Wednesday, October 30, 2019

The market for IntensCare product Case Study Example | Topics and Well Written Essays - 500 words

The market for IntensCare product - Case Study Example The company enjoys a large market power because of its innovativeness, formalized process of product development and heavy investments in product development (Donnellon and Margolis 2). Presently, MedSys Company has is the leading distributor of the IntensiveCare product in the market. The company has invested huge sums of money, amounting to $20.5 million in developing and launching the product (Donnellon and Margolis 1). Since the product is the most ambitious project in history, MediSys must have the largest market compared to its competitors. Nature of the market structure The nature of the market for IntensCare product is perfect competition. Perfect competition market is where there are many buyers and sellers so that the action of one trader has no significant impact on the market price. Perfect competition market is characterized by mobility of the factors of production such that producers can respond to price signals. Valerie Merz, for example, fears of losing the market share for to the forthcoming product, which are scheduled for release within the year (Donnellon and Margolis 1). Valerie is rational and seek to maximize utility and profits; this is the feature of a perfect competition market. The marketing function is interested in distributing and selling the product. Valerie Merz, the marketing manager was under pressure as she reviewed the agenda of the meeting intended for IntensCare product development team.

Monday, October 28, 2019

Toys and Games Essay Example for Free

Toys and Games Essay The Toys and Games industry is one of the most adaptable and creative enterprise businesses that outlined a wide scope of products for younger children as well as slightly older children. An increasing market of children toys and games have grown over the last several years to producing intriguing products that satisfies parents both on prices and technology. The toy and gaming industry has grown to produced extraordinary entertainment products as well as brand identity to solidify the company’s brand equity (Kelly, 2000:08). For instance the Mattel and Hasbro company brands contributes to the enormous consumer interests to toys and gaming system in the United States, China, and U. K. that created fierce competition with corresponding international company brands. The marketing strategies implemented by the firms operating in different geographic locations present an interesting perspective for defining the product specifics (Armstrong and Kotler, 2007:98). Some of the boundaries identified in the toy and game industry that resulted in the market being affected by falling birth rate. This in turn created a lower accountability in children population is declining in the past decade from 1996-2001 (Key Note, 2007:44). Therefore, the boundary creates the need for enterprises to redesign products for the older children market and provide appropriate marketing aspects according (Emeraldinsight. com, 2008). The marketing strategies used by the firms the major company brands are centered on the core technical advancement to solidify the target segmentation (Shermerhorn, 2008:38). The marketing strategies are planned and executed from its central platform in the international market due to the vast opportunities to reaching majority of the children population. The company’s brand cohesive approach provides the challenges exposed by each sector market that redefines the boundary previously indicated for exposure in the United States, China, and the U. K. target market segments identified (Asa. org, 2008:2). The toy and games industry sectors are categories in nine units that are as follows (Key Note, 200711): ? Infant/pre-school toys and games products for under 5year olds ? Activity toys ? Outdoors/sport toys and games ? Games/puzzles ? Dolls ? Action toys ? Vehicles ? Plush toys ? Other Products The toy and game industry category sectors are garnering the marketing approach to be designated by target demographic and locations to render the most brand equity to a profitability standing (Chitty, Barker, and Shrimp, 2005:22). The business enterprise has to renders a longer consumer commitment to a particular brand in order sustaining operations when the target demographic changes, case in point the last past decade declined in child births (Cameron, 2004). Moreover, the pricing strategies offer another element to assist in the differentials between the large company brands that creates a fundamental aspects to outlined the concepts for competitive prices in order to become the leader in the toy and game industry. The impact of government policies and laws on the Toys and Games Industry The identified government policies impacting the Toys and Games industry relates to several concerns that safety to weights and measure regulations. These two areas out of the many specified regulations depending on the location around the world where toys and games are sold, the safety area and weight measurements are dominately the primary concern. The safety legislation enforces the Toy Safety Directive 88/378/EEC that stricts the toy company to adhere to materials not destructive to the environment or longtime negative exsposure to children. Furthermore, the safety legislature covers the means for ensuring the toy products and games are aligned communicating the correct assessement towards age, choking hazards pieces, EN71-2:2006 Flammability, and other additional information to provide the parent the right assessment. The weights and measure regulations 1994 No# 1851 relates to the requirement for an indication of actual weighing of the toy and game. Case in point, the younger children demographic are at different sizes as well as the container/furniture to hold or stand up the product (Key Note, 2007:55). Therefore, this particular regulation provides the parent needed information to better assess what is acceptable for the children and/or houselhold. The weight and measure regulations allows for the company’s brands to focus on the appropriate components necessary to address two folds of marketing and RD concerns; pricing and targeted demographic preferences for longtime interests in the toy or game. These enforced government policies are geared towards bringing the law within the toy and game industry to facilitate the growing company brand in the international market as well as domestically. In doing so, the end user that is mostly younger children are able to enjoy the toy and game product to its full potential without the immediate concern of a possible harmful outcome. Analysis on the Economic Forces which Affect Demand for the Toys and Games Industry The economic environment is constantly changing that produces a challenging concept for toy and game companys to being creative in selling and distributing their products. The U. K. gross domestic product continues to show the consistent level of growth from 2004 to currently. In doing so, the GDP has provides a very positive backdrop for the corporate spending in RD for product development. The area of inflation does arises, especially the last couple of years particularly in U. K. , in which the rate have lagged behind for the increase of household disposable income (Carol. co. uk. ,2008:2). As economists have outlined, the prices that rises in an economy as a whole hoave been lower than income rises creates opportunities for toys and games company enterprises to adapt to the market conditions (Baye, 2009:102) The GDP in the U. K. averages to a 5% increases between 2007-2010 that encourages toys and games enterprises for further investment in traditional demographic markets. The senior management team within the toy and game industry companies provided the needed funding to further explore more creative ways to tap into the available expendable/spendable income of households. Respectively, the international focus of marketing to these targeted households are more effective in highlighting new products and features that can translate to â€Å"crazes† that boost volume sales for specific products. The growth rate continues to improve as more and more toy and game companies trained their marketing team to identify trends and adapt quickly to the changing preferences in the demographic (Pelsmacker, 2006:122). Case in point, the latest report on younger children are more inclined to prefer toys and games that are older in content that is understanding due to the rise in pre-school education. The younger children population tend to be more attracted to toys and games that are at least1 grade higher that produces an emphasis on creating products that are challenging to hold children’s interest. The economic environment additionaly creates a structure for companys to provide upgraded options in order counteract with limited product shelf life within the particular age groups. This is critical for major brands to adjust accordingly due to current trends of younger children preferences that are different than forty years ago. The cooperation of major company’s brand with retailers and research on trends offers a stronghold to RD to marketing effectively in a challenging economic environment. The Impact of Demographic Change, Society’s beliefs, Values and Attitudes The identified impact of demographic changes are in the specifications preferences from the younger children population. In recent years, the younger children population prefers more challenging activities from toys and games that requires for better RD to market effectively in the industry. In addition, the impact of the primary demographic creates an opporutunity for major companys to expand the focus of product development for ages 7-9 and 10-18 that focuses on educational development as well as entertainment. These demographic changes has pros and cons depending on the specificity of the toy and game company to adapt accordingly in order to stay relevant and leader in the industry (Bryman, 2007:45). The society’s beliefs, values, and attitudes on certain toys and games provide for social responsible company to adhere to that will not limit the marketability of the product. That is why most toy and game companies concentrate most of their investments in the international markets to expose the product line. The different cultures provides for a more specified marketing strategy that acknowledge the children society belief and values that will encourage a positive attitude towards the company brand. Case in point, the Mattel Corporation number one doll Barbie is marketed internationally and in each culture there are different theme Barbie, for instance the UK model will be different for the China model or even the U. S. A. model. This approach allows for a more competitive toy and game company to incorporate needed attributes in products that has a lasting impressions on younger and older children. The flexibility of the younger children preferences allows for the creation of upgraded tailored toys and games that older children are more attracted to purchase accordingly. Therefore, the brand of Sony and Playstation developed different demographic age groups to market that will balance out the disparity of time periods of low birth rate to a higher older children population. The demand for a different gaming experience by the older demographics sets the bar for firms both in the U. K. and the United States that creates a platform for influencing the marketing and design strategy (Burnes, 2004:102). The toy and games companies are utilizing the feedback from consumers and integrating a newer technology approach that infuses the society beliefs of acceptable products (Wild, Wild, and Han, 2006:94). The challenge is the constant ability to target market the appropriate resources to secure the designated children population (Fleming and Koppelman, 2006:25). The approach taken by each of the toy and game companies is to release products and game titles that catered to the targeted demographic preferences with care to parents and children values of appropriate features, i. e. the Brats Dolls probably will not be acceptable in China compared to the U. K. or the U. S. A. Therefore, the advancements during certain times for maximum impact in designing the product and accessories are critical to demonstrate a willingness to staying as a leader in the industry (Williams, 2008). The toy and game industry provides the straight forward concept to effective RD that produces an interesting business perspective to effectively knowing the market in different geographic locations to meet is strategic goals in demographic assessment. Assess the Impact of Technological Development in Relation to Toy and Game Industry. The dramatic impact of technological development in relation to the toy and game industry is the major features for the Sony PlayStation contrasting approach from the other products. As mention prior, the major opportunity for toy and game companies to market the brand towards different demographic age groups when the fluctuations in birth rate creates an audience interested in complicated toys and games (Cooper, Grey, Raymond, Walker, and 2005:28). These fluctuations in time-tables of releasing titles and online initiatives in China compared to the USA. The strategy for the time-tables is to apply pressure in the gaming markets on the other brands to follow suit after Sony sets the trend. The outcome projected for online capabilities increased revenue and returned investment due to the Sony PlayStation robust multimedia capabilities (USA Today, 2005:1). Conversely, the fundamental marketing strategy for Sony PlayStation is to allow U. K. to focus on the accessibility mindset for the expansion into international markets by the availability of titles to increase interest in the product. In doing so, the Sony PlayStation continues to stay competitive compared to Xbox and Nintendo Wii in both international markets. The Xbox predominately brand positioning with the manufacture trade-name Microsoft offers a competitive edge in the U. K. and the United States to keep the brand competitive to Sony PlayStation and Nintendo Wii. (See Figure A). Brand Positioning Brand Name Selection Brand Sponsorship Brand Development Attributes Benefits Beliefs and Values Selection Protection Manufacturers brand Private brand Licensing Co-branding Line extensions Brand extensions Multi-brands New-brands More importantly, the Sony PlayStation PS3 consoles have sold in the U. K. markets creates a profound interests to producing sales trends upwards (PlayStation. com, 2008: 2). The identified recent market strategy to improve the consoles model of PSP and PS2 that features a Blu-ray influenced the overall sales returns for the company. The Blu-ray provided the Sony PlayStation to effectively utilize the younger demographic age range from 12 to 18 years old. This approach for the Sony PlayStation differs from some of the other products by focusing and maintaining the aspect of a visual experience as the primary focus. In doing so, the targeted market segment offers Sony PlayStation to build on its already establishing consumer base to strengthen its brand identity (Sony, 2008:1). Furthermore, the Sony PlayStation marketing strategies adapt its features to the U. K. market on technique for the gaming experience compared to other international geographic markets that provides accessibility to upgrade features. The Sony PlayStation focuses on the titles for the video game console produced to solidify their lead in specific game titles. The PlayStation 3 competes with Microsofts Xbox 360 and Nintendos Wii as part of the generation of video game systems that distinguishes the PlayStation by its unified online gaming service, the PlayStation Network. The theoretical concept that Sony Company Entertainment incorporates is based on the understanding to the international markets that the firm concentrates on adaptability that secures a holding on the demographic both offline and online. The firm geographic locations, specifically in markets that catered to the product demographics interets presents more a direct interest to the game titles and technical online accessibility. Moreover, the Sony PlayStation contrasts with previous game developer’s perception on how Sonys marketing strategy for the online play to infuse advertising funding appropriately (Porter, 2004:89). Nonetheless, the Xbox generation video game console expanded the landscape to present Microsofts second foray in succeeding their projects in the international launch (Bowen, 2000). The promotional strategy for the Xbox 360 focuses on opening an alternate reality game title selections primarily in the USA and the Microsoft Corporation primary focus is to split resources for products exposure in U. K. for the marketing strategy. The focus on the U. K. is mainly due to the reported sales that have slowed due to the onset of the Nintendo Wii product launch that counteracts Microsoft Corporation approach (Xbox. com, 2008). Therefore, the Microsoft Corporation strategy is to penetrate the domestic and global markets with advance visual impact technology by presenting the product on an online community’s websites. The Xbox brand identity has grown in the internatinal markets over the years along with association to the British and American public; therefore, the brand identity provides an advantage in securing the brand equity compared to Sony PlayStation and Nintendo Wii. However, the Xbox marketing strategy for the product concentrates on the adaptability and brand loyalty in the United States the on going approach is to strenghten itself in U. K. and international markets. The measure implemented by toys and games companies such as Microsoft Corporation Xbox, Nintendo, and other corresponding companies provides the necessity of the concept for consumers to utilize the products in a different way rather than an ordinary way (Nintendo. com, 2008:3). The toys and game technology strategy is to provide more attractive software adaptability with creative tools to play the video game to solidify the consumer base. The product offers the technical capabilities on the online marketing to solidify the target market population for infusing the product’s brand equity. The 3 most Opportunities and 3 most Threats Identified The three most opportunity for the toy and game industry is the companies sources of information on demographics, distribution to international markets from economic scale, and the market is susceptible to â€Å"crazes† that boost volume sales for a specific item. These benefits of using demographic segmentation for targeting a children population audience is the increase of the share of the customer in the market, high customer equity, and brand equity that provides continued growth for business operations. The building of profitable relationships with them is the foundation of marketing management (Mantel, Mereidith, Shafer, and Sutton, 2008:11). The formula for the marketing management agenda is the philosophy for a design plan that empowers the brand idenitiy through effective customer-driven marketing strategy (Thill and Bovee, 2007:88). The opportunity creates a vast trend towards a specific product item that at times transcends the available spendable household income that truly boost sales. Therefore, the ability to change efforts to finding, attracting, and growing the target demographic from younger children to slightly older children proves beneficial by superior customer value (Kotter, 1996:1) The identified three threats are children getting older creating a shorter product shelf life, many products are global but ignoring local markets, and toys and games company has to compete with for consumer expenditures during high buying season i. e. Christmas. Therefore, the pursuit to successfully utilize the RD data to formulate products that adapts to growing children to reduce shelf-life, however, companies that do not invest accordlying in RD lose a significant share in the demographic segmentation (Saunders, 2007:55). The focus effort required to balancing the marketing strategy not just globally but locally provides a strong hold on the brand loyalist to further brand equity. Respectively, the measure to acquire toy and game brand influence both globally and locally markets requires the needed information to segments of the targeted demographics to when to effectively market during low periods of household spending. Therefore, the methods to achieving and managing the toy and game company brand identity to established a â€Å"familiarity† from the customer base that produces product superiority through brand value proposition. References 30 Key Note (2007) The Key Note Report 2007 21st Edition, Edited by James Manley, Retreived December 23, 2008, Published date May 2007 Emeraldinsight. com (2008) The Emerald Insight Review, Retrieved December 22, 2008, from http://www. emeraldinsight. com ASA. org (2008) The Advertising Standards Authority, Retrieved December 28, 2008, from www. asa. org. uk Carol. co. uk (2008) Annual Report Online, Retrieved December 26, 2008, from http://www. carol. co. uk Chitty, W. Barker, N. Shimp, T. A. (2005). Integrated Marketing Communications. Melbourne: Nelson. Pelsmacker, Patrick (2006) Marketing Communications: A European Perspective. Financial Times/ Prentice Hall; 3 edition Porter, Michael (2004) Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press; New Ed edition Saunders, Mark (2007) Research Methods for Business Students. Financial Times/ Prentice Hall; 4 edition Schein, Edgar (2004) Organizational Culture and Leadership. Jossey Bass; 3rd Edition Baye, Michael R. , (2009) Managerial Economics and Business Strategy Fifth Edition, Retrieved from August 2, 2008, McGraw-Hill / Irwin, Boston, MA Bryman, Alan, (2007) Business Research Methods. Oxford University Press; 2Rev Ed edition Burnes, Bernard, (2004) Managing Change: A Strategic Approach to Organizational Dynamics. Financial Times/ Prentice Hall; 4 edition Cameron, Ester, (2004) Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change. Kogan Page Ltd PlayStation. com (2008) The Official Website of Sony PlayStation, Retrieved from July 27, 2008, from http://www. playstation. com Nintendo. com (2008) The Official Website of Nintendo, Retrieved from July 25, 2008, from http://www. nintendo. com USA Today, (2005) Tech Gaming, Retrieved from July 29, 2008, from http://www. usatoday. com/tech/gaming/2005-11-21-xbox-rivals_x. htm Sony Boasts PlayStation, (2008) The PlayStation Boasts Sales, Retrieved, from July 30, 2008, from http://www. joystiq. com/2008/01/06/sony-boasts-playstation-holiday-sales-numbers/ Xbox, (2008) The Official Website of Xbox, Retrieved from July 26, 2008, from http://www. xbox. com Armstrong, Gary, Kotler, Philip, (2007). Marketing: An Introduction, 8th Edition. Pearson, Prentice Hall, Upper Saddle River, New Jersey Wild, John J. , Wild, Kenneth L. , Han, Jerry C. Y. , (2006). International Business, The Challenges of Globalization Williams, Meri (2008) The Principles of Project Management, SitePoint Incorporated Fleming, Quentin Koppelman, Joel (2006) Earned Value Project Management, 3rd Edition, Project Management Institute Bowen, R. Brayton, (2000). Recognizing Rewarding Employees. Journal of McGraw-Hill Professional Book Group. 2(3) 140-141 Kelly, Joe, (1998). Existential-Systems Approach to Managing Organizations. Journal of Greenwood Publishing Group, Incorporated. 1(3) 122-125 Shermerhorn, John, (2008). Organizational Behavior. Wiley, 10 Edition Cooper, Dale, Grey, Stephen, Raymond, G, and Walker, (2005) Managing Risk in Large Projects and Complex Procurements Mantel, Samuel J. Jr. Meredith, Jack R. Shafer, Scott M. Sutton, Margaret M. (2008) Project Management in Practice, John Wiley Sons, Inc. Publishing Kotter, John (1996) Leading Change. Harvard Business School Press Thill, John V. and Bovee, Courtland L. (2007) Excellence in Business Communication, Seventh Edition, Pearson Prentice Hall, Upper Saddle River, New Jersey

Saturday, October 26, 2019

Physics of Cooling Lava :: physics lava volcano

On January 23rd 1973 a new volcano unexpectedly erupted in the Vestmannaeyjar archipelago, southwest of Iceland. The new volcano was a fissure 1.25 miles long and only 1100 yards from the center of town, also named Vestmannaeyjar. The new volcano was named Heimaey. The town was mostly evacuated over the next few days and the lava slowly flowed towards town and the mouth of the harbor for the next seven months. Vestmannaeyjar is the only good harbour in that part of Iceland, and was the base for a large fishing fleet that produces a significant part of Iceland’s GNP. As the lava threatened to overrun the town and close off the harbor, a decision was made to try to slow and divert the lava by cooling it with sea water. The idea was initially scoffed at, but when small initial efforts seemed to have an effect the scale of the operation was increased. Over seven months eight million cubic yards of sea water were pumped onto the lava flow; they cooled 5 million cubic yards of basal t lava to solid rock. The harbor and much of the town survived the eruption, likely as a result of the efforts to cool the lava. Iceland is known for its volcanic activity. A few years before Heimaey erupted; a nearby sub oceanic eruption formed the new island of Surtsey. The town of Vestmannaeyjar already had an extinct volcano on its outskirts, the volcano was known as Helgafell. It was thought to have been extinct for several hundred years. In January 1973 a new fissure opened up a few hundred yards from the extinct volcano. It went clear across the island and into the ocean on both sides. Boats escaping the harbor saw red magma under the water, and sub oceanic power and water lines from the mainland were broken by the eruption. In the initial eruption a curtain of lava 500 feet erupted from the fissure, after a few days the eruption was mostly from a single vent, with a cinder cone 300 feet tall. The lava flows from the eruption were a viscous slow moving basaltic magma. Average speeds for the lava flows were 3 to 9 yards a day. These relatively slow speeds are what made it possible to try and cool and div ert the lava. The lava was initially cooled with fire pumps and hoses, later in the effort large pumps were leased from the US military and several fire fighting boats were used.

Thursday, October 24, 2019

Biometrics Security Essay -- Biometric Technology

Biometrics Security Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combination of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the pattern of blood vessels inside the eye or the pattern of fingerprints -- and then storing the specifics, often called minutiae, in a database. When a user scans a hand or retina, the new mapping is compared with the stored data. Access is either granted or denied based on matching patterns that are unique to each individual. It's that ability to identify someone based on unique physical traits that is driving biometrics into the corporate enterprise. As more high-priced transactions are conducted over the Internet, businesses increasingly need ironclad authentication of someone's identity. Add to that the increasing amount of in"house security breaches and corporate espionage, and you'll find network and security administrators grappling for a better way to secure information from unauthorized eyes. "Somebody who is doing stock trades online wants security that is amazingly accurate," says Michael Thieme, a senior consultant for International Biometric Group in Manhattan, an independent biometrics consulting and integration firm." A lot of recent security incidents are making people aware that they have a lot of data that just isn't as secure as they thought it would be. . . . If biometrics can even be a small part of that, it will be a tremendous market." Costs are dropping Until recen... ...s fingerprint. That all amounts to an unlawful search." And that is bound to make some users uneasy or even unwilling to hand over their fingerprints. Grant Evans, vice president of Identix, calls it a small problem. "The fact is Big Brother has all the information he needs on you without your fingerprints," he says. Gail Koehler, vice president of technology for Purdue Employees Credit Union in West Lafayette, Ind., was worried that members would be upset when she first deployed fingerprint scanners in her automated branch kiosks. Koehler says 12,000 members have registered their fingerprints with the credit union. "We spent the majority of our marketing dollars preparing ourselves to convince members that this was secure and not an invasion of their privacy," she says. "It was wasted dollars. We've basically had no objections. Members prefer the security."

Wednesday, October 23, 2019

Moral Decline in Society Essay

â€Å"Freedom without morality inevitably becomes merely the liberty to perpetuate evil.† The topic I will be presenting on is: â€Å"Family is responsible for the general moral decline in society†. Do any of you know what a ‘moral’ is? The Collins English dictionary defines a moral as the difference between right and wrong or good and bad. What about the word ‘decline’? It simply means a decrease. Thus, a moral decline is a decrease in the difference between knowing what is right and wrong or good and bad. Children learn moral values mainly within their families, and mainly by relying on parents as role models. When families are unstable, when parents are absent, emotionally distant, or pre-occupied, or whenever parents themselves are immoral, the learning of moral values by children is greatly slowed down. For example, what if you grew up in a family where you were forced to sell drugs at an early age? What would you grow up to do, sell drugs? Consider a family who spends time together by going on family outings, and enjoy the quality time that is being spent. During these times, parents may instill in children the proper moral values that would allow them to grow up to be proper adults. With the attack of advertising and the organized entertainment industry, and often sex and violence- saturated popular culture they are driving, childhood is no longer the relatively protected period that it has been in recent times. Children are thrust into an adult culture at an early age, just as they once were in the older era. If a child doesn’t have a strong emotional attachment to a parent, the effectiveness of the parent as a teacher and moral guide is greatly reduced†¦.

Tuesday, October 22, 2019

Guidelines for Keeping a Lab Notebook

Guidelines for Keeping a Lab Notebook A lab notebook is the primary permanent record of your research and experiments. Note that if you are taking an AP Placement lab course, you need to present a suitable lab notebook in order to get AP credit at most colleges and universities. Here is a list of guidelines that explains how to keep a lab notebook. Notebook Must Be Permanently Bound It should not be loose-leaf or in a 3-ring binder. Never tear a page out of the lab notebook. If you make a mistake, you can cross it out, but you should not remove sheets or parts of sheets from your book. When you cross out an error, it should still be legible. You should be  explaining the reason for the strikethrough and you should initial and date it. To that point, it is not acceptable to take notes in pencil or erasable ink. Keep Everything Legible and Organized Organization is key to a good lab book. Print your name, contact info, the date and other pertinent information on the cover of the lab book.  Some lab books require you to enter some of this information on every page of the book. If your book is not pre-numbered, number every page. Usually, numbers are located in the upper outer corner and both the front and back of each page is numbered. Your labor instructor may have a rule regarding numbering. If so, follow their instructions. Its also a good idea to reserve the first couple of pages for a Table of Contents. To keep everything organized and simplified, start a fresh page for each experiment. Be Precise in Your Record Keeping This is a record of the lab work you have done during the semester or year, so it needs to be thorough. For each experiment, record the date(s) and list lab partners, if applicable. Record all information real-time. Dont wait to fill in the information. It may be tempting to record data elsewhere and then transcribe it into your lab notebook, usually because it would make the notebook neater, but its important to record it immediately. Include charts, photos, graphs and similar information in your lab notebook. Usually, youll tape these in or include a pocket for a data chip. If you must keep some data in a separate book or other location, note the location in your lab book and cross-reference it with the relevant lab book page numbers wherever the data is stored. Dont leave gaps or white space in the lab book. If you have a big open space, cross it out. The purpose of this is so no one can go back in and add false details at a later date.

Monday, October 21, 2019

capone essays

capone essays Alphonse Capone And His Rise To Power During the Capone era many mobsters were in power. As Al Capone grew, he began to associate with many different bosses and was in the neighborhood with many mob run gangs. After being involved and associated with these gangs, Capone then joined one, which just so happen to be run by Johnny Torrio, mobster to become leader of the underworld. There were many influences that helped Capone grow and gain until his rise to power as Chicagos most notorious mobster. One of the most common fictions is that like many gangsters of Capones era, he was born in Italy. This is untrue, he wasnt born in Italy but was born in New York(Bardsley 1). Alphonse Capone was born in Brooklyn, New York, in 1899, of an immigrant family (Al 2). Gabriele Capone, Al Capones father, was one of 43,000 Italians who arrived in the United States in 1894. He was a barber by trade and was one of the few who could read and write his native language. He was from the villa of Castellmare di Stalia, sixteen miles south of Naples (Bardsley 3). Capones mom, Teresina Capone, came to America with her two-year-old son Vincenzo and infant son Raffaele (historical 1). In May of 1906, Gabriele became an American citizen (Bender 26). Al Capone quit school after the sixth grade and associated with a notorious street gang. Becoming accepted as a member. Johnny Torrio was the street gang leader and among other members was the great Lucky Luciano (Al 1). As Capone grew, Torrio gave him more responsibility and Capone soon became apprenticed by him. On December 18, 1918, Capone married at the age of 19, to a 21 year old Irish girl names Mae Coughlin. A short time later Albert Francis Capone was born to the couple (Bardsley 8). At the same time this was going on, in New York Johnny Torrio moved all of his operations to Chicago. Torrios prospects in New...

Sunday, October 20, 2019

Craig v. Boren - Intermediate Scrutiny Case

Craig v. Boren - Intermediate Scrutiny Case In Craig v. Boren, the U.S. Supreme Court established a new standard of judicial review, intermediate scrutiny, for laws with gender-based classifications. The 1976 decision involved an Oklahoma law that prohibited the sale of beer with 3.2% (non-intoxicating) alcohol content to males under age 21 while permitting the sale of such low-alcohol beer to females over the age of 18. Craig v. Boren ruled that the gender classification violated the Equal Protection Clause of the Constitution. Curtis Craig was the plaintiff, a resident of Oklahoma who was over the age of 18 but under 21 at the time the suit was filed. David Boren was the defendant, who was governor of Oklahoma at the time the case was filed. Craig sued Boren in a federal district court, alleging that the law violated the Equal Protection Clause. The district court had upheld the state statute, finding evidence that such gender-based discrimination was justified because of gender-based differences in arrests and traffic injuries caused by males and females ages 18 to 20. Thus, the court held that there was justification on the basis of safety for discrimination. Fast Facts: Craig v. Boren Case Argued: Oct. 5, 1976Decision Issued: Dec. 20, 1976Petitioner: Curtis Craig, a male who was over 18 but under 21, and Carolyn Whitener, an Oklahoma alcohol vendorRespondent: David Boren, Governor of OklahomaKey Questions: Did an Oklahoma statute violate the 14th Amendments Equal Protection Clause by establishing different drinking ages for men and women?Majority Decision: Brennan, Stewart, White, Marshall, Blackmun, Powell, StevensDissenting: Burger, RehnquistRuling: The Supreme Court ruled that the statute violated the 14th Amendment by making unconstitutional gender classifications. Intermediate Scrutiny: a  New Standard The case is significant to feminism because of the intermediate scrutiny standard. Prior to Craig v. Boren, there had been much debate about whether sex-based classifications or gender classifications, were subject to strict scrutiny or mere rational basis review. If gender became subject to strict scrutinies, like race-based classifications, then laws with gender classifications would have to be narrowly tailored to achieve a compelling government interest. But the Supreme Court was reluctant to add gender as another suspect class, along with race and national origin. Laws that did not involve a suspect classification were subject only to rational basis review, which asks whether the law is rationally related to a legitimate government interest.​ Three Tiers Are a Crowd? After several cases in which the Court seemed to apply a higher scrutiny than rational basis without really calling it heightened scrutiny, Craig v. Boren finally made clear that there was a third tier. Intermediate scrutiny falls between strict scrutiny and rational basis. Intermediate scrutiny is used for sex discrimination or gender classifications. Intermediate scrutiny asks whether the laws gender classification is substantially related to an important governmental objective.Justice William Brennan authored the opinion in Craig v. Boren, with Justices White, Marshall, Powell and Stevens concurring, and Blackmun joining in most of the opinion.  They found that the state had not shown a substantial connection between the statute and the benefits alleged and that statistics were insufficient to establish that connection.  Thus, the state had not shown that gender discrimination substantially served a government purpose (in this case, safety).  Blackmuns concurring opinion arg ued that the higher, strict scrutiny, a standard was met. Chief Justice Warren Burger and Justice William Rehnquist wrote dissenting opinions, criticizing the Courts creation of an acknowledgment of a third tier, and arguing that the law could stand on the rational basis argument. They remained opposed to establishing the new standard of intermediate scrutiny.  Rehnquists dissent argued that a liquor vendor who had joined the suit (and the majority opinion accepted such standing) had no constitutional standing as his own constitutional rights were not threatened.Edited and with additions by   Jone Johnson Lewis

Saturday, October 19, 2019

Marketing Oriented Approach Essay Example | Topics and Well Written Essays - 1000 words

Marketing Oriented Approach - Essay Example To this end it is useful to compare and contrast between firms that lie at two ends of the spectrum: the marketing oriented firms versus the production oriented. A marketing oriented approach is a ‘reactive’ approach in that companies produce new products/services based on customer needs and wants (Kotler, 2007). However, it goes further than that in that it aims to establish long term profitable relationships with the customer (Jeff, 2009). The aim of such firms is not just delivering a product has profitable customer demand but also establishing long term association with them by exceptional customer service. Such service may be in the form of superior after sales service and/or consultation services provided by salespeople (Jeff, 2009). Kotler elaborates on the concept of marketing orientation by claiming that holistic marketing orientation is essentially a process that enables companies to capture customer lifetime value. The concept of building long lasting relation ships with customers enhances the company’s ability to understand the customer and retain him for a lifetime. Thus, the Pareto rule that 20% customers bring in 80% of the revenue is very well recognized by this approach which aims at capturing a customer and retaining him for life. Companies that therefore drifted away from the idea of offering low prices towards offering a brand experience. Today’s customer is no longer price conscious; infact, contemporary trends have made the customer of today pressed for time with multiple claims on an individual’s scarce time. Hence, convenience and satisfaction is the need of the hour. Thus, rather than competing on cost, companies today are competing on attempts to provide a pleasurable brand experience to its customers. On the other hand, the production oriented approach is a ‘proactive’ approach in that the company first produces the product/service that is most feasible for the company in terms of its comp etitive priorities (cost, quality, delivery, flexibility) and then makes an effort to sell it to the customers. Thus, production oriented firms are inclined towards mass production of goods that they are able to produce at the lowest cost due of economies of scale (Jeff, 2009). Perhaps, an obvious difference then is that companies adopting marketing oriented approach are able to offer differentiated, innovative and unique products as opposed to production oriented firms that offer standardized, low cost items at several locations (Jeff, 2009). Hence, the fundamental difference between the two is that in the former the ‘customer’ is the driving force behind a new product whereas in the latter, the ‘company’ is the driving force. Furthermore, in production oriented companies the role of the sales force also changes; from that of prior consultation to ‘pushing’ the product to the customer once it’s produced (Jeff, 2009). Hence, the marketin g oriented companies adopt what is known as a ‘pull’ strategy (that is having the customer buy the product he/she wants) as opposed to the ‘push’ strategy of production oriented firms (that push the product it develops based on low costs to the customer) (Kotler, 2007). Although both have successfully co-existed since a long time, it has been realized that most successful

Friday, October 18, 2019

Commodification of Rap by White Artists Essay Example | Topics and Well Written Essays - 500 words

Commodification of Rap by White Artists - Essay Example Such people found discouragement in their early stages as some felt that they were not even a half black to do the rapping. Ideally, rap was a black thing. What matters in the context is how white rappers have fared in this field of music. Eminem has mastered his art far better than a number of his male counterparts. His lyrical flow, regardless of the content has been found more appealing than that of many rappers. But we should digress and consider the likes of Iggy Azalea who are not American in the first place but have seemingly been well treated in the light of rap awards.  Many other rappers in the likes of Azealia Banks feel that Iggy is not in to represent rap or hip hop as she barely understands black issues (Boom). This takes us back to what would otherwise inspire Iggy Azalea to get involved in rap. Is it about the multicultural nature of the society today? Is it about talent? Wait, we should look at what comes with music industry these days. Celebrities are racking mill ions of dollars overnight. This element, money, has set the whole industry in motion motivating many individuals to get involved. Organizations are endorsing rappers so as to have financial returns. These are not the days when radio hosts and programmers had no place for rap as they claimed it was fad. In fact, commercial hubs have reported of increased sales after playing more rap music in their stores.  The big issue is that rap has been transformed to a commodity in the market. It is being traded for money and fame.

Kroger Co.s financial position and the role of profitability and Assignment

Kroger Co.s financial position and the role of profitability and shareholder equitys ratios in it - Assignment Example This essay analyzes The Kroger Co. that is rated among the top five players in thirty-eight out of the forty-two major markets. Most of its competitors have experienced negative growth trend in the recent past however, Kroger Co. has successfully managed to keep a smile on its shareholder’s face by steady sales growth in last twenty-nine quarters. Kroger Co. has a substantial customer base and it and it takes great pride in its loyal customer base as approximately one half of US households have a Kroger loyalty card. This has been a result of Customer 1st strategy that Kroger Co. believes in. It has also been popular among shareholders for its consistent dividend payments. In 2010, it gave out $250 million along with maintaining high investment-grade credit rating and reducing its leverage which eventually resulted in capital gain. Profitability ratios are an indicator of a company’s performance over the year. Profitability ratios include operating profit margin, net pr ofit margin, return on asset, and return on equity. Sales increased by 7.1% to $82.2 billion in 2010, which is more than its competitors. Operating profit margin is calculated by dividing the operating profit by the net sales. The operating profit for the year was $2182 M, as compared to net sales of $82189 M. The operating profit margin was 2.65% for the year. Net profit margin is calculated by dividing the net profit after tax by the net sales amount. Net profit for the year was $1116 M and it constituted 1.36% of the sales. ... Kroger has been trying to reduce its long term debt in the past few years which makes the company less risky to benefit shareholders. The company has kept its shareholders happy by giving a return of 21.07%. Shareholder’s Equity Ratio: The most important ratio in determining the impact of equity on the company is to find the percentage of equity to total assets. This ratio will give us an idea of the role of shareholder in the company’s operation. Also, companies take up debt to keep the larger portion of the profit with them (HORNE, James C. Van and Wachowicz, John M., 2008). This is a regular practice of profitable and established firms. Likewise, Kroger Co.’s asset base is majorly financed by debt and only 22.5% of its assets are sourced by shareholder. This is one of the reasons of high return on equity. This ratio indicates that Kroger Co.’s business model is profitable and becoming its shareholder will be profitable in future. Use and Application of Financial Reports Financial statements are an integral document for any company. It is used by stakeholders to assess the financial position and performance of the company. These stakeholders can be classified as internal and external (BRIGHAM, Eugene F. and Ehrhardt, Michael C., 2010). The internal users of these statements are management, board of directors and sometimes the employees as well. The external users include investors, lenders, suppliers and customers, government department and agencies, competitors, media, labor unions, supporters and opponents. Following are the three financial statements that is of prime importance for an investor, Balance sheet: It is also known as statement of financial position. It presents the picture of the company’s

Thursday, October 17, 2019

Honeynets implementation Case Study Example | Topics and Well Written Essays - 2000 words

Honeynets implementation - Case Study Example To ascertain the effectiveness of the project in administering the foresaid role, I have done sufficient research about the reliability and convenience of the system in managing the task and have found it much viable and efficient. The research done covered a wide scope including monitoring and getting feedback with those already with the system. I have also done hypothetical hacking techniques and in all the cases, the project has proved beyond hacking. I therefore strongly recommend the project for your institution to cushion form such possible attempts. Best regards. Executive Summery During the month of February, we received a formal communication to design a system security than would be hackers proof since the existing one was frequently being intruded in. It did not provide a resistant guard to hackers. Following this communication, we designed a study to help the company in the following ways; I. Keeping intruders outside the production system in disguise while they think the y are inside the main production system. II. It recognizes any intrusion attempt. This is because any operation found within it can only be from an intruder. III. Cheaper to manage; it can be virtually supported as opposed to those that are physically supported. IV. Recognizing and storing the pattern taken by the intruders to help our experts advance a quick counter response. During the month of February, hackers intruded into the production line system of the company. As a result of the intrusion several information were altered within the production system and the company lost very crucial operational and management data. In this regard, the company is estimated to have lost about $ 150,000. As a result of our in depth feasibility study, we established the following criterion for the system to be adopted; a) Can be virtually supported b) It has significantly low cost of maintenance c) It gives the identity of the hackers d) It is difficult to penetrate by hackers In this regard, we want to confidently appeal for company’s management to ratify the new security system and engage it for the next six month during which they will observe the number of attempted hacking without success in the main system. It is at this time that it will prove inevitable to avoid. Abstract The need to prevent hackers from succeeding in their quest is one of the investments being done by most of the organizations. Organizations do invest in various systems that will ensure that their insider information is not leaked to the unauthorized persons or that the unknown does not manipulate the organization’s data. Various systems have therefore been floated in response to the conduct. The lingering question is the viability of the system employed to succeed in the intended purpose, we made a proposal to your organization in this regard where we intended to implement the Honeynet project. Research was done about this project in terms of how successful it is and the informati on collected is

Gangs Assignment Example | Topics and Well Written Essays - 750 words

Gangs - Assignment Example atson, supports the mission statements of organizations like The Peace Keepers, funded by Simmons, which uses mentors to curb violence and crime in communities by fostering a sense of pride and hope in communities besieged by violence, drugs and crime. Video taped messages by rappers Chuck D., Ludacris and Trenton native Wise Intelligent of the Poor Righteous Teachers will be featured during the event. Jay-Z, who once attended Trenton Central High School, was ranked as the 10th best overall artist of 2000-2009 by Billboard Magazine and was crowned by MTV as the ‘Greatest MC Of All Time.’ He is one of the four wealthiest hip-hop artists/producers besides 50 cent, Russell Simmons and Sean Combs. The rally is a community response to the horrifying news of the gang rapes of 15 and seven year old sisters at the Rowan Towers apartment complex last week by several males while at a party.† (New Jersey Newsroom, 2010) For the purpose of this essay, I interviewed a number of students who attend Trenton Central High School who also attended this concert rally, in order to see how they felt about the case, gang violence, and hip hop in relation to gangs. A lot of people, for example 7 out of the 10 people I discussed this with, all believed that hip-hop contributes to violence and gangs by glorifying the lifestyle and violence. But none of the same ten felt that hip hop music was any influence in the case of the 7 year old girl. In the majority opinion, 6 people believed that the sister was to blame for actually being a prostitute and pimping out her sister to the boys in the gang. Four of the 10 people questioned believed that the boys were to blame for the rape and not the sister. More of the surveyed people would blame the individuals for this crime, but blame the gangs (7/10) for the increase of drugs in the community vs. the individual users (3/10) who create the demand for drug supply. Almost all (8/10) agreed that the way gangs glorify drug use, drug dealing, and

Wednesday, October 16, 2019

Honeynets implementation Case Study Example | Topics and Well Written Essays - 2000 words

Honeynets implementation - Case Study Example To ascertain the effectiveness of the project in administering the foresaid role, I have done sufficient research about the reliability and convenience of the system in managing the task and have found it much viable and efficient. The research done covered a wide scope including monitoring and getting feedback with those already with the system. I have also done hypothetical hacking techniques and in all the cases, the project has proved beyond hacking. I therefore strongly recommend the project for your institution to cushion form such possible attempts. Best regards. Executive Summery During the month of February, we received a formal communication to design a system security than would be hackers proof since the existing one was frequently being intruded in. It did not provide a resistant guard to hackers. Following this communication, we designed a study to help the company in the following ways; I. Keeping intruders outside the production system in disguise while they think the y are inside the main production system. II. It recognizes any intrusion attempt. This is because any operation found within it can only be from an intruder. III. Cheaper to manage; it can be virtually supported as opposed to those that are physically supported. IV. Recognizing and storing the pattern taken by the intruders to help our experts advance a quick counter response. During the month of February, hackers intruded into the production line system of the company. As a result of the intrusion several information were altered within the production system and the company lost very crucial operational and management data. In this regard, the company is estimated to have lost about $ 150,000. As a result of our in depth feasibility study, we established the following criterion for the system to be adopted; a) Can be virtually supported b) It has significantly low cost of maintenance c) It gives the identity of the hackers d) It is difficult to penetrate by hackers In this regard, we want to confidently appeal for company’s management to ratify the new security system and engage it for the next six month during which they will observe the number of attempted hacking without success in the main system. It is at this time that it will prove inevitable to avoid. Abstract The need to prevent hackers from succeeding in their quest is one of the investments being done by most of the organizations. Organizations do invest in various systems that will ensure that their insider information is not leaked to the unauthorized persons or that the unknown does not manipulate the organization’s data. Various systems have therefore been floated in response to the conduct. The lingering question is the viability of the system employed to succeed in the intended purpose, we made a proposal to your organization in this regard where we intended to implement the Honeynet project. Research was done about this project in terms of how successful it is and the informati on collected is

Tuesday, October 15, 2019

Citizens view on police conduct Essay Example | Topics and Well Written Essays - 1500 words

Citizens view on police conduct - Essay Example An effective civilian oversight ensures that the police work force utilise their power in respect to the law, and the constitutional rights and freedoms of the citizens. Walker explains that there is a review board responsible for the oversight units in law enforcement agencies. The review board consists of professionals who monitor the law enforcement operations (Walker, 2005). The areas that the oversight agencies focus on include the use of force, personnel issues, and lawsuits against the police departments, policies used in police departments. The special counsel and review commission acts as mediators between the public and the police departments. Citizen oversight agencies process public complains. The internal affairs unit investigates the complaints. The counsel reviews the internal affairs investigations if they find the public complaints are justified the counsel makes recommendations that are incorporated into the policies of law enforcement agencies. According to walker and Andreaz, the recommendations are essential in the transformation of policies in police units. Citizen oversight encourages law enforcement agencies to foster a culture of openness and responsiveness. The special counsel and review commission responsible for citizen oversight publish reports that allows member of the public and media access to information regarding public complaints and the effort made by law enforcement agencies to improve the situation (Walker, 2005). Walker (2005) explains that citizen oversight have time and again failed to achieve their goals. This failure stems from factors such as poor planning, lack of political and financial support. According to walker, the resistance from police departments is a key obstacle in the successful implementation of the citizen oversight goals. Walker argues that citizen oversight agencies desire to have a working relationship with law enforcement agencies and at the same time, they value their independence and objectivity. The success of citizen oversight agencies requires finding solutions for financial constraints and resistance from police departments. It is important for police administrators to come up with ways to foster a working relationship with citizen oversight agencies. This move will facilitate the establishment of a valuable accountability system. Law enforcement units that support the role of citizen oversight agencies benefit by gaining the public’s confidence (Walker, 2005). The problems that citizen oversight agencies encounter while implementing their goals include financial constraints, unrealistic expectation set by oversight agencies, the poor planning makes it hard for oversight agencies to accomplish their goals. A lack of cooperation between oversight agencies and police departments contributes to an increased deterioration of the public’s trust in their police force. Citizen oversight agencies adopt an impartial work attitude where they focus in gathering of neu tral facts. It is due to these reasons that agency investigators fail to embrace the outrage and perspective of citizen complaints (Livingston, 2004). Walker describes that citizen oversight agencies focus on delivering the expectations of the members of the public and at the same time, assist police departments fight the issue of misconduct. However, citizen oversight agencies are encouraged to avoid offering a judgement on the allegations. On the other hand, there are police

Of Mice and Men By John Steinbeck - Coursework Essay Example for Free

Of Mice and Men By John Steinbeck Coursework Essay Of Mice and Men was set in the 1930s in North California. This was a time of economic hardship due to the Wall Street Crash. Men were forced to leave their families and find work on ranches. Pay and working conditions were poor. Men scraped by, spending any extra money they had gambling or in one of the many whore houses. This is where Steinbeck drew his inspiration from; he spent time on the ranches experiencing the hardships experienced by the workers. The book is about these workers and the extremely lonely lives they led. It also exposes underlying themes of racism and how badly the disabled were treated. This was a time when people looked after number one, as there was nobody else to do this for them. The two main characters are somewhat different, as they travel and work together, looking out for each other. This was very unusual because life would have been hard enough without the extra responsibility of looking after another person. The two main characters have just been evicted from their work in a town called Soledad (which means loneliness). They are the only people in the book whose names Christian names are actually used. It shows that nobody makes the effort to make friends enough to be on first name terms. This is symbolic of the loneliness of each of the characters and shows how unusual the two main characters are. The two main characters are called George ands Lennie. There is very little information about them in the book. They work for their keep on the ranches. Lennie is slightly brain damaged and has a very limited memory. He is an enormous man and Steinbeck often compares his actions with those of a large, clumsy animal using similes and metaphors: Dragging his feet a little, the way a bear drags his paws. These are intended to subtly give the reader the impression that Lennie is big and clumsy, like an animal that does not know its own strength; Lennie dabbled his big paw in the water. George is exactly the opposite of Lennie. He is small, dark and quick, and is cautious about his surroundings; The small man stepped nervously George is always on the look out and he knows how to look after himself. The town they had just come from was called Weed which could signify that they were unwanted, like a weed, there: they were forced out of there because Lennie made a mistake. He had grabbed a woman and she said that he had raped her. George is very much the dominant figure in the relationship and makes all the decisions. At the very start you can tell this because Lennie copies George in the way he looks and acts; Lennie, who had been watching imitated George exactly. This suggests that Lennie looks up to George and wants to be just like him. This is quite sad really as he has ended up nothing like him. Lennie hates to make George angry, like a dog that hates to make his master angry. George feels responsible for Lennie. He is like a father figure to him, and he knows that Lennie would never be able to survive without him. He feels a sense of duty because Aunt Clara told him to look after Lennie. The other reason they travel together is George, though he doesnt like to admit it, enjoys Lennies company and he doesnt want to let go of the American Dream. They share the dream of owning their own place with a few animals; livin off the fatta the lan'. George knows it is very unlikely to happen but Lennie still believes and always likes to hear the story of how its gonna be. This is painful for George and he is reluctant to talk about it. You can tell it is important to Lennie because he forgets anything he is told but he remembers the dream. George and Lennie are always dreaming of the future. When George and Lennie arrive on the ranch, the ranch hands and the boss are suspicious of their relationship. They suspect that George is taking Lennies stake for himself; I said what stake you got in this guy? You takin his pay away from him? They cannot see why someone else would travel with someone who would restrict them unless they were getting paid. They are lonelier than George and Lennie, and have no real concept of friendship. Despite having Lennie as a companion, George is also lonely. He is alone in his responsibility for Lennie. In a way it is more like speaking to an animal than a human when speaking to Lennie because George knows that whatever he says to him will be forgotten and mean nothing. From the very beginning we get a hint of this by the way Lennie is made to seem more like a responsibility than a friend to George. Lennie is made to seen like an animal, like a terrier that doesnt want to bring his ball back to his master, maybe signifying that he is like a pet that always needs looking after. Steinbeck also uses George playing solitaire as a metaphor for his loneliness; George cut the cards again and put out a solitaire lay, slowly and deliberately. George lays the cards out like he has done it many time before. Solitaire is a single player game (and solitaire is derived from solitary), this shows that Lennie is not capable of acting like an adult and so George must play on his own. George is held from having his own life by the responsibility of caring for Lennie. He continuously tells Lennie how life would be without him; how he could have a girl and a decent job: God amighty, if I was alone I could live so easy The truth though, is that George would be even lonely without Lennie. It is ironic at the end of the book that George should be so upset by the death of Lennie, because then he realiz es that he will have to spend all the rest if his time alone. You never know what you have until it is gone. One of the ranch workers, Candy, features heavily in the book. He tries to join the friendship of George and Lennie. Candy is extremely lonely. He has been working on the ranch for many years and due to his disability. He is unable to leave because he knows that no other employer would take him on. The only reason he has got work now, is that he suffered the injury to his hand on the ranch. He has seen many men come and go but he cannot move on. Candy knows he will probably die on the ranch. Candy is very talkative because he is so eager to make friends. He warms to this gossip because he on his own when all the workers are in the fields. As soon as he meets George and Lennie he engages them in conversation, hardly letting them speak. He lets out all the opinions, about Curley and his wife and the other ranch hands that he has formed and never had anybody to tell them to. In fact the only sort of a friend he has is an old dog. The dog is old, has no teeth and it stinks. The dog is used to symbolise Candy: old and useless. The dog is also used as a foreshadowing device for Lennies death. When Carlson tells him that he should kill the dog he tries to stop him by making up excuses: Maybe itd hurt him, and tries to put the inevitable off; wants to spend just one more day with the dog by killing it in the morning. The only reason Candy had left to live was the dog so in a way Carlson killed a part of him. The dog is also used as a second foreshadowing device for what George has to do to Lennie in the conclusion of the book. Lennie, unlike the dog, however will be killed by the only person he trusts in the world. This will come from the pressure of other people. In the early 20th Century, blacks were heavily persecuted because of their colour. The stable buck is called Crooks and is discriminated because he is a black; Spose you couldnt go into the bunkhouse and place rummy cause you were black. He is kept apart from the other ranch hands because of his race. He is very nervous when Lennie enters his room. This is because crooks has his own living space away from the other men. The only people he sees are probably going to insult or hurt him so he is immediately on guard when someone comes in to his room. He is also discriminated against because of his crippled back, which means that he cant work in the fields like the other men. Crooks reveals his past to Lennie in his barn. The irony that his father used to own his own ranch and once he used to lead a comfortable life must be extremely painful for him to relive when he thinks about his present lonely self. That is probably why he is so bitter towards the other men who are treating him so harshly. Crooks is always dreaming of the past; Remember when I was a little kid on old mans chicken ranch. The other men would probably dream of having their own space but Crooks is so lonely he would rather be with other people; A guy ne eds somebody to be near him. All Crooks has for company is a small collection of books that he reads over and over again. It must be very lonely being on your own all the time when he thinks about what it had been like when he owned his own ranch. Sometimes he almost goes crazy with loneliness; Maybe if he sees somethin, he dont know whether its right or not. He cant turn to the other guy and ast him if he sees it too, He is only admitting this because he knows that Lennie is not listening, and even if he was, he couldnt remember and repeat what was being said anyway. Crooks is proud and doesnt want to admit that he is lonely or that the men are getting to him by calling him names and abusing him, If I say something, why its just a nigger saying it. When someone calls somebody something enough times a person will start to absorb the names and start to believe that there is some truth to what the person is saying about them. Crooks is treated like an animal. One Christmas time they let him into the bunkhouse and made him fight. The word let is used like letting an animal in for a treat. He then leaves after his fight, for his own room. The men just use him as entertainment. His life is always under threat because he means nothing them. Curleys wife plays a very prominent role in the book as she brings the death of Lennie and herself. She is not given a name through the whole book. This signifies how little everyone thinks of her. She is referred to as jail bait and slut by all the ranch hands. This is due to the manner she has adopted to befriend the men. She constantly flirts with any man she meets and being pretty at the same time, she is bound to get herself into some sort of trouble. She acts like this because she is lonely and it is her way of attracting attention to herself. The problem is that all the workers are afraid to talk to her because they fear what Curley would do to them if they did. Curley is always looking for a fight to show how much of man he is. If he got just the faint scent of her cheating on him he would fight. Nobody want to get on the wrong side of Curley because they know he is a good boxer and because he is the bosss son he can probably get anyone canned if he wants, In reality, Curleys wife doesnt actually like Curley and even admits to Lennie: I dont like Curley. She married him to show her mother that she could be independent and to get back at her for the letter that could have been her big break that she thinks her mother stole. Curleys wife is dreaming of what could have been, how she could have been in the movies and what a lifestyle she could have had. The marriage between Curley and Curleys wife is not based on love but on sexual attraction Curleys wife is also very lonely, that is why she is always skulking around the bunkhouse with the men. She needs someone to talk to; She uses the excuse that she is looking for her husband. In the end her loneliness is the end of her when she tries to talk to Lennie (much the same way as Crooks let out his thoughts to him). The climax of the book starts in the barn. The scene begins with Lennie worrying about his puppy which he has just killed accidentally. Curleys wife enters, as usual looking for someone to talk to. She begins telling Lennie her life story. All through the book she has been portrayed as a spiteful woman; foolin around with other guys, causin trouble., but here her true character comes out. Lennie ends up telling her about his love for soft things so she lets him stroke her hair. The other men can resist her charms but Lennie is not clever enough to know. Lennie strokes it a bit too vigorously and her panic affects Lennie. He breaks her neck by accident, then thinks that if he hides the puppy, which is used as a foreshadowing device to Curleys wifes death George will be more likely to let him tend his precious rabbits. This is sad and ironic, as Lennie cannot grasp the enormity of the thing he has just done. Curleys wife seemed peaceful after her death; the ache for attention were gone from her face. She was realised from her prison on the ranch and was now free and happy. When George hears, he despairs, for Lennie has ended their chance of achieving the impossible American Dream. One of the themes of this book is certainly loneliness. The people are segregated into groups. Age, disabilities, race and sex separate many people. Also the time of economic hardship forced men to look after number one. It made it very hard for the men to form friendships as they have very few responsibilities. The book is about the unusual friendship of George and Lennie who have nothing in common with each other apart from they share the American Dream. That is all that keeps them going. It is extremely sad when George is forced to kill Lennie because he was all that George had left. It was ironic because George had always spoken about what life would be like without Lennie; how he could be free. Now he had his wish he was devastated that he had had to kill the only friend that he had in the world.

Monday, October 14, 2019

Macro Environment Analysis: PEST

Macro Environment Analysis: PEST With the increasing of international business, there has been growing interest in how a successful organization to create a appropriate international strategy. This article provides an expanded approach to an organizations strategy and linkages that exist in international business operations. Geely Holding Group as an illustrative case to be evaluated by suing PEST analysis, Porters Five Force Model, SWOT analysis, and Integration-responsiveness Framework. By analyzing all internal and external elements and variables factors, this paper proposes a list of recommendations and solutions to promote Geelys international process. Key words: Internal Business Environment, External Business Environment, industry globalization and localization drivers, Critical Success Factors, competitors Integration-responsiveness framework. 1.0 Introduction 1.1 Background of Automotive Industry The automotive industry is growing with globalization since the first automobile was built in 1885. To the present day, more than 70 million motor vehicles were produced extending throughout the world. China , Russia , Brazil and India became the major markets rapidly. In 2008, the Figure 1 shows there were about 73.2 million new motor vehicles were sold worldwide (OICA, 2009). The production has continuously increased, whereas sales started decrease in late 2007. The whole industry was weakened by a substantial increase in the prices of raw materials and fuels cost. Furthermore, the recession began in 2008 had a profound influence on the auto industry. By 2008, a series of damaging blows drove the automobile manufacturers include American Big Three to the verge of miserable condition. Dugigg (2008) has referred to such a language as The automotive industry crisis occurred between 2008 and 2010 is a part of reflection of global financial downturn. The crisis primarily affected the American and European automobile manufacturing industry. Decline in productivity has resulted in less output, meanwhile, due to the economic crisis, oil price shock and environment expectations, more and more automobile buyers turned their attention on a higher quality and more fuel saving auto vehicles. This phenomenon of changing product demand gives many automobile manufacturers a heavily shock. Therefore, many famous automobile manufacturers have no choice to sell some of its famous brands in order to relieve financial pressure. Undoubtedly, it provides opportunities to other private enterprises entry the market. China became both the largest automobile producer and market in the world after experiencing massive growth in 2009. For example Ford, the one of The Big Three of American au tomobile manufacturer and the fourth-largest in the world based on cars sold number annually (OICA,2008), battled against the weak currency market and sold decline. Failing investments and an increasing unemployment rate has exacerbated the impact of the crisis. 1.2 Geely Holding Group Profile According to the company brief of Geely (2010), Geely Holding Group is one of Chinas top ten private automakers and also among the countrys top 500 organizations. Geely is founded in 1986 and is today a fully integrated independent auto firm with a complete auto eco-system from design and research and development to production, distribution and servicing (Li Shufu,2008,p 9). Although Geely has achieved great success in domestic automobile industry, it pays more attention to explore global market. About 40000 vehicles are exported for sales in 2008, ranking second place in automobile export in China. In March 28, 2010, Geely Group signed a contract to make an acquisition of Ford Motors Volvo automobiles brand for the cost of $1.8 billion (Nordstrom, 2010). Through acquisition, Geely can rapidly accelerate its international business in automobile industry and become a leader in this area. 2.0 Geely Business Environment Analyses 2.1 Conceptual Background on Business Environment John Kew and John Stredwick(2005) similarly argued that business environment is a situation largely outside the control and influence of an organization, and the factors in business environment car potentially have both benefit and passive impacts on an organizations present or future activities. It is useful to divide into two the micro-environment and the macro-environment. Middleton (2003) elaborated that the macro-environment involves factors such as the economy, government policy and social change, outside of the direct control of the business. These factors such as the economy, government policy and social change can have a significant effect on a firms success but the relationship is fairly one way. The PEST (or PESTLE) analysis appears to be by Francis J. Aguilar in 1967 can analyze the macro-environment efficiently. The individuals and firms belong to micro-environment and have direct activities of a business. The members of it include suppliers, distributors, competitors, c ustomers and employees. These factors will affect the performance of any organization. Thus, the micro-environment plays a critical role in the success and behavior of a business. Use the Five Forces analysis to gain insights into the competitiveness of the micro-environment (Cliff, 1990). 2.2 Macro-environment Analysis by use PEST Analysis PEST is an acronym for Political, Economic, Social and Technological. Organization can use this tool to reduce risks associated with operation. The Oxford University Press was strongly shaped and influenced by PEST analysis. As the relevant article published in 2007 shows A PEST analysis is helpful understanding the position, potential and direction for a business. PEST Analysis on Automotive Industry Political Political factors relate to government policy that firms have to operate, such as trade regulation, political stability and trading policies. Political decisions can impact on many vital aspects for organizations. Automotive industry has propelled by government incentives. For example, China government used stimulus measures to support vehicle sales, such as cuts in sales tax for engines smaller than 1.6 liters. Indeed, Geely as a famous independent privately owned firm in China, it has a strong support from the government. Moreover, America saved the American Big Three of the automobile manufacturers in 2009. Furthermore, governments make no difficultly with automobile merger of cross border or oversea purchase domestic brands. A great deal of mergers and acquisitions activity from auto manufacturers to parts suppliers (Gaughan, 2008). For instance, Geelys international acquisition is evident to that. Economic Economic factors include interest rates, taxation changes, economic growth, inflation and exchange rates. Above of these impact the profit of firm and customers purchasing power. Exchange rate fluctuation influences on vehicle international trade, a weak currency may make export easier. An economic slowdown in many parts of the world during the financial crisis. In this term, interest rate and inflation are unstable. In fact, recession let automotive industry has a huge problem. However, China has remained the only one of the worlds major economies that continued to show growth through the global recession of 2008-2009. Chinas strong economic boom of recent years continues to lift incomes and bring more of the population within financial reach of car ownership, vehicle sales arrived at 13.6million units in 2009 CAAM reported (Just-auto). Social Social factors include lifestyle trends, culture, buying access and trends. These factors affect consumers demand and the size of potential markets.Focus on social trends can improve on the firms reaction to customers need. Consider of fuel cost and environment pollution, increasing consumers need small cars. In other words, customers prefer to high quality, low price, complete service, and added value for an auto vehicle. Technological Technological factors involve new technologies create, rate of technological diffusion and change, replacement technology and so on. Individuals and governments are set up to promote new technology in renewable energy and create electric vehicles. Conclusion Above of these factors could be important macro-environment elements in an automobile manufacturer. It is vital to gain an insight into the macro-environment of the industry to guide strategic decision-making. In political aspects, although most governments propel development of auto industry, some of them take a system of tariffs or other measure of protecting domestic producers, especially compare with Chinas new stimulus measures. It doubtless impacted automobile international trade. If the firm choose a place with abnormal inflation rate, high taxation and may lead to production cost and operation fee, taxation and unstable exchange rate, the firm will have high risks associated with operation. Consider social and technological factors, companies in should focus on research and development to environmentally-friendly products like electric vehicles. 2.3 The Porters Five Forces Analysis on Micro-environment Porters Five Forces analysis is a simply tool to analyze the determinants of an organizations profit; it can be summarized through his Five Forces Model in figure 3. (Chris, Stewart and martin, 2008). This model attempts to explain relationship between competitors, new entrants, suppliers, customers and substitutes. Understand of critical issues is vital to establish what the best competitive position and gap is (Michael E. Porter, 1980). 2.3 The Porters Five Forces Analysis on Micro-environment Porters Five Forces analysis is a simply tool to analyze the determinants of an organizations profit; it can be summarized through his Five Forces Model in figure 3. (Chris, Stewart and martin, 2008). This model attempts to explain relationship between competitors, new entrants, suppliers, customers and substitutes. Understand of critical issues is vital to establish what the best competitive position and gap is (Michael E. Porter, 1980). Rivalry Among Existing competitors Rivalry competitors always have similar products or services in the same industry. Strong rivalry is likely to generate profits damage. The degree of rivalry is high when competitors have become more equal in market share and capability, tempted use price war or other competitive measures to boost sales, low barriers to entry, demand for the product is growing slowly, the costs of leaving the market is high and a little brand loyalty because of so similar that customers are easily switch products. According to automotive industry, rivalry can be intense and cut-throat due to more and more competitors undertook the vehicle manufacture. 2. Threats of New entry For other Chinese firm enter the automotive industry it is expensive to set up a nationwide network in marketing and equipment. Geely established in 5 strategy markets, such as CIS, Middle East, Africa, Southeast Asia and Central and South America. The existing automobile manufacturers have gained high reputation in market and established excellent brand image. However, the existing firms have no control of the supplies; new entries have opportunities to development. In recent years, Chinese domestic auto companies that have experience in host country like Chery, Chana, Saic and Baw, have active performance in international market. Therefore industrys profitability was affected. Like Porters view, In a market with low barriers to entry, the threat of newly competing rivals is high only when the level of profitability in this industry is high as well. To illustrate, in March 2nd, 2006, Chery had exported its own products to American. Chery has gained a certain market share in Europe, Africa, South America and North America in 2009. 3. Threats of substitutes A substitute is something has similar function as existing product in the industry. According to Porter, the threat of substitutes also influences the bargaining power of companies. (Chris, Stewart and martin, 2008,p.37)If substitutes have lower price, good performance or both, then some customers will be tempted to move new products. Substitutes are not in direct competition but have nonetheless a massive impact on existing companies, for example decrease goods price and raising investment to improve products or services. However, there was no obvious evidence of substitutes in automotive industry. Although some countries have complete public transfer, but all of these 4. Bargaining Power of buyers Powerful buyers will be able to force down prices thus can bargain away profits of firms that sales goods or services. Porter argues that the profitability of an organization depends on the bargaining power it exercises in negotiating prices with suppliers and customers. Buyer power will be higher if they are scale important in this transaction. For example they purchase in large quantities or purchases represent a sizeable percentage of the industrys total sales. However, this kind of powerful buyer are difficult appear in global auto industry, it could be happen in a small area. Especially, there are a few buyer of the firm, big buyer is vital to them. Moreover, when the industry emerge large numbers of small sellers or customers can easily switch to other provides, consumers have powerful negotiation to extract a high quality service at a good price. In fact, international auto market has a great many vehicle brands not only in low-end car market but also in high-end auto market. Buyers have a very wide selection. 5. Bargaining power of suppliers The strong bargaining power of supplier is leading to a squeeze on profits through higher input costs. If there are relatively few suppliers within the industry or organizations are difficult or costly switch from one supplier to another, the suppliers of raw materials, power, skilled labors and components will have power of high prices negotiation. According to China Association of Automobile Manufactures research (Plunkett, 2007) shows cost, design, security and extra capability are decisive factors in a cars value. It requires suppliers to enhance the quality of their products and service. Global competition in auto industry: Along with the continuous impact of financial crisis, the international market is shrinking. Meanwhile, the profit of international auto market decrease along with the shrinking revenue. Consequently, the competition in international auto market is becoming fiercer and fiercer. The automobile market is at the maturity stage of the life cycle, locally and globally, due to an increased number of competitors from domestic and foreign markets. The automobile market is characterized by a low potential for market growth, but high sales and limited profit margins. Competitive forces are high in each segment of the overall market, Geely currently face fierce competition against Lifan, whos marketing strategy is price oriented, its model series LIFAN520 has gain a considerable proportion of the market due to its low price strategy. After the buy out of Volvo, it is expected that Geely will shift its current strategy to differentiation. Hunt (1972) proposed a strategic group analysis to identi fy and group strategic characteristics, following similar strategies or rivaling on common bases. Criticism offers that the study of strategic groups is merely from cognitive perspective, notwithstanding the framework have obtained prominence over the years (Hodgkinson 1997:623). Profit Margin High Low Sales Volume Low High High sales with average margin Toyota, Chrysler, Honda Low Sales Volume with high margin BMW, Mercedes, Jaguar High Sales Volume with low margin Lifan, Geely Low Sales and low margin Chery, Chana, Saic Baw Figure: Strategic Group Analysis To sum up, along with the recovery of international economy environment, and Chinese governments policy on private enterprises access to internationalization, it provides convenience and opportunity for Geelys international strategy. Nevertheless, due to deficient consumer confident on private enterprise and the restriction of consumption environment, Geely faces mighty competition pressure. Thus, what is needed is the improvement of Geelys ability to respond to external factors after acquisition. When we make an international strategic plan for a multinational enterprise, we have to take the corresponding relationship between local factors and global factors into account. The IR framework provides a visual diagram for us to demonstrate the diverse and conflicting pressures that firms confront. The two major concepts that will influence MNE are integration and responsiveness. By integration, Prahalad and Doz (1987) refer to the coordination of activities across countries aimed at building efficient operations networks and taking maximum advantage of similarities across locations. By responsiveness, they refer to the attempt of responding to specific needs of host countries, and note that businesses can choose to emphasize one dimension over another, or to stress both dimensions. Thus, firms have basically three strategic options at their disposal: the global integration strategy, the locally responsive strategy, and as sort of an in-between option, the multi-focal strategy. The choice between the three strategic options is governed by the perceived intensity of two forces in the firms operating environment: the pressure for global integration and the pressure for local responsiveness (Prahalad Doz, 1987, pp. 18-21). The global integration and local responsiveness pressure of Geely is listed in Figure 8 Integration Pressure(Globalization drivers) Responsiveness Pressure(Localization drivers) Economies of Scale. Geely needs to set a brand of subsidiaries to achieve economies of mass production. Consumer trends and universal needs. The word Consumers are God should be a basic principle of Geelys cultural. Uniform service to global customers. Services are essential to win global consumers enthusiasm. Global sourcing of raw materials, components, energy, and labor. Source from large-scale, centralized suppliers provides benefits from economies of scale and consistent performance. Global competitors. Global cooperation and coordination is necessary to resolve competitive threats in foreign and domestic markets. Availability of media that reaches customers in multiple markets. Geely should take advantage of the Internet and cross-national television to advertise their products in different countries simultaneously. Unique resources and capabilities available to the firm. Each country has its own abundant resources. Diversity of local customer needs. Different people in different region have different appetite and requirements on vehicles. Local competition. When competing against numerous local rivals, centrally-controlled MNEs will have difficulty gaining market share with global products that are not adapted to local needs. Geely should diversify its products. Cultural differences. MNES have to adapt to local history, language, custom, ways of dealing with people and culture. Local government requirements and regulations. Local governments usually impose trade barriers or complex business regulations to protect local trade. Apparently, Geely has great ambitions to become a top automobile manufacturer giants in a few years. However, due to the reason that Chinese automobile industry has started later than many developed countries, Geely has a huge gap between other large manufacturers. Although Geely has already acquired Volvo, it has numerous obstacles such as international humanresource integration and management, autonomous technology RD, and cross-cultural conflicts. According to the analysis of Figure8 and IR framwork, we can conclude that Geely has to seek to achieve both global effectiveness and local responsiveness. Geely must achieve simultaneously requirements for strong central control and coordination of subsidary companies and decentralization and empowement to local responsiveness. 3.3 Key Factors for Success in Automotive Industry The Critical success factors (CSF) is a notion which is applied to understand the elements necessary for an organization to archive its objectives, it is initially applied in the data analysis and business analysis (Rockart, 1979), later it extended its use in IT projects to enhance the user involvements (Boynlon, 1984). In the automotives industry, there are a set of critical success factors for firms to achieve in order to obtain unique competitive advantage. First, engineering and innovation in car designing, a firm can gain remarkable advantage via superior quality of engineering in automotive production, skilled labour force, fashionable design and luxury taste. Second, Brand image is of essence in todays auto mobile competition. E.g. BMW claims its brand as ultimate Driving Machine (BMW, 2004), excellent brand image can lead to fanatic loyalty towards the brand thus create advantage. Third, safety is guaranteed by the quality of vehicles, premium quality mobile, sophisticated testing methods and strong safety record will all contribute to competitiveness of a firm. Fourth, cost reduction, sophisticated techniques e.g. JIT system or host country advantage can have direct impact on the cost reduction of a firm. Fourth, if a firm can tightly control its distribution network, it can manage its bran d more efficiently and make more effective communication with its distributors. Fifth, a firm has an excellent grasp on supply chain management enables the firm to maintain a good relationship with suppliers in the long run, to ensure that the customer needs are satisfied. The strategic positioning model is widely applied to demonstrate how a firm shifts its strategy in a variety of ways (Boston, 2000). Chesbrough and Rosenbloom (2002) argued that the application of strategic position model enable the user to gain a clear picture of the competitive advantages of the chosen firm. In Geelys case, due to the host country advantage now Geely possess the cost advantage in the low end market from global scale. However the acquisition of Volvo may help Geely to gain the engineering expertise and a positive brand images, consequently create more competitive advantages for the firm. 4.0 International Strategy of Geely 4.1 Internal and External Factors Analysis by Using SWOT Analysis SWOT analysis is a simple and useful tool for strategic alternatives from a business environment analysis. SWOT formed from the initial letters of Strengths, Weaknesses, Opportunities and Threats. It through analyze the internal and external environment to help organizations understand current situation and make decision easily. The SWOT analysis was provided by Albert S. Humphrey in the 1960s, but now it development into an absolutely necessary part of the strategic planning process (An Soff, 1965). Indeed, it is considered the first step of forming a strategic picture. SWOT analysis divide into two aspects, one is external factors as opportunities and threats, the other aspect is internal factors include strengths and weaknesses. Strengths and weaknesses are essentially internal to an organization and relate to matters concerning resources, programs, and organization in key areas. Opportunities and threats tend to be external- from competing organizations, global trends, and other environmental factors. (Charney,p 170,2005) The SWOT analysis reduces the relevant information from internal and external environment to a manageable quantity of primary issues. Logically, it is helpful optimize the firms resources and capabilities, therefore a firm can better leverage its strengths, correct its weaknesses, capitalize on golden opportunities, and deter potentially devastating threats. (Menon,1999,p 30) Thus, a comprehensive SWOT analysis of Geely contributes to a better understanding of Geelys international business environment at internal and external. The figure below is the SWOT analysis on Geelys acquisition of Volvo. SWOT analysis on Geely Internal factors External factors Strengths Opportunities Owns many patents. The maturity of domestic market. Ranking 2nd place in automobile export in China. Supports from government policy. A mass of honest customers in the low-end car market. Geely got further research and developed new energy vehicles. Effective cost control of manufacturing and sale while has high performance price ratio. Increasing needs at abroad. Vehicles have gained high reputation in overseas market and established excellent brand image. Advanced production facilities and technology in low-end car. Local competitors have poor products. Geely can launch 4-5 brand new car models and engine models every year. RD is greatly improved to provide efficient guarantee for the overseas business development. Geely successfully acquired the worlds second largest automatic transmission company called DSI. Capital rising by entrust loans from reliance group. Product innovations ongoing. An increasing trend on global market shares. A billions credit limit from China Everbright Bank and the support from Goldman Sachs Investment Bank. Weaknesses Threats The scale gap with other large automobile manufacturer in the world. Brand appeal is low, oversea consumers have little confidence on new private brands. Marketing network is incomplete, oversea staff need training. Consume circumstance of automobile market is depressed since financial crisis. No takeover experience at automobile company abroad could be called up. It has risks in culture and operation. More and more domestic private brands emerge in automobile industry likely entry of new competitors. Management cover insufficient, Lack of management depth A high safety standard of international import and export motor vehicles Inadequate financing capabilities. Capital situation is unstable. Culture difference impact management style and sales product, oversea customers maybe refuse to adapt new products. It will invest huge number of money to operate in the further years. The market system is incomplete. Manufacturing technique is deficient, poor quality vehicles and less value. New regulations exposed to political problems in the countries that operate in, besides, taxation maybe introduced on product or service. 6.0 Current Situation and Recommendations Independent Research and Development There is no doubt that core technology is the essential of every company in every industry. Moreover, when Geely grasp the unique core technology in automobile industry, it will have the pricing power and cost control, which is the key factor of its globalization strategy. Therefore, Geely has to put more energy on research on its own patents. It is advisable for Geely to set up its own lab. Geely can attract scientists and technicians by offering well-paid position and reputation. 2. Pay attention to domestic market Chinese market is a huge cake which contains abundant human and raw material resources. More and more foreign have rushed into China in order to seize the new prosperous market. As a domestic enterprise, Geely has many unique advantages such as human network, government supports, and public patriotism. Domestic market is the solid back supports for Geelys international development. 3. Cross-cultural management After acquisition, Geely has to take over a series of overseas factories, which means Geely has recruited hundreds and thousands of foreign employees. How to manage them effectively will be the first challenge for Geely. Cultural shock, language barriers, miscommunications, and staff turnover will be the main obstacles in Geelys management. It is suggested that Geely should pay attention to leadership theories. Empowerment, motivation and teamwork are the key factors involved in Geelys management. 4. Government supports In order to expand international market, Geely has to face with different laws and regulations. Building a harmonious and cooperative relationship with governments is essential. Geelys investment and development can enhance local employment rate and increase local tax revenue. Simultaneously, government can provide unique supports for Geely. Cooperation with governments is a win-win strategy. 5. Building a talents training system Experts and technology are the core productivity for a MNE. Geely can set up its own talent base through establishing independent labs and donation to famous universities. Through collaboration with universities and labs, Geely can gain a reputation for thousands and hundreds of students, who have potential to contribute for Geely in the future. Unauthorized Intrusion Or Hacking Information? Unauthorized Intrusion Or Hacking Information? This survey paper will give us the brief overview of what cyber attacks are, what are their types and their causes and what steps should be taken in order to control or counter them with respect to information security management. With the current advancement in cyber technology and mass adaptation of this technology by most of the organizations and businesses cyber security becomes the key concern. Most of the operations like financial, industrial and commercial are interlinked and dependent on each other and ever more dependent on information technology. At the same time, the rapidly growing interconnectivity of IT systems, and the convergence of their technology towards industry-standard hardware and software components and sub-systems, renders these IT systems increasingly vulnerable to malicious attack. (Randel, etal,1998) Introduction: As technology progress and capabilities of information warfare have developed significantly in recent years, the probability of cyber attacks have increased as well. Computer-network attacks mainly known as cyber attacks can destroy adversary data, computer systems, and networks, and can have a major effect on an adversarys ability to wage war (Bayles, 2001). In the cyber arena, the situation is, in some ways, worse than simply paying too little heed to a potential new threat until it manifests itself. Threats in the cyber arena have manifested themselves. We are reminded constantly of our vulnerabilities to the threat, yet we still are not doing enough. Every hour of every day, some individual or group is writing or disseminating a new disruptive virus or worm or is breaking into a computer network or to harm a network by some other means (Vatis, 2004). It is usually said that it is very productive and simple to bring computer in our systems and to increase its usage but at the same time it is significantly difficult and far more expensive to develop technologies to make it secure mainly because of the internet, a network which is used to share information rather than hiding it. Most cyber attackers are attracted to high value targets such as networks, servers, or routers, whose disruption could yield financial or political consequences (Vatis 2001). Types of cyber Attacks: According to (Arnold and Pangi, 2003) Main objective of the cyber attacker is to steal, destroy, remove or change information or to block the functionality of the system which they want to target. We can divide these attacks typically into three main categories, Unauthorized Intrusion or Hacking Destructive Viruses or Worms Denial of Service attacks (DoS) Unauthorized Intrusion or Hacking: Unauthorized attacks are attacks in which attacker get access in to the system by the means of different hacking or cracking techniques. This type of activity will be performed by some outsider who wants to have access of the system in order to use it for some negative purpose. Second type of threat is from an insider who illegally wants to access the system which he or she is not authorized to in order to do harm the network or system. We can divide hacking further in to three more categories, system can be shut down by hacker after regular interval but this kind of hacking activity easily recognized by the administrator and can be easily fixed. Sometimes there are defacements which change the information on the computer system, this type of activity is also easily traceable as sometimes hackers place a note like you have been hacked à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦etc. Defacements are potentially more disruptive as they subtly change figures or alter information. Another common type of defacement is website defacement. Hackers regularly deface information on organizations or government websites in order to ridicule the entity that sponsors the site or to put hackers own message. Most of them are just nuisance not a serious threat. Semantic hacking is one fo rm of defacement which is potentially more harmful as it changes the content of a web page deviously so that the change could not be obvious which results in the dissemination of the false information. An example of possible semantic attack with significant impact would be change in the website of disease control and prevention system which could have a disastrous effect on research and analyses or treatment of the disease. Thirdly the possible threat is of Trojan horse programmes. These are the silent operations and aim to pass undetected by virus scanners. They get the information from the system and send it to the hacker. (*, 2007) Destructive Viruses or Worms: These types of attack usually spread through emails or some other source of data transfer between computer to computer and can cause the loss of functionality of parts of the network. Worm and viruses are malicious computer program example of famous virus is love mail which use to shut down the system and another example of this kind of virus is I love you email as soon as attachment is opened it start sending copies of the same email to all address in users address book. Denial of Service attacks (DoS) Denial of service attack is a sort of attack in which hacker bombard the system with number of messages with such a frequency that system cannot able to process anything else. It overload the computer system which results in effecting the functionality of the system. Distributed denial of service (DDoS) attacks is another useful mean of putting computers off network for some time. In Distributed Denial of service attacks hacker bombard the web and email server from great number of messages, by receiving such a high numbers of fake messages system functionality becomes slow or sometime system get crashed. Hackers can easily increase the effect of their distributed denial of service (DDoS) attacks by using malicious codes to get control of other systems and using these Zombie machines to send more messages on to the servers(Arnold and Pangi, 2003). Domain Name server (DNS) Attack: According to (Arnold and Pangi, 2003) Communication between two computers on the internet is done by using internet protocol address of computers. To map the name of the website computer consult domain name servers and if DNS give wrong numerical address than user will connect to a wrong server without any information that he is on wrong server. This sort of attacks will be useful in spreading incorrect information and to divert a customer of e-commerce site from the original site or sometime block access. DNS is hierarchal there for the cascading effect on remote servers would result in traffic to selected site to be redirected or loss. (Cortes, 2004) Compound attacks: As the word compound itself describes these attacks are the combinations of 2 or 3 different attacks simultaneously. Purpose of these attacks is to increase the destructiveness of some sort of physical attack with the help of coordinated cyber attacks e.g. terrorist might place some boom in densely populated area at the same time with the help of cyber attacker they disable the communication setup of emergency services like ambulance, fire, police to impede there response. (Arnold and Pangi, 2003) Routing Vulnerabilities: Router controls all the traffic on the internet that is there they make it sure that the information in the form of packets, get from the source to destination. In general router is not a primary threat for disruption, but if the routing operation is not well diversified than it can lead to a massive routing attack. So it now a primary concern for the router manufactures to follow standards and regulation for maintaining the security on routers. (Cortes, 2004) Sources of Attacks: Cyber attacks can be launched from different sources depending upon their motives and the target they want to attack, generally we can group them in three categories terrorist groups, targeted nation-states and thrill seekers. Terrorist Groups Terrorist activities are the great threat for the whole world. Terrorist are not only targeting the physical infrastructure of the countries but now they are targeting the IT infrastructure as well. i.e. hacking the government websites and causing serious damage to vulnerable information (Cortes, 2004). Targeted Nation-States Most of the countries which dont have the friendly relation with one of the some countries use cyber attacks to sabotage the IT infrastructure of their potential enemy in order to safe guard their own national interests. e.g. India and Pakistan both are trying to attack government an defense resources in order to harm each other. Similarly China, America and Russia try to initiate attacks on each other national infrastructure primarily security network (Cortes, 2004). Thrill Seekers These sorts of attacker are not attacking the network for specific purpose rather they do it for fun and check their ability to break the secured networks. Because of the advancement in technology probability of these attacks are high (Cortes, 2004). Countering Cyber Attacks: Due to technology advancement and use of IT in almost every field of life and day by day increasing cyber attacks it is mandatory to counter all this cyber attacks and to secure the IT infrastructure as much as possible. Although countering these cyber attacks is not an easy job rather much complex and consist of several layer of defense. It take time to develop a mature program. The ratio of threat is changing day by day probability of risk is increasing and organizations should change their approach towards information security and take it as a primary concern. Establish threat intelligence gathering Capability Threat monitoring Risk analysis Security strategy validation Minimize delivery of malware Security awareness enhancements Continuous controls update Website protection Threat monitoring Application security testing Prevent execution of malware Application whitelisting Least access privileges Network restrictions/segmenting Identity and access management Protect the data Protect the data/data loss prevention Detect and respond Host and network anomaly detection Incident response program Forensics Source: insight of IT risk 2010 Established threat gathering capabilities: In order to understand the continuously changing threat landscape organization should develop an intelligence gathering capabilities to supervise and plan strategic and tactical responses to threats. This team should consist of qualified professionals who can keep an eye on the current threats and interpret how the organization can be effected by these potential threats and what necessary steps should be taken to modify the organizational security controls and overall security strategy. The prime objective of this time is to monitor the threat level than analyze it that how it can effect their organization and than to develop a strategy (Ernst Youngs, 2010). Minimize delivery of malware: By strictly implementing the traditional security measures in the organization the threat of malware can be greatly reduced below mentioned are the ways how we can reduce the threat level. Social engineering: It is one of the most common methods of reducing the threat or malware environment. There are number of ways by which this threat can be introduce like phishing or dropping USB in organization premises and hoping some one will use this USB in company computer, resulting employees unintentionally perform a harmful action. Regardless of implementing the entire advance technical controls human factor will remain the weakest link in spreading malware. So the solution of this problem is to aware the employees as much possible against these threats so that the employees protect them self to unintentionally become a source for spreading these malware. Research shows that companies are not doing well in promoting awareness to their employees. The organization should conduct the information security programmes on regular intervals. So that there effectiveness will be increase (Ernst Youngs, 2010). Security awareness: Mean to educate the employee about the common threats which are used by the cyber attackers. This awareness can be increase by including security awareness programs in the companies overall defense in depth strategy. These programs should include education about new threats different examples how employees contribute to the success of the attack and lesson learned what means are used by cyber attacker using social media etc. to target organizational networks and than take the feedback from the employees (Ernst Youngs, 2010). Malicious software: Another way which can reduce the threat of cyber attack is a use of registered softwares on all user computers. Corrupted or pirated softwares are also the main source of introducing malware in the network. Phishing and DNS redirection: Threat can be introduced in the company network by redirecting the DNS to a malware site while preventing the user from visiting the hack or fraudent site to begin with would be preferred but it would not happen most of the time. So it is preferred to block the sites but it is infective to block the sites on domain name bases because they can easily be change. So it is more effective to block the sites by IP address. Install the tools which can tell the users when they visit the site whether the site is safe or unsafe the network. At the end decision is again in the employees hand, so awareness to employees is really very important (Ernst Youngs, 2010). Protect the data: Data is the most important aspect in information system because at the end it all about the data. By implementing the Data Loss Prevention DLP solution can help stop malware collecting the sensitive data and from sanding data back to attacker home network. On the basis of predefined policies host based DLP can be implemented in order to control the information which user has access. In order to keep the check on the flow of data on the network, network DLP can be use which keep the record which data is going in and out of the network and block the specific data to going out of the network ( Ernst Youngs, 2010). Conclusion: After considering all the factors in mind which we have discussed above we came to conclusion that As technological advancement reaching at its peak, at the same time Cyber crime is also increasing day by day but different organization and agencies are working to overcome all such crimes. As cyber crime become a global issue so globally Governments are putting all their resources against these crimes by imposing legislation against these activities and most of the country have consensus to help each other against cyber attacks. Software companies are developing most sensitive tools and controls in order to protect organizational or government assets from these threats. The most important thing is to implement all those advance controls along with conventional security measures to safe guard all sort of assets from cyber attack.