Saturday, February 15, 2020

The Five Porter Forces Essay Example | Topics and Well Written Essays - 500 words

The Five Porter Forces - Essay Example This is thus applicable to the Coke and Pepsi industries who are major rivals in the production of carbonated soft drinks. The structure of the concentrated producers is such that a blend of the raw material ingredient  is produced, packaged in plastic canisters and taken to the bottlers. Concentrate producers add artificial sweeteners to carbonated drinks while the bottlers add sugar or high fructose is making the process of the former to be less capital intensive than the latter. Production cost is low under the concentrate producers with little capital being used on machinery, labor and overheads and still ensuring that production can serve the whole of the United States (Greenwald & Kahn 91). Innovation and sophistication is a key goal in the firm with high investments awarded to marketing, advertising, research, promotion and bottler support. However, key emphasis is given to the development of customer development agreements with other advanced companies to promote marketing strategies and employment of many people to meet the production demand Bottlers on the other hand add sugar, carbonated water, high fructose corn syrup to the concentrates and packed it ready for delivery to customers. The sales include maximization of space, positioning of brand, setting displays and points of sale and coming up with promotional activities. The process of the bottlers is capital intensive, involves high speed and high cost the o produce a package that is of similar type and size. Much of the system is capital intensive with major investments being accounted for trucks and distribution process. The industry structure of the concentrate producers is more attractive based on the model provided by Porter on industrial framework.  

Sunday, February 2, 2020

Cloud Computing and Human Rights Research Paper

Cloud Computing and Human Rights - Research Paper Example Along the way, the paper touches on the legal regimes that regulate surveillance of cloud activities, and the basis of such laws in more fundamental laws relating to privacy rights. The paper also touches on the concerns that individuals and governments have with regard to the way cloud computing wrestles control of data from users, and how such control issues weigh on decisions by individuals and governments to move their activities over to the cloud (Ion et al. 2011; Solove 2007; Warren and Brandeis 1890; Necessary and Proportionate 2013; ACLU of Massachusetts 2013; Judge 2013; Brown 2013; Timberg 2013; Schneier 2013; Chen 2010; Davies 2013; Johnson 2013). II. Introduction This paper discusses the statement that cloud computing, in the new century, has the potentiality with regard to the creation of the largest violations of human rights. This statement pertains to cloud computing as a potential platform for the breaching of the privacy rights of individuals, and those corollary ri ghts that pertain to privacy rights, including the right to privacy of health information and other corollary rights. Cloud computing refers to the use of online storage and applications, including social media, platforms for sharing documents and images, and the way users are made to agree to user agreements that may compromise data privacy rights in favor of greater use of such personal information by service providers, among others. Such breaches of privacy rights and the issues tied to that extend to the way governments have come to have access to private citizen data as they are generated from their smartphones and other computing devices, including personal computers and tablets, and how such access is made without explicit consent and knowledge of citizens in various parts of the world. The violations of privacy rights can be gleaned from a cursory look at the literature to be pervasive and crosses social and national boundaries, and that in turn poses serious questions with regard to the overall desirability of cloud computing platforms when it comes to individuals who are wary of the intrusions into their private data by governments and private enterprises, and by the way such intrusions can result in the safety and overall integrity of the human person being compromised. This, in turn, poses questions with regard to the overall desirability of alternatives to cloud computing, such as the use of private, offline storage and applications, to circumvent surveillance by various governments and third parties and to secure the privacy rights of human beings around the world.