Preview

1. Introduction Distribution Supported Pricing & Design Registration

Better Essays
Open Document
Open Document
1965 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
1. Introduction Distribution Supported Pricing & Design Registration
1. Introduction Distribution Supported Pricing & Design Registration
Most Semiconductor Manufactures choose 2 channels to sell their products. Direct where Value, Quantities or Strategic reasons Manufacturers uses its own sales operations. Remaining customers supported indirectly through distributors, setting distribution bye price to allow the distributor to make margin. Manufactures allow Distributor to apply for Volume or Strategic pricing and getting further discount called supported pricing. Some Products require “Technical Sales and Support” while being "designed in", to encourage and cover additional costs incurred a further distribution price reduction is offered, allowing additional profit from the work. To monitor, and administrate this process a supported price / design registration scheme is set up.
2. The Registration Process.
The Process required the Applications / Sales Engineer to complete paper a registration form: Figure 1 Registration Form
Once a Customer has been visited the form is completed and sent in to the distributor’s office, by fax or post. There a Franchise Manager who has responsibility for controlling and processing the application, checks the form and forwards to the Franchise’s Sales person, who then check the form and if accepted issues the supported pricing or design registration the process is outline in the registration flow diagram below.
There were 2 sets of records, the distributors and the franchise. The Distributor records are duplicated as the FEA Sales and the franchise Manager kept a copy.

Figure 2 Design Registration Flow Diagram
3. Issues with the Registration Process.
1. Updating, synchronisation and access to the records are difficult
2. Customer Identification correct Name Address, Multi Site, with an account, or with out, New customers, Previous account Activity, Competitions activity (Business aligned with other Distributors), Buying Location different to Engineering Location, Use of sub



References: (1) Sekiguchi T 2007 “A contingency perspective of the importance of PJ Fit and PO fit in employee Selection” Journal of management Psychology 118 -131. (2) Porter, M.E. (1979) How Competitive Forces Shape Strategy, Harvard business Review, March/April 1979. (3) Porter, M.E. (1980) Competitive Strategy, Free Press, New York, 1980. (4) Bocij, P., Greasley, A., Hickie, S. (2008) ‘Business Information Systems:Technology, Development & Management, 4nd Edition, FT/ Prentice Hall, (5) European Network and Information Security Agency, United Kingdom Country Report 2010. (6) European Network and Information Security Agency, A users Guide: How to raise Information Security Awareness (7) Centre for the protection of National Infrastructure: Sources of Guidance on Security in the Telecommunications sector

You May Also Find These Documents Helpful

  • Good Essays

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BIS 220 Week 2 Proposal

    • 641 Words
    • 3 Pages

    References: Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: Wiley…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A franchise is a legal agreement between franchisers and franchisees that consents use of the franchise’s trademark and trade name or marketing plan to sell products or services (Kubasek, Brennan, & Browne, 2012, p. 791). Through a franchising arrangement franchisee can profit from implementing another’s efficacious business model. One of the most attractive advantages is the high probability of success of 90 % as compared to 20 % for small businesses (Staring and Naming a Business Presentation, 2012, Slide 9). Other advantages include established franchise reputation, operational support and training, product research and development, and better access to financing. On the downside, business plan rigidity can deprive the quality of customer service and hinder a creative business owner. Thus, both the Clayton Act regulates business competition and price discrimination (15 USC §§ 12-27; 36 Am J1st Monop etc §§ 141, 142) and the Sherman Act is a federal antitrust act (15 USC §§ 1 et seq; 36 Am J1st Monop etc. § 141) protect the public and small business owners from monopolization and market power.…

    • 1470 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    a. The usage of security awareness training to instruct employees of Richman Investments security policies…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Eco-201

    • 617 Words
    • 3 Pages

    How should goods and services be produced. After some research of opening a this franchise I found that the most important recourse to start a franchise is money:…

    • 617 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Retail Buying

    • 3282 Words
    • 14 Pages

    Rainer, R.K. and Cegielski, C.G. 2010. Introduction to information systems: enabling and transforming business. 3rd ed. US: John Wiley & Sons.…

    • 3282 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Bombardier Essay

    • 2243 Words
    • 9 Pages

    [ 3 ]. L. NORRIE, James and Mark W. HUBER, Introduction to Business Information Systems, Mississauga, Wiley, 2010.…

    • 2243 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Problems at Jetblue

    • 524 Words
    • 3 Pages

    References: Rainer, R. K., & Turban, E. (2009). Introduction to Information Systems: Supporting and Transforming Business (2nd ed.). Hoboken, NJ: Wiley…

    • 524 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Levis Research

    • 8552 Words
    • 35 Pages

    The franchisee sells directly to the customers and the distributers sell to the sub-franchisee and the sub-franchisees sell to the customers.…

    • 8552 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    References: [1] Ministry of Transport and Communications, Action Programme "Everyday Security in the Information Society: A Matter of Skills, Not of Luck". Implementation of the government resolution on National Information Security Strategy. Liikenne- ja viestintäministeriön julkaisuja, 51. 2009. http://urn.fi/URN:ISBN:978-952-243-127-1 (downloaded on 1 Feb 2011) [2] Karlsson, B., Bria, A., Lönnqvist, P., Norlin, C. & Lind, J., Wireless Foresight: Scenarios of the Mobile World in 2015. Wiley, Chichester. 2003. [3] Gorniak, S., Ikonomou, D., Saragiotis, P. et al., Priorities for Research on Current and Emerging Network Trends. European Network and Information Security Agency. 2010. http://www.enisa.europa.eu/act/it/library/deliverables/procent (1 Feb 2011) [4] Forge, S., Guevara, K., Srivastava, L., Blackman, C., Cave, J. & Popper, R., Towards a Future Internet: Interrelation Between Technological, Social and Economic Trends. Interim report. Oxford Internet Institute. 2010. http://www.future-internet.eu/publications/view/article/towards-a-future-internetinterrelation-between-technological-social-and-economic-trends.html (1 Feb 2011) [5] Cave, J., van Oranje-Nassau, C., Schindler, R., Shehabi, A., Brutscher, P.-B. & Robinson, N., Trends in Connectivity Technologies and Their Socioeconomic Impacts. Final report of the study: Policy Options for the Ubiquitous Internet Society. RAND Corporation. 2009. http://www.rand.org/pubs/technical_reports/TR776.html (1 Feb 2011) [6] Aumasson, A., Bonneau, V., Leimbach, T. & Moritz, G., Economic and Social Impact of Software and Software-Based Services. Pierre Audoin Consultants. 2010. http://cordis.europa.eu/fp7/ict/ssai/studysw-2009_en.html (1 Feb 2011) [7] Bylund, M., Johnson, M., Lehmuskallio, A., Ovaska, S., Räihä K.-J., Seipel, P., Tamminen, S. & Turunen, M., PRIMA: Privacy in the Making. Final financial and scientific report. 2010. [8] Ovaska, S. & Räihä, K., Teaching Privacy with Ubicomp Scenarios in HCI Classes. Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group.…

    • 17037 Words
    • 69 Pages
    Good Essays
  • Powerful Essays

    100. Follow these General Instructions and the Requirement and Instruction for each Item in franchise…

    • 22833 Words
    • 92 Pages
    Powerful Essays