...amaxonCase Assignment for eBay and Amazon (Group 7 will present this case in class on November 7) Case Questions: 1. 2. 3. 4. What are the key drivers of profitability in eBay’s business model? What are the key drivers of profitability in Amazon’s retail business model? How does its retail business model interact with that of eBay? As it shifted to a retail and platform business model, how successful was Amazon in overcoming barriers to entry in the third-party seller market? What would you recommend eBay going forward, and why? Requirements: For Each Individual Student 1. 2. 3. 4. Read the case material carefully and briefly address the above questions in your case report. Limit your case report within TWO pages. Case report must be written in English. Submission deadline for case report is 2pm, November 6 (Tuesday) For Group 7 1. 2. Submission deadline for case presentation PowerPoint is 11pm, November 6 (Tuesday) – only one copy need to be submitted Limit your presentation to 20 minutes (including Q&A) Note: Each student in Group 7 still needs to submit his/her individual case report separately. Marking Criteria for Individual Case Report (total 2 points in your final grade): 1. 2. 3. 4. On-time submission with satisfactory quality – 1 point On-time submission with good discussions – 1.5 point On-time submission with excellent insights – 2 points Late submission without justifiable reason is not accepted Marking Criteria for Group Case Presentation (total 10 points...
Words: 307 - Pages: 2
...Module 6: IT Department Now days it is getting harder and harder to find a company whose IT department is not based in a foreign country where English is the primary language. It is amazing how many Carls, Steves, and Bobs in the world have such a difficult time explaining what is wrong with your computer in their native tongue. The fact is companies are finding that just like automotive and retail manufacturing, IT departments can be cheaper if you outsource them. Below you will read an argument supporting keeping an IT department in house versus outsourcing its work. I will discuss issues like network familiarity, troubleshooting timeframe, and priorities. Module 6: IT Department Lack of Information In the article, To Outsource or Not To Outsource, Outsource magazine brought up the point about how cost alone should not be the deciding factor in outsourcing an IT department. One of the key issues they brought up is in-house versus a specialist. A specialist may sound nice, but is it as good as an in-house employee? Lets put this in a more understanding example. Your car needs new brakes; this is the car that you drive your kids around in every day. Whether to and from school or to soccer practice this car quite often holds the most important possessions in your life. You have two options for mechanics to replace your brakes. Both mechanics have the same amount of experience working on automobiles, but their expertise and prices differ slightly. Option one is cheaper and...
Words: 853 - Pages: 4
...In conceptualizing a business plan and understanding the value alignment with a company and an individual, Team A has selected Johnson and Johnson (J&J). Team A will analyze the values of each team member and how his or her values compare to the values of Johnson and Johnson. Enclosed below is an outline of subsequent evolution values and action alignment between plans and actions. Team A has reflected the degree of differences in individual values versus J&J stated values. Origins of Personal and Workplace Values A person’s values derive from family, friends, and life experiences shaping each individual’s perspective. Values are “a person’s principles or standards of behavior; or judgment of what is important in life” (Definition of Value, 2012, p. 1). The values each individual in Team A may differ in some form but to become a team the individuals must come to an agreement about a single set of values. Individual values are instilled through those closest such as family, friends, and mentors. As the person grows older and wiser these values sets him or her apart from others around them; although all share a set of common values. Similar to Team A corporations must have a foundation that guides the company and at the same time communicate to employees and the public the company’s vision and mission. Explain how your team values drive its actions and behaviors Team A’s values are important because they set us apart from other teams. In the academic setting Team...
Words: 1265 - Pages: 6
...working with children in Key Stages 1 and 2 Professional development materials Primary teachers and headteachers Status: Recommended Date of issue: 04-2004 Ref: DfES 0163-2004 ❚❙❘ Contents DVD – extracts from the video Speaking, Listening, Learning: working with children in Key Stages 1 and 2 (DfES 0628-2003) Introduction Planning meeting Professional development modules 1 Speaking and listening: concepts, skills and knowledge 2 Progression in speaking and listening 3 The role of the teacher in developing effective interaction and identifying and developing language features 4 Organising and managing speaking and listening 5 Speaking and listening: drama Inside front cover 3 5 7 19 35 49 55 This booklet contains suggestions for a planning meeting for embedding speaking and listening across the primary curriculum, and five professional development modules to support the teaching of speaking and listening in primary schools. The planning meeting will require teachers in preparation and follow-up. The professional development modules require time for teachers to read, plan, try out some teaching, watch others teach and discuss. Each module also has a staff meeting lasting between 60 and 75 minutes. Professional development for speaking and listening in mathematics will be available in 2005. © Crown copyright 2004 DfES 0163-2004 Professional development materials 2 Speaking, Listening, Learning: working with children in Key Stages 1 and 2 DfES...
Words: 24680 - Pages: 99
...– Criminal Investigation Lesson 4 – Surveillance, Records, and Reporting 9/17/2012 In this paper I will be discussing the four characteristics of a well-written report. As well as what makes them critical to writing a report. The four characteristics are completeness, conciseness, clarity, and accuracy. As stated in the textbook “A report may contain all the necessary information, but if it is poorly written, points may be lost in the prose” (P.189). Simply put, if it doesn’t contain all the key elements your report could otherwise become useless. The first characteristic of a well written report is its completeness. “Completeness means that the report contains all pertinent information” (P.190). Officers have a series of questions they should ask themselves before handing in a report to make sure that it is complete. Reports should contain any and all relevant information so that your report leaves no open questions whether it by a fellow officer or the court. Having all the necessary information in the report will show what actions were taken and it helps to avoid wasted time and effort of having to do it all over again. E-mail addresses have become important in report writing since it is the easiest way to deliver a statement to an officer. “An Added Benefit is that e-mail interviews can be printed out and attached to the supplementary report” (P.190). The importance of the completeness of a written report is crucial due to it needing every detail that was crucial...
Words: 702 - Pages: 3
...be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson) Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption. As a matter of fact, the applications of encryption are very important. First of all we have data protection. Here we are referring to files and email encryption. The data is protected in the hard disk in case a hacker gets into the system. However, if the person who has the key of the encryption to decode...
Words: 1201 - Pages: 5
...Summary: The number of illiterates in India is estimated to be over 400 million of which 75% live in rural areas. Of the literate population, a significant proportion lack basic vocational skills. India has world-class institutes of higher learning, such as the IITs, IIMs and medical colleges but the rural India still remain isolated to them. India’s most valuable intellectual capital migrates to western countries keeping gap in demand and supply of such intellectual capital in India, therefore we need to develop the equal opportunities for the isolated communities and enable them to access the elitist structure of Indian education. With the weak and tottering foundation India will not be able to achieve social and economic development The key challenge of India is to rapidly provide opportunities to the rural population to empower them with education and make them literate, and develop basic leadership and problem-solving skills. Have strong basic education foundation rural India will be able to raise productivity, entrepreneurship and material standards of living Here we would like to opt to do research into how into how provide solution to the critical issues of primary education in India through innovation strategy. As a part of research we will be meeting and collecting information from founders of NGO called “eVidyaloka (www.eVidyaloka.org)”. eVidyaloka is a not for profit organization registered under the Trusts Act, focuses on...
Words: 702 - Pages: 3
...Journey of the Self The road I’m traveling on I see as a dirt road through a light forest in the mountains of northern California. I’m not sure exactly where I am, but it is a bright day with some clouds and blue skies, but off to the distance I can see storm clouds. All I have with me is my backpack containing a notebook, a pen, a pair of gym shorts, a spare t-shirt, a pack of cigarettes with a lighter, a bottle of water and a couple of granola bars. In my pockets I have a cell phone with a dead battery, a pocketknife, and my wallet with five dollars and my I.D. inside. I’m walking, surrounded by trees of all types. There is a light breeze, but it’s quiet as I walk and look around. As I’m walking, the road is flat and somewhat narrow, but it is easy going for the most part, with random spots where the road becomes rocky and somewhat stressful, but it evens itself out and becomes smooth for a period of time again. I feel happy and serene, but exhausted at times and in need of a bit of rest, but I always continue and begin to walk again. As I’m walking, I come to a two-way fork in the road with a sign in the middle. The sign has two arrows with words printed on them. Each arrow is pointing in the opposite direction of the other. To the left I have the choice to walk to the city, while to the right I have the choice to walk to a small country town. After some thought and consideration of both of my choices, I eventually choose to head towards the Country. I’m not sure exactly...
Words: 2126 - Pages: 9
...What is Honor? My understanding of the term honor. Honor is defined as a source of credit or distinction, and is associated with reverence, dignity, reputation, good name and a good sense of what is morally correct. The key part to honor is having respect for others and for you; the two must act together because without both, there is nothing. I strongly believe that reputation is hard to gain and easily lost. Think about this, every day thousands of planes fly somewhere and there is never any news about a successful landing, but if any of those flights crash, it is all over the news. This fact tells me that in order to keep one’s honor, one must maintain a set standard of excellence. It will only take one infraction to cause said person to forfeit one’s honor. Nicholas Boileau once said: “Honor is like a rugged island without a shore, once you have left it, you cannot return.” Honor is something in which is not obtained and sustained easily. One must have patience and study to become a person of integrity and goodwill. Honor is an everyday thing; obstacles trying to deter one from being honorable lay in life’s everyday path. Perseverance is a key to honor; one must fight the constant impeding objects in order to maintain the highest level of honor. The shore of an island is often looked at as something isolated and secluded yet has a certain charm about it. Honor is much like the shore in this sense. Honor must come from inside and resist being influenced by minor factors...
Words: 556 - Pages: 3
...David Srep Computer Literacy New Tech Update These three phones allow you to have the Unikey app. No more digging your pockets and looking for your keys. There a new app that you can get for the phones that are above this paragraph. This key is called the Unikey system, and it has some cool features that are actually kind of clever. The unikey app transmits a Bluetooth signal from the user iPhone, android, or blackberry smart phone, which is picked up by a paired unikey deadbolt lock as it is approached by a user. All the user has to do is walk up to the door and the phone has to be nearby the door. Next the user has to touch the outer surface of the lock, at which point the bolt will electronically withdraw. You can do the same thing when you leave the house. What I like about the Unikey system is that you can text someone the key to your house. This way your family member doesn’t have to wait until you get home. It gives you an option if you want that person have the key permanent or a one- time use. If you lose your phone you can deactivate the app from a computer and the unikey comes with a spare key. The unikey system is being sold for 199.00. It will be cool if they can make these apps for cars. I have car key 3 times and hand to pay 80 dollars for someone to get my key out the car. Source: http://www.unikeytech.com/ Source:...
Words: 276 - Pages: 2
...Cryptography Cryptography Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible. Data encryption is an important part of computing and, if done properly, can provide the user with means through which data can be protected from other parties. Encryption is done in many areas including end point devices such as computer terminals and servers which store important information. As such, data encryption has been applied in the military, banking sector, in businesses and other areas which require secure storage and transfer of data. Data encryption is simply the change of raw data or ordinary information referred to as plaintext into indecipherable material called cipher text. The data can then be stored or transferred securely since it cannot be read by another party. If the data is to be accessed, a cipher, which is the pair of algorithms that encrypts and decrypts data, is used to decrypt the data. The data can then be read and it is therefore accessible only...
Words: 1679 - Pages: 7
...Asia. product segments: Frozen savoury, Dessert, Fruit products customer segments: retailers (supermarkets), foodservice outlets (sporting venues or cafes), Petrol and Convenience Channel (Reliance BP sites) oversease markets: US market, Asia market Value chain: PFL doesn't sell directly to consumers. 2 What is the current life cycle position of the industry? (industry life cycle, and demonstrate why?) Maturity stage : The case mentioned that PFL has already achieved leadership in serveral markets. Besides, serveral other markets are very competitive. In addition, PFL is continuing to pursue conversion cost reduction, which is another character of maturity stage. So we conclude that this industry is in maturity stage. What are the key issues that will affect historical/future industry growth? What is their likely impact and the overall assessment of the industry’s future growth? (TEMPLES) Technology + The technology development, especially information systems and manufacuturing systems, will improve the efficiency and effectiveness of this industry by enabling economies of scale and scope. So the smaller compititors who doesn't have strong cash flow to invest in the new technology, will be swept out. And the left competitors will grow market share by both further acquisitions and cost management. Economy + The potential growing sales in US and Asia may make the total industry grow by expanding to international markets. The global financial crisis (Case doesn't mention)...
Words: 932 - Pages: 4
...Ariel Martin October 16, 2013 Descriptive narration Flash Burn My dad was set on fire when the car backfired. He was in the process of getting his Jeep fixed. On this particular day, the project of choice was working on the carburetor. The process was simple, he would pour gas into the carb well my boyfriend Mat would turn the key over. They must have done this at least a dozen times. The last time it all went wrong. My dad poured the gas and Mat turned the key. A loud bang like a gun shoot startled me, but I did not expect to turn my head to see the most devastating thing. I looked over to where the bang was there were flames coming from under the hood. The bottle of gas my dad was holding was on fire. He was unsure where my son was so he didn’t want to throw the bottle. Instead he tried to shake the bottle that’s when it all went wrong. The gas splashed his face then the flames; he hit the floor stop, drop and roll. It didn’t work as he hit the floor the bottle of gas fell and he rolled right into it. Now his chest is on fire, he realized it’s not working he stands up and rips his shirt off and starts hitting his head to put the flames out. The smell of burning flesh and hair was all we could smell. The sight was heart breaking when he turned around; the skin that was left on his face was hanging. From the time the fire started to when he looked me in the eyes and asked how he looked had only been about a minute and a half. That fast I had to look my dad in his...
Words: 515 - Pages: 3
...SECTION ONE INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on...
Words: 4428 - Pages: 18
...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...
Words: 254 - Pages: 2