...Harvard Business School 9-191-072 Rev. June 17, 1993 Cambridge Software Corporation “If we don’t decide soon, Paula, your people won’t have time to make changes in the software and to write the documentation for the student version, and my people won’t have time to publicize the software at colleges and with professors. It’s already Thanksgiving; any further delay, and we won’t be ready for the next academic year.” Tony Atkinson, the new product manager at Cambridge Software Corporation (CSC) was meeting with Paula Stewards, vice president, Software Development, and Chuck Kennedy, CSC’s president and chairman, in November 1989 to decide whether to offer multiple versions of Modeler, a new Lotus 1-2-3®-compatible modeling software product. Stewards responded to Atkinson’s appeal. “It’s easy for you to push for several versions of Modeler. After all, in your previous job, you were responsible for a line of many different clock radio models. Before that, it was toaster ovens. And before that, hand tools. But, for us, multiple product versions is a new concept. My people have enough trouble developing, documenting, and supporting one version of a software product. And you are pushing for three versions of a product of which we don’t have even one version ready!” Kennedy knew both Atkinson and Stewards were right in their own ways. He had hired Atkinson because he wanted CSC to move from offering single products to multi-version product lines. On the other hand, Stewards also...
Words: 2033 - Pages: 9
...Cambridge Software Corporation Profit Analysis * Introduction This report includes a detail analysis of the information provided in Exhibit 1, Table 1 in this report, of the Cambridge Software Corporation Case Study. It also includes a recommendation for the course of action to be taken regarding pricing and market entry for the greatest profits. Table 1: Cost, Demand, and Willingness-to-Pay Estimates | | | | "Student" | "Commercial" | "Industrial" | Estimated product completion cost | | | $100,000 | $200,000 | $500,000 | Variable cost (per unit) | | | $15 | $25 | $35 | Market Segment | Size | Segment Dev. Cost | Willingness-to-Pay | | | | -----------------------(per unit)------------------------ | | | | | | | Large, multidivisional corporations | 5,000 | $150,000 | $150 | $1,200 | $2,500 | Corporate R&D and university laboratories | 2,000 | $100,000 | $100 | $1,000 | $2,000 | Consultants and professional companies | 20,000 | $200,000 | $200 | $300 | $600 | Small businesses | 15,000 | $200,000 | $175 | $225 | $300 | Students | 500,000 | $300,000 | $50 | $60 | $100 | * One Edition Approach – Greatest Profit The single edition approach was a straight forward Cost Analysis on each market (Student, Commercial, and Industrial) at the Willingness-to-Pay price points provided in Exhibit 1. Full analysis can be found in Exhibit 2-4 on the attached spreadsheet. The Student Edition produced...
Words: 703 - Pages: 3
...AD Fucking (tutorial even for ultimate noobs) By Boczek [uid;1561667] Contents: 1. Disclaimer 2. Method 3. Conclusion 4. Proof DISCLAIMER This eBook is for educational purposes and is not intended to be used in a harmful or illegal way. If you do any of the methods in this eBook I am not responsible and that is your own doing. I will not be held liable for any damages or loss for any action you take in response to anything written in this eBook. Abide by all laws, rules and regulations applying to yourself as you take any actions. If you do not agree with these conditions then do not read the eBook and remove it from your computer. I do not associate with the companies or websites mentioned in this eBook. I do not support nor ridicule any of the companies or websites. I am also not responsible for your account or user from getting banned on any site for any reason. In addition, you may not distribute, copy, sell, or trade any content from this eBook nor the eBook in its entirety. You may also not modify or change any of the original writing from the eBook. If you fail to abide, appropriate action will occur. Bo cz ek METHOD (All links are clickable, making this guide so much easier to use - download links included) 1. Register at : http://www.bubblews.com 2. Download Mozilla Firefox http://www.mozilla.org/en-US/firefox/new/ 3. Download and install these two Firefox ADD-ONS; - ipFlood [IPFuck - Same Program] https://addons.mozilla.org/en-us/firefox/addon/ipflood/ ...
Words: 588 - Pages: 3
...Ltd ABM Knowledgeware Ltd Accel Transmatic Ltd ACE Software Exports Ltd ACI Infocom Ltd Adam Comsof Ltd Adam Comsof Ltd Advent Computer Services Ltd Aftek Ltd Agilent Technologies ALLIANCE CONSULTING Allied Computers International (Asia) Ltd Altos India Ltd Ancent Software International Ltd AOL OnlineApis India Ltd Aplab Ltd Applied Materials, IncAptech Ltd Archana Software Ltd Arms Paper Ltd Arraycom (India) Ltd Asia H R Technologies Ltd Asian Electronics Ltd Asian Films Production & Distribution Ltd Asit C Mehta Financial Services Ltd Ask Me Info Hubs Ltd ASM Technologies Ltd ASTIR ITAstro Bio Systems Ltd Atos OriginAtrentaAurionpro Solutions Ltd Avance Technologies Ltd Avantel Ltd AXIS-IT&T Ltd Axon Infotech Ltd Aztecsoft Ltd B B2B Software Technologies Ltd Bangalore Softsell Ltd Baron Infotech Ltd Bartronics India Ltd Bathina Technologies (India) Ltd Birla Shloka Edutech Ltd BITS Ltd Blue Star Infotech Ltd Bombay Talkies Ltd Brels Infotech Ltd Bristlecone C CadenceCalifornia Software Company Ltd Cambridge Solutions Ltd Cambridge Technology Enterprises Ltd CanonCAT Technologies Ltd Cauvery Software Engineering Systems Ltd CCS Infotech Ltd Cerebra Integrated Technologies Ltd CG VAK Software Ltd Chakkilam Infotech Ltd Choksh Infotech Ltd Clio Infotech Ltd CMC Ltd CNI Research Ltd Color Chips (India) Ltd Compare Infobase Compuage Infocom Ltd Compucom Software Ltd Compudyne Winfosystems Ltd Comp-u-Learn Tech...
Words: 1145 - Pages: 5
...Cambridge Software Corporation I. Problem Statement In November 2008 Cambridge Software Corporation (CSC) had to decide under high time pressure whether to develop and offer multiple versions of Modeler, a new cross-operating system computer-based software product as well as which customer segments to target at which price points. II. Situation Analysis Context and Company: CSC was founded in 1993 and has accumulated a lot of experience in developing computer software up until 2008. Vice president Paula Stewards helped to transform the company from offering products to the academic market to developing and selling computer software to the commercial market, with the latter accounting for 95% of revenues and almost all of the company´s profits in 2008. Moreover, in 2008 Kennedy hired Atkinson, who had relevant experience managing product lines of a range of computer and consumer-electronic products as product manager. Customers: The market consists of different customer segments: both the large, multidivisional organizations and the corporate and university laboratories require analytical and sophisticated software for multi-plant scheduling and experimental data analysis and show a higher willingness to pay for the industrial version compared with other segments. The consultants and professional companies and small businesses have the highest and second highest willingness to pay in the market for the student version and require less sophisticated models in order...
Words: 1333 - Pages: 6
...definitions this paper is based on. Human-Computer Interaction (HCI) is summarily, and loosly, defined as the interaction between people (users) and computers and can be referred to in several different manners. For instance; Computer-Human Interaction (CHI) or Human-Machine Interaction (HMI) are both virtually interchangeable with HCI. The phrase “speech recognition” is rarely, if ever, used outside the context of computer science. Speech recognition refers to the ability of computer-based software to convert spoken words into written (typed/digital) text. Together – HCI/CHI/HMI, etc., insert your acronym of choice but HCI will be used throughout this paper – HCI and speech recognition represent the present and rising future of end-user functionality. The next big thing will be the ability of computers or machines to read your mind instead of verbally instructing it to carry out your bidding… that is sarcasm, of course. However, this current reality of speech recognition software was not stumbled upon and did not happen by chance. A Short History The lever is widely regarded as the first “machine” “invented” and implemented by humans. Regarding human inventions, not much happened until the Industrial Revolution, which took place from the mid-1700s to the mid1800s. The Industrial Revolution is hailed as “the most important event in the history of humanity since the domestication of animals and plants.” The Industrial Revolution is also a benchmark for recognizing...
Words: 806 - Pages: 4
...Software Copyright and Patents Introduction The escalating speed of the advancement in the software industry has put many parties in a competitive race to come up with new softwares for commercial purposes. This digital arms race contributed to a rapid increase in software patents from a mere 45 average patents a week in year 1985 to an average 1200 patents a week in year 2012 (Patent Metrics, 2013). Intrigued by such large numbers of software patents, multiple studies have been carried out by scholars to investigate the impact of software patents to the software industry. The studies sparked an ongoing debate on whether software copyrights and patents are beneficial or detrimental for the software industry. This paper touches lightly on the methodology of software copyrights and patents under the current standards of the World Intellectual Property Organization (WIPO). It then explores the benefits of copyrights and patents in the software industry and lay out the drawbacks of software patenting. Finally, this paper provides a possible four-point solution to the problems concerning software patents. Methodology of Software Copyrights and Patents According to WIPO, copyright is defined as something that “provides exclusive legal rights to a creator to publish, print, perform or materialise an original work and authorize others to do the same” (2002). In the context of software copyright, a software is subject to copyright as soon as it is documented in a verifiable manner...
Words: 3386 - Pages: 14
...The History of Information Technology March 2010 Draft version to appear in the Annual Review of Information Science and Technology, Vol. 45, 2011 Thomas Haigh thaigh@computer.org University of Wisconsin, Milwaukee Thomas Haigh The History of Information Technology – ARIST Draft 2 In many scholarly fields the new entrant must work carefully to discover a gap in the existing literature. When writing a doctoral dissertation on the novels of Nabokov or the plays of Sophocles, clearing intellectual space for new construction can be as difficult as finding space to erect a new building in central London. A search ensues for an untapped archive, an unrecognized nuance, or a theoretical framework able to demolish a sufficiently large body of existing work. The history of information technology is not such a field. From the viewpoint of historians it is more like Chicago in the mid-nineteenth century (Cronon, 1991). Building space is plentiful. Natural resources are plentiful. Capital, infrastructure, and manpower are not. Boosters argue for its “natural advantages” and promise that one day a mighty settlement will rise there. Speculative development is proceeding rapidly and unevenly. But right now the settlers seem a little eccentric and the humble structures they have erected lack the scale and elegance of those in better developed regions. Development is uneven and streets fail to connect. The native inhabitants have their ideas about how things should be done, which sometimes...
Words: 27274 - Pages: 110
...c. d. PG: PG: PG: PG: 13.56 13.11 13.76 15.31 CL: CL: CL: CL: 8.71 8.35 8.67 9.02 2. Abercrombie and Fitch (ANF) and TJ Maxx (TJX) report the following information in their respective January 2006 10-K reports. Compute the 2006 inventory turnover for each of these two retailers. a. b. c. d. ANF: ANF: ANF: ANF: 3.25 7.67 2.98 2.57 TJX: TJX: TJX: TJX: 5.21 6.79 1.31 5.19 Cambridge Business Publishers, ©2010 Quiz 6-1 Financial & Managerial Accounting for MBAs, 2nd Edition 3. Intel Corporation (INTC) and Texas Instruments (TXN) report the following information. Compute the 2005 PPE turnover for both companies. a. b. c. d. INTC: INTC: INTC: INTC: 2.27 2.17 2.50 2.36 TXN: TXN: TXN: TXN: 3.44 3.21 3.50 3.43 4. General Electric Company reports the following footnote in its 10-K report. The company reports its inventories using the LIFO inventory costing method. Assume GE has a 35% income tax rate. As of the 2005 year-end, how much has GE saved in taxes by choosing LIFO over FIFO method for costing inventory? a. b. c. d. $6,705 million $475 million $3,610 million $244 million Cambridge Business Publishers, ©2010 Quiz 6-2 Financial & Managerial Accounting for MBAs, 2nd Edition 5. The inventory footnote from the Deere & Company’s 2005 10-K follows ($ millions). Inventories Most inventories owned by Deere & Company and its United States equipment subsidiaries are valued at cost, on the “last-in, first-out” (LIFO) basis. Remaining inventories are generally...
Words: 959 - Pages: 4
...New Perspectives Excel 2013 Tutorial 3: SAM Project 1a Spring Software ENHANCE A TIMESHEET Project Goal M Project Name Project Goal New Perspectives Excel 2013 Tutorial 3: SAM Project 1a Spring Software ENHANCE A TIMESHEET Project Goal M Project Name Project Goal PROJECT DESCRIPTION Devon Hastings is the human resources director for Spring Software, a software development company in Cambridge, Massachusetts. He has created a workbook for employees to use in recording the hours they work. He would like your help finishing the timesheet. GETTING STARTED * Download the following file from the SAM website: * NP_Excel2013_T3_P1a_FirstLastName_1.xlsx * Open the file you just downloaded and save it with the name: * NP_Excel2013_T3_P1a_FirstLastName_2.xlsx * Hint: If you do not see the .xlsx file extension in the Save file dialog box, do not type it. Excel will add the file extension for you automatically. * With the file NP_Excel2013_T3_P1a_FirstLastName_2.xlsx still open, ensure that your first and last name is displayed in cell B6 of the Documentation sheet. If cell B6 does not display your name, delete the file and download a new copy from the SAM website. PROJECT STEPS 1. On the Employee List worksheet, select cells A1:B1 and then use the Format Painter copy the format only to the range A2:B9. 2. In cell B1 enter bs001, in cell B2 enter cg001, in cell B3 type dh001, and then use Flash Fill...
Words: 790 - Pages: 4
...SCIENTIFIC COMPUTING (ISBN 0-521-43108-5) Copyright (C) 1988-1992 by Cambridge University Press. Programs Copyright (C) 1988-1992 by Numerical Recipes Software. Permission is granted for internet users to make one paper copy for their own personal use. Further reproduction, or any copying of machinereadable files (including this one) to any server computer, is strictly prohibited. To order Numerical Recipes books or CDROMs, visit website http://www.nr.com or call 1-800-872-7423 (North America only), or send email to directcustserv@cambridge.org (outside North America). Numerical Recipes in C The Art of Scientific Computing Cambridge New York Port Chester Melbourne Sydney EXXON Research and Engineering Company Harvard-Smithsonian Center for Astrophysics Department of Physics, Cornell University CAMBRIDGE UNIVERSITY PRESS William T. Vetterling Saul A. Teukolsky Brian P. Flannery Second Edition William H. Press Polaroid Corporation Published by the Press Syndicate of the University of Cambridge The Pitt Building, Trumpington Street, Cambridge CB2 1RP 40 West 20th Street, New York, NY 10011-4211, USA 477 Williamstown Road, Port Melbourne, VIC, 3207, Australia Copyright c Cambridge University Press 1988, 1992 except for §13.10 and Appendix B, which are placed into the public domain, and except for all other computer programs and procedures, which are Copyright c Numerical Recipes Software 1987, 1988, 1992, 1997, 2002 All Rights Reserved. Some sections of this...
Words: 24819 - Pages: 100
...Executive summary The dream of the Strategic Center Firm (SCF) has quickly become a reality. This firm’s objective now includes the building of a decision support structure that supports the following areas: 1. “Formal reporting relationships and procedures” (FLA Grading Rubric, n.d., p. 2) 2. “Managing complex, cooperative interactions among network partners” (FLA Grading Rubric, n.d., p. 2) 3. “Aligning incentives among networked partners to have a reason to stay connected” (FLA Grading Rubric, n.d., p. 2) 4. “Managing the strategic network and controlling its operations” (FLA Grading Rubric, n.d., p. 2) These areas should help catapult your company to the status of a fortune 500 company. We would be known worldwide as one of the companies in America that has what it takes to not only compete in a global market, but be sustainable in a global market. “Fortune magazine takes into account the businesses' growth, as measured by stock earnings and investment returns, assets, revenue and profit when compiling the list.” (Tran, n.d., para. 3) Strategic Outsourcing If order to businesses to remain competitive, they must walk a fine line between costs and quality. Outsourcing plays an intricate part in this process. First off what is outsourcing? “Outsourcing has evolved beyond being viewed as a purely tactical exercise to reduce costs and increase operational efficiencies.” (Singhal, n.d., para. 1) SCF plans on utilizing strategic outsourcing to “adapt flexibly to business...
Words: 3096 - Pages: 13
...Globalization Worksheet 1 Globalization and You p. 1 Worksheet 1 Globalization and You Students study the Powerpoint file on “Globalization and You”, and then answer the questions below. Brand names 1. Do you know what 2. Have you ever 3. Where did you kind of products used these use such or services the products or products/services brand names services? If yes, ? provide? how many products or services have you used? Please give a in the boxes below. Disney Theme parks, movies, stationery, etc. Amazon Book purchase, etc. Microsoft Software, etc. McDonald’s Food, drinks, toys, etc. Going on the Internet, Yahoo searching for information, etc. Intel Computers, etc. Globalization Worksheet 1 Globalization and You p. 2 Brand names 1. Do you know what kind of products or services the brand names provide? 2. Have you ever used these products or services? If yes, how many products or services have you used? Please give a in the boxes below. 3. Where did you use such products/services ? Sony Stereos, T.V., computers, etc. HSBC Banking services, etc. CNN News information, etc. Coca Cola Drinks, products with company logos, etc. Nokia Mobile phones, etc. Nike Sports goods, sneakers, sports wear, etc. Levi’s Jeans, etc. Globalization Worksheet 1 Globalization and You p. 3 Brand names 1. Do you know what kind of products or services the brand...
Words: 1574 - Pages: 7
...He doesn't wear a stocking mask over his face, and he doesn't break awindow to get into your house. He doesn't hold a gun to your head, nor does heransack your personal possessions. Just the same he's a thief. Although thisthief is one you'll not only never see, but you may not even realize right awaythat he's robbed you. The thief is a computer hacker and he 'enters' your homevia your computer, accessing personal information -- such as credit card numbers-- which he could then use without your knowledge -- at least until you get thatnext credit card statement. Richard Bernes, supervisor of the FBI's Hi-Techsquad in San Jose, California, calls the Internet 'the unlocked window incyberspace through which thieves crawl' (Erickson 1). There seems to be anunlimited potential for theft of credit card numbers, bank statements and otherfinancial and personal information transmitted over the Internet. It's hard to imagine that anyone in today's technologically orientedworld could function without computers. Personal computers are linked tobusiness computers and financial networks, and all are linked together via theInternet or other networks. More than a hundred million electronic messagestravel through cyberspace every day, and every piece of information stored in acomputer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bankrobbers have become today's computer hackers They can walk away from a computercrime with millions of virtual dollars (in the form of information...
Words: 1331 - Pages: 6
...1/12/15 What does Portal Instruments do? - a Cambridge company seeking to develop needle-free drug delivery systems, which is designed for administering viscous biologics as well as other formulations. - enhancing both safety and patient compliance What do you think are the prospects for Portal Instruments? - liquid needle How do you think Patrick Anquetil thought about the terms of the series A - A start-up entrepreneur has to be very comfortable with that uncertainty. But even if you solve the problem, you still need to sell your idea. You have to demonstrate that you have the right skills and the right team. You also have an obligation to make sure that the technology you develop will be used properly to help people Customers Industry Products Geography Size Form Debt: you have to pay back, cost of capital – interest rate Equity: you get part of the shares for paying back, cost of capital – CAPM calculate the equity capital Equity investments come in: assets go up, equity go up Institutional VC: financial Corporate VC: Info flow, sourcing, spying , HR Determine the cost of capital Equity capital 1/13/15 Nest: smart, next generation thermostat maker, where it can automatically learn about you, what temp you like, your schedule, your home, also it can help with saving energy Customers: people who own their own house – to equipped better device Form: corporation Geo: Palo Alto, California Industry: technology Product: connected home devices / home automation...
Words: 745 - Pages: 3