Free Essay

Cis-320-Ol009 Design Activities

In: Business and Management

Submitted By torrales
Words 1643
Pages 7
Design Activities-Written Assignment4
Benjamin Torrales
Thomas Edison State College

The purpose of this document is to further understand the different activities that are performed during the Design Phase of the Software Development Life Cycle. Design Activities are done in parallel and is composed of Network Integration, Application Architecture and Software, User Interfaces, System Interfaces, Database Integration, Design Details, and Integration of System Controls (Satzinger, Jackson, Burd 2008, pg. 330). One should take into consideration that some of the details utilize in Design Activities are output of the System Analysis Phase (Satzinger, Jackson, Burd 2008, pg. 330). Furthermore each of the activities will generate a blueprint for the final design documents (Satzinger, Jackson, Burd 2008, pg. 330).

Design Activities-Written Assignment 4
Design Activities utilizes a lot of the outputs generate by the Analysis Activities (Satzinger, Jackson, Burd 2008, pg. 330). It is during the Design Activities that a detail system is drawn and this is when a specific technology is recommended (Satzinger, Jackson, Burd 2008, pg. 330). Every activity in this phase becomes part of the final design and part of the design document (Satzinger, Jackson, Burd 2008, pg. 330). The Design activities is composes of seven different tasks that are executed at the same time in the Design Activities phase (Satzinger, Jackson, Burd 2008, pg. 330). As part of this research/essay document we will dive further into these different activities. The goal of this document is thoroughly discuss the different user, system interfaces. We will look at database integration, and the various controls. We will get a further understanding who should be involved for each activity, and the importance of each activity. We will uncover the benefits of standardization, documenting findings, and why is important to obtain user and management sign off during the process.

Design and Integrate the Network
During the Design and Integrate Network activity it will be determined how the systems will communicate in the organization (Satzinger, Jackson, Burd 2008, pg. 331). Though systems and network s can be built and implemented together normally a system will be implemented as part of an existing network (Satzinger, Jackson, Burd 2008, pg. 331). When designing a system there should be certain considerations to the Network limitations and during the design activity one should consider technical issues, reliability, security, throughput, and synchronization (Satzinger, Jackson, Burd 2008, pg. 331). Though all steps are important this step is critical since it will determine if the proposed system will be part of a new network or part of an existing network as stated earlier if part of an existing network we would need to consider the limitations of that network and provide alternative solutions that can fit the limitations of the existing infrastructure. During this step it is imperative to get users and the Information Technology Group. From a personal experience with more than ten years in the field I like to engage users as much as possible because they are ultimately the people that will utilize the system and the people most likely complain about any network deficiencies. From and the Information Technology we can gather a lot of the backbone of the infrastructure such as Router, Switches, connection speeds, and if there are any other systems that can cause problem with the proposed solution.
Design the application architecture and software
Design the Application Architecture and Software activity determines the role of each user and/or group. Furthermore, it is during this phase that the workflow is determined and the interaction between the system and people is materialized (Satzinger, Jackson, Burd 2008, pg. 331).
As part of this activity it is determined if the system would be new or replacing an old system. Normally based on experience if the system implemented is new there is more work to be done since all access policies will need to be determined and the actual workflow designed. However, if the system being implemented is replacing an old system then most right access and policies will remain the same. It is imperative to understand the system activities and what are the expectations from the new system. If remote access is required the infrastructure needs to be in place to support request in addition another area that should be taken into consideration is growth since this will guide the design from a hardware perspective (Satzinger, Jackson, Burd 2008, pg. 331). Though users are important for this step the Purchasing Directors or Department, Managers should be involved in this step since they will need to sign off in hardware and software purchase.
Design the User Interfaces
The Design the User Interface activity guides the Design according to each user role in the organization (Satzinger, Jackson, Burd 2008, pg. 332). From an end user perspective the User Interface is the system this is where the user will interact with the system conceptually, perceptually, and physically (Satzinger, Jackson, Burd 2008, pg. 332). As we work similar throughout these activities one must consider how the system will be used by the end user web based, mobile devices, operating systems, and browsers (Satzinger, Jackson, Burd 2008, pg. 332). One of the main challenges I find based on experience is that when a system is access by the end user as web based application it depends on the type of Web Browser being used you can have different views to the system which can be problematic to the end users and those supporting the web application. This activity is important because it provides the value of the system providing the end users to be efficient and return on investment to stakeholders. It is important for End User to be involved and sign off on this activity and for managers to sign off on it if it meets the requirements of the end users.
Design System Interfaces
The Design System interface activity focuses on the interaction of the new system with legacy systems. As part of this activity the Systems Analyst should be aware of all the system that is part of the organization infrastructure (Satzinger, Jackson, Burd 2008, pg. 333). Furthermore when designing the system interface one must take into consideration any connections either internal to the company or third party vendors external to the company (Satzinger, Jackson, Burd 2008, pg. 333). It is important to have Managers and head of Department involve during this activity since it provides the System Analyst to understand how the system will interact with other systems. This step will be important specially if integrating with current systems.
Design and integrate the Database
The Design and Integrate the Database activity is filled with many technical challenges and requirement that an Analyst should consider (Satzinger, Jackson, Burd 2008, pg. 333). Integration of the New Database with legacy system is important since it will allow for backward compatibility in addition it will allow the new database structure to access old records from the new system if necessary. As technology and roles in the organization changes all the tables and attributes must be taken into consideration when the database of the system is designed. It is important for the Information Technology or Information System Department to be involved during this activity since they can provide the backend information required to integrate the new database system (Satzinger, Jackson, Burd 2008, pg. 333).
Prototype for Design Details
The Prototype for Design Details activity acts as a testing phase for the system to be implemented (Satzinger, Jackson, Burd 2008, pg. 333). In addition to performing testing this activity functions as a guide that will ensure that all the design activities have been understood and it meets the requirements of the project (Satzinger, Jackson, Burd 2008, pg. 331). This in essence shows the ability of the new system to be integrated with the current infrastructure (Satzinger, Jackson, Burd 2008, pg. 334). During this phase is important to have Management, Information Technology, and End Users involved. This will require an all hands on Deck from a System Perspective so feedback is provided and allow for tweaking the system and move forward.
Design and Integrate the System Controls
Last but not least the Design and Integrate the System Controls provides the robustness required for the system to operate protecting the organization most valuable assets which is the information generated from the Data (Satzinger, Jackson, Burd 2008, pg. 334). Security plays a major role and access by hackers can cause harm to a company systems causing major setbacks in the organization (Satzinger, Jackson, Burd 2008, pg. 334). The different level of access and security can deter hackers from accessing your system (Satzinger, Jackson, Burd 2008, pg. 334). Since security as a major role a security consultant should be consider for this activity (Satzinger, Jackson, Burd 2008, pg. 334). At all time the data and information generated by the system should be safe and secure (Satzinger, Jackson, Burd 2008, pg. 334). The individuals that should be involved for this would be management and the information technology department since it requires for Management to guide approval on the various access levels and the information technology will be the individuals responsible for executing the policies.
As part of this conclusion we will need to take into consideration all the different activities that will part of the Design process. Furthermore one must take into consideration that all the activities work in parallel and that standardization of the process can help in greatly improve the activity of the Design. In addition one must consider that all the steps will required to be documented. It is imperative to get user and management sign off which will work as an approval. This will make sure that all the requirements have been met from an User and Management perspective.
Satzinger, John W.; Jackson, Robert B.; Burd, Stephen D. (2008-03-28). Systems Analysis and Design in a Changing World. Cengage Textbook.…...

Similar Documents

Free Essay

An Activity-Oriented Design Framework for Mobile Learning Experience

...Education An Activity-Oriented Design Framework for Mobile Learning Experience Huanglingzi Liu Nokia Research Center, Beijing Jyri Salomaa Nokia Research Center, Beijing Ronghuai Huang Beijing Normal University Ding Ma Beijing Normal University Abstract This paper proposes a conceptual design framework for mobile learning (mLearning) mainly based on the reflection and action research results of Nokia Mobiledu project, which was recently launched in China and is targeted especially for learning English. The framework involves five stages: mLearning activity design, requirement and constraint analysis, mLearning scenario design, mLearning technology environment design and mobile learner support services design, in which mLearning activity design plays a key role in a systematic design procedure for mLearning experience. 1. Background In China, there are more than 600 million mobile phone users and people are spending more time on the road or commuting. There is a big growth potential for mobile learning in China. Nokia recently set up China’s first interactive mobile learning service Mobiledu (, with the aim to enrich people’s learning experiences anytime anywhere in a most convenient way with their mobile phones. Reflecting on the design and development process of Mobiledu and other mobile learning projects, this paper describes an activity-oriented design framework......

Words: 1648 - Pages: 7

Free Essay

Is Design

...umani. Prin introducerea unui sisteme informatic personalul uman se poate simţi urmărit şi verificat în acţiunile sale, poate fi frustrat de inutilitatea cunoştinţelor şi aportului său faţă de cel al mijloacelor de informatizare, astfel că de aici pot apare incidente de muncă sau utilizarea necorespunzătoare a sistemului. Asemenea situaţii duc la compromiterea SI – chiar dacă acesta este realizat corect. O a treia situaţie de compromitere a sistemului informatic apare atunci când el este realizat după cerinţele beneficiarului, dar acesta din urmă ori nu cunoaşte bine domeniul ţintă, ori nu are soluţii adecvate la problemele sale, ori de-a dreptul nu ştie ce vrea. Aspectele prezentate mai sus nu sunt argumente împotriva introducerii unui SI ci reprezintă situaţii ce trebuie rezolvate atât de proiectant cât şi de organizaţia beneficiară, pentru a asigura un SI de calitate, care să atingă scopurile vizate. Neglijarea aspectelor de mai sus duce la lucrări de calitate proastă, cheltuieli suplimentare şi chiar compromiterea sistemului informatic; poate apare astfel falsa părere că 4 SI este inutil, ceea ce va bloca progresul şi va provoca chiar eliminarea din competiţia globală a organizaţiei respective. Pe de altă parte, este la fel de falsă părerea că o problemă oarecare a unei organizaţii se poate rezolva prin introducerea unui SI fără a se cunoaşte în prealabil soluţia şi a se adapta această soluţie la specificul organizaţiei. Dacă nu se cunoaşte bine problema şi nu se......

Words: 25152 - Pages: 101

Free Essay

Design and Analyses of Experiments was the observation from various students that the subject of design and analysis of experiments can seem like “a bunch of miscellaneous topics.” We believe that the identification of the objectives of the experiment and the practical considerations governing the design form the heart of the subject matter and serve as the link between the various analytical techniques. We also believe that learning about design and analysis of experiments is best achieved by the planning, running, and analyzing of a simple experiment. With these considerations in mind, we have included throughout the book the details of the planning stage of several experiments that were run in the course of teaching our classes. The experiments were run by students in statistics and the applied sciences and are sufficiently simple that it is possible to discuss the planning of the entire experiment in a few pages, and the procedures can be reproduced by readers of the book. In each of these experiments, we had access to the investigators’ actual report, including the difficulties they came across and how they decided on the treatment factors, the needed number of observations, and the layout of the design. In the later chapters, we have included details of a number of published experiments. The outlines of many other student and published experiments appear as exercises at the ends of the chapters. Complementing the practical aspects of the design are the statistical aspects of the analysis. We have......

Words: 308264 - Pages: 1234

Free Essay


...| Team building Activities | | 1. Blind Wine Waiter Team Building Task Overview Teams of six must successfully find, uncork and pour a bottle of wine into five glasses. Each team manner must carry out no more than one element of the task and at least five of the team must wear blindfolds. Pre-Work None required Equipment and Layout One bottle of wine per team, one wineglass per team, blindfolds for 5 members of each team, one corkscrew per team. Running The Activity 1. Introduce this as a light-hearted activity that will improve communication across teams. 2. Divide the group into teams of 6 and ask each team to elect a leader. 3. Hand out blindfolds to all team members other than the leader, instruct all team members other than the leader to put on their blindfold. 4. Ask the team leader to take a seat somewhere close to his/her team and ask him/her to sit on her hands. 5. For each team, position one bottle of wine, one wineglass and one corkscrew in various locations around the room. Take care to ensure that nothing is positioned where it might easily fall or break (eg make sure the wine bottle(s) and glass(es) are placed on the floor against a wall, or in the centre of a table). 6. Tell all participants that their task is to find a bottle of wine, a corkscrew and a wine glass, open the bottle and pour their leader a glass of wine. 7. Tell the participants the rules: - the team leader cannot move from his/her position and......

Words: 6849 - Pages: 28

Free Essay

Its 320

...withdraw(double amount) { balance -= amount; } /** * The addInterest method adds the interest * for the month to the balance field. */ public void addInterest() { interest = balance * interestRate; balance += interest; } /** * The getBalance method returns the * value in the balance field. */ public double getBalance() { return balance; } /** * The getInterest method returns the * value in the interest field. */ public double getInterest() { return interest; } } /** * * Colorado State University – ITS-320 – Basic Programming * * This program demonstrates the BankAccount class. * * (Taken from “Starting Out with Java - Early Objects * (Third Edition) by Tony Gaddis, 2008 by Pearson Educ.) * * Programmed by: Reggie Haseltine, instructor * * Date: June 19, 2010 * */ import java.util.Scanner; // Needed for the Scanner class import java.text.DecimalFormat; // Needed for 2 decimal place amounts public class Program2 { public static void main(String[] args) { BankAccount account; // To reference a BankAccount object double balance, // The account’s starting ......

Words: 1186 - Pages: 5

Premium Essay


...Tori Hatch Written Assignment 1 Games People Play SOS-360-OL009 1. In the movie Princess Bride we are witnessing game theory in action. Game theory is defined as the study of strategic interaction among rational players. There are four elements to games. These elements are players, strategies, payoffs, and common knowledge. These elements, and how they relate to the poison scene in Princess Bride will be discussed below. The first element of a game is the players. There must be at least two players. These players are also assumed to be rational. By rational, we mean that the player will make decisions based on strategies that will give them the most positive outcomes. The second element of a game is strategies. Strategy in this sense represents the decisions that must be made by every player based on his desired payoff. The third element is payoff. Payoff refers to that outcome that is viewed as beneficial to the player. One player’s payoff may not be the same as the other player’s payoff. The fourth and final element is common knowledge. Common knowledge refers to the fact that all the players know the rules of the game. In lecture 1, Mr. Stephens further said common knowledge refers to the fact that everybody knows that everybody knows the rules of the game. In the “Battle of Wits” movie scene, we clearly have two players, the outlaw Vizzini and Wesley. The strategy is to choose the goblet that seemingly does not contain the poison. However, he......

Words: 622 - Pages: 3

Free Essay


...influențe tradiționale - Proiect la Design şi estetica mărfurilor - Coordonator ştiinţific: Asist. univ. dr. Smaranda Giuşcă Studenţi: Florea Mihaela-Raluca Florian Maria Geangu Andreea Ghenea Dana-Roxana Grupa 940, Seria A, Anul III Bucureşti 2014 Cuprins Introducere Capitolul I: Prezentarea generală a produselor cu influențe tradiționale Capitolul II: Exemple reprezentative pentru design-ul cu influenţe tradiţionale 2.1 Ceasul Mora 2.2 Păpușa Matryoshka 2.3 Evantaiul 2.4 Ia românească Capitolul III: Ceasul suedez Mora pe piaţa românească Concluzii Bibliografie Introducere Motivul alegerii stilului tradițional derivă din dorința de a analiza impactul tradiției asupra fiecărei culturi și cum aceasta și-a creat propria cale către autenticitate. Astfel, în acest proiect, vom evidenția câteva dintre caracteristicile stilului cu influențe tradiționale, un stil care se remarcă prin diversitatea trăsăturilor în funcție de regiune, cultură, religie, așezare geografică și alți factori reprezentativi pentru o comunitate sau țară. De asemenea, vom prezenta câteva dintre caracteristicile stilulurilor tradiționale cu influențe suedeze, rusești, chinezești si românești, unele dintre cele mai importante, care și-au păstrat influențele tradiționale, fiind puternic conturate prin multitudinea de caracteristici, prin unicitatea lor și care sunt prezente și astăzi în societatea noastră. Design-ul cu specific......

Words: 3592 - Pages: 15

Free Essay


...User Experience ©Jeff Patton Five topics today: User Experience explained simply and then: Users and modeling what you know about them Usability evaluating & testing it Visual Design guidelines to help visual design to communicate what you intend Emotional Design how do users feel about your software? 2 3 4 User Experience is Built From Dependent Layers Jesse James Garrett’s Elements of User Experience: 5 The Surface Layer Describes Finished Visual Design Aspects Surface Skeleton Structure Scope Strategy 6 The Skeleton Describes Screen Layout and Functional Compartments in the Screen Surface Skeleton Structure Scope Strategy 7 Structure Defines Navigation from Place to Place in the User Interface Surface Skeleton Structure Scope modal wizards task panes modal dialogs Strategy 8 The Places in the User Interface are Built to Support User Task-Centric Scope Surface Skeleton Structure Scope Strategy user tasks: • enter numbers • enter text • enter formulas • format cells • sort information • filter information • aggregate information • graph data • save data • import data • export data • print • ….. 9 Business Goals Drive User Constituencies and Contexts Supported To Form Strategy Surface Skeleton Structure Scope Strategy business goals: • displace competitive products • motivate sale of other integrated products • establish file format as default information sharing......

Words: 2870 - Pages: 12

Free Essay


...Community Service Department Activity Guide Summer 2015 REGISTER ONLINE BEGINNING MONDAY, MAY 4 Create Your User Account – See Page 2 Registration (520) 421-8677 • Summer is upon us and the temperatures will really begin to warm up. Within our summer activity guide, you will find several pages of cool opportunities to combat the heat. The newly renovated Palm Island Family Aquatics Center offers open swimming, special splash events, swimming lessons, a swim team, aerobics and Zumba classes. If you would like to use the facility for a private party or corporate event - those rental opportunities are available as well. Enjoy your summer evenings playing in a few outdoor sports leagues such as softball and pickle ball or indoor activities such as basketball and volleyball. The Len Colla Recreation Center and the Dorothy Powell Senior Adult Center both provide daily exercise, arts and educational programming in a very friendly and comfortable setting. Not to be outdone - both the Main and Vista Public Libraries offer a tremendous assortment of youth, teen and adult programming. The Summer Reading Program kicks off on Saturday, May 30th at the Main Library, please circle that date and stop by and enjoy the festivities. Both libraries will also be hosting free technology classes throughout the summer for those 18 years of age and older. Learning is a very cool thing! You will also notice several enhancements being made this summer......

Words: 6060 - Pages: 25

Premium Essay

Systems and Design

...CIS 335 Case Study Bundle 2a: Due Monday, Sept. 1. How does strategic planning influence day-to-day business operations? Why is it important for systems analysts to understand a company's strategic plan? Answer: A strategic plan looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future. Because the firm's IT group will be expected to deliver IT resources, IT managers must understand and participate in strategic planning. Strategic planning starts with a mission statement that reflects the firm's vision, purpose, and values. Mission statements usually focus on longterm challenges and goals, the importance of the firm's stakeholders, and a commitment to the firm's role as a corporate citizen. 2. What is a SWOT analysis? Prepare a SWOT analysis of your school or your employer. Answer: The letters SWOT stand for strengths, weaknesses, opportunities, and threats. A SWOT analysis can focus on a specific product or project, an operating division, the entire company, or the mission statement itself. Strengths – Affordable, comprehensiveness, quality, and growth of online education Weaknesses - lack of financial support for faculty Scholarship Opportunities - international and off-campus study and exchange programs Threats - risk of losing prominent faculty and staff for genuinely better opportunities at other schools. 3. What is an effective way to assess user requests for additional features and functions? ...

Words: 2037 - Pages: 9

Premium Essay

Cis 417 Week 4 Assignment 2 Forensic Lab Design

...CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: 1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs. 2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. 3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. 4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 4 Assignment 2 Forensic Lab Design in order to ace their studies. CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 640 - Pages: 3

Premium Essay

Cis: Network Design Paper

...Network Consultation Introduction to Networking June 19, 2016 Network Design DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance. I recommend using a Local Area Network (LAN) design to efficiently fulfill this request. According to Agarwal & Tayal (2009), “The main reason for designing a LAN is to share resources such as disks, printers, programs, and data. It also enables the exchange of information.” Using a server based LAN, DesignIT can manage its six computers through by accessing the main computer from the three servers which can be located in the server room as indicated on the design layout. There are several advantages of LAN such as: * It allows for a large number of users to access data from a single memory. * Files are stored on single memory. * The processing can be done by numerous of users simultaneously. * Low cost. * Resource sharing. * Every device can communicate with any other device. * Independent devices are interconnected with high degree Compared to other area networks, the LAN is ideal for being used in a small area such as an office building. LAN has the lowest error rates, highest speed in transmission and uses the most inexpensive equipment such as Ethernet and token rings. Network Architecture DesignIT is a small business that is expanding and requires additional workstations. As the company continues to grow, there is a natural......

Words: 1188 - Pages: 5

Premium Essay

Sos 440 Ol009 Wa2

...Terrorism SOS 440 OL009 Written Assignment 2 What is more important in determining terrorists' motives: the psychology of the individual or the sociological impact of the group? In order to achieve an understanding as to what motivates terrorists, we need to go beyond a psychological approach. In addition to a psychological factor, religion, politics and social surrounding promote a motive as well. Combining these factors can alter the causes, objectives and beliefs of organized terrorist groups. Each terrorist group must be examined within its own cultural, economic, political, and social context in order to better understand the motivations of its individual members and leaders and their particular ideologies. Research has shown that terrorist individuals in large part are not mentally disturbed. Moreover, terrorist groups tend to logically and specifically target “normal people” for recruitment and actively exclude socially unacceptable prospects that might attract unwanted attention to the group. I agree that both factors play a part in this discussion. The psychology of the individual can be very impactful especially in that terrorists are generally so irrationally committed to their purpose that they cannot be reasoned with, nor would they want to be. The sociological aspect of the group will impact each individual terrorist. This is a family they belong to, a union based on faith and political ideologies. It appears to me that peer pressure, fear of......

Words: 465 - Pages: 2

Premium Essay


...basic elements in the communication process. 1.2 Analyze the five C’s of communication. 1.3 Identify two key elements that make individual communication successful. 1.4 Explain six roadblocks to successful communication in groups. 1.5 Discuss the impact of sexual orientation and age on communication. 1.6 Describe the cultural impact on one’s perception of health and its impact on communication. Readings Read the Week One Read Me First. Read Ch. 3, 5, & 10 of Communicating About Health. Read this week’s Electronic Reserve Readings. Participation Participate in class discussion. Ongoing Minimum of 4 days per week 1 Discussion Questions Respond to 2 weekly discussion questions. DQ 1: Thursday DQ 2: Saturday 1 Course Design Guide HCS/320 Version 2 2 Learning Team Instructions Create the Learning Team Charter. Begin developing the Communication Channels Paper due in Week Three. Thursday (Day 3) 2/23/2012 Individual Pre-class Survey Write your responses to the following questions based upon your experience. · What is communication? · What is the purpose of communication? · What is good communication? · What is your understanding of the differences between verbal and nonverbal communication? · What is your experience with team or group communication? · Describe your experience with utilizing formal written communication. Monday (Day 7) 2/20/2012 5 Week Two: Communication Channels in a Variety of Organizations Communication Differences in......

Words: 1293 - Pages: 6

Premium Essay

Bis 320

...Applying Information Security and SDLC to Business Team Names Here BIS/320 Date Applying Information Security and SDLC to Business - Bookstore is known as one of the largest retail online stores in the world. Of course this online retail store was not always the largest and had a shaky slow start because the online layout was not eye-catching. In 1994, Jeff Bezos, who founded started his business in his garage in Washington State selling books. However, in 1994, Nick Hanauer took an interest in Bezos business and invested $40,000, and in 1995 Tom Alburg invested $100,000 to join this venture. After receiving these investments Bezos decided to create a website that would be more appealing to customers and hoped to get his business to take off. Over the next three years Amazon increase in book sales, which amazed Bezos because after an analysis was completed he was shocked to find out outside of local customers who were purchasing books from Amazons but customers around the world. In 1997, Amazon reached revenue in the amount of $15.7 million. By 1998, Amazon was starting to show signs of success when Bezos started listing new products for the customers could purchase online ( Mission Statement, 2012). Vision and Mission - The mission statement for success is centered on their customers and without their customers Amazon would not exist. Although......

Words: 3158 - Pages: 13

Перри Лэнг | Precio más alto | Genuino Sigma AF 17-50mm f2.8 EX DC OS HSM For Nikon