The document outlines various unethical practices across several functional areas of business including sales, advertising & promotion, after sales service, and marketing research. Some examples provided include not providing the product as ordered, hiding costs from customers, changing product specifications or terms without informing customers, exaggerating product benefits in advertisements, providing substandard or different products than advertised, and conducting biased or low quality marketing research. The document suggests businesses should avoid these practices and act ethically in all areas of operations.
Strategic management, Analyzing the building blocks of WaltonMd. Ismail Hossen
An assignment prepared for the purpose of analyzing the four building blocks of Walton ( Refrigeration Department)
1) Achieving Superior Efficiency
2) Achieving Superior Quality
3) Achieving Superior Innovation
4) Achieving Superior Customer Responsiveness
Strategic management, Analyzing the building blocks of WaltonMd. Ismail Hossen
An assignment prepared for the purpose of analyzing the four building blocks of Walton ( Refrigeration Department)
1) Achieving Superior Efficiency
2) Achieving Superior Quality
3) Achieving Superior Innovation
4) Achieving Superior Customer Responsiveness
Reflections on the Role of the Audit CommitteePeter Chambers
Reflections on what makes for an effective audit committee, based on 20+ years of experience, delivered to an audience at Abu Dhabi Center for Corporate Governance in January 2014.
Abstract:
Corporate governance is very important in our business world today, especially after the frequent non-stop worldwide financial crises. Strong corporate governance is now considered a basic condition to accept and register an organization in most of the Stock Exchange Markets all over the world. The audit committee plays a major role in corporate governance regarding the organization’s direction, control, and accountability. As a representative of the board of directors and main part of the corporate governance mechanism, the audit committee is involved in the organization’s both internal and external audits, internal control, accounting and financial reporting, regulatory compliance, and risk management. This paper focuses on the audit committee’s powers, functions, responsibilities, and relationships within the framework of corporate governance.
Reflections on the Role of the Audit CommitteePeter Chambers
Reflections on what makes for an effective audit committee, based on 20+ years of experience, delivered to an audience at Abu Dhabi Center for Corporate Governance in January 2014.
Abstract:
Corporate governance is very important in our business world today, especially after the frequent non-stop worldwide financial crises. Strong corporate governance is now considered a basic condition to accept and register an organization in most of the Stock Exchange Markets all over the world. The audit committee plays a major role in corporate governance regarding the organization’s direction, control, and accountability. As a representative of the board of directors and main part of the corporate governance mechanism, the audit committee is involved in the organization’s both internal and external audits, internal control, accounting and financial reporting, regulatory compliance, and risk management. This paper focuses on the audit committee’s powers, functions, responsibilities, and relationships within the framework of corporate governance.
REVISED CORPORATE GOVERNANCE NORMS RECOMMENDED BY SEBI IN ITS BOARD MEETING HELD ON 13th FEB., 2014.
THESE NORMS WOULD BE APPLICABLE FROM 1st OCT. 2014
Need to price a new product but don't know where to start? This presentation explains some of the key considerations to create a pricing strategy for your new product.
The presentation was created for ProductCamp Austin 20.
This presentation updated Feb 13, 2018. Slideshare does not allow updates of presentations so I had to delete the old one.
Knowing your customer, Doing a regular follow-up, Interacting with them, Offering them the best most importantly simplifying work to get the best output....
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Sales
• Supply of product not as per order or sample
• Keeping a few costs hidden –
Transport/Accessories
• Not accepting defective product by some small
obscure print condition.
• Changing product specifications without prior
intimation to the customer
• Changing business terms without approval of the
customer.
• Delaying the supply of goods to the customer
3. Sales
• Treating 2 customers differently without valid
reasons
• Using superlatives for ordinary products
• Not providing after sales service as agreed
upon in the original contract.
• Playing favourites between two customers
regarding price and priority in supplies.
4. Advertising & Promotion
• Exaggerating product benefits in advertisements
• Supplying products, which are different than
those advertised.
• Giving wrong idea in advertisements regarding
price
• Not supplying the gift so promised in the
campaign
• Increasing the price and then offering a discount
on the price.
5. • Making derogatory remarks about competitors
• Making comparative advertisements by using
selected parameters alone
• Hiding major flaws of the product
• Not providing the advertised service to the
customers as a part of the promotional plan.
• Giving wrong information about the product.
6. After Sales Service
• Service technicians not going by the priority and playing
favourites for personal gain.
• Using substandard material during service and charging
for the genuine parts
• Using wrong equipment which endangers the product
itself during service
• Not taking service calls, if the location is distant or not
easy to reach while free service was promised for that
place.
• Making temporary repairs only to the product, so that it
can be repeatedly brought for service
7. • Over-billing the service charges
• Not keeping the service records properly so that
the problem has to be looked into afresh.
• Using substandard components or rejected
components.
• Refusing to service the product on some pretext
or the other
• Exchanging genuine parts with spurious ones,
when the product comes for service.
8. Marketing Research
• Research done to reflect a particular viewpoint
• Research is focused on areas which need not be
covered.
• Deep in-depth research is undertaken when preliminary
research would have satisfied the research objective
• Old research is repackaged as new
• Biased report
• Selling the research report to competition also
• Suppressing parts of the report/data to the managers.
• Entrusting the Marketing Research to a novice.