Monday, January 27, 2020

Advantages And Disadvantages Using Computer Networking Facility Computer Science Essay

Advantages And Disadvantages Using Computer Networking Facility Computer Science Essay The advantages of using computer networking facility within the Smith Solicitor office They can use intranet facility for internal communication in the office They can share resources like printer so that they can use two printers for the whole office. Video Conference can be done which makes it easier for the employer to contact with the employee. And meetings can be done online. File and data sharing can be done which helps them share data between the computers. Folders can be password protected to limit access to unauthorized users. A single internet connection in server computer allows the entire client computer to share internet. The disadvantage of using computer networking facility within the Smith Solicitor office Skilled IT administrator should be hired for maintenance. Training should be given to the employer and employee to use the computer which in network. Proper network security should be given to the server computer. Network maintenance should be done time to time. Network Installation charges would be expensive. Networking Component like router, switch and cable would be expensive to buy.   All the computers in an office building might become completely useless if a single network component fails.   If a single computer is virus infected then the entire computer in network may soon get affected. Evaluate the various costs, performance, security and utility values associated with the installation of your network design for Smith Solicitor. (P2) The various cost, performance, security and utility values associated with the installation of the network design for Smith Solicitor Server Computer Brand Name: HP Pro Liant DL380 G7 Rack Server The HP Pro Liant DL380 G7 Server continues to deliver on its heritage of engineering excellence with increased flexibility and performance, enterprise-class uptime and HP Insight Control manageability, 2 sockets Intel ® Xeon ® performance, and 2U density for a variety of applications. Features Intel ® Xeon ® E5620 (4 core, 2.40 GHz, 12MB L3, 80W) 6GB PC3-10600R (DDR3-1333) Registered DIMMs Rack-mountable 3 years warranty Specifications Product Description HP Pro Liant DL380 G7 Processor Intel ® Xeon ® E5620 (4 core, 2.40 GHz, 12MB L3, 80W) Form Factor Rack-mountable 2U Cache Memory 12 MB L3 Chipset Intel ® 5520 Chipset Hard Drive None Networking (2) 1GbE NC382i Multifunction 2 Ports RAM 6GB PC3-10600R (DDR3-1333) Registered DIMMs Storage Controller (1) Smart Array P410i/256MB Graphics Controller ATI ES1000 Monitor HP *Windows server 2003 will be installed as an operating system in server computer as it is user friendly. It has different security features. (1) Client Computer HP Pavilion Elite HPE-490uk Designed for computing tasks in equal good measure, the HP  Pavilion Elite HPE-490uk  desktop PC is powered by the potent quad-core Intel ® Coreà ¢Ã¢â‚¬Å¾Ã‚ ¢ i7-870 Processor. General Information Processor Intel ® Coreà ¢Ã¢â‚¬Å¾Ã‚ ¢ i7-870 Processor 2.93 GHz (up to 3.6GHz with turbo Boost) 8 MB Smart Cache RAM 8GB installed RAM 4 DIMM slots maximum 16GB supported memory Hard Drive 1.5 TB SATA 3G Hard Disk Drive (5400 rpm) USB 10 x USB 2.0 ports Memory Card Reader 15-in-1 memory card reader Accessories Included Keyboard, mouse, power cord, documentation Windows XP will be installed in this client computer as its users friendly. It has got option like plug and play. Its got facilities like  fast user switching which affects applications that access hardware or that can only tolerate one instance of their application running on a machine at any one time. We can also create multiple users and protect the users putting the password. Networking and communication features are also very good in windows xp. So Windows xp would be the most suitable and appropriate as a client computer. (2) Connectivity Device The Network Interface card (NIC) The hub The switch The bridge  Ã‚   Transceivers Wireless access points The router  Ã‚   The gateway Cable (UTP cat 5) RJ45 Cost: The server computer and client computer are as required by The Smith Solicitor Office. Its very affordable and the components are very good. The total price of the entire computer would be about  £16 thousand. Security: The security features of windows 2003 are as listed below Authentication: Most basic level is requiring a user id and password to log on to some system. Access control: Access control is used to secure resources such as files, folders, and printers. Encryption: Confidential files can be encrypted using the Encrypting File System (EFS) for local files stored on NTFS volumes Security policies: Security policies control a range of security settings. The security features of windows XP are as listed below Firewall: Automatic updates: Remote Assistance / Remote Desktop Local Security Policy Justification: Overall selected hardware component are suitable for the selected Operating system and the software and hardware are at affordable price. Provide an overview of a network operating system (NOS) and illustrate how NOS works with in computer network. (P3) Network Operating System (NOS) helps the server computer to control Client computer and distribute the function to the entire client computer. Therefore it helps to manage the computers which are connected in the network. Features of Network Operating System It has a function to allow multiple users to access shared resource at same time. It provides file, print, web services, back-up services. NOS distributes the function to all the computer in network It helps to manage multiple user and support for logon and logoff, remote access; system management, administration tools Client systems contain specialized software that allows them to request shared resources that are controlled by server systems responding to a client request. NOS supports multiple user accounts at the same time and enables access to shared resources by multiple clients at same time. It has security features like authentication, authorization, logon restrictions and access control I suggest windows operating system for smith solicitor office because it is commonly used on computers and currently, the most widely used version of the Windows family is  WINDOWS XP for client computer and WINDOWS SERVER 2003  for servers. It has features listed below Security Windows provide frequently updated security features such as firewalls, pop-up blockers, antivirus and antispyware software and more. It has additional security and administrator tools for server. Networking These OS offer administration tools and security for computer networking. Ease of Use Windows OS are straightforward and user friendly. Technical Help/Support These OS performs numerous functions, above average support is needed. Generally, Microsoft offers more support to its customers online  and also self-guided support. Design a LAN for a Smith Solicitor or assess an existing network (if any) for fitness of purpose. (P4) [Learner needs to design a LAN on the paper for their LAN selection.] last.jpg Identify the various parts (software and hardware) of a network system for Smith Solicitor and relates it to the 7- layered model. (P5) The various parts of a network system for smith solicitor which is related with 7 layeres model are Physical Layer:  This layer explains the physical properties of the various communications media and coordinates the function required to transmit Example: It explains the size of Ethernet coaxial cable, layout of pins. The physical layer uses hubs and repeaters. Data Link Layer: This layer explains the logical organization of data bits transmitted on a particular medium. Example: this layer gives addressing and checks summing of Ethernet packets. Network Layer: This layer helps to describe the exchanges of packets between any two nodes in a network. Ex: It defines the addressing and routing structure of the Internet. Transport Layer: In transport layer it describes the class, quality and type of the data delivered. This layer makes sure if and how retransmissions will be used to ensure data delivery.   Session Layer:   In this layer the group of data sequences larger than the packets handled by lower layers. So it is handles synchronization process. Example: It shows the details of request and reply packets are paired in a remote procedure call.   Presentation Layer: This layer works to translate, encrypt and compress data. Ex: this layer describes how floating point numbers can be exchanged within hosts with different math formats Application Layer: This layer gives services to the user by allowing the access to network resources Ex: this layer would implement file system operations Differentiate between different kinds of network, network topologies and network operating systems. (P6) [Discuss different network topologies] The different kinds of network are A  local area network also knows as LAN  is a kind of network where the networked computers are in short distance only. Example a network within a building of school. LANs Usually owned, controlled, and managed by a single person or organization. They use Token ring or Ethernet technology Metropolitan area network also known as MAN is a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. Example it is commonly owned by a single body like as a government body or large company. Wide area network also known as WAN is a geographically single collection of LANs. It generally covers wide area of computer networks. A router connects different LAN to WAN. For example- mostly WANs (like the Internet) arent owned by any organization or group but it works under the joint or distributive ownership and management. The different types of network topologies are: Star topology and tree topology All devices connect to a central device, called hub. All data transferred from one computer to another passes through hub Popular in LAN because its inexpensive and easy to install. Whereas tree topology is the extended form of star topology which is used in large networks .This kind of network significally reduces the traffic on wires by sending packets only to the wires of the destination host Ring topology In this kind of topology cables are formed in closed ring or a loop form where the devices are arranged along the ring. Data communication is d one in this topology by device to device around entire ring in one direction only but if we use dual ring then communication can be done by both direction Mainly this topology is used in LAN network but it is also used in WAN network. Mesh topology In this kind of topology all computer are connected to each other so that theres a fault tolerance in this kind of topology. It is expensive as well as difficult to create this type of topology. Here all the nodes are connected to each other and forms complete network. This kind of network topology is mostly use in financial sector. 3.1 Set up a software network environment, for some departments in a Smith Solicitor organization. (P7) [Configure Active directory] To configure an active directory for smith solicitor organization following process in taken. Click start and type dcpromo and enter. Then a dialogue box will appear. Then we need to press next. After that we will see a domain control type wizard where we need to select the domain controller for a new domain and select next option. Then we need to select the domain in new forest and press next as show in picture below. 4.png After that on the  New Domain Name  page, in the  Full DNS name for new domain  box, we need to give some domain name .For example we can give domain name like SmithSolicitiorFirm.com. After that we need to give name for NetBIOS domain name and click next where we get to seelect the location where we would like to store and save the database and log files. On the  Shared System Volume  page, accept the default in the  Folder location  box, and then click  next. On the  DNS Registration Diagnostics  page, click  Install and configure the DNS server on this computer and set this computer to use this DNS server as its preferred DNS Server, and then click  next as shown in the picture below. C:UsersjaikishanshresthaDesktop9.png On the  Permissions  page, click  Permissions compatible only with Windows  2000 or Windows Server  2003 operating systems, and then click  next. After that on the  Directory Services Restore Mode Administrator Password  page, we need to enter a password in the  Restore Mode Password  box and again retype the password to confirm it in the  Confirm password  box, and then click  next. Finally in last we just need to confirm that the given information are correct and click next  and When prompted to restart the computer, click  Restart now. This is the successful configuration of active directory for smith solicitors server computer. 3.2 Install a piece of network software on to a server to be used by different selected users in a created group on Smith Solicitor Network.(P8) [configure print server] We can configure a print server in smith solicitor network by the following process given below. Installation process: Firstly connect the printer to the computer .Then the printer will be detected automatically. After that we need to install driver which we normally get with printer. Else we can do it manually by the following process as shown below. Click on Start > Settings > Control Panel > Printer and Faxes. Then Click on the File Menu > Add printer > Next > Local Printer attached to this computer.  After that it Checks automatically detect and Install My Plug and Play Printer. Then Click Next. After that a wizard will automatically detect any attached printer and install the driver for it. If the system doesnt find the driver then it will be prompted to provide the drivers location. After successfully installing the printer driver, it will show new printer name in the Printer and Faxes in the control panel. Server Configurations: If the printer needs to be shared by a server computer, firstly we need to click the printer name>properties>sharing>share this printer. Then we need to provide name for the shared printer which will be used by client computer on the network. We can also set the colour management, priorities, printing preferences, font s in the properties tab of the printer. Client Computer Configuration: To setup printer at the client computer we can just give the command \computernameprintername (printer name is the shared name of the printer which we create while configuring server) 3.3 Illustrate how you configure user workstations on the network? (P9) [Steps of user configuration on Active directory] To configure user workstation on the network firstly we need to have one active directory domain, where we need to create a user account in that domain to use as an administrator account. Then after adding the user to the exact security group we can use that account to add computer to domain. To configure user on active directory following process should be completed. C:UsersjaikishanshresthaDesktopAdd new user in Exchange 2003.PNG Firstly click start and then point the cursor towards administrator Tool. Then Click Active Directory Users and Computers  to start the Active Directory Users and Computers console. After that we need to click the domain name that had been created, and then expand the contents. Where we need to right- click Users>New>User Type the first name, last name, and user logon name of the new user, and then click  Next. Where we get other wizard to type a password and confirm it by typing again and click the check box as required by user. Then click Next .After that just check the details and enter to Finish. Finally a new user will be created under the active directory. In case of adding a computer to the domain, following the steps Log on to the computer that needs to be added to the domain. Then right click on MY Computer>Properties>Computer Name Tab>Click change. In the computer Name change dialogue box, click Domain under member of and type the domain name. After that click OK.When you are prompted, type the user name and password of the account that you previously created, and then click  OK. Then a welcome message appears in a dialogue box where we need to click OK and restart. 4.1 Write a report on the rights and responsibilities of the network manager and the network user for Smith Solicitor (P10) [Discuss role of Network admin- user rights, sharing etc. and network user password, maintain file etc.] Network administrator need to setup and configure all the devices, hardware, software, connection between the computers. They should be able to add the user and delete the user as the requirement of the company or manage the password and access control as the requirement and ensure that there is a proper security in the network to protect it from hackers and viruses. They are deeply involved in making sure that the software are updated and applications, and monitoring the performance of the network, checking for security breaches, poor data management practices and more. So scheduled check up should be done. Administrator should be able to manage user account such as file access privileges and passwords. Administrator should also train user to utilize the networks resources and also train users to work under the server network environment. Administrators keep records of all users problems and errors as well as the steps taken to solve the problems. This information is used to help solve future problems. Administrators also control user access to the network. The administrator must also create a firewall-a set of security measures designed to make sure that no one can gain unauthorized access to the system. Administrator should use Active directory for centralized management and manage user environment. Admin should respond to the needs and question of clients concerning their access to resources and create backup in different ways to recover any lost data. They are responsible to manage, assign and maintain the list of network addresses. 4.2 Apply control mechanisms in a Smith Solicitor network for managing users. (P11) [Discuss group policy, user authentication, authorization etc.] Control in a smith solicitor network for managing users can be done by using centralized management system in active directory. Active Directory enables the administrator to centrally manage resources and to easily find the information location. It also enables to group the users according to the users limitation because user group policy helps to makes different policy for the user by the administrator. Active directory user authorization secures resources from the unauthorized user and unauthorized access. Managing Authorization and Access Control Published: November 03, 2005 The Microsoft Windows XP Professional operating system includes a number of features that you can use to protect selected files, applications, and other resources from unauthorized use. These features, which include access control lists, security groups, and Group Policy, along with the tools that allow you to configure and manage these features, provide a powerful yet flexible access control infrastructure for your local resources and network. Understanding what these features are, why they are necessary, and how they function will help you to manage rights and permissions on network and local resources more effectively. Security principal In Windows XP Professional, any entity that can be authenticated. A user, group, computer, or service can be a security principal. Security principals have accounts. Local accounts are managed by the Local Security Accounts Manager (SAM) on the computer. If the account is in a Microsoft Windows 2000 or Windows Serverà ¢Ã¢â‚¬Å¾Ã‚ ¢ 2003 domain, it is managed by Active Directory. If the account is in a Microsoft Windows NT version 4.0 domain, it is managed by a SAM database on the primary domain controller. Inheritance A mechanism for propagating access control information down through a tree of objects. In Microsoft Windows NT, an object (such as a file) inherits access control information from its parent object (such as a folder) only when the object is first created. In Windows XP Professional, objects inherit access control information not only when they are created, but also when the parent objects access control list changes. Owner The only security principal who has an inherent right to allow or deny permission to access an object. An objects owner can give another security principal permission to take ownership. By default, the built-in Administrators group on a computer is assigned a user right that allows this group to take ownership of all objects on the computer. Security groups Groups that can be used to organize users and domain objects, thus simplifying administration. Security groups allow you to assign the same security permissions to a large numbers of users, such as employees in a single department or in a single location, ensuring that security permissions are consistent across all members of a group. Security descriptor A data structure containing the security information associated with a securable object. A security descriptor identifies an objects owner by SID. If permissions are configured for the object, its security descriptor contains a discretionary access control list (DACL) with SIDs for the users and groups that are allowed or denied access. If auditing is configured for the object, its security descriptor also contains a system access control list (SACL) that controls how the security subsystem audits attempts to access the object. Access control list (ACL) An ordered list of access control entries (ACEs) that define the permissions that apply to an object and its properties. Each ACE identifies a security principal and specifies a set of access rights allowed, denied, or audited for that security principal. Security settings Security configuration settings that can be applied to individual computers. These settings can be configured locally on the computer by using the Local Security Policy administration tool, the Microsoft Management Console (MMC) Security Configuration and Analysis snap-in, or, if the computer is a member of an Active Directory domain, through the Security Settings extension to Group Policy. Auditing of system events You can use the auditing feature to detect attempts to circumvent protections on resources or to create an audit trail of administrative actions on the system. For example, you can audit failed attempts to open a file. You can also set security policy so that failed logon attempts are recorded in the security event log. If another administrator changes the auditing policy so that failed logon attempts are no longer audited, the log can record this event as well. In an Active Directory environment, you can use Group Policy to centrally control who is allowed to manage security logs on computers joined to a domain. user or group is stored as part of an ACE in a DACL that is part of the objects security descriptor. Rights and Permissions Access control involves the configuration of rights and permissions, which apply to both the objects on the local computer or network and the potential users (including individuals, computers, and services) of those objects. A  right  is authorization to perform an operation. From an administrators point of view, there are two types of rights: privileges and logon rights. In Windows XP Professional, only one user right is inherent-the right to allow or deny access to resources that you own. All other user rights must be granted, which means that they can also be withdrawn. A  permission  is authorization to perform an operation on a specific object, such as opening a file. Permissions are granted by owners. If you own an object, you can grant any user or security group permission to do whatever you are authorized to do with it. When permission to perform an operation is not explicitly granted, it is implicitly denied. For example, if Alice allows the Marketing group, and only the Marketing group, permission to read her file, users who are not members of the Marketing group are implicitly denied access. The operating system will not allow users who are not members of the Marketing group to read the file. Permissions can also be explicitly denied. For example, Alice might not want Bob to be able to read her file, even though he is a member of the Marketing group. She can exclude Bob by explicitly denying him permission to read the file. In fact, this is exactly how explicit denials are best used-to exclude a subset (such as Bob) from a larger group (such as Marketing) that has been given permission to do something. Each permission that an objects owner grants to a particular user or group is stored as part of an ACE in a DACL that is part of the objects security descriptor. User-Based Authorization Every application that a user starts runs in the security context of that user. When a user logs on, an access token is created. The access token contains key security-related information, including the users SID, the SIDs of the groups to which the user belongs, and other information about the users security context. This access token is then attached to every process that the user runs during that logon session. An application runs as a process with threads of execution. When an application performs an operation on a users behalf, one of the threads performs the operation. For example, when Alice opens a Word document, Microsoft Word, and not Alice, actually opens the file. More precisely, one of the threads of execution performs the operation. For a thread to gain access to an object such as a file, it must identify itself to the operating systems security subsystem. Threads and applications do not have a security identity, so they must borrow one from a security principal, such as Alice. When Alice starts an application, it runs as a process within her logon session. When one of the applications threads needs to open a file, the thread identifies itself as Alices agent by presenting her access token. Alice is therefore ultimately responsible for anything that the thread does to the file or system on her behalf. Before allowing the thread of execution to proceed, the operating system performs an access check to determine whether the security principal associated with the thread has the degree of access that the thread has requested. This access check involves the following steps: The security subsystem checks the file objects DACL, looking for ACEs that apply to the user and group SIDs referenced in the threads access token. If a DACL does not exist, access is granted. Otherwise, the security subsystem steps through the DACL until it finds any ACEs that either allow or deny access to the user or one of the users groups. If a deny is found at the user or group level, the access is denied. If the security subsystem comes to the end of the DACL and the threads desired access is still not explicitly allowed or denied, the security subsystem denies access to the object. Therefore, if a DACL exists but is empty, access is by definition denied. At the conclusion of this process, access is either allowed and the file is opened or access is denied, in which case the file remains closed and an Access Denied message is generated. Creating and deleting user accounts and defining and using security groups are important security tasks. Defining the security restrictions or permissions that might apply to different groups of users and resources in your network will help to simplify the implementation and management of the permissions and restrictions in your organization. For example, you can create a Printer Operators group and give it precisely delineated administrative control over a finite group of printers. For you to effectively manage security groups in your organization, you need to be familiar with the relationship between accounts, security groups, and built-in security principals. It is also important for you to become familiar with the techniques and tools available for managing group membership. Built-in security principals apply to any account that is using the computer in a specified way. Built-in security principals allow you to configure security based on the manner in which a resource is being accessed n increasing number of Windows XP Professional-based systems are connected directly to the Internet and participate in home or small business networks rather than in domains. To simplify the sharing and security model used in these nondomain environments, network logons performed against unjoined Windows XP Professional-based computers are automatically mapped to the Guest account by default. This simplifies the sharing of resources in home or small business networks by eliminating the need to synchronize user names and passwords across all computers in the network. Authenticating users logging on to the network as Guest can provide an additional measure of security for computers connected to the Internet by eliminating the ability to access the computer remotely by using administrative credentials. Forcing network logons to authenticate as Guest does not affect the following: Interactive logons. In addition to console logons, this also includes remote access sessions using Terminal Services or Telnet, which are essentially remote occurrences of interactive logon sessions. Computers that are joined to a domain. This is not the default for Windows XP Professional-based computers that are joined to a domain because the domain provides single sign-on capabilities for all computers that are in the domain. Outbound connections. The authentication and access control settings of the computer that you are attempting to access govern outbound connections. 4.3 Discuss how you control printer queues and other forms of resource usage in the Smith Solicitor network. (P12) Controlling in printer queues in smith solicitor can be done by changing the printer job setting by setting a priority and to notify the person when the print is done. As well as pause, cancel or resume can be done. To manage print queue firstly, we need to go to st

Saturday, January 18, 2020

Walmart’s Key HR Functions Underperforming

Introduction The success of any organization depends on its strategic asset, the human capital. As pointed out by Lawler (1996), organization’s competitive advantage comes from its human capital. Efficient management of this resource can bring significant benefits to the company. It should be remembered that motivation is the epicenter of performance and an important factor ensuring the success of a company. Improving workplace productivity however remains a major challenge in most companies. In this regard, this study explores the human resource management approach at Wal-Mart. It identifies the ways in which two HR functions (employee motivation and employee performance practices) are underperforming. This includes a brief account of how the functions operate within the organization, how they are applied and what the outcomes for the business are given that they are underperforming. The paper evaluates why these particular functions are considered to be underperforming using Herzbergâ₠¬â„¢s motivator Hygiene Theory. Further the paper makes some recommendations for improvement of these HRM practices and the benefits to the company. What is human resource management? Human resource management encompasses all activities associated with management of the human capital and in ways towards achieving the corporate goal or objective. In any organization, the human resource department plays a crucial role. Not only are HR managers required to recruit and train employees, but they also have the obligation of motivating and engaging the workforce. Understanding what motivates the employee and ensuring good employee employment practices is key for talent retention and performance (Lockwood et al. 2010). Regardless of the economic environment, it is imperative for companies to create an engaged and motivated workforce. Underperformance in the workplace has recently been a major concern in Wal-Mart stores. According to a new research report by Wolfe research, an equities research firm, Wal-Mart has been underperforming over the past years. The firm lowered Wal-Mart from a â€Å"market perform† rating to an â€Å"underperform† rating (Covert, 20 14). Failure by Wal-Mart has been attributed to their poor employment practices especially low wages and lack of rewards. Whereas Wal-Mart may not be the only big store chain criticized for its poor employment practices and policies, it has come to the spotlight owing to its aggressive policies and low cost strategy which undermines the effort made by employees. Just last year, a lawsuit was filed against Wal-Mart by the international Labour Rights Fund for requiring overtime, denying minimum wage and punishing union activity (Covert 2012). This is clearly a violation of worker’s rights. Wal-Mart which was initially a corporate fortress seems to be headed to a downfall. Even its operations in the US indicate the possibility of a failure in the giant retailer. More recently, Wal-Mart warned its investors that its comparable store sales may be slightly negative after the third quarter. This is also evident in the huge layoff of 2300 workers at Sam’s club, one of its stores. The layoff was attributed to their poor performance. Whereas Wal-Mart still remains the corporate fortress in the retail sector due to its massive size, its underperformance in the US and emerging markets indicate the possibility of a failure in the near future. Walmart’s bad business practices Wal-Mart has on several accounts been criticized for poor wages. Why should employees suffer in one of the giant retail stores that make billions of profit annuallyWal-Mart is ranked among the best 100 corporations by Forbes magazine yet most of its employees take on average less than $250 a week. Full-time employees are paid between $6 and $7.50 an hour. A further a third of the employees who are part-time are limited to working up to 28 hours a week and are not eligible for benefits. Such pay scale places them and their families below the poverty line. The lack of rewards demotivates and discourages them from performing well. Perhaps Wal-Marts bad business practices are more evident with the Rana Plaza tragedy which led to the loss of over 1000 lives. The tragedy exposed some of the profound flaws in the industry. Rana Plaza produced private garments for some of the giant retailers including Wal-Mart. Evidence provided by the Bangladesh center for Worker Solidarity showed that Wal- Mart had been producing its garments in Ether Tex factory situated on the 5th floor of the building (Steven 2013). Some documents were found in the rubble detailing purchase orders for certain garments which were to be delivered to Wal-Mart. Further, at the time of the tragedy, Wal-Mart was already listed in Ether Tex’s website as one of the main customer. Although Wal-Mart denied knowledge of their operations at the factory building, it announced its plans to put in place new safety measures at some of their factories in Bangladesh. The corporate fortress, however, promised to stop production if urgent safety problems were uncovered at some of its factories. The company further assured the Bangladeshi government of their support and commitment towards improving workplace safety. But the company stopped short of committing to these improvements and distanced itself from the Rana Plaza tragedy. This is a clear example of bad business practice. Why these particular functions are considered to be underperforming Last year, Wal-Mart reported $11 billion in net income yet it has not been able to remedy some of its questionable workplace practices. Wal-Mart has been filed in over 5,000 lawsuits for poor employment practices such as inadequate health care, wage law violations, worker exploitation and their anti-union retailer stance. Wal-Mart anti-union stance can be seen in their recent threat to close one of its stores in Quebec after workers successfully unionized. Citing ‘economic reasons’; Wal-Mart announced their plans on shutting the store. However, this argument was rejected by Quebec’s labor relations and Wal-Mart’s firings found illegal. Further, the move to extend operations to overseas markets including setting up factories in emerging markets such as Bangladesh and China was driven by the desire to take advantage of cheap labour. For example, Wal-Mart pays much less its employees in China compared to those in the US and the UK. A further criticism has been the lack of employment benefits. Part-time employees are limited to working up to 28 hours a week and are not eligible for benefits. While, workers who are eligible for benefits pay way over the odds to get health insurance and other benefits. The company has often come under criticism for not providing employees with affordable access to health care and employees are overburdened. For example, in 1999, 36% of the total costs were paid by the employees. In 2001, there was a 42% rise in employee burden. The health of its employees has been deteriorating at a faster rate. According to the company’s internal memo discovered by New York Times, Wal-Mart workers were sicker compared to the national population. This begs the question: Why can’t such a giant corporation provide its workers medical retirement benefits given the huge profits that they makeThis question was once raised by one of Wal-Mart’s managers only to be fired by the CEO and reasons of disloyalty cit ed as the reason for being quitted. (Jordan 2008). As Michael Porter (1980) once pointed out that a company would rely on three basic competitive strategies to maintain their edge in the market: differentiation, cost leadership, and focus strategy. Wal-Mart has obviously taken the cost-leadership strategy by reducing the cost of recruitment, providing low pay, no rewards, requiring overtime, and cheap children labors. It currently faces a barrage of lawsuits for extensive violations of labour laws. Wal-Mart also faces law suits for extensive violations of state regulations that require time for breaks and meals. In some instances, minors are forced to work late for the performance appraising. Outcomes for business Wal-Mart may be headed for a downfall. Its customer service is already low and their low-cost strategy has led to many cut offs of employees. Since recession, Wal-Mart has been cutting down on their staff. Without enough manpower for their retail operations and with workers on site underpaid, its merchandize remains stacked on pallets in warehouses instead of the shelves where customers can reach them. What then is the value of offering lower prices if the products are not accessible to the customers? Further, the check-out lines are painfully long and there seems to be a decline in the overall customer shopping experience. Customer shopping experience has been deteriorating due to the longer checkout lines, disorganization and less staff help. Last year, the giant retailer was placed last among in the American Customer Satisfaction Index, a six year in a row in which Wal-Mart has taken the last spot (Ungar 2013). Lessons must be learnt from the experience of the other low end retail ers. McDonald’s earnings have fallen significantly due to their poor terms of employment. Similarly, Wal-Mart needs to consider the potential upside of their aggressive policies. Despite the poor employment practices, Wal-Mart still remains among the leading retail giants. Its remains ahead of its competitors such as Target and JC penny. However, Wal-Mart faces a threat from Costco, its primary competitor. Costco has been experiencing a fairly healthy 8% growth in annual sales (Ungar 2013). In fact, a significant number of customers are moving to this retailer for their shopping experience. Could this be attributed to the good employment practices at CostcoUnlike Wal-Mart, employees at Costco get a decent living and are paid in excess of the minimum wage. Given the aggressive HR policies employed by Wal-Mart, it begs the question: what then is the role of HR managers in this companySince, as HR professionals, they are required to put in place strategies oriented towards the e mployees. To some point, however, employees seem to be encouraged to think of themselves as ‘servant leaders’. For example, employees are called â€Å"associates† showing that the company values their contribution. Such kinds of HR policies are employed in most of the best performing companies. These policies and practices serve to motivate employees to increase their performance and can aid in developing good corporate culture. However, employees may not feel appreciated if they are paid less than minimum wages and denied rewards and opportunities for professional growth. There seem to be no opportunities for enhancement and professional growth. Wal-Mart does very little training and developments of its human resources and as such, opportunities for enhancement of professions especially for women are limited. In fact, several claims have been filed against Wal-Mart for discriminating against women in terms of employment positions and the lack of opportunities fo r advancement. Improving employee motivation and employment practices at Wal-Mart As HR professionals continue to seek bright, talented and highly engaged workforce, motivational theories can provide insights on how Wal-Mart can improve employee motivation and engagement. Several motivational theories have been suggested including the Expectancy Theory, Maslow’s Hierarchy of Needs theory, Herzberg’s motivator Hygiene Theory, Goal Setting Theory, and Equity theory (Lockwood et al. 2010) Herzberg’s motivator Hygiene Theory is perhaps more applicable to the case of Wal-Mart. The theory suggests that two main factors must be met for employees to become satisfied with work. These are: the hygiene factors and motivator factors. The hygiene factors include meeting the basic needs such as adequate pay, comfortable working environment, effective supervision and good relationships with the core workers. On the other hand, motivation factors include advancement and professional growth, and rewards or opportunities for recognition (lockwood et al. 2010) W al-Mart needs to consider applying the two-factor theory of motivation if they are to improve on the performance of their employees. They need to revamp their policies, increase the salary of their employees, and the safety and security of the employees. Further, they need to consider motivators that are intrinsic to the job which include providing rewards for achievement and increasing their growth opportunities. Pundits, policymakers and activists outraged by the company’s low wages have been calling for protests. According to Robert Reich, a professor at U.C. Berkeley, Walmart’s net income is estimated at $17 billion meaning that they can easily afford to give its workers a small pay-rise (Atner 2013). The Chancellor professor of public policy has in fact urged shoppers to boycott Wal-Mart since they do not want to share even a little bit of their income with their employees (Atner 2013). Conclusion In today’s highly competitive marketplace, motivation of employees and employing the best employment practices is key to success. Underperformance in the workplace has recently been a major concern in Wal-Mart stores. Several lawsuits have been filed against Wal-Mart for violation of worker’s rights including low wages, lack of employment benefits, being required to work overtime and denied to participate in union activity. Bad employment practices are clearly evident in Wal-Mart. This has affects employee productivity as it demoralizes and demotivates them. Wal-Mart needs to consider applying the two-factor theory of motivation if they are to improve on the performance of their employees. Incentives are key to maintaining a motivated workforce and ensuring business success. Appraising and offering hardworking employee with incentives will motivate them to go the extra mile of putting the company first. Employee valuations need to be implemented and growth opportunities made plenty. HR managers at walmart need to understand the benefits of employee motivation and engagement. By sharing their profit, employees will feel appreciated and more passionate about their work. Ultimately, this will result in improved performance and greater customer satisfaction Reference Ciura, B., 2014. Is Wal-Mart’s empire about to failViewed on 29th March 2014. Available from http://www.fool.com/investing/general/2014/02/01/is-wal-marts-empire-about-to-fall.aspx Covert, B., 2014. Walmart’s labor practices backfire. Viewed on 29th March 2014. Available from http://thinkprogress.org/economy/2014/02/10/3271221/walmart-downgraded-understaffing/ Gusdorf, M.L. and Reed, S.M., 2009. The role of mission and values in strategic human resource management. Society for Human Resource Management. Jordan, T., 2014. The good, the bad and Wal-Mart. Workplacefairness Lockwood, N., Anderson, C., Fiester, M. and Samers, K., 2010. ‘Motivation in today’s workplace: the link to performance’. Research Quarterly. The Society for Human Resource Management Rasouli, R., 2013. ‘Modelling the impact of HRM practices on knowledge workers’ job satisfaction and intention to stay: re-examining the Herzberg’s two-factor theory of motivationâ₠¬â„¢. World of Sciences Journal Steven, G., 2013. As firms line up on factories, Wal-Mart plans solo effort. Viewed on 29th March 2013. available from http://www.nytimes.com/2013/05/15/business/six-retailers-join-bangladesh-factory-pact.html?pagewanted=all&_r=0 Thomasson, E., 2014. Bangladesh factory inspections highlight safety risks as anniversary of Rana Plaza tragedy looms. Retail & Marketing. Ungar, R., 2013. Wal-Mart pays workers poorly and sinks while Costco pays workers well and sails-proof that you get what you pay for. {Viewed on 30th March 2014} available fromhttp://www.forbes.com/sites/rickungar/2013/04/17/walmart-pays-workers-poorly-and-sinks-while-costco-pays-workers-well-and-sails-proof-that-you-get-what-you-pay-for/

Friday, January 10, 2020

Communities of Practice: Learning, Meanings, and Identity Essay

Introduction                     A community simply refers to a group of people living together in unity and harmony and coordinating with each other to perform various task and responsibilities which benefit everyone involved. It can also be referred to as a form of social unit which is made of people who share common values, attitudes, interest and even have common goals that they would like to achieve together (Wenger, 72). Self and others simply refers to a situation whereby one strives for their own development while at the same time encouraging others to achieve their own development. It calls for working together not just for ones won benefit but also for the benefit of others. This relates to the principle of a community whereby everyone looks after each other and values the interest of others in addition to their own. The various kinds of communities which exist include, the communities made of people with the same interest or share the same passion, a community of people who try to bring change through their actions, a community of people who are brought together as a result of the geographical location and boundaries they share. Furthermore, there are communities of people who share similar practice or share the same kind of profession, and last but not least there are communities which are brought together as result of the similar external situations or events which affect all of the people involved (Wenger, 72). All these communities can be classified as centralized, de-centralized or even distributed communities. An individual ensures that the common objectives and goals of the whole community are achieved by providing their contribution and playing their role in the community. In addition, an individual shows respect, cooperation and participates actively. The community on the other hand, ensures that an individual achieves personal development, safety, and general well-being in addition to satisfaction. As an individual, I belong to the student body of my school which represents my interests and looks after my welfare as a student. My duties include my active participation in ensuring that I follow the school rules, make annual contributions to the student body and participate in elections when selecting new student leaders. The technological advancements have transformed the understanding of community to that of people who are found on the same social network and can interact without minding each others’ development or interests. Technology has brought virtual communities which only exist through internet connections although they still may share common interests (Chayko, 4). The current understanding of community relates to the interactions on social networks and the physical touch no longer exists. References Chayko, Mary. Portable Communities: The Social Dynamics of Online and Mobile Connectedness. Albany: SUNY Press, 2008. Print. p.4 Wenger, Etienne. Communities of Practice: Learning, Meanings, and Identity. New York: Cambridge University Press, 2007. Print. p.72 Source document

Thursday, January 2, 2020

Ansoff Matrix , Pdf - 2059 Words

Strengths | Weaknesses | Fast decision making | Negative image of the Middle East | Oil money, booming economy | Barren desert, the lack of natural resources | Political neutrality and impartiality | Only 20% of UAE nationals | Unique beauty, hotels and attractions | The lack of fundamental infrastructure: transportation, water | Luxury experience includes relaxing beaches and invigorating sport and exploration opportunities | Luxuries might appeal too small a segment | Safe environment | | | | Opportunities | Threats | Increasing oil price | Strong competitors: within the region: Abu Dhabi, Qatar; outside of region: Singapore, Hong Kong | Increase job opportunities for immigrants†¦show more content†¦ADCCI provides a wide range of services, such as setting up the Sheikh Khalifa Fund to provide technical and financial support for small-medium enterprises set up by the youth, they also organize trade fairs, sending delegations abroad to promote Abu Dhabi a s a commercial center and initiating training programs that train nationals to join the private sector. The strong banking system increases presence of venture capital and government funding provide substantial financial resources to foreign and local entrepreneurs. The most crucial factor is raising capital for a new foreign entrepreneur is to establish good relationships with local guarantors or other established foreign entrepreneurs. The best thing to do here is to get a network of contacts essential for successful business in the system Political risk factors Four types of political risk factors must be examined in assessing the climate for investment in any given country. They are: 1. Regime change: A change in key government personnel through normal electoral or authorized political processes, or through illegal means. 2. Political turmoil: General levels of politically inspired violence, including violent strikes, guerrilla action, or civil war 3. Government policy: Decisions with respect to fiscal and monetary policies, tradeShow MoreRelatedMarketing Management - Digi3738 Words   |  15 Pagesthen apply it to a market segment with which you are familiar. Table of Contents 1.0 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ page 3 1.1 Ansoff Matrix 1.2 Advantages of Ansoff Matrix 2.0 DiGi Telecommunications Company Portfolio†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.page 5 2.1 Ownership 2.2 Top 10 Shareholders 3.0 DiGi’s Marketing Strategy (Ansoff) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.page 7 3.1 Market Penetration 3.2 Market Development 3.3 Product Development 3.4 Diversification Read MoreMarketing Management - Digi3738 Words   |  15 Pagesthen apply it to a market segment with which you are familiar. Table of Contents 1.0 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ page 3 1.1 Ansoff Matrix 1.2 Advantages of Ansoff Matrix 2.0 DiGi Telecommunications Company Portfolio†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.page 5 2.1 Ownership 2.2 Top 10 Shareholders 3.0 DiGi’s Marketing Strategy (Ansoff) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.page 7 3.1 Market Penetration 3.2 Market Development 3.3 Product Development 3.4 Diversification Read MoreSamsung Marketing Management2227 Words   |  9 Pagesanalysis and ANSOFF matrix analysis for all its products to check the position of their particular product in the market such that if any drawback is found it can be solved to improve the efficiency. Boston Consulting Group’s Product Portfolio Analysis For any company BCG analysis is very essential as it provides guidance for the resource allocation. The BCG matrix is generally defined as a general management system in a business strategy consulting. The variables of the BCG growth share matrix are theRead MoreAnsoff Matrix3132 Words   |  13 PagesTable of content The executive summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 1. History of Ansoff Matrix.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 2. Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. . 3 3. Model Use and the Applicability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 3.1 Market Penetration†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦........ 5 3.2 Market development†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7 3.3 Product Development†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. .. 7 3.4 Diversification†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦ 9 4. The Advantages†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 12 5. The Risks†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Read MoreCompany Overview of Kingfisher3201 Words   |  13 Pagesand sustainable products. Growth strategy/ Ansoffs matrix The Ansoff Matrix is the most famous work of the Russian-born mathematician which assists managers in looking at their growth in terms of existing or new products or markets (businesscasestudies.com, 2013). Essentially, the matrix helps managers to determine different levels of risk which are inextricably connected with moving their business forward. The first aspect of the Ansoff Matrix is market penetration, which is connected to a companysRead MoreTata Motors Group2026 Words   |  9 Pagestools like SWOT analysis, core competence analysis and key factors for success analysis. The analysis of financial resources of Tata Motors has been undertaken and review of strategic options for Tata Motors have been analyzed using Ansoff and Generic strategies matrix. Analysis of strategic choice and cost reduction and quality improvement recommendations has also been given. 1. Tata Introduction Mission and Vision Tata Motors Limited is an Indian multinational company that is headquarteredRead MoreASDA marketing plan2961 Words   |  12 Pageswriter has covered internal analysis and competitive situation. The company has strong competitors in the home country, like Tesco. In this report, the writer has used different strategic tools and techniques (i.e. SWOT, Porters five forces, Pestle, Ansoff, McKinsey 7s model) to evaluate the current situation and strategy of the organization. Currently, the company has strategy to expand their business in home country as well as to the potential market. They have also focused on improving their supplyRead MoreLaura Ashley: Risk Analysis1800 Words   |  7 Pagesand Malaysian managers may not have the same values. There are cultural differences reflecting both the home country and organizational culture as well. Issues The retail strategy issue relates to some of the issues mentioned above. The Ansoff growth matrix highlights a number of different strategies that can help a retail operation grow. These are market penetration, market development, product development, and diversification (Riley, 2012). Of these, Laura Ashley is pursuing market developmentRead MoreCoca-Cola Product Management2578 Words   |  11 Pageshas or should employ to strengthen their market position.’ Jacob Parkinson N0444654 Content: | | * Product Management? | 2 | * ‘Coca-Cola’ | 3 | * Introduction | 3 | * New Product Development | 3 | * Ansoff Matrix | 6 | * Marketing Mix and 4 P’s | 7 | * Just-In-Time | 9 | * Conclusion | 10 | * References and Further Reading | 11 | Product Management? Product management is the development, marketing and sale of a product orRead MoreStrategy as a Planned Process Essay1885 Words   |  8 PagesSchool(1960s), Ansoff (1965) and consulting group Mc Kinsey and BCG have successfully develop the approach and thus form different matrices to enhance analysis and thus adopt to the courses of action. Harvard Business School (1960) formed the SWOT analysis, examining the internal factors of strength and weakness and the external factors of opportunity and threat. Ansoff (1965) also developed the SWOT analysis, by emphasizing the distinctive competences in the long term, Ansoffs Product/Market matrix was