Free Essay

Datavast Case

In:

Submitted By intergalactic
Words 3235
Pages 13
w
9B12A020

DATAVAST INC.: THE TARGET SEGMENT DECISION

Maggie Hao wrote this case under the supervision of Professor Michael Taylor solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality.
Richard Ivey School of Business Foundation prohibits any form of reproduction, storage or transmission without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Richard Ivey School of Business Foundation, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca.
Copyright © 2012, Richard Ivey School of Business Foundation

Version: 2012-06-08

It was December 2011, and Winston Hao, founder and general manager of Datavast Inc. (Datavast), was deep in thought as he gazed out the window of his Beijing office with a cup of his favourite tea in hand.
He was both excited and anxious about his company’s prospects for the future. Since the company’s inception five years ago, Hao had heavily invested time, energy, and money into building this company, which designed, manufactured, and sold cloud storage products – that is, products that stored large amounts of digital data. After recently making major adjustments to the original product, Hao’s company was finally ready to push its newly revamped product onto the market. The only question was: Who should Hao target? He expected the small-to-medium enterprise (SME) segment would be the most price-sensitive, but it could also provide the fastest growth. On the other hand, the large-company segment permitted much higher unit contributions, but it also had a much longer buying cycle.
FORMS OF DATA STORAGE

Data storage devices allowed users to store digital files in a secondary location in order to prevent the loss of important information. Such devices came in many forms, depending on the needs of the user.
CD

CDs (Compact Discs), portable optical discs, were widely used by consumers for personal purposes and represented an inexpensive method of storing digital data. However, CDs were an undesirable method for businesses to store data because they could be easily lost, scratched or broken, thereby compromising the information stored on the device. CDs were often unreadable after they were made. The storage capacity of a CD was about 0.73 GB.1

1

B. Marshall, “How Analog and Digital Recording Works,” http://electronics.how stuffworks.com/analog-digital4.htm, 2011.

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

S

Page 2

9B12A020

Portable external hard drives2 offered a user-friendly and mobile method of storing data with larger storage capacities. The storage capacities of these devices ranged from 160 GB to 2 TB.3 Portable external hard drives were more expensive than CDs, but they offered increased reliability since information was less likely to be corrupted after it was transferred to the device. Like CDs, portable external hard drives are easy to lose and damage. They are very susceptible to damage from shock, vibrations, and strong magnetic fields.4
USB Flash Drive

USB (Universal Serial Bus) flash drives5 were portable, rewritable, and physically smaller than their alternatives, and they could store up to 256 GB of data. It was common for data stored on USB flash drives to be unreadable. Flash drives also presented a significant security challenge for organizations, since their small size and ease of use allowed unsupervised visitors or employees to store and smuggle out confidential data with little chance of detection.
Cloud Storage

Cloud storage represents the process of saving data to an off-site storage system maintained by a third party.6 Instead of storing information to a computer’s hard drive or other local storage device, it could be stored in a remote database. In a “public cloud,” the user could access their data through the Internet.7 In a private cloud, this process was facilitated through the company’s intranet.8
Public Cloud
Public cloud storage offered several advantages over traditional storage methods. First, companies were required to pay only for the amount of storage they actually used, which helped reduce their expenses.
Since the service providers installed the physical storage devices in their own offices or data centres, public cloud customers gained significant storage and office space at their own locations. Companies were also relieved of maintenance responsibilities, as the responsibility for this process fell to the service providers. Adoption of this storage method was hindered by risk of compromised data security, since all data was stored at the third-party service provider’s location.
Private Cloud
According to the National Institute of Science and Technology, “Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third party and hosted internally or
2

Removable hard disk drives that established communication with a computer through connectivity options, such as USB.
“External Hard Drives – Including Portable and Desktop External Hard Drives,” Helpwithpcs.com, http://www.helpwithpcs.com/buy-guides/external-hard-drives.html, 2012.
4
USB Flash Drive, Winston Hao, personal interview by case writer, February 27, 2012.
5
Storage devices that include flash memory and an integrated USB interface.
6
J. Strickland, “How Cloud Storage Works,” http://computer.howstuffworks.com /cloud-computing/cloud-storage.htm, 2012.
7
F. Gens, “Defining ‘Cloud Services’ and ‘Cloud Computing,’” http://blogs.idc.com/ie/?p=190, September 23, 2008.
8
The
NIST
Definition of Cloud
Computing,
National
Institute
of
Standards
and
Technology,
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
3

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

Portable External Hard Drive

9B12A020

externally.”9 This model had an advantage over the public cloud, as the data did not need to be stored with a third party. However, users still needed to buy a physical storage device, which had to be housed in their home office or data centre. A summary of differences between the private and public cloud can be found in Exhibit 1.
Integrated Backup Systems

Alternatively, integrated backup systems were offered by IT solution providers such as IBM Tivoli.
Providers of this service often bought hardware equipment from reputable vendors such as IBM and stored the company’s core data10 on it. These data storage and backup solutions had been available for over 10 years and were regarded as the most reliable option for data storage. They also offered the highest level of customization with state-of-the-art performance. Providers had very quick recovery times for compromised data. However, along with such strong performance came the kind of high prices that many smaller companies could not afford.
BUSINESS DATA STORAGE IN CHINA

Creating backup copies of important data constituted a relatively new concept in China, and a large proportion of the companies that were backing up data were, by North American standards, using outdated storage methods. Hao estimated that about 20 per cent of China’s small and medium-sized enterprises (SMEs)11 still used CDs as their primary form of data backup, while 30 per cent to 40 per cent used external hard drives, 40 per cent did not use any form of backup, and the rest used other methods.12
Most large companies 13 used integrated backup systems offered by large multinational service providers to store their core data, often at a cost of millions of RMB, and their non-core data was stored through a variety of outdated means.
Cloud computing was picking up very slowly in China due to fears of data leakage.14 Bankruptcy laws in
China were underdeveloped, and companies feared that small cloud-storage service providers would go bankrupt overnight, disappearing with all of their clients’ stored data. It was common for people working in service industries to sell client information, a practice that made it difficult for companies trust service providers with storing sensitive company information.
The concept of private-cloud storage was unfamiliar to the Chinese public, but, according to Hao, when
Chinese businesses were surveyed, they described their ideal storage solution as one that resembled private-cloud storage. However, since this concept was a new one, most companies were unaware of its existence. Datavast was one of the more established players in this relatively unknown market.
IT solutions were sold to businesses through either a systems integrator (SI) or an IT supplier, depending on the size of business. Large businesses and government organizations normally used SIs, who worked collaboratively with the IT departments of these organizations to provide full-package solutions. Large
9

The
NIST
Definition of Cloud
Computing,
National
Institute
of
Standards
and
Technology,
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
10
Core data refers to data that is critical and of the highest importance to a company.
11
An SME is defined as companies with 200 to 500 computers.
12
Winston Hao, personal interview by case writer, February 27, 2012.
13
Large companies are defined as those with over 1,000 computers.
14
E. A. Alter, Y. Pang, R. Lin and G. J. Harris, “China’s Pragmatic Path to Cloud Computing,” http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Chinas_Pragmatic_Path_to_Cloud_Computing.pdf, May 2010.

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

Page 3

9B12A020

businesses were loyal to their SIs through strong, continuous working relationships, and SIs were highly familiar with their customers’ IT infrastructures and needs. Product developers relied on SIs to introduce and sell their products to their customers since large companies were not receptive to new product pitches or opportunities from parties with whom they lacked a connection. SIs met regularly with their customers.
At these meetings, they were responsible for identifying areas in their customers’ IT infrastructures that needed improvement and for educating and recommending new products that suited their customers’ needs. Their responsibilities also included technical support. The role of a SI resembled that of a consultative partner. When SIs made a sale, a product manufacturer, such as Datavast, would provide the
SI with the product. The SI then packaged the product into a solution package and marked up the price of each product in the package. The sales process for SIs and IT suppliers can be found in Exhibit 2.
SMEs mainly purchased from IT suppliers, and they were not necessarily loyal to a particular one of the many IT suppliers on the market. The IT suppliers competed based on low prices and sold individual components separately. Business customers generally approached IT suppliers looking for a particular product or solution, and the IT supplier would provide it at the lowest price possible. IT suppliers carried a large portfolio of products to sell, often including tens of thousands of items. IT suppliers did recommend products to customers on occasion if asked to do so, but they were not very knowledgeable about every product they had in stock.
DATAVAST

Datavast provided cloud computing storage products in China. Datavast had offices in Beijing and
Shanghai and sold to companies located in cities that possessed developed IT infrastructures. There were
30 employees in the company, including three salespeople.
Datavast was founded for the purpose of offering information backup services to companies through the public cloud, in partnership with China Telecom. This service was new to the Chinese market, and Hao hoped that a partnership with China’s largest telecommunications company would provide Datavast with credibility. However, Chinese businesses proved to be very resistant to the adoption of public cloud computing, and companies did not feel comfortable storing sensitive information with Datavast, even though it had a credible partner.
Hao discontinued its public-cloud storage and reinvented his business to focus on a product called the
Data Security Box. The company converted from a service provider to a product designer, manufacturer, and seller. The Data Security Box had the capacity to back up large quantities of information, encrypt it using the latest technologies, and store the information into a physical device that the client company could keep on its own site. With this product, companies did not need to worry about leaving sensitive information with a third party. These Data Security Boxes offered larger storage capacities than did CDs, external portable hard drives, and USB flash drives. Since Data Security Boxes were not removable, companies did not worry about losing them, and the boxes were designed to be resistant to breakage. The encryption function also prevented information from being leaked if the box were stolen. In addition, employees could access information through the company’s intranet from virtually anywhere. Hao also included features that provided company management with a means to limit employee access to the information stored in this box. He felt that these features made his box more attractive than the traditional storage alternatives, and his solution was significantly cheaper than the integrated back-up systems offered by large companies. The Data Security Box had no association with China Telecom.

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

Page 4

9B12A020

Since the private-cloud storage market in China was relatively new, Datavast did not have any major direct competitors. Hao had recently noticed a few small private-cloud storage companies beginning to emerge in the market, but these businesses were less established than Datavast. Portable hard drives represented the closest substitute for the Data Security Box.
Hao found that one of his company’s largest barriers to success stemmed from a lack of customer knowledge about his product. Extensive effort was needed in order to educate the public about the nature of private-cloud storage and about the capabilities of Hao’s product.
By 2011, five years into its operations, Datavast was still operating at a loss.
WINSTON HAO

In 2002, Hao left Canada in search of entrepreneurial opportunities in China. After working in Canada’s telecommunications industry for over 10 years and completing his EMBA at the Rotman School of
Business, Hao decided it was time to pursue his dream of building his own business. In his first few years in Beijing, he worked in the Chinese telecommunications industry to familiarize himself with the operating environment and search for new opportunities. A few years later, he spotted the growing need for data storage in China and launched Datavast.
Although Hao thoroughly enjoyed working to build up Datavast, he wanted to retire in five years.
Therefore, he was not keen on investing any more personal capital into the business before his retirement.
After five years of losses, his goal was to generate a positive net income this coming year with the launch of his new product. With cash flow from operations as the only source of funds Hao did not want to adopt a slow-growth strategy that would stress the company’s finite financial resources, and he did not want to increase overhead spending beyond the existing level of RMB200, 000 per year.
THE DECISION

After finishing the design of his new product, Hao needed to decide where to focus his attention and resources. Which segment was most suitable for his current situation? He decided not to segment by geographical region or industry as he did not see many differences in the needs of companies located in different geographical areas or different industries. However, the size of the company largely affected its needs and buying characteristics.
SMEs

Since SMEs were very price-sensitive, Datavast would need to significantly discount its prices in order to remain competitive. Hao estimated that he could sell each Data Security Box for approximately
RMB7,000 to an IT supplier, who would then mark up the price slightly to make a small margin on the sale. Since SMEs required a fairly standardized product, the standardized product was also cheaper than the not-so-standard product required by the large company segment to produce. The Data Security Box margins were close to 50 per cent, which took into account the servicing costs for each sale, as SMEs did not typically employ IT engineers or anyone with extensive knowledge in IT.
The selling cycle to SMEs was much faster than it was for large companies. Hao estimated that he could complete a sale and receive the payment in two to three weeks. Since Datavast was still in its start-up

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

Page 5

Page 6

9B12A020

Large Companies

Large companies typically used integrated back-up systems, but they could use the Data Security Box for non-core data. Datavast could charge RMB400,000 to the SI, who would then mark-up that price to sell to its own customers. Hao was considering providing SIs with a 30 per cent margin on each sale in order to provide an incentive for the SIs to push the Datavast product as they made only a 10 per cent margin on most of their other products. These low margins stemmed from the fact that most of the SIs’ products came from well-known brands such as IBM and Cisco, who had very transparent prices in the industry.
Since Datavast’s Data Security Box was relatively unknown and customized, SIs would be able to earn higher margins on it without upsetting their customers. Datavast’s margin on these sales was 75 per cent to 80 per cent.
Sales cycles in this segment took two to three months, due to a significant amount of time spent on bureaucratic decision-making processes.
As Hao finished his tea, he decided it was time to map out an analysis and make a decision. He wondered what impact his decision would have on his company’s positioning and what steps he should take in order to make the decision a success.

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

phase, cash was important for covering overhead costs. The company did not have a working capital loan at the time.

Page 7

9B12A020
Exhibit 1

Source:
S.
Lesem,
“Cloud
Storage for the
Enterprise
Part
2:
The
Hybrid
Cloud,” http://cloudstoragestrategy.com/2010/01/cloud-storage-for-the-enterprise---part-2-the-hybrid-cloud.html, January 25, 2010.

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

COMPARISON OF PUBLIC CLOUD VERSUS PRIVATE CLOUD DATA STORAGE

Authorized for use only by Maria Montenegro in Marketing Decisions for Managers at Nova Southeastern University from Oct 19, 2015 to Dec 11, 2015.
Use outside these parameters is a copyright violation.

Page 8
9B12A020

Exhibit 2

SME SALES PROCESS

Similar Documents

Free Essay

Datavast - Case Study

...Nova Southeastern University Wayne Huizenga Graduate School of Business & Entrepreneurship Assignment for Course: Submitted to: Submitted by: Date of Submission: Title of Assignment: Case Study Analysis – Datavast Inc.: The Target Segment Decision CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Student Signature: _____________________________ *********************************************** Instructor's Grade on Assignment: Instructor's Comments: (1) Describe the data storage industry in China in this case. Include comments on technology and issues in accepting new technology? Backup copies of important data was a relatively new concept in China and a large number of companies that backed up their data used outdated storage methods. These storage methods were not very reliable and were sometimes very easily compromised. It was estimated that approximately 20% of China’s small and medium-sized enterprises (SMEs) still used CDs as their primary source of data backup (Hao, 2012). CDs were used mostly for personal...

Words: 1355 - Pages: 6

Premium Essay

Datavast Case Study

...Introduction Datavast Inc. is one of leading China’s designers, and it has been recently involved in the launch of new Data Security Box; which is a private cloud storage product. The manager of the company is faced with dilemma on the ways and strategies that can be used in selling the product. The manager is focused on segmenting the target market based on the effective method that will yield high level of customer satisfaction. With the understanding that customers in different sector have distinct purchase characteristics, the manager is concerned with implementing measures that will generate high revenue outlay. However, in the modern economy, the large companies and SMEs have exhibited varying needs and change in purchase behavior. The general manager has been faced with limited resources and this has an implication on the decision to be achieved on whether to focus its operations on large companies or SMEs. During this period, Datavast Inc. had limited number of direct competitions; however, the success was hampered by its current capabilities and the data storage sector imminent in China. With the general manager willing to retire in the next half-decade, it is difficult for the manager to extensively investment in the organization. Problem Statement The company has reported a reduced profitability level and this has been impacted by lack of decisive marketing strategy. Management requires development and implementation of short-term marketing strategy that will...

Words: 2149 - Pages: 9

Free Essay

Family

...With these developments, it is obvious that conflicts between parties of different nationalities occur and liability to tax on income of foreigners especially among those engaging in trading venture. Whilst the laws affecting domicile and residence may be sufficiently settled, it is paramount for courts to pursue a detailed analysis to ascertain specific preliminary issues so as to avoid controversial rulings. Courts often handle numerous financial cases that involve what can be best described as foreign or international elements. In such cases, court must decide whether it has the jurisdiction under the Family Law Act 1975 to make a decision on such cases. In the event that it is determined that the court is invested with the jurisdiction to determine the case, the court has to consider whether there is a system of law in foreign country that also has the jurisdiction to handle the case. As it was addressed in the case Attorney General of New Zealand v Ortiz [1984] AC 1, these benefits and costs to either party if the case resolution is made in foreign country as compared with the apparent country should also be a subject of concern. [1] Legal systems in most countries around the world adopt community property regime, which takes effect at the inception of marriage or at the time of divorce. For instance, California and Massachusetts in the United States have adopted community property regimes that support equal division of assets upon divorce. However, this provision...

Words: 659 - Pages: 3

Premium Essay

None

...Adapted from Bernhardt & Kinnear (1988). Cases in marketing management, pp. 6-16. Plano, TX: Business Publications, Inc. Pay careful attention to the following points. They are often used by instructors to evaluate either a written or oral analysis. 1. Be complete. Each area of the situation analysis must be discussed, problems and opportunities identified, alternative presented and evaluated using the situation analysis and relevant financial analysis, and a decision must be made. An analysis that omits part of the situation analysis or only recognizes one alternative is not a good analysis. Second, each area must be covered in-depth and within insight. 2. Avoid rehashing case facts. Every case has a lot of factual information. A good analysis uses facts that are relevant to the situation at hand to make summary points of analysis. A poor analysis just restates or rehashes theses facts without making relevant summary comments. 3. Make reasonable assumptions. Every case is incomplete in terms of some piece of information that you would like to have. A good case analysis must make realistic assumptions to fill in the gaps of information in the case. For example, the case may not describe the purchase decision process for the product of interest. A poor analysis would either omit mentioning this or just state that no information is available. A good analysis would attempt to present this purchase decision process by classifying the product and drawing upon real life...

Words: 487 - Pages: 2

Free Essay

Save Me

...are given. It is understandable then that we should seek out more opportunities to apply our skills and make more positive impacts within our jurisdictions. It is this general attitude that led us to get involved in investigating cold cases. How We Got Started Mark had, for several years, been consulting with our Coroner’s Division as a forensic anthropologist. During this time he came to learn that there were numerous coroners’ cases in which the identity of the decedent was unknown. These cases were kept in three-ring binders on a shelf in the Sergeant’s office. Over the years, in the course of this forensic work, we would discuss these cases and the progress that was being made on them. The conversation usually ran along the lines of us asking “any luck with that 1980 homicide victim?” and the sergeant answering “well, we’ve gotten so many new cases that I haven’t been able to even look at it yet.” This went on for a few years and through two different sergeants. One day we, as a crime analysis unit, were brainstorming about how we could broaden our “client base”, as it were. We had been successful in integrating ourselves into our Investigations Bureau and had been involved in numerous major cases. And, of course, we had always been active in producing tactical and strategic analyses for our patrol personnel. But we knew that we could be doing more, particularly given the size and responsibilities of our agency. It was during...

Words: 412 - Pages: 2

Free Essay

Business Case

...BUSINESS CASE Presented to the Accountancy Department De La Salle University In partial fulfillment Of the course requirements In ACCTBA2 (C33) March 2, 2015 A stakeholder is typically concerned with an organization delivering intended results and meeting its financial objectives. In general, a stakeholder can be one of two types: internal (from within an organization) or external (outside of an organization). The stakeholders in this situation are Lanie Marquez and Tim Rodriguez who are also partners in the retail distribution business and their capital contributions are as follows P500,000 and P300,000 respectively they are an internal stakeholder since they are also the owners. The total Capital of both stakeholders is P800,000 and with a monthly salary for both partners at P15,000 on the assumption that both of them will contribute to manage the business equally. Assuming that both managed the business equally the total salary for the year for Lanie and Tim are P180,000 each. They share profit and loss equally and no interest will be given on capital contributed. The problem for this situation is that Lanie is starting to get concerned with the behavior of her other partner Tim. He only manages the business 50% of the time, which will mean that his salary of P15,000 will need to decrease by also 50% since he does not manage the business equally with his partner. The business has seen a downturn in the profit outcome and for the current financial...

Words: 758 - Pages: 4

Premium Essay

Ralph's Grocery Case Summary

...Ralph’s Grocery and United Food and Commercial Workers Union The case that I chose for the week 6 critical thinking assignment concerns Ralph’s Grocery Company, located in California. It applies to this week’s material due to the fact that the case involves unlawful suspension and discharge of an employee, as reviewed by the National Labor Relations Board. Background In May 2011, Vittorio Razi was an employee at Ralph’s Grocery and was suspended and terminated after he refused to take a drug test without first consulting with his UFCW Local 324 representative. The company (Respondent) says that on the day in question, Razi’s behavior was in question, acting nervous, anxious, agitated, and slurred speech. After a couple managers discussed the...

Words: 750 - Pages: 3

Premium Essay

Chromogens Affecting Wealth Wear Staining Teeth

... Many people wonder why their own teeth stain so easily. The enamel on your teeth and chromogens are what stains your teeth, but what exact beverage stains teeth the most? I chose this topic because I was curious to know what stains teeth the most. It affects us daily because it could rot your teeth or you can’t pick up hot chicks anymore. So what causes teeth to stain? The temperature causes teeth to expand or contract making it easier for stains. So hot and cold drinks affect that. Color in foods and beverages come from chromogens. Chromogens are intensely pigmented compounds that stick to teeth enamel. Chromogens cause a lot of trouble when they mix and react with other stain causing and stain promoting factors. Tannis may be natural or synthetic tannis is another factor that stains teeth. Tooth enamel is porous making it extremely susceptible to stains. The darker the liquid the darker the stain. There are some examples that stain teeth. Not only sodas bad but also Gatorade. Beets are bad for you also. Mostly cause they’re concentrated. Berries dark skins stain teeth. Ketchup is also really bad because of its bright red color and high levels of acid. Dark liquids and sauces you put on your foods also stain teeth. Colored candy and popsicles both contain colorants that will transfer to the teeth and embed in the porous enamel. Fruit juices, especially grape and cranberry, leave a colorful tinge on the teeth and tongue. Colored sodas instantly discolor teeth. The citric acids...

Words: 594 - Pages: 3

Free Essay

Fin 571

...efficient investigative products and services. As a result, the coverage requirements for ANACI and NACLC investigations have been enhanced to support a common content baseline for all agencies. Note that these enhancements apply only to those ANACI and NACLC cases submitted on an SF 86. The purpose of this FIN is to provide you with information concerning what case coverage changes have been made. The case price adjustments necessary to support these changes will be reflected in the FY 2007 case prices. ANACIINACLC Cases Currently, listed and developed issues which are identified in ANACI and NACLC cases (for non-DoD customers) are not pursued beyond the normal scope of the investigation. These cases are returned to the requesting agency so that the agency may decide whether to adjudicate the case based upon the information in hand, conduct additional follow-up themselves, or request a Reimbursable Suitability Investigation (RSI) from FISD to cover the additional issues. Beginning with FY 2007, expansion of these issues will become a standard part of both the ANACI and NACLC products. Effective October 1, 2006, issues apparent at scheduling or developed during the course of the investigation and which fall within the 5-year case coverage period, unless otherwise noted, will be expanded upon according to the following chart (exception: issues which are known to have been covered in previous investigations, or which would reasonably have been expected to...

Words: 772 - Pages: 4

Free Essay

Getting Ready for a Midterm

...find that you would like even more time. I recommend that you enter the exam promptly since I will make deductions for those exceeding the 9:00 o'clock end time even if you enter late. Third, know that the legal reasoning essay will come from Module 4 on immunity. The variety of scenarios in that question will force you to think about and explain the nuances between sovereign and personal immunity, between absolute and qualified immunity, about loss of immunity, etc. You will want to understand all four cases from that module well before the exam. I will expect specific citations to the cases and the principles that they enunciate. An additional case that might be useful for you to look at is Canton v. Harris. A second question will address the rulemaking process and the principles underlying it. You should "walk into" the exam (in a virtual sense) with a clear sense of a fully articulated rulemaking process, so that you can pick and choose elements as appropriate in the case you will be presented. The third question will be drawn from the text regarding the Constitutional framework. Finally, remember that "open book" exams can be as challenging as closed book because the "bar" (the expectation) is higher. I think you will find that prior preparation will make a good deal of difference. As stated before, when you open the exam, answer the questions initially in word and copy it back to the exam. That way, you will not lose work, time...

Words: 342 - Pages: 2

Premium Essay

Compensation Culture

...in which it is acceptable for anyone who has suffered a personal injury to seek compensatory damages through litigation from someone connected with the injury. It’s the idea that for every accident someone is at fault. For every injury, there is someone to blame. And, perhaps most damaging, for every accident, there is someone to pay. There are so many ridicilous cases througout history where people sue somebody or some company for no reason and get a lot of money from them. For example . A caretaker fell off a ladder and sued the local authority for not training him to use a ladder - and won.He could get up to 50.000 pounds compensation. One former ex policeman received nearly £90,000 compensation for the trauma of seeing a woman die after he crashed into her car during a 999 call .The husband of the woman killed by the policeman received £16,000 compensation. Policemen cause a tremendous number of accidents - so many, indeed, that one force has stopped its drivers from speeding. The effect is damaging to society. The courts become clogged up with greedy people out for themselves, many with no real case at all while other people with real compensation claims, the people disabled in accidents, crippled in operations or people who have lost loved ones due clear negligent behavior. All the other who just sue somebody with ridicilous acusations should be ashamed of themselves and I hope that in the future others avoid trying to cash in just because it seems so easy...

Words: 266 - Pages: 2

Premium Essay

Business

...Case - Swisher System Corporation I. Company Background: Swisher Systems Corporation (SSC) is an industrial heating company which was established in 1949. SSC is an innovator of flexible heating products, especially with its knit and braided heating element. The heating element is multi-stranded resistance wire that is knit and braided with fibreglass and is the base technology for almost all SSC products. SSC is known in the industry as being the highest quality flexible heat supplier which produces control devices and heating cable. SSC’s competitive advantage is on the quality products which maintains higher and safer temperature that are more flexible than their competitors or other products in the market. II. Facts of the Case: A. Mike Watkins  Director of Purchasing for Swisher Systems Corporation  Solely responsible for purchasing all materials of SSC.  Has various experiences in material management prior to SSC.  Has more than thirty-five (35) years of industrial purchasing experience. B. Products at Swisher Systems  All SSC products are solutions to industrial heating applications  SSC manufactures fifty percent (50%) standard products and fifty percent (50%) custom orders. o The custom products can be applied to virtually all industries that require heating products. Industries like semi-conductors, food processing, medical, petrochemical and others.  Biggest contributor of SSC’s sales is the cloth heating jacket, though expensive...

Words: 296 - Pages: 2

Free Essay

Ism 5014-Enterprise Information Systems

...certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Student Signature: z ******************************************* Instructor’s Grade on Assignment: Instructor’s Comments: The cases that we analyzed as a group as part of the class requirements were very interesting. I was able to relate to both cases especially due to the company I work for. Case number 1, was related on how to survive and adapt to a new market place. As the company I work expands, it continues to navigate and explore new markets with the different products it manufactures. Case number 2, concentrated on how pay attention to contracts and making sure one does its homework before making any type of decisions. I was able to learn from both cases different type of information system solutions and how to manage it. The group projects were very helpful by allowing us to learn how to communicate and work together as a long distance team. It was very hard at first, especially because one of the team member drop the course one week before our first project was due. However, we shined as a group and we were able to complete the project in a timely manner. I learned that the best way to get a long distance project done is...

Words: 461 - Pages: 2

Premium Essay

D Unger V. Ed Rachal Foundation Summary

...Final Case Brief FACTS: Claude D’Unger worked for the Ed Rachal Foundation. This foundation owned a ranch that shared a border with the Rio Grande. Frequently, migrants would cross through the ranch. D’Unger suspected that another ranch employee was harassing migrants. Despite being told by his CEO to drop the issue, D’Unger contacted the authorities. It came out that there was no crimes committed, and D’Unger was fired as a result of his actions. Claude D’Unger claimed that the Foundation had breached its contract and that he had been wrongfully terminated and sued on these grounds. He also sued his CEO, Paul Altheide, claiming he had commited tortious interference. The county judge who reviewed his case ruled in favor of D’Unger, but a court of appeals reversed the breach of contract and...

Words: 422 - Pages: 2

Free Essay

Business Case for Hr Self Service Systems

...Business Case for HR Self Service Systems Table of Contents Executive Summary 3 Project Overview 3 Business Case for Proposed Project 4 Conclusion 5 References 5 Executive Summary This paper addresses the business case for implementing self service in the IT industry with the aim of gaining higher efficiency for a majority of HR functions and other benefits that can be derived from improved information access. The paper also discusses the various challenges an organization might face while attempting to implement self-service. The business case for self service revolves around reducing administrative costs and gaining better efficiency. It also aims at improving the overall performance and other benefits such as information management, trend analysis and also operational efficiency. The chief argument presented here is that a self-service initiative allows the HR to concentrate more towards the core functions such as people management instead of getting burdened with administrative tasks. While self-service has the ability to improve the service expectations from HR, it may also result in some of the savings being consumed in order to meet the higher quality expectations. However, on the long run, it is bound to reduce expenses to a great extent while enhancing the quality. Self-service also enables an organization to implement flexible work and helps employees to remain connected with the organization through a centralized HR system aimed at remote...

Words: 1107 - Pages: 5