Thursday, October 31, 2019
Global Warming on Forests Essay Example | Topics and Well Written Essays - 1250 words
Global Warming on Forests - Essay Example This paper talks that the collective rainforests of the world act as a climatic sponge storing much of the worldââ¬â¢s rainwater, of which the Amazon rainforest accounts for more than half. Trees in the rainforest recycle water drawn from the forest ground. This, combined with the moisture that evaporates from the leaves is released into the atmosphere from whence it came. This paper approves that deforestation is the leading reason that soils in the forested areas lose their sustainability. Farming techniques and overgrazing increase soil degradation and erosion. The solution begins with severing the root cause. The voracious consumerism of industrialized nations is depleting the forests but if the people of these nations could come to understand the implications of deforestation and learn the specific companies within their country contributing to it. For example, Kentucky Fried Chicken and McDonalds have recently been reported on the national news as major purchasers of soybeans grown in former rainforest lands. This paper gives a solution automobile emissions may lie in alternative fuels. Promising future alternatives to crude oil, vegetable oil can be substituted for diesel fuel while ethanol is an effective petrol additive. Given the fact that fossil fuels are finite and its emissions are threatening every living thing on earth, why have most nations been slow in efforts to reduce the use of oil in favor of more viable energy sources? The economic consequence of doing nothing is far greater than solving the problem through legislation.
Tuesday, October 29, 2019
Sociology Essay Example | Topics and Well Written Essays - 500 words
Sociology - Essay Example Adolescent substance abuse can be defined as the use of a drug or chemical ââ¬Å"that modifies the mood or behavior of the userâ⬠by which, ââ¬Å"the userââ¬â¢s functioning is negatively affectedâ⬠(Lewis, Dana and Blevins, 2009, p.4). Substance abuse is also different from addiction in that when addiction is there, the person shows ââ¬Å"physical symptoms of withdrawal or tolerance to the substanceâ⬠(Lewis, Dana and Blevins, 2009, 4). Any deviant behavior is proven to have ââ¬Å"multiple causesâ⬠(Isralowitz and Singer, 2009, 10). The causes of adolescent substance abuse are understood to have developed from a ââ¬Å"complex interaction of interpersonal, social and developmental factorsâ⬠(Lorion, 1990, p.203). Developmental factors are supposed to be the most important causes for this problem, as puberty will bring in many physical changes, along with changes in thinking, self-image and self-esteem (Lorion, 1990, p.203). Though it is very difficult to list all the causes involved, it is approved by all that substance abuse results in serious health problems in adolescents (Isralowitz and Singer, 1983, p.1). Prevention, early identification, intervention, and maintaining of corrected behavior are the steps in treating this kind of deviance (Isralowitz and Singer, 1983, p.1).
Sunday, October 27, 2019
The Antivirus Technology Definition Computer Science Essay
The Antivirus Technology Definition Computer Science Essay Antivirus is defending software designed for guarding your computers system smart cell phones against Virus, Trojans Hijackers etc. These all Viruses, Trojans Win32 etc. are called Malicious Software in computer world. All Antivirus software run in the background at all times to protect defense your computers system smart cell phones some antivirus are automatically updated through internet some antivirus are needs manual updated through internet to protect your systems against Malicious software. Introduction: Antivirus software provides a many critical layer to protect from Virus, win32, Trojans worm etc. The first document removal of the computer viruses was written by Bernd Fix. There are two types antivirus application in the computer world so that the time of the Atari ST platform designed in 1987 the first one was G Data second was UVK 2000 made by Bernd Fix in 1987.The word Antivirus is come from the word Antibiotic which means implies combat with an invading force of the programs. Fred Cohen designed the strategies relative to an Antivirus software program in 1988 to solve the virus problems. The old previews years Antivirus software are not so good because those software only detected the Virus Spyware etc. remove it from your computers system damage your some operating system files inside your computers now AntiVirus software much better than old ones because it detected the virus remove it without deleting your operating system files inside your computers it also fight against new malicious software which come from internet network. Well in the preview years Antivirus software are not completely free downloadable on the internet means you could only find some antivirus software with trial version now Antivirus software are completely free download without trial version . New Antivirus also checked the incoming outgoing mail, email attachments etc. It also has internet security for internet threats. Advantages and Disadvantages: Antivirus software is very useful in the preventing, controlling, virus many more viruses program, which can damage the computers components from inside operating system files to. Antivirus software are used the methods for searching killing Viruses some of the well knows patterns of computer data programs. Antivirus programs are very effective against the viruses program, whose is the biggest threat for your computer systems. Antivirus program has some limitations drawbacks on the other hand, which effect on the computer system performance. In the computer world, inexperienced users can have many problems with the antivirus programs or software such as inabilities to understand, threats of the software success of the antivirus programs software are dependent on the ability of the user to understand Or knowing the right kind of balance between the positives negatives things in the computer world. Antivirus software or programs can cause problems during the installation window in the computer system or upgrade the Windows Service packs in the computer system. Antivirus software can be hampered some few software programs because it used its own firewall to block application to store in the computer system. E.g. True Crypt. Some Antivirus program will not knowing by the policy assessment before make its own policy when it install in the computer system. There are three major types of detection which is used to identify the potential threats in the computer system such as: Signature based, Heuristic based File emulation method. Signature based detection: In this method, you can identify the viruses malware virus software. Antivirus software can also compare the content files of the computer system to dictionary files of virus signatures because viruses are embed into themselves in the files shape or in pieces shape to infect the computers. Heuristic based detection: In this method, you can only detect malicious activity relative to viruses identify unknown viruses in the computer system. File emulation: In this method, it has using the heuristic type approach which it executing the program in a virtual environment which effect the action of the program performs it also carries out the disinfection actions relative to the programs which run in the computer. What is a Virus? Viruses are the category of malicious program code software, viruses are used for attempted to breach security value break them damage data of the computer system display unwanted messages on the display screen when the antivirus program for gabbing user passwords on a networks are called LOGIN.exe. These real LOGIN.exe programs which have intruder or infect the user programs are called Trojan Horses when viruses program fall into the Trojans category than these viruses program have the ability to reproduce themselves again again until users computer systems slow down performance processing to any application it infected the your operating system. . Why Do Viruses Exist? Now-a-days every computer virus programs are written by someone who wanted it to infect damage other peoples computer systems smart cell phones our world. So these Viruses program coding pass from computer to other computers system these viruses may be not have direct effect on the some computers but it effects on the other resources like(Disk space Memory) thats why these viruses are harmful it coding are very complex it also contain some serious bugs which damages the computer system pretty badly. How do we will know if we have a virus want to protect our computer systems? If the someone computer systems are very running slower, freezing it displaying error messages again again than you should have the viruses in yours computers or operating system than u must install Antivirus software scan your computer system with latest internet updated of the Antivirus programs security to clear your computer with viruses. How do we get these viruses on our computer system or operating system? Computer systems can be infected by viruses because: User using the Internet without having the latest updates of the Antivirus programs security installed into your operating system. User using the Internet without having a working firewall on the operating system or Antivirus software. User who opening the email attachments without knowing that whos will send him or her. User visiting unreliable website pages than viruses automatically stored into your computer because these website pages contains the infected viruses programs. How do we get rid of the viruses? To get rid of the Viruses you should use latest Antivirus software or latest Antivirus program security updates now-a-days many new Antivirus software are able on the Internet free cost with one years updates free e.g. Norton Antivirus, McAfee Antivirus Kaspersky Antivirus etc. What are types of Virus in the computer world? There are several types of viruses in the world which your computers your operating systems for examples: Worms, Trojan horses, Logic bombs, Mutated viruses, Polymorphic viruses, Bounty hunters, Boot sector viruses Macro viruses etc. Worms: Worms Viruses are used to spread over a network of the internet hacks the computer system or operating system which connects with internet networks. Trojan horses: Trojans viruses are used to create a security hole in the computer programs or operating system infected the system files inside. Logic bombs: Logic bombs viruses are used to trigger the specific event means computer systems date programs of remote activation etc. Mutated viruses: Mutated viruses are used to rewritten by hacker users to change the behavior or signature of the programs made the multiple versions of the same viruses that infected the computer programs or operating system. So these viruses are also called variants. Polymorphic viruses: Viruses which are used to automatically change according their appearance, like as a chameleon by giving the viruss signature of the programs in encrypt-decrypt function so virus can only be recognize its own signature of the program. This kind of virus is called Polymorphic viruses. Bounty hunters: Bounty hunters viruses are used to modify signature program stored by Antivirus program in the order to render them an inoperable in the operating system. Boot sector viruses: A boot sector viruses are used to infecting the boot sector of a hard drive of the computer system. (Just like MBR Master boot record) it also has infected the speed of the processer. Macro viruses: Viruses which came from email, email attachments etc. to damage the operating system or hack the computer system BackDoor.exe Viruses: These viruses are highly dangerous because it can give the complete shell of the victims computers to the attacker. These exe are made by many encryption techniques, so anti-virus hardly detects these types of viruses. What is Firewall Spyware? Firewall: Firewall is software or program which have security tool to help limit internet network traffic with hackers or viruses to getting in your computer system. Firewall helped protects your computer from future hackers new incoming viruses. Spyware: Spyware are used to a multitude of malicious software programs which access your computer system. When Spyware viruses infect your computer system or operating system than it will slow down your operating system speed performance your computer system going to hang again again. Issues relative with the Antivirus software: Unexpected renewal costs: Some of the commercial antivirus software which includes end-user license agreements which effect on the subscription automatically renewed it, cost so much which you not expected. False positives: Antivirus software can used to identify non-malicious files which having the viruses so that it will be cause serious problems for the computer system because false positive make operating system files very unstable because of the viruses. System interoperability related issues: When the multiple antivirus programs running on the computer or operating system than it will degrade the performance of the operating system create conflicts in every programs running on the operating system. So this concept is called Multiscanning If the functionality of the few software programs can be hampered by the active antivirus software on the operating system. Effectiveness: The effectiveness of antivirus programs have been decreased in the previews year because of new good Antivirus software launch on the markets computer threat going dropped from 40-50% to 20-30% in this preview year. Rootkits: Rootkits are major challenge for antivirus programs on the operating system it had admin area access to the system to control, invisible hidden the EXE from the running processes of the task manager on the computer system. What is Cloud antivirus method? Cloud antivirus method is a technology that used the lightweight agent software to protect the computer system or operating system it also used for analysis the data with providers infrastructure. To implement this Cloud antivirus method we used the multiple antivirus engines which scanning suspicious files from the operating system this concept is called Cloud AV. Cloud AV was designed to send programs on the internet network where detection programs are used to improve the detection rates with multiple antivirus behavioral on the internet network. Online Scanning: Some of the Antivirus provides maintain of websites with free online scanning on the internet with the entire computer such as like local disks, critical area files relative to the computer systems. Well as you know that internet becomes the vehicle for communication in this world people using digital communication on the internet with very fast speed scope so that new kinds of viruses are increasing spread all over the world of the internet network. If someone will not want to install antivirus on his or her computer than he or she can easily scan his or her computer online this is quickly possible solution. What do u means by the birth rate death rate of the viruses? The Birth rate of the viruses: The birth rate of the viruses depends upon the one infected computer system or operating system which can spread this infection to other computer system or operating system. The Death rate of the viruses: The death rates of the viruses depend upon the infection found on the computer system or operating system destroy that computer system. Antivirus products: There many products of antiviruses. Some of them are discuss below: Avast Free AntiVirus: Avast is an antivirus computer program made by AVAST Software a.s. Avast is the freeware version of the Avast company. Avast can be installed on Microsoft Windows, Macintosh Operating System X and Linux. It also has command line scanner system and different dangerous script blocker. It has many new features e.g. file system shield, Real time protection form worms and threats. Mail shield protect from dangerous mails and attachments In it. Web shield protects form malicious URL or virus containing sites. Network shield protect from attacking ports and known network worms. Boot time scan, scans the infections that are loading during windows startup and remove them. If any virus is found, antivirus displays the notification to the user, and asks for action to take. AVG AntiVirus: AVG is another antivirus program made by AVG Technologies. It can be installed on multiple platforms and FreeBSD computing platforms. It also has a free version of antivirus. There are many components in avg antivirus. Anti-Spyware protects you from different spyware which are in your computers. Link Scanner scans the web links, whether they are affected or not. Web Shield protects you from viruses which come into your computer through internet. It has own firewall system to protect the system. It also has servers version to protect the web/file servers, mail servers and dns severs. Avira AntiVirus: Avira is considered as the 6th largest antivirus software worldwide. And it has 100 million customers. It can be installed on Android and other operating systems. It runs as a background process which checks every file opened or downloads form the internet. It has different components in the antivirus. Email scanning which supports POP3 and SMTP protocols. Web Guard to block the access of malicious sites. It has personal firewall and anti-spam system. Backup module to protect and secure the important data. Keep an eye on different Botnets, and prevent them. It offers tools including a Rescue System utility used to write a bootable CD and DVD. Some main features of Avira windows versions are: Anti-Phishing Mail Guard Game Mode AnitBot Parental Controls Bitdefender Antivirus: The Bitdefender products include antivirus and antispyware, personal firewall, privacy control, user control, backup for company and home users. PC Tuneup and Performance Optimizer. It can be used in Symbian Operating System, Windows Mobile, and Solaris. A free basic online scan is offered by the Bitdefender via the bit defender website. Bitdefender introduces the new technology B-HAVE. Through which it can detect the unknown threats. ESET NOD32 Antivirus: ESET first ever product was NOD, an antivirus program for computers running MS-DOS. Then after some time period it introduces the NOD32 for Windows XP. In September 2010 ESET released NOD32 antivirus for Macintosh OS. It also supports BSD, Linux, Novell NetWare and Sun Solaris. ESET NOD32 includes an enhanced media control that automatically scans all USB, CD/DVD and external hard drives. F-Secure Antivirus: F-secure is first antivirus to establish an existence on the World Wide Web. F-secure first introduced the anti-rootkit technology. It can be installed on Mobile security; it has also the facility of online Backup and anti-theft for Mobile. Also available for Linux, servers, Policy Manager, protect the message security gateway. F-secure developed the new technology through which new or unknown malware, which causes the changes in windows files and windows registry. F-secure teach the one semester course in university about new viruses and other technology. F-secure antivirus can also detect the backdoor.exe virus. F-secure also helping the authorities to catch the mafia or terrorist organization through their antivirus. K7 Antivirus: K7 is the first antivirus to build their own NST (Nano Secure Technology), has ability to protect the system at multiple layers. Which can detect and remove the existing threats and as well as future threats. It provides support browsing against attacks by the attackers, to steal the passwords or even your money. It also produces the various applications and antivirus for DOS. The basic feature are firewall, Anti-spam, Anti-Spyware tools, K7 mail security, security tools to detect the key loggers, Tracking Cookie detection, usb scanning, safe cloud base scanning. Kaspersky Antivirus: Kaspersky product designed to protect the users from malicious malware and other threats. It runs on different platforms and Linux version available only for business users. Its features include real-time protection, removal and detection of viruses, Trojans, worms, spyware, key loggers, backdoors, sql injection and many others. It also has the online helping facility to help and guide the user about their new products. Rescue disk facility is also available in Kaspersky. This scans the computer at boot time. The features which are not implemented in the antivirus program are personal firewall, AntiSpam and parental controls. Kaspersky uses the highly graphics to display the interface, so their system requirements are high. At early stages of Kaspersky, it has very crucial flaws in it, through which attackers can attack and run the piece of code to compromise the users pc. McAfee Antivirus: McAfee Antivirus is very powerful antivirus it is light weight. This Antivirus is the leading antivirus software in the security industry markets. This Antivirus have two features one is ScriptStopper second is WormStopper it automatically updater it virus definitions updates on the regular basis from internet network. Panda Antivirus: Panda Antivirus have Ultrafast new feature scanning engine as compared to other antivirus applications. This Antivirus have the Anti-Phishing filter Anti-Banking Trojans engines in the Identity protection area it have advanced heuristic scanning with personal firewall. ZoneAlarm Antivirus: ZoneAlarm Antivirus have very strong removal ability to destroy the dangerous viruses also having multilayered security. This Antivirus used less processer power of performance it used very low computer system resources. TrendMicro Antivirus: TrendMicro Antivirus is very popular antivirus, which mostly used for Spyware protection Adware protection from viruses. This Antivirus has some new features like Remote file locking sharing registry files. Sophos Antivirus: Sophos Antivirus includes the network access control, Anti-spyware etc this types of Antivirus are used for watching on the data supplying through monitoring tracking software means like upload videos. Rising Antivirus: Rising Antivirus is the Chinese Antivirus software it is used for UTM, spam-blocking firewall etc. This Antivirus basic function is BIOS rootkit checks. Vba32 Antivirus: Vba32 Antivirus programs are used in the personal systems it neutralizes viruses which infected or attack the computer systems on the real time. Linux Shield: Linux Shield is the Antivirus product used in the Linux operating systems to clean the viruses from Linux operating system Technology Highlights: There are many technology highlights such as : First Generation (Antivirus): The first generation of Antivirus software are based on the signature detection polymorphic engines. Second Generation (Antimalware): In the preview few years, new types of malware software are emerge file-less network worm etc are on the spotlight of the massive damage viruses are on the internet network. These problems can be solving by personal firewalls clear the signatures packet from viruses used smart clean Browser which will not infect the operating system with the spyware Trojans viruses. Third Generation (Proactive Technology): TruPrevent: This behavioral technology is used for research development of the technologies. It has two main function technologies: Behavioral of analysis blocking known computer system. (i). Behavioral Analysis: This Act as last line of defenses against new viruses which executing in the computer system it give real time results used behavioral category alone. (ii). Behavioral Blocking: This is the Second main component of the TruPrevent. It knew hacker viruses behavioral to attack system application by injecting with program codes into the computer system. Genetic Heuristic Engine: These technologies are inspired by the biology work as an organisms which individually identified by the other organisms. It based on the digital genes. This carries out new viruses harm things which going to infect or damage the computer system or operating system. Collective Intelligence (The Next Generation): Collective Intelligence used the approach which collect the objective of this technology in which after clean the computer system or operating system it automatically generated full report cleaning viruses report it much faster lightweight in the future. It protected your computer system 95% up to 98% it also give your infecting computer system percentage according to the report. It is also collect the data from the communities which can tell us about the behavioral patterns of the any programs files. It also have the information about higher visibility threats against viruses or active on the internet network it can be automatically do data processing on the computer system analyzes thousands of new samples which received every day from internet network it will not expired the data which infect by the new malware viruses. It automatically saved the data files from new old malware it also release the knowledge extracted from delivering to user on the web services updates i t. In this platform we can do collective intelligence technology or platform for online services designed to perform of the machines against malware viruses solve the security solution. It also gives corporate requirements information performance of the malware thats why we created a specific managed service called Malware Radar. Proof Point Virus Protection key capabilities: Viruses Protection key depend up on the efficient message analysis, Continuous business enterprise virus-detection updates, Integrated Administration reporting flexible policy management message disposition. Viruses protection key have the enterprise antivirus engine which gives good efficiently of the scanning messages attachments for new malicious codes which give fully proof point platform find new viruses definition which created the cloud-based Dynamic system which secure channel guarantees with proof point protection is already up to date than it will gives business enterprise with maximum detection against all viruses for IT administrators gives very importance to all antivirus enterprise of the proof point of the protection. It also used dynamic update service make for organizations.
Friday, October 25, 2019
Essay --
Income inequality continues to increase in todayââ¬â¢s world, especially in the United States. Income inequality means the unequal distribution between individualsââ¬â¢ assets, wealth, or income. In the Twilight of the Elites, Christopher Hayes, a liberal journalist, states the inequality gap between the rich and the poor are increasing widening, and there need to have things done - tax the rich, provide better education - in order to shortening the inequality gap. America is a meritocratic country, which means that everybody has equal opportunity to be successful regardless of their class privileges or wealth. However, equality of opportunity does not equal equality of outcomes. People are having more opportunities to find a better job, but their incomes are a lot less compared to the top ten percent rich people. In this way, the poor people will never climb up the ladder to high status and become millionaires. Therefore, the government needs to increase all the tax rates on rich people in order to reduce income inequality. 1. Tax Cuts Caused Income Inequality Income inequality is a big problem in the United States because the top, wealthiest American saw huge increases in their incomes, which the rest had their incomes go down. Bottom people do not have the same amount of money and the opportunity to move up the social ladder as the rich people do. In order to reduce income inequality, the government needs to tax the rich people more, and give poor people more money and more social services - education, food subsidies, health care. Tax cuts are only benefiting the richest people, and will widen the inequality gap between the rich and the poor. A recent report from the Congressional Research Service states, ââ¬Å"as the top tax rates a... ...ot let this inequality gap continues to rise; therefore, the government needs to tax heavily onto the rich people, and redistribute their money to the poor. If income inequality continues to grow, the economy will break down. For example, if the housing price continues to rise because of the rich people, poor people will not have a place to live since they cannot afford to buy these expensive houses. When this happens, it will create another housing bubble because the houses are not worth buying, which means the market value of the house exceeds the houseââ¬â¢s value; therefore, nobody will buy the house including the riches since they already have houses to live. Moreover, poor people do not believe they can get access to wealth because they cannot afford anything, and they cannot afford the tuition fees for a good education, which is the traditional route to success.
Thursday, October 24, 2019
Violence in the Workplace Essay
Workplace violence includes threatening behaviors, verbal abuse and physical assault. In any given week about 20 workers are murdered in the United States (Bruce& Nowlin, 2011). This can include the harming of an employee or client/customer of an organization by another employee, client/customer, or member of the general public. Many internal and external factors, including socioeconomic conditions, problems related to drug and alcohol abuse, layoffs, dictatorial workplaces, stress over job security, and domestic problems, are leading causes of workplace violence. Organizations have to deal with human productivity and economic costs from incidents of workplace violence. For example, employees and customers or clients can be seriously injured or killed. In addition, a loss of productivity generally occurs during the incident because the business may be closed or on reduced hours pending investigation and employees may fear that another incident could occur within days or months. Some employees also may quit as a result of fear of another incident or dissatisfaction with the employer for failing to prevent or properly respond to the incident. Physical injuries or emotional difficulties that result from the violent incident may cause increases in workersââ¬â¢ compensation claims. Organizations with policies on workplace violence are more likely to implement practices that can reduce the potential for workplace violence. The managers in these organizations indicated that counseling for potentially violent employees, investigating unfairness in the workplace, disciplining/arresting people responsible for violent acts, mandating fair treatment for terminated employees, using mediation to resolve disputes that have the potential for becoming violent, and intervening in problems between employees were part of their workplace violence policies. These elements are further evidence that organizations that initiate formal policies for workplace violence are more likely to consider ways to be proactive, rather than reactive. Organizations must take steps to ensure that employees feel safe and secure. While organizations are unable to anticipate all situations, basic preventive measures can deter some violence in the workplace. While every employee with the potential for workplace violence cannot be pre-identified at the point of hire, organizations should have a variety of pre-employment assessments in place to ensure selection of individuals whose credentials, work experience, personality, and life experiences appropriately correspond to organizational needs and values. At the pre-incident strategy stage, the organization should create a zero tolerance policy. The organization should document all forms of aggression that have occurred against people and property associated with their organization. Employees should be encouraged to report incidents of which they are aware. Furthermore, for a second strategy, pre-employment screening should include psychological testing, background checks to validate an applicantââ¬â¢s resume, reference checking, employment history verification, or even integrity interviewing. Training should include interpersonal communication, conflict resolution techniques and hostage survival skills to ensure that employees are prepared for any violence that should occur in the workplace.
Wednesday, October 23, 2019
Clairant Marketing
We are also thankful to Mr.. Oman Patella 0 for his help and valuable Insights Into Strategic Management at Claimant Pakistan Limited. Mr.. Patella, a very dedicated individual, is a competent and proactive professional at analyzing the implications of Claimant's competitive strategic framework on each of the business' operations. He provided us with every detail about Clangors corporate strategic activities and how they are aligned with the core competencies of the company.Without his time and help, it would have been impossible for us to prepare this report. Sincerely, Amber Alicia Ham Named Virus Mason Razz Mohammad Moms Useful Gaga students of ABA (HON.) Institute of Business Management, Karachi. Letter of Transmittal Mr.. Abdul Qatar Mollie Institute of Business Management Koran Creek Karachi ââ¬â 75190 Pakistan Date: 18th April, 2013 Dear Mr.. Mollie: Management in Claritin Pakistan Limitedâ⬠as authorized by you.The purpose of this report is to examine how Claritin Pa kistan Limited manages its strategic activities at the corporate as well as the business level. The project report is a comprehensive outline of Claimant's strategic mission, the competitive strategies it has developed to enhance its core competencies, the macro-economic analysis that it conducts for scanning the various environmental threats/pressures, the strengths and opportunities it effectively utilizes and the weaknesses and threats it counter- balances.The group members were immensely excited to work on this project since in a few months' time we will all be part of the work force and will be concerned with these strategic tasks employed in the organization at the basic level of an individual employee. With much effort and diligence all the work was divided equally amongst us. We prepared a questionnaire which contained a list of questions regarding Strategic analysis, development and execution. We then met a representative of Claritin Pakistan Limited, Mr.. Oman Patella 0 wh o responded to our list of questions diligently.Later different parts of the report were asked to be written by each group member. While working on this report we observed the amount of energy, thought process and effort that goes behind into making an organization strategically competitive in its industry We are grateful to you for teaching us the important aspects of Strategic Management, for helping us whenever we needed your assistance and believing in us to complete this report in the best possible manner by fulfilling our capabilities. Contents 1 Objective To conduct Claimant's organizational analysis in the light of the chemical industry.To achieve this objective a broad environmental analysis needs to be conducted in order to recognize the external opportunities and threats along with internal strengths and weaknesses. This would allow us to improvise their existing strategies and suggest recommendations. 2 Industry Definition At present there are nearly 30 Chemical companie s having the total paid-up Capital of RSI. L . 7 billion. Most of them have shown remarkable progress in their sales in the recent years such as Fuji Fertilizer, Icily Pakistan, Negro Chemical, Atwood Hercules,Claritin Pakistan, Sitars Chemical Colgate Palmolive, Berger Paints, BOCA Pakistan, Sins Alkalis, Dyne Pakistan, are considered as market leaders in the field of Chemical Industry in Pakistan. The rapid industrialization resulting in the large increase in chemical consuming products has enlarged the demand of all types of chemicals in the country. Chemical Industry in Pakistan has gradually developed to its present stage and has played a vital part in the development of the country and will continue to do so in future with more foreign investment.The Chemical Industry produces a arioso range of products such as polyester fiber, sodium carbonate, PVC, Soda Ash, PTA, Pharmaceutical, Paints, Fertilizer, Insecticides, Petrol-Chemical and other Chemicals. Chemical industry in Pakis tan is widespread. The chemical imports constitute about 17% of the total import bill. Pakistan has made considerable progress in basic inorganic chemicals like Soda Ash, Caustic Soda, Sulfuric Acid and Chlorine and has acquired sufficient production capacity of these chemicals to cater for the needs of the local industry, while surplus is being exported. 2 Even then there are some challenges to be countered. The chemical industry of Pakistan is lagging behind due to some challenges. The main challenge is that it has to rely on its imports and foreign materials. It does not benefit the economy and results in production of expensive products. Secondly lack of industrial infrastructure and technology in Pakistan results in low quality products which do not mark the standard. Moreover the discriminatory approach of international community does not integrate the Pakistan market into the international economy and Pakistani products are not given access to the international market.Moreove r the lack of resources and weak trade policies of the ministries also result in the weakening of chemical industry. In order to enhance the chemical industry Pakistan must adopt the policy of ââ¬Å"self-relianceâ⬠. Instead of relying on foreign designs and engineering it must improve its own production and ensure high quality of chemical products. Pakistan must work towards integrated approach. It must bring four worlds of a society together which are traders, universities, research and development and production partners.This will bring innovation and must utilize its youth which has rest minds and great ideas to enhance the chemical industry resulting in qualitative and quantitative perfection in the chemical products. Pakistan is capable of producing high technological products all it needs is a little bit of effort in improvement of administrative capabilities and induction of new technology and support from government to put things in order. 3 Company Background and Info rmation 3. History Claritin was formed in 1995 as a spin off from the chemical company Sanded, which was itself established in Basel in 1886. Through their direct lineage, Claritin have massed knowledge and experience of chemistry and industry spanning approximately 150 years. Claritin expanded through the incorporation of the specialty chemicals business of Hooch's (Germany) in 1997, and the acquisitions of BIT Pl (I-J) in 2000 and Saba's Master batches division in 2006.In 2008, it acquired the leading U. S. Colorado suppliers Rite Systems and Ricoh Colors. The latest acquisition, the highly-innovative specialty chemicals company SÃ'Ëd-Chemic (Germany), was completed on 21 April 2011. Additives Catalysis & Energy Emulsions, Detergents & Intermediates Functional Materials Industrial & Consumer Specialties Leather Services Masturbates Oil & Mining Services of specialty chemicals and application solutions for consumer care and industrial markets.Textile dyes include disperse, reactiv e, direct, acid and sulfur dyes. The textile business encompasses special chemicals for pretreatment, dyeing, printing and finishing of textile. Optical brightener and chemicals for special treatment are also the part of the range. Moreover, textile region also include water based application of the emulsion for the paint and the construction industry. Paper business supplies paper dyes, optical brightener and process and pulping chemicals.Leather region produces chemicals for finishing and complete range of wet-end chemicals. The Consumer Care segment includes the Personal Care business which, among others, develops and produces specialty ingredients for skin and hair care, wet wipes and selected pharmaceutical applications. They supply all relevant information and advice for safer use, handling, labeling, storage, and disposal of our products as a part of Claimant's commitment to sustainability and product stewardship to best meet customer needs.Industrial & Home Care business hel ps customers gain a competitive advantage with its product range for household cleaning fluids, disinfectants, industrial and hospital cleaning solutions Claritin, as a world leader in the field of specialty chemicals, is fully committed to sustainable operation and development in all business activities. It develops and offer products and applications that allow for use of the product during its whole life cycle helping to avoid risk to employees, customers, the public and environment.Claritin has signed the Global Responsible Care Charter as our commitment to Sustainability. It is the chemical industry voluntary initiative to continuously improve health, safety and environmental performance, and to communicate with all stakeholders through the supply chain. This enables Claritin to make a strong contribution to Sustainable Development through the Responsible [emailà protected] ethic and the Global Product Strategy targets which promote the safer use of chemical products and enha nce product stewardship throughout the whole supply chain.Their comprehensive product stewardship approach includes cooperation and partnership with Claimant's suppliers Claritin is aware that the energy issue is one of he key challenges of today's and future society and industry. Claritin highlights energy efficiency and savings as the most cost-effective and fastest way to reduce CO and other emissions and increase security of supply. 3. 3 Mission Statement Our mission clearly expresses what is important to us and what we stand for ââ¬â as a brand and as a company. We build leading positions in the businesses we are active in and we adopt functional excellence as part of our culture.We create value through appreciating the needs of: our customers ââ¬â by providing competitive and innovative our environment our shareholders by acting sustainable ââ¬â by achieving above-average returns 4 Porters Five Forces 4. 1 Bargaining Power of Suppliers The bargaining power of suppl iers is low. Claritin is a chemical manufacturing firm; they make chemicals used in different sectors like textiles, oil & gas, mining, dyeing etc. Claritin does not have a particular supplier for its raw materials; the Company buys raw material from different suppliers.The planning department is responsible for planning of the units of raw material to be purchased based on the market forecast. The procurement then takes prices from approved suppliers and then laces an order to the supplier who gives the lowest deal on the purchase. The bargaining power of suppliers is low as there are many suppliers in the market and they cannot charge a high price otherwise they would lose business to their competitors. Yes (+) moderate No (-) 1 . My inputs (materials, labor, supplies, services, etc. Are standard rather than unique or differentiated. 2. I can switch between suppliers quickly and cheaply. 3. My suppliers would find it difficult to enter my business or my customers would find it dif ficult to perform my function in-house. 4. I can substitute inputs readily. 5. I have many potential suppliers. 7. My cost of purchases has no significant influence on my overall costs 4. 2 Bargaining Power of Buyers The bargaining power of buyers is high in the chemicals industry as the buyers have many choices from where they can purchase their products from.Claimant's consumer markets include automobiles, candles, cosmetics, detergents, latex, stationery, as well as finishers for aluminum and leather. Claimant's buyers are aware of the need for information and Claritin helps its customers through the technical service centre. But this does not undermine the fact that other local chemical industries are also major players in the market so similar products are available, and buyers do not really incur a switching cost when changing where to purchase from. To what extent are your customers locked into you?No effect 1) Are there a large number of buyers relative to the number of firm s in the business? 2) Do you have a large number of customers, each with relatively small purchases? 3) Does the customer face any significant costs in switching suppliers? 4) Does the buyer need a lot of important information? 5) Is the buyer aware of the need for additional information? 7) Your customers are not highly sensitive to price. ) Your product is unique to some degree or has accepted branding? 9) Your customer's businesses are profitable. 0) You provide incentives to the decision makers. 4. 3 Rivalry among the Competitors Threat of competitors is high. 1 . The industry is growing rapidly. (Not so rapidly due to Energy constraints) 2. The industry is not cyclical with intermittent overcapacity. 3. The fixed costs of the business are relatively low portion of total costs. 5. The competitors are diversified rather than specialized. 6. It would not be hard to get out of this business because there are no specialized kills and facilities or long-term contract commitments etc. 7.My customers would incur significant costs in switching to a competitor. 8. My product is complex and requires a detailed understanding on the part of my customer. 9. My competitors are all of approximately the same size as I am. 4. 4 Threats of Substitutes Threat of substitutes is high. 1 . Substitutes have performance limitations that do not completely offset their lowest price. Or, their performance is not Justified by their higher price. 2. The customer will incur costs in switching to a substitute. 4. Your customer is not likely to substitute. . 5 Threats of New Entrants The threats of new entrants are high. 1 . Do large firms have a cost or performance advantage in your segment of the industry? 2. Are there any proprietary product differences in your industry? 3. Are there any established brand identities in your industry? 4. Do your customers incur any significant costs in switching suppliers? 5. Is a lot of capital needed to enter your industry? 6. Is serviceable used equ ipment expensive? 7. Does the newcomer to your industry face difficulty in accessing distribution channels?
Subscribe to:
Posts (Atom)