benefits of offshoring IT operations, they come along with certain riders. We will look at certain hidden costs that have the potential to either reduce savings considerably. Companies that want to succeed in offshoring, shall avoid the below statements. Pursuing the Low-Cost Worker: Offshoring is not only about sending processes to places that will execute at low labour cost. That, today, is no longer the primary reason offshoring is adopted. Quality is of equal or, sometimes, more importance. Businesses, instead, are proceeding with caution and only select offshoring as a strategic option after having completed a detailed cost-benefit analysis...

Words: 1774 - Pages: 8

Premium Essay

Cango Consulting Project

...from Liz’s stock option and the help of Warren Fox (MBA classmate). As a start-up company and joint efforts from Liz and Andrew, the expansion of its operations included CDs. DVDs, audio and video tapes and customized MP3 players. Can Go, Inc. listed as an online retailer of books and audio/visual entertainment took a leap into the online gaming arena whereby 50% ($25 million) of their divisional revenues was a direct result of this new venture. Can Go’s net sales revenue peaked at $50 million for its 2010 facial period. As Can Go strives to garner a major position in entertainment e-commerce, the online gaming is becoming highly popular. The trend shows the market shares are rising quickly and so are companies like Nintendo and Electronic Arts that took only a few years in the online gaming business to “make hundreds of millions” (Software Top 100, 2010). Can Go was recently acknowledged as a leader in entertainment focused e-commerce business in a $60 billion...

Words: 3472 - Pages: 14