.

Sunday, March 31, 2019

Overcoming Barriers to Inclusion for Physically Disabled

Overcoming Barriers to Inclusion for Physically DisabledSpecial fosteringal Needs (SEN) argon encyclopaedism differences, difficulties or disabilities that wanton away it harder for a peasant to learn than other(a)wise inwardly their peer group. This could be behavioural difficulties, emotional, favorable and intellectual difficulties.Defining inclusion body refers to the process of educating students with disabilities along with their world(a) peers. The general goal is to allow pip-squeakren with disabilities to be educated with their peers in the regular tutorroom to the maximum extent appropriate for the learning in the least restrictive environment. For some children this means being with typical peers all day and for others it whitethorn mean, mainstreaming. (www.amazon.co.uk 2009)The inclusion process is dependent on the child individual carry off they use an Individual Education Plan (IEP) team for example p atomic number 18nts, teachers and other school day staff put strategies together for inclusion. The IEP is the basic right of both child with a disability. Physical educational quarter provide some(prenominal) positive benefits for pupils with or without disabilities. Physical Education (P.E) can provide the chance to companionableise with peers and develop relationships has well as developing their motor skills. numerous children with disabilities do not give the opportunity to socialise outside of school hours or participate in physical activities. They depend on this interaction to meet their social necessarily. (www.amazon.co.uk 2009)Researchers frame that for those who are fortunate to participate in an inclusive education do find themselves to have more self worth. On the downside, teachers attitudes to inclusion have a direct effect on inclusion gaining. If teachers are not open and tolerant to the childs physical needs the child go forth not be has relaxing and benevolent. Teachers need to be patient with stude nts who learn at a sluggisher pace and exact the responsibilities of incorporating activities to suit regardless of ability level. Its compulsory that teachers sees the children first then clear the disability.Many change children were considered has in educable until 1970. Before 1970 children were segregated from their families and put into peculiar(prenominal) hospitals or institutions. In 1978 the Warnock Report was the biggest ever investigation into SEN (Special Educational Needs), this bill put the issues of integration of handicapped children in mainstream schools for the first time. (inclusion.uwe.ac.uk)Nearly 30 years after Baroness Mary Warnock inclusion into mainstream school, she acknowledges that inclusion had failed. Mary Warnock declared and admitted that schools did not al itinerarys provide properly for children with disabilities and proposed a radical fall over of the system. (Guardian 2008)Since the revision of the SEN code of come there have been sever al changes for the better. SENCO, guide on teacher and governing body with other members of staff have an imperative responsibility in the role of providing an inclusive education for those with disabilities. SENCO welcomed the SEN code of practice but they were still interested with some of the difficulties they were face up in implementing the code. The difficulties they were facing were the omit of resources, time constraints and low status. However the codes of practice have extend more effective in their provision for pupils with disabilities by setting them in the altogether targets.In recent years teaching assistance has been working alongside teachers to give extra endure for children with SEN. Having the extra support in classrooms overhauls proficient mainstream education for all instead of segregation into separate special schools. behind OBrien an inclusion consultant says that adults have an important role in service of process children to build responsible r elationships with each other, especially when those relationships are across a social fracture line like race, gender and disabilities. Developing (inclusion.uwe.ac.uk 2009) inclusion means ending segregation, inclusion is a developing process and is concerned with breaking barriers to help learning increase.During the 1980s and 1990s there was much(prenominal) investment in new special schools to meet the needs of children with learning and physical disabilities. The motivation for these separate schools was that mainstream education was unable to provide the excess support and care that was required.Since the start of the 21st century there has been a political shift in thinking with many special schools closedown or merging with their nearest primary or secondary school or college. The social aspect of education is crucial to all learners and that a persons learning or physical difficulties are best met in an inclusive social environment. (www.pedagogy 2009)There are a range o f barriers that children face, the three I looked at were inclusion, barriers to inclusion and multi influence working.Inclusion came into force in 1990 and the inclination for this new legislation was to eradicate potential barriers. This was so children could benefit in full from an effectual inclusive education.The belief behind the new legislation was to allow in all regardless of their hurt to a full time education and for them to grow to the best of their ability. Even though society has moved forrard there is still some segregation. Current legislation should be seen in a chronological context as part of a slow process of change for the better. about barriers children also face are the lack of motivation due to it being painful and tiring for them. However for centripetal and learning disabilities the world may seem disorganised and baffling because of their impairment.another(prenominal) barrier children also face is over protective parents, treating their children c hildlike and unable. and then it is often a great concern for parents when their change child starts to converse and assert themselves. For many disenable children it is important part of their life to express their identity and feeling (inclusion.uwe.ac.uk 2009). The aims of the Multi Agency Services are to work for disabled children. The operate are to provide families with an effective team of supporters to help families in managing their disabled childrens complex health care needs at home. The multi means is working and making a significant difference to children and their families. However a number of social and emotional barriers for families still remain. (pg 78 making a difference). Mainly families still beat with daily routines (such as sleep deprivation) to seek to sort out social activities for themselves and their disabled child. The multi agency service had enabled families to con breaks and day trips to elevate some of the pressure of being their childs twen ty quaternion hour carer. There are also some families with a disabled child or children who receive no support with help in calming benefits despite being on a low income. Some families felt that there was a lack of co-ordination and flexible support from the multi agency services thus leaving them to suffer emotional pressure.Even though Multi Agency Services had helped some children they are still faced with a multiple of barriers. The barriers they face where exercising their basic human rights, this included feelings that they could not have the rights to communicate, the rights to be independent, the rights to develop friendships and relationships, and to participate in ordinary unemployed and recreational activities and the right to be consulted and informed about their care and support. (pg 78 Making a Difference). Although there is still room for improvement within the multi agency service, Overall families that have been involved with the agency have describe that they felt their quality of life had improved.The models of disability provides a framework for thought the way in which quite a little with impairments experience disability, This helps society to understand the concussion society has on impairments. There are two main models which are the social and medical model.The social model has been designed by disabled people. People with a disability says that barriers exist within society and the way society is organised. Before the social model had been developed disabled people felt that they had to voice their opinions because society would discriminate and exclude them from society. The aim for the social model is to remove barriers so that a disabled person can have the same opportunities has everyone else. Society has started to change because a person with impairment can use public transport and gain full door to building thus making them no different to an able body person.Under the medical model disabled people are de set apart b y their illness or medical condition. Disabled people are often seen as the problem in society and that its them who should learn to aline to society and not society to them. The medical model view that disabled people need to be cured or cared for and professional apologise that its acceptable for a disabled person to go into a specialized school or being isolated at home where completely their basic needs are met. The professionals determine which school the child will attends and the sort of education supplied. The professional are the ones creating some barriers has it will limit their opportunities, thus creating stereotypes who will pity, fear and patronise them instead of working together for a inclusive environment. (www.fepdfscotlandIn conclusion barriers are starting to be knocked down and people with impairments are starting to be heard. Disabled children indispensability to be respected and callened to and to be able to play with friends, to feel base hit and be c omfortable. Some other potential barriers were that children faced were feelings of segregation has they would be left out of day to day activities. Some people take for granted that having a disability would prevent the children from having fun thus resulting in isolation. Some families also reported that they did not know where and how to get help and the other barriers they face were actually persuading someone that help was needed. Their Families also found that the provisions they were finally provided with was too little and too late to make the best possible improvement to the quality of their passing(a) life. For the disabled child parents they found that they miss out on full entitlements to benefits because some services tended not pass on the proper information needed. Some other potential barriers families have faced were the very long waiting list for intervention, equipment and adaptions which meant the loss of integration for children and their needs. Families with d isabled children have a real struggle with finding the right services and information to suit their childs needs and when they do finally get the right sort of help they always have to repeat their painful stories to different members of staff. Some services tend to work towards their own priorities rather than what best for the child, this is a particular issue in the transition from childhood to adulthood where they need to consider options of accommodation and body of work depending on the person individual needs. Families also found it harder to contribute to everyday life in ways where non-disabled families took for granted. At worst, this can result in social exclusion for all the family. (www.audit-commission 2009) restricted access, service gaps or hector culture put pressure on the whole family. For many children and families there tends to be at least one outstanding member of staff that will give the family support, empathy and expertise. Having such expertise has given the families of disable children the support required which have helped make a difference in a small way. Other staffs as demonstrated a child- centred approach and motivation to work beyond their strictly defined role.

Security information and event management

pledge info and tied(p)t warinessIntroduction guarantor selective information and solution Management (SIEM) automates incident identification and resolution based on streng thened in melodic phrase rules to jock improve configuration and alert lag to critical intrusions. IT audits, standards and regulatory wantments have now become an important fraction of to the highest degree enterprises day-to-day responsibilities. As part of that burden, organizations ar spending substantial quantify and energy scrutinizing their gage and event poundarithms to track which dusts have been accessed, by whom, what activity took place and whether it was appropriate. Organizations be increasingly human faceing towards information-goaded automation to help ease the burden. As a result, the SIEM has taken form and has stomachd focused solutions to the problem. The protective c all over information and event focal flower market is driven by an extremely increasing quest for c ustomers to meet conformation requirements as well as continued necessity for concrete- age awareness of foreign and internal holy terrors. Customers posit to analyze certificate event data in palpable time (for affright charge) and to analyze and typography on logarithm data and chiefly this has made aegis system information and event focussing market much(prenominal) demanding. The market sojourns fragmented, with no dominant vendor.This report entitled Security training and solution Management (SIEM) Solutions gives a clear view of the SIEM solutions and whether they tooshie help to improve intrusion espial and response. Following this introduction is the primer coat section which deeply analyzes the evolution of the SIEM, its architecture, its relationship with the log management and the get hold of for SIEM carrefours. In the epitome section, I have analyzed the SIEM functions in percentage point along with real world examples. Finall(a)y the conc lusion section summarizes the paper. sceneWhat is SIEM?Security Information and Event Management solutions are a combination of two dissimilar products namely, SIM (security information management) and SEM (security event management). SIEM technology provides real-time synopsis of security alerts generated by network hardware and applications. The objective of SIEM is to help companies serve to attacks faster and to organize push-down storages of log data. SIEM solutions come as software, appliances or managed services. Increasingly, SIEM solutions are being used to log security data and generate reports for compliance purposes. Though Security Information and Event Management and log management tools have been complementary for years, the technologies are expected to merge.Evolution of SIEMSIEM emerged as companies free-base themselves spending a lot of m peerlessy on intrusion light uponion/prevention systems (IDS/IPS). These systems were helpful in detecting external attac ks, exclusively because of the merged trust on mite-based engines, a tumid number of false positives were generated. The commencement-generation SIEM technology was designed to condense this signal-to-noise ratio and helped to capture the most critical external threats. Using rule-based correlation, SIEM helped IT detect real attacks by foc use on a subset of firewall and IDS/IPS events that were in violation of policy. Traditionally, SIEM solutions have been expensive and time-intensive to maintain and tweak, but they cypher the big headache of sorting finished excessive false alerts and they efficaciously protect companies from external threats. While that was a timber in the well(p) direction, the world got to a greater extent complicated when new regulations such as the Sarbanes-Oxley lick and the Payment Card Industry Data Security Standard followed much stricter internal IT controls and assessment. To satisfy these requirements, organizations are required to suck in, analyze, report on and get by in all logs to monitor activities inside their IT infrastructures. The idea is non solo to detect external threats, but overly to provide periodic reports of user activities and defecate forensics reports surrounding a given incident. Though SIEM technologies collect logs, they bear upon only a subset of data related to security breaches. They werent designed to take the right-down volume of log data generated from all IT comp matchlessnts, such as applications, switches, routers, databases, firewalls, operational systems, IDS/IPS and Web proxies. With an idea to monitor user activities rather than external threats, log management entered the market as a technology with architecture to handle much larger volumes of data and with the ability to extend to meet the demands of the largest enterprises. Companies employ log management and SIEM solutions to satisfy different employment requirements, and they have to a fault light upon out tha t the two technologies work well together. Log management tools are designed to collect report and archive a large volume and breadth of log data, w here(predicate)as SIEM solutions are designed to correlated a subset of log data to point out the most critical security events. On looking at an enterprise IT arsenal, it is possible to see both(prenominal) log management and SIEM. Log management tools often assume the exercise of a log data warehouse that filters and forwards the necessary log data to SIEM solutions for correlation. This combination helps in optimizing the return on investment magic spell also reducing the cost for implementing SIEM. In these tough economic time it is likely to see IT trying to stretch its logging technologies to solve even more problems. It leave al ace expect its log management and SIEM technologies to work impending together and reduce overlapping functionalities. Relation between SIEM and log management Like umpteen affaires in the IT i ndustry, theres a lot of market status and buzz coming around regarding how the original term of SIM (Security Information Management), the succeeding marketing term SEM (Security Event Management), the newer combined term of SIEM (Security Information and Event Management) relate to the long standing process of log management. The basics of log management are not new. Operating systems, spins and applications all generate logs of almost sort that contain system-specific events and notifications. The information in logs whitethorn vary in overall usefulness, but before oneness freighter derive much value out of them, they first need to be enabled, then transported and finally stored. in that respectfore the way that one does gather this data from an often distributed escape of systems and get it into a centralized (or at least semi-centralized) location is the first challenge of log management that counts. There are varying techniques to accomplish centralization, ranging from standardizing on the syslog mechanism and then deploying centralized syslog servers, to using commercial products to verbalize the log data acquisition, transport and storage issues. Some of the other issues in log management include working around network bottlenecks, establishing tried event transport (such as syslog over UDP), setting requirements around encryption, and managing the black data storage issues. So the first steps in this process are figuring out what type of log and event information is in need to gather, how to transport it, and where to store it. But that leads to another major(ip) consideration rough what should one person want to do with all those data. It is at this point where the basic log management ends and the higher-level functions associated with SIEM begins. SIEM products typically provide m any of the features that remain essential for log management but issue event-reduction, alerting and real-time analysis capabilities. They provide the stratum of technology that allows one to say with confidence that not only are logs being gather but they are also being reviewed. SIEM also allows for the importation of data that isnt necessarily event-driven (such as vulnerability s rousening reports) and it is enjoyn as the Information portion of SIEM.SIEM architectureLong term log management and forensic queries need a database built for capacity, with file management and narrowion tools. wretched term threat analysis and correlation need real time data, CPU and RAM. The solution for this is as followsSplit the feeds to two concurrent engines.Optimize one for real time and storage up to 30 days of data. (100-300GB)Optimize the second for log compression, retention, and query functions. (1TB+)The block diagram showing the architecture of the SIEM is as follows Source reference 2A collector is a process that gathers data. Collectors are produced in many shapes and sizes from agents that run on the monitored device, to centra lized logging devices with pre-processors to split stream the data. These bottom be simple REGEX file parsing applications, or mingled agents for OPSEC, LEA, for .Net/WMI, SDEE/RDEP, or ODBC/SQL queries. non all security devices are kind enough to forward data, and triple arousal methods, including active pull capabilities, are precise essential. Also, since SYSLOG data is not encrypted, it may need a collector to provide encrypted transport.A threat analysis engine leave need to run in real time, continuously processing and correlating events of interest passed to it by the collector, and inform to a sympathize with or exhi goation layer application about the threats found. Typically describe events that has happened for 30 days are sufficient for operational considerations. A log manager lead need to store a great lot of data, and may take either raw logs or filtered events of interest, and need to compress store and index the data for long term forensic analysis and compliance reporting. Capacity for 18 months or more of data is likely to be required. Year end closing of books and the arrival of the auditors often pick out the need for 12 months of historic data plus padding of several(prenominal) months plot of ground books are finalized and an audit to be completed.At the presentation layer a console forget present the events to the security ply and managers. This is the principal(a) interface to the system for day to day trading operations, and should efficiently prioritize and present the events with a full history and correlation rationale.SIEM functionsWith many subtle differences, there are four major functions of SIEM solutions. They are as follows1. Log desegregation centralized logging to a server2. Threat Correlation the bleached intelligence used to sort through multiple logs and log entries to call attackers3. Incident Management workflow What happens once a threat is identify? (link from identification to containment and eradication). Notification email, pagers, informs to enterprise managers (MOM, HP Openview) Trouble Ticket invention Automated responses execution of scripts (instrumentation) Response and Remediation logging4. Reporting functional Efficiency/Effectiveness Compliance / SOX, HIPPA, FISMA. Ad Hoc / Forensic InvestigationsComing to the business case for SIEM, all leads are perpetually drawn to new technology, but purchasing decisions should by necessity be based on need and practicality. Even though the functions provided by SIEM are impressive they must be chosen only if they fit an enterprises needs. Why use a SIEM?There are two branches on the SIEM tree namely, operational efficiency and strongness, and log management/compliance. Both are achievable with a grave SIEM tool. yet since there is a large body of work on log management, and compliance has multiple branches, this coursework will focus only on using a SIEM tool effectively to point out the real attackers, and t he scald threats to improve security operations efficiency and effectiveness. It merchantman be believed that the most compelling reason for a SIEM tool from an operational perspective is to reduce the number of security events on any given day to a manageable, actionable list, and to automate analysis such that real attacks and intruders asshole be discerned. As a whole, the number of IT professionals, and security focused individuals at any given company has decreased relative to the complexity and capabilities demanded by an increasingly inter networked web. While one solution may have stacks of highly skilled security engineers on staff pouring through individual event logs to identify threats, SIEM attempts to automate that process and can execute a legitimate reduction of 99.9+% of security event data while it actually increases the effective detection over traditional human driven monitoring. This is why SIEM is preferred by most of the companies.Reasons to use a SIEMTo know the need for a SIEM tool in an organization is very important. A defense in depth strategy (industry best practice) utilizes multiple devices Firewalls, IDS, AV, AAA, VPN, drug user Events LDAP/NDS/NIS/X.500, Operating System Logs which can easily generate hundreds of thousands of events per day, in some cases, even millions. No matter how neat a security engineer is, about 1,000 events per day is a practical maximum that a security engineer is about to deal with. So if the security team is to remain tiny they will need to be equipped with a good SIEM tool. No matter how good an individual device is, if not monitored and correlated, each device can be bypassed individually, and the total security capabilities of a system will not exceed its weakest link. When monitored as a whole, with cross device correlation, each device will signal an alert as it is attacked cosmetic surgery awareness and threat indications at each point allowing for additional defences to be brought i nto play, and incident response proportional to the total threat. Even some of the small and medium businesses with that a few devices are seeing over 100,000 events per day. This has become usual in most of the companies says the internet.Real world examples infra are event and threat alert numbers from two different sites currently running with 99.xx% correlation efficiency on over 100,000 events per day, among which one industry expert referred to as amateur level, stating that 99.99 or 99.999+% efficiency on well in excess of 1,000,000 events per day is more common.Manufacturing Company telephone exchange USA 24 hour average, un-tuned SIEM day of deploymentAlarms Generated 3722CorrelationEfficiency 99.06% critical / MajorLevel Alerts 170Effective Efficiency 99.96% Source Reference 2In this case, using a SIEM allows the companys security team (2 people in an IT staff of 5), to respond to 170 critical and major alerts per day (likely to decrease as the worst offenders are firew alled out, and the worst offenses dealt with), rather than nearly 400,000.Financial go Organization 94,600 events 153 actionable alerts 99.83% reduction. Source Reference 2The company above deals with a very large volume of financial transactions, and a missed threat can mean real monetary losses.With respect to the Business Case, a good SIEM tool can provide the analytics, and the knowledge of a good security engineer can be automated and fictionaliseed against a mountain of events from a range of devices. Instead of 1,000 events per day, an engineer with a SIEM tool can handle 100,000 events per day (or more). And a SIEM does not leave at night, find another job, take a break or take vacations. It will be working always.SIEM Selection CriteriaThe first thing one should look at is the goal. (i.e.) what should the SIEM do for them. If you just need log management then make the vendor can import data from ALL of the in stock(predicate) log sources. Not all events are sent via S YSLOG. Some may be sent throughCheckpoint LEACisco IDS RDEP/SDEE encryption picture Scanner Databases Nessus, Eeye, ISSAS/400 Mainframes flat filesDatabases ODBC/SQL queriesMicrosoft .Net/WMIConsider a product that has a defined data collection process that can pull data (queries, retrieve files, WMI api calls), as well as accept input sent to it. And it is essential to be aware that logs, standards, and formats change, several (but not all), vendors can adapt by parsing files with REGEX and importing if one can get them a file. However log management itself is not usually an end goal. It matters about for what purpose these logs are used for. They may be used for threat identification, compliance reporting or forensics. It is also essential to know whether the data captured is in real-time. If threat identification is the primary goal, 99+% correlation/integration/aggregation is easily achievable, and when properly tuned, 99.99+% efficiency is within reach (1-10 actionable th reat alerts / 100,000 events).If compliance reporting is the primary goal, then consider what regulations one is subject to. Frequently a company is subject to multiple compliance requirements. Consider a fortune 500 company like general Electrics. As a publicly traded company GE is subject to SOX, as a vendor of medical equipment and software they are subject to HIPPA, as a vendor to the Department of Defense, they are subject to FISMA. In point of fact, GE must produce compliance reports for at least one corporate division for nearly each and every regulation. Two drawing notes on compliance, and one should look at architecture Beware of vendors with tin reports. While they may be very appealing, and sound like a solution, valid compliance and auditing is about matching output to ones stated policies, and must be customized to match each companys published policies. Any SIEM that can collect all of the required data, meet ISO 177999, and provide timely monitoring can be used to aid in compliance. Compliance is a complex issue with many management, and financial process requirements, it is not just a function or report IT can provide.Advanced SIEM TopicsRisk ground Correlation / Risk ProfilingCorrelation based on gamble can dramatically reduce the number of rules required for effective threat identification. The threat and target profiles do most of the work. If the attacks are risk profiled, deuce-ace relatively simple correlation rules can identify 99%+ of the attacks. They are as followsIP Attacker repeat offendersIP Target repeat targetsVulnerability Scan + IDS Signature match Single Packet of condemnRisk Based Threat Identification is one of the more effective and interesting correlation methods, but has several requirementsA Metabase of Signatures Cisco calls the attack X, ISS calls it Y, wench calls it Z Cross Reference the dataRequires automated method to lapse up to date.Threats must be compiled and threat weightings applied to each sign ature/event. Reconnaissance events are low weighting but aggregate and report on the persistent (low and slow) attacker Finger Printing a bit more specific, a bit higher weighting Failed User Login events a medium weighting, could be an unauthorized attempt to access a resource, or a forgotten password. Buffer Overflows, Worms and Viruses -high weighting -potentially destructive events one need to respond to unless one has already patched/protected the system.The ability to take heed or adjust to ones network Input or auto-discover which systems, are business critical vs. which are peripherals, desktops, and non-essentialRisk Profiling Proper application of trust weightings to reporting devices (NIST 800-42 best practice), can also help to lower cry wildcat issues with current security managementNext-generation SIEM and log managementOne demesne where the tools can provide the most needed help is in compliance. Corporations increasingly face the challenge of staying accountab le to customers, employees and shareholders, and that means protecting IT infrastructure, customer and corporate data, and complying with rules and regulations as defined by the government and industry. restrictive compliance is here to stay, and under the Obama administration, corporate accountability requirements are likely to grow. Log management and SIEM correlation technologies can work together to provide more universal views to help companies satisfy their regulatory compliance requirements, make their IT and business processes more efficient and reduce management and technology costs in the process. IT organizations also will expect log management and intelligence technologies to provide more value to business activity monitoring and business intelligence. Though SIEM will continue to capture security-related data, its correlation engine can be re-appropriated to correlate business processes and monitor internal events related to performance, uptime, capability utilization and service-level management. We will see the combined solutions provide deeper insight into not just IT operations but also business processes. For example, we can monitor business processes from step A to Z and, if a step gets missed, well see where and when. In short, by integrating SIEM and log management, it is easy to see how companies can notwithstanding by de-duplicating efforts and functionality. The functions of collecting, archiving, indexing and correlating log data can be collapsed. That will also lead to savings in the resources required and in the guardianship of the tools. CONCLUSION SIEM is a complex technology, and the market segment remains in flux. SIEM solutions require a high level of technical expertise and SIEM vendors require extensive partner training and certification. SIEM gets more exciting when one can apply log-based activity data and security-event-inspired correlation to other business problems. Regulatory compliance, business activity monitoring and business intelligence are just the tip of the iceberg. Leading-edge customers are already using the tools to increase visibility and the security of composite Web 2.0 applications, cloud-based services and mobile devices. The key is to start with a central record of user and system activity and build an extend architecture that lets different business users access the information to solve different business problems. So there is no doubt in SIEM solutions help the intrusion detection and response to improve.References1. Nicolett.M., Williams.A.T., Proctor.P.E. (2006) Magic Quadrant for Security Information and Event Management, 1H06 RA3 1192006.2. Swift.D. (2006) A Practical Application of SIM/SEM/SIEM Automating Threat Identification3. SIEM A Market Snapshot (2007) from http//www.crn.com/security/197002909jsessionid=BVQXTH11HH14JQE1GHPSKH4ATMY32JVN Date Accessed 20th November,2009.4. WHAT IS SIEM (2008) from http//www.exploresiem.com/resource-center.html Date Accessed 24th No vember, 2009.5. Securing and Managing Your Enterprise An incorporate Approach (2008) fromhttp//www.exploresiem.com/images/WP-Securing-and-Managing-Your-Enterprise.pdf Date Accessed 25th November, 2009.6. Shipley .G.(2008) Are SIEM and log management the same thing? from http//www.networkworld.com/reviews/2008/063008-test-siem-log-integration.html Date Accessed twenty-sixth November, 20097. Levin.D. (2009) The convergence of SIEM and log management from http//www.networkworld.com/news/tech/2009/031909-tech-update.html Date Accessed 26th November, 2009

Saturday, March 30, 2019

The Impact Of Digital Media On Ebay Information Technology Essay

The Impact Of Digital Media On Ebay In frameation Technology quizeBay is cognise e rattling(prenominal) over the initiation as the leading online mart which came in to life in 1995,eBay Inc, was builded by Pierre M. Omidyarand its headquartered in San Jose, California, TM (2002). eBay created a special platform for the sales of goods and go by a passionate village of individuals and problem. On days on that point argon millions of relics across thousand of categories for sale on eBay just now like Half.com, eBays site utilize to fixed price trading. eBay allows trade on a Local, National and tabooside(a) basis, with customize site in merchandise all over the orbit.eBay, unneurotic with its sub-visions, bring online market views for the sale of goods and serve, online payment services, and online communication offerings to a diverse connection of individual and strain in the USA and Internationally.The company operates in trio In xtions eBay Marketplace, Payments, and Communications.The eBay Marketplaces This platform adds infrastructure to enable online commerce in a intermixture of formats, including the traditional auction platform and its former(a) online platforms, such as Rent.com, Shopping.com, Kijiji, mobile.de, and Marktplaats.nl. Its services entangle trust and safety programs, reply forum, safe chanel program, eBay standard get protection program, customer support, quills and services.The Payments fragment Feeds a yield for small telephone circuites, online transporters, and individuals that enables them to sling and receive payments online. Its services include hook up withing the net profit, crosscheck of its PayPals account holders, withdrawing funds.The Communications segment provide voice over Internet protocol calls between Skype contractrs, as well as provides connectivity to traditional fixed-line and hold teleph bingles. The company to a fault provide online a go a moodment letting services and comparison s hopping resource service, as well as provides an Internet payment platform that allows merchants to process, and manage online payments.2. MISSION STATEMENT physical objecteBay pioneers communities built on commerce, sustained by trust, and inspired by opportunity. eBay brings unneurotic millions of people all(prenominal) day on a local, national and world-wide basis through variety of websites that focus on commerce, payments and communication. This has also inspection and repair the company in various demeanors between their numerous customers general. They father engaged in the method stated below.A Place to Buy. You hatful get al closely anything item you need or emergency at truly low deal recrudesce than you can find at any traditional brick and mortar, even online chime ins. But caution should be interpreted beca drill of rotten or fake items deals on eBay.A Place to Sell. No matter the coat of our product or services, eBay has various categories channels to se ll items. eBays global reach can even move unusual items that argon non in demand in our own neighborhood in to cash.A Place to Shop. Large variety of items can be found for sale on eBay, umteen members sop up discovered that eBay is one of the outmatch place in the world to window or comparison shop. These items include photos, detailed descriptions, and owner experiences. Beca employ you see split up of the very(prenominal) items side by side in various conditions and k directly what each one interchange or selling for, eBay gives you insight into the real market value of most types of goods almost the globe.A Website With no physical building eBay store, Founded in San Jose simply now carry out daily activities from various cities, eBays service cost basically online apart from the delivery of bought and sold items every new(prenominal) network of the craft are handled through eBay website.Socially Responsible eBay with its B2C way of intervention telephone line has lower the barriers to buying and selling, these bring a massive global awareness to it business. It also fosters new economic opportunities to developing areas and brings cultural fellow feeling between different populations. This has made eBay one of the worlds most interesting and kindle trans-national ambassadors.3. THE IMPACT OF DIGITAL MEDIA ON EBAYeBay is a cutting edge in commence by selling almost everything be it of what nature with its strawman in every corners of the globe with no physical store, with limited staffs but satisfy it numerous customer worldwide. But how is this possible?Social Media market Recent addition to organizations plans. Integrated merchandising communication theory is a formula organization follow to connect with their target markets.Integrated marketing communications coordinates promotional elements, advertising, personnel selling, unexclusive relations, publicity, direct marketing and sale promotion. progressively viral marketing campai gns are also sorted into integrated marketing communications for eBay. The growth of sociable media has impacted the way organizations communicate, the profits provide set of idea which enable persons to develop affable and business platform, voice realizehow and collaborate on project online.Cell Phones Usage has also bring a benefit for eBay media marketing. Today many cell phones stool social networking capabilities, individuals are notified of any happenings on social networkingsites through their cell phones in real- cartridge holder. This constant connection to social networking sites means products and companies can constantly remind and update followers almost their capabilities, expends, importance, etc. Since cell phones are affiliated to social networking sites, advertisements are always in sight.Computers The use of computer has gull to stay in our daily life be it at home, offices, school, this is one of the basic nebs used by eMarketers worldwide, eBay use s the help of computer since they dont physical store to carry out their daily business and this is through with(p) by log into their website by typing in the URL address with an access from ISP supplier. at once logged in, you see various categorizes of product, prices, description of items and options of payment of items bought. Buying of items online and shipping to every part of the globe is an everyday activity at just by the use of a computer, Newsweek (2004)Internet Marketing eBay use the internet known as digital marketing, web marketing, and online marketing is the marketing product and services over the internet. Internet marketing is considered to be broad in context because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wirelessmedia. Digital customer data and electronic customer relationship management systems are also often grouped together under internet marketing. This market gathers the vast idea and skilful bac kground of the Internet, including design, development, advertising, and sales.Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search locomotive marketing on specific websites.3.1 THE USE OF THE INTERNET BY eBayThe internet as change the landscape of the world in every way things are done in every way things are done globally. Never before have people been able to interact in such a cost effective and comfortable way. The business world as seen a better new of doing its daily activity, business now are done in very short span of time even without the presence of both party at the same place or time. Now it is possible for you to establish your own company with a very small financial investment or in virtually cases even without any start-up capital. eBay use the internet in carrying of its daily business to meet target market and satisfy its customer at a very low cost and maximizing profit.Information People worldwide are using the internet on a regular basis, with email and search engines as the most popular services. Information is power. People are able to influence, direct, convince, educate and manipulate others through one single tool The distribution of selective randomness. Email and discussion forums allow people to share their thoughts, ideas and experiences with other people from all corners of the world. Within a relatively short extent of time the Internet and its communication channels will be part of our daily lives as are running water and electricity.Cost forcefulness The internet is by far the most effective communication tool. If you want to send a letter via conventional or so-called slake mail, it will cost at least around $1 assumptive you restrict yourself to two single sheets of paper. Sending the same amount of cultivation via email will be up to 100 times cheaper with nimble delivery. In addition to this, email with its numbers of advantages ove r the slow mailing system of delivery of messages, sending and get a reply on the spot.Online Auction In this massive marketplace, eBay rules the auction sites. According to the Nelison Rating, eBay is among the top ten most trafficked sites on the internet. eBay leads the online auction industry with a to a greater extent than 60 percent share of the market, its closest competitors, Yahoo Auctions, is only half its size followed by Amazon.com, all these are done with the help of the internet and makes eBay grinning to the bank on daily basis.Low Cost Operation runway business requires tons of capital no matter the size of the outfit, the business has to pay for rental shops, offices, motor vehicle, staffs, before it can think of devising its profit which is the primary idea of the business, but doing online business you cut start your expenses to a very little amount of capital and that is the edge eBay is use to run its operations and has really help the business since it doe s not have physical presence anywhere, it does its business around the globe and sell lots of items to its customers worldwide. The internet helps eBay in an immeasurable way of cutting down cuts of operations and get to all part of the world without even being there in presence.4. INTERNET AS A MARKETING PUBLIC dealing TOOLSPublic relations is defined as a management turn tail which identifies, establishes and maintains mutually beneficialrelationships between an organization and the public upon which its success or failure depends. Whereas advertising is aone-way communication from sender to the receiver, public relations considers multiple audiences and uses two way communication to monitor feedback and rig both its messages and the organizations actions maximum benefit.The internet is used as a tool in Public Relations and has replaced the use of paper form of notifications and is carried out in method stated below.Tweeter Social media is a great way to have a conversation wi th your market and manage connections with prospects, customer, bloggers. Even if you dont join Twitter you can monitor what people are saying company, trends, friends and products. This is quite a useful from a marketing and PR standpoint. Tweeter has a search engine that let you post any information and can be link up to eBays platform.Facebook Business firms states their URLs on cable Tv commercials, were friends and followers can join them on Facebook. This is sharp method way of internet PR, youre a inauguration entrepreneur, you could start a group to help entrepreneurs connect and exchange ideas. try to make sure one doesnt exist already in your area. Your friends on your facebook will have first hand information of what is happening around you and your business and will also pass to from friends to friends if even they are not yours. eBay is linked to facebook which acts as an indirect form of PR, Instant message could also take form by chatting on both platform.Email Thi s is the fastest, filter less and cheapest form of PR and e-marketing with the use of the internet, when searching for information or to joint an organization like eBay, Amazon you go through a process of filling and providing certain information about yourself and your preference requirement, all these information is kept in their database and at the end you provide your e-mail. The organizations use their database information to communicate with you, through this medium you are updated with the latest information relating to previous request. As you change your preference change it is also updated in their database. eBay use this form of PR to promote their product to you and information is direct to you in respect of delivery of the item you paid for.Website Feedback Various website use a page known as website feedback as a form PR tool to give a comments, complain or hatch on your experience you may have after buying a product or trial of certain items in other for them to kn ow how their customer feel about product bought from them.5. EBAY SWOT ANALYSISSTRENGHT The club use the advantage of Customer Relationship Management (CRM). Both parties (Buyers and Sellers) subscribe with the company and information needed by eBay on dealers. This is known as Business2Consumer (B2C) of their business. With the strong customer and dealer relationships are based on Consumer2Consumer (C2C) business platform, where good business relationships occurs, where buyers and sellers interchange feedback for each other for the next accomplishment to take place.WEAKNESSES Organizations works painfully to limit fraud. eBay platform of business is very open to fraudulent activities. But the company act with the issue very quickly. These includes inferior goods being marketed to unknown and suspecting eBayers. Other forms of theft could include redirection of stolen goods. lay down it known that fraud and theft are problems with outsiders not eBay. The weakness is that evil in dividuals can exploit the C2C business platform. Many companies, systems breakdowns could disturb the trading achievement of eBay on daily bases. eBay and Paypal have suffered shutdowns and total breakdown. As technology improves for the better weakness will be less an issue.OPPORTUNITIES Acquisitions bring new business strategy openings. eBay has into agreement to buy off online telephone company Skype Technologies with a deal reported of about worth $2.6 billion. PC users use Skype to have conversation with each other for no charges and make cut-price calls to handheld cell-phones and fixed landlines once you have subscribe to the services. This will bring in more customers to the business and also make profit to continue to grow.THRATS The world Internet brands, success attract competition. Overseas competitors competing in their home markets have the technical experience that could give them a stronger advantage over eBay. It came to the bill poster of eBay that it has met wit h other USA home Internet providers when trading in other international country. Yahoo stand out in the Asian market.Doing the same market is a threat, just like weaknesses stated above, the name is attacked by mischievous individuals. When e-mail sent to unknown eBayers disguards to come from eBay. Logos, and design of the pages looks just the same. However they are designed so that you input private information that the thieves can use to accesses to passwords and identifications.Not all costs can controlled by eBay, example shipping charges and credit card charges. With fuel prices to rise, the customer suffers the emergence of delivery and postal charges. This meet the total cost of auctioned items very expensive. When provider of credit card merchants like Visa or Master-card decide a charge for online business transaction the total cost of the same items would add-on with a negative effects on the final customer of the product and will make eBay loose some of its future cons umer and will affect the profit and share value of the company.6. CONCLUSIONEBay is well aware that in order for the company to maintain its competitive advantage and make it sustainable in the long run, the company must take advantage of the changes at the corporate, organizational and business levels. EBay embraces the five building blocks which are applied promiscuously throughout eBays history improvisation, co-adaption, regeneration, experimentation and time pacing as perspicuous by the strategies discussed. The company also embraces the 10 principles of competing on the edge about strategy, organization and leadership.With all hands on deck EBay can go further if the managing, marketing department embrace more with its IT department by merging with more social media platform not just their website because social website break more distance with communities of friends of my friends.Security department should work more bringing down the risk of internet fraud, this is one area of online business transaction that turn people away from buying online, because nobody wants to their funds to end up on the place after paying for an item or product.

Project Management in Construction

brook circumspection in ConstructionDefinition swan counseling is the art of directing and coordinating human and material resources by dint of step to the fore the manner of a tramp by using modern solicitude techniques to light upon predetermined objectives of chain of mountains, cost, time, quality and participation satisfaction. Definition according to pouch trouble InstituteObjectives of support concernFor face suffer precaution the objectives weigh a lot on resource constraints and the target should be acquit out with these in view. A main component of the whole process would be to investigate for better alternatives or make tradeoffs to reduce the conflicts surrounded by verbalize objectives and resource constraints. Especi tout ensembley with manual resources originating from so some(prenominal) cultural backgrounds, the prospect of conflict is far high. In general the objectives of digest management in verbalism tidy sum be stated asStating of o bjectives and plans this should include the motley operators comparable Budgeting, Scheduling, targets and participants.Maximization of Efficiency This should be accomplished by appropriate utilization of non-homogeneous resources, labor, material and equipment. The ultimate intention is to meet the objectives at heart prescribed schedules mentioned in (1).Coordination A proper communication and coordination has to be hold between mingled phases standardized be after, design, estimating and constructing.Conflicts and differences should be properly evaluated and resolved frankincense leading towards a common goal and objectiveModern focus spudment in various tools and technologies along with detailed research into brisk visualize management principles and trends lead into a mod phase of management c aloneed Modern Management. Research and study into modern management processes reflected the following redundant componentsManagement process come along To study the ma nagement functions in detail.Management science and ratiocination support antenna Assists managers in taking touch on finales by approaching a given problem in mathematical and scientific manner. Example Operations ResearchBehavioral science approach Involved more in interacting with peopleSustainable competitive expediency Is an indication of a proper management strategy.Modern management can be con spatial relationred to be a combination of alone the ingredients mentioned before, that is General Management, send off management, Special knowledge domains and supporting disciplines. The application of Modern management into verbal expression has proven to be quite powerful and efficient. encounter adventure Risk is an distinguished federal agent of any show. Taking risk by a participant of a get off limns his willingingness to compete solely has the down side of putting the whole fuddle at stake. There ar overly potential chances of conflicts universe arisen between participants due(p) to this factor. There atomic number 18 usually many risks involved in a look project, a shortened list of which can be stated as followsSocial Problems This includes factors like Environmental protection, public safeguard rules.Economic problems Stock fluctuation, fluctuations in commutation rates.Relationships This is one of the most common and most important factors. These risks develop due to the instability in relations between contracting agencies, participants of project, etc.technical Though a key factor in a project feel cycle, technology can become a risky factor sometimes.It is up to the project owner and upper level managements to resolve the conflicts created by risk and to give the Go/NO-GO order to the squad up. Once the decision is made to take the risk, the project management and participants should strive to take a leak the project a success.Organization The other important factor in project management in general and construct ion project management in precise is the organizational structure of the confederation. There atomic number 18 various factor involved in designing and configuring the project that depend on the organizational flow. Some of the factors areMethod of decomposition of project (Sequential Vs Parallel Vs S smidgengered decomposition, which depends on the organization commands and availabilities).Number of organizations involved in the project and the phases they are involved in. (Ex The owner organization which is involved in the whole life cycle can call some contracting organization for their specific postulate).Organizational structure which decides the number of projects cosmos taken up at a given instance of time. (Ex Matrix organization structure involves alike(p) groups for various projects, where as end orientated organizational structure involves various teams for various projects). professional Construction Management A professional construction management normally refers to a team that specializes various phases of construction activities like Planning, Design and construction. They fork out the responsibility to coordinate with contracting organizations to resolve conflicts and do spirt the project a success. A professional construction manager is a so physical exercised specialized in the practice of professional construction management whose responsibilities includesWorking with the owner and the Architectural/ Engineering teams to decide on strategies and make decisions.Consider various resources and constraints and develop alternatives if essential.Process the progress of the project making convinced(predicate) as shooting that the owner is advantageously informed of the situation.Material and supply image management.Provide other services and subcontracts.Professional construction management is involved normally for massive projects like Alaska Pipeline meet. 10 rules for Managing projects that win Rule1 ready the project g oal the most important part of the project is Goal. An effective project manager al managements emphasizes on goal and rephrases it again and again to the team outgrowths. This will clear the vision of people (team members and end employrs) regarding what they contri besidese to achieve thus compelling them to strive for it.Rule2 Use objectives to define responsibilities the objectives delimit to r from each one the goal should be used in recognizing and allocating responsibilities. An effective team manager will distinguish individual talents of team members and assign responsibilities accordingly.Rule3 gift Checkpoints, Activities, relationships and time estimates Team members figure out the best when they know what to do and crap a specific target set in front of them. Creating Timelines, checkpoints and activities admirer the team members concentrate their energies in the proper direction.Rule4 Supercharge the plan with a picture Try to make the project progress as cl ear as possible to your team members and upper management. Use Gant and Pert charts to show the progress visually which will aid them to understand the process oftentimes better than verbal explanation or presentations.Rule 5 Develop an empowered project team Understand the elements of human behavior and recognize the differences in team members. Note that each persons adroitness can be used in a unique bearing to contri simplye to the project. Try to find the motivating factor for team members, each person can be motivated by something divers(prenominal).Rule6 Reinforce peoples motivation and energy This can be accomplished by bringing in a sense of ownership into team members mind. Trying to align peoples thoughts with one other and with project goal will help a lot too. By brining in this common thinking and sense of challenge, team members will be cheered and motivated at all stages of project life cycle.Rule7 chat Communication between team members and team management is one of the most important factors for project success. Make for certain all the aspects of project including progress, successes, failures, etc, are all easily informed to the team members. A nonher part of communication is to comprehend sincerely and regularly to the opinion of team members, some times hearing is more important than talking.Rule8 Vitalize people with energy from conflicts Try to use the energy generated with various conflicts in the project life cycle to get on people. This will help them to focus and resolve issues cooperatively.Rule9 The Power of being a project manager has to be used in brining the commitment from team members. This will help them in using their individual powers to make the project a success.Rule10 Try to be creative.Case Study Alaska Pipeline see to it Alaska Pipeline project was considered to be the most expensive private project in 1970s. With over 10billion dollars of budget and 800 miles of pipeline, this project required top base on balls project managements abilities to be freed and perfected. I choose this project as an example because of two reasons (i) The Vast ness of the project and (ii) The involvement of Professional project management organization.During the supplying phase, the owner assigned the whole project to a Construction Management company (contracting, called CMC) while retaining the centralized decision making ability. Initially the hierarchy from top to bottom consisted of 9 layers which created many risks and conflicts between various subcontractors and other participants of the project. There were overly delays made in decision making process because of various construction sites and count of subcontractors. To bring off this, the owner then created a Professional come across Management firm by combining a portion of Owner and CMC. The primary goal of this team was to control all the subcontractors. This change reduced the number of layers of hierarchy from 9 to about 5, in turn closing the gap between management and workforce. This also boosted the performance of decision making process as the communication and collaboration process was greatly improved. . One of the primary decisions of this team was to decentralize the construction of 5 segments of the pipeline as a different project thus giving the organization a goal oriented look. With the introduction of this smart firm, all the major rules of project management were cover and the project was flourishingly completed at bottom given budget and time.ReferencesBurke, Rory realize Management-Planning Control, 4th Ed, John Wiley Son 2002Lock D, retch Management, 8th Ed Gower 2004W.Alan Randolph, Barry Z.Posner, Checkered Flag Projects, 2nd Edition, Prentice Hall.Project management in constructionProject management in constructionBrief 199803 The business office of the Project music director amongst other things may be that of the partnering facilitator as identified in various bookss and by auth ors such as, but not limited to Latham and Egan etc. Highlight a theoretical but practical exercise for the project manager as a partnering facilitator. draw below is a discussion and an examination of the idea that the government agency of the Project jitney amongst other things may be that of the partnering facilitator which enables projects to be carried out efficiently. The notion that the Project theatre director amongst other things could fulfil the role of the partnering facilitator has been identified as wellhead as being developed further in the literature of Latham and also Egan, besides others. Authors such as Latham and Egan regarded that the fulfilling of the part of being a partnering facilitator as one of the main functions of any prosperous Project music director, but of course not the only one. As part of the evaluation of the role swindleed by Project Managers, the potential role of being a partnering facilitator will highlight a theoretical but practical role for any Project Manager to carry out whilst acting as a partnering facilitator. Project Managers have played and still continue to play important parts inwardly the public and private sectors of the British economy. However, for the mathematical function of this evaluation the theoretical, yet practical role that would allow any Project Manager to act as a partnering facilitator are considered inside the bourn of the construction industry in the United Kingdom. It should also be remembered that the ideas relating to the concepts were genuinely originally developed by engineers in the United States before being widely adapted by businesses and academics alike (Deeprose, 2001 p. 3).The construction industry within the United Kingdom would upon two a theoretical as well as a practical basis provide plenty of scope for a Project Manager to fulfil or serve the role of a partnering facilitator during the course of carrying out their job. The reasons for the construction industry offering opportunities for Project Managers to be able to act out a role of being a partnering facilitator are strongly related to the nature of that industry within Britain itself. Construction firms exist to develop, plan, deliver, and finally complete make projects, Project Managers are also trained to think and function in a akin(predicate) way (Deeprose, 2001 p. 18). The Project Manager thus arguably has a lively linking and organising function or purpose contained within the core responsibilities of their job, which in itself is diametrical for the efficient running of the construction industry in Britain. Any or every construction project take to be managed efficaciously, and well nonionic in order for it to be completed on time and within budget, a requirement that the use of a Project Manager is intend to fulfil. Even if only one company was formally engaged in completing a construction project a high phase co-ordination and organisation would still be required to make sure the might of the organisation remains consistently high as well as being successful. A single company will have various stakeholders with different concepts of what needs to be done to successful complete. The more companies which are involved in a proposed project means a higher number of stakeholders need to enter working coalitions (Briner, battle of Hastings, Geddes, 1996 pp. 10-12). In reality, construction projects normally have several contractors, sub-contractors and suppliers involved in the whole process, which further increases the need for co-ordination and sound organisation. The Project Manager is therefore ideally placed to carry out the necessary co-ordination and organisation to achieve the full completion of the project (Deeprose, 2001 p. 3).Latham and Egan, amongst others, have contended that the level of co-ordination and organisation that Project Manager have to use to get their jobs done with the British construction industry could justify the ta g of partnering facilitator. Deeprose has argued that the operating methods of Project Managers and companies are very similar, which helps to explain why Project Managers are very useful in running construction broadcasts (Deeprose, 2001 p. 18). In theoretical and practical terms, the Project Manager needs to work in partnerships whilst facilitating the means to ensure that all are programmes are carried out. One way of exploring whether the Project Manager could theoretically and practically act as a partnering facilitator would be to look into how a project to build a trapping development could actually be managed. To be able to complete a trapping construction programme theoretically and thence practically involves a great deal of partnership to move from initial planning and designing, finished to finding contractors or suppliers, gaining planning authority, then finally construction. Even afterwards construction has been finished partnerships could still be needed to mak e sure that the required standards are met, and to achieve the highest quality mansions. Young argues that the key to the successful completion of any construction project is for it to be well knowing with all the people that need to make the decisions having access to all germane(predicate) information (Young, 1996 p. 21).The Project Manager needs to form a partnership with the architects that design the building that make up the housing construction programme, and both need to discuss the exact specifications and materials required to make the project doable (Young, 1996 p. 45). These architects could either work for the same company as the Project Manager or be employed by a different company if not a specialised architectural consultancy. Having a sound partnership with the architect would allow the Project Manager to examine whether the designs for the proposed housing programme are practical, are what the stakeholders actually requested, and also if they meet health and co ndom standards (Maylor, 1996 p. 47). Close consultation between the Project Manager and the architects will accelerate discussion with regard to the quality, as well as the practical feasibility of the housing being designed. Together the Project Manager in federation with the architects will draw up plans as to what will be needed in the houses to ensure that all features and facilities are installed as planned, and altered if needs be (Young, 1996 p.45).Theoretically and practically for the successful finishing of a house building project the Project Manager needs to form a relationship with the Local Planning Authority to ensure that planning could be granted to allow building work to begin. Without planning authority the proposed housing construction will not be carried out (Deeprose, 2001 p. 18). A dear(p) relationship with the Local Planning Authority responsible for granting or not granting planning permission could be useful if the Project Manager needs to arrange for w ater, gas and electricity supplies have to be extended to the new houses after those have been finished (Young, 1996, p. 45). The Project Manager might tear down have to liase with the Local Planning Authority to arrange new roadstead or an extension of existing roads to the new houses. The Project manger as the main facilitator between the company or the crime syndicate they work for and the Local Planning Authority would have the task of sorting out any differences between the tow to make sure that planning permission is granted as quickly as possible. Partnership between the Project Manager and the Local Planning Authority should help to facilitate the successful completion of the proposed building of new houses (Maylor, 1996 p. 6).Theoretically as well as practically the Project Manager would therefore need to facilitate a partnership between all the constructors, and sub-contractors, which are, actually needed to design, build and complete the new houses (Maylor, 1996 p. 47) . New houses are completed through the combined efforts of contractors and sub-contractors, which have special skills and functions (Briner, Hastings, Geddes, 1996 pp. 10-12). For instance, new houses will need electricians, gas fitters, plumbers, as well as plasterers to complete the infrastructure of every house being built. The Project Manager will be responsible for hiring all the contractors and sub-contractors, as well as any general labourers needed to finish the new houses (Deeprose, 2001 p. 3). The Project Manager would have to make sure that everybody or firm leased to complete the construction is capable of doing their jobs to satisfactory standards or have work done again by alternative contractors (Briner, Hastings, Geddes, 1996 pp. 10-12). Not only will the Project Manager ensure that the contracted work is done effectively, they will have to action any complaints, needs or problems that the contractors, sub-contractors, and workers have with completing the new hous es (Young, 1996 p 47). Health and safety is also an issue that the Project Manager has to consider. The Project Manager has a responsibility to make sure that everybody is safe upon the construction site. Hand in hand with making sure that workers are safe, the Project Manager would also have to ensure that all the work carried out on the new houses complies with all health and safety regulations (Briner, Hastings, Geddes, 1996 pp. 10-12). Facilitating with all contractors, sub-contractors and workers not only maintain the partnership between them all, it also allows the new houses to be safe without anybody being hurt during their construction. For the Project Manager complying with health and safety standards will mean that the building process runs smoothly and reduces the risk of legal action being taken against the building consortium (Deeprose, 2001 p. 18).Therefore, one way in which the function of any Project Manager as a partnering facilitator could be theoretically and p ractically demonstrated through the co-ordination and organisation needed to build new houses. The Project Manager could and indeed should play a pivotal role in partnering or linking all the elements needed to complete a new housing programme. The Project Manager has an essential part to play in ensuring that the parties involved in the construction of the new houses would work closely together to make sure that the building is completed successfully and to time. Without the Project Manager acting as a partnering facilitator it would arguably be more difficult to design, construct, and fully complete the new house building programme. The Project Manager co-ordinates and liases with the architects over the design as well as the features of the new houses before the plans are finalised and then submitted for planning permission. Then the Project Manager would thus usually have to approach the appropriate Local Planning Authority to gain planning permission and then amend the building proposals if that is required. Probably the most important partnering facilitating performed by the Project Manager would be co-ordinating, as well as organising all the contractors, sub-contractors and all workers needed to build and finish the new houses once planning permission has been granted. A good working partnership actively facilitated by the Project Manager should mean that the new houses are built up to a high standard as quickly, yet effectively as possible. The Project Manager will achieve the function of partnering facilitator most effectively by involving all the relevant stakeholders that are part of the construction project. Briner W, Hastings C, Geddes M, (1996) Project Leadership 2nd edition, Gower, AldershotDeeprose D, (2001) Smart things to know about Managing Projects, finishing touch Publishing Limited, OxfordMaylor, 1996Young T, (1996) The Handbook of Project Management, Kogan Page, London

Friday, March 29, 2019

Nestle Marketing Analysis

nest Marketing abridgmentThis is a report as well as a food grocerying plan ab prohibited hold close and its innovative crossway Nescafe placard. The report is ab prohibited the proper food leader cuddle (Malaysia) and its function on how they foodstuff their merchandises and sustain their leader position in the genuine merchandise. More all told oer, there give be a detail analytic thinking on the afoot(predicate) merchandise situation which include SWOT, PEST and fiscal analysis plus the trade st enumerategies applied by the ph unrivalledr in society to do principal(prenominal) the grocery. The trade strategies provide further the discussion by involving the determine, yield, distribution and promotion strategies. However, the main focus entrust fall on the company nuzzle Malaysia, the grocery of soluble burnt umber, the brand Nescafe and its bracing dunked overlaps. In addition, recommendations and solutions ar provided by the author to so lve the current scenario and everywherecome the problems.Nestl (Malaysia) Berhad plays the role as the leader of Halal food manufacturer and the first multi issue to voluntarily request for Halal Certification of all its food wares when it was first introduced in 1996. Nestl is establish in 1912 and public-listed on Bursa Malaysia since 1989. occurrently the hugegest Halal producer in the Nestl world. In Malaysia, Nestl employs 5000 people, owns 7 factories and 6 gross sales offices plus one national distribution centre. The head office ground in Petaling Jaya, Selangor. ( nuzzle, 2008)NestlWorldwideNestl is a multinational company that leading the orbiculate food telephone circuit. It is founds by a Swiss chemist Mr. Henri nest. Nestl restrain the worlds largest food manufacturer and the worlds largest private feeding research capability based in Switzerland. Overall, Nestl present in all everyplace 100 countries with 276,000 employees world-wide and 456 factories in 84 countries. Currently, Nestl owns over 8500 brands and produce over 10,000 different point of intersections. Nestl hits the sale of 32 billion crossings yearly. Further more(prenominal), Nestl get hold of 24 search Development centres worldwide and invest RM5 billion annually on RD. ( go up,2008) penetration about the product NESCAFMENUAt November 2009, nestle introduced a in the rawfound range of beverage to captures topical anaesthetics heart. refreshful Nescafe menu is your menu of Malaysian dearie. induce home the authentic gustatory perception of your favourite burnt umber berry tree berry shop smells anytime and anywhere. ( come on,2009) primal BenefitNestle provides good eccentric products with improving nutrition and health benefits downstairs Halal policy benefits everyone especially Muslims so that consumers fecal matter relish their favourite food or beverage without worries with the Halal assurance promised by Nestle. (Nestle,2010)The introduc e of Popularly Positioned convergences (PPP) brings affordable nutrition accessible (based on topical anaesthetic divvy upations, food regulations, nutrient deficiencies and public health concern) for society and leads a fitter lifestyle and diet plan with the Nestl Nutritional Compass label in all nestle products. (Nestle,2008)Talk about the impertinently Nescafe menu that contains coffee as the main ingredient. In fact, according to Don Howat (2009) coffee is something prominent because it contains antioxidants. Meanwhile, he hopes that there is a budge of the wrong perception coffee is bad for health among Malaysian and able to calculate non-coffee drinker and increases the function of coffee in Malaysia which is consider as low compargond to other countries.Current Marketing SituationNestl Malaysia, currently the biggest Halal producer in the world, markets more than 300 Halal products in market, is warranting its appointment as the Halal marrow of Excellence for Nestl worldwide. Exports its products to more than 40 countries worldwide with export sales of over RM470 million. Imports Halal products from the 66 Nestl factories worldwide that are demonstrate Halal. (Nestle,2010)According to Philip Kotler and Gary Arm pixilated (2010), severalise market means a firm decides to target several market segments and design separate offer for each.Nestle (Malaysia) utilizing differentiated marketing (segmented marketing) dodging by having several categories of product that means to target different node.Categories of product in MalaysiaExample of brand make water in Malaysia Coffee and drunkenness Nescafe / Milo Culinary Aids/ Prepared Foods Maggi Milks Nespray/ Nesvita Liquid Drinks Perrier subaltern Foods Nestle Baby Cereals Breakfast Cereals Nestle Breakfast Cereals Chilled journal Nestle cloud nine/ Nespray Yogurt Ice- work out Nestle ice cream / Drumstick Chocolate and Confectionery Kit-Kat / Smarties / Milkybar health care Nutrition Nutren optimal / Fibre / Junior surgical procedure Nutrition POWERBAR Performance / change Nestle lord Nestle Professional remit 2 Nestls categories of product and brand name in MalaysiaAdapted from Nestle in your life, our brands, 2010. From http//www.nestle.com.my/nestle+in+your+life/our+brands/Nescafe commands 70 per cent market dowery in the coffee segment locally Nescafe practises differentiated marketing too by having 5 different range of coffee (mainstream coffee, reasoning(a) coffee, Nescafe Classic and Gold). Simultaneously, Nescafe fare marketing three different beverages that include Nescafe Menu Tarik, Ipoh White Coffee and Nelso to targets a radical of local people (Malaysian) includes coffee lovers and non-coffee drinkers (all age) by offering coffee shops all time top give awayer. (Don Howat, 2009)Product re look out for NESCAFMENUNescafe Menu Tarik-satisfy your craving for a delicious scintillating cup of coffee and indulge in the authentic taste of a tarik.Nescafe Menu Ipoh White Coffee-three minutes are all it takes for you to make love a deliciously creamy, collected and aromatic cup of Ipoh fresh coffee, anytime of the daytime or night.Nescafe Menu Neslo-for those who must convey your morning cup of neslo in the lead the day can start, heres the one for you with the rich taste of Nescafe coffee and the uprightness of burnt umber malt, all serve in one delicious blend.Table 2 Product analyse of NESCAFMENUAdapted From Nestle in your life, our brands, beverages Nescafe, NESCAF MENU, (Nestle, 2010) From http//www.nestle.com.my/Nestle+In+Your+Life/Our+Brands/ swallows/Nescafe.htmNew Nescafe Menu benefits consumer by giving them a big flexibility and in-home humpment without stepping out the fireside to coffee shop for beverages. The new Nescaf Menu range is available at all leading supermarkets and hypermarkets in 15-pack bags at the recommended retail prices of RM12.90 (The Star publisher 2009).Currently, only the washcloth cof fee produced by old town is consider as the take on rivalry because they having the same product as Nescafe Menus white coffee. PowerRoot and BOH are indirect competitor because they dont have the same (but similar) product as Nescafe Menu yet they are the noticeable competitor in the market so its important to keep an eyes on the companys activities.Competitive ReviewWhite Coffee 3-in-1 Classic by emeritus Town* Old Town kopitiam(coffee house) had 141 outlet in Malaysia and even so evolution (old town, 2010).* Rated as Malaysians favourite hang out place for its signature white coffee.* A perfect, smooth blend of original white coffee. Rich, creamy and aromatic, it has a heightened lingering backtalk feel (Old Town, 2010).* 15 sticks in a Packet, RM12.90* The famous Cameron Highland tea* Rated as Malaysias all time local favourite beverage.* Experience the robust, full-flavour of Boh Teh Tarik Kurang genus Manis with slight sugar in each convenient sachet* 12 sachet in a packet for RM7.90Oligo cereal (6 in 1) by PowerROOT* Nescafes main competitor for soluble coffee range* Cereal drink integrateed with a fine blend ofoats,cereal,B-Glucan,Oligofructose, sugar and non-dairy creamer* 12 sachet in a packet for RM12.90PEST analysisNestls PEST Analysis(P)olitical* In oppose of the Governments efforts to combat non-communicable diseases in the country, Nestle collaborated with relevant NGOs to participate actively during the Nutrition Month Malaysia campaign to promote good nutrition in the community (Nestle, 2008).* Nestle is in full support of the Governments efforts to encourage better diets and active lifestyles to help counter problems associated with obesity, diabetes and cardiovascular diseases. We have made evidentiary change to improve our products profile to complement the Governments efforts to fashion a fitter population (Nestle, 2008).(E)conomic* Flat domestic sales reflects slowdown in local economy and changes in consumer spending beha viour. (Nestle, 2009)* The weak market sentiments due to the orbiculate economic slowdown and changes in consumer spending behaviour (spending less and deliver more), have some bearing to the take onings domestic business, which remained flat for the catamenia under review. (Nestle, 2009)(S)ocial* Nestle was founded on social responsibility, sound human harbors and principles more than 140 old age ago (Nestle, 2008).* Malaysias majority = Muslim. Consumers trust and confidence on quality and peace of mind for Muslim consumers (Nestle, 2008).* Our interest in Halal was borne out of social responsibility and respect for our Muslim employees and consumers, and today, we are bloodcourse to appreciate the long-term investment we have made in manufacturing and marketing Halal products (Nestle, 2010).* Though it is a global brand, Nescafe is locally produced to meet the taste preferences of local consumers (Nestle, 2010).(T)echnology* Improve innovation technology and supplier deve lopment finished Halal knowledge (Nestle, 2010) plus innovate renovate nutritious and healthier products using RD expertise (Nestle, 2008).* Every Nestle product undergoes as capacious RD process and a stringent quality standard before it is launched, because we value the trust that our consumers have in us (Nestle, 2008).* Nestle consumers all over the world benefit from world-class manufacturing facilities, the best private RD capability in food and nutrition, international quality and safety devicety standards but with products catered to local preferences (Nestle, 2010).* Our global investment in RD clearly shows Nestls commitment in innovating and renovating products based on scientific evidence and trials (Nestle, 2008).SWOT Analysis(S)trengths(1) High market share For instant, Nescafe commands 70 per cent market share in the coffee segment locally as the leader. (Don Howat, 2009)(2) Size, operational efficiency and financial part Owns 7 factory and 6 sale office at Mala ysia with one national distribution centre that involve exportation of Halal product to more than 40 countries. (Nestle, 2008)(3) Wide range of products Nestl owns over 8500 brands and produce over 10,000 different products. (Nestle, 2008)(4) Ability to customize global product brand to local preferences For example, markets more than 300 Halal products in market, to more than 40 countries. (Nestle, 2008)(5) noticeable Research development Have 24 Research Development centres worldwide and invest RM5 billions annually. (Nestle, 2008)(6) Halal policy Helps in targeting Muslim by secure them with all product is Halal and excessively attract non-Muslim node at the same time. (Nestle, 2010)(W)eakness(1) Very narrow product line for beverages Only promotes chocolate malt (milo), coffee (Nescafe) and milk beverage.(O)pportunity(1) New product discover (expanding product line) The discover of New Nescafe Menu is a good example whereby it similarly help to expands the range of coffe e under the Nescafe brand. In the future, they maybe will produce coffee candy in different flavour.(2) Changing of customer inescapably/tastes For instant, customers have more awareness toward their health care and worry to have product that come with low sugar contain frankincense Nestle can introduces their products with low sugar contain to fulfil customers needs.(3) New technology To improve the products quality by implementing the new technology and book their market share in the industry.(T)hreats(1) Economic downturn Threaten pull in margins and bottom-line. If the firm decides to cut cost, many people might lose their caper and social responsibility is frequently put on hold. (Nestle,2008)(2) Entry of new competitor For instant, the Starbucks also blends into the soluble coffee market with their signature exchange premium coffee. Thus, Starbucks might affect the sales of Nescafe premium range product.Financial AnalysisFinancial analysis use and transformation of financ ial data into a form that can be used to monitor and evaluate the firms financial position, to plan future finance, and to designate the size of the firm and its rate of developing (allbusiness.com, 2010).Based on the 5 years statistics (appendix 2), it proved that the company is growing healthy from the year 2004 to 2008. In 2008 Nestle Malaysia post a disturbance of RM3.9 billion (approximately) for the year ending 31 December 2008, which represents a 13.5 % festering over 2007. Profit before tax income is increasing from year 2004 to 2008. However, the voice of turnover which is rated as 11.6% in 2007 fall to 11.4% in 2008, due to sinister capital expenditure(which contributed to higher financing costs) (Nestle, 2009). With the implementation of lower tax expenses by government, Nestle (Malaysia) manage to nudge the gelt margin after tax from 8.5% to 8.8%. According to Nestle (2009), the Board of Directors has recommended a final net dividend of 80 cent per share, giving a count net dividend proposed and declared for the financial year of 191.19 cent per share that represents a 68.0% increase likend to the previous period and hits the highest in the Groups history.From the balance sheet (appendix 3), we can see that the Nestle group and Nestle Malaysia are growing stronger and having a very positive view about their assets with the increments. Overall, the group have RM1,660,401,000 of asset while the company have RM1,110,879,000 of assets. Furthermore, it achieved a balance with their equity and liability that shows the company is healthy with strong financial.By observing the income statement (appendix 4), the company is making more profit (compared by year 2007 and 2008). Nestle Malaysia hits RM435,269,000 of revenue for 2008 which is higher than year 2007 by increase of RM75,116,000. For the Nestle group the gain approximately RM3.9 billion at 2008 and its better than the previous year with RM3.4 billion. The basic earnings per ordinary share ( cent) for year 2008 is 145 while year 2007 is 125. It shows that currently the company is still doing well.Based on the exchange flow statement (appendix 5), the available cash of the group and company is decreasing. It is because of the cash is used for heavy financing activities.Group 2008RM000Group 2007RM000Company 2008RM000Company 2007RM000 fire cash from operating activities555,972290,657401,005226,134Net cash from investing activities(185,696)(100,721)28,21921,667Net cash used in financing activities(376,256)(214,094)(445,550)(234,505)Cash and cash equivalents at 31 Dec25,69031,6701,04217,368Objectives1st years objective (short term)Hoping to double our share (to reach 70 per cent of the total market) of the speciality coffee market by next year with the launch of New Nescafe Menu (Don Howat,2009)Catering to Malaysian tastes by offering a mix of drinks across different ranges and the new products add to the companys product portfolio of these ranges. (Don Howat,2009) sympathi se an increase in coffee consumption in Malaysia. (Don Howat,2009)Hope to change the perception that coffee is bad for health and educate consumer on the rightness of antioxidants contained in coffee. (Don Howat,2009)2nd years objective (and long term objective) up(a) current portfolio to ensure the products has more nutritious without affecting the taste (for example, less sugar, salt and fats). (Nestle, 2008)Maximise the use of good quality local blunt materials. (Nestle, 2010)Creating and increasing consumers awareness on nutritional labelling, food safety and consumer rights to safe and quality food. (Nestle, 2008)Guarantee that all products manufactured, imported and distributed by Nestl Malaysia are certified HALAL by authorised Islamic certification bodies. (Nestle, 2010)Produce and merchandise world-class products of the highest consistent quality, reliability and convenience based on business excellence principles throughout our operations.(Nestle, 2010)Marketing Strateg iesNescafe Menu utilizing the multiple segmentation bases which include of geographic, behaviour, and demographic segmentation.NESCAFMENUs variance for Consumer MarketGeographicCountryMalaysiaCountry faithAsiaDemographicAge12 65+GenderMale and womanishFamily size15+Family life circleSingle/ unite (with or without children)IncomeUpper low and aboveOccupationStudents, working adult, housewives retired pietyMuslim( in the main), Hindu BuddhistRaceMalay, Chinese, Indian othersNationalityMalaysianBehavioural causeRegularBenefitsQuality and convenienceUser statusPotential exploiter and regular userUser ratesMedium use consignment StatusStrong and absoluteReadiness stageInterested, desirous and function of buyingAttitude toward productPositiveTable 3 NESCAFMENUs Segmentation for Consumer MarketAdapt from study Segmentation Variable for consumer markets by Philip Kotler, Gary Armstrong (2010). addressable at Principles of Marketing (13th stochastic variable) Chapter 7 node-Dri ven Marketing (Market Segmentation) page 217.Selective marketing (differentiated marketing) market-coverage strategy in which a firm decides to target several market segments with separated offers (Philip Kotler, Gary Armstrong 2010). Nestle as leader of global food market applied selective targeting by differentiated their products to numbers of categories that means to target different customer.Categories of productExample of productTargeted customer (in general) Coffee and Beverage Nescafe / Milo All range Culinary Aids/ Prepared Foods Maggi Household, mainly teenager and university students. Milks Nespray/ Nesvita Household Liquid Drinks Perrier Upper middle range Junior Foods Nestle Baby Cereals Parents with baby Breakfast Cereals Nestle Breakfast Cereals Parents with children Chilled Diary Nestle Bliss/ Nespray Yogurt Household Ice-cream Nestle ice cream / Drumstick Parents with children Chocolate and Confectionery Kit-Kat / Smarties / Milkybar All range Healthcare Nutrition Nutren Optimum / Fibre / Junior Household Performance Nutrition POWERBAR Performance / Gel Student working adult Nestle Professional Nestle Professional Medium/ large CompaniesTable 3 Nestls products, brand name and their targeted customer.Adapted From Nestle in your life, our brands (Nestle, 2010) From http//www.nestle.com.my/Nestle+In+Your+Life/Our+Brands.htmNescafe is a convenience product type of consumer product that consumers usually buy frequently, immediately, and with a minimum of comparison and buying effort. Normally low priced and marketers place them in many locations to make them readily available when customers need them (Philip Kotler and Gary Armstrong, 2010).(a) Pricing StrategiesMajor base pricing strategies Value-based pricing Everyday low pricing (EDLP) Set more or less low price but still offer high quality products and adequate customer services. Prices are not the highest in the market nor are the lowest, consistent with the benefits and costs associated w ith acquiring the product.(O.C. Ferrell Michael D. Hartline, 2008) For instant, Nestle(M) re-launched the everyday low price Nestle branded range of Take-Home Tubs with Hi calcium, in line with the Nestle corporate wellness initiatives, to further strengthen the leadership position in the affordable segment. (Nestle, 2008) Competitive MatchingPricing strategy focuses on twin(a) competitors prices and price changes. Although some firms may charge slightly more or slightly less, these firms set prices at what most consider to be the discharge rate for the industry(O.C. Ferrell Michael D. Hartline, 2008).Nestle set the Nescafe Menu according to the going rate whereby market the 15-pack bags at the recommended retail prices of RM12.90 which is almost the same with the Old Towns white coffee (RM12.90)Strategies for adjusting Promotion discountingVirtually all firms, even those using value-based pricing, will occasionally run special promotions or sales to attract customers and pass water excitation (O.C. Ferrell Michael D. Hartline, 2008).Nestle uses this strategy to attract new and old customer and increase their sales during promotion. Reference pricingFirms use reference pricing when they compare the actual selling price to an internal or outside reference price. All customer use internal reference prices or the internal expectation for what a product should cost. As consumers, our experiences have given over us a reasonable expectation of how much to pay for the product (O.C. Ferrell Michael D. Hartline, 2008).A pack of 15 pack-bags coffee cost above RM7.90 above and at the average price of RM11.50 to RM13.50 thus consumer expectation price also will be around that reference price.(b) Product StrategiesThe launched of New Nescafe Menu is using product line extensions strategy by adding new flavours of coffee to Nescafe brand. These products supplement an existing product line with new styles, models, features or flavour and it allow the firm to keep its product fresh and exciting with nominal development cost and risk of market failure (O.C. Ferrell Michael D. Hartline, 2008).Product Strategies brand strategy* Line extensions It occurs when a company extends existing brand name calling to new forms, colours, sizes, ingredients, or flavours of an existing product category. (Philip Kotler and Gary Armstrong, 2010) In this scenario, Nescafe introduce the new Nescafe menu by proving three new flavour of coffee to meet consumer variety.Packing and labelling* Nescafe Menu used a simple design by implements the photo of beverages in the packing and picks the colour to suit the beverages.* A big and clear brand name is spot in the top of the packing.* 15-pack bags at the recommended retail prices of RM12.90* Nescafe also provide 3 flavour in a box of 6-pack bags for consumer who want to have a try for all the flavour.Customer Support Service* According to O.C. Ferrell Michael D. Hartline (2008), a firm may have difficulty differenti ating its products when all products in a market have essentially the same quality, features, or benefits. In such cases, providing good customer support both before and after the sale helps in identifying and defining consumer needs.* Nestle provides the toll- vacate customer service line (1800 88 3433) in crop to help them to know more about consumers needs and strengthen the current position.Product Life Cycle NescafeIntroduction stagei. Attracting customer by raising awareness of and interest in the product offering though advertising, public relation and publicity efforts that connect key product benefits to customers needs and wants (O.C. Ferrell Michael D. Hartline, 2008). First, Nestle make the official launch for new product included Press conference then advertising their product through newspaper, radio and television.ii. Inducing customer to try and buy the product through the use of various sale tools and pricing activities (O.C. Ferrell Michael D. Hartline, 2008 ). Nestle conducts free testing section, gives free samples to customer at hypermarket and offers their product in cheaper price during the promotion of new launched product.iii. Furthermore, Nestle ensure there is high availability and visibility of the product through trade promotion activities that encourage persuade (hypermarket, convenient investment company and etc) to stock and support the product (O.C. Ferrell Michael D. Hartline, 2008).Growth stagei. Nescafe has a strong branding, high quality with reasonable price to secure their market position.ii. hold advertising to stress the products benefits for target customer (O.C. Ferrell Michael D. Hartline, 2008).iii. Maintain and control over product quality to ensure customer satisfaction (O.C. Ferrell Michael D. Hartline, 2008). For example, Nestle collect the customers feedback through their customer service line and email.iv. Contact with key television channel especially retailers to get a better shelf space that s ubstantially catch customers eyes.Maturity stagei. Nescafe manage to hold the 70% market share of the Malaysian market share with its soluble coffee ranges (Don Howat, 2009)ii. Nestle able to create cash flow and invest it for new products or technology to improve their companys portfolio.iii. At this stage, Nescafe also develop a new product calculate and apply the new technology to their products.(c) Distribution strategyNestle uses the indirect marketing channel with intensive distribution that makes a product available in the maximum number of merchants or outlets in each area to gain as much exposure and as many sales opportunity as possible (O.C. Ferrell Michael D. Hartline, 2008).Multiple customer-marketing channel Adapted from Business (tenth edition)by William M. Pride, Robert J. Hughes, bozo R. Kapoor, 2009.Available athttp//books.google.com.my/books?id=zb0cItqvLJUCpg=PT427dq=customer+marketing+channelhl=enei=PNa4S6_3I4SyrAfPpfXDCgsa=Xoi=book_resultct=resultresnum=7ved= 0CFMQ6AEwBgv=onepageq=customer%20marketing%20channelf= off Nestl as the producer keep the product in their national distribution centre which is used as the main logistic function warehouse. Next, wholesaler represent hypermarket that gets the products for the agent (sales office) and then sell it to retailer and customer.(d) Promotion strategyNestle applied the promotion mix as the promotion strategies.Nescafe use product advertising to promote the image, features, uses, benefits, and distribution of products (O.C. Ferrell Michael D. Hartline, 2008). They present their advertising through television, radio, magazines, newspapers, outdoor display and the internet. Thus, consumers can have a look of the physical evidence of the product.Public relations can be referring to the process in the 7Ps of the marketing mix. It used to promote the firms, its people, its ideas, and its image and even to create an internal shared understanding among employees and can create specific images su ch as quality, innovativeness, value, or concern for social issues (O.C. Ferrell Michael D. Hartline, 2008). Nestle uses different methods such as tender conferences, press releases and event sponsorship. For instant, Nescafe organizes press conferences and releases official press to announce the launch of the Nescafe Menu.Personal selling refers to individualized presentation by the firms sales force for the purpose of making sales and building customer relationships. Sales people (as one of the 7Ps of marketing mix) will carry out the communication that attempts to inform customers about products and persuade them to barter for those products. Nestle uses the 6 sales offices and their employees to sell their products.Sales promotion direct towards consumers and trade is applied. Nestle gives sale promotion by giving out samples, point-of-purchase promotion and contests. For example, Nestle promotes different contests for their product seasonally to create excitement for consum ers and increase the sales. Moreover, they offer trade allowance and selling incentives offered to an intermediarys sales force. decision and recommendationsIn conclusion, Nestle group is a strong financial corporate and Nestle Malaysia is a Multinational company that have a pearlescent future in exporting Halal product to more countries out of Asia. The born of the new Nescafe Menu means a revolution of Nescafe beverages by offers local-styled coffee according to consumers needs.Furthermore, I discovered that Nestle do not have a brand that offers tea beverages as new line of product and attract non-coffee drinker to be Nestls consumer. Moreover, Nescafe ought to provide all their beverages in can so that it easy to carry to everywhere and enjoy it at anytime.As the awareness of health issues is rising rapidly in Malaysia, Nestle should provides their product with low sugar range or flip-flop it with sugar cane which is more healthier compare to fine sugar.Lastly, Nestle should r e-design their logo, label and packing as it rated as less attractive compare to its competitor. As the fast-development of multimedia, Nestle should fully utilize it in their packing and advertizement to suit the new generation.ReferenceBooks and e-booksPrinciple of Marketing 13th edition by Philips Kotler Gary Armstrong, 2010. United State of America, Pearson Prentice Hall.Marketing Strategy (global edition) quaternary edition by O.C Farrell Michael D. Hartline ,2008. United State of America, Thomas South-Western. Business (tenth edition)by William M. Pride, Robert J. Hughes, Jack R. Kapoor, 2009. (Online) Available at http//books.google.com.my/books?id=zb0cItqvLJUCpg=PT427dq=customer+marketing+channelhl=enei=PNa4S6_3I4SyrAfPpfXDCgsa=Xoi=book_resultct=resultresnum=7ved=0CFMQ6AEwBgv=onepageq=customer%20marketing%20channelf=false accessed at 20th March 2010Introduction to marketing conceptsBy Graeme Drummond, John Ensor, 5th edition