Wednesday, July 31, 2019

Marketing In business organizations

1)  Ã‚  Ã‚  Ã‚  Ã‚   The buying decision process as a general concept and as applied to commercial / industrial buyers. In business organizations, the various participants who are involved in the purchasing decision making process are initiators, users, influencers, deciders, approvers, buyers and gatekeepers. The gatekeepers are the important participants in the industrial buying process as they are the focal point for entry into the firm. They constitute the decision–making unit of a buying organization termed as the buying centre. The business buyers have the advantage of seeking the highest economic, social, service and technical benefit with respect to a market offering’s cost. The buying process begins with problem recognition- in this case the industrial buyer identifies the main need or problem which affects the firm’s business processes. The next step is Product specification – The buyer identifies the product’s general technical specifications by specifying the size, quality, quantity, design, features etc. Supplier Search – After the specifications have been set upon, the buying centre tries to examine the appropriate suppliers for its supply of raw materials. Proposal Solicitation – The proposals and quotations will be invited from various suppliers contacted and one, which satisfies the firm’s objective with minimum cost and better economies of scale will be accepted. Supplier selection – Based on certain characteristics, the buyer will determine parameters to select the suppliers based on price, reputation, product reliability, and service reliability and supplier flexibility. Order – Routine Specifications : Here negotiation on the order takes place with the final supplier selected by the buying centre. Performance Review – the suppliers will be periodically checked and evaluated on their performance in-order to identify the gap between the actual and the expected performance. 2)  Ã‚  Ã‚  Ã‚  Ã‚   Describe how the business environment is analysed, segmentation, targeting, positioning. The major environmental factors that influences and affects the buying behaviour as an industrial customer are environmental factors like the level of demand, the economic outlook, social responsibility acts, technological and political change; Organizational factors speak on the objectives, strategies, policies, plans and systems etc; Interpersonal factors highlight on the status, empathy, interests, power, authority etc; Individual factors such as age, income, education, job designation, culture, social class etc. are the requirements to be looked upon; The overall market dynamics can be studied by understanding the levels of market segmentation. Segment marketing, niche marketing, local marketing and individual marketing are some of the ways of micro marketing. Some of the variables for segmenting business markets are Demographics where-in the industry details, company size and the location have to be decided; Operating variables which includes technology, user or nonuser status, customer capabilities in the buying process have to be worked upon; Purchasing approaches – The way the customer approaches while buying the industrial goods, Situational factors- like size of the order, urgency; and Personal characteristics – buyer-seller similarity relationship, loyalty between the firm and the customers and attitude towards risk are chief parameters while segmenting.. These are the important bases for segmenting the market in case of industrial or business buyers. Selecting one or more of the market segments, which yields better returns at minimum cost and improved profits, is known as the process of targeting. The firm could use certain patterns for targeting such as single-segment concentration, selective specialization, product specialization, market specialization and full market coverage. Positioning is what you do to the minds of the consumers. The various differentiating or positioning categories will be product, services, personnel, channel and image. Different positioning strategies adopted could be attribute positioning, benefit positioning, application, user, competitor positioning, price positioning and product-category positioning. 3)Some of the patterns for market coverage are based on the segment’s overall attractiveness and firm’s objectives and resources. In Single segment concentration – the company selects just one single segment, which implies a product in a single market. In selective specialization – the firm selects certain segments, which are supposed to be lucrative, and which are more attractive. Product specialization – The firm focuses on a single product in all the available market to spread the business risk. Market specialization – the firm constitutes on serving a certain focused market with the acceptability of various products. Full Market coverage – The firm attempts to serve all the markets and all the products considering the whole market as one globe. References – Advertising Management, Edited by R. Batra, J. G. Myers, and D. A. Aaker. New Delhi: Prentic, 1999. Marketing Management, Edited by P. Kotler. New Delhi: Prentice, 2000. Marketing Management: Planning, Implementation and Control, Edited by V. S. Ramaswamy and S. Namakumari. Delhi: Macmillan, 2004. Retail Marketing Management, Edited by D. Gilbert. New Delhi: Pearson, 2003.               

Ideology ; Discourse

Ideology, what is that? There are hundred answers and none of them is right or wrong. Most of ideology definitions are not compatible with each other, but I have found one that I like the most: An  ideology  is a set of  ideas  that constitute one's goals,  expectations, and  actions. An ideology is a comprehensive vision, a way of looking at things as in several  philosophical  tendencies, or a set of ideas proposed by the dominant class of a society to all members of this society. Ideologies are systems of abstract thought applied to public matters and thus make this concept central to politics.Implicitly every political or economic tendency entails an ideology whether or not it is propounded as an explicit system of thought. 1 So ideology is a system of conceptualized views and ides, expressing the interests of different social classes, groups and societies, to evaluate relationships between people and reality, as well as authorized on a community form of dominatio n and power (conservative ideology) or settle their transformation (radical, revolutionary ideology). It`s not a science, but it includes scientific knowledge of social and politic life, as well as assessing it.Good example of bad ideology was Nazi in Germany, when Hitler wanted to â€Å"clean† the Aryan race from â€Å"sub-human† – Jews, Gypsies, homosexuals and handicapped people who were at the bottom of racial hierarchy by Nazi studies. Now let`s move on discourse. What is that? Discourse is the term that describes written and spoken  communications; the â€Å"language in the language,† a certain vocabulary, semantics, pragmatics and syntax, manifesting itself in actual communicative acts, speeches and texts. â€Å"Discourse constitutes the social.Three dimensions of the social are distinguished – knowledge, social relations, and social identity – and these correspond respectively to three major functions of language †¦ Discourse is shaped by relations of power, and invested ideologies. † (Fairclough 1992:8). 2 Example: Discourses are seen to affect our views on all things; it is not possible to avoid discourse. For example, two notably distinct discourses can be used about various  guerrilla  movements describing them either as â€Å"freedom fighters† or â€Å"terrorists†.In other words, the chosen discourse provides the vocabulary, expressions and perhaps also the  style  needed to communicate. 3 So how ideology and discourse works together? Actually they both are inextricably connected to each other, because both are elements of human thoughts and communication. Some people say that ideology affect discourse, other say that discourse is used as a way to deliver an ideology. 4It`s very important to remember that when analyzing media texts, because the interpretation of the text will depend on person who wrote it and his opinion on the subject and the person who is reading it. F or example some political articles in newspapers in the UK have political alignments, some support Labours, some support Democrats. So when one of the parties wants to write a press release or something their ideological discourse will be organized by a general strategy of positive self-presentation (boasting) and negative other-presentation (derogation).This strategy may operate at all levels, generally in such a way that our good things are emphasized and our bad things de-emphasized, and the opposite for the Others—whose bad things will be enhanced, and whose good things will be mitigated, hidden or forgotten.

Tuesday, July 30, 2019

A Killer Marketing Plan Essay

If you are the founder of a new startup or an existing business it’s highly recommended that you develop a roadmap that will get you from where you are today to where you want to be tomorrow, six months from now, or a year or longer down the road. The roadmap is a guide to help you overcome roadblocks, prevent costly mistakes and eliminate time-consuming detours that can prevent you from attaining your goals, and reaching your ultimate destination. We typically refer to this roadmap as a marketing plan. A marketing plan should be a formal written document, not recalled from memory or something scribbled on a napkin. To take your business to the next level requires preparing a written marketing action plan. There are 12 recognized marketing planning models in use today. The Top 5 most popular marketing planning models include: * 7 P’s Marketing Matrix – The seven elements of the marketing mix: Product, Price, Place, Promotion, People, Process and Physical evidence , form the core tactical components (see below) of the marketing plan. * Segmentation, Targeting and Positioning – This three stage process involves analysing which distinct customer groups exist and which segment the product best suits before implementing the communications strategy tailored for the chosen target group. * SOSTAC ® – This acronym stands for Situation, Objectives, Strategy, Tactics, Actions and Control and is a very popular classic marketing planning framework for creating marketing plans. SOSTAC is more comprehensive and borrows elements of several of the other popular marketing planning models. * Ansoff’s Growth Strategy Matrix – Ansoff’s Growth Strategy Matrix identifies alternative growth strategies by looking at present and potential products in current and future markets. The four growth strategies include: market penetration, market development, product development and diversification. * Porter’s Five Forces – In a blog post dated November 21, 2011, I covered Michael E. Porter’s Five Forces marketing planning model. The Five Forces are Rivalry, Supplier Power, Threat of Substitutes, Buyer Power and Barriers to Entry and are used to analyse the industry context in which the organisation operates. Porter’s Five Forces are required reading in any graduate course on Marketing or Strategic Planning. For my money, the SOSTAC ® marketing planning model is the model I use the most when developing marketing plans. First, let’s begin by defining what SOSTAC is: What is SOSTAC ®? SOSTAC ® is a marketing planning model, originally developed in the 1990s to help with marketing planning by PR Smith, who together with Dave Chaffey co-authored Emarketing Excellence. SOSTAC ® stands for: * Situation – where are we now? * Objectives – where do we want to be? * Strategy – how do we get there? * Tactics – how exactly do we get there? * Action – what is our plan? * Control – did we get there? SOSTAC has been used to develop marketing plans for a broad range of industries. Here’s how SOSTAC is used to summarise the main issues to consider within a digital marketing strategy: You can see it gives a logical order for tackling your plan (with iterations) and a great way to summarise the main elements of each. Why is SOSTAC ® useful? SOSTAC ® has become very popular since it’s simple, easy to remember and covers all the main issues which you need in a marketing plan or business plan. Tips for using SOSTAC ®Ã‚  Here are some tips on how to use SOSTAC ® based on Chaffey’s experience applying the model in companies and in academia. 1. Use SOSTAC ® to review your process – Before looking at how you apply SOSTAC ® at each step to create a marketing plan, use it to review your planning process and how you manage your marketing. Ask yourself what you and your organisation are good at. Maybe you spend too much or too little time reviewing the situation. Perhaps you’re not so good at setting SMART objectives, or developing strategies to support them or the control stage of assessing how effective your strategies and tactics are and adjusting them? 2. Get the balance right across SOSTAC ® – Oftentimes, there is too much time spent on analysis within a plan and not enough on setting the strategies. So as a rule of  thumb, this is how your balance of content could look: Situation Analysis (20%), Objectives (5%), Strategy (45%) and Tactics (30%) = 100% 3. Summarise your Situation in a SWOT Analysis – To give focus to your situation analysis it is recommended that you utilize this form of SWOT analysis. This helps integrate SWOT with strategy. I also recommend that you read my blog post dated November 29, 2011 on how to prepare a SWOT analysis to plan for the future of your company. 4. Make your goals SMART and link them to your analytics/control process – Since digital marketing is so measurable, it makes sense to be specific as possible about your goals by developing a funnel conversion model. You should also setup specific goals in Google Analytics. But it’s worth thinking about the full range of goals indicated by the 5Ss. 5. Integrate the different elements of your SWOT Analysis – Oftentimes in a plan or report there isn’t good flow relating sections. To help this I recommend summarising your entire SOSTAC ® plan within a table. It’s important to note that a marketing plan can be for a product (the iPhone), a series of similar products (e.g. mobile devices) or an all-encompasing plan for a company. General Rules For Creating A Killer Marketing Plan There is no shortage of general rules for developing marketing plans, but if you want to create a killer marketing plan I have found that the following general rules work the best: * Stay focused – Don’t try to â€Å"boil the ocean† by going overboard or overstate the case with too many ideas, products or services. Know what your core business is going to be. Focus on one product or service at a time. * Where Are You Today – You must know where you are today in order to develop a roadmap to where you want to be in the future. * Keep Things Simple – Less is better. Avoid long sentences. Be brief. Avoid geeky tech terminology and acronyms. Use bullet points. Embellish with graphs, charts and images. * Be Realistic – Set realistic and measurable goals. Don’t try to conquer the world. Set goals that you can reasonably accomplish. * Know Your Strengths and Weaknesses – Take an inventory of your individual and management teams strengt hs and weaknesses. * Do Your Homework – Before you do anything do your research. Know your market, your ideal customers, market niches, your competitors, latest trends,  barriers-to-entry, methods of opeation, distribution channels, pricing models, and promotions and advertising methods used in the industry. The Key Steps To Develop A Killer Marketing Plan Using SOSTAC ® For large corporations it is not too unusual to see 100 page marketing plans. For a small startup, a marketing plan should be between 10-15 pages in length including graphs, charts and tables. The Apple iPhone launch marketing strategy provided above is a great example. Before you start preparing your marketing plan make sure that you have completed sufficient market research to determine if your idea, product or service is viable given all that you know about the marketplace you are entering. Situational Analysis – Where are we now? This is where you take inventory of where you are right now. I recommend that you conduct your market research before you prepare your marketing plan. The Situational Analysis should include the following: * Product or Service – Describe the product or service in simple terms. Describe the market need filled or problem your product or service solves. Identify the total value proposition your produce or service offers customers. * Market and Competition – Describe the type, size and geographic location of the market in which your product or service will compete, competitive landscape including the number of competitors, major competitors, direct competitors, market shares, market niches, stage of development and market trends. * Target Customers – Identify the individuals or organizations (â€Å"target market†) and customer segments you are targeting. In some cases, you may have more than one target market. Determine the following: * Who needs your product or service and why? * What is the profile of your ideal customer and what are their attributes? * How many potential customers are there? * How many different customer niches are there? * Is the target market or market niches underserved? * Describe your customers by their shared characteristics for individuals and organizations. * Individuals – Describe them by demographics: age, income, geographic location, and lifestyle. * Organizations – Describe them by number of employees, sales, geographic location,  and industry. * SWOT Analysis – Identify your competitive strengths and weaknesses, business opportunities and potential threats. Arrange your strengths, weaknesses, opportunities and threats into a four-quadrant grid like the one below: The purpose of a SWOT Analysis is to help you build on your business’ strengths, minimize and correct the weaknesses, and take the greatest possible advantage of potential opportunities while formulating a plan to deal with potential threats. Think of a SWOT Analysis as a checkup for your business. Be honest with yourself, if you lack a strong marketing and sales team, list it as a weakness. I also recommend that you read my blog post datedNovember 29, 2011 on how to prepare a SWOT analysis to plan for the future of your company. * Management Team – List the key members of your present management team and very brief description of their business and industry experience and education. If you believe you will need to add key individuals to the management team list their position, title and duties. * Milestones Accomplished – Elaborate on significant milestones that have accomplished to date. Include major new customers, revenues, no of unique visitors, downloads, new patents, major personnel additions and awards. Objectives – Where do you want to be? * Goals and Objectives – Set realistic goals and objectives. Make sure your goals and objectives are measureable and achievable. Measure them against your own efforts and abilities, not your competitors. There are two types of goals and objectives: * Quantitative – Those with specific, measurable results and numbers. * Qualitative – Those that increase value, like improving image or visibility. Strategy – How do we get there? Your marketing strategies answer the big question: HOW do you get from where you are today to where you want to be tomorrow? Be creative and brainstorm with your team. Don’t think in terms of what other organizations or individuals have done, but how you are going to get it done. Your marketing strategies should include the following: * Core Marketing Message – Your core marketing message is a short description of your business, products and services, employees, core values, business philosophy, mission and value proposition you bring to the customer  relationship. Your core message should project what makes you unique and be conveyed in a manner that instantly connects with your ideal customers. * Define Your Brand – Your brand isn’t just your corporate identity like your logo, tag line, motto or its visual associations such as unique design, colors or packaging, but the relationship you have with your customers. Your brand’s value proposition in cludes everything you have promised your customers: quality products, great prices, better selection, great service, more locations, moneyback guarantee, free delivery, etc. * Positioning Statement – How you intend to position your company in the marketplace. Will you compete on the basis of differentiation (e.g. technology leader, quality, durability, broad selection, etc.), target a specific market niche (e.g. Affluent, professionals, SMB’s, management, etc) or compete on the basis of price (e.g. luxury, premium, medium, bargain or low price). Explain why you have chosen this particular market position. * Business Model – According to Peter Drucker, the late Harvard management guru, â€Å"A business model is nothing else than a representation of how an organization makes (or intends to make) money.† But, a business model is far more than this. Mark W. Johnson, the Harvard professor and author of â€Å"Seizing The White Space,† says that a business model consists of three components: 1) It identifies an important job a customer needs to get done and then proposing an offering that fulfills that job better than any alternative the customer can turn to–in short, the customer value proposition (CVP), 2) A pricing model and profit formula that shows quantitatively that you can make a profit delivering on the CVP, and 3) You can identify which company resources and which processes are essential to delivering the CVP. To develop your business model I highly recommend that you read my blog post dated November 5, 2011, January 26, 2012, and February 26, 2012. * Pricing Model – Describe the methodology you will use to set prices for your products and services. Prices should reflect competitive factors, economic conditions, nature of the market and how you intend to position yourself in the marketplace. Pricing should take into account fixed and variable costs associated with each product or service, so that you can generate a sufficient gross profit. Prices and profit margins should be determined by distribution channel. Describe if you will use different price levels depending on quantities ordered and type of customer. * Launch Strategy  Ã¢â‚¬â€œ Describe your go-to-market strategy for your product or service. Describe when, the method used to announce your market entry, and how you will manage your market entry during the first 30-to-90 days. * Distribution Strategy – Describe the distribution channels you will utilize to get your product or service to your target market (e.g. direct-to-consumer, ecommerce, retail stores, dealers and distributors, infomercials, mail order catalog, direct mail, email, etc.) and specific reasons you are using each channel. * Sales Strategy – Describe who is actually going to sell your product or service. Will you be using inside sales personnel, inbound or outbound sales personnel, outside sales personnel, manufacturer’s representatives, independent salespeople or network marketing personnel. * Advertising and Promotions Strategy – Determine what media channels you will use to market and promote your products and services to your target market (e.g. print ads, television, radio, direct marketing, ecommerce, social media and events). The types of media channels you will use will depend on your unique requirements, budget constraints, and practices within your industry. * Public Relations Strategy – Describe the methods you will utilize to inform, communicate and educate your public (e.g. customers, media, vendors, academia) about your company and its products and services. * Strategic Alliances – Describe the nature and type of third-party alliances you anticipated will be needed in order to compete effectively in the marketplace. * Word-of-Mouth – Describe how and the methods you will utilize to create word-of-mouth. A few final pointers about developing marketing strategies: * Think strategic first – Too many individuals believe that the marketing tactics — the newsletters, press kits, trade shows, banners, 800-numbers, display advertisements, logos and giveaways — comes before the marketing strategies. Those promotional, publicity and advertising tactics should be contained within a well-orchestrated marketing action plan. But first create your marketing strategy items that will generate leads, build awareness and enhance credibility. * Make the first the last. The executive summary consists of a one-page, top-level summary of the entire marketing plan. It’s placed at the front of the document, but it’s the last thing you’ll write. Its purpose is to convey the gist of the plan to stakeholders,  investors and anyone else who needs to know these facts in a hurry: * The scope of the plan in an outlined paragraph. * The product or service being marketed. * For whom the plan is being prepared. * The time period the plan covers. * The geographic area where the implementation occurs. * The strategic messages and the tactics to get them to the target markets. Tactics – How exactly do we get there This is where you list the specific action steps or programs to achieve each marketing strategy (see above). If you are going to use billboards to advertise your product, indicate the name of the outdoor advertising company, the number of billboards, their geographic locations, cost per billboard and total amount. If you will be conducting focus groups to conduct market research and get feedback about your product, indicate the name of the research firm, dates focus groups will be conducted, cost per focus group and total amount. You should include deadlines and key dates for executing all of your marketing activities. * Media Tactics – If you will invest in different types of media to communicate your core marketing message and product or service offering divide your media into paid, non-paid and non-traditional media. * Paid media: direct mail, newspaper, radio, TV, billboards, direct sales. * Non-paid media – Referred to as public relations because it is exposure through traditional media without paying for advertising in that media. * Non-traditional media: includes everything else — sponsorships, ad specialties,shows/events, electronic media and the Internet. Action – What is our plan? Your business model is the one piece of the marketing plan that puts it all together for you. In a blog post dated February 6. 2012, Floodgate Fund co-founder Ann Muira-Ko says, â€Å"Its the business model that matters the most, rather than the business plan.† According to Miura-Ko, business models do a better job of unearthing assumptions about a company’s users, customers, pricing, demand creation, sales channels, supply chain, and overall logistics – all critical components to building a successful business. A business model answers all the 4 W’s (Who, What, Where and  Why) and the all important How you are going to do it as it relates to the following: * Core marketing message. * Components of your brand identity. * Customer value proposition (CVP). * Industry or market. * Target customers. * Competitive landscape. * Industry life cycles. * Pricing model. * Value chain. * Operations. According to Peter Drucker, the late Harvard management guru said. â€Å"A business model is nothing else than a representation of how an organization makes (or intends to make) money.† But, a business model is far more than this. Mark W. Johnson, the Harvard professor and author of â€Å"Seizing The White Space,† says that a business model consists of three components: 1. It identifies an important job a customer needs to get done and then proposes an offering that fulfills that job better than any alternative the customer can turn to–in short, the customer value proposition (CVP). 2. A pricing model and profit formula that shows quantitatively that you can make a profit delivering on the CVP. 3. identifying which company resources and which processes are essential to delivering the CVP. Use the Business Model Canvas (see below) to guide you in the preparation of your business model provides the answers to the four W’s and the How. The business model canv as is divided into nine grids: * Strategic partners. * Key activities. * Value proposition. * Customer relationship. * Customer segment. * Key resources. * Distribution channels. * Costs. * Revenues. The Business Model Canvas (Click Image To Enlarge) To develop your business model I highly recommend that you read my previous blog posts dated November 5, 2011, January 26, 2012, and February 26, 2012. Control – Did we get there? Establishing a marketing budget allows you to establish quantitative goal and measure actual performance against those goals. Here’s how a marketing budget can help assist you manage, control and measure the return-on-investment (ROI) from the execution of your marketing plan: * Marketing budgets allow you to put a quantitative value to every strategy, tactic or program built into your marketing plan. * Marketing budgets allow you to establish specific budget line items, including sales and related marketing expenses. * Marketing budgets allow you to evaluate and make the best marketing decisions. * Marketing budgets place a cap on every budget line item forcing you to work within those budget constraints. Having a marketing budget in place allows you to evaluate marketing decisions such as advertising in the yellow pages, hiring sales reps or conducting a PR program based on the amount of business a particular initiative generates. Track each initiative and evaluate what worked, what didn’t. Marketing budgets should be established by month, quarter and year so that you can gauge your performance and make adjustments to insure you are within budget. This allows you to determine if you are meeting your stated quantitative goals monthly, quarterly and yearly. Sample Marketing Plan Budget Here’s an excellent of an annual marketing plan budget for a software business: Click Image To Enlarge Apple’s iPhone Launch Marketing Strategy Analysis Example Here’s a great example of the Apple iPhone launch marketing strategy by Borislav Kilprin: Apple’s iPhone Launch Marketing Strategy Analysis View more documents from Borislav Kiprin I often use Steve Jobs’ â€Å"Digital Hub Strategy† (see my blog posts dated August 31, 2011 and January 20, 2012) for inspiration and as a great  example of a grand vision and all-encompasing marketing strategy for a company. On January 9, 2001, Steve Jobs gave a great presentation at MacWorld where he introduced the public to the concept of the Digital Hub, when he said that the PC was not dead, but was evolving. Steve Jobs declared that the Mac would become â€Å"the digital hub for the digital lifestyle,† an emerging digital trend driven by the internet and an explosion in digital devices: digital camera’s, videocam’s, portable music players, PDA’s and DVD video players. Steve’s idea was to use the Mac as a way to add value to those devices by making them more useful by allowing users to share digital files and be able to combine text, images, video and sound to heighten the overal digital experience. Steve Jobs’ 7 Success Principles When you stop and analyze the Digital Hub Strategy you will discover that Steve Jobs’ 7 Success Principles are evident everywhere: * Do what you love. Steve Jobs once told a group of employees, â€Å"People with passion can change the world for the better.† Jobs has followed his heart his entire life and that passion, he says, has made all the difference. It’s very difficult to come up with new, creative, and novel ideas unless you are passionate about moving society forward. * Put a dent in the universe. Passion fuels the rocket, but vision directs the rocket to its ultimate destination. In 1976, when Jobs and Steve Wozniak co-founded Apple, Jobs’ vision was to put a computer in the hands of everyday people. In 1979, Jobs saw an early and crude graphical user interface being demonstrated at the Xerox research facility in Palo Alto, California. He knew immediately that the technology would make computers appealing to â€Å"everyday people.† That tec hnology eventually became The Macintosh, which changed everything about the way we interact with computers. Xerox scientists didn’t realize its potential because their â€Å"vision† was limited to making new copiers. Two people can see the exactly the same thing, but perceive it differently based on their vision. * Kick start your brain. Steve Jobs once said â€Å"Creativity is connecting things.† Connecting things means seeking inspiration from other industries. At various times, Jobs has found inspiration in a phone book, Zen meditation, visiting India, a food processor at Macy’s, or The Four Seasons hotel chain. Jobs doesn’t â€Å"steal† ideas as much as he uses ideas from other industries to inspire his  own creativity. * Sell dreams, not products. To Steve Jobs, people who buy Apple products are not â€Å"consumers.† They are people with hopes, dreams and ambitions. He builds products to help people achieve their dreams. He once said, â€Å"some people think you’ve got to be crazy to buy a Mac, but in that craziness we see gen ius.† How do you see your customers? Help them unleash their inner genius and you’ll win over their hearts and minds. * Say no to 1,000 things. Steve Jobs once said, â€Å"I’m as proud of what we don’t do as I am of what we do.† He is committed to building products with simple, uncluttered design. And that commitment extends beyond products. From the design of the iPod to the iPad, from the packaging of Apple’s products, to the functionality of the Web site, in Apple’s world, innovation means eliminating the unnecessary so that the necessary may speak. * Create insanely great experiences. The Apple store has become the world’s best retailer by introducing simple innovations any business can adopt to create deeper, more emotional connections with their customers. For example, there are no cashiers in an Apple store. There are experts, consultants, even geniuses, but no cashiers. Why? Because Apple is not in the business of moving boxes; they are in the business of enriching lives. Big difference. * Master the message. Steve Jobs is the world’s greatest corporate storyteller, turning product launches into an art form. You can have the most innovative idea in the world, but if you can’t get people excited about it, it doesn’t matter. Apple’s Five Key Pillars For Product Success When you dig down into the roots of the Digital Hub Strategy it is all about the product. I have identified five key elements or pillars of strength that have been important in Apple’s product successes: * Creating products that disrupt existing industry paradigms. * Creating products that Apple engineers themselves would love to use. * Creating products that customers don’t know they need yet. * Creating elegant, simple and minimalist products that â€Å"people will lust for.† * Controlling every aspect of the product, including the design, engineering, intellectual property, components, operating systems, applications software, manufacturing, distribution, customer service, advertising and pricing. The Digital Hub Strategy has endured the test of time and every new product  launched by Apple represents a â€Å"spoke† in the Digital Hub. In essence, the Digital Hub Strategy has not only become Apple’s core business strategy, but also its grand vi sion.

Monday, July 29, 2019

Market-based or Government control Issues surrounding ObamaCare Research Paper

Market-based or Government control Issues surrounding ObamaCare - Research Paper Example Critics labeled PPACA as ?bamaCareto differentiate it from other alternative solutions to America's diverse healthcare problems, such as a fully nationalized healthcare system and improving the current market-based healthcare system (Shi & Singh, 2007, p.ix). This paper seeks to explore the issues surrounding PPACA. A number of authors argued against PPCA, because they assert that it is a socialist intervention that does not fit the market-run socio-economic model of modern society and it is a costly and unconstitutional infringement on individual choices and corporate rights. ObamaCare is fundamentally socialist and does not fit into the market-run socio-economic model of modern society. Williamson (2011) described PPACA as ?ocialist,because it is based on a ?entral planning model,with socialist features of ?ncome-redistribution, economic leveling, the co-opting and nationalization of private enterprises, and the elevation of an elite planning class(p.237). He did not believe that a socialist model can resolve the underlying issues of high medical and insurance costs in the nation, and for him, it will only replicate the 1970s British healthcare issues of poor implementation and poor results. Sultz and Young (2008) highlighted the characteristics of American healthcare that evade an effective socialization process. First, the healthcare system is too large to be managed by the state alone: ?he U.S. health care system is the world's eight largest economy, second to that of France, and is larger than the total economy of Italy(p.xvii). Second, the healthcare system is too complex, because of its labor-intensive levels and the changing, varied roles of healthcare professionals and employees who interact with evolving medical technology and patient preferences (Sultz & Young, 2008, p.xvii). Sultz and Young (2008) argued that the size and complexity of the American healthcare system shaped problems of limited health care access, inconsistent quality, and increasing costs (p.xviii).They stressed that nowadays, the system is more driven by the market than state policies, which only reflects underlying socio-economic paradigms, and so a socialist response to it will not be effective. Shi and Singh (2007) even described the healthcare system as not a system, because it is enormously fragmented. It is ?ragmented because different people obtain health care through different means(p.2). Since it is not even a system, a socialist system will also not work to improve access to it, as well as reduce costs and inequalities. Several sources asserted that Obamacare will not resolve the American healthcare system's weaknesses, because it takes away individual choices through strong government interventions. Atlas (2010) argued that ObamaCare is flawed, because it predominantly eliminates individual choices by enforcing state control. He stressed that ?bamaCare... audaciously [imposes] a strong-armed federal government onto perhaps the most personal of all segments of American life(p.2). He believed that ObamaCare will only reduce individual choices and he hinted that this may have an impact on the ?uperior medical carethat Americans can access now (p.2). Shi and Singh (2007) also did not agree with ObamaCare, because it manifests the growing government control over people's lives. They stressed that around fifty percent of the American public opposed ObamaCare, becaus

Sunday, July 28, 2019

Should minors who commit violent crimes be tried as adults Research Paper - 1

Should minors who commit violent crimes be tried as adults - Research Paper Example Has there been a day that a war was crucial in the reputation of a nation and the adults did not reach a decision to give them weapons? This is a clear line drawn between the adults and minors, why then should we conclude that this case is different and this minor deserves equal treatment as adults and be locked away in prisons with the grownups (Bernard, 2010). For years now, history has come to the defense of the minors, nations that have attempted to recruit children in warfare have had the leaders tried or sanctioned. This case has also cut across decades where children have had to face the juvenile system. Why then change this after having proven productive for ages. Currently, the status of this dilemma stipulates that they should be tried separately although there are lawmakers who insist otherwise. Research conducted recently has demonstrated that transfer of minors from the juvenile courts to adult courts has not reached the goal of lowering recidivism, on the contrary, it aggravates the situation by making the crimes increase. The minors have always positioned minors for redemption and reform. Juvenile detention facilities possess the same programs implemented to assist in the reformation process unlike the prisons (Bernard, 2010). Trying them as adults would hurt the economy, some of the verdicts would mean life imprisonments, what good does this do where they feed and pay salary to wardens for their entire life whereas the juvenile facilities would have reformed them and brought them back to the society to be beneficial to entire economy. Minors introduced to the prison system have their social lives terminated and altered to a direction that would otherwise not have been acquired if it were for the juvenile facility. Basically, it is unethical to see children as young as 13 undergo the same hard task and punishment as the seniors, prisons are not friendly places

Saturday, July 27, 2019

Comunication Essay Example | Topics and Well Written Essays - 250 words

Comunication - Essay Example It is also advisable for one to look people directly in the eye when communicating. Eye contacts in communication convey truth as well as honor. It is also good to ask questions before ending a conversation so as to clarify on some points that were not clear. Writing things down is also part of communication; writing helps one to remember a lot. Additionally, it is advisable for one to read whole messages or mails in order to avoid concluding things in the wrong way. Health care environment is associated with diverse communication between health care practitioners and patients as well as patients and nurses. As a result of this, effective communication is crucial. Team collaboration is also paramount to all activities that take place within a health-center. In most occasions, lack of communication results to medical errors; unfortunately, medical errors are a pervasive problem in many health care organizations (Finkelman, 2012). The errors are also the main causing agents for the deaths in healthcare organizations. Since medical education advocates error-free practices, it is crucial for health care professionals to be good in communication as well as to have good communication

Friday, July 26, 2019

MBA Strategic Analysis and Choice Research Paper

MBA Strategic Analysis and Choice - Research Paper Example This study is initiated to investigate and analyse Tesco strategic resources, environment, choices and action while defining the company's reaction should it discover that a competitor is competing on the basis of the BCG growth Matrix. The study first of all scans the market environment, then using Porters Five forces framework, Porters generic strategy, the SWOT matrix and the core competences and capabilities of Hamel and Prahalad, the study analysis Tesco in order to identify those invisible taken for granted assumptions, capabilities and resources that competitors have found difficult to emulate. The study made three important findings. Firstly, Tesco unlike the competitors is focused on cost leadership, generic focus and product differentiation. This has become part of the company's culture. To the company lower cost does not mean lower quality. Secondly, as a company's reaction to a competitor using the BCG growth matrix, the company's management emphasizes on its core values, lay emphasis on product differentiation and lower cost; that is using the cash cows and stars to reduce the company's question marks. Also, it has been argued in this paper that, the company should enter into exclusive long term relationship with suppliers, co-branding with celebrity, artist and designers to create a unique product. It should be so, because taking a lead of innovation might mean innovation in branding, innovation in product variation and innovation in other formats. Introduction Today, business environment has become more turbulent, chaotic and challenging than ever before. In the present phase of events, to survive it is vital that a firm does something better than its competitors (Wonglimpiyarat 2004). Globalisation has not only altered the nature and the intensity of competition but has dictated and shaped organisations in terms of what consumers want, how and when they want it and what they are prepared to pay for it (Hagan 1996). In the context of today's global competition, businesses and firms no-longer compete as individual companies but try to corporate with other businesses in their activities (Wu & Chien 2007). These researchers further argue that, this strategy is now quite common in many businesses including the retail chain stores. In the retail chain stores, the conventional vertical integrated company based business model is gradually being replaced by collaborative relationship between many fragmented, but complementary and specialized value stars and constellation (Wu & Chien 2007). Having said this, the remaining parts of the paper will be structured as follow. The next section provides an introduction to the company under case study. There after, the purpose of the study will be defined. Using certain analytical techniques,

Thursday, July 25, 2019

The Orthodox Jews Total Way of Life Research Paper

The Orthodox Jews Total Way of Life - Research Paper Example Also known as erub or eiruv, an eruv is an enclosure in which Orthodox Jews can push or carry objects on the Sabbath, to escape the violation of the Jewish Law which prohibits carrying things except within the home setting.   An eruv, therefore, serves the purpose of a home, and in it, things such as house keys, nappies, prams, crutches, food and beverage, extra clothes essential medicines and handkerchiefs may be carried. Differing Interpretations of Eiruv among the Different Jewish Denominations. On the one hand, Orthodox Jews accept the use of an eiruv to serve as a house, to cushion them from contravening the Jewish Sabbath Law. Reformed Jews on the other Reformed Jews do not regard an eruv as an unnecessary mechanism which encourages separateness and works against assimilation (Diamond, 490). Taboos in Orthodox Judaism emanate from the Torah and the oral interpretation of the Torah and the codification of the Torah [the Talmud and Mishna].   These laws in the Torah became th e total way of life for Orthodox Jews. Again, the same laws became a total way of life for Orthodox Jews because they were believed to have originated from God, through Moses, as is shown in the Torah. In respect to the foregoing, all food taken by Orthodox Jews must be kosher, meaning, proper for consumption. For instance, Orthodox Jews may neither take milk and beef nor cheeseburger because of their observation to Deuteronomy 14:21 and Exodus 23:19. These taboos cover the Orthodox Jew’s total way of life and therefore govern even business dealings.  

Role Of Vision In Managing Change Essay Example | Topics and Well Written Essays - 500 words

Role Of Vision In Managing Change - Essay Example A vision is a realistic, credible and attractive plan for the future of an organization. A vi sion describes a set of ideals and priorities depicting a picture of the future that makes the company special and unique. A vision defines a core set of principles by which the company abides in order to achieve success. A clear vision today is indispensable for organizational success.† How could any group or individual strive toward greatness and mastery without a vision? That's exactly the point. They can't. They can maintain they can survive; but they can't expect to achieve greatness†. (Mapes 1991) . A clear vision attracts commitment and energizes people; the motivational effect of vision. Vision generates enthusiasm about the course the organization intends to follow and the change it is implementing and increases the commitment to work toward adapting to the change effectively. It gives a meaning to the change. A vision allows people to accept the challenge and move on an d get better. It establishes a higher standard of excellence. Considering the example of a bank where the old hand written trend of file making and documenting is replaced by modern technology and computers, a vision serves a very important function in establishing a standard for mastering the change. A clear vision bridges the present and the future. The right vision takes the organization out of the present, and focuses it on the future. A good vision orients the workers on the future, and provides positive direction to the change. .Without a vision, the organization will have difficulty understanding and cooperating with the new plans and procedures. A vision is a road map on which, it has to be identified where the organization is currently and where it wants to be, in the future. A clear vision is critical for any project. It addresses the overarching goals of the initiative and is relevant and meaningful to all people being affected by the change. A clear vision enables to ach ieve a consistency of beliefs and actions among those responsible for implementing the change.

Wednesday, July 24, 2019

Impacts of a Borderless Society Essay Example | Topics and Well Written Essays - 1000 words

Impacts of a Borderless Society - Essay Example This is possible because of the borderless society that we are living in today. Although a borderless society makes it possible to access products all year round globally, it also has some negative impacts from economic, social and environmental perspectives. A borderless society reduces the world into a global village where it is very likely that national identities and cultural values may be lost (Reimann, 2002). Market competition has now become very stiff as a result of the concept of a borderless society. Countries that have goods of low quality and unfavorable prices do not have the chance in the global market. Some countries have taken advantage of the borderless society, and utilize cheap labor that is available in other countries. For example, many Western companies have relocated to Asian countries to take advantage of the cheap labor in these countries and the operations cost are low (Laudon & Traver, 2013). Sirloin steak refers to the steak that is cut from the back of an animal. The name ‘ sirloin’ originated from England when a certain king after having the steak liked it so much that he decided to knight it. Many people probably would only say which grocery store their sirloin comes from opposed to the geographical area in which it was produced. Most of the beef that is consumed in the United States for instance originates from the U.S with only 8-20 % originating from foreign countries (Emel & Neo, 2013). American cattle ranchers have continued to show interest in sustainable beef production practices that have minimal adverse environmental, ecological and social impacts. Research has shown that the beef industry in America has made achievements in environmental sustainability by using less water, emitting less greenhouse gas and avoiding overgrazing. America only imports beef products that have met sustainability standards set by the Global Beef Trade. It can therefore be concluded that

Tuesday, July 23, 2019

Al-Qaeda in Southeast Asia Essay Example | Topics and Well Written Essays - 5000 words

Al-Qaeda in Southeast Asia - Essay Example Consistent with this fact, the term ‘Al Qaeda’ was not Christened by Osama bin Laden; rather, it was the United States intelligence agency CIA that referred to the Islamic activists led by bin Laden in this manner in the mid-1990s. Al Qaeda, translated from Arabic, literally means a â€Å"foundation or precept’. The term Jemaah Islamiyah, a terrorist outfit that has its roots in Southeast Asia is translatable into â€Å"Islamic community† (Shuja, 2006, p.447). Hence, the employment of terrorism is not an intrinsic aspect of these organizations. Terrorism is only a tactic that was adopted during the last decade or so, but there is nothing inevitable about it. This fact should be kept in mind by Australian security agencies, while drawing awareness campaigns and security measures, for far too often western intelligence tends to portray these Islamic groups to indulge in terrorist activities for terror’s sake. This is not true. The Jihadists’ ob jective is to defend their faith and their way of life, which they feel is threatened by the western cultural and military interventions in the Islamic world (and there is sufficient proof to support this assertion). To understand how Al Qaeda gained support in Southeast Asia, it is important to gain cognisance of its founding principle, i.e. Al Qaeda was founded on universal Islamic precepts of jihad and brotherhood. And the present wave of Islamic revivalism and the rise of Islamic fundamentalism in Southeast Asia originated during the 1970s.

Monday, July 22, 2019

Culture And Second Language Learning Essay Example for Free

Culture And Second Language Learning Essay Through the conduction of studies, it has been discovered that learning a second language, particularly in a situation where second language learning is given particular importance, requires an immersion into the lingua and cultural societies of the native speakers of the second language that is to be learned (Wan 44-45). This requirement is extremely important to be followed as the immersion on the societal components of the second language of the native speakers helps the learner to obtain more hands-on learning benefits when trying to acquire second language abilities (Wan 45). Literature Review Although numerous language specialists do conclude that culture and social groups exercise great influence on the acquisition of second language abilities, these specialists are still bound to not realize that the components that involve this situation are interconnected and are not distinct entities from each other (Wan 46). It is crucial to understand that learning a second language involves factors that cannot exist without the existence of other factors (Wan 47). Most recently, it has become a trend to become immersed in the culture of the native speakers of the second language through the use of the internet (Wan 47). Numerous second language learners browse the web in order to get immersed into the native speakers’ culture (Wan 47). Numerous second language learners can definitely learn through the utilization of this method as the web has got a lot of information from around the world to offer to the browsers (Wan 47). Methodology And Data Analysis Result of the surveys participated in by English language learner students: 3 1. Methodology: They have had difficulty forming friendships due to language barriers. Data Analysis: A little over 65 % of these people have had trouble forming friendships with English native speakers in the United States due to language differences. It is often uncomfortable to form a friendship with people whom you often encounter difficulty in conversing with. An interesting conversation turns sour when you have difficulty conversing with someone. The people who face this difficulty with English native speakers often become lonely while living in the United States if they are not able to find friends that share the same language as them. 2. Methodology: They have had difficulty achieving their academic goals than they would have if their instruction at school were conducted in their native language. Data Analysis: Although non-native speakers of English who are proficient in English are the only non-English speaker foreign students who are admitted for formal academic studies at schools in America, English proficient non-native English speakers also still encounter difficulty in their academic studies than they would have if the instruction was conducted in their own language. This is such the case as the mentioned students still are not used to the English language. These students most usually converse with their circle of influence in their native language, hence, this situation causes them to become awkward in utilizing the English language in their academic studies as well. The most objective advice that can be recommended from this situation is for the students to use the English language often even when conversing with non-native English speakers who form their circle of influence. Or, it would be better if these students would be able to find native English speaker friends who would be willing to practice conversing with 4 them in English on a regular basis. It would also be helpful for these students to practice sharpening their English language writing skills through regularly utilizing writing drills. 3. Methodology: Language barriers often make the students feel a longing to go home to their country. Data Analysis: Numerous students who experience difficulty learning English in the United States are usually not able to adjust to their social environment in the country. As a result they often feel that they are social outcasts and feel that they don’t belong in the community. Because of this situation that they may get into, they may become inclined to go back to their home country. 4. Methodology: Language barriers may have the tendency to make the students inculcate a lower self-esteem. Data Analysis: The students feel that they are not smart enough as they are not able to efficiently learn a second language. This dampens their spirits of good self-esteem. 5. Methodology: These students become the targets of discrimination pranks in the United States. Data Analysis: Numerous of these students become the victims of prank jokes just because of their limited English language abilities. They are seen as vulnerable group of people as they create a self-image of being dumb or â€Å"not smart enough† due to their limited English language abilities. 6. Methodology: These students become too dependent on an English proficient relative, family member or friend while in the United States. Data Analysis: This becomes the situation as the students may not even be able to convey simple information to strangers (e. g. , giving orders at a restaurant) due to their limited 5 English language abilities. The mentioned family member, relative or friend may eventually feel that these students are becoming a burden on them as time goes on. 7. Methodology: Numerous students are reluctant to learn English as a second language because they feel that learning it would cause them to somehow exhibit disloyalty to their own language and culture. Data Analysis: It now a common trend that people do somehow paint a picture on other people as being â€Å"colonially influenced† if they try to learn a second language. This causes these second language learners to become self-conscious when trying to learn a second language. If these people become too self-conscious to learn a second language, they may also give up the pursuance of a goal to move to another country and other goals that come with it. 8. Numerous people abandon their culture altogether and adapt the culture of the native speakers of the second language that they are learning. Learning a second language ultimately also causes one to get immersed in the culture in which that language belongs. Therefore, there are times that the culture of the learners gets totally abandoned as these learners try to learn a second language. This situation is sometimes viewed negatively by others. Results Learning a second language definitely has its ups and downs. The learners would just have to weigh in whether the advantages outweigh the disadvantages as a basis in making their decision to learn a second language. However, we can definitely see that as long as the teaching of the second language is executed properly, numerous students are able to learn the language efficiently and utilize their second language fluency in worthwhile activities and 6 and professions. Discussions Three questions need to be answered in order for specialists to improve second language teaching and learning (Conference Probes Second Language 1). These questions are the following (Conference Probes Second Language 1): 1. What are the strategies on research that need to be executed in the implementation of second language education in America (Conference Probes Second Language 1)? 2. What are the strategies on research on the execution of second language education in the United States that need to be improvised (Conference Probes Second Language 1)? 3. What are these research strategies that are deemed to be effective (Conference Probes Second Language 1)? Reading, writing and speaking fluency of a second language does not come automatically if one has acquired extensive knowledge on the language usage (Swiderski 4). A culture’s main foundation is the official language that comes with it (Swiderski 6). When one first learns a language, he/she automatically first learns its corresponding culture (Swiderski 6). A language mirrors its corresponding culture (Swiderski 6). However, the language and the culture are not exactly similar in every ways (Swiderski 6). Because when learning a language one learns all about its usage, its interconnected component, culture, is also being learned during the process of learning the language (Swiderski 6). Therefore, language and culture are still 7 Regarded as separate entities (Swiderski 6). We can really see that a language tells about what kind of culture it evolves in (Swiderski 13). For example, a classroom where an English language learning class is held comprises of styles and settings that tells about the culture of the country where the school that houses the classroom is located (Swiderski 13). Significant differences in the way that the English language is used among the native and non-native speakers of English are considerably noticeable (Lucas 59). However, there are some questions that arise from this conclusion (Lucas 73). These questions are the following (Lucas 73): 1. Do the students make requests to their professors directly or indirectly (Lucas 73)? 2. Is politeness evident in the way that the students make the requests (Lucas 73)? Conclusions Charles Hutchison, Lan Quach and Greg Wiggan wrote in their article entitled, â€Å"The Interface of Global Migrations, Local English Language Learning And Identity Transmutations Of The Immigrant Academician,† English language instructors who experience teaching students belonging to different cultures, experience the following culture shock situations: 1. Problems in differences in teaching and learning. 2. Problems in differences in curriculum and assessment. In the article entitled, â€Å"The Interface Of Global Migrations, Local English Language Learning And Identity Transmutations Of The Immigrant 8 Academician,† using the social-constructivist (and cognition) theories as references, instructors of English language classes experience changes in the way they view language through the following ways: 1. They may be forced to conform to the students and their circle of influences’ viewpoints and theories. 2. They may experience communication barriers. Furthermore, the authors state in the article that the English language instructors come to realize who they really are and their vocation objectives due to the following reasons: 1. They shape what types of people their students become and their students’ self-esteem. 2. They struggle in helping their students realize their own identity as a minority in the United States. 9 Works Cited Hutchison, Charles, Quach, Lan Wiggan, Greg. â€Å"The Interface of Global Migrations, Local English Language Learning And Identity Transmutations Of The Immigrant Academician. † Forum On Public Policy: A Journal Of The Oxford Round Table (2006). Lucas, Sigrun. â€Å"Students Writing Emails To Faculty: An Examination Of E-Politeness Among Native And Non-Native Speakers Of English. † Language, Learning Technology 11 (2007): 59, 73. Swiderski, Richard M. Teaching Language, Learning, Culture. Westport: Bergin Garvey, 1993. Wan, Shun. â€Å"Second Language Socialization In A Bilingual Chat Room: Global And Local Considerations. † Language, Learning Technology 8 (2004): 44-47. â€Å"Conference Probes Second Language Research Needs. † Reading Today August 2001.

Sunday, July 21, 2019

Chinese Medicine

Chinese Medicine Introduction For over 2000 years, traditional Chinese medicine was the only medical therapy consisting of various forms of  herbal medicine,acupuncture,massage,exercise, and dietary therapy for treatment illnesses. With the arrival of the missionaries from the west, a new form of medical therapy which based on treatment using chemicals and surgery was introduced to China in the 19th century. This not only provided an alternative medical treatment for Chinese, it also brought in scientific, social and political upheavals to China in the 19th and 20th century. Medical Services in 19th Century China The first western medical service was introduced to Macau, a Portuguese’s colony at the time, by Rev Robert Morrison1 (1782-1834) in 1820. Interestingly, one of his objectives of his effort was to find out whether Chinese traditional herbal medicine would offer no additional healing for the Westerners. In 1828, a Christian surgeon, Dr Thomas Colledge2 (1796 – 1879) opened a hospital in Guangzhou with his belief of Christians had a duty to treat the sick people of China. By 1835, Dr Colledge cooperated with Dr Peter Parker (1804 1888), a Protestant medical missionary and foreign Christian residents in Guangzhou formed the Medical Missionary Society of China. The new hospital appealed to the locals despite their suspicious altitude towards foreigners’ intention. By 1840, the hospital had provided over 9,000 treatments to the local patients. By 1892, over 60 hospitals and 40 dispensaries were established by the missionaries. There were over 120 male and female western medical personnel plus a corps of trained native assistants to provide services for these facilities. The hospital annual report of 1895 stated that over half a million patients were treated and over 70,000 operations were performed. Before the Opium War, the hospital provided access of the missionary opportunity to contact locals who otherwise were not permitted to preach in public and are restricted to reside at the â€Å"Thirteen Hong† at Guangzhou. Some patients considered allowing foreign doctors to treatment gave a favour them, some did not accept the religion of their doctors, however, many patients converted to Christianity. The introduction of western medicine also raised the Chinese women social status. It was Chinese social custom to restrict men and women contact at the time. Hence, female patients were reluctant to be treated by male doctors. The missionaries therefore had to bring in female doctors from the west to provide treatment to female patients. Dr Mary H. Fulton (1854 – 1927), a female missionary doctor was sent by the Foreign Missions Board of the Presbyterian Church to found the first medical college foe woman, Hackett Medical College for Women in Guangzhou in 1902. By 1915, the college had 60 students; all became Christians at the influence of Dr Fulton. The college achieved its aim to spread Christianity and western medicine, as well as women social status in the Chinese society. Medical Services in Hong Kong In Hong Kong, a British colony at the time, Tung Wah Hospital3 was established in 1870 which was the first hospital in China providing Chinese medicine services in western hospital mode. By 1887, the first teaching institution, the Hong Kong College of Medicine for Chinese (the predecessor of the Faculty of medicine of theUniversity of Hong Kong)was established by the London Missionary Society. The new institution not only introduced breakthrough in the research and development of western medicine in China, it also brought the first graduate, Dr SUN Yat-sen4 (1866 1925), a Christian himself who led the Chinese Revolution and toppled the Qing Dynasty, to establish the Republic of China in 1911, profoundly changes the history of China. The Opium War The introduction of western medicine in China also changed the history of China. Opium5 which was found to be a good remedy for nervous disorders and its sedative and tranquilizing properties was also introduced into China by western surgeons. However, opium was also used by the British Government to balance their trade deficit with China. They grew opium in British India and sold it to China for exchange of silver. When the Emperor Daoguang of Qing Dynasty banned the smoking and trading of opium in 1838, the British began the First Opium War with the beginning of annexation of Hong Kong, opened up of ports and a series of unfair treaties with the subsequent turmoil in China for over 100 years. Recognising the additive and social destructive nature of the opium smoking, the missionaries raised against the trading of opium both in their home countries and in China6. They also set up clinic to provide medical service to opium smokers to kick off their addiction, hence providing more op portunity for them to preach Christianity. Conclusion Western medicine went hands in hand with missionaries from the west to preach and convert local into Christians. By doing so, it also changed the history of China, opened up the horizons of Chinese people, turned imperial China into a republic and profoundly affect the world, with its effect still felt today. References Starr J Barton â€Å"The Legacy of Robert Morrison†, International Bulletin of Missionary Research, April 1998 Fu L, â€Å"The protestant medical missions to China: Dr Thomas Richardson Colledge (1796-1879) and the founding of the Macao Ophthalmic Hospital†, Journal of Medical Biography 3Tung Wah Hospital website http://www.tungwah.org.hk/?content=314 4Britannica http://global.britannica.com/EBchecked/topic/573697/Sun-Yat-sen 5Allingham V. Philip, â€Å"England and China: The Opium Wars, 1839-60†, Victorian Web, Lakehead University 6Kathleen L. Lodwick, â€Å"Crusaders against Opium: Protestant Missionaries in China, 1874-1917†,Lexington: University Press of Kentucky, 1996 SECTION B Question1 Introduction There were several outbreaks of plague in the history which include the 1984 plague outbreak in Hong Kong and the pneumonic plague outbreak in Manchuria in 1910 – 1911. The 1984 plague was also known as the â€Å"black death† due to the black coloring of whole body before or after death, which is later being identified as the bubonic plague. The pneumonic plague is unique in which it was exclusively pneumonic (infection of the lungs). Patients who are infected with the pneumonic plague will present with coughing, often with hemoptysis (coughing up blood), headache, weakness etc. Although both diseases caused outbreak, different control and measures were done by the local government at that period. Control and measures in Hong Kong in 1894 The plague outbreak in Hong Kong was mainly associated with the poor sanitation and dense population of Hong Kong at that period. In order to cope with the outbreak of plague the British government did several measures in order to prevent the spread of the disease and to prevent new cases from emerging. This included forced disinfection of affected houses, rapid disposal of corpses, building of the Blake Garden to reduce population density and house to house searches for infected people. The infected will then be isolated on the hospital ship – Hygeia. But due to the non-reluctant response of the Chinese population, patients were later transferred to Kennedy Town glassworks which was converted for use as a temporary hospital. The government later built a Bacteriology institute with the recruitment of a bacteriologist, Dr. William Hunter to Hong Kong for the investigation of the cause of outbreak. Control and measures in Manchuria in 1910 – 1911 During the pneumonic plague outbreak, the cause of the disease could not be identified. So it was agreed that no cure for the pneumonic plague was available by that time1: the mortality was proved to be one hundred percent. Without antibiotic at that period, the only way to prevent the spread of the disease was quarantine and isolation. The Chinese were isolated into train cars for several days. They were not let out until no one displaying any sign or symptoms of pneumonic plague. If one plague case was identified, others in the car would be considered to have a poor prognosis. Because the location of outbreak was close to Japan and Russia, there was collaboration between countries for the control of disease2. In need of medical help from Russia and Japan, the Chinese government at that period sought help by calling for an international plague conference. While the etiology of the pneumonic plague was still being investigated, isolation was used as an effective method to prevent the spread of the disease. Autopsy was also done to investigate the cause of the disease3. In later stage, new bacteriological techniques such as culturing helped identifying the cause of the epidemic. Similarities and differences There are several similarities between the battle against pneumonic plague and the measures to control the plague in Hong Kong in 1894. Firstly, in both cases public health was introduced to the affected areas. In western medicine public health focuses on the surveillance and the prevention of disease. Isolation was used in both cases in order to prevent the spread and the deterioration of the disease. Different measures such as sanitation and rapid disposal of corpses in the 1894 plague in Hong Kong all refers to public health measures for the disease. This is important because by that time there was no way of treating both diseases, so public health became the only way to prevent the spread of the diseases and to control the epidemic. The treatment for plague(antibiotics) was not discovered in 1940s, about 30 years after the pneumonic plague. In addition, modern western medicine played a large role in coping with the outbreaks in both cases. In both cases a lot of modern western advanced sciences were used to investigate the diseases. For example, bacteriology culture and autopsy were used to investigate the cause of pneumonic plague whereas dissection of rats and bacteriology study were used in the 1894 plague. In comparison traditional Chinese medicine did not play a large role in either the prevention of the disease or the treatment of the disease. Moreover, investigations of the diseases were both done simultaneously with the measures and controls of the outbreaks. In other words, controls and measures like isolation were done before the identification of the cause of the disease in order to prevent the spread of the disease. One major difference of the control and measures between the two cases is the involvement of other countries in pneumonic plague. The coping of the pneumonic plague involved collaborations on the international level whereas the 1984 plague only involved isolated research without collaborations. This can be explained by the location of outbreak. As the outbreak of pneumonic plague may endanger the resident population in Russia and Japan, the two countries took part in the plague control. Whereas the 1894 plague happened in Hong Kong which will not affect other countries based on its location. Conclusion In conclusion the measures and control of the pneumonic plague and the 1894 plague outbreak in Hong Kong are similar in many ways. Both cases are very important as they show us the introduction of science and theory of western medicine such as public health into China at that period when the population knew little about western medicine. The idea of public health also helped saving a lot of people’s life at that period by preventing the spread of the disease. References: Richard Pearson Strong and the .urnal es:hat period by preventing the spread of the disease. of western medicine into China Hong Kong are similar in many wayManchurian Epidemic of Pneumonic Plague 1910 1911, Eli Chernin Oxford Journal, Mark Gamsa, The epidemic of pneumonic plague in Manchuria 1910-1911 3 Contagions The Great Pneumonic Plague of1910-1911: https://contagions.wordpress.com/2013/03/21/the-great-pneumonic-plague-of-1910-1911/

Review of Data Duplication Methods

Review of Data Duplication Methods Mandeep Singh Abstract: -The cloud storage services are used to store intermediate and persistent data generated from various resources including servers and IoT based networks. The outcome of such developments is that the data gets duplicated and gets replicated rapidly especially when large numbers of cloud users are working in a collaborative environment to solve large scale problems in geo-distributed networks. The data gets prone to breach of privacy and high incidence of duplication of data. When the dynamics of cloud services change over period of time, the ownership and proof of identity operations also need to change and work dynamically for high degree of security. In this work we will study the concepts; methods and the schemes that can make the cloud services secure and reduce the incident of data duplication with use of cryptography mathematics and increase potential storage capacity. The purposed scheme works for deduplication of data with arithmetic key validity operations that redu ce the overhead and increase the complexity of the keys so that it is hard to break the keys. Keywords: De-duplication, Arithmetic validity, proof of ownership. INTRODUCTION Organizations that focus on providing online storage with strong emphasizes on the security of data based on double encryption [1] (256 bit AES or 448 bit), managed along with fish key algorithm and SSL encryption [2] based connections are in great demand. These organizations need to maintain large size data centers that have a temperature control mechanism, power backups are seismic bracing and other safeguards. But all these safeguards, monitoring and mechanism becomes expensive, if they do not take care of data duplication issues and problems related to data reduction. Data Deduplication [3] occurs especially when the setup is multi-users and the users are collaborating with each others work objects such as document files, video, cloud computation services and privileges etc. and volume of data grows expensively. In a distributed database management systems special care is taken to avoid duplication of data either by minimizing the number of writes for saving I/O bandwidth or de normalization. Databases use the concept of locking to avoid ownership issues, access conflicts and duplication issues. But even as disk storage capacities continue to increase and are becoming more cheaper, the demand for online storage has also increased many folds. Hence, the cloud service providers (CSP) continue to seek methods to reduce cost of DE-duplication and increase the potential capacity of the disk with better data management techniques. The data managers may use either compression or deduplication methods to achieve this business goal. In broad terms these technologies can be classified as data reduction techniques. The end customers are able to effectively store more data than the overall capacity of their disk storage system would allow. For example a customer has 20 TB storage array the customer may bet benefit of 5:1 which means theoretically 5 times the current storage can be availed. [(5*20 TB) = 100 TB]. The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. Fig: Deduplication Process The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. The purpose is to obtain a reducedrepresentation of a data set file that much smaller in volume yet provide same configure even, if the modified data in a collaborative environment. The reduced representation does not necessarily means a reduction in size of the data, but reduction in unwanted data or duplicates the existence of the data entities. In simple words the data reduction process would retain only one copy of the data and keep pointers to the unique copy if duplicates are found. Hence data storage is reduced. Compression [4]: It is a useful data reduction method as it helps to reduce the overall resources required to store and transmit data over network medium. However, computational resources are required for data reduction method. Such overhead can easily be offset due to the benefit it offers due to compression. However, an subject to the space time complexity trade off; for example, a video compression may require expensive investment in hardware for its compression-decompression and viewing cycle, but it may help to reduce space requirements in case there is need to achieve the video. Deduplication [3]: Deduplication is processed typically consist of steps that divide the data into data sets of smaller chunk sizes and use an algorithm to allocate each data block a unique hash code. In this, the deduplication process further find similarities between the previously stored hash codes to determine if the data block is already in the storage medium. Few methods use the concept comparing back up to the previous data chunks at bit level for removing obsolete data. Prominent works done in this area as follows: Fuse compress compress file system in user space. Files-depot Experiments on file deduplication. Compare A python-based deduplication command line tool and library. Penknife its used to DE duplicate informations in shot messages Opendedup A user space deduplication file system (SDFS) Opendedupe A deduplication based filesystem (SDFS) Ostor Data deduplication in the cloud. Opensdfs A user space deduplication file system. Liten Python based command line utility for elimination of duplicates. Commercial: 1). Symantec 2). Comm Vault. 3). Cloud Based: Asigra, Baracuda, Jungle Disk, Mozy. Before we engross further into this topic, let us understand the basic terms involved in the DE duplication process having in built securely features. Security Keys [5]: The security keys mainly consist of two types, namely first is Public Key and second is Private Key. The public keys are essentially cryptographic keys or sequences that can be obtained and used by anyone to encrypt data/messages intended for particular recipient entity and can be unlocked or deciphered with the help of a key or sequence in knowledge of recipient (Private Key). Private Key is always paired with the public key and is shared only with key generator or initiator, ensuring a high degree of security and traceability. Key Generation: It is a method of creating keys in cryptography with the help of algorithms such as a symmetric key algorithm (DES or AES) and public key algorithm (such as RSA) [6]. Currently systems such as TLS [7], SSH are using computational methods of these two. The size of the keys depends upon the memory storage available on (16, 32, 64, 128 bits) etc. Key Distribution: Before, any authentication process can happen both the parties need exchange the private and public keys. In typical public key cryptography, the key distribution is done using public server keys. The key generator or initiator keeps one key to himself/herself and uploads the other key to server. In case of SSH the algorithm used is Diffie-Hellman key [6] exchange. In this arrangement, if the client does not possess a pair of public and private key along with published certificate. It is difficult for the client to proof ownership. The Figure [1] shows the life cycle of Keys used for the sake of security. Fig 1: Life Cycle of Key Key Matching and Validation: Since, in most cases the private key is intended to reside on the server. And, the key exchange process needs to remain secure with the use of secure shell, this is a need to have a robust key matching algorithm so that no spoofing or manipulation occur in transient. Moreover, it is always recommended that a public key validation must be done before these keys are put into operation. Public key validation tests consist of arithmetic test [8] that ensure that component of candidate informs to key generation standard. Hence, a certificate authority [9] (CA) helps in choosing the trusted parties bound by their individual identities with the help of public key. This is stated in Certificate Produce Standards. Some third party validators use the concept of key agreements and others may use the concept of proof of possession mechanism. In POP mechanism [10], for the proper establishment of keys, the user interacting is required to work with CA using a natural function of the keys (either key agreement for encryption) or by using zero-proof knowledge algorithms [11] to show possession of private key. POP shows that user owns the corresponding private key, but not necessarily, that the public key is arithmetically valid. The Public key validation (PKV) methods show that public key is arithmetically valid, but not necessary that anyone who owns the corresponding key. Combination of these (POP and PKV) methods gives a greater degree of security confidence that can be useful for Deduplication operation. However, the only issues needs to be addressed is the overhead involved in public key validation. Improvements in arithmetic validity test can be done to improve the validation process, especially in concept of DE duplication area; where the message to be encrypted in data chunks and need to arithmetic validation and proof of ownership is to be done multiple times due to the collaborative nature of the data object. Most of the arithmetic tests validity are based on the generation and selection of prime numbers. It was in late 1989s many people came up with an idea of solving key distribution problem for exchanging information publicly with a use of a shared or a secret cipher without someone else being able to compute the secret value. The most widely used algorithms DiffieHellman key exchange takes advantage of prime number series. The mathematics of prime numbers (integer whole numbers) shows that the modulus of prime numbers is useful for cryptography. The Example [Table no. 1] clearly illustrates the prime number values gets the systematically bigger and bigger, is very usefu l for cryptography as it has the scrambling impact. For example: Prime Numbers in Cryptography and Deduplication: Prime numbers [13] are whole numbers integers that have either factors 1 or same factor as itself. They are helpful in choosing disjoint sets of random numbers that do not have any common factors. With use of modular arithmetic certain large computations can be done easily with reduced number of steps. It states that remainder always remain less than divider, for example, 39 modulo 8, which is calculated as 39/7 (= 4 7/8) and take the remainder. In this case, 8 divides into 39 with a remainder of 7. Thus, 39 modulo 8 = 7. Note that the remainder (when dividing by 8) is always less than 8. Table [1] give more examples and pattern due this arithmetic. 11 modulus 8=3 17 modulus 8=1 12 modulus 8=4 18 modulus 8=2 13 modulus 8=5 19 modulus 8=3 14 modulus 8=6 20 modulus 8=4 15 modulus 8=7 21 modulus 8=5 16 modulus 8=0 So onà ¢Ã¢â€š ¬Ã‚ ¦. Table 1: Example of Arithmetic of modus To do modular addition [14], two numbers are added normally, then divided by the modulus and get the remainder. Thus, (17+20) mod 7 = (37) mod 7 = 2. The next section illustrates, how these computations are employed for cryptographic key exchange with typical example of Alice, Bod and Eva as actors in a typical scenario of keys exchange for authentication. Step1: Sender (first person) and receiver (second person) agree, publicly, on a prime number X, having base number Y. Hacker (third person) may get public number X access to the public prime number. Step 2: Sender (first person) commits to a number A, as his/her secret number exponent. The sender keeps this secret. Receiver (second person), similarly, select his/her secret exponent. Then, the first person calculates Z using equation no. 1 Z = YA (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (1) And sends Z to Receiver (second person). Likewise, Receiver becomes calculate the value C using equation no. 2 Z= YB (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (2) And sends C to Sender (first person). Note that Hacker (third person) might have both Y and C. Step 3: Now, Sender takes the values of C, and calculate using equation no. 3 CA (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (3) Step 4: Similarly Receiver calculates using equation no. 4 ZB (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (4) Step 5: The value they compute is same because K = YB (mod X) and sender computed CA (mod X) = (YB) A (mod X) = YBA (mod X). Secondly because Receiver used Z = YA (mod X), and computed ZB (mod X) = (YA) B (mod X) = YAB (mod X). Thus, without knowing Receivers secret exponent, B, sender was able to calculate YAB (mod X). With this value as a key, Sender and Receiver can now start working together. But Hacker may break into the code of the communication channel by computing Y, X, Z C just like Sender and Receiver. Experimental results in cryptography, show that it ultimately becomes a discrete algorithm problem and consequently Hacker fails to breaks the code. The Hacker does not have any proper way to get value. This is because the value is huge, but the question is how did sender and receiver computed such a large value, it is because of modulus arithmetic. They were working on the modulus of P and using a shortcut method called repeated squaring method. The problem of finding match to break the code for the hacker becomes a problem of discrete algorithm problem. [15] From the above mention in this paper, it can be deduced that the athematic validity part of the security algorithm computations can also be improved by reducing number of computational steps. For this purpose Vedic mathematical methods such as [17], especially where the resources (memory to store and compute) keys are constrained. Example: Base Type Example on how compute exponents using Vedic Maths If the base is taken less than 10 9^3= 9-1 / 1ÃÆ'-1 / (1ÃÆ'-9) / 1ÃÆ'-1ÃÆ'-9 = 8 /1 / -9 / 9 = 81 / -9 / 9 = 81 9 / 9 = 72 / 9 = 729 If the base is taken greater than 10 12^3= 12 + 2 / 2 ÃÆ'- 2 / + (2 ÃÆ'- 12) / 2ÃÆ'- 2 ÃÆ'- 12 = 14 / 4 / + 24 / 48 = 144 / +24 / 48 = 144 +24 / 48 = 168/ 48 = 1728 Life Cycle of Data and Deduplication: The life cycle of digital material is normally prove to change from technological and business processes throughout their lifecycle. Reliable re-use of this digital material, is only possible. If the curation, archiving and storage systems are well-defined and functioning with minimum resource to maximum returns. Hence, control to these events in the Life Cycle is Deduplication process and securely of data. Table: 1 recent works in key management applied in De duplication area S. No. Authors Problem undertaken Techniques used Goal achieved Junbeom Hur et al. [1] Build a secure key ownership schema that work dynamically with guaranteed data integrity against tag inconsistency attack. Used Re-encryption techniques that enables dynamic updates upon any ownership changes in the cloud storage. Tag consistency becomes true and key management becomes more efficient in terms of computation cost as compare to RCE (Randomized convergent encryption). However the author did not focused their work on arithmetic validity of the keys. Although the lot of work has been done on ownership of keys. Chia-Mu Yu et al. [18] Improve cloud server and mobile device efficiency in terms of its storage capabilities and of POW scheme. Used improved of flow of POW with bloom filter for managing memory without the need to access disk after storing. Reduced server side latency and user side latency. Jorge Blasco et al. [19] Improve the efficiency of resources (space, bandwidth, efficiency) and improve security during the DE duplication process. Improved the working of bloom filter implementation for its usage in POW scheme and thwart a malicious client attack for colluding with the legitimate owner of the file. Experimental resources suggest the execution time increase when size of file grows but in case of proposed scheme it helps in building a better trade off between space and bandwidth. Jin Li et al. [20] Build an improved key management schema that it more efficiency and secure when key distribution operation access. The user holds an independent master key for encrypting the convergence keys and outsourcing them to could this creates lot of overhead. This is avoided by using ramp secret sharing (RSSS) and dividing the duplication phase into small phase (first and block level DE duplication). The new key management scheme (Dekey) with help of ramp scheme reduces the overhead (encoding and decoding) better than the previous scheme. Chao Yang et al. [21] Overcome the problem of the vulnerability of client side deduplication operation, especially when the attacker trys to access on authorized file stored on the server by just using file name and its hash value. The concept spot checking in wheel the client only needs to access small functions of the original files dynamic do efficient and randomly chosen induces of the original file. The proposed scheme creates better provable ownership file operation that maintains high degree of detection power in terms of probability of finding unauthorized access to files. Xuexue Jin et al. [11] Current methods use information computed from shared file to achieve. DE duplication of encrypted. Data or convergent encryption into method is Vulnerable as it is based well known public algorithm. DE duplication encryption algorithm are combined with proof of ownership algorithm to achieve higher degree of security during the DE duplication process. The process is also argument with proxy re-encryption (PRE) and digitalize credentials checks. The author achieved anonymous DE duplication encryption along with POW test, consequently the level of protection was increased and attacks were avoided. Danny Harnik et al. [22] Improve cross user (s) interaction securely with higher degree of privacy during DE duplication. The authors have described multiple methods that include:- (a). Stop cross over user interaction. (b). Allow user to use their own private keys to encrypt. (c). Randomized algorithm. Reduced the cost of operation to secure the duplication process. Reduced leakage of information during DE duplication process. Higher degree of fortification. Jingwei Li et al. [23] The authors have worked on the problem of integrity auditing and security of DE duplication. The authors have proposed and implemented two methods via Sec Cloud and Sec Cloud+, both systems improve auditing the maintain ace with help of map reduce architecture. The Implementation provided performance of periodic integrity check and verification without the local copy of data files. Better degree of proof of ownership process integrated with auditing. Kun He et al. [24] Reduce complications due to structure diversity and private tag generation. Find better alternative to homomorphic authenticated tree. (HAT) Use random oracle model to avoid occurrence of breach and constructs to do unlimited number of verifications and update operations. DeyPoS which means DE duplicable dynamic proof of storage. The theoretical and experimental results show that the algorithm (DeyPoS) implementation is highly efficient in conditions where the file size grows exponentially and large number of blocks are there. Jin Li et al. [25] The provide better protected data, and reduce duplication copies in storage with help of encryption and alternate Deduplication method. Use hybrid cloud architecture for higher degree of security (taken based) , the token are used to maintain storage that does not have Deduplication and it is more secure due to its dynamic behavior. The results claimed in the paper shows that the implemented algorithm gives minimal overhead compared to the normal operations. Zheng Yan et al. [26] Reduce the complexity of key management step during data duplication process But implement less complex encryption with same or better level of security. This is done with the help of Attribute Based Encryption algorithm. Reduce complexity overhead and execution time when file size grows as compared to preview work. Summary of Key Challenges Found The degree of issues related to implementation of Crypto Algorithms in terms of mathematics is not that difficult as compared to embracing and applying to current technological scenarios. Decentralized Anonymous Credentials validity and arithmetic validity is need to the hour and human sensitivity to remain safe is critical. In certain cases, the need to eliminate a trusted credential issuers can help to reduce the overhead without compromising the security level whole running deduplication process. Many algorithms for exponentiation do not provide defense against side-channel attacks, when deduplication process is run over network. An attacker observing the sequence of squaring and multiplications can (partially) recover the exponent involved in the computation. Many methods compute the secret key based on Recursive method, which have more overhead as compared methods that are vectorized. Some of the vectorized implementations of such algorithms can be improved by reducing the number of steps with one line computational methods, especially when the powers of exponent are smaller than 8. There is a scope of improvement in reducing computational overhead in methods of computations of arithmetic validity methods by using methods such as Nikhilam Sutra, Karatsuba. CONCLUSION In this paper, sections have been dedicated to the discussion on the values concepts that need to be understood to overcome the challenges in De-duplication algorithms implementations. It was found that at each level of duplication process (file and block) there is a needs for keys to be arithmetically valid and there ownership also need proved for proper working of a secure duplication system. The process becomes prone to attacks, when the process is applied in geo-distributed storage architecture. The complexity for cheating ownership verification is at least difficult as performing strong collision attack of the hash function due to these mathematical functions. Finding the discrete algorithm of a random elliptic curve element with respect to a publicly known base point is infeasible this is (ECDLP). The security of the elliptic curve cryptography depends on the ability to the compute a point multiplication and the mobility to compute the multiple given the original and product po ints. The size of the elliptic curve determines the difficulty of the problem. FUTURE SCOPE As discussed, in the section mathematical methods such as Nikhilam Sutra, Karatsuba Algorithm [27] may be used for doing computations related to arithmetic validity of the keys produced for security purpose as it involves easier steps and reduce the number of bits required for doing multiplication operations etc. Other than this, the future research work to apply to security network need of sensors that have low memory and computational power to run expensive cryptography operations such public key validation and key exchange thereafter. [1] J. Hur, D. Koo, Y. Shin and K. Kang, Secure data deduplication with dynamic ownership management in cloud storage, IEEE Transactions on Knowledge and Data Engineering, vol. 28, pp. 31133125, 2016. A. Kumar and A. Kumar, A palmprint-based cryptosystem using double encryption, in SPIE Defense and Security Symposium, 2008, pp. 69440D69440D. M. Portolani, M. Arregoces, D. W. Chang, N. A. Bagepalli and S. Testa, System for SSL re-encryption after load balance, 2010. W. Xia, H. Jiang, D. Feng, F. Douglis, P. Shialane, Y. Hua, M. Fu, Y. Zhang and Y. Zhou, A comprehensive study of the past, present, and future of data deduplication, Proceedings of the IEEE, vol. 104, pp. 1681-1710, 2016. J. Ziv and A. Lempel, A universal algorithm for sequential data compression, IEEE Transactions on information theory, vol. 23, pp. 337343, 1977. P. Kumar, M.-L. Liu, R. Vijayshankar and P. Martin, Systems, methods, and computer program products for supporting multiple contactless applications using different security keys, 2011. S. Gupta, A. Goyal and B. Bhushan, Information hiding using least significant bit steganography and cryptography, International Journal of Modern Education and Computer Science, vol. 4, p. 27, 2012. K. V. K. and A. R. K. P. , Taxonomy of SSL/TLS Attacks, International Journal of Computer Network and Information Security, vol. 8, p. 15, 2016. J. M. Sundet, D. G. Barlaug and T. M. Torjussen, The end of the Flynn effect?: A study of secular trends in mean intelligence test scores of Norwegian conscripts during half a century, Intelligence, vol. 32, pp. 349-362, 2004. W. Lawrence and S. Sankaranarayanan, Application of Biometric security in agent based hotel booking system-android environment, International Journal of Information Engineering and Electronic Business, vol. 4, p. 64, 2012. N. Asokan, V. Niemi and P. Laitinen, On the usefulness of proof-of-possession, in Proceedings of the 2nd Annual PKI Research Workshop, 2003, pp. 122127. X. Jin, L. Wei, M. Yu, N. Yu and J. Sun, Anonymous deduplication of encrypted data with proof of ownership in cloud storage, in Communications in China (ICCC), 2013 IEEE/CIC International Conference on, 2013, pp. 224229. D. Whitfield and M. E. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol. 22, pp. 644654, 1976. H. Riesel, Prime numbers and computer methods for factorization, vol. 126, Springer Science Business Media, 2012. R. A. Patel, M. Benaissa, N. Powell and S. Boussakta, Novel power-delay-area-efficient approach to generic modular addition, IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 54, pp. 12791292, 2007. Repeated Squaring, Wednesday March 2017. [Online]. Available: http://www.algorithmist.com/index.php/Repeated_Squaring. [Accessed Wednesday March 2017]. Table of costs of operations in elliptic curves, Wednesday March 2017. [Online]. Available: https://en.wikipedia.org/wiki/Table_of_costs_of_operations_in_elliptic_curves. [Accessed Wednesday March 2017]. Calculating Powers Near a Base Number, Wednesday March 2017. [Online]. Available: http://www.vedicmaths.com/18-calculating-powers-near-a-base-number. [Accessed Wednesday March 2017]. C.-M. Yu, C.-Y. Chen and H.-C. Chao, Proof of ownership in deduplicated cloud storage with mobile device efficiency, IEEE Network, vol. 29, pp. 5155, 2015. J. Blasco, R. D. Pietro, A. Orfila and A. Sorniotti, A tunable proof of ownership scheme for deduplication using bloom filters, in Communications and Network Security (CNS), 2014 IEEE Conference on, 2014, pp. 481489. J. Li, X. Chen, M. Li, J. Li, P. P. Lee and W. Lou, Secure deduplication with efficient and reliable convergent key management, IEEE transactions on parallel and distributed systems, vol. 25, pp. 16151625, 2014. C. Yang, J. Ren and J. Ma, Provable ownership of files in deduplication cloud storage, Security and Communication Networks, vol. 8, pp. 24572468, 2015. D. Harnik, B. Pinkas and A. Shulman-Peleg, Side channels in cloud services: Deduplication in cloud storage, IEEE Security Privacy, vol. 8, pp. 4047, 2010. J. Li, J. Li, D. Xie and Z. Cai, Secure auditing and deduplicating data in cloud, IEEE Transactions on Computers, vol. 65, pp. 23862396, 2016. K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang, Deypos: deduplicatable dynamic proof of storage for multi-user environments, IEEE Transactions on Computers, vol. 65, pp. 36313645, 2016. J. Li, Y. K. Li, X. Chen, P. P. Lee and W. Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 12061216, 2015. Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, Encrypted data management with deduplication in cloud computing, IEEE Cloud Computing, vol. 3, pp. 2835, 2016. S. P. Dwivedi, An efficient multiplication algorithm using Nikhilam method, 2013.