Premium Essay

Infs

In:

Submitted By vada1211
Words 295
Pages 2
Outline
Introduction
1. Company * Lifefont was found in 1907, and its business is Wonder Home Product, a manufacturer of consumer products. * And then, Wonder Home Product was established itself as a leading manufacturer of customer packaged goods. * In 21th century, Lifefont has 2 divisions: Life Sciences, which contributed 72% of sales / 80% of operating profit and Consumer Product, which contributed 28% of sales / 20% of operating profit * Five distinct franchises under Consumer: Breakfast Foods, Bath & Beauty, Skin Care, Energy Drinks, and Nutritional Bars. * Consumer segment faced with challenge of competing with consumer packaged goods (CPG)
2. Industry * Lifefont’s CPG industry is highly competitive * In 1800s, there were a lot competitors * Beginning in 1970’s, the product innovations is very slowly. * In 1990s, the product differentiation among the remaining manufacturers is littler. * In the final decades of 20th century, Retail has a significant development to whom CPG manufacturers sold their products. * In 2003, consumer packaged goods end market was fully penetrated in the U.S and Western Europe.
3. The problem * The company made a decision to focus on sales promotions to improve the income. The sale promotion cost more than $200 MM per year * It is $70 MM difference between the gain form the sales increased and cost of the sale promotion. * Despite the five sale organizations have lot of similar facts, business were run in a specific manner, and processes differed from one operating company to another
4. Project * The objective of Retail Driver was to develop a common sales promotion to tool for use across the five customer organizations. * To obtain a profitable investment with 57% internal rate of return and a payback period of 2.1 years. * What’s more, the project want to

Similar Documents

Premium Essay

Inf Security

...INF 370 – Information Security – Week #4-1 attendance check 1. Read the article “Privacy and Security / Emotion and Security” by Rose McDermott published in Communications of ACM, February 2012: http://dotlrn.aubg.bg/dotlrn/classes/departmentofcomputerscience/sINF370/INF370S12/file-storage/view/Handouts/Privacy_and_Security_-_Emotion_and_Security-Communications_of_ACM-February2012.pdf Make a short resume (about 200 words) of the publication. Responses to presumed threats or attacks are usually emotionally based. People tend to misunderstand or shift their attention to risks that are not very high while forgetting about the not-so-obvious threats. However, these threads are in most cases far more dangerous than the obvious and easy to predict dangers. According to Prospect Theory models individuals tend to weight probability not in the linear fashion advocated by standard normative models of probability theory, but rather the subjective functions that overvalue certain low-probability events. Fear and anger make people anxious and nervous, cause them to make worse decisions and make mistakes. 2. Using AUBG Web find what information security policy, standards, practices and procedures exist. What is the most important for a policy to be effective? http://www.aubg.bg/RapidASPEditor/MyUploadDocs/Information_Security_Guide.pdf For a policy to be effective it needs to be observed and applied. No matter how great a policy is if people do not comply...

Words: 254 - Pages: 2

Free Essay

Infs Assignment

...cu MOVEIN BUSINESS INTELLIGENCE AND ANALYTICS REPORT me nt ap A  Business  Plan  on  the  Role  of  Business  Intelligence  and  Analytics  for   MoveIn  Pty  Ltd               Th ink sw Do   TABLE  OF  CONTENTS   Executive  Summary   ........................................................................................................................  2   1  -­‐  Introduction  ..............................................................................................................................  3   2  -­‐  Role  of  Business  Intelligence  .....................................................................................................  3   2.1  -­‐  Business  Intelligence  -­‐  Overview  ...............................................................................................  3   2.2  -­‐  Business  Intelligence  Tools  ........................................................................................................  4   2.2.1  -­‐  On-­‐line  Analytical  Processing  ..............................................................................................  4   2.2.2  -­‐  Data  Mining  ........................................................................................................................  5 ...

Words: 4854 - Pages: 20

Premium Essay

Inf 620

...RWC 1: Cogent Communications, Intel, and Others: Mergers go more smoothly when your Data are Ready Case Study Questions 1. Place yourself in the role of a manager at a company undergoing a merge or acquisition. What would be the most important things customers would expect from you while still in that process? What role would IT play in meeting those expectations? Provide at least three examples. Role: Customers expect the same or better service than they are currently receiving-though they likely fear a service disruption. IT plays a significant role if not as a service provider than at least as a vehicle for communications between the organization and its customers. Examples: Banking, telecommunications, and Internet service providers. 2. Focus on what Andi Mann in the case calls “tribal knowledge.” What do you think he means by that, and why is it so important to this process? What strategies would you suggest for companies that are faced with the extensive presence of this issue in an acquired organization? Develop some specific recommendations.l Tribal Knowledge: Is the organizational knowledge maintained in the minds of its employees. In many cases, only experienced employees possess information about who does what, when, and why. While these employees may be redundant following a merger, losing them would mean losing information critical to maintaining the acquired organization’s systems. This loss could result in a disruption of critical services...

Words: 505 - Pages: 3

Premium Essay

Inf 336 Final

...The importance of Purchase and Supply management INF 336 Instructor: Lori Deere In my time of jobs, I’ve had some experience of dealing with projects, vendors (suppliers) and some of the business. When I worked for Whole Foods, I dealt with different vendors and dabbed in some of the project aspect of the work. In later time, I became the bulk buyer and got more involved. At that time I really didn’t know how vital purchasing and supply management were in business. In an organization, buying supplies and keeping them in order is very important to help the business run correct. For this paper, I’ll discuss the aspects of purchasing and supply management and why it’s important. It will go over some of the important parts with explanation. In the process, I’ll do my best to give examples from my past experiences and other examples. SO that being stated, let’s go into what exactly is purchasing and supply management. “Supply management is focused on the acquisition process recognizing the supply chain and organizational contexts” (Johnson, P. F., Leenders, M. R., & Flynn, A. E. 2010). Purchasing and supply management is a complex matter that requires more than what most think. It’s stated that there is no easy way to organize the functions of supply, integrate suppliers correctly, and conduct the activities involved. It’s actually more of challenge of anything. In addition, each organization needs its own unique method. “It is also challenging because every supply...

Words: 2594 - Pages: 11

Premium Essay

Infs 3770 Studyguide

...Study Guide for INFS 3770 CHAPTER 1 Data vs Information CHAPTER 2 * Entity: Unique and distinct object used to collect and store data * Attribute: Characteristic of an entity * Relationship: Describes an association among entities * One-to-many (1:M) * Many-to-many (M:N or M:M) * One-to-one (1:1) * Constraint: Set of rules to ensure data integrity ===================================================================================== * Entity relationship diagram (ERD) * Uses graphic representations to model database components =====================================================================================CHAPTER 3 * Database * Tables (entity, file, record type, relation) * Records (rows, instance, tuple) * Fields (attribute, column) ===================================================================================== Types of Keys * Composite key * A key composed of more than one attribute * Key attribute * Any attribute that is part of a key * Superkey * Any key that uniquely identifies each row * Candidate key * A superkey without unnecessary attributes * Foreign key (FK) * An attribute whose values match primary key values in the related table * Referential integrity * FK contains a value that refers to an existing valid tuple (row) in another relation * Secondary key * Key used strictly for data...

Words: 468 - Pages: 2

Free Essay

Inf 340 Final

...Hoosier Burger Case Analysis Sarah Doppelmayr Ashford University Business Systems Analysis INF340 Mark Revels March 10, 2014 Hoosier Burger Case Analysis Having a dream since the 1970’s of owning their own restaurant, Hoosier Burger owners realized that dream when they noticed a for sale sign in the window of Myrtle’s Family restaurant while driving one day. After purchasing the business, the owners, Bob and Thelma Mellenkamp identified the need for an information system (IS) project in order to support their needs for a system that supported inventory control, customer services, marketing, and food preparation. The system has a strategic focus on improving day-to-day operations for the company, assisting Bob and Thelma in their duties as company executives. (Valacich, George, & Hoffer, 2009, p. 28) The systems development life cycle (SDLC) became an important part to the development of an effective system for Hoosier Burger. The goal of this system was to modernize the information system, by implementing four key steps of SDLC, (1) planning and selection, (2) analysis, (3) design and (4) implementation and selection. This improved system would replace the current system of paper records for the inventory control, customer orders, and management reporting systems. In addition, Bob and Thelma considered a point of sale (POS) system, which would allow them to generate reports that are more detailed and track inventory more accurately. As a family...

Words: 1787 - Pages: 8

Free Essay

Accounting Inf Systems

...1. This is an example of an RFID system with a very limited range (less than 8 inches): A) NFC system B) LAN system  C) MICR system D) WAN system Table for Individual Question Feedback | Points Earned: | 1.0/1.0 | | 2. A POS device is usually attached to a: A) Cash register B) Keyboard C) Bank check D) Printer E) Computer mouse Table for Individual Question Feedback | Points Earned: | 1.0/1.0 | | 3. The reason why processor speeds are not important to AISs is because: A) Most AIS processing is performed on weekends anyway B) Most computers are I/O bound C) Microcomputers are so inexpensive these days D) There are so many of them in the world today Table for Individual Question Feedback | Points Earned: | 1.0/1.0 | | 4. Which of these measures how close a biometric reading is to a prerecorded template? A) Legacy amount B) PDA reading C) Hamming distance D) Match percentage Table for Individual Question Feedback | Points Earned: | 1.0/1.0 | | 5. The special cards that users can store in their cars to gain access to parking lots and breeze through collection booths on toll roads are examples of: A) POS systems B) RFID systems C) MICR systems D) NFC systems Table for Individual Question Feedback | Points Earned: | 1.0/1.0 | | 6. The hardware of a computer system includes the computer itself and other devices that help the computer perform its tasks. These “other devices” are commonly also called: A) Helper equipment  ...

Words: 1173 - Pages: 5

Free Essay

Infs 1602 Assignment a

...Business Information Systems Introduction With the advent of modern technology, the Internet has replaced most ways of obtaining information. One such method of obtaining information is crowdsourcing. Crowdsourcing has revolutionized the way services are rendered, with an online community taking up the tradtional role of suppliers. Forever 21, the popular American fashion retail chain has hired a leading international consulting firm to advice on global crowd sourcing. As a junior consultant, specializing in Information Systems at the firm, I have been tasked with recommending crowdsourcing strategies for Forever 21. In doing so, I shall investigate the crowdsourcing phenomenon and aim to identify the best crowd sourcing strategy for Forever 21. The client has identified platforms such as Amazon Mechanical Turk (MTurk), Freelancer, oDesk, Would You Rock This (WYRT), and Spoonflower to be off particular interest. As a junior consultant, I have thus evaluated these platforms and then put forward my recommendation on the best crowdsourcing platform. One that I believe is capable of posing radical challenges or opportunities in line with Forever 21’s objectives and operations (Allen, 2011). In-Depth Analysis of the Various Types of Crowd Sourcing Platforms In this section, I shall conduct an in-depth analysis of the aforementioned crowd sourcing platforms on the basis of their target markets (Barnes, Hinton, & Mieczkowska. 2003). Amazon Mechanical Turk (MTurk): The Amazon...

Words: 2400 - Pages: 10

Premium Essay

Week 5 Inf 325

...Kimberly Smith INF 325 Telecommunications & Networking Concepts Instructor: Karmaveer Koonjbearry September 7, 2015 Discusses the Differences Between ‘Implementation’ and ‘Policy’ and Describes the Importance of Their Separation Management defines information security policies to describe how the organization wants to protect its information assets. After policies are outlined, standards are defined to set the mandatory rules that will be used to implement the policies. Some policies can have multiple guidelines, which are recommendations as to how the policies can be implemented. Finally, information security management, administrators, and engineers create procedures from the standards and guidelines that follow the policies. This is a major flaw in the linear model because policies often change as they move through bureaucracies to the local level where they are implemented. ‘Implementation always makes or changes policy to some degree’, (Lindblom 1980). ‘Policy implementers interact with policy-makers by adapting new policies, co-opting the embodied project designs or simply ignoring new policies, hence underscoring the fact that implementers are crucial actors whose actions determine the success or failure of policy initiatives’, (Juma and Clarke 1985). Better practice implementation plans are scalable and flexible. They reflect the degree of urgency, innovation, complexity and/or sensitivity associated with the particular policy measure, and provides sufficient...

Words: 1375 - Pages: 6

Premium Essay

Inf 340 Building a System

...What makes a strategy a winner? Please provide some examples. Ans. 1. Three questions can be used to test the merits of one strategy versus another and distinguish a winning strategy from a losing or mediocre strategy: a. How well does the strategy fit the company’s situation? i. To qualify as a winner, a strategy has to be well matched to industry and competitive conditions, a company’s best market opportunities, and other aspects of the enterprise’s external environment. Unless a strategy exhibits a tight ft with both the external and internal aspects of a company’s overall situation, it is likely to produce less than the best possible business results. b. Is the strategy helping the company achieve a sustainable competitive advantage? i. The bigger and more durable the competitive edge that a strategy helps build, the more powerful and appealing it is. c. Is the strategy resulting in better company performance? i. Two kinds of performance improvements tell the most about the caliber of a company’s strategy: (1) gains in profitability and financial strength and (2) gains in the company’s competitive strength and market standing. 2. Strategies that come up short on one or more of the above questions are plainly less appealing than strategies passing all three test questions with flying colors. CORE CONCEPT: A winning strategy must fit the enterprise’s external and internal situation, build sustainable competitive advantage, and improve company performance...

Words: 798 - Pages: 4

Free Essay

Inf 103 Artificial Intelligence

...Intelligence is defined as, “A typical dictionary definition might suggest that it is the "capacity for learning, reasoning, understanding, and similar forms of mental activity," (Bowles, 2010). Artificial Intelligence is defined as, “artificial intelligence (AI): a computer that simulates or achieves true intelligence”. (Bowles, 2010). As artificial intelligence means to be able to achieve intelligence, can this be done? Can a computer think? Computers know as much as the programmer has put into it. It does not come up with new ideas on its own. When it is programmed, it is told, if A = B and B=C, then C=A. This type of formula is telling it what the relationship is and therefore what the answer is. It does not actually think on its own and reasons out its own answer. If a computer can only work off the information/data that it is supplied with, is it truly thinking? Can you ask a computer a question or give it a problem without any prior data and have it use reasoning to find it’s own answer? As to translation bots, they may seem very intelligent, but they are going off data translations that have already been programmed into its memory. If a programmer did not sit there and key in all the translations it needed, the computer would not be able to translate. A computer is a lot quicker then the human brain, but again without the human brain, it is only a box with a few wires hanging from it. I do not believe there will ever be “true” artificial intelligence. We may...

Words: 482 - Pages: 2

Premium Essay

Inf 336 Week 3 Assignment

...Needs Identification and Defining Commercial Equivalents INF 336 June 8, 2014 All companies have some type of supply need and must be able identify the specifications of the needs to be efficient. One of those is knowing the differences between needs identification and defining commercial equivalents and why they should separate these into two stages. They must also be able to interpret the value to their organization when early supplier involvement (ESI) is effectively implemented. Managers must be able to examine the advantages and disadvantages of specifying by performance. Finally, they must be capable of understanding strategic requirements. This paper will look more into what exactly this all means. Differences and Values When looking at the differences between needs identification and defining commercial equivalents, one must know why it is preferable to separate this into two stages. It is preferable to separate need identification and defining commercial equivalents into two separate stages because a company must first know what it needs and why it is needed. By doing this the company can identify suppliers with the lower costs, higher quality product or service, or who has the most cutting-edge technology (Leenders, M. R., & Flynn, A. E., 2010). If they are not separated into two stages, any opportunity value may be overlooked. Advantages and Disadvantages When dealing with specifying by performance, the supply professional must know the advantages and...

Words: 493 - Pages: 2

Free Essay

Inf/340 Week 5 Dq 1

...problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ 1 INF340 Week 5 DQ 1 INF/340 Week 5 DQ 1How do analysts generate alternative solutions to information systems problems? INF 340 Week 5 DQ...

Words: 1821 - Pages: 8

Premium Essay

Infs 1602 Assignment B

...Forever 21 CRM and SCM Recommendations INFS1602 Assignment B z3457712 Hiu Kwan Lam, z5060301 Cindy Nguyen, z3406631 Syed Maheen Reza Word Count: 3488 Forever 21 CRM and SCM Recommendations INFS1602 Assignment B z3457712 Hiu Kwan Lam, z5060301 Cindy Nguyen, z3406631 Syed Maheen Reza Word Count: 3488 Executive Summary The purpose of this report is to outline the advantages and disadvantages of cloud- based CRM and SCM solutions, how it can enhance a business’ customer relationships and supply chain as well as balancing the risks of the use of this technology with the benefits. This report will firstly illustrate the benefits and disadvantages of implementing a cloud-based CRM and SCM solutions, in comparison to traditional on-site processes to assist Forever 21 in making a decision whether to use these CRM and SCM solutions or not. It will then describe how CRM and SCM solutions can maintain customer relationships and retention through the leveraging of an enhancing the efficiency of supply chain management and tailoring the product range through the use of these technologies. This report will accentuate the security, ethics and privacy issues that are associated with cloud-based CRM and SCM solutions. A recommendation of a specific vendor for cloud-based CRM and SCM solutions will then be provided to assist the CIO of Forever 21 in making a decision which is most suitable to a retail business such Forever 21. Table of Contents Executive Summary 2 Introduction...

Words: 5235 - Pages: 21

Premium Essay

Inf 103 the Future of Cloud Computing

...The Future of Cloud Computing Wesley Rhoades INF 103 Computer Literacy Anjit Bose, MBA December 2, 2013 Imagine a world where everything is ran by a network of computers centralized in one specific location. Businesses no longer required hardware and software to store their data on. Students didn’t have to sit in a classroom behind a desk listening to a teacher lecture them for an hour at a time. Imagine the money you would save just for the commuting alone. Warehouses that make and ship goods for companies could all be tracked by a bar code and becomes accessible wherever there is an internet connection. This is the future of cloud computing. Cloud computing has become another popular term after Web 2.0. However, there are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. On the other hand, cloud computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established grid computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast cloud computing with grid computing from various angles and give insights into the essential characteristics of both. Cloud computing is something that a great many people have spent a good amount of time pondering. We’re seeing a new trend in software deployment and flexibility goal sets, and as a result, the future...

Words: 1735 - Pages: 7