This report is to show the system risks, security and recovery is important to the future of a company. Its starts with giving background information of the Lenovo Company and together the current market in operation. The report discusses two models are SWOT analysis and Porter’s five forces to understand the position held in the market. After that, the report discusses problems in the operation system and from them two suggested IT solutions are required. As we know, everything has good impact besides have also bad impact would be recommendation. The risks involved in the solution are projected and the security measures to obstacle the risks projected are discussed. Finally, a recovery mechanism is discussed in case there is loss of any information …show more content…
Secondly, Lenovo has faced a high shipment growth in its product in the emerging market. According to Ahrens & Zhou (2013) Lenovo has increased its shipment growth in the emerging market by 50% in the financial year 2010-2011; moreover, about 30% growth in Chinese market share still keeps the company competitive locally (See figure 2). Thirdly, after the loss in 2009, the company has made incremental profit to its shareholders till 2013 (See figure 3) (Lenovo Group Limited, 2013). Fourthly, unlike majority Chinese firms, Lenovo has built an unChinese and multicultural corporate environment by making English its official language and recruiting many senior foreign executives making it a strong point in global arena (The Economist, 2013). Fifthly, Lenovo has always been customizing and localizing its products line upon penetrating into new global or local market which is its core strategy (Dalsant, 2014). Sixthly, for effective strategic management and global expansion, the firm decided to carry out several M&A transaction throughout the last decade. For example, it acquired the PC division of International Business Machines (IBM) in 2005, acquired control of Medion AG, a Germany-based computer manufacturer and the PC unit of Tokyo-based NEC Corp. in 2011 and acquired Brazil-based consumer …show more content…
While Lenovo took over IBM’s PC division in 2005, such risk was exposed since IBM’s ThinkPad sector was not profitable (Ahrens & Zhou, 2013). Other threats such as political or regulatory threats has always been minimal in case of Chinese companies, i.e. Lenovo.
2. Threats of Substitutes
The threat of substitutes for Lenovo’s product lines is currently medium to high, since it mainly depends on PC manufacturing and selling. As mentioned earlier, the demand for PC may decline in the future and other portable and nano-technological devices may replace it, Lenovo needs to expand its product line with variety, portability and user-oriented functionality.
As of now, its product lines include Think-branded commercial PCs and Idea-branded consumer PCs, as well as servers, workstations, and a family of mobile Internet devices, including tablets and smart phones; however, which are still at a minimal stage of production and revenue generating sector for the company (Ahrens & Zhou, 2013). Thus, Lenovo can market these products at globally with cheaper rate and customer-demanded features to stay
4.4.2. Attack group knowledge A biggest thing is that to provide attackers to information about system. Which means to gain information about system?
With widespread use of internet services, the network scale is expanding on daily basis and as the network scale increases so will the scale of security threats which can be applied to system connected to the network. Viruses and Intrusions are amongst most common threats that affects computer systems. Virus attacks can be controlled by proper antivirus installation and by keeping the antivirus up to date. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. Intruders can be grouped into two major categories which are external and internal Intruders.
Following is a report completed for the executives of Frist World Bank Savings and Loan, with the objective to provide information on appropriate kernel options including the pros and cons of each. The importance of a software management plan, the use of installing anti-virus software on our Linus servers, monitoring and logging techniques used in a typical Linux infrastructure are all included within. Additionally, a description and explanation of the importance of a suitable backup plan is described. First let’s discuss each option and understand each. The kernel is highly configurable, it represents an opportunity to better secure our systems.
Security Mechanisms and Protection for the DMS DMS needs a top notch security mechanism in an effort to protect itself from not only the users accessing its system online, but also from its employees. Even though the current DMS network was up and running, and deemed safe and steady, the system was very sluggish and the interface was not very user-friendly. The system is equipped with a firewall in order to stop unauthorized entries by assessing and checking the inbound and outbound data network exchanges. DMS plans on starting an e-commerce, which will involve taking an extra effort with the security since it also includes authenticating users to confirm they are authorized to make any purchases. The security devices that are required are identified as Virtual private networks and IP security.
For operational purposes, the company collects and stores confidential information about their customers, employees, suppliers, and vendors. For purposes of their rewards program, the company collects sensitive and confidential consumer information. Although security measures and information technology systems have been put in place to ensure secure transmission and storage of confidential information, security breaches, computer viruses, or even human error can occur. Any of these events could cause data to be lost or stolen, as well as disclosed and used with malicious intent. Such occurrence could lead to litigation, fines, increased security costs, and damage to
And achieve as a result, the growth for its brand, market share, and sales
Samsung implements the strategy of “ Red Ocean;” which shows that a firm gains competitive advantage by venture into the current market and constructing on the weaknesses of other competitors in the field of similar products. Thus, Samsung“floods the market with many products” which are made by other companies within short duration of time ( Travos,2002). It seems that Samsung made these new products through developing many of manufacturing products of its Smartphones. However, such attitude is considered to be as a massive cost advantage over other firms that make such product. Samsung has improved its “competition position internationally through developing its present competitive strategies” , through depending on the other manufacturers`
Porters Five Forces Analysis: Samsung Electronics Introduction Samsung Electronics focuses in three specific areas; Consumer Electronics, IT & Mobile Communications and Device Solution. Porter’s Five Forces model has been used to analyse Samsung Electronics competitive position within the global market they operate in. By using this model, an evaluation of their current position will highlight which of the five forces are “affecting the intensity of competition in an industry and its profitability level” (Jurevicius, 2013). Nevertheless, when conducting analysis on an international company such as this, studying of market trends is already carried out thoroughly to ensure that they are fully aware of that market, in order to achieve success and maintain within it. With this in mind, it would be considered that Samsung Electronics would have a relatively good competitive advantage against other rival companies.
Apple states in their Form K-10 Report (2017, p.1) they are “committed to bringing the best user experience to its customers through innovative hardware, software and services.” In an Industry where profit margins are low, technologies are constantly evolving and competition is high it is essential that Apple continues to offer innovative and simple products that increases customer experience (Heracleous, 2013) so to maintain a competitive advantage. A variety of tools have been used to evaluate Apple’s external and internal environment, including the PESTEL (Appendix 1), Porter’s Five Forces Analysis (Appendix 2), SWOT (Appendix 3). It is envisaged that the information derived from these tools and the associated analysis will support Apple’s CEO to make strategic decisions that addresses the challenges ahead in the short term, ensuring Apple can be competitive in the long term (Rothaermal, 2017).
Sunday, January 31st, 2016 Internal Assessment Research question: At what extent was Apple´s innovative Apple Watch marketing strategy successful when launching the device? In recent years, cutting edge technology has been the gap through which society had maintained daily basic activities, businesses such as Apple Inc., in the attempt maintain ahead and wider the advantage over potential competitors, seek the innovative development as an important key to better meet the needs and wants of their customers in the future, this factor represents the arise of new chambers in the market as a new opportunity of growth where a proper marketing strategy that involves a correct manage of price and the product features, enabled a beneficial introductory
Internal strengths work as the main success factors for an organization. The main strength of the company was its Research and Development section in which it spends almost 9% of its total sales amount. Again the company had very high innovation aggressiveness which led the company to remain in its price differentiation strategy. Moreover the company always had been under the supervision of charismatic leaders which accounted for its strategic success. Lastly, the simple and user friendly premium looking device with uniqueness accounted for the brand loyalty of its
Process Strategies The process strategies, for such a large manufacturing company, would need to be varied. The production process type would be determined by the product life cycle stage at that time (Thayer 2004).Product life cycles for items such as smartphones and tablets do not generally follow the standard life cycle stages. The maturity stage can be interrupted by discontinuation or irrelevance of a technology, which recommences the cycle (Giachetti & Marchi 2010). Incidentally, during the product life cycle of these items, a cyclic improvement of both process and product is required to stay in contact with market changes.
With a relatively low investment, Huawei develops products in a short period of time and participates in market competition at a lower
Sensitive market to these kinds of products are commercial line and offices those has to get technological interface to attain day to day tasks. Samsung has contributed in so many innovative products to make users life easy such as tablets, mini laptops, and televisions to provide with the wide range of technology for personal use. Samsung is known for its colors and picture quality in the
This essay will start with a brief description of Siemens, an introduction of its current mission statement and an evaluation of the key strategic issues/objectives which Siemens faced and are facing. The next part, two appropriate tools of analysis, PESTEL analysis of the external environment the organization faces, and Porter 's 5-Forces analysis of the competitive environment in which Siemens operates; a summary of its key strategic resources and competencies, and any resources that it lacks will follow these tow analysis. At last, SWOT analysis will be applied to describe and evaluate the strategic options for Siemens. Siemens is Europe 's largest engineering conglomerate.