Contact Us
Sign In / Sign Up for FREE
Go to advanced search...
Nobody downloaded yet

Protecting Enterprise Customers - Assignment Example

Comments (0) Cite this document
In the paper “Protecting Enterprise Customers” the author discusses M&A as an arena where one might expect a wide consensus about what defines success. However, only 9% of the senior executives defined "success" as an increase in the free cash flow…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Protecting Enterprise Customers
Read TextPreview

Extract of sample "Protecting Enterprise Customers"

Download file to see previous pages M & A is an important strategic option for companies that look to reposition themselves. The merger of Cingular wireless with AT & T has been in the news for quite some time and finally, in November 2005 the merger has taken place. These are not easy decisions and definitely are based on certain expectations and apprehensions. We shall examine here the motives behind this merger and assess the difficulties ahead in achieving its goals.
When AT & T put itself on the auction block and Cingular made the first offer, they did not know how many more bids would be forthcoming and whether the bids would exceed that of Cingular. Cingular and Vodaphone, on their part, expected that AT & T would choose the best bid by the deadline that it had set, which turned out to be incorrect. AT & T was unsure whether Cingular or Vodaphone would increase their bids to an amount it considered sufficient. AT&T Wireless was uncertain of the time between the bids that would be offered.
For months, rumors were widespread that Cingular would finally purchase AT & T so it came as no surprise when they announced the take over at a bid of $41 billion dollars. Many in the industry were surprised at the speed at which the takeover was approved by the FCC and the DOJ. The skeptics were also taken aback at the relative ease with which the company completed its sales processes with AT & T. They went in for a completely new advertising and marketing campaign to educate the customers about the merger. Literally overnight, they could transform thousands of AT & T stores to Cingular stores.
It is yet to be seen who has won or who has lost in this merger but the CEO of AT & T definitely obtained a superior premium for the company and its stockholders. The merger on paper makes Cingular the number one wireless company in the U.S. today. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Protecting Enterprise Customers Assignment Example | Topics and Well Written Essays - 2250 words - 2, n.d.)
Protecting Enterprise Customers Assignment Example | Topics and Well Written Essays - 2250 words - 2.
(Protecting Enterprise Customers Assignment Example | Topics and Well Written Essays - 2250 Words - 2)
Protecting Enterprise Customers Assignment Example | Topics and Well Written Essays - 2250 Words - 2.
“Protecting Enterprise Customers Assignment Example | Topics and Well Written Essays - 2250 Words - 2”.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Protecting Enterprise Customers

Protecting our Environment

Global warming and climate changes are the major outcomes of injudicious human activities. It is believed that sustainment of life in this world may become extremely difficult in near future itself if effective measures were not taken to counter environmental problems.
Even though the size of the earth remains the same, global population is growing at alarming rates so that it may become extremely difficult for our earth to accommodate or cater the needs of all the people. As each individual contributes heavily to environmental problems, growth of population means growth of environmental problems also. In other words, population growth is directly proportional to environmental problems. As the world population grows, so does...
9 Pages(2250 words)Essay


...?Enterprise QUESTION Entrepreneurial is a characteristic that is referred for a person who has entrepreneurial features. It is generally considered as a quality for a person and the person is considered as an asset for the company. An entrepreneur person is a person who is ready to take risks but the level of risks is not at extremes; the risks are neither to easy nor to risky, the person just knows what is right for him and for the company and he knows how to make profit for the company. The person is very sharp minded and can take initiatives for different projects and deals. He is strong, energetic and positive minded, he always looks towards the bright side of any idea and always tries to find benefits in any proposal and the ways...
3 Pages(750 words)Essay

Understanding customers- analysing customers using mosaic

...? UNDERSTANDING S- ANALYSING S USING MOSAIC Table of Contents Section Introduction 3 Section 2: Analysis of the Mosaic Profile System 3 Section 3: Data and information reports by Experian 6 Section 4: Importance of segmentation 10 Section 5: Business case study 12 Section 6: Summary 13 References 14 Section 1: Introduction Satisfying the needs and requirements of customers is the key to success for any organisation now-a-days. Most of the companies try to target a specific group of people after developing a segmentation strategy to group people based on certain parameters. This is an important marketing strategy followed by organisations because it helps in catering to the specific needs of customers in a more effective and efficient way...
8 Pages(2000 words)Essay

Protecting IT: A Roadmap for Securing the Enterprise

...?Protecting IT: A Roadmap for Securing the Enterprise The modern times are driven by technological devices and information enabled setups. Almost allenterprises and business environments are being dominated and run by computer enabled tools and utilities. Ranging from banking sectors, to education departments to business enterprises, all in all rely heavily on I.T setup. AN I.T enabled enterprise is one that is fully integrated with the state of the art technological devices, machines and other components that enable completing the tasks easily and with little reliance on the manual methods. Having mentioned the characteristics of I.T enabled setups, these setups are equally vulnerable to outside threats. The bitter fact is no physical...
8 Pages(2000 words)Research Paper


...? number: Email Address: Word Count for Task and 2 828 words Task 1. Business Model Canvas for Key partners Key Activities Value Proportions Customer Relationship Customer Segments Rightholders Value proposition Advertising Access to music via streaming and download service Advertizing Free drivers paid Automated online relationships 3rd party APIs Communities Advertisers Key Resources Channels Royalties to the shareholder Salaries Bandwidth costs Global Music fans Core Structure Revenue Streams This business operates on a multi-sided platform. This is because it is the advertisers and the users who support the business. They have a symbiotic relationship; hence, this makes up the value proposition for the business. Advertising...
6 Pages(1500 words)Essay


... to put in place strategies than enhance efficiency and effectiveness. Priceless organizational resources owned by many rival firms cannot be sources of a competitive merit. Therefore, a firm should adopt web technology in an agile manner to ensure that its capabilities and resources will be rare, eventually resulting in a sustainable competitive advantage. In addition, the resources and capabilities should not be imitable and substitutable. Modern businesses face a world of changing technologies, increased global competition and dealing with enlightened customers. Customers precisely know what they want, and use the web to look for every detail of their product of choice. This calls for businesses to use the fresh wave of enterprise 2.0...
4 Pages(1000 words)Essay

Securing and Protecting Information

...? Security and Protecting Information Securing and protecting information Development of information securitystrategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007). This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction (Layton, 2007). Information security includes...
3 Pages(750 words)Essay

Problem Customers

...Problem s When we consider marketing, it is important to keep in mind that the s come in all sizes, shapes and personalities. Some customers are more profitable than others. Some are easy to deal with and some others are difficult to deal with.1 The last type of customers is not only difficult to deal with but also problematic and some of them are not profitable for the business. They can be again termed into two categories: 1. the problem customers those can be transformed into profitable by dealing them differently 2. The problem customers those cannot be profitable, whatever may be the way we deal with. The sales person should concentrate on first type of problem customers if he wants to move beyond the customers who are profitable...
4 Pages(1000 words)Essay


...Enterprise has remained one of the leading car rental services in the country and has earned a reputation of being a focused organization. Over the period of time, it has been able to achieve consistent level of growth by adapting innovative management policies and a relentless focus on the customer services. It has been able to put in place a system which allows it to actually understand what its customers require and deliver the same through a cost effective service to its customers while still being strictly local. It matches the experience of its customers by offering them timely services; clean vehicles and easy local accessibility which can reduce the cost for its customers while at the same time ensure that customer expectations...
4 Pages(1000 words)Essay

Protecting Private Property

...Protecting Private Property Hitler appeared to adopt a capitalist stance here by emphasizing and elevating the value of private property. It is a known fact that capitalism derives from the need to provide individuals with the opportunity to enrich themselves using whatever means possible as well as the need to create classes of people depending on access to wealth and resources (Sen 14). Capitalism also derives from the need to develop fast and efficient manufacturing and production methods to support rapid growth. In the process, it creates, directly or indirectly, clear distinctions between various classes of people. It is quite surprising that Hitler used this phrase; there are several ironies in such an utterance coming from a person...
5 Pages(1250 words)Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Protecting Enterprise Customers for FREE!

Contact Us