Tuesday, February 25, 2020

Case study analysis Essay Example | Topics and Well Written Essays - 2000 words - 2

Case study analysis - Essay Example But if one can get an established unit in its chosen field the combined entity can take off within a couple of years after due integration. Adding a new dimension to the issue Paul Tiffany, adjunct professor of management at Wharton and senior lecturer at the University of California's Haas School of Business in Berkeley, says that the global steel consolidation has an unfamiliar ring, he notes "It's interesting that the consolidation in the steel industry is driven not by market opportunity but by the threat of the The most dramatic change in Indian business in the past decade has been the surge in ambition. Take Ratan Tata, the Mumbai-based tycoon who won the race to buy Britain's Corus Group, beating his Brazilian rival Benjamin Steinbruch in a fiercely contested auction. British Steel and the Dutch group Hoogovens merged in 1999 to become the largest steel makers in Europe because they felt the necessity to out-grow their national geography. With the passage of time the same company felt that they need a global presence. As stated by Corus chief executive Jim Leng that Corus now felt it was "no longer sufficient to be European. This is a global industry," he said. "We have got to respond with passion, but with commercial passion. It's not about big companies and small companies, it's a matter of being globally commercial." (Knowledge@Wharton). "We want to expand into geographies where, as a group, we can have a meaningful presence. First, we have chosen countries where we felt we could make an impact and, secondly, where we are able to participate, as we have in India, in the development of that country. When you visit a country or examine Gopi 3 a particular company, I think you intuitively know if there's an opportunity, and then you flesh out that opportunity in one form or other. If we get to the stage of justifying assembly or manufacturing operations, we will seek either to contract them or to invest in facilities in that country." (Interview with Ratan Tata in India Today Magazine issue dated November 6, 2006). In takeover parlance big sharks swallow up the small sharks. But in this case a small shark has swallowed a shark almost five times its size. It is the biggest international acquisition so far by an Indian company, and it coincided with Tata Steel's 100th anniversary. It will also be the Tata Group's 22nd foreign acquisition in two years. The Corus takeover catapults Tata Steel from its 65th place among global steel producers to the No 5 spot in the hierarchy of steel makers with a combined capacity of 23.5 million tons. Others ahead of it are Arcelor-Mittal (110 million tons), Japan's Nippon Steel (32 million tons), South Korea's Posco (30.5 million tons) and JFE of Japan (29.9 million tons). Excluding Corus, Tata Steel has plans to raise its Indian capacity to 30 million tons by 2015 through Greenfield projects. Tata Steel managing director B. Muthuraman said in a statement after the January 31 deal

Saturday, February 8, 2020

Research paper Example | Topics and Well Written Essays - 1250 words - 19

Research Paper Example They also serve to secure internet traffic. Just like a Wide Area Network, it connects multiple sites and servers over a long distance. The most important aspect of a virtual private network is its emphasis on privacy, because when a client computer connects to the internet through a VPN, its initial IP address is replaced by the one provided for by the VPN providers. For Example, a person’s physical location is Washington, but while using a virtual private network he appears to live in Brussels, this clearly shows that users obtain IP addresses from the area the VPN provides (Stewart 2011). In order to get access or connection into a virtual private network, one must have a username and password, mostly provided for by the service provider. On a computer, a VPN client is normally used, or you can access a special website, you enter your correct authentication details, then the computer exchanges information with the remote servers and once verification has taken place, connection happens and all the information and internet data is encrypted and secured from on lookers. Software developers have also developed applications for smart phones to also take advantages of accessing the internet safely through a VPN, by using certain protocols such as PPTP and L2TP/IPSec. Computers also uses PPTP VPN connections, OpenVPN and L2TP/IPSec protocols use an open source software known as OpenVPN client and authentication details configured into a certificate that you download and run on the client (Yuan & Strayer 2001). A virtual private network has many protocols of which can be utilized to secure the flow of information over a public network with the only difference between these protocols being how each keeps the data safe and secure (Geier 2014). IP Security protocol (IPSec), is one of the major protocols used to obtain a secure connection over the internet, it is a combination of many