Friday, February 14, 2020

Marketing plan Essay Example | Topics and Well Written Essays - 3000 words - 2

Marketing plan - Essay Example Second part discusses the international marketing plan and third is the recommendation. Nestle SA is a multinational company that has been successful in holding business in many parts of the world. As a matter of expansion, it is planning to enter a new territory. How they will enter the territory and its marketing strategies will be discussed in this paper. Nestle SA is the holding company of Nestle Group that is based in Switzerland. It was founded by Henri Nestle whose name is retained as company’s name. Its main activities are the development and production of food and beverages. Nestle Group manages the food and beverage activities in three geographical areas (Europe, America and Asia, Oceania and Africa), and globally for Nestle Water, Nestle Nutrition, and other food and beverages). As of 2012, company has employed 328,000 people worldwide and earned CHF 92.2 billion. (Reuters. 2015). Top 3 competitors to Nestle are Mars, Inc., Danone and Mondelez, International, Inc. Company mission of â€Å"Good food, good life† is to provide consumers with the best tasting, most nutritious choices in a wide range of food and beverage categories and eating occasions, from morning to night.†(Reuters. 2015) Discussion about relevant historical developments of India, in this paper, starts in the 19th wherein it was reigned by Great Britain. It was granted independence in 1947 after years of non-violent resistance was staged by its leader Gandhi. Earlier years were not peaceful, since after gaining independence, it was disturbed by three wars with neighboring countries, and the last one was in 1971 that resulted to the separation of Pakistan and India. There were nuclear threats in 1988 and a terrorists attack in Mumbai on the same year. (CIA Worldfactbook, 2015). Country remained calm after this. India’s growth started in 1991 after a series of economic

Saturday, February 1, 2020

Voice over Internet Protocol Security Vulnerability and Risk Analysis Literature review

Voice over Internet Protocol Security Vulnerability and Risk Analysis - Literature review Example In modern times different means and mechanisms are being introduced for establishing communication with one another. The aim behind all of them has been to work on those lines that ensure reliable, fast and economical sources that can enable connecting people from across the borders and shores. The progress so made is so immense that people sitting across the continent can get in touch and see each other in matter of few seconds. Different means exist for such concepts. All those means of communication that have existed in history were conducted with a concern and consideration of privacy in them. This is achieved through encryption of data that is being exchanged between the two points. Voice over I.P (VOIP) is one of them. It has gained popularity in recent times and is being widely used .Like every other system in the field of telecommunications; VOIP has its strengths as well as weaknesses. Like every other internet utility, it has its own vulnerabilities and security concerns. This paper looks into the vulnerabilities and risks affiliated with it, further touching on the features being provided by it along with its working principles in brief. The paper also looks into the role of Voice over I.P Security Alliance and its efforts to meeting the demands in terms of narrowing down the vulnerabilities that exist in various forms. Keywords: VoIP, Open standard, Vulnerability, Denial of Service. ... VOIP is established on the concept of open standards to maximum its use and accessibility (Ellis, Pursell & Rahman,pg 250, 2003). Interoperability is another feature that is making inroads across the platform all over. Having mentioned the features that are being provided by VOIP, a serious concern is being raised about its security aspect. Many a times it is being tagged as vulnerable in terms of security aspects. For this purpose efforts are needed to be in place which will insure the safety of all parameters involved in this. This is possible through study of all those areas which have loop holes in them and further working on those areas will make this a safe source of communication for customers to use. VOIP is a generic term for number of applications intended for establishing connection (Persky 2007); it could be the chat client establishment, the phone call conversation, the SMS service establishment. VOIP makes use of number of protocols that contain both the open protocols and proprietary protocols. Through the use of single broadband line, VOIP enables sending voice signals, data that includes textual format and video format information. The vulnerabilities are not just limited to its usage and application, rather operating systems, and protocols used (McGann & Sicker 2005). Types of calls possible with VOIP: Unicast calls: This kind of calling conversation involves the minimum number of parties, one at each end. It is the SIP or H.323 based call. Mostly the traffic and conversation is not encrypted and hence unsafe. Multi cast calls (limited number of callers): This includes more than two users involved in a conversation at one time. Usually a conference call where the first two establish a