Monday, September 30, 2019

Nurse Practitioner Scope of Practice in the United States

Nurse Practitioners are registered nurses who are outstandingly recognized for providing primary care and treating acute and chronic illness and diseases. They acquired practiced skills and experience through advance education and medical training, and are authorized to serve as health and medical care resources and interdisciplinary consultants for diverse populations during health and illness. Nurse Practitioners may be generalists, like family nurse practitioners, or specialists whose areas of expertise include pediatrics, geriatrics, and psychiatry.Nurse Practitioners render a wide range of different types of preventive and clinical services as authorized by a state's Nurse Practice Act that vary from state-to-state in which some allow independent practice for nurse practitioners. In the United States, the state from which a nurse practitioner is practicing gives the nurse practitioner’s license being certified by the American Nurses Credentialing Center (ANCC). Since the profession is regulated by the state, the extended care-giving role played by Nurse Practitioners varies. Nurse practitioners in the community may be engaged in health maintenance organizations, home health care agencies, public health departments, school or college clinics, and physician’s offices, to mention a few.With increasing demand for primary care services to underserved groups and communities, nurse practitioners are successfully qualified for rendering such service, being fully equipped with appropriate knowledge and training. Standards for practice developed by the American Academy of Nurse Practitioners (1993) provide the specific activities that a nurse practitioner can perform and govern the services granted.In general, regardless of specialty, the scope of services practiced by nurse practitioners is divided into three categories. The first category covers the assessment of health status. This includes activities such as obtaining medical and health record of a n individual, performing nursing assessments, and conducting physical examination on patients. Nurse practitioners also perform preventive screening procedures based on the patient’s age and history. Such screening includes those for hearing, sight, and cancer. Identification of medical health risks and requirements is also under the scope of practice of this profession.The second category is the application of suitable diagnosis based on previous examinations and clinical findings. They execute and interpret diagnostic studies such as routine laboratory tests, EKGs and X-rays. Diagnosing, treating, evaluating, and managing minor and common and acute and stable illness and diseases such as injuries, diabetes, and high blood pressure are being employed by nurse practitioners. Also, with proper training or with supervision, they are also allowed to perform minor surgeries and procedures and may be First Assistants in the OR.Central to the care provided by nurse practitioners ar e the conditions of the patients and the further effect of illness on the lives of the patients and the patients’ relatives. Thus, supportive counseling and educating patients regarding their health behaviors stressing out health promotion and citing preventive measures on illness and diseases are also under the practice of nurse practitioners. Providing prenatal care, conducting well-child screenings and immunizations, prescribing rehabilitation treatments and medications, though limited in some states, are also being practiced. All of these fall under the third category and can be summarized as the management of the case.This further identifies the needs of individual, family or community the assessment and interpretation of data collected.   Evaluation and execution of plan of care are also being stressed in the practice of such profession. Nurse practitioners also establish collaborative working relationship with physicians to provide comprehensive care and refer patien ts to other health professionals as needed to meet the appropriate health and medical goals.Nurse practitioners with specialization may include other specific activities in their scope of practice in line with their acquired specialty to further serve the target population. For pedriatric nurse practitioner, for instance, one may include the analysis of factors that may affect the child’s growth and development. Studies relating to abnormal and normal development in relation to anatomical, physiological, motor, cognitive, and social behavior of the child may be included in his scope of practice. Women’s health care nurse practitioner may perform fertility counseling and infertility management and may also give prescription and management of birth control pills and diaphragms or provide family planning services.To further improve the scope of practice, there are nurse practitioners that take advance training for certain clinical procedures. These procedures which can be accomplished by nurse practitioners with effective training which depends on previous experience and practice limitations of individual state Nurse Practice Acts.The continuing progress to cope with changing health care needs of the society is the responsibility of the nurse practitioners. They unite the role of being a care resource person, counselor and educator, researcher and administrator especially in the field of primary health care. Members of such profession are liable for the expansion and improvement of the practice of such profession and this can be achieved through involvement and active participation in professional health care organizations and their activities as they ensure that the standards on the scope of practice for nurse practitioners are maintained.ReferencesKozier B., et al. (1998). Fundamentals of Nursing: Concepts, Process and Practice.Addison Wesley Longman, Inc.Nurse Practitioner Scope of Practice. (2007). American College of  Ã‚   Nurse Practitioners .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Retrieved 02 December 2007 fromhttps://www.aanp.org/?pageid=3465Sherwood G. et al. (2007). Defining Nurse Practitioner Scope of Practice:

Sunday, September 29, 2019

Marketing mix success of Xiaomi Essay

Background Founded in 2010 in Beijing, Xiaomi first began by launching custom Android-based firmware- MIUI. Backed by tech savvy early adopters and  enthusiast, it thrived on feedback to improve usability. A year later they entered the hardware market with their flagship phone, the Mi One which featured the top specifications at a low price. Today, Xiaomi has launched it’s 4th series of their flagship phone the Mi 4 and have expanded their product line to mid tier smart phones, smart TV, routers, set-up boxes and other accessories. In just four short years, Xiaomi has become the third largest smartphone manufacturer just behind technology giants Apple and Samsung (Appendix B). Introduction This essay will discuss the marketing mix, a combination of marketing tactics which consist of four elements known as the 4Ps- product, price, place, and promotion that is derived from the marketing strategy of the company (Kotler and Armstrong, 2012) and the efforts made to adapt each mix to reach it’s intended audience in a foreign market. Price Xiaomi aims to provide similar specifications phones to competitors but at a much lower price. Currently they offer 2 series of flagship phones, the Mi and Redmi (or Hongmi). The Mi 3 has specifications that is similar to Sony’s Xperia Z1 that is priced only at CNY 1,999 (USD$322.62) as compared to Z1 retail   price of USD$935 (Appendix C). The Redmi series, a mid tier range is priced at CNY 799, targeting the lower income in emerging markets such as China, India with plans to expand into Brazil and Mexico. As the first company with such an aggressive penetration pricing strategy, Xiaomi changed the perceived value of smart phones (Ramesh Kumar, 2007). Anticipating that consumers would be skeptical about the quality of it’s low priced Redmi series, Xiaomi chose to first launch their top tier Mi before launching Redmi in each new market so that the reduction in market price would not be too drastic and that consumers could gain confidence in the quality (Snoj, Pisnik Korda and Mumel, 2004) of it’s Redmi series. Product Unlike other phone manufacturers that make their products obsolete with product refreshes within a year, Xiaomi’s phones have a longer product life cycle of 24 months. As the product enters the maturity stage, volume sales starts declining. Yet from a technological standpoint, Moore’s law dictates that a longer product life meant that it’s cost to manufacture the same product becomes lower. This decline in volume sales profit will be counteracted by a higher profit margin achieving overall profit sustainability. Similar to Apple & Amazon, Xiaomi has developed an ecosystem of software & services such as cloud service, messaging app, theme store and app store which preloaded to it’s custom firmware. An integral part of this ecosystem is Mi Market (app store) since Android’s default app store is not accessible in China. China’s market for apps has fragmented into many app stores birthed from startups to the likes of search giant Baidu. Thanks to the popularity of Xiaomi’s phones, Mi Market is currently one of the largest app stores in China. Place To eliminate the cuts that retailers and distributors would get, Xiaomi has sold their products entirely online, on their own website. However since expanding into new markets, Xiaomi has more recently adopted a horizontal marketing system to build upon retailer’s expertise in the region. In India, Xiaomi chose a partner to sell exclusively through Flipkart, India’s largest e-commerce company. Xiaomi needs to understand the local distribution methods in order to mitigate the loss of potential customers especially when they employ exclusive distribution which would impair the availability of their products (Pride and Ferrell, 2011). For instance, due to purchasing behavior, cash-on-delivery remains as one of India’s primary mode of payment. Buyers would perform an inspection of the product before payment. In short,  accounting for less than 1% of the total retail market, e-commerce is still in it’s infancy stage in India. As Xiaomi’s mobile phones shifts into the maturity or even decline stages of its product life cycle, it might want to employ selective distribution through traditional brick and mortar stores. Bilgin and Wà ¼hrer (2014) points out that products not adapting to maturity stages will find themselves soon in the decline. In order to prolong it’s product’s life, Xiaomi should change their distribution strategy. Though it may not be economically feasible to sell their phones with thinner profit margins or perhaps even selling at a loss, it should be noted that Xiaomi’s goal is to make profits through services and apps rather than purely hardware sales- similar to the relationship between printers and ink cartridges (Appendix D). Promotion Releasing fixed amount of handsets at specific times, Xiaomi primarily engages in flash sales for new products that often results in phones selling out within seconds. Xiaomi meticulously limits supply to artificially create more demand than supply- a strategy known as â€Å"hunger marketing† (Chen et al., 2014 p. 1950-1957). â€Å"Hungry† consumers through word of mouth created buzz which in due time transits into hype where consumers mimic one another in the buying craze (Mourdoukoutas and Siomkos, 2009 p. 82), further raising demand. In Xiaomi’s advertisements, it is evident that marketing messages are focused on hunger marketing. There is always emphasis on how fast their products have been sold (Appendix D) , editorial tone that communicate a sense of   urgency (Appendix E), statistics to provide an impression of popularity (Appendix F), and multiple teasers for product launch over a period of time to create hype (Appendix G). Conclusion Xiaomi’s marketing mix is a combination of both Apple’s strategy of producing high quality products and limiting supply to magnify consumer hype as well  as Amazon’s kindle strategy of making products as widely as possible and to profit primarily from its services. Though Xiaomi has seen exponential growth in retailing smart phones, it’s key focus should remain in distributing mobile applications and services while maintaining the quality of smartphones instead of diversifying into other electronics. Without the access restrictions in China, Google remains dominant for app distribution as well as its services which are preloaded to every Android phone. Xiaomi must continue to innovate and integrate it’s solutions and services even tighter to it’s own firmware to remain competitive and profitable. It needs to pry it’s customers away from the many alternatives available in the heavily saturated mobile app market perhaps through technological acquisitions or strategic partnerships. References ASSOCHAM, 2014. E-Commerce Evolution in India: Creating the bricks behind the clicks. India: PricewaterhouseCoopers. Bilgin, F. and Wà ¼hrer, G. (2014), International marketing compact, Wien: Linde Verlag GmbH. Chen, E., Huang, K. and Cheng, L. (2013), Xiaomi: China’s answer to Apple, http://asiaresearch.daiwacm.com/eg/cgi-bin/files/china_tech_food_chai n_130925.pdf, Date accessed 15/12/14. Chen, Y., Kuo, C., Jhan, Y. and Chiu, P. (2014) ‘Hunger marketing on smartphone’, Proceedings of the Management of Engineering & Technology (PICMET), 2014 Portland International Conference, Kanazawa, 27-31 July. United States: IEEE Xplore, pp. 1950-1957. Kotler, P. and Armstrong, G. (2012), Principles of marketing, Boston: Pearson Prentice Hall. Kumar, A. (2014), What India taught Xiaomi: On Flipkart, lessons and future plans, http://yourstory.com/2014/09/india-lessons-xiaomi-flipkart-future-plans -hugo-barra/, Date accessed 15/12/14. Pride, W. and Ferrell, O. (2011), Marketing express, Mason, Oh.: South-Western Cengage Learning. Ramesh Kumar, S. (2007), Marketing and branding, New Delhi: Dorling Kindersley (India). Ridge, M. (2014), e-commerce in India: not just cash on delivery to a man on a bike, http://blogs.ft.com/beyond-brics/2014/09/22/e-commerce-in-india-notjust-cash-on-delivery-to-a-man-on-a-bike/, Date accessed 15/12/14. Siomkos, G. (2009), The Seven Principles Of Wom And Buzz Marketing, New York: Springer Berlin Heidelberg. Snoj, B., Pisnik Korda, A. and Mumel, D. (2004) ‘The relationships among perceived quality, perceived risk and perceived product value’, Jnl of Product & Brand Mgt, 13, 3 156-167. Triggs, R. (2014), Hugo Barra talks business models and Xiaomi success, http://www.androidauthority.com/xiaomi-business-model-success-5596 81/, Date accessed 13/12/14. Appendices Appendix A (Selected case article: Xiaomi Flash Sales Prove Popular in India) Chinese smartphone maker Xiaomi, which has overtaken Apple and Samsung in China, is working its way into the Indian market using sudden online sales and high-end handsets priced at close to cost. On Tuesday alone, Xiaomi says it sold 100,000 of its 5,999 rupee ($97) Redmi 1S smartphones in 4.2 seconds. It has sold about 500,000 total handsets using similar sales since its July launch in India, it says. The Beijing-based company sells its products exclusively online through Flipkart, one of India’s largest online retailers, via flash sales at specific times. The phones are sold at close to the manufacturing cost, with Xiaomi making profit through services such as mobile applications. Xiaomi has used the sales tactic in other countries, as well. Analysts say Xiaomi is taking off in the world’s second-biggest telecommunications market because Indians see value in its low-cost products. Word of mouth has created a buzz surrounding the brand, and the  flash sales help create a scarcity of the company’s products. â€Å"The way they carried out their PR was key to the success,† says Karan Thakkar, an analyst with research firm IDC. â€Å"With the flash sales they have created a competitive spirit among the consumer.† While Xiaomi’s market share isn’t yet known, IDC says competition among companies selling low-cost smartphones is expected to increase in the coming quarters thanks to similar low-cost makers, such as Mozilla, which offers a $33 smartphone. Indeed, smartphone sales in India should double through 2018 as devices priced below $200 enter the market, IDC says. Meanwhile, rivals such as India’s Micromax remain skeptical of Xiaomi’s success. â€Å"Selling for PR is different from selling for business,† Micromax Chief Executive Vineet Taneja told media at a launch event for a new phone last month. Micromax, India’s second-biggest smartphone seller by market share after Samsung, sells about three million phones every month through its 130,000 outlets spread across the country. But that hasn’t stopped Micromax from adopting an online sales model. In September it began offering one of its devices on Snapdeal.com, a Flipkart rival. Source: Wall Street Journal http://blogs.wsj.com/digits/2014/10/17/xiaomi-flash-sales-prove-popular-in-i ndia/ Appendix B (Top Five Smartphone Vendors, Shipments, Market Share and Year-Over-Year Growth, Q3 2014 Preliminary Data (Units in Millions) ) Source: IDC Worldwide Quarterly Mobile Phone Tracker, October 29, 2014 Appendix C (Smartphone pricing and specification comparison) Source: Companies, Daiwa Appendix D (Net revenue comparison of hardware vs supplies (Units in millions) ) Source: Hewlett-Packard Annual Report 2011 Appendix E (Typical post flash sale update to inform customers that the sale has ended) Source: Mi India Facebook page Appendix F (Announcement of flash sale) Source: Mi India Facebook page Appendix G (Post Christmas sale infographic) Source: Mi Singapore Facebook page Appendix H (Teaser for new product) Source: Mi Singapore Facebook page

Saturday, September 28, 2019

Berger Paints Bangladesh

The company has been successfully maintaining Its position by developing the quality of the products, adding new features to the products and also by launching new products in the different segments of the paint and Its peripherals. In this pursuit sales management of Berger wants to know evaluate marketing strategy whether there Is scope of improvement. For this they firstly wanted to explore their sales volume/revenue with comparison to marketing effort.They also wanted to know consumer Insight about the marketing communication run by the marketing team. The successful completion of MBA also requires an internship project to be conducted in the attachment of a company. In response to the request of IBA authority Berger management assigned me the Job to study marketing strategy and also to know consumer insight about Berger. 1. 2 Scope of the Report This is a descriptive study. The study will focus on the following things: Functions of Marketing Department of Berger Paints Banglades h Functions of Sales TeamPromotional activities of Berger Paints Bangladesh Analysis of sales growth of Berger Paints Bangladesh Consumer insight about marketing activities of Berger Paints Bangladesh 1. 3 Objective Broad Objective To analyze the marketing strategies of Berger Paints Bangladesh Ltd. Specific Objectives To obtain an overall view of Berger Paints Bangladesh Limited. To explore information about the market position To evaluate the marketing strategy of Berger Paints Bangladesh Limited To analyze sales growth of Berger Paints Bangladesh Ltd In financial terms To recommend mprovement of marketing strategy if required.This is an analytical report endeavoring to explore the marketing strategy of Berger Paints Bangladesh Ltd. The information used is mostly primary and a little part is secondary information. Primary information has been collected through semi structured interviews mostly with probing questions to explore the real and required scenario. The Judgment sampling is used because there was no scope to travel throughout Bangladesh and the work had to be done within the area of Dhaka city. As a result Judgment is used to get the best possible picture of the market.So the primary and secondary sources of information are: The primary sources are: Face to face conversations with the officers of marketing department and sales team. Relevant file study as provided by the concerned officers. Survey on the customers of Berger Paints Bangladesh Limited. Dealers of Berger Paints Bangladesh Limited The secondary sources are: Annual Reports of Berger Paints Bangladesh Ltd. Different circulars issued by the management of Berger Paints Bangladesh Ltd Berger Paints Bangladesh Ltd's website.Brochures and web sites of different paint companies. 1. 5 Literature Review Marketing strategy is a process that can allow an organization to concentrate its (always limited) resources on the greatest opportunities to increase sales and achieve a sustainable competitive a dvantage. Marketing strategy is most effective when it is an integral component of corporate strategy, defining how the organization will engage customers, prospects and the competition in the market arena for success. A marketing strategy also serves as the foundation of a marketing plan.A marketing plan contains a set of specific actions required to successfully implement a marketing strategy. For example: â€Å"Use of a low cost product to attract consumers. Once an organization, via its low cost product, has established a relationship with consumers, the organization will sell additional, higher-margin products and services that enhance the consumer's interaction with the low-cost product or service. † A strategy consists of well thought out series of tactics. Without a sound marketing strategy, a marketing plan has no foundation.Marketing strategies serve as the fundamental underpinning of marketing plans designed to reach marketing objectives. It is important that these objectives have measurable results. olicies, and action sequences (tactics) into a cohesive whole. Many companies cascade a strategy throughout an organization, by creating strategy tactics that then become strategy goals for the next level or group. Each group is expected to take that strategy goal and develop a set of tactics to achieve that goal. This is why it is important to make each strategy goal measurable.So to evaluate the marketing strategy a simple tool is to relate the sales volume of the organization under study. The measurement also includes the long term impact of marketing strategy on consumers in their buying habits. http://en. wikipedia. org/wiki/ Marketing_strategy) 1. 6 Report Preview Introduction to the report, objective, methodology has been given in the first chapter. The information on the paint industry and the company Berger Paints Bangladesh Limited is given in the second and third chapter. The findings and analysis part of the study is in the fourth cha pter.The conclusion is given in the fifth chapter and recommendation in the sixth chapter. 1. 7 Limitation The study faces some limitations in the process of collecting information and also in representing the scenario. These are: Due to the resource constraint the research has been done by Judgmental sampling and is limited within the Dhaka city. Though it covers the main and major dealers, still the market of semi urban and rural part may not be reflected properly. Because of organizational restriction, no name and details of the status of classified information could be revealed.However a good number of local paint manufacturing companies (40 organized and at least 50 more in the informal sector) have been operating in this small market. Quite a few of these companies are producing paints of internationally of the local paint companies is double the present local market demand. The paint market is still mostly concentrated in the urban areas naturally because the number of constr uctions and surface areas are in huge number in the urban side. Urban side contributes almost 80% of the national paint market. But companies are trying to penetrate the semi urban and rural market through the economy paints.Contribution of Urban, Semi-urban and Rural Market in 2006 is shown in the following fgure: Figure 1 : Geographical Market Size (Source: Berger Sales and Marketing Team) The paint industry can be broadly categorized into four segments: Decorative, Industrial, Marine and Automotive paints. Industrial paints are basically specially produced paints, which are used in two ways. Industrial paint is being used in some industries as the raw materials which are the regular consumer of such paints. The segment uses such paint for the protective and maintenance purpose.Marine paints are produced specially for the river and sea going vessels and the automotive paints are being used in the automobile sector. All the rest fall in the decorative category. It covers all the pa ints for the exterior and the interior surfaces of plaster, metal and wood. This is the biggest segment of the paint industry. The category wise existing market condition is given in the following table: Table 2: Category wise paint market size in 2006 (Source: Berger Sales and Marketing Team) The Table shows that decorative paint segment is enjoying almost 81% of the market.The rest is being divided among all the others. It means that still decorative is the main segment for the paint companies to operate successfully. The second significant segment is the Industrial segment. But the marine segment is having growth now a days. The following figure shows the segmentations of total paint market on the basis of the value in Bangladesh. Figure 2: Segments of Paint market (Source: Berger Sales and Marketing Team) The projected broad category wise market size for 2007 is as follows: Category Value in crore (Tk) Decorative 550 12. Industrial 55 1. 03 Marine 32 0. 71 Total 630-650 14. 04 T able 3: Projected Market Size 2007 (Source: Berger Sales and Marketing Team) The Table shows that Decorative segment is projected to enjoy the highest growth of 8. 75% from 2006. The Marine segment is also projected as a significant segment from the growth perspective. In this sector the projected growth is almost 8. 51%. The Industrial segment's projected growth is around 6. 8%. The total growth of the paint market from 2006 to 2007 8. 51%.The decorative paint market can be categorized into three segments based on the ingredients used in the production process: solvent based paints, water based paints and cement paints. The solvent based category includes gloss coatings, varnishes, primers and others and the water based paint category includes distemper, interior as well as exterior emulsions. The detail category wise contribution of the major decorative paints in 2006 is given below.

Friday, September 27, 2019

REPORT ON AM TRANSMISSION AND RECEPTION Essay Example | Topics and Well Written Essays - 1250 words

REPORT ON AM TRANSMISSION AND RECEPTION - Essay Example The following laboratory experiment is a practical demonstration of AM technique with the application of a balanced modulator. First the message signal will be modulated with carrier signal using balanced modulator. The modulated signal is then amplified sufficiently and transmitted through antenna. The transmitted signal is then received through a receiver. Before mixing the signal to local tune, the received signal efficiency is enhanced through a RF amplifier and then shifted to pre-define IF frequency, normally at 455 KHz in AM broadcasting systems. The desired signal is boosted by using an IF filter. It discards the undesired portion of signals. Finally, the original message is recovered using a envelop detector. For modulation of carrier we first we will generate the carrier wave through the application of VCO-LO while the message signal will be generated through signal generator. The whole process involves following steps; After adjusting everything and setting the oscilloscope vertical mode to ALT and trigger on channel 1 as shown in figure (5) bellow, the message signal (M) is connected the oscilloscope channel 1 and channel 2 probe is to be connected to output of the modulator. Now if we vary the frequency of message signal while keeping the amplitude constant the frequency of the Amplitude modulated signal also changes while its â€Å"amplitude† will remain constant as shown in figure (6) on next page. Also the output signal with modulating index 1 and when it over-modulated is shown in figures (8) and (9) respectively below. In case of over-modulation the modulation index will have greater than unity value. Since the condition for envelope detector in terms of modulation is defined as; Now as further step the two-post connector at the output of balanced modulator is connected to â€Å"SSB† and â€Å"AM† terminals while another two two-post

Thursday, September 26, 2019

Intellectual Property Law Essay Example | Topics and Well Written Essays - 4250 words

Intellectual Property Law - Essay Example The TRIPS agreement carries more force than any other provisions established to promote equitable trade and commerce by the WTO, as it is a mandate whose provisions must be adhered to by all participating members of the WTO (Mercurio, 2004). The TRIPS agreement attempted to provide flexibility for member nations who might receive fewer benefits from the mandated patent rights stipulations; however, soon after its implementation it became apparent to many observers and participants alike that the provisions of the TRIPS agreement were more favourable to economically privileged nations than to member nations of the so-called third world (de Almeida, 1990). One of the most disheartening consequences of the TRIPS agreement was that it had the effect of limiting access to life saving drugs by poorer nations who could not afford the high cost of pharmaceuticals while under patent protection (Mercurio, 2004). This resulted in long delays (often years) between the development of new drugs to treat disease endemic to poorer nations such as HIV-AIDS and their availability in these countries (Abbott, 2005). In its attempt to level the playing field, so to speak, and offer all WHO member nations the same rights of protection for inventions, novel technologies and processes, the TRIPS agreement overlooked the basic fact that member nations of the WHO are not a level playing field, but have individual economic bases that would be unequally served by the implementation of this protective mandate (Ewelukwa, 2005).

Marketing report (Analysis & SWOT ipod touch or iphone 4) Essay

Marketing report (Analysis & SWOT ipod touch or iphone 4) - Essay Example Apple’s target market is often young and middle aged adults looking for excitement on the go and it’s because of this reason that Apple has developed products which offer the entertainment element on the go. Consumers can rip their music, videos and photos on their devices and carry them and use them wherever they go. Apple has also attempted to target young professionals by offering them products like Apple IPhone and Apple IPad to check their emails, surf internet as well as watch videos and movies anywhere anytime. The overall marketing mix of the company is based upon offering premium products through its own chain of stores and other partners besides having an online store. Further, the brand recognition of Apple has reached to a level where its products are self selling in nature. This report will present a situational analysis of one of its newly launched products i.e. Apple Iphone 4 with special reference to London, UK. Situational Analysis This section will dis cuss both the internal as well as external environment of Apple Iphone 4 with first section will be on the assessment of the internal environment. Internal environment Iphone 4 is a sequel to the much successful Iphone product line of Apple which has overtaken the smartphones market by storm. Based on the Apple’s own mobile operating system, this product combined the Apple’s already successful MP3 Player IPod with the added utility of mobile phone and other applications. The IPhone therefore was the result of the vision to combine music and mobile communication on the go while allowing consumers to check their emails, surf internet and use so called apps on their Iphones. It is also important to note that Iphone 4 comes with added features such as retina display, face time as well as with iBooks where consumers can actually read the eBooks on their Iphone4. (Apple Inc, 2010). These features were absent from the earlier versions of the Iphone. Apps have also proved a re ally an important source of not only improving the productivity but also created fun and excitement for the users also. (Sintumuang, 2011) Like its predecessor, Iphone was targeted as the young and middle age individuals who were looking for some added functionalities in the phone. Apple therefore has followed the segmentation strategy based on people rather than on markets. (Asay, 2010) Iphone 4 comes with the face time utility allowing users to make video calls besides enjoying high speed internet. Consumer trends therefore suggest that the customers are willing to pay the premium price for the product given the brand name and product quality of the phone. It is also important to note that Apple faced a rather tricky situation at the beginning of the launch of Iphone due to some technical issues which somewhat distracted the customers. However, the situation was overcome and the new models are now being sold with further technical refinements. A closer look at the marketing mix si tuation of the product would suggest that Iphone4 is priced at premium and is sold in the range of ?500 to ?6201 for two different models according to the storage capacity. Pricing of the product therefore suggest that Apple is charging premium for the quality and breadth of services it provides through its allied service iTunes. Product is mostly distributed through

Wednesday, September 25, 2019

Nanomaterials in Consumer Products Research Paper - 1

Nanomaterials in Consumer Products - Research Paper Example At the same time in the business dimension, there are still concerns about the nanotechnology effect on global economics. The use of nanotechnologies is on the rise because it is very effective. There are numerous products on the market with additional ones coming in day after day. Most of the viable products for use by the public are duped as the first generation. Some of the available products in the market include tritium oxide that is used in most of the surface coatings, cosmetics as sunscreen at the same time is employed in some food additives, carbon allotropes are used to produce gecko tape. Lastly, one of the most commonly used material in this technology is a silver. It has been used mostly as an antibacterial in household appliances(Suh et al., 133). Zinc oxide is used in most sunscreens and surface coating, outdoor furniture furnishes, paints and cosmetic. Lastly cilium oxide is used as fuel catalysts. Silver is one of the materials used in the production of nanotechnology equipment. It can be used in food packaging, disinfectants, household appliances and clothing. Further, the silver ionic nanoparticles can be used for washing machines, air conditioners, refrigerators Samsung vacuum cleaners and air purifiers as part of the household appliances used. Silver nano coating is used in most of the Samsung home appliances to protect the household from bacterial infection. Most of the appliances are coated with silver nano that has both antifungal and anti-bacterial effect. Thus, it keeps the place clean and free from contamination by microorganism. For instance, the Samsung fridge is coated with this silicon on the inside hence killing this microorganism by cellular metabolism hence preventing further growth. According to Hoek & Ghosh, (5) the silver nanotechnology is used to sterilise equipment against 650 types of bacteria. The machines do so by eliminating about 400 billion silvers ions that penetrate deep

Tuesday, September 24, 2019

Inclusive Education in UK Essay Example | Topics and Well Written Essays - 3000 words

Inclusive Education in UK - Essay Example (Mitchell, 2005) Some philosophers argue that inclusion is the act of inviting others in or integrating others into the mainstream. (Asante, 1996). This premise stems from the fact that some people in society have always been treated unfairly. Society has been historically unjust to certain categories of individuals. These include racial minorities, handicaps and others. Proponents of such a definition claim that people who have been sidelined in the past need to be 'invited in'. One can therefore extend this definition of inclusion to the field of education where inclusive education may be defined as a form of education that facilitates integrating those who have been neglected in the past 'in'. However, one cannot help but see some of the loopholes that emerge from such a definition. First of all, who has a right to invite others in Additionally one should examine what are the causes of exclusion in the past. It should be understood that all persons have equal rights in education. No single person should have the upper hand to decide another's fate. (Hanson, et al, 1998) A more acceptable way of looking at inclusive education should include the acknowledgment of the fact that all human beings are born equal and that society is given the responsibility of supporting those who have special needs. The Centre for Studies on Inclusive Education came up with a more comprehensive definition of inclusive education. They state that inclusive education refers to inclusion of all manner of children in schools (high school, universities, colleges and preschool) regardless of their disabilities provided they are given all the support they require. They assert that inclusion should encompass the community and life in general. It involves the acknowledgment of the fact that some pupils or students may need more support. The support should be provided by a number of stakeholders ranging from local governments, education agencies and education sponsors among others. However, there is a need to modify this kind of definition because it does not include the element of continuity. (Lieber et al, 1998) The most acceptable and comprehensive definition was put forward by CSIE, two years later. They described inclusive education as the continuous process of including students in mainstream classrooms, the community and local culture. It also involves reducing the level of exclusion in the latter mentioned realms. It also involves the elimination or reduction of obstacles in education and participation. It should be noted that this definition is more dynamic and highlights the fact that schools/ communities cannot adopt inclusion overnight. This is something that gradually changes with time. It should also be noted that this definition avoids the use of integration and emphasises inclusion instead. The reason for this is that integration tends to imply that some people are more equal than others and that the former have a right to 'integrate' others into their own systems. Advantages and disadvantages of inclusive education Advantages Inclusive education is more beneficial than it is detrimental. Even criticisms labelled against inclusive education are simply based on the fact that the program was not implemented properly. If it is implemented in the right way, then inclusive

Monday, September 23, 2019

Trend and analysis of SLS hotel external environment Research Paper

Trend and analysis of SLS hotel external environment - Research Paper Example The SLS Luxury brand caters to a specific class of people who desire a lifestyle of high-class service, sophistication, â€Å"over the top† luxury, and an atmosphere that fulfills these needs. SLS Hotels have created a new paradigm in the luxury hotel experience that speaks to a global, sophisticated audience. â€Å"SLS† stands for â€Å"style, luxury, and service. This speaks to the needs of today’s sophisticated travelers, offering an array of widely customizable features and an unwavering commitment to innovation and superior guest service (Hotels, 2014). The sort of products and administrations requested by customers is generally impacted by their convictions and state of mind which, on the other hand, are affected by social molding. The surrounding social entities and the associated activities. The Hollywood presence, for instance, presents the hotel with great opportunity for the constant flow of clients who even stay for longer periods. The hotel location is a great contributor to the accessibility by the target population who include the diplomatic tourists and business persons in Los Angeles. Beverly Hills and Los Angeles, in particular, is a popular destination for people seeking luxury and high-class lifestyle. The Hollywood movie industry, high-end shopping options and opportunities, beaches and resorts such as Santa Monica Pier and Venice boardwalk, attractions such as the Universal Studios, many museums and cultural events in L.A constitutes to the main social factors that make the destination popular (Enz, 2009). Being an economic hub, Los Angeles provides the hotel with an adequate supply of market as business people from all over the world frequently come to the city for conferences (Hotels, 2014). The growing population of Beverly Hills is also a social factor to consider. Currently, the population of the city stands at over 34,000 people. However, the population has various demands depending on the age-group and socioeconomic factors.

Sunday, September 22, 2019

Research Paper for History of Bowling Essay Example for Free

Research Paper for History of Bowling Essay The original ninepins game became very popular. Because gambling during the game was prevalent in many areas, a law was enacted to prohibit ninepin bowling. A tenth pin was added to create the game of tenpins in order to get around the law. That happend probably between 1820 and 1830. Terms For Scoring Double: Two strikes in a row. Converted split: Knocking pins in a split formation down with the second ball. Frame: Box in which the score is registered on score sheet. Line: A complete game as recorded on the score sheet. Mark: Making either a strike or a spare. Miss: Pins remaining after two balls have been rolled, except in case of a split leave. Open Frame: Frame in which neither a strike nor a spare has been made. Spare: Knocking down all ten pins by rolling two balls. Strike: Knocking all ten pins down with the first ball. Turkey: Three strikes in succession. Terms For Handling the Ball Grip: Ability to move your fingers in and out of the ball easily and still have a firm hold on the ball. Span: The distance between the thumb and finger holes. Weight: Beginning girls between 10-14 lbs. nd boys between 12-16 lbs. The ability to roll the ball easily and accurately should be considered. Terms For Delivery of Ball Approach: Area on which the bowler takes steps to the foul line and makes his delivery. Backup: Ball that fades to the right as it nears the pins (right-handed player). Brooklyn: A hit to the left of the headpin. Cross Alley: Aiming and rolling the ball directly at the pocket from the right -hand corner or left-hand corner on the leave. Curve: Ball that approaches the pins in a greater arc, usually slower, than a hook ball. Foul Line: Black line which separates the runway and the lane and designates the limit of the bowlers approach. Foul: Act at the foul line not in conformity with the rules. Headpin: Number 1 pin. High: Ball hits full on the head pin. Hook: Ball breaks sharply to the left as it approaches the pins. Leave: Any pins left standing after the first ball has been rolled. Light: Not hitting the pin full enough. Lofting: Throwing the ball too far out on lane due to release from an upright position. Pocket: Space between the one and three or one and two pins.

Saturday, September 21, 2019

Online Course for Phishing

Online Course for Phishing Ahmed Hassan Al-Asmari Applied Phishing PROJECT in TI-ANS-ANS-TTC The report aims to provide an online course for Social engineering (phishing) for TTC students. The proposed course is designed based on the approach of research based learning. Proposed design of the circuit is supported by the theory. The report aims to provide an online course for ICT department. The expected result is to provide a new learning course for security information Provide a new content, types, problems, solutions and how to informed about phishing technology. What is phishing? Its technique used to steal personal information through spamming, fake websites, unofficial applications or other deceptive means, thats means someone create a website which resembles original website 100% and the website which created asked for specific data such as request information entry or data update or add credit card and so on. So, this way is start by sending a message which similar to the message the original company and the content of message request to entry the link to update data, sometimes the link malicious files which help phishersto control device and steal data. To avoid Internet phishing, people should have knowledge of different types of phishing techniques and they must also be conscious of anti-phishing techniques to defend themselves from getting phished[1]. 2.1. Phishing Techniques 2.1.1. Email / Spam Phishing by using email or spam are most common phishing scam. Phishers can send the similar email to millions of users, requesting them to loading personal data. The information which are steal will used for unlawful ways. Most of the message have a note which ask users to enter the personal information to update and verify accounts. Sometime, phishers asked you to fill a form to access to a new services(Figure1)[2]. 2.1.2. Instant Messaging Instant messaging is one of the phishing ways which used by sending a message provide a link that direct user to fake website, thats website are similar to the original website. So, If user dont check the URL of this link, then he will fall on the phisherhand, sometimes its going to be hard to find out the different between the original and fake URL. Then, link contain form which phisher asked to fill(Figure2[3])[1].   Ã‚   2.1.3. Link Manipulation link manipulation is one methods that phisher use in websites by sending a link and when user click the link it will start to direct user to the phisher website instead website which in the link. The way to prevent link manipulation is to put the indicator of mouse over the link to check the real link(Figure3[4])[1]. 2.1.4. System Reconfiguration Phishers may send a message that asked the user to change the settings of the computer. The message might arrive from a web address which comparable an official source. For example: URL can be modified by phishers to direct victim to a fake websites. For example: a URL website of a FACEBOOK may modified from www.facebook.com to www.facebo0k.com[1]. 2.1.5. Phishing through Search Engines This is one of phishing scams and that by using search engines which direct the user advertisement sites which may present low price products or services. So, when the user select some of these offers and begin to put data of the credit card, then its collected by the phishing site(Figure4[5])[6]. 2.1.6. Phone Phishing The phisher may also used phone by making calls to random users and request them personal details about bank account or any others information and the phishing caller may be automated response. They may be friendly with you, start calling you by your first name and asking you about your family. They may act working in a company you trust and asking to update your accounts or asking for credit card. So, we see that kind of phisher have a little information about you before the call and after the call, they may get all the data they want to complete steal whole data. 2.1.7. Malware Phishing Phishing scams malware its one of the technique need to be run on the users PCs. The malware is typically linked to the email sent to the user by the phishers. Once you get on the link, the malware will begin to publishing and causes damages inside PC. Sometimes, the malware attached to downloadable files. phishing was spread around the year 1995, but they was not known to people until few years. So, this is negative point for people who does not take a careful and about the phishers because they maybe make a serious problems in one day. So, it is helpful to have a basic understanding of the behind them[7]. Most of the phishing scam are successful and that because people dont know about scam methods which phishers use it. So, there are several ways to avoid to be a victim. We can get the idea about those list which may help to prevent phishers to steal your information and be aware about the following list: Keep Informed about social engineering techniques specially phishing techniques so that will help you to have an information about the methods scams that phishers use it and you know the ways to prevent all scams. Install an Anti-Phishing. So, a lot of popular Internet browsers can be Associated with anti-phishing toolbars. So, this is a common way to prevent the phishing through search engines or websites, anti-phishing toolbar can alert you from fake websites by blocking it. Such as AdBlock. Verify a sites security: its important that websites you visit are security and free from fake advertisement and illegal products. So, keep informed about the websites URL which should have to begin with https. Also, you should see an icon lock close to the address URL. Also verify the certificate of websites security. Verify your online accounts periodically as long as you dont visit your online account for a long time, verify each of your online accounts periodically and changing your passwords regularly too. Its good that each of your accounts has different password. Use best firewalls: you can use two option kinds: a desktop firewall and this is a software type install in your device, second is a network firewall this is a type of hardware which are in a routers or switches. Never Give Out Personal Information. Use Antivirus Software. Use an Alert Password from Google to alert you from phishing. We see here in this figure5 the cycle of phishers witch they move with each steps when they target personals or companies. figure below will explain this cycle more(Figure5[8])[9]: What do you think about your passwords. Do you use just one or simple to figure out variations on just one? If you do both, you shouldnt, because youre making it easy for a phishers to get access to your personal information. Every password for every site or different accounts should be different. Letters numbers and characters work best to keep password difficult and hard to get. Change them repeatedly. The special programs for internet security and system of device can help you to keep follow of your passwords. Because Google are the famous company and has too many users, Its important to set high level of security to protect users information. So, from the phishing side, Google has created a new tool which can secure users data from phishing. The main idea of this tool is to alert user when the password of account are entered in other original google.com. So, if user receive a message in e-mail and this mail are look like original webpage of Google and with a link asked you to change or update your password account. Then you click the link and start to direct you to another website and stealing your personal data. So, this tool from Google will alert you when personal data are entered in other Google account and trying to follow and show the suspicious signup page and alert you before you enter your personal data and password(Figurs6[10])[11]. There are several target in a phishing: the end users, businesses, the computer compromised to host fraudulent sites and the ISP hosting the email address. So, phishing want to get the important information from those to get all permission to control[12]. I think about the most common type of phishing technique are used is E-mail phishing so far. I chose that type because I see that in every news, TV, websites and social media. The last attacks which happen in Saudi Arabia in Jan 2017 by the virus which called SHAMOON by Green Big groups. This virus targeted most popular company in Saudi Arabia like ARAMCO and Communications and Information Technology. The virus was working for several attacks like send an E-mail to the employs of the ARAMCO company which include the malicious link and the message is similar to original messages of the company. Then, some of the employs are failed in this E-mails and the viruses are distribution and made a huge damage like stole information and delete all the data stored on the computers. So, I chose this type which is most common because of this story happened in 2017 and there is no way to stop it until we make a strengthen the defense of this attacks before happening[13]. Alic and Bob are the names used in scenario security characters. This names are chosen based on the letters of the alphabet (A)lic and (B)ob. Discoverer of this theory put names of people to make it easier to understand and study. If we suppose that Alic are sending a private messages to Bob by postal mail. Alic knew that postman are reading the message she sends. She thinking to find a way to send a message without anybody read it. So, Alic buys a lockbox and two keys (Encryption Decryption) to open it and meet Bob to give one of this keys. Alic put the message inside this lockbox. The postman cannot read the message or open it or looking through the lockbox. So, after the message delivered to Bob, he can use the key to open the lockbox and read the message. So. Bob as well can use the same method to send a message to Alic and they are sure about the security message exchange and this is called a symmetric key encryption. Lets keep continuo with Alic and Bob. Now, Bob buy a new padlock which is open and put it with the message in the lockbox and keep the key of the padlock with him. Alic receive the lockbox and buy a similar padlock which Bob sent it with the message, and puts her message and the new key of her new padlock in the lockbox. Then. she locks it with the Bobs padlock and send it to Bob. Now Bob can read the message and get the key of the padlock Alics. So, Alic and Bob can exchange messages as they want safety. If we suppose that Alic are person (A) and Bon are person (B). A want to send a private message to B but person A discover that some person who is trudy are reading the private message when send it to B. So, A thinking about some method to encryption the message when send by add a code with so that message cant opening and read until insert that code. Then, A send a message after give the code to B to decryption the message so he can read it and no one than A and B can decrypt the message because they have the same keys to encrypt and decrypt it. This method called encryption and decryption and the keys are called Symmetric-Key Encryption. Lets suppose that we have two persons Mohammed and Abdullah want to exchange encrypted messages so that no one can see it. Mohammed comes through a particular program (browser in case SSL) and produces two keys associated with each others one public key and the second are the private key. Mohammed then sends the public key to Abdullah by any method. Abdullah uses this key and encrypts the message that he has by the public key who sent by Muhammad public key. And then sends the encrypted message to Muhammad. Mohammed then decrypts the message code via the private key which is with him and associated with the public key. So, Muhammad can encrypt a message with the private key and Abdullah decrypts the message through the public key. [1]Phishing Techniques | Phishing.org. [Online]. Available: http://www.phishing.org/phishing-techniques/. [Accessed: 25-Oct-2016]. [2]The Online Service Message Email Is A Google Account Phishing Scam., Facebook Tips, 06-Jun-2011. . [3]My Computer: Text message phishing scam, My Computer. . [4]Watch Out For Facebook Phishing Scams | Simple Industries, Inc. [Online]. Available: http://www.simpleindustries.com/2010/10/tech/watch-out-for-facebook-phishing-scams.html. [Accessed: 20-Feb-2017]. [5]Ads on popular Search Engine are leading to Phishing Sites. [Online]. Available: https://www.govcert.admin.ch/blog/16/ads-on-popular-search-engine-are-leading-to-phishing-sites. [Accessed: 20-Feb-2017]. [6]Ads on popular Search Engine are leading to Phishing Sites. [Online]. Available: https://www.govcert.admin.ch/blog/16/ads-on-popular-search-engine-are-leading-to-phishing-sites. [Accessed: 28-Oct-2016]. [7]History of Phishing | Phishing.org. [Online]. Available: http://www.phishing.org/history-of-phishing/. [Accessed: 25-Oct-2016]. [8]L. Meleney, Dyre Malware Has Stolen Over $1 Billion: Is Your Companys Sensitive Data at Risk? [Online]. Available: http://blog.baymcp.com/blog/dyre-malware-has-stolen-over-1-billion-is-your-companys-sensitive-data-at-risk. [Accessed: 20-Feb-2017]. [9]Dyre Malware Has Stolen Over $1 Billion: Is Your Companys Sensitive Data at Risk? [Online]. Available: http://blog.baymcp.com/blog/dyre-malware-has-stolen-over-1-billion-is-your-companys-sensitive-data-at-risk. [Accessed: 28-Oct-2016]. [10]Phishing prevention with Password Alert FAQ G Suite Administrator Help. [Online]. Available: https://support.google.com/a/answer/6197508?hl=en. [Accessed: 20-Feb-2017]. [11]Password Alert. [Online]. Available: https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep. [Accessed: 28-Jan-2017]. [12]R. D. Vines, Phishing: Cutting the Identity Theft Line. John Wiley Sons, 2005. [13]Saudi Arabia warns on cyber defense as Shamoon resurfaces | Reuters. [Online]. Available: http://www.reuters.com/article/us-saudi-cyber-idUSKBN1571ZR. [Accessed: 11-Feb-2017]. [14]What Is SSL (Secure Sockets Layer)? | DigiCert.com. [Online]. Available: https://www.digicert.com/ssl.htm. [Accessed: 12-Feb-2017]. [15]HTTP to HTTPS | What is a HTTPS Certificate. [Online]. Available: https://www.instantssl.com/ssl-certificate-products/https.html. [Accessed: 12-Feb-2017]. ACADEMIC HONESTY DECLARATION I, the undersigned, declare that the attached assignment/project is wholly my own work, and that no part of it has been: copied by manual or electronic means from any work produced by any other person(s), present or past, produced by several students working together as a team (this includes one person who provides any portion of an assignment to another student or students), produced by automatic tools or aids modified to contain falsified program output, or copied from any other source including web sites, except as directly authorized by the instructor. I understand that penalties for submitting work which is not wholly my own, or distributing my work to other students, may result in penalties. Full name: Student Number: ___________________ Signature