Sunday, March 31, 2019
Protection of Biometric Templates
vindication of Biometric templetsProtection of Biometric Templates Stored on an enfranchisement Card by common salt the TemplatesProblem StatementThe proposed seek addresses the problem of surety of biometric entropy stored on guides victimization a corpse-on- visor border on for refreshed bill stickers by proposing a mode to salt the sc go forths.Research StatementThis enquiry proposes a juicy and resilient mode to salt the guidebooks stored and paralleled on- posting. It prep atomic bite 18s a salt using a findprint templet of a randomly chosen riff, the serial count of h exclusivelymark mentality and a establishment generated random PIN. The salt is employ to encrypt the templets of distinguishable sensemark guides created and stored on waggle. During trademark, a guidebook of the finger chosen randomly to prep atomic number 18 the salt during the registration phase is obtained and a PIN is extendd by workr. These two inputs along with the seri al scrap of phone bank bill is use to prep be the salt and again encrypt the live usher go awayd by user for au thustication. Once, the stored encrypted usher and the created encrypted guidebook matches, the user contri excepte be considered genuine and concessioned access further. This method is implemented on musical arrangement-on- tease smart separate to add users much security and privacy.AbstractThis research proposes to allow a limit method to prep argon salt for encryption of guides stored on the assay-mark loosen using what I am, what I have and what I know which is lastly resistant to known comings against match on gameboard technology.The user depart be provided with a Java notification with an insert reproduce indorser on the carte du jour. The user has to provide a fingermark which depart be captured by lecturer embedded on-card and this fingermark will be utilise to instal salt along with serial number of Java card and a 4-digit PIN input by user. The salt will be prepared to encrypt the live guidebook of some early(a) reproduce chosen randomly by placement, generated by the carcass on Java card. The encrypted live template and the stored salted template will be compared to establish if the user is genuine or non. The user will be demonstrated based on the nurtures of ending if it passes a plastered thresh everyplaceaged cling to.ResourcesThe resources we intend to use to complete this research is Google Scholar, IEEE Xplore, Research Gate. club to the courses of the MISSM ProgramVarious courses of MISSM program are linked to the proposed research as expound beneathCryptography The basics of Biometrics and JAVA card technology, using challenge and response for any type of environment much(prenominal) as banking, soaring-security settings etc. Also, RSA certificates for web certification during dialogue with server. security measures policies distinguishable policies and standardiseds governing the management of biometric selective in yearation i.e. ISO/IEC standards etc. Also, variant policies that end be implemented to ensure sound use of proposed method.Governance Risk and envision Considering the advantage of defense-in-depth concept by adding an additional layer of security for the idea of risk management in natural access documentation /security. reappraisal of related research The research related to this proposal contains the discussion of match-on card and system-on-card nuzzle and how system-on-card technology provides additional security and privacy to user. The review is shared bulge(a) into four section as described belowdigitprint Au thereforetication SystemsBiometrics are automated methods of establishing a persons identity based on his/her physical or behavioral characteristics 1. There are various physical characteristics that push aside be utilize for authentication system much(prenominal) as iris, fingerprint, palmprint, hand vein pattern et c. For each biometric authentication system, a biometric is chosen based on various components such as Universality, Uniqueness, Accuracy, Maturity, military posture as described in bruise Cards and Biometrics 2. findprints is intimately widely used from the date of origin of biometry. The following matrix put off clearly shows that fingerprint is most suitable biometric trait that muckle be used.number 1. Report of Defense Science Board Task might on Defense Biometrics 2Like any other authentication system, fingerprint authentication system withal consists of four basic important components Input mechanism, Matching methodologies, Decision making procedures and database of biometric information. A conventional biometric authentication system consists of two phases enrolment and Verification as explained in frame 2 3.Fig 2. Framework for fingerprint Authentication System 3During Enrollment phase, user is asked to input a fingerprint. Different gets are extracted from this fingerprint and a template is created by a one-way dish up that transforms the haves extracted into a numeric form using different functions. This template is stored in a database which is used during second phase of authentication i.e. Verification.During Verification phase, user is again asked to provide fingerprint. Again a template called live template from the input fingerprint is generated and then the stored template in database and live template are compared to authenticate the user as genuine or not.The proposed research focus on template protection algorithm to protect the biometric template (or filename extension) in front storing them in database. Templates are generated by extracting specific features from a biometric trait (in this case it is fingerprint) of user. The template is a short hand description 12 which provides essendial information astir(predicate) the legitimate fingerprint. Templates atomic number 50 be stored in database as such with out freeing them through any protection algorithm, which will save time and less(prenominal) resources are claimd for whole form. But unprotected templates are very(prenominal) serious threat to the faithfulness of whole fingerprint authentication system (or any biometric authentication system). Also, the template tush be easily manipulated and is used for speed of comparison.As demonstrated by Ross et. al. in 13 that information grass be extracted out of the template and true fingerprint cornerstone be regenerated. In their paper, ternion level of information was obtained from the minutiae template of fingerprint. The information about orientation field, fingerprint class and friction ridge grammatical construction was extracted out and based on that information the fingerprint was synthesized again. It proves the notion that getting airplane pilot fingerprint from the template is nearly impossible to be untrue. Hence, the protection of template is very crucial and cannot be ignored.Fingerprint templates are generated from specific features of the fingerprint input by user. Fingerprint template includes information for each minutiae point, such are position of the point on an XY-axis, distance of one minutia from all others or gradient information of each minutia. Gradient information gives the slope of the line segment extending from minutia being described 12 as shown in fig. all(a) this information for each minutia of a finger makes a fingerprint template for a finger. Similarly, template for each finger can be constructed and stored in database. Templates can be a two dimensional matrix in which rows repre moves each minutia and column represents different type of information about that minutia. Examples of order and widely used template formats are ANSI INCITS 378-2004 and ISO/IEC 19794-2.ANSI INCITS 378-2004 template format consist of three standards for fingerprint data interchange which are as followsANSI INCITS 377-2004 Finger Pattern select ive information Interchange coiffeThis standard defines the content, format and units of quantity for the exchange of finger image data that whitethorn be used in the chit or identification abut of a subject region 14. It exchanges unprocessed image of fingerprint. This standard is used where at that place is no narrow on the resources such as storage and transmission time.ANSI INCITS 378-2004 Finger Minutiae Format For Data InterchangeThe Finger Minutiae Format for Data Interchange standard specifies a method of creating biometric templates of fingerprint minutiae, such as ridge endings and bifurcations 14. The structure of minutia data format is defined in the figure below. The extended data blocks contain additional information about the minutia.Fig Structure Minutia Data Format extracted out from 14.ANSI INCITS 381-2004 Finger Image-Based Data Interchange FormatThe Finger Pattern Based Interchange Format standard specifies a method of creating biometric templates of fing erprint biometric information using ridge pattern measurements found in fingerprints. The fingerprint image is reduced and then grouped into small cells of 5*5 pixels. accordingly these cells are analyzed separately 14.The template generated may be used for two principal purposes 14 which are identification and verification. In both cases a live template is generated from fingerprint input by user is compared with the template stored in database. The chances of these two templates being an exact match is very small because of dirt, injury or poor quality of fingerprint itself 14. Therefore, a threshold value is specified which is called a correlation coefficient 14. The value of this coefficient must be set finical to the performance. This is because, if this value is high then there a high chance of FRR and if this value is low, then there is high chance of FAR. Examples of application of fingerprint authentication system are law en obligement for identification of criminals, ai rports to provide rapid services to a high number of passengers etc.In a conventional fingerprint authentication system, there are various points of assault as identified by Ratha et. al. 4 which can be exploited by an adversary as seen in Fig 3 5. Different attacks that can be performed on these points can be grouped into four categories 5Attacks at user interface These types of attacks use histrion finger made of gelatin or latex and false fingerprint is given as input to reader device that captures the fingerprint. These types of attacks can be mitigated by developing hardware and software solutions more sensitive to the liveness of the fingerprint.Attacks at interfaces between modules Different modules of fingerprint authentication systems communicate with each other. For example, fingerprint reader sends the fingerprint image to feature extractor module (Fig 3) through a confabulation channel. And if, this channel is not potentd physically or cryptographically 5 then the data can be intercepted and aggressor can get access to the authentic fingerprint. Another attack that can be performed is to launch play back or hill- climbing attacks 5.Attacks on the modules An adversary can attack either the communication channel or the modules itself. If the channel is take prisonerd using cryptographic measures that does not secure the wide authentication system. An assailant can execute various attacks to take possession of modules and force them to work according to his/her will and intentions. This can cause system to traverse even the legitimate user and allow illegitimate user by feeding wrong input or modifying the decision.Attacks on the template database The templates stored in database can be attacked and is one of the most potentially damaging attack 5. These attacks can be performed either to modify the templates or retrieve the original fingerprint.Fig 3. Points of attack in a generic biometric authentication system 5All these attacks can com promise the authentication system and present a threat to access privileges of sensitive data or location. Some of the attacks that can be performed and described in figure above include presenting artificial finger made from either silicone or gelatin. This synthetic finger has a fingerprint printed on the side facing the sensor. Then this fake finger is used to give system input. This attack can be anticipateed by improving the liveness detection of the hardware as headspring as software as described in 15. Replay of old data can be mitigated by limiting the number of attempts an individual can make before permanently locking out the person from the system. Communication channel which is used to transmit template from database to marriage broker module can be intercepted and template can be obtained mend in transit. So, additional security measures are needed to be interpreted such as establishing encrypted channels which is again an overhead. If the template is modified in tr ansit, then attacker can perform DoS attack and foresee genuine user from getting access to the system. Similarly, if the final decision can be modified and allows the foster to enter into system. Also, if the matcher is overridden by attacker then the decision of the matching is compromised without any doubt and hence, the whole system is compromised.Smart CardSmart cards are also called structured Circuits Card (ICC) in ISO/IEC 7816 standard. These types of cards are made of plastic with a metallic break away inside it. There are two types of chips as described in 11 which are memory chips and microprocessor chips. Memory chips consists of control system of logic 11 and are used for storage purposes. These chips are used to store data only. Whereas, microprocessor chips have a programmable processing unit along with a computer science unit and runty storage to carry put various operations. A plastic card with microprocessor chip is called smart card 11.These type of cards ca n be used for various purposes such as payment, authentication, document storage, portable files storage etc. For different applications of the smart card require different operations to be performed by CPU embedded in the chip. CPU of the smart cards require power to carry out the operations which is the reason that a card reader device is inevitable component of the authentication system. The smart card and card reader ending communicates with each other to transfer data.Terminal requires different information and responses from the card to carry out the desired operations. To get required service, utmost sends a request to the card which is received by on-card application and executes the operations as requested and provide celestial pole with responses. The communication between the card and the terminal is protected by establishing a secure channel. Also, different cryptographic algorithms are used for protection of information transmitted between terminal and the card. Th ese algorithms are processed using the calculation unit embedded in the microprocessor chip. The secure channel is established using cryptographic protocols. The transmission occurs analogous to communication using OSI destination model 11.The transmission of data between card and the reader takes place in units called APDU (Application Protocol Data Unit). There are two types of APDUs which are categorized as command APDUs and response APDUs. ISO/IEC 7816-4 defines a command set consisting of various commands (some are mandatory and others are optional) for cultivation of the applications by different industries. The basic idea behind this approach is that an application developed by any vendor will be matched with the chip card. Structure of APDU can be found in Appendix.Smart cards have card managers to administer and manage all the card system services 12 and operations. It can be viewed as an entity that provides functions very similar to runtime environment of card, repres ents the card issuer and verifies the users identity. It can also be seen as three different entities as described in GlobalPlatform Card Specification 2.1.1, as followsThe GlobalPlatform EnvironmentThe Issuer Security DomainThe Cardholder Verification MethodsIssuer Security Domain can be considered as entity representing card issuer on-card. It consists of data that shall be stored on-card as listed below 12Sr, No,Name (Tag of ISO/IEC 7816)Descriptiona.Issuer Identification Number (Tag 42)Maps the card to a particular card management system.It is of inconstant length.b.Card Image Number (Tag 45)use by card management system to identify the card among its database.Also, has variable length.c.Card Recognition DataProvides information about the card before communication starts between card and card management system.It is contained in Directory discretionary Template (Tag 73)d.On-card pick up InformationDifferent underlyings are stored in tenacious memory of card.Key consists of various attributes such as key out identifier, key version number, associated cryptographic algorithm and key length.All key components associated with an entity (e.g. symmetrical and asymmetric key are two different entities) has equivalent key identifierKeys are managed by Issuer Security DomainThese data in Issuer Security Domain can be accessed using GET DATA command.Fingerprint Match-on-card and Fingerprint System-on-cardIn a conventional biometric authentication system, a template generated during verification is sent to server where it is matched with the stored template in database. Live template must be protected against attacks while in transit to server. as yet though templates are results of one-way function but original fingerprint image can still be prepared using different attacks.To address the problem of template compromise in transit, modules of biometric authentication systems described in Fig 3 can be grouped together. These types of groupings can be used to counterpunch the attacks described above. In the article cyclopaedia of Biometric, Chen Tai Pang, Yau Wei Yun, Jiang Xudong and Mui keng Terrence explained four different types of approaches that can be taken to group the modules and placing grouped components of authentication system on an authentication card (which is also called a smart card) such as Java card. These approaches are a) Template on-card b) Match-on-card c) Work sharing on-card d) System-on-cardThis research focuses on limitations of Match-on-card approach and features of System-on-card approach that overcome these limitations. These approaches are described below. Also, the limitations and how they affect the integrity of biometric authentication system is also defined.Match-on-card is defined as the process of performing comparison and decision making on an integrated circuit (IC) card or smartcard where the biometric reference data is retained on-card to enhance security and privacy 6. During enrollment, the te mplate generated from the fingerprint is stored on the secure area of cards storage. To accomplish on-card matching, live template is generated after capturing and feature extraction of fingerprint of user using an interface device. This live template is uploaded to the card for verification process.On-card matching follows the same process flow as defined in fig 4 but with Matcher and Database module that has stored template on-card. Matching function executes on- card alternatively than on a server. This solves the problem of attack on interfaces of modules described above. Fig 3 explains match-on-card process for biometric verification 6.Fig 4. On-card matching process 6substance abuser inputs his/her fingerprint using Biometric terminal. Features are extracted from the input and a live template (or here its called query template) is generated. This query template is generated off-card but sent to card for matching. Cards matcher module retrieves the stored template from the sec ure storage area of card and compare two templates. This comparison result is handed over to on-card application and thus, original template and the result always resides on the card. cover line represents the application firewall that restricts the access of application to matching module 6.Attacks on interfaces between modules also stems to attacks on database in which templates are stored. If the interfaces or the communication channel is compromised, then the data travelling among different modules can also be compromised. If not intercepted, at least modification can be performed to execute DoS attack for a legitimate user. To deal with this limitation, system-on-card approach can be used.System-on-card means the whole biometric verification process, including the acquisition, is performed on the smartcard. The smartcard incorporates the entire biometric sensor, with processor and algorithm 6.Fig 5. System-on-card Technology 6Smartcard equipped with fingerprint reader is inser ted into an interface device which provides time and power to card. Then user is asked to provide his/her fingerprint which is captured by the fingerprint reader on-card. Different features are extracted out from the fingerprint and different incorporated algorithms on-card 6 transforms that input into a mathematical form (template). The template is stored in secure area of cards storage. The whole process takes place on-card providing more security and privacy to user. System-on-card is more secure because the template stored and query template is always present on-card and only the result is sent to host-side application.Template SecurityThis research focus on the security of the template before storing it in database. Fingerprint of an individual is very ludicrous. It makes it an ideal factor for authentication systems. No two persons can have same fingerprints providing high security, privacy and integrity to authentication systems using fingerprint. Even though this makes the biometrics strong among all other factors of authentication but it also is its weakest point. foreign any other computational algorithms, biometric information of a person is unique and once compromised, cannot be recreated. It makes the protection of templates very crucial to protect the integrity of biometric authentication systems.Two approaches can be considered to secure the templates. Either, a) database can be protected against different attacks by implementing various security measures such as firewalls or b) templates can itself be protected against attacks so that even if the database is compromised, original fingerprint can still be protected. Since, the template itself is very specific information which makes it quite useless for attacker to get original fingerprint image from template. But it is still possible to create original fingerprint using the algorithm defined in 13.According to ISO/IEC 24745 7 standard, all the Biometric Template Protection Systems must fulfil l three main requirementsNon invertibility It should very arduous to retrieve the original template from the final protected template reference stored in database. The noninvertibility prevents the abuse of stored biometric data for launching spoof or replay attacks, thereby improving the security of the biometric system 3.Revocability It should be computationally backbreaking to obtain the original biometric template from multiple instances of protected biometric reference derived from the same biometric trait of an individual 3. It makes it possible for issuer to issue a new template to user in case of a compromise, without bothering about the probability of supremacy for an attacker using the old template.Nonlinkability It should be tough to establish affinity among different instances of templates derived from same biometric characteristic of user. The nonlinkability property prevents cross-matching across different applications, thereby preserving the privacy of the individ ual 3.Methods for Biometric Template ProtectionAs described by Anil K. Jain, Karthik Nandakumar and Abhishek Nagar in their article Biometric Template Security 8, Template protection schemes can be categorized into two main groups viz. feature transformation and biometric cryptosystem as shown in fig 6.Fig 6. Template Protection approaches 8In feature transformation, a feature transformation function is utilize to the biometric template 8. The new template generated after feature transformations is stored in database preferably than the template generated after feature extraction. This transformation provides more security because it makes the template more random and make it almost impossible for attacker to recollect the original template and hence more difficult to obtain original fingerprint image. Two methods for feature transformation are flavor and Nonivertible transform.Salting It is also called biohashing. In this approach a biometric template (fingerprint template, her e) is taken as input and a mathematical function is applied defined by a specific key. A token number or a key is used to increase the entropy of the template and so makes the template difficult for attacker to guess 2. Salting is the name given because the key used in this method is called salt to protect the template. This approach is invertible which means using the key, original template can be obtained from change template. transmogrifyation function that satisfy the requirements of this approach can be de sign-language(a).Noninvertible Transform This approach is similar to previous one i.e. salting with a little difference that this method is invertible which means a transformed template is very difficult to invert to original template. Non-invertible transform refers to a one-way function that is easy to compute but hard to invert 8. Hence, more security is provided in this approach because if the key is known to attacker, he/she still cannot retrieve original template.Comp aring these two approaches based on the description above, non-invertible transform seems an obvious choice for security. But thats not true. This is so because, salting in invertible but it supports revocability property of biometric template protection. It means if a key is leaked and transformed template is accessible to attacker then the template can be easily replaced using a new key. Also, key usage causes low FAR. Whereas, non-invertible transform presents a tradeoff between discriminability and non-invertibility 8. It means the transformed template using different features of same user should be same but different from another(prenominal) user along with fulfilling noninvertible property. It is difficult to design such transformation function 8.Salting is done using a specific key or token. Any key or token used for salting is secureDescription of Proposed ResearchConsidering the above knowledge, the research will focus on a method to protect the template stored on card. The proposed method will protect biometric template stored on card by salting the template. The research will focus mainly on the proposed method of salting the template. Also, other elements as required will be included in the research to propose a robust and secure system that use the method for salting. It is assumed that enrollment phase is done in a secure environment and verification phase can be done in an untrusted zone.The research will look deep into the method to develop a more random and strong salt for biometric template protection. System-on-card approach will be used because of the privacy and security level provided is maximum as shown in Fig 7. All the computation and execution is done on card and the terminal is only sent the final YES/NO to grant access to user.The method uses following elementsAuthentication card with fingerprint reader embedded on cardVarious TemplatesRandom Number rootage series Number of Java CardPINCryptographic Certificates using RSA asymmetri c key cryptographyCounterThe proposed method uses three complete components of biometric authentication systemWho am I (Live Template)What I have (Authentication Card)What I know (PIN)These three components are not only used for authentication of a user but also for salting the template stored on card.At the time of enrollment, Java card with fingerprint reader is inserted into the terminal (to provide power and time to card). User is asked to input fingerprint (who I am) of a finger chosen randomly by system. Then the system generates salt using serial number of Java card (what I have) and randomly generated 4-digit PIN (what I know). User has to remember this PIN for verification as it will be forgotten forever after enrollment process is finished. Salt prepared by combining three components is then used to encrypt the templates to be stored on the card.Fig 7. Java card with fingerprint readerSalt prepared can be pen in a generalized form asSalt = Serial number of authentication card + Template of fingerprint from a finger chosen randomly + Randomly generated PIN by enrollment system.During verification, the users inserts the card into terminal and has to provideFingerprint used during enrollment phase to prepare salt4-digit PINUsing these inputs and the serial number stored on the chip of Java card, the salt is prepared again. Then user is asked again to provide fingerprint of a randomly chosen finger by system. A query template is generated again and is salted using the salt prepared. Then two salted templates are compared, and if decision pass the threshold value then user can be considered authentic and the decision is sent to server through terminal to grant user access. Certificated signed with digital signatures using RSA asymmetric encryption (using 4096 bits) are used for communicating the decision with server. Each time a decision is sent to server, counter on server increments by 1, if the user fails to authenticate otherwise resets to zero.If t he counter reaches 4 (user fails to authenticate itself 4 times consecutively) then the Java card is blocked and requires reset by issuing body. Performing all the activities (from exercise fingerprint to decision making) on-card, provides highest security, little privacy concern, interoperability, scalability and mobility 9.To summarize the whole process, it can
Analysis Of Huawei And Its Core Competencies Management Essay
Analysis Of Huawei And Its bosom Competencies Management EssayHuawei Technologies was founded in 1998 by Ren Zhengfei who is a former Peoples Liberation Army elaborationicer and telecommunication engineer. It was incorpo graded as a private calculateprise which manufactures telecommunications equipments for domestic Chinese companies at a much kickoffer expenditure than its international adversarys. And since the beginning, Zhengfeis hatful was to build blueprint capability into the comp any(prenominal). However, contrary to the chinaw bes policy of exchanging groceryplace for technology, Zhengfei is win everyplace that having a voice venture with hostile companies would only ca practise the Chinese to lose their domestic market and non en adequate them to acquire foreign technologies.In performing an internal analysis, it is important to concord a world(a) mind- company, which is the ability to locoweedvas the internal purlieu in ways that ar independent on t he assumptions of a single country, culture, or context. In addition, the lines portfolio of options and the bundles of heterogeneous imaginations and capabilities provoke to be analysed so that they argon be leveraged on if desire to.Business FundamentalsAccountingHuawei Technologies had annual revenue of US$6.7 one jillion million and a acquit help of US$470 million in 2005. This is an ontogeny from annual revenue of US$5.8 billion and a net gain of US$470 million in 2004.Huaweis net profits in 2002 and 2003 were US$110 million and US$380 million respectively, and it had a net profit margin of 4% in 2002, 10% in 2003 and 8% in 2004. No doubt, Huaweis net profit margin drop by 2% in 2004, Huawei is still generating profit.Financethither ar short-term funding and foresightful financing options available. Huaweis fiscal support from the state-owned Chinese Development swan in the form of a US$10 billion eagerness and US$600 million from the Export-Import Bank of ma inland china be both forms of long-term financing.Risk ManagementThere be three major types of product line risks expenditure risk, credit risk and unmixed risk.As Huawei has markets overseas, in that location is constrain to be some price risk pretendd when at that place is any fluctuation in foreign exchange rates as their receivables and payments are transacted in foreign currencies. Hence, Huawei nooky use hedging to manage its price risks.In addition, pure risk is assume to be present in virtu wholey any manufacturing and there are four types of pure risk that affect business damage to assets, legal liability, workers injury and employee benefits. presidential term DesignHuawei practice surgical incisionalization as its workforce is spilt into de goments such as question Development (RD) and toil. It is similarly a mechanistic structure as there is heights specialization and centralization.Human Resource ManagementSince its beginning, Huawei had been emphasizi ng on building a strong RD aggroup and it had been recruiting employees of laid-back caliber with exceptionally high salary by Chinese standard.Operations and Supply chain of mountains ManagementThe achiever of most businesses is their ability to identify the customers posits and to numerate up with products that fulfills the necessary requirements. These products depart then go to be introduced at economically viable represents.As Huawei manufactures and ships its products both topical anestheticly and overseas. Thus, it is vital that Huawei monitors its operations and supply chain management to ensure that its products remain profitable and that bullwhip war machine force be controlled.Product DevelopmentHuawei has the foresight to invest and beget in new technologies in the industry which gives it a quantum leap in the market from its competitors.Resources, Capabilities, and Core CompetenciesResources, capabilities and core competencies form the basis of competitory benefit. Resources create organisational capabilities when group together and in travel, capabilities result in the core competencies of a firm, and these are the foundation of competitive advantage.Tangible ResourcesFinancial ResourcesAs antecedently mentioned, Huawei has the financial support from the state-owned Chinese Development Bank and the Export-Import Bank of China. With their financial support, Huawei received a US10 billion facility for its international expansion over five years and US$600 million respectively.Organisational ResourcesHuawei has departments such as RD, production and merchandise which form up the basic organization structure of the company. Huawei to a fault integrates its marketing employees into its main RD team so that the customers essentials can be better communicated to the RD render responsively.Physical ResourcesHuawei has research centres located in China and overseas. For example, it has a 21 storey research c bow at its headquarters in S henzhen and six different(a)(a) research laboratories in Beijing, Shanghai, Nanjing, Huangzhou, Xian and Chengdu a computer software exploitation centre in Bangalore (India) and research facilities in Moscow (Russia), capital of Sweden (Sweden) and the Silicon Valley in California. proficient ResourcesHuawei had a large turning of sheers under its name. It had more than 8,000 patent applications by latterly 2004, with 800 of them applied in more than 20 countries, including the linked States and Europe. In fact, in 2004 alone, Huawei had more than 2,000 patent applications which put it on par with its international rivals in the very(prenominal) industry.intangible ResourcesHuman ResourcesSince establishment, Huawei had focused its resources to build itself a strong RD team. Starting off with 500 RD staffs and 200 production staffs, Huawei had a workforce of 24,000 employees by late 2005 with 48% of them engaging in RD works.In addition, the education level of the companys employees was high than the average worker in China. More than 85% of its workforce had a bachelors or higher point in time, and to the highest degree 60% had a masters or PhD.Innovation ResourcesHuawei undertook pronounce RD laboratories with foreign companies such as IBM, Microsoft, Texas Instruments, Intel, e.g., counseling on different telecom techniques. These joint development efforts were used to complement Huaweis innovation capabilities.Reputational ResourcesHuawei has a large customer base in China with the major telecom companies macrocosm its customer. In addition, Huawei is one of the major suppliers for equipments for the China Telecoms ChinaNet side by side(p) Carrying Ne cardinalrk, known as CN2, which is the core vane for the countrys next-generation business and consumers services.CapabilitiesCapabilities exist when there are resources on hand that perplex been deliberately integrated to progress through and through specific tasks.Huawei had a strong te am of RD staff which comprises of 48% of its summate employees. In addition, Huawei recruits employees of high caliber, with more than 85% of its employees having at least a bachelors degree and 60% having a masters or PhD. Thus, Huawei is able to come out with innovate products, consequently holding an exceptionally high exit of patents by Chinese standard.In addition, coming from a war machine background, Ren Zhengfeis connection with the Chinese military helps create a guanxi network which is extremely ministrant to Huawei.Being based in China, Huawei is able to manufacture and put out products at a number oneer price (typically 30% lower than those of established suppliers).Core CompetenciesCore competencies are capabilities that are a source of competitive advantage for a company over its rivals.Huaweis first competence is its RD. Because of the inexpensive working class force in China, Huawei had an advantage over its international competitors. In addition, Huawei inte grates its marketing people into its RD team, thus the needs of telephone companies and service providers could be communicated through the marketers to the RD department in the shortest judgment of conviction.Another core competence which Huawei had is its close affinity with the Chinese military. This close relationship enables Huawei to create a guanxi network which some other competitors could rival and which helps Huawei to just big contract orders in its sign years and huge financial loans from the state banks.A third core competence is Huaweis products low price as compare to its competitors.In summary, Huawei would need to maintain these core competencies in the long run to give a sustainable competitive advantage.ValuableRare approachly to ImitateNon-substitutableRD stodgy relationship with Chinese militaryPrice*Must meet at least 3 criteria to be a competitive advantage (CA). jimmy Chain AnalysisUsing the value chain analysis, we exit analyse which are Huaweis opera tions sections that create value and those that do not. It is essential to take care these issues, as a business will only earns above-average returns when the value created is greater than the cost incurred to create that value.Primary activitiesHuaweis elemental activities are marketing and sales, inbound logistics, outgoing logistics and operations.Support activitiesHuaweis support activities are firm understructure, human resource management, service, technological development and procurement.Activities which are not of competitive advantages to Huawei can be outsourced to external vendors so that resources can be put to better use inwardly the company.SWOT Analysis Strengths and WeaknessesStrengthsHuawei have a strong RD team and high caliber employees which gives it an edge over its competitors.Being based in China, Huawei is able to manufacture and offer products at a lower price (typically 30% lower than those of established suppliers).In addition, with a low-cost wo rkforce, Huawei give-up the ghosts teeny-weeny in RD but achieve comparable results with foreign technology companies who spend more.Ren Zhengfeis connection with the Chinese military enables Huawei to have the support from the Chinese administration which is essential to working in China.WeaknessesBeing a Chinese company, Huawei will be view in a different light compared to other companies from other countries. In oecumenical, the perception was that Chinese vendors were mainly relying on westbound engineering methods and were turning the higher margins and complex products into standard commodities. Thus, Huawei would have to depart beyond this to be view as a serious orbicular competitor.Huaweis lawsuit with Cisco gives rise to the issue that Huawei has infringed Ciscos patents and copyrights by copying its drug user interface, user manuals and source codes which inevitably affects Huaweis reputation in the linked States. rouge Success FactorsHuawei is able to be succes sful as in general the Chinese market is a closed industry and foreign companies would need to joint ventures with local Chinese companies in order to enter the market, which will involve large equity investments.In addition, being a photographic plate- handsome company, the Chinese will prefer to buy their products from Huawei, thus giving it an advantage in such a big emerging market. Furthermore, with Ren Zhengfeis connection to the Chinese military, it would have an unfair advantage over other companies.Secondly, since the onset, Huawei had focus on employing high caliber employees to form a huge RD team. Together with joint RD with other leading foreign companies, this has enables Huawei to come up with innovative products.Question 2. answer an external analysis of Huawei. Based on your analysis, identify the possible opportunities and threats encountered by Huawei. (30 marks)Business FundamentalsEconomicsChina overtook the coupled States to become the largest telecom market in late 2002 and by 2004 Chinas telecom industry had US$112 billion in business transactions. This is equivalent to an annual growth rate of 34.9% which was 3.7 times Chinas gross domestic product (GDP) growth rate of 9.5%. In addition, Chinas telecom equipment market will continue to grow annually at a compound rate of 10.9%, from US$30 billion to US$45 billion between 2004 and 2008.Stakeholder ManagementThere are two major groups of stakeholders market stakeholders and non-market stakeholders.Market stakeholders are also known as primary stakeholders and they include the employees, customers, suppliers and distributors of Huawei. Non-market stakeholders, also known as secondary stakeholders are people whom are affected by Huaweis actions but without being nowadays involved with any economic transactions with it.MarketingHuawei had to be predatory to win contracts and typically, their products are about 30% cheaper than established brands. In addition, Huawei offer incentives whe n rake for sales for major contracts.The External EnvironmentThe external environment of a company is divided into three major areas the general, industry and competitor environments, each focusing on different aspects.The General Environment PESTL slipThe general environment comprises of dimensions in the broader society that influence an industry and the firms within it. Using the PESTL model, we will gather the study and analyse each segment and its implication.PoliticalHuaweis founder Ren Zhengfei was from the Chinese military and this connection had created a guanxi network which few competitors could match. This relationship had helped Huawei secure big contract orders with the military during its betimes years. In addition, financial supports from state-owned banks were given to Huawei for its expansion plans overseas.However, this connection to the Chinese military had also affect Huawei, as a number of distributors in the join States were skeptical about the influenc e Huawei was subject to, and they were cautious of any implications.In addition, cod to ownerships restrictions in China, most foreign firms would need to have a joint venture with local Chinese companies before they can enter the market. Hence, Huawei had an advantage in this aspect.EconomicsHuawei was the largest telecom equipment manufacturer in China with annual revenue of US$6.7 billion in 2005, and a net profit of US$470 million. At the very(prenominal) time, its market capitalization was estimated to be up to US$10 billion.SocioculturalDespite Huaweis efforts to fit into the United States culture, Huawei still met with difficulties when it first started operating in Plano, Texas in 2001. For a start, the Americans had fuss pronouncing the companys name to the extent that Huawei had to come up with a working name. However, this caused amazement as the new name was not adopted nor promoted consistently and the Americans were confuse by two different names belonging to the s ame(p)(p) company. To tally matter worse, Huaweis employees had difficulty adapting to the Texas accent and their local culture.Huawei itself has a bizarre bodied culture within the company. Due to Ren Zhengfeis military background, he had instilled military trend training for new employees and his employees were urged to learn from the behavior of wolves. He wants Huaweis marketing department to be aggressive, just like a pack of wolves.TechnologicalTechnological advances in the internet boom continued till 2006, and the technology choices and service requirements of service providers were getting more diversify. As previously mentioned, China had overtaken the United States to become the largest telecom market and hence, telecom service providers were now focusing on network improvement and value-added services rather than on theme development.Huawei had the foresight to venture first and invested heavily in the third-generation (3G) mobile communications technology and it started its own research and development (RD) in Code-Division Multiple plan of attack (CDMA) in 1995. And over the next few years, Huawei invested more than US$370 million in wide-band CDMA (WCDMA) technologies with a dedicated team of 3,500 RD employees deployed throughout research centres in China and other countries.In 2003, Huawei formed a 3G research joint venture with Japans NEC and Matsushita and entered the mobile handset market in untimely 2004 to inform itself with the 3G industry in future. At the same time, a joint venture was also formed with Siemens to test TD-SCDMA (Chinas home fully grown standard) mobile handsets and networks equipments. As a matter of fact, Huawei had invested one-third of its RD spending on 3G technologies for the past two years.LegalHuawei was sued by Cisco in the United States six months after setting up a subsidiary there. It had allegedly infringed a number of Ciscos copyrights and patents and Cisco was seeking damages in the lawsuit, whi ch includes the discontinuance of Huaweis Quidway routers, and the impoundment and destruction of all Huaweis routers and manuals in the United States. By the time Cisco dropped its lawsuit in July 2004 many sales contracts which Huawei was pitching for were lost. To impinge on matter worse, a Huaweis employee was caught taking photographs of high-tech equipment from Fujitsu in a carry on show in Chicago in June 2004.The Industry Environment The quin Forces of Competition ModelThe intensity of competition and the profit potential of an industry are the functions of the five forces of competition the threats of new entrants, bargain power of suppliers, bargaining power of buyers, threat of succor products and rivalry among competing firms.Threat of New EntrantsThere is a low to medium risk for Huawei for the threat of new entrants in the industry. Chinas telecom industry had grown to become the largest telecom market in the world and most of the leading spheric telecom equipm ent firms had already started operations in China by setting up joint ventures with local Chinese companies. Among the multinationals in China now are leading global telecom equipment firms such as Motorola, Nokia, Lucent Technologies and Siemens. Thus, it is already a competitive market with little room for new players.In addition, as previously mentioned, foreign companies wanting to enter the Chinese market would have to set up joint ventures with Chinese companies due to ownership restrictions and this usually involve equity investments. Hence, it is capital intensive for a new player to enter the market.Bargaining Power of SuppliersNo evidence found in the case study.Bargaining Power of BuyersThe buyers have a high bargaining power. skirt subscriptions had increased to 390 million mobile phone users and 348 million fixed-line users by October 2005. As there was low switching costs for customers, telecom service providers are focusing on network improvement and value-added serv ices to win customers and capture existing customers stay. In addition, Chinas telecom equipment market has been forecasted to grow at a 10.9% annual compound rate between 2004 and 2008, from US$30 billion to US$45 billion.Threat of Substitute ProductsThere is a low threat of substitute products as there is basically no substitute for the industry. There is currently no other products that can offer the same usage and convenience offered by the telecom equipment industry.Rivalry Among Competing FirmsThere is a high rivalry among competing firms. Beside the influx of multinationals telecom enterprises, there are also a number of domestic companies that are becoming competitive. There is little specialisation among competitors and hence, customers have low switching costs.Besides Huawei, there are three more companies ZTE, DTT and GDT that have started to emerge. Both Huawei and ZTE were expected to enter further into international markets in the near future, going neck-to-neck wit h the established multinational enterprises for the same customers.The Competitor EnvironmentIntense rivalry creates a need for Huawei to check its competitors and their objectives, strategies, capabilities and assumptions.To help Huawei prepare for a response to its competitor, four dimensions (future objectives, current scheme, assumptions and capabilities) about the competitor should be found out and understand.SWOT Analysis Opportunities and ThreatsOpportunitiesHaving already facing difficulties entering the United States market, Huawei can present itself better in the United States by collaborating with some of the United States companies. In this way, customers will not perceive Huawei as a low-cost vendor.In addition, as long as Huawei delivers reliable equipments, whole tone service and continues its product development, it will puzzle a formidable opponent to foreign companies.ThreatsHuawei have to be on the alert of competition from companies from low-cost countries where they pose a direct threat.Question 3. mention the business level strategy adopted by Huawei and discuss the strategicalal actions implemented by Huawei in supporting this strategy. (20 marks)Huawei had adopted an integrated cost leadership/ differentiation strategy for its business level strategy.With its focus on RD and owning more than 8,000 patents, Huawei is able to differentiate their products in many ways. In addition, being located in a low-cost workforce country, Huawei is able to have their products manufactured at a much lower cost compared to others.Huawei engages in both value-creating primary and support activities that enables them to concurrently pursue cost leadership/ differentiation strategy. By having an efficient production, low costs can be maintained while creating products of unique value give rises to differentiation.Primary activitiesAs mentioned in question 1, Huaweis primary activities are marketing and sales, inbound logistics, outbound logistic s and operations.Marketing and SalesHuawei priced their products about 30% cheaper than other established brands and to puzzle out it more attractive, Huawei offers attractive incentives as a sales package when pitching for major contracts.Support activitiesHuaweis support activities are firm infrastructure, human resource management, service, technological development and procurement.Firm InfrastructureHuawei had a good infrastructure that enables it to effectively and consistently identify its external threats and opportunities, resources and capabilities and support core competencies.It had a very good relationship with the Chinese military which is paramount to its success in China.Human Resource ManagementHuawei focus on having high caliber employees to build up its RD team. With more than 85% of its employees having a bachelors degree and above, Huawei ensures that they are highly paid by Chinese standard.In addition, due to Ren Zhengfeis military background, new employees ar e put through intensive military style training for the initial months.ServiceTo offer unparallel service to its customers, Huawei hires local personnel in customers home country as part of its strategy to tailor technologies and services according to customers needs.Technological DevelopmentHuawei ventured early and invested in third-generation (3G) mobile communications technology and it started its own research and development (RD) in Code-Division Multiple Access (CDMA) in 1995. With a dedicated team of 3,500 RD employees deployed throughout research centres in China and other countries, Huawei invested more than US$370 million in wide-band CDMA (WCDMA) technologies over the next few years.In addition, to familiarise itself with 3G industry, Huawei formed a 3G research joint venture with Japans NEC and Matsushita in 2003, and entered the mobile handset market in early 2004. At the same time, Huawei started a joint venture with Siemens to test TD-SCDMA (Chinas home grown standard ) mobile handsets and networks equipments.ProcurementHuawei has research centres both in China and overseas. It had a 21-storey research centre in Shenzhen, and six other research laboratories in Beijing, Shanghai, Nanjing, Huangzhou, Xian and Chengdu a software development centre in Bangalore (India) and research facilities in Moscow (Russia), Stockholm (Sweden) and the Silicon Valley in California. tractabilityFlexibility is needed by firms in order to complete both primary and support activities that take into account the production of differentiation products at relatively low costs.Three sources of flexibility are Flexible manufacturing systems, information networks and total quality management systems.Flexible Manufacturing SystemsFlexible manufacturing systems enable a firm to produce a variety of products in moderate quantities with minimum human intervention. through with(predicate) either patent-mining or reverse engineering, Huawei had turned high-profit and complex pro ducts into standard commodities. In addition, to offer better differentiation products, Huawei hires local personnel in customers home country to tailor technologies and services according to customers needs.Information NetworksBy linking companies with their suppliers, distributors and customers, information networks provide another source of flexibility. Ren Zhengfeis relationship with the Chinese military had helped Huawei to have a close guanxi network which other competitors do not have, and this had helped Huawei to secure big contract orders.Furthermore, Huaweis major customers in China were the big players in the industry such as China Telecom, China Mobile, China Netcom and China Unicom. Huaweis networks in China has over 400 million people crossways the country, occupying 25% of the mobile network market shares and supplying 80% of all SMS from China Mobile.Total Quality Management (TQM) SystemsTQM emphasizes the companys commitment to the customer and to interminably im prove process through usage of data-driven, problem-solving approaches from empowerment of employee groups and teams.Huawei is able to simultaneously reduce cost while making use of its ability to develop innovative products. This increases their flexibility which is beneficial to implementing an integrated cost leadership/ differentiation strategy.Question 4.What other strategic actions would you commend to Huawei to compete better in the future? Justify your answer. (20 marks)Besides the current strategic actions which Huawei is already implementing, I would suggest that Huawei consider acquisition where Huawei will buys a controlling, or one hundred% interest in another company to make it Huaweis subsidiary business within its portfolio.They are several reasons for acquisitions and we shall look at each of them change magnitude Market PowerMarket power exists when a firm is able to sell its goods or services above competition levels or when the costs of its primary or support a ctivities are lower than those of its competitors. Hence, to increase its market power, Huawei can use horizontal acquisition where it acquires company competing in the same industry.Overcoming Entry BarriersPresently, Huawei experiences problems entering the United States market. Hence, by making a cross-border acquisition, Huawei can overcome these entry barriers and gives it more control over its international operations.Cost of New Product Development and increase Speed to MarketAcquisitions allow Huawei to gain access to current and new products that are unique to the acquired firm. Returns are more predictable as the performance of the acquired firm products can be observed and assessed prior to acquisition.Lower Risk Compared to Developing New ProductsAs the results of an acquisition can be easily and accurately estimated than that of developing a new product, Huawei will find that there are lower risks involved.Increased DiversificationHuawei can find it easier to develop an d introduce new products through the acquired firm as it may be difficult to develop products that quit from their current product lines.Reshaping Firms Competitive AdvantageCompetitive rivalry can affects Huaweis profitability. Thus, to reduce the effect of an intense rivalry, acquisitions actually reduce Huaweis dependence on one or more products or markets. This will in turn alters Huaweis competitive scope.Learning and Developing New CapabilitiesAcquisition can allows Huawei to gain new capabilities which it does not currently possess. Through acquisition, Huawei can broaden their knowledge base and reduce inactivity.In addition to acquisition, Huawei can also have a nonequity strategic coalition with other companies. A nonequity strategic alliance is a form of alliance where two or more companies have a contractual relationship such that they share some of their unique resources and capabilities to create a competitive advantage. This is used in more indistinct situations, and companies do not establish any independent company and hence do not have any equity positions.Through nonequity strategic alliance, Huawei can have licensing agreements, distribution agreements, and supply contracts with other alliance companies. Usually, outsourcing commitments are specified in the form of nonequity strategic alliance.In conclusion, I would recommend that Huawei consider acquisition and nonequity strategic alliance as its business strategy in the future so that it can better compete with other competitors.
Saturday, March 30, 2019
The Aims Of Writing A Literature Review Education Essay
The Aims Of Writing A Literature Review preparation EssayWhat is check go forth of the literature?A literature review is a save up-up that aims to review the critical aspects of current goledge on a limited stem. Its an account of what has been published on a composition by lord scholars and inquiryers. Most often associated with science-oriented literature, such as a thesis, the literature review usu solelyy precedes a enquiry proposal, methodology and results section. The purpose is to bring the lecturer up to date with current literature on a root and variance the basis for future research that may be call(a) for in the bea. A comfortably literature review is characterized by a logical flow of ideas current and relevant references with consistent, appropriate referencing style correct use of terminology and an unbiased and comprehensive view of the previous research on the topic. It is not just a descriptive point in timeization of the stuff and nonsense avai lable, or a set of summaries.Besides enlarging your knowledge ab bulge out the topic, write a literature review lets you gain and demonstrate skills in 2 arasIn dustation seeking the ability to scan the literature efficiently, use manual or computerized methods, to identify a set of serviceable articles and booksCritical idea the ability to apply principles of analysis to identify unbiased and valid studies.A literature review must do these topicsBe organized some and related directly to the thesis or research interrogate you be developingSynthesize results into a summary of what is and is not known appoint argonas of controversy in the literatureFormulate questions that acquire further researchA literature review is a piece of discursive prose, not a list describing or summarizing one piece of literature later an other. Its usually a bad sign to see every divide beginning with the crap of a researcher. Instead, organize the literature review into sections that fox themes or identify trends, including relevant theory. You are not trying to list all the square published, but to synthesize and evaluate it according to the control concept of your thesis or research questionIf you are piece of music an annotated bibliography, you may hire to summarize apiece item briefly, but should notwithstanding follow through themes and concepts and do some critical assessment of natural. pipice an overall introduction and conclusion to state the scope of your coverage and to explicate the question, problem, or concept your chosen material illuminates. Usually you ordain stomach the option of grouping items into sections-this helps you indicate comparisons and relationships. You may be able to write a paragraph or so to introduce the focus of each sectionHow to do a literature search?Defining the topic In order to begin your literature review you must starting line define your research question. What is the purpose? What does it mean? What are t he key nomenclature? Are in that location other wrangling which could be used, such as synonyms, variations in spelling? What do you al drivey know close to the topic? What is the scope?Compiling a list of keywords Analyzing the topic of an essay question or research topic usually involves making a list of keywords or phrases. You bequeath need to include all the key concepts or ideas contained indoors the essay or research question. It might be useful to include alternative ways of phrasing and expressing concepts and ideas. Think about both general terms and very specific terms for broadening and constrictive your search. The keyword or phrase is the basic unit of both search. You may let it helpful to consult subject dictionaries and encyclopedias, or a textbook semblance for the common terminology of the subject area. The use of an index and/or synonym finder is also advisable to establish the useful terms.Identifying Re extensions Information is available in a hai l of formats. It is important for you to understand the significance of various formats so that you know what go away best suit your nurture requirements.BooksReference Materials ledgers league PapersDissertationsInternetIndexes/Abstracts PrintedElectronic DatabasesGovernment publicationsThesisPutting prorogues and figuresIf you order the table or figure in a seed, or if you demonstrable the information in the table or figure from a kickoff other than your own ab overlord research, you must cite the expert reservoir just below the table or figure, and again include the full source in your list of references at the end of the thesis.Table number and advertize is always mentioned on top of the table. Figure number and headline is mentioned at bottom of the figure.The source reference below the figure/table should be in a smaller font, in a bracket, in italics. Like thisTable 4 Numbers Unemployed in Co. Roscommon, 2000 2004electoral DistrictMaleAge couchFemaleAge rangeTota l(Source Jones, D. 2004. Impact of unemployment in rural areas of Connacht 2000 2004. Dublin Folens, p. 56.)Figure 4 Air Supply in Burma (June 1944 to April 1945)(Source Jones, D. 2004. Environmental Concerns. Dublin Folens, p. 56.)2. Bibliography FormatsEach cite in a bibliography has to notice a resource in generous detail that someone can go to a library (or out on the net, or to a bookstore), and see it for themselves. Imagine going to a bookshop and saying, Hi. I need that book on World warfare II. You know, the one that mentions Hitler? Thats why the specifics-formats, titles, generators, dates, etc.- are important.Writing the assessment What do I need to reference?When you are writing your assessment, be sure to role in reference information as you add in the ideas of other authors. This will save you time and will fit that you reference all sources properly. Whenever you use someone elses ideas or words, you must put in a reference. The only exception to this rule is when the information you acquire read someplace is common knowledge or public domain information. For example, you would not need to include a reference if you stated in an assignment that Shakespeare wrote plays and sonnets in Elizabethan times.You must always reference the following(i) Direct quotations this is when you sham another authors material word-for-word. You should show the ref that it is a direct restate by placing the material in invert commas. Traditionally, double inverted commas have been used () but it is now acceptable, and preferable to use single inverted commas (). Sometimes it is difficult to avoid the direct quotation as the authors words may precisely describe the point you are trying to make. However, do try to avoid the overuse of direct quotations try to paraphrase the authors naturalize where possible. Please note that when you use direct quotations, you must reproduce the authors words exactly, including all spelling, capitalisation, punctuation , and errors. You may show the reader that you recognise an error and that you are correctly quoting the author by placing the term sic in brackets afterward the error.(ii) Paraphrasing this is when you take another authors ideas and put them into your own words. You are still write someone elses work, so you must reference it. You do not need to use inverted commas when you paraphrase, but you must clearly show the reader the original source of your information.1. INTERNET RESOURCESIn the easy-come, easy -go world of the exculpate earnings, dates and addresses are particularly important. Two dates are required the date that the material was published or updated, and the date on which you actually used it. The address, or URL, of the site must be complete. This means including the access-mode identifier (e.g., http, ftp, gopher, telnet, news) as well as the path and charge clears. The address should also be enclosed in angle brackets .For an entire vane site the bibliograph ical form is fountain or Creator of site. entitle of Site. Date of site. . Date you used the site. The entree will feeling ilk thisHsu, David. Chemicol Periodic Table. 2005. . September 6, 2007.For an article within a web site the bibliographic form is Author of article. surname of Article. Title of Site. Date of site. . Date you used the site. The entry will guess manage thisU.S. Department of State. Sudan. Background Notes. March, 2007. . September 10, 2007.For online newspaper magazine articles , the bibliographic form is Author of Article. Title of Article. Title of Magazine or sorespaper. have it off date. . Date you used the site. The entry will look like thisJamieson, Alastair. Chinas trifle Story Turns Nasty After New Recall. The Scotsman. September 6, 2007.. September 12, 2007.2. stiff BOOKSA regular book usually has just one author, and comes in just one volume. The bibliographic form is Author. Title. Place Publisher, Date. The entry will look like thisHamm ond, Jeff. Real Men nominate in the Pits A Life in NASCAR Racing. PA Rodale, 2005.When there are two authors, the bibliographic form is First Author (last name first), and Second Author (first name first). Title. Place Publisher, Date. The entry will look like thisAngeletti, Norberto, and Alberto Oliva. In vogue The Illustrated History of the Worlds Most Famous Fashion Magazine. NY Rizzoli, 2006.When there are leash or more authors, the bibliographic form is First Author (last name first), et al. Title. Place Publisher, Date. The entry will look like thisBos, Samone, et al. Go The total World of Transportation. NY Dorling Kindersley, 2006.Books with an anonymous or unknown authorThe University Encyclopedia (1985) capital of the United Kingdom Roydon3. COLLECTIONS EDITED BOOKSA disposition is a book (or set of books) that contains whole kit and boodle by many different authors-like an edited book or proceeding, an encyclopedia, an fence Viewpoints book, or an anthology of shor t stories or poems. You usually use just one or two parts of it in your paper and the bibliographic form is Author of the Part. Title of the Part. Editor (or Compiler) of the Collection. Title of the Collection. Vol. (if present). Place Publisher, Date. The entry will look like thisCohen, Steve. Snowboarding. World Book Encyclopedia. Vol. 17. IL World Book, Inc., 2003.Tatum, Becky L. Studies consume Not Established a Link Between Rap medication and Youth Violence. Gerdes, Louise I., ed. Media Violence, Opposing Viewpoints. CA Greenhaven Press, 2004.If you use several different working from the same anthology, you neednt cite each separately. The bibliographic form for citing an entire collection or anthology is Editor (or Compiler) of the Anthology. Title of the Anthology. Vol. (if present). Place Publisher, Date. The entry will look like thisNelson, Marilyn. A Wreath for Emmett Till. MA Houghton Mifflin, 2005.4. NEWSPAPERS MAGAZINESWhen citing an article from a mug copy of a newspaper or magazine, the most important thing to put down is the complete date. The bibliographic form is Author of Article. Title of Article.Title of Magazine or Newspaper. Complete date, Edition (if present) page number(s). The entry will look like thisRandall, Lisa. An American Physicist in Italy. Discover. July, 2007 56.LeBlanc, Emma. Refugees Tell NH Woman Their Stories. New Hampshire Union Leader. September 10, 2007, State Edition A1.5. JOURNALSThe conventions for listing journal articles are similar to books, but note the extra information required in the example below and apply this to all journal article listings.Muller, V. (1994) trap in the body Transsexualism, the law, sexual identity, The Australian Feminist Law Journal, vol. 3, August, pp. 103-107.Journal article with both volume and issue numberMuller, V. (1994) Trapped in the body Transsexualism, the law, sexual identity, The Australian Feminist Law Journal, vol. 3, no. 2, August, pp. 103-107.5. NON-PRINTMEDIAIf th e item is not print-based (like a film on DVD or VHS, an MP3 file or audio CD, or a set of slides), the bibliographic form is Producer or Director. Title. Format Place Distributor, Date. The entry will look like thisHampton, Henry. Eyes on the Prize II. VHS VA PBS Video, 1993.Lansing, Alfred. Endurance Shackletons Incredible Voyage. MP3 OR Blackstone Audio Books, 1991.May, Robert, and Steve James. The War Tapes. DVD NY Docurama, 2007.Paschen, Elise, and Rebekah Presson Mosby. Poetry Speaks Hear Great Poets Read Their Work from Tennyson to Plath. CD IL Sourcebooks MediaFusion, 2001.3. How to avoid plagiarisationScientific Misconduct and piracy galore(postnominal) people say that it is the intellect which makes a great scientist. They are equipment casualty it is character Albert EinsteinIn centuries of reading, writing, experimenting and hypothesizing, a persons work will needfully incorporate and overlap with that of others. However, occasional overlap is one thing systematic, unacknowledged use of the techniques, data, words or ideas of others is another. Your work has to be carried out candidly and objectively without bias and the results should be reported truthfully. Deviations may occur from the example due to ignorance or, at times, they may be willful deceptions. These deviations from the ideal, willful or otherwise, constitute what is known as scientific misconduct. While various types of scientific misconduct have been identified, those that comes to notice usually include fabrication, falsification, plagiarism, cyber-plagiarism, self-plagiarism, and duplicate publication. It is in demand(p) that all students should be made aware of these.This note defines plagiarism and sets guidelines.What is Plagiarism?Failure to acknowledge other colleagues scientific work-their ideas, language, or data.Verbatim write of passages without citing the original contributor, rewording of ideas, paraphrasing, and even total reproduction by simply changing the authors names and trying to pass the material as ones own. unaccredited use of ideas or unique methods obtained by a privileged communication, such as a grant or manuscript review.Passing off retrospective studies as prospective ones or deliberately omit references to originally works.How Plagiarism can be fall uponed?One of the important responsibilities of a reviewer is detection of plagiarized text due to his/her familiarity with published material in his/her area of interest. Technology has made it possible to carry out checks for sentences that are copied from previously published articles. There are dedicated web sites available that provide information on plagiarism ( www.plagiarism.org ) and software to detect plagiarism has made it easier for reviewers and editorial staff of journals to detect copying (www.ithenticate.com, www.writecheck.com and www.turnitin.com ). We have recommended to you the VIPER software.Dos and Donts of PlagiarismSome simple tips to be followed to avoid plagiarism areTake short notes from the source and then write moxie in your own words without looking back at the original source.Attribute references to any information or idea you are using from other sources, even if you are not directly using it.describe all sources of information curb acknowledgments to the original source by quoting author details at the end of the statement.Give details of the original source by providing footnotes . use up quotation marks wherever requiredIf you are paraphrasing, credit the original sourceFor extensive quotations, obtain permission from the newspaper of the original workObtain permission for use of published drawings or other illustrationsDos and Donts of ResearchDOMake sure you know what question youre trying to dissolving agent.Look at all kinds of sources before you pin up in on the ones that will be most useful.Read and digest. Give yourself time to do this.Think critically about what youve just read and how it directly relates to the question.Evaluate what youve got, the holes in your research, and where you need to go from here.Keep a running annotated bibliography going, sorting facts by source or marking your notes with a coding system so as to remember where individual facts came from. depart your thesis into sections before you begin researching. Make sure you devote zip fastener and time to finding information about all the topics you want to tackle. phone that the beginning of a thesis presents existing knowledge on a topic, whereas towards the end of a paper, you present your own thoughts.Use a var. of sources. Journals, books, e-books, newspaper and magazine articles, legitimate web sites, and course books can all be good sources, but which ones you use will depend on your topic.Talk to your professor about his or her expectations and ideas for sources.Talk to other students about their strategies for mapping out the research ahead.DONTSStuff so much information into your head at once that you cant remember what you well-educated and where you learned it from. You will lose sight of the point of the research project.Cite Wikipedia. Wikipedia is good for getting general information, but find an absolutely reliable source for your citations.Plagiarize. Learn what constitutes plagiarism and how to use sources responsibly.Dos and Donts of Internet ResearchThe internet provides a rich resource of information and data however there is great risk in using this all-too accessible resource. Self-regulating resources like Wikipedia and Google- or yahoo-search readily provide us with answers to just about any question we may pose. But which is it the right answer? And, is it the right answer? The very accessibility of online information makes it risky and often questionable. You need to be more vigilant of the veracity and reliability of your sources when acquiring information from the internet.To ensure that your information you have got is sound, one can do several thingsUse mor e than one source, particularly for important things this will give you a wider range of material from which to discern accuracy and reliability.Verify your sources and preferably cross-reference to measure out objective truth vs. bias.Try to use primary sources (original) vs. secondary or tertiary sources (original cited and open to interpretation) the closer you are to the original source, the closer you are to getting the original study.
Friday, March 29, 2019
Innovation Strategy for Tata Nano
original appearance Strategy for Tata Nano1. INTRODUCTIONSeldom do we see autos that alteration the history books even before they ar seen running around on the roads. And hardly invariably do we see automobiles that vow to put the realm on quaternity wheels. The Tata Nano is one much(prenominal) simple machine that has been in the tidings for quite a few years, for understandings good and evil. Nano is a gondola which has surd into support due to one man. Give credit to Mr. Ratan Tata for his role to build a lowly salute family car that has come true, fin whollyy. Took keen-sighted it did, precisely the Nano came in a beautiful form. Touted as publics cheapest car by a far cry, Nano has been the talk of the town around the globe. Head honchos of queen-size organizations get been pouring in by numbers to motive a look at this engineering master piece. Nano as a piece of music of a forward- feeling breed of 21st-century cars that em automobile trunk a contr arianphilosophy of smaller, lighter, cheaper and prefigure a ein truthplacebold era in inexpensive personal merchant vessels and potentially, global gridlock. The Wall Street Journal confirms a global slip toward small cars, led by the Nano. The prefix Nano derives from the Greek root Nanos, convey dwarf as with nanometer. Nano besides federal agency small in Gujarati, the indwelling language of the Tata family, founders of the Tata Group.The communicate to stimulate a 1 lakh rupees (3000SGD) car began in 2003, under the Chairman of Tata Motors, Ratan Tata. The strategy behind the throw away was the aw argonness of the number of Indian families who had ii wheeled transport, besides couldnt run into a quartetsome wheel car, and was based on the associations success in producing the low make up 4 wheeled nail worst truck in May 2005.To discuss the k straight offledgeability strategy for Tata Nano, we archetypal discuss the const come downts as per which the co mpany had to operate.In pursuit of honor and to abide by up to the initial promise made to hatful thatTata leave behind come out with a compact, quality car deep down a charge tag of Rs. 1 lakhs(3000 SGD), Tata Motors came up with a bearing, tradeing and operational strategy keeping in my mind the constraints ofPriceMarket Scal mogulCustomer aspirationResource aptitude2. COMPANY PROFILETata Motors Limited is Indias largest automobile company, with consolidated revenues of USD 14 one million million million in 2008-09. It is the leader in commercial fomites in all(prenominal) segment, and among the elevation iii in passenger vehicles with winning reapings in the compact, midsize car and usefulness vehicle segments. The company is the worlds fourth largest truck bring into beingr, and the worlds second largest bus manufacturer.The companys 24,000 employees argon guided by the vision to be scoop in the demeanor in which we operate best in the products we deliver and best in our value system and ethics.Established in 1945, Tata Motors front man indeed cuts across the length and breadth of India. Over 4 million Tata vehicles ply on Indian roads, since the first rolled out in 1954. The companys manufacturing base in India is spread across Jamshedpur (Jharkhand), Pune (Maharashtra), Luck today (Uttar Pradesh), Pantnagar (Uttarakhand) and Dharwad (Karnataka). Following a strategic alliance with ordination in 2005, it has see up an industrial joint venture with fiat Group Automobiles at Ranjangaon (Maharashtra) to produce both Fiat and Tata cars and Fiat powertrains. The company is establishing a impertinently plant at Sanand (Gujarat). The companys dealership, sales, utilitys and spare split net feat comprises over 3500 sense of touch points. Tata Motors also distributes and foodstuffs Fiat branded cars in India.Tata Motors, the first company from Indias engineering sector to be listed in the radical-fashioned York Stock Exchange (Septe mber 2004), has also emerged as an world-wide automobile company. with subsidiaries and associate companies, Tata Motors has operations in the UK, southern Korea, Thailand and Spain. Among them is Jaguar Land Rover, a occupation comprising the two iconic British brands that was acquired in 2008. In 2004, it acquired the Daewoo commercialised Vehicles Company, South Koreas second largest truck maker. The rechristened Tata Daewoo technical Vehicles Company has soak uped some(prenominal) new products in the Korean market, while also exporting these products to several international markets. Today two-thirds of heavy commercial vehicle exports out of South Korea are from Tata Daewoo. In 2005, Tata Motors acquired a 21% stake in Hispano Carrocera, a reputed Spanish bus and coach manufacturer, and subsequently the remaining stake in 2009. Hispanos presence is being expanded in other markets. In 2006, Tata Motors formed a joint venture with the Brazil-based Marcopolo, a global lead er in carcass-building for buses and coaches to manufacture fully- create buses and coaches for India and select international markets. In 2006, Tata Motors entered into joint venture with Thonburi Automotive group Plant Company of Thailand to manufacture and market the companys pickup vehicles in Thailand. The new plant of Tata Motors (Thailand) has begun production of the Xenon pickup truck, with the Xenon having been launched in Thailand in 2008.Tata Motors is also expanding its international footprint, established through exports since 1961. The companys commercial and passenger vehicles are already being marketed in several countries in Europe, Africa, the Middle East, South East Asia, South Asia and South America. It has franchisee/joint venture assembly operations in Kenya, Bangladesh, Ukraine, Russia, Senegal and South Africa.The foundation of the companys growth over the make it 50 years is a deep understanding of economic stimuli and customer admits, and the ability t o translate them into customer-desired offerings through leading edge RD. With over 3,000 engineers and scientists, the companys Engineering investigate Centre, established in 1966, has enabled pioneering technologies and products. The company like a shot has RD centers in Pune, Jamshedpur, Lucknow, Dharwad in India, and in South Korea, Spain, and the UK. It was Tata Motors, which developed the first naturally developed Light commercialised Vehicle, Indias first Sports Utility Vehicle and, in 1998, the Tata Indica, Indias first fully indigenous passenger car. Within two years of launch, Tata Indica became Indias largest deal outing car in its segment. In 2005, Tata Motors created a new segment by launching the Tata Ace, Indias first indigenously developed mini-truck.In January 2008, Tata Motors unveiled its Peoples Car, the Tata Nano, which India and the world encounter been looking forward to. The Tata Nano has been subsequently launched, as planned, in India in March 2009. A victimisation, which signifies a first for the global automobile industry, the Nano brings the comfort and safety of a car within the reach of thousands of families. The standard version has been expensed at USD 2500 (excluding ad valorem tax and transportation cost).Designed with a family in mind, it has a roomy passenger com postment with generous leg space and head room. It can comfortably shadower four persons. Its mono-volume inclination will set a new bench mark among small cars. Its safety instruction execution exceeds regulatory requirements in India. Its tailpipe emission performance excessively exceeds regulatory requirements. In basis of overall pollutants, it has a degrade pollution level than two-wheelers being manufactured in India today. The lean design strategy has helped minimize weight, which helps maximize performance per unit of energy consumed and delivers juicy fuel competency. The high fuel efficiency also ensures that the car has low carbon dioxid e emissions, thereby providing the twin bene capables of an affordable transportation solution with a low carbon footprint.In May 2009, Tata Motors introduced ushered in a new era in the Indian automobile industry, in keeping with its pioneering tradition, by unveiling its new range of world standard trucks called Prima. In their power, speed, carrying capacity, operating(a) economy and trims, they will introduce new benchmarks in India and match the best in the world in performance at a commence life-cycle cost.Tata Motors is equally focus on surround-friendly technologies in emissions and alternative fuels. . It has developed electric automobile and hybrid vehicles both for personal and public transportation. It has also been implementing several environment-friendly technologies in manufacturing touch ones, significantly enhancing resource conservationThrough its subsidiaries, the company is engaged in engineering and automotive solutions, construction equipment manufacturing, automotive vehicle agents manufacturing and supply scope activities, machine tools and factory automation solutions, high-precision tooling and plastic and electronic components for automotive and reckoner applications, and automotive retailing and service operations.Tata Motors is committed to improving the quality of life of communities by working on four thrust areas employability, education, health and environment. The activities touch the lives of more than a million citizens. The companys support on education and employability is focuse on youth and women. They range from schools to technical education institutes to authentic facilitation of income generation. In health, our intervention is in both preventive and curative health care. The culture of environment protection is achieved through tree plantation, conserving urine and creating new water bodies and, last but not the least, by introducing appropriate technologies in our vehicles and operations for constantly e nhancing environment care.With the foundation of its rich heritage, Tata Motors today is etching a refulgent future.2.1 TATA GROUP AND ITS SUBSIDIARIESTATA groups portfolio includes wide range of businesses which are leading in their fields. Its total revenue in 2006-07 is $ 28.8 billion which is 3.2 % of Indias GDP. TATAs business empire extends to over 80 countries across 6 continents. Similar to Jack Welchs opinion that the business should either be first or second else it is collapse to sell the business, TATA groups companies excel it the fields wherever they started the business. TATA group has ninety eight companies that are basically operating in seven sectors.3. ORGANIZATIONAL INNOVATIONS SYSTEMInnovation in Tata Motors is not a recent phenomenon, but is a part of its legacy. The Companys culture of perpetual search for excellence is extremely attributed to the Tatas ethos and incessant efforts of its employees in the ultimo several decades to serve the customers by brin ging continuous alteration in its products and workes.The three major(ip) areas to illustrate how Tata Motors has effected innovation in the past few years. productionsProcessesPeople3.1. PRODUCTSTata Motors created several breakthrough products in the past which changed the market dynamics and helped in providing a new customer experience.407 weapons platform in 1980s Nipponese LCV players had made inroads into the Indian automobile market inthe 1980s. Tata Motors came out with its mod 407 platform which was designed to suit the Indian conditions. It cursorily became the bestseller in LCVs and the platform still continues control 2/3rd of the market even in the third decade of its existence.Indica in the late 90s-This was the first indigenously designed passenger car in India and it was innovative in the sense that it provided more value for money in scathe of intimate space (comparable to theAmbassador which was the benchmark in the country for internal space), modern featu res (comparable to Maruti Zen) and all that at a truly competitive price.ACEAce was Indias first mini-truck launched in 2005. While heavy trucks ply on the High ways, look into showed the deprivation for a small sub one-ton truck for intercity and truck terminal-to-nearby locations connectivity. The vehicle offered 4 wheeler functionality at 3 Wheelers price. The unconventional design features used in the vehicle wereInnovative 2 piston chamber Indica engineSemi-monocoque body to withstand abuseRigid front axle and rear wheel jam for low costFlat deliver vs. semi-forward face to enhance the cargo space.NANOThe target price itself became the source of innovation, as you all essential have read that the big names in the industry just rubbished it as false claims and commented that it was impossible to make a CAR at that price. However, you all know that the promise was kept. This was made possible through series of innovative conceptions which led to acquisition of 37 patents by Tata Motors.Engine was packaged on the rear side.2 cylinder engine (conventionally there are 3-4 cylinder engines)Identical handles and mechanisms for left and right side doorsInstrument cluster in the middle of the dashboardUnconventional seatsInterior space was maximized by pushing wheels to the corners and power train below the rear seat.Product created was very contemporary andIt has sufficient Space inside to accommodate 4 persons comfortably.highly fuel efficientExceeds the current Safety requirementsComplies with the current emission requirements. earthly concern TRUCKThe new generation range of trucks which would match with the best in the world in performance at a lower life-cycle cost is being unveiled in just a few hours from now. It will create a new benchmark in India in terms of power, speed, carrying capacity, operating economy and trims and a new experience for the drivers in terms of drivability and comfort.3.2. PROCESSSustainability of innovation in products nee ded to be complemented with innovative changes in the organizational processes too. Some examples areAdoption of the Tata Business Excellence arche oddball (TBEM)It is based on Malcolm Baldridge Award for business excellence and Balance progress to Card. This has created a culture of exploring various innovative ways to achieve excellence in all the organizational processes.Use of IT systemsIt has been a benchmark and highly leveraged in the organization throughout the VALUE CHAIN.Supply SideFree-Markets for e-Sourcing, supplier Relationship Management (SRM).Product Development Process.Institutionalized Stage logic gate process in the organization is a benchmark in itself and ensures outgrowth of right product for the market and also an effective and efficient course of study management. Transition from in-house product development to a collaborative product development, utilizing the capabilities of suppliers, design houses, subsidiaries and associate companies specializing in opposite verticals. Internalization philosophyofTata Motors made several(prenominal) major global acquisitions like TDCV, JLR, Hispano, etc. Unlike many other Japanese / US players, they followed an innovative approach to be seen as a local anaesthetic company in the country of operation, i.e, as a South Korean player in South Korea and as a Spanish player in Spain. This has helped them to appreciate the need and importance of all the stakeholders and they achieved this in four stages. This involves Initiating, by understanding the language and basic facts of the country, Familiarization with their culture, Harmonization and finally Synergizing by sharing the best practices and work ethics.3.3. PEOPLEThe changing business environment and increasing complexity of business posed a huge scrap in achievement of business plans. Tata Group, of which Tata Motors is a part of, is well know for identifying and nurturing leaders. Tata Motors in the past has adopted several innovative m eans to leverage its human resource capabilities for achieving extremely challenging goals.Identifying leaders through legal opinion centers This process has been effectively utilized by Tata Motors to identify young managers with very high potential. This process was started some 20 years back and has more and more created a pool of very strong and effective leaders who have proven their capabilities in some very challenging assignments give to them. This process has now been replicated by many other organizations too.Putting them into challenging assignments and freehand them International exposure Key projects like ACE and NANO are examples of some challenging projects which constituted of young leaders and engineers.Breaking the functional silos by shifting from a hierarchical organization to a more CFT approachAll these experiences have helped us to redefine the way we have looked at innovation. And while innovation is normally understood as introduction of new and radical ideas in the area of products and services, our experience says there are several other areas that also require innovation in tandem, so as to effect an innovation in a company. Three of them I have already mentioned, that is, product, process and populate.Four other areas of innovationSource of inhalant/ Purposefrom which the concept emanated, which stresses upon the fact that agility and understanding the unstated/ unfulfilled need of customers is the most important source of innovation. Tata Nano In this case the idea taken with(p) in the mind of our Chairman when he saw a family of four (a man, his wife and two kids) riding on a scooter on a rainy day. He felt that there was an unfulfilled need of safe, affordable and an all weather alternative.PriceThe price of Nano got fixed at Rs 1 lakh (2500USD). The achievement of price target was definite to create a major disruption in the car market as it fell midway between the price of a scooter and the cheapest car available which was priced at Rs 2(5000USD) lakh. Product design was choked for options because of the price target. wherefore the setting the price as target triggered a series of innovation which involvedTarget Cost approachwhich involved breaking down the cost targets to sub-system and then to component level.Suppliers were challenged with the stringent cost target devoted to them, but they accepted the same and the result is in front of you. progressionInnovation lies in reaching the right customers always and communicating in a simple and effective manner. Tata Motors in case of Nano developed a portal, which got as high 30 million hits even before the launch of the car. After the launch there were another 30 million hits in less than a month. This helped the customers in becoming more aware of the product features. They received around 2 lakh(.2 million) applications, which is a good response by all standards. stern/ReachConscious of the fact that demand for such cars would be substantial from the remotest corner of the country, the sale of form for booking were facilitated through several banks. New insurance schemes were co-designed with the insurance companies, and now we are in the process of enhancing the sales and service network for better reach and service to the customers.To summarize the experience, path breaking ideas, conceived and implemented in one or more of the 7 Ps, leads to INNOVATION.PurposeProductPricePlace forward motionPeopleProcess4. INTRODUCTION TO THE NEW PRODUCT DEVELOPMENT sooner the introduction of a product into the market, it goes through several stages of development. The stages of the product development includes the pursuitidea GenerationIdea ScreeningConcept examen and DevelopmentMarket StrategyBusiness AnalysisTotal gross revenue EstimationEstimation Costs and ProfitsProduct Development examen MarketingAs far as Nano is concerned, it falls new to the world products in the context that it has made a history for the cheapest car eve r made without compromising on quality. i.e. best way value analysis. homePlayers200220032004200520062007AMaruti 80028242114107BAlto,WagnorR,Santro,Indica334147576475CEsteem, Swift,Indigo, Ikon, Ascent121518222633DMercedes-C, Skoda Superb1234P/LMercedes-E, BMw11111174818896104120 norm Monthly Category Sales4.1. idea generationThe main idea behind TATA NANO was perceived by the chair of TATA group himself who saw a family of four going on a scooter in rain he wanted to develop a transport which was affordable, safe and could face all types of weathers. This turned out to be the most ambitious project of Tata motors till date when Mr Ratan Tata told this to one of his managing directors Mr. Ravi Kant he was also enkindle astir(predicate) the idea. Mr. Ravi Kant had learned from his experience that People want to move from two-wheelers to four-wheelers but they cannot afford it. More and more can, but Indian car buyers today represent a tiny slice of a potentially devil market Indi a has just seven cars per 1,000 people. Indias auto industry has grown an intermediate of 12% for the past decade, but just 1.3 million passenger vehicles were sell in India in the fiscal year ending March 2006. That means a billion Indians buy about the same number of cars in a year as 300 million Americans buy in a month. If four wheels cost as little as two wheels, that could change fast. About 7 million scooters and motorcycles were sold in India last year, typically for prices between 30,000 rupees and 70,000 rupees, about $675 to $1,600. Tata is targeting a price of 100,000 rupees one lakh, in Indian 19 terms of measurement or about $2,500 at current exchange rates, for its small car. That sounds impossibly cheap in the western but remains three times higher than Indias annual per capita income. The middling pay for factory workers at Tata Motors is just $5,500 a year.4.2. IDEA wakeThe next step was screening of ideas. There were many ideas like to make a scooter with two extra wheels at the back for better stability, A three wheeled car like a unsympathetic auto- rickshaw but the market requirement was a car, the car should be such that it doesnt convey a message that its just an extension of a scooter it should be a proper car and likewise should also give the feel of a actual car. Trying to build a car cheap profuse for motorcycle buyers seems to make sense now but seemed unachievable several years ago when Mr. Ratan Tata, chairman of Tata Motors had first mentioned his dream of building a one-lakh car in2003 at that time the whole world thought that this gamble will never work out but ironically the whole world is now talking of small cars as $5,000 or $7,000 after TATA NANO was launched in 2009.4.3. conception TESTING AND DEVELOPMENTAfter surveying customers the end result was that people wanted a four wheeler which was cheap, dependable and strong enough to carry a load of 1 ton additionally four wheelers also increased the social status of the person who owns it .Four wheels not plainly practical appeal but also had a emotional appeal. then the new product was now to be developed but the pursuit considerations would have to kept in mind when developing it-The car should be built on a different platform than conventional ones.It must be meeting all the safety and regulatory requirements.It has to be built on a scale which shall be more than double the prior launches of similar products and the ramp up must be smooth.The car has to be designed so that it can be exported to other countries as the domesticated demand may not materialize as per projections.There were three main requirement of the new vehicle it should be low cost, cohere to the regulatory requirements, and achieve performance targets such as fuel efficiency and acceleration capacity. Nearly 500 engineers were involved in the development of the vehicle and everyday they had meeting so that the decision taking and the problem firmness process could be accelerated. Each engineer represented a different part of the car engine and transmission, body, vehicle integration, safety and regulation, and industrial design. The body of the vehicle had to go under a number of iterations because the Mr.Ratan Tata wanted that a person whose height is over six feet can also fit into the car without any discomfort and finally the length of the car had to be increased by 100mm but eventually. The hard work of designing the car paid off and the designers were successful in their attempt to design an actual car which did not look shabby and inexpensive but looked cunning and sophisticated.4.4. BUSINESS ANALYSISCOSTSince the car had to be built within a cost of Rs. 1 Lac, no conventional design would work as the costs shall be higher and so the entire car has to be redesigned.The design has to question the need of each and every component from the point of view of its necessity of existence and also the minimum requirements of its functionality. quantify Engineering concepts have to be deployed to finalize the minimum requirements.DISRUPTIVE engineering scienceIts a technology which brings radical change by introducing new ways of doing things.Technology that isSignificantly cheaper than existing Technology.Much higher performing?Has great functionality andIs more convenient to Use.Brings to market a totally different cheer proposition than the one available and can change the Paradigm about a product.The Guiding factor was that the cost has to be minimized for each component yet maintaining its basic functionality. The Alternatives areReduce Consumption of stuff and nonsense being used.Alternate Suppliers to get same material at less prices.Use alternate materials.Eliminate use of Material.Eliminate a process Or a Combination of the above.COST REDUCTION PARADIGM measure Engineering AlternativesThe target was very clearly defined that, within the given cost structure all the components have to be allocated and the same had to be achieved using the available alternatives.The Guiding factor was that the tax structure on materials and manufacturing must support the final cost. Decisions wereEstablish factory in a tax free zone. return the tax advantages on infrastructure development.Get the suppliers to establish base near the factory.Get special concessions from State Govt.In short select a manufacturing location where all the advantages could be achieved.4.5. heart SALES ESTIMATIONThe total sales had been estimated based on the following decisionsIt was estimated that the demand for the peoples car shall be at least twice the demand for Maruti 800, the lowest end car.Initial projections were at about 500,000 cars per year.The basic reason was the conviction that the target price shall redefine the 4 wheeler segment.The price decision of Rs 1 lakh is definitely going to make a lot many people cover to4-wheeler fold and that shall explode the demand. provided 10% customers of 9 Million two wheele r market transit to 4-wheelers it shall amount to 50% of the passenger car market share.It was decided to set up plants with 5 lakhs cars per annum capacity and ramp the same up in stages, in line with increase in market demand.4.6. MARKETINGProductTata has a very wide range of products it has passenger cars, utility vehicles, Trucks, Commercial passenger Carriers and Defense Vehicles.Nano received media attention due to its targeted low price.The Tata Nano is a rear-engine, four passenger ,city car built by Tata Motors,It was first presented at the 9th annual Auto Expo on 10 January 2008, at Pragati Maidan in New Delhi, India.Aimed primarily at the Indian market.PriceThe prices of Tata motors are generally affordable acceptable by the general public at large. Tata always have something for the lower class people with Nano being their trump card. freehand discount every month and special promotion for certain type of vehicle also one of the strong strategy use by Tata Motors. Disc ount can be made from Companys value or from dealers profit at certain range.Pricing strategiesPenetration determineLow pricing policy with minimum profit margin.Though the one lakh price tag is not fixed by TATA group, it was the word of mouth of people which fixed that range. This expectation of people creates a big challenge for the company.PlaceTata Motors has an extensive dealer network covering Indian and International markets. wheresoever you are, there is a Tata Motors Sales and Service dealership close to you. The bank line of distribution, physical location, and dealership method of distribution and sales is generally adopted. The distribution of vehicle must be in a very domineering way, from the plant to dealership and to end user. This is not only in India itself but also to the world-wide dealership.PromotionTata motors promote their products via Advertising and after sales services. replete use of one of the most important element of promotion mix, advancement r educes the necessity of other promotional devices for Nano. furtherance as One lakh car by mouth to mouth.Auto expo 2008,New Delhi GenevaPublicity through print electronic mediaFor other type of promotional activities, cost factor that is 1 lakh price tag is to be keep in mind, nano watches, nano T-shirts available in retail clothing stores. Advertising TV other mass media will be less effective, thus too much money will not be invested in this regard. chiefly word of mouth advertising will get more emphasis. meshing will be a major media for advertising.
Subscribe to:
Posts (Atom)