Free Essay

Commnication

In:

Submitted By travis123
Words 1549
Pages 7
Introduction
Electronic communications have come a long way. It began in 1867 with the invention of the typewriter. Today we have various types of new technology, which makes us to do business faster and more efficient than ever before. Furthermore, electronic communication media such as TV, telephone and Internet have a variety of advantages such as higher speed instant transfers and the ability to send a large amount of data when compared with traditional methods such as mail, newspaper etc .Significantly, the various threats to this technology also increases day by day. And these threats can be categorized into various sections. Anyhow, as an Electrical Engineering student I can say that basically, Electrical vulnerabilities are seen in things such as spikes in voltage to different devices and hardware systems, or brownouts due to an insufficient voltage supply. Electrical threats also come from the noise of unconditioned power and, in some extreme circumstances, total power loss. And route (reason) to these situations can be divided into two categories. 1. NATURAL PROBLEMS. 2.HUMAN ACTIVITIES.

http://henapcblog.blogspot.co.uk/(picture)

Threats to the electronic communication
Natural problems
Natural effects have been a huge trouble for many technologies and for businesses then and now. This effects the electronic communication in a big level as well. Natural effects such as solar flares(affecting satellites).earth quakes and even rain can affect this technology. Anchors/Backhoes, Hurricanes too .
Solar flares
Solar storms can easily affect radio communications, satellite communications, radars and navigation systems. On frequencies below 30MHz, the ionosphere generally acts as an efficient reflector, allowing communications to distance. Solar extreme ultraviolet and soft x-ray emissions from solar flares change the electron density and gradients in the ionosphere reflections. This affects the electronic communication in a bad way.

Solutions - Having Whole House Surge Protector. Unplugging Electronic Devices . Simply shielding power stations and satellites. (http://blog.ayoudo.com/blog/using-social-media-to-prepare-for-the-solar-storm/)(picture) damages to electronic communication infrastructure
Since most, if not all the electronic communication infrastructure depend on a " local nodes" like structure (TV/telephone/satellite relay stations, satellites, phone towers, servers etc.) any damage to even one of these critical areas can have a significant effect on the local communication. One of these areas getting affected by a natural disaster such as heavy rain, thunder storm and etc, will disturb the local communication.

Solutions - constructing these buildings in no flooding areas such as mountains. Earth metal decaying
Electronic communication by definition depends on electricity, and as a result the lack of electricity (a blackout or in a remote location such as a ship) can stop communication. And it is significant that ,coal which is used to produce electricity is decaying day by day .This will cause to insoluble problems in future. It is same with stored energy sourced such as batteries and etc. For an example another rare metal lithium which is used to produce batteries is decaying day by day. As a result ,this will make the future with no batteries to store energy.
Solutions - compulsory to dispose materials in a specific way.(lithium batteries) reinforce plastic. building energy efficiency and resource management.

Human Activities
It is obvious that the world is improving in science day by day with the support of human being. On the other hand, it is also understandable that the same human being invented threats to these technologies which are improving.
Internet security

There are programmes which have been invented to crash computers which is a main medium of electronic communication through internet. computer virus is an executable program. Depend on the nature of a virus, it may cause damage hard disk contents, and interfere normal operation of the computer. Computer worm is also more like to be virus ,but it is a standalone malware computer programme that reproduces itself and spread to other computers. As a result, these dangerous programmes can be mentioned as one of the challenging threats in electronic communication.

Solutions - Using genuine virus guards for computers. Using a pop-up blocker with the browser. Using a firewall(it helps to alert you when viruses try to get into the PCs)

changing use patterns often

Another threat is the changing use patterns of these communication media. For an example roughly a decade back the use of Internet was limited to static desktop computers with wired connections but after the smart phone revolution Internet service providers were forced to concentrate on wireless solutions and the "always connected" lifestyle forced the providers to rapidly increase the reliability and the coverage of their networks.

This "always connected" lifestyle also allows hackers to access private data, webcams, microphones, GPS which was not possible in the past. And this caused an increase in cyber terrorism.

There's also the problem of the time taken to change the legal system in response to the rapid change in technology and online culture. The problems with bit coins, unauthorised monitoring are prime examples.

Human Resources Human resources are more demandable and expensive .So it is compulsory that we use it properly. And now a day's its rarely seen that the correct person is there in right working place. In addition, High efficiency of human beings is more important than that of machines. We may classify human efficiency into physical, mental and intellectual efficiencies. Solutions- Limits should be personal. Must get paid for working hours time. People should spread and work. And must be the right person in the right place .

Conclusion

Government response to electronic technology threats Governments can update their rules, guidelines and standards. They can also educate people on such problems and how to overcome them. They can create backup systems to respond in case of an emergency.

For an example about two years back the 911 service in USA updated their systems to add the ability to receive SMS, photos and videos.

As a negative, there were some cases of children threatening their schools as jokes on Facebook and the schools taking it seriously and shutting down.
The government is working very hard to develop strategies on the space weather security policy and to implement measures and legislation on all sorts of different threats on the electronic technology .

business owners response to electronic technology threats

businesses can update their rules, guidelines and standards. They can also educate people on such problems and how to overcome them. They can create backup systems to respond in case of an emergency.
Moreover, they must be aware on the profit and loss percentages. So that that will be help the people to solve their problems without a loss.

Appendices

The effects of solar storms on radio communications .
(NSSA, 2007, Barnes, P.R and et al., 1991):
● HF radio communication (3-30MHz)
» Increased absorption.
» Depressed maximum usable frequencies (MUF).
» Increased fading and flutter
» Effect short–wave propagation through sunlit side of earth.
» Effect ground-to-air, ship-to-shore and amateur radio communications
» Increased lowest usable frequency (LUF)
●VHF propagation (30 – 300MHz)
» Effect pagers and cellular phones
» Susceptibility to fadeout of the high and low band in mobile voice communications for dispatching utility company line crews
● Satellite communications (200MHz to several GHz)
» Increased scattering of satellite-to-ground ultra high frequency (UHF) transmissions or scintillation can seriously interfere with direct satellite communications links
» Radio frequency interfere (RFI)
» Loss of phase lock
» Severe distortion of data transmissions from geosynchronous satellites
» Erroneous positioning information from single frequency GPS
» Drastic loss in spacecraft electrical power due to inability to reposition craft.
»Faraday rotation of the plane of polarization effect on satellites that employ linear polarization up to 1GHz
(http://scholarsresearchlibrary.com/aasr-vol4-iss4/AASR-2012-4-4-1825-1832.pdf

Damages to Electronic communication due to natural disasters. This is a fine example

Taiwan Earthquakes – December 2006

Large earthquakes hit Luzon Strait, south of Taiwan on 26 December 2006

7 of 9 cables in the strait were severed

7901 prefix outages (28% of region)

15,780 unstable prefixes (36% of region)

All cables reported repaired 51 days later!

(source: 14 February 2007, Office of the
Telecommunications Authority of Hong Kong)

http://www.renesys.com/wp-content/uploads/2013/05/20thAnnualFIRST.pdf

References

1. (n.d.). Retrieved october 30, 2013, from Reneys: http://www.renesys.com/wp-content/uploads/2013/05/20thAnnualFIRST.pdf

[ (Renesys) ]

2. (n.d.). Retrieved october 30, 2013, from Renesys: http://www.renesys.com/wp-content/uploads/2013/05/20thAnnualFIRST.pdf
Hena Aktar Professional Competences. (n.d.). Retrieved october 2013, 30, from blogspot: http://henapcblog.blogspot.co.uk/

[ (Hena Aktar Professional Competences) ]

3. (n.d.). Retrieved october 30, 2013, from Renesys: http://www.renesys.com/wp-content/uploads/2013/05/20thAnnualFIRST.pdf
Hena Aktar Professional Competences. (n.d.). Retrieved october 2013, 30, from blogspot: http://henapcblog.blogspot.co.uk/ waste management world. (n.d.). Retrieved october 7, 2013, from waste management world: http://www.waste-management-world.com/articles/2013/10/uk-government-takes-option-3-following-e-waste-recycling-consultation.html

[ (waste management world) ]

4 .kaspeersky lab. (n.d.). Retrieved october 3, 2013, from kaspersky: http://usa.kaspersky.com/internet-security-center/threats/web#.UnvkmvkwpDo

[ (kaspeersky lab) ]

5.china.org.cn. (n.d.). Retrieved october 3, 2013, from china.org.cn: http://www.china.org.cn/business/2012-03/25/content_24979534.htm

[ (china.org.cn) ]

6. [ (Norman) ]

Similar Documents

Premium Essay

Commnication

...Communication and Collaboration Strategy Phuc B. Nguyen Gen 200 Dr. Bradford 04/14/2010 Communication and Collaboration Strategy I - Learning styles and Strategies A. Bodily-Kinesthetic B. Logical-Mathematical C. Interpersonal II - Personality types and Strategies A. Organizer B. Giver C. Adventurer III - Conclusion IV - References Abstract People have many different learning styles and personality. Knowing my learning styles will help me use it to learn quickly and absorb information faster. Knowing my personality will help me to work well by myself and others. Through Pathways to Learning and Personality Spectrum worksheets, I will find out my learning styles and personality types. Each learning style and personality will have strong and weak points. I will have to use the strong points to my advantage and watch out for the weak points. Communication and Collaboration Strategy Learning Styles and Strategies Bodily-Kinesthetic is the ability to use the physical body skillfully and to take in knowledge through bodily sensation (coordination, working with hands). Strategies for studying are move fingers under words while reading and act out scripts of material, design games. Logical-Mathematical is the ability to understand logical reasoning and problem solving (math, science, patterns, sequences). Effective strategies to learn are organize material logically, explain material sequentially...

Words: 517 - Pages: 3

Free Essay

Commnications

...Online Dating: Better or worse than traditional? Amanda S. Wahl Post University In our society today everyone owns a smartphone or a tablet and is able to stay in contact with loved ones throughout or nation and others. With keeping in contact with loved ones via technology this has opened up a window for people to meet their matches through ways of online dating. People have gone to online dating due to insecurities or just plain curiosity, but there is still ways in which people still use traditional means of dating. So, why is there a cause of why one is better than the other? In online dating there is a lot of conflict with people not being who they truly are and rapes and murders but if you look at even in dating offline those are some of the key worries as well. Than in saying should we be in conflict with both? In my research about online dating and traditional dating, I have found that they both have positive and negative effects. With online dating a lot of people are insecure about themselves and are able to hide those insecurities behind a screen. I have had my own personal experiences with online dating and offline. I was always curious about why my friends were chatting it up with complete strangers so I tried it and I found my fiancée. We were together two and half years and separated because he had been cheating on me with girls online. For me it was an experience all in itself. My friends have had their shares of bad and good experiences whether it...

Words: 345 - Pages: 2

Premium Essay

Interpersonal Commnication

...Levels of Communication: 1. Interpersonal Behavior 2. Intrapersonal Behavior 3. Small Group 4. Large Group 5. Organizational 6. Public/Mass Language is perhaps the most pertinent tool in communications, we may infer to the semantics of each lexicon in the language to understand Language as a component on its own. But this is neither the only nor the foremost element of importance in communication due to the complex process by which culture and communication influence each other. Interpersonal Communication Communicating "one on one" with other human beings is generally referred to as interpersonal communication. It is the process by which people exchange information, feelings, and meaning through verbal and non-verbal messages: it is face-to-face communication. Interpersonal communication is not just about what is actually said - the language used - but how it is said and the non-verbal messages sent through tone of voice, facial expressions, gestures and body language. When two or more people are in the same place and are aware of each other's presence, then communication is taking place, no matter how subtle or unintentional. Without speech, an observer may be using cues of posture, facial expression, and dress to form an impression of the other's role, emotional state, personality and/or intentions. Although no communication may be intended, people receive messages through such forms of non-verbal behaviour. Elements of Interpersonal Communication ...

Words: 3131 - Pages: 13

Premium Essay

Effictive Commnication

...Effective communication is a good way to understand a person or a situation that lets us resolve problems. It also helps build trust and respect between people. Having an effective communication is very vital in everybody’s life even in a business environment. The time I experienced an effective communication was when I went to Wal-Mart and bought an air mattress, when I was there I was able to witness how they communicated. They listened to me by making feel heard and understood, they avoided interrupting me, they were not judgmental, and showed interest in solving my problems. I moved into a new apartment with my family, and didn’t yet have enough money to buy a bed for my children, so I decided to go to Wal-Mart and purchase an air mattress. After buying it, and went home I found out that my wife had already bought a bed which made me to go back to return it on the same day, but when I got there I was told that do not accept a return or exchange of mattress. On hearing that I requested to speak to their manager, after she came and listened to my explanation she explained why they do not accept a return of mattress, but also understood why I had to return it. She did not judge me, but gave a listening ear, and then she asked me to wait while she contacted her superior. After doing that she came back with the good news telling me that I could return the mattress and get a full refund of my money back. The manager also gave me a piece of advice telling me not to always...

Words: 348 - Pages: 2

Premium Essay

Ccna Intermidiate Level

...requre a special signaling method - Groudn start signaling 0 to eliminate the chance of glare. 8)Define in-band signaling and list the three in-band signaling methods used to initiate trunk connections between switches. 10)What is CAS and where is it used? a form of digital signalling systems in modern telecoms networks 12)Define out-of-band signaling communications which occur outside of a previously established communication method or channel 14)Define the following terms: SSP-service switching point are end points that are used in a telecommunication system which can be interconnected to each other by ss7 links. STP- Signaling transfer point is a packet switching node that is used to route control messages that are sent in a commnication network. SCP-Service control point is a standard component of the intelligent network telephone system which is used to control the service. 16)Draw the SS-7 message format by showing the MTP, the ISUP, the TCAP, and the SCCP, and explain the function of each. Pg.295-296 2)The MG has to be placed in the same location as the MGC A. True 4)Explain why a company purchases two MGC's even when call volume does not warrant the purchase. 6)An MTA provides all functions except: e. none of the above 8)Megaco/H.248 and MGCP are primarily used to set up trunks between...

Words: 380 - Pages: 2

Free Essay

Video Violence

...Skip to Navigation Skip to Content OPPapers.com Research Papers and Essays for All Join Login Writing Service Help Question? 888-442-7499 Follow Us on Twitter Join Search Get Access to Over 250,000 More Articles! Join Now Get Better Grades Today By Joining OPPapers.com and Accessing Over 460,000 Articles and Essays! get better grades Impact Of Private Channels Home Page» Religion & Spirituality» Islam Research Papers Impact Of Private Channels IMPACT OF PRIVATE CHANNELS ON PAKISTANI CULTURE Introduction: Media has occupied a major place in our daily lives by providing substance from our identities, put up meaning and organizes our survival. Individuals adapt their use of mass media to their own particular needs. Broadly speaking, we can say that people use the media in four ways: enjoyment, companionship, surveillance, and interpretation. Today media service is an anxious system of modern society. Electronic media, mainly television is the most important innovation in the communication technology. Teachers teach, government governs and religious leader preach but media totally changes the lifestyle of people and culture. Change is a natural phenomenon in the world. The occurrence of change is very immediate in Pakistan. Pakistan is also in the deep effect of change caused by private media. Youngsters, who considered the future of any country, always accept the urgent change. In the history of Pakistan last 8-10 years have revolutionaryIs...

Words: 627 - Pages: 3

Free Essay

Gm 545 Course Project Part 1

...of ethical dilemmas and issues" (Orinsi, 1999). Therefore, employees feeling the pressure to perform may resort to unethical decisions in order to meet the goals that they feel are unreasonable. This can happen at any level of management (Orinsi, 1999). I work in a industry full of healthful living and fitness plans, one of the most recent corporate ethical dilemas I believe is reasonable to discuss, centers around Susan G. Komen (SGK) for the Cure and chosing cause-marketing partner, Kentucy Fried Chicken (KFC). Questions have been raised by various media, including The Washington Post and The Huffington Post (one specifically about pesticides and their link to corn, chickens and cancer) to which Andrea Rader' SGK's director of commnications, responded with dollar amounts of SGK's contributions to research and education. (Stengel, 2010) In the majority of its responses to the media, SGK seems to be saying "The end justifies the means." More money for our cause is all the matters, never mind the health implications for our supporters, KFC's customers, or for those fighting obesity and heart disease. Repeatedly the responses list what SGK will do with the money while failing to address the possibility of doing harm. It is not always about the bottom line, especially not...

Words: 1194 - Pages: 5

Free Essay

Fema

...Communication: Past and Present HCS/320 July 25, 2013 Sandra Alviso Communication: Past and Present Every country suffers from natual dissasters. In 1979 at the Three Mile Island Nuclear Generating Station there was a malfunction that Lt. Gov. Bill Scranton miss communicated to the public. (Rose, 2011). In 2005 Mother Nature brought Hurricane Katrina to the coast Lousiana and, she devastated the city of New Orleans. Today our community’s natural disaster is a life-threatening biological agent which has spread in the water supply of several towns. Technology has changed the way a community in a disaserous situation communicates after the Three Mile Island and Hurricane Katrina. Comparing the way an Emergency Management Office communicates with the public and the groups involved, the advantages and challenges that come with the past and present communication technology, and the media opportunities used in today’s world. Individuals and Groups With a life-threatening situation there are many individuals and groups internally and externally that need to be notified of the situation. Within the office the entire staff needs to be aware of the seriousness of the situation. The Federal Emergency Management Agency (FEMA) and the Center for Disease Control Center (CDC) are a few federal agencies that need to be aware of the situation. The Department of Homeland Security’s (DHS) Office of Emergency Communications (OEC) was directed by Congress to develop the first National...

Words: 1574 - Pages: 7

Premium Essay

Student

...THE TWO-STEP FLOW OF COMMUNICATION A report called The People´s Choice* was made after analysing the process of decision-making during the course of an election campaign in 1940. After the analysis the authors suggested that the flow of mass communications may be less direct than was commonly supposed. Authors of The People Choice proposed the following Hypothesis: Influences deriving from the mass media first reach “opinion leaders” who, in turn, pass on what they read and hear to those of their everyday associates from whom they are influential. And that Hypothesis was called: “THE TWO-STEP FLOW OF COMMNICATION” Authors themselves intrigued by its implications for: • Democratic society: • They say it was better that people were more persuaded by the interaction with other people and that the influence of mass media was less automatic and less potent than had been assumed. • Social theory and communications research: • Hypothesis suggested that the image of modern urban society needed revision: image of the audience as a mass of disconnected individuals hooked up to the media but not to each other. IMPACTS OF THE HYPOTHESIS • The hypothesis in The People´s Choice, however, was not very well documented by empirical data: • The design of the study did not anticipate the importance which interpersonal relations would assume in the analysis of the data. • Interpersonal influence really attracted the attention of many researches of different kind, not just mass media researches:...

Words: 2182 - Pages: 9

Free Essay

Advances of Wireless Powering for Body Sensors and Implants

...Advances of Wireless Powering for Body Sensors and Implants Vieira, Caio Gagliano Sarkar, Mahasweta. Phd. Department of Electrical and Computer Engineering, San Diego State University Abstract This paper will talk about the advances that wireless powering can provides for medicine, especially for implants, prosthesis and sensor postsurgical. Looking for a reason that show why this is important and what has been created, what was already implemented, solutions from different institutions and what provisions exist for the next few years. Keywords • SAR (Specific Absorption Rate): unit of measurement that says the frequency range that can be absorbed by the human body. • RFID (Radio-frequency identification): is used to convert electromagnetic energy to electrical energy. Commonly used in tolls, parking lots and among others that uses a passive equipment to identify easily the customer. Another use for it has been to track animals, when a chip smaller that a grain of rice is implanted under the tissue of the animal and it can be read anytime to get an information needed. • iBMI (invasive brain machine interface) : it’s a type of device that goes in the patient’s brain to get data from it and send to a prosthesis to get movement that is needed. One real problem is how much battery the equipment is going to use to work. With this I found a good explanation about the problem at Wikipedia’s definition about Neuroprothetics: • Class-E power amplifiers...

Words: 2274 - Pages: 10

Premium Essay

HỏI Con 5s

...Part 1 Introduction 1.1 What is an operating system 1.2 History of operating systems 1.3 Computer hardware review 1.4 The operating system zoo 1.5 Operating system concepts 1.6 System calls 1.7 Operating System Structure 1 1.1 What is an operating system 2 What is An Operating System A modern computer consists of: • • • • • One or more processors Main memory Disks Printers Various input/output devices Managing all these components requires a layer of software – the operating system 3 What is an Operating System 4 The Operating System as an Extended Machine - Hides the messy details which must be performed - Presents user with a virtual machine, easier to use 5 The Operating System as a Resource Manager • • • Allow multiple programs to run at the same time Manage and protect memory, I/O devices, and other resources Includes multiplexing (sharing) resources in two different ways: • In time • In space 6 1.2 History of Operating Systems 7 History of Operating Systems • First generation 1945 - 1955 – vacuum tubes, plug boards • Second generation 1955 - 1965 – transistors, batch systems • Third generation 1965 – 1980 – ICs and multiprogramming • Fourth generation 1980 – present – personal computers 8 History of Operating Systems First generation 1945 - 1955 • Computers:ENIAC, UNIVAC… • Operating System: No OS, • Machine Language: plugboards • Single group: designed, built, programmed...

Words: 2601 - Pages: 11

Free Essay

Japan Itinerary Project

...Introduction and Motivation Japan is a country that has always fascinated me. I love to travel. I have been to Europe, South America, Canada, and most states in the U.S. However, what draws me to Japan is the distinct difference in culture from anything I have seen before. Japan is one of the most beautiful countries in the world. There is an era of mystique behind the culture. One of the main reasons why I would like to see Japan is because I am curious about what the culture is like. My grandparents are very well-traveled. It is easier to ask them where they have not been compared to where they have been. I remember them telling me about how much they loved Japan, and out of all the countries they have seen, Japan was one of their favorites. They put their trip to Japan up there along with going on an African safari, seeing the Pyramids of Egypt, and bashing around the streets of London. My grandmother has brought back souvenirs and beautiful artwork from the places she has visited, and her most prized possessions are the paintings she has brought back from Japan. I would like to see the country for myself and get a glimpse of why my grandparents have put it so high on their list of favorite places visited. Area History and Customs The Japanese culture seen today dates back many centuries, starting from 710 and continuing to the year 1333. It is greatly influenced by the Nara, Hein, and Kamakura periods (Grayson, 2016). One of the main attractions to Japanese...

Words: 3782 - Pages: 16

Premium Essay

Battle for Your Mind

...Battle For Your Mind (3 of 8) Series: The Battle Is The Lord's Dr. Stan Coffey II Corinthians 10:3-5 I. SATAN'S DESIRE II. SATAN'S DEVICES III. SATAN'S DOORS IV. SATAN'S DEFEAT It is good to see you. If you have a copy of the word of God, I want you to take God's word and turn to Second Corinthians Chapter 10 and tonight we want to continue to think about the battle is the Lord's. We are thinking about spiritual warfare. I don't know about you but I am in a battle. Amen? I suspect you are too if you are a believer. Somebody said if you hadn't met the devil, you are probably going the same direction he is. Amen? So if you are going toward God, you are going to have the devil try to stand between you and God and not the devil literally but demonic influence, demons. We studied last seek how to overcome the devil and we spoke about that and we spoke about how Jesus had vanquished the devil. The devil has been vanquished but the devil has not been banished. That is, the Bible says that God now has given us authority over him and power over him but he is not yet in the lake of fire. There is no need for any believer to be defeated by Satan because the Bible says we have been given the victory, the victory has been won and we don't fight for victory, we fight from victory. But nevertheless, we are still in a battle. Now look at Second Corinthians 10 and verse 3, "FOR THOUGH WE WALK IN THE FLESH, WE DO NOT WAR AFTER THE FLESH. (FOR THE WEAPONS OF OUR WARFARE...

Words: 5807 - Pages: 24

Premium Essay

Get It Through Training

...2013 Moriah Morris M&M Storage Inc. 2/10/2013 2013 Moriah Morris M&M Storage Inc. 2/10/2013 Get it Through…Training! Get it Through…Training! Mission Statement M.A.S.K.Storage Inc. will be offering a three day train the trainer class to be held at the Corporate Home Office in Kingsland, Georgia. “Get it Through…Training”, is specifically designed to provide current Certified Training Managers and candidates with needed tools, support, and guidance to facilitate policy and procedure to new hire trainees. Additionally, this class will provide an opportunity to assess the abilities of each training manager recommended or wishing to become a Certified Training Manager for M.A.S.K.Storage Inc. Classes will be held the third week of the first month each quarter for a total of four classes per year. M.A.S.K. Storage’s stakeholders demand and enforce extremely high standards from all employees in areas of policy and procedure compliance. In 2011 a training department was created and charged with team training and development for the entire company. Each region was assigned two experienced property managers to oversee the initial and ongoing training of store personnel within the region. Shortly after M.A.S.K. added online training courses to the program. Certified Training Managers (CTM’s) responsibilities include facilitating a five day shoulder to shoulder training class, four weeks of online training and mentoring, progress reporting and trainee follow up....

Words: 5264 - Pages: 22

Premium Essay

Diesel Brand Management

...DIESEL case study “Branded hedonism” Enric Gili Fort | ID520 Communication Planning | Fall 2005 | Institute of Design, IIT Enric Gili Fort Design Planning track ID520 Communication Planning Fall 2005 Institute of Design, IIT Chicago, IL 2 Table of contents 1. Era Analysis 4 • Era analysis • Competitive Analysis 2. Brand portfolio architecture 10 3. Brand identity beyond names and marks 12 4. Communication approaches and assets 16 •Identifying communication assets •Marketing Approach 5. Communication considerations and modes 22 •Framing of terms of comparison and key messages •Analysis of a communication • Webography and appendix 24  1. Era and competitive analysis Era analysis Diesel jeans started in 1978 when Renzo Rosso, after being designing his own clothes for several years and after graduating of an industrial manufacturing textile school, joined forces with a group of textile manufacturers in his region creating the Genesis group. Under the umbrella of this company many brands were launched and nowadays many still remain well known: such as katherine Hamnett, Goldie, martin guy, ten big boys and of course, diesel. In 1985 Rosso took control of the company by buying out the other partners and while being the sole force of the brand the company began its expansion. Without being trained neither in marketing or advertisement, Rosso defined and created the brand from scratch and after few years...

Words: 6667 - Pages: 27