Saturday, December 28, 2019

The Hiv / Aids Epidemic - 3453 Words

Globally, there is good news. In 2011 the World Health Organization (WHO) claimed that the HIV/AIDs epidemic was declining in their â€Å"Global HIV/AIDS Response† progress report (Progress Report 2011). Each continent and region, however, showed different changes in their rates of HIV/AIDS (Progress Report 2011). In North America, and specifically in the United States, the incidence of HIV has been constant for the past several years (Progress Report 2011). Despite the stability of this disease, the proportions of who is becoming infected are alarming (Progress Report 2011). Men who have sex with men (MSM) accounted for nearly 57% of the patients who were newly infected with HIV in 2010; and this is the case for MSM around the world†¦show more content†¦Part of why HIV is so deadly is that once an individual contracts the virus, they will have it for life. Another alarming fact about HIV is that the transmission of infected to uninfected individual is typically facilitated through STDs; commonly referred to as co-infections. The main portion of the population that is affected by STDs and thus put at risk of acquiring HIV is the encompassing age group of 15- to 30-year-olds. This is the target group for VDH. Today’s youth are becoming infected with STDs at an even greater rate, which increases their chance of receiving HIV and thus spreading it. The Center for Disease Control (CDC) conducted research and collected 11,631 health risk behaviors questionnaires from students in 124 different schools across the country (Lowry et al.). The purpose was to determine the risk that high school-aged student put themselves at for acquiring STDs and ultimately HIV (Lowry et al.). The students â€Å"were stratified into one of four mutually exclusive groups† depending on their drug use: no drugs and alcohol, only alcohol and/or cigarettes, marijuana, or illicit drugs (Lowry et al.). The respondents were also examined by their sexual risk behaviors: had sex, had sex with four or more partners, and had sex without a condom (Lowry et al.). The findings showed that the â€Å"prevalence of sexual risk behaviors was least among students who reported no substance use† (Lowry et al.). TheShow MoreRelatedThe Epidemic Of Hiv And Aids1535 Words   |  7 Pagespopulation include providing access to health care, HIV testing and syringe services programs. The Office of HIV Planning in Philadelphia focuses on the needs of the population, conducts community outreaches and educational sessions. As previously stated, 32 state Medicaid programs reimburse for routine HIV screening of adults aged 15-65 years, regardless of risk. This policy allows for individuals to more likely participate in this screening process. HIV testing can be done through health care professionalsRead MoreThe Epidemic Of Hiv / Aids1306 Words   |  6 PagesOne of the most known and feared viruses in the world today is HIV/AIDS. To fully understand on why HIV/AIDS is so deadly, we need to first understand and breakdown on what this virus exactly is. HIV is an acronym that stands for Human Immunodeficiency Virus. Human means that only humans can be infected by this virus. Immunodeficiency means that this virus attacks and weakens your immune system to the point where your immune system can no longer protect your body. Virus means that it can onlyRead MoreThe Hiv / Aids Epidemic1650 Words   |  7 PagesThe HIV/AIDS epidemic poses a major concern for global health. There are approximately 36.7 million people living with HIV/AIDS worldwide (WHO, 2017). Due to the increased phenomenon of global migration and movement we see a proportion of individuals who are HIV positive migrating. In Canada alone, over 300,000 new immigrants were welcomed into the country in 2016 (CIC; Globe And Mail, 2016). As a result we can infer that certain proportion out of all immigration applicants into Canada were HIV positiveRead MoreThe Hiv / Aids Epidemic1848 Words   |  8 Pagesreduce its high rates of HIV/AIDS prevalence in the face of low socioeconomic development and declining Gross National Income (GNI) per capita because its existing NGO-based system for HIV/AIDS prevention was scaled up through international technical and financial assistance. The two leading NGOs in this effort, Haitian Gro up for the Study of Kaposi’s Sarcoma and Opportunistic Infections (GHESKIO) and Partners in Health (PIH), were created at the onset of the HIV/AIDS epidemic in the early 1980s, butRead MoreThe Hiv / Aids Epidemic1072 Words   |  5 Pagesagainst HIV/AIDS (Country and Lending Groups, n.d.). They have one of the highest prevalence rates of HIV/AIDS in the world at 19.1%, and the incidence of new cases is increasing steadily (Milan, 2014; CIA, n.d.). To combat this growing problem President Jacob Zuma launched the largest HIV Counseling and Testing campaign in the world in April 2010 (â€Å"Global AIDS†, 2012). In the same year, the country also achieved a significant reduction in the price of antiretroviral medicines (ARVs) (â€Å"Global AIDS†, 2012)Read MoreThe Hiv / Aids Epidemic2082 Words   |  9 Pages The United States has been fixated on its mission to abolish the sex industry since the start of the HIV/AIDS epidemic in the 1980s. George W. Bush and Congr ess created the United States Leadership against HIV/AIDS, Tuberculosis, and Malaria Act of 2003 with the intention of funding beneficial programs furthering the research and accessibility of HIV/AIDS treatment. (Middleberg, 2006). The beneficiaries of this funding must show their opposition towards prostitution and sex trafficking in orderRead MoreThe Epidemic Of Hiv / Aids2413 Words   |  10 Pagesworld issues. In 1980, news papers, highlighted the onset of an epidemic, one that would create fear, isolation, bias and discrimination. The HIV virus took the public by disbelief, one of the main tribulations with HIV disease was that there was no concrete evidence that determined its transmission. Many Semantic variations such as gay mans disease created biases and discrimination toward this population (CITE). The onset of HIV/AIDS virus also created a devastating impact on healthcare professionalsRead MoreHiv / Aids Epidemic : A Huge Epidemic1314 Words   |  6 PagesHIV/Aids Epid emic HIV/AIDs is a huge epidemic still plaguing society today. The lack of knowledge and technical advances has caused an increasing number of cases. It has made its way around the world since the 1940s, causing countries to join together in the fight against AIDs. With all the campaigning that has been done the numbers of cases continue to rise. Countries have separated the disease into three patterns to make it easier to distinguish the effects that AIDs has on different regions ofRead MoreShould The Hiv / Aids Epidemic?918 Words   |  4 PagesShould the HIV/AIDs epidemic in Africa be described as a feminist issue? With higher transmission rates concentrated among African women, and the vast majority of new mother-child transmissions occurring within African countries, HIV seemingly fits into the scope of feminist concerns. As described in Oppong and Kalipeni’s contribution to Kalipeni, et.al.’s HIV AIDS in African: Beyond Epidemiology, the consistent classifying of th e HIV/AIDS epidemic as being the direct result of distinct AfricanRead MoreThe Epidemic Of Hiv / Aids Essay1607 Words   |  7 Pagessyndrome (AIDS). Another two years would pass before scientists were able to isolate the retrovirus that causes AIDS, which in 1984 was termed human immunodeficiency viruses (HIV). Although a successful discovery, in the absence of a proven treatment, HIV and AIDS had free rein in which to leave in its wake a global path of fear, illness, and death. To understand the totality of HIV/AIDS, consider the following. Since the onset of the pandemic more than 70 million people have been infected with HIV, 35

Friday, December 20, 2019

The Role Of State And Local Control Of Education - 850 Words

Highly Qualified The law requires teachers to have a bachelor’s degree, a state teaching certification and to demonstrate content knowledge in the subjects they teach. Proficient and effective teachers, not only know the subject matter in which they teach they have strategies to reach all types of learners in their classroom. These qualified individuals have mastered the skills that they need to be a certification teacher. The law, however, must maintain and establish the governing body that establishes and makes sure that school districts employ only qualified individuals. The importance of state and local control of education is crucial and provides the opportunity for each state to develop their own definition of what qualifications are needed by individuals in order to be considered â€Å"highly qualified†. This definition must be reliable with NCLB as well as with the unique needs of the state. The state law requires public school elementary and secondary teachers to meet their st ate’s definition of highly qualified in the core academic subjects they teach. No Child Left Behind Act The No Child Left Behind Act of 2001, which was established by former President George W. Bush; is a United States Act of Congress that is a reauthorization of the Elementary and Secondary Education Act, which includes Teacher Title I. The nation standards vary upon the NCLB are diverse into Highly Qualified Teacher, Accountability and Standard Testing Regime, common core, failingShow MoreRelatedThe Current Structure Of The America s Educational System954 Words   |  4 Pagesclimate controls our system and treats students as another campaign point. The U.S. educational system needs some aspects of educational control under a standardized, national system while other aspects of education should remain in the hands of local communities to uphold the diverse cultural needs of America’s students. Certain aspects of U.S. educational system need standardization in order to ensure an equitable education for all learners. A proposed shift of all local and state control is notRead MoreThe Levels Of The Uk Government Essay1390 Words   |  6 PagesNational/Central Government Regional Government Local Government What is the European Parliament: The European parliament is an elected parliamentary institution of the European union (EU) which was formed on November 1st 1993, they mainly focus on functions like legislation within the 28 member states that form up the European union to help sustain, control and create a political and economic community throughout Europe, the European parliament’s general role is to represent the citizens of the EU communityRead MoreLegal Influences on the State Board of Education1145 Words   |  5 Pagesand authority of the state board of education and local school boards and what responsibilities they have for the administration and operation of schools. The state board of education governs the way that education is directed within the state. They create policies covering a variety of legal issues such as health and safety, minimum requirements for teacher licensure, graduation requirements, rights of students with disabilities, and student disciplinary practices. The state school boards has sixRead MoreThe Local Control Of Education Act Essay1411 Words   |  6 PagesThe Local Control of Education Act was introduced by Sen. Vitter, David [R-LA]  on January 7th, 2015. This act aims to amend the Elementary and Secondary Education Act of 1965 (ESEA), which prohibits the federal government from directly or indirectly mandating, directing, controlling, incentivizing, or conditioning federal support on a state s, local educational agency s (LEA s), or school s adoption of: the Common Core State Standards, any other academic standards common to a number of statesRead MoreChapter Six Of America s Teachers833 Words   |  4 PagesReading chapter six of America’s Teachers: An Introduction to Education (Newman, 2006) reminded me of the Barenaked Ladies song It’s All Been Done (Page, 1998). As I read the conflicting sides of each argument regarding education as far back of the Civil War, I kept thinking how none of this sounded new. It’s all been done before, and we are still debating many of the same issues. Newman (2006) put it another way, â€Å"Despite promoters’ claims to the contrary, few educational wheels are brand newRead MoreEducation Failure Of The Great Depression863 Words   |  4 Pages Education Failure, the Great Depression revived in America After escaping the tyranny of England, and arriving to the America to establish both the Declaration of Independence and the Constitution of the United States, American leaders Thomas Jefferson, John Adams and Benjamin Franklin, acknowledge that the American Dream could not truthfully be established, without education being one of the priority components constituent of it. They wanted everyone the right to have equality and no social statusRead MoreImpact Of Postmodernism Theory On Education937 Words   |  4 PagesPostmodernism theory on education Post modernists believe that it’s important for teachers to teach students their own British values. This is because values are important for an individual’s culture and are important at school to demonstrate to the Ofsted how well they are doing at stimulating the children’s physical and intellectual development of pupils at school. The values that the teachers at school must teach the children include teaching about the rule of law and teaching them respect andRead MoreThe Evolving Role of Government Education Essay1185 Words   |  5 PagesThe Evolving Role of Government in Education What are the roles of federal and state government when it comes to American education? The roles of education have evolved from historic liabilities to current liabilities. There are many laws and cases that have had an impact on American education that still has a strong influence on education today such as the debate between church and state, racial desegregation, and education finances. Other impacts as relevant are testing standards and specialRead MoreThe Elementary And Secondary Education Act1526 Words   |  7 PagesThe The Elementary and Secondary Education Act (ESEA), was revamped in 2001 as the No Child Left Behind Act (NCLB). Due to the time period of the inception and now, there is a pressing need for reform. Even when the law expired four years ago, Congress continued to update the out of date NCLB Act was never seriously considered by the House Committee on Education and the Workforce until now. Since the Republicans assumed control of the House of Representatives, they have created and passed a seriesRead MorePolice Agencies and Law Enforcements812 Words   |  3 Pagesinto local, state, and federal agencies that all address varying elements of law enforcement, and often in collaboration with each other. The current structure of law enforcement in this country is very complex. There are various types of police agencies broken up based on differing jurisdiction (Grant Te My 12). Today, there are over 18,000 police agencies working within the context of the United States (Walker Katz 59). These agencies enforce our legal structure through social control and

Thursday, December 12, 2019

Environmental and Economic Performance of Firms

Question: Discuss about the Environmental and Economic Performance of Firms. Answer: Introduction Apple Inc is one of the consumer electronics organizations in America. The company concentrates in conception and fabrication of electronics and software products. The start of the company took place in 1976 in Cupertino, California involving the sales and support of a variety of personal computers, software and hardware accessories, mobile phones, and music players. The company operates some online shops and stores that help in the selling of its products. Apple Inc product portfolio comprises Macintosh for personal computers, iPods, iPads, and iPhones. In this industry, there is a clear distinction between mature and emerging markets. This is based relatively on the strength of Apples distribution channels (Masi, 2009). At the same time, it is an important factor for Apple Inc to consider incorporating factors influencing sales of their products within the American market before full consideration of the entire global market. In this case, since market positioning is critical in th e determination of higher margins, it is necessary for Apple to invest massively in product brands that appeal mostly to the young people (Budikova, 2014). According to Kotler et al., (2014), Marketing refers to the art and science of creating value for goods and services delivered to consumers for the reasons of satisfying needs at an expected profit. In this study, marketing concepts or marketing management philosophies give guidelines to the business on the application of marketing efforts. These theories are applicable in the process of identifying and fulfilling consumer needs while also benefiting the company. Some of the marketing management philosophies include production concept, product concept, marketing concept, selling concept, and social marketing concept (Kotler et al., 2014). On production concept, consumers of electronic products always desire to buy at affordable prices. The products should also be widely available to customers. In this case, Apple, for instance, ensures that the demand for their iPads is more than the supply according to the impression through their website. In the year at the launch of its iPads, they successfully used this concept to make significant sales. In this case, it was easy for the company to moderate their prices to suit the consumer demand. The concept also works for Apple since their market is spread all over the world (Kotler et al., 2014). The product concept focuses on quality of the product despite its high price. This philosophy assumes that customers would still purchase a high-quality product irrespective of price and availability. Apple products are of high technological quality in the market and, therefore, sell at higher prices, in fact, their objective is never to sell low-cost goods (Kotler et al., 2014). The selling philosophy focuses on the actual sale of company products. This concept disregards the quality aspect, and consumer need rather focuses on making money. However, Apple does not use this concept so much since the company takes the issue of building relationships with customers seriously. The marketing concept focuses on providing products to consumers that fulfill their needs (Datamonitor, 2006). This enables the building of strong relationships between company and customers hence generating profits in the long-run. There is also the societal marketing philosophy that focuses on fulfilling customer needs without affecting the entire environment or rather maintaining societys well-being. It is important for large companies such as Apple to involve corporate social responsibility as crucial part of their marketing concept (Kotler et al., 2014). The strength of Apple is in its ability and focus on user-friendly customer experience. In this case, Apple ensures that their products appear delightful and friendly to consumers. This concept is easily provided through innovative features such as gesture touch-screen and personal assistant SIRI. Users prove that the design of Apple devices is customer compatible in both digital and entertainment hub. This ensures that Apple has a passionate brand community of followers that take company brand values as their identity. In this case, Apple is implementing relationship and social marketing concepts to propagate their sales and market dominance (Lantos, 2015). External Environment PEST analysis is a valuable strategic tool that enables easy identification of business status, position and growth within a defined market environment. The device is also applicable in the analysis and classification of market development and decline (Kotler and Armstrong, 2013). Considering the markets primary characteristics, Apple Inc is one of the leading asset management company as well as Smartphone producer in the global market. Apple Inc distinct itself as one of the businesses that produce and runs together hard-wares and soft-wares. Notably, the Company allows its consumers to share contents through Apple devices by availing an exclusive platform within the media referred to as iTunes (Digital Marketing, 2011). Apple boasts of some of the unique innovations such as that of iPad that attracts significant sales, an attribute that can only be delivered by Apple (Burns, 2012). The sales of some of the products such as iPad, Mac, and iPhones have increased by a significant perc entage over the years. The PEST analysis is a necessary tool that is crucial in this case for the reasons of gaining an understanding of the Apples business potential. The tool is also vital since it helps the company identify the direction of its operations including the knowledge of the future market environment. There are major problems that companies are unable to control that involves political instabilities, global health issues and other uncertainties that eventually affects the sale of Apple products within the global market (Anon, n.d). Apple Inc reduces operating costs by outsourcing their productions in different countries in Scandinavia region, China, and Korea. In the case of any political instability within these countries, there is a delay in manufacturing processes that eventually affect Apples appealing nature in the face of consumers and various dealers (Burns, 2012). On the economic front, the purchasing power of any region depends on its financial abilities. The increase in the rate of unemployment within the global platform has negatively affected the sale of Apple products (DeWitt, 2012). Moreover, the increase in world oil prices resulted in inflation of the worlds economy that eventually affected sales of Apple products in different regions owing to its perceived high prices. This reduced the purchasing power of the consumers, therefore, negatively impacting sales. However, the recent times have shown immense recovery to the worlds economy, therefore, making Apple purchase foreign currencies making Apple increase its revenue within the global market (Apple Inc, 2012). Social Environment On the Social front, Apple Inc has always utilized two factors to affirm the quality of their products; this is the design and quality. The majority prefers to purchase luxury products since they can afford. In this case, the iPhones and iPads experience a significant increase in purchase across different market segments globally. The growth in the music industry has improved and this accounts for the biggest social influence on Apple since the major essential music store used by the majority is iTunes. The use of iTunes and other Apple products defines the modern lifestyle, therefore, making the company benefit from the social aspect (McGrath, 2012). Concerning the technological factors, Apple is renowned for its innovative abilities and high-grade technology products. The company invests heavily in research and development making it be at the top of new innovative productions. The aspect of their products that makes them user-friendly is admirable across consumer networks. Apple Inc is one of the big brand names in the Consumer Electronics Industry globally. The industry has fierce competition from key players such as Google, RIM, Nokia, Hewlett-Packard, and Samsung. The nature of competition within this industry can best be analyzed through Porters five competitive forces. There is intense competition within the industry from potential companies such as Samsung and Google (Reisinger, 2012). However, Apple Inc focuses significantly on building technical support and creation of loyalty amongst customers including the production of quality products. This aspect has given Apple an upper hand, therefore, making its products not to go on sale. Their productivity levels have been maintained without marking down products while generating superiority through Android phones, tablets as well as e-Readers at affordable prices (Loma, 2012). The aspect of the bargaining power of vendors has the potential of downing the profits of the company through high supply prices. Apple Inc is still growing, therefore, requires new suppliers of their raw materials. They utilize their online website to register new suppliers, hence, reduces the bargaining power of vendors by making the registration open. In this case, a large number of suppliers are attracted, which reduces their bargaining power through competition amongst the large number of vendors (Apple, 2010). In pursuit of a significant market share, there is a need for Apple to meet the expectations of customers. This is achievable by focusing on different segments divided based on educational level, age as well as income. The aspect on differential makes buyers switch quickly to other products driven by price sensitivity. Google provides high competition on smartphone and tablet markets due to the fall of Blackberry that was once a leader in Smartphone production within American market (Travlon, 2012). However, Apple Inc still holds a significant market share that amounts close to 75% of industrys profit. This narrows the chances of Apples customers to switch brands since their loyalty to Apple brand is very strong. Threat of Substitute product In this industry, the need of consumers is almost the same making the aspect on substitution difficult. This makes the threat of substitute to operate on price and performance that influences consumers to switch products. Apple reduces the threat of substitute through its large base of loyal customers. The company has created an ecosystem that enables users to buy iPhones for standard as well as other products based on stability and ease to upgrade. Such attributes grant the customer the ability to transfer knowledge as well as apps amongst devices (Segan, 2012). Whenever an industry experiences entrance of more companies in the market, the possibility is that the existing companies experience decreasing market share. However, Apple maintains the market share through differentiation of its product brands and ensuring the existence of valuable marketing strategies (Kurtz et al., 2007). The high brand image of Apple makes it overcome any form of competition; this also includes its innovativeness and excellent customer services. Apple Inc uses differentiation strategy to distinct its products from other competitors within the market. The design of its products seem outstanding and of high quality whereby Apple Inc considers easiness of use from beginners to prominent users within the market (Masi, 2009). The company invests in value creation by focus as well as cost leadership whereby it outsources its production to reduce costs. Apple ensures such outsourcing to third parties is through massive economies of scale. The companies from whom Apple Inc outsource acts like the Original Equipment Manufacturer (OEM) with Apple focusing on user interface and industrial design. This ensures that they maintain highly innovative and user-friendly devices that are stylish. These highly personalized and people friendly devices ensures that Apple remains distinctive even in their product prices in the market (Laudon and Traver, 2016). Apple Inc proves to be the master of teaser campaign mechanism whereby they cultivate and drag the suspense on their product development processes. Before the release of any product, the company advertises over social media creating a cliffhanger as consumers speculate on the outcome. Such marketing principle generates massive consumer interest for free, which they eventually convert into sales volume. The essence is that Apple ensures that they build relationships with the leading influencers in the industry; the media and bloggers (Webber, 2013). From the perspective of relationship marketing, the best way for a company to promote its products is to involve others and allow them to propagate the rest on behalf of the Company. The use of such third-party experts ensures the success of teaser campaigns that eventually results into a full-blown marketing campaign that builds interest and momentum over time (Apple, 2010). The other aspect that Apple Inc uses involves the creation of an illusion of scarcity on their products for the ultimate purpose of increasing demand. The point on poverty ensures that the Apple products remain more desirable and in demand within the market. In this case, the aspect on scarcity propels the trendy consumers besides the value of the product and all the procrastinators to anxiously buy the products (Tontini et al., 2014). For instance, on the launch of iPhone 5 in September 2012, the Apple website reported that they had massive demand that necessitated a delay in delivery of the product. Such illusion on scarcity created an impression amongst the consumers that they could only pre-order the phone for delivery to take place. This made the iPhone 5 to set record sales on day one, due to the impression on prolonged difficulty of owning one (Brondoni, 2014). In their quest to deliver value, Apple Inc also focuses on providing friendly customer experiences. In this case, their products are portrayed as having different, friendly, and delightful designs (Morschett et al., 2015). In this case, the core driver of Apple products involves ease of use experiences with innovative features such as a touchscreen that senses gestures for zooming and scrolling as well as personal assistants. Design and packaging also add value to their products, Apple Inc is known to package their products brilliantly. This acts as an important technological product differentiator. All Apple products convey the companys brand personality especially the unified visual identity alongside distinctive appearance (Apple, 2016). Moreover, Apple Inc has evolved a brand culture that is friendly and upmarket, which have attracted massive passionate following identifying themselves with brand innovativeness. It is important for such companies to define the meaning behind their brands before zeroing in on the types of consumers that share the same values. This value enables Apple Inc in the creation of digital communities for easy connection between fans and the company and amongst the fans themselves (Stone and Woodcock, 2014). The issue concerning rivalry amongst firms is best countered through brand positioning; this calls for the need of focusing on the quality of the designed products. The case on branding Apple Inc through globally recognized names makes the identity appealing amongst the consumers (Cornelissen, 2014). The other unique process adopted by Apple is the idea of presenting company branded products in easy to read, understandable, and friendly language. Apple utilizes the art of brand positioning to solve problems that surround marketability in some regions. Such marketing strategy is appropriate in cases where consumers demand unique characteristics on the product such as easiness to use. Moreover, for the reasons of penetrating some emerging market segments, it is advisable that the company acquire a local-based strong brand. Reinforcing the brand image requires the inclusion of meaningful ideas through naming, color as well as a symbol (Hopwood, 2005). SWOT Analysis The major strength of Apple is in its market position and consumer trustworthiness that increases its competitive advantage. The company boasts of variety of software and apps that are interlinked to maintain each other. Further, the company has a large capital base and operates on profits, not debts which are an advantage over its competitors. They provide customers with high-quality experiences in their retail stores and also invest heavily on brand awareness (Strategic Management Insight, 2013). Apple Inc has weaknesses on its great pricing mechanism, whereby most of its products are highly priced as compared to competitors. In such a case, consumers can easily obtain similar products of the same function at a lower price from the competitors (Strategic Management Insight, 2013). The other aspect concerns the rows within the management team, especially after the death of Steve Jobs (Kahn, 2012). Concerning opportunities, Apple products such as iPad and iPad mini have the opportunity of increasing market share due to the high demand from consumers. At the same time, the launch of the iTV increases the sales margin including the experienced growth in the smart-phone and tablet markets. The increasing trend in mobile advertising presents an opportunity for Apple since it allows advertisements on iPads and iPhones through its Ad advertising platform (Strategic Management Insight, 2013). From the perspective of Doole and Lowe (2008), the overall structure of the industry provides abundant opportunities for innovativeness. However, the desirable structural attributes within Apples areas of operation gives the company the needed capability that is necessary to capture a significant market share. The rapid changes in technology present one of the biggest threats to Apple and its competitors. This is since the current lifestyle is more technology loving, therefore, demands innovations within the shortest time possible (Chen et al., 2016). In this case, there is a lot of pressure facing companies due to the high nature of competition from rivalry firms. At the same time, regional economic wave affects the growth of the enterprise such as an increase in tax in the United States of America. Apple Inc has Samsung as the sole provider of application processors; therefore, chances are high of them to charge high prices on Apple Inc due to the absence of feasible substitute company that can supply application processors (Jung, 2012). Further, Apple faces stiff competition from Android OS which serves as the main competitor for its iOS and can quickly overtake them in the market. Conclusion The strength of Apple Inc is in its product portfolio that includes many electronic products such as cell phones, personal computers, iTunes alongside other related services and also networking solutions. Apples market position is measurable through its operating performance that impresses investors and stakeholders. However, the companys profitability can be affected by fierce competition from rivals in the same market (Data monitor, 2006). The demand on the market is dynamic and crucial since they focus on quality that satisfies curiosity. For instance, in the process of unveiling innovations, the consumers should be assured on the advancement of new qualities capable of addressing important individual desires. This is since consumers can at times be wrongly enticed through false assurances that eventually lead to disappointments and consequently loss of trust with the consumers. In this case, the management should take time ostensibly in managing organizational sustainability through the management of performance in financial assets, the health of employees and intellectual property. At the same time, the management should presume their compliance with international ethical standards and laws. Recommendations Apple should be careful concerning the legal and political areas within its areas of operation. This is mainly because Apple Inc outsources its services to different countries to reduce operating costs. The company has to identify an alternative supplier of processors to reduce risk since it purchases application processors from Samsung which is a direct threat to its operations. Consequently, Apple Inc should reinforce its presence in the emerging markets within regions like middle-East and Africa. This is since the existing economic trends in the wider European market are changing progressively. Such trends largely influence business activities, therefore, encouraging the formation of alliances as well as partnerships between related companies (Raza-Ullah et al., 2014). However, joining such alliances will demand that Apple and its accomplice supplies products that are capable of attaining competitive advantage in relation to the standards within the target market. In this case, Apple Inc will have to restructure various marketing strategies and activities that involve supply concepts as well as practices that have the capability of addressing complexities within the market. However, the company will also have to strategize on how to overcome the issue on integration across supply chains within specified markets. Regarding the distribution channels, Apple s hould try to add to the number of stores currently existing and also such joint venture with identified organizations will help the company to expand its business venture. Also one of the best remedies that can easily deal with rivalry in competition involves purchasing of highly rated brands within specified regions. This presents a probable solution to markets such as the Scandinavian and Asia. The initial step of maintaining balance and stability within the management structure provides the advantage on strategic moves. In this case, the Apple Inc should profoundly influence the use of aggressive promotional techniques contrary to that of their competitors. A good example is a of creating awareness on the companys product portfolio through their website and social media (Wagner et al., 2001). The company should also invent different promotional techniques that ensure the creation of influence and stability. On technical fronts, Apple should make sure that every touch point between the business products and consumers conveys a strong brand personality with a unified visual identity that sets the company apart from other competitors. This strategy requires that Apple also involves the use of in-person meet-ups that easily connects to business fans. There is also need for creating more digital communities through applications such as WhatsApp. There is also the aspect of identifying and making a detailed analysis of the impact of other companies within different target markets. This involves analysis of the most preferable and applicable product promotion techniques for electronic consumers, especially in home markets. References Anon, n.d. Internal and External business environment of Apple. Available at https://www.ukessays.com/ Apple Insider. 2013. Apples iPhone grew to 25.1% global market share in 2012. Available at https://appleinsider.com/articles/ Apple Inc. 2016. Company Profile. Available at https://www.apple.com/ Brondoni, S.M., 2014. Innovation and Imitation for Global Competitive Strategies. The Corporation Development Models of US, Japan, Korea, and Taiwan. Symphonya. Emerging Issues in Management, (1), pp.12-27. Budikova, J., 2014. Discussion: how digital trends are changing the marketing landscape. Central European Business Review, 2, pp.57-58. Burns, M.., 2012. Apple Q2 2012: 35.1M iPhones, 11.8M iPads, 4M Macs, and 7.7MiPods. [online] Available at: https://techcrunch.com/2012/04/24/apple-q2-2012-35-1m-iphones-11-8m-ipads-4m-macs-and-7-7m-ipods/ Chen, C.M. and Ann, B.Y., 2016. Efficiencies vs. importance-performance analysis for the leading smartphone brands of Apple, Samsung and HTC. Total Quality Management Business Excellence, 27(3-4), pp.227-249. Cornelissen, J., 2014. Corporate communication: A guide to theory and practice. Sage. Datamonitor .2006. Apple Computer, Inc. [online] Available at: https://www.alacra.com/acm/2009_sample.pdf [Accessed 30 April 2013] DeWitt, P.E. 2012. Whats eating Apple? The analysts weigh in. [online] Available at: https://tech.fortune.cnn.com/2012/11/14/apple-shares-fallen-wall-street-analysts/ Doole, I. Lowe, R. 2008. International marketing strategy. Available online: https://estore.bized.co.uk/ Driscoll, M.2009. Public Relations and advertising. Available online: https://aboutpublicrelations.net/ Hopwood, B. 2005. Sustainable development: mapping different approaches. Sustainable Development, (13), 3852. Jung, S. 2012. A little less Samsung in Apple sourcing. [online] Available at: https://blogs.ft.com/beyond-brics/2012/09/10/a-little-less-samsung-in-apple-sourcing/#axzz2THpqrqbe Kahn, J.2012. IDC: Samsung takes top smartphone marketshare in Q1, as Apple hits 8.8-percent high of total mobile phonemarket. [online] Available at: https://9to5mac.com/2012/05/01/idc-samsung-takes-top-smartphone-marketshare-in-q1-as-apple-hits-8-8-high-of-total-mobile-phone-market/ Kotler, P. Armstrong, G.2013. Principles of marketing 15th global edition. Pearson. Kotler, P., Keller, K.L., Ancarani, F. and Costabile, M., 2014. Marketing management 14/e. Pearson Lantos, G.P., 2015. Consumer behavior in action: Real-life applications for marketing managers. Routledge Laudon, K.C. and Traver, C., 2016. E-Commerce 2016: Business, Technology, Society. Pearson Higher Ed. Masi, B.2009. Strategic Analysis of Apple Inc. [online] Available at: https://www.scribd.com/doc/24134877/Strategic-Analysis-of-Apple-Inc-Brian-Masi McGrath, D. 2012. Apple coming to Dominate electronics Supply Chain. Available at https://www.eetimes.com/electronics-news/ Morschett, D., Schramm-Klein, H. and Zentes, J., 2015. Strategic international management. Springer. Raza-Ullah, T., Bengtsson, M. and Kock, S., 2014. The coopetition paradox and tension in coopetition at multiple levels. Industrial Marketing Management, 43(2), pp.189-198. Reisinger, D.2012. Samsung pulling away from Apple in Smartphone market. Available at https://news-cnet.com/ Stone, M.D. and Woodcock, N.D., 2014. Interactive, direct and digital marketing: A future that depends on better use of business intelligence. Journal of Research in Interactive Marketing, 8(1), pp.4-17 Strategic Management Insight. 2013. SWOT analysis of Apple. Available at https://www.strategicmanagementinsight.com/ Tontini, G., Picolo, J.D. and Silveira, A., 2014. Which incremental innovations should we offer? Comparing importanceperformance analysis with improvement-gaps analysis. Total Quality Management Business Excellence, 25(7-8), pp.705-719. Wagner, M., Schaltegger, S. Wehrmeyer, W. 2001. The relationship between the environmental and economic performance of firms. Greener Management International, (34), 95108. Webber, R., 2013. The evolution of direct, data and digital marketing. Journal of Direct, Data and Digital Marketing Practice, 14(4), pp.291-309.

Wednesday, December 4, 2019

BCP and Disaster Recovery Plan †Free Samples to Students

Question: Discuss about the BCP and Disaster Recovery Plan. Answer: Introduction Security has been evolved for the long term to be in the standard terror that aims to have more than the cloud investments while the observations is been made on the improvements been made on the security. Checking to the public cloud security, the observations and ideas been made and are improving towards the security and stopping it form the malicious activities. Infrastructure as a Service (IaaS) usually aims to provide the virtualised computing resources over the internet connectivity. It mainly focus on delivering the infrastructure and outsourcing it to provide the security of the data which is been collected from the internet. Keeping the security terms in mind, the data is been violated and making the duplicated data and change the original data keeping all the issues and working on it the company deploying software is to keep the biggest concern about the privacy and the security regarding the issues. Because of all these concerns the organisation is not stopping it from mig ration of the database from 1 platform to another platform (Alhazmi Malaiya, 2013). When the database is been moved to the cloud device the security been shared during the risk with the responsibility which is been provided is to have an appropriate reason for it sometimes the expertise who are working in big industries allow them to increase the sensitivity of the data to the other party i.e. the third party which have the cloud providers to increases and make it difficult for the risk settings through which company keep on making the updating and perform the operations daily (Yang Jia, 2013). Once the database is been moved in to the IaaS instance in the cloud, the level of security is been increased into the cloud services. But for maintaining the security in the cloud the most important thing is to keep in the mind i.e. the budgeting of the security on the public cloud station which is totally different from the other platforms which generally have the other way of differentiating and preventing it from the risks. The most fundamental method which is being used from prevention is that the provider uses the shared responsibility models which mainly aim to spread the risks between the sellers and the potential buyers. Generally it happens that the customers generally dont buy the products and the equipments which are similar because sometimes the issue is been raised between the security in the cloud and the data canters (Xiao Xiao, 2013). Budgeting and taking the preventions in the security in the public cloud generally start from the applications that have the various infrastructure components that are existed, like serving of the documents, hosting a website, etc. In IaaS providers tend to allow the main responsibility which is to be provided to the customers. The benefits and issues that would be the result of your deployment of these security measures are- That is basically prevents from reducing the total infrastructure costs, it basically provides the group off virtual machines which are being hosting on the track. This basically helps the organisation in serving on a large scale of the servers, capacity of the storage, network connections, load balancing, etc. It tends to reduce the capital IT investments and the expenditures. The main benefits are: Maximising of the Resources with the Minimal Investments Increasability of the speed in the market Advantages to Drive competitive and its innovation Maximising Flexibility. Reduces various connectivity to the entry and reduce barriers for the large data centers (Wei, et al., 2014). The risks associated with migrating this mission critical database to the cloud The Database- Generally cloud environment generally faces the threats which are being placed as the corporate traditional corporate networks. This threat is mainly occur when the data is been violated from the one source to another source it generally happens because of the large amount of the data being stored in the networks on the cloud servers (Wei, et al., 2014). This tends to damage the sensitivity of the data which is been exposed. The IaaS infrastructure- It is essential to have a large storage i.e. should be cloud based storage service which requires the more demanding and usability of an application should be secured more so as to tolerate best hosted application services. The communications between Webbs and their IaaS database in the cloud- Insufficiency in the network based in the virtual networks and the tailoring with the accessibility to the web and to the IaaS database it generally have the limited accessibility to the networks infrastructure and IP based controls and network standards and it various zones are not applied usually (SILVA, 2016). Risks and the issues associated with the backing up of data on cloud computing: Confidentiality: The risk of unauthorised access to the data is called as the risk of confidentiality information is one of the vital assets of any organisation. And hence keeping the sensitive information confidential is critical for any organisation. As it is a general fact that clouds operates on the public networks it is more prone to cyber-crimes like data leakage, internet terrorism etc. When the data is moved on online platforms the hackers or the intruder seeks to decrypt the confidential data of the company so as to gain access to the companys confidential and sensitive data (Rong, Nguyen Jaatun, 2013). Integrity: The risk of integrity the risk of unauthorized alternations and modification of highly relevant information of the company. Data saved on the online platform can be safeguarded from the issues of data loss and damage through the use of tight data controls. However, even information saved on online mode i.e. the cloud is vulnerable to risks of data cracking, data hacking and other cyber-crime etc. the hackers of the information are discovering new techniques to have gain unauthorised access to the sensitive data of the company so that they can alter it by adding deleting or modifying the critical information of the company (Pearson, 2013). Standardisation risk: This risk occurs because the cloud system is not standardised. The cloud solutions are not all uniform as the vendors or the cloud service provider sets out different protocols to provide the services like backup and recovery plans of important data of company. Provider often has different opinion as to what is relevant and important when the issues of back-up and recovery provision arise (Rittinghouse Ransome, 2016). Connectivity: The proper working of internet network is the must for migrating the important data of the company to online modes and hence network issues imposes the risk of outage where the data can be stuck or get corrupted in between due to the improper network connectivity. Loss of data control: When the data is saved on premise platforms the business managers have full control over their important data but when the critical information is transferred to the public clouds the owners of the information may have to face the risk of loss of control over their own data (Khoshkholghi, 2014). Issues of data storage on cloud platforms Data privacy: The cloud platforms although are the cheap source of information safeguarding however due to the huge public network on the cloud system it is difficult for the cloud service providers to prevent the risk of hacking or cracking of data that is stored on the clouds. As cloud computing offers the cost effective and easily manageable infrastructure the users of cloud computing services are increasing day by day and due to the high access of cloud computing system by the users it is difficult for the cloud service vendors to control the risk of unauthorised access or data stealing (Kavis, 2014). Data recovery: Cloud services are often used by the businesses to get their critical data safeguarded from the risks and uncertainties of data corruption or data loss. Cloud computing enables the users to secure their data from those risks and uncertainties by providing the back-up services. However with the increased users of cloud services the cloud traffic is growing rapidly with each passing day therefore the cloud users have to face issues like slow data recovery or sometimes the data is recovered by the unauthorised persons without the actual users knowledge (Amiri, Cavusoglu Benbasat, 2014). Data backup: With the growing crowd over the cloud service platforms the cost of data back-up services are increasing affecting the cost effectiveness of the backing up features of cloud computing. To store the data as the backup plan the clouds are providing not the reliable storages as the data is highly vulnerable to the risk of unauthorised access (Hashem, et al., 2015). Retrieval of data from the cloud: Time consuming: Once the data is transferred to online modes it may sometimes get cumbersome for the users to take back their data in house as it may involve considerable time due to slow retrieval processes on cloud as a result of heavy users traffic. This process may make the users to wait for enormous time. Complex retrieval processes: The data retrieval sometimes gets complicated due to the involvement of technical issues in the data transfers and thus difficult for the business managers to cope up with the complexities of retrieval processes (Alhazmi Malaiya, 2013). The Webbs has started initialising to use the cloud backups and the DR plans so as to have the top priority of the backup recovery. DRP plans are very essential for the certain reasons which is been used in an organisation. It is essential to plan for the DRP system to continue all the business process in an organisation to simultaneously perform all the business activities which mainly deals with the goods and the services. The clouds initially offer the businesses to the virtual way of storing the large amount of data. It is essential to store all the files and the folders which is been kept at the data centers. Webbs protect access to these services that they are now moving to the Cloud The first thing to recognize the best suitable services that are being in the trend to use the best services for storing and migrating the best possible services for migrating the database to the cloud is so that the data should not be violated or been breached to the other platform and should not continue from preventing it the Webbs uses the (Fox, Patterson Joseph, 2013). Cloud backup and restore infrastructure This process is used to safeguard the business activities and to prevent from the disaster so as to protect the files which are been collected from the website or from the necessary applications needed. This process helps in to quickly access and perform the network operations and to rapidly increase in the restoring of the files when the system gets failed or the file is lost. The main benefits and the features of this software for which the Webbs uses It helps in saving time for easily creating, scheduling and managing of the file-level backups using the control panel. This software is less costly and save money. It helps in securing the organisational data This software is more reliable as comparison to other software It helps in easy way of accessing by the users for restoring the files from the Cloud control Panel. It helps in Customizing the scheduling which helps mainly in taking the backups very frequently. Provides the facility of the File based backups which help in restoring all the files and folders from the system (Almorsy, Grundy Mller, 2016). Conclusion Therefore it can be firmly concluded from the entire research that migration of data can cost severe consequences to the business if proper security measures are not used and implemented in data transferring from physical modes to online modes. In order to ensure the data security the businesses are thus required to critically analyse the potential risks involved in the data migration. Moreover, the business managers are required to make proper recovery plans of data before transferring it online. References Alhazmi, O. H., Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. InReliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual(pp. 1-6). IEEE. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Amiri, A. K., Cavusoglu, H., Benbasat, I. (2014). When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing. Dutta, A., Peng, G. C. A., Choudhary, A. (2013). Risks in enterprise cloud computing: the perspective of IT experts.Journal of Computer Information Systems,53(4), 39-48. Fox, A., Patterson, D. A., Joseph, S. (2013).Engineering software as a service: an agile approach using cloud computing. Strawberry Canyon LLC. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Kavis, M. J. (2014).Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley Sons. Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., Othman, M. (2014). Disaster recovery in cloud computing: A survey.Computer and Information Science,7(4), 39. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer London. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. SILVA, B. (2016). A framework for availability, performance and survivability evaluation of disaster tolerant cloud computing systems. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), 843-859. Yang, K., Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing.IEEE transactions on parallel and distributed systems,24(9), 1717-1726.