Wednesday, January 29, 2020

EVOS Office Essay Example for Free

EVOS Office Essay The Exxon Valdez oil spill in 1989 is considered as the worst environmental challenge that the state of Alaska has faced over the years. The incident led to the spillage of around eleven million gallons of oil from the Exxon Valdez tanker which immediately affected the immediate environment which resulted to the ecological imbalance within the water system affecting marine life and the loss of thousands of sea birds that dwell in the area. (â€Å"Crude Awakening,† 2008) Since the incident, Exxon Mobil has tried to resolve the problems and the impending threats and risks that come with the spread of oil within the water system by transforming the mission of the company as it inches forward to alleviate the effects of the oil spill. The mission of Exxon Mobil is to keep up with the growing demand for energy all over the world by providing and facilitating the abundance of oil and gas resources under the dimensions of financial stability, the adaptation of technological innovations, and efficiency and superiority in presenting the goods and services of the company. (Exxon Mobil, 2008a) To strengthen the position of the company in terms of social responsibility, it upholds the highest standards of ethical conduct by implementing principles that meet the conditions of ethics and morality. The guiding principles that Exxon Mobil observes are defined for both the internal and external members of the organization. Exxon Mobil acknowledges the role of stakeholders in the success of the company by working on improving products and services to ensure the return of investment and financial stability. For the company’s consumers, Exxon Mobil undertakes the responsibility of satisfying them, despite diversity or varied preferences. Aside from the company’s consumers, Exxon Mobil also follows guiding principles in handling employees. The company strives to sustain a highly competitive pool of staff, personnel, or employees by hiring, recruiting, and looking after the needs and demands of able individuals who meets the mission, goals, and objectives of the company. To enhance corporate social responsibility, Exxon Mobil observes practices that are geared towards satisfying the expectations of communities. Exxon Mobil assures society of their will to become a valuable asset of the community by adhering to and respecting laws, whether domestically or internationally, and consider the multicultural diversity at all times. (Exxon Mobil, 2008b) Due to the Exxon Valdez oil spill, the company has worked towards transforming the mission statement of Exxon Mobil by incorporating other goals or objectives to address the problems brought about by the incident. Apparently, the company established the Exxon Valdez Oil Spill Trustee Council following the incident that damaged the ecological environment in Alaska. The mission statement of the council constitutes the determination of the company to re-establish the natural environmental conditions of the immediate location of the situation under the dimensions of the desirable quality of life based on set standards of living. (â€Å"Restoring the Resources,† 2004) Exxon Mobil’s focus included the mission of addressing environmental concerns that will lead to the restoration of the ecosystem in Alaska. The company exerts time, effort, and resources in conducting research, establishing plans for restoration, monitoring the progress or changes in the environment, providing reimbursements as payments for damages and other costs caused by the oil spill, working on the establishment of means of protecting the habitat or ecosystem in the area, and such. (NOAA, 2008) Overall, the oil spill in 1989 caused Exxon Mobil to become aware of the effects and influences of the incident to the environment. Since then, it has included in its mission not only the restoration of natural environmental conditions in Alaska, but the continued protection of environmental systems not only in the area but all over the world as well. References â€Å"Crude Awakening. † (2008). Retrieved November 23, 2008, from The International Bird Rescue Research Center. Website: http://www. ibrrc. org/Exxon_Valdez_spill_1989. html Exxon Mobil. (2008a). What We Do. Retrieved November 23, 2008, from Exxon Mobil. Website: http://www. exxonmobil. com/Corporate/about_what. aspx Exxon Mobil. (2008b). Guiding Principles. Retrieved November 23, 2008, from Exxon Mobile. Website: http://www. exxonmobil. com/corporate/about_operations_sbc_principles. aspx NOAA. (2008). About NOAA Fisheries’ EVOS Office. Retrieved November 23, 2008, from The National Oceanic and Atmospheric Administration’s National Marine Fisheries Service. Website: http://www. fakr. noaa. gov/oil/ â€Å"Restoring the Resources. † (2004). Retrieved November 23, 2008, from Exxon Valdez Oil Spill Trustee Council. Website: http://www. evostc. state. ak. us/Universal/Documents/Publications/AnnualStatus/2004AnnualReport. pdf

Tuesday, January 21, 2020

The Outsiders Essay -- Essays Papers

The Outsiders The title of the story is The Outsiders. S.E. Hinton wrote it. Dell Publishing published the book. The main characters include Ponyboy, Darry, Soadapop, Dally Winston, Johnny, Cherry, Two-Bit, and Marcia. This story is about a guy names Ponyboy who is a â€Å"greaser†, a member of a group of lower-class youths who wear their hair long and greasy, wear jeans and ripped-up T-shirt, and are at odds with the rich-kid bullies known as the â€Å"Socs†, shorter name for socials. One day, as Ponyboy is walking home from a movie, he is jumper and beaten by a gang of Socs. At the last minute, his gang of greasers (including his brothers Darry and Sodapop, who raised Ponyboy now that their parents are dead,) the hardened hood Dally Winston, innocent Johnny, and wise-cracking Two-Bit see what’s going on and save him. The next night, Ponyboy and Johnny go to a movie with Dally. There they sit behind some attractive Socs girls and dally hits on the obnoxiously. After Johnny tells him to stop, Johnny and Ponyboy sit with the girls, Cherry and Marcia, and Ponyboy and cherry discover to their mutual surprise that they have a great deal in common. Two-bit appears, and the three gr easers walk the Socs girls back to Two-Bit’s house so that he can drive them home. On the way, the run into Bob and randy, the girls’ drunken boyfriends, and the girls agree to leave with them in order to prevent a fight between the Socs and the greasers. Ponyboy is very late getting him, and his bro...

Monday, January 13, 2020

Air Asia Essay

1.Threat of new Entrants The extent of barriers to entry depends on the strength of- i)Customer has little brand loyalty. If consumers of Airasia do not have brand loyalty, then the strength of the threat of new entrants is very high. The high numbers of competitors in the industry also decrease Airasia’s customer loyalty. Most of the travelers prefer low cost. New competitors which want to come in the industry have to spend little to compete with Airasia. ii)High capital requirement. The industry of airline needs large volume of start-up capital. The cost of setting up of offices, buying or leasing aircraft, hiring pilots and other staffs like air stewardess and etc incur a high start-up cost. Thus, the threat is low for Airasia. iii)Different product offered. Airasia offers different product compared to other competitors in Asia like Bangkok Airways, Tiger Airways, and Air Philippines. Other than the passenger sales ticket, Airasia also include holiday packages which is affordable around Asia. Airasia has good connection with hotels and tourism companies around Asia, which it is hard for new competitors to compete. iv)Low switching costs. Customers do not need to spend more on switching to another airline. The price would not be very significant in differences, which it depends on the availability of competitor’s services and suitability of the flight time that prompts them to switch. v)Moderate access to distribution channel. Airasia is the first airline company to enable customer book and purchase air tickets online in Malaysia. This makes its website www.airasia.com very famous among frequent travelers. Although new competitors can create a website for their company, it is quite difficult to compete with Airasia’s website. The website is known of its simplicity and user friendly. Thus, new competitors are difficult to make known their websites to travelers. vi)Strict government regulations. In obtaining license and permit to operate  an airline company is quite restricted. This is because in Malaysia, the airline industry is very competitive already and that the government also wants to protect the interest of its national airline, MAS which is operating on loses a few years back. 2.Rivalry among existing firms The strength of this factor depends on: i)High numbers of rivals. There are approximately 59 low fares and no frills airlines compete with Airasia. Among of them are Tiger Airways, JAL Express, JetStar Airways, Air Arabia and etc. Some of the airline does not compete directly with Airasia, but it competes indirectly in routes that Airasia does not fly. Thus, the higher the number of competitors, the more fierce the competition. ii)High fixed cost. The airline industry incur high fixed cost which consists of finance cost, hire purchase, and staff costs. The airline companies have to gain more market share to cover the fixed costs. In doing that, constant price reduction is done by them to compete with others. Thus, the rivalry is strong. iii)Customers easily switch. The nature of airline industry is that customer’s priority is to look at price and flight schedule that suits them the best when buying air tickets. The main purpose of using the airline services is to get to the destination intended. Customers can switch to other airline easily which makes the industry so competitive. iv)High exit cost. It is hard for an airline company to exit the industry. It is because the cost is high in paying the loans, staff retrenchment and flight cancellation refunds. Even making losses, the companies have to get running to cope with fixed costs. This makes the industry very competitive. v)Products are similar. As mentioned earlier, the main purpose of using airline services is to reach the destination. Every airline provides similar  services to customers. Though Airasia provides other added services like hotel booking, and tour packages, it is subject to the customer’s choice. An industry with similar products offered is highly competitive. 3.Threat of Substitute product i)Easy to switch. There are about 59 low cost airlines competing in the industry. The airlines serve over one hundred cities and islands across the sub-continental regions of South Asia, Southeast Asia and Northeast Asia. Although some of the budget carriers only fly domestic routes within the country of origin, while only a few operates international routes connecting nearby countries, customers will always look for alternatives. ii)Performance of substitutes. Performance of other airlines are quite similar with Airasia’s given there is no obvious product differentiation. Performance of airlines normally consists of the accuracy of take off time, aircraft performance and staff services. So far, Airasia had constantly reviewed its performance and improve its services. iii)Relative price. The price of substitutes are about the same with Airasia’s. Some of the airlines offers cheaper price to achieve profitable passenger loads. The price offered depends on the time gap between the booking date and flight date. The longer the date, the cheaper will be the price. If the tickets are purchased last minutes, the price will be about the same with premium airlines like MAS and Singapore Airlines. Thus, in this situation customers would switch to the premium airlines. 4.Bargaining power of buyers i)No significant product differentiation. The only difference Airasia’s product with others airlines is the holiday packages offered. Most of the low cost airlines concentrate on providing flight services only to customers. There is some offers hotel booking at the city that the airline flies to. However, Airasia makes the difference by providing holiday packages like example 3 days and 2 nights to Bali at RM800 per pax includes  flight ticket, accommodation and travel guides. For customers who do not want to follow the travel agencies and enjoys freedom, they will look for Airasia’s packages, but the customer’s portion of this type is small. Thus the bargaining power of buyers is strong as the main thing they look for is to fly to destinations. ii)Low switching costs. Cost of switching to other airlines is low, so bargaining power of buyers is strong. Airasia is not the only airlines operates in Asia. Other than that the price offered by other competitors are not much different. The customer choice is subject to their convenience and flight schedule that fit them best. iii)Portion of buyers expenditure on airline is moderate. This factor depends on portions of income an individual earns. The higher the portion, the more the customer look for cheaper price and thus, the stronger the bargaining power of buyers. Eg when a student without earning any income, will look for the cheapest price available as the portion of his expenditure will be very substantial. iv)Customers have access to market information. The IT world had emerged since 20th century. Many big and success companies in the world uses IT and e-commerce to operate. Without IT, the business had boundaries and international business will be prohibited. With worldwide web, information can be gathered on one click. Customer’s access to the current airline market information is easy and available all the time. The airline companies have less room for negotiation. Thus, customers had strong bargaining power. v)Buyer’s power concentration in many hands. Most of the airline company customers are individual travelers, only some travel in groups. So the air tickets are purchased individually. The airline companies are not relying on a few groups of customers only. Thus, the bargaining power of buyer is strong. 5. Bargaining Power of Suppliers i) Supplier concentration in a few hands. The supplier of airline companies is the fuel supplier, foods supplier, merchandise supplier and aircraft supplier. There are few suppliers in the market, eg the aircraft supplier, the companies are either Airbus or Boeing. In this case the power of supplier is strong. Other supplier like foods supplier and fuel supplier, the term of the supply must be based on the market condition. The supplier cannot increase too much of its price or risk losing long term business with the aircraft companies. ii)High switching costs. Most of Airasia’s aircraft are Airbus models. Previously the company used Boeing models, which they lease it and the company had since phased out most of the models and replace with Airbus. If Airasia is to switch to Boeing again, then the cost will be high, because training cost for employees to suit the aircraft features must be provided. Other than that, the technology used by Airbus is the most advanced, thus Airasia must rely to the Airbus engineers to do maintenance of the aircrafts and seek advices. Thus, bargaining power of suppliers is strong. iii)Relative lack of importance of buyers to supplier. Airbus is a UK based aviation company. Its customers come from around the world. So far 9,113 aircraft had been ordered, out of which 5,408 aircraft had been delivered by the company. Airasia had ordered 200 aircraft from Airbus and so far only 54 aircraft had been delivered. The percentage of less than 1%, 0.99% proves that Airasia is not Airbus’s important buyer. Thus, Airbus had strong power over Airasia.

Sunday, January 5, 2020

The Components Of Lifecycle Of Network Security - 812 Words

The present era can be referred as a digital era as well, which has created various opportunities for organizations to conduct business and deliver different services over the internet. The cyber security is basically a practice that helps organizations minimize risks, helps the security operations in an effective manner, provide authentication and access control for resources, guarantee availability of resources and also helps to achieve regularity for enhancing own business network. The basic components of the security include; confidentiality (maintaining privacy of the data), integrity (detecting the data is not tampered), authentication (establishing proof of identity, non-repudiation (ability to prove that the sender actually sent the data), availability (computer assets are available to authorized parties when needed), and access control (access to information resources are regulated). The problems of network security include: †¢ increase in network attacks †¢ increased sophistication of attacks †¢ lack of awareness †¢ lack of security policies †¢ lack of proper laws. The components of lifecycle of network security are plan, design, implement, operate, and optimize. Information / Internet threats: Internet threats are malicious software programs designed to target users when they are online. Threat is a potential occurrence that might compromise the assets. An asset is a resource of value. The threat is linked to vulnerability (vulnerability is a weakness in theShow MoreRelatedImpact Of Cloud On The Organization s Network Infrastructure1485 Words   |  6 PagesIntroduction: The central theme of this essay focuses on the impact of cloud on the organization’s network infrastructure. While going through the impact we will also analyze how to optimize network performance for cloud and we will also discuss about how the cloud impact the lifecycle orchestration and the organization. The key aspect o the cloud is discussed in detail with suitable examples. Background: The cloud computing is noting but storing the data and information n the internet, insteadRead MoreA Short Note On Network Enhancement Requirements For A Company s Network1382 Words   |  6 Pagescurrent security countermeasures are insufficient due to increasing number of physical connections which are unauthorized to the company s network. so, as the previous network designers we have to implement more security countermeasures which are helpful for the present situation of the Intertrode company. 1.1. Network Enhancement Requirements: As part of this, we have to implement the following security measures to help remedy this issues: 1). Implement IP security to excludeRead MoreSecurity Assessment - Aircraft Solutions Essay examples1349 Words   |  6 PagesCourse Project: Security Assessment and Recommendations – Phase I amp; II Aircraft Solutions Table of Contents Executive Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..1 Company Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..1 Hardware Vulnerability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...2 Policy Vulnerability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..3 Hardware Solution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 Policy Solution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...5 Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 Executive Summary The purpose of this paper is to explore and assessRead MoreRisk Management : An Essential Part On Computer Security Planning1455 Words   |  6 Pagesall the treats, no matter how secure the system is. Planning for security isn’t possible. However, performing a full risk assessment of developing security protocols and enforcing control to avoid network devastation. Risk management plays an essential part on computer security planning. The risk analysis gives an idea to make an educated assumption regarding network security. The process of risk analysis identifies existing security controls, calculates current vulnerabilities, and evaluates theRead MoreMock Test: Information Technology Infrastructure Library 1733 Words   |  7 Pages measuring existing services and the potential future requirements monitoring service failures, reduction of service risks 2. Good example of a service can be described as? Unix Server Payroll Processing Firewall Wide Area Network 3. What is the role of the Emergency Change Advisory Board (ECAB)? To assist the Change Manager in ensuring that no urgent Changes are made during particularly volatile business periods To assist the Change Manager in evaluating EmergencyRead MoreDefining Microsoft Windows Vista943 Words   |  4 PagesMicrosoft. There are many factors that contributed to the re-inventing of Longhorn to Microsoft Vista; chief among them was the rapid rise of security as critical unmet needs across all target markets for this operating system. Microsofts chairman and CEO Bill Gates announced the Trustworthy Computing Initiative in early 2002 which was the direct result of the security shortcomings in Windows XP Professional, XP Home, and previous generation client and server operating systems. The Longhorn developmentRead MoreHci / 520 Data Management1058 Words   |  5 Pagessystem is an organized structure that has inputs and outputs that carry out a specific activity. A system is a group of components that makes up a complex functioning unit. When an element changes, the system will stop functioning right. Once the system has been defined by jurisdiction, budget, coverage requirements and user needs, the next step is to design the system using components and systems that are obtainable and have the desired features that the customer and the design engineer have agreedRead MorePhysical Security Measure Is Locks And Keys Essay1385 Words   |  6 Pagescommon physical security measure is Locks and Keys, which is a part of physical access control. This physical security measure can be used in the YGT since its not expensive, and provides a decent security measure. There are two types of locks: Mechanical, and Electro-mechanical. Mechanical lock is the standard lock most o f us have on our doors that relies on the key that turns the lock in order to lock or unlock. Mechanical lock can also have rotating dial to further increase the security of the lockRead MoreNetwork System Analysis Risk Management670 Words   |  3 PagesNetwork System Analysis Risk Management Introduction The multifaceted nature of risk as it relates to a healthcare provider is evident on how comprehensive the access controls, compliance, security and staff level-based access privileges are in the Natividad Medical Center. The complexity of these factors and the level of traceability and audit controls are accentuated by the Health Insurance and Accountability Act (HIPAA) and its many requirements and stipulations for reporting (Dennis, 2005)Read MoreCloud Computing : A Solution For Resources Management1341 Words   |  6 Pagesupgrades, security and performance. However, cloud’s safety and standardization have been a challenge when different types of clouds need to be connected. Resource management issues as Quality of service (QoS) and the increasing of complexity and functionality failures are a constant in cloud computing environments, and should be considered by customer when looking for cloud solutions to adapt their organization’s requirements. This paper will ex plain the structure, and different components of hybrid