Sony Targets Laptop Consumers in China: Segment Global or Local?

Author(s):  
Kent Grayson ◽  
Sachin Waikar

The manager of the Sony VAIO personal computer in China has been given two segmentation studies. One study is country-specific and product-specific. The other is a global segmentation study, which covers all regions and all of Sony's many consumer electronics. Which segmentation study should the manager rely on---or is there a way to rely on both? After deciding which study is best, which consumer should the manager target, and with what position?To provide a basis for students (with the help of their lecturer or professor) to answer the following questions: What are the general purposes of a market segmentation study, and what are some of the associated challenges? Is it better for a segmentation study to provide information about the likelihood of category purchase or the likelihood of brand purchase? What are the plusses and minuses of a global versus local segmentation study, and what are the marketing implications of each?

2021 ◽  
Author(s):  
Valerie Molina

The aim of this critical literature review is to define the connection between immigration policies and the construction of a national identity, and to discuss what the implications of such connections may be. Tracing how the legal subjectivity of the migrant has developed throughout time and through policy reveals how messages about the nation and Others are created, sustained, and circulated through legal policies. What values are implicit within Canadian immigration policy? How does the migrant ‘other’ help ‘us’ stay ‘us’? How do nationalist ideologies construct the Other and how is this reflected in labour market segmentation? Constructing a national identity involves categorizing migrants into legal categories of belonging, a process in which historical positions of power are both legitimized and re-established through law. Discourses about temporary foreign workers provide examples of how the Other is framed in limited terms and in opposition to that of legitimate members of Canadian society. Key Terms: Citizenship, discourse, subjectivity, immigration law, identity, power, humanitarianism, temporary foreign workers, labour market segmentation.


Locked Out ◽  
2019 ◽  
pp. 23-46
Author(s):  
Evan Elkins

Chapter 1 explores regional lockout’s assemblage of technology, distribution, regulation, and culture through the DVD region code. In order to preserve traditional market segmentation practices, Hollywood convinced consumer electronics manufacturers to develop a DRM system wherein DVDs and DVD players are assigned a numerical “region code” based on their respective geographic territories. The codes in the software and hardware must match before the DVD will play. Chapter 1 details the DVD region code’s history, showing how the system was put in place and governed through complex negotiations and alignments among content creators, electronics manufacturers, and governing bodies. The chapter argues that the system is not only a hard-nosed form of technological and distributional control but also a system of symbolic global representation that clusters certain territories together and ranks those clusters within economic and cultural hierarchies.


Author(s):  
Vasily G. Moshnyaga

With the explosive use of personal computers or PCs, reducing computer energy consumption is paramount for sustainability. The display is the largest energy consumer in a personal computer. Current display energy management technologies ignore the attention of the PC user and therefore may either switch the display off when the user looks at the screen or lose energy by keeping the display on when nobody looks at it. This chapter discusses a new display energy management technology and outlines its implementation in a personal computer system. Unlike existing technologies, which “sense” a PC user through keyboard and/or mouse or the other sensors, this technology “watches” the user through a single camera or CMOS vision sensor. The technology tracks the user’s eyes, keeping display active only if the user looks at its screen. Otherwise, it dims the display down or even switches it off to save energy. The authors implemented the technology in software and hardware and present the results of their experimental evaluation.


2019 ◽  
Vol 27 (3) ◽  
pp. 373-392
Author(s):  
Adenekan Dedeke ◽  
Katherine Masterson

Purpose This paper aims to explore the evolution of a trend in which countries are developing or adopting cybersecurity implementation frameworks that are intended to be used nationally. This paper contrasts the cybersecurity frameworks that have been developed in three countries, namely, Australia, UK and USA. Design/methodology/approach The paper uses literature review and qualitative document analysis for the study. The paper developed and used an assessment matrix as its coding protocol. The contents of the three cybersecurity frameworks were then scored to capture the degree to which they covered the themes/items of the cybersecurity assessment matrix. Findings The analysis found that the three cybersecurity frameworks are oriented toward the risk management approach. However, the frameworks also had notable differences with regard to the security domains that they cover. For example, one of the frameworks did not offer guidelines with regard to what to do to respond to attacks or to plan for recovery. Originality/value The results of this study are beneficial to policymakers in the three countries targeted, as they are able to gain insights about how their cybersecurity frameworks compares to those of the other two countries. Such knowledge would be useful as decision-makers take steps to improve their existing frameworks. The results of this study are also beneficial to executives who have branches in all three countries. In such cases, security professionals could deploy the most comprehensive framework across all three countries and then extend the deployment in each location to meet country-specific requirements.


Author(s):  
Qing Wu ◽  
Colin Cole

Conventionally, force elements in longitudinal train dynamics (LTD) are determined sequentially. Actually, all these force elements are independent from each other, i.e., determination of each one does not require inputs from others. This independent feature makes LTD feasible for parallel computing. A parallel scheme has been proposed and compared with the conventional sequential scheme in regard to computational efficiency. The parallel scheme is tested as not suitable for LTD; computing time of the parallel scheme is about 165% of the sequential scheme on a four-CPU personal computer (PC). A modified parallel scheme named the hybrid scheme was then proposed. The computing time of the hybrid scheme is only 70% of the sequential scheme. The other advantage of the hybrid scheme is that only two processors are required, which means the hybrid scheme can be implemented on PCs.


1991 ◽  
Vol 3 (5) ◽  
pp. 379-386
Author(s):  
Hesin Sai ◽  
◽  
Yoshikuni Okawa

As part of a guidance system for mobile robots operating on a wide and flat floor, such as an ordinary factory or a gymnasium, we have proposed a special-purpose sign. It consists of a cylinder, with four slits, and a fluorescent light, which is placed on the axis of the cylinder. Two of the slits are parallel to each other, and the other two are angled. A robot obtains an image of the sign with a TV camera. After thresholding, we have four bright sets of pixels which correspond to the four slits of the cylinder. We compute by measuring the relative distances between the four points, the distance and the angle to the direction of the sign can be computed using simple geometrical equations. Using a personal computer with an image processing capability, we have investigated the accuracy of the proposed position identification method and compared the experimental results against the theoretical analysis of measured error. The data shows good coincidence between the analysis and the experiments. Finally, we have built a movable robot, which has three microprocessors and a TV camera, and performed several control experiments for trajectory following.


2021 ◽  
Vol 45 (1) ◽  
Author(s):  
A. S. Chechko ◽  

The problem of the description of artificially present industrial noises which are available at operation of personal computers is considered in work. These noises have both positive and negative effects when protecting the information typed by the user by means of the USB keyboard interface. The difficulties that arise in this case are due to the fact that the indirect radiation of electromagnetic fields is observed during the operation of all elements of computer technology. On the one hand, the presence of these noises distorts the useful signal, which in turn prevents the attacker from detecting reliable information that is transmitted. On the other hand, these noises prevent the creation of appropriate measures to ensure complete protection when typing by a user of a personal computer. The paper proposes to consider industrial noise in the form of three random processes, which are described by Johnson distributions.


2017 ◽  
Vol 29 (1) ◽  
pp. 183-199 ◽  
Author(s):  
Qin Su ◽  
Weiyan Liu

Purpose The purpose of this paper is to examine the issue of optimal pricing strategies for two substitutable products from the same product platform and the effects of variations in product architecture. Design/methodology/approach The authors design a product line which consists of two substitutable products and use a traditional market segmentation research framework to analyze the pricing and product design strategies. Findings It is concluded that profit tends to rise in a centralized supply chain at the expense of market share of the integral product. In a decentralized supply chain, one product will reduce its market share so as to enhance the degree of modularity. Although enhancing the extent of integration of a product will bring in more flexibility during the design of the product line, this will do so at the expense of the market share of the other product. Originality/value The authors find that the two products form a product line and share a common module belonging to the platform, so any changes in the modules (changes in product architecture) not only affect the product in question but also the other one in the product line.


2014 ◽  
Vol 48 (1_suppl) ◽  
pp. 37-99 ◽  
Author(s):  
Frédéric Docquier ◽  
Giovanni Peri ◽  
Ilse Ruyssen

In this study, we use cross-country bilateral data to quantify a two-step process of international migration and its aggregate determinants. We first analyze which country-specific factors affect the probability that individuals join the pool of potential (aspiring) migrants. Then, we consider the bilateral and destination country factors that affect the frequency at which potential migrants turn into actual migrants. Using information on potential migrants from World Gallup surveys and on actual migrants from national censuses for 138 origin countries and 30 major destinations between 2000 and 2010, we analyze economic, policy, cultural, and network determinants of each step. We find that the size of the network of previous migrants and the average income per person at destination are crucial determinants of the size of the pool of potential migrants. Economic growth in the destination country, on the other hand, is the main economic generator of migration opportunities for a given pool of potential migrants. We also find that college-educated exhibit greater actual emigration rates mainly because of better chances in realizing their immigration potentials, rather than because of higher willingness to migrate.


Sign in / Sign up

Export Citation Format

Share Document