...September 2014 Story Between the numbers We bring some key ratios that you can use to analyse companies Rahul Oberoi/Money Today Edition:September 2014 Commerce Ministry wants sunset clause for SEZs to go 27 PSU banks write off Rs 1.14 lakh cr bad debts during 2012-15 Impose antidumping duty on ceramic tiles from China Raise public healthcare spending to 2.5% of GDP Lenovo launches Yoga 900 convertible laptop, Tab 3 Pro tablet MORE ECONOMY CORPORATE MARKETS MONEY INDUSTRY TECH OPINION PHOTOS VIDEOS MAGAZINE MORE Railways' make in India: A look at 24coach train features Netflix launches in India, plans start at Rs 500 Vodafone's 4G services in Delhi, Mumbai by March Maruti releases first sketch of its compact SUV Vitara Breeza Supreme Court extends ban on 2000cc diesel cars Delhi-Agra train fare less than a kg of apples PHOTOS VIDEOS MORE 'Ratio analysis is crucial for investment decisions. It not only helps in knowing how the company has been performing but also makes it easy for investors to compare companies in the same industry and zero in on the best investment option', says DK Aggarwal, Chairman and Managing Director at SMC Investments and Advisors 'A high P/E ratio may indicate that the stock is overpriced. A stock with a low P/E may have greater potential for rising. P/E ratios should be used in combination with other financial ratios for informed decision-making' , says Sabyasachi Mukherjee...
Words: 619 - Pages: 3
...estimate the level of applicability of each TQM characteristic to the organization. 5. Discuss your finding and provide conclusion on the state of TQM in the organization. Q2. Exercise No. 4 on pg. 151 Give an example of the use of the PDSA cycle in your personal life and in your work experiences. Personal Life Experience A personal life experience of the Plan, Do, Study and Act cycle is my decision to go back to school to get my Masters degree in Engineering. The planning required me to define the length of time it would take for me to finish my degree. The key sequence of events were for me to let my manager know of my intention to get my degree and that it would not affect my job performance. Then I had to lay our my educational plan and my overall purpose of getting my degree. The Do cycle required me register for a class and ensure that it didn’t interfere with my job performance. Another key part of the do process was for me to study and get a passing grade. The Study cycle required me to study for my exams and assignments on my own time and not on company time. The Act cycle requires me to continue to push myself to finish my degree in a recent amount of time. Work Experience A work experience of the Plan, Do, Study and Act cycle is my involvement on our latest diesel engine in our Superduty truck line where I was the lead for powerplant NVH. The planning required...
Words: 875 - Pages: 4
...around. Burton was expected to develop a sustainable business platform that would be capable of doubling the company’s size and generating an attractive return on investment. Jim Burton did everything in his power to help turn around Norton Lilly International. Due to the fact that he was new to this industry and dealing with veterans that had 30 years of experience he had to use an incremental approach by introducing ideas and building on them once accepted. He formed an executive committee in order to begin decentralizing the decision-making processes away from the owners. Burton also established process mapping, which focused on the key processes involved in delivering each type of service. This process helped management understand the underlying causes of service failures and began to close performance gaps. Burton then established key performance indicators that identified operating level...
Words: 996 - Pages: 4
...technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be futile because the text looks ridiculous to them. It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer...
Words: 7475 - Pages: 30
...be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson) Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption. As a matter of fact, the applications of encryption are very important. First of all we have data protection. Here we are referring to files and email encryption. The data is protected in the hard disk in case a hacker gets into the system. However, if the person who has the key of the encryption to decode...
Words: 1201 - Pages: 5
...Summary: The number of illiterates in India is estimated to be over 400 million of which 75% live in rural areas. Of the literate population, a significant proportion lack basic vocational skills. India has world-class institutes of higher learning, such as the IITs, IIMs and medical colleges but the rural India still remain isolated to them. India’s most valuable intellectual capital migrates to western countries keeping gap in demand and supply of such intellectual capital in India, therefore we need to develop the equal opportunities for the isolated communities and enable them to access the elitist structure of Indian education. With the weak and tottering foundation India will not be able to achieve social and economic development The key challenge of India is to rapidly provide opportunities to the rural population to empower them with education and make them literate, and develop basic leadership and problem-solving skills. Have strong basic education foundation rural India will be able to raise productivity, entrepreneurship and material standards of living Here we would like to opt to do research into how into how provide solution to the critical issues of primary education in India through innovation strategy. As a part of research we will be meeting and collecting information from founders of NGO called “eVidyaloka (www.eVidyaloka.org)”. eVidyaloka is a not for profit organization registered under the Trusts Act, focuses on...
Words: 702 - Pages: 3
...Journey of the Self The road I’m traveling on I see as a dirt road through a light forest in the mountains of northern California. I’m not sure exactly where I am, but it is a bright day with some clouds and blue skies, but off to the distance I can see storm clouds. All I have with me is my backpack containing a notebook, a pen, a pair of gym shorts, a spare t-shirt, a pack of cigarettes with a lighter, a bottle of water and a couple of granola bars. In my pockets I have a cell phone with a dead battery, a pocketknife, and my wallet with five dollars and my I.D. inside. I’m walking, surrounded by trees of all types. There is a light breeze, but it’s quiet as I walk and look around. As I’m walking, the road is flat and somewhat narrow, but it is easy going for the most part, with random spots where the road becomes rocky and somewhat stressful, but it evens itself out and becomes smooth for a period of time again. I feel happy and serene, but exhausted at times and in need of a bit of rest, but I always continue and begin to walk again. As I’m walking, I come to a two-way fork in the road with a sign in the middle. The sign has two arrows with words printed on them. Each arrow is pointing in the opposite direction of the other. To the left I have the choice to walk to the city, while to the right I have the choice to walk to a small country town. After some thought and consideration of both of my choices, I eventually choose to head towards the Country. I’m not sure exactly...
Words: 2126 - Pages: 9
...What is Honor? My understanding of the term honor. Honor is defined as a source of credit or distinction, and is associated with reverence, dignity, reputation, good name and a good sense of what is morally correct. The key part to honor is having respect for others and for you; the two must act together because without both, there is nothing. I strongly believe that reputation is hard to gain and easily lost. Think about this, every day thousands of planes fly somewhere and there is never any news about a successful landing, but if any of those flights crash, it is all over the news. This fact tells me that in order to keep one’s honor, one must maintain a set standard of excellence. It will only take one infraction to cause said person to forfeit one’s honor. Nicholas Boileau once said: “Honor is like a rugged island without a shore, once you have left it, you cannot return.” Honor is something in which is not obtained and sustained easily. One must have patience and study to become a person of integrity and goodwill. Honor is an everyday thing; obstacles trying to deter one from being honorable lay in life’s everyday path. Perseverance is a key to honor; one must fight the constant impeding objects in order to maintain the highest level of honor. The shore of an island is often looked at as something isolated and secluded yet has a certain charm about it. Honor is much like the shore in this sense. Honor must come from inside and resist being influenced by minor factors...
Words: 556 - Pages: 3
...David Srep Computer Literacy New Tech Update These three phones allow you to have the Unikey app. No more digging your pockets and looking for your keys. There a new app that you can get for the phones that are above this paragraph. This key is called the Unikey system, and it has some cool features that are actually kind of clever. The unikey app transmits a Bluetooth signal from the user iPhone, android, or blackberry smart phone, which is picked up by a paired unikey deadbolt lock as it is approached by a user. All the user has to do is walk up to the door and the phone has to be nearby the door. Next the user has to touch the outer surface of the lock, at which point the bolt will electronically withdraw. You can do the same thing when you leave the house. What I like about the Unikey system is that you can text someone the key to your house. This way your family member doesn’t have to wait until you get home. It gives you an option if you want that person have the key permanent or a one- time use. If you lose your phone you can deactivate the app from a computer and the unikey comes with a spare key. The unikey system is being sold for 199.00. It will be cool if they can make these apps for cars. I have car key 3 times and hand to pay 80 dollars for someone to get my key out the car. Source: http://www.unikeytech.com/ Source:...
Words: 276 - Pages: 2
...Cryptography Cryptography Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible. Data encryption is an important part of computing and, if done properly, can provide the user with means through which data can be protected from other parties. Encryption is done in many areas including end point devices such as computer terminals and servers which store important information. As such, data encryption has been applied in the military, banking sector, in businesses and other areas which require secure storage and transfer of data. Data encryption is simply the change of raw data or ordinary information referred to as plaintext into indecipherable material called cipher text. The data can then be stored or transferred securely since it cannot be read by another party. If the data is to be accessed, a cipher, which is the pair of algorithms that encrypts and decrypts data, is used to decrypt the data. The data can then be read and it is therefore accessible only...
Words: 1679 - Pages: 7
...Asia. product segments: Frozen savoury, Dessert, Fruit products customer segments: retailers (supermarkets), foodservice outlets (sporting venues or cafes), Petrol and Convenience Channel (Reliance BP sites) oversease markets: US market, Asia market Value chain: PFL doesn't sell directly to consumers. 2 What is the current life cycle position of the industry? (industry life cycle, and demonstrate why?) Maturity stage : The case mentioned that PFL has already achieved leadership in serveral markets. Besides, serveral other markets are very competitive. In addition, PFL is continuing to pursue conversion cost reduction, which is another character of maturity stage. So we conclude that this industry is in maturity stage. What are the key issues that will affect historical/future industry growth? What is their likely impact and the overall assessment of the industry’s future growth? (TEMPLES) Technology + The technology development, especially information systems and manufacuturing systems, will improve the efficiency and effectiveness of this industry by enabling economies of scale and scope. So the smaller compititors who doesn't have strong cash flow to invest in the new technology, will be swept out. And the left competitors will grow market share by both further acquisitions and cost management. Economy + The potential growing sales in US and Asia may make the total industry grow by expanding to international markets. The global financial crisis (Case doesn't mention)...
Words: 932 - Pages: 4
...Ariel Martin October 16, 2013 Descriptive narration Flash Burn My dad was set on fire when the car backfired. He was in the process of getting his Jeep fixed. On this particular day, the project of choice was working on the carburetor. The process was simple, he would pour gas into the carb well my boyfriend Mat would turn the key over. They must have done this at least a dozen times. The last time it all went wrong. My dad poured the gas and Mat turned the key. A loud bang like a gun shoot startled me, but I did not expect to turn my head to see the most devastating thing. I looked over to where the bang was there were flames coming from under the hood. The bottle of gas my dad was holding was on fire. He was unsure where my son was so he didn’t want to throw the bottle. Instead he tried to shake the bottle that’s when it all went wrong. The gas splashed his face then the flames; he hit the floor stop, drop and roll. It didn’t work as he hit the floor the bottle of gas fell and he rolled right into it. Now his chest is on fire, he realized it’s not working he stands up and rips his shirt off and starts hitting his head to put the flames out. The smell of burning flesh and hair was all we could smell. The sight was heart breaking when he turned around; the skin that was left on his face was hanging. From the time the fire started to when he looked me in the eyes and asked how he looked had only been about a minute and a half. That fast I had to look my dad in his...
Words: 515 - Pages: 3
...SECTION ONE INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on...
Words: 4428 - Pages: 18
...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...
Words: 254 - Pages: 2
...Dance like There's No Tomorrow As you open the door into Dance Like There's No Tomorrow, you will immediately see a cheerful, sprightly woman sitting at a maple oak desk full of neat, organized papers. Right in front of her, a bright green apple laptop sits, glowing. What hits you second is the lemony smell of air freshener, to mask the smell of the oak floor. She invites you to sign up with a shiny clipboard and yellow pencils. After you finish the tedious registration, you get to enter the studio! Your hand grabs the cold, slippery doorknob on the soundproof door and turns the knob. You get hit by a breeze of cold, fresh air coming from a grey fan hung in the back corner of the studio. Loud pop music from a stereo in the front of the room blasts out, and vibrates your eardrums. You find yourself enclosed by four walls of crystal, clear mirrors on every side of you and it mimics every move. Long, polished wooden bars wraps around two sides of the walls. A portable blue jug of ice water sits in the front of the room, covered with little beads of water. In the very back of the studio, there is a hidden door which blends into the walls because it also has mirrors on it. It contains apparel for dance, sweatpants, T-shirts, camis, dance shoes, and sweatshirts with Dance Like There's No Tomorrow on the very front of them. The shiny, glittering world of Dance is intriguing and popular for all ages. If you need to release your stress, want to have fun, or Dancing is just your...
Words: 284 - Pages: 2