...Origin of The Report: In this chapter we tried to describe the origin of the report, objective of the report, scope and limitations of the report. Objective of The Report: The BBA Program under the department of finance offers a course named “Management (F-108)” which requires submitting a report on a specific topic determined by the course instructor. The report under the headline ‘Whirlpool Corporation’ has been prepared towards the purpose. Objective of the report: There are several objectives to conduct the study which are: To Provide an overall information about the whirlpool company To provide the position in the BCG Matrix To analyze the SWOT of the organization To give an economical analysis. Methodology: To prepare this report we mainly depend on the primary data. But also take some help from our seniors. Process of collecting secondary data: We went to our senior to know about the procedure of making a good report. Then we ask for advices that should be followed to collect a standard data. Process of collecting primary data: Primary data are collected from the following sources: We collected our necessary primary data by the help of internet. Here the web address of Whirlpool proved to be very helpful to us. Reasons for collecting primary data: It is not possible to complete the report with the secondary data. To cross checking the secondary data couldn’t be possible without using primary data. Scope of The Report: Everything has some advantage...
Words: 4496 - Pages: 18
...MBA 6661 XTIA, Strategic Marketing Management Sonic Marketing Plan Executive Summary Sonic is an emerging telecommunication company that produces multifunctional Personal Digital Assistants (PDA). The company will launch a new multi-functional device called the Sonic 1000. This device allows consumers to have the usage of various telecommunication abilities at once in the palm of their hand. As Sonic enters a mature market, it will face many challenges from existing PDA makers such as Apple, Palm, Hewlett-Packard, and other well-established companies. Sonic will also face the challenge of the development of new and more innovative technology, industry consolidation, and pricing pressures. During its first-year sales, Sonic’s primary marketing objective is to achieve 3 percent growth sales and keep their losses to a minimum. The Challenge Brief product description: The Sonic 1000 is a sleek, stylish handheld PDA with Sonic Software that supports Windows and Mac, 400 Mhz processor, 128 MB of memory and 3.5-inch touch screen. The device will allow you to easily manage email on the road or access files on your office desktop PC. It offers built-in wireless connectivity via Wi-Fi and Bluetooth, expansion slot that supports SD/SDIO memory cards. Consumers can also listen to music and watch videos via its Media Player, as well as, view, share, and manage photos. Strategic Goals: Some of the key issues that Sonic faces are: What is the best way to confront changes...
Words: 9326 - Pages: 38
...I. Introduction Cecillio Kwok Pedro recognized an opportunity in producing aluminum toothpaste tubes for Colgate and Unilever and by 1977; he invested and opened Aluminum Container Inc. It was the start of his battle against entrenched giants to becoming the number one toothpaste producer in the Philippines. However, in 1986, a new packaging arrived and the two multinational companies (MNC) decided to switch to plastic tubing. Instead of closing down, Pedro decided to use his machinery and make and offer his own toothpaste. Knowing little about toothpaste, he had technical tie-up with a Japanese company and Lamoiyan Corporation was formally launched in 1988 and produced the first tube of Hapee. Sales have been thwarted by three significant barriers: consumer fears that locally produced goods were inferior, their preference for Colgate’s taste and the lack of awareness of the Hapee brand. Pedro and Lamoiyan Corporation counteracted these obstacles by capitalizing on their tie-up with a Japanese company, imitating Colgate’s taste and doing aggressive promotional strategies like sponsoring the Philippine Olympic team. Pedro also signed an exclusive contract with Sesame Street and featured the characters. Hapee created a niche in the kids market. Hapee toothpaste entered the market at a 50% discount and the multinationals made no move to combat the band. Hapee then dropped to 30% discount and soon, captured 20% market share. The entry of Hapee to the market didn’t...
Words: 7093 - Pages: 29
...device is WishChip. WishChip is an inexpensive computer device that will be implanted into the keys of the vehicle. The purpose of the chip is to allow the guardian of the vehicle to set the max speed the car can go. For example, if you are a parent and your kids are of age to drive, the parent can set the car to not go any faster then 70 mph or be alerted when it has reached high speed. Taking surveys/polls is one of the many ways to obtain research along with accident reports and much more. WishChip will first be marketed domestically. Marketing domestically will allow ForSure to test out the product and to get a feel for what the customers wants really are. Because the market, customer needs, tastes, geography, demographics, and distribution methods are likely familiar, it's often the easiest place for companies to launch a product. The four P's of marketing - product, price, place and promotion - are often easier for companies to determine within the domestic market. The marketing concept will be used because finding a product that fits the customers’ needs is first priority. WishChips is made in mind of what an individual would like. By being able to control this device provides each customer with options. A company that has a strong value system and is able to communicate it to its customers will have a competitive advantage over other firms because customers will be in a better position to develop a relationship with the brand. There is a need to be honest here. If...
Words: 5064 - Pages: 21
...Intellectual Property Valuatoin Techniques By Daryl Martin and David Drews- IPmetrics LLC Introducation Unlike many of the other assests found on a company’s balance sheet, the intangible assets, such as patents, trademarks and copyrights, are among the most difficult to quantify in terams of their value. It becomes further complicated to ascertain value when contemplating more obscure intangible assets, such as trade dress, trade sectets or software code. While difficult, the value of these assests can be accurately calculated via a number of industry accepted methodologies. The key to a successful analysis is to develop a comprehensive plan of action. The initial point to determine when attempting to value intellectual propery or intangible assests is the rationale for undertaking the analysis in the first place. Why do you need to know the value of the assets? The most obvious situations are those in which a third party has an interest in the asset values. For example, the internal revenue service and othe tax authorities want a detailed understanding about the basis for any value determination used when allocating portions of the purchase price associated with ethe acquisition of other companies. This issue has become even more important with the recent issuance of Statement of Financial Accounting Standard 142, Goodwill and Other intangible Assets, which changed the accounting treatment of certain intangibles acquired through business combinations. Instead of a more-or-less...
Words: 4938 - Pages: 20
...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...
Words: 23221 - Pages: 93
...PRENTICE HALL MA NAGEMENT INFORMATION SYSTEMS TITLES MIS: Brown/DeHayes/Hoffer /Martin/Perkins, Managing Information Technology 6/e © 2009 JessuplValacich, Information Systems Today 31e © 2008 Kr oenke, Using MIS 21e © 2009 Kr oenke, Experiencing MIS © 2008 Laudon/Laudon, Management Information Systems 10le © 2007 Laudon/Laudon, Essentials of Management Information Systems 81e © 2009 Luftman et aI., Managing the IT Resource © 2004 Malaga, Information Systems Technology © 2005 McKeen/Smith, IT Strategy in Action © 2009 McLeod/Schell, Management Information Systems 10le © 2007 McNurlin/Spr ague, Information Systems Management In Practice 7Ie © 2006 Miller, MIS Cases: Decision Making with Application Software 41e © 2009 Senn, Information Technology 31e © 2004 Database Management: BordoloilBock, Oracle SOL © 2004 Bordoloi/Bock, SOL for SOL Server © 2004 Fr ost/DaylVanSlyke, Database Design and Development: A Visual Approach © 2006 Hoffer/Prescott/Topi, Modern Database Management 91e © 2009 Kroenke/Auer, Database Concepts 31e © 2007 Kroenke, Database Processing 10Ie © 2006 Perry/Post, Introduction to Oracle10g, © 2007 Per ry/Post, Introduction to SOL Server 2005 © 2007 Systems Analysis and Design: Hoffer /GeorgelValacich, Modern Systems Analysis qnd Design 5'/e © 2008 Kendall/Kendall, Systems Analysis and Design 7Ie © 2008 Valacich/George/Hoffer, Essentials of Systems Analysis and Design 31e © 2006 Object-Oriented Systems Analysis and Design: ...
Words: 39287 - Pages: 158
...Dissertations Dublin Institute of Technology Year Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Mr. Dublin Institute of Technology, faith.shimba@student.dit.ie This paper is posted at ARROW@DIT. http://arrow.dit.ie/scschcomdis/1 — Use Licence — Attribution-NonCommercial-ShareAlike 1.0 You are free: • to copy, distribute, display, and perform the work • to make derivative works Under the following conditions: • Attribution. You must give the original author credit. • Non-Commercial. You may not use this work for commercial purposes. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the author. Your fair use and other rights are in no way affected by the above. This work is licensed under the Creative Commons Attribution-NonCommercialShareAlike License. To view a copy of this license, visit: • URL...
Words: 35464 - Pages: 142
...This page intentionally left blank Copyright © 2007, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2487-4 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com CONTENTS xvii Dedicated to My Parents Shri Gopalrao and Gayabai Kondalkar This page intentionally left blank Preface Globalisation, technology advancement, open market system and desire of human beings to excel in the field one works has increased competitiveness and resultant work stress. Management of human behaviour and chanalizing it into correct direction has become important. Application of motivational theories, art of leadership and skill of redesigning jobs and modification to organisational structure is an on going process that facilitates positive work environment leading to increased job satisfaction of employees, greater productivity and organizational growth. Due to scientific advancement managing human resources is more challenging. It has been observed that everybody...
Words: 149242 - Pages: 597
...Commonwealth Executive Masters in Business Administration / Public Administration CEMBA 553 Management in Organisations Copyright © Commonwealth of Learning, 2003 All rights reserved. No part of this course may be reproduced in any form by any means without prior permission in writing from: The Commonwealth of Learning 1285 West Broadway Suite 600 Vancouver, BC V6H 3X8 CANADA e-mail: info@col.org Dean Institute of Distance Learning New Library Building Kwame Nkrumah University of Science and Technology Kumasi, Ghana Phone: +233-51-60013 Fax: +233-51-60014 E-mail: idldean@kvcit.org Web: www.fdlknust.edu.gh i 553 - Management in Organisations Learning Objectives Upon successful completion of this course, learners will be able to: • • • • Explain the basic premises of management and public administration Compare different theories and approaches of organisation Distinguish behavioural patterns, advantages, disadvantages, and dysfunctions of bureaucracies Categorize the different management trends in the work environment. Topics • Introduction to Management and Organisational Behaviour • Individual and Group Behaviour in Organisations • Decision- making and Communications in Organisations • Leadership, Organisational Structure & Environment • Power and Politics • Organisational Culture • Organisational Change • Conflict and Negotiations ii TABLE OF CONTENTS 1 Introduction................................................................................
Words: 79671 - Pages: 319