Thursday, January 30, 2020

Lml Swot analysis Essay Example for Free

Lml Swot analysis Essay LML Ltd is an India-based Company that manufactures, sells and exports motorized two wheelers. The company operates in one segment, namely motorized two wheelers. They offer scooters, motorcycles, and mopeds, as well as spares and accessories. They are having their manufacturing facilities located at Kanpur in Uttar Pradesh. LML Ltd was incorporated in the year 1972 as Lohia Machineries Ltd to manufacture machinery for the synthetic fibres industry. In the year 1983, the company commenced production of 100 cc scooters in technical collaboration with Piaggio VE, SpA, Italy. In the year 1984, the company incorporated a new company under the name and style of Vespa Car Company Ltd to manufacture 200,000 scooters and 50,000 three-wheelers annually. STRENGTH Vespa is an Italian line of scooters manufactured by Piaggio. The Vespa has evolved from a single model motor scooter manufactured in 1946 by Piaggio Co. S. p. A.of Pontedera, Italy—to a full line of scooters and one of seven companies today owned by Piaggio—now Europes largest manufacturer of two-wheeled vehicles and the worlds fourth largest motorcycle manufacturer by unit sales. Known for their painted, pressed steel unibody which combines a complete cowling for the engine, a flat floorboard , and a prominent front fairing , The Vespa was the first globally successful scooter. ?Vespa first came to India in 1960 with a collaboration with Bajaj Auto.? The technical collaboration ended in 1971 and Bajaj and Vespa parted ways. ?Vespa at that time was considered an iconic scooter brand globally and the brand was owned by Piaggio. ?Piaggio then joined hands with the Kanpur based Lohia Machines Ltd ( LML) in 1983 and started to roll out the Vespa range of Scooters. ?By that time Bajaj was ruling the market with the iconic Chetak . WEAKNESS Opportunities and Threats LML stands for the highest standards of technical expertise, product innovation and has one of the ?nest R D capabilities, particularly relating to designing, rapid prototyping, CAD CAM, tooling and industrialization. It is harnessing these strengths and its vast experience in the two-wheeler business coupled with a aggressive business strategy for its revival and turnaround. The Company is perhaps the ? rst in the world to obtain Euro III certi? cation for its 2-stroke vehicles and subsequent to restart, it has also received the upgraded ISO 9001-2008 certi? cation from DNV.

Wednesday, January 22, 2020

The Use Of Pencils As Weapons :: essays research papers fc

Violence in our schools has always been a problem, now more than ever before. Each year many students are injured and some are even killed during so-called 'school-yard brawls.'; In fact, more than 1,000 students are seriously injured per year during school violence in California alone. (http://www.geocities.com/area51/stats/7403.html) In most cases of serious injury, weapons were involved, including common school supplies such as pencils and pens. Historically, the school systems response to possession of weapons on campus has been at the very least confiscation of said weapons and suspension of the possessor, more commonly expulsion of the possessor and occasionally the bringing of criminal charges to bear. The use of weapons to do violence has had much the same results. In some schools, the students pass through a metal detector and/or are searched for weapons upon a regular basis. (Ch. 4 news at 6:00), However, when the weapons being used are common school supplies, what can one do? The number of students injured by their classmates with common school supplies such as pencils and pens are on the rise. A student carrying a gun or a knife is often busted before having an opportunity to use said weapon, one with a pencil on the other hand, they run free until they seriously injure or even possibly kill someone with the pencil. Our current policy is to deal with the student after they commit the crime, as far as stabbing with pencils go anyway, treating them as though they had used any other weapon. It is my belief that something can be done to prevent, or at least minimize the number of incidents involving the use of pencils as 'stealth'; weapons in our classrooms. Although we do not need to worry about lead poisoning from pencils, (pencil lead is really graphite), (From graphite to pencil, Ali Mitgutsch, 1985) when misused a pencil is a deadly weapon, one far worse than a pocketknife.   Ã‚  Ã‚  Ã‚  Ã‚  One obvious alternative, which would thrill many teachers, would be to replace pens, pencils, paper, and the like with computer systems of one sort or another. Estimations have been made that computer systems at the school could be provided for as little as $800 per student including Internet access and basic maintenance. ('Computing Edge';, John Beecham, 1997) This approach would have many advantages, including the fact that our schools would be releasing children with at least a basic knowledge of how to operate a computer system, this in turn would make it much easier to learn to operate other, more complicated and more advanced systems, which would give our students needed job skills in today's information age.

Tuesday, January 14, 2020

Digital Fortress Chapter 44

Phil Chartrukian stood fuming in the Sys-Sec lab. Strathmore's words echoed in his head: Leave now! That's an order! He kicked the trash can and swore in the empty lab. â€Å"Diagnostic, my ass! Since when does the deputy director bypass Gauntlet's filters!?† The Sys-Secs were well paid to protect the computer systems at the NSA, and Chartrukian had learned that there were only two job requirements: be utterly brilliant and exhaustively paranoid. Hell, he cursed, this isn't paranoia! The fucking Run-Monitor's reading eighteen hours! It was a virus. Chartrukian could feel it. There was little doubt in his mind what was going on: Strathmore had made a mistake by bypassing Gauntlet's filters, and now he was trying to cover it up with some half-baked story about a diagnostic. Chartrukian wouldn't have been quite so edgy had TRANSLTR been the only concern. But it wasn't. Despite its appearance, the great decoding beast was by no means an island. Although the cryptographers believed Gauntlet was constructed for the sole purpose of protecting their code-breaking masterpiece, the Sys-Secs understood the truth. The Gauntlet filters served a much higher god. The NSA's main databank. The history behind the databank's construction had always fascinated Chartrukian. Despite the efforts of the Department of Defense to keep the Internet to themselves in the late 1970s, it was too useful a tool not to attract the public-sector. Eventually universities pried their way on. Shortly after that came the commercial servers. The floodgates opened, and the public poured in. By the early 90's, the government's once-secure â€Å"Internet† was a congested wasteland of public E-mail and cyberporn. Following a number of unpublicized, yet highly damaging computer infiltrations at the Office of Naval Intelligence, it became increasingly clear that government secrets were no longer safe on computers connected to the burgeoning Internet. The President, in conjunction with the Department of Defense, passed a classified decree that would fund a new, totally secure government network to replace the tainted Internet and function as a link between U.S. intelligence agencies. To prevent further computer pilfering of government secrets, all sensitive data was relocated to one, highly secure location-the newly constructed NSA databank-the Fort Knox of U.S. intelligence data. Literally millions of the country's most classified photos, tapes, documents, and videos were digitized and transferred to the immense storage facility and then the hard copies were destroyed. The databank was protected by a triple-layer power relay and a tiered digital backup system. It was also 214 feet underground to shield it from magnetic fields and possible explosions. Activities within the control room were designated Top Secret Umbra†¦ the country's highest level of security. The secrets of the country had never been safer. This impregnable databank now housed blueprints for advanced weaponry, witness protection lists, aliases of field agents, detailed analyses and proposals for covert operations. The list was endless. There would be no more black-bag jobs damaging U.S. intelligence. Of course, the officers of the NSA realized that stored data had value only if it was accessible. The real coup of the databank was not getting the classified data off the streets, it was making it accessible only to the correct people. All stored information had a security rating and, depending on the level of secrecy, was accessible to government officials on a compartmentalized basis. A submarine commander could dial in and check the NSA's most recent satellite photos of Russian ports, but he would not have access to the plans for an anti-drug mission in South America. CIA analysts could access histories of known assassins but could not access launch codes reserved for the President. Sys-Secs, of course, had no clearance for the information in the databank, but they were responsible for its safety. Like all large databanks-from insurance companies to universities-the NSA facility was constantly under attack by computer hackers trying to sneak a peek at the secrets waiting inside. But the NSA security programmers were the best in the world. No one had ever come close to infiltrating the NSA databank-and the NSA had no reason to think anybody ever would. Inside the Sys-Sec lab, Chartrukian broke into a sweat trying to decide whether to leave. Trouble in TRANSLTR meant trouble in the databank too. Strathmore's lack of concern was bewildering. Everyone knew that TRANSLTR and the NSA main databank were inextricably linked. Each new code, once broken, was fired from Crypto through 450 yards of fiber-optic cable to the NSA databank for safe keeping. The sacred storage facility had limited points of entry-and TRANSLTR was one of them. Gauntlet was supposed to be the impregnable threshold guardian. And Strathmore had bypassed it. Chartrukian could hear his own heart pounding. TRANSLTR's been stuck eighteen hours! The thought of a computer virus entering TRANSLTR and then running wild in the basement of the NSA proved too much. â€Å"I've got to report this,† he blurted aloud. In a situation like this, Chartrukian knew there was only one person to call: the NSA's senior Sys-Sec officer, the short-fused, 400-pound computer guru who had built Gauntlet. His nickname was Jabba. He was a demigod at the NSA-roaming the halls, putting out virtual fires, and cursing the feeblemindedness of the inept and the ignorant. Chartrukian knew that as soon as Jabba heard Strathmore had bypassed Gauntlet's filters, all hell would break loose. Too bad, he thought, I've got a job to do. He grabbed the phone and dialed Jabba's twenty-four-hour cellular.

Monday, January 6, 2020

Analysis Of The Movie Prayer For Bobby - 925 Words

Homosexuality back in the 1980s was looked as deviant to the majority of society and still today there are some individuals who believe it is a perversion and an abomination. The movie, Prayer for Bobby, recaps on how the power of ones society s beliefs had an influence on families, especially how it influenced Bobby Griffith s family. I will discuss the three most important topics in the movie, describe how society has contributed to those issues, and discuss what can be done to alleviate or eliminate those issues. The first important topic of the movie, Prayer for Bobby, is the intolerance of Bobby s mother, Mary Griffith, toward homosexuality. Mary Griffith, a devoted Christian, did not want to accept or believe her son was gay. She confided in her religion and believed God would cure him. No matter how hard Bobby tried to inform her, being gay was not a choice, she was still intolerant and did not believe him because of what she was taught from her religion and society. The second topic is the power the majority had over the minority. Bobby s homosexuality was not accepted into his family and his society. His mom, a heterosexual like the rest of his family members and the majority of society, tried to help him by taking him to a therapist who informed Mary Griffith, he can be cured. Mary Griffith proceeded with following the therapist s orders by telling Bobby how he should live his life. This included his mother setting him up on dates with females, havingShow MoreRelatedStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagesof systematic study. Identify the major behavioral science disciplines that contribute to OB. Demonstrate why few absolutes apply to OB. Identify the challenges and opportunities managers have in applying OB concepts. Compare the three levels of analysis in this book’s OB model. MyManagementLab Access a host of interactive learning aids to help strengthen your understanding of the chapter concepts at www.mymanagementlab.com cott Nicholson sits alone in his parents’ house in suburban Boston