Nike, was founded in the year 1957 by Knight and the company since the very beginning manufacturing higher quality sports shoes for several sports inclusive of athletics, football, volleyball etc. Additionally, the company also has been involved in manufacturing equipment’s for fitness and related sports apparels such as caps. The organization since its development has always been involved in making higher commitments to innovative products. In the fiscal year of 2012, 24.1 billion dollars was generated by Nike with an increase by 16 percent since the last year. The organization further made announcements of increasing this total revenue generated in the 2015 fiscal year to reach 30 billion. More than 50000 employees across the globe are employed by Nike and there are several contracts wherein the company employs more than 80000 individuals. The mission statement of Nike is to develop inspiration and to consistently innovate for each sports person across Continue reading
Information Technology
The Five Stages of Business Intelligence
Business Intelligence is the process of transforming related business data into information, information into knowledge and with repetitive identification turning knowledge into Intelligence. Data: It is a raw data i.e. it represents reality, facts and figures. Information: It is a data that is processed and interpreted. Knowledge: After the information is processed, it becomes more sensible containing some meaning and understanding. Business Intelligence (BI) is a wide category of applications and technologies for collecting, storing, analyzing, and providing access to data to help the enterprise users make better decision making. BI applications supports the activities decision support systems, querying and reporting, online analytical processing (OLAP), statistical data analysis, forecasting and data mining. Some important definitions of Business Intelligence are: Business Intelligence is a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful and useful information used to enable more effective strategic, tactical, and operational insights and Continue reading
Data Mining and Privacy Concerns
In data mining, the privacy and legal issues that may result are the main keys to the growing conflicts. The ways in which data mining can be used is raising questions regarding privacy. Every year the government and corporate entities gather enormous amounts of information about customers, storing it in data warehouses. Part of the concern is that once data is collected and stored in a data warehouse, who will have access to this information? Oftentimes a consumer may not be aware that the information collected about him/her is not just shared with who collected the information. With the technologies that are available today, data mining can be used to extract data from the data warehouses, finding different information and relationships about customers and making connections based on this extraction, which might put customer’s information and privacy at risk. Data mining necessitates data arrangements that can cover consumer’s information, which Continue reading
Components of an RFID System
Radio frequency Identification (RFID) as the name implies uses radio frequency to exchange data between two entities for identification purpose. It is a wireless technology to collect information without any human interventions. An RFID system is basically an integrated combination of various components which work together for detection and identification of objects or persons. These are the components which are primarily responsible for working of any RFID system whether basic or complex. Although there can always be additional components associated with RFID systems like sensors etc. but the following are amongst the key components of these systems: A tag (sometimes called a transponder), which is composed of a semiconductor chip, an antenna, and sometimes a battery. An interrogator (sometimes called a reader or a read/write device), which is composed of an antenna, an RF electronics module, and a control electronics module. A controller (sometimes called a host), which most often Continue reading
Targeting Strategies Involved in E-marketing
Once the variables that form a lucrative cluster of customer base for the product is identified, advertising campaigns are decided to target those customers. The E-marketer arrives at the second stumbling block here “portals”. Portals have the most popular URLs on the web today. They claim to be a one-stop solution for anything and everything that the netizen looks for. For the netizen it means less URLs to remember and a place to meet people & socialize. It could have, in most probability, also been the place of a successful electronic transaction before, quelling his/her security concerns. Although portals deny their comparison with the supermarkets of the real world, they are doing just that right now. A portal is not exactly a marketers’ paradise. He would rather prefer sites, which have a niche target audience in sync with his requirements. The next step is to select segments for targeting online Continue reading
Social Engineering Attacks – Explanation with Examples and Prevention Tips
The rise of 21st century marked the transition phase of the most global businesses towards a paperless office environment, where the focus shifted the manual to the computerized form of work culture. But at the same time, change brought a number of threats and menace in terms of one of the biggest issues of the current businesses, the social engineering used among the hackers for cracking techniques that rely more on human weaknesses rather than technology itself. The aim or motive of such attacks was getting access to passwords or other relevant information by tricking people for carrying out illegal or criminal activities. FBI and other security experts hold a firm view that majority of threats originate from the internal working environment or employees who have been granted additional privileges or authorities to company’s information. People who have an urge for power and control over other individuals exhibit the social Continue reading