Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What was the objective of the exercise?

The objective of the exercise was to create user accounts on the machine. User accounts allow the machine to be used by multiple persons. Each user on the machine will have a different customized and personalized environment on the same machine. Each user will have personalized directories for file operations as well. The files and directories of a particular user will be restricted to be accessed by any other user of the machine. So, the user account will provide with a fully personalized environment to share the same machine with other users. Access restrictions will be applied to the user accounts to secure the critical information stored on the machine. Each user will have certain limitations as well to access the environment.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise, the outcome of the exercise user accounts was made on the machine using the command line shell. Each user account has specific properties. To ensure access to the personalized environment, particular restrictions were implemented on the authorization process at boot time. Each user of the machine was password protected. Password must be changed by the user of the particular account within ninety days of account creations. The second restriction on the user is that the password must be used for thirty days or in other words, the password cannot be changed before thirty days.

Question 3: Explain your experience with exercise?

It was useful and exciting to create user accounts on the same machine for multiple users. So, that they can carry out file operations in Linux systems. The exercise was completed without any fatal errors, and the outcome was observed by performing the instructed operations using the commands.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What was the objective of the exercise?

The objective of the exercise was to groups of the users. Grouping users allow system administrators to manage permissions for certain groups. Such as many organizations may not define and create restricted user groups having specified permissions only. Members of the groups may have special permissions to create and remove directories within the group and to interact with the files in different directories of the group. Members of a particular group can also be permitted to interact with the members of the other group under special permissions form the group owner. Member of one group can be the owner of the other group as well. Member can be added to specific groups with a certain amount of permission to perform file operations either within the group or out of the group directories.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise, the two groups namely account and sales were formed. The groups then assigned members. Members can be added to any specific group using the shell commands. Owner of the group can be a member of the same group. On the other hand, the member of one group can be the owner of the other group as well as compared to the ownership of the same group. Two groups were created and equipped with some members as well as the outcome of the exercise.

Question 3: Explain your experience with exercise?

It was useful and interesting to create groups of users. So, that they can carry out file operations in Linux systems. The exercise was completed without any fatal errors, and the outcome was observed by performing the instructed operations using the commands.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What was the objective of the exercise?

The objective of the exercise was to define basic permission for files in a user directory. Basic permissions including reading, write access to the files stored in a directory. These permissions can be restricted to users of the certain directory or the users of the certain group. During the exercise directories in the specified groups of accounts and sales were created according to the instructions. After simply creating the directories under required user groups, the ownership of the directories was also changed using commands in the root shell. Basic permissions were granted to the users of each directory.

Question 2: What was the outcome of the exercise?

As an outcome to the exercise, the directories under the specified user groups were created, and their ownership was changed as per the instructions of the exercise. The final outcome of the exercise were two directories having basic permissions to perform file operations. However, users of one directory were only restricted to their parent directory for basic file operation permissions. The users of each directory have the read and write permissions in the same directory but no permission in another directory.

Question 3: Explain your experience with exercise?

It was useful and interesting to grant basic permissions to certain users. So, that they can carry out file operations in Linux systems. The exercise was completed without any fatal errors, and the outcome was observed by performing the instructed operations using the commands.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What was the objective of the exercise?

The objective of the exercise was to define special permission for files in a user directory. Special permissions such as removing files from a particular directory can be assigned to specific users of the directory in Linux systems. Most of the time such special permissions are granted to the user of the directory who is the owner of the directory as well. In the lab exercise, special permissions were granted to the user Linda, the owner of the directory as well, by setting the group identity bit and the sticky bit. The exercise contains the practice of creating files and removing them without special permissions. The second part contains the practice of creating the files and removing the files using special permissions of the directory owner such as Linda in this exercise.

Question 2: What was the outcome of the exercise?

As an outcome to the exercise, the files created by the touch command were first deleted by the user of the directory without granting special permissions. During the second task, special permissions were granted to the user Linda, the owner of the directory, by setting the group ID and sticky bit. The files then created and removed by the same user because of special permissions granted to the same user. Otherwise, the user would not be able to remove the files from the directory as the sticky bit restricts the use of such actions.

Question 3: Explain your experience with exercise?

It was useful and interesting to grant special permission to certain users. So, that they can carry out special file operations in Linux systems. The exercise was completed without any fatal errors, and the outcome was observed by performing the instructed operations using the commands.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Name Here

School or Institution Name (University at Place or Town, State)

Question 1: What were the objectives of the exercise?

The objective of the exercise was to control and define the access of files between the two groups namely, sales and accounts. Previously there were complete isolation and restriction on these groups. No group was able to access the files of the other group in any way. In this exercise, access to the directories has been redesigned and implemented. Both the groups now have the read-only access to each other's directory and files. This allows the groups to access each other files for reading purpose.

Question 2: What was the outcome of the exercise?

As an outcome to the exercise both the sales and accounts groups of the users were able to read the files on their customized directories. Sales group was able to read the files of accounts group and vice versa. The permissions granted by the access control list to both the groups were read-only permissions. No other permission was granted to any of the group. Rest of the restrictions by the initial access control list were not modified during this improvement of the design.

Question 3: Explain your experience with exercise?

It was fun to learn and implement access control lists. The exercise was precisely designed to meet the understanding level of the students. I have learned to design and implement access control lists with specific permissions for particular user groups. The experience of performing the lab was smooth. All the tasks were completed without experiencing any fatal error. The objectives of the lab exercise were achieved as well. Particular restrictions and specific access control lists were successfully implemented for each user group using the lab.

Subject: IT

Pages: 1 Words: 300

Lab Report

Lab Report

Nafaa Iguelouzene

School or Institution Name (University at Place or Town, State)

Lab Report

Question 1: What was the objective of the exercise?

In operating systems, there are many services running in the background. Same is the case with Linux based operating systems. Almost all of the programs or system services write to the log files about events. Minimum verbosity of events to be written in the log file can be changed in Linux based systems. Monitoring log files help in identification of the errors or security-related incident investigations. The objective of the exercise was to view the system log file in real time for log entries and to write any user messages in the log file using logger command.

Question 2: What was the outcome of the exercise?

The outcome of the exercise was two terminal windows running side by side allowing the real-time monitoring of log files. Main shell terminal was showing real-time entries as being written by the processes and user shell window opened by the tail command allows the user to write messages in the log file. In user shell window a log message "Hello" was typed and it was written to the log file in real time. Entering the wrong password in root shell generated a failed login attempt entry into the system log file observed by opening the log file into the terminal window.

Question 3: Explain your experience with the exercise?

The exercise was designed to equip students with practical experience of real-time log monitoring. No errors or technical issues were experienced while performing the lab. All the instructions in the exercise are self-explanatory. Appropriate execution of commands as described in the exercise generated desired output instantaneously. The task was completed successfully without encountering any potential issue. Overall the experience of performing the exercise in the lab was exciting.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Nafaa Iguelouzene

School or Institution Name (University at Place or Town, State)

Lab Report

Question 1: What was the objective of the exercise?

Logging is an essential feature of any modern operating system. Especially operating systems targeted for enterprise markets have advanced logging capabilities. Log files can be used to investigate potential hardware failures caused by any particular action or to investigate cybersecurity breaches on the network. The objective of the exercise was to configure custom rules for Apache web server for log file requirements. Apache web server does not use default system log files for log entries. In the lab exercise, a configuration change was introduced in the log configuration of the system to make Apache applications capable of writing events in default system log files.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise Apache web server was made capable of writing log entries into default log files of the system along with a custom log file for hypertext transmission protocol requests. Log entries into customized file were tested by requesting an HTTP resource using the Firefox web browser. Corresponding log entry was created instantly as there was no such resource available on the server. Configuration changes made into the rules of rsyslog file configurator. It was achieved and tested in the lab that the Apache web server started logging into the default system log.

Question 3: Explain your experience with the exercise?

The exercise was designed to equip students with practical experience of enabling custom applications to use default system log file for log entries of the application instead of a separate file. No errors or technical issues were experienced while performing the lab. All the instructions in the exercise are self-explanatory. Appropriate execution of commands as described in the exercise generated desired output instantaneously. The task was completed successfully without encountering any potential issue. Overall the experience of performing the exercise in the lab was very interesting.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Nafaa Iguelouzene

School or Institution Name (University at Place or Town, State)

Lab Report

Question 1: What was the objective of the exercise?

In corporate environments restricting access to certain resources is an important aspect of security. It is achieved by deploying security-enhanced Linux servers also known as SELinux. It allows implementation of security policies to restrict access to certain resources on a server machine. It is more comprehensive than implementing manual access control lists. It allows enforcement of administrator control policies easier. The objective of the exercise was to disable enforce mode of SELinux and rebooting into permissive mode. Then re-enabling the enforce mode of SELinux.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise enforce mode of SELinux server was disabled. Enforce mode blocks access to specific resources as per the access control policies defined by the administrator of the system. The server was rebooted into the permissive mode of the SELinux server. The permissive mode does not restrict access to the protected resources but log any requests made for such resources that would have been blocked in enforce mode. Such logging of events helps system administrators in investigations of security breaches. Finally, enforce mode was re-enabled in SELinux using commands.

Question 3: Explain your experience with the exercise?

The exercise was designed to equip students with practical experience of enabling and disabling of security-enhanced enforce and permissive modes respectively. No errors or technical issues were experienced while performing the lab. All the instructions in the exercise are self-explanatory. Appropriate execution of commands as described in the exercise generated desired output instantaneously. The task was completed successfully without encountering any potential issue. Overall the experience of performing the exercise in the lab was very interesting.

Subject: IT

Pages: 1 Words: 300

Lab Report



Lab Report

Nafaa Iguelouzene

School or Institution Name (University at Place or Town, State)

Lab Report

Question 1: What was the objective of the exercise?

In network environments, local time hosts connected to the network can be synchronized with the network time with reference to pre-defined time zones as well. In Red Hat Enterprise Linux version 7 the default time management tool is deployed using a chrony job. Network time protocol is another handy tool to manage the time on networked hosts that use user datagram protocol to synchronize time on network nodes. The objective of the exercise was to change and manage the time on a Linux system to a particular time zone using the timedatectl command. This command is used to turn on network time protocol and communicate with chronyd process in case of Red Hat Enterprise Linux system version 7.

Question 2: What was the outcome of the exercise?

As an outcome of the exercise system, time and date were changed to a different time zone instead of hardware clocks of the system. Hardware clock shows the hardware time based on system oscillators. It was converted to human readable time and date format and finally, the system time was synchronized to the Europe/Amsterdam time zone using the timedatectl command. The command communicated with network time protocol to provide the administrator with available time zone options.

Question 3: Explain your experience with the exercise?

The exercise was designed to equip students with practical experience of managing time and date on networked computers running Linux based operating systems using network time protocol and timedatectl command. No errors or technical issues were experienced while performing the lab. All the instructions in the exercise are self-explanatory. Appropriate execution of commands as described in the exercise generated desired output instantaneously. The task was completed successfully without encountering any potential issue. Overall the experience of performing the exercise in the lab was very interesting.

Subject: IT

Pages: 1 Words: 300

Libraries And API

Libraries and API

OpenGL Software Library and APIs

OpenGL software library is the standard API for defining different types of graphics. It is an open source software library which is completely free avaible for the users. OpenGL provides users with an APIs for graphical content. It is a simple document that explains a set of instructions and several libraries functions. OpenGL is used for hiding the complexity of interacting with different graphics accelerators. It is also used for hiding different capabilities of graphics hardware. OpenGL provides rendering functions which is used to provide a high level and common interface across different systems (Computer Graphics, 2019, n.p).

Today computer graphics are being used for several purposes. These are not only used in computer games or animated scenes but also being used for performing different type of simulations. OpenGL comes into two different forms which include Microsoft OpenGL and Cosmo OpenGL. Both have different functionality because Microsoft OpenGL is used in windows for the installation software of a graphics card while Cosmo OpenGL is designed for computer systems that dont have dedicated graphics card. OpenGL interface consists of many different functions which are being used to draw complex 3D scenes (Woo, 1999, n.p).

Today OpenGL is rapidly being used in virtual reality and video games as well. It specifies a set of commands and each command directs a drawing action. OpenGL comes with different built in capabilities which can be called with the help APIs. It is hardware independent and also operating system independent. OpenGL allows programmer to efficiently address and take advantage of graphics hardware. It include several high level libraries and applications which provide different graphic functionalites to the users.

Firewalls

Firewalls are used for network security that monitors both incoming and outcoming traffic of a network. It also decides which traffic to allow or block in a network. There are many firewall devices which are being used to monitor traffic of a network. Firewall can be software as well or both hardware and software. There are different types of firewalls which include Proxy firewall, Stateful inspection firewall, Unified threat management firewall, Next Generation firewall, etc (Services, 2019, n.p).

Proxy firewalls are very important because they serves as a gateway from a one network to another. It allows to prevent connections which are outside the network (Services, 2019, n.p). Stateful inspection firewall allows or block traffic in a network based on the protocol or port (Services, 2019, n.p). Unified threat management firewalls typically combines in a loosely coupled way. They also include different services and also platform to manage cloud. UTM firewalls are best for the cloud management (Services, 2019, n.p). Next Generation firewall are used by organizations to block security threats. There are different types of attacks which are popular these days such as malware attacks. Next Generation firewalls are used to block malware attacks and improve the security of the network (Services, 2019, n.p).

Packet filtering firewalls are best for the university network to provide security to the network. These type of firewalls operates where devices that include routers and switches do their work. It allows only the traffic that is authentic to enter into the network. Packet filtering firewalls doesnt route packets. However, they compare each captured packet according to a set of roles or criteria. Packets which are unknown in a network are blocked to enter into a network to control the security of a network. It is most suitable for universities because they need a security like this in a network which only allow authentic traffic to enter into a network and block unknown traffic (Bellovin, 1999, n.p).

Internet of Things

Internet of things is a system of interrelated computing devices, objects, digital machines, etc. It is being rapidly used by organizations these days to work more efficiently. Internet of things (IoT) has been becoming very important for every organization because the rapid increase in the technology (Atzori, n.d, 2788). There are many different types of IoT devices that are being used these days to collect, send and act on data that are necassery for the environment. Smart devices have been become essential in our daily lifes because they have made the life of people easier as they are performing all the human related tasks with the help of IoT.

Internet of Things (IoT) is currently offereing several benefits to people in their daily lives. It has helped people to save their time as well as money and improve their overall performance in the business. IoT has helped in increasing the productivity of the employees and helped managers to make more better business decisions. IoT has allowed organizations to generate more revenue. However, there are several changes that are necassery to computer hardware, operating systems, or networking to support IoT. It is important to have updated operating systems in order to implement IoT devices. Network devices are very important for the implementation of IoT (Da Xu, 2014, pp.2235). If any device fails it can stop the working of all IoT devices connected to a network. It is essential that hardware devices must support connectivity protocol such as Wifi, Bluetooth, Zigbee, etc. So, hardware must be according to the requirement of the environment and should be updated regularly to support IoT devices.

References

Services, P. (2019). What Is a Firewall. online Cisco. Available at HYPERLINK https//www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html https//www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

Bellovin, S.M., 1999. Distributed firewalls.

Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things A survey. Computer networks, 54(15), pp.2787-2805.

Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries A survey. IEEE Transactions on industrial informatics, 10(4), pp.2233-2243.

Computer Graphics. (2019). OpenGL. online Available at HYPERLINK https//graphics.fandom.com/wiki/OpenGL https//graphics.fandom.com/wiki/OpenGL .

Woo, M., Neider, J., Davis, T. and Shreiner, D., 1999. OpenGL programming guide the official guide to learning OpenGL, version 1.2. Addison-Wesley Longman Publishing Co., Inc..

IT PAGE 6

,-nop2

O e

g

j

v

x

y

xtm hOh5hh hZ/ hOhOhOhGhNhhNhehh hih4hhUh(hbq56 hW56h9hbqh8x hDh8xh.nhDh.n6 hDhDh_ hDh.n hDhC -Bop y

dgdO dgd9dgdedgd9

(dagd_

(dagd8x dagd8xdgdDNX 0d0gdm0d0gd_0d0gd dagd9dagdp dagdpdgdWhijr,8yzgouzCEh(@h4rh87hfhhhhW56 h056 hh56he hEPhEPhEPhVhW h-hVh2 h-hVhvhvhh h-hVhhh2hh0h9hW562mnz MNW X yuhO hOhOhChi0JhijhiU hihihjhbq hhhh hEPhEPh hFh-hV0Jh-hVjh-hVU h-hVh-hVhb7h5hhhh hmhmhmheh4rh(@ hhh(@-h( hDh(hL.0JmHnHuhDh(0JjhDh(0JUhA.h_hAjhAU hDh0d0gdmagd.n 5 01hpxm/ w2 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@6666_HmH nH sH tH @@ NormalCJ_HaJmH sH tH DAD Default Paragraph FontRiR Table Normal4 l4a (k (No List 4@4 .nHeader

4 4 .nFooter

.)@. .n Page Number6U@6 -hV Hyperlink BphcRv1R

-hV0Unresolved MentionBphq PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKg theme/theme/theme1.xmlY4O3dHTwbS.,.1UR0aF0tStzQ@o_EG2 @GRU1aN KjVkUDRKQj/dRSxMPsJ54vqWC D3REBUt Qy@.X7

0h @nBVqu 5kPOC Aw0kPo(h5(CVsmY2zwnKDCjKXK P@IYCgxV(ekQtx7xbJ7 oW_ynFido/_1z/Lo_933S,F@)R8elmEv/,qh1ij.uk CZWcK0E8SsdKANM1I/AeQGF@Aeh-QR9C 5

d9 0expJ7t Lc)Ic8ESf@Awr32@7knaWJN1XGVhLZVKbXzsIn .qc7/NZu-eamHm3C .nAr)-NVlkvNs _OuCXmO4msd0npt2ezOrgI(

B8L

4F8JIrVLvVxNNfVYx-,JfVkhPaLfhHHX WQXt,JU,Z BpB)siE4(U.O. xaMBF7xytK-zzF75eo5C9Zc76M2 9B N

1(IzZYrH9pd4n(KgVB,lDAeX)Ly5ot ebW3gp j/gQjZTae9i5j5 fE514g7vnO( ,jV9kvvadVoTAn7jahy@ARhW.GMuO

/e5sZWfPtfkA0zUw@tAm4T2j

hvWwA9 ZNUAwvhv36VPK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-g theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/0 mXX@ @H 0( 0( B S - rune h z 4 7 gowzOXLU)NTZ

0

DN333333evyevyF.,Xc3fTDxC C EPhzViWU4K(z(,A.L.05s123h 4 N687.189/u AcZ(@NAWANBDeHiH MNSySVV-hVW1XZlZZ/pxbVeixmm.nBobq4rQrtsbtw8xzc Jb7OVZjh5OK0v14K l3e_g(CO,b/GlQlnN4a n haXx( 7AfOtmNRlque@vvvv@UnknownGAx Times New Roman5Symbol3. Cx ArialC., @Calibri Light7.@CalibriABCambria Mathq h@tt

.

.x243qHP j2xxe muhammadtehreem Aftab ArshadOh0 H T

ltmuhammadtehreemNormalAftab Arshad58Microsoft Office Word@@@j@I.,D.,@

px

.

Title 8@ _PID_HLINKSA (m(https//graphics.fandom.com/wiki/OpenGLZWRhttps//www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

(),-./012456789@ABERoot Entry FWGData 1TableWordDocument70SummaryInformation(3DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 3 Words: 900

List And Discuss At Least Three Advantages Of Using Internet Technologies In Supply Chain Management.

Using Internet Technologies in Supply Chain Management

[Author’s name]

[Institute’s name]

Using Internet Technologies in Supply Chain Management

Introduction

           The advancement of technology in different forms phenomenally changed the perspective of organizational management and this approach can also be observed in the case of supply chain management. The active involvement of technologies in this area dramatically transformed the conventional patterns of supply chain management. The growing influence of technologies in the sector of supply chain management can also be successfully established by examining the use of internet or web technologies in this context. This paper focuses to list and critically discuss three central advantages of using internet technologies in supply chain management. 

Discussion

           The positive significance of internet technologies in supply chain management can be observed in different areas of operations. The idea of supply chain management is characterized as the systematic planning and management of all the activities that are associated with the forms of sourcing, procurement, adaptation, and logistics. An understanding of the fundamental role of internet technologies revealed the active integration of these technologies in the case of all the activities of supply chain management. The main advantages of internet technologies in supply chain management are listed as:

Direct Transactions

Collaboration

Consumer Orientation

Direct Transactions

           Financial prospects are recognized as necessary aspects to successfully achieve targeted objectives of supply chain management. The positive influence of internet technologies on the area of supply chain management can be explicitly observed in the case of the smooth approach of direct transactions. The risk of improper performance of intermediaries can be reduced by adopting the strategy of the direct transaction through various forms of internet services. The facility of internet technologies made it possible and easy for suppliers to market and sell their products and services to potential consumers ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"QXDiWx2o","properties":{"formattedCitation":"(Auramo, Kauremaa, & Tanskanen, 2004)","plainCitation":"(Auramo, Kauremaa, & Tanskanen, 2004)","noteIndex":0},"citationItems":[{"id":306,"uris":["http://zotero.org/users/local/qLzeF6Hj/items/LLVK6V8H"],"uri":["http://zotero.org/users/local/qLzeF6Hj/items/LLVK6V8H"],"itemData":{"id":306,"type":"article-journal","title":"Benefits of IT in supply chain management–an explorative study of progressive Finnish Companies","container-title":"Department of Industrial Engineering & Management, Helsinki University of Technology","author":[{"family":"Auramo","given":"Jaana"},{"family":"Kauremaa","given":"Jouni"},{"family":"Tanskanen","given":"Kari"}],"issued":{"date-parts":[["2004"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Auramo, Kauremaa, & Tanskanen, 2004). This form of the direct approach of business transaction is useful for suppliers to successfully reach the exact potential market by decreasing or eliminating the improper role of middle mediators by limiting their authority. 

           It is noteworthy to mention that the elimination of mediators’ role eventually simplified the whole procedure of supply chain management by developing direct business interaction between producers and clients. All the information is smoothly transferred from one shareholder to another without facing the challenge of lengthy procedure of information straining through re-sellers. This form of benefit of internet technologies mainly appears in the case of business-to-customer prospects. 

Collaboration

           The improved form of collaboration is another major benefit that can be achieved through the proper use of internet technologies in the context of supply chain management. The facility of active communication due to internet technologies made it possible for all the stakeholders to timely communicate with each other and avoid the factor of ambiguity. Closer integration is one beneficial option to minimize all the complications associated with the practical idea of supply chain management. The successful involvement of the main functions of supply and procurement is an integral condition to ensure the appropriate execution of the entire supply chain management plan. The basic aim of suppliers is to attain a high, anticipated form of sales value when it comes to buying reliable and economic resources ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"OGQHklii","properties":{"formattedCitation":"(Lancioni, Smith, & Schau, 2003)","plainCitation":"(Lancioni, Smith, & Schau, 2003)","noteIndex":0},"citationItems":[{"id":307,"uris":["http://zotero.org/users/local/qLzeF6Hj/items/LE4AS9FP"],"uri":["http://zotero.org/users/local/qLzeF6Hj/items/LE4AS9FP"],"itemData":{"id":307,"type":"article-journal","title":"Strategic Internet application trends in supply chain management","container-title":"Industrial Marketing Management","page":"211-217","volume":"32","issue":"3","author":[{"family":"Lancioni","given":"Richard A."},{"family":"Smith","given":"Michael F."},{"family":"Schau","given":"Hope Jensen"}],"issued":{"date-parts":[["2003"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Lancioni, Smith, & Schau, 2003). The growing involvement of internet technologies is one great option for companies to satisfy potential customers by assuring long-term association due to active communication. 

           The facility of active interaction made it easy for both companies and suppliers to successfully obtain their relevant business objectives. High volume information sharing permits the suppliers to sell their product at a lower cost while the idea of cost reduction also gives benefits to the purchaser as a crucial partner in the entire scenario of supply chain management. The opportunity of the internet made the interactive connection strong between all supply chain management partners. This target can mainly be achieved through the successful use of Web technologies that permits the SCM networking domain to develop and successfully utilize new competencies of the business. 

Consumer Orientation

           Consumer orientation is another major advantage that can be attained by the successful application of internet technologies in the case of supply chain management. Direct communication between producers and customers through web technologies is one great opportunity for business companies to construct strong and long-term business associations with customers by identifying their product or service preferences. The idea of consumer orientation is characterized as one major business objective in the context of the functioning of supply chain management. 

           The creation of a successful form of consumer orientation is the ultimate task within the practical domain of supply chain management. This specific aim can be better achieved through the active intervention of different forms of internet technologies ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Rn235das","properties":{"formattedCitation":"(Vakharia, 2002)","plainCitation":"(Vakharia, 2002)","noteIndex":0},"citationItems":[{"id":308,"uris":["http://zotero.org/users/local/qLzeF6Hj/items/J9TMMZW7"],"uri":["http://zotero.org/users/local/qLzeF6Hj/items/J9TMMZW7"],"itemData":{"id":308,"type":"article-journal","title":"E‐business and supply chain management","container-title":"Decision Sciences","page":"495-504","volume":"33","issue":"4","author":[{"family":"Vakharia","given":"Asoo J."}],"issued":{"date-parts":[["2002"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Vakharia, 2002). In a traditional manner of supply chain management, it is difficult for companies to obtain a successful form of customer focus. The advancement of internet technologies made it easy for companies to deliver their idea of selling and marketing to the customers and timely get their feedback on products or services. This idea is mainly useful for business organizations who are dealing with the extensive form of supply chain management. Quick data sharing through the facility of internet technologies benefitted companies to recognize their business position timely and adopt necessary practical actions accordingly. The option of internet technologies directed business efforts and strategies of business companies by considering the performance of different activities of supply chain management. 

Conclusion

           To conclude the discussion on the successful use of internet technologies in supply chain management, it is vital to indicate that the current competitive business environment made it mandatory for companies to consider internet technologies. It is one significant form of development to obtain standards of different phases of supply chain management. 

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Auramo, J., Kauremaa, J., & Tanskanen, K. (2004). Benefits of IT in supply chain management–an explorative study of progressive Finnish Companies. Department of Industrial Engineering & Management, Helsinki University of Technology.

Lancioni, R. A., Smith, M. F., & Schau, H. J. (2003). Strategic Internet application trends in supply chain management. Industrial Marketing Management, 32(3), 211–217.

Vakharia, A. J. (2002). E‐business and supply chain management. Decision Sciences, 33(4), 495–504.

Subject: IT

Pages: 3 Words: 900

List The Outputs From Risk Management Planning And Explain How These Outputs Can Be Used To Benefit The Project.

Project Risk Management

[Name of the Writer]

[Name of the Institution]

Project Risk Management

Introduction

Whenever there is any project in which information technology is integrated, it is very important to make sure that there is realization among stakeholders that how the risk management process is going to be carried out. To make sure that risk element is accounted for, the better idea is to make sure that all the risk outputs that are going to be faced must be accounted for. When these risk factors are determined, the next thing must be done is to ensure that the mitigation plan is needed to be developed in terms of how this risk is going to be managed. In this paper, it is going to be seen that what are some of the outputs from the risk management in context of the information technology product.

Risk Register Updates

The first outcome is the risk register, the risk register goes to identify some of the risks that are faced by the entity at the given point of time. It takes into account different level of risks such as the risk categories and risk priorities to make sure that the determination of the extent of the risk can be made. The other thing that it tends to do is that the integrated risk planning management process is needed to be developed.

Activity Cost Estimates

During the course of the project, it is quite important to have an understanding about the cost estimates that are faced during any activity and based on that estimate, the exact estimate about how the some of the cost implications of the project are going to be determined can be ascertained. The other important element is that how the scope baseline for the project is needed to be defined. They also provide insight about the cost deliverables of the project and how they are likely to have an impact on project.

Activity Duration Estimates and Scope Baseline

The nature of the project management is such that whenever any project is being carried out, the first thing that is quite important is to make sure that the duration of the activities that are going to be part of the project are needed to be ascertained and if there is any underlying risk during the course of the whole process, then effort is needed to be made to mitigate that risk. Not only that the scope baseline which includes the scope of the project, the domain under which the deliverables are going to be working out as well as some of the other factors are also important in a sense that they provide insight about how the execution of the project is going to be taking shape.

Schedule Management and Cost Management Plan

The cost management plan and the schedule management are some of the important elements when the overall execution of the project is needed to be carried out. The idea is to ensure that the quality constraints that are faced during the course of the project are needed to be worked out and based on that rationale, the actual deliverables of the project can be estimated along with their risk profile.

Conclusion

In the hindsight, it can be seen that how the output from the risk ascertainment profile includes the guidelines and deliverables of the project. These two are an important element of risk profile outcome of the project is needed to be determined. Management accounting reports are of little help to operating managers as they attempt to reduce costs and improve productivity. Frequently, the reports decrease productivity because they require operating managers to spend time attempting to understand and explain reported variances that have little to do with the economic and technological reality of their operations...

References

Burke, R. (2013). Project management: planning and control techniques. New Jersey, USA.

Chapman, C., & Ward, S. (2016). Project risk management: processes, techniques and insights. John Wiley.

Rescher, N. (2018). Risk: A philosophical introduction to the theory of risk evaluation and management.

Subject: IT

Pages: 2 Words: 600

Lists,Stacks,Queues

Data Structures Using Java document shell

Student’s Name

Institution

Date

Table of Contents

TOC \o "1-3" \h \z \u 1.0.Background PAGEREF _Toc29909652 \h 3

2.0.Lists, Stacks, and Queues PAGEREF _Toc29909653 \h 3

3.0.Heaps and Trees PAGEREF _Toc29909654 \h 4

4.0.Sorting Algorithms PAGEREF _Toc29909655 \h 4

5.0.Searching PAGEREF _Toc29909656 \h 4

6.0.Recursion PAGEREF _Toc29909657 \h 4

7.0.Conclusion PAGEREF _Toc29909658 \h 5

References PAGEREF _Toc29909659 \h 6

Background

The data structure is the regarded as the way the data can be used efficiently. It is also embodies the knowledge of data to be organized in the memory. As stated by Leung (2015), java data structure is unique and it comprises of linked list, Queue, searching, programs and graph. For proper understanding and usage of the java programming language, it is important to understand the way data is organized and therefore, understanding hierarchy or the flow of data is fundamental for good programming. This report present the illustration sections of Java such as Queue, linked list, searching, programs, sorting, graphs, heaps and trees, sorting and algorithms, searching and recursion.

Lists, Stacks, and Queues

List, stacks and Queues are essential when using Java language for development of any software or system. Goodrich (2017) pointed out that these aspects are applied to ensure that the systems are proper programmed to have a good arrangement of data. The stacks are described as the containers of subjects which are inserted and removed in accordance to the last in and last out (LIFO). It is also referred as a limited access to data structure where element can be easily removed and added from the stack. It has the top and the rest is empty. It is also built on top of other data structure and therefore, it is implemented to a developed system with the best functionality. There are neatly arranged on top each other and then pushed to the top one by one. Each stack which is used in the java scripts program usually has its own java method stack. Linked lists are known as set of boxes which are chaired together and stored on top of each other CITATION Mah17 \l 1033 (Mahmud, Rana, Hossin, & Jahan, 2017). The lists are arranged in the order of sequence and therefore, it means that each element has a position within the lists. It ensures that each element can only be accessed in a particular order.

Java code example:

public static Integer[] reverse(Integer[] a) { ArrayStack S = new ArrayStack(a.length); Integer[] b = new Integer[a.length]; for (int i = 0; i < a.length; i++) S.push(a[i]); for (int i = 0; i < a.length; i++) b[i] = (Integer)(S.pop()); return b;

Heaps and Trees

Heaps and trees are known as binary nodes which are used to store values which are greater than the value of its children. In Java language, the heap is regarded as a special Tree-based data structure in which the tree is a complete binary tree CITATION Goo17 \l 1033 (Goodrich, 2017). The heap contains the properties of the heap and therefore, it is used to find the shortest path. The below is an example of heap and trees structure which are used in java:

// DSutil.java import java.util.*; // A bunch of utility functions. Public class DSutil { // Swap two objects in an array public static void swap(Object[] array, int p1, int p2) { Object temp = array[p1]; array[p1] = array[p2]; array[p2] = temp;

Sorting Algorithms

The sorting algorithms are used to ensure that the arrays and lists are well arranged. It puts element of the list and arrays in a certain order to allow search to be conducted easily. It takes an array as both input and output and therefore, it is important to ensure that the data is properly arranged. However, there are two types of sorting which are used comparison and integer sorts CITATION Amy14 \l 1033 (Dalal, 2014). In java language programming the sorting algorithm is used to put element of a list in a certain order and mostly used order is numeral order.

Searching

Searching is string for a specific value and therefore, returns to the position match. It is designed to check for element and conducting retrieving of a binary. It is best when the data is less to go through the data. It is used to locate a specific element represented in a given element.

Recursion

It is the process where the functions call themselves directly. These are attributes which allow elements to call themselves directly. It is implemented to help solve problems that can be encountered during the programming process.

Conclusion

The data structure is an important part of programming and therefore, linked listed, searches, queue, heaps and tree and other are important part of the process of developing a good program or system.

References

BIBLIOGRAPHY Dalal, A. C. (2014). Searching and Sorting Algorithms. International Journal of ICT and

Business , 2-35.

Goodrich, M. T. (2017). Data Structures and Algorithms in Java: Department of Computer

Science University of California, Irvine . New York: Pearson.

Leung, Y. L. (2015). Linear Data Structures: Linked Lists, Stacks,and Queues in JS.

https://www.freecodecamp.org/news/linear-data-structures-linked-lists-stacks-and-queues-in-javascript-a13c7591ad87/ , 12-35.

Mahmud, H., Rana, S., Hossin, A., & Jahan, H. (2017). MinFinder: A New Approach in Sorting

Algorithm. International Congress of Communication technology , 2-35.

Subject: IT

Pages: 2 Words: 600

M2A1 Short Paper: Using Digital Devices

Title page

Quantum computing

Quantum computing technology offers numerous benefits to the research teams who are aiming analyzing information. Quantum computing can empower machine learning, which will help businesses in performing operations with efficiency and accuracy. It allows managing gigantic programs related to artificial intelligence that will prevent healthcare institutes from financial loss. The uses of this new technology are not limited to any one industry but it can be adapted by every organization. Optimization is one of the visible advantages of this technology that can be used by travel agents and salesman CITATION Dmi18 \l 1033 (Solenov, Brieler, & Scherrer, 2018). Quantum computing can be used by them for finding the optimum routes. Advance system design help salesmen in many ways that will improve their precision and performance. This technology can also be used for biomedical simulations such as for creating and studying the molecular models. This provides a vivid representation of amino acids in lactic acid. Integration of quantum computing will also help organizations in the performance of financial services CITATION Min10 \l 1033 (Ying, 2010). Complex financial modeling can be performed with efficiency. This technology also improves firm’s ability of managing risks.

Quantum computing can solve the problems of the existing technology such as it will store superposition of various quantum states, which is missing in other technological tools. Traditional technology encounters the problem of prime factorization, that can be resolved by quantum computing. There is computational limit of traditional approaches that makes encryption restricted. But quantum computing has the capacity of presenting strong encryption that makes the seal unbreakable. This will provide enhance security to the firms. This also resolves the problem of data limitation by retrieving large data sets.

New technologies will change the way of doing this from traditional approach. They will rely on fast and more efficient methods that will require the technical staff to acquire skills and trainings for learning this new technology. This suggests that new technology will make the traditional approach obsolete because the goal of firms is to attain efficiency in operations. The companies and the customers will benefit the most from this technology. This is because the organizations that will adopt quantum computing will attain accuracy in operations and make better use of data that will result in enhanced overall performance CITATION Min10 \l 1033 (Ying, 2010). Customers will also benefit from this technology because they will receive better services due to elimination of computational errors. Fresh graduates acquiring degrees in quantum computing will also benefit because they will have better career prospects.

I think integration of new technology is important for the organizations to survive in the competitive business culture. This will improve firm’s capacity of addressing customers concerns by attaining efficiency and reaching goals on time. New technology will succeed because old technology will not be able to fulfill demands of customers in future. Few firms adopting this technology will set a standard for all other firms.

Quantum Computing can be used by financial institutions like banks who are aiming to provide secure channels to the customers. By integrating this technology their can develop enhanced encryption processes that will secure the privacy and information of the clients CITATION Gua19 \l 1033 (Guo & Ying, 2019). Banks will be able to protect its data from cyber criminals. This technology assumes that the need for quantum computing will become evident due to the rising concerns of customers regarding their privacy and organizational views on confidentiality. This technology is based on law of mechanics. I agree with these assumptions because people have become aware of their rights to privacy in the current world.

References

Ying, M. (2010). Quantum computation, quantum theory and AI. Artificial Intelligence , 174 (2), 162-176.

Guo, G.-C., & Ying, M. (2019). Preface to special topic on quantum computing . National Science Review , 6 (1).

Solenov, D., Brieler, J., & Scherrer, J. F. (2018). The Potential of Quantum Computing and Machine Learning to Advance Clinical Research and Change the Practice of Medicine . Mo Med , 115 (5).

Subject: IT

Pages: 2 Words: 600

Manual Coursework Outline

[Name of the Writer]

[Name of Instructor]

[Subject]

[Date]

Manual Coursework Outline

Basic Abstract Data Types, Vector, Stack, Queue, Hash, Map, Unordered Map, Set.

It is a class of operations or a type for objects. The behavior of objects is defined by a set of operations and set of values. In List ADT, get(), size(), replace(), remove(), insert() and isFull() functions can be performed. In Stack ADT pop(), peek(), size(), and push() operations can be performed. In Queue ADT peek(), dequeue(), enqueue() and size() operations can be performed. In ADT vector elementAtRank(), insertAtRank and removeAtRank() are the important operations. The ADT Set stores the unique values without having any specific order. In ADT Map and Hash, a unique key is used to map the values.

Pointers and dynamic memory allocation

The Dynamic Memory Allocation is used for allocating memory at “run time”. Pointers are used to refer the DMA or Dynamic Memory Allocation.

Inheritance, Polymorphism and visual destructors

The ability of a lower-level object to inherit or access the data structures and behaviors connected with all the classes. Polymorphism is used to invoke the method determined at the runtime grounded on the object type.

Lambdas

These are the short, unnamed and inline functions. Lambdas are used to perform operations and functions like reduce () and map (). These operations and functions often considered as one parameter. By creating the function of lambda one can actually organize his or her code.

Range-Based loops

It is used for executing a loop over a range. It is also used as a readable equivalent to the traditional for the operation of loop over a range of elements. The syntax for Range-Based Loops is:

for ( range _ declaration : range _ expression) loop _ statement

for ( init – statement ( optional ) range _ declaration : range _ expression ) loop _ statement.

Move Semantics

It is also known as scenic route. It is a novel method of shifting resources everywhere in an optimum mode by evading redundant copies of impermanent objects which are based on the references of rvalue. The syntax is

Class _ name (class _ name &&)

Class _ name (class _ name &&) = default

Class _ name (class _ name &&) = delete

Strongly Typed Enums

There are many drawbacks of the Enums. The three drawbacks include implicitly conversion to int function. Enums functions are mostly introduced at the end of the body or in enclosing scope. Many limitations and boundaries incurred by regular enums are solved by Strongly Typed Enums.

Uniform Initialization

It permits the use of consistent syntax to initialize objects and variables varying from primitive type of aggregates. In simpler words it presents brace-initialization that practices braces () to encompass initializer values. The syntax of uniform Initialization is as type var_nam{arg1, arg2, ….. arg n}..

Constexpr

The analysis and evaluation of a variable or a function at accumulate time. These expressions can only be used with the constant expressions. It should have specific conditions like it should be in LiteralType and must instantaneously initialize. The body of a function must not had a goto statement, any labeled statement and an asm declaration.

Type Inference

This term refers to auto detection of the ADT or data type expression used in the programming language. It is a compiler feature of practical programming languages.

C++ Resources

This is an explanation of most noteworthy functions, classes and objects of the SLA or Standard Language Library with descriptive fully-functional short programs like C++ 11, C++ Language and General C++ Programming.

Modern C++ Resources

C++ is called Modern C++. It is founded on C++17, C++14 and C++11. The two ultimate resources of Modern C++ are C++ Core Guidelines and C++ Best Practices.

Subject: IT

Pages: 2 Words: 600

Marketing Management

RUNNING HEAD:  ARCHER & HOLLAND

Marketing management plan

Author name

Affiliations

Executive summary

This marketing plan has a focus over the new product of Archer &Holland. The plan is to use the technology to make all jewellery and give it more fine look and improve its quality. With rings, bracelets and jewellery are also aimed to enhance their quality. The report has a primary purpose to guide Archer & Holland in achieving its goals and objectives. It consists of situation analysis, SWOT analysis, marketing goals and objectives and decisions about seven pcs. Moreover, there is also a financial analysis, implementation plan and evaluation and controls discussed in this marketing plan.

Table of Contents

TOC \o "1-3" \h \z \u Executive summary PAGEREF _Toc9629863 \h 1

Introduction PAGEREF _Toc9629864 \h 1

Authorisation PAGEREF _Toc9629865 \h 2

Organization and industry PAGEREF _Toc9629866 \h 2

Organisational Mission and Values PAGEREF _Toc9629867 \h 2

Situation Analysis PAGEREF _Toc9629868 \h 3

The Consumer environment PAGEREF _Toc9629869 \h 3

SWOT Analysis PAGEREF _Toc9629870 \h 8

Strengths PAGEREF _Toc9629871 \h 8

Weaknesses PAGEREF _Toc9629872 \h 9

Opportunities PAGEREF _Toc9629873 \h 10

Marketing Goals and Objectives PAGEREF _Toc9629874 \h 11

Target Market PAGEREF _Toc9629875 \h 12

Market segmentation PAGEREF _Toc9629876 \h 12

Market targeting PAGEREF _Toc9629877 \h 14

Concentrated strategy: PAGEREF _Toc9629878 \h 14

Differentiated strategy: PAGEREF _Toc9629879 \h 14

Product specialization: PAGEREF _Toc9629880 \h 14

Market specialization: PAGEREF _Toc9629881 \h 14

Full market coverage: PAGEREF _Toc9629882 \h 15

Market positioning PAGEREF _Toc9629883 \h 15

Product Strategy PAGEREF _Toc9629884 \h 15

Pricing Strategy PAGEREF _Toc9629885 \h 16

Distribution Strategy PAGEREF _Toc9629886 \h 18

Promotional Strategy PAGEREF _Toc9629887 \h 18

People, Process, and Physical Evidence PAGEREF _Toc9629888 \h 19

Financial Analysis PAGEREF _Toc9629889 \h 20

Marketing Implementation PAGEREF _Toc9629890 \h 20

Evaluation and Control PAGEREF _Toc9629891 \h 21

Marketing Audits PAGEREF _Toc9629892 \h 21

Introduction

Archer & Holland jewellery shop is located in South Australia and is specialised in handcrafted pieces using the finest quality diamond, gold and platinum.The company has a partnership with Bill Whiting for jewellery designs as it outsource its manufacturing operations. Archer & Holland jewellers can also repair and make good designs from old jewellery ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"A9Cz0u0g","properties":{"formattedCitation":"(\\uc0\\u8220{}Archer & Holland,\\uc0\\u8221{} 2019)","plainCitation":"(“Archer & Holland,” 2019)","noteIndex":0},"citationItems":[{"id":"cyNHK2u8/3AV5lRSv","uris":["http://zotero.org/users/local/KZl8ZL3A/items/A9YRYH3P"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/A9YRYH3P"],"itemData":{"id":2172,"type":"webpage","title":"Archer & Holland","URL":"https://archer-holland.com.au/","issued":{"date-parts":[["2019"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Archer & Holland,” 2019). It designs different kinds of jewellery such as bracelets, earrings, dress rings, pearls and necklaces that personify the personality of the wearer.The main target population is couples and the product is engagement and marriage rings. The dedicated designers work with clients and pay special attention to their requirements that result in the development of perfect jewellery for them. Moreover, it also provides services related to insurance and valuation as well as expert services.

Authorisation

This report has been authorised and commissioned by______________.

Limitations

The report has been prepared in limited time. There was also specific length requirement and limited access to information related to the organisation.

Purpose and scope

The report has a primary purpose to guide Archer & Holland in achieving its goals and objectives. It consists of situation analysis, SWOT analysis, marketing goals and objectives and decisions about seven pcs. Moreover, there is also a financial analysis, implementation plan and evaluation and controls discussed in this marketing plan.

Background

Organization and industry

Archer & Holland has handcrafted jewellery in gold, platinum and diamond. It is famous for its unique and beautiful jewellery pieces. Engagement rings are special focus of the organisation. It is linked with jewellery retailing that is a promising industry in Australia. Industry growth is the result of increased consumer confidence and is further growing due to technological revolution.

Organisational Mission and Values

Delight each and every customer and give clients perfect kind of products and services that satisfies theirrequirements.

Situation Analysis

It is the analysis of the internal and external environment of a business. The analysis will result in identifying business's capabilities, customers and business environment.

The Consumer environment

Consumer environment has different factors such as consumer’s wants and requirements, market size, advertising, distribution channels and their income level. Consumers undergo the consumer buying process to purchase a product. Some consumers will have high involvement in this process while other will have low depending upon their needs and other factors.

The Consumer Buying Process

Consumers do not buy instantly but they pass through a buying decision process that starts long before the purchase and also continue after the purchase. Different factors have an impact on this process such as motivation, learning, perception, remembrance as well as behaviour. Companies are required to know about this process in order to gain an insight into consumers. The process consists of following stages.

Need Recognition

This is the first stage of the buying decision process.Need can be due to internal or external stimuli. Internal stimuli are the result of trigger by the most basic needs. On the other hands, external stimuli can be the advertisement or discussion with friend. Archer & Holland jewellery customers may have needs in thesescenarios. Consumers may have weddings, engagements or any other function. They may also want to invest by investing in jewellery.Information Search

After need recognition consumers will search for information, which has a key role in future buying decision. The information must have to be accurate as it will affect the quality of purchase. Moreover, consumers try to have more and more information when the product has high value. Then they check multiple sources as compared to those buyers who make purchases on regular basis. For this consumers have both internal and external search. Archer & Holland jewellery customers mostly depend on externalsearch. Now a day, internet is the source of information for people who are interested in online shopping. Moreover, friends, relatives and peers can also be the great source of information.Evaluation of alternatives

After collecting information and getting different alternatives, consumers then evaluate different options. For example, consumer evaluates different brand choices and alternatives.Different factors affect this evaluation; consumer’s experience, urgency and the cost. Furthermore, consumers also evaluate their beliefs and attitudes about different alternatives.

Purchase Decision 

At this stage decision is taken about the purchase. This is the decision about what to buy and whom to buy. External forces play a major role at this stage such as family and friends. Archer & Holland jewellery customers spend more time at this stage as they are not expert who can determine the authenticity of the product. They rely on the honesty and reputation of the brand.Post – Purchase Behaviour

After the purchase of the product and its use, consumers then then weigh their experience based on initialhopes. If the product does not fulfil the expectations, the result is the disappointment of consumers. On the other hand, if the product fulfils the expectations, consumers are delighted.

The External Environment

It is the external busyness environment of the organisation thatlimits the capabilities of the organisation. Organisations are required to assess this environment and identity potential threats and opportunities to enhance their capacities. There are six major forces operating in this environment; political, economic, competition, and socio-cultural, technological and legal andregulatory forces.

Political forces

Businesses are required to have the stable political conditions for the successful operations. Unstable political conditions cause harm to business. Australia has stable political conditions that give Archer & Holland a stable business environment. Country has stable gold prices as well as taxation policies on precious metals like gold ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"t6PWJz98","properties":{"formattedCitation":"(De Marchi et al., 2014)","plainCitation":"(De Marchi et al., 2014)","noteIndex":0},"citationItems":[{"id":206,"uris":["http://zotero.org/users/local/wY2D8D5E/items/GS65INEM"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/GS65INEM"],"itemData":{"id":206,"type":"article-journal","title":"Globalization, recession and the internationalization of industrial districts: experiences from the Italian gold jewellery industry","container-title":"European Planning Studies","page":"866-884","volume":"22","issue":"4","author":[{"family":"De Marchi","given":"Valentina"},{"family":"Lee","given":"Joonkoo"},{"family":"Gereffi","given":"Gary"}],"issued":{"date-parts":[["2014"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (De Marchi et al., 2014). However, if there occur nay change in taxation policies, it will adversely affect the jewellery market by increasing prices.

Economic forces

Economic environment can be divided into microeconomic environment and macroeconomic environment. Microeconomic environment has an effect over business decisions. On the other hand, macroeconomic environment affects the overall economy and offers different constraints to the business over which firm have no control. However, marketers can keep check over the microeconomic forces and react appropriately accordingly. For this purpose, marketing managers keep track of relevant economic indicators and devise the strategies according to them. Archer & Holland have jewellery as main product that requires high disposable income by consumers. Thus, for the company the economic factor that has great impact is per capita income ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"eBZXzhlY","properties":{"formattedCitation":"(Y\\uc0\\u252{}ksel, 2012)","plainCitation":"(Yüksel, 2012)","noteIndex":0},"citationItems":[{"id":207,"uris":["http://zotero.org/users/local/wY2D8D5E/items/MWNUXHRH"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/MWNUXHRH"],"itemData":{"id":207,"type":"article-journal","title":"Developing a multi-criteria decision making model for PESTEL analysis","container-title":"International Journal of Business and Management","page":"52","volume":"7","issue":"24","author":[{"family":"Yüksel","given":"Ihsan"}],"issued":{"date-parts":[["2012"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Yüksel, 2012). Australia has steadily increasing per capita income that is enabling middle class people to also purchase costly jewellery ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"sXl8i0B0","properties":{"formattedCitation":"(Jackson, 2015)","plainCitation":"(Jackson, 2015)","noteIndex":0},"citationItems":[{"id":208,"uris":["http://zotero.org/users/local/wY2D8D5E/items/MEYIPY33"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/MEYIPY33"],"itemData":{"id":208,"type":"article-journal","title":"Local Economy special edition on Australia and New Zealand: Commentary","container-title":"Local Economy","page":"5-11","volume":"30","issue":"1","author":[{"family":"Jackson","given":"Tony"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Jackson, 2015).

Competition

Jewellery industry is one of the highly competitive industries as numerous companies provide similar products and services to their customers. Competitors in this industry differ in terms of their fashionable designs and low inventory records. Archer & Holland jewellery also has different competitors such as Everett Brooks jewelers and G.W. The sever competition among these companies is requiring the creation of creative and unique designs by Archer & Holland jewellery.

Socio-cultural forces

Marketing strategy of a company cannot be successful until businesses take into account different socio cultural forces. Some socio cultural factors are lifestyles of customers, language, technology, aesthetics, education, law and politics, religion, customs and values, family and status of person in that society. All these factors have a link with consumers buying habits. In today society, millennial and Gen Y are more obvious and their expectations, style and fashion elements also differ. Archer & Holland also recognise the change in its customers taste and update its products accordingly.

Technological forces

In today business environment the use of technology in companies operations is inevitable. It is an important tool that can improve business operations and achieve the synergy. Companies who have better technological capacities can compete better. These can also bring economies of scale for the company and increase the efficiency of the businesses. Archer & Holland is also required to make use of latest technology to increase its capacities and compete in better ways ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"PQIbAvr7","properties":{"formattedCitation":"(Brun and Moretto, 2012)","plainCitation":"(Brun and Moretto, 2012)","noteIndex":0},"citationItems":[{"id":209,"uris":["http://zotero.org/users/local/wY2D8D5E/items/XXFKZUA6"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/XXFKZUA6"],"itemData":{"id":209,"type":"article-journal","title":"Contract design and supply chain management in the luxury jewellery industry","container-title":"International Journal of Retail & Distribution Management","page":"607-628","volume":"40","issue":"8","author":[{"family":"Brun","given":"Alessandro"},{"family":"Moretto","given":"Antonella"}],"issued":{"date-parts":[["2012"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Brun and Moretto, 2012). With machines company can get the higher finesse and cutting quality in its products. Moreover, technologies must also be used in order and inventory management to enhance the efficiency.

Legal and regulatory forces

Legal and regulatory framework of the country controls its trade. There are different legal regulations such as consumer laws, trading hours as well as JAA code of conduct for all jewellers in Australia. Businesses must abide these regulations to escape from any loss or penalties. Archer & Holland jewellery is also required to follow the Australian consumer law (ACL), companies can ensure the quality of their products as the law requires the selling of only those products that have standard quality ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"HH3CCHzG","properties":{"formattedCitation":"(\\uc0\\u8220{}legalvision,\\uc0\\u8221{} 2016)","plainCitation":"(“legalvision,” 2016)","noteIndex":0},"citationItems":[{"id":210,"uris":["http://zotero.org/users/local/wY2D8D5E/items/YUMWZ23D"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/YUMWZ23D"],"itemData":{"id":210,"type":"webpage","title":"legalvision","URL":"https://legalvision.com.au/legal-considerations-for-watch-and-jewellery-retailers/","issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“legalvision,” 2016).

SWOT Analysis

It is a strategic management tool that will inform Archer & Holland about its strengths, weaknesses, opportunities and threats (SWOT) to help the business in developing strategies for the success. It can thus assist in the development of different organisational strategies such as competitive strategy. Organisations operate in environments of which one is inside the organisation and other is outside the company in which it operates. By analysing the internal environment, company can know about its strengths and weakness while the analysis of the external environment provides the details about the threats and opportunities of the company. Company has a control over its strengths and weaknesses and can change them. It can also take advantage of different opportunities and use such strategies that can protect the company against threats.

Strengths

Strengths refer to organizations capabilities that distinguish them from their competitors. These are used to achieve the competitive advantage for the company as with these companies can take advantage of opportunities in the external environment ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"0wgEjTHS","properties":{"formattedCitation":"(McDONALD, 2016)","plainCitation":"(McDONALD, 2016)","noteIndex":0},"citationItems":[{"id":211,"uris":["http://zotero.org/users/local/wY2D8D5E/items/5WIV5F99"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/5WIV5F99"],"itemData":{"id":211,"type":"chapter","title":"Strategic marketing planning: theory and practice","container-title":"The marketing book","publisher":"Routledge","page":"108-142","author":[{"family":"McDONALD","given":"MALCOLM"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (McDONALD, 2016). Moreover, these are the positive attributes of the company that allow it to perform better.

Archer & Holland have unique designs.

Accessibilityof skilled designers.

All products are handcrafted pieces that are made using the finest quality diamond, gold and platinum.

Archer & Holland can not only make new designs but also specialise in repairing the old.

Different products of the company are; bracelets, earrings, dress rings, pearls and necklaces.

Engagement and wedding rings are main product and they also offer customized products.

Manufacturing operations are outsourced to achieve the operational efficiency.

Archer & Holland also has strong relationships with suppliers.

Relationships are also healthy with customers and business has an established brand worth.

Company has an efficient distribution network.

Weaknesses

These refer to the negative factors in an organisation that detract it and stop it from performing at its best possible level. These are also areas that require improvements so a business can remain competitive in the market.

Restricted target market and image of brand only for rich people.

The need to persistently create new designs.

Saturation of market.

Lack of trust my all potential buyers.

Do not provide sufficient information to the consumers about the products.

Price of some products does not reflect the quality of the product.

Opportunities

These external factors are the reasons of company existence and development. These are source of competitive advantage for the company as these contribute in the success of the company. Organizations are required to be vigilant and readily recognise different opportunities in their external environment. For this purpose, they require effective planning during their course of operations.

To remain competitive, Archer & Holland can increase its target market.

It can also increase the investment.

Archer & Holland can go for different partnerships and alliances and start international operations.

It can also increase the product line with more jewellery options.

The selling and profits can also be increased by selling online.

Technology revolution has hit the industry and is providing different benefits that can be availed by Archer & Holland.

Threats

These are factors in the external environment that that can cause harm to the organisation. Organisations must have such strategies that can identify these factors timely.

Limited availability of raw materials.

Imitated products in the market.

Economic downturn.

Change in taxation rules.

Competition from other countries.

Change in customerspreferences.

Developing Competitive Advantages

Archer &Holland must match its strengths with the opportunities to have a long terms success in the business. It must also devise strategies to overcome its weaknesses. Moreover, threats must also be considered by the company to avoid any loss. For example, company should have the proper knowledge of rules and regulations of the industry.

Marketing Goals and Objectives

The results of the situational and SWOT analysis have assisted in establishing these goals, objectives, and tactics.

Marketing Goal 1: Increase the target market by going for partnerships and alliances in the international contexts within a period of 1 year.

Objective: Target the international market.

Tactics:

Establish of databases relative to international customers.

Explore untapped international markets.

Try to have partnerships with the local companies in new markets.

Establish the brand worth in new markets.

Use of aggressive strategies in the target markets.

Marketing Goal 2: Establish the brand worth in the local market in a period of 6 months.

Objective: Target the local customers and increase the quality of products and services.

Tactics:

Establish the brand mission statement

Use of technology in products manufacturing to enhance the quality

Use of different incentives for the customers.

Target Market

Businesses cannot satisfy all their customers individually. They need to develop different groups of customers in which customers have identical preferences so they can satisfy them in better way. For this purpose they use the strategy of target marketing. This strategy focus on their customers needs and wants and allow the development of customer-centric strategy. They thus develop their marketing mix elements; products, prices, place, and promotional strategies according to the needs of different segments.

The target marketing has three stages; market segmentation, market targeting and market positioning.

Market segmentation

It is the division of the entire market into small segments that have customers that think on the same lines. This assists in identifying niches in the markets having specific needs and then targets them using the same marketing strategy. These niches have similar requirements, needs as well as interests and they also respond in a similar way to different market fluctuations.

Different factors can be used to segment the markets.

Segmentation variable

Some examples of measured variables

Application to target market

Demographic

Income, gender, ethnicity, and family size ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Dv6BAK0F","properties":{"formattedCitation":"(Cross et al., 2015)","plainCitation":"(Cross et al., 2015)","noteIndex":0},"citationItems":[{"id":212,"uris":["http://zotero.org/users/local/wY2D8D5E/items/VUDKH632"],"uri":["http://zotero.org/users/local/wY2D8D5E/items/VUDKH632"],"itemData":{"id":212,"type":"paper-conference","title":"How marketing managers use market segmentation: An exploratory study","container-title":"Proceedings of the 1990 Academy of Marketing Science (AMS) Annual Conference","publisher":"Springer","page":"531-536","author":[{"family":"Cross","given":"James C."},{"family":"Belich","given":"Thomas J."},{"family":"Rudelius","given":"William"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Cross et al., 2015)

20-60 years age groups.

Higher Income levels.

People of all races.

Men and women

Geography

Product distribution areas

South Australia

Psychographic

Attitudes, perceptual styles and reference groups

Peer groups references

High price conscious

Behavioural segmentation

User status, buyer-readiness stage and loyalty status

Occasion, loyalty

High value product conscious

Heavy brand users

Market targeting

After the creation of different segments in the market the next step is to devise different promotional strategies for these segments. With the use of different marketing plans, marketers target the customers according to the taste of particular segment. Different strategies in this regard can be:

Concentrated strategy:

This strategy consists of one marketing mix and is known as single strategy. This is mostly used by companies having limited resources.

Differentiated strategy:

This strategy consists of different marketing mixes and is known as multiple-segment strategy. For example, company can offer the same product to the segment but with different promotional messages.

Product specialization:

This strategy is used by companies that have specialities in their production. The product is offered to different market segments according to their requirements.

Market specialization:

This strategy offers different products to the market segment and is specialise in serving specific market segment.

Full market coverage:

This strategy is used by companies if they want to serve all the market with same strategy. Thus, a single undifferentiated marketing mix is offered to the whole market.

Market positioning

This is the last stage at which efforts are made to create the positive image of the company in the psyche of consumers. It fully changes the minds of consumers and tries to get innovative positions. The primary aim of this is to create superiority over competitors in highly competitive conditions. The strategy is also effective in markets that have limited mobility such as jewellery. In addition, before devising this strategy it is necessary to get know about competitors comprehensibly. This assist in determine the right position for the company in consumers mind. Those benefits are offered that are not offered by competitors in order to excel over them. This strategy emphasises the advantages of buying the specific product in comparison to competitors.

Product Strategy

Product strategy also known as roadmap of a product is about imagining the future of the product. This strategy gives the direction of company's activities with respect to product. It is a decision about the basic essentials of a product. Archer &Holland product strategy is about different products and services that it offers such as custom jewellery design, jewellery repair and remodelling and jewellery insurance and valuation. Thus, the product strategy describes about the type of jewellery and services.

Product strategy determines different attributes such as its core, actual and augmented product. Moreover, it decides about the product line and product brand as well as its lifecycle.

Product and services

Existing product

New product

Core, actual and augmented product

Refined product with the use of technology

Product line of mix

Product brand

Such as brand image, brand equity, brand strategy.

Product life cycle

Introduction, grown, mature and decline stage.

Pricing Strategy

The best pricing strategy is that can cover expenses as well as has the ability to make profit. For example, Archer &Holland has to offer a price discount then it is needed to determine its mark up on products. Archer &Holland has a pricing strategy to offer discounts on special occasions. Different product strategies can be used for new product such as cost based, value based, and competition based premium pricing and good value. Different factors that affect the pricing decisions are also considered such as economy, psychological, segmentation, allowance and discount. There is also development of price adjustment and price mix strategies.

Existing product

New product

Pricing strategies

Cost based, value based, competition based, premium pricing and good value

What will be new product pricing strategy

New product pricing strategies

Cost based, value based, competition based, premium pricing and good value

Skimming and penetration

Factors affecting pricing

Economy, psychological, segmentation, allowance and discount.

Economy, psychological, segmentation, allowance and discount.

Price adjustment

Dynamic, psychological, segmentation, allowance and discount.

Price mix strategies

Product line prices, captive product prices, bundle prices, optional pricing

Distribution Strategy

Distribution strategy is about decisions related to channels a firm can use. Distribution channels fulfil the needs of both consumers and producers and enhance the efficiency. Companies can also use more than one channel for the distribution of its products and services. Distribution strategy includes decision about channels of distribution, distribution intensity and channel control. For the existing product the distribution intensity can be selective, intensive and exclusive and for the new it will be and exclusive. Moreover, the channel control for the existing will be horizontal or vertical distribution while for the new will be vertical distribution.

Existing product

New product

Channels of distribution

Distribution intensity

Selective , intensive and exclusive

Intensive and exclusive

Channel control

Horizontal or vertical distribution

Vertical distribution

Promotional Strategy

The aim of promotional strategy is to inform, persuade or influence the customer purchase decision. Thus, it provides information to t he customers, increases the demand, differentiate the product and emphasise over the value of product. Integrated marketing communication is a strategy used by Archer &Holland that decides about communication tools, media, messages, executional style and budget.

Communication tools (Promotional tools)

Advertisement, sales promotions, personal selling, publicity and direct marketing

Media

TV, radio, newspaper, magazines, billboards and YouTube.

Message

Emotional, rational, both

Executional style

Slice of life, unique selling, proposition, scientific evidence, humour.

Budget

Competitive parity, percentage and sale, objective and task

People, Process, and Physical Evidence

Marketing strategy is executed through these elements; people, processes and physical evidence.

Services marketing mix elements

Description

Application

People

Company success is greatly dependant on having the right people in the company.

Quality of staff matters a lot.

People must have information about product and its attributes.

Process

This is the path from the operational activities to the delivery of the product or service.

Proper training is required to know about this process in detail and inform customers accordingly.

Physical evidence

This refers to tangible evidence about company, its products and people.

• Physical evidence will have the brand logo.

Financial Analysis

Archer &Holland has a projected budget for this marketing plan as $12,000.00. It is 30% of the expected marketing budget.

Marketing Implementation

It is the process of executing marketing strategy to achieve the desired marketing objectives. Archer &Holland will implement its marketing strategy to achieve its marketing goals.

Evaluation and Control

Evaluation of the marketing plan is essential to know about the success of the plan. The strategy will be evaluated after every two weeks to know about the progress.

Formal and Informal Controls

Formal and Informal both controls will be used to check the performance.

Marketing Audits

Third party assistance will be used for marketing control.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Archer & Holland [WWW Document], 2019. URL https://archer-holland.com.au/

Brun, A., Moretto, A., 2012. Contract design and supply chain management in the luxury jewellery industry. International Journal of Retail & Distribution Management 40, 607–628.

Cross, J.C., Belich, T.J., Rudelius, W., 2015. How marketing managers use market segmentation: An exploratory study, in: Proceedings of the 1990 Academy of Marketing Science (AMS) Annual Conference. Springer, pp. 531–536.

De Marchi, V., Lee, J., Gereffi, G., 2014. Globalization, recession and the internationalization of industrial districts: experiences from the Italian gold jewellery industry. European Planning Studies 22, 866–884.

Jackson, T., 2015. Local Economy special edition on Australia and New Zealand: Commentary. Local Economy 30, 5–11.

legalvision [WWW Document], 2016. URL https://legalvision.com.au/legal-considerations-for-watch-and-jewellery-retailers/

McDONALD, M., 2016. Strategic marketing planning: theory and practice, in: The Marketing Book. Routledge, pp. 108–142.

Yüksel, I., 2012. Developing a multi-criteria decision making model for PESTEL analysis. International Journal of Business and Management 7, 52.

Subject: IT

Pages: 12 Words: 3600

Memo Writing- Project Management

Memo 2 – individual assignment

Author name

Affiliations

SWOT ANALYSIS

A SWOT analysis is a tool that can be used for the purpose of assessing university internal and external environment. It shows the University’s strengths, weaknesses, opportunities, and threats. Strengths are factors that are internal to the organization and assist in achieving different objectives. Weaknesses are factors that are internal to the organization and offer hindrance in achieving different objectives. In addition, opportunities are factors that are external to the organization and assist in achieving different objectives. Threats are factors that are external to the organization and offer hindrance in achieving different objectives. This paper will conduct a SWOT analysis of George Mason University in order to show its current position and possible future position.

Executive summary

Assessment of strategic plan 2014 of George Mason University reveals its different strengths, weakness, opportunities, and threats ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"RmMWRkin","properties":{"formattedCitation":"(George Mason University, n.d.)","plainCitation":"(George Mason University, n.d.)","noteIndex":0},"citationItems":[{"id":2453,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/4BKWKTAP"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/4BKWKTAP"],"itemData":{"id":2453,"type":"webpage","title":"2014-2024 Strategic Plan","URL":"https://strategicplan.gmu.edu/wp-content/uploads/2013/07/GMU_Strategic_Plan_Web.pdf","author":[{"family":"George Mason University","given":""}]}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (George Mason University, n.d.). The University has an experienced and highly qualified faculty. The faculty is assisting in maintaining the quality of education in the university. Students also have different support programs including the facility of online courses. Students also have the opportunity of internships and jobs due to partnerships of the university with different employers. Moreover, the university is a part of an online community as it has partnerships internationally and accommodate more and more international students. Its weakness includes less financial stability in terms of funds and donations. In addition, it does not invest much for research, marketing and an increase in enrolment of students. It can increase its global presence by having more and more partnerships internationally. However, it is also facing different threats such as a change in the technology is bringing new areas in the courses. Now there is an increasing trend of blue collar jobs. It is also difficult due to economic instability to maintain the quality of education at affordable rates by students.

Strengths

Weakness

Highly-skilled and professional faculty

George Mason University has a highly skilled and professional faculty.

Affordable education

Mason is providing an affordable and prudent college choice.

Academic programs with national accreditation

Its programs are nationally accredited.

Quality Student Services

Students have strong administrative support for academic programs.

Reputation as an international university

Mason is an internationally recognized university.

International Program Support

University has strong international partnerships.

Online programs

Students are getting more than 50 online and hybrid program options for undergraduates ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"JfjViaeG","properties":{"formattedCitation":"(Mason University, n.d.-a)","plainCitation":"(Mason University, n.d.-a)","noteIndex":0},"citationItems":[{"id":2454,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/8MD4WHPT"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/8MD4WHPT"],"itemData":{"id":2454,"type":"webpage","title":"Academics","URL":"https://www2.gmu.edu/academics","author":[{"family":"Mason University","given":""}]}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mason University, n.d.-a)

Part of an international community

University has an international reputation and students from all over the world come and join the university.

Advantages of the Honors College

Mason has the status of Honors College and students receive individualized academic advising and have close interaction with faculty.

Internships

The university gives an opportunity to experience the real world of the workplace so they can have meaningful careers in a global society. Students complete at least one internship before graduation.

Teaching and Learning

Faculty are required to fulfill the lofty standards. Teachers can have this through experiential learning and research opportunities.

Community Builder

It has regional partnerships and commitments contributing to the cultural vitality of the community ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"uqyDibS4","properties":{"formattedCitation":"(Mason University, n.d.-b)","plainCitation":"(Mason University, n.d.-b)","noteIndex":0},"citationItems":[{"id":2455,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/EHNYRSJC"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/EHNYRSJC"],"itemData":{"id":2455,"type":"webpage","title":"Visit Mason","URL":"https://www2.gmu.edu/admissions-aid/visit-mason","author":[{"family":"Mason University","given":""}]}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mason University, n.d.-b).

Return on Investment

University has innovative partnerships with employers that support student’s career readiness.

Underfunding in many areas

The university faces a shortage of funds in different programs.

Lack of faculty Scholarship support

Faculty do not get adequate financial support.

Low ethnic diversity

Although students come from different countries still it is low in ethnic diversity.

Declining enrollment

Due to changing international standards, now there is less enrolment in different programs.

Lack of marketing

On the international level, the university lacks marketing strategies to increase enrollment.

Opportunities

Threats

Global learning platform

Through partnerships and other forms of presence, the university can have a global learning platform.

Online opportunities worldwide

It can extend the number of courses offered online.

Growing public interest in educational value

Now people are becoming more conscious about education.

Risk of losing experienced

Due to better opportunities in the market, there is a risk of losing experienced staff.

Competition for students

Students face competition, internationally.

• State Policy Changes

The state may change its policies that affect students as well as the university.

Maintain the quality

University is offering education at affordable rates and thus face difficulty in maintaining quality in the long run due to economic uncertainty.

The trend of blue collar jobs

Now focus is more towards the blue collar jobs and university education is lacking its importance.

Change in information technology

With technological advancement, there is a threat of continuously changing in information technology.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY George Mason University. (n.d.). 2014-2024 Strategic Plan. Retrieved from https://strategicplan.gmu.edu/wp-content/uploads/2013/07/GMU_Strategic_Plan_Web.pdf

Mason University. (n.d.-a). Academics. Retrieved from https://www2.gmu.edu/academics

Mason University. (n.d.-b). Visit Mason. Retrieved from https://www2.gmu.edu/admissions-aid/visit-mason

Subject: IT

Pages: 2 Words: 600

Micros Soft Word

Learn to use your computer

More efficiently

Hands on Classes Earn 1 credit hour

Macy Community College

Computer Learning Center

OFTC 110 keyboarding on the Job

This course builds competencies needed in today’s offices, speed, accuracy and production of various types of business correspondence, forms and reports

August 22 – October 31

Monday 2:00 -1.50

OFTC Building Speed and accuracy

This class is designed to improve the keyboarding speed, accuracy through timed copy analysis, goal setting and corrective practice.

August 24 – October 25

Tuesday 11:00 – 11:50

OFTC Using Microsoft Office

August 23- October 23

Monday 10:00 – 10:50

This course provides an introduction to Microsoft office and the popular word processing, spreadsheet, presentation, information management, and database software.

OFTC 112 Building Speed and Accuracy

This class covers basis window functions. Learn to enter and edit text, format documents, print file and save your work.

August 23- October 25

Thursday 1.00: 1:50

These are computer courses for beginners. No perquisite required

Macy Community College 415 W. Beale St. Kingman Az. 86401- 5705

To enroll contact our registration office at (928)555-0170

Or register online at www.macycc.edu/registration/register2.html

Fern global commodities

1002 Brett Favre Pass

Green bay WI54304-3736

(920)555-0100(920)555-0102 Fax

New Release Contact: Jessica Thurman

For release immediately

GREEN BAY W September 22, 2011. In cooperation with Kessler University Fern Global Commodities recently announced its annual professional seminar for mentoring for a brighter future. The seminar will be held each Saturday in February from 10:00 am to 2:00pm on the site at FGM corporation headquarters. The FGM personnel will offer mentoring in the following areas; cost analysis, advertising, sales, packaging, and shipping. The mentorship will also cover warehousing, product distribution, profit analysis and personnel evaluation.

In the April 2019 issue of business management, FGM publishes a recent study of challenges that many companies face in the market. The study revealed one major problem, a critical shortage of experienced employees. It also identified four key factors which contribute to employee shortage in the country. One major factor identified is the increase number of graduates. The second factor is the downsizing of workers, redistribution in the workforce, and early retirement. The study overwhelmingly indicated that as the workplace rapidly changes, jobs once considered routine are becoming more complex. In additional new jobs demands more specialized level of training and skills. The study noted “downsized companies must do more and more with less and less, corporate management recognizes the need to identify and uses the accumulated knowledge and skills and employees who have reached or are rearing retirement age. The study also reported that nearly seventy –five percent managers surveyed have voiced this concern but said that they did not now know how to secure this knowledge.

Careful investigation into the solution in other areas has revealed that monitoring is the way to retain a corporate knowledge. It is regarded as a win-win situation for all the parties concern. However, mentoring is regarded is the process of nurturing employees to become better employees or leaders by acquiring new skills and knowledge. It is done through in house training, seminars and by attending workshops. College students who are interested in manufacturing and marketing enterprise will benefit from the valuable hand on hand experiences this seminar offers. The students who complete the seminar will get two semester hours of credit. Fern Global Commodities also guarantees summer and holiday employment to students who complete the seminar as well as full consideration to fulltime employment upon graduation. Registration is free, interested students must register by January 10th. To register student can call Ms Jessica A. Thurman at 555-0106.

Subject: IT

Pages: 2 Words: 600

Milestone

Milestone

[Name of the Writer]

[Name of the Institution]

Milestone

Section # 1

Introduction

eBay Incorporation is a US-based multinational e-commerce corporation based in San Jose, California. The company facilitates business to business and consumer to consumer sales through its website. The company (eBay) has become a notable success story of the dot-com bubble with having strong business growth and increasing customers’ base. In the year 2014, eBay the company faced huge trouble of data breach in which hackers hacked accounts of around 150 million users of eBay. This data (cybercrime) breach has occurred in late 2014 but it has been reported during 2016 by the company. In the data breach, the names, email addresses, phone numbers, passwords, date of birth, and some of the security questions have been obtained by the hackers. Every data or cybercrime breach has inverse impacts on the person or organization which have been hacked or whose data have been stolen, but the cybercrime braches (data breach) of eBay have been found one of the most badly affecting the company.

This was a badly affecting breach because in hacking organizations data such as business information etc. also impacts badly and is considered illegal and unethical but they have impacts on the hacked organization of body while, the breach of eBay has impacts on the company in terms of losing valued and highly potential customers as well as it has impacts on the people and communities as their critical information has been captured (Business Insider, 2019). A number of cybercrimes are there to be brought under analysis and discussion, but the data breach of eBay has been chosen because it has been found more critical and multi-affecting than some of the others while the shocking thing is it has not been considered as illegal but not a criminal act.

The people who were involved in this data were not a single person or hacker. While a group has found involved in this huge data breaches in which they hacked accounts of around 150 million users of the company (eBay).

Section # 2

Attackers and Defenders of eBay Data Breach 2014

As mentioned earlier, the attackers nor the defender of the data breach of eBay was not a single individual while a well-established organization was involved which has hacked the accounts of around 150 million users of eBay. In the data breach, the attackers have a totally unique motive for hacking because this motive and even hack has considered illegal but not as criminal.

On the other side, the defender of this breach is also a highly professional body and it can be stated that the data breach has been defended well too but up to some extent. Hence the major people involved in this data breaches are groups/organizations. So, some of the possible details of the groups or organizations are as follows.

The group who has attacked eBay and hacked its valued data of 150 million users are known as the "Syrian Electronic Army” (SEA). The group has claimed responsibility that they have attacked the company and hacked their data. They claimed the responsibility after eBay reported the data breach in 2016. The main and ultimate motive for the group (SEA) was Hacktivism and that was the actual reason because of which the motive and hack have not been considered as criminal (Saarien & Sarrinen, 2019).

SEA is a group of computer hackers who surfaced online for the first time in 2011. The main goal of the groups is to support the government of Syrian President. The group use website defacement, spamming, phishing, malware and other types of attacks (Abas & MAsri, 2018). In their attacks, they also have attacked the number of opposition groups, news organizations, websites, and many human rights organizations that are in conflict of the government. They have also attacked and hacked many government websites in Europe and the Middle East. The group (SEA) openly launches the cyber-attacks on its enemies in 2011.

The group (SEA) was connected with the group of Syrian Computer Society which has firstly headed by the Syrian President Bashar Al-Assad. The group also has a registered website (Syrian-es.com). The main background and information about the group ,has been supported by the Syrian state. Beyond that, the group called SEA also have several links with some big bodies such as official in Syria, Lebanon, Iran, and Hezbollah. In 2015, the group has been suspected as actually Iranian by the officials of American intelligence.

In this big data breach ever faced by eBay in 2014, the company took every possible step to defend the attack on its user’s data. The company has assigned a number of groups that have worked for the company in defending the attacks. Beyond that, the company also took every simple and easy & tough and complex step to defend itself against the attack. They also have worked on improving their data protection policies and processes (Stevenson, 2018). Hence the main and key defender (after some defenders hired by the eBay “not shown at all by the company as they have reported the breach in 2016 while it has happened in 2016”), is eBay itself.

At the time and even after the data breach faced by the company, the company ensured keeping the top of the password management. As well as they have asked every customer whose accounts have been hacked or not to change their accounts passwords after attackers got access and hold on the logins of employees and got access to the data of eBay customers (BBC News, 2014).

Section # 3

Timeline of the Event (eBay Data Breach)

Throughout 2014, the topic of cybersecurity and cybercrime has been a major for discussion. In the year 29014, the occurrence of cyber-attacks and hacking has not slowed down with no sign. Many companies, organizations, and businesses faced huge troubles of data breaches in a particular period (Chabrow, 2019). The data and critical information on large scale organizations have been stolen by several hackers. The number and occurrence of cybercrime events and data breaches have been recognized two times higher than of 2013. As mentioned above, several organizations and their data have been hacked. Hence, one of them was eBay.

The attack on the eBay data has been announced on the 21st of May, 2014. On this date, the company announced the security breach on its main database and asked even all of its customers to change their passwords. The company has announced the concern due to several reasons but one this was also a major reason that the access of eBay employees has been gotten by the hackers and employees were not able to change customers’ passwords.

Timeline

There is a number of events that have occurred in the event of the eBay data breach. Each of these steps has been taken and completed in a well-planned and highly professional manner. Some of the possible details and explanations of each of the events occurred in the event (eBay data breach 2014) and the timeline is as follows.

S. No

Event Occurred

Details

01

Installation of Malware

The first event that occurred in the eBay data breach 2014 was the installation of Malware by the hacking group involved. In the very early stage, they have installed the particular Malware that has been developed, designed and planned to be used for this particular attack.

02

Steeling the data

Another and a critical and crucial event that has occurred from the attackers’ side was steeling the basic data such as getting the data that allow hackers to gain access to the accounts of eBay employees.

03

Story Breaks

This is the event where the 120-page role has been broken by hackers. This step or event was the event or step taken by the hackers while attacking in which the database was breached between late February and early March.

04

Target Employee Accounts

The most critical and worst event for eBay in the data breach of eBay was the target of eBay employees’ accounts. This event was the most crucial part of the entire process and event because this event of targeting employees’ accounts give the ultimate access to the hackers, while on the opposite side, it was the most important and crucial step and event for the hacking group (hackers) (Finkle, 2014).

05

Target 140 million accounts

After having access to the accounts of eBay employees, the next event that occurred in the event of eBay data breach was hacker got access to the accounts of around 30% of accounts out of 150 million.

06

Target customers basic information

Proceeding, the group (hackers) target the initial/basic information of the customers such as their names and email, etc.

07

Target data breach of all users’ accounts

This was almost the last event in the event of an eBay data breach. In this step, the hackers ultimately targeted the accounts of even all 150 million customers of eBay and got access to all 150 million accounts of users (Wakefield, 2014).

09

Hacking the data

The last event in this data breach was the data hack. The hackers hack the company’s (eBay) customers’ accounts and data such as their names, email addresses, date of birth, and security questions.

Section # 4

How the eBay Data Breach Could Have Been Mitigated or Prevented

There are some crucial steps that could be taken into action to prevent such a massive breach, but some most credible ones are the following.

Technical Change Solution

The event could be prevented in the way if the company had security controls at both levels. Here they were required to have security controls at two levels which are the security control within applications that includes database, customers’ applications, and application platforms while they had to have strong security controls at the system level such as volumes and file system (Lyne, 2014). As well as three critical controls and management are needed at each of the below levels.

Access control

Encryption

Monitoring of data access patterns

The joint power of the above two controls access “control and encryption” is that those controls exclude each of the users which have no authority or not authorized to from accessing the data (HelpSystems). Hence, this hugely and greatly decreases the surface and access available to hackers.

Beyond that, the last but not the least control (monitoring of data access) enables the company to identify faster any unusual occurrence or happenings with any of the accounts, flag it for lockdown and investigation, and stop the process of an attack on the account (Lyne, 2014). So through the implementation of this control, eBay could have prevented the massive data breach they faced.

Beyond that, other credible techniques through which the breach could have been prevented were the usage of two-factor authentication like a physical token which creates a one-time PIN to log in. These are some of the most perfect fit because these are associated with technical control while the data breach that eBay had faced had occurred mostly because of the poor technical control of their valued and importance even they have a huge amount of customers’ data as they are an online e-commerce company (UCSC, 2019).

Additionally, the major things that have been learned from the event is that 1) organization having so much data of customers should change and implement procedures and new controls as threat as the hacking and technology environment is changing unstoppably, 2) consider the addition of resources that know that 5 phases of ethical hackers and to think like a hacker and get possible entryways into any organization, and 3) test new policies and procedures that are effective so that could be protected from hacking like eBay (Robert, 2018).

Culture Change Solution

Development of security awareness plans and pieces of training

They should create a cyber-breach response plan

Instill a concept of the security belongings to all employees

eBay and the concerned management or department have to get a secure development lifecycle at the organization (Gonsalves, 2017).

Recognize each of the employees who support and put efforts for security enhancement

Develop or build up a security community within the organization.

References

Abas, A. MAsri, A. (2018). The new face of the Syrian Electronic Army. OpenCanada. Retrieved 11 October 2019, from https://www.opencanada.org/features/new-face-syrian-electronic-army/

BBC News. (2014). eBay faces investigation over the breach. Retrieved 11 October 2019, from https://www.bbc.com/news/technology-27539799

Chabrow, E. (2019). eBay Sees Revenue Decline Due to Breach. Bankinfosecurity.com. Retrieved 11 October 2019, from https://www.bankinfosecurity.com/ebay-sees-fewer-sales-due-to-breach-a-7074

Cyber Thieves Took Data on 145 Million eBay Customers by Hacking 3 Corporate Employees. (2019). Business Insider. Retrieved 11 October 2019, from https://www.businessinsider.com/cyber-thieves-took-data-on-145-million-ebay-customers-by-hacking-3-corporate-employees-2014-5

Finkle, J. (2014). Hackers raid eBay in historic breach, access 145 million records. The U.K. Retrieved 11 October 2019, from https://uk.reuters.com/article/uk-ebay-password/hackers-raid-ebay-in-historic-breach-access-145-million-records-idUKKBN0E10ZL20140522

Gonsalves, A. (2017). How to protect your company from an eBay-like breach. CSO Online. Retrieved 11 October 2019, from https://www.csoonline.com/article/2158083/how-to-protect-your-company-from-an-ebay-like-breach.html

HelpSystems. (2019). eBay Breach Highlights the Value of Monitoring Security-Related Events | Helpsystems.com. Retrieved 11 October 2019, from https://www.helpsystems.com/resources/articles/ebay-breach-highlights-value-monitoring-security-related-events

Lyne, J. (2014). eBay Hacked, Bleeds Data And Why You Need To Act. Forbes.com. Retrieved 11 October 2019, from https://www.forbes.com/sites/jameslyne/2014/05/21/ebay-hacked-bleeds-data-why-you-need-to-act/#3b5497d7b6bb

Roberts, S. (2018). Learning lessons from data breaches. Network Security, 2018(11), 8-11.

Saarinen, J., & Saarinen, J. (2019). Attackers access eBay customer passwords, personal data. iTnews. Retrieved 11 October 2019, from https://www.itnews.com.au/news/attackers-access-ebay-customer-passwords-personal-data-386139

Stevenson, A. (2018). These are the 19 worst data breaches in history. Business Insider. Retrieved 11 October 2019, from https://www.businessinsider.com/target-ebay-and-ubisoft-a-list-of-the-biggest-data-breaches-in-history-2015-7#15-pinterest-number-of-records-compromised-70-million-5

UCSC. (2019). Security Breach Examples and Practices to Avoid Them. Its.ucsc.edu. Retrieved 11 October 2019, from https://its.ucsc.edu/security/breaches.html

Wakefield, J. (2014). eBay Faces Investigations over Massive Data Breach. BBC News.

Subject: IT

Pages: 7 Words: 2100

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.