Home / Blog / Single Post

MRKT20052 Marketing Management And Digital Communications

Free Samples

MRKT20052 Marketing Management And Digital Communications

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MRKT20052 Marketing Management And Digital Communications

0 Download6 Pages / 1,362 Words

Course Code: MRKT20052
University: Central Queensland University is not sponsored or endorsed by this college or university

Country: Australia

Background: Market and demand assessment, including demography, segmentation & target market analysis:PEST analysis: Competitor analysis including their aim, objective and marketing promotion analysis:SWOT analysis:Value & brand positioning analyses: Marketing aim and promotional objectives for 2018:Marketing mix strategies:
Competitive strategies:

Public cloud
In cloud computing, public cloud architectures involve service providers who supply and deliver service in the form of applications and storage systems. The services are provided over the web to the public crowd (Brian J.S. Chee, 2010). These services delivered can either be free or subscribed to in an agreed payment.
The following are the reasons for public cloud servicing;

The service is easy and inexpensive. This is due to the existence of the provider to give hardware and software.
The service is easily scalable.
There is reduced resource wastage.

Private cloud architecture
This type of servicing is also called the internal cloud. It entails the provision of cloud computing techniques that are dedicated to serving a single organization. Some reasons for using this architecture are;

Existence of multi-tenancy
Self-service characteristic
Ability to change computing resources whenever demanded(Galloway, 2013).

Hybrid cloud architecture
This architecture blends the features of private cloud and hybrid clouding. It has some reasons to purchase it;

Best preferred for workloads that continuously change.
One can get the best of both cloud features. That is the private and public cloud architectures.

Benefits of cloud computing architecture
Cost saving – The cloud technology enables cheap cash usage due to the use of servers and other hardware (Kees Blokland, 2013).
Reliability – in cloud technology, the service provider offers management. The management offers best hardware and software service that are good performing than in-house equipment.
Manageability – the centralized resource administration simplifies the IT management system and maintenance capabilities (Pethuru, 2013).
Strategic edge – about competition, the cloud architecture provide better service and equipment technology due to ever improving computer technology.
Issues of cloud computing architecture
Downtime – whenever the connection to the network fails. The work operation in clients is stopped. More to this is the existence of many clients operating at a time that can lead to outages.
Security – if sensitive data is stored in external locations. The insecurity revel rises, and the thought of using cloud means access to a provider (Rajkumar Buyya, 2010).
Vendor lock-in – the cloud computing architectures have not developed to the best features making migration from vendors difficult in some situations.
Limited control – the service provider offers management of accounts thus restricting access of some.
The risks associated with the hybrid cloud architecture are;
Loss of control – there I a perceived loss of control to the side of the customer due to changing technology equipment. Solving this risk is by trying to keep up with ever-increasing computer technology (JAMES, 2010).
Cloud security – cloud technology goes hand I hand with the inherent risk of security. To solve this risk, the better hybrid switching architecture is produced (David, 2016).
Compliance – the information flowing along the hybrid may not be monitored by some managing rules. This could lead to information loss. Restricting the whole cloud to some regulation increases the security.
The following are the steps recommended to the board for securing hybrid cloud service. In each security step, there is the reason for taking such an action (Thomas Erl, 2013).
To begin with, encryption is a suggested way forward. In the hybrid cloud, a network that lacks encryption is susceptible to eavesdropping. The man-in-the-middle can easily attack the cloud. The attack may lead to impersonating the endpoints of the service. Therefore the board needs to encrypt the hybrid cloud service. During encryption, the company could use reliable proxy servers, use reliable VPN, block transmission from attack by deploying cryptographic protocols and the network can apply the security shell network (Pethuru, 2013).
Another security protocol is security assessment. When an organization fails to perform scrutinized risk profiles of the hybrid infrastructure network, they would not be able to detect the exact point of breach to the net. To fix the security assessment risk, detailed risk prevention has to be performed. The system needs to be in log motorization and updating of network software.
Better diligence in compliance. Hybrid network services require being good in compliance. The constituents of cloud architecture, the public cloud, and the private cloud should be compliant to stipulated parameters. The compliance feature entails the two clouds to be coordinated. Also, the system industry standards should be met before handling important company documents.
The security management needs to be strong. The management of the cloud system has to be able to authenticate the service, identify and manage the procedure in the company servicing network. The management, therefore, has to replicate control in the public and private clouds. The data from the two clouds has to be synchronized. Lastly, the premise data storage system has to be in regular maintenance (David, 2016).
Data redundancy. The company that has poor data redundancy puts the board network at a very high risk. Making the situation worse is the poor state of redundant copies spread all over the company centers.
In secure communication between the public and private clouds, the management must put up a mutually shared cyber security between the service provider and the purchasers.
Another security improvement lies in protecting API endpoints. Unprotected API makes the net prone to malicious activity. Thereby, the API keys should be accounted appropriately, and verification is required before issuing them to a third-party.
Factors considered when moving into hybrid cloud
To start with, the migration strategy is a factor to be considered. Ideas such as what the scaling model would resemble. One more consideration is the existence of backup whenever a failure occurs.
Strategy management of the intended hybrid cloud is one critical consideration. The management has to get a way of taking charge of the intended cloud development. The management could be self-managed or put forward for managing by another party.
The workload of the service is a factor determining whether a system can run overnight or handle large data at one given time while maintaining the high performing feature required.
The transition time for development into using hybrid cloud should be put into consideration. The staff of the company needs to adjust to the new working environment (David, 2016).  
Lastly, the security condition of the company providing the service needs analyzing.  The migration into clod networking does not automatically secure information. The kind of network used directly relates the security.
The cloud architecture consideration before movement
Before moving into the cloud computing technology, some factors come in to dictate the cloud computing features. The cloud computing entails the utility computing techniques. The techniques include the compute resources, management resources. The environment of development and the deployment environment. These conditions are the basics required for the movement of clod computing. Whether IaaS or PaaS, the mentioned features have to be strongly considered.
Steps into cloud migration
First, the board needs to determine whether the migration is profitable or not then identify a service vendor and scrutinize the track record. Next is consideration of the data security of the vendor after which data transfer is done (JAMES, 2010). Data is then stored and given a location. Scalability is the step that follows. The service level is then guaranteed with the upgrade and maintenance schedule determined. The software architecture is designed and finally the company checks with its lawyers for verification.
In these steps, there are critical issues put forward are the security determination, scalability, software architecture and lawyer verification. These steps are the basic requirements for moving into a proper cloud environment.
Brian J.S. Chee, C. F. ( 2010). Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. washington DC: CRC Press.
David. (2016). Cloud Architecture and Engineering. Philadephia: Willford Press.
Galloway, J. M. (2013). A Cloud Architecture for Reducing Costs in Local Parallel and Distributed Virtualized Cloud Environments. Austin: University of Alabama Libraries.
JAMES, G. (2010). Enterprise Cloud Computing: Technology, Architecture, Applications. Denver: Cambridge University Press.
Kees Blokland, J. M. (2013). Testing Cloud Services: How to Test SaaS, PaaS & IaaS. New York: Rocky Nook, Inc.
Pethuru. (2013). Cloud Enterprise Architecture. San Antonio: CRC Press.
Rajkumar Buyya, J. B. ( 2010). Cloud Computing: Principles and Paradigms. New York: John Wiley & Sons,.
Thomas Erl, R. P. (2013). Cloud Computing: Concepts, Technology & Architecture. chicago: Prentice Hall.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 6 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Marketing Management And Digital Communications. Retrieved from

“Marketing Management And Digital Communications.” My Assignment Help, 2021,

My Assignment Help (2021) Marketing Management And Digital Communications [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Marketing Management And Digital Communications’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Marketing Management And Digital Communications [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Are you aware of the enchantment that you can cast upon your professors with just exciting topics? Selecting expository essay topics or research paper topics is not an easy task. You need to conduct extensive research in order to choose a compelling topic that is relatively less known to people. Moreover, good research paper should have a wide scope of investigation options so that you can provide validations. Experts at provide valuable insight into choosing interesting topics to write about. Years of experience have provided them with the efficiency of retrieving the necessary details to make an offbeat topic stand out.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Tips and Tricks from our Blog