当前位置:网站首页>Do you want to meet all the needs of customers
Do you want to meet all the needs of customers
2022-07-29 07:44:00 【Galloping Bay positioning】
Whether to meet all the needs of customers
To a project demand , Locate the construction personnel in a tunnel , But there are several preconditions . Due to the continuous construction on the site , Cannot install too many devices , Cannot deploy power and network cables . The part involving maps and personnel location involves sensitive information , You are not allowed to access the public network . Blasting is used in the excavation stage , The installed equipment must meet the explosion-proof requirements . Finally, the project budget is limited , Cost must be controlled .
Initially get the project requirements , In fact, it is the conventional positioning of tunnel personnel , But he has some preset conditions , This is the time , As a product provider , We need to analyze how to respond .
Because too many devices cannot be installed , Then you need to leave most of the work of the positioning function to the positioning tag carried by the personnel , So we recommend using inertial navigation technology . Because inertial navigation will produce errors with time and distance , Therefore, beacons need to be installed in the tunnel , Considering that there is no power cord , Then the beacon adopts Bluetooth Beacon. Because there is no network cable and you cannot access the public network , Then the location data transmission of the tag adopts Lora Pattern . Explosion proof requirements are well met .
Come here , On the technical level, it can almost satisfy users , But control the cost , Reduce cost , Under so many preset conditions , It's almost hard to do .
If you want to reduce costs , Then it is necessary to replace or even fake with low-cost things , If you do this , It is equivalent to that we are using extreme ways to meet the needs of users . So should we meet all the needs of our customers ?
Say first conclusion , Meeting the needs of users is a matter of course , We should try our best to meet the needs of users , Even if some requirements are incomprehensible or even ridiculous in our view , But since users spend money on our products , He is here to solve his own problems , It doesn't mean that we should follow our products to change their requirements , So I don't believe that the needs of customers can guide .
If you encounter something like the above , Almost most of the needs can be met , It's only one or two points , So should we use unconventional means to meet it ? The answer is No , Since users trust us , Then we must tell the truth , You can't cheat users , Because once there is the first deception , Then when the user knows that we are lying to him , There is almost no possibility of cooperation in the future .
Even if users can't meet oneortwo of them because of us , Chose our peers , Don't regret , We are good at ourselves , Honestly tell users why not , Why can't we , Let users feel our sincerity , Keep users like this , One day in the future , When users have other needs , Will still negotiate with us .
边栏推荐
- Getting started with JDBC
- Analyze the roadmap of 25 major DFI protocols and predict the seven major trends in the future of DFI
- Prometheus and grafana
- Cross domain problems when downloading webapi interface files
- Amaze UI 图标查询
- 佳木斯市场监管局开展防疫防虫害专题食品安全网络培训
- Strongly connected component
- 电子元器件贸易企业如何借助ERP系统,解决仓库管理难题?
- Meeting notice of OA project (Query & whether to attend the meeting & feedback details)
- Embroidery of little D
猜你喜欢
@JsonSerialize注解的使用
MySQL uses date_ FORMAT(date,'%Y-%m')
STM32 operation w25q256 w25q16 SPI flash
Sort out the two NFT pricing paradigms and four solutions on the market
电子元器件贸易企业如何借助ERP系统,解决仓库管理难题?
【深度学习】数据准备-pytorch自定义图像分割类数据集加载
NFT 的 10 种实际用途
Zero technology is deeply involved in the development of privacy computing financial scenario standards of the ICT Institute
2022 Shenzhen Cup Title A: get rid of "scream effect" and "echo room effect" and get out of the "information cocoon room"
Segger's hardware anomaly analysis
随机推荐
I, 28, a tester, was ruthlessly dismissed in October: I want to remind people who are still learning to test
String class
Cs61abc sharing session (VI) detailed explanation of program input and output - standard input and output, file, device, EOF, command line parameters
LANDSCAPE
【暑期每日一题】洛谷 P6408 [COCI2008-2009#3] PET
Introduction to logback appender
Prometheus与Grafana
Write some DP
[summer daily question] Luogu p1601 a+b problem (high precision)
@Detailed explanation of requestmapping usage
2022 Shenzhen Cup Title A: get rid of "scream effect" and "echo room effect" and get out of the "information cocoon room"
MapReduce各阶段步骤
基于高阶无六环的LDPC最小和译码matlab仿真
gin abort不能阻止后续代码的问题
电子元器件贸易企业如何借助ERP系统,解决仓库管理难题?
[deep learning] data preparation -pytorch custom image segmentation data set loading
[FPGA tutorial case 42] image case 2 - realize image binarization processing through Verilog, and conduct auxiliary verification through MATLAB
【FPGA教程案例42】图像案例2——通过verilog实现图像二值化处理,通过MATLAB进行辅助验证
输出1234无重复的三位数
Zero technology is deeply involved in the development of privacy computing financial scenario standards of the ICT Institute