Recent orders
Threats of substitutes of IBM
Threats of substitutes of IBM
Apple’s products are confronting high rivalry. Exceptionally, machine and ipod player are moving quick in world business sector. Organizations like IBM acquainted Thinkpad with distinctive arrangement with spread diverse needs of shoppers. Case in point, the R Series Thinkpad is for ordinary day by day utilization of machine. T arrangement is presented for chief execution and X arrangement is determined for business explorers due to its peculiarities like Thinnest and lightest model.
Threat of Existing Rivals:
The danger of existing adversaries is high for Apple in present business sector. Macintosh is working in two major business sector portions like Pcs and compact music players. There are huge names contending in the business like Dell, HP Compaq, Gateway and Toshiba. Each Rival is giving diverse products and administrations with distinctive procedures which make troublesome for Apple to addition greatest offer of the business sector. Low value war makes harder for each organization to proceed with its products at same rate for long time. Apple has possessed a finer business position by change and speculation on innovative work.
Threat of New Entrants:
Presently the present business of Pcs is entrenched and very aggressive, for example, Dell, HP Compaq, Lenovo, Sony and Toshiba is huge players of the business. There are two noteworthy hindrances for new contestants which are extremely hard to evacuate. To start with, to enter in the business sector needs monstrous measure of capital which permits new organization to be dynamic in business and be a member of value war and maintain the business sector weight while advancing its products and produce economies of scale products.Bargaining Power of Customers:
In working frameworks, Apple’s OSX Operating System is the main substitute working frameworks accessible for utilization if shoppers deny utilizing Microsoft working framework. So bartering force of the client is lessened for this situation in light of the fact that he has extremely constrained choice however in late market insights, Microsoft is heading the world market by its products and Apple does not permit some other organization to utilize Apple’s working framework which makes restricted utilization of its clients and that is the reason Apple is not as large as Microsoft.
Bargaining Power of Suppliers:
Apple is giving extremely intricate gadgets in the business and it is not assembling everything by own. Apple made numerous contracts with diverse suppliers like Hitachi Global Storage Technologies, Western Digital, and Seagate. Apple did not make an agreement with single organization only due to creating high haggling force to its suppliers which conveyed Apple into better positions of arrangement. This system helps Apple to maintain a strategic distance from deficiencies furthermore minimal effort segments.
Threats and Risk Assessment for Solux Books Limited
Name:
Course:
Tutor:
Date:
Threats and Risk Assessment for Solux Books Limited
Introduction
Threat and Risk assessment in this organization is intended to give recommendations that will help in maximizing confidentiality, integrity as well as availability while at the same time giving rise to functionality as well as usability. In order for this company to be able to come up with these answers, it is prudent that this company performs a threat and risk assessment. Failure to do this for our company will open us to circumstances that are likely to destroy our conduct of business.
Scope
This threat and risk assessment is intended to uncover what internal and external factors affecting the performance of this organization. The assessment will explore both the negative and positive factors that have a bearing on the performance of this organization. It will make the organization become more aware of the assets in their possession.
Risks assessment
Determining our assets
The assets in our possession include financial records, servers, computers, cables, Backup devices. We also have human assets which include our administrators, our IT staff, and technical servers and so on. These assets are likely to be destroyed by fire, theft, equipment failure
Threat rating
This is an assessment of how a threat to a particular asset of the company is likely to have an impact on the performance of the company. There are certain assets of the company which if affected could paralyze the operation of the company. Likewise, there are certain assets which if affected will not interfere with the operation of the company.
High rating
My company will suffer a very big disruption as well as financial loss if our financial records, computers and staff are lost. Moreover, without financial list documents we are likely to open up for legal suits with our creditors and debtors in case of a misunderstanding concerning a certain aspect of finances. Moreover loss or destruction of the company’s software is likely to paralyze the operation of the company.
Medium rating
An attack on our employee records will make us suffer a minor disruption as well as financial loss. We will still be able to meet our objective albeit with slight difficulties. It is only used in storing employees’ data, profile and progress. So without it we will still be in a position to meet our target as they can always be asked to furnish fresh information.
Low rating
There is no asset in this organization whose loss could not deal a blow to the organization albeit small. Even if we lost a member of the staff, we could experience some disruptions before we find the replacement. No asset that is in possession of the company that does not add value to the existence and functioning of the company.
Probability of the risk occurring
The risks that are bound to occur include theft, fire, and vandalism as well as Technological hazards. There is low likelihood of theft occurring as the area where the company stands is well secured and more so, the building is under 24 hour CCTV surveillance. The risks that are most likely to occur are technological hazards as well as fire.
How security officials determine threats and risks
Security officials can be used to provide information that can be used in risk assessment. That information will help owners of business ventures or any organizations in risk assessment and planning (Groves, 2001).
In natural areas
Security officials can provide statistics on number of times a natural calamity has occurred in certain areas. This information is vital as it helps one in determining what natural calamities amount to a risk in any business venture. Natural hazards could include floods, hurricane as well as earthquake. These risks are however put into consideration if the business stands out in a area where these calamities are bound to occur. You cannot conduct a risk assessment on occurrence of hurricane in an area that is not at the coast.
In manmade areas
Police and security departments van give statistics on the frequency of occurrence of crimes in a certain locality. These crimes include theft, vandalism as well as political situations. The police could also give statistics on whether fire usually occurs within that locality. These are the biggest threat that exist that pose risks and threats to a business. This is because most of the time it is not easy to identify the culprits as well as what really transpired in the occurrence of the risk (Groves, 2001).
Technological hazards
Technological hazards are dangers that are caused by the technology that has been used to prepare equipment. These are usually shortcomings that happen to an equipment during its performance. Security forces could be used to determine the number of times that a risk or danger has been caused due to the use of certain equipment in the course of business.
Strengths and weaknesses of the security system
Use of security system in determining risk has both advantages and disadvantages. The advantages of using the security system are that it provides one with first hand information concerning a risk that might exist in a certain locality. This is because the security system is usually involved in the investigation and management of a risk when it occurred. Moreover the police can give one advice on the safeguards that can be put in place to prevent occurrence of a certain risk in an organization as they are aware of what cause some risks especially the manmade risks.
There are certain disadvantages that are involved when one relies on the security information in assessment of risks. To start with, the security system is not in a position to access all information from previous organizations especially on internal factors in an organization that contributed to the loss occurring. The security system is only capable of assessing information on the external factors that have contributed to losses in an organization. Reliance on this information only may not give one a true picture of the actual threats that are likely to face an organization. This information from the security system can only be used to supplement other available information on the threats and risks that the organization is likely to encounter.
Secondly, in the course of their investigations, they could have arrived at the wrong conclusion about the existence of a certain risk. They could have been given wrong information by the owners of an enterprise which they rely on to make a conclusion on the existence of certain types of risk which could eventually turn out not to be true. This therefore means that at times, they could give wrong information about the existence of a certain type of risk.
Concerning the technological hazards, the security system cannot be in a position to gain access to that kind of information and at times even if they are in possession of that information, they are reluctant to share it especially where they have colluded with the manufacturers’ of certain equipment so as not to spoil the manufacturers name (Karim, 2007).
General types of threats
General types of threats are of the kinds that are bound to occur in any business organization regardless of the nature of business it is engaged in. General types of threat that exist to this type of business include, political uprising, theft, vandalism as well as fire. Others include technological hazards that are mostly associated with the breakdown of the equipment (coxxi& Ricci, 1990).
Specific types of threats
Specific threats are basically threats that are associated with a particular kind of business that one is engaged in. They are specific to a certain business. In this kind of organization where we are engaging in provision of books in the library, such risks include tearing of books, misplacement of books as well as plucking of pages from the books (Landoll, 2006).
References
Landoll, D. J. (2006).The security risk assessment handbook: a complete guide for performing security risk assessments. New York. United States.Auerbach Publications.
Cox, L. A. Ricci, F. L. (1990).HYPERLINK “http://www.google.co.ke/search?tbo=p&tbm=bks&q=+bibliogroup:%22Advances+in+risk+analysis%22&source=gbs_metadata_r&cad=9″Volume 6 of Advances in risk analysis. Washington D. C. United States. Springer.
Karim, H. (2007).Strategic security management: a risk assessment guide for decision makers. Carlifonia C. A. United States. Butterworth-Heinemann.
Groves, R. H. (2001). Principles of Risk Mnagement. London. United Kingdom. Csiro Publishing.
Thoughts of Marcus T. Cicero
Thoughts of Marcus T. Cicero
In the year 106 B.C.E. during the month of January, Cicero Marcus Tulluis was born in a town near Rome known as Arpinum. Cicero was brought up in a well to do family as his father was a landowner who was extremely wealthy. This seems to be a contributing factor in making him one of the world’s greatest philosophical thinkers. As a young boy, he would study books found in the library, which his father owned. Growing up reading the works of famous and earlier philosophers contributed to his success in the future. Were it, not for the library where he obtained influential books, he probably would not be known today (Forsyth, 2002. 23).
As a result of reading widely from various authors, he grew intellectually and later on became a renowned public speaker and philosophic. Cicero attended the best Roman schools after his father noticed his potential. Also, the need to make Cicero and his brother join the upper class was a reason why they were sent to study in Rome (Everett, 2002. 45). Life seems to favor him a lot as he evaded participating in the wars that took place during his time. Cicero is known for his bold acts, which made him have many admirers. It was while representing a client in court that he spoke of the ills of the then Sulla Regime. People were not free as the ruler assumed more power than he had, and as he ruled through absolute power. This incident would give rise to many other scenarios where he proved to be a brilliant thinker of philosophy.
As fate had it, he married a young lady from a wealthy family, and this further made him be known in the society. As a member of the Roman Senate, he had more opportunities to make his sentiments and thoughts be known. After finding Caius Verres guilty of mismanagement and misusing of government resources, he had him prosecuted. Cicero will be remembered for his acts of bravery and the role played by him in making the Roman Empire successful. Cicero made progress in his career, and by the year 69 B.C.E, he assumed the title of a Judge and head of games and public works (Ingo, 2011. 67). So far, his life has had only positive elements from the time he was born. One can easily claim that the Gods were in favor of Cicero. During this time, he made a political speech, and this made him gain favor from the top leaders. Six years later he attained the highest title anyone could achieve at an age such as his. Cicero knew how to network and form unions with people who would enrich his life. This makes one think of Cicero as an opportunist and a go getter.
Later on it seemed his lack ran out as he was exiled after refusing to join the First Triumvirate. His kind heated nature was opposed to violent methods of attaining power used by Caesar. In the year 57 BC.E, he went back home and tried to make Pompey leave the first Triumvirate. He was a free spirit and fighter who could not be derailed from what he believed in. Tragedy struck his life as his daughter died, he divorced his wife, constantly received threats from Caesar, and Pompey lost his life. At this time in this life, he kept on writing philosophical works, which made his depression end. They believed that he was a threat due to his outspoken nature, and they had to find a way of containing him. His death will forever be remembered as he faced it with the utmost dignity and courage that a man would do. Most people would react differently if they were in the same situation as Cicero.
More problems seemed to affect him, as even though Caesar met his death, other people interfered with his life. A second triumvirate similar to that of the first one was formed, and the members had to find a way of terminating Cicero. Mark Antony is the one responsible for sending his men to kill Cicero. The political life of Cicero was not successful as compared to that of being a writer, thinker and public speaker. Some of the speeches written by Cicero show his vast knowledge and intellect in many areas. The speeches had meaning and often were for the purposes of making evils in society be known. An example of one his speeches is the Pro Archia, a short speech that advocated for quality of life enhancement, as it was persuasive as well as sincere. The books, which he read when he was young, contributed to the many speeches concerning diverse subjects. Finally, his letters are famous due to the nature of their content as well as being valuable and fascinating. In his lifetime, he wrote over eight hundred letters that were in the form of dialogues and speeches. Furthermore, the fact that he well experienced in the Latin language makes him more notably a famous philosopher (Everitt, 2001. 12). In conclusion, the thoughts and life of Cicero are extremely intriguing and need to be known by lovers of philosophy.
Work Cited
Everett, Anthony. Cicero: The Life and Times of Rome’s Greatest Politician. New York: Random House, 2002. Print.
Forsyth, Fiona. Cicero: Defender of the Republic. New York: Rosen Central, 2002.Print.
Everitt, Anthony. Cicero. A turbulent life. London: John Murray Publishers, 2001.Print.
Ingo, Gildenhard. Creative Eloquence: The Construction of Reality in Cicero’s Speeches .Oxford/New York: Oxford University Press, 2011.Print.
