Crm at minitex

Minitrex Systems
The Minitrex Company is a business entity with different divisions under different personnel heads. The company has various data and information databases. The Minitrex Company has complete operations conducted under four divisions. The divisions include the sales and marketing department, the financing department and the insurance department. The company operates four data and database information systems which include the Customer Contacts System, the Management Business Center System, the Credit Administration System and the General Management System.

Customer Contacts Database

The customer contacts are a data and information system dedicated to serving the sales and marketing department. The database maintains and controls data and information for customers contacts. The main process of data and information entry into the customer’s contacts is through the customers having direct contact with the sales and marketing department. The customers can also get information through making a phone call. The customer contact is not shared with the other department divisions. However, the Customer contacts database share data involving the orders with the credit administration database. Customer contacts database also share data containing the products and services with General Management System.

General Management System
The other form of the data processing and management platform is the General Management System. The data and processing database are used by the department of insurance division the insurance division can receive bills from the customers. The General Management System shares data and information with the customer contacts database. The data and information shared includes the products and services.

Credit Administration System
The credit administration system is the data and information processing system that obtains the billing information from the insurance department. Credit Administration System shares the credit data and information with the customer contacts database. The General Management System is controlled and managed by the insurance department.

Management Business Center System
Management Business Center System manages and process data and information within the financing department. The financing department controls data and information stored in obtained by the customers. Management Business Center System share data and information concerning the orders placed by the customers. Management Business Center System supports the World Wide Web access to the internet.

CRM Minitrex Data
The Minitrex organization has three independent departments. The finance department, the sales and marketing department and the insurance department carry out their transactions on their individual operations. The customer accesses the Minitrex and services through contacting the four areas of customer service. The customers have the freedom of accessing any customer service. The vital data and information concerning the customer contacts information are not evenly distributed between the departments. The process of disseminating and sharing the information among then departments is not defined. The Minitrex organization encounter data and information redundancy resulting from customer’s inability to use a single point service point. The data stored in the Credit Administration System is similar to the data stored in Management Business Center System. The data and information stored by the processing unit lead to data and information redundancy. The departments have no developed mode of data and information sharing. Only a sing department has properly developed a system of education through the online network. The Management Business Center System has access to thru web services hence the customers can access the services through the online services.

Explanation for Calling a customer and Failing to know he is a Customer

An individual at Minitrex can call a customer and fail to know if he is a customer due to lack of sharing the customer contact data and information. The organization has no copy or way of accessing customer contact data and information. The situation results in the organization employee failing to understand their current customer. The poor communication results to the major operation of the company failing to get accomplished due to poor infrastructure of communication (Piercy, & Lane, 2009). The members from a different department like the finance and members of the department of insurance should shares data, and the information is containing the customer contacts. However, the failure may lead to the Minitrex workers calling and failing to identify the customer.

Explanation of failing to understand that the customer had called for the third time

The reason for failing to understand that the customer called for the third time is due to the lack of clear customer registration system. The communication m system at Minitrex has no way of recording the new customers within the organization. The customer contact processing unit doesn’t have the data and information for unregistered individuals. The data and information stored is only that exist within the database. When a call is made and happens that the one calling is not a registered customer, then the system has no record to indicate how many times the person has called through the system. The fact that the individual is new he is also new to the system and people when he is not recorded in the system database.

The Process of Implementing the Customer Relationship Management (CRM)

The Customer relationship management helps in making the general tasks and the functions involving the customers easily to operate for the customers. Jon Bettman should focus on implementing clear customer platform that shares data and information of the customers evenly to all individuals (Farkas, 2011). Denny Khan should design a dynamic communication system that should facilitate the customer data being disseminated across all departments. Denny Khan should implement the automation of the operations by designing an online platform that supports the customers (Schniederjans, et al…, 2012). The system should ensure that the customer can access the services and the functionalities of the Minitrex organization at any time. The company services should get availed to the clients to ensure that all the operations have been automated. The CRM is also achieved through making a simplified system that enables the customers to receive services at one point. The organization should concentrate the business operations to a customer care service n to promote the issue of standardization. Standard services are well offered by having only one point of service delivery (Peppers, & Rogers, 2011).

All departments should be linked by a single cloud-based architecture where all departments should access the company data and information. The cloud computing technology should get applied in the Minitrex Company to facilitate easier access and to unite the departments. Uniting the department shall lead to better terms among Mariella Hopkins, Harold Blumfen, and Jon Bettmann. The togetherness would promote the customers also to emulate the unity of the company. The organization should also avail the goods and services always to the customer have to ensure that they maintain them always. The platforms such as the social media and solution solving platforms should be implemented on the company website for entertaining the customers for social networking. The solutions and feedback to the clients should be made online through chat box.

Security and privacy impact

Introduction
The incidents relating to security are on the rise at an alarming rate each year. Additional there is an increase of these threats complexity so do measures for security that are needed to protect the networks. Network administrators, data center operator’s m, and other professionals in the data center have to comprehend the security basics so as to manage safely and deploy the networks of today.

The internet has transformed the way people connect in the present era. The use of the internet presents whole new options for organizations and users are it in social networking, e-commerce, and enterprises among others. Since many people are now using and enjoying the benefits of the internet, the main question is how well protected are the networks from intruders. For a long time the question has been the use of the firewall, but how long will it take for the firewall become extinct (Singer, and Friedman 2014).

This paper presents the current practice of securing the networks systems by use of firewalls to determine if they are becoming extinct. I the paper also outline the aspects that the network engineers should expect internet security to be in the next two years. I finally I will give a picture of how networks will be like in the next two years in light with the mobile devices proliferation (Kaplan, Chinn, and Marcus, 2015).

With the proliferation of devices with wireless productivity, such as tablets and smartphones, the number of devices having access and connections with the data centers are exploding. The proliferation increases the perimeter security burden since these devices enhance additional services accessibility from any location with a greater volume of traffic. The distributed denial of service (DDoS) attacks is taking toll of online businesses. Though some cases of DDoS attacks may occur from non-economic reasons as they were the case of the past, they are now being taken advantage of by attackers who are monetary driven including corporate revenue, competitive advantage, and extortion. About DDoS protection, many Internet data Centers operators and enterprises tend to have a false sense of security. They think their services security from the DDoS attacks by simply deploying firewalls and intrusion prevention systems in front of their services. However, these deployments do expose companies to irate customers and service outages. The IDC and enterprises lose money when there are on critical services of the business, and this damages their customer relationship. Additional when there are no services as a result of external attacks, it can be unwelcome and sensational front pages news damaging the reputation of the company yet it is a damage that can be prevented (Gehem, Usanov and Frinking 2015).

There is also a new type of DDos attack that threatens the viability of a business service provider. Thus, the attacks have the potential of harming the e-commerce. The firewalls, IPS devices and other products for security are vital aspects in a layered -defense strategy. However, they are only meant to solve security problems that are different from DDoS mitigation and detection products. The firewall only acts a policy were enforcing the prevention of access to unauthorized data. Additionally, the IPS devices are for blocking the in attempts that lead to theft of data. Moreover, the firewalls and IPS devices are in line, state solutions and they are vulnerable to the DDoS attacks since they become the targets.

Therefore in this moving, and the highly open world the walled -garden of the old approach to securing the computers as the intranets and firewalls are getting out of step (Abouzakhar, 2015).

What should network engineers expect to happen with security in 2 years?

Security professionals in the next two years are expected to update their skills in new technologies. They will adapt, update and identify skills of dealing with the state-backed espionage in democratic states since it will no longer be only for North Korea and China. Businesses will also face complications in Balkanized Internet which will no longer work. Thus, it is essential for the internet engineers to maintain and coordinate partnership regarding information sharing across the servers. It will provide stronger support to cyber resilience and engage other multi-stakeholders in the process of governance in sharing intelligence (Lindstrom, 2008). The accessibility of web-based services from a broader internet will be the main target for activists, competitors, and others for political or negative agenda (Stevens, 2015).

Also, as data centers become more focused on the users, the customers and employee will increasingly depend on the internet services. Therefore, there is a need for enterprises to ensure that their main data center services maintain accessibility not just within the technical contingencies but also from the motivated opposition (Brenner, 2011).

The increasing connectivity as a result of the internet use and its ability to accessibility anywhere means that it is vital to segment properly the internal network by ensuring that the internal threats, as well as improper accesses, are not allowed to the data center. The core firewall segmentation should at the same time keep increasing its speed within the network core what will networks look like in 2 years, given the proliferation of mobile devices?

Traffic for mobile devices will need major emphasis on small packet performance with the gearing of data center applications towards smaller bites and screens of information. Other solutions for network security will also be for them to attain their performance specifications similar to the larger packet sizes. However, they can significantly degrade when traffic shifts to the smaller packet sizes and larger numbers of users. With the increase of the care network, there will be the need for high -speed 100 GbE and 40 GbE, as well as high port density, becomes vital. Also, there will be a need for network security appliances applicable throughout the data centers so as to connect efficiently within the high-speed fabric network (Lee 2015).

Conclusion
As the fight against cyber warfare and online crime continues to grow, and then there is the need for highly trained professionals on cyber security with relevant skills. Predicting the state of cyber security in the next few years gives an opportunity for every IT security engineers to perfect his or her skills.

Narrative essay

Whenever I think of the incident that transpired on that particular Thursday afternoon, I get a nasty feeling about the challenges of working as a respiratory therapist. Is it that all the health care practitioners should have a calling to their work or should work as a profession? As a respiratory therapist, I usually work in the intensive care and the operating rooms, but I also engage in the outpatient activities. I am a specialist and an educator in the fields of cardiology and pulmonology. Most of the patients I attend to are in the ICU and the emergency departments struggling for their lives. At times, I manage the pre-hospital and the hospital to hospital patient transport by air or by mobile road ambulance. Most of the patients have illnesses ranging from asthma, bronchitis, and emphysema. Other have a heart attack and sleep disorders. On a certain Thursday afternoon late last year, I had one of the many challenges in my line of service.

I reported to work as usual and said a prayer before the start of my daily chores. I attended to several patients having varying illnesses, and most of them had a hope of getting well in due time. I decided to take a short rest during lunch hour after realizing that there were no more patients to attend. However, after few minutes, I received a call from the hospital superintendent that there was an emergency case I required to attend. The details clarified that I had to travel with several nurses to a nearby village to seek what we could do to save the situation. There was a man in his later forties who lived with asthma for a long time. I looked at him in desperation knowing that I could do my best to save the situation though he was in a life-threatening stage. He could not talk, had flared nostrils, his skin was bluish tint from the mouth region and under the fingernails. The man lacked adequate oxygen circulation in the blood stream.

My professional’s values require that I serve to the best of my ability to save lives and restore health. We teamed up with the nurses to address the condition, but our attempts seemed futile. All our first aid attempts failed to change the situation. I instructed the nurses to lay him in the ambulance and rush to the hospital for further treatment. I think that it was a rough day for me since every other attempt to save the man failed. He lost his life as we worked tirelessly to save it. I felt discouraged, guilty, and emotionally disturbed and could not attend to other patients that day. I questioned my work as a respiratory therapist and whether it was a calling or out of influence to study the particular discipline. According to my understanding, such occurrences were inevitable, but some could be saved regardless of their severity. I did not understand why the man could lose his life in the hands of professionals and experts in the field.

It was sad news to the close family members and very challenging to break the same news to the wife who was also ill of another health condition. In some instances, the experiences of healthcare practitioners are hard to relate with though they form part of the daily life. The work of a respiratory therapist is challenging, but the desire to continue improving the quality of life compels me to serve wholeheartedly.