Verified Document

Ancient Computers Was The Vendor Essay

Market research revealed several factors contributing to price inelasticity. Most importantly, Ancient's competitors were far larger competitors that raised financial viability concerns for Ancient in sales deals. Further, competitors offered bundles of software products that were far large than Ancient's database and data integration line. Some of Ancient's prospects had expressed that they were fearful that a lower price meant that the product was inferior to more expensive offerings even though Ancient did not believe that there were major differences in functionally between its data integration product and those of the competition.

Given its initial poor market reception, Ancient is now repositioning the SnapTogether solution for small and medium sized enterprises (SMEs). This time it believes it will have more luck. Ancient believes that smaller companies will be...

Unlike the crowded enterprise market, Ancient's competitors avoid selling to smaller companies, leaving Ancient one of the few players in a relatively untapped market. Although the integration needs of smaller companies aren't as great as those of larger enterprises, Ancient believes that it can price its product in such a way that will still make it attractive for SMEs to purchase a product rather than to build the capabilities themselves. And, Ancient has developed a channel strategy to replace its direct sales force, an approach that should increase profit margins.
In the world of product introduction nothing is ever certain. But, this time around Ancient is optimistic that it has uncovered a good market opportunity. Launch of the new market strategy is slated for March, 2005. Stay tuned

Sources used in this document:
Market research revealed several factors contributing to price inelasticity. Most importantly, Ancient's competitors were far larger competitors that raised financial viability concerns for Ancient in sales deals. Further, competitors offered bundles of software products that were far large than Ancient's database and data integration line. Some of Ancient's prospects had expressed that they were fearful that a lower price meant that the product was inferior to more expensive offerings even though Ancient did not believe that there were major differences in functionally between its data integration product and those of the competition.

Given its initial poor market reception, Ancient is now repositioning the SnapTogether solution for small and medium sized enterprises (SMEs). This time it believes it will have more luck. Ancient believes that smaller companies will be more price sensitive and unable to afford the huge price tag of competitive offerings. Unlike the crowded enterprise market, Ancient's competitors avoid selling to smaller companies, leaving Ancient one of the few players in a relatively untapped market. Although the integration needs of smaller companies aren't as great as those of larger enterprises, Ancient believes that it can price its product in such a way that will still make it attractive for SMEs to purchase a product rather than to build the capabilities themselves. And, Ancient has developed a channel strategy to replace its direct sales force, an approach that should increase profit margins.

In the world of product introduction nothing is ever certain. But, this time around Ancient is optimistic that it has uncovered a good market opportunity. Launch of the new market strategy is slated for March, 2005. Stay tuned
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Information System Design
Words: 2315 Length: 9 Document Type: Term Paper

New Computer System for the 21st Century Business Office It is impossible to imagine that any business can be run in the 21st century without an adequate computer system. And yet therein lies the rub: Determining what computer system is adequate for any business purpose is in fact a complex and difficult process in many cases. All too often what happens when a manager is faced with choosing a new

It Upgrade
Words: 2401 Length: 8 Document Type: Other

Upgrading System Proposed WESTSYS Systems Upgrade John Moore Senior IT Tech, WESTSYS Richmond John Smith, CIO John Gibson Investment Services Stephen Baker, VP, Purchasing, John Gibson Investment Services Specific Issues with the System Financial Aspects of the Problem Feasibility of Implementation Project Costs The Average Life Cycle of Common Hardware (Garretson, 2010) Technical Feasibility Assessment (Ambysoft, N.d.) Estimated Project Costs The report has identified a problem and investment opportunity that is salient to the financial services that the company offers. The problem is

Accounting Systems and Accounting
Words: 2188 Length: 8 Document Type: Journal Professional

Professional Profile of the Defense Finance and Accounting Service (DFAS): Chaos What is the Defense Finance and Accounting Service? Ensuring that the men and women who work for the United States military receive their salaries promptly is critical. The Defense Finance and Accounting Service (DFAS) serves this vital function. The DFAS was created in 1991 by the Secretary of Defense, "to standardize, consolidate, and improve accounting and financial functions throughout the Dod. The

Ethics and Technology
Words: 1821 Length: 5 Document Type: Term Paper

Ethics and Computing in Computer Science EMPOWERMENT AND RESPONSIBILITY Errors and Hazards and Their Consequences Despite the best of care and talent, computation is subject to uncertainties, which experts call "errors (Landau, 2008)." Some of these errors are man-made and some are produced by the computer itself. The four classes of errors are blunders or bad theory, random errors, approximation or algorithm errors, and round-off errors. Blunders are typographical errors or errors caused

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now