Wednesday, October 9, 2019
Biographical essay Example | Topics and Well Written Essays - 1500 words
Biographical - Essay Example Chamberlain must have governed in frenzy of faith that the mad man of Germany would calm down soon. He must have played the gentle man that Britain was not going to blow the first whistle on Germany. While Hitler, Mussolini and Japan came out openly as rogue leaders and state, we sat back and watched. It seems nothing was wrong with the invasion of Manchuria. It seemed it was all okay to embark on rapid militarization of Rhineland. The appeasement policy massaged Hitlerââ¬â¢s roaming appetites for war. I have today set foot on Europe to bring good news, thanks to Chamberlain and the appeasement policy (McDonough 1). I bring good news from the world on the other side pacific that we are indeed very sorry for this war, which the world could have avoided. This is the news that I bring with a gun on my hand and explosives on my back.â⬠Powell spearheaded many military strategies and by October 1944, there was huge progress. He helped in designing the D-Day operations and strategi es, much to the success of the Allied. After the end of the war, Powell returned to work in Europe under the Marshall Plan. He records in his diary the following. ââ¬Å"The Marshall Plan is a big boost in the recovery of Western Europe and Japan in the post-war period. I can see a future beyond the rubble, hunger and starvation. Even so, I fail to understand why the Russians with whom we had just fought on the same side could be taking advantage of the situation. I foresee a quite friction between the ambitious Soviet and the USA. I believe it is now time for reconstruction, not for claiming plunders of the war. Otherwise, I may consider that I fought on the wrong side of the war.â⬠Amongst other entries, Powell observes that the onset of the Cold War started with Russiaââ¬â¢s taking advantage of the small nations. He also notes that in the aftermath of the war, many states in Eastern Europe were still weak. Rather than being left to their own determination, Russia was forc ing them one after another into communism. It is then that the US acted under the Trumanââ¬â¢s Doctrine (McDonough 1). Under the Trumanââ¬â¢s Doctrine, it became the official policy of the US to support any free people resisting attempted subjugation by an armed foreign force. To counter the emerging tyranny of Russian, Powell received orders to watch keenly the developments in Eastern Europe and advise accordingly. This was the early years of the Cold War in the aftermath of WWII. Powell was also not an apologist for the Hiroshima and Nagasaki situation on the account that it was a consequence of war. He based his reasoning purely on war strategy. From his 1945 diaries, he has offered sufficient reason why the use of the atomic bomb was unavoidable (Doyle 1). As noted in his diary, he enters the following: ââ¬Å"The world seems to forget so fast. Just the other day were dealing with Hitler and Mussolini. That is over, and the next rogue is Russia. The United States is practi cally fighting proxy wars to help those whose right to free determination is under threat by the USSR. It is foolhardy to start playing blame games at this moment on whether the atomic bomb solution is justified.â⬠Powell indicates that when the United States resolved to use atomic bombs on Japan, it was because that was the only solution left. Germany and other axis powers had been subdued and surrendered. The war had dragged for too long, but Japan was not
Tuesday, October 8, 2019
The Market Opportunities Available to Carrefour in a South Africa Assignment
The Market Opportunities Available to Carrefour in a South Africa - Assignment Example This paper provides a detailed outline of the market entry strategies that the Board of Directors should consider for entering the retail business sector in South Africa. It has been recommended that the joint venture would be the safest and most profitable method of market entry. Table of Contents 1 Brief Synopsis of the Issue 4 Recommendation(s) 4 Background 4 Company overview 4 Theories of international trade and investments 5 Analysis of Market Opportunities in South Africa 6 Company Situation Analysis 10 Analysis of various types of market entry strategies 13 Market entry Strategy: Joint venture 15 Reference List 17 Brief Synopsis of the Issue The proposed market entry strategy for Carrefour is joint venture since this is the best option available to the firm for minimizing threat involved in entering the new market and for gaining knowledge of the local market. Recommendation(s) South Africa is a developing country and the national government is making efforts to attract foreig n direct investment Carrefour is a multinational firm with advanced technological know-how Joint venture with a well performing local firm in the same business is the best strategy to enter the South African market Background Recently, Carrefour has made an unsuccessful attempt to enter the Russian market with the aim of establishing a hypermarket in the country. The causes of the failures have been found to be lack of potential demand (particularly for organic food items) and low opportunities for acquisition and growth. This paper presents a case study, which acts as the platform on which the company should build its strategy to enter the South African market. Through this paper, it has been recommended that Carrefour should adopt the strategy of a joint venture for entering the South African retail industry. Company overview Carrefour was founded in France in the year 1960 by two entrepreneurs, one textile retailer and the other a food wholesaler. In 1960, the first store was hig hly successful and it marked the beginning of the companyââ¬â¢s successful journey. In 1975, the company made its first venture outside Europe and opened a hypermarket in Brazil. Since then Carrefour has expanded its business across the globe. Presently, the company has 4635 stores in France alone and more than 5200 stores in Europe, Asia, Latin America, Caribbean and North Africa and Middle East (Carrefour, n.d.). However, in 2009, the company faced a setback while trying to establishing a hypermarket in Russia due to lack of demand for its organic food products (Indu, 2011). The company was forced to quit their business in Russia and exited after four months. It is currently considering South Africa as a prospective country for making investments. Theories of international trade and investments In the modern globalized business world, there is wide agreement on the benefits of international trade among the economist, politicians and academic researchers. Investments made in for eign countries are believed to boost up business operations around the world and also lead to economic progress of the host countries. These countries are encouraged to modify the economic policies pertaining to international trade in such as way, that they can promote international trade and investment.Ã
Monday, October 7, 2019
A Sports Development Work Programme and a Sports Development Action Essay
A Sports Development Work Programme and a Sports Development Action Plan - Essay Example A four year plan is published by the council. The council has been working in partnership to ensure that they deliver the most efficient and highest quality services to business, citizens and communities in the South Lanarkshire. There has been need of developing a leisure structure of NBG in South Lanarkshire such as a swimming. The reason behind the choice of area of work is to improve the quality of life of citizens in South Lanarkshire and at the same time improve the overall enjoyment of living and working in South Lanarkshire by providing equal access to opportunities. There is need to prepare a work programme when commencing any given new project. Many projects reach undesirable end results, such as structural collapse, cost overruns, and/or litigations reason because those with experience in the field did not make detailed plans and maintain careful oversight during the project to ensure a positive outcome. Hence, for our project we should establish a team of workers and advisors to create an overall plan to ensure that our project will proceed in an orderly manner to a desirable end. We will include advisors such as accountants, insurance brokers, mortgage bankers, architects and engineers. Effective planning is essential for the successful execution of a project. Those involved with the design and execution of the infrastructure will consider the environmental impact of the job, the successful scheduling, budgeting, site safety, inconvenience to the public caused by construction delays, preparing tender documents, etc. A SWOT analysis identifies factors that may facilitate or inhibit the proposed development of a leisure structure of NBG in South Lanarkshire. A SWOT Analysis to Development of a Leisure Structure of NBG in South Lanarkshire Strengths Weaknesses Good support network by sports fans Improved link with other partners Support by the council Difficult of development without support of the community If government support the project, then we account more also to it. Opportunities Threats Potential improved government funding Other partners may high jack the project The development of the leisure structure of NBG will succeed if it gets support from the sports fans and the required support from the council. It will also succeed if it gets funds from the government and other well wishers. On the other hand the project might fail if other partners high jacks the project before we implement it and also if the community will not support the project. Action Plan Action 1 Goals: Consultation with relevant organisation on the development of swimming Evaluation Strategy: I will know that the goals have been achieved if we reach to a compromise. Steps Necessary to Achieve the Goal Time Scale Resources Having consultative meeting with various stalk holders 3 - 6 Months Myself, Council, Community Leaders, Church Leaders, Government Representatives
Saturday, October 5, 2019
Organizing and Paying for American Education Essay
Organizing and Paying for American Education - Essay Example Private institutions are run by non-governmental organizations and often churches. Public education is one of the main expenditures of the state whose funding comes from local taxes. The American educational structure is as follows: First there is pre-higher education that consists of pre-primary classes involving kindergarten, nurseries, preschool programs, and child/day care centers. Then, there is primary education which is the elementary school from grades 1 to 7. After that the middle education comes which offers education from grades 4-6, or 5-7, or 6-8. Then, there are high schools providing education from grades 7 or 8 to 12. After this, higher education starts which is also referred to as postsecondary education, offered in universities. Organization An American school has a principal who is in charge of the school; an assistant principal who shares duties of the principal; curriculum coordinators; department heads, teachers as team leaders; student teachers; probationary te achers; tenured teachers; and support staff consisting of classified employees such as librarians, custodians and secretaries. As far as organization of school districts is concerned, there is a local board of education which is granted legal authority to run schools and is elected for a term of four years.
Friday, October 4, 2019
Qualitative Analysis Essay Example | Topics and Well Written Essays - 1500 words
Qualitative Analysis - Essay Example Compared to other developed countries Singapore has low tax rates with a very high per capita GDP globally. Singapore has a very innovative and stable economy which is merged with efficient economic planning under the Economic Development Board that helped to establish a free market. Singaporeââ¬â¢s main exports include; chemicals, services and electronics which provide the main sources of revenue for the country. Most firms are registered as private Limited companies. The country experiences a very low supply of water with a limited arable land for agriculture. Moreover, Singapore has a port that is strategic enough to give it an edge over the neighboring countries that carries Entrepot trade. Most of its labor comes within the population which is owed to the efficient education policy in the country that produces skilled labor for the industries in the country. The Argentinean economy is dominated by agriculture, which contributes the largest percentage of the GDP. The country h as fair economic policies that aim at increasing the exports from the main productive sectors. The main natural resources that contribute immensely to the countryââ¬â¢s economy are minerals such as zinc, lead, copper, tin, oil and natural gas, uranium, iron, manganese and lithium. The main agricultural products produced in the country include; grains and livestock products. The country does not have a free economy like that of Singapore hence its economy is not that well established. The industries operating in Argentina include: oil refinery, food processing, machinery and equipment, petrochemicals and textile industry. Most of the countryââ¬â¢s exports are taken to Europe and Brazil which are the countryââ¬â¢s main trading partners. The main sector which is Agriculture has recently shown a rapid recovery with an increasing industrial production which replicates that of its immediate neighbor Brazil. The tax revenues are slowly growing with the debt services reducing. Ther e is a probability of volatility in the financial markets due to the conflict that exist between the central bank and the federal government. Comparison of the Political Environment between Singapore and Argentina Singapore has one of the most efficient political and regulatory policies globally. According to the surveys conducted the country ranks 122 out of the 138 countries in terms of creating a conducive political environment for business. This is in connection with press freedom in regard to the World information technology report of 2011 (Huff 745). The uniqueness of Singaporeââ¬â¢s political environment comes in the fact that the immigration rules and laws are not that strict compared to Argentina or any other country. There are very strong law enforcement agencies which make cases of political unrests rare and efficient for business operation. The country is controlled by very few political parties with the main political party being Peopleââ¬â¢s Action Party. This st ability in terms of political party policies ensures effective business environment for the development of country. The government of Singapore also ensures free trade agreements and employment laws in industries where a majority of the foreigners are in the job market. The main countries that have set up businesses in the country include China, Europe and the United States. As such, most foreigners use this country as an avenue to establish and expand their businesses through a
Thursday, October 3, 2019
Network Design Essay Example for Free
Network Design Essay The objective at hand was to build a network from the ground up. This was accomplished by breaking down all of the sections and building upon all previous assignments. This was a good course as I learned a lot about all of the different sections of building a network. The pros are now I know how to build a network on the design side from the ground up. I learned quite a bit about using a lot of the technologies associated with networking and it allowed me to learn quite a few new concepts. Some of the downfalls about this course and what I have learned are I did not feel I accomplished much as there is no hands on training associated with the course. I do not feel like concepts and design ideas are a great resource to actually learn how to use any of the systems but they do give a pretty good idea. Cabling SpecificationsEthernet is a Local Area Network (LAN) technology with a transmission rate of 10 Mbps and has a typical star topology. Computers and devices must wait-and-listen for transmission time on the network as only one device can transmit at any one time. In order to operate with this network strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple Access with Collision Detection). Each device on the network listens for the network to be clear before transmitting data. If more than one computer or device transmits data at the same time, then collisions occur. Once collisions are detected, all devices stop transmitting for a period of time until one of the devices senses the line is free and will then gain control of the line to transmit its data. Receiving devices just sit there waiting and listening for transmissions that are meant for them, which are determined by an IP (Internet Protocol) address. The main advantage to Ethernet is it is one of the cheapest networks to put into service. Compared to other hardware for Token Ring, Ethernet equipment such as hubs, switches, network interface cards, and cable (Cat5 common) is inexpensive. The main disadvantage to Ethernet is related to the collisions that occur on the network. Even though Ethernet cable (Cat5) is fairly inexpensive, it can become a cost issue if designing a large network as each device or computer requires its own cable connection to the central hub. Another disadvantage is distance limitation for node connections. The longest connection that can occur within an Ethernet network without a repeater is 100 meters. Todays Ethernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the most part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) specification for Ethernet is 802.3 with three-part names designating the different types. For example, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps. Token RingToken was developed by IBM as an alternative to Ethernet. The network is physically wired in star topology, but is arranged in a logical ring. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is used. Access to the network is controlled by possession of a token that is passed around the ring from computer to computer as data can only travel in one direction at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to the transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds: 4 Mbps and 16 Mbps. The main advantage to Token Ring is there are never any collisions within the network, which makes it a highly reliable solution for high-traffic networks. The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware. FDDIFDDI (Fiber-Distributed Data Interface) is an architecture designed for high-speed backbones that operate at 100 Mbps, which are used to connect and extend LANs. A ring topology is used with two fiber optic cable rings. Ità passes a token on both rings and in opposite directions. The specification for FDDI is designated by the American National Standards Institute as ANSI X3T9.5. The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, data is rerouted in the opposite direction using the other ring. It is also considered reliable because it uses a token-passing strategy. The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings. WirelessLocal Area Network (LAN) TopologiesA mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device being connected to every other device. The Internet uses a mesh topology to operate efficiently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive. A bus topology is a multipoint topology that entails each device being connected to a common link or path. The common link can be thought of as the backbone to the network. All devices typically connect to the backbone with a T-connector and coax cable. The main advantages of a bus topology are that it is easy to install and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a problem with the one backbone cable, then the entire network will no longer have the ability to communicate.à These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable short can cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Another disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal can travel down that cable. A ring topology means that each device is connected in a ring, or daisy-chain fashion, one after another. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device. The main advantage of a ring topology is that it is easy to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring. The star topology has each device in the network connected to a central device called a hub, which can actually be a hub or switch. All traffic must pass through the hub in order to communicate with any other device on the network. There is no direct communication between devices like in a mesh topology. One advantage to a star topology is any failure to one cable or device connected to the hub will not bring the entire network down. Repairs can be done to individual nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices can be added to the network without disrupting any of the current users. All that is required is an additional cable run from the device to the hub. One disadvantage includes cable costs because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.à Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network. Wide Area Network (WAN) DesignA WAN, also known as a Wide Area Network, is an essential part to bigger corporate networks most government networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running as one big network over a big geographical area. Although a WAN could cover very small distances, most WANs cover much larger geographical areas such as a country or possibly even the world. The largest WAN today would technically be the internet or the World Wide Web. The internet is, in short, one giant WAN because it consists of many smaller LANs and servers. Most WANs can cover a fairly large geographical area, but some, such as the World Wide Web can cover the globe. The United States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest ways to be able to do so. To be able to get on the internet, a subscriber must go through an ISP (Internet Service Provider) and they will give the subscriber access to the internet for a certain price every month. There are different ways to get access to the internet depending on the geographical location in which you live. A subscriber can go through dial up, which is one of the slowest methods, but it is also one of the most common. There is also DSL (Digital Subscriber Line) through most phone companies if they have access in the area and cable which is usually one of the fastest and most expensive methods to access the internet. The last common method is using a satellite to obtain access. This is usually the most expensive ways to access the internet because the equipment usually needs to be bought. When talking about telephone lines, we start getting into analog versus digital signals and degradation over longer distances. A telephone system works on analog signals. These work by a computer transmitting a digitalà signal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and later being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a filter of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals. Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public systems such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking much faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming much more common. When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is defined as Ãâlatency is a measure of how fast a network is running. The term refers to the time elapsed between the sending of a message to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well. At the user level, latency issues may come from software malfunctions; at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.ÃâDos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These types of attacks are usually by hackers or someone who does not want others to access a certain service. There was a recent DoS threat on the CNN webpage as some hackers wanted CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services. There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is instead of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a simple fix to this problem is to defragment a hard drive. This can tremendously speed up a PC, because the files will be closer together and easier and quicker to access. On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of information and check how much time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line. In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and backup all of the data on the network as well, but this was an example of a crude network. Most companies also a very repetitious and redundant with their WANs. This is because they do not want a central failure point to bring the entire company to itÃâs knees. There are usually multiple switches that can tie theà entire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason redundancy in this situation makes more than enough sense. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to transfer data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic. Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual Private Network). VPN technology is already built in to most operating systems and is very easy to implement. With bigger environments and corporations, a consideration for concentrated VPN hardware should be in place because of the simultaneous users and stress on the servers. There are a few different types of VPN including IPsec, PPTP and SSL. Once the connection from remote access has been made, you need to make sure the files are readily accessible for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. Thereà are other ways to allow access as well. Using remote desktop connection, the user has the ability to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. Network Remote AccessMost companies need to be able to access their work from many locations, including home and while traveling. The solution that allows them to access the network is one of two ways to access their network. The first is through a VPN (virtual private network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection; this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware. The definition from whatis.com about a VPN is Ãâ virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunnelingà Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a tunnel that cannot be entered by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.ÃâA VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the world with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of comfortable solutions, such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download t he document. Network Business ApplicationsA second way to access oneÃâs computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss. The explanation between these two pieces of technology is Ãâwith dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated. ÃâThere are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to setà up and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone jack and they should be able to log in. The disadvantage of this is depending on where the user is long distance charges may apply and it could rank up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run. There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party support companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the headache that VPNs can give due to different errors. There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up system because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companyÃâs network through a VPN. Through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPNs can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access. All in all, there are two very cost effective solutions at a companyÃâs finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not needà to set up multiple accounts per user, or if they would rather have a better solution and save more money down the road. The choice also depends on the amount of users logging in at any given moment. Backup and Disaster RecoverySecurity, back ups and disaster recovery are all important very parts of all networks in todays world. The problem with today is information on how to hack, destroy and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least have access to the Internet in the world, which is about 25% of the worlds population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the users side. There are other things that happen besides people trying to maliciously harm a users files and data. Accidents can happen and destroy data as well. There could be many things that can harm a users data such as a fire, earthquake, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings). There are other ways to store a users data as well. One way is to make a physical copy of everything needed on CDs, DVDs, Flash Drive or some other type of media and store it at a friends house or some other persons house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be restored. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for redundancy which allows the customer more safety and easier access to all of their files. One of the first steps to a business that wishes to be very secure in allà that they do is to set up a backup and disaster recovery plan to start it all off. Like I stated earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies. They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can restore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com Ãâthe first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probability and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact. So in this companys risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.ÃâAnother big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system. A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite aà bit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly. Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be broken in to. There are people out there that can be hired to try and break into a companies network. They get paid and let the company know what needs to be fixed so others can not break into it as well. In conclusion, a company can be nothing or brought to its knees with out its network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way. References About, Inc. (2004). Network topologies : bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http://compnetworking.about.com /library/weekly/aa041601a.htmBrain, M. (2004). How stuff works : how wifi works. Retrieved October 12, 2004,from http://computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp://www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp://www.pcworld.idg.com.au/index.php/id;988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtual Private Network. (n.d.).retrieved May 11, 2008, fromhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.html#VPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp://technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http://www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http://www.internetworldstats.com/stats.htm
Alternative marketing strategies to increase market share
Alternative marketing strategies to increase market share The aim and objective of this report is to provide recommendations on ways for Natural Way Products to increase the brands market share. Based on NWPs current market share status the most effective strategies to implement incorporate a mix of market penetration and market development strategies. It is recommended that NWP maintain their current reputation in their current market as its a vital part and one of the businesses main strengths to their ongoing business. Recommendations for implementing the market penetration and market development strategies involve focusing on customer relationship management, looking for potential alliances with businesses already in the national market, using alternative media channels and look at product promotion via their current online distribution channels while tailoring the marketing campaigns to each target segment. NWP is a small, independently owned New Zealand company currently holding an estimated 10% market share in New Zealand aiming to achieve a 15% share within the next five years, and expand sales to the South Island and Australian market. The purpose and objectives of this report is to identify different market growth strategies and advise Jacqui Thompson of Natural Way Products (NWP) recommendations in order to achieve a greater market share in the New Zealand natural skincare market. This report outlines the recommended solutions for Jacqui to implement in order to achieve the companies objectives. These recommendations focus on how NWP can strive to achieve the desired growth in market share specifically using the market penetration and market development strategies using geographic expansion methods and product promotion. It is assumed that NWP have available funds to allocate to the marketing strategies recommended. With restricted access to current customer market feedback it is assumed that the points of difference stated by Jacqui are correct and therefore hold the advantage over competitors offerings. It is also assumed that the market share estimate is correct and current and that the brand Zaras is a reputable brand. 2. DISCUSSION Natural Way Products situation analysis: 2.1 Strengths: Successful established and reputable brand name and product line Current 10% market share Current experience, knowledge and resources already in place Quality and reliable products Uses some locally grown and entirely natural herbal ingredients Offers different channels of distribution through online sales and retail outlets. 2.2 Weaknesses: Currently limited to small market segment offering slower growth potential Products made in small batches risk with the more produced the less attention given as demand increases. 2.3 Opportunities: Create additional services to competitors by enhancing current features of online system Influential media awareness focus on natural-based products Look for low cost opportunities and ones that leverage current capabilities Product variants provide opportunity of selling more to the same market Opportunity for growth in new locations and underrepresented geographic markets Marketing costs are less in this digital age and easier to implement Partnerships or alliances with other businesses 2.4 Threats: Risk of retaliation from larger competitors Impact of global economy and environment on local business Little scope for using existing expertise if trying to sell completely different products or services to different customers Effect of increased market share on actual and perceived quality Alternative strategies for growth in market share: 2.5 Market Penetration NWP could gain additional market share with its current products and current markets by encouraging customers to purchase more. They would be able to utilise current experience, knowledge and resources making growth in existing product markets more cost effective and less of a risk. NWP could further advertise their products leaning on their points of difference from competitors offerings in order to encourage more customers in their existing market to use their product, or current customers to use more of it. NWP could do this by launching special promotions and offerings (Boaz, 2006, p.212); increase sales representatives; expand to department stores; and introduce a loyalty scheme to entice customers into the market. With the forever increasing use of online marketing NWP could use customised marketing through their current client database and focus on expanding the services provided through their online ordering tools. With extra features and additional offers that create a competitive advantage such as same day delivery, free gift wrapping service or free delivery; or discounted online offers. It has been argued by Gorton (2007, p.37) that maintaining the client database using customer relationship management is also important and could be used by NWP to create custom reminder responses based on previous buying patterns and as reminders on special occasions. NWPs current reputation is one of the most important assets they have. Market penetration will be a useful strategy for NWP, while maintaining expertise and experience in a market already well known to the company they are at less risk and losing reputation and upsetting product quality and service delivery. The downside to using this strategy is that this limits market share growth to current markets offering slower growth potential as opposed to developing products in new markets. 2.6 Market Development NWP should consider domestic geographic expansion as a way to improve sales volume and share position. Changing from a regional operation to a national operation (Walker, Orville C. Jr Mullins, John W. , c2011, p.251) could be best implemented by NWP through an alliance with a business already in the market and also assist in stronger buying power from suppliers. This move does create a risk of retaliation from larger national competition as well as from current regional competitors. NWP could look at targeting non-users who would be interested in using the products through advertising and media channels or offering free samples to first time users. By marketing to potential customers and making them aware of the products NWP could invest in television, internet and magazine advertising, for example in womens health magazines, or during prime television slots in which the target market are known to be viewers. Focusing on media advertising as shown by Boaz (2006, p.209) does run the risk of being costly and ineffective if not advertised correctly. NWP already offer two channels of distribution but could look at further promotion through online sales and expanding the reach of current retail stores in which their products are sold. NWP should look to open up alternative distribution channels such as direct marketing using a sales team; introducing products into department stores under another brand name, and expanding the number of retail outlets. NWP could also target different age groups of women by tailoring the advertising campaign and packaging to appeal more to each market segment. The same expertise currently used in the company can be applied with ease to the new segment therefore reducing cost and risk. Expanding products into further market segments will be an effective strategy for NWP, using geographic expansion, their current distribution channels, and further advertising. It is also recommended (Snyder, Tom Burns, Brian, 2010, p.173) that a potential alliance with major customers or with other national like-minded businesses is likely to be successful in achieving growth in market share. 2.7 Product development With 15 years of business and products already proving to be successful NWP could introduce more products to the market under their recognised brand name Zaras. Ideally NWP would need to offer a new product not currently offered by competitors and could make this offering more attractive than competitors by providing initial discount offers for first time users and then continuing at full price once theyve obtained repeat business. NWP would benefit from using their existing customer database to find out their preferences and to gain feedback for potential new products. If using this strategy NWP would benefit from integrating current users into the innovation process by asking for new product ideas from them and pursuing the most popular of those ideas. NWP could also look at packaging existing products in new ways to appeal more to the current target market. Or try promoting the current product in department or retail stores under an alternative brand name. Unless risk management is closely monitored this could be an ineffective strategy for NWP (Leithhead, 2011, para.3). Managing the risk involved in product development could put pressure on NWP as resources would need to be reallocated to the development of the new product. Product development could be costly and unrewarding for NWP. If resources are stretched to develop new products the quality of their existing offerings could suffer. Identifying critical resource limitations, recognises Gorton (2007, p.27), is essential to avoid a negative impact on the quality of current product lines. 2.8 Diversification Diversifying the current product range could help reduce NWPs overall business risk through offering products in different customer categories. NWP already have an established brand name under the name Zaras giving an advantage should the new product or target markets be unsuccessful NWPs other product lines are unlikely to be affected. Zaras would help in leveraging new products belonging to the same brand and help the company to spread their customer base while also helping the company develop its product portfolio through introduction of complimenting products in the market (Keller, Philip Kotler, Kevin Lane, 2009, p.28). NWP could introduce a diverse pricing strategy with lower quality, cheaper to produce products; however this would be going against the core values of the company which is not advisable. The huge risk with this strategy for NWP is there is often little scope for using existing expertise as it involves selling completely different products to a completely different market. This would make NWP vulnerable to a major reaction from competitors as they attempt to enter into other markets with products that could affect competition. Diversification strategy is similar to starting an entirely new business (Holden, Philip R., Wilde, Nick, 2007, p.75) also involving high risk and is not recommended for NWPs growth strategy at this time. 3. CONCLUSIONS Attempting to increase usage among current customers is less threatening to a competitor which avoids bigger competitor responses. The downside to using market penetration is that it limits market share growth to current markets offering slower growth potential as opposed to developing products in new markets. Using market development in similar segments the company can apply current expertise with ease to the new segment therefore reducing cost and risk. Domestic geographic expansion is an effective way to improve market share. Increasing use of online marketing makes a focus on expanding the services provided through current online ordering tools a useful avenue for growth in market share. An effective way of targeting non-users is through further advertising and media channels or offering samples of the products for first time users. NWP should consider the effect of increased market share on actual and perceived quality before pursuing increased market share too many customers can strain the firms resources, hurting product value and service delivery. Unless risk management is closely monitored product development and diversification could be ineffective strategies for NWP. Introduction of a diversified pricing strategy with lower quality, cheaper to produce products is an option for different markets and potential market growth; however this would be going against the core values of the company which is not advisable. Managing the risk involved in product development could put pressure on the companys resources. 4. RECOMMENDATIONS Inform current and valued clients of continuous delivery quality and services provided to build further customer satisfaction and maintain customer loyalty. Focus on developing products in new markets. Create/amend marketing budget to determine affordability of marketing techniques for tailored campaign targeting a younger/older generation specific to appeal to each target segment. Contact potential partners and retail outlets in the South Island and Australian markets for geographic market expansion. Create/amend marketing budget to determine affordability of marketing techniques for enhancements on NWP online ordering system with extra features and additional offers. Contact media channels such as womens health magazines and other media and advertising channels. Advertise offering samples of products either in-store or by online ordering in order to target non-users within the target market. Ensure NWPs increase in product sales will not impact firms resources through reallocation and reviewing of quality product and service delivery. Employ management to maintain specific target markets. Employ risk management specialist management and implement risk management plan to monitor changes in market and customer satisfaction. Focus existing expertise on market development and market penetration strategies.
Subscribe to:
Posts (Atom)