Sunday, December 29, 2019
Security for Our Mobile Devices - 849 Words
Risk Analysis The consequences of a mobile device being compromised by an attacker range from small to huge depending on the level of severity the impact that has on the intended recipient. Some examples include but are not limited to; personal and professional data being removed, operation of the device being rendered unusable, total battery discharge, stealing of userââ¬â¢s identity, recording of conversations, and manipulating smartphones to act as zombie machines. Assumptions Some common assumptions in mobile device security are that new smartphones and tablets are safe and have the current up to date operating systems installed. Passwords are inconvenient in that they slow down device use. Platform security is 100% secure at all times. The user does not make any mistakes or will not have any accidents with their mobile devices. All applications are trustworthy and legitimate. The data contained within mobile devices is always recoverable. Cybercriminals are not interested in usersââ¬â¢ and are instead focused on targeting businesses. A last assumption would be that all Wi-Fi connections are safe and secure. Limitations Security measures are primarily gained through having a combination of knowledge and experience in dealing with mobile device security. The implementation of security solutions can be hard to correlate between a mobile device and a personal computer. Personal computer use antivirus and firewall as a means of security while m obile devices is not possible.Show MoreRelatedCyber Threats And Cyber Attacks Essay946 Words à |à 4 Pagesof Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broadRead MoreSmartphones And Other Mobile Devices1630 Words à |à 7 Pagessmartphones and other mobile devices are playing a greater central role in how people are entertained, communicate, network, work, bank, shop, and how employees interact in a corporation. Times are changing and everything is growing within the mobile market--whether in performance, storage, applications, or ab ilities--have been occurring at an extremely rapid pace. However, there is basic area in which broad time and circumstances in expansion have not been realized on mobile devices, especially whenRead MoreNetwork Access Policy Of Millennium Corporation1098 Words à |à 5 PagesNETWORK ACCESS POLICY Keeping in mind the end goal of securing our system and information of our customers, Millennium Corporation has founded this Network Access Policy. We re ensuring against the harms and risk made when unauthorized access happens, additionally against external infections and physical harm to our infrastructure. Introduction This report puts forward policy which must be held fast to by all representatives of Millennium Corporation and any client allowed access to any networkRead MoreMobile Devices And The Business Environment1491 Words à |à 6 Pages Securing Mobile devices in the Business Environment: Introduction: Today,mobile devices are becoming important in everyoneââ¬â¢s life and these are playing a crucial role in peoples life and work.smart phones and tablets are used by people as work tools in place of desktops.Now-a-days,there is a rapid increase of usage of mobile devices in business and enterprises for their growth.Features of mobile devices is changing a lot and because of those some features threats are also increasing.securityRead MoreWireless And Mobile Security Plan1584 Words à |à 7 PagesRunning head: WIRELESS AND MOBILE SECURITY PLAN Wireless and Mobile Security Plan Patrick C. Behan Regis University Context:à Our networks are becoming more vulnerable because of wireless and mobile computing. Ubiquitous devices can and do pose a significant vulnerability. In this activity, you are to think outside the box and determine how to best defend against these threats. Scenario - You are an Information Security engineer for a midsized company. The company would like to offer directRead MoreRole of Mobile Computing in Healthcare Management1394 Words à |à 6 PagesMobile Computing in Healthcare Management Technology changes everyday. We blink our eyes for a second, and it has advanced to far beyond our wildest dreams. Thus, every aspect of our lives is also being impacted by these advances in technology, including how we care for our bodies and our overall well-being. Technology has long played a crucial role in healthcare management strategies, but todays industry is seeing drastic changes in how it uses mobile computing devices. The use of mobile devicesRead MoreByod Mobile Plan For Wickid Candles1553 Words à |à 7 PagesWickID Candles has 500 employees that work in one of our five departments. The departments vary from sales, advertising, accounting, manufacturing, and transportation. Even though our manufacturing and transportation crews work together, they are two separate teams. In addition, our sales department also has two individual groups within the department. The first group of employees focus on in store sales, while the other group manages online sales on our store w ebsite. The online sales, advertisementRead MoreSecurity Risk Associated with Mobile Devices1429 Words à |à 6 Pagesï » ¿ Security Risk Associated with Mobile Devices The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. ââ¬Å"Mobile devices can be used by a hacker as an access point into many other aspects of your digital lifeRead MoreIn social networking sites, other than communicating with existing friends, people can find and900 Words à |à 4 Pagesschool or company etc. Mobile social networking servicesto connect to their social communities with a mobile device, through one or more available mobile channels. Members share experiences, interests, opinions, presence information and personal content through their mobile devices. Mobile adds new capabilities to social networking, such as location-related services and new visualization mechanisms.A current trend for social networking websites, such as Facebookis to create mobile apps to give theirRead MoreImplications Of Mobile Computing882 Words à |à 4 Pagesnew advancements and one of the biggest outcomes is Mobile computing. The impact of mobile computing on the average person and in various industries is immense. Many business enterprises are planning to implement and integrate the concept of mobile computing into their operations. Some of them are successful while some others are on the verge of executing and the rest are still dubious. This paper explores some of the published articles on mobile computing and its significance in politics, K-12 classrooms
Saturday, December 21, 2019
Coming From Childhood Into Womanhood - 943 Words
In ââ¬Å"Coming to age in Mississippiâ⬠Moody describes her life from childhood into Womanhood in rural Mississippi. Her autobiography provides incite into the atrocities committed in the south due to racism and prejudice. Moody illustrates how the economic, and social injustices of the 1940s and 50s plagued her childhood. Inspiring her to make a change as a leading advocate during the Civil Rights Movement. From her earliest memories Moody recognized the color of skin would dictate her finances. In the first chapter of her autobiography, moody describes the rickety one bedroom shack that ââ¬Å"was up on the hill with Mr. Carters big white houseâ⬠. her sharecropping family lived in when she was four years old. Throughout her adolescence Moody continued living in small, old homes, until Raymond builds the family a five-bedroom home, none the less the bathroom was still outdoors. Moodyââ¬â¢s incite of the economic contrast between the whites and blacks of her town increases when she works white homes and observes the differences. Ms. Olaââ¬â¢s bathroom was a subject of awe for moody as a young girl, the white bathtub and soft pink rug seemed luxurious to Moody who bathed in a tin tub moody uses a metal tub to bathe in, so the porcelain white bathtub truly seemed luxurious to Moody. Similarly, to Moodyââ¬â¢s less than suitable living conditions Moody and her family suffered from hunger, sometimes only having beans for dinner. She recalled that ââ¬Å"Sometimes Mama would bring us the whiteShow MoreRelatedWomanhood and Coming of Age in Madeleine L. Engleà ´s A Wrinkle in Time1007 Words à |à 5 Pagestime with her portrayal of women in A Wrinkle in Time. The novel is infused with the themes of womanhood and coming of age. To be more specific, it is a novel which is thoroughly blended with the strengths of womanhood and with the concept that how women in a society can bring forth specific positive changes. The protagonist, Meg Murry, is a gifted adolescent who constantly harps on being different from other children. Her mother, Mrs. Murry, defines empowerment in women. Mrs. Murry is a phenomenalRead MoreCamila Velasquez. Hum-101-12. Professor David Winner. May1591 Words à |à 7 Pagesteenager, adult or even your own birthday party? We all celebrate our bir thday every year, but young girls will have a special birthday that has to be celebrated for once in their life. A woman has a point of time where they stop from being a child and become as an adult. Womanhood is such an important stage for young girls where some cultures have different forms of celebration to recognize the upcoming of age. In the cultural root of Latin America, girls who are turning to fifteen years of age will beRead MoreRed Dress 19641220 Words à |à 5 PagesRed dress-1946 is a short story from Dance of the happy shades (a collection of short stories) by Alice Munroe. It is about the great social pressures faced by the narrator, surrounding the chronological events that take place before, during and after a school dance. The ââ¬ËRed dressââ¬â¢ is the dress her mother makes her for the dance, when she would clearly like to buy one instead from a store, this suggests to us that she can-not afford readymade clothes which then leads us to presume she is of a lowerRead MoreRite of Passage Essay675 Words à |à 3 Pagesthis ââ¬Å"communitasâ⬠in different ways such as my Hispanic culture that experiences quinceneras. Quinceneras are a rite of passage for young girlsââ¬â¢ transition from adolescence to womanhood. I for one never experienced this rite of passage. In my culture it is traditional for a young girl to go through the rite of passage from childhood to womanhood called a Quincenera. This rite of passage usually involves a visit to the church in which the girl gets blessed and that is followed by a festive party inRead MoreFun Home By Alison Bechdel1392 Words à |à 6 Pageshomosexuality, they are able to go against the norms and the collection of rules set by society. It is also through their struggle with gender roles that one is able to understand their sexual orientation. Although Bruce and Alison seem fairly different from one another, there are elements that pull them closer together revealing their similarities. Throughout the book, Bruce and Alison both struggle with the concept of gender roles. For Bruce, he displays more of a feminine side going against the typicalRead MoreBook Review : Quinceanera 1682 Words à |à 7 Pagesis for formal, festival, and fifteen. Fifteen isnââ¬â¢t just a number, but it is an important celebration event in the hispanic community called quinceaà ±era. When I was the age fifteen it was when i marked to make the transition of a young women into womanhood. A quinceaà ±rea is a huge celebration to the young womenââ¬â¢s family, because itââ¬â¢s almost as important as a wedding. It takes month of planing, but I only had under a month to get everything ready. Having less than a month felt like i was a little antRead MoreGender Roles in Alice Munros Boys and Girls1081 Words à |à 5 Pagesare the weaker, more emotional sex ââ¬â by showing how the adults of the story expect the children to grow into their respective roles as a girl and a boy, and how the children grow up and ultimately begin to fulfill these roles, making the transition from being ââ¬Å"childrenâ⬠to being ââ¬Å"young adults.â⬠The adults in the story expect the children to grow into the gender role that their sex has assigned to them. This is seen in several places throughout the story, such as when the narrator hears her motherRead MoreCharacter Analysis Of Elizabeth Lavenza s Frankenstein 1562 Words à |à 7 Pagesfulfills the standard roles as a woman from the 19th century. She was the, ââ¬Å"calmer and more concentrated disposition,â⬠(Shelley, 18), the balancing character to Victor. Shelley takes great care to point her physical description in detail so that the reader is aware of how she pretty is (Shelley, 19-20). Her womanhood is established more once she becomes the adult of the house. She earns this role after Caroline Frankenstein passes away from contracting scarlet fever from Elizabeth (Shelley, 23-24). ElizabethRead MoreAnalysis Of The Book The First Drawing 791 Words à |à 4 Pageslittle girls playing and having fun. It was imperative that I created a space were this little girl could play, be liberated and not worry about coming off the page into my world. The series of drawings I did as a child allowed me to have my moment of space and freedom within the constraint of my room. As I prepared to write this paper and observed my childhood drawings, I understand more now how art saved me. The drawing of the Holly Hobby girl on old faded vanilla paper is not just a drawing; she isRead MoreWomen s Rites Of Passage1791 Words à |à 8 PagesIntroduction Every culture in the world has rites of passage. Whether it be death and dying, birth or a transition from puberty to adulthood, every culture has certain rituals they use to christen these changes in social status within a society. A rite of passage is symbolic in how important a change is in the lives of the people who experience them. Status changes such as these are very important in the eyes of their culture and the ceremonies they produce help them retain stability while their
Friday, December 13, 2019
Creating value Free Essays
When it comes to the housing finance sector in India, one name stands out distinctively: HEAD ââ¬â a market leader and an innovator. We have consistently revised the benchmarks of housing finance products and services. Being a pioneer and leader in a nascent market has not stopped us from aspiring for challenging goals. We will write a custom essay sample on Creating value or any similar topic only for you Order Now The World Bank considers us a model private sector housing finance company in developing countries. We provide consultancy services and technical assistance for ewe and existing institutions. Our executives undertake consultancy assignments related to housing finance and urban development directly or on behalf of international agencies worldwide. We also share our expertise through Training Programmer at our own Training Centre in Loan, India or at the clientââ¬â¢s location. Delegates from several countries have benefited from participating in these programmer. A senior executive of HEAD was the former President of the International Union for Housing Finance (UHF), which is a non-profit trade association, with members from 60 countries worldwide. The objective of JIFF is to make housing credit affordable and more available around the world. On the domestic front, our executives help formulate national housing policies and strategies. In fact, we have been invited by the Government of India to Join a number of committees and task forces related to housing finance, urban development and capital markets ââ¬â a task that we are proud to be part of. HEAD Centre for Housing Finance Our training facility, Centre for Housing Finance (CHEF), is located 120 SMS from Iambi, in the tranquil environs of Loan, a hill station, 2,000 feet above sea level. Some of the key features of our Centre are: State-of-the-art technology in the training rooms Syndicate rooms for group work Well-equipped library Residential accommodation that provides comfort and relaxation Dining facilities offering a variety of cuisine Indoor and outdoor recreation facilities Technical Assistance (TA) The objective of the TA is to offer specific deliverables and support the Client in all aspects relating to mortgage finance operations which include loan origination and recoveries, marketing and distribution strategies, accounting and management information systems, resource manipulation and information technology support. Who would review and advise the Client on products, systems and procedures, including developing new products and designing marketing strategies. These experts would visit the Client and work closely with its officials to understand the external environment in which the Client functions and thereafter make recommendations visa-avis strategies, products, policies, systems and procedures. Our experience makes the difference Training Programmer Our training programmer are specially designed to be a blend of learning and practical experience. We offer a variety of training courses for senior and middlemen management executives and line staff. Some key programmer offered are: Housing Finance Management Loan Origination and Credit Risk Management Managing Customer Service in Financial Organizations Building High Performance Teams Resource Manipulation ââ¬â Issues in Managing and Marketing Training The Trainers ââ¬â A Multi Dimensional Workshop We also custom- design programmer based on organizational needs. Training specific Current Programmer Housing Finance Management ââ¬â 2010 (HEM-2010) November 28 ââ¬â December 5, 2010 at CHEF, Loan, India. The week long residential programmer on Housing Finance Management encompasses all the prime functions of a specialized Housing Finance Institution. Through specialized modules, the programmer will focus on various housing finance systems and best practices, credit evaluation, emphasis on customer needs, product development, marketing, managing competition and distribution channels, effective internal control systems and mechanisms, resource manipulation and risk man agement systems. img class="aligncenter wp-image-34539 " src="https://donemyessay.com/wp-content/uploads/2017/07/-.jpg" alt="Creating value" width="720" height="388" / In addition, a field visit to an HEAD office will also give participants a practical perspective of the housing finance business. HEM-2010: Programmer Outline Day 1 : Sunday, November 28, 2010 w Assembling ; Bonding Day 2: Monday, November 29, 2010 w Introduction to the programmer w Overview of Housing Finance Systems w Loan Origination and Assessment of Risk Day 3: Tuesday, November 30, 2010 w Product Development, Marketing and Distribution Channels w Legal and Technical Appraisal w Developer/Builder Relationships and Products Day 4: Wednesday, December 01 , 2010 w Loan Accounting Practices ââ¬â Systems and Controls w Credit Risk Management w Process Development for Efficient Credit Risk Management Day 5: Thursday, December 02, 2010 w Day visit to an HEAD office Day 6: Friday, December 03, 2010 w Corporate Functions ââ¬â Management Information Systems w Business Strategy and Budgeting w Managing Service Delivery Processes Day 7: Saturday, December 04, 2010 w Resource Manipulation w Risk Management Systems and Development of Secondary Mortgage Markets w Open House Session Day 8: Sunday, December 05, 2010 w Departure from CHEF, Loan v Subject to change Fees: US $ 3,000* for first participant. US $ 2,750* from second participant onwards accommodation, refreshments during breaks, meals, training costs, course material and to and fro airport transfer. Note: Accommodation will be on a double occupancy basis. For single occupancy** an additional amount of IIS$ 750 plus service tax @ 10. 30% will be charged. ** Subject to availability What our participants saidâ⬠¦ Feedback from Housing Finance Management Programmer The classroom experience was invaluable in opening up all aspects of Housing Finance Management. I have taken with me many insights that I intend to apply to what I hope will be a long career in Housing Finance. The free flow of ideas from participants representing 1 5 countries and 17 organizations also added immensely to he richness of the programmer. Cynthia Kanata, Housing Finance, Kenya (WFM 2007) It was a very wonderful experience at the HEAD Training Centre, where there was an optimal combination of knowledge gaining, sharing of experiences and recreational activities all in the perfect environment. The content of the programmer was so fruitful and have surely added value to our products and services, not forgetting the delicious meals and accommodation. Jackson Alfred Aloha Zinnia Bank Ltd, Tanzania (WFM 2008) I have attended similar programmer where the tuition cost is more than he entire programmer at WFM but in many cases those programmer were a mere rehearsal of academic notes of the Presenter. WFM 2008 was different in content and methodology; it was very practical in every respect and my reality on housing finance has since changed positively. Joseph Alphorns Tutor Jacobean, Loom Togo (WFM 2008) It was a great pleasure to visit India for the first time ââ¬â an experience Iââ¬â¢ll never forget. The programmer was successful. We shared our experience, knowledge and ideas with each other. Mar Beheaded Egypt Housing Finance Company Egypt (WFM 2009) My experience exceeded my expectations. I am really touched by the level of knowledge, passion, commitment and insight of the people at HEAD, and the opportunity to share experience with other participants. Islam Nominal PIED of Bangladesh Ltd. Bangladesh (WFM 2009) The course was an eye opener in terms of mortgage lending. It gave me a broader understanding of the various aspects of housing finance. Interacting and learning from various participants showed me that we all had a similar goal/objective that is providing shelter to everyone. Margaret Musher Zambia National Building Society Zambia (WFM 2009) The training was an experience of a life time. I learnt a lot during my interaction with the experts and participants from different countries. Apart from that the network of friends that I made will be cherished for life time. How to cite Creating value, Papers
Thursday, December 5, 2019
The Strategic Analysis for Global Business @Dell Corporation
Question: Discuss about the Strategic Analysis of Dell Corporation for Global Business. Answer: Introduction Dell Technology is a privately held technology company founded in the year 2016 after the merger of Dell Inc with EMC. The company was founded by Michael Dell and all its operations are allied from Round Rock, Texas, United States. Dell computers deals in selling, repairing and supported computers related products and services. It is known worldwide for its innovation services, supply chain management and providing configured system to the customers (Company Heritage, 2016). EMC combined with Dell on 7 September 2016 to form Dell Technologies which marked as the biggest deal in the history. The accompany employs 140,000 people around the globe which makes it worlds largest technology company. Dell, Dell EMC, Pivotal Software, Secure Works and VMware are its subsidiary company (Technology Solutions Powerhouse, 2016). The company has earned revenue of $54.9 Billion in the fiscal year end January 29, 2016(Americas largest Private Company, 2016). Dell has earned a fiscal profit of $ 13.1 billion for the year 2017. There is a 32% of increase in the revenue from the previous year (FY17 Q2 Financial Results Press, 2016). Dell started its operations in Singapore in the year 1996 and has employed 1000 people to meet the demand in the field of IT solution. It focuses on merging individual competencies to function world-wide. It has the first Dell solution Center which provides technology support and design worldwide (Getting to know Dell Singapore, 2016). External analysis Pestle analysis Pestle analysis describes the macro factors which affect the strategy implementation. This tool is used to access the market research and gives the overview of the different factors which helps in understanding the business position potential. The analytical tool helps in understanding the political, economic, social, technological, environmental, and legal factors which affect the company while developing a strategic alliance (Dransfield, 2004). Dell technology has multiple operations around the world. It is essential for a company to access the PESTLE analysis before developing a strategy to conquer the outside world (Schmid et al. 2006). P (Political) These are the political issue a company faces when developing an international alliance. Global expansion of business involves understanding of the political environment in the host country. Every country has a different political arrangement which affects the strategies while considering cross-border transactions. For example some countries have restricted the sale of foreign technology. It is necessary to conduct a political research while expanding operations in the international market (Shirani, 2013). E (Economic) The economies of the nation possess major threat to the growth of the technology products. In a rich economy technology is given more preference. Strategic alliances are favorable under dynamic economy. Demography of a country is a key factor to manage the economy. Wealth distribution is an essential key to understand the economy of the country. A country with fewer sources has less purchasing power. It is recommended to expand after considering the economic power (Shirani, 2013). S (Social) Society is posing a major issue on the future growth of the technological gadgets. Increasing popularity of various social networking sites has posed a threat on the social atmosphere. Different demography possesses challenge over the consumers attitude. Social challenges play a pivotal role in making expansion plans. The company needs to focus on the social challenges to adopt long run growth. T (Technological) Technology is developing at a faster rate with time. It is essential to work as per the technology which is guaranteed. Dell corporation is competing with international brands like HP and Lenovo. Technology can only help in distinguishing the features with the rest of the world. A company can only survive if it has adopted the global changes and needs (Neild and Carysforth, 2004). L (Legal) Legal environment is necessary to be given importance to pursue main motive of the organization. Legal compliances are crucial to be fulfilled while diversifying the operations to other country. The legal framework of every country is different which creates difficulty. E (Environmental) The world has realized the importance of environment. Technology is posing a danger to the environment. Dell technology can pose various threats to environment. Various countries have incorporated serious environmental law to safeguard themselves against recent environmental changes. Environment has caused serious issues. Dell has to adopt stringent plans while developing the environment. company 2016 shipments 2016 market share Lenovo 13,198 20.5 HP Inc 12,284 19.1 Dell 9,788 15.2 The above mentioned report suggests that there was a fall of 5% in computer shipment. Lenovo and HP together shared 40%of market whereas Dell was at third place with 15.2% market share. The PC marked has seen a fall in recent times but there are hope to witness growth by 2018. (Ghosh, 2016) Porters five forces model Porters five forces model focuses on the understanding the strength of the business under current position. It focuses on building strong model considering all the essentials into the working model (Roy, 2011). Supplier power High There are large number of supplier for the hardware components in the market which creates a high level of switching cost Buyer power High Presence of end number of brands has created a high pressure on the company. The company needs to focus on providing high class customer services to retain the customers from switching from one brand to other. Dell is providing the best service against its competitor which has created a brand loyalty in the mind of the customers. Competitive rivalry High The price margin between the rival companies is very low which has created a low price margin. However the competitive strategies have helped it to gain huge market share. It has proved that Dell business strategies are one of the best Threat of substitutes Low Dell has high presence in the market due to its reliable features. Low cost has made its presence everywhere in the world. Threat of new entry Moderate Market is subject to fluctuation. It has subjected to the threat of new entry. Globalization has reduced the legal barriers across the borders which has led to entry of various competitors in the market who provides goods at a very low cost( Hill and Jones,2007) External analysis VRIO analysis This tool is used to analyze various dimensions to make strategically decisions against its competitor. VRIO stands for Value, Rareness, Imitability, Organization (Grnig and Khn,2015). DELL Corp. Valuable Rare Inimitable Organization Personalized customer pt Yes Yes No Yes Customer Relationship Yes Yes No Yes Distribution services Yes Yes No Yes Peng, M. (2016). Personalized customer part: dell is known worldwide for creating a personalized customer parts. Dell corp. is known for compiling the system as per the choice of its customers. This provides the company with a cutting edge against the other brands. Customer relationship: Dell ensures customer satisfaction by giving quick services. They give priority to customer relationship by taking care of the customers needs. There is no other brand in the market which can imitate the customer services as provided by the competitor brands. Distribution services: Dell corp. is focused on providing the best distribution services. The company has distribution channels at different places. They are known for providing the non imitable distribution services within the economy. SWOT analysis SWOT analysis is used to analyze the strength, weakness, opportunities and threats. This analytical tool is essential to understand the potential threats and opportunities. It takes all the necessary information from the surroundings and helps in deciding the external factors which can affect the working of an organization (Ferrell and Hartline, 2010). Strengths The brand value of dell corp. after merging with EMC is at over $60 billion (Su, 2016).Dell is the market leader in the field of technology innovation. Enigmatic and effective leadership by Michael dell has added a cutting edge with the brand. The brand is known for providing customized products to its customers. Their business model is as per the environmental norms. Dell is based on the direct selling model. The company has a competency on merger and acquisitions. Weakness Their customer services are poor as compare to the other competitive brands. Dell has made a very low investment in the research and development process. The patents portfolios are week when compared with the brands like apple, HP, and Lenovo The retail locations are very few in the market. The customer services are poor as compare with the other brands. Low product differentiation . Opportunities Dell needs to make an investment on the research and development process. It has an ample of opportunities in the field of merger and acquisition. This will create opportunities in the field of technology innovations. Dell should diversify its product range by entering into smart phone and tablet industry. There is an increase in the opportunities due to emerging market trends. Threats Emerging economies has created competition inside the organization. Data privacy security is causing a major threat on the brand. A low price brand in the market has created difficulty for the brand. There is a decline in the current desktop and laptop market ( Schneider,2014). Strategic option Strategic options are the recent changes the world is facing in the business practices due to external factors. The external factors have exposed the organization to the risk. SWOT analysis helps in analyzing the risk which is attached with the organization. Strategic options are the various opportunities available with the organization to assess the threats. The various strategic options are acquisition, merger, offensive/defensive strategies, strategic alliance; diversification etc. Dell Corporation has recently seen a change in its internal structure. The company has recently merged with EMC. It is the biggest tech merger in the history which amounted $ 67 billion (Cornelissen, 2004). Research innovation Research innovation is an essential tool for accelerating growth in the competitive environment. However excess investments in the research and development would minimize its core competency. It will create a pressure over the company to create multiple distribution channels to redirect the availability of resources. Dell strength is to make mass sale without making much investment in the research and development. Innovation is a necessary for dell to improve over the recent changes. There are many competitors in the market which are providing better services so it is necessary to make a difference in the mind of the consumer by improving on the current technology. Technology is changing with each passing day which is posing serious competition. Dell needs to put its resources in the strategic research and development of resources instead of bulk production. Research and technology is gaining importance as per the recent trends. The company should stay on focusing of its research and development services to create the difference in the technology industry. This will increase the overall potential of the company. Its world-wide recognizable name will help it in expanding into other markets (Dells Cooling Innovation For Scale-Out Computing,2016). Diversification There is a need to diversify the resources to other projects in order to achieve a sustainable growth. Dell has concentrated its resources in mass production of computer goods. Many of its competitors have already diversified its production into other category. Dell by far has concentrated in the market for the production of mass computer goods whereas brands like HP and Lenovo has diversified its market by producing tablets and mobile phones. Dell needs to diversify its assets into other segments to procure large profits. However it is late for a company to take a big step where there are already various brands which are already doing well in the market. Dell has to diversify its production strategies into other fields which will help it to grow. The acquisition of EMC with Dell is important in point of view of technology. The technology is developing at a rapid speed where other competitive brands are fighting hard for their survival. Dell needs to focus on the strategy as per the latest market trends and atmosphere. Acquisition Technology competency is essential while following various models. The latest acquisition in the internal structure has helped the company to grow with the joint support. Acquisition strategy helps in creating a competitive difference. The merger of big brands in market helps in accomplishing the desired goals. Merger of EMC and Dell are seen as a big market changer by the technologists. Recommendation Dell should focus on building relationship with the customers. This will help it to grow on a long run. It is seen in the past that the company which do not have better relationship with the customers and its partners fail. Dell should diversify its profits and revenue to create competitive advantage over other brands. The company is recommended to reduce the overall cost by introducing the favorable plans in its system. Today market requires diversification of asset in order to serve the purpose. The international market has created ample of opportunity with dynamic changes. Diversification would help in improving the overall expansion of the core benefit. Creating partnership with the leading technology brands will help Dell in overcoming the upcoming issues. Conclusion Dell Corporation is a famous computer brand in the market which is providing services round the world. The report discusses the internal and external analysis of the company strategies and what strategy it should adopt to compete with its competitors. Dell should focus on bringing innovation in its technology services by making investments into its research and development. It should focus on emphasizing in its core strength which will help it to grow on a long run. Todays market is based on diversification of the assets. Multiple companies are focusing on the different technologies to procure the benefit. Dell is recommended to diversify its assets to procure maximum benefit through its strategies. References Americas largest Private Company, (2016). (Online) Available from: https://www.forbes.com/companies/dell/ (Accessed on 26/09/16) Company Heritage,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/about-dell-company-timeline (Accessed on 26/09/16) Cornelissen,J.(2004). Corporate Communications: Theory and Practice. SAGE Dell's Cooling Innovation For Scale-Out Computing,(2016) (Online) Available from: https://www.forbes.com/sites/moorinsights/2016/06/02/dells-cooling-innovation-for-scale-out-computing/#1e3b33311a8c (Accessed on 26/09/16) Dransfield,R.(2004). Business for Foundation Degrees and Higher Awards. Heinemann Ferrell, O. and Hartline, M. (2010). Marketing Strategy. Cengage Learning FY17 Q2 Financial Results Press (2016). (Online) Available from: https://www.dell.com/learn/us/en/uscorp1/secure/2016-09-06-fy17-q2-financial-results-press-release (Accessed on 26/09/16) Getting to know Dell Singapore,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/careers/careers-about-singapore (Accessed on 26/09/16) Ghosh,A.(2016).Global PC shipments fall by 5% in Q2 2016, Lenovo dips but remains market leader (Online) Available from: https://www.ibtimes.co.uk/global-pc-shipments-fall-by-5-q2-2016-lenovo-dips-remains-market-leader-1570110 (Accessed on 26/09/16) Grnig,R. and Khn,R.(2015). The Strategy Planning Process: Analyses, Options, Projects. Springer Hill,C. and Jones,G.(2007). Strategic Management: An Integrated Approach. Cengage Learning Neild,C. and Carysforth,C.(2004). Business. Heinemann Peng,M.(2016). Global Business. Cengage Learning Roy, D. (2011). Strategic Foresight and Porter's Five Forces. GRIN Verlag Schmid,N et al. (2006). The Dell Company - A Strategic Analysis. GRIN Verlag Schneider,G.(2014). Electronic Commerce. Cengage Learning Shirani,M.(2013). Strategy Creation and Change - Dell Corporation. GRIN Verlag Su,J.(2016). Dell To Rebrand As Dell Technologies After EMC Merger (Online) Available from: https://www.forbes.com/sites/jeanbaptiste/2016/05/06/dell-to-rebrand-as-dell-technologies-after-emc-merger/#763ba3de3e7f (Accessed on 26/09/16) Technology Solutions Powerhouse,(2016) (Online) Available from: https://www.dell.com/learn/sg/en/sgcorp1/2016-present?~ck=mn (Accessed on 26/09/16)
Thursday, November 28, 2019
Oncology and Malignant Tumor Cells free essay sample
Cancer is one of the most common life-threatening diseases of the modern world, according to the research, there was around 12. 7 million people were diagnosed with cancer in 2008, and around13% of all deaths. In this essay, a discussion of the introduction of cancer disease, which is followed by an analysis of the treatment usage and the effectiveness of targeted therapy and subsequently compare targeted therapy and the other cancer treatment resolution. Cancer is a big class of disease causes the abnormal cell growth uncontrollably and spread through the body. There are over 100 different types of cancer, and each is classified by the type of cell that is initially affected. The tumors usually classified into two main groups, they are solid tumors (in organ of body) and liquid tumors (in the circulatory and lymphatic system). The cause of cancer is usually due to carcinogens which is widespread in the environment, If the cell is belong to cancerous tumor-malignant, it invades other organ or spread systems and life threatening. We will write a custom essay sample on Oncology and Malignant Tumor Cells or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The cancer usually progress through 4 stages, the signs and symptoms will depend on the position, size and numbers of the cancer cells, also different in several stages. If the tumor is close to the body surface, you might see a lump or swelling, a change of color of the skin or mucous membranes. If the tumor is deep, the symptoms appear until the tumor grows to push on nearby organs, blood vessels, and nerves. This pressure causes some of the signs and symptoms of cancer. Cancer remains one of the largest causes of death worldwide, therefore huge amounts are spent to treatment of cancer, and this essay will focus on the targeted therapy. Targeted cancer therapies are drugs or other substances that block the growth and spread of cancer by interfering with specific molecules involved in tumor growth and progression. The first molecular target for targeted cancer therapy was the cellular receptor for the female sex hormone estrogen, in 1949 by Leukemia but there was 0% in five year survival. In 2009, there were 38 subtypes have been identified, and 70% in five year survival. Targeted therapy is a treatment that aims to exploit some biologic feature of the tumor to eradicate it. There are 2 main types of targeted therapy drugs monoclonal antibodies and small-molecule drugs. Monoclonal antibody therapyà is the use ofà monoclonal antibodies to specifically bind to target cells or proteins. This may then stimulate the patientsà immune systemà to attack those cells. For example, mAb therapy can be used to destroy malignantà tumorà cells and prevent tumor growth by blocking specific cell receptors. Small-molecule drugs are typically able to diffuse into cells and can act on targets that are found inside the cell. Most monoclonal antibodies cannot penetrate the plasma membrane and are directed against targets cells. Targeted therapy is in contrast to traditional chemotherapy, which is not specific to a particular tumor type and acts by killing rapidly dividing cells, regardless of whether or not they are malignant. There are two major reasons for the development of targeted therapies. Firstly, by targeting a unique characteristic of the tumor, cancer cells will be killed while normal cells will be spared, thus providing effective cancer treatment with fewer side effects. Secondly, if the target is essential for the viability of the cancer, it is unlikely that the cancer cell will easily become resistant to the targeted therapy, thus increasing the effectiveness of this type of treatment. Although targeted therapy drugs donââ¬â¢t affect the body the same way that standard chemo drugs do, they still cause side effects. When drugs attack more than one target, side effects are more likely. Also, drugs that act as angiogenesis inhibitors affect new blood vessel formation all over the body, not just for cancers. Many of the targeted therapy drugs can cause a rash or other skin changes. For example, targeted therapy drugs target the epidermal growth factor receptor (EGFR) protein, which tells the cancer cells to grow and divide. The problem is that normal skin cells also have a lot of EGFR, and drugs that target or block EGFR often affect skin cells, too. They turn off the signal for skin cells to grow normally and make it harder for them to retain moisture. Allergic reactions usually within minutes to hours after taking the drug. They may include hives and intense itching. An allergic reaction often includes other serious symptoms such as trouble breathing, dizziness, tightness in the throat or chest, or swelling of the lips or tongue. The improvements in cancer treatment seen in the last 100 years have been dramatic outcomes over the world. In the past, doctors used to use therapeutic windowââ¬â¢, refers to the ability of a treatment to kill cancer cells while minimizing the toxicity to healthy, normal cells. Furthermore, targeted therapies tend to be better tolerated than traditional cytotoxic chemotherapeutic agents and the development of target therapy allows greater tumor specificity and less toxicity so it has started to spread across the world. In order to avoid cancer recurs, most of the doctors suggest combining target th erapy and chemotherapy to completely eradicate the cancer.
Sunday, November 24, 2019
Pre 1900 Prose Assignment Charles Dickens Essay Example
Pre 1900 Prose Assignment Charles Dickens Essay Example Pre 1900 Prose Assignment Charles Dickens Paper Pre 1900 Prose Assignment Charles Dickens Paper what fat cheeks you ha got. , and if I hant half a mind tot! are all quotations where an accent is visible from the convict. An accent might create confusion as Pip might not be able to understand him and also lets us know he probably is foreign. When the convict asks where Pips mum was, and Pip answered There, sir! the convict, acting as though he wasnt scared and was scary until then, runs away. This suddenly brings to mind that he isnt as threatening as he was thought to be. Who dye live with supposing youre kindly let to live, which I hant made up my mind about? The convict is re-affirming that he is still dangerous and delivers a threat if Pip doesnt answer. He makes an even greater threat not long after when he wants food and a file, You get me a file. He tilted me again. And you get me wittles. He tilted me again. You bring em both to me. He tilted me again. Or Ill have your heart and liver out. He tilted me again. The convict backs this threat up by scaring Pip when he tilts him back and back. In this extract, Dickens has again used effective techniques to create an atmosphere where Pip is frightened and vulnerable. At times, though, he has made the convict look slightly afraid and sometimes you feel sorry for him because of how he has been described. The scene and setting changed as the extract went on, one part was when Pip was described as petrified in his point of view, and another was a different perspective of Pip. Also the convict, when he first arrives on the scene he is described as intimidating and a scary person but your opinion changes as the extract goes on. The Signalman is quite a bit different to this extract from Great Expectations as Dickens doesnt try and use the same techniques to create the same effect. Oliver Twist was one of Charles Dickens most popular novels and was first published between 1837 and 1838. It centres on the hardship of the dispossessed and those of outside civilised society. The extract that I am analysing is Chapter 47: Fatal Consequences and focuses mainly on a discussion between Fagin and Bill Sykes, and then at the end of the chapter, Bill murdering Nancy. The first paragraph is basically a very long sentence; it is over five lines long and goes on to set the scene and atmosphere. It was nearly two hours before daybreak tells us that it is still dark and darkness can be seen as where all evil takes place. This immediately sets a dangerous and frightening atmosphere, just like Dickens did with The Signalman. That time in which the Autumn of the year. This backs up the evil part as autumn is barren and hibernation takes place. Dead is related to evil and darkness and the next quotation is just part of the description of the setting but we already know that the atmosphere is dangerous and scary. May truly be called the dead of night is also very negative and nothing g ood is said. The dead of night is personification and so is sounds appear to slumber. The first quotation the dead of night could mean that at night everything seems dead as it could be silent and maybe unsettling. The next quotation sounds appear to slumber suggests that because it was silent it felt that all sounds were sleeping and fits in with the danger atmosphere. Personification was used in The Signalman so again this extract has similarities with the short story. Fagin was first described as though he was evil and dead, and went well with the description of the setting. Fagin sat watching in his old lair, with face so distorted and pale, and eyes so red and bloodshot makes us create an image of Fagin which was quite frightening. That he looked less like a man, than like some hideous phantom, moist from the grave, and worried by and evil spirit finishes of that fearsome picture of Fagin in our minds and describes him as though he had died long ago and risen up from his grave. Dickens uses evil again to tell us about a spirit and this helps with the frightening atmosphere if the character is like it. Fagin is then portrayed as being an animal or monster, he sat crouching over a cold hearth, his toothless gums and fangs are all features or characteristics of an animal such as a dog. At last. He muttered, wiping his dry and fevered mouth. At last! This quotation suggests that Fagin was expecting Sikes, but he might have been late. It could mean that Fagin is impatient. Sikes is described as soon as he comes through the door and creates an image of him being the brawn of the two, whereas Fagin is the brains. The man displayed the burly frame of Sikes. Bur he did not take his eyes of the robber shows that Fagin does not trust Sikes and shows that he fears him a bit. Dickens has given Sikes an accent Damme said Sikes, and this has made Sikes foreign, more dangerous as he is from another county and harder to understand. Sikes lacks security, feeling in his breast with a look of alarm, which has made us feel that he is unstable and that he needs protection. It also shows that Sikes mistrusts Fagin as well. Nance will think Im lost. Gives a little glimmer that Sikes is caring and humanises him to his first description. Fagin uses blackmail a few times to persuade Sikes What if I did it! cried Fagin, almost in a yell. I, that know so much and, could hang so many besides myself! This blackmail is strong and is showing that what Fagin is trying to persuade Sikes to do is important. Sikes changes back to his violent self after he is humanised and he makes brutal threats to match Fagins blackmail. And beat your brains out afore the people and that I could smash you head as if I a loaded wagon had gone over it are two quotations showing the violence in him. Dickens has gone further than Sikes being just violent and has also created an image that he is not even afraid of death, Id do something in the jail that ud get me put in irons This finishes our image of the character Sikes in our heads and it is a cruel aggressive one, no sign of the caring part as he is willing to kill anyone who betrays him. When Sikes comes into Nancys room, Dickens makes Nancy feel vulnerable and we can sympathise for her. Even when Dickens uses double-locked the door it shows that she wants some security. The girl was lying, half dressed, upon it. Girl is used to again go further on her vulnerability and that shes not a woman but a defenceless young girl. Nancy is said to be pleased with Bills return and she thinks of him as a guard or some protection, or it shows that she might love him, with an expression of pleasure at his return. During the murder of Nancy, she was said to be praying on her knees and this helps for Dickens to make us feel sorry for her. Also a white handkerchief makes her appear helpless and weak This extract from Oliver Twist has most of the atmosphere techniques at the start of it, so as to create an image of the scene as quickly as possible. The Signalman and this extract are very similar in the techniques used to create atmosphere as Dickens is trying to build up a dangerous and evil place. Techniques used to create character are used throughout the extract and each character has been given different characteristics so there would be conflict. Fagin is very sly and evil, Sikes is violent and aggressive and Nancy is vulnerable and weak. The Signalman and Great Expectations both have two characters and centres mainly on the atmosphere and less on the them, whereas Oliver Twist uses techniques more to describe the characters. I found that The Signalman and Oliver Twist were the more effective of the three. I think I thought this as there was a lot of detail on the atmosphere of The Signalman and had conclusions to what the signalman was like, in his job and what is personality was actually like. Oliver Twist went into great detail with the characters and I liked this as I could create an image of all three characters and then I imagined what the atmosphere was like around them after. Dickens in Great Expectations, though, didnt use as many effective techniques to describe the characters. The atmosphere was being described through the use of the senses and there werent that many other techniques. This is why I thought that Great Expectations was less interesting and therefore less effective in building atmosphere and character.
Thursday, November 21, 2019
To what extent do leaders shape their movements, and to what extent Essay
To what extent do leaders shape their movements, and to what extent are they shaped by them Illustrate your answer with reference to leaders from more than one - Essay Example This particular essay will be conducted in a manner such that briefly some theories of the leadership and the behaviors of the leaders are discussed. The conclusions related to the theories will be supported by one of the leader who is selected for the discussion here. The leader is selected on the basis of the major revolutionary changes that have been made because of his and his movementsââ¬â¢ contributions. Kirk (2005) argues that according to the 1trait theory which is designed in the context of the leadership, the leaders have the personalities as well as the behavioral tendencies that make the leaders the way they are. The theory says that there will be certain traits and characteristics in the person that will make him behave in the leading manner. In addition to this the contingency theory suggests that in addition to the behavioral tendencies that the person has, the leadership qualities of the person are shaped more by the surrounding situation that the person belongs to. Many of the historical authors have written the leadership qualities what seemed appropriate to them. In the case of Sanskrit, there are ten main qualities in the leader that have been defined. According to the aristocratic thinkers, the leadership quality of the person comes from the familial traits or the genes of the person. If the leadership runs in the family than the person would be possessing the leadership qualities. But this in my point of view still depends on the situation that the person is in. Sunnemark (2004) discusses that in these historical times, we have seen many leaders who may be related to the political movements which have worked for the changes in the social society as well. 2Therefore the leaders are always important to the social movements that ever occurred in the history. The scholars have tried hard to learn as to what
Subscribe to:
Posts (Atom)