...at country’s leading pharmaceutical company, world reputed Square Pharmaceuticals Limited (SPL) and was placed under one of the most important departments in the company Product Management Department (PMD). I have found the experience to be quite interesting and under the guidance of my supervisors and with the help of all the members of the department I have tried my level best to prepare an effective report on the above mentioned topic. The report contains the trend analysis of generic shifting, the reasons behind it and future potentiality of certain generic shifting events and SPL’s planning in the present scenario. Here I have gathered data and information through actual interviews of product managers and secondary data from IMS software and Research department of the organization (MRPC). I honestly hope that my analysis will help to give the idea how generic shifting event occur in the pharmaceutical market in Bangladesh and performance of different brands of different generics in the market. I hope you will find this report worth all the labor I have...
Words: 26333 - Pages: 106
...territory and product structuring, field alignment and related queries. * Making reports regarding performance of our products with their competitors * For launching new products, provide suitable and potential information to the marketing staff about the molecule and segments as well as highlight those areas where we have boost our business. * Make monthly reports brick wise performance , Territory wise performance ,Product wise performance ,Regions and District wise performance , Outlet wise performance * Besides making above reports, different kind of reports are developed as per the requirement of immediate boss * Using Software PLD( Pharmacy Level Data) * Using Software Sales Analyzer * Using Software IMS Plus * Using IMS Black book Organization : Helix Pharma (Private ) Limited. Over All Duration : Jan 2012 up March 2014 Previous Designation : Sales Analysis Officer Previous Responsibilities: * As a Marketing Sales Analyst, My Responsibilities Includes...
Words: 657 - Pages: 3
...great absentees of the social media. Out of fifty pharmaceuticals included in a social media use study, only ten had an identifiable presence on social media. Several articles had been written about what they call the "PharmaSocmephobia." A very interesting study from IMS Institute dedicates over 40 pages to explore, discuss and analyze the reasons, the pros and cons of this behavior. By ignoring social media pharmaceuticals are missing on great information for product development, key opinion leader identification and monitoring. Social media are a tool to listen to customer ideas and feedback, and collaborate with social groups to test products and services. As stated by IMS Pharmaceutical companies cannot afford to delay their entry into these ever evolving and increasingly significant new channels of communication. "Early movers will test the water with an educated trial and error approach and discover benefits for the company as a whole while moving closer to consumers and patients."(Social, 2014) Hard copies of healthcare information decreased in importance while online researchers for healthcare information went from 25% on 2000 to 72% of Americans and 82% among Europeans on 2012 according to IMS study. It is mandatory by FDA when advertising healthcare products FDA to include risk information in the main body...
Words: 516 - Pages: 3
...changed, and this is especially true for romantic films, which in the last few years have become cultural product of consumption that calm the thirst of emotions and entertains audiences. We are been living in a decade where materialism, coldness, and convenience stands out compared to previous decades. A clear example of this are the romantic films of the 90s compared to the present romantic films. For example, when we look at the 1990 movie Pretty Woman, we can see that there is a gallant man, and the conquest and elegance prevails. However, when we look at the 2007 movie Good Luck Chuck, we can realize that there is nothing alike in this romantic film, or in this decade. It was only after comparing the courtly manners of the man, the intensity of the sensual scenes, and the song soundtracks of the two films, that it can be determined that there are several differences and similarities between the two romantic films. At first glance, comparing the 90s romantic films to the present romantic films, we can clearly appreciate that in the movie Pretty Woman, the character Edward (Richard Gere), demonstrates a high level of elegance and gentleman in how he treats Vivian (Julia Roberts), speaks to her, and how he expresses himself. In addition, how could anyone forget the scene where he puts a diamond necklace on her neck, and tells her how beautiful is. In contrast, the male character in Good Luck Chuck, Dr. Charlie Logan (Dane Cook), seems to consider that this formality in the twenty-first...
Words: 616 - Pages: 3
...Pretty Woman: A Romantic Comedy The popular romantic comedy, Pretty Woman, is a story that shows how members of two different social classes meet and become forced to learn about each other's way of life and fall in love in the process (Garnham). Edward, (Richard Gere) is the upper-class businessman who coincidentally meets Vivian, (Julia Roberts), a lower-class prostitute, while trying to find his way back to his hotel after a fancy gathering of co-workers and other members of his elite society. After staying with Edward for a period of time, Vivian becomes assimilated into his upper-class way of life. While Vivian is learning how to fit into the upper echelons of society, Edward also learns how life is for the lower class. "Every society is marked by inequality, with some people having more money, schooling, health, and power than others. With its predictable plot, simple conflict and easy resolution, simple characters that the audience relates to, and the notion that one character saves the other, this film is the very definition of a romantic comedy. The predictable plot. This particular aspect of romantic comedies both explains their continued popularity and remains one of the hallmarks of this particular genre. Romantic comedies almost always follow the basic formula: Two people who are not supposed to be together somehow manage to fall in love. Hijinks and other mishaps ensue, they get into a huge fight, and then everything ends happily ever after (Garnham). This film...
Words: 1398 - Pages: 6
...being teased by Clairee Belcher (Olympia Dukakis). The women interact mostly in the home-based beauty salon owned by Truvy Jones (Dolly Parton). Truvy’s good friend, M’Lynn Eatenton (Sally Fields), and her daughter, Shelby (Julia Roberts), are frequent patrons. The movie centers on Shelby, who is a diabetic, gets married and wants to have a child. Her mother is worried because childbirth would put too much stress on Shelby’s body. Shelby is strong willed and determined to have a child. She has kidney failure several months after childbirth, and her mother donates a kidney. The kidney is rejected and Shelby dies. The name of this movie is so appropriate. The women seem to be delicate like a magnolia, but are actually as strong as steel. Pretty...
Words: 911 - Pages: 4
...the others in the herd. But to my kind, well, it almost ended my life one day, although, that same day I’ve never loved my family so much. That day, I was guarding our ally way like Papa Johnny tells me to, while the herd is out grabbing food. Then, the Junk Yard Cats came. Papa and Mama always told me about them and how they were the only pack they’ve seen around that was my kind, but they didn’t want me to ever be one of them. They had this kind of label on themselves. Well, Junk Yard Cats pretty much explains where they come from. Papa Johnny told me a few stories about them; like how they would do stupid stunts on railroad tracks, or jump off high places like bridges. Papa also told me they weren’t that intelligent. Mama Nita told me how they would walk around thinking that they owned the place. I always told them I’d be strong enough to take them on, but I was wrong that day. “Here kitty kitty kitty kitty!” said Bobby, one of the members. “He ain’t no cat Bobby; he’s a pretty boy now. With his precious bunny ears that his hoppin’ mama gave him!” said Sean, the leader. “Where’s your jumpin’ family? Doing all the hard work while they leave the weak link at home?” “You guys can go...
Words: 801 - Pages: 4
...Jeanine Ingalls Professor Linda Gross-O’ Neil English 099 3 December 2014 Beauty Pageants By wearing costumes, pretty shoes, and caking your face with makeup, a beauty pageant seems like a lot of fun for young girls. Dressing up like a Disney princess, winning an extravagant tiara, or lots of cash sounds perfect, right? Wrong. These girls are learning from a young age things that they shouldn't be taught. They are all dolled up in clothes and makeup and hair products that their parents spend thousands of dollars on that could be put towards important things, such as their children’s' futures. They are not developing any sort of personality or education; just what is taught through these competitions. Most importantly, they are learning to be comfortable with becoming a completely new girl that hides her sense of realness with fake eyelashes, and a pound of makeup. Beauty pageants are a way to exploit young women, and are killing the mockingbird within these children. The first American beauty pageant took place in 1854. It was quickly shut down by public protest. Another American pageant didn't come along for thirty more years, when one was held in Rehoboth Beach, Delaware. This time it was not shut down to protests due to the strict rules and regulations. The women also wore modest clothing. Beauty pageants continued to grow in popularity, but the 1920s was when the idea of pageants completely changed. The 20's were a time of economic growth, and social...
Words: 932 - Pages: 4
...Prologue: Cryptography is an excellent art/science of protecting data from unwanted intruders by transforming the data to an unreadable format which can be brought back to the original form only by those who are authenticated to do so. This system depends vastly on a principle of key usage and is the basic underlying principle of network security. A detailed technical discussion of cryptography ,particularly from a network’s stand point provides a compelling and an up to date examination of the political and the social issues that are now inextricably intertwined with cryptography. A complete discussion of cryptography itself requires a complete book and so we touch on only the essential aspects of cryptography. It is now high time to introduce Alice and Bob who are essentially the widely accepted persons for a discussion on networks as communicators. Also ,the third party Trudy ,the intruder also has a wide role to play in hacking the discussion of the two. So the whole thread would hang about these three and the ways there adhere to secure and hack the data that is transmitted. A First look on Terminologies Now its high time to know the basic terminologies of Cryptography. Firstly the text that we type in the human understandable format is called as the Plain Text. The plain text is then converted to a generally incomprehensive form called as the Cipher text using a technique called Encryption which usually does this, and the cipher is transmitted. Precisely...
Words: 1831 - Pages: 8
...Applying MESE processes to Improve Online E-Voting Prototype System with Paillier Threshold Cryptosystem Web Services Version 1.00 A project submitted to the Faculty of Graduate School, University of Colorado at Colorado Springs in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Software Engineering Department of Computer Science Prepared by Hakan Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold...
Words: 7163 - Pages: 29
...Table of Contents Project Outline 3 Security Requirements 4 Perimeter Security 5 Client and Server Security 10 Database Security 10 Server Security 12 Wireless and Remote Access Security 15 Security Configuration Management 19 References 23 Project Outline Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees is located in Columbus, Georgia, and employs 10 people full time, and 4 persons part time. The third location is located in Washington, DC, and employs 15 people. The fourth location located in Richmond, Virginia is the smallest of all the locations employing 5 persons full time. Tiger Tees is a fast growing company in dire need of a secure network that will ensure that the confidentiality, integrity, and availability of client information remain confidential. All transactions completed are sent to the organizational headquarters in Beckley, WV and processed there. In the past these orders and transactions have been completed by telephone and e-mail. A secure wide area network would streamline this process making the transactions more secure, and providing faster service to the customers...
Words: 5336 - Pages: 22
...In today’s world of instant connectivity and information at users’ fingertips, it’s vital that sensitive information is safeguarded against those who seek to do personal harm and profit from gaining access to the data. The key behind keeping information safe is the method in which it’s protected and encrypted. In order to appreciate how information is secured, users must understand the encryption concepts behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into the recent Heartbleed vulnerability. Encryption is at the heart of security in today’s networked world. When using the Internet, users are not always clicking around and taking in information passively, such as reading through their Facebook feed, a blog, or a news article. Often times, they are transmitting their own information while shopping online or registering for a website such as Twitter (Tyson 2014). Users take for granted the “behind the scenes” process of safeguarding the information they share while performing these day to day tasks. Simply put, encryption refers to any process used to make data more secure and less likely to be viewed or read by unauthorized or unintended parties (Tom’s Guide 2014). Encryption relies on...
Words: 767 - Pages: 4
...Encryption is a very important aspect of our daily lives. Everywhere we go and everything we do now involves some sort of encryption technology. From turning on our cars to using a card access to gain entry to our workplace, encryption is there. More specifically, encryption in communication is a vital component to everyday life. Without encryption, our lives would be much different and unsecure. According to Oded Goldreich (2004), There are 2 main types of encryption: One is called Symmetric-key and the other is public-key encryption (pp 375-376). The Symmetric-key algorithm uses the same cipher for both encryption and decryption. Conversely, the public-key algorithm requires 2 separate keys. One of these keys encrypts the text or message and the other decrypts it. A big drawback to using the Symmetric-key system is that both parties must possess the single, shared key (Mullen & Mummert, 2007). The public-key system kept both parties having separate keys that neither even knew about, but could still decipher the message. Encryption is defined as the activity of converting data or information into code. There are a lot of different ways that we use encryption. Cell phones, web browsers, wireless access, and computer passwords are all different types of communication encryption. Encryption is definitely not a new technology. It has been used by militaries and governments to communicate secretly for years. Cell phones are a prime example of the encryption we use today. In fact...
Words: 1437 - Pages: 6
...Symmetric Cryptography Secret writings have been found in many civilizations dating back to thousands of years where wide spread writings were adopted. Some of these civilizations included the Egyptians with their use of hieroglyphics, the Greeks and Spartan and the use of Scytale, and the Romans with the use of the Caesar Cipher. All these encryption methods could be thought of as symmetric encryption, which uses the same key to encrypt and decrypt the ciphertext. With a more contemporary look at symmetric key encryption with computer data, we can classify it into two categories called block ciphers and stream ciphers. The data in a block cipher would be broken down into specific sizes, for example 64-bit blocks or 128-bit blocks, which then the blocks would be encrypted separately. In stream ciphers, data would be encrypted in a stream of bits as oppose to dividing the data into blocks of bits. The decryption process for these two classification of symmetric encryption, of course, would be to use the same encryption key. Differences and Similarities with Symmetric and Asymmetric The fundamental difference between symmetric and asymmetric cryptography would be that asymmetric uses two keys, a public and private key, for encryption and decryption. If a private key is used to encrypt, then a related public key would be used to decrypt. This could also work the other way around when a public key is used to encrypt, then a related private key would be used to decrypt. Unlike...
Words: 558 - Pages: 3
...Lab #2 – Assessment Worksheet Applying Encryption and Hashing Algorithms for Secure Communications Ethical Hacking Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files. Lab Assessment Questions & Answers 1. Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The harsh value would change because of course there is a change in data of the file "Example.txt" so if the file should be transfer from the source to the destination with different hash string, for example the source hash string is 3ddhyhhhs47878, and when it reach the destination the...
Words: 662 - Pages: 3