Escolar Documentos
Profissional Documentos
Cultura Documentos
Today’s consumer has become increasingly demanding. They not only want high quality products but they also expect high quality customer service. Even
manufactured products such as cars, mobile phones and computers cannot gain a strategic competitive advantage through the physical products alone. From a
consumer’s point of view, customer service is considered very much part of the product.
Delivering superior value to the customer is an ongoing concern of Product Managers. This not only includes the actual physical product but customer service as
well. Products that do not offer good quality customer service that meets the expectations of consumers are difficult to sustain in a competitive market.
SERVQUAL (service quality gap model) is a gap method in service quality measurement, a tool that can be used by Product Manager across all industries. The
aim of this model is to:
• Identify the gaps between customer expectation and the actual services provided at different stages of service delivery
This model developed by Parasuraman, Zeithalm and Berry in 1985 identifies five different gaps:
The Customer Gap: The Gap between Customer Expectations and Customer Perceptions
The customer gap is the difference between customer expectations and customer perceptions. Customer expectation is what the customer expects according to
available resources and is influenced by cultural background, family lifestyle, personality, demographics, advertising, experience with similar products and
information available online. Customer perception is totally subjective and is based on the customer’s interaction with the product or service. Perception is derived
from the customer’s satisfaction of the specific product or service and the quality of service delivery. The customer gap is the most important gap and in an ideal
world the customer’s expectation would be almost identical to the customer’s perception.
In a customer orientated strategy, delivering a quality service for a specific product should be based on a clear understanding of the target market. Understanding
customer needs and knowing customer expectations could be the best way to close the gap.
The Knowledge Gap: The Gap between Consumer Expectation and Management Perception
The knowledge gap is the difference between the customer’s expectations of the service provided and the company’s provision of the service. In this case,
managers are not aware or have not correctly interpreted the customer’s expectation in relation to the company’s services or products. If a knowledge gap exists, it
may mean companies are trying to meet wrong or non-existing consumer needs. In a customer-orientated business, it is important to have a clear understanding
of the consumer’s need for service. To close the gap between the consumer’s expectations for service and management’s perception of service delivery will
require comprehensive market research.
The Policy Gap: The Gap between Management Perception and Service Quality Specification
According to Kasper et al, this gap reflects management’s incorrect translation of the service policy into rules and guidelines for employees. Some companies
experience difficulties translating consumer expectation into specific service quality delivery. This can include poor service design, failure to maintain and
continually update their provision of good customer service or simply a lack of standardisation. This gap may see consumers seek a similar product with better
service elsewhere.
The Delivery Gap: The Gap between Service Quality Specification and Service Delivery
This gap exposes the weakness in employee performance. Organisations with a Delivery Gap may specify the service required to support consumers but have
subsequently failed to train their employees, put good processes and guidelines in action. As a result, employees are ill equipped to manage consumer’s needs.
Some of the problems experienced if there is a delivery gap are:
• Employees lack of product knowledge and have difficulty managing customer questions and issues
The Communication Gap: The Gap between Service Delivery and External Communications
In some cases, promises made by companies through advertising media and communication raise customer expectations. When over-promising in advertising
does not match the actual service delivery, it creates a communication gap. Consumers are disappointed because the promised service does not match the
expected service and consequently may seek alternative product sources.
Case Study: Amazon.com
Amazon.com provides books, movies, music and games along with electronics, toys, apparel, sports, tools, groceries and general home and garden items.
Amazon is a good example of an online business that tries to close the service gaps in order to thoroughly meet consumer expectations.
From the time the consumer starts to shop at Amazon’s online store, Amazon will attempt to understand their expectations. From when a customer first makes a
product selection Amazon creates a consumer profile and attempts to offer alternative goods and services that may delight the consumer. The longer the
consumer shops at Amazon, the more the company attempts to identify their preferences and needs.
When a consumer buys a product from Amazon they selects the mode of delivery and the company tells them the expected number of days it will take to receive
their merchandise.
For example: standard shipping is three to five days but shipping in one or two days is also available. The company has set standards for how quickly customers
are informed when a product is unavailable (immediately), how quickly customers are notified whether an out of print book can be located (three weeks), how long
customers are able to return items (30 days) and whether they pay return shipping costs.
These standards exist for many activities at Amazon from delivery to communication to service recovery.
Service Performance
Apart from defining their service delivery, Amazon goes one step further and delivers on its promises. Amazon performs! Orders often arrive ahead of the
promised dates; orders are accurate and are in excellent condition because of careful shipping practice.
Customers can track packages and review previous orders at any time. Amazon also makes sure that all its partners who sell used and new books and other
related items meet Amazon’s high standards. The company verifies the performance of each purchase by surveying the customer and posting scores that are
visible to other customers.
Managing promises is handled by clear and careful communication on the website. Every page is very easy to understand and to navigate.
For example the page dealing with returns eliminates customer misunderstanding by clearly spelling out what can be returned. The page describes how to repack
items and when refunds are given. The customer account page shows all previous purchases and exactly where every ordered item is in the shipping process
Amazon strategy has been well received by its customers and the Amazon brand is known worldwide.
Conclusion
Effective product management is a complex undertaking which includes many different strategies, skills and tasks. Product managers plan for creating the best
products and operational excellence to maximize customer satisfaction, loyalty and retention. Recognising and closing gaps offers high quality customer service to
the consumer and helps them to achieve their goal whilst maximising market position, market share and financial results through customer satisfaction. It also
helps managers to identify areas of weakness and make improvements to a company’s service delivery.
Check out our blog post on “The Value Curve: visualising the value proposition”. This tool allows product managers to take information gleaned from gap analysis
to develop or refine products that are both compelling to customers and distinct from competitors.
Firewall
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass
data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
[edit]History
The term firewall originally referred to a wall intended to confine a fire or potential fire within a building; cf. firewall (construction). Later uses refer to
similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
- The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm
was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.[1]
The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems
known as packet filter firewalls. This fairly basic system was the first generation of what became a highly evolved and technical internet security
feature. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet filtering and developed a working model for their
This type of packet filtering pays no attention to whether a packet is part of an existing stream of traffic (i.e. it stores no information on connection
"state"). Instead, it filters each packet based only on information contained in the packet itself (most commonly using a combination of the packet's
source and destination address, its protocol, and, for TCP and UDP traffic, the port number).
TCP and UDP protocols constitute most communication over the Internet, and because TCP and UDP traffic by convention uses well known ports for
particular types of traffic, a "stateless" packet filter can distinguish between, and thus control, those types of traffic (such as web browsing, remote
printing, email transmission, file transfer), unless the machines on each side of the packet filter are both using the same non-standard ports.
Packet filtering firewalls work mainly on the first three layers of the OSI reference model, which means most of the work is done between the network
and physical layers, with a little bit of peeking into the transport layer to figure out source and destination port numbers.[2] When a packet originates
from the sender and filters through a firewall, the device checks for matches to any of the packet filtering rules that are configured in the firewall and
drops or rejects the packet accordingly. When the packet passes through the firewall, it filters the packet on a protocol/port number basis (GSS). For
example, if a rule in the firewall exists to block telnet access, then the firewall will block the IP protocol for port number 23.
The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol,DNS, or web
browsing), and it can detect if an unwanted protocol is sneaking through on a non-standard port or if a protocol is being abused in any harmful way.
An application firewall is much more secure and reliable compared to packet filter firewalls because it works on all seven layers of the OSI model, from
the application down to the physical Layer. This is similar to a packet filter firewall but here we can also filter information on the basis of content. Good
examples of application firewalls are MS-ISA (Internet Security and Acceleration) server, McAfee Firewall Enterprise & Palo Alto PS Series firewalls.
An application firewall can filter higher-layer protocols such as FTP, Telnet, DNS, DHCP, HTTP, TCP, UDP and TFTP (GSS). For example, if an
organization wants to block all the information related to "foo" then content filtering can be enabled on the firewall to block that particular word.
Software-based firewalls (MS-ISA) are much slower than hardware based stateful firewalls but dedicated appliances (McAfee & Palo Alto) provide
In 2009/2010 the focus of the most comprehensive firewall security vendors turned to expanding the list of applications such firewalls are aware of
now covering hundreds and in some cases thousands of applications which can be identified automatically. Many of these applications can not only
be blocked or allowed but manipulated by the more advanced firewall products to allow only certain functionally enabling network security
administrations to give users functionality without enabling unnecessary vulnerabilities. As a consequence these advanced version of the "Second
Generation" firewalls are being referred to as "Next Generation" and surpass the "Third Generation" firewall. It is expected that due to the nature of
malicious communications this trend will have to continue to enable organizations to be truly secure.
From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam, developed the third generation
Third-generation firewalls, in addition to what first- and second-generation look for, regard placement of each individual packet within the packet
series. This technology is generally referred to as a stateful packet inspection as it maintains records of all connections passing through the firewall
and is able to determine whether a packet is the start of a new connection, a part of an existing connection, or is aninvalid packet. Though there is still
a set of static rules in such a firewall, the state of a connection can itself be one of the criteria which trigger specific rules.
This type of firewall can actually be exploited by certain Denial-of-service attacks which can fill the connection tables with illegitimate connections.
[edit]Subsequent developments
In 1992, Bob Braden and Annette DeSchon at the University of Southern California (USC) were refining the concept of a firewall. The product known
as "Visas" was the first system to have a visual integration interface with colors and icons, which could be easily implemented and accessed on a
computer operating system such as Microsoft's Windows or Apple's MacOS. In 1994 an Israeli company called Check Point Software
The existing deep packet inspection functionality of modern firewalls can be shared by Intrusion-prevention systems (IPS).
Currently, the Middlebox Communication Working Group of the Internet Engineering Task Force (IETF) is working on standardizing protocols for
Another axis of development is about integrating identity of users into Firewall rules. Many firewalls provide such features by binding user identities to
IP or MAC addresses, which is very approximate and can be easily turned around. The NuFW firewall provides real identity-based firewalling, by
requesting the user's signature for each connection. authpf on BSD systems loads firewall rules dynamically per user, after authentication via SSH.
[edit]Types
There are several classifications of firewalls depending on where the communication is taking place, where the communication is intercepted and the
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through
the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet
Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use
that "state information" to speed packet processing. Any existing network connection can be described by several properties, including source and
destination IP address, UDP or TCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer,
or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a
packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.
Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session. They may also be
necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on
Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination
service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, of the source, and many other attributes.
Commonly used packet filters on various versions of Unix are ipf (various), ipfw (FreeBSD/Mac OS X), pf (OpenBSD, and all
[edit]Application-layer
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all
packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender). In principle,
application firewalls can prevent all unwanted outside traffic from reaching protected machines.
On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The
additional inspection criteria can add extra latency to the forwarding of packets to their destination.
[edit]Proxies
A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input
packets (connection requests, for example) in the manner of an application, whilst blocking other packets.
Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily
cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely,
intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy thenmasquerades as that system to other
internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass
Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the
"private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the
NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as
well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Hiding the addresses
of protected devices has become an increasingly important defense against network reconnaissance.