Datavast Case Study Answers

Improved Essays
Datavast Study Case

1. Describe the data storage industry in China in this case. Include comments on technology and issues in accepting new technology.

The data storage industry in China is relatively new and undeveloped. According to Hao, 40 per cent of SMEs don’t create backups of the firm’s information; 20 per cent still use CD for this purpose, which can be easily lost or broken and has capacity to store only 0.73 GB; and 30 to 40 per cent use external hard drives, that can store 2 TB, but also can be lost or damaged. On the other hand, large companies often store their core data in integrated backup systems, a higher costly reliable option offered by multinationals IT solution providers that has the highest level of customization
…show more content…
Compare and contrast IT suppliers and system integrators (SI). What are the implications for Datavast and the DSB technology?

IT suppliers sell individuals components separately and provide low prices. They buy products from a manufacturer and mark-up the price to receive a slightly margin on sales. IT suppliers have a huge portfolio of products, but they don’t have much knowledge about them. Thus they only recommend products occasionally, if they are asked to do so.
On the contrary, systems integrators purchase products from manufacturers and turn it into to a full-package of solutions to the IT departments of the companies. They meet regularly with their clients and point what needs to be improved in the customers’ IT department. SI also recommend products and give technical support for the clients. They basically have the role of a consultant.
Since private-cloud storage is a new and unknown form of data backup in China, Datavast has to educate the public about the capabilities of the Data Security Box. Its product has large storage capacity, uses encryption to protect the data, it is resistant, unmovable, and less expensive than integrated back-up systems and it is hosted on the client’s own site. The access can be done virtually through the firm’s
…show more content…
What is the decision Hao has to make? What are his alternatives? What are the risks of each alternative?

Hao has to decide in which segment he will offer his new product. He can either opt for target small-to-medium business or large companies. If Datavast targets large firms, it could charge RMB400,000 for the Data Security Box to the Systems Integrator, who would mark-up the price to sell to its clients and receive from Datavast 30 per cent margin on each sale (they usually make 10 per cent). Although Datavast margin on sales would be 75 to 80 per cent, the selling cycle would take a long time to be completed – two to three months –, because the decision-making processes are long and bureaucratic in this segment.
If Hao opts for the SMEs, he would have to sell the Data Security Boxes for lower prices (approximately RMB7,000) to the IT supplier, who would mark-up the price to make a small margin on sales. Although Datavast margin on sales would be 50 per cent because of the servicing costs, the sales cycle would be completed much faster than it would for large companies – two to three weeks –, which could provide a faster growth.

5. What do you recommend to Hao? Support your recommendations with

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hrm 531 Week 4 Paper

    • 570 Words
    • 3 Pages

    In 1996, the manufacture vice president Lucas Moore recommended that the company should purchase the Effective Management Systems, Inc. (EMS) the Time Critical Manufacturing package will operate on several of their systems. The initial startup cost of $220,000 up front and yearly maintenance contracts is available for $55,000 per year. Effective Management Systems, Inc. will provide a limited amount of personalized modifications to the software, and the company will pay $60 an hour for labor. Mr. Lucas pointed out that even though the company MIS department was designing their own system, it would take two years to acquire the system at a cost of $400,00 not taking into account that the parts and other components are not included in the price presented to them (Brown, DeHayes, Hoffer, Martin, & Perkins, 2012). Moore does not have a lot of experience in the manufacturing and was not employed at the company when they tried software implementation earlier, which did not meet the expectation the company expected company.…

    • 570 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Volume License Agreements. Organizations should assess their software usage and determine opportunities to renegotiate agreements and take advantage of VPA discounts. Assuming average software expenditure of $1,500 over five years, the leverage of VPAs can save: $75 per PC x 2,500 = $187,500 5. Maintenance Negotiating Power. An updated inventory is essential to renegotiating a maintenance contract.…

    • 596 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Acquiring an existing firm is easier than establishing a new subsidiary, but it comes with its challenges. Looking at Datasil firm’s case, it is clear that the organization is going through a very tough time. There are problems within various departments as well as in the top management. With the threat of collapse after losing sales, it is important that the root causes of these problems be diagnosed, analyzed and amended to bring the firm back to its feet.…

    • 1998 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Roles of Core Technologies in an Effective IT System Technology permeates all aspects of modern civilization. It is woven into the fabric of our daily lives. What was once barriers to knowledge and communication have been stripped down as we are now connected, in an instant, to the farthest reaches of the globe. With every new advancement comes an opportunity to usher in a revolution in how societies live, work, and play. The major players that make it all possible are the men and women who create and manage the technology we use today.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    This project’s goal was to see if the application integration can be used to compile the various types of applications together, such as legacy systems, e-business solutions, databases and ERP applications. The downside of the project was that the IT department spent 60% of total pilot implementation time on system’s design and 40% on system’s development. It took a long time as a number of systems have to be changed or phased out to support an integrated process. Also, it was difficult to collaborate to automate and redesign the…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Confidentiality: Only the authorized people can access the data, no other persons cannot access the data or accounts. Integrity: only the authorized person can change the data, no other people cannot access it. Availability: The data should be available to the authorized users 24/7.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Advertising Research Brief Due Date 12 October 2016 Claudi van der Merwe Section 1 Yes, I believe that Cell C researched their target market before they decided to rebrand and reposition themselves. They did primary and secondary research.…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hr Audit Paper

    • 1056 Words
    • 5 Pages

    HR Audit Strategic Management of Human Capital Jasmine Flores [Date Submitted] HR Audit Introduction Any organization faces an essential requirement to follow a certain number of rules, regulations, practices and other detailed procedures for staying on the path of success. For an organization to be successful, some of the most significant aspects which can assist it in relation to this include different instances of HR metrics. By following and monitoring significant HR metrics, a company can deal with issues effectively and raise the standards of its operations and outcomes in an informed manner.…

    • 1056 Words
    • 5 Pages
    Improved Essays

Related Topics