You are on page 1of 3

qwertyuiopasdfghjklzxcvbnmqw

ertyuiopasdfertyuio
pasdf
California Miramar
university
ghjklzxcvbnmqwertyuiopasdfghj
Discussion Chapter 1 & 2
klzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvb
Vihar

Answer:
In a marketing environment, a competitor analysis is a crucial part of a small businesss
overall strategy and should include a thorough assessment of the strengths, weaknesses,
opportunities and threats of current and prospective competitors as well as the political,
economic and technological influences that affect the way in which a business competes. One
of the most effective tools for assessing the competitive landscape of a business is the Five
Competitive Forces model developed by Michael E. Porter of Harvard Business School.
Before making any strategic decisions, small businesses should use these five forces as a
foundation for developing a strong analysis of the competition.
example,
In the late 1960s, the intellectual leadership of business moved from such "wisdom" authors
as Peter Drucker to strategists, economists, and consultants such as Michael Porter and the
Boston Consulting Group. The newcomers noted that higher-volume production meant lower
costs, lower costs meant lower prices, and lower prices meant even greater volume. Finally
business could be played like a game with crystal-clear rules and winners and losers.

Chapter 2: Answer

The Internet backbone may be defined by the principal data routes between large, strategically
interconnected computer networks and core routers on the Internet. These data routes are
hosted by commercial, government, academic and other high-capacity network centers,
the Internet exchange points and network access points, that interchange Internet traffic
between the countries, continents and across the oceans
The huge networks we found through trace-routing are known as Tier 1 networks.
o

AT&T from USA

Centurylink (formerly Qwest and Savvis) from USA

Deutsche Telekom AG from Germany

Inteliquent (formerly Tinet) from USA

Verizon Business (formerly UUNET) from USA

Sprint from USA

TeliaSonera International Carrier from Sweden

NTT Communications from Japan

Level 3 Communications from USA

Tata Communications from India

Virus, Worm or Trojan is no longer a technical jargon. They are so common and their
impacts are so severe that they have appeared many times in the headlines of newspaper and
media, such as CNN Although anti-virus vendors are trying their best to stop these attacks,
new types of virus/worm are discovered every day. New techniques must be employed to
supplement our existing methods to detect and stop these attacks.In order to protect against
the massive and evolving networking virus/worm attacks, the Computing Services Centre
(CSC) had recently deployed the network based Intrusion Protection System (NIPS). In this
article, we shall discuss the features of the new IPS . For background information of IPS and
security appliance deployment on our campus
o

Intelligent Port Scanning detection

Behavior-based Denial of Service (DoS) protection (Zero Day Attack Protection)

Brute Force Protection for Central Servers and Application Servers

Multiple Segments Support - Virtual IPS

Programmable API for Dynamic Policy management

-------------------------------------------------------------------------------------------------------------------------------------THANKS,
VIHAR PATEL