Sunday, December 29, 2019

Security for Our Mobile Devices - 849 Words

Risk Analysis The consequences of a mobile device being compromised by an attacker range from small to huge depending on the level of severity the impact that has on the intended recipient. Some examples include but are not limited to; personal and professional data being removed, operation of the device being rendered unusable, total battery discharge, stealing of user’s identity, recording of conversations, and manipulating smartphones to act as zombie machines. Assumptions Some common assumptions in mobile device security are that new smartphones and tablets are safe and have the current up to date operating systems installed. Passwords are inconvenient in that they slow down device use. Platform security is 100% secure at all times. The user does not make any mistakes or will not have any accidents with their mobile devices. All applications are trustworthy and legitimate. The data contained within mobile devices is always recoverable. Cybercriminals are not interested in users’ and are instead focused on targeting businesses. A last assumption would be that all Wi-Fi connections are safe and secure. Limitations Security measures are primarily gained through having a combination of knowledge and experience in dealing with mobile device security. The implementation of security solutions can be hard to correlate between a mobile device and a personal computer. Personal computer use antivirus and firewall as a means of security while m obile devices is not possible.Show MoreRelatedCyber Threats And Cyber Attacks Essay946 Words   |  4 Pagesof Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broadRead MoreSmartphones And Other Mobile Devices1630 Words   |  7 Pagessmartphones and other mobile devices are playing a greater central role in how people are entertained, communicate, network, work, bank, shop, and how employees interact in a corporation. Times are changing and everything is growing within the mobile market--whether in performance, storage, applications, or ab ilities--have been occurring at an extremely rapid pace. However, there is basic area in which broad time and circumstances in expansion have not been realized on mobile devices, especially whenRead MoreNetwork Access Policy Of Millennium Corporation1098 Words   |  5 PagesNETWORK ACCESS POLICY Keeping in mind the end goal of securing our system and information of our customers, Millennium Corporation has founded this Network Access Policy. We re ensuring against the harms and risk made when unauthorized access happens, additionally against external infections and physical harm to our infrastructure. Introduction This report puts forward policy which must be held fast to by all representatives of Millennium Corporation and any client allowed access to any networkRead MoreMobile Devices And The Business Environment1491 Words   |  6 Pages Securing Mobile devices in the Business Environment: Introduction: Today,mobile devices are becoming important in everyone’s life and these are playing a crucial role in peoples life and work.smart phones and tablets are used by people as work tools in place of desktops.Now-a-days,there is a rapid increase of usage of mobile devices in business and enterprises for their growth.Features of mobile devices is changing a lot and because of those some features threats are also increasing.securityRead MoreWireless And Mobile Security Plan1584 Words   |  7 PagesRunning head: WIRELESS AND MOBILE SECURITY PLAN Wireless and Mobile Security Plan Patrick C. Behan Regis University Context:  Our networks are becoming more vulnerable because of wireless and mobile computing. Ubiquitous devices can and do pose a significant vulnerability. In this activity, you are to think outside the box and determine how to best defend against these threats. Scenario - You are an Information Security engineer for a midsized company. The company would like to offer directRead MoreRole of Mobile Computing in Healthcare Management1394 Words   |  6 PagesMobile Computing in Healthcare Management Technology changes everyday. We blink our eyes for a second, and it has advanced to far beyond our wildest dreams. Thus, every aspect of our lives is also being impacted by these advances in technology, including how we care for our bodies and our overall well-being. Technology has long played a crucial role in healthcare management strategies, but todays industry is seeing drastic changes in how it uses mobile computing devices. The use of mobile devicesRead MoreByod Mobile Plan For Wickid Candles1553 Words   |  7 PagesWickID Candles has 500 employees that work in one of our five departments. The departments vary from sales, advertising, accounting, manufacturing, and transportation. Even though our manufacturing and transportation crews work together, they are two separate teams. In addition, our sales department also has two individual groups within the department. The first group of employees focus on in store sales, while the other group manages online sales on our store w ebsite. The online sales, advertisementRead MoreSecurity Risk Associated with Mobile Devices1429 Words   |  6 Pagesï » ¿ Security Risk Associated with Mobile Devices The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. â€Å"Mobile devices can be used by a hacker as an access point into many other aspects of your digital lifeRead MoreIn social networking sites, other than communicating with existing friends, people can find and900 Words   |  4 Pagesschool or company etc. Mobile social networking servicesto connect to their social communities with a mobile device, through one or more available mobile channels. Members share experiences, interests, opinions, presence information and personal content through their mobile devices. Mobile adds new capabilities to social networking, such as location-related services and new visualization mechanisms.A current trend for social networking websites, such as Facebookis to create mobile apps to give theirRead MoreImplications Of Mobile Computing882 Words   |  4 Pagesnew advancements and one of the biggest outcomes is Mobile computing. The impact of mobile computing on the average person and in various industries is immense. Many business enterprises are planning to implement and integrate the concept of mobile computing into their operations. Some of them are successful while some others are on the verge of executing and the rest are still dubious. This paper explores some of the published articles on mobile computing and its significance in politics, K-12 classrooms

Saturday, December 21, 2019

Coming From Childhood Into Womanhood - 943 Words

In â€Å"Coming to age in Mississippi† Moody describes her life from childhood into Womanhood in rural Mississippi. Her autobiography provides incite into the atrocities committed in the south due to racism and prejudice. Moody illustrates how the economic, and social injustices of the 1940s and 50s plagued her childhood. Inspiring her to make a change as a leading advocate during the Civil Rights Movement. From her earliest memories Moody recognized the color of skin would dictate her finances. In the first chapter of her autobiography, moody describes the rickety one bedroom shack that â€Å"was up on the hill with Mr. Carters big white house†. her sharecropping family lived in when she was four years old. Throughout her adolescence Moody continued living in small, old homes, until Raymond builds the family a five-bedroom home, none the less the bathroom was still outdoors. Moody’s incite of the economic contrast between the whites and blacks of her town increases when she works white homes and observes the differences. Ms. Ola’s bathroom was a subject of awe for moody as a young girl, the white bathtub and soft pink rug seemed luxurious to Moody who bathed in a tin tub moody uses a metal tub to bathe in, so the porcelain white bathtub truly seemed luxurious to Moody. Similarly, to Moody’s less than suitable living conditions Moody and her family suffered from hunger, sometimes only having beans for dinner. She recalled that â€Å"Sometimes Mama would bring us the whiteShow MoreRelatedWomanhood and Coming of Age in Madeleine L. Engle ´s A Wrinkle in Time1007 Words   |  5 Pagestime with her portrayal of women in A Wrinkle in Time. The novel is infused with the themes of womanhood and coming of age. To be more specific, it is a novel which is thoroughly blended with the strengths of womanhood and with the concept that how women in a society can bring forth specific positive changes. The protagonist, Meg Murry, is a gifted adolescent who constantly harps on being different from other children. Her mother, Mrs. Murry, defines empowerment in women. Mrs. Murry is a phenomenalRead MoreCamila Velasquez. Hum-101-12. Professor David Winner. May1591 Words   |  7 Pagesteenager, adult or even your own birthday party? We all celebrate our bir thday every year, but young girls will have a special birthday that has to be celebrated for once in their life. A woman has a point of time where they stop from being a child and become as an adult. Womanhood is such an important stage for young girls where some cultures have different forms of celebration to recognize the upcoming of age. In the cultural root of Latin America, girls who are turning to fifteen years of age will beRead MoreRed Dress 19641220 Words   |  5 PagesRed dress-1946 is a short story from Dance of the happy shades (a collection of short stories) by Alice Munroe. It is about the great social pressures faced by the narrator, surrounding the chronological events that take place before, during and after a school dance. The ‘Red dress’ is the dress her mother makes her for the dance, when she would clearly like to buy one instead from a store, this suggests to us that she can-not afford readymade clothes which then leads us to presume she is of a lowerRead MoreRite of Passage Essay675 Words   |  3 Pagesthis â€Å"communitas† in different ways such as my Hispanic culture that experiences quinceneras. Quinceneras are a rite of passage for young girls’ transition from adolescence to womanhood. I for one never experienced this rite of passage. In my culture it is traditional for a young girl to go through the rite of passage from childhood to womanhood called a Quincenera. This rite of passage usually involves a visit to the church in which the girl gets blessed and that is followed by a festive party inRead MoreFun Home By Alison Bechdel1392 Words   |  6 Pageshomosexuality, they are able to go against the norms and the collection of rules set by society. It is also through their struggle with gender roles that one is able to understand their sexual orientation. Although Bruce and Alison seem fairly different from one another, there are elements that pull them closer together revealing their similarities. Throughout the book, Bruce and Alison both struggle with the concept of gender roles. For Bruce, he displays more of a feminine side going against the typicalRead MoreBook Review : Quinceanera 1682 Words   |  7 Pagesis for formal, festival, and fifteen. Fifteen isn’t just a number, but it is an important celebration event in the hispanic community called quinceaà ±era. When I was the age fifteen it was when i marked to make the transition of a young women into womanhood. A quinceaà ±rea is a huge celebration to the young women’s family, because it’s almost as important as a wedding. It takes month of planing, but I only had under a month to get everything ready. Having less than a month felt like i was a little antRead MoreGender Roles in Alice Munros Boys and Girls1081 Words   |  5 Pagesare the weaker, more emotional sex – by showing how the adults of the story expect the children to grow into their respective roles as a girl and a boy, and how the children grow up and ultimately begin to fulfill these roles, making the transition from being â€Å"children† to being â€Å"young adults.† The adults in the story expect the children to grow into the gender role that their sex has assigned to them. This is seen in several places throughout the story, such as when the narrator hears her motherRead MoreCharacter Analysis Of Elizabeth Lavenza s Frankenstein 1562 Words   |  7 Pagesfulfills the standard roles as a woman from the 19th century. She was the, â€Å"calmer and more concentrated disposition,† (Shelley, 18), the balancing character to Victor. Shelley takes great care to point her physical description in detail so that the reader is aware of how she pretty is (Shelley, 19-20). Her womanhood is established more once she becomes the adult of the house. She earns this role after Caroline Frankenstein passes away from contracting scarlet fever from Elizabeth (Shelley, 23-24). ElizabethRead MoreAnalysis Of The Book The First Drawing 791 Words   |  4 Pageslittle girls playing and having fun. It was imperative that I created a space were this little girl could play, be liberated and not worry about coming off the page into my world. The series of drawings I did as a child allowed me to have my moment of space and freedom within the constraint of my room. As I prepared to write this paper and observed my childhood drawings, I understand more now how art saved me. The drawing of the Holly Hobby girl on old faded vanilla paper is not just a drawing; she isRead MoreWomen s Rites Of Passage1791 Words   |  8 PagesIntroduction Every culture in the world has rites of passage. Whether it be death and dying, birth or a transition from puberty to adulthood, every culture has certain rituals they use to christen these changes in social status within a society. A rite of passage is symbolic in how important a change is in the lives of the people who experience them. Status changes such as these are very important in the eyes of their culture and the ceremonies they produce help them retain stability while their

Friday, December 13, 2019

Creating value Free Essays

When it comes to the housing finance sector in India, one name stands out distinctively: HEAD – a market leader and an innovator. We have consistently revised the benchmarks of housing finance products and services. Being a pioneer and leader in a nascent market has not stopped us from aspiring for challenging goals. We will write a custom essay sample on Creating value or any similar topic only for you Order Now The World Bank considers us a model private sector housing finance company in developing countries. We provide consultancy services and technical assistance for ewe and existing institutions. Our executives undertake consultancy assignments related to housing finance and urban development directly or on behalf of international agencies worldwide. We also share our expertise through Training Programmer at our own Training Centre in Loan, India or at the client’s location. Delegates from several countries have benefited from participating in these programmer. A senior executive of HEAD was the former President of the International Union for Housing Finance (UHF), which is a non-profit trade association, with members from 60 countries worldwide. The objective of JIFF is to make housing credit affordable and more available around the world. On the domestic front, our executives help formulate national housing policies and strategies. In fact, we have been invited by the Government of India to Join a number of committees and task forces related to housing finance, urban development and capital markets – a task that we are proud to be part of. HEAD Centre for Housing Finance Our training facility, Centre for Housing Finance (CHEF), is located 120 SMS from Iambi, in the tranquil environs of Loan, a hill station, 2,000 feet above sea level. Some of the key features of our Centre are: State-of-the-art technology in the training rooms Syndicate rooms for group work Well-equipped library Residential accommodation that provides comfort and relaxation Dining facilities offering a variety of cuisine Indoor and outdoor recreation facilities Technical Assistance (TA) The objective of the TA is to offer specific deliverables and support the Client in all aspects relating to mortgage finance operations which include loan origination and recoveries, marketing and distribution strategies, accounting and management information systems, resource manipulation and information technology support. Who would review and advise the Client on products, systems and procedures, including developing new products and designing marketing strategies. These experts would visit the Client and work closely with its officials to understand the external environment in which the Client functions and thereafter make recommendations visa-avis strategies, products, policies, systems and procedures. Our experience makes the difference Training Programmer Our training programmer are specially designed to be a blend of learning and practical experience. We offer a variety of training courses for senior and middlemen management executives and line staff. Some key programmer offered are: Housing Finance Management Loan Origination and Credit Risk Management Managing Customer Service in Financial Organizations Building High Performance Teams Resource Manipulation – Issues in Managing and Marketing Training The Trainers – A Multi Dimensional Workshop We also custom- design programmer based on organizational needs. Training specific Current Programmer Housing Finance Management – 2010 (HEM-2010) November 28 – December 5, 2010 at CHEF, Loan, India. The week long residential programmer on Housing Finance Management encompasses all the prime functions of a specialized Housing Finance Institution. Through specialized modules, the programmer will focus on various housing finance systems and best practices, credit evaluation, emphasis on customer needs, product development, marketing, managing competition and distribution channels, effective internal control systems and mechanisms, resource manipulation and risk man agement systems. img class="aligncenter wp-image-34539 " src="https://donemyessay.com/wp-content/uploads/2017/07/-.jpg" alt="Creating value" width="720" height="388" / In addition, a field visit to an HEAD office will also give participants a practical perspective of the housing finance business. HEM-2010: Programmer Outline Day 1 : Sunday, November 28, 2010 w Assembling ; Bonding Day 2: Monday, November 29, 2010 w Introduction to the programmer w Overview of Housing Finance Systems w Loan Origination and Assessment of Risk Day 3: Tuesday, November 30, 2010 w Product Development, Marketing and Distribution Channels w Legal and Technical Appraisal w Developer/Builder Relationships and Products Day 4: Wednesday, December 01 , 2010 w Loan Accounting Practices – Systems and Controls w Credit Risk Management w Process Development for Efficient Credit Risk Management Day 5: Thursday, December 02, 2010 w Day visit to an HEAD office Day 6: Friday, December 03, 2010 w Corporate Functions – Management Information Systems w Business Strategy and Budgeting w Managing Service Delivery Processes Day 7: Saturday, December 04, 2010 w Resource Manipulation w Risk Management Systems and Development of Secondary Mortgage Markets w Open House Session Day 8: Sunday, December 05, 2010 w Departure from CHEF, Loan v Subject to change Fees: US $ 3,000* for first participant. US $ 2,750* from second participant onwards accommodation, refreshments during breaks, meals, training costs, course material and to and fro airport transfer. Note: Accommodation will be on a double occupancy basis. For single occupancy** an additional amount of IIS$ 750 plus service tax @ 10. 30% will be charged. ** Subject to availability What our participants said†¦ Feedback from Housing Finance Management Programmer The classroom experience was invaluable in opening up all aspects of Housing Finance Management. I have taken with me many insights that I intend to apply to what I hope will be a long career in Housing Finance. The free flow of ideas from participants representing 1 5 countries and 17 organizations also added immensely to he richness of the programmer. Cynthia Kanata, Housing Finance, Kenya (WFM 2007) It was a very wonderful experience at the HEAD Training Centre, where there was an optimal combination of knowledge gaining, sharing of experiences and recreational activities all in the perfect environment. The content of the programmer was so fruitful and have surely added value to our products and services, not forgetting the delicious meals and accommodation. Jackson Alfred Aloha Zinnia Bank Ltd, Tanzania (WFM 2008) I have attended similar programmer where the tuition cost is more than he entire programmer at WFM but in many cases those programmer were a mere rehearsal of academic notes of the Presenter. WFM 2008 was different in content and methodology; it was very practical in every respect and my reality on housing finance has since changed positively. Joseph Alphorns Tutor Jacobean, Loom Togo (WFM 2008) It was a great pleasure to visit India for the first time – an experience I’ll never forget. The programmer was successful. We shared our experience, knowledge and ideas with each other. Mar Beheaded Egypt Housing Finance Company Egypt (WFM 2009) My experience exceeded my expectations. I am really touched by the level of knowledge, passion, commitment and insight of the people at HEAD, and the opportunity to share experience with other participants. Islam Nominal PIED of Bangladesh Ltd. Bangladesh (WFM 2009) The course was an eye opener in terms of mortgage lending. It gave me a broader understanding of the various aspects of housing finance. Interacting and learning from various participants showed me that we all had a similar goal/objective that is providing shelter to everyone. Margaret Musher Zambia National Building Society Zambia (WFM 2009) The training was an experience of a life time. I learnt a lot during my interaction with the experts and participants from different countries. Apart from that the network of friends that I made will be cherished for life time. How to cite Creating value, Papers

Thursday, December 5, 2019

The Strategic Analysis for Global Business @Dell Corporation

Question: Discuss about the Strategic Analysis of Dell Corporation for Global Business. Answer: Introduction Dell Technology is a privately held technology company founded in the year 2016 after the merger of Dell Inc with EMC. The company was founded by Michael Dell and all its operations are allied from Round Rock, Texas, United States. Dell computers deals in selling, repairing and supported computers related products and services. It is known worldwide for its innovation services, supply chain management and providing configured system to the customers (Company Heritage, 2016). EMC combined with Dell on 7 September 2016 to form Dell Technologies which marked as the biggest deal in the history. The accompany employs 140,000 people around the globe which makes it worlds largest technology company. Dell, Dell EMC, Pivotal Software, Secure Works and VMware are its subsidiary company (Technology Solutions Powerhouse, 2016). The company has earned revenue of $54.9 Billion in the fiscal year end January 29, 2016(Americas largest Private Company, 2016). Dell has earned a fiscal profit of $ 13.1 billion for the year 2017. There is a 32% of increase in the revenue from the previous year (FY17 Q2 Financial Results Press, 2016). Dell started its operations in Singapore in the year 1996 and has employed 1000 people to meet the demand in the field of IT solution. It focuses on merging individual competencies to function world-wide. It has the first Dell solution Center which provides technology support and design worldwide (Getting to know Dell Singapore, 2016). External analysis Pestle analysis Pestle analysis describes the macro factors which affect the strategy implementation. This tool is used to access the market research and gives the overview of the different factors which helps in understanding the business position potential. The analytical tool helps in understanding the political, economic, social, technological, environmental, and legal factors which affect the company while developing a strategic alliance (Dransfield, 2004). Dell technology has multiple operations around the world. It is essential for a company to access the PESTLE analysis before developing a strategy to conquer the outside world (Schmid et al. 2006). P (Political) These are the political issue a company faces when developing an international alliance. Global expansion of business involves understanding of the political environment in the host country. Every country has a different political arrangement which affects the strategies while considering cross-border transactions. For example some countries have restricted the sale of foreign technology. It is necessary to conduct a political research while expanding operations in the international market (Shirani, 2013). E (Economic) The economies of the nation possess major threat to the growth of the technology products. In a rich economy technology is given more preference. Strategic alliances are favorable under dynamic economy. Demography of a country is a key factor to manage the economy. Wealth distribution is an essential key to understand the economy of the country. A country with fewer sources has less purchasing power. It is recommended to expand after considering the economic power (Shirani, 2013). S (Social) Society is posing a major issue on the future growth of the technological gadgets. Increasing popularity of various social networking sites has posed a threat on the social atmosphere. Different demography possesses challenge over the consumers attitude. Social challenges play a pivotal role in making expansion plans. The company needs to focus on the social challenges to adopt long run growth. T (Technological) Technology is developing at a faster rate with time. It is essential to work as per the technology which is guaranteed. Dell corporation is competing with international brands like HP and Lenovo. Technology can only help in distinguishing the features with the rest of the world. A company can only survive if it has adopted the global changes and needs (Neild and Carysforth, 2004). L (Legal) Legal environment is necessary to be given importance to pursue main motive of the organization. Legal compliances are crucial to be fulfilled while diversifying the operations to other country. The legal framework of every country is different which creates difficulty. E (Environmental) The world has realized the importance of environment. Technology is posing a danger to the environment. Dell technology can pose various threats to environment. Various countries have incorporated serious environmental law to safeguard themselves against recent environmental changes. Environment has caused serious issues. Dell has to adopt stringent plans while developing the environment. company 2016 shipments 2016 market share Lenovo 13,198 20.5 HP Inc 12,284 19.1 Dell 9,788 15.2 The above mentioned report suggests that there was a fall of 5% in computer shipment. Lenovo and HP together shared 40%of market whereas Dell was at third place with 15.2% market share. The PC marked has seen a fall in recent times but there are hope to witness growth by 2018. (Ghosh, 2016) Porters five forces model Porters five forces model focuses on the understanding the strength of the business under current position. It focuses on building strong model considering all the essentials into the working model (Roy, 2011). Supplier power High There are large number of supplier for the hardware components in the market which creates a high level of switching cost Buyer power High Presence of end number of brands has created a high pressure on the company. The company needs to focus on providing high class customer services to retain the customers from switching from one brand to other. Dell is providing the best service against its competitor which has created a brand loyalty in the mind of the customers. Competitive rivalry High The price margin between the rival companies is very low which has created a low price margin. However the competitive strategies have helped it to gain huge market share. It has proved that Dell business strategies are one of the best Threat of substitutes Low Dell has high presence in the market due to its reliable features. Low cost has made its presence everywhere in the world. Threat of new entry Moderate Market is subject to fluctuation. It has subjected to the threat of new entry. Globalization has reduced the legal barriers across the borders which has led to entry of various competitors in the market who provides goods at a very low cost( Hill and Jones,2007) External analysis VRIO analysis This tool is used to analyze various dimensions to make strategically decisions against its competitor. VRIO stands for Value, Rareness, Imitability, Organization (Grnig and Khn,2015). DELL Corp. Valuable Rare Inimitable Organization Personalized customer pt Yes Yes No Yes Customer Relationship Yes Yes No Yes Distribution services Yes Yes No Yes Peng, M. (2016). Personalized customer part: dell is known worldwide for creating a personalized customer parts. Dell corp. is known for compiling the system as per the choice of its customers. This provides the company with a cutting edge against the other brands. Customer relationship: Dell ensures customer satisfaction by giving quick services. They give priority to customer relationship by taking care of the customers needs. There is no other brand in the market which can imitate the customer services as provided by the competitor brands. Distribution services: Dell corp. is focused on providing the best distribution services. The company has distribution channels at different places. They are known for providing the non imitable distribution services within the economy. SWOT analysis SWOT analysis is used to analyze the strength, weakness, opportunities and threats. This analytical tool is essential to understand the potential threats and opportunities. It takes all the necessary information from the surroundings and helps in deciding the external factors which can affect the working of an organization (Ferrell and Hartline, 2010). Strengths The brand value of dell corp. after merging with EMC is at over $60 billion (Su, 2016).Dell is the market leader in the field of technology innovation. Enigmatic and effective leadership by Michael dell has added a cutting edge with the brand. The brand is known for providing customized products to its customers. Their business model is as per the environmental norms. Dell is based on the direct selling model. The company has a competency on merger and acquisitions. Weakness Their customer services are poor as compare to the other competitive brands. Dell has made a very low investment in the research and development process. The patents portfolios are week when compared with the brands like apple, HP, and Lenovo The retail locations are very few in the market. The customer services are poor as compare with the other brands. Low product differentiation . Opportunities Dell needs to make an investment on the research and development process. It has an ample of opportunities in the field of merger and acquisition. This will create opportunities in the field of technology innovations. Dell should diversify its product range by entering into smart phone and tablet industry. There is an increase in the opportunities due to emerging market trends. Threats Emerging economies has created competition inside the organization. Data privacy security is causing a major threat on the brand. A low price brand in the market has created difficulty for the brand. There is a decline in the current desktop and laptop market ( Schneider,2014). Strategic option Strategic options are the recent changes the world is facing in the business practices due to external factors. The external factors have exposed the organization to the risk. SWOT analysis helps in analyzing the risk which is attached with the organization. Strategic options are the various opportunities available with the organization to assess the threats. The various strategic options are acquisition, merger, offensive/defensive strategies, strategic alliance; diversification etc. Dell Corporation has recently seen a change in its internal structure. The company has recently merged with EMC. It is the biggest tech merger in the history which amounted $ 67 billion (Cornelissen, 2004). Research innovation Research innovation is an essential tool for accelerating growth in the competitive environment. However excess investments in the research and development would minimize its core competency. It will create a pressure over the company to create multiple distribution channels to redirect the availability of resources. Dell strength is to make mass sale without making much investment in the research and development. Innovation is a necessary for dell to improve over the recent changes. There are many competitors in the market which are providing better services so it is necessary to make a difference in the mind of the consumer by improving on the current technology. Technology is changing with each passing day which is posing serious competition. Dell needs to put its resources in the strategic research and development of resources instead of bulk production. Research and technology is gaining importance as per the recent trends. The company should stay on focusing of its research and development services to create the difference in the technology industry. This will increase the overall potential of the company. Its world-wide recognizable name will help it in expanding into other markets (Dells Cooling Innovation For Scale-Out Computing,2016). Diversification There is a need to diversify the resources to other projects in order to achieve a sustainable growth. Dell has concentrated its resources in mass production of computer goods. Many of its competitors have already diversified its production into other category. Dell by far has concentrated in the market for the production of mass computer goods whereas brands like HP and Lenovo has diversified its market by producing tablets and mobile phones. Dell needs to diversify its assets into other segments to procure large profits. However it is late for a company to take a big step where there are already various brands which are already doing well in the market. Dell has to diversify its production strategies into other fields which will help it to grow. The acquisition of EMC with Dell is important in point of view of technology. The technology is developing at a rapid speed where other competitive brands are fighting hard for their survival. Dell needs to focus on the strategy as per the latest market trends and atmosphere. Acquisition Technology competency is essential while following various models. The latest acquisition in the internal structure has helped the company to grow with the joint support. Acquisition strategy helps in creating a competitive difference. The merger of big brands in market helps in accomplishing the desired goals. Merger of EMC and Dell are seen as a big market changer by the technologists. Recommendation Dell should focus on building relationship with the customers. This will help it to grow on a long run. It is seen in the past that the company which do not have better relationship with the customers and its partners fail. Dell should diversify its profits and revenue to create competitive advantage over other brands. The company is recommended to reduce the overall cost by introducing the favorable plans in its system. Today market requires diversification of asset in order to serve the purpose. The international market has created ample of opportunity with dynamic changes. Diversification would help in improving the overall expansion of the core benefit. Creating partnership with the leading technology brands will help Dell in overcoming the upcoming issues. Conclusion Dell Corporation is a famous computer brand in the market which is providing services round the world. The report discusses the internal and external analysis of the company strategies and what strategy it should adopt to compete with its competitors. Dell should focus on bringing innovation in its technology services by making investments into its research and development. It should focus on emphasizing in its core strength which will help it to grow on a long run. Todays market is based on diversification of the assets. Multiple companies are focusing on the different technologies to procure the benefit. Dell is recommended to diversify its assets to procure maximum benefit through its strategies. References Americas largest Private Company, (2016). (Online) Available from: https://www.forbes.com/companies/dell/ (Accessed on 26/09/16) Company Heritage,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/about-dell-company-timeline (Accessed on 26/09/16) Cornelissen,J.(2004). Corporate Communications: Theory and Practice. SAGE Dell's Cooling Innovation For Scale-Out Computing,(2016) (Online) Available from: https://www.forbes.com/sites/moorinsights/2016/06/02/dells-cooling-innovation-for-scale-out-computing/#1e3b33311a8c (Accessed on 26/09/16) Dransfield,R.(2004). Business for Foundation Degrees and Higher Awards. Heinemann Ferrell, O. and Hartline, M. (2010). Marketing Strategy. Cengage Learning FY17 Q2 Financial Results Press (2016). (Online) Available from: https://www.dell.com/learn/us/en/uscorp1/secure/2016-09-06-fy17-q2-financial-results-press-release (Accessed on 26/09/16) Getting to know Dell Singapore,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/careers/careers-about-singapore (Accessed on 26/09/16) Ghosh,A.(2016).Global PC shipments fall by 5% in Q2 2016, Lenovo dips but remains market leader (Online) Available from: https://www.ibtimes.co.uk/global-pc-shipments-fall-by-5-q2-2016-lenovo-dips-remains-market-leader-1570110 (Accessed on 26/09/16) Grnig,R. and Khn,R.(2015). The Strategy Planning Process: Analyses, Options, Projects. Springer Hill,C. and Jones,G.(2007). Strategic Management: An Integrated Approach. Cengage Learning Neild,C. and Carysforth,C.(2004). Business. Heinemann Peng,M.(2016). Global Business. Cengage Learning Roy, D. (2011). Strategic Foresight and Porter's Five Forces. GRIN Verlag Schmid,N et al. (2006). The Dell Company - A Strategic Analysis. GRIN Verlag Schneider,G.(2014). Electronic Commerce. Cengage Learning Shirani,M.(2013). Strategy Creation and Change - Dell Corporation. GRIN Verlag Su,J.(2016). Dell To Rebrand As Dell Technologies After EMC Merger (Online) Available from: https://www.forbes.com/sites/jeanbaptiste/2016/05/06/dell-to-rebrand-as-dell-technologies-after-emc-merger/#763ba3de3e7f (Accessed on 26/09/16) Technology Solutions Powerhouse,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/2016-present?~ck=mn (Accessed on 26/09/16)