Thursday, October 31, 2019

Discussion Posts About Type II Diabetes And FASD Essay

Discussion Posts About Type II Diabetes And FASD - Essay Example Efficient diabetes management needs demanding and continual self-care procedures and behaviors in various areas. For instance, measuring and testing glucose level, diet control, information update about diabetes from library and insulin injection. The patients are expected to record all the results obtained. Text messaging makes it easy for patients to send the blood glucose results to their doctor on time and in response receive intervention feedback to support self-care management (Sarnikar, Bennett & Gaynor, 2013).Discussion two I agree with Katherine Johnson that the introduction of FASD topic in high school sex education is effective in lowering the number of babies born with the disorder. Effective strategies to minimize FASD comprise of comprehensive and early education about the hazards of alcohol intake during pregnancy. In order to minimize the number of babies born with FASD, prevention is the best alternative. Sex education programs provided in the private and public scho ols is a suitable venue to teach about FASD (Miller, Blumenthal & Chamberlain, 2015). Such a program can assist in implementing CHOICES, which is a program for women about selecting healthy behaviors to prevent alcohol-exposed pregnancies. The teenagers can access information that assists women to learn how to abstain from alcohol and use birth control techniques effectively. In addition, the youth will benefit from addiction rehabilitation and correctional settings (Hanson, Wilton, & Langland, 2015).

Tuesday, October 29, 2019

British Airways Essay Example | Topics and Well Written Essays - 1000 words

British Airways - Essay Example The concept of organizations developing to global citizenship has been developed in the recent past to ensure that organizations have an input on the societies they are in. Usually, the main purpose of why an organization exists is to make profit for the shareholders. However, this is not all, organizations are obliged to take care of the people that sustain it in different aspects ion order to have a corporate social responsibility. Therefore, according to the World Economic Forum, corporate global citizenship refers to the adoption of real and lasting contributions by a corporate body to societies apart from making profits for the shareholders. The organization should be able to take care of the stakeholders at all levels, these includes the customers, the suppliers, the community in which they operate, aid organizations and governments. It is becoming clear that the act of corporate global citizenship is becoming a corporate norm. The organizations have been under intense pressure to comply with the community expectations ad at the same time remain profitable, the pressure may not be direct but it is evident. This concept has in the recent years shifted from the acts of philanthropy, public relations or legal compliance to become more of a corporate strategy with an aim of creating a corporate name for the organization driven by values. It is therefore necessary for companies to adhere to these provisions in order to maintain not only a corporate image but also a social image that demonstrates to the world that the organization has an input. A company that is a good global citizen should be capable of participating in community development as well as supporting the government through developments. (Nelson, 2005).. Such a company should be able to devote its resources in developing the community around them; this ca n be majorly done through initiation of projects and programs that facilitate development. Global Citizenship Policy of British Airways The airline has reached the community in several different ways. Firstly, they have developed a charitable affiliation called Flying Start that is a joint initiative with Comic Relief. The main purpose of the aid organization is to help children undergoing through hard times across the world. The organization has left a big mark in the lives of many children and their families all around the globe. The second initiative is the establishment of a Community Learning Centre, which was opened around 1999 and has seen more than seventy eight thousand people get training (British Airways 2012). The centre has focused on training the community on information and communication technology, environmental education, language trainings, and customer service among others. The airline has also been on the forefront in supporting charitable organizations both loca lly and internationally, so far they have reached out in support for over forty organizations. One major and recurring impact has been through Dream Flight, which takes seriously ill children and disabled from the United Kingdom for a vacation to Orlando, United States. There is support accorded to street children through a program called Railway Children, several children found in the streets and especially those who live on railway platforms in the United Kingdom have benefited. The airline goes beyond to take care of the wild life through the David Sheldrick Wildlife Trust that takes care of orphaned wildlife in Kenya; the initiative has played a critical role in the conservation of elephants (British Airways 2012). British Airways has developed a number of partnerships with the community where they have an input in the development both within the United Kingdom and within other countries. The major areas that the airline has focused on include, in education and youth development , colleague engagements, conservation and emergencies. The staff is very instrumental in providing

Sunday, October 27, 2019

Privacy Preserving Data Mining in Partitioned Databases

Privacy Preserving Data Mining in Partitioned Databases A survey : Privacy preserving data mining in horizontally partitioned databases Komal Kapadia, Ms.Raksha Chauhan _______________________________________________________________________________________________________ Abstract – Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective information sharing between organizations becomes a vital requirement in today’s society. Privacy preserving data mining deals with hiding an individual’s sensitive identity without sacrificing the usability of data. Whenever we are concerning with data mining, Security is measure issue while extracting data. Privacy Preserving Data Mining concerns with the security of data and provide the data on demand as well as amount of data that is required. Index Terms – data mining, privacy preserving, ECC cryptography, randomized response technique. _______________________________________________________________________________________________ INTRODUCTION Data mining techniques have been widely used in many areas especially for strategic decision making. The main threat of data mining is to security and privacy of data residing in large data stores. Some of the information considered as private and secret can be bought out with advanced data mining tools. Different research efforts are under way to address this problem of privacy preserving and preserving security. The privacy term has wide range of different meanings. For example, in the context of the health insurance accountability and portability act privacy rule, privacy means the individual’s ability to control who has the access to personal health care information. In organization, privacy means that it involves the definition of policies stating which information is collected, how it is used, how customers are involved and informed in this process. We can considering privacy as â€Å"Individual’s desire and ability to keep certain information about themselves hi dden from others.† Privacy preserving data mining refers to the area of data mining that seeks to safeguard sensitive information from unsolicited disclosure. Historically, issues related to PPDM were first studied by the national statistical agencies interested in collecting private social and economical data, such as census and tax records, and making it available for analysis by public servants, companies, and researchers. Building accurate socio-economical models is vital for business planning and public policy. Yet, there is no way of knowing in advance what models may be needed, nor is it feasible for the statistical agency to perform all data processing for everyone, playing the role of a â€Å"trusted third party†. Instead, the agency provides the data in a sanitized form that allows statistical processing and protects the privacy of individual records, solving a problem known as privacy preserving data publishing. There are many methods for preserving the priva cy. In this surevey many methods try to compute the answer to the mining without revealing any additional information about user privacy. Progress in scientific research depends on the sharing and availability of information and ideas. But the researchers are mainly focusing on preserving the security or privacy of individuals. This issue leads to an emerging research area, privacy preserving data mining. For privacy preserving data mining, many authors proposed many technologies. The main aim of this paper is, to develop efficient methodology to find privacy preserving. LITERATURE SURVEY We have studied some of the related work for the privacy preserving in horizontally partitioned databases. Existing work for privacy preserving in horizonatally partitioned database has different types of techniques. TYPES OF PRIVACY PRESERVING TECHNIQUES Semi honest party Without trusted party With trusted party In without trusted party each party will calculate their own partial support and add their own random number and sends the result to the next party in the ring so that the other party will never know the result of others and in last the initiator party will disclose the result that is global support. In trusted party each party will calculate their partial support and send to the trusted party and add the own random number and send to the next coming site in the ring so that other party will never know the result of other parties after that trusted party will disclose the result and send to all sites that presents in the ring. Fig. 1 Framework of privacy preserving data mining[5] SECURE MULTIPARTY COMMUNICATION Approximately all Privacy Preserving data mining techniques rely on Secure multi party communication protocol. Secure multi party communication is defined as a computation protocol at the last part of which no party involved knows anything else except its own inputs the outcome, i.e. the view of each party during the execution can be effectively simulated by the input and output of the party. Secure multi party communication has commonly concentrated on two models of security. The semi-honest model assumes that every party follows the rule of the protocol, but is free to later use what it sees during execution of the protocol. The malicious model assumes that parties can arbitrarily cheat and such cheating will not compromise moreover security or the outcome, i.e. the results from the malicious party will be correct or the malicious party will be detected. Most of the Privacy Preserving data mining techniques assume an intermediate model, Preserving Privacy with non-colluding parties . A malicious party May dishonest the results, but will not be able to learn the private data of other parties without colluding with another party. (1)MHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE M. Hussein et al.’s Scheme (MHS) was introduced to improve privacy or security and try to reduce communication cost on increasing number of sites. Behind this main idea was to use effective cryptosystem and rearrange the communication path. For this, two sites were discovered. This algorithm works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites. This scenario was able to decrease communication time. Fig. shows MHS algorithm. The working of the algorithm is as follows: The initiator generates RSA public key and a private key. It sends the public key to combiner and all other client sites. 2. Each site, except initiator computes frequent itemset and local support for each frequent itemset using Local Data Mining . 3. All Client sites encrypt their computed data using public key and send it to the combiner. 4. The combiner merges the received data with its own encrypted data, encrypts it again and sends it to initiator to find global association rules. 5. Initiator decrypts the received data using the private key. Then it merges its own local data mining data and computes to find global results. 6. Finally, it finds global association rules and sends it to all other sites. Fig.2 MHS algorithm[11] (2) EMHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE Enhanced M. Hussein et al.’s Scheme (EMHS) was introduced to improve privacy and reduce communication cost on increasing number of sites. This algorithm also works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites . But this algorithm works on the concept of MFI (Maximal Frequent Itemset) instead of Frequent Itemset. a) MFI (Maximal Frequent Itemset): A Frequent Itemset which is not a subset of any other frequent itemset is called MFI. By using MFI, communication cost is reduced . b) RSA (Rivest, Shamir, Adleman) Algorithm: one of the widely used public key cryptosystem. It is based on keeping factoring product of two large prime numbers secret. Breaking RSA encryption is tough. (3)MODIFIED EMHS ALGORITHM FOR HORIZONTALLY PARTIOTION DATABASE In this technique, they used modified EMHS algorithm for improving its efficiency by using Elliptic curve cryptography. Here Elgamal cryptography technique is used which is of ECC for homomorphic encryption. ELLIPTIC CURVE CRYPTOGRAPHY Elliptic curve cryptography provides public cryptosystem based on the descrete logarithm problem over integer modulo a prime. Elliptic curve cryptosystem requires much shorter key length to provide a security level same as RSA with larger key length. In this elgamal cryptography is used. ELGAMAL CRYPTOGRAPHY a)A wishes to exchange message M with B[9]. b) B first chooses Prime Number p, Generator g and private key x. c)B computes its Public Key Y = gx mod p and sends it to A. d) Now A chooses a random number k. e) A calculates one time key K = Yk mod p. f) A calculates C1 = gk mod p and C2 = M*K mod p and sends (C1,C2) to B. g) B calculates K = C1x mod p h) B calculates K-1 = inverse of K mod p i)B recovers M = K-1 * C2 mod p j) Thus, Message M is exchanged between A and B securely. In this system, Elgamal cryptography paillier cryptosystem is used. Here, Elgamal cryptography is used for security purpose. Compared to EMHS algorithm here performance is better in terms of computation time. RANDOMIZED RESPONSE TECHNIQUE In this technique, here mainly focused on CK secure sum in randomized response technique for privacy preserving. Here, the multi party transaction data who discover frequent item sets with minimum support. In the randomized response technique, consider the data sets I = {I1, I2, I3†¦Ã¢â‚¬ ¦In} and the random number or noise part are denoted by R= {R1, R2, R3 †¦Rn}, the new set of records are denoted by I1+R1, I2+R2 †¦.In+Rn and after that take a partial support Pij = {Pi1, Pi2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Pin} so that partial support is P ij=I+R[10] I=Pij-R[10] In Randomized response secure sum technique, secure sum each site will determine their own data value and send to predecessor site that near to original site and this goes on till the original site collects all the value of data after that the parent site will determine the global support. CK SECURE SUM ALGORITHM[10] Step1:-Consider parties P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Pn. Step2:-Each party will generate their own random number R1, R2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.RN Step3:-Connect the parties in the ring (P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦PN) and let P1 is a protocol initiator. Step4:-Let RC=N, and Pij=0 (RC is round counter and Pij is partial support) Step5:-Partial support P1 site calculating by using following formula Psij = Xij.support – Min support * |DB| + RN1 – RNn Step6:-Site P2 computes the PSj for each item received the list using the List using the formula, PSij= PSij + Xij. Support – minimum support * |DB| +Rn1-Rn (i-1) Step7:-While RC! =0 begin for j=1 to N do begin for I=1 to N do Step8:-P1 exchange its position to P (j+1) mod N and RC=RC-1 end Step9:-Party P1 allowance the result Pij Step10:-End In ck secure sum technique, mainly focused on for computing global support within a scenario of homogeneous database and provides the high security to the database and hacking of data is zero. CONCLUSION In this paper we reviewed five privacy preserving technique in horizontally partitioned database. In MHS algorithm RSA cryptography is used. In EMHS algorithm, by using MFI approach accuracy is high compared to MHS. Modified EMHS algorithm used elgamal technique so privacy is high than EMHS technique. Randomized response technique provides high security to the database compared to other techniques. In future we can compute less number of rounds instead of n number of rounds. Here , we can use encryption technique for encrypting random number and sends it to the predecessor. REFERENCES [1] Neelamadhab Padhy, Dr. Pragnyaban Mishra Rasmita Panigrahi. â€Å"The Survey of Data Mining Applications and Feature Scope.† 2012 IJCSEIT. [2] Xinjun qi, Mingkui zong. â€Å"An overview of privacy preserving data mining.† 2011 ICESE. [3] Kishori pawar, Y.B. gurav. â€Å"Overview of privacy in horizontally distributed databases.† 2014 IJIRAE. [4] Manish Sharma, Atul chaudhary , Manish mathuria Shalini chaudhary. â€Å"A review study on the privacy preserving data mining techniques and approaches.†. 2013 IJCST. [5] Shweta taneja, shashank khanna, sugandha tilwalia, ankita. â€Å"A review on privacy preserving data mining: techniques and research challenges.† 2014 IJCSIT. [6] Jayanti dansana, Raghvendra kumar Jyotirmayee rautaray. â€Å"Techniques for privacy preserving association rule mining in distributed database.† 2012 IJCSITS. [7] Xuan canh nguyen, Tung anh cao. â€Å"An enhanced scheme for privacy preserving association rules minig on horizonatally distributed databases.† 2012 IEEE. [8] Manish Sharma, Atul chaudhary, Manish mathuria, Shalini chaudhary Santosh kumar. â€Å"An efficient approach for privacy preserving in data mining.† 2014 IEEE. [9] Rachit v. Adhvaryu, Nikunj h. Domadiya. â€Å"Privacy preserving in association rule mining on horizontally partitioned database.† 2014 IJARCET. [10] Jayanti Dansana , Raghvendra Kumar , Debadutta Dey. â€Å"Privacy preservation in horizontally partitioned databases using randomized response technique.† 2013 IEEE. [11] Rachit v. Adhvaryu, Nikunj h. Domadiya, â€Å"Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database†. 2014 IJEDR. [12] Agrawal D. Aggarwal C. C. On the Design and Quantification of Privacy-Preserving Data Mining Algorithms.ACM PODS Conference, 2002. [13] D.W.Cheung,etal.,Ecient Mining of Association Rules in Distributed Databases, IEEE Trans. Knowledge and Data Eng., vol. 8, no. 6, 1996,pp.911-922.

Friday, October 25, 2019

Impact of Globalisation on the Music Industry Essay -- Globalization E

Define and explain globalisation, then critically evaluate and illustrate the impact globalisation has had on a particular business, the industry it operates in, its country of origin and the country or countries the business has expanded into. In this paper I will be discussing how globalisation has impacted the Music Industry in recent years, and in particular the multi-national giant Universal Music Group (UMG). Globalisation is a noun that is hard to define; it has many definitions depending on which scholar you talk to, which dictionary you reference, and the viewpoint you take. The Oxford dictionary will tell you that globalisation is â€Å"the process by which businesses or other organisations develop international influence or start operating on an international scale† (Definition of globalization in English). People’s perspectives on defining the word vary depending on the place they were born, where they have lived, the religion they follow, their social status, political ideology, cultural background and wealth, amongst other things, because all of these will affect whether they view globalisation to be a positive or negative occurrence. My favourite definition comes from Kenichi Ochmae; a Japanese organisational theorist most recognised for introducing Japanese management methods, such as the just-in-time method of production, to the Western world. In 1992, Ochmae said that globalisation is the â€Å"onset of the borderless world† (Al-Rodhan, 2006). This is my preferred explanation of globalisation because it is so simple to digest. From the phrase â€Å"borderless world† alone you can begin to understand exactly what globalisation is all about, however the simplicity of this definition is also its downfall because it is very non... ...ndi, a Paris-based multi-national who in 2012 declined an offer of 8.5 billion US$ for the company from SoftBank (Staff, 2013). Universal Music Group operates in over 60 countries across the world – with its corporate headquarters located in Santa Monica (California) and Broadway (New York City) (FAQ's, 2014). The firm owns many hugely successful record labels including Deutsche Grammophon Capitol Records, Decca, Def Jam Recordings, EMI Records, Interscope Records, Island Records, Mercury Records, Motown Records, Polydor Records, Republic Records, Virgin Records and many more. This puts them is an extremely fortunate position in the music industry because they own many back catalogues of artists who have experienced huge fame and have the ability to attract new talented artists because of their history and the prestige linked to the names of the labels they own.

Thursday, October 24, 2019

Affirmative Action Policy: Eliminate All Forms of Discrimination Essay

Question 1: Is the affirmative action policy morally defensible? Explain. Yes affirmative action is morally defensible in that: South Africa has been characterised by many years of workplace inequities and imbalances of the past particularly blacks who were treated in an inhumane manner and denigration. In 1994 the new democratic government came into power and had a moral duty to eliminate all forms of discrimination and thereafter level the playing field at the workplace, hence the affirmative action policy was introduced and legislated. Since blacks were marginalised certain jobs and skills were reserved for white minority in some sectors of the economy thereby robbing our economy of its potential and productivity. Whereas the introduction of the affirmative action policy uncovered skills and untapped talent, created more jobs in responsible positions and thereby allowing our economy to grow stronger and compete in the global markets. The harsh realities of the past regime created divisions between black and white communities and promulgation of this policy assisted in closing that gap and normalise the conditions at the workplace. Therefore the policy allowed companies and government to utilise all people to the maximum potential and created improved relations and communication between organised labour and management. QUESTION 2: In your opinion, which country has successfully implemented the policy of affirmative action and why did it succeed? America QUESTION 3: In your view, why did South African government choose to implement Affirmative Action policy and Act, and was it ever justifiable? Certainly the policy of Affirmative Action is justifiable in that: Central to the democratic government was the economic challenges and expectations of the black majority who voted them into power. Therefore, the government was obliged to strive for macro-economic balance that supports sustainable growth and development to ensure that the benefits are shared by all concerned. Consequently, the Employment Equity Act 55 of 1998 was promulgated in terms of which the Affirmative Action Policy was implemented and its main aim to correct and balance the inequities of the past. Furthermore the policy had to promote equal opportunities and redress entrenched inequalities that affected blacks, women and children at the workplace. Therefore the policy is justifiable based on moral, legal and socio-economic issues. QUESTION 4: Does the policy need to be discontinued after a certain length of time and why? Yes in that: The main objective of the policy is to create opportunities and level the playing field where everyone can compete and once this is achieved the policy has to stop. Moreover the policy is not a punishment for the wrongs of the past so it makes sense to discontinue it some years to come moral responsibility is achieved.

Wednesday, October 23, 2019

How Great Websites Help Improve Your Business

Take a look at the websites for Harley-Davidson (www. harley-davidson. com), Yamaha (www. yamaha-motor. com), and Indian (www. indianmotorcycle. com). Who are their potential customers? How is each of these companies appealing to their potential customers? Are they using emotion, facts, comparisons, etc? How effective do you believe each of them to be? Harley Davidson (www. harley-davidson. com) Who doesn’t know Harley Davidson? It is a popular American motorcycle manufacturer. Also known as H-D or Harley founded in 1903 by William Harley and Walter, William, and Arthur Davidson, who built their first three motorcycles in a shed in Milwaukee.Harley sells heavyweight which is over 750  cc motorcycles designed for traveling on highways. It was one of two major American motorcycle manufacturers to survive the  Great Depression during the first decade of 20th century. Harley-Davidson has come a long way since filing for bankruptcy in 1986 once the company realized how to conne ct with potential customers. According to Ken Schmidt, Harley-Davidson's former director of communication said that they don’t compete with hardware which only creates pricing pressure. Instead, they use the hardware as protection and the process behind it as their weapon.Their weapon of choice is getting potential customers to like them more than their competitors. From a hardware and utility perspective, everything does the same thing, so Harley do business with people, brands and organizations they like. Schmidt also said â€Å"When all things are the same and we feel no inclination to do business with one particular company over another, we buy from whoever is willing to sell us a cool piece of hardware at the lowest price. We are all consumers; the things we buy, the reasons we buy them, regardless of how much we spend, do not make sense. Notice our customer is one of the key points in doing business. Harley-Davidson sale person continuously ask potential customers what that they really wanted and produce that product and sell it to them at a profit. Harley-Davidson brings motorcyclists together to create social network. Today there are 1,300 Harley dealers worldwide, 650 of which are in United States. The group are getting larger. The sales person refers the customers as a friend. The customer feels good once you treat them like a friend.By this they will go out and spread the word which create a bigger chain of ‘friends’ around the world. Current customers have told Harley-Davidson’s management to keep the identity, look and sound of the motorcycles because they are unique. When customers view are heard and accepted it develop greater brand loyalty, creating customer experience that is unique and valuable. Harley-Davidson ranging from CEO and sales person maintained personalised relationships with customers through face to face and social media contact. They use advertising nationally about four to five television commercials a year.These commercials are recognised because they are advertising the company not the product. They also advertised in national magazines such as Road ; Track, Popular Science, and Fortune as well as specific motorcycle magazines as Easy Rider. Locally, individual Harley-Davidson dealers advertise on the radio and through direct mail. Internet is a great and fast way to promote as it reaches the entire world. Harley owners can find new product where new customers are able to see what products Harley-Davidson has to offer and can compare the price with similar products.The more information the public can get the more chances of a potential customer. The purpose of Harley-Davidson's mass media advertising is to inform and remind which move customers from ignorance to awareness. The plant's maintenance organization is a strong proponent of: * Technology * A focus on detail and root causes * Team concepts * Communication and sharing By effectively using these â€Å"tools,† sa ys lead maintenance reliability engineer Dana Fluet, â€Å"We are moving toward being 100 precent proactive and having zero fire-fighting. It's the way that we're doing business at Harley-Davidson. As a result for the full year 2012, Harley-Davidson continues to forecast a five – seven percent increase in motorcycle shipment compared to last year, 2011. Companies can build customer relationships at many levels, depending on the nature of the target market. Harley-Davidson established the  Harley Owners Group  (HOG) in 1983 which gives Harley riders a way to share their common passion of â€Å"making the Harley-Davidson dream a way of life† HOG also build on the strong loyalty and community of Harley-Davidson enthusiasts as a means to promote not just a consumer product, but a lifestyle. HOG members typically spend 30% more han other Harley owners, on such items as clothing and Harley-Davidson-sponsored events. HOG went international in 1991, with the first officia l European HOG Rally in Cheltenham, England. Today, more than one million members and more than 1400 chapters worldwide make HOG the largest factory-sponsored motorcycle organization in the world. HOG benefits include two magazines (Hog Tales and Enthusiast), a HOG Touring Handbook, a roadside assistance program, a specially designed insurance program, theft reward service, a travel center, and a â€Å"Fly & Ride† program enabling members to rent Harleys while on vacation. . http://www. sema. org/sema-enews/2010/13/sema-show-seminar-how-harley-davidson-reinvented-itself 2. http://en. wikipedia. org/wiki/Harley-Davidson 3. http://www. scribd. com/doc/2670384/Harley-Davidson-Analysis 4. http://www. scribd. com/doc/19943405/Harley-Davidson-Case-Study 5. http://catalogue. pearsoned. co. uk/assets/hip/gb/hip_gb_pearsonhighered/samplechapter/0273755021. pdf 6. Text Book Principle of Marketing Thirteenth edition Yamaha (www. yamaha-motor. com)Genichi Kawakami was the first son of Ka ichi Kawakami, the third-generation president of Nippon Gakki (musical instruments and electronics; presently Yamaha Corporation). He was the second Kawakami to join the Nippon Gakki Company. He explored producing many products, including sewing machines, auto parts, scooters, three-wheeled utility vehicles including motorcycles. Market and competitive factors led him to focus on the motorcycle market. Genichi actually visited the United States many times during this period. â€Å"If you are going to make it, make it the very best there is. With these words as their motto, the development team poured all their energy into building the first prototype, and ten months later in August of 1954 the first model was complete. It was the Yamaha YA-1. The bike was powered by an air-cooled, 2-stroke, single cylinder 125cc engine. Yamaha continued to grow. They have diversity products including snowmobiles, race kart engines, generators, scooters, ATVs, personal watercraft and more. Genichi K awakami step up for Yamaha Motor Company's success with his vision and philosophies.His total honesty towards the customer and making products that hold their own enables the company that serves people in thirty-three countries, to provide an improved lifestyle through exceptional quality, high performance products. Yamaha motor has expended to Star motorcycles, Sport, Outdoors, Watercraft and Marine. Now Yamaha motor has more than 400 dealers across the country and now they are planning to spread out to more cities increasing its dealer network to 2000 by 2018. To be on top you have to know your customer.Genichi once said, â€Å"I believe that the most important thing when building a product is to always keep in mind the standpoint of the people who will use it. † An example of the commitment to â€Å"walking in the customers' shoes† was the move in 1966 by Yamaha to continue its expansion. John Bayliss who is the Motorcycle Product Manager of Yamaha Motor Canada Ltd said â€Å"The new FJR1300 is attracting lots of very positive feedback. A number of customers have already stepped up and left deposits with our dealers, without even seeing the bike in person! It tells us that the designers and engineers have done a great job and satisfied customers need.Yamaha motor website makes the customer easy to find what they want. Yamaha motor also created a link ‘My YAMAHA’ is for you. By becoming a member of ‘My Yamaha’ customer will have access to many exclusive member benefits such as build a customised web page and set as your browser’s home page, Create & Save accessorised ATVs in any of the Build-Your-Own sections, Build & Save a Wish List for Genuine Yamaha Parts and Accessories and also customer can view and print vehicle Maintenance Schedules & Services Specifications back from year 2002.Yamaha motor also offer Pro Yamaha Motorsports dealer. A Pro Yamaha Motorsport dealer is a customer satisfaction focused dealer ship that has consistently excelled in providing customer with the best sales experience, the best service experience and the best ownership experience. By ‘Walking in customers shoes’ slogan it will make Yamaha motor understand the needs of customer by this they will deliver faster and better. By having more products in the market, it will be easier for people to know your brand. 1. www. amaha-motor. com 2. http://www. presidion. com/industry_solutions/commercial/materials/case_studies /Yamaha%20Motor%20Europe. pdf 3. http://cars. sulekha. com/yamaha-motors-expand-their-dealership-network-in-maharashtra_car_news_2935 4. http://www. yamaha-motor. com/sport/myyamaha/login/L3Nwb3J0L215eWFtYWhhL2hvbWUuYXNweA==/starthere. aspx Indian Motorcycle (www. indianmotorcycle. com) The Indian motorcycle was originally founded as the Hendee Manufacturing Company by George M. Hendee in 1897 who manufacture bicycles.They renamed the Indian Motocycle Manufacturing Company  in 1928. Ca rl Oscar Hedstrom  joined in 1900. Both of them are former bicycle racers and manufacturers. They teamed up to produce a motorcycle in Hendee’s home town of Springfield. It was successful and the sales increased drastically during the next decade. In April 2011, Polaris Industries purchased Indian Motorcycle Company. Backed by $2 billion Company, the customer can expect the confidence of the Polaris engineering team, vision, quality and performance to be delivered in the classic Indian Motorcycle.Now, Polaris is redesigning Indian bikes from a clean sheet of paper to capture the spirit of the Chief and other Indians from a half-century ago, but to use a modern engine and other components to make the bikes rider-friendly. With the slow economy, Indian had a tough road due to a restricted and high end line of motorcycles. Polaris, on the other hand is far more expanded and able to weather the current market conditions. This could be a good combination for both companies This store also carries many ranges of back seats, decorative trim, leather jackets, hats, shirts and more.Customers and fans can join a rewards membership program for added benefits, events and discounts. We use mobile toolboxes & equipment to set up a fabrication shop under canopy for customers to get a unique & personal experience in the techniques. There are hundreds of events held all over the country each year. Indian motorcycle show potential customers that the modifications & builds can be done without huge machines & million dollar facilities, they can get their local dealer to do the modifications or even do some themselves.They even do small workshops for potential & existing customers. This can help to change customer thinking. In Indian Motorcycle website it stated RIDE PROUD. RIDE INDIAN. Indian Motorcycle is determined to deliver a premium experience to riders around the world. Indian Motorcycle is looking for a select dealer business operator that will proudly represent t heir brand while assuring a premium buying and ownership experience for consumers. Understanding what customers need in a purchase experience is critical in meeting the needs of the market.We spent a substantial amount of time talking with motorcycle riders to understand what they want from their dealer. This understanding was the basis for the store design and dealership operational expectations. The customer experience is paramount in the success of the Indian Motorcycle brand and a profitable dealership. Indian Motorcycle store branding was established directly from what consumers told us and what they expected when shopping for a premium motorcycle. These riders want an open environment that allows enough room to walk between the motorcycles.They do not want to have to walk through or around other products to get to the bikes. Having an adequate selection of apparel and accessories is also very important to their potential consumers. The store layout and design will give custome rs a premium shopping experience that is constant with their expectations. This look and feel will be consistent in the dealerships, at major motorcycling events, and all other consumer and public interactions with Indian Motorcycle. In addition to the dealership location and shopping environment, customers also have expectations about how they should be treated.They want to be able to sit on the motorcycles, start the motorcycles, and take a test ride. It is important to them to be able to feel firsthand how the motorcycle performs and fits their riding style. These riders want to be able to have conversations with a knowledgeable staff that listens and responds properly. They want the staff to be motorcycle buffs that understand motorcycle riders. Indian motorcycle training, support, and operational standards will help ensure a positive â€Å"frictionless† interaction with our consumers.With the development of this strategy, they also understand the need to align with the r ight partners in the market. Indian Motorcycle dealers will need to understand and embrace the â€Å"Ride Proud, Ride Indian† culture. They should understand that that they are making an investment in their future with Indian Motorcycle. They will be expected to maintain the highest level of respect for the Indian Motorcycle brand and the Indian Motorcycle rider. Indian Motorcycle gathers and uses your personal information to run the Indian Motorcycle Web site and carry out the services you have requested.They also use your personally identifiable information to inform you of other products or services available from Indian Motorcycle and its associates. Indian Motorcycle may also contact you via surveys to conduct research about your opinion of current services or of potential new services that may be offered. Indian Motorcycle keeps track of the websites and pages that customers visited within Indian Motorcycle in order to decide what Indian Motorcycle services are the most popular. This data is used to deliver modified content and advertising within Indian Motorcycle to customers that are interested in a particular subject area.Indian Motorcycle is an iconic brand with a proud legacy and a bright future. We will offer Indian Motorcycle Brand training to ensure that all dealership appreciate the legendary heritage of Indian Motorcycle and the brand that they have been entrusted to help steward and grow. Training will also be provided to be certain that dealership personnel understand who the customer is and what they expect in a finest shopping experience. 1. http://www. indianmotorcycle. com/en-us/pages/home. aspx 2. http://www. phatridez. biz/Polaris. html 3. http://thekneeslider. com/polaris-buys-indian-motorcycles/