Thursday, November 7, 2019
Security threats and features of LDAP The WritePass Journal
Security threats and features of LDAP 1.à Introduction to LDAP: Security threats and features of LDAP 1.à Introduction to LDAP:2. Protocol Operation:3. Auditing features in LDAP:4. Security features of LDAP: (RFC 2829)5. Implementation of ACL over LDAPIntroduction:Example syntax for ACL syntax on LDAP server:Regular expression:LDAP search filter:Comma separated attributes:6. ReferencesRelated 1.à Introduction to LDAP: There are many protocols listed in the networking communications such as HTTP, FTP and one among them is LDAP, which is expanded as Light Weight Directory Access Protocol. LDAP is primarily used in the communication of directory services. This protocol runs depending on four models categorized as: informational model (describes about the directory), naming model (structuring and referring the directory data), functional model (describes about the mechanism of protocol on directory services access), security model (describes about the protection of data in a directory from malicious programs or any unauthorized access). This coursework explains about the various security threats that may raise during the design of a directory service and the security features that LDAP supports. Prior to that, there is a need of understanding the functionality involved and the data transfer or access between client and server needs to be discussed. Later, the directory cannot be used for storing public data if the mechanism or security support is not available for LDAP services for the applications and users. In a reason for developing trust from the users and applications, there is a need of providing some of the important security features along with LDAP systems and services. 2. Protocol Operation: LDAP is a message oriented protocol, where the LDAP client sends a request for data to LDAP server and server processes the request and returns the client with multiple messages with unique message_id as the result. The following figure explains about the protocol operation about client server communications. 3. Auditing features in LDAP: What security auditing features does LDAP support and is it possible to detect brute forcing attacks (such as NAT) against a LDAP server? The initial security feature while designing a directory can be developed based on security threat or issues that generally make a service insecure. The security problems are difficult to fix if there is no clue form the threats occurred. So, there is a need to maintain a track record of whoever has access the system and the timestamp that the system was accessed. There should be additional information about the operations performed and the impact of the operations with results of some errors or unusual conditions. With the help of such information, it can be easier to analyze the logs which can narrow down the technical security problems insight. Some of the security features in LDAP examples include break-in attempts, trawling attempts, misconfigured applications. The auditing features help in detecting the brute force attacks and supports LDAP operations with the following methods: Break-in attempt triggers when there is a multiple failures that occurred repeatedly that were noted down in the error logs due to login failure which raises a choice of break-in attempt. Trawling refers to unauthorized bulk downloads from the directory services or data from the systems. The trawling attempt is to monitor the repeated search results such that the limit for download exceeds the allotted administrative limits. Misconfigured applications: Some of the applications retrieve certain data that is not relevant to the directory systems or the data of directory services. Such application even place unnecessary load on the servers and these are rated as misconfigured applications. Auditing such information helps the administrator of the directory server to counter such threats or can also help in identifying the solutions to make the server with optimal solutions. The auditing feature is available on LDAP based account or through a local file system access in /etc directory. In most of the cases, the auditing feature is disabled by default on LDAP accounts. The command line option with audusr ââ¬âa or ââ¬âd makes the accounts active and disable respectively for auditions. Once the account of LDAP or local user account was authorized, then the flag for system auditing can be set to enable. Such configuration can be enabled by defining the parameter ââ¬Å"initial_ts_auditingâ⬠in the client configuration file ââ¬Å"/etc/opt/ldapux/ldapux_client.confâ⬠. Auditing feature is dependent on the host specifications where the setting needs to be enabled for each and exclusive hosts. They share unique audit Ids for different LDAP based accounts which are not synchronized when they are executing in trusted mode. If the LDAP account changes or gets updated, a unique id is generated for each host that the account is created on. Initially, as discussed auditing flag will be set to disable in ââ¬Å"/etc/opt/ldapux/ldapux_client.confâ⬠file. Else,, if the account is deleted in the directory server, related information will not be completely deleted from the local system. Reason is that the information that is stored in the local system can be re-used when there is a need to use the account again. However, such accounts can be removed from trusted mode manually which can be specified in the directory: /tcb/files/auth/ directory, and represents the initial of the account name. 4. Security features of LDAP: (RFC 2829) Authentication security feature for LDAP can be done in two approaches one way communication, where client enters the simple password texts to the directory server in a LDAP bind operation or the server provides a SSL Secure Socket Layer certification to the client where the connection will be encrypted. Another type of network in LDAP is two way communications, where client and server exchange SSL certificates. SSL layer divides the data sent across into multiple blocks where each block is associated with check sum value to make sure that the blocks are not tampered in the transit. So, if the data sent will be signed with SSL certificate from the indicated party, there is a little chance of the data to be tampered in the transit and such security feature was termed as Signing. Encrypted data has very interesting feature that only the receiver for the data can decrypt the data with the code and possibly the sender will know the code to undo from the original. There is minimum chance for the data to get scrambled when sent through the security mechanism of encryption. There needs to be a feature developed in any directory system when the data sent needs to be acknowledged with a end to end security enabled. This feature needs to be implemented to track the data if the security was compromised and in what manner the security was lost. Such information will be logged inside the error logs of every directory server and such mechanism of tracking records and error logs is defined as auditing security feature. Firewall is the vital security feature available on LDAP directory systems which prevent unauthorized access on the resources or data inside the network or directory server. Examples are e-commerce websites that are equipped with efficient firewalls which create multiple zones of security where the zones are included with public Internet sites and internal database servers with sensitive information. These above mentioned mechanisms are the security features which are available inclusive in LDAP In the next section, the area that will be discussed on the security systems that support LDAP in keeping the directory systems more secure. Intrusion detection systems are mainly supportive while a intruder tries to look-up information and access certain secure data. These systems help in detecting such attack and signals that an attack has occurred on the directory systems. They consists of network intrusion detection systems NIDS, which identifies the network packets and system integrity verifiers SIVs, which monitor system resources such as registry settings. SSL Secure sockets layer protocol, as explained earlier is a protocol which was mainly developed for the use of making certain protocols like LDAP, HTTP etc more secure. It is mainly based on the public key cryptography that comprises of authentication, signing and encryption features of additional security to the directory systems. Kerberos provides authentication and encryption features as well with the directory systems in LDAP. SASL, Simple authentication and Security layer will be applicable for application layer protocols that can negotiate the authentication by supporting encryption, signing and authentication services. Internet Protocol Security, IPsec helps in providing a security mechanism on transport layer connections where LDAP runs on TCP Transfer Control Protocol between machines. IPsec is mainly dependent on public key technology that can be useful in administrative tasks on the directory systems. 5. Implementation of ACL over LDAP How is it possible to implement an access control list on a LDAP server? Introduction: Access control lists (ACLs) over LDAP server has the underlying reason for their implementation as to monitor the individualââ¬â¢s rights and permissions of access on the different resources and directories. The configuration syntaxes are defined for ACL as: {*, self, anonymous, users, Regular expression} where * represents any connected user (can be self or anonymous user) Self represents DN, distinguished name of the currently connected user who was successfully authenticated in the previous LDAP bind operation or request. Anonymous represents non-authenticated user connections Users represent the opposite of anonymous as the authenticated user connections Regular expression represents DN or a SASL identity. (Source: Carter, 2003). Example syntax for ACL syntax on LDAP server: The individual login username will be considered as the form of DN as (DN=â⬠`cn = Gopal Krishna, ou=people, dc=Glamorgan, dc=orgâ⬠) or as the form of SASL identity as (DN=â⬠uid = gk123, cn=Gopal Krishna, cn=authâ⬠). The access privileges vary from one user to another user narrowing from top to bottom where the intensity of access also varies accordingly. Write permission is on the top access level followed by read, search, compare, auth, none. The simplest way to monitor the access level is initially defining a default access level of authorization. The configuration file that includes all such information of LDAP is: ââ¬Å"slapd.confâ⬠. When there are no rules or roles generated or provided for any user, slapd.conf file has all the parameters that define the access levels for the unspecified users. Example: To assign the role or privilege of ââ¬Å"searching the directoryâ⬠is given to all the users. It can be implemented in the slapd.conf file as shown below: The next implementation of ACL on LDAP is to define the entry and attributes that needs to be applied on directories. They are categorized as: regular expression, LDAP search filter, comma-separated list of attributes. (Source: Carter, 2003). Regular expression: It defines the distinguished name (DN) of the proposed or desired ACL that needs to be set on directory systems. Then, the syntax will be written as: ââ¬Å"dn.targetstyle=regexâ⬠where, Target style represents one of the bases (can be sub tree, one or children). It has the default value of sub tree where it is used to broaden or narrow down the scope of ACL for the authenticated or non authenticated users (anonymous users). If we consider example of sub tree comparing the target style value as one, then the scope of ACL limits to the value of children immediately next to the defined DN. However, in most of the real time scenarios, the default value does not gets changes as most of the users need to be provided the privilege of sub tree scope of limit on ACL over LDAP. Regex term represents the actual regular expression specification of DN. It follows the most commonly used normal regular expression rules such that the regular expression will not affect the DN value to make it in a normalized form. LDAP search filter: LDAP search filter is configured by specifying the filter as ââ¬Å"Filter = ldapFilterâ⬠. If the LDAP query searches all entries of an ââ¬Å"object class attributeâ⬠, Search scope defines the ââ¬Å"LDAP search queriesâ⬠, by default has sub tree as the target list searches for all the entries from the directory server that was defined by ââ¬âb option. When the search filter targets with target style = children, number valued as one; the immediate children of the base suffix entry or searching the single entry. The entries are specified as sub, base, or one are identified by the search scope ââ¬âs (RFC 2820). Comma separated attributes: The file ââ¬Å"slapd.confâ⬠, with the query of ââ¬Å"slapdâ⬠returns the attributes which are non-operational. For every entry in the directory, there will be an extending list of attributes inside the directory. When the results target operational attributes, the examples of such attributes are: modify Timestamp and modifiers name. A comma separated list of attributes is written with the syntax: â⬠attrs= attribute Listâ⬠. The ACL applies to all the attributes held by such entries which match the distinguished name regular expression pattern. If there are no such search filters present and the requirement shifts towards the asterisk (*) which will be used as a placeholder that consist of every attribute list filters. If the access needs to be provided for every user, for example when a read operation needs to be allotted for all the available users, the syntax is written in the form as: Space indicates that the other line is continuation of the earlier command. The entire syntax can be written in a single line where most of the complex ACLs makes the easier readable format in such spaces. If the user needs to be restricted on the access with a password attribute, user can access and does not have any explicit permissions of read and write permissions. The implementation can be written as follows: Else, if the password permission for updating by the user, implementation of ACL on LDAP can be obtained by: (Source: Carter, 2003). 6. References LDAP System Administration by Gerald Carter, Copyright 2003 Oââ¬â¢ Reilly Associates, Inc published on March 2003 First Ed. Understanding and Deploying LDAP Directory Services, Second Editionà By Timothy A. Howes Ph.D., Mark C. Smith, Gordon S. Good Access Control Requirements for LDAP (RFC 2820). E. Stokes, D. Byrne, B. Blakley, and P. Behera, 2000. Available on the World Wide Web at ietf.org/rfc/rfc2820.txt. Authentication Methods for LDAP (RFC 2829). M. Wahl, H. Alvestrand, J. Hodges, and R. Morgan, 2000. Available on the World Wide Web at ietf.org/rfc/rfc2829.txt. Chris McNab, Network Security Assessment: Know Your Network, Second Edition, Oââ¬â¢Reilly, 2007, ISBN: 0-596-51030-6.
Tuesday, November 5, 2019
Abbreviations and Titles Used in College
Abbreviations and Titles Used in College Some abbreviations are appropriate in academic writing, while others are not appropriate. Below youll find a list of abbreviations you are likely to use in your experience as a student. Abbreviations for College Degrees Note: Theà APA doesnt recommend using periods with degrees. Be sure to consult your style guide as recommended styling may vary.à A.A. Associate of Arts: A two-year degree in any specific liberal art or a general degree covering a mix of courses in liberal arts and sciences. It is acceptable to use the A.A. abbreviation in place of the full degree name. For example, Alfred earned an A.A. at the local community college. A.A.S. Associate of Applied Science: A two: Dorothy earned an A.A.S. in culinary arts after she earned her high school degree. A.B.D. All But Dissertation: This refers to a student who has completed all the requirements for a Ph.D. except for the dissertation. It is used primarily in reference to doctoral candidates whose dissertation is in progress, to state that the candidate is eligible to apply for positions that require a Ph.D. The abbreviation is acceptable in place of the full expression. A.F.A. Associate of Fine Arts: A two-year degree in a field of creative art such as painting, sculpting, photography, theater, and fashion design. The abbreviation is acceptable in all but very formal writing. B.A. Bachelor of Arts: An undergraduate, four-year degree in liberal arts or sciences. The abbreviation is acceptable in all but very formal writing. B.F.A. Bachelor of Fine Arts: A four-year, undergraduate degree in a field of creative art. The abbreviation is acceptable in all but very formal writing. B.S. Bachelor of Science: A four-year, undergraduate degree in a science. The abbreviation is acceptable in all but very formal writing. Note: Students enter college for the first time as undergraduates pursuing either a two-year (associates) or a four-year (bachelors) degree. Many universities have a separate college within called a graduate school, where students may choose to continue their education to pursue a higher degree. M.A. Master of Arts: The masters degree is a degree earned in graduate school. The M.A. is a masters degree in one of the liberal arts awarded to students who study one or two years after earning a bachelors degree. M.Ed. Master of Education: The masters degree awarded to a student pursuing an advanced degree in the field of education. M.S. Master of Science: The masters degree awarded to a student pursuing an advanced degree in science or technology. Abbreviations for Titles Dr. Doctor: When referring to a college professor, the title usually refers to a Doctor of Philosophy, the highest degree in many fields. (In some fields of study the masters degree is the highest possible degree.) It is generally acceptable (preferable) to abbreviate this title when addressing professors in writing and when conducting academic and non-academic writing. Esq. Esquire: Historically, the abbreviation Esq. has been used as a title of courtesy and respect. In the United States, the title is generally used as a title for lawyers, after the full name. Example: John Hendrik, Esq. It is appropriate to use the abbreviation Esq. in formal and academic writing. Prof. Professor: When referring to a professor in nonacademic and informal writing, it is acceptable to abbreviate when you use the full name. It is best to use the full title before a surname alone. Example: Ill invite Prof. Johnson to appear as a speaker at our next meeting.Professor Mark Johnson is speaking at our next meeting. Mr. and Mrs. The abbreviations Mr. and Mrs. are shortened versions of mister and mistress. Both terms, when spelled out, are considered antiquated and outdated when it comes to academic writing. However, the term mister is still used in very formal writing (formal invitations) and military writing. Do not use mister or mistress when addressing a teacher, a professor, or a potential employer. Ph.D. Doctor of Philosophy: As a title, the Ph.D. comes after the name of a professor who has earned the highest degree awarded by a graduate school. The degree may be called a doctoral degree or a doctorate. Example: Sara Edwards, Ph.D. You would address a person who signs correspondence as Sara Edwards, Ph.D. as Dr. Edwards.
Saturday, November 2, 2019
What is mentoring at work What benefits may the mentor derive from Essay
What is mentoring at work What benefits may the mentor derive from such a process Illustrate your answer with suitable examples - Essay Example velopment, acquirement of inter-personal skills, problem solving skills, collaboration and teamwork as well as open mindedness among other positive aspects that are important for enhancement of performance. The purpose of this paper is to assess critically the meaning of mentoring at work and to assess the benefits that a mentor derives from workplace mentorship. Mentoring is a practice that involves sharing of knowledge, experience, facts as well as the point of view by a person to promote personal and career development in another individual. At work, mentoring involves maintaining a positive attitude towards work as well as developing problem solving skills among the less experienced employees to enhance the accomplishment of organizational goals. A mentor is usually an experienced worker in an organization who understands the organizational processes and is competent in problem solving (Ragins, 2007). Zachary (2005) states that, ââ¬Å"satisfaction is one of the major benefits of mentorsâ⬠. In essence, humans tend to be inclined towards helping others as a sign of social responsibility. Material benefits may not be achieved, but the mentor tends to feel esteemed when successful individuals associate their accomplishments with him/her. When a person acts as a mentor, there is a high possibility of developing a new perspective in regard to approaching issues in the workplace. The mentor gains a sense of worth on the realization that the knowledge he/she has acquired over many years is valuable not only to the organization, but also to another person who will possibly pass it over to a third person in future. In essence, he/she becomes a legendary employee in the organization whose legacy is admired by many. Willingen (2000) observes that talent is preserved in an organization, which is an indicator of success for the mentor. Moreover, the mentor understands concepts better as he/she engages in problem solving through workplace mentoring (Ensher & Murphy 2005).
Thursday, October 31, 2019
Marketing, Management Project ( Introduction) Essay
Marketing, Management Project ( Introduction) - Essay Example The presence of other car manufacturers such as Toyota and Tata Motors has made the Asian vehicle market difficult to reach (Lewis, 2011). However, the use of social media in creating product awareness gives Mercedes Benz more opportunities to get in Asian countries, especially in China (Huang, 2014). The importance of global social media channels such as Facebook, Twitter, and YouTube among other national or regional social networks has attracted more attention from product promoters and marketers (Harris, 2014). For a long time, Mercedes Benz has relied on social media channels to reach areas with high presence of technology. Mercedes has significantly used the Chinese leading social media networks; Qzone, Tencent Weibo and Sina Weibo in efforts to reach its target market. This means that the interaction and discussion of its brand and products is very high in social networks (Lewis, 2012). The use of social media channels in product awareness and interaction with both customers has increased in the last two years. Company marketers and public relation officers have set out to understand the real benefits from the use of social media by organization in communicating with their customers. While social media channels may not be as effective as television, newspapers or print media, Sandoval (2014, p. 46) notes that the personal relationship created by these channels improves the confidence of the customers. Mercedes Benz and other firms using social media have widely used the channels to connect with their customers concerning the quality of products and solution to any problems raised by customers (Barker et al, 2012). According to Lewis (2012), most potential customers spend more time online seeking clarification and information on products or services they are interested in. Customers use this important brand information in making their buying decisions (Lardi and Fuchs, 2013). Therefore, the type of information
Tuesday, October 29, 2019
Introduction Chapter for Swirling Flows Essay Example | Topics and Well Written Essays - 1500 words
Introduction Chapter for Swirling Flows - Essay Example and also in various engineering applications. [1] Aerodynamic drag induced by lift of the wings of an aircraft may also give rise to swirling flows in air. In the engineering applications, particularly where combustion systems are entailed, swirling flows can be defined as continuous jets of fluid in uniform transverse flow that have dynamic and three dimensional (3D) structures. [2] According to a basic definition from Lilley (1977), ââ¬Å"Swirling flows result from the application of a spiraling motion, with a swirl velocity component (also known as a tangential or azimuthal velocity component) being imparted to the flow via the use of swirl vanes, in axial-plus-tangential entry swirl generator or direct tangential entry into the combustion chamber.â⬠[3] Figure ââ¬â 1: Example of swirling flow in an artificial test case [4] Why Study Swirling Flow? According to experts like Gallaire, Rott and Chomaz, there have been only a few studies in the academic world which have dea lt with the monitoring, control and analysis of complex fluid mechanical systems involving tubes and swirling jets. Also, the competitions between the axisymmetric and helical breakdown patterns of vortices in a swirling flow are still a major area of scientific exploration, which cannot be successfully accomplished without a complete understanding of Central Recirculation Zone (CRZ) and reported formations of Precessing Vortex Core (PVC) inside the swirling flow. [1, 3, 5] In combustion chamber and gas turbine applications, swirl flame stabilisation is widely used. Lean premixed and non-premixed systems are the major categories of these applications, where the processes of flame stabilisation, as functions of thermo-acoustic flux, combustor geometry and fuel type, are yet to be fully understood and simplified. [1, 6] Besides, there are relatively fewer research papers available where tall cylinders have been used to generate swirling flows with instabilities directed to the 3D patt erns of fluid dynamics. Hence, three dimensional characters of a swirl remain less explored than its unsteady axisymmetric features. [7] Therefore, swirling flows should be studied so that these gaps in engineering research can be properly abridged. Overview of Some Major Swirling Flow Phenomena Some of the major phenomena related to swirling flow that predominantly occur in combustion technologies are vortex breakdown, sudden expansion, bluff body flow, Central Recirculation Zone (CRZ) and reported formations of Precessing Vortex Core (PVC). Vortex Breakdown: Since swirling flow has a three dimensional structure, it possesses both axial and tangential velocity components in the 3D vector fields [1, 4]. When the Swirl number S is increased, strong coupling forces develop among the axial and tangential velocities. Together with strong inertial effects, swirl vortex is generated which is again broken down when the flow attains high Reynolds number. Ayache explains this process of vort ex breakdown as an unstable flow with transient patterns that ââ¬Å"occurs due to the instabilities present in swirl flows such as shear-layer instabilities (like Kelvin-Helmholtz instability) similar to axial jets and azimuthal shear-layer instabilities created by the radial gradient in azimuthal velocity.â⬠[1] Sudden Expansion and Bluff Body Flow: In order to gather intricate flow statistics, a bluff body may be introduced on
Sunday, October 27, 2019
Changing business environment of Samsung
Changing business environment of Samsung Introduction: Samsung has grown to one of largest electronics company since 1938. Since 1970s and early 1980s Samsung expanded globally with diversified intention into core technical business. Samsung leads the electronic industry with its high performance and with high growth rate along with stability. 2009 Global Market Share of 13 Percentage of different products available in market. Examples -: Mobile Phones, Monitors, Semiconductor.1970 First Black White (Model P-3202) production started Samsung-Sanyo Electronics.1969 SAMSUNG-Sanyo Electronics established (renamed SAMSUNG Electro-Mechanics in March 1975 and merged with SAMSUNG Electronics in March 1977)1951 SAMSUNG Moolsan established (now SAMSUNG Corporation)1938 SAMSUNG was founded in, Korea (Taegu) Company: Samsung Global Market share is terms of sales is as follows: TV Market Share is 21.9% Laser Printer Share is 13.7% Mobile Phone Share is 16.7% DRAM Share is 30.1% TFT-LCD Panel Share is 25.7% If we compare this performance to other companies Samsung emerges as world leader in at least 3 sectors which are TV, DRAM TFT-LCD. This clearly shows us the dominance of Samsung in market and this is mainly due to its transparent policies, positive approach and honest efforts in being a global leader. This performance data is taken from Samsungs sustainability report for 2009 from Samsung official website. We can clearly see that Samsung as a company is growing locally and globally Korea being its local market. This consistent growth of the company is mainly due to its marketing strategies which are paying off well. More details on Samsungs operations, marketing, product line etc can be found on: The business environment keeps on changing and is unpredictable. So, it is very necessary to understand and react to this changing business so as to survive and grow in the market.Proper knowledge of business environment will make the entrepreneurs and businesses able enough to plan and implement strategies that are needed to identify the scope of improvement, create and exploit opportunities that come on the way, retain stability, gain competitive advantage and prepare appropriately for the upcoming challenges. The way the environment is analyzed and accordingly the strategies implemented, will define the track of the business.Here With the example of samsung. The data collected will be analysed using SWOT. SWOT stands for strengths, weaknesses, opportunities and threats. SWOT analysis, is a strategic business planning tool used to determine the Strengths, Weaknesses, Opportunities, and Threats that exists in business. It includes identifying the business objectives as well as the internal and external factors which are likely to favour the business. It may be classified into: Internal factors strengths and weaknesses that are within (internal) organization. External factors opportunities and threats of external environment. The internal factors can be classified into strengths and weaknesses depending upon their effect on organization and business objectives.The factors may include all of the 4Ps; as well as personnel, finance, manufacturing capabilities, and so on. The external factors may include macro-economic factors like technological , legal,and socio-cultural changes, as well as changes in the marketplace or competitive position. According to B Kyle SWOT can be identified as internal and external in relation to environment. Strengths: It usually tells about the positives of the company. How well we are doing in our area of interest. What is our position in front of competitor? Weaknesses: Weakness refers to area of struggle of our company. Why are consumers not happy about particular product? Why are we not meeting sales target for a particular product. Opportunities: It is directly related to external environment. It could be the areas where your competitor is not good at. We should try to utilize strengths in areas of our weaknesses. Are there any emerging trends or possibility to capture market by introducing new product? Threats: It could be financial or development problem. Competitors strength is major threat. Are competitors becoming strong. Description. Strategic business tools: SWOT analysis for Samsung Strengths Strong hold in Consumer Electronics Low margin strategy increases sales Highly skilled labour availability locally globally Good focus on customer service and good marketing strategy Strong management and loyal employees Weaknesses Lack of performance in Laser printer sales Less cost effective in PC consumable products. Lack of brand recognition in mobile phone sector. Poor pricing strategy Lack of usage of infrastructure in some part of world e.g. China Opportunities Can unseat major stake holders in TV and DRAM sectors Increase product range in consumer electronics Can sustain future market using the idea of consumer taste research Rapid growth in competitive markets across the globe Increase in portfolio due to acquisitions of other firms Threats Faces high competition from Sony and Nokia in mobile phone sector. Daily entrants of new technology companies Impact on sales due to recession Lack of innovation in mobile industry threatens its position further down. Intense competition from existing companies in PC sector. The above information which helps in doing the SWOT analysis and other graphical presentation helps to answer our objective questions mostly. Although it might not provide direct answer but clarifies strategies and benefits of organisation doing global and domestic business. It clearly reveals the benefits of proper marketing in terms of sales numbers. PESTEL Analysis: PESTEL analysis is one of the most important tool of business strategic management which helps in identifying the surroundings within which the company operates. It gives a clear idea about the threats, risks and opportunities that occur in the market. It helps in understanding the needs of market, its fluctuations, whether the market is progressing upwards or downwards (i.e. growth decline ratios) and thus makes the businesses able to develop strategies accordingly. PESTEL is used as decision making tools in macro-environment. PESTEL is Classified into: Political factors Economic factors Social factors Technological factors Environmental factors Legal factors Political factors: Its all about intervenes of the government on the economy of the country. Political factors include areas like Tax policy Labour law Environmental law Trade restriction Tariffs Political stability Services and goods provide by the government ( merit goods ) and services which is not provided by the government (demerit goods) Goodwill among foreign nations Economic factors: It includes Interest rates Economic growth Rate of inflation (Inflation rate) Rate of Exchange (Exchange rate) For example: Cost of capital is directly affected by interest rate Exporting goods and supply of goods is affected by exchange rate Inflation raises cost. Social factors: Demand of products and company operations are affected by social factors like Culture of the society Natality rate Growth rate Age distribution Technological factors It includes Research and development activity. Automation Better technology for the production of goods Technological have direct impact on costs, quality which leads to innovation. Environmental factors It includes Weather Climate change Locality (Place) Ecofriendly products (to overcome with problem of global warming)e.g Effect of temperature on farming and tourism. Legal Factors It include Consumer law Employment law Health and safety law Discrimination law e.g. Minimum wages system in U.K is legal factor that affect business. Minimum age for employment is fixed by the government. Conclusions Recommendations We have analysed and gathered data from Samsung Company in relation to our topic global versus domestic marketing a critical analysis. The conclusions drawn using company data alone cannot summarize our findings. However there are similarities in few points. If we look at the organisation section we can see how Samsung has come a long way to be recognised as a global brand. It shows that achieving such position in global market is very hard. Not only achieving but it becomes increasingly important to sustain that growth due to fierce competition. It shows how companies have to adjust or change their policies from time to time keeping in mind rising and falling economy. In general it alerts companies of being more innovative cautious of environmental changes. It also emphasis on limitations one has to face as the behaviour and taste of consumer changes geographically. Recommendations Companies should develop marketing strategies keeping in mind its strengths, weaknesses and availability of resources to be globally successful. Companies should try to develop product which global consumer can identify easily from competitors one. Identify a sector where we can see growth and sustain competition. Companies should appoint special taskforce or focused group people to identify the drawbacks of non performing sector and find solutions to that. To be successful organisations should concentrate mainly on quality and pricing structure. Be in constant touch with customer by means of advertising, press releases and make them aware about product specifications and changes if there are any. Try to use both forms of communication verbal and non verbal. Summary From this report on global marketing versus domestic marketing we understand that main objective of any company doing global marketing is to find opportunities. It mainly expands companys reach to global customers. This mainly depends on how the company analyses its strengths and opportunities, optimum usage of resources and approach towards business. Here in this report we saw how Samsung as a global company has wide range of products and constantly keeps on adding them to sustain market place. SWOT analysis helped us to understand about positives and negatives of the company. Important outcome of the report about marketing can be converted in one slogan think globally and act locally. References Aaker, Jennifer, Susan Fournier and S. Adam Brasel. (2003). When Good Brands Do Bad. Paper presented to the Marketing Science Institute Board of Trustees Meeting in Washington, D.C., March 6, 2003. Baker, Malcolm and Greet Sterenberg. (2002). International Branding: How to Resolve the Global-Local Dilemma. Market Leader (Autumn). Johansson, Johny K. and Ilkka A. Ronkainen. (2003). The Esteem of Global Brands. Unpublished draft paper, McDonough School of Business, Georgetown University. Klein, Naomi (2000). No Logo. St, Martins Press. Levitt, Theodore. (1983). The Globalization of Markets. Harvard Business Review. Quelch, John, Douglas Holt and Earl Taylor. (2003). Managing the Transnational Brand: How Global Perceptions Drive Value. Paper presented at the Harvard Business Schools Globalization of Markets Colloquium (May 28-30, 2003). Upshaw, Lynn and Earl Taylor. (2000). The Masterbrand Mandate. John Wiley Sons. McQuarrie, Edward F, The Market Research Toolbox A concise guide for beginners. Bobette Kyle, How Much For Just the Spider? Strategic Website Marketing For Small Budget Business William D. Perreault, E. Jerome McCarthy Basic Marketing A Global Managerial Approach Tata Mcgraw-Hill Publishing Co. Ltd 2006. G Armstrong, P Kotler (2003), Marketing An Introduction, Pearson Education Pte. Ltd. Internet reference: http://www.fao.org/docrep/w5973e/w5973e02.htm http://www.cdf.org/issue_journal/samsungs_lessons_in_design.html Sustainability Report [online] from http://www.samsung.com/uk/aboutsamsung/citizenship/oursustainabilityreports.html Accessed 22nd August 2009 http://ivythesis.typepad.com/term_paper_topics/2009/08/global-marketing-versus-domestic-marketing-a-critical-evaluation.html http://business.lovetoknow.com/wiki/Global_and_Domestic_Marketing Refrences Sustainability Report [online] from http://www.samsung.com/uk/aboutsamsung/citizenship/oursustainabilityreports.html Accessed 12 March 2010.
Friday, October 25, 2019
Hockey, My Life :: essays research papers
The hockey game that I played three years ago for the championship has been one of the greatest events of my life. That game was one of the best achievements that I have reached in my life. Every single chair in the arena was taken. It was difficult to describe the noise; the cheering fans, couches talking to the players, players chatting to each other, etc. The arena was built to muffle the sound of 1000 people, but that afternoon it was like a sponge that couldn't absorb anymore. Being under so many eyes, brought both fear and motivation to me. This game was unlike other games to me. It was not just regular season game, it seemed like a war for me and I wished to get out of this battlefield with victory. I thrilled to accomplish something so phenomenal as to surpass a record, I was stubborn to be someone unique the "Great One" was. I knew everybody would play their best to win the game and trophy. Once the game started I clenched my hand around the hockey stick and told myself that I have to win this game no matter what happens. The hushing sound made by the skates on the ice was very annoying, but I tried to forget about it and put hundred percent efforts o n my game, my "War". When I got the puck bunch of players I began advancing with extraordinary speed, like a jet. The opponent players were rushing toward me like I was their worst enemy. Even though I was fully "armed" but still it was thrilling to stand there get pinched against the glass like a lemon. Bruises from the last game had already made every part of my body sore; getting his by the deadly puck was enough to take of that matter. But I didn't care I wanted to win and touch that trophy. The feeling of having my hand wrapped around the stick gave me more confidence. I was lucky to make some exemplary moves and this caused the crowd to roar. It seemed the stick was a person that I could rely on. The smell of compact air in the arena and the taste of sweat dropping from my nose to my mouth made me feel a little bit dizzy, it gave me the feeling of being in vacuum. There were less than two minutes left to the end of the game and I could see the victory right before my eyes.
Subscribe to:
Posts (Atom)