Tuesday, April 7, 2020

Genghis Khan and the Making of the Modern World Essays -

Genghis Khan and the Making of the Modern World By: Jack Weatherford Brandon Gibson Stacie Brewer History 101 Western Civilization to 1689 Fall 2017 1st Term Jack Weatherford writes in a very appealing style, which had a large impact in the speed that I could finish the book. This book was written so well that it was on the New York Best Time Seller list for several weeks. The positives of Weatherford's writing are that he combines other historian's data with some of his own and it grabs and holds the attention of readers. The author uses examples and stories extraordinarily well to clarify his points so that the reader can relate to the material. The entire book is written so that it is very easy to comprehend. This allows someone from just about any education level to understand easily and can follow along. Taking that into account , I would suggest this book to someone who would not have the least bit of interest in history. It is very clear that Weatherford is a creative writer, blending the history of Genghis Khan with incredible enthusiasm , in turn paints a clear picture of the past . The very first page after the table of contents, is an ancestral table showing Genghis Khan, his family, and the lineage beyond him. The rest of the bo ok is organized in chronological order starting with an introduction about Weatherford's gathering of information and travels , followed by three text sections broken further down into chapters about the life of Genghis Khan , and ending with an epilogue. The structure and layout of the book is another key reason why I feel this book is great for any education level because it is presented, in my opinion, in the easiest way for a reader to understand and retain. Jack Weatherford's main theme for the book is how the Mongols would forever change the world through many different methods. Starting with the medieval times all the way till current day. Weatherford would go on to support his main theme by making connections between the Mongols, the Renaissance, an d the series of events that resulted in these combing . One of Weatherford 's main supporting ideas, was the importation of the printing press, blast furnace, compass, gunpowder, as well as Persian and Chinese painting s from the Mongol Empire . These items were all catalysts in providing the chang e into the modern world . He would make his case very powerfully and provides massive amounts of evidence . He displays how the Mongols also have an indirect influence in Europe. He also explains how the Mongols were very innovative during the renaissance while the European view was of a very destructive and vulgar culture. Weatherford portray ed all this by laying out a very thorough timeline about Genghis Kahn and his rise to power as well as how the Mongols viewed warfare, which honestly , was not the most honorable method of war, but it is what allowed for the Mongols to conquer and achieve victory. One very interesting point that Weatherford used to support his main idea about Genghis Kahn and his conquering of the world was that he was not born a military genius. Many people believe Genghis Kahn was born a military m astermind, however, everything h e would learn about war would be through mistakes. Trial and error was his learning process for successful raids and war. Outside of the main theme, w hat I like about this book is how Weatherford describes the multitude of raids, wars, and ambushes that the Mongols conducted and puts it in perspective. He provides a thorough comparison between t he Mongols and their opponents who would often t orture and maim prisoners, typically for entertainme nt . I also found , Weatherford 's explanation and reasoning for each invasion intriguing. He would also provide a political viewpoint behind each event from the Mongol perspective . Weatherford would support these views by explaining very well how each raid was either a brutal massacre or quite easy and peaceful. The word choices in his descriptions are what make it easy to follow and understand. What is

Monday, March 9, 2020

Willy Russell Educating Rita Essays

Willy Russell Educating Rita Essays Willy Russell Educating Rita Essay Willy Russell Educating Rita Essay Essay Topic: Literature The play is about a working class hairdresser from Liverpool, that wants to be educated, hence the title Educating Rita. Her tutor, Frank is an English lecturer who is teaching in the Open University for the money. The play is set in Franks office. Frank and Rita in the beginning have a teacher pupil relationship that changes to friendship, and subsequently turns back to teacher pupil and towards the end back to friendship. The play is staged with only two main parts and on one set. This allows the audience to become closer to the two characters easier because they are the only characters shown. This means that the audience had to imagine the other characters. The film however has many sets and a more characters, it also gives more of an insight to the working class and middle class home life. I preferred the play because it had a superior dialogue and didnt stray to far from the main point of the play. Our first impressions of Frank are that he is an alcoholic, who hides his drink. Jubilantly he moves to the Dickens section and pulls out a pile of books to reveal a bottle of whisky. He takes the bottle from the shelf and goes to the small table by the door and pours himself a large slug into the mug is his hand. Frank has taken on the Open University work to pay for his drink. It is also obvious from the out set that Frank is middle class, this is shown by his profession, a university lecturer, his speech, standard English and his food, lamb and ratatouille. He also shows his lack of will power when he breaks his promise not to smoke. Frank is very cynical about the education system and has a dry humour. He is almost always apathetic about life; encased in his own environment, his office and his senses become dulled. This is shown when Rita first comes to Franks office and notices the religious painting on the wall and describes it as erotic to which Frank replies, Actually I dont think Ive looked at it for about ten years, He doesnt take notice of his surroundings. In contrast, Rita is a working class hairdresser from Liverpool who decides to take on an English Open University Course to discover herself and to improve her way of life. In the first scene Rita bursts into Franks office and this has a dramatic effect. Rita has a good sense of humour, which keeps the play more interesting at the beginning. She is also assertive, however she sometimes puts herself down because of her lack of formal education. Ritas language is full of slang and swearing. So y switch it off an say, thats fuckin rubbish. Rita believes that the course she is doing will be the key to changing her life. The relationship between Frank and Rita starts at a teacher pupil basis, Rita begins the relationship with high expectations, she assumes that Frank the lecturer will have all the answers and this comes from the fact that she isnt educated, she doesnt come from an educated background. However Rita tests Franks intellectual talents to the full. She always wants an explanation and justification for everything he says. Frank and Rita get on so well because they are different. To Frank Rita is like a breath of fresh air, very natural and down to earth, compared to Frank who is a disillusioned, apathetic, battered university lecturer. But they are both unhappy about the situation that they are in. Rita has a failing marriage with a husband that wants her to have a baby, and Frank his unhappy with everything in his life. However Ritas freshness and appetite for learning and knowledge inspires Frank, he also finds her attractive, intelligent and he enjoys her company. So he invites Rita to his dinner party, he also feels that she will enjoy meeting new people; he never thinks how Rita would really feel being surrounded by middle class educated people. Rita on the other hand is partly excited about it and also apprehensive. In the end Rita does not go to the party because she thinks she brought the wrong wine, or so she said, and would not be able to converse with Franks middle class friends at their level. But I dont wanna be charming and delightful: funny, whats funny? I dont wanna be funny, I wanna talk seriously with the rest of you, I dont wanna spend the night taking the piss, comin on with the funnies because thats the only way I can get into the conversation. I dont want to come to your house just to play the court jester. She thinks that she is a half-caste stuck between working and middle class, not quite fitting into either. For Rita Act One ends on a very negative note, her marriage is finished. This came about because Ritas husband Denny wanted a baby and Rita did not, also Denny wanted Rita to stop going to the O. U course. Denny gives an ultimatum do as he says or leave. Frank and Rita both know that Rita will have to change to be able to write essays that will pass an examination. This will affect the relationship because Frank doesnt want to change Rita but Rita wants Frank to help change her, so it is inevitable that there would be a clash of wills. When Rita comes back from the O. U summer school she is more mature. Frank however is surprised that Rita has changed this much. Rita has gained a larger vocabulary at the summer school and begins to speak more objectively which is what Frank described the language of education to be. Well any analogy will break down eventually. The relationship has developed from the original teacher pupil status to a firm friendship that, as Frank knows, will inevitably have to end. Trishs is Ritas flat mate and has a large influence on Rita; this is shown when Trish tells Rita to talk in Standard English, which she does (to Franks annoyance). Trishs influence also causes Rita to gain confidence, so Rita begins to talk to the proper students. Rita, Yeh, I got here early today. I started talking to some students down on the lawn. Frank, You were talking to students down there? During Act 2 it is shown that, as Ritas life becomes better Franks is becoming worse. He enters scene 3 drunk, after students had complained about him being drunk in a lecture. Rita on the other hand is becoming more educated. Towards the end of the play Rita says that she doesnt need Frank, that she didnt need to hold his hand anymore. This shows that Rita is becoming more independent from Frank, this distanced the pair. Frank asks if Rita wants to stop coming to the tutorials because even without him she would sail through the exam. The audience feels sorry for Frank all through this scene. The end of scene 6 is a low point in the relationship because Rita and Frank arent in direct contact with each other and so the relationship is deteriorating. Frank at the end of the play is being sent to Australia for his crimes and he is still apathetic about the whole affair. Rita however is slightly more depressed with the attempted suicide of her flatmate and Frank leaving. Rita changing her name back to Susan is significant because it shows how she has grown up over the course of the play and that she now knows that changing her name was a silly thing to do. Frank is going to Australia for repeated drinking on campus and his punishment is reduced from the sack to a sabbatical to Australia. Rita plans to either go to France with Tyson, go to her mothers for Christmas or have a baby. These choices reveal that she is still indecisive. I think Russells message is that however well together people seem you cant really tell whats going on inside. For example, you could be a well paid businessman or woman who has a spouse, 2 kids, car and a roof over your heads a perfect life, and still want to kill yourself. The play ends on a happy note with a sad undertone. With the friendship between Frank and Rita back to normal, but with Franks leaving and Trishs suicide attempt ending it as a mix of the two. Russell uses humour to soften the blow that could be caused by tackling class, political and social issues, and the different ways the different classes deal with these issues. The first part of the play is funnier because the differences between Frank and Rita are more prominent. The play ends on a funny note with Rita giving Frank a haircut and cutting him.

Friday, February 21, 2020

Major Incident Management Essay Example | Topics and Well Written Essays - 500 words

Major Incident Management - Essay Example Those who are categorized as serious have a deathly consequence in their circumstances; those categorized as major may suffer from a major permanent loss of function; next comes those who may suffer with a permanent reduction in bodily functions; those categorized as minor require increased level of care; and finally those classified as minimum are patients with no injury or increased level of care (New South Wales Government, 2005). Based on corporate consequence, impact on staff, visitors, services, finances, and the environment shall also be assessed by the first responder. The likelihood of the incident happening again shall also be assessed by the first responder. He shall classify the likelihood from the rating ‘frequent’ (the highest possible rating) to ‘rare’ (the lowest possible rating) (New South Wales Government, 2005). The risk or the magnitude of the incident also needs to be assessed by the first responder. The incident is rated at 1 if the ris k is extreme; 2 if the risk is high; 3, if there is medium risk; and 4 if the risk is low (New South Wales Government, 2005). The initial triage of the first responder is to assess the patients with life threatening conditions. The first responder has to deliver immediate treatment to these patients first by delivering CPR after airway clearance. For those classified as urgent or are unable to walk with RRs at 10 bpm-29 bpm and CRT at 2 seconds or less, urgent treatment has to be delivered by the crew. For those with minor injuries, but are walking, their treatment may be delayed; and for those who are dead, no treatment can be delivered. The crew then has to render appropriate emergency care and then transport the patients to the nearest hospital the soonest time possible, starting with those needing immediate care. In case of possible contagion, the emergency ambulance crew also has the duty of decontaminating the patients and themselves

Wednesday, February 5, 2020

Learning disability is a growing problem in the UK Essay

Learning disability is a growing problem in the UK - Essay Example Quine (2003) studied a sample of 200 five to 18-year-olds with learning disabilities and identified a range of behaviour difficulties such as: attention seeking (29%), over activity (21%), temper tantrums (25%), aggressiveness (21%), screaming (22%), wandering off (18%), destructiveness (14%) and self-injurious behaviour (12%). Kiernan and Kiernan (2000) found that in a study of 68 schools for children with severe learning disabilities, 8% were thought to have extremely difficult or very difficult behaviour and a further 14% who were thought to have behavioural difficulties of a lesser nature. They calculated that somewhere in the region of 2000 children in England and Wales alone will present with severe difficulties, and that a further 3400 will present with difficulties of a lesser nature. As introduced above, the determining, the prevalence of behaviour analysis is difficult, in part because of inadequate operationalization of the term. The preferred term, behaviour analysis, is regarded by a number of commentators as problematic, because of its tendency to be used over-inclusively for a range of other conditions (Slevin 2000, Gates 2002). Consequently, in the current study, to achieve conceptual clarity the term was operational zed to refer exclusively to children with learning disabilities who predominantly demonstrated behavioural difficulties. ... Nihira (2000) has divided behavioural difficulties into six subcategories: violent and antisocial behaviour, rebellious behaviour, untrustworthy behaviour, destructive behaviour towards property or self, stereotyped and hyperactive behaviour and inappropriate body exposure. These six subcategories have been developed into an eight category scale: The British Association on Learning Disabilities, Adaptive Behaviour Scale-Residential and Community 2nd Edition (UKLD ABS: RC: 2) (Nihira et al. 2000). The manifestation of any behaviour that fell into any of these eight subcategories, at a level that caused parental distress, was used in this study as evidence of behaviour difficulties. Learning Disabilities and Developmental Disabilities. A relatively unexplored conceptual issue is the relationship between learning disabilities and developmental disabilities. This relationship is important to the topic of this article because the emphasis on functionality in the recent UKLD definition (Luckasson et al., 2001) is conceptually similar to that found in the definition of developmental disabilities (Beirne-Smith et al., 2000). Furthermore, Learning Disabilities have always been considered the most common type of developmental disability. As defined in the Developmental Disabilities Assistance and Bill of Rights Act of 2000 (P.L. 98-527), a developmental disability refers to a severe, chronic condition that causes substantial functional limitations in three or more major life activities. This primary component of the definition is very similar to the UKLD definition's specification of limitations in two or more applicable adaptive skill areas. For a comparison among the

Tuesday, January 28, 2020

Using Computer Forensics to Investigate Employee Data Theft

Using Computer Forensics to Investigate Employee Data Theft Introduction Over 25 percent of employees steal proprietary data when departing a company or organization.[1] To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.   Ã‚   When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft of IP analysis in order to preserve electronic data and uncover important evidence. Using specialized software, the expert can reveal digital footprints such as: USB activity Files recently opened Cloud storage usage Files sent to personal email accounts Recently printed documents The results of the analysis can provide the foundation for legal action such as a temporary restraining order, permanent injunction, subpoena of personal devices, or other litigation to prevent the misappropriation of company data. When Employee Data Theft Is Suspected Employee data theft occurs most frequently just prior to, or immediately after, an individuals termination or resignation from an organization. Telltale signs that an investigation is warranted include unusual activity by the employee, such as: Plugging a personal USB thumb drive or hard drive into a computer Coming into work at odd hours or establishing remote desktop connections during off-hours Transferring large amounts of data on the company network Visiting file sharing sites like Dropbox or Google Drive Sending emails with attachments to personal accounts If there are concerns that a departing employee has stolen proprietary data, then it is important to take steps not to delete important electronic evidence located on his or her computer. If the computer is powered on, then leave it on, because important evidence may be stored on the computers random access memory and could be deleted if the computer is powered off. Also, ensure the computer cannot be accessed remotely by disconnecting it from the network. If the computer is already turned off, then place it in secure storage. Furthermore, confirm the employees login credentials are disabled or have been changed, but do not let the IT staff reinstall the operating system or reassign the computer to another employee. Such actions could destroy or overwrite any evidence of wrongdoing. Finally, resist the temptation to take a peek at what is stored on the computer by turning it on and accessing files because this could alter the data, thereby making the investigation more complex. If the suspected employee had a company-issued cell phone, then place it in secure storage as well. Smartphones hold an abundance of useful information such as text messages, emails, call logs, internet activity and more. The simple act of resetting the phone, however, can permanently destroy this data. IP Theft Investigations Preserving and Analyzing Electronic Evidence The first step in a theft of IP investigation is to forensically preserve the data on the employees device(s). The computer forensics expert will create chain of custody documentation, photograph the hardware, and verify the integrity of the preserved data, among other things. These steps ensure that the electronic evidence will be admissible in court. Once the data is preserved, the next step in the investigation is to perform an analysis to identify software and artifacts that may be indicative of IP theft. These areas on a typical Windows installation include: USB activity Files recently opened or deleted Cloud storage Personal email accounts Internet history report Printed documents USB Activity Analysis Many of todays USB devices, such as thumb drives and external hard drives, have enough storage capacity to save an entire copy of a users hard drive. As such, they are one of the most common tools used to steal data. The good news is that using a USB device leaves behind a trail of digital evidence that can prove invaluable to an investigation. Analyzing a users USB activity can reveal several key facts regarding what was connected to the computer and when. In most cases, forensic experts can determine the serial number and/or brand of the USB device, as well as the first and last time the device was connected to the computer. In some instances, they may also be able to verify each time a specific USB device was connected. Oftentimes, the analysis will reveal that an external USB hard drive or flash drive was connected for the first time during an employees last week of employment. While most analyses reveal a new USB connection, it is also possible that a device used throughout the duration of the suspects employment was never returned. A device such as this would likely contain numerous documents and files that were related to the employees day-to-day activities and could contain value to a competitor. If it is a requirement that employees return company-owned USB drives at the end of their employment, forensic experts have the ability to verify whether or not that policy was upheld. Files Recently Opened While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. These artifacts indicate what was opened, when it was opened and where it was opened from. A classic red flag is if the employee was opening files during the last week of employment that were not related to the work being performing during that time. Another consideration is the organizations data access policy. If data access restrictions are not in place, then the employee may be able to access company files unrelated to current work that are stored on the network. The existence of these artifacts when combined with a USB activity timeline can indicate a high probability that data was copied off the system. Lastly, the artifacts can also contain specific information about where the file existed. If a file was opened from a USB drive, the artifact will indicate this, providing factual evidence that the suspect is in possession of a USB drive that contains specific files. For example, combining a USB analysis and files recently opened analysis could show that on October 7, 2016, at 7:22:08 a.m., a non-company-issued SanDisk thumb drive with serial number 851450 was plugged into the computer for the first time and a file titled Client Contact List.xlsx was opened. Cloud Storage If the analysis shows that certain files were accessed but no USB activity was detected, the next step in the investigation is to identify evidence that a cloud storage provider such as Dropbox, Google Drive or Microsoft OneDrive was accessed. The purpose of these applications is to share and sync data across multiple computers. For example, Dropbox may have been surreptitiously installed on the employees work computer as well as his or her home computer. Consequently, the simple act of syncing a company file to Dropbox will instantaneously also make that file available on the employees home computer. The good news is that cloud storage applications often have corresponding log files and databases that record what files the user accesses and what activities are performed. These logs can signify files have been uploaded to the cloud in the past even if they have already been deleted from the shared folder. Some of these applications even save deleted data in a separate hidden folder on the computer itself that users typically are not aware of. As a result, a theft of IP analysis may show that Dropbox was installed on the users work computer and that early in the morning on October 7, 2016, fifty files were deleted and the hidden folder reveals these were company files. Personal Email Accounts Some individuals may use their company email to send attachments to their personal email account such as Yahoo or Gmail. In these cases, forensic experts are able to perform a preservation of the employees work email to identify and document the evidence of misconduct. Internet History Report An Internet history report can be generated that shows, inter alia, recent Internet searches, web sites and pages visited, cookies from websites, and Internet downloads that occurred. Such information is helpful in establishing what an individual thought was important or even their state of mind. For example, analysts have discovered that individuals have searched on how to delete data or copy data surreptitiously and that they reviewed websites that were in essence how to manuals to perform certain deleterious acts. Paper Documents Finally, individuals who are a little less aware of more modern techniques to copy data will simply print the documents they wish to take out the door. In these cases, forensic experts are able determine the last known print date of Microsoft Office documents. Deliverables and Project Timeframe The turnaround time for a theft of IP analysis performed by an analyst is typically one week. Deliverables provided will be easy to understand in the form of spreadsheets, html reports, and written reports containing the findings of the analysis. A forensic expert should also spend time with the client either over the phone or in person to discuss the reports in detail so that they know exactly what a report contains and the assumptions and opinions of the forensic expert. If necessary, an expert will also provide depositions or expert witness testimony regarding the authenticity of the evidence and their findings. Authors Timothy M. Opsitnick, President, JURINNOV, LLC, Joseph M. Anguilano, Director of Operations, and Trevor B. Tucker, Forensic Analyst. JURINNOV, LLC, a wholly-owned subsidiary of Technology Concepts Design, Inc. (TCDI), is a technology company that provides cybersecurity and eDiscovery services. Cybersecurity consulting includes investigating accidental or malicious data breaches as well as providing security strategies and assessments to prevent such occurrences. eDiscovery consulting includes computer forensic investigations and ASP ESI hosting. JurInnov news and information is available at www.jurinnov.com. For over 25 years, TCDI has been providing technology solutions through partnerships with large corporations and law firms. These solutions include advanced litigation support software and services for electronic discovery, hosted review and production, and large-scale litigation case file management. TCDI news and information is available at www.tcdi.com. [1] Biscom, Employee Departure Creates Gaping Security Hole Says New Data, December 23, 2015; https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/.

Monday, January 20, 2020

Open Systems Interconnection (OSI) Model Essay -- essays research pape

Open Systems Interconnection (OSI) Model This memorandum will attempt to explain the Open Systems Interconnection Model, known more simply as the OSI Model. The OSI Model has seven levels, and these levels will be discussed in detail. Particular mention will be made to which level TCP/IP functions with the OSI Model. The seven levels of the OSI Model are as follows: 7) Application: Provides different services to the applications. 6) Presentation: Converts the information. 5) Session: Handles problems which are not communication issues. 4) Transport: Provides end to end communication control. 3) Network: Routes the information in the network. 2) Data Link: Provides error control between adjacent nodes. 1) Physical: Connects the entity to the transmission media. In simple terms, the OSI model defines a networking framework for implementing protocols. Is defines seven levels to accomplish this. Control is passed from one level to the next, starting at the Application level (Level Seven) and working its way through the levels until it reaches and completes Level One, the Physical level. Once this cycle has been completed, control moves to the next station on the network and back up the hierarchy. Since the process begins at the seventh level, the Application level, it will be detailed first. As its name implies, this Application level supports applications, but it also supports other end-user processes. User authentication and privacy on the network is consid...

Saturday, January 11, 2020

Bajaj auto Essay

The project report entitled â€Å"Strategic Management Cycle of Baja] Auto Ltd † . has been submitted to Gujarat Technological University, Ahmedabad in partial tultlllment tor the award of degree of Master of Business Administration. I the undersigned hereby eclare that this report has been completed by me under the guidance of Prof. Jignasha mam† (Faculty Member, Shayona Institute of Business Management, Ahmedabad) The report is entirely the result of my own efforts and has not been submitted either in part or whole to any other institute or university for any degree. Date: Place: Ahmedabad PREFACE As it is always said that if you give some-one theory knowledge it will make person understandwell. But if you give some-one theory as well as practical knowledge then it will help the person to understand and remember that always. In the same way to get practical knowledge,the report which we prepare not only make us understand the various functions but also gives us different vision regarding them and along with it gives us experience of practical assignment and manager’s work. By preparing report on Analytical Study on Strategic Management Cycle of Baja] Auto Ltd. we have tried to develop skill to understand well and also how to implement theoretical knowledge work. For this we are thankful to Gujarat Technological University for including such a project as practical studies in the syllabus of M. B. A. Acknowledgement The succession completion of this report would not have been possible without co- operation and support of our professor , friends and our institute. We forward gratitude to respected director of our institute. We are heartily thankful to the management for providing us the opportunity to make a study to practical in their organization. We express our sincere thanks to the company who have given us all the information on-line. We are also thankful our professor out with whose help, this becomes possible and who provided full guidance, co-operation and valuable suggestion bout company report. We are also thankful to our college friends and all those who have helped us directly or indirectly in the preparation of this report. Executive Summary In our project we nave conducted a research on now baJaJ auto ltd works By using stretegic management ; their different moves.. Hence on the basis of the Information we have found out our finding and have done an in-depth analysis on Strategic Management Cycle of Baja] Auto Ltd.. It is followed by recommendations and conclusion. TABLE OF CONTENTS 1 . Objective of SM 2. Introduction of ABC Co. 3. History of ABC co. . Strategic Thinking i. Vision i’. Mission iii. Corporate Purpose ‘v. Values: (Standard of Conduct, Law, Employees, Consumers, Shareholders, Business Partners, Community Involvement, Public Activities, the environment, innovation, competition, business integrity etc. ) 5. Strategic Planning i. Strategy adopted by ABC Co. i’. Action plan by ABC Co. iii . Responsibilities of ABC Co. – CSR (Internal as well as External) iv . Michael Porters 5 Forces analysis v. McKinseys7S Model VI. SWOT Analysts of ABC co. PEST Analysts ViiiBCG MATRIX 6. Analysis of Strategies of ABC Co 7. Strategic Implementation i. Resource Allocation 7. Strategic Evaluation i . Balance Scorecar 1. OBJECTIVE OF SM . Statements of vision tend to be quite broad and can be described as a goal that represents an inspiring, overarching, and emotionally driven destination. Mission statements, on the other hand, tend to be more specific and address questions concerning the organization’s reason for being and the basis of its intended competitive advantage in the marketplace. Strategic objectives are used to operationalize the mission statement. That is, they help to provide guidance on how he organization can fulfill or move toward the â€Å"high goals† in the goal hierarchy-the mission and vision. As a result, they tend to be more specific and cover a more well- defined time frame. Setting objectives demands a yardstick to measure the fulfillment of the objectives. If an objective lacks specificity or measurability, it is not very useful, simply because there is no way of determining whether it is helping the organization to move toward the organization’s mission and vision. 2. INTRODUCTION OF BAJAJ GROUP : The Baja] Group is amongst the top 10 business houses in India. I s tootprint stretches over a wide range of industries, spanning automobiles (two-wheelers and three-wheelers), home appliances, lighting, iron and steel, insurance, travel and finance. The group’s flagship company, Baja] Auto, is ranked as the world’s fourth largest two- and three- wheeler manufacturer and the Baja] brand is well-known across several countries in Latin America, Africa, Middle East, South and South East Asia. Founded in 1926, at the height of India’s movement for independence from the British, the group has an illustrious history. The integrity, dedication, resourcefulness nd determination to succeed which are characteristic of the group today, are often traced back to its birth during those days of relentless devotion to a common cause. Jamnalal Baja], founder of the group, was a close confidant and disciple of Mahatma Gandhi. In fact, GandhiJi had adopted him as his son. This close relationship and his deep involvement in the independence movement did not leave Jamnalal Baja] with much time to spend on his newly launched business venture. His son, Kamalnayan Baja], then 27, took over the reigns of business in 1942. He too was close to Gandhi]’ nd it was only after Independence in 1947, that he was able to give his full attention to the business. Kamalnayan Baja] not only consolidated the group, but also diversified into various manufacturing activities. The present Chairman of the group, Rahul Baja], took charge of the business in 1965. Under his leadership, the turnover of the Baja] Auto the flagship company has gone up from INR. 72 million to INR. 120 billion, its product portfolio has expanded and the brand has found a global market. He is one of India’s most distinguished business leaders and internationally espected for his business acumen and entrepreneurial spirit. 3. HlSTORY OF BAJAJ AUTO LTD Baja] Auto is a $2. 3 billion company founded in 1926. It is fourth largest two- and three-wheeler manufacturer. Baja] Auto has three plants in all, two at WaluJ and Chakan in Maharashtra and one plant at Pant Nagar in Uttaranchal. The company is into manutacturing ot motorcycles, scooters and three-wheelers. In India, Baja] Auto has a distribution network of 485 dealers and over 1,600 authorised services centres. It has 171 exclusive dealers for the three-wheeler segment . lt has total 3750 rural outlets in rural areas. The company has opened 11 retail stores for bikes across the country, exclusive for high-end and performance bikes. It has opened these stores under the name in cities like Pune, Nashik, Ahmedabad, Chennai, Hyderabad, Kolkata, Navi Mumbai, Chandigarh, New Delhi, Faridabad and Mangalore. The Baja] brand is well-known across several countries in Latin America, Africa, Middle East, South and South East Asia. It has a distribution network in 50 countries with a dominant presence in Sri Lanka, Colombia, Bangladesh, Mexico, Central America, Peru and Egypt. It has technical tie up with Kawasaki Heavvy Industries of Japan to manufacture latest models in the two-wheeler space. Baja] Auto has launched brands like Boxer, Caliber, Wind125, Pulsar and many more. It has also launched India’s first real cruiser bike, Kawasaki Baja] Eliminator. Baja] Auto’s has in all three plants, two at WaluJ and Chakan in Maharashtra and one plant at Pant Nagar in Uttranchal, western India. WaluJ – Baja] range of motorcycles and three-wheelers Chakan – Baja] range of motorcycles Pant Nagar – Baja] range of motorcycles Achievement 1945- On November 29 Baja] Auto came into existence as BachraJ Trading Corporation Private Limited. 1948- The company commenced sales in India by importing two- and three-wheelers. 1959- Baja] Auto obtained the licence from the Government of India to manufacture two- and three-wheelers. 1960- The company became a public limited company and conducted Bhoomi PooJan of the Akurdi Plant. 1970- Baja] Auto rolled out its 100,000th vehicle. 971- The company introduced its three-wheeler goods carrier. 1972- The company introduced Baja] Chetak. 1975- Baja] Auto ; Maharashtra Scooters entered into a Joint venture. 1976- The company introduced Baja] Super. 977- Baja] Auto introduced rear engine autorickshaw and achieved production and sales of 100,000 vehicles in a single financial year. 1981- Baja] Auto launched Baja] M-50. 1984- On January 19, the foundation stone laid for the new plant at WaluJ, Aurangabad. 1985- On November 5, the WaluJ plant inaugurated by the erstwhile President of India, Giant Zail Singh. The company commenced production at WaluJ, Aurangabad in a record time of 16 months. 1986- The Baja] M-80 and the Kawasaki Baja] KBIOO motorcycles were introduced. The company produced and sold 500,000 vehicles in a single financial year. 990- The Baja] Sunny was introduced. 1991- The company introduced Kawasaki Baja] 4S Champion. 1994- It launched Baja] Classic. 1995- On November 29, Baja] Auto turned into a 50-year old company. It signed agreements with Kubota of Japan for the development of diesel engines for three- wheelers and with Tokyo R;D for ungeared scooter and moped development. The Baja] Super Excel is introduced while Baja] celebrated its ten millionth vehicle. The same year one million vehicles were produced and sold by company in that financial year. 1997- The Kawasaki Baja] Boxer and the RE diesel Autorickshaw are introduced. 998- The company commenced production at Chakan plant. It rolled out Kawasaki Baja] Caliber from its WaluJ plant. Baja] Auto launched Legend, India’s first four- stroke scooter from Akurdi plant. The same year Spirit was launched. 1999- Caliber motorcycle notched up 100,000 sales in record time of 12 months. 000- The company launched Baja] Safire. 2001- Baja] Auto launched its latest offering in the premium bike segment ‘Pulsar’. The same year Eliminator was launched. 2003- Baja] Pulsar DTS-i was launched. The company sold 107,115 motorcycles in a month. The company launched Baja] Wind 25, The World Bike in India. It launched its Caliber 115 ‘Hoodibabaa! ‘ in the executive motorcycle segment. 2004- B aja] Discover DTS-I, new Baja] Chetak 4-stroke with wonder gear and Baja] CT 100 were launched. Baja] unveiled new brand identity, new symbol, logo and brandline. 005- Baja] Discover, Baja] Avenger DTS-I and Baja] Wave DTS-I were introduced. 2006- Baja] Platina was launched. 2007- RE GDi autonckshaw, Bajaj XCD 125 DTS-Si, Bajaj pulsar 220 DTS-Fi, 200 cc Pulsar DTS-I and Baja] Kristal DTS-i were launched. The company also underwent through revamping of its organisational structure. 008- Baja] Platina 125 DTS-Si was launched. 2009- Bajaj pulsar 150 & 180 upgrade and Bajaj XCD 135 DTS-Si were launched 2011- April, Baja] Records its best year ever of 2010. HISTORY OF RAHUL BAJAJ Rahul Baja] Chairman, Baja] Auto Limited. Mr. Baja] (b. June 10, 38) is recognized as one of the most successful business leaders of India. He heads the Baja] Group of Companies which is a leader in a variety of manufactured products and financial services in India and abroad including motorized 2 and 3-wheelers, home appliances, electric lamps, wind energy, special lloy and stainless steel, cranes, forgings, infrastructure development, material handling equipment, travel, general and life insurance and investment, consumer finance & asset management. Mr. Baja] holds an Honours Degree in Economics from Delhi University, a degree in Law from Bombay University and an MBA from Harvard Business School. Mr. Baja] is the Chairman of the Board of many companies. He was elected to the Upper House of Parliament (RaJya Sabha 2006 – 2010). Mr. Baja] has received many prestigious awards and recognitions, notable being the award of ‘Padma Bhushan’ by he Government of India in 2001, Alumni Achievement Award by the Harvard Business School and Life Time Achievement Awards from Economic Times, Ernst & Young and CNBC TV18. Mr. Baja] was appointed Knight in the Order of the Legion of Honour by the President of the French Republic. Mr. Baja] has been conferred Honorary Doctorates by 7 Universities including IIT Roorkee. The Project Report On Strategic Leaders Page 4 Mr. Baja] was the President of Confederation of Indian Industry (Cll – 1979-80/1999-2000). He was President of Society of Indian Automobile Manufacturers SIAM) and Mahratta Chamber of Commerce, Industry And Agriculture (MCCIA) and Chairman of the Development Council for Automobiles and Allied Industries. Mr. Baja] was appointed by the Government of India the Chairman (1986- 89) of the Government owned domestic carrier, Indian Airlines. Mr. Baja] was nominated by the President of India the Chairman of the Board of Governors of the Indian Institute of Technology, Bombay during 2003-06. Mr. Baja] is a Member & former Chairman of the International Business Council of the World Economic Forum, Geneva and a Member of Harvard Business School’s Global Advisory Board. He is also a Member of the International Advisory Council of the Brookings Institution, Washington DC and a Member of the Executive Board of Indian School of Business. Mr. Baja] spear-heads the CSR initiatives of the Baja] Group which include Jamnalal Baja] Foundation and Shiksha Mandal and a number of social organizations including Bharatiya Yuva Shakti Trust and Ruby Hall Clinic, a large hospital in Pune as their Chairman.