Sunday, February 23, 2020

Marketing Management Essay Example | Topics and Well Written Essays - 1250 words - 1

Marketing Management - Essay Example Main line of Marriott Marriott International Inc. operates and franchises hotels and lodging facilities worldwide (Marriott-a, 2010). Mr. Marriott has built a culture which is highly regarded and the company recognizes the value that they bring on to the organization. At present around 300,000 people are serving guests under the brand name Marriott and franchised properties throughout the world. Mr. Marriott shifted the company’s business model from hotel ownership to franchising and property management. This allowed the company to accelerate growth and broaden his leadership. This brought up the Marriott International, a hotel management and a franchising company. The company is a leading lodging company with around 3,000 lodging properties in USA and 67 other countries (Marriott, 2011). Marriott International has almost 2300 franchised hotels. The company has won many awards with relation to franchise because of the contribution made to the International Franchise Associatio n. Some of the awards include, 2006 Ronald E. Harrison Award by the IFA, Entrepreneurs of the year in 1984 to name a few (IFA, 2010). Presence of Marriott International JW Marriott Mexico City, Mexico: Marriott International has presence in Mexico with its 5-star hotel offering luxurious and modern accommodation for leisure as well as business travelers. It is located in Polanco district which has a historical importance (Marriott International Inc-b, 2011). Marriott India: In India, Marriott provides state-of-the-art meeting facilities, recreation facilities and personalized getaways in thirteen different cities (Marriott International Inc-c, 2011). China Hotel, a 5-Star Marriott Hotel: Marriott has presence in Guangzhou city of China from which it is connected to Export-Import Fair complex, airport and stations (Marriott International Inc-d, 2011). Marriott Argentina: Marriott International started its operations in Buenos Aires as Marriott Plaza hotel in 1909 and has hosted a num ber of high profile people such as Charles de Gaulle, Theodore Roosevelt, Indira Gandhi etc (Marriott International Inc-e, 2011). Marketing mix Marketing mix is a unique blend of product, price, promotions, offerings and distribution which are designed to meet the needs and demands of the consumers (McDaniel & Gates, 1998, p.3). As the demand of the market changes, the marketing mix also needs to be revised. The company should follow to have a right product at the right price, in the right place and at the right time. In addition to four Ps there is other three other secondary components which is concerned with the service industry. Thus as the project is based upon service industry, therefore the marketing mix would deal with 7 Ps. They are Product Price Place Promotion People Physical evidence and Process (Stone, 2001, p.54). Product The core product of Marriott is the hotel rooms that they provide to its customers. The company has different kinds of brands such as Marriott hotels and resorts, Renaissance hotels, JW Marriott hotels and reports, Autographs collection to name a few (Marriott, 2011). The reason which made Marriott a strong brand is because the company has one concept but they make the concept work differently for different people thus, attracting huge amount of customers. Place Marriott has been operating in many countries in about 68 countries and territories. Countries include USA,

Thursday, February 6, 2020

An IT security consultant Essay Example | Topics and Well Written Essays - 750 words

An IT security consultant - Essay Example This paper will explain four methodologies and how they can be used to protect an organization’s system from being vulnerable. Firewall A firewall is the first in line of a network’s defense mechanisms, which can either be a software application or hardware device. It keeps unauthorized people from accessing the organization’s network by blocking selected outbound or inbound traffic (Vacca 2009). Depending on the implemented type, the firewall allows the network administrator to determine the traffic to be let out or in of the network, and also restricted to specific domain names or IP addresses. There are four firewall mechanisms including application gateway, proxy server, circuit level gateway and packet filtering gateway. With the packet filter, traffic flow into or out of the network is intercepted and evaluated against the rules given by the administrator. Filtering is based on the criteria that the packet filter is able to access the destination and source ports, as well as their IP addresses (Christey 2007). The circuit level gateway bars all inward traffic to any other host, with the exclusion of itself. The client machines within the organization and the circuit level gateway establish connectivity via software run on the clients’ machines. ... The application gateway is a type of proxy server. After internal clients connect to it, it determines whether or not to establish the connection, then connects to the destination machine. All communications are routed from the client to the application gateway, then application gateway to destination machine. Since the gateway is the address viewed by the outside world, the internal network is kept safe. Encryption Encryption is the process of converting information in a way that cannot be understood by unauthorized people (Ardi, Byers & Shahmehri 2006). The information is converted into an unreadable form called ciphertext, and decryption is required to convert it back into its initial for by the recipient. During encryption, the information is encoded into ciphertext using encryption algorithms. An encryption key determines the way the information is encoded. Encryption schemes require algorithms for key-generation in order to produce keys randomly. By use of a decryption algorith m that needs the correct secret decryption key, the authorized party can decode the ciphertext. Key algorithms undo the encryption algorithms’ work. Encryption protects data both in transit and at rest (Zittrain 2008). Data in transit comprises that being transferred across networks like mobile phones or the internet. Data at rest includes files stored on storage devices and computers. Encryption makes it difficult to intercept data on transit, while securing that which cannot be physically kept from being accessed by unauthorized persons. In the case of data at rest, it remains safe in incidents of laptop and back up devices theft. The safest practice is to apply encryption at the time of