Customer Relationship Management is the most vigorous tools in our era and is the integration of trust, business and technology to gratify the requirements of the clients. CRM is a strategy of dealing with people, technology and process and need to be implemented precisely. CRM is the most outstanding business strategy that consolidates internal procedures and externals to generate and convey value to the spotted customers and CRM can easily neutralize competitive perils; provide a good source of roadmap for the company and customers. Moreover it may clarify the potential pitfalls in creating success for the company. CRM involves validating and evaluating critical success factors, which cover the three perspectives of CRM as the theoretical base, and which constitute a guide for companies in the implementation of the applications. Due to this, the desired benefits have intensified customer satisfaction and maintenance, by generating personalized products and value-added services. In this paper, the author investigates the factors that can positively leverage the implementation and use of CRM and creates differentiation among these factors and knowledge management factors. What is more, the paper aims at determining technical feature between CRM and knowledge management and managed to compare KM with CRM successfully.
Abstract-Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification [1], based on the 802.15.4 standard [2], defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
This paper studies the impact of different encryption algorithms on the quality of Voice over Internet Protocol (VoIP). Assuring Quality of Service (QoS) is one of the primary issues in any IP based application that examines the voice quality of VoIP. This paper examines QoS in terms of lost packet ratio, latency and jitter using different encryption algorithms along with firewalling at the IP layer. The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth available and encryption used. Findings include the need for the provision of bandwidth for encryption, and even when adequate bandwidth is provided encryption algorithms can increase lost packet ratios and packet latency, and reduce. Overall, the results indicate the implementation of encryption algorithms may degrade the voice quality even if bandwidth is adequate. I.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.