Tuesday, January 28, 2020

MapReduce for Distributed Computing

MapReduce for Distributed Computing 1.) Introduction A distributed computing system can be defined as a collection of processors interconnected by a communication network such that each processor has its own local memory. The communication between any two or more processors of the system takes place by passing information over the communication network. It has its application in various fields like Hadoop and Map Reduce which we will be discussing further in details. Hadoop is becoming the technology of choice for enterprises that need to effectively collect, store and process large amounts of structured and complex data. The purpose of the thesis is to research about the possibility of using a MapReduce framework to implement Hadoop. Now all this is possible by the file system that is used by Hadoop and it is HDFS or Hadoop Distributed File System. HDFS is a distributed file system and capable to run on hardware. It is similar with existing distributed file systems and its main advantage over the other distributed File system is, it is designed to be deployed on low-cost hardware and highly fault-tolerant. HDFS provides extreme throughput access to applications having large data sets. Originally it was built as infrastructure support for the Apache Nutch web search engine. Applications that run using HDFS have extremely large data sets like few gigabytes to even terabytes in size. Thus, HDFS is designed to support very large sized files. It provides high data communication and can connect hundreds of nodes in a single cluster and supports tens of millions of files in a system at a time. Now we take all the above things mentioned above in details. We will be discussing various fields where Hadoop is being implemented like in storage facility of Facebook and twitter, HIVE, PIG etc. 2.) Serial vs. Parallel Programming In the early decades of computing, programs were serial or sequential, that is, a program consisted of a categorization of instructions, where each instruction executed sequential as name suggests. It ran from start to finish on a single processor. Parallel programming (grid computing) developed as a means of improving performance and efficiency. In a parallel program, the process is broken up into several parts, each of which will be executed concurrently. The instructions from each part run simultaneously on different CPUs. These CPUs can exist on a single machine, or they can be CPUs in a set of computers connected via a network. Not only are parallel programs faster, they can also be used to solve problems on large datasets using non-local resources. When you have a set of computers connected on a network, you have a vast pool of CPUs, and you often have the ability to read and write very large files (assuming a distributed file system is also in place). Parallelism is nothing but a strategy for performing complex and large tasks faster than traditional serial way. A large task can either be performed serially, one step following another, or can be decomposed into smaller tasks to be performed simultaneously using concurrent mechanism in parallel systems. Parallelism is done by: Breaking up the process into smaller processes Assigning the smaller processes to multiple processors to work on simultaneously Coordinating the processors Parallel problem solving can be seen in real life application too. Examples: automobile manufacturing plant; operating a large organization; building construction; 3.) History of clusters: Clustering is the use of cluster of computers, typically PCs or some workstations, storage devices, and interconnections, appears to outsider (user) as a single highly super system. Cluster computing can be used for high availability and load balancing. It can be used as a relatively low-cost form of parallel processing system for scientific and other related applications. Computer clustering technology put cluster of few systems together to provide better system reliability. Cluster server systems can connect a group of systems together in order to provide combined processing service for the clients in the cluster. Cluster operating systems distribute the tasks amongst the available systems. Clusters of systems or workstations can connect a group of systems together to share critically demanding and tough tasks. Theoretically, a cluster operating system can provide seamless optimization in every case. At the present time, cluster server and workstation systems are mostly used in High Availability applications and in scientific applications such as numerical computations. A cluster is a type of parallel or distributed system that: consists of a collection of interconnected whole computers and is used as single, unified computing resource. The whole computer in above definition can have one or more processors built into a single operating system image. Why a Cluster Lower cost: In all-purpose small sized systems profit from using proper technology. Both hardware and software costs tend to be expressively minor for minor systems. However one must study the entire cost of proprietorship of your computing environment while making a buying conclusion. Next subdivision facts to some issues which may counterbalance some of the gains of primary cost of acquirement of a cluster. . Vendor independence: Though it is usually suitable to use similar components through a number of servers in a cluster, it is worthy to retain a certain degree of vendor independence, especially if the cluster is being organized for long term usage. A Linux cluster created on mostly service hardware permits for much better vendor liberation than a large multi-processor scheme using a proprietary operating system. Scalability: In several environments the problem load is too large that it just cannot be processed on a specific system within the time limits of the organization. Clusters similarly provide a hassle-free path for increasing the computational means as the load rises over time. Most large systems scale to a assured number of processors and require a costly upgrade Reliability, Availability and Serviceability (RAS): A larger system is typically more vulnerable to failure than a smaller system. A major hardware or software component failure fetches the whole system down. Hence if a large single system is positioned as the computational resource, a module failure will bring down substantial computing power. In case of a cluster, a single module failure only affects a small part of the overall computational resources. A system in the cluster can be repaired without bringing rest of the cluster down. Also, additional computational resources can be added to a cluster while it is running the user assignment. Hence a cluster maintains steadiness of user operations in both of these cases. In similar type of situations a SMP system will require a complete shutdown and a restart. Adaptability: It is much easier to adapt the topology. The patterns of linking the compute nodes together, of a cluster to best suit the application requirements of a computer center. Vendors typically support much classified topologies of MPPs because of design, or sometimes testing, issues. Faster technology innovation: Clusters benefit from thousands of researchers all around the world, who typically work on smaller systems rather than luxurious high end systems. Limitations of Clusters It is noteworthy to reference certain shortcomings of using clusters as opposite to a single large system. These should be closely cautious while defining the best computational resource for the organization. System managers and programmers of the organization should intensely take part in estimating the following trade-offs. A cluster increases the number of individual components in a computer center. Every server in a cluster has its own sovereign network ports, power supplies, etc. The increased number of components and cables going across servers in a cluster partially counterbalances some of the RAS advantages stated above. It is easier to achieve a single system as opposed to numerous servers in a cluster. There are a lot more system services obtainable to manage computing means within a single system than those which can assistance manage a cluster. As clusters progressively find their way into profitable organizations, more cluster savvy tools will become accessible over time, which will bridge some of this gap. In order for a cluster to scale to make actual use of numerous CPUs, the workload needs to be properly well-adjusted on the cluster. Workload inequity is easier to handle in a shared memory environment, because switching tasks across processors doesnt involve too much data movement. On the other hand, on a cluster it tends to be very tough to move a by this time running task from one node to another. If the environment is such that workload balance cannot be controlled, a cluster may not provide good parallel proficiency. Programming patterns used on a cluster are typically diverse from those used on shared-memory systems. It is relatively easier to use parallelism in a shared-memory system, since the shared data is gladly available. On a cluster, as in an MPP system, either the programmer or the compiler has to explicitly transport data from one node to another. Before deploying a cluster as a key resource in your environment, you should make sure that your system administrators and programmers are comfortable in working in a cluster environment. Getting Started With Linux Cluster: Although clustering can be performed on various operating systems like Windows, Macintosh, Solaris etc. , Linux has its own advantages which are as follows:- Linux runs on a wide range of hardware Linux is exceptionally stable Linux source code is freely distributed. Linux is relatively virus free. Having a wide variety of tools and applications for free. Good environment for developing cluster infrastructure. Cluster Overview and Terminology A compute cluster comprises of a lot of different hardware and software modules with complex interfaces between various modules. In fig 1.3 we show a simplified concept of the key layers that form a cluster. Following sections give a brief overview of these layers. 4.) Parallel computing and Distributed Computing system Parallel computing It is the concurrent execution of some permutation of multiple instances of programmed instructions and data on multiple processors in order to achieve results faster. A parallel computing system is a system in which computer with more than one processor for parallel processing. In the past, each processor of a multiprocessing system every time came in its own processor packaging, but in recent times-introduced multicore processors contain multiple logical processors in a single package. There are many diverse kinds of parallel computers. They are well-known by the kind of interconnection among the processors (â€Å"processing elements or PEs) and memory. Distributed Computing System: There are two types of distributed Computing systems: Tightly coupled system: In these systems, there is a single system wide primary memory (address space) that is shared by all the processors. In these systems any communication between the processors usually takes place through the shared memory. In tightly coupled systems, the number of processors that can be usefully deployed is usually small and limited by the bandwidth of the shared memory. Tightly coupled systems are referred to as parallel processing systems Loosely coupled systems: In these systems, the processors do not share memory, and each processor has its own local memory. In these systems, all physical communication between the processors is done by passing messages across the network that interconnects the processors. In this type of System Processors are expandable and can have unlimited number of processor. Loosely coupled systems, are referred to as distributed computing systems. Various Models are used for building Distributed Computing System: 4.1) Minicomputer Model It is a simple extension of the centralized time-sharing system. A distributed computing system based on this classical consists of a few minicomputers or large supercomputers unified by a communication network. Each minicomputer usually has many user simultaneously logged on to it through several terminals linked to it with every user logged on to one exact minicomputer, with remote access to other minicomputers, The network permits a user to access remote resources that are available on same machine other than the one on to which the user is currently logged. The minicomputer model is used when resource sharing with remote users is anticipated. The initial ARPAnet is an example of a distributed computing system based on the minicomputer model. 4.2) Workstation Model Workstation model consists of several workstations unified by a communication network. The best example of a Workstation Model can be a company’s office or a university department which may have quite a few workstation scattered throughout a building or campus, with each workstation equipped with its individual disk and serving time which is specifically during the night, Notion of using workstation Model is that when certain workstations are idle (not being used), resulting in the waste of great amounts of CPU time the model connects all these workstations by a high-speed LAN so that futile workstations may be used to process jobs of users who are logged onto to other workstations and do not have adequate processing power at their own workstations to get their jobs handled efficiently. A user logs onto one of the workstations which is his â€Å"home† workstation and submits jobs for execution if the system does not have sufficient processing power for executing the processes of the submitted jobs resourcefully, it transfers one or more of the processes from the user’s workstation to some other workstation that is currently ideal and gets the process executed there, and finally the outcome of execution is given back to the user’s workstation deprived of the user being aware of it. The main Issue increases if a user logs onto a workstation that was idle until now and was being used to perform a process of another workstation .How the remote process is to be controlled at this time .To handle this type of problem we have three solutions: The first method is to allow the remote process share the resources of the workstation along with its own logged-on user’s processes. This method is easy to apply, but it setbacks the main idea of workstations helping as personal computers, because if remote processes are permitted to execute concurrently with the logged-on user’s own processes, the logged-on user does not get his or her fail-safe response. The second method is to kill the remote process. The main disadvantage of this technique is that all the processing done for the remote process gets lost and the file system may be left in an erratic state, making this method repellent. The third method is to migrating the remote process back to its home workstation, so that its execution can be continued there. This method is tough to implement because it involves the system to support preemptive process migration facility that is stopping the current process when a higher priority process comes into the execution. Thus we can say that the workstation model is a network of individual workstations, each with its own disk and a local file system. The Sprite system and experimental system developed at Zerox PARC are two examples of distributed computing systems, based on the workstation model. 4.3) Workstation-Server Model Workstation Server Model consists of a limited minicomputers and numerous workstations (both diskful and diskless workstations) but most of them are diskless connected by a high speed communication Network. A workstation with its own local disk is generally called a diskful workstation and a workstation without a local disk is named as diskless workstation. The file systems used by these workstations is either applied either by a diskful workstation or by a minicomputer armed with a disk for file storage. One or more of the minicomputers are used for applying the file system. Other minicomputer may be used for providing other types of service area, such as database service and print service. Thus, every minicomputer is used as a server machine to provide one or more types of services. Therefore in the workstation-server model, in addition to the workstations, there are dedicated machines (may be specialized workstations) for running server processes (called servers) for handling and providing access to shared resources. A user logs onto a workstation called his home workstation, Normal computation activities required by the user’s processes are performed at the user’s home workstation, but requirements for services provided by special servers such as a file server or a database server are sent to a server providing that type of service that performs the user’s requested activity and returns the result of request processing to the user’s workstation. Therefore, in this model, the user’s processes need not be migrated to the server machines for getting the work done by those machines. For better complete system performance, the local disk of diskful workstation is normally used for such purposes as storage of temporary file, storage of unshared files, storage of shared files that are rarely changed, paging activity in virtual-memory management, and caching of remotely accessed data. Workstation Server Model is better than Workstation Model in the following ways: It is much cheaper to use a few minicomputers equipped with large, fast disks than a large number of diskful workstations, with each workstation having a small, slow disk. Diskless workstations are also preferred to diskful workstations from a system maintenance point of view. Backup and hardware maintenance are easier to perform with a few large disks than with many small disks scattered all Furthermore, installing new releases of software (such as a file server with new functionalities) is easier when the software is to be installed on a few file server machines than on every workstations. In the workstation-server model, since all files are managed by the file servers, users have the flexibility to use any workstation and access the files in the same manner irrespective of which workstation the user is currently logged on .Whereas this is not true with the workstation model, in which each workstation has its local file system, because different mechanisms are needed to access local and remote files. Unlike the workstation model, this model does not need a process migration facility, which is difficult to implement. In this model, a client process or workstation sends a request to a server process or a mini computer for getting some service such as reading a block of a file. The server executes the request and sends back a reply to the client that contains the result of request processing. A user has guarantied response time because workstations are not used for executing remote process. However, the model does not utilize the processing capability of idle workstation. The V-System (Cheriton 1988) is an example of a distributed computing system that is based on the workstation-server model. 4.4) Processor-Pool Model In the process of pool model the processors are pooled together-to be shared by the users needed. The pool -or processors consist of a large number of micro-computers and minicomputers attached to the network. Each processor in the pool has its own memory to load and run a system program or an application program of the distributed-computing system. The processor-pool model is used for the purpose that most of the time a user does not need any computing power but once in a while he may need a very large amount of computing power for short time (e.g., when recompiling a program consisting of a large number of files after changing a basic shared declaration). In processor-pool model, the processors in the pool have no terminal attached directly to them, and users access the system from terminals that are attached to the network via special devices. These terminals are either small diskless workstations or graphic terminals. A special server called a run server manages and allocates the processors in the pool to different users on a demand basis. When a user submits a job for computation an appropriate number of Processors are temporarily assigned to his or her job by the run server. In this type of model we do not have a concept of home machine, in this when a user logs on he is logged on to the whole system by default. The processor-pool model allows better utilization of the available processing power of a distributed computing system as in this model the entire processing power of the system is available for use by the current logged-on users, whereas this is not true for the workstation-server model in which several workstations may be idle at a particular time but they cannot be used for processing the jobs of other users. Furthermore, the processor-pool model provides greater flexibility than the workstation-server model as the system’s services can be easily expanded without the need to install any more computers. The processors in the pool can be allocated to act as extra servers to carry any additional load arising from an increased user population or to provide new services. However, the processor-pool model is usually considered to be unsuitable for high-performance interactive application, program of a user is being executed and the terminal via which the user is interacting with the system. The workstation-server model is generally considered to be more suitable for such applications. Amoeba [Mullender et al. 1990]. Plan 9 [Pike et al. 1990], and the Cambridge Distributed Computing System [Needham and Herbert 1982] are examples of distributed computing systems based on the processor-pool model. 5) ISSUES IN DESIGNING A DISTRIBUTED OPERATING SYSTEM To design a distributed operating system is a more difficult task than designing a centralized operating system for several reasons. In the design of a centralized operating system, it is assumed that the operating system has access to complete and accurate information about the environment is which it is functioning. In a distributed system, the resources are physically separated, their is no common clock among the multiple processors as the delivery of messages is delayed, and not have up-to-date, consistent knowledge about the state of the various components of the underlying distributed system .And lack of up-to-date and consistent information makes many thing (such as management of resources and synchronization of cooperating activities) much harder in the design of a distributed operating system,. For example, it is hard to schedule the processors optimally if the operating system is not sure how many of them are up at the moment. Therefore a distributed operating system must be designed to provide all the advantages of a distributed system to its users. That is, the users should be able to view a distributed system as a virtual centralized system that is flexible, efficient, reliable, secure, and easy to use. To meet this challenge, designers of a distributed operating system must deal with several design issues. Some of the key design issues are: 5.1) Transparency The main goal of a distributed operating system is to make the existence of multiple computers invisible (transparent) and that is to provide each user the feeling that he is the only user working on the system. That is, distributed operating system must be designed in such a way that a collection of distinct machines connected by a communication subsystem appears to its users as a virtual unprocessed. Accesses Transparency: Access transparency typically refers to the situation where users should not need or be able to recognize whether a resource (hardware or software) is remote or local. This implies that the distributed operating system should allow users to access remote resource in the same ways as local resources. That is, the user should not be able to distinguish between local and remote resources, and it should be the responsibility of the distributed operating system to locate the resources and to arrange for servicing user requests in a user-transparent manner. Location Transparency: Location Transparency is achieved if the name of a resource is kept hidden and user mobility is there, that is: Name transparency: This refers to the fact that the name of a resource (hardware or software) should not reveal any hint as to the physical location of the resource. Furthermore, such resources, which are capable of being moved from one node to another in a distributed system (such as a file), must be allowed to move without having their names changed. Therefore, resource names must be unique system wide. User Mobility: this refers to the fact that no matter which machine a user is logged onto, he should be able to access a resource with the same name he should not require two different names to access the same resource from two different nodes of the system. In a distributed system that supports user mobility, users can freely log on to any machine in the system and access any resource without making any extra effort. Replication Transparency Replicas or copies of files and other resources are created by the system for the better performance and reliability of the data in case of any loss. These replicas are placed on the different nodes of the distributed System. Both, the existence of multiple copies of a replicated resource and the replication activity should be transparent to the users. Two important issues related to replication transparency are naming of replicas and replication control. It is the responsibility of the system to name the various copies of a resource and to map a user-supplied name of the resource to an appropriate replica of the resource. Furthermore, replication control decisions such as how many copies of resource should be created, where should each copy be placed, and when should a copy be created/deleted should be made entirely automatically by the system in a user -transparent manner. Failure Transparency Failure transparency deals with masking from the users partial failures in the system, Such as a communication link failure, a machine failure, or a storage device crash. A distributed operating system having failure transparency property will continue to function, perhaps in a degraded form, in the face of partial failures. For example suppose the file service of a distributed operating system is to be made failure transparent. This can be done by implementing it as a group of file servers that closely cooperate with each other to manage the files of the system and that function in such a manner that the users can utilize the file service even if only one of the file servers is up and working. In this case, the users cannot notice the failure of one or more file servers, except for slower performance of file access operations. Be implemented in this way for failure transparency. An attempt to design a completely failure-transparent distributed system will result in a very slow and highly expensive system due to the large amount of redundancy required for tolerating al l types of failures. Migration Transparency An object is migrated from one node to another for a better performance, reliability and great security. The aim of migration transparency is to ensure that the movement of the object is handled automatically by the system in a user-transparent manner. Three important issues in achieving this goal are as follows: Migration decisions such as which object is to be moved from where to where should be made automatically by the system. Migration of an object from one node to another should not require any change in its name. When the migrating object is a process, the interposes communication mechanism should ensure that a massage sent to the migrating process reaches it without the need for the sender process to resend it if the receiver process moves to another node before the massage is received. Concurrency Transparency In a distributed system multiple users uses the system concurrently. In such a situation, it is economical to share the system resource (hardware or software) among the concurrently executing user processes. However since the number of available resources in a computing system is restricted one user processes, must necessarily influence the action of other concurrently executing processes. For example, concurrent update to the file by two different processes should be prevented. Concurrency transparency means that each user has a feeling that he is the sole user of the system and other users do not exist in the system. For providing concurrency transparency, the recourse sharing mechanisms of the distributed operating system must have the following properties: An event-ordering property ensures that all access requests to various system resources are properly ordered to provide a consistent view to all users of the system. A mutual-exclusion property ensures that at any time at most one process accesses a shared resource, which must not be used simultaneously by multiple processes if program operation is to be correct. A no-starvation property ensures that if every process that is granted a resources which must not be used simultaneously by multiple processes, eventually releases it, every request for that restore is eventually granted. A no-deadlock property ensures that a situation will never occur in which competing process prevent their mutual progress ever though no single one requests more resources than available in the system. Performance Transparency The aim of performance transparency is never get

Sunday, January 19, 2020

Affirmative Action Essay -- Affirmative Action Essays

After the United States Congress passed the Civil Rights Act in 1964, it became apparent that certain business traditions, such as seniority status and aptitude tests, prevented total equality in employment. Then President, Lyndon B. Johnson, decided something needed to be done to remedy these flaws. On September 24, 1965, he issued Executive Order #11246 at Howard University that required federal contractors â€Å"to take Affirmative Action to ensure that applicants are employed . . . without regard to their race, creed, color, or national origin (Civil Rights).† With the signing of that order, and without knowing it, President Johnson created reverse discrimination.   Ã‚  Ã‚  Ã‚  Ã‚  Affirmative Action was created in an effort to help minorities leap the discriminative barriers that were ever so present when the bill was first enacted, in 1965. At this time, the country was in the wake of nationwide civil- rights demonstrations, and racial tension was at an all time high. Most of the corporate executive and managerial positions were occupied by White Males, who controlled the hiring and firing of employees. The U.S. government, in 1965, believed that these employers were discriminating against Minorities and believed that there was no better time than the present to bring about change. This action, that started with good intentions, would later lead to a different and more complex form of discrimination.   Ã‚  Ã‚  Ã‚  Ã‚  When the Civil Rights Law passed, Minorities, especially African- Americans, believed that they should receive retribution for the earlier years of discrimination they endured. The government responded by passing laws to aide them in attaining better employment as reprieve for the previous two hundred years of suffering their race endured at the hands of the White Man. To many people the passing of these laws was an effort in the right direction. Supporters of Affirmative Action asked, †why not let the government help them get better jobs?† After all, the White Man was responsible for their suffering. While this may all be true, there is another question to be asked. Are we truly responsible for the years of persecution that the African Americans and other Minorities were submitted to? I am not so sure.   Ã‚  Ã‚  Ã‚  Ã‚   It is true that past generations of White Men are p... ..., and other policies benefiting families with young children. Widely supported programs that promote the interests of both lower and middle class Americans that deliver benefits to Minorities and Whites on the basis of their economic status, and not their race or ethnicity, will do more to reduce Minority poverty than the current, narrowly based, poorly supported policies that single out Minority groups. However, if this, or another remedy is not taken sometime in the near future, and Affirmative Action continues to separate Minority groups from Whites, we can be sure to see racial tension reach points that our history has never seen. Works Cited â€Å"Affirmative Action at the University of California at Berkeley† Online. http://pwa.acusd.edu/~e_cook/ucb-95.html â€Å"Civil Rights† Compton's Interactive Encyclopedia. (1996). [Computer Program] SoftKey Multimedia International Corporation. United States. Commission on Civil Rights. Affirmative Action in the 1980's: Dismantling the Process of Discrimination. Washington: 1981. United States. Nebraska Advisory Committee to the U.S. Commission on Civil Rights. Private Sector Affirmative Action: Omaha. Washington: 1979.

Saturday, January 11, 2020

Crazy Eddie Essay

1) Red flags were the increase on short-term investment receivables why would an electronic company have short-term investments in the first place. Increase of prepaid inventory in 1987 should be alarm nearly double from 1986. The company gross profit margin was stable of around 13%-16% average there was no need to increase inventory prepaid. Also lack of accounts payable and account receivable was a sign every retail company should have bad debt expense or allowance for doubtful accounts as customers may commit fraud to purchase products. The inventory age of went from 80 in 1986 to 111 in 1987 yet cost of goods sold primarily consisted of inventory was average from 1984 to 1987 2) Several audit procedures could have been performed to attest Crazy Eddie wrong doing A) The falsifying inventory count sheet would be detected if the auditors randomly performed inventory count and compare it to the Crazy Eddie sheet and consulted with inventory experts of how companies can deceive auditors. B) Bogus email could been investigated by requesting back support documentation to support the memos and also if this was mentioned  during executive meetings by reviewing the executive board minutes. Also by contacting the vendor and reconciling their receivables to payables of Crazy Eddie. C) Transhipping sales would have been by reviewing account receivable process from start to finish. Review payment of the sale invoices and checking shipping department log of when transshipment was done and of course contact the buyer to authenticate the sale to place. D) Consignment of inventory is to also audit their inventory and compare it to Crazy Eddie log and review of the contra ct between both parties how they operate the consignment agreement 3) As auditors they analyze the industry they are in and even compare financial records of other companies in the same industry for regularities and irregularities. During the 80’s it was evident that the electronic industry was declining and ever changing leaving certain products to being obsolete. Transhipping made it difficult, as they were able and justify the reasoning for buying large number of products however auditors should be able to communicate with supervisors of the life shelf of products and be able to produce aging schedule for each product they sell. 4) Lowballing in the audit context is to charge a client cheap in order to offer other services at fair or premium costs. Other services perform by the same firm of the independent client does violate its independence as the firm footprint with the company gets bigger and creates conflict of interest as some can be audits of services they provided to the company violating external independence and objectively 5) Member of the audit team if a third of the sample size I requested cannot be find I would suspicious and question if the sale even took place. Also means that I will need to select more sales with that time period to see if more exceptions appear. Also I would receive their sales process and witness the process for deficiencies and evaluate other ways to detect red flags for example selecting sales from shipping department or warehouse department for possible red flags as well. 6) I believe its common for audit members to join clients team as management already know the value he brings and since Sarbanes Oxley and PCAOB does not prohibit the practice will continue on. That person is familiar with their accounting system therefore he will be more efficient that bringing a person new also the relationship with audit firm can be strengthen and less problematic having that person as an liaison during the audit period. The cons are the negative light and question the independence of the audit firm. The person may have extensive knowledge how to deceive and commit unethical transactions without his former employer knowing. Facts Eddie was born in 1947 into a large close Syrian family. and dropped out of high school at the age of 16 years old and peddled television in Brooklyn neighborhood. By 1969 Antar and one of his cousins have funds to open consumer electronic store called Crazy Eddie. Crazy Eddie was nickname given to Antar through his behavior towards customers, vendors, and subordinates. For example Antar would block the exit door even locking door until the individual agreed to buy something anything Antar distinctive trait was the inability to trust anyone outside his big family circle and mostly relatives hold company positions in all capacity. Crazy Eddie was know for marketing advertising antics in 1972 Antar hired radio personality know as Dr. Jerry as Crazy Eddie’s advertising spokesman. Discounting policy was the theme to the campaigns promising to refund the difference of the selling price and lower retail price with the 30 days of purchase. In the early 1980’s electron industry exploded lead to increasing growth to Crazy Eddie by 1987 the company product sales were the following Antar encourage to upsell the customer and to purchase extended warranty as the electronic was already insured by the manufacturer lead to high profit margin Crazy Eddie would purchase large amount of quantity and avoid large concessions expenses that allowed him ‘’transhipper ‘’ commonly known as secondary supplier to smaller stores in the New York City area . In1983 Crazy Eddie decided to go public to raise capital for expansion but  was delayed over year for the IPO as underwriter discovered several discrepancies of the company financial records and relatives role in the business key example his wife and mother received 6 figure salaries for little or no work. Recommended Antar to hire CFO with public company experience and hired his cousin Sam Antar as his CFO. The sale of stock was tremendous success and with the permission of the SEC issued 200,000 more stock. One way to sway financial analyst for positive reviews was to invite them to his store and show his salesman skills to close sales . One analyst wrote ‘’Crazy is a self disciplined competently organized firm with a sophisticated management and a well trained, dedicated staff’’ Based on the 1984-1987 financial statement and rave financial reviews investors from the IPO realized 1,000 percent increase In 1986 Antar resigned from the company but remained chairperson member but after a few weeks he completely withdrew from the company. By 1987 the end of the electronic bubble, increased local competition, diminished supplier leverage, and family issues most notably bitter divorce as a result family members picking sides were the indication of the Crazy Eddie downfall. Mismanagement of the company and poor financial reports plummeted the stock as regulatory officials started investigating. November 1987 the company was taken over by two individuals while performing due diligence they uncovered 65 million inventory storage Extensive investigating SEC alleged Antar was worried about company stock and ordered staff commit fraud by overstate/understate balance sheet items like overstate receivable by 2 million the following yellow understating payables by 9 million dollars. Overstated inventory with non-existent products Prepare bogus memos reports and entered in company accounting records Included consignment & goods to manufacturer as revenue Overstating transshipping inventory transactions Understating COSGS Peat Marwick was the Crazy Eddie accounting firm but the underwriters  suggested to hire bigger recognizable firm and comply to hire Main Hurdman that merged with Marwick was the independent auditor for modest ‘’lowball’’ fee while offering over non-auditing services to make up the difference. Hurdman charged Crazy Eddie 85 thousand for auditing service while charging millions to do their computer inventory systems. Questioning Hurdman independence and objectively as Crazy Eddie accountant were former Hurdman staff. Hurdman defense was Antar would properly stock year end inventory to hide any shortages and systematically conceal documentations of shortages and to junk their computer operated inventory system and return to manual system making difficult to determine actual ending inventory at time period the entire accounting department participating in the collusion to throw off auditors. In 1989 Crazy Eddie lost line of credit and filed for Chapter 11 bankruptcy Antar was arrested with 17 counts of financial fraud in 1993 and publicly admitted to defrauding investors by manipulating accounting records in May of 1996. Lawsuit was settled in 1993 in the amount of 42 million to various defendants including Peat Marwick Analysis Crazy Eddie problems started with the idea to increase its expand the heavily tied family business and decided to take the company public than have venture capitalist provide the capital instead. We can see why it went public electronic started becoming the norm and disposable income complimented the fast growing industry. Crazy Eddie had the advantage similar to Wal-Mart being able to purchase large quantities at a low rate and taking a step forward to being second supplier to small business. Crazy Eddie failed to acknowledge or wasn’t aware of the product cycle and wasn’t able to forecast of where the industry was headed nor did it know the life of technology it was buying would not outpace demand. Management at Crazy Eddie raised concerns regarding experience and education to make sound decisions to operating and financing structure the company needed also family had to be problem as some relatives received a salary just because they’re family. After going public the Antar realized financial ratios had to be sound and used his power to convince the public that his company was  growing despite the current trends. His power was used to commit fraud and deceive the public in order to maintain the stock price like Enron would do a decade later and had the support of the entire accounting finance decision as no one reported to the SEC of their wrong doing Recommendations Recommendations for Crazy Eddie are to have the right management in place from executives to senior positions. Individuals that understand the industry trends and operate as efficiently possible. Finance department needed not only strong accounting department but an even stronger internal audit department that can properly perform Sarbanes Oxley section 404, SAS 69, SAS 99, SAS 109, SAS 115 for internal control practitioners to identify, prioritize, evaluate, and test the controls in place to prevent fraud and other financial statement material errors. Internal audit needs to be candid with external auditors and share information that can benefit external auditors during the financial audit a lot of sensitive valuable information went rogue that could been used to detect operations inventory fraud. References Sarbanes Oxley Section 404 Internal Control Practitioners Statement on Auditing Standards 69 The Meaning of Present Fairly in Conformity With Generally Accepted Accounting Principles Statement on Auditing Standards 99 Consideration of Fraud in a Financial Statement Audit Statement on Auditing Standards 109 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Statement on Auditing Standards 115 Communicating Internal Control Related Matters Identified in an Audit

Thursday, December 26, 2019

The Energy Source Of Energy - 868 Words

In an era where fossil fuels are the dominant source of energy, environmentalists and scientists are looking for alternative energy sources in the fear that fossil fuels will sooner or later become consumed by our energy needs. In the hunt to find a strong alternative energy source, scientists have reverted back to an old formula E=MC2. The indicated formula was first thought up by Albert Einstein to describe a part of general relativity in the paper â€Å"Does the Inertia of a Body Depend Upon Its Energy Content?† Furthermore, in his publication Albert Einstein explains that mass and kinetic energy are proportionally equal. Meaning you can transfer energy into mass and vice versa. In addition if you are able to transfer mass into energy that mass will be multiplied by the speed of light (C) squared, meaning that a little mass can turn into a lot of energy. Moreover, Einstein’s reasoning for using the speed of light is because atoms when separated travel the speed of l ight thus carrying a lot of energy. At the time Einstein was working on trying to find ways to separate and or fuse atoms in order to gain energy and put his formula to use. However, today we have found two different ways of doing so in what we call nuclear fusion and nuclear fission. Nuclear fusion has been around since the big bang, as it is the process that powers stars just like ours and is how our universe continues to grow. Moreover, nuclear fusion occurs when two or more atoms fuse together at very highShow MoreRelatedEnergy Sources Of Energy Source Essay1464 Words   |  6 PagesEnergy is a big part of our lives. We are heating our homes with natural gas or electricity and driving to and from work and any other outdoors activities. Our main source of the energy people use is fossil fuels and in the future, the availability of those sources has an end date. As studies show there are renewable resources of fuel and other equipment used for energy like wind, nuclear power plants and solar hydroelectric. There are many pros and cons to all forms of energy source, and theyRead MoreEnergy Sources Of Renewable Energy1292 Words   |  6 Pages1. Introduction. Nowadays, with the continuous increase in the demand for energy consumption resulted by both population and socioeconomic growth, making it a priority to satisfy such a demand for all developed countries. This report aims initially to focus on the energy situation in the United Kingdom, and then present two forms of energy conventional energy in specific coal, and renewable energy which is wind energy, and will finally recommend the most suitable one after comparing and contrastingRead MoreEnergy Of Renewable Energy Sources Essay1568 Words   |  7 PagesIn recent years many endeavors have been devoted to reduce the pollutant energy generation by increasing the utilization of clean energy sources. Actually, the power sector is responsible for roughly a quarter of anthropogenic CO2 emissions [1]. Thus, the widespread introduction of renewable energy sources is seen to be one of the major solutions. Meanwhile, fossil fuel based power plants will still be needed. In any case, fully abs taining from the use of fossil fuels is difficult. Nevertheless,Read MoreRenewable Sources Of Energy And Energy1120 Words   |  5 PagesAlternate energies are forms of energy that do not deplete natural resources or harm the earth. The sources of the energies are naturally found or generated or are part of a natural conversion from one source into another. Energy cannot be destroyed but can be converted into other forms, therefore there are many reactions occurring around us that allow us to harness these energies. Alternate sources of energy has been extensively researched as a result of the large energy crisis that is being experiencedRead MoreEnergy As An Source Of Energy For Electricity Essay789 Words   |  4 PagesWhat is the idea –Solar Energy as an alternate source of energy for electricity. Why is this important idea -- There are many reasons why l think the installation of solar power should be considered as an alternating source of power in our homes: 1. We must be concerned about the environmental effect and reliance on fossil fuels (Since United State has 67% of its source of power from fossil fuels). 2. We should improve the value of our property by investing in solar panels. 3. We would like to beRead MoreRenewable Sources Of Energy And Energy1983 Words   |  8 Pagesof all the energy used in the day-to-day lives and operations of the entire world population are nonrenewable. This energy is created from the fossil fuels: coal, petroleum and natural gas. Fossil fuels are still cheap and high in supply, but the rate at which we are consuming them, which is only expected to increase, vastly exceeds the rate at which they regenerate. This creates the aforementioned problem of mankind running out of the required natural resources to fuel its own energy demands. TheRead MoreEnergy Sources Of Solar Energy1680 Words   |  7 PagesThe earth has lots of energy sources such as nuclear energy, fossil energy, and renewable sources. Solar, wind, geothermal, and water are renewable sources of energy. These energy sources are clean. They do not produce any pollution. But the most reliable energy source is the sun. The sun is an important part of living things. It pr oduces an energy called solar energy. Solar energy is the earth’s main source of energy which can be transformed into heat and electricity. Its energy was used to heat andRead MoreEnergy Sources For Alternative Energy930 Words   |  4 Pagesto create diverse methods of generating powerful, dependable energy sources that do not have negative repercussions on our environment. Alternative energy refers to sources that do not create undesired consequences, such as fossil fuels do (Alternative Energy 2015). Not only are emissions from fossil fuels concerning, but also these resources are not going to be available for our use forever, making changes for alternative energy sources a pressing topic of discussion. British Petroleum and RoyalRead MoreSources Of Energy1062 Words   |  5 Pagesrenewable sources in our existing infrastructure, major challenges are arising, as their supply is generally unstable and unpredictable. Too often, integrated renewable sources are curtailed and the energy is wasted for the safety of our existing electrical grid [1-6]. A logical solution would be to include large-scale energy storage systems, which would reduce the curtailment and increase the utilization of these clean sources, such as wind turbines and photovoltaics. A large-scale energy storageRead MoreRenewable Energy Sources Of Energy2600 Words   |  11 PagesThe worldwide demand of energy has been increasing considerably. Up to 2030, it is supposed to be 60% higher than today (B. SCHMITZ, 2013). Currently, non-renewable energy sources, like coal and oil, are more commonly used, since they are cheaper than renewable energies. In the European Union, 80% of the energy consumption demands are covered by fossil sources (B. SCHMITZ, 2013). But, non-renewable energy sources are running out and they are also very harmful for the environment, since they generate

Wednesday, December 18, 2019

Analyze Globalizations Impact on Singapores Development.

â€Å"A developed country is one that allows all its citizens to enjoy a free and healthy life in a safe environment.† These are the wise words of Kofi Annan, former Secretary-General of the United Nations. Thus, there are a set of tangible criteria to help determine the development of a country, of which economic criteria tend to dominate, with indicators such as the Gross Domestic Product (GDP) as well as other social and security needs of the people, with the recent Human Development Index (HDI) which measures overall well-being of the people. So, with the recent phenomenon of globalization becoming ever more widespread in our society today, there is no doubt that it has impacts, both positive and negative, on the development of Singapore as†¦show more content†¦This will boost the economy of Singapore as when more companies are willing to invest in Singapore, especially due to our strengths like competitive workforce and strategic location, it will result in great er influx of capital. It will also result in a creation of jobs for the people, boosting employment rate and generating revenue for both the country and the individual. Take for instance, the chip used in the latest PlayStation3 and Xbox. A French semiconductor company, Soitec, is investing $700 million to set up in Singapore its first offshore facility to make the wafer for this chip. The wafers involve alternating layers of silicon and insulator, unlike conventional wafers which use silicon throughout. Soitec is coming here because its technology has to be well-protected, and we are the only country in Asia that they trust well enough to set up their first manufacturing campus outside of France. Thus, positive development is a sure thing with globalization. Furthermore, since in the modern day context, money is a key indicator of happiness, thus, Singapore’s development can be mirrored by the happiness of the people with their monetary needs fulfilled. However, the development of Singapore’s society cannot be predicated on pure economics alone. Even though globalization has enabled Singapore to fare well in economic development, however, termed the perils of success, globalization has brought about undesirableShow MoreRelatedDubais Political and Economic Development: Essay38738 Words   |  155 PagesDUBAIS POLITICAL AND ECONOMIC DEVELOPMENT: AN OASIS TN THE DESERT? by CHRISTOPHER DeNICOLA A thesis submitted in partial fulfillment of the requirements for the Degree of Bachelor of Arts with Honors in Political Science WILLIAMS COLLEGE Williamstown, Massachusetts MAY 10,2005 Table of Contents I Persian Gulf Development Literature Oil Curse Literature Arab and Islamic Factors Regional Ovemiew and Historical Background Dubais Development History I1 PI1 Explaining

Tuesday, December 10, 2019

Case Study & Strategic Management Of EBAY - Free Sample

Question: Critically examine the relationship and the need for compatibility between corporate strategic and functional management policies. Analyse the internal and external influences on corporate objectives and strategy. Demonstrate the need for flexibility in strategic management and the practical limits of quantifying corporate strategy. Percentage Of Marks Awarded For Module 50% of the total marks for the module Assessment Criteria Explanatory comments on the assessment criteria. Answer: Introduction The business environment of the retail company eBay is evaluated in the report. Strategic purpose includes the business mission and vision of EBAY. To operate in the retail industry in UK, the company follows some values, which are discussed here. Strategic statement of EBAY presents a clear view on value proposition of the company (EBAYinc.com, 2016). As per the second quarter-2016, financial report of eBay the volume of merchandise is worth 20.9 billion dollar. The revenue that is earned is 2.2 billion dollars. In the second quarter of 2015, the net revenue was 2110 dollars and 2230 dollars in the second quarter of 2016. A strategy statement of a company consists of objective of the company and scope in the retail market. It also shows whether the company enjoys any competitive advantage in the market or not. The analysis of Macroeconomic environment of the company includes several political, economic, social factors and their impact on the company. These factors are external factors, which affect the strategy of the company (Ho 2014). There are internal factors such as business functioning, operation management, human resource, which affect companys strategic management. Future growth prospects of the company are discussed and presented through Ansoffs matrix. This is tool of strategic management, which helps the management to take approach for future growth of the company. Several aspects of the Ansoff matrix are analysed to assess the potential of the EBAY in product diversification or ability to develop new product in the retail market. Strategic purpose Assessment of strategic purpose of the organization Mission: Our purpose is to pioneer new communities around the world built on commerce, sustained by trust and inspired by opportunity. Vision: We seek to create a global platform that provides individuals and business of all types and sizes with the access to broad markets (EBAYinc.com, 2016). Values: The values that is followed by the company includes as follows: We believe people are basically good We recognize and respect everyone as unique individual We believe everyone has something to contribute We encourage people to treat others the way they want to be treated themselves We believe that an honest, open environment can bring out best in people. Critical analysis on relationship of strategic statement and functional objective EBay needs to have a well defined objectives for which they can strive. The objectives in connection with the mission and vision provide eBay and employees a goal for focusing the activities. The objectives would help in growing and improve the different aspects in the future. The company is trying to focus their work in extending lead in payments, delivering of better experience to customers of eBay, expanding of capabilities, connecting of sellers and buyers, driving sustainable ecommerce, operating efficiently and reducing cost. The objective of the company is to set a standard for maintaining quality of a product (Hill et al. 2014). Achievement of monthly target, how to achieve cost and price advantage, identification of companys strength and weaknesses are included in the strategic statement. In contrast, the functional objective states overall corporate objectives of the company. The corporate objectives include financial strategy, targeted sales volume per customer, budget, pl anning etc. The company eBay meets the environmental needs. The company is into conserving and recycling of energy, an objective that is linked to vision. Strategic statement shows long-term objectives of company and functional objective shows short-term objectives of the company. However, strategic statement is closely related to functional objectives. In order to achieve strategic objective, fulfillment of functional objective is essential (Lasserre 2012). External analysis Analysis of macroeconomic environment of the company PESTLE analysis Political factors: As per market review, there is a chance of depreciation of Sterling due to exit of UK from EU. Therefore, online shopping can be affected as import may become costly. Moreover, UK may loss the opportunity to trade in Free Trade Area in European Union. There is a fear for EBAY to lose both supplier and customer in European Zone. Political turmoil can affect EBAY business (Priem et al. 20120). The company eBay has been providing localized version of PayPal in the different countries. In the United States, the company has operated as transmitter of money. There are restrictions on the investment of customers funds, reporting and bonding requirements there is regulatory agencies in each state. Economic factors: Economic slowdown in UK affects the business operation of EBAY. Global recession decreases the sales volume of products supplied by EBAY across world and thus operating profit may fall significantly. On the other hand, with growth in ecommerce business the firm may contribute notably to countrys GDP, which further enhances economic growth rate. Inflation, tariff rate imposed by different importing country raise the price of the product and shipping charge, which may reduce the demand of consumers. Imposition of high rate of corporation tax by government affects the business (Ho 2014). For example, eBay is second fastest exporter as per the Asian Exporters Index. Indias eBay exports have be growing at 85% year on year. This trend will help in increasing demand that developed nations for country specific items. Social factors: Decrease in sales reduces net profit, which creates chances for job cut. If business profit of EBAY decreases due to economic disturbance, number of unemployment may rise if the management takes cost reduction policy by job cut. Increase in unemployment rate lead to decrease in the standard of living of people, which has social cost. Age is an important aspect affecting business. For example, the survey has shown 34% of the online shoppers of the age group of 18 to 24 years uses PayPal and similarly in the past for 12 months. Technological factors: Operating online business at international market, use of latest and user-friendly technology is required. Easily accessible website of the company can give the company competitive advantage. Using improved technology, the company can display the products in a more attractive way to the customers. Besides this, management can use an extensive database to manage information regarding supplies and customer, which can help in daily business operation (Ho 2014). There is always a risk of security for eBay as most of the products are put in the internet. The proprietary information would be at risk with security breach on our sites. There can be a severe breach of the information. The information if compromised will make the people believe that they are not capable of maintaining the site and will stop using our service. For example, eBay is expanding their role in platforms and mobile payments. Mobile technologies is a field they eBay is trying to explore. Environmental factors: The business operation of EBAY is performed by transaction of goods between sellers and buyers through this online platform. Packaging, distribution is part of the business. Therefore, the company needs to maintain Environment safety law in packaging, importing and shipping the goods. Use of bio degradable and recyclable products in packaging keeps environment safe. Environmental factors such as changing regulation for energy use can affect the business. The company is seen to achieve the objective of selling green products. There will be more consumption leads to carbon dioxide emission and thus a more polluted environment is created. There are more benefits achieved by people rather than spending. Legal factors: Environmental safety law, Sales of Goods Act 1979, Work and Safety Act 1974 are required to be maintained by EBAY to operate business in UK. Apart from these acts, company needs to abide by Electrical Equipment Safety regulation 1994, Gas appliances Safety regulation 1995 in business transaction (legislation.gov.uk 2016). There are legal issues that is put upon t is that there are people selling product in the website who do not deliver the products but hold peoples case and flies away. Threats: The online business is becoming popular in present decade. With the increasing demand and expansion of the market, three is possibility for new firm to enter into the market. New entry may reduce share of market of EBAY Company, as there will be increased competition in the market. There is also threat of illegal use of website by some deceitful people (Piotrowicz and Cuthbertson 2014). There are threats from existing business such as Amazon, Bonanza, e-Bid etc. Opportunities: With the increase in demand for online purchase, there are many opportunities for EBAY to expand its business globally. The company will come up with more number of inline stores in other countries, through increased portfolio through acquisition. The company is able to control illegal activities, its business performance may increase in future. Analysis of market potentiality of the company using porters five forces Competitive rival: Rivalry in this industry is high. There are strong competitors of EBAY such as Amazon, Etsy, Bonanza etc exist in the market. Competition comes from small firm such as e-bid in UK. When doing business at international market, the firm has to compete with local business operators of that country (Lee et al. 2012). Bargaining power of Customers: Customers have strong ability to bargain for the price of the product. If EBAY charge higher price for a similar product, customer may switch over to another online marketer. Bargaining power of suppliers: There are large numbers of sellers offering products in EBAY platform. Bargaining power of suppliers is thus comparatively low. Sellers may also switch over to another e-commerce business, if they do not accept the terms and condition set by EBAY. Threat of substitute products: This threat is very low as EBAY offers a wide range of products to the customers. In short run it may lose business if it fails to provide latest developed goods in market. In long run this threat is low. Threats of new entry: There are medium threats of new entry. It is easy to enter into this market. However, operate in his market requires huge potential. Existing e-commerce businesses operate in the market at wide scale. They have economies of scale and hence, offering product at low price is easier ((Lee et al. 2012). For a new firm operating at large scale initial is difficult with high startup cost. Some of the established players can influence the strong share of eBay. The established positions are for Amazon, Apple, Alibaba who has a potential to dent the position of eBay. There effect will be high on eBay. Internal analysis of strategic capabilities Strategic capabilities of the company Development of online auction model has helped the business to operate at low cost in the market. The pricing policy is mainly demand driven and customer oriented. Following this model, the company started to show description of product and attractive visualisation, which motivated customers to buy product from EBAY site. This strategy influence marketing and sale of product (Morris et al. 2015). During 2014, the company decided to cut job in order to reduce costs. However, during 2nd quarter of 2016, the company has been able to increase revenue by 6% compared to previous year. To increase the business at global level, the company has decided to acquire some small companies and increase in market share (investors.EBAYinc.com 2016). Information management technology and supply chain management is very strong of EBAY. During recession period, EBAY has taken strategies such as acquisition of Skype Internet telephony to raise share by 30% during 2009. During 2008, the company changes its business strategy regarding incentives to seller, fee structure and quality standard to reduce risk of global financial crisis (www.mirror.co.uk, 2016). Basic Resources Unique Resources Employees Funds Assets Physical Resource Online Store Network Brand Intellectual Property Patents Trade mark Figure: Unique Feature of eBay Source: (Created by Author) Basic resources of EBAY are human resource such as employees, financial resource such as funds, assets, physical resources. Unique resources are online store, network, brand and intellectual property such as patent, trademarks etc. Companys internal strategic capabilities depend on managing these resources (Shaw 2012). Discussion on the business function of the company Business function of EBAY includes providing a convenient platform to the customers and seller for transaction. This is an online retail business, which offers a wide range of consumer goods to the customers at a cheap rate. Overtime EBAY has improved the functioning of website. This company follows Business to Customer business model. Products are classified into different segments. This company values customer satisfaction criteria. It follows E-auction in setting competitive rice for the product. In the financial statement, this company includes Gross Merchandise volume, which analyses total closed transaction. Company follows GAAP measures for some element in financial statement and use non GAAP measures for some other elements. To analyse companys current financial performance, non GAAP measures are used (EBAYinc.com 2016). Figure: Organizational Structure of eBay (Source: Sahney 2015) Core Competencies of eBay: As per the core competencies eBay educates the sellers in finding and negotiating the best price for selling of the product in the market place this would be help in benefiting the sellers and buyers equally. There are wide ranges of products like electronics to furniture available for the customers which they are able to purchase easily through online at a much lower price. The company is brilliant in terms of promotion. There are more number of people who are visiting the online store of eBay as it promotes itself through magazines, online sites and the even through word of mouth. Basis of competitive strategy Competitive strategy is creation of better value chain in business. The competitive strategy of eBay includes same day delivery routing in which eBay tends to coordinate deliveries between the shoppers , couriers , stores on a 24*7 schedule. It takes hardly two hours for the dispatching from the point of sale, handling service logistics and delivery based on the preferences of the consumers. EBAY offers some unique features to the seller, which enables them to display branded and non standard goods unlike other competitors. E-bay sells products on auction basis, which gives it competitive advantage. EBAY gives priority to improvement in technology. Hence, it developed a program to facilitate both business and customers. EBAY has been successfully able to overcome all the previous difficulties faced initially by taking customer oriented business policy (EBAYinc.com, 2016). Strategic choice and strategic evaluation Key directions for future growth of the company using Ansoffs Matrix Using Ansoff matrix, management of EBAY can formulate future growth strategy based on four components. These four aspects of a business can help to evaluate long term growth prospects of this company (Hussain et al. 2013). The four components are discussed below. Market penetration Market penetration is a strategy to sell existing products in current market. Penetration in online retail market depends on creation of portfolio of product. Bundling strategy can be utilised. Increment in sale depends on aggressive market promotion strategy. Company can discount on sale of a product portfolio (Sahney 2015). New product development EBAY has opportunity to capture more market share by introducing new product in business. Giving priority to all types of customers, the company can follow current market trends for major consumer goods. Investment in research and development helps significantly in product development. Product development also includes packaging, labeling and use of latest technology (Fernie et al. 2014). New market development The company can divide total own market share into segments. It can open business in a new country, where online retail business is not so popular. Through market promotion strategy it can increase the awareness of people about online shopping. If the customers can be convinced that purchase through online retail store would give them cost benefit, this business may be popular in long run. If market can be segmented according to local preference, companys growth strategy increases (Wamba et al. 2015). Mixing local culture and flavour in business helps in market promotion. Company can divide market based on marginal revenue. Different products have different level of demand in the market. Therefore, in the product market, where demand elasticity is less, company can charge higher price compared to a market with low elasticity (Hu et al. 2012). Diversification Market diversification includes expansion of business in some other ways such as entering into new market and creating new products. Developing new products by maintaining environment standard increases interest of customer to avail the product (Johnson et al. 2014). Product diversification is important in long growth of the business. Horizontal diversification is required for loyal customers. As explained by Ansoffs matrix, diversification has risk of entering into unknown market. Operate into new market requires new skill and strategy (Boons et al. 2013). Additional training is required for existing employees to increase efficiency and productivity. Figure: Financial Data of eBay and it performance in USA (Source: Gong et al. 2013) Assessment of new market development Suitability Demand for online shopping increases overtime both in developed and developing countries. Therefore, it is suitable for EBAY to expand business in another country. Its suitability depends on understanding psychology of new customers (Gong et al. 2013) During 2004, EBAY took decision to expand business in China market. However, it failed to compete with local company Alibaba in China due aggressive market strategy (www.forbes.com, 2010). Hence, doing business in new market requires understanding local market deeply. Acceptability Acceptability of the company depends on customer choice. If the company fails to meet local needs, business cannot be successful. Maintenance of corporate social responsibilities in business process helps an organization to grow up in the industry. It can engage itself into some social work in target market to influence the customers. Incorporation local culture and language in system increases acceptability to the new customers (Chen 2012). Feasibility Feasibility depends on start up cost and financial performance of the company. Competition in local market influences Companys strategy. In order to acquire market, the company needs to have economies of scale. If the start up cost is very high to set up business in new geographical area, the company may not get competitive advantage in pricing, which may be detrimental for business operation (Johnson et al. 2014). Hence, keeping average cost at low level increases feasibility and opportunity of the company to develop new market. Life cycle Phase Requirement of funding Cost of Capital Business Risk Likely finding sources Dividends Launch High High High Equity Zero Growth High Medium High Growth investors Nominal Maturity Medium Medium Medium Retained earnings High Decline Low Medium low Debt High Figure: Feasibility Chart of ebay (Source: Created by Author) Conclusion and recommendations EBAY is multinational online retail company, which has good market share in UK and US. It has been successful in many areas to meet companys vision. It is very important for the company to diagnosis the strategic problem as the company has been a follower of innovation rather than becoming an innovation leader. There is high degree of competition that is faced by the company in the present and who are likely to witness in the future as well. There is a need for the company to formulate strategies. The strategies need to address the key aspects of the organization. To address a valid set of strategies there is a need to complete a SWOT matrix. There is a need for a course of action that suits better for the current position of the company. Nevertheless, the company has been successfully able to capture a significant share in online retail market despite having several challenges. Main strength of this company is having economies of scale, easy payment process, and high brand value. Inventory management nf information management system are strong in this company. Main weakness of the company is charging high price to the customers compared to other competitors. Strategy for development of new market has not been so effective. Long term growth strategy of the company is not so strong. However, during 2015-16 company has taken decision to change strategy to reduce the threat of new entry. Amazon is growing rapidly to overtake EBAY in terms of profit. References Boons, F., Montalvo, C., Quist, J. and Wagner, M., 2013. Sustainable innovation, business models and economic performance: an overview.Journal of Cleaner Production,45, pp.1-8. Chen, S.C., 2012. The customer satisfactionloyalty relation in an interactive e-service setting: The mediators.Journal of Retailing and Consumer Services,19(2), pp.202-210. Fernie, J. and Sparks, L., 2014.Logistics and retail management: emerging issues and new challenges in the retail supply chain. Kogan Page Publishers. Grant, R (2010) Contemporary Strategy Analysis: concepts, techniques, applications, 7th edition, Blackwell. Hill, C.W., Jones, G.R. and Schilling, M.A., 2014.Strategic management: theory: an integrated approach. Cengage Learning. Ho, J.K.K., 2014. Formulation of a Systemic PEST Analysis for Strategic Analysis.European academic research,2(5), pp.6478-492. Hu, W. and Li, Y., 2012. Retail service for mixed retail and E-tail channels.Annals of operations Research,192(1), pp.151-171. Hussain, S., Khattak, J., Rizwan, A. and Latif, M.A., 2013. ANSOFF matrix, environment, and growth-an interactive triangle.Management and Administrative Sciences Review,2(2), pp.196-206. Johnson, G., Whittington R., Scholes K., Angwin, D. Regner, P. (2014) Exploring Strategy Text and Cases, 10th edition Prentice Hall. Johnson, G., Whittington R., Scholes K., Angwin, D. Regner, P. (2014) Fundamentals of Strategy, 3rd edition Prentice Hall. Gong, W., Stump, R.L. and Maddox, L.M., 2013. Factors influencing consumers' online shopping in China.Journal of Asia Business Studies,7(3), pp.214-230. Lasserre, P., 2012.Global strategic management. Palgrave Macmillan. Lee, H., Kim, M.S. and Park, Y., 2012. An analytic network process approach to operationalization of five forces model.Applied Mathematical Modelling,36(4), pp.1783-1795. Morris, M., Schindehutte, M., Richardson, J. and Allen, J., 2015. Is the business model a useful strategic concept? Conceptual, theoretical, and empirical insights.Journal of Small Business Strategy,17(1), pp.27-50. Piotrowicz, W. and Cuthbertson, R., 2014. Introduction to the special issue information technology in retail: toward omnichannel retailing.International Journal of Electronic Commerce,18(4), pp.5-16. Priem, R.L., Li, S. and Carr, J.C., 2012. Insights and new directions from demand-side approaches to technology innovation, entrepreneurship, and strategic management research.Journal of management,38(1), pp.346-374. Sahney, S., 2015. Critical success factors in online retailan application of quality function deployment and interpretive structural modeling.International Journal of Business and Information,3(1). Shaw, E.H., 2012. Marketing strategy: From the origin of the concept to the development of a conceptual framework.Journal of Historical Research in Marketing,4(1), pp.30-55. Slack, N., 2015.Operations strategy. John Wiley Sons, Ltd. Wamba, S.F., Akter, S., Edwards, A., Chopin, G. and Gnanzou, D., 2015. How big datacan make big impact: Findings from a systematic review and a longitudinal case study.International Journal of Production Economics,165, pp.234-246. Forbes.com. (2016). Forbes Welcome. [online] Available at: https://www.forbes.com/sites/china/2010/09/12/how-EBAY-failed-in-china/#53f3136e7abf [Accessed 25 Jul. 2016]. mirror. (2016). Meet Britain's oldest EBAY seller - he's making 100,000 a year. [online] Available at: https://www.mirror.co.uk/money/meet-britains-oldest-EBAY-seller-7537365 [Accessed 25 Jul. 2016]. EBAYinc.com. (2016). Our Company - EBAY Inc.. [online] Available at: https://www.EBAYinc.com/our-company/ [Accessed 25 Jul. 2016]. legislation.gov.uk Anon, (2016). [online] Available at: https://investors.EBAYinc.com/ [Accessed 25 Jul. 2016].