Friday, May 22, 2020
Pk Electricss International Marketing Analysis - 2280 Words
PK Electricsââ¬â¢s international marketing analysis Contents Introduction 3 The reasons of entering international markets 3 Market Saturation 3 Market-related factors 3 Product Life Cycle 4 Two sources of information 4 The World Trade Organization 4 The International Trade Centre 5 Key Opportunities and Threats 5 Key Opportunities 5 Key Threats 6 The Selection Process PK Electrics would Use 6 Modes of Market Entry 7 Most Appropriate Mode for PK Electrics 8 Conclusion 8 Reference 9 Introduction Since PK Electrics was established in 1987 in Ningbo, Zhejiang province, China. It has grown from a local supplier producing a limited range of electrical cabling and switches to a national supplier of a wide range of electrical suppliesâ⬠¦show more contentâ⬠¦Moreover, it is a member-driven organization which nearly always works on a consensus basis. As an international organization it has a sound and accountable legal basis because all WTO members have ratified the WTO Agreements. [International Marketing: An Introduction] Since China joined the WTO in December 2001, it had to open some areas of market to foreign companies meanwhile, it will promote the export of China and it will also benefit PK Electrics entering the international markets. As an enterprise of China which is a member of WTO, PK Electrics should understand the nature of this organization and principles as well as membership of countries. Then, PK Electrics should access information about the external environment of its destination country, such as political factors. For example, the attitudes of the countryââ¬â¢s government, taxation policy and social cultures. In addition, the economic factors and human resources in terms of price of labor force if the company want to set assembly abroad. The International Trade Centre The International Trade Centre (ITC) is the technical cooperation agency of the United Nations Conference on Trade and Development (UNCTAD) and the WTO for operational, enterprise-oriented aspects of trade development. The ITC supports developing and transition economies, and particularly their business sector, in their efforts to realize their full potential for developing exports and
Sunday, May 10, 2020
Cuban Revolution Assault on the Moncada Barracks
On July 26, 1953, Cuba exploded into revolution when Fidel Castro and about 140 rebels attacked the federal garrison at Moncada. Although the operation was well-planned and had the element of surprise, the higher numbers and weapons of the army soldiers, coupled with some remarkably bad luck afflicting the attackers, made the assault a near-total failure for the rebels. Many of the rebels were captured and executed, and Fidel and his brother Raà ºl were put on trial. They lost the battle but won the war: the Moncada assault was the first armed action of the Cuban Revolution, which would triumph in 1959. Background Fulgencio Batista was a military officer who had been president from 1940 to 1944 (and who had held unofficial executive power for some time before 1940). In 1952, Batista ran again for president, but it appeared that he would lose. Together with some other high-ranking officers, Batista smoothly pulled off a coup that removed President Carlos Prà o from power. The elections were canceled. Fidel Castro was a charismatic young lawyer who was running for Congress in Cubaââ¬â¢s 1952 elections, and according to some historians, he was likely to win. After the coup, Castro went into hiding, knowing intuitively that his past opposition to different Cuban governments would make him one of the ââ¬Å"enemies of the stateâ⬠that Batista was rounding up. Planning the Assault Batistaââ¬â¢s government was quickly recognized by various Cuban civic groups, such as the banking and business communities. It was also recognized internationally, including by theà ââ¬â¹United States. After the elections were canceled and things had calmed down, Castro tried to bring Batista to court to answer for the takeover, but failed. Castro decided that legal means of removing Batista would never work. Castro began plotting an armed revolution in secret, attracting to his cause many other Cubans disgusted by Batistaââ¬â¢s blatant power grab. Castro knew that he needed two things to win: weapons and men to use them. The assault on Moncada was designed to provide both. The barracks were full of weapons, enough to outfit a small army of rebels. Castro reasoned that if the daring attack were successful, hundreds of angry Cubans would flock to his side to help him bring Batista down. Batistaââ¬â¢s security forces were aware that several groups (not only Castroââ¬â¢s) were plotting armed insurrection, but they had little resources, and none of them seemed a serious threat to the government. Batista and his men were much more worried about rebellious factions within the army itself as well as the organized political parties that had been favored to win the 1952 elections. The Plan The date for the assault was set for July 26, because July 25 was the festival of St. James and there would be parties in the nearby town. It was hoped that at dawn on the 26th, many of the soldiers would be missing, hungover, or even still drunk inside the barracks. The insurgents would drive in wearing army uniforms, seize control of the base, help themselves to weapons, and leave before other armed forces units could respond. The Moncada barracks are located outside of the city of Santiago, in the Oriente province. In 1953, Oriente was the poorest of Cubaââ¬â¢s regions and the one with the most civil unrest. Castro hoped to spark an uprising, which he would then arm with Moncada weapons. All aspects of the assault were meticulously planned. Castro had printed copies of aà ââ¬â¹manifesto, and ordered that they are delivered to newspapers and select politicians on July 26 at exactly 5:00 am. A farm close to the barracks was rented, where weapons and uniforms were stashed. All of those who participated in the assault made their way to the city of Santiago independently and stayed in rooms that had been rented beforehand. No detail was overlooked as the rebels tried to make the attack a success. The Attack In the early morning of July 26, several cars drove around Santiago, picking up rebels. They all met at the rented farm, where they were issued uniforms and weapons, mostly light rifles and shotguns. Castro briefed them, as no one except a few high-ranking organizers knew what the target was to be. They loaded back in the cars and set off. There were 138 rebels set to attack Moncada, and another 27 sent to attack a smaller outpost in nearby Bayamo. Despite the meticulous organization, the operation was a fiasco almost from the start. One of the cars suffered a flat tire, and two cars got lost in the streets of Santiago. The first car to arrive had gotten through the gate and disarmed the guards, but a two-person routine patrol outside of the gate threw the plan off, and the shooting started before the rebels were in position. The alarm sounded, and the soldiers began a counterattack. There was a heavy machine gun in a tower which kept most of the rebels pinned down in the street outside the barracks. The few rebels who had made it in with the first car fought for a while, but when half of them were killed, they were forced to retreat and join their comrades outside. Seeing that the attack was doomed, Castro ordered a retreat and the rebels quickly scattered. Some of them just threw down their weapons, took off their uniforms, and faded into the nearby city. Some, including Fidel andà Raà ºl Castro, were able to escape. Many were captured, including 22 who had occupied the federal hospital. Once the attack was called off, they had tried to disguise themselves as patients but were found out. The smaller Bayamo force met a similar fate asà they too were captured or driven off. Aftermath Nineteen federal soldiers had been killed, and the remaining soldiers were in a murderous mood. All of the prisoners were massacred, although two women who had been part of the hospital takeover were spared. Most of the prisoners were tortured first, and news of the barbarity of the soldiers soon leaked to the general public. It caused enough of a scandal for the Batista government that by the time Fidel, Raà ºl and many of the remaining rebels were rounded up in the next couple of weeks, they were jailed and not executed. Batista made a great show out of the trials of the conspirators, allowing journalists and civilians to attend. This would prove to be a mistake, as Castro used his trial to attack the government. Castro said that he had organized the assault to remove the tyrant Batista fromà office and that he was merely doing his civic duty as a Cuban in standing up for democracy. He deniedà nothing but instead took pride in his actions. The trials and Castro riveted the people of Cuba became a national figure. His famous line from the trial is ââ¬Å"History will absolve me!â⬠In a belated attempt to shut him up, the government locked Castro down, claiming he was too ill to continue with his trial. This only made the dictatorship look worse when Castro got the wordà out that he was fine and able to stand trial. His trial was eventually conducted in secret, and despite his eloquence, he was convicted and sentenced to 15 years in prison. Batista made another tactical mistake in 1955 when he buckled to international pressure and released many political prisoners, including Castro and the others who had participated in the Moncada assault. Freed, Castro and his most loyal comrades went toà ââ¬â¹Mexico to organize and launch theà Cuban Revolution. Legacy Castro named his insurgency ââ¬Å"the 26th of July Movementâ⬠after the date of the Moncada assault. Although it was initially a failure, Castro was ultimately able to make the most out of Moncada. He used it as a recruiting tool: although many political parties and groups in Cuba railed against Batista and his crooked regime, only Castro had done anything about it. This attracted many Cubans to the movement who may have otherwise not gotten involved. The massacre of the captured rebels also severely damaged the credibility of Batista and his top officers, who were now seen as butchers, especially once the rebelsââ¬â¢ plan ââ¬â they had hoped to take the barracks without bloodshed ââ¬â became known. It allowed Castro to use Moncada as a rallying cry, sort of like ââ¬Å"Remember the Alamo!â⬠This is more than a little ironic, as Castro and his men had attacked in the first place, but it became somewhat justified in the face of the subsequent atrocities. Although it failed in its goals of acquiring weapons and arming the unhappy citizens of Oriente Province, Moncada was, in the long run, an essential part of the success of Castro and the 26th of July Movement. Sources: Castaà ±eda, Jorge C.à Compaà ±ero: the Life and Death of Cheà Guevara.à New York: Vintage Books, 1997.Coltman, Leycester.à The Real Fidel Castro.à New Haven and London: the Yale University Press, 2003.
Wednesday, May 6, 2020
Identify Risk, Threats, and Vulnerabilities Free Essays
Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats. Within the World Wide Web, social network is becoming the favorite target for cybercriminals. We will write a custom essay sample on Identify Risk, Threats, and Vulnerabilities or any similar topic only for you Order Now This Attention requires an intensive focusing of web security efforts and money the most significant threats along with the common vulnerabilities exploited. Sensitive attribute inference through machine learning algorithms it is possible to infer sensitive data from one user. Collecting data from userââ¬â¢s contacts and experimented attacker can predict some not explicit data. For example, if all the friends of one user belong to one political party, it is safe to predict that the user has the same political tendencies. Excessive exposition of private data inadequate privacy configuration settings may lead to publishing sensitive information. Some of the threats are private data management is a key feature that I have found inside of social networks. Digital dossier building- Everyone can collect published information through different OSN about one user and extract a complete dossier about it, Secondary Data Collection users may grant the platform secondary information (such as IP address, contacts list, messages or visited pages) Re-identification in spite of using fake data to register on a Social Network it is feasible to associate users shared data (such as text, photos, and videoââ¬â¢s) with real names or e-mail directions. Vulnerabilities associated with OSN it is difficulty to completely remove all user information when deleting an account. When users try to leave a Social Network, license agreement clauses appear rights that are transferred to the platform when the content is uploaded. Thus if one would like to remove there uploaded material, it would find that the only way to do so is by deleting the videos or photos one by one manually another vulnerability would be weak authentication method on the internet are one of the most important vulnerabilities that web environments have nowadays. The combination of user-name and password is commonly misused by the user who seeks easy-to-remember login details (such as short user-name and passwords, passwords with no combination of numbers and letters same username and password for several domains) another vulnerability is non-validation of users data during registration process. Most of the OSN do not use a validation process during new userââ¬â¢s registration. Unfortunately, just checking a valid email address, the preferred validation requirements, is not an adequate method, which leads to proliferation of fake populating the network. In conclusion On-line social networks represent one of the last and most important internet services most of the enterprises hesitate to integrate OSN into their business model, this new phenomenon cannot be ignored, but neither can be adopted without knowing the risks account when attempting to protect users and systems. I have identified the risk, the threats that compromise them and noted the vulnerabilities exploited by those threats. How to cite Identify Risk, Threats, and Vulnerabilities, Papers
Subscribe to:
Posts (Atom)