.

Monday, September 30, 2019

A Quality Management Case Study Defects Essay

Quality Control is developing evaluation schemes to ensure products are designed and produced to meet or exceed customer requirements. Any unit of production not meeting the standard is immediately eliminated. Researchers apply the Pareto principle implying that very few quality defects account for the larger quality losses. Pareto diagrams allow us to separate vital few factors that cause majority defects from the less contributing factors. Resources are then used to correct these factors and optimum quality standard is achieved. This study examines for defects found during final inspection of printed circuit before they are integrated into the next higher assembly. Manufacturing process followed standards such as MIL-Q. It’s a standard written by the government used even by commercial enterprises. Whenever we have a defect cited, a discrepancy report (DR) is generated. The DR record keeps track of when what defect was detected by whom and where. It also stores information about what action was taken to restore quality unit. Defects are classified as types (In this study, there are 31). These broad categories are further sub categorized. In nutshell, this effort of planning quality is the essence is Quality Assurance. Using the online DR system, Managers analyze defects. First, Managers find out the correlation between inspections and defects. Pearson’s coefficient is a valuable indicator of that. Secondly, Managers analyze the ratio of defects to no. of inspections per week. To crack the whip on detailed data of actual defects, Pareto analysis (Quality Control measure) is performed. Significantly, it shows percentage of defects caused by the key defect types. Working groups are formed to drill down on the last few vital factors to suggest corrective actions and completely eliminate defects. New drawings, procedures are designed and applied to achieve highest quality. During the highest problem period in this study, no. of inspections went down drastically. One reason could be that the work completed was less (because of more defects) and so the number of inspections went down. But the repaired boards needed to be inspected. Inexperienced operators could be the other reason. This leaves a lot of work yet to be done in this field. This study however does benefit quality management efforts. Although, this case is specific to the airline industry, the approaches described here can be usefully applied to any project. Maintaining quality is a very crucial task and any project management must seriously focus on it. Harvard Business Review

Sunday, September 29, 2019

Diving and Changing the Wreck

Adrienne Rich’s poem Diving into the Wreck   is filled with personal myth at the birth of herself, in either a literal of a metaphoric sense. I will rewrite Rich’s 4th and 5th stanza in order to better utilize her personal myth and to make it more succinct that she is speaking about birth. I will chiefly be using her syntax, but with different word choices and with a different number of lines for each stanza.I breath in blue air,That only gets bluer the more I come out of that dark place.I delve into my subconscious, my unconscious, my primordial mind that only infants still posses.I am born.I am powerful, full of blood and air and crying it all out of me and into meAgain and again.I am the sea of her,For in the sea of my mother I saw the beginning of me.This alone is my story,Something deepIn the elemental self.And now: I remember lessOf my purposeIn this outside worldThat is beyond an umbilical chordThat ties me faithfully to my mother.And yet†¦I belong here to o, just as my lungs adjustTo this new seaSo too does my vision.I see reformed coral reefs,And even though I breathe and eat outside of my motherI am still thereAnd here, breathing just a little bit differently.Works CitedRich, Adrienne. (1973). Diving into the Wreck. Online. 28 March 2009. Poets.Org.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   < http://www.poets.org/viewmedia.php/prmMID/15228>

Saturday, September 28, 2019

Characterization, Theme, and Imagery of Ray Bradburys The Pedestrian

Two works cited by humans have made great progress in inventions such as television. However, as kids gave up reading and played outside to connect TV, people might wonder if it is progressing or returning. In The Pedestrian, Ray Bradbury chose to state the effects of these improvements. Through expression and image he shows that humans will no longer exist if human progresses until society loses humanity. Ray Bradbury's The Pedestrian is a short story about a man named Leonard Mead on the future of AD 2052. Bradbury created a rare scene with a powerful image and metaphor. And it also contributed to the theme that appears through short stories. This story happens in a future dyspeak society in 2052. This book was featured on the streets of a vacant city of Leonardo Meade, a rare city born in Waukegan, Illinois on August 22, 1920. Since 11 years old, Bradbury is interested in writing books and novels. He accepted high school education and kept teaching himself. Also, I sold newspapers at the time of writing and I spend most of the time at the library. In the same year he graduated in 1938 and he published his first short story in the magazine Hollerbochen's Dilemma. Until 1942 51 When reading Ray Bradbury's story, the reader can see that he is writing a distinctive style; with the story pedestrian his style is quite obvious. First of all, this story belongs to the type of science fiction. Another aspect of his style is that unlike other people like such Leonard Mead, his character is often lonely. Third, he uses images to explain settings and characters. Therefore, Bradbury's style is revealed in this story. Question: Writers start their work and ask their readers to stop and think about their investigation. I preview BIG 3 and it ends with paper. Short stories and anecdotes: Writers provide a short story (story) related to their subjects in order to quote examples and attract viewers' interests. Next, we preview the paragraph theme quickly and it ends with the paper. Quotation: Writers refer to persuasive or topic-related statements made by authoritative sources regarding their subject. Quote or say the lyrics of the lyrics. Please use your mother / dad / grandma always to say something Among pedestrians, Ray Bradbury wanted to draw on events that had been stopped by policemen while walking with friends at night. Person 50). The character formation and symbolism of this short story shows how society develops when people depend on technology. There are too many mobile phones, too many internet, you have to remove those machines, there are too many machines. (Time 1) Even today I will introduce his skill using this citation It is. Do not trust his moon before his 90th birthday. Ray Bradbury's pedestrian shows the distrust of his own technology and the idea of ​​how to end if the technical society is about to end.

Friday, September 27, 2019

Why the government should create policies that make buying locally Research Paper

Why the government should create policies that make buying locally more appealing to us in the United States - Research Paper Example Lester Brown, President of the Earth Policy Institute states, â€Å"The prospect of peaking oil production has direct consequences for world food security, as modern agriculture depends heavily on the use of fossil fuels.† Modern agriculture depends heavily on fossil fuels to operate the heavy machinery necessary to take the worlds supply of food from a beginning, on the farm, to its end, in the hands of the consumer. Brown points out many aspects in his article to support the fact that the rising cost of fossil energy is driving the American economy back into its local communities. Every product produced that ends up in the hands of the consumer is directly effected by the use of fossil fuels. Past decades of inexpensive oil has created this dependency which in turn has given rise to the way our society lives. There is virtually no limit to the distance that food can travel to the consumer. Many of the products that we consume daily travel from China, an emerging country, als o, have seen a growing dependency on fossil fuels. In their effort to become more capitalistic, backward agricultural methods have been replaced with modern machinery dependent on oil. Dependency on oil not only creates higher cost in food; it also creates a constant flow of filthy air back into the environment. Therefore, with these notable factors, should the government make policies that drive the consumer back toward the local economy? It’s a question of individual initiative in most instances, but most of us look to the government for guidance just as a child looks to its parents. Should the government be involved at all in the daily lives of the consumer? Policy is not treated in the same fashion, as are laws. Policies put forth to a society as a whole give suggestions and positive influences that are more readily accepted by the majority. A policy is a more tactful way of achieving an end result without the rigors of law. Consider our food safety! Where do our foods or iginate? What are the safety factors involved in transporting foods from such long distances? What are the positive factors of focusing more on local grown foods? The Food and Water Watch states, â€Å"Our current food system is broken, and it didn’t happen by accident.† The Fair Farm Bill works to bring positive aspects, changes, and upgrades when needed. It also promotes the local food movement, pointing out that locally grown foods are more accessible, healthful, tasty, and help local communities prosper. As local communities prosper, it brings the economic living standards back to an acceptable quality of life. The current food system consists of large monopolies formed primarily to sustain themselves economically due to rising cost of fuels and other expenses. Farmers have been forced to merge with others into large conglomerates, which have not been a positive factor for the consumer in producing quality, healthy, and fresh foods. Foods that are produced in other countries do not have the same health standards supported by the policies of the United States. The merger era also destabilized pricing. Pricing in any industry normally fluctuates by supply and demand. Large conglomerates monopolize the market creating their own pricing structures, but questionable inferior quality foods. Smaller local food entities focus more on quality vs. quantity. Competition is what drives any capitalistic society to improve on what now exists. In order for local small business to exist, there must be a breakdown of the large conglomerates. A competitive atmosphere fuels more business, better quality, and lower pricing; which will be passed to the local communities giving easy access

Thursday, September 26, 2019

Ethicsproject Case Study Example | Topics and Well Written Essays - 250 words

Ethicsproject - Case Study Example In turn, they mess up Bernie program of acquiring new television set on time. I think the proposals are well informed and ethical since they aim to improve the type of services the company offers to its guests. For instance, when Napoli Pizza brochures are given to each room and phone numbers provided, it would be easy to understand what guests needs and what they do not want. In turn, the communication between guests and the management improves the performance of the company. Further, it leads to customer satisfaction, which is the aim of the company. Jane acted ethically in that she wanted to satisfy the greatest number of people by supporting education. On the other hand, her parents are unethical since they only desire good things for themselves at the expense of others. This is the reason they were against Jane supporting education of people in the community. People should not use their grocery money to play lottery because it can interrupt other people. For instance, if they fail to win their desired prizes they end up losing what they have hence affecting people who depend on them. It is not ethical for Sal to direct Jim to increase the lottery when he understands that the chances of winning are slim. Further, they should target middle class not minority groups who rely on daily income from grocery for

The economy of Saudi Arabia Essay Example | Topics and Well Written Essays - 1250 words

The economy of Saudi Arabia - Essay Example Saudi Arabia is promoting business privatization to facilitate economy diversification and national employment. Attempts at diversification center on energy production, telecommunications, natural gas breakthrough, and petrochemical divisions. In the country’s oil industry and service divisions, around 5.5 million employees are from foreign countries. Saudi government is principally centered on providing work for the big youth populace, which is deficient in education and technological expertise. Riyadh has maximized expenditures on job training and education, particularly with the opening of the King Abdallah University of Science and Technology, the country’s primary co-educational institution of higher education. To increase business ventures on foreign goods and services, Saudi Arabia joined the World Trade Organization (WTO) in 2005. The government started launching "economic cities" throughout the country to encourage economic growth. In 2004-2008, the continuing increase in the world’s oil price earned Saudi Arabia sufficient financial reserves to cope with worldwide financial disaster. However, in 2009, its economic development was hampered due to strict global credit, declining oil prices, and the large-scale economic crisis. This impediment delayed several economic expansion plans. Saudi establishments sustained the banking division throughout the global crisis by directing asset investments into banks, decreasing rates, and openly confirming Saudi administrations security of bank deposits (â€Å"Middle East: Saudi Arabia†). Saudi Arabia is the world’s biggest producer and exporter of petroleum. The oil industry was discovered in the 1930s but was commercially produced after World War II. In 1951, the Arabian-American Oil Company (ARAMCO) was established, granting 50% net earnings to Saudi Arabia. Since the 1960s, petroleum brought huge revenues to the Saudi

Wednesday, September 25, 2019

Bowling alley Research Paper Example | Topics and Well Written Essays - 3000 words

Bowling alley - Research Paper Example My aim in this paper is to bring out clearly the reasons why the construction should be carried, using geology/ soil and the water system of the specific place, 70 Greenwood roads, Marlboro NJ 07751 Block 122 Lot 39, to defend my opinion To achieve the above goal I have organized my paper into sections in which the first section, I have given the Environmental Impact Analysis of the specific place in relation to Geology/ soil, and the in the second section I have discussed the water system of the place pertaining to the aquifer of the water system. I have then concluded my paper with a final section that discusses the overall summary of why I think the team trying to deny the construction of the alley is bad. So let start with the Environmental Impact Analysis of the place. Geology/ soil First before looking into why the soil or rather the geology of the place supports the construction of the alley, it is very prudent to define the two key words, that is the geology and soil of a pla ce. Soil: soils are the results of weathering, mechanical disintegration, and chemical decomposition of the parent material. The products of weathering may have the same composition as the parent material, or they may be new minerals that have resulted from the action of water, carbon dioxide, and organic acids with minerals comprising the parent material. Geology: geology can be defined as the scientific study is which comprises the study of the solid rocks and the solid Earth, these rocks of that it are composed, and the various processes by with which the solid rocks change. Generally speaking, geology can be considered as the scientific study of the surface of almost all the celestial bodies, such as the geology of the mars and the geology of the moon. So, why is the geology or the soil for that matter very important before the construction of a building anything for this case a bowling alley? Well below is a list of the soils conditions, types, present in the place that support s the construction of the alley. GEOLOGY/ SOILS Following an analysis of the geology/ soils and the seismic hazards is founded primarily on a technical report by the Geotechnical Engineering Investigation of the Proposed five lane bowling alley. 1. The ENVIRONMENTAL CONDITIONS a. Appropriate Physical Setting (1) Geologic Conditions In 70 Greenwood roads, Marlboro NJ 07751 Block 122 Lot 39, which is the project site is comparatively very level with an entire change in the grade of around 33 feet, west to east something that is less than 30% grade. An average elevation of the area is very roughly 740 feet almost above the mean sea level. The Immediate head-to-head properties, are usually characterized by the similar shapes and the elevations. 70 Greenwood roads, Marlboro is underlain by the Pleistocene and Holocene alluvium that had been deposited in the Valley next to the place, the structural basin that is surrounded by the mountains on the entire four sides. This alluvium can be es timated as being numerous hundred feet thicker. The deposits are usually very fine grained that consists of mixtures of silt,

Tuesday, September 24, 2019

The Criminal Justice System Essay Example | Topics and Well Written Essays - 500 words

The Criminal Justice System - Essay Example lations (LegalMatch, 2012) â€Å"Theft or common theft, assault and battery, drink driving, vandalism, public drunkenness, resisting arrests, obstructing or resisting a police officer, trespassing, disorderly conduct, breach of the peace, failure to appear in court, prostitutionâ€Å". These crimes normally have a penalty of no longer than one year and are not considered to be serious offenses. The serious offenses normally fall under felony charges such as (LegalMatch, 2012) â€Å"murder/homicide, rape, drug trafficking, child abuse, gun possession, burglary, money laundering, and child pornography†. Such serious offenses are considered highly serious and have punishments that vary from state to state, depending upon the courts deemed severity of the offense. Having clearly defined the difference of the two crimes based upon the description of offenses, it is safe to say that one would much rather be accused of a misdemeanor rather than a felony. That is if one finds himself facing legal action as a result of his own personal actions or reactions to situations concerning him. As per the police records submitted to us, you were charged with a Misdemeanor Breach of Peace charge. This was charge was the result of your involvement in the bar room brawl that occurred at last Friday between your boyfriend and another bar patron. You have asked me to advise you with regard to what kind of penalty you are looking at and for how long. I am please to inform you that since you are charged with a misdemeanor, your penalty will not be longer than one year. Our federal government has indicated that the punishment for misdemeanor offense such as yours â€Å"... carry a maximum punishment of one year of incarceration usually is served in a local jail. â€Å" (wiseGeek, 2012). I therefore advice you not to worry as there is even a very strong possibility that, should you plead guilty or be found guilty of involvement in the misdemeanor charge, â€Å"If a jail sentence is imposed, it is

Monday, September 23, 2019

Integrated marketing communication Essay Example | Topics and Well Written Essays - 1750 words

Integrated marketing communication - Essay Example There is a much used clich sentence in marketing circles that goes - "If you build a better mousetrap, the world will beat a path to your door." (Crilley 2009). But according to management experts this no longer holds good today. Hence "the reality is that when you build the world's best mousetrap, customers don't naturally come knocking at the door." A product or service whether it is provided by a private or public service organization needs to market it and marketing needs marketing communication for it to succeed. According to Ms Linda Hall and Dr. Mark Wickham of the University of Tasmania, there is a lot of homogeneity in products, services and price, the concept of integrated marketing communication has become the 'new frontier' to enable organizations to differentiate themselves, their products and services from other. (Hall and Wickam). IMC is the transformation of business messages to the consumer group on an integrated basis "IMC is defined as a management concept that is designed to make all aspects of marketing communication such as advertising, sales promotion, public relations, and direct marketing work together as a unified force rather than permitting each to work in isolation." (Lake 2009).There are several primary reasons why organizations need to change their isolated marketing communication approach to an integrated one. They are changes in the society, changes in the economy, and changes in technology. (Varey 2001, p.254). Changes in society: The behaviour and pattern of buying among consumers have undergone a sea change when compared to a few decades back. The concept of a brand loyal market has changed to a repertoire market. An article titled 'Mistakes Marketers Make' that appeared in eh Wall Street Journal states that marketers focus on building brand loyal customers, while in reality, this concept is fast disappearing. This is truer in the case of consumer goods. "Most frequently purchased consumer goods are in repertoire markets, though many consumers don't realize it." (Corkindale 2008). The feature of a repertoire market is that customers will have a basket of goods of the same type of product which he or she will alternatively buy. "In a repertoire market, the customer will buy from a repertoire of brands (more than one brand)." (Marketing Wisdom for 2004: 99 Marketers and Agencies Share Real Life Tips). The Wall Street Journal Article mentioned earlier states that in such a case marketers need to reach a larger audience and hence resorting to an integrated marketing approach will be more practical. . Changes in the economy: The cost of media advertising is increasing as time goes by. Organizations can no longer rely on a single expensive media like the television to promote their products and services. They have to be more cost conscious and at the same time be effective. An IMC strategy uses all types of promotional media and hence a marketing mix can be developed integrating less costly media with the more expensive ones. Changes in technology: Fifty years ago, the choice of advertising media would have been limited to the print and radio and television is certain markets. A little later few televisions channels appeared which later boomed with the introduction of cable TV and direct to home services. The internet as an advertising medium also became very popular. The huge increase in choice has also necessitated in an integrated marketing strategy for effectiveness. Global business scenario: Integrated Marketing Communication (IMC) is considered as essential part of the business operations in the global business environment .Both public and private sector organisation are required to run their business in the global competitive environment. Expansion and diversification of business operations on global basis requires integrated marketing communication. Integrated communication improves business productivity and performance on a greater extend.

Sunday, September 22, 2019

Discuss Some of the Challenges Facing International Students in Higher Education Essay Example for Free

Discuss Some of the Challenges Facing International Students in Higher Education Essay As a growing number of international students who attempt to obtain a further education diploma or expand their horizons, has been increasing, it is often the case that they would face various challenges while studying abroad. The main barrier that they have to overcome is â€Å"academic learning that consists of strangeness, difference and integration (Teekens, 2006:17, cited in Hyland, 2008). According to Hyland et al (2008:29), to improve the quality of higher education not only the individual needs to endeavor, but also the departmental and institutional effort would be indispensable. This essay will illustrate that the main factors of overseas students who study for least one year result in academic learning challenges, are adapting to a new educational system’s assessments and English speaking only environments, then will provide possible solutions, for example, giving sufficient guidance from enrolled universities, revolutionising language certified test in reducing these difficulties. The first main factor that directly causes learning challenges is that overseas students would probably face different methods of assessment. Most postgraduate students wish their overseas journeys were the same as ‘back home’ (Pointon, 2009, cited in The Higher Education Academy, 2012). However,for those students who graduated in other educational systems, team projects, presentations would become the barriers they have to confront. Firstly team-based learning appears to be more strange and complicated to these students because it not only depends upon academic competence,but also has to be relevant to their abilities of communication and coordination. Group work can be even more stressful because a silent student is effectively excluded, whether voluntarily or not. It is also something that many international students have not really encountered before (Sovic,2008). Subsequently, quite a number of overseas students seem to be unfamiliar with presentations as well. According to (Sovic,2008:153), except for necessity of group work sometimes, to express their opinions via presentations international students who may be new have to be confidently confronted with classmates who would hold other cultural perspectives. These unacquainted assessment criterions would widely and considerably affect international students, especially at the beginning of their academic journey. For example, presentations would be often assigned in the first term, if the results seem to be quite low, they not only directly impact those students’ overall score, but also affect their emotions to some degree even might reduce their confidence and motivation with regards to continuing their studies abroad. The second major factor which would be around all overseas students,is the atmosphere of foreign language only. Sovic(2008:150)has demonstrated that for those students who are non-native speakers, even if they have obtained fairly high IELTS(The International English Language Test System)test grades, language is still singled out as the biggest obstacle for them to study abroad. The main reason, which causes that they passed the tests but could not adapt to the new language environment quickly, is that IELTS seems to be irrelevant to the demands within the universities. To begin with, when overseas students arriving the destinations, the first difficulty they have to face is local accent. Research (Sovic, 2008:151) reported that international students who are even native-speakers can still have significant problems with fast and heavy accents in lectures and tutorials. Another point which bothers almost overseas students especially at the beginning of study abroad is acquiring academic language, including discipline-specific vocabulary and academic expression. It is often overlooked, since students who obtained the required language scores always mistakenly believe that it is sufficient to complete their studies (Arkoudis, 2008). These unexpected barriers would be troubled for all overseas students to varying degree. It is notable that international students must spend quite a large amount of time and energy on solving language issues. In other word, they have to cut down the time from learning main curriculums, which would considerably affect them to absorb curriculum knowledge and make them feeling more stress. One feasible solution to help overseas students to face academic challenges is that enrolled universities need to make more efforts before international students’ academic journeys. Despite universities always remind students who have been confirmed acceptance to prepare relevant knowledge about their courses, there are few students who could prepare adequately. Zhai(2004:101)discovered that academic issue tend to be the most difficulty for international students, and there are around 60% students whom recommended that their college should provide more academic guidance. It is suggested that academic support should be provided to international students as soon as possible, since Pedersen (1991) had demonstrated that sufficient guidance should be initiated before they arrive. According to the factors mentioned above, enrolled universities may send an amount of materials to international students via email or even material object, including introduction of new educational system, samples of presentation and team project, videos of lecture and tutorial. Moreover, for students of different disciplines, universities may provide more specific background knowledge or required reading list. Although these will increase universities’ operating costs, it would be effective to help international students overcome academic challenges. Another solution which seems to be quite challenging is revolutionising language certification test. Lee (2009:23) claims that compared to other language certified tests, IELTS is most effective and reliable examination to assess students’ not only language skill but also academic ability. However, although international students obtain the qualified language scores, it does not mean that they can successfully finish academic learning (Schmitt, 2005; Murray and O’Loughlin, 2007; Arkoudis, 2008; Sovie, 2008), even the type of writing in IELTS seems to be â€Å"public non-academic genres† (Moore and Morton, 2005, cited in Hyland et al, 2008). Feast (2002:83) reported that between language proficiency and academic performance at university there is a positive and significant, but weak relationship. Thus, in order to better serve high education, IELTS may be adjusted. Firstly, academic IELTS test could be divided into three categories that consist of Arts aspect, Science and Engineering, Social Science. Secondly, increasing more academic topics in section1 and section2 of listening test could replace a considerable number of life topics. Thirdly, the type of task2 in writing could change to mini-academic essay. These adjustments could not only make the scores more valuable to be referred by universities, but also help and guide international students to accumulate more discipline-specific and academic knowledge which lead to reduce those academic difficulties after they arrive. In conclusion, as this essay has demonstrated, the main factors which lead to academic learning challenges are atmosphere of English speaking only and different educational assessment system. Feasible solution to these challenges including revolutionising language certified test and providing adequate support from enrolled universities. It seems that revolutionizing language certified test is most significant solution to help and guide students at the source. In the future, increased awareness of academic challenges via researching and reporting as a whole could arouse relevant departments’ attention to take action on resolving these problems.

Friday, September 20, 2019

Intersections Of Race And Gender Sociology Essay

Intersections Of Race And Gender Sociology Essay Gender identity originates from the experiences of our lives and these experiences differ not only based on gender but also by other factors such as race and class. These identities are formed under the narrow structures of stereotypes, which are created as a system of social control (Andersen 311). The interactions between race and gender create stereotypes about men and women. An analysis in Sociology: Understanding a Diverse Society by Margaret L. Andersen and Howard F. Taylor and Jacquelynne S. Eccles article Gender Role Stereotypes, Expectancy Effects, and Parents Socialization of Gender Differences reveals that gender intersects with race, thus proving that manhood and womanhood emerge due to systems of prejudice and discrimination that are inextricably intertwined with race, class, and gender. Gender is part of our social structure, just as race and class are. When applied to Camara Phyllis Jones article, The Gardeners Tale, men are the red flowers and women are the pink. From the moment of birth, men and women are put into different pots. These pots symbolize socialization because the separation affects the course that a man or womans life will take. However, institutionalized sexism causes the options to be distinct. Jacquelynne Eccles of the Institute for Social Research at the University of Michigan suggests that parents are role models. Actions as simple as giving a toy truck to a little boy and a Barbie to a little girl can help develop a childs gender identity. If a child grows up with a mother who is very athletic, she is more likely to view sports as a normal part of being a girl. The same idea can apply to a boy; if he sees his dad treating his mom kindly, he is less likely to abuse his own wife. Personally mediated sexism revolves around the concept of omission. This can be seen when men are given power, prestige and economic resources for they are believed to become the next world leaders, doctors, businessmen, engineers, and scientists (Andersen 315). Women grow up wearing frilly pink dresses and are taught to be gentle and remain at home. They are excluded or discouraged from entering certain schools or career paths because they are expected to not have the capacity to exceed in certain fields. Lastly, there is internalized sexism, which can be seen in early adolescence. This once again reintegrates Eccles statement of how parents play a critical role in influencing their childrens social self-perceptions, interests, and skill acquisition (Eccles 184). Early adolescence is when people begin noticing the existence of gender differences and believing in them. Young women, generally, view themselves as having a lower math ability in comparison to young men. They go on to express less interestà ¢Ã¢â€š ¬Ã‚ ¦in studying mathematics and in en tering math-related professions (Eccles 184). Females do believe that they are more competent in English that their male counterparts and males believe their athletic competence is greater than a females (Eccles 184). Gender inequality does not exist in its own sphere. It coincides with race and class inequality. As M.P.P Root questions, is it possible to separate the gendered experiences from the racial existence (Root 162)? Latinas and African American women are discriminated by both race and gender and even possibly by class. White men, usually, are given more power; however, this does not apply to Latino men. Tim Wise, a White man, explains that he had experienced this unearned privilege. Growing up, he was given the benefit of the doubt if he did not succeed. African American men felt a weight on their shoulders for if they did not succeed, then they would be proving the stereotype, African Americans are inferior to Whites, true. Gender identity incorporates racial identity. Females are taught from a young age to have characteristics of femininity that include a nurturing yet confident personality. They should seek higher education and a career. However, African American women, compared to White women, have a greater likelihood of declaring their independence. This aspiration may come from the fact that their mothers were often career orientated women who relied on themselves. Males are also affected by their racial identity. Latino men are almost expected to embody the stereotype of machismo, exaggerated masculinity which is associated with sexist actions and honor, dignity, and respect (Andersen 313). Despite the existence of such behaviors, the relationship between Latino men and women is multidimensional (Andersen 313). These families are egalitarian so the decisions are made by both the men and the women. African American men are also subjected to certain associations such as accountability to family a nd self-determination (Andersen 313). As they mature, they in turn put a greater stress on themselves to be the breadwinner. People acknowledge that race includes systems of privilege and inequality, yet they do not realize that gender is also controlled by the same systems. Women are generally at a disadvantage when compared to men in aspects such as access to economic and political resources (Andersen 315). Women are denied an opportunity for achievement, influence, and independence. Gendered institutions are the cause of the different experiences of men and women. In a career that is dominated by men, women are treated like outsiders and seen as tokens (Andersen 314). Men, on the contrary, continue to rise to a higher position because they are viewed as more important and the career advancement may simply come from connecting and spending more time with their superiors. Women are not given these opportunities to spend time with their superiors whether it be inside or outside work. The income of an employed woman is less than that of an employed man. However, when analyzed among Hispanics and African Ame ricans, the womans income is approximately the same as the mans. Furthermore, gendered institutions build toward gender roles, which can be defined as learned patterns of behavior associated with being a man or a woman (Andersen 314). Nonetheless, in recent years, there has been a shifting of gender roles. Women are no longer presumed to be the keepers of the house and do womens work and men are working as nurses and primary school teachers and they celebrate a womans accomplishments instead of expecting it to diminish their own. These advancements and the crossing of gender boundaries also bring about drawbacks such as the questioning of ones true gender identity (Andersen 321). The roles that both men and women fall into are not random but rather are conditioned by the social context of their experiences (Andersen 313). Experiences are affirmed by race, class, and gender standing. Each exhibits different effects, depending on a persons location in the interconnection of gender, race, and class relations (Andersen 323). Males and females identify with certain gender expectations. This involves the issue of conformity. Males take risks that can lead to greater violence and all because of the cultural definition of masculinity (Andersen 311). However, it is both gender and race that further emphasize stereotypes. African American men are stigmatized as being hyper masculine and oversexed while Latinos are macho (Andersen 312). Jews, on the other hand, are viewed as being simply intellectual but asexual (Andersen 312). Woman, similarly, conform to their environment and the stereotypes of their race. As David R. Williams and Chiquita Collins state in their artic le, Racial Segregation: A Fundamental Cause of Racial Disparities in Health, it is from this segregation that African Americans lose employment access and thus income. It is no surprise that this social inequality develops into the stereotype of African American women being welfare queens (Andersen 312). Residential segregation also introduces class. Even the White race has its own distinct boundaries. Working-class white women are perceived as slutty, while those of the over-class are frigid and cold (Andersen 312). Experiences of race and gender socialization do interact with one another to create todays societal norms. To be truly able to comprehend the different stratifications among men and women begins with considering how gender structures social experiences. Race, gender, and class are all nuances that affect a persons life. Sometimes, either race, gender, or class may be the primary identity, but together each places a mark on the experiences of a person. This is why I have come to conclude that though race, gender, and class are different, they are interrelated dimensions in our social structure (Andersen 323).

Thursday, September 19, 2019

Teen Marriage (and Divorce) :: Exploratory Essays Research Papers

Teen Marriage (and Divorce) Why would a single young female like me write an essay about marriages and divorces? Well I'll tell you why I wrote it. I chose to write my paper on marriages and divorces because I am very interested in how the lengths of marriages among young adults have changed over the years. I'm also interested in why they divorce at such an early time in their marriage. The age and reason of marrying today has changed dramatically over the years. Many young people today are starting to get married at a very young ages and they're doing it all for the wrong reasons. . So start my research I asked myself, how far back in history have young adults been getting married? About states: In Ancient Rome, girls married between the ages twelve and fourteen as well as some young men married at the age of fourteen also. However, during the middle ages, women married as early as fourteen. But men usually waited until they were well on their feet and able to support themselves as well as a wife. In 1371, the average age for women to marry was 16 and the average for men was 24. However the age changed in the year 1427 to men marry in their mid 30's and marrying women about half their age. (1) However that's when marriages were accepted by society. Today young adults aren't married as young, but their marriage doesn't last as long either. For instance, Macaulay Culkin and his ex wife married both at the age of 17, but they ended up getting a divorce with him at the age of 19 and her at the age of 20. Their marriage only lasted for 2 years after they found out that their love for each other was really just a fling. I don't think that they should have been thinking about marriage at that age and point in their lives. They both had their own busy lives which they had already planned out what they wanted to happen. I'm sure neither of them had included the part about getting married at the age of 17. 1 also think that they really weren't as ready as they thought they were. They probably figured that because they feel that they are in love that they should just go ahead and take that extra step and get married to be with each for the rest of their lives, which didn't turn out that way.

Motivating an Athletic Performer Essay -- Motivation Motiational Theor

This essay will include the different types of motivational theories. It will illustrate the different types of motivation and how each affects the performers in various ways. Positive and negative issues of the types of motivation will be discussed to determine which is the best method of motivation and why. It will also illustrate how these motivational theories are used to motivate a performer. This essay will be concluded by stating the best motivation method, and how a coach or teacher could use it in motivating a performer. Motivation can be described in various ways: (English Oxford Shorter Addition 1993) described motivation as being, "à ¢Ã¢â€š ¬Ã‚ ¦The action or an act of motivating something or someone. The stimulus, incentive, motives for action towards a goal, resulting from psychological or social factors; the factors giving purpose or direction to behaviourà ¢Ã¢â€š ¬Ã‚ ¦." (Kent 1994) described motivation as being, "à ¢Ã¢â€š ¬Ã‚ ¦ the internal state which tends to direct a person's behaviour towards a goalà ¢Ã¢â€š ¬Ã‚ ¦." (Woods, 1998) described motivation as, "à ¢Ã¢â€š ¬Ã‚ ¦motivation has been seen as having two aspects: it is what drives us to do thingsà ¢Ã¢â€š ¬Ã‚ ¦and it makes us do particular thingsà ¢Ã¢â€š ¬Ã‚ ¦." These various descriptions of motivation are putting across all of the same points. All three statements involve an inner drive to a specific goal. These goals are achieved through arousal and the direction of the athlete's behavior. There are various types of motivation such as intrinsic, extrinsic, primary, secondary, positive and negative motivation. Intrinsic motivation is a term used to describe the internal drives that allows the athlete to perform. Intr... ...rises the athletes to perform, creating a job like situation for the players. I believe that there is no best method of motivation a coach or teacher can use on a performer. This is because when you start a particular sport, you do it for fun, but gradually as you get better rewards begin to be offered. Thus resulting in the performers motivation coming more from extrinsic than intrinsic motivation. If the performer wins a competition it will have a positive affect on them intrinsically as well as extrinsically, as the performer will fell good about the reward as much as he feels good about how much effort was concerned in obtaining the reward. There has to be a balance, as if it is to extrinsically motivated their will be no enjoyment competing in the sport, therefore the performer will get bored and quit.

Wednesday, September 18, 2019

Acupuncture Essay -- essays research papers

Acupuncture A Chinese medical technique; acupuncture is a medicine originating in the orient over four-thousand years ago. Used primarily for pain relief, but also in curing disease and general health improvement. Oriental Medicine views (illness and pain) as an imbalance of one's energy. With Acupuncture the energetic balance can be restored, thus helping the body to rid itself of disease. Often illnesses can be diagnosed and treated at an early stage. Acupuncture consists of inserting hair thin needles through specific spots in the skin called acupuncture points. These specific spots of insertion are over neuroreceptors in underlying muscles. These needles are inserted along meridian points throughout the body; There are hundreds of these meridians, all serving different purposes. "Evidence proves that needling simulates peripheral nerves in the muscles which send messages to the brain to release endorphins (morphine- like peptides in the brain). These natural chemicals then block the sending of painful messages from the brain." (Acupuncture-Microsoft Network Nov. 30, 1996). Acupuncture needles are typically inserted 1/10 to 4/10 on an inch deep. Although some procedures require needles to be inserted as deep as 10 inches. Acupuncture points are then stimulated by various forms of needle stimulation. Acupuncture is an incredibly effective form of medicine; This essay will present details explaining some of the uses of acupuncture. Acupuncture; the insertion of needles into the body through specific spots, over neurorecepters. These needles are then stimulated by either: rotation, heat, or by a weak electrical current. Acupuncture is a medical technique used primarily as a relief of pain, but is known to cure disease, as well as improve general health. "The theory suggest that acupuncture blocks the transmission of pain impulses from parts of the body to the central nervous system." (Compton's interactive encyclopedia). Three main sites have been found for endorphin acupuncture analgesia. This type of acupuncture blocks the sending of pain messages from the brain. The pituitary gland being one; this gland, when stimulated by needles, releases endorphin. The second site are the periaquaductal gray neurons in the mid brain which release endorphins when stimulated. The third, el... ...les must be stimulated. The stimulation is what causes acupuncture to be so effective. There are several ways in which stimulation is reached: One being, a gentle twirling motion. The physician, by use of his/her fingers gently rotates the needles. Second, there is heat stimulation, the physician heats the needle with a cigar looking tool designed specifically for acupuncture. Third, electrical stimulation; the physician agitates the needles with a low powered 2 hz electrical current. The physician connects the needles to a low output electrical stimulation machine. Stimulation is key to the success of acupuncture. Acupuncture, a medical technique originating in the Orient, more than four-thousand years ago. Used primarily for reduction of pain, but to cure some disease, as well as improvement of general health. The most spectacular reason for acupuncture's success is: Stimulation of needles by the acupuncturist. Stimulation of the meridians; the rivers of energy throughout our bodies. These rivers get stopped up from time to time, acupuncture is the key to clearing the stop... Acupuncture a method of encouraging the body to promote natural healing and to improve bodily functions.

Tuesday, September 17, 2019

Applications of Biometrics in Cloud Security

CHAPTER ONE 1. 1 INTRODUCTION The success of modern day technologies highly depends on its effectiveness of the world’s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ‘in the cloud’ that supports them [15, 16].Authentication, thus, becomes pretty important for cloud security. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos (measure). To make a personal recognition, biometrics relies on who you are or what you do—as opposed to what you know. OBJECTIVES 1 To know and understand the meaning of biometric, its uses, the characteristics and also its advantages and challenges. To know and understand the full meaning of cloud computing its type and its service providers 3 To explain the about cloud security and its shortfalls 4 To know how biometric technology can be applied to enhance security in cloud computing CHAPTER TWO 2. 0 BIOMETRICS The word â€Å"biometrics† comes from the Greek language and is derived from the words bio (life) and metric (to measure). Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.Computer science, biometrics to be specific, is used as a form of identification [1]. Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic [2]. Biometrics offers new perspectives in high-security applications while supporting natural, user-friendly and fast authentication. Biometric technology uses these characteristics to identify individuals automatica lly1. Ideally the characteristic should be universally present, unique to the individual, stable over time and easily measurable [5]. 2. Biometric systems A biometric system provides an automated method of recognizing an individual based on the individual's biometric. A biometric is a measurement of a biological characteristic such as fingerprint, iris pattern, retina image, face or hand geometry; or a behavioural characteristic such as voice, gait or signature. Behavioural biometrics are related to the behaviour of a Person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviourmetrics to describe the behaviour class of biometrics [1].A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioural characteristic that the person possesses [3]. Biometric systems can be used in two different modes. Identity verification occurs wh en the user claims to be already enrolled in the system (presents an ID card or login name); in this case the biometric data obtained from the user is compared to the user’s data already stored in the database Identification (also called search) occurs when the identity of the user is a priori unknown.In this case the user’s biometric data is matched against all the records in the database as the user can be anywhere in the database or he/she actually does not have to be there at all [4]. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. 2. 2 Biometric Authentication Authentication on the other hand, is a process where a known person's live biometric is compared to a stored template of that person.For example, an individual’s identity is revealed to the biometric system upon entering a PIN (Personal Identification Number). To authenticate that this is the person associated wi th this PIN, a live biometric is presented by the individual and compared to the template and a match is determined. This is known as a ‘one to one’ search. It is more accurate than the ‘one to many’ application and is the predominant biometric process in place today and the more privacy friendly of the two systems.This answers the question – Are you who you say you are? Two general uses of biometrics are identification and verification which both require the existence of reference data that the person’s measured traits will be compared with reference templates or raw data. During these processes, a biometric data sample is compared against the respective biometric data of every person enrolled in the database or against a single reference template of a particular enrolled individual in order to confirm the identity of that person respectively.When a biometric system correctly identifies a person, then the result of the identification process is a true positive, whereas if the system correctly rejects a person as not matching the respective enrolled template, the result is a true negative. Similarly, when the system incorrectly identifies or rejects a person then we speak about a false positive or a false negative. Fig 2. 1 Components of a Biometric Authentication System[31] 2. 3 BIOMETRIC SECURITY SYSTEM The biometric security system is a lock and capture mechanism to control access to specific data.In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometric s is the key to open that lock [11]. 2. 4 CRITERIA FOR BIOMETRIC SYSTEM[12]There are seven basic criteria for biometric security system: [12] * Uniqueness: uniqueness is considered as the priority one requirement for biometric data. It will indicate how differently and uniquely the biometric system will be able to recognize each user among groups of users . For instance, the DNA of each person is unique and it is impossible to replicate. * Universality: Universality is a criterion for the biometric security that indicates requirements for unique characteristics of each person in the world, which cannot be replicated. For example, retinal and iris are characteristics will satisfy this requirement. Permanence: permanence parameter is required for every single characteristic or trait which is recorded in the database of the system and needs to be constant for a certain period of time period. This parameter will mostly be affected by the age of the user * Collectability: The collectabil ity parameter requires the collection of each characteristic and trait by the system in order to verify their identification * Performance: performance outlines how well the security system works. The accuracy and robustness are main factors for the biometric security system.These factors will decide the performance of the biometric security system * Acceptability: The acceptability parameter will choose fields in which biometric technologies are acceptable. * Circumvention: circumvention will decide how easily each characteristic and trait provided by the user can lead to failure during the verification process. DNA is believed to be the most difficult characteristic leading to the failure of the verification process [13]. Figure 2. 2 Basic Criteria for Biometrics Security System [26] 2. 5 TYPES OF BIOMETRIC systems Two classes of biometric methods are: 1) Physical Biometrics:Physiological biometrics is based on measurements and data derived from direct measurement of a part of the human body. * Fingerprint: Fingerprint recognition is one of the best known and most widely used Biometric technologies. Fingerprint recognition technology extracts features from impressions made by the distinct ridges on the fingertips. * Iris-scan: Iris recognition technology is based on the distinctly coloured ring surrounding the pupil of the eye. Iris recognition systems use a small, high-quality camera to capture a black and white, high-resolution image of the iris. Retina-scan: Retina recognition technology captures and analyses the patterns of blood vessels on the thin nerve on the back of the eyeball that processes light entering through the pupil. * Hand geometry: Hand geometry technology takes 96 measurements of the hand, including the width, height, and length of the fingers; distances between joints; and shape of the knuckles. * Facial recognition : Facial recognition technology identifies people by analysing features of the face not easily altered—the upper out lines of the eye sockets, the areas around the cheekbones, and the sides of the mouth..Facial recognition can be used in both verification and identification systems. 2) Behavioural characteristics are based on an action taken by a person. Behavioural biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body * Voice recognition: Voice authentication is unique and non-intrusive method and also the hardware requirements required for this type of authentication are cheap and are available readily. Microphones can be used for this purpose.However the back ground noise must be controlled, high storage is required for this kind of authentication. This type of authentication can also be extraneously influenced by once sore throat and cold. [7] * Keystroke-scan: Keystroke dynamics is a biometric based on the assumption that different people type in uniquely characteristic manners. Observation of telegraph operato rs in the 19th century revealed personally distinctive patterns when keying messages over telegraph lines, and telegraph operators could recognize each other based on only their keying dynamics [22].Keystroke dynamics is known with a few different names: keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms [22]. Currently users begin information to computer systems via physical keyboards or keyboards on touch screens. The main advantage of using keystroke dynamics is that it can be used without any additional hardware. Thus it is inexpensive. The user acceptance of a keystroke dynamics biometric system is very high, since it is not intrusive and users do not necessarily even notice that such a system is used [22, 27]. Signature Recognition: Signature recognition authenticates identity by measuring handwritten signatures. The signature is treated as a series of movements that contain unique biometric data, such as personal rhythm, acceleration, and pressure flo w. In a signature recognition system, a person signs his or her name on a digitized graphics tablet or personal digital assistant. The technology can also track each person’s natural signature fluctuations over time. The signature dynamics information is encrypted and compressed into a template.One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric – the measured behaviour has a beginning, middle and end [6]. A number of biometric methods have been introduced over the years, but few have gained wide acceptance. 2. 6 PERFORMANCE OF BIOMETRICS SYSTEMS The following are used as performance metrics for biometric systems [8]. * False Accept Rate FAR and False Reject Rate FRR: The FAR gives a measure of the probability that an individual will be ‘falsely accepted’ by the system (i. . that the system accepts someone who is not enrolled on the system, or makes an incorrect identification). The FRR indicates how like ly it is that a legitimate user will be rejected. The balance between the FAR and the FRR greatly influences both the security and usability of the system. The False Rejection Rate (FRR) is usually caused by lighting, climate conditions, low quality equipment or inexperience. The False Acceptance Rate (FAR) is caused by the security standard being too low [9]. False Match Rate FMR and False NonMatch Rate FNMR: A false match occurs when a system incorrectly matches an identity, In verification and positive identification systems, unauthorized people can be granted access to facilities or resources as the result of incorrect matches. That occurs when a subsequent reading does not properly match the enrolled biometric relating to that individual, something that results in Denial of Access to services. * The Crossover Error Rate (CER): The Crossover Error Rate (CER) is defined as the error rate of the system when the FAR and FRR are equal.Usually expressed as a percentage, the CER can b e used to compare the performance of different biometric systems. * False enrol rate: This occurs when a person’s biometric is either unrecognizable, or when it is not of a sufficiently high standard for the machine to make a judgment, something that does not allow the user to enrol in the system in the first place. The fingerprints of people who work extensively at manual labour are often too worn to be captured. A high percentage of people are unable to enrol in retina recognition systems because of the precision such systems require.People who are mute cannot use voice systems, and people lacking fingers or hands from congenital disease, surgery, or injury cannot use fingerprint or hand geometry systems [10]. Applications of biometrics 2. 7ADVANTAGES OF BIOMETRIC SECURITY [14] 1. The first advantage of using this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With un iqueness of biometrics technology, each individual's identification will be single most effective identification for that user.A chance of two users having the same identification in the biometrics security technology system is nearly zero. 2. Secondly, the highly secure way of identifying users makes this technology less prone for users to share access to highly sensitive data. For example, users can share their fingerprints, iris and so forth allowing other users access to secure information. Each trait used during identification is a single property of that user. In other words, it is extremely hard or impossible to make duplicate or share biometrics accessing data with other users.This makes it ever more secure allowing user information and data to be kept highly secure from unauthorized users. 3. This identification of users though biometrics cannot be lost, stolen or forgotten. This aspect of biometrics technology allows it to become more popular in its use. This method of ide ntifying and giving access to user makes user identification a lot easier. Finally, most biometrics security systems are easy to install and it requires small amount of funding for equipment (except modern biometrics technology such as: DNA/retinal/iris recognition). . 8 CHALLENGES AND ISSUES Nothing is 100% secure, not even biometrics. Nevertheless, biometrics does provide the means to present security credentials that are unique. Unlike other systems that may rely on passwords or tokens that can be vulnerable to loss or exploitation, no one is going enter your live biometric as a means of impersonation Just as a firewall does not constitute a network security solution but rather a component of a defensive strategy, biometrics could be viewed in the same manner.It is not enough to assume absolute verification with biometrics alone but rather as part of a well designed security implementation that considers strong two factor authentication. The second major threat is concerned with modification of the components of the authentication system. The capture device could be modified to output a different image to the one captured. Alternatively, it could be modified to create a denial-of-service (DoS) that will prevent legitimate users accessing the system (by smashing a camera, for example). The processes of emplate generation or template matching could be subverted to produce erroneous results; for example, a piece of malicious code could interfere with the template generation software to produce the attacker’s template rather than that of the legitimate user, or the matching process could be modified to produce an artificially high or low matching score. CHAPTER THREE 3. 1 CLOUD COMPUTING Cloud computing is a means of accessing computer facilities via the Internet, where the adjective â€Å"cloud† reflects the diagrammatic use of a cloud as a metaphor for the Internet.Most of us have been using cloud-computing facilities in one form or another for years through ordinary email and the World Wide Web. Recently, the term has come to reflect the use of software and the running of computer applications via the Internet where the computer infrastructure and software are not â€Å"on premises. † Cloud computing, as a form of service provisioning, has given rise to several related concepts, such as mesh computing, cloud platforms, and software plus service. Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources.In a survey undertaken by the International Data Corporation (IDC) group between 2008 and 2009, the majority of results point to employing Cloud computing as a low-cost viable option to users [17] developers or research projects and even e-commerce entrepreneurs. Using Cloud computing can help in keeping one’s IT budget to a bare minimum. It is also ideally suited for development and testing scenarios. It is the easie st solution to test potential proof of concepts without investing too much capital.Using cloud computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and Yahoo are the forerunners that provide cloud computing services. Recently more and more companies such as SalesForce, Facebook, YouTube, MySpace etc. also begin to provide all kinds of cloud computing services for Internet users . 2 TYPES OF CLOUDS [18] In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are three types of cloud deployment models offered, namely, a public, private and hybrid cloud. A. Public Cloud A public cloud is a model whic h allows users’ access to the cloud via interfaces using mainstream web browsers. It’s typically based on a pay-per-use model, similar to a prepaid electricity metering system which is flexible enough to cater for spikes in demand for cloud optimisation.This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure [19]. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all applications and data accessed on the public cloud are not subjected to malicious attacks. Therefore trust and privacy concerns are rife when dealing with Public clouds with the Cloud SLA at its core. B. Private Cloud A private cloud is set up within an organisation’s internal enterprise datacenter.It is easier to align with security, compliance, and regulatory requirements, and provides more enterprise control over deployment and use. In the private clo ud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organisation itself, similar to Intranet functionality. Utilisation on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure.Only the organisation and designated stakeholders may have access to operate on a specific Private cloud [20]. C. Hybrid Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network [20]. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Clouds provide more secure control of the data and applications and allows various parties to access information over the Internet. It also has an open architecture that allow s interfaces with other management systems. . 3 CLOUD COMPUTING DELIVERY MODELS [18] The architecture of Cloud computing can be categorised according to the three types of delivery models, namely Infrastructure as a service (IaaS), Software as a service (SaaS) and Platform as a service (PaaS). A. Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor’s dedicated resources are only shared with contracted clients at a pay-per-use fee. This greatly minimizes the need for huge initial investment in computing hardware such as servers, networking devices and processing power.They also allow varying degrees of financial and functional flexibility not found in internal data centers or with co-location services, because computing resources can be added or released much more quickly and cost-effectively than in an internal data center or with a colocation service [21]. B. Software as a Service (SaaS) Software as a Service also operates on the virtualised and pay-per-use costing model whereby software applications are leased out to contracted organisations by specialised SaaS vendors. This is traditionally accessed remotely using a web browser via the Internet.Software as a service applications are accessed using web browsers over the Internet therefore web browser security is vitally important. Information security officers will need to consider various methods of securing SaaS applications. Web Services (WS) security, Extendable Markup Language (XML) encryption, Secure Socket Layer (SSL) and available options which are used in enforcing data protection transmitted over the Internet. C. Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of â€Å"rented† functionality.Clients using PaaS services transfer even more costs from capital investment to operational expenses but must acknowledge the additional constraints and possi bly some degree of lock-in posed by the additional functionality layers [20] . The use of virtual machines act as a catalyst in the PaaS layer in Cloud computing. Virtual machines must be protected against malicious attacks such as cloud malware. Therefore maintaining the integrity of applications and well enforcing accurate authentication checks during the transfer of data across the entire networking channels is fundamental.Figure 3. 1 CLOUD COMPUTING MAP [18] 3. 4 CLOUD SECURITY Cloud computing have many advantages in cost reduction, resource sharing and time saving for new service deployment. While in a cloud computing system, most data and software that users use reside on the Internet, which bring some new challenges for the system, especially security and privacy. Since each application may use resource from multiple servers. The servers are potentially based at multiple locations and the services provided by the cloud may use different infrastructures across organizations.Al l these characteristics of cloud computing make it complicated to provide security in cloud computing. To ensure adequate security in cloud computing, various security issues, such as authentication, data confidentiality and integrity, and non-repudiation, all need to be taken into account. The biggest challenge in implementing successful Cloud computing technologies is managing the security. As with any new technology enhancements, criticisms are driven by fear of unknown variables and changes to current control procedures. How can cloud stakeholders ensure and promote the security of Cloud computing?In the Cloud Computing Services Survey conducted during August 08/09 by IDC IT group [17], users were asked to rate their issues and challenges experienced with Cloud computing. The results illustrate that security is the biggest concern. Security is the main issue users are concerned with when considering Cloud computing solutions. CHAPTER FOUR 4. 1 APPLICATION OF BIOMETRICS IN CLOUD SECURITY One of the Security risks in cloud computing according to Garfunkel [23] is hacked passwords or data intrusion. If someone hacks a password they get control over the resources.They can manipulate the information or disable the services. Furthermore, there is a possibility for the user’s email (Amazon user name) to be hacked (see [24] for a discussion of the potential risks of email), and since Amazon allows a lost password to be reset by email, the hacker may still be able to log in to the account after receiving the new reset password [25]. As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant , want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_c hecker A Hybrid biometric method can be developed by fusing finger prints and voice biometric methods. The fused value can be used as signal sign on for multiple resources provided by cloud. This encrypted data is used for authentication 4. 2BIOMETRIC AUTHENTICATION SYSTEM AS A CLOUD SERVICE:The authentication service provider maintains the biometric data base . The data has to be stored in encrypted format using cryptography on biometric for the security reasons 4. 2. 1ARCHITECTURE BIOMETRICS AUTHENTICATION SYSTEM A secure data access scheme based on identity-based Encryption and biometric authentication for cloud communication Cloud Services1 CS1 Cloud Services1 CS3 Cloud Services1 CS2 Biometric Authentication Service Org1 User1 User2 †¦ Org2 User1 User2 Fig4. 1: Biometric Authenticating System in cloud [30].The user initially enrols with the biometric system which is provided by a cloud, once the identity is registered his/her biometric authentication details are stored in c loud service provider database. The authorization details are also entered at the registration time which is also encrypted. Whenever the user wants to use any cloud service user first uses the biometric authentication service rather than a traditional password mechanism. Once authenticated, the user is redirected to the actual cloud service for which he is authorized to use. 4. 3 A PROPOSED METHOD [29] Step1: Setup cloud side parameters . Initialization On the cloud service side, given a security parameter 2. Key generation When tenants are registered in cloud computing providers, each tenant will obtain a unique identity to identify him or her. The phase generates private key corresponding to given registered ID of every tenant in cloud computing. Step2: Generate tenant’s biometric template Cloud computing is a pervasive service environment for tenants, different tenants have different security requirement. To these tenants who have special security concern on data can gene rate their biometric template and be stored in cloud database.Biometric authentication must be needed when someone wants to access the data. Step3: Encrypt cloud data Input: cloud data (which is created by cloud tenants and stored in the database of cloud platform), a private key (the cloud service providers), and an ID (the cloud tenant who want to access the data); output: encrypted cloud data. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes.Biometric authentication has the advantage of exclusive for tenant in data access. Step4: Biometric authentication As an excellent storage scheme for tenants’ big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants’ different data should be processed by different security modes. Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant say, p, want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker.Then, cloud tenants use registered identity ID to create their biometric template and all of the created templates are stored in cloud_sys_database. In cloud data access, cloud tenant p must pass the biometric authentication performed by biometric matcher in cloud computing. Step5: Decrypt cloud data Input: encrypted cloud data ciphertext (which is generated in Step3), an ID (the cloud service provider’s), a private key (the cloud tenant who want to access the data), and output: the corresponding plaintext i. e. cloud data. CHAPTER FIVE 5. 1 SUMMARYIn summary, as Biometrics allow for increased security, convenience we can say that fused biometric authentication system will be novel solution for authenticating users on cloud computing ,which can be provided as service on cloud . By following guiding principles discussed in this paper, a great deal of insecurities may be easily expelled, saving business owners’ valuable time and investment. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution. Future work and progress lies in standardising Cloud computing security protocols 5. CONCLUSION . Authentication is necessary in Cloud Computing. In order to seek a secure data access method for cloud tenants, a proposed method presented a secure data access mechanism based on identity-based encryption and biometric authentication in this paper, the mechanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will eliminate the maloperations over tenants data by root administrator in cloud service. The security of data is maintained even though the same application is shared by mu ltitenant.To ensure the correctness of users’ data in cloud data storage, an effective and flexible biometric is proposed. i believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. This proposed method can be implemented with more security by using strong biometric m easures like eye. REFERENCES [1] http://en. wikipedia. org/wiki/Biometrics [2] J. L. Wayman, â€Å"Fundamentals of Biometric Authentication Xhtp:/ww. engr. sisu. edu/biometrics/nbtcw. p 4] http://www. fi. muni. cz/reports/files/older/FIMU-RS-2000-08. pdf [6] http://www. indexbiometrics. com/physiological_or_behavioral. htm [7] http://ntrg. cs. tcd. ie [8] Cernet. â€Å"CHARACTERISTICS OF BIOMETRIC SYSTEMS†. [online] available: http://www. ccert. edu. cn/education/cissp/hism/039-041. html. February 2013 [9] V. Vijaya Kumari and N. Suriyanarayanan. â€Å"Performance Measu re of Local Operators in Fingerprint Detection. † Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). [10] www. gao. gov/cgi-bin/getrpt? GAO-03-1137T. February 2013 [11] Jain, A. K. ; Ross, A. Pankanti, S. , â€Å"Biometrics: a tool for information security† Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 – 143 [12] Michael E. Schuckers, â€Å"Some Statistical Aspects of Biometric Identification Device Performance†, 2001 [13] Sandra Maestre, Sean Nichols â€Å"DNA Biometrics†, 2009 [14] Massimo Tistarelli and Marks Nixon, â€Å"Advances In Biometrics†, Springer-Verlag Berlin Heidelberg 2009, ISBN 03029743 [15]Erdogmus, H. : Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 4–6 (2009) [16] Leavitt, N. : Is Cloud Computing Really Ready for Prime Time?Computer 42(1), 15–20(2009) [17] Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, viewe d 18 February 2010, Accessed online @ . February 2013 [18]Ramgovind S, Eloff MM, Smith E,† The Management of Security in Cloud Computing† [Online] Available: http://uir. unisa. ac. za/bitstream/handle/10500/3883/ramgovind. pdf;jsessionid=75882F66B5AF28B3D640A3C5F9CFD837? sequence=1 February 2013 [19] A Platform Computing Whitepaper, ‘Enterprise Cloud Computing: Transforming IT’, Platform Computing, pp6, viewed 13March 2010. 20]Global Netoptex Incorporated, 2009, â€Å"Demystifying the cloud. Important opportunities, crucial choices† , [online] pp 4-14 Available: http://www. gni. com, February 2013 [21] Brodkin J, 2008, ‘Gartner: Seven cloud-computing security risks’, Infoworld, Accessed [email  protected] http://www. infoworld. com/d/security-central/gartner-seven-cloudcomputing-Security-risks-853? page=0,1 February 2013 [22] J. Ilonen, Keystroke dynamics, Lappeenranta University of Technology, Finland, http://www. it. lut . fi/kurssit/ 03-04/010970000/seminars/Ilonen. pdf (2003) [23] S. L.Garfinkel, â€Å"An evaluation of amazon’s grid computing services: EC2, S3, and SQS†, Technical Report TR-08-07, Computer ScienceGroup, Harvard University, Citeseer, 2007 [24] S. L. Garfinkel, â€Å"Email-based identification and authentication: An alternative to PKI? â€Å", IEEE Security and Privacy, 1(6), 2003 [25] Cloud Computing Security: From Single to Multi-Clouds [Online] Available: http://ieeexplore. ieee. org/stamp/stamp. jsp? tp=&arnumber=614956 February 2013 [26] Rahultech â€Å"IT trends-latest/recent trends in information technology† 2010[online] available:

Monday, September 16, 2019

Banks of India and Bank

Project Report On CUSTOMER SATISFACTION CORPORATE GUIDE FACULTY GUIDE Mr. Ravi Parmar Mr. Rajnish mallick Relationship Manager Submitted in Partial Fulfillment of the requirement of Post Graduate Diploma in management Submitted By Ankur Singh PGDM-III, Semester Batch- 2008-10 Roll no. 014908005 Centre for Management Technology Knowledge Park I Gr. Noida AcknowledgementsIf words are considered to be signs of gratitude then let these words Convey the very same My sincere gratitude to ICICI BANK for providing me with an opportunity to work with BANK and giving necessary directions on doing this project to the best of my abilities. I am highly indebted to Mr. Remay Verma, Branch Manager and Mr. Ravi Parmar (RM) company project guide, who has provided me with the necessary information and also for the support extended out to me in the completion of this report and his valuable suggestion and comments on bringing out this report in the best way possible. I also thank Prof.Anant Jyoti,(HO D of PGDM), who has sincerely supported me with the valuable insights into the completion of this project. I am grateful to all faculty members of C-Mat and my friends who have helped me in the successful completion of this project. | CONTENTS| | Sr. No. | Subject Covered| Page No. | 1| Acknowledgements| 2| 2| Executive Summary| 4| 3| My Project Objective| 7| 4| Banking Structure in India| 8| 5| Introduction| 9| 6| History of Banking in India| 10| 7| Bank In India| 17| 8| Fact Files of Banks in India| 19| 9| Indian Banking Industries| 26| 10| ICICI Bank | 28| 11| ICICI Group | 33| 2| Technology used in ICICI Bank| 39| 13| Product and Customer segments | 41| 11| Product| 44| 14| SWOT Analysis | 55| 15| Research Methodology| 57| 16| Company Efforts To Ensure Customer Satisfaction | 59| 17| Data Analysis | 69| 18| Comparison With SBI| 79| 19| SWOT Analysis(comparative)| 87| 20 | Questionnaire | 93| 21| Finding | 98| 22 | Suggestion | 99| 23 | Conclusion| 102| 24| Bibliography| 103| | E XECUTIVE SUMMARY Private banking is a concept which is new and fast emerging in the world of banking where changes have become a necessity in order for banks to survive n this competitive environment vis-a-vis not only from the public and private sector banks but also from the foreign banks. The objective of the research is to explore the various products, which a private banker deals into and the systematic process involved to match client requirements with the right kind of product. Through this research one of the main objectives is to explore the reason why most of the banks are injecting private banking as business profile to their set of service offerings. Though private banking evolved in late 80’s in Asia, in India its not more than 5 years old.ICICI started it in Aug 2002 and since then it has been a remarkable success. Today there are enormous solutions to cater client needs but what suits best to a client is where private banking fits in. Every client will have dif ferent needs, liking and preferences. So a customized portfolio for every client is the need of the day. This research will highlight more on the product portfolio of ICICI Private Banking, how they have changed or innovatively structured to be attractive and competitive. Research objective 1. To draw the comparative analysis of ICICI BANK Ltd with SBI etc. 2.To identify the major attributes of customer satisfaction. 3. To study customer perception about ICICI BANK Ltd. 4. To identify and study the various ways of ensuring customer satisfaction adopted by ICICI BANK Vs HDFC & SBI. ————————————————- BANKING STRUCTURE IN INDIA Scheduled Banks in India (A) Scheduled Commercial Banks Public sector Banks| Private sector Banks| Foreign Banks in India| Regional Rural Bank| (28)| (27)| (29)| (102)| * Nationalized Bank * Other Public Sector Banks (IDBI) * SBI and its Associates| * Old Private Banks * New Private Banks| | | B) Scheduled Cooperative Banks Scheduled Urban Cooperative Banks (55)| Scheduled State Cooperative Banks (31)| Here we more concerned about private sector banks and competition among them. Today, there are 27 private sector banks in the banking sector: 19 old private sector banks and 8 new private sector banks. These new banks have brought in state-of-the-art technology and aggressively marketed their products. The Public sector banks are facing a stiff competition from the new private sector banks.The banks which have been setup in the 1990s under the guidelines of the Narasimham Committee are referred to as NEW PRIVATE SECTOR BANKS. introduction The banking section will navigate through all the aspects of the Banking System in India. It will discuss upon the matters with the birth of the banking concept in the country to new players adding their names in the industry in coming few years. The banker of all banks, Reserve Bank of India (RBI ), the Indian Banks Association (IBA) and top 20 banks like IDBI, HSBC, ICICI, ABN AMRO, etc. as been well defined under three separate heads with one page dedicated to each bank. However, in the introduction part of the entire banking cosmos, the past has been well explained under three different heads namely: * History of Banking in India * Nationalization of Banks in India * Scheduled Commercial Banks in India The first deals with the history part since the dawn of banking system in India. Government took major step in the 1969 to put the banking sector into systems and it nationalized 14 private banks in the mentioned year. This has been elaborated in Nationalization Banks in India.The last but not the least explains about the scheduled and unscheduled banks in India. Section 42 (6) (a) of RBI Act 1934 lays down the condition of scheduled commercial banks. The descriptions along with a list of scheduled commercial banks are given on this page. * HISTORY OF BANKING IN INDIA Witho ut a sound and effective banking system in India it cannot have a healthy economy. The banking system of India should not only be hassle free but it should be able to meet new challenges posed by the technology and any other external and internal factors.For the past three decades India's banking system has several outstanding achievements to its credit. The most striking is its extensive reach. It is no longer confined to only metropolitans or cosmopolitans in India. In fact, Indian banking system has reached even to the remote corners of the country. This is one of the main reasons of India's growth process. The government's regular policy for Indian bank since 1969 has paid rich dividends with the nationalization of 14 major private banks of India.Not long ago, an account holder had to wait for hours at the bank counters for getting a draft or for withdrawing his own money. Today, he has a choice. Gone are days when the most efficient bank transferred money from one branch to oth er in two days. Now it is simple as instant messaging or dial a pizza. Money have become the order of the day. The first bank in India, though conservative, was established in 1786. From 1786 till today, the journey of Indian Banking System can be segregated into three distinct phases. They are as mentioned below: * Early phase from 1786 to 1969 of Indian Banks Nationalization of Indian Banks and up to 1991 prior to Indian banking sector Reforms. * New phase of Indian Banking System with the advent of Indian Financial ; Banking Sector Reforms after 1991. To make this write-up more explanatory, I prefix the scenario as Phase I, Phase II and Phase III. Phase I The General Bank of India was set up in the year 1786. Next came Bank of Hindustan and Bengal Bank. The East India Company established Bank of Bengal (1809), Bank of Bombay (1840) and Bank of Madras (1843) as independent units and called it Presidency Banks.These three banks were amalgamated in 1920 and Imperial Bank of India wa s established which started as private shareholders banks, mostly Europeans shareholders. In 1865 Allahabad Bank was established and first time exclusively by Indians, Punjab National Bank Ltd. was set up in 1894 with headquarters at Lahore. Between 1906 and 1913, Bank of India, Central Bank of India, Bank of Baroda, Canara Bank, Indian Bank, and Bank of Mysore were set up. Reserve Bank of India came in 1935. During the first phase the growth was very slow and banks also experienced periodic failures between 1913 and 1948.There were approximately 1100 banks, mostly small. To streamline the functioning and activities of commercial banks, the Government of India came up with The Banking Companies Act, 1949 which was later changed to Banking Regulation Act 1949 as per amending Act of 1965 (Act No. 23 of 1965). Reserve Bank of India was vested with extensive powers for the supervision of banking in India as the Central Banking Authority. During those day’s public has lesser confi dence in the banks. As an aftermath deposit mobilization was slow. Abreast of it the savings bank facility provided by the Postal department was comparatively safer.Moreover, funds were largely given to traders. Phase II Government took major steps in this Indian Banking Sector Reform after independence. In 1955, it nationalized Imperial Bank of India with extensive banking facilities on a large scale especially in rural and semi-urban areas. It formed State Bank of India to act as the principal agent of RBI and to handle banking transactions of the Union and State Governments all over the country. Seven banks forming subsidiary of State Bank of India was nationalized in 1960 on 19th July, 1969, major process of nationalization was carried out.It was the effort of the then Prime Minister of India, Mrs. Indira Gandhi. 14 major commercial banks in the country was nationalized. Second phase of nationalization Indian Banking Sector Reform was carried out in 1980 with seven more banks. T his step brought 80% of the banking segment in India under Government ownership. The following are the steps taken by the Government of India to Regulate Banking Institutions in the Country: * 1949: Enactment of Banking Regulation Act. * 1955: Nationalization of State Bank of India. * 1959: Nationalization of SBI subsidiaries. 1961: Insurance cover extended to deposits. * 1969: Nationalization of 14 major banks. * 1971: Creation of credit guarantee corporation. * 1975: Creation of regional rural banks. * 1980: Nationalization of seven banks with deposits over 200 crore. After the nationalization of banks, the branches of the public sector bank India rose to approximately 800% in deposits and advances took a huge jump by 11,000%. Banking in the sunshine of Government ownership gave the public implicit faith and immense confidence about the sustainability of these institutions. Phase IIIThis phase has introduced many more products and facilities in the banking sector in its reforms me asure. In 1991, under the chairmanship of M Narasimham, a committee was set up by his name which worked for the liberalization of banking practices. The country is flooded with foreign banks and their ATM stations. Efforts are being put to give a satisfactory service to customers. Phone banking and net banking is introduced. The entire system became more convenient and swift. Time is given more importance than money. The financial system of India has shown a great deal of resilience.It is sheltered from any crisis triggered by any external macroeconomics shock as other East Asian Countries suffered. This is all due to a flexible exchange rate regime, the foreign reserves are high, the capital account is not yet fully convertible, and banks and their customers have limited foreign exchange exposure. BANKS IN INDIA In India the banks are being segregated in different groups. Each group has their own benefits and limitations in operating in India. Each has their own dedicated target ma rket. Few of them only work in rural sector while others in both rural as well as urban.Many even are only catering in cities. Some are of Indian origin and some are foreign players. All these details and many more is discussed over here. The banks and its relation with the customers, their mode of operation, the names of banks under different groups and other such useful information’s are talked about. One more section has been taken note of is the upcoming foreign banks in India. The RBI has shown certain interest to involve more of foreign banks than the existing one recently. This step has paved a way for few more foreign banks to start business in India. Major Banks in India| ABN-AMRO Bank * Abu Dhabi Commercial Bank * American Express Bank * Andhra Bank * Allahabad Bank * Bank of Baroda * Bank of India * Bank of Maharastra * Bank of Punjab * Bank of Rajasthan * Bank of Ceylon * BNP Paribas Bank * Canara Bank * Catholic Syrian Bank * Central Bank of India * Centurion Ban k * China Trust Commercial Bank * Citi Bank * City Union Bank * Corporation Bank * Dena Bank * Deutsche Bank * Development Credit Bank * Dhanalakshmi Bank * Federal Bank * HDFC Bank * HSBC ICICI Bank * IDBI Bank * Indian Bank | * Indian Overseas Bank * IndusInd Bank * ING Vysya Bank * Jammu ; Kashmir Bank * JPMorgan Chase Bank * Karnataka Bank * Karur Vysya Bank * Laxmi Vilas Bank * Oriental Bank of Commerce * Punjab National Bank * Punjab ; Sind Bank * Scotia Bank * South Indian Bank * Standard Chartered Bank * State Bank of India (SBI) * State Bank of Bikaner ; Jaipur * State Bank of Hyderabad * State Bank of Indore * State Bank of Mysore * State Bank of Saurastra * State Bank of Travancore * Syndicate Bank * Taib Bank * UCO Bank * Union Bank of India * United Bank of India * United Bank Of India * United Western Bank * UTI Bank | Fact Files of Banks in India The first, the oldest, the largest, the biggest, get all such types of information’s about Banking in India in this section. The first bank in India to be given an ISO Certification| Canara Bank| The first bank in Northern India to get ISO 9002 certification for their selected branches| Punjab and Sind Bank| The first Indian bank to have been started solely with Indian capital| Punjab National Bank| The first among the private sector banks in Kerala to become a scheduled bank in 1946 under the RBIAct| South Indian Bank| India's oldest, largest and most successful commercial bank, offering the widest possible range of domestic, international and NRI products and services, through its vast network in India and overseas| State Bank of India| India's second largest private sector bank and is now the largest scheduled commercial bank in India| The Federal Bank Limited| Bank which started as private shareholders banks, mostly Europeans shareholders| Imperial Bank of India| The first Indian bank to open a branch outside India in London in 1946 and the first to open a branch in continental Europe at Pari s in 1974| Bank of India, founded in 1906 in Mumbai| The oldest Public Sector Bank in India having branches all over India and serving the customers for the last 132 years| Allahabad Bank| The first Indian commercial bank which was wholly owned and managed by Indians| Central Bank of India| | | Bank of India was founded in 1906 in Mumbai. It became the first Indian bank to open a branch outside India in London in 1946 and the first to open a branch in continental Europe at Paris in 1974. PUBLIC SECTOR BANKS Among the Public Sector Banks in India, United Bank of India is one of the 14 major banks, which were nationalized on July 19, 1969. Its predecessor, in the Public Sector Banks, the United Bank of India Ltd. , was formed in 1950 with the amalgamation of four banks viz. Camilla Banking Corporation Ltd. (1914), Bengal Central Bank Ltd. (1918), Camilla Union Bank Ltd. (1922) and Hooghly Bank Ltd. (1932).Oriental Bank of Commerce (OBC), Government of India Undertaking offers Domestic , NRI and Commercial banking services. OBC is implementing a GRAMEEN PROJECT in Dehradun District (UP) and Hanumangarh District (Rajasthan) disbursing small loans. This Public Sector Bank India has implemented 14 point action plan for strengthening of credit delivery to women and has designated 5 branches as specialized branches for women entrepreneurs. The following are the list of Public Sector Banks in India * Allahabad Bank * Andhra Bank * Bank of Baroda * Bank of India * Bank of Maharastra * Canara Bank * Central Bank of India * Corporation Bank * Dena Bank * Indian Bank * Indian Overseas Bank * Oriental Bank of Commerce Punjab ; Sind Bank * Punjab National Bank * Syndicate Bank * UCO Bank * Union Bank of India * United Bank of India * Vijaya Bank List of State Bank of India and its subsidiary, a Public Sector Banks * State Bank of India * State Bank of Bikaner ; Jaipur * State Bank of Hyderabad * State Bank of Indore * State Bank of Mysore * State Bank of Saurastra * State Ban k of Travancore PRIVATE SECTOR BANKS: Private banking in India was practiced since the beginning of banking system in India. The first private bank in India to be set up in Private Sector Banks in India was IndusInd Bank. It is one of the fastest growing Bank Private Sector Banks in India.IDBI ranks the tenth largest development bank in the world as Private Banks in India and has promoted world class institutions in India. The first Private Bank in India to receive an in principle approval from the Reserve Bank of India was Housing Development Finance Corporation Limited, to set up a bank in the private sector banks in India as part of the RBI's liberalization of the Indian Banking Industry. It was incorporated in August 1994 as HDFC Bank Limited with registered office in Mumbai and commenced operations as Scheduled Commercial Bank in January 1995. ING Vysya, yet another Private Bank of India was incorporated in the year 1930. Bangalore has a pride of place for having the first bran ch inception in the year 1934.With successive years of patronage and constantly setting new standards in banking, ING Vysya Bank has many credits to its account. List of Private Banks in India * Bank of Punjab * Bank of Rajasthan * Catholic Syrian Bank * Centurion Bank * City Union Bank * Dhanalakshmi Bank * Development Credit Bank * Federal Bank * HDFC Bank * ICICI Bank * IDBI Bank * IndusInd Bank * ING Vysya Bank * Jammu & Kashmir Bank * Karnataka Bank * Karur Vysya Bank * Laxmi Vilas Bank * South Indian Bank * United Western Bank INDIAN BANKING INDUSTRY The Indian banking market is growing at an astonishing rate, with Assets expected to reach US$1 trillion by 2010.An expanding economy, middle class, and technological innovations are all contributing to this growth. The country’s middle class accounts for over 320 million People. In correlation with the growth of the economy, rising income levels, increased standard of living, and affordability of banking products are promi sing factors for continued expansion. The Indian banking market is growing at an astonishing rate, with Assets expected to reach US$1 trillion by 2010. An expanding economy, middle class, and technological innovations are all contributing to this growth. The Indian banking Industry is in the middle of an IT revolution, Focusing on the expansion of retail and rural banking.Players are becoming increasingly customer – centric in their approach, which has resulted in innovative methods of offering new banking products and services. Banks are now realizing the importance of being a big player and are beginning to focus their attention on mergers and acquisitions to take advantage of economies of scale and/or comply with Basel II regulation. â€Å"Indian banking industry assets are expected to reach US$1 trillion by 2010 and are poised to receive a greater infusion of foreign capital,† says Prathima Rajan, analyst in Celent's banking group and author of the report. â€Å"T he banking industry should focus on having a small number of large players that can compete globally rather than having a large number of fragmented players. † | |Type| Private, BSE & NSE, NYSE| Founded| 1955 (as Industrial credit and Investment corporation of India)| Headquarters| ICICI Bank Ltd. , ICICI Bank Towers, Bandra Kurla Mumbai, India| Key people| N Vaghul, K. V. Kamath, Chanda Kochhar, V Vaidyanathan, Madhabi Puri | Industry| Banking Insurance Capital Markets and allied industries| Products| Loans, Credit Cards, Savings, Investment vehicles, Insurance etc. | Revenue| ^ USD 5. 79 billion| Total assets| Rs. 3,997. 95 billion (US$ 100 billion) at March 31, 2008. | Overview ICICI Bank (formerly Industrial Credit and Investment Corporation of India).ICICI Limited was established in 1955 by the World Bank, the Government of India and the Indian Industry, for the promotion of industrial development in India by giving project and corporate finance to the industries in India . ICICI Bank has grown from a development bank to a financial conglomerate and has become one of the largest public financial institutions in India. ICICI Bank has financed all the major sectors of the economy, covering 6,848 companies and 16,851 projects. As of March 31, 2000, ICICI had disbursed a total of Rs. 1,13,070 crores, since inception. ICICI Bank Fact Files: Total assets: Rs. 146,214 crore (December 31, 2004) Network: 530 branches ATMs: Over 1,880 Abroad Subsidiaries: United Kingdom and Canada Abroad branches: Singapore and Bahrain Representative offices: United States, China, United Arab Emirates, and Bangladesh and South Africa.ICICI Bank is India's second-largest bank with total assets of about Rs. 2,513. 89 bn (US$ 56. 3 bn) at March 31, 2006 and profit after tax of Rs. 25. 40 bn (US$ 569 mn) for the year ended March 31, 2006 (Rs. 20. 05 bn (US$ 449 mn) for the year ended March 31, 2005). ICICI Bank has a network of about 614 branches and extension counters and over 2, 200 ATMs. ICICI Bank offers a wide range of banking products and financial services to corporate and retail customers through a variety of delivery channels and through its specialized subsidiaries and affiliates in the areas of investment banking, life and non-life insurance, venture capital and asset management.ICICI Bank set up its international banking group in fiscal 2002 to cater to the cross border needs of clients and leverage on its domestic banking strengths to offer products internationally. ICICI Bank (BSE: ICICI) ( Industrial Credit and Investment Corporation of India) is India's largest private sector bank in market capitalization and second largest overall in terms of assets. Bank has total assets of about USD 100 billion (at the end of March 2008), a network of over 1,491 branches, 22 regional offices and 49 regional processing centers, about 4,485 ATMs (at the end of September 2008), and 24 million customers (at the end of July 2007).ICICI Bank offers a wide range o f banking products and financial services to corporate and retail customers through a variety of delivery channels and specialized subsidiaries and affiliates in the areas of investment banking, life and non-life insurance, venture capital and asset management. (These data are dynamic. ) ICICI Bank is also the largest issuer of credit cards in India. ICICI Bank has got its equity shares listed on the stock exchanges at Kolkata and Vadodara, Mumbai and the National Stock Exchange of India Limited, and its ADRs on the New York Stock Exchange (NYSE). The Bank is expanding in overseas markets and has the largest international balance sheet among Indian banks. ICICI Bank now has wholly-owned subsidiaries, branches and representatives offices in 18 countries, including an offshore unit in Mumbai.This includes wholly owned subsidiaries in Canada, Russia and the UK (the subsidiary through which the hisave savings brand is operated), offshore banking units in Bahrain and Singapore, an adviso ry branch in Dubai, branches in Belgium, Hong Kong and Sri Lanka, and representative offices in Bangladesh, China, Malaysia, Indonesia, South Africa, Thailand, the United Arab Emirates and USA. Overseas, the Bank is targeting the NRI (Non-Resident Indian) population in particular. ICICI reported a 1. 15% rise in net profit to Rs. 1,014. 21 crore on a 1. 29% increase in total income to Rs. 9,712. 31 crore in Q2 September 2008 over Q2 September 2007. The bank's current and savings account (CASA) ratio increased to 30% in 2008 from 25% in 2007.ICICI Bank currently has subsidiaries in the United Kingdom, Russia and Canada, branches in Singapore, Bahrain, Hong Kong, Sri Lanka and Dubai International Finance Center and representative offices in the United States, United Arab Emirates, China, South Africa and Bangladesh. Our UK subsidiary has established a branch in Belgium. ICICI Bank is the most valuable bank in India in terms of market capitalization. ICICI Bank's equity shares are list ed in India on the Bombay Stock Exchange and the National Stock Exchange of India Limited and its American Depositary Receipts (ADRs) are listed on the New York Stock Exchange (NYSE). ICICI Bank has formulated a Code of Business Conduct and Ethics for its Directors and employees.At June 5, 2006, ICICI Bank, with free float market capitalization of about Rs. 480. 00 billion (US$ 10. 8 billion) ranked third amongst all the companies listed on the Indian stock exchanges. ICICI Bank was originally promoted in 1994 by ICICI Limited, an Indian financial Institution, and was its wholly owned subsidiary. ICICI's shareholding in ICICI Bank was reduced to 46% through a public offering of shares in India in fiscal 1998, an equity offering in the form of ADRs listed on the NYSE in fiscal 2000, ICICI Bank's acquisition of Bank of Madura Limited in an all-stock amalgamation in fiscal 2001, and secondary market sales by ICICI to institutional investors in fiscal 2001 and fiscal 2002.ICICI was form ed in 1955 at the initiative of The World Bank, the Government of India and representatives of Indian industry. The principal objective was to create a development financial institution for Providing medium-term and long-term project financing to Indian businesses. In the 1990s, ICICI transformed its business from a development financial institution offering only project finance to a diversified financial service group offering a wide variety of products and services, both directly and through a number of subsidiaries and affiliates like ICICI Bank. In 1999, ICICI become the first Indian company and the first bank or financial institution from non-Japan Asia to be listed on the NYSE.In October 2001, the Boards of Directors of ICICI and ICICI Bank approved the merger of ICICI and two of its wholly owned retail finance subsidiaries, ICICI Personal Financial Services Limited and ICICI Capital Services Limited, with ICICI Bank. The merger was approved by shareholders of ICICI and ICICI Bank in January 2002, by the High Court of Gujarat at Ahmadabad in March 2002, and by the High Court of Judicature at Mumbai and the Reserve Bank of India in April 2002. Consequent to the merger, the ICICI group's financing and banking Operations, both wholesale and retail, have been integrated in a single entity. Free float holding excludes all promoter holdings, strategic investments and Cross holdings among  Ã‚  Ã‚   public sector entities. BUSINESS OBJECTIVES Vision To be the leading provider of financial services in India and a major global bank. Mission We will leverage our people, technology, speed and financial capital to: be the banker of first choice for our customers by delivering high quality, world-class service. * Expand the frontiers of our business globally. * Play a proactive role in the full realisation of India’s potential. * maintain a healthy financial profile and diversify our earnings across businesses and geographies. * Maintain high standards of gov ernance and ethics. * Contribute positively to the various countries and markets in which we operate. * Create value for our stakeholders. * Product and Services Service and banking of ICICI bank categorized in to personal banking, business banking and NRI banking services. Personal banking- Deposit in form of saving, recurring, term deposit, senior itizen deposit and children depository account are there for individual customer can also avail of their housing, automobile, farm equipment, business or personal loan scheme. Personal client can also invest in mutual funds and participate in stock trading through ICICI bank. Business banking  Ã¢â‚¬â€œ Business banking services of ICICI Bank are exhaustive. Project financing, deal assessment, and land evaluation are investment banking services offered to corporate clients. Global trade and cash management transaction services facilitate remittances and receipts across important cities. Capital market and custodial services enable busin ess houses to participate in equity trading and transfer across major stock markets of world.Customer ICICI bank targets all segment of customer with various types of products and services. I interacted with a a lot of customers and collect their feedback on the given services of company, and feedback are positive response from all point of view. Customers are beneficiary from both sides monetary as well as non monetary. The bank targets to add nearly 500,000 customers under the new scheme in the next one year and plans to offer auto loans through the new online channel in the future, ICICI Bank's Executive Director, V Vaidyanathan, said here. â€Å"As of now, nearly 24 per cent of our customer transactions are happening through internet.We are primarily targeting our urban customers, who constitute nearly 70 per cent of our total customer-base,† Vaidyanathan said. Customers, opting for the service can also benefit from the quantum optima facility, wherein if the balance exce eds Rs 5,000, the money will automatically be transferred to a fixed deposit scheme, he said. The facility, which also enable customers to transact between an ICICI Bank account and accounts in other banks, is being offered free of cost, he said ICICI bank, presently, has above 2 crore customers. The lender opened nearly 470 branches in the last fiscal. The lender has also plans to launch ‘SMS n Cash' scheme later this week under which ICICI account holders can transfer funds to those who do not have a bank account.ICICI bank is strongly committed to protecting the privacy of its customers and has taken all necessary and reasonable measures to protect the confidentiality of the customer information and its transmission through the world wide web and it shall not be held liable for disclosure of the confidential information when in accordance with this privacy commitment or in terms of the agreements, if any, with the customers. ICICI bank Endeavour’s to safeguard and en sure the security of the information provided by the customer. ICICI bank uses 128-bit encryption, for the transmission of the information, which is currently the permitted level of encryption in India.When the information provided by the customers is not transmitted through this encryption, the customer's system (if configured accordingly) will display an appropriate message ensuring the best level of secrecy for the customer's information. The customer would be required to cooperate with ICICI bank in order to ensure the security of the information, and it is recommended that the customers necessarily choose their passwords carefully such that no unauthorized access is made by a third party. To make the password complex and difficult for others to guess, the customers should use combination of alphabets, numbers and special characters (like! @, #, $ etc. ).The customers should undertake not to disclose their password to anyone or keep any written or other record of the password su ch that a third party could access it. * ICICI bank undertakes not to disclose the information provided by the customers to any person, unless such action is necessary to: * Conform to legal requirements or comply with legal process; * Protect and defend ICICI bank's or its affiliates rights, interests or property; * Enforce the terms and conditions of the products or services; or * Act to protect the interests of ICICI bank, its affiliates, or its members, constituents or of other persons. Competitor The main competitor of is ICICI bank is SBI because this bank is totally taken by government after this bank HDFC bank is the main competitor of ICICI bank .There are different types of segment operation semment, investment and services, demat and NRI services. The competitor from the operation segment are State Bank of India(SBI), Axis, Housing Development and Financial corporation(HDFC) etc. From the investment And service sector HDFC standard life insurance corporation, Bharati Axa life insurance ,Reliance Life Insurance Corporation, Max new work life insurance SBI Life insurance,Life Insurance Corporation of India. In demat section India bull,Anangram,SBI,HDFC,India Infoline are the main competitor of ICICI bank. In the NRI service section the Western Union bank is the main competitor of ICICI bank.There are some other company who also compete with the ICICI bank After the SBI the HDFC bank is the main competitor of ICICI bank. HDFC Bank Ltd. is a commercial bank of India, incorporated in August 1994, after the Reserve Bank of India allowed establishing private sector banks. The Bank was promoted by the Housing Development Finance Corporation, a premier housing finance company (set up in 1977) of India. HDFC Bank has 1,500 branches and over 2,890 ATMs, in 530 cities in India, and all branches of the bank are linked on an online real-time basis. As of September 30, 2008 the bank had total assets of INR 1006. 82 billion. State Bank of India is the largest bank in India.It is also, measured by the number of branch offices and employees, the second largest bank in the world. [citation needed] The bank traces its ancestry back through the Imperial Bank of India to the founding in 1806 of the Bank of Calcutta, making it the oldest commercial bank in the Indian Subcontinent. The Government of India nationalised the Imperial Bank of India in 1955, with the Reserve Bank of India taking a 60% stake, and renamed it the State Bank of India. In 2008, the Government took over the stake held by the Reserve Bank of India. SBI provides a range of banking products through its vast network in India and overseas, including products aimed at NRIs.With an asset base of $126 billion and its reach, it is a regional banking behemoth. SBI has laid emphasis on reducing the huge manpower through Golden handshake schemes and computerizing its operations. The State Bank Group, with over 16000 branches , has the largest branch network in India. It has a market share among Indian commercial banks of about 20% in deposits and advances, and SBI accounts for almost one-fifth of the nation’s loans. There are some other banks which gives challenging some how in the banking and service sectorthey are: * Allahabad Bank * Andhra Bank * Bank of Baroda * Bank of India * Bank of Maharashtra * Canara Bank * Central Bank of India Corporation Bank * Dena Bank * IDBI Bank * Indian Bank * Indian Overseas Bank * Oriental Bank of Commerce * Punjab & Sind Bank * Punjab National Bank * Syndicate Bank * UCO Bank * Union Bank of India * United Bank of India * Vijaya Bank Environment An employer the bank extends a lot of authority along with justified accountability to you. The working culture is very collaborative in nature. It can be owed to the fact that the bank is highly segmented with a lot of overlapping and mostly distinct roles and responsibility. ICICI Bank has established itself as a one stop solution (Universal Bank) for all financial need of indivi duals and institutions alike.The credit for the same can be attributed to its vast network, probably the largest among private sector banks. This makes the life of an employee a lot easier, especially for those who face the external customers. You do not have to justify your organization, it is only the product that has to be pitched. As far as employee benefits are concerned, ICICI Bank offers a lot of financial benefits ranging from your family health insurance to your kids school donations. The organization is sensitive to the needs of its employees as this quality is one of the building blocks (DNA) of the organizational culture. The organization will be giving you enough flexibility to innovate and come-up with new ideas.It will also exhibit its in terms of well laid systems, processes and infrastructure. It will extend a fast track growth for those with extraordinary talent at the same time offer stability to those who are able to deliver satisfactorily. Overall, I would say i t’s a lifetime experience to work with such a behemoth organization. It might not be the best paymaster but it definitely will impress you with its capability as the head master (Principal) of banking industry. there are huge competition between the eployee to achieve theo goal. BUSINESS OBJECTIVES: Vision To be the leading provider of financial services in India and a major global bank. Mission We will leverage our people, technology, speed and financial capital to: be the banker of first choice for our customers by delivering high quality, world-class service. * expand the frontiers of our business globally. * play a proactive role in the full realisation of India’s potential. * maintain a healthy financial profile and diversify our earnings across businesses and geographies. * maintain high standards of governance and ethics. * contribute positively to the various countries and markets in which we operate. * create value for our stakeholders. Product and Services Se rvice and banking of ICICI bank categorized in to personal banking, business banking and NRI banking services.Personal banking- Deposit in form of saving, recurring, term deposit, senior citizen deposit and children depository account are there for individual customer can also avail of their housing, automobile, farm equipment, business or personal loan scheme. Personal client can also invest in mutual funds and participate in stock trading through ICICI bank. Business banking  Ã¢â‚¬â€œ Business banking services of ICICI Bank are exhaustive. Project financing, deal assessment, and land evaluation are investment banking services offered to corporate clients. Global trade and cash management transaction services facilitate remittances and receipts across important cities. Capital market and custodial services enable business houses to participate in equity trading and transfer across major stock markets of world.CUSTOMER ICICI bank targets all segment of customer with various types of products and services. I interacted with a a lot of customers and collect their feedback on the given services of company, and feedback are positive response from all point of view. Customers are beneficiary from both sides monetary as well as non monetary. The bank targets to add nearly 500,000 customers under the new scheme in the next one year and plans to offer auto loans through the new online channel in the future, ICICI Bank's Executive Director, V Vaidyanathan, said here. â€Å"As of now, nearly 24 per cent of our customer transactions are happening through internet.We are primarily targeting our urban customers, who constitute nearly 70 per cent of our total customer-base,† Vaidyanathan said. Customers, opting for the service can also benefit from the quantum optima facility, wherein if the balance exceeds Rs 5,000, the money will automatically be transferred to a fixed deposit scheme, he said. The facility, which also enable customers to transact between an ICICI Bank account and accounts in other banks, is being offered free of cost, he said ICICI bank, presently, has above 2 crore customers. The lender opened nearly 470 branches in the last fiscal. The lender has also plans to launch ‘SMS n Cash' scheme later this week under which ICICI account holders can transfer funds to those who do not have a bank account.ICICI bank is strongly committed to protecting the privacy of its customers and has taken all necessary and reasonable measures to protect the confidentiality of the customer information and its transmission through the world wide web and it shall not be held liable for disclosure of the confidential information when in accordance with this privacy commitment or in terms of the agreements, if any, with the customers. ICICI bank Endeavour’s to safeguard and ensure the security of the information provided by the customer. ICICI bank uses 128-bit encryption, for the transmission of the information, which is currently the p ermitted level of encryption in India.When the information provided by the customers is not transmitted through this encryption, the customer's system (if configured accordingly) will display an appropriate message ensuring the best level of secrecy for the customer's information. The customer would be required to cooperate with ICICI bank in order to ensure the security of the information, and it is recommended that the customers necessarily choose their passwords carefully such that no unauthorized access is made by a third party. To make the password complex and difficult for others to guess, the customers should use combination of alphabets, numbers and special characters (like! @, #, $ etc. ). The customers should undertake not to disclose their password to anyone or keep any written or other record of the password such that a third party could access it. ICICI bank undertakes not to disclose the information provided by the customers to any person, unless such action is necessa ry to: * Conform to legal requirements or comply with legal process; * Protect and defend ICICI bank's or its affiliates rights, interests or property; * Enforce the terms and conditions of the products or services; or * Act to protect the interests of ICICI bank, its affiliates, or its members, constituents or of other persons. COMPETITOR The main competitor of is ICICI bank is SBI because this bank is totally taken by government after this bank HDFC bank is the main competitor of ICICI bank . There are different types of segment operation semment, investment and services, demat and NRI services. The competitor from the operation segment are State Bank of India(SBI), Axis, Housing Development and Financial corporation(HDFC) etc.From the investment And service sector HDFC standard life insurance corporation, Bharati Axa life insurance ,Reliance Life Insurance Corporation, Max new work life insurance SBI Life insurance,Life Insurance Corporation of India. In demat section India bull, Anangram,SBI,HDFC,India Infoline are the main competitor of ICICI bank. In the NRI service section the Western Union bank is the main competitor of ICICI bank. There are some other company who also compete with the ICICI bank After the SBI the HDFC bank is the main competitor of ICICI bank. HDFC Bank Ltd. is a commercial bank of India, incorporated in August 1994, after the Reserve Bank of India allowed establishing private sector banks.The Bank was promoted by the Housing Development Finance Corporation, a premier housing finance company (set up in 1977) of India. HDFC Bank has 1,500 branches and over 2,890 ATMs, in 530 cities in India, and all branches of the bank are linked on an online real-time basis. As of September 30, 2008 the bank had total assets of INR 1006. 82 billion. State Bank of India is the largest bank in India. It is also, measured by the number of branch offices and employees, the second largest bank in the world. [citation needed] The bank traces its ancestry ba ck through the Imperial Bank of India to the founding in 1806 of the Bank of Calcutta, making it the oldest commercial bank in the Indian Subcontinent.The Government of India nationalised the Imperial Bank of India in 1955, with the Reserve Bank of India taking a 60% stake, and renamed it the State Bank of India. In 2008, the Government took over the stake held by the Reserve Bank of India. SBI provides a range of banking products through its vast network in India and overseas, including products aimed at NRIs. With an asset base of $126 billion and its reach, it is a regional banking behemoth. SBI has laid emphasis on reducing the huge manpower through Golden handshake schemes and computerizing its operations. The State Bank Group, with over 16000 branches , has the largest branch network in India. It has a market share among Indian commercial banks of about 20% in deposits and advances, and SBI accounts for almost one-fifth of the nation’s loans.There are some other banks w hich gives challenging some how in the banking and service sectorthey are: * Allahabad Bank * Andhra Bank * Bank of Baroda * Bank of India * Bank of Maharashtra * Canara Bank * Central Bank of India * Corporation Bank * Dena Bank * IDBI Bank * Indian Bank * Indian Overseas Bank * Oriental Bank of Commerce * Punjab & Sind Bank * Punjab National Bank * Syndicate Bank * UCO Bank * Union Bank of India * United Bank of India * Vijaya Bank ENVIRONMENT An employer the bank extends a lot of authority along with justified accountability to you. The working culture is very collaborative in nature. It can be owed to the fact that the bank is highly segmented with a lot of overlapping and mostly distinct roles and responsibility.ICICI Bank has established itself as a one stop solution (Universal Bank) for all financial need of individuals and institutions alike. The credit for the same can be attributed to its vast network, probably the largest among private sector banks. This makes the life of an employee a lot easier, especially for those who face the external customers. You do not have to justify your organization, it is only the product that has to be pitched. As far as employee benefits are concerned, ICICI Bank offers a lot of financial benefits ranging from your family health insurance to your kids school donations. The organization is sensitive to the needs of its employees as this quality is one of the building blocks (DNA) of the organizational culture.The organization will be giving you enough flexibility to innovate and come-up with new ideas. It will also exhibit its in terms of well laid systems, processes and infrastructure. It will extend a fast track growth for those with extraordinary talent at the same time offer stability to those who are able to deliver satisfactorily. Overall, I would say it’s a lifetime experience to work with such a behemoth organization. It might not be the best paymaster but it definitely will impress you with its capabili ty as the head master (Principal) of banking industry. there are huge competition between the eployee to achieve theo goal. TECHNOLOGY ICICI use many type of advance technological software like Pinnacle 7. 0 and Pinnacle7. 016.Among from this software ICICI bank uses the e-banking, core banking, mobile banking electronic display sy ICICI Bank was using Teradata for its data warehouse. However, due to its proprietary hardware, the cost of procurement, upgrades and administration was soaring. The closed box architecture of Teradata imposed restrictions on scalability. Secondly, querying and loading could not happen simultaneously. Queries could only be run during business hours because the loading of data had to take place during off-business hours. This meant that the refresh rate of EDW was delayed, so queries may not reflect the most current data. ICICI Bank was also dependent on Teradata for support and other activities: The bank was completely tied down to that solution.These iss ues compelled ICICI Bank to look for more efficient and flexible solutions. The solution would have to address not only current issues, but accommodate future growth expectations and business requirements. ICICI Bank evaluated numerous data warehousing solutions in the pursuit of solving its issues, and developed a shortlist of alternatives for its migration proof-of-concept: Sybase, SAS and Netezza. The primary criteria for evaluation was the price-to-performance ratio where Sybase IQ emerged the clear winner. During this rigorous testing, Sybase IQ delivered faster results on independent hardware and operating systems with minimum infrastructure.Commending the improvements achieved, Amit Sethi, Joint General Manager, ICICI bank says, â€Å"What impressed us wasthat even with overall lower costs, we could achieve significantly better query performanceafter implementing the Sybase enterprise warehouse solution. † ICICI Infotech today launched an enterprise resource planning ( ERP) solution for the small and medium enterprises. The ERP package – Orion Advantage – comes bundled with an HP dual processor Xeon server, Oracle 9i database, Windows 2003 server and costs about Rs 9. 90 lakh and has a 15-user license. An ERP package helps a manufacturer or any other business implementing it to manage all the important parts in the company such as product planning, parts purchasing, maintaining inventory and interacting with suppliers and customers.ICICI Infotech officials told a press conference here today that Orion Advantage offered a set of business practice solutions for industry segments such as engineering, auto ancillary, pharmaceuticals, chemicals and IT distribution. Besides the cost advantage, the ERP package also came pre-configured. ICICI Infotech had mapped the processes specific to each industry segment into the package. Mr. Manoj Kunkalienkar, Executive Director and President, ICICI Infotech, said that small and medium enterprises (SM Es) offered a good market and ICICI Infotech hoped to become a leading solution provider to this segment. Mr. R. K. Kanthi, Deputy General Manager, ICICI Infotech, said there was no ERP package for the SMEs that bundled the server, database and operating system right now.That was the advantage ICICI Infotech offered to SMEs as Orion Advantage came bundled and pre-configured. Besides the high cost of generic ERP packages, their implementation time as far as SMEs were concerned was also long. Orion Advantage could be installed in 45 days. ICICI Infotech had signed up six customers so far for the package and hoped to garner a 15 per cent market share of the SME segment, whose number in the country was estimated at 2. 30 lakh. Mr. K. S. Natarajan, Managing Director, Trident Pneumatics Pvt Ltd of Coimbatore, one of the companies that had installed Orion Advantage, said that the company had tried three other ERP packages, all of which had failed, before settling on Orion Advantage.Mr Kunk alienkar said that ICICI Infotech planned to move the two development centers in Chennai into a single location and double the staff strength from 300 now in the next two years. The Chennai centers were involved in research and development of Orion ERP solutions and Premia, an insurance package. ERP Systems Integration Pinnacle Software Solutions has the expertise and experience to assist you with your enterprise systems integration. From developing your strategy, through implementation and support, we bring the right combination of resources, management skillsets, and technical know-how. We will help you successfully integrate your  Enterprise Resource Planning (ERP)  systems into your overall business and technology infrastructure.Whether you are planning an upgrade of an existing ERP system, or a complete replacement of a legacy application and platform, we can help you improve your financial, human resources, electronic mail, and other business systems. We work with the lead ing ERP systems, including the latest versions of the Oracle and PeopleSoft applications: ? General Ledger| ? Project Costing| ? Accounts Payable| ? Human Resources| ?   Accounts Receivable| ? Payroll| ? Purchasing| ? Benefits| ? Asset Management| ? Compensation| Our technology management solutions will help you migrate hardware platforms, improve network and database performance, develop or refresh policies and rocedures, and develop sound disaster recovery and backup solutions. Please contact us to learn how Pinnacle Software Solutions can help you develop â€Å"solutions that fit†Ã‚  your enterprise. ICICI Prudential Life Insurance Company Limited ICICI Prudential life Insurance Company Limited was incorporated on 20th July 2000. The authorized capital of the company is Rs. 2300 million and the paid up capital is Rs. 1500 million. The company is joint venture of ICICI (74%) and UK based company Prudential Plc (26%). The company was granted certificate of registration for carrying business, by Insurance Regulatory and Development Authority on 24th November 2000.It commenced commercial operation from 19th December 2000 and becoming a leading private sector life insurance company. The company recognizes that the driving force for gaining sustainable competitive advantage in this business is superior customer experience and investment behind the brand. The company aims to achieve this by striving to provide world class service level trough constant innovation in product, distribution channels and technology based delivery. Vision and Mission Their vision is to make ICICI Prudential Life Insurance Company the dominant new insurer in the life insurance industry. This they hope to achieve through their commitment to excellence, focus on service, speed and innovation, and leveraging our technological expertise.The success of the organisation will be founded on its strong focus on values and clarity of purpose. These include: *   Understanding the needs o f customers and offering them superior products and service *   Building long lasting relationships with their partners *   Providing an enabling environment to foster growth and learning for their employees And above all building transparency in all our dealings. They believe that they can play a significant role in redefining and reshaping the sector. Given the quality of their parentage and the commitment of their team, they feel that tere will be no limits to their growth. Board of DirectorsThe ICICI Prudential Life Insurance Company Limited Board comprises reputed people from the finance industry both from India and abroad. Shri K. V. Kamath, Chairman Mr. Mark Tucker Smt. Lalita D. Gupte Mr. Danny Bardin Mrs. Kalpana Morparia Shri M. P. Modi Mr. John Caouette Shri S. P. Subhedar, (Alternate Director to Mr. Danny Bardin)   Mr. Derek Stott, (Alternate Director to Mr. Mark Tucker) Smt. Shikha Sharma, Managing Director Management Team Ms. Shikha Sharma, Managing Director Mr. Kevin Wright, Executive Vice President – Sales & Distribution Ms. Madhavi Soman, Chief – Strategic Initiatives Mr. V. Rajagopalan, Appointed Actuary Mr. Sandeep Batra, Chief Financial Officer & Company Secretary Mr.Saugata Gupta, Chief – Marketing & Service Mr. Shubhro J. Mitra, Chief – Human Resources Corporate Office: ICCI Prulife Towers, 1089, Appasahab Marathe Marg, Prabhadevi, Mumbai 400 025. Telephone Number: 022-462 1600 Website :  www. iciciprulife. com ICICI Lombard General Insurance Company ICICI Lombard  General Insurance Company Limited is a 74:26 joint venture between ICICI Bank Limited and Canada based  Fairfax Financial Holdings  Limited. ICICI Bank  is India's second largest bank, while  Fairfax Financial Holdings  is a diversified financial corporate engaged in general  insurance,  reinsurance, insurance claims management and  Investment management.Lombard Canada Ltd, a group company of Fairfax Financial Holdings Limit ed, is one of Canada's oldest property and casualty insurers. ICICI Lombard General Insurance Company received regulatory approvals to commence general insurance business in August 2000. Board Members * Mr K V Kamath, Chairman * Mr R Athappan, Director * Mr B V Bhargava, Director * Mr Dileep Choksi, Director * Mr James F Dowd, Director * Ms Lalita D Gupte, Director * Ms Kalpana Morparia, Director * Mr S Mukherji, Director * Mr Chandran Ratnaswami, Director * Mr H N Sinor, Director * Mr Sandeep Bakhshi, Managing Director & CEO Audit Committee * Mr. S Mukherji, Chairman * Mr. Dileep Choksi, Director * Mr. James F Dowd, Director * Mr. H. N. Sinor, Director Investment Committee * Mr.Chandran Ratnaswami, Chairman * Ms. Kalpana Morparia, Director * Mr. Sandeep Bakhshi,, Managing Director & CEO * Mr. S Gopalakrishnan, Head – Investments * Mr. Rakesh Jain, Head-Finance & Accounts * Mr. Liyaquat Khan, Appointed Actuary Board Governance Committee * Ms. Kalpana Morparia, Chairperson * M r. Chandran Ratnaswami, Director * Mr. H. N. Sinor, Director Retail Segment of ICICI Lombard General Insurance : ICICI Lombard's Retail Segment consists of personal insurance products – Health, Home, Motor and Travel insurances. Health Insurance ICICI Lombard is known to be a pioneer in introducing innovative concepts in the Indian health Insurance sector.Be it the floater concept, the critical illness cover or the tax gain policy, all these were first introduced by ICICI Lombard. It was also one of the first general insurance companies in India to have a robust online system in place for buying and renewing policies. The various plans offered by ICICI Lombard include  Family Floater Plan  Ã¢â‚¬â€œ where one policy covers the entire family,  Health Advantage Plus  Ã¢â‚¬â€œ where they cover OPD and dental expenses, also help save maximum tax under section 80D and  Critical Illness plan  Ã¢â‚¬â€œ a special policy covering a list of critical illnesses. They also have a basic  Personal Accident Plan  which covers against accidents. ICICI Lombard health plans also provide coverage against terrorism. Home InsuranceHome Insurance is actually one of the most neglected areas in the general insurance category. Simply, because people in general, especially in India, do not give much importance to it. However, in the recent years, due to the increase in awareness, and the great extent of damage caused to property due to natural calamities and terrorism, it has been gaining importance. The  Home Insurance Policyoffered by ICICI Lombard covers both the structure and the contents of the house. You can opt for either of the covers or both. Unlike other policies, it also covers damage due to terrorist activities, loss of cash, public liability, temporary resettlement and others. Motor InsuranceAs Motor Insurance is mandatory in India and is governed by the Motor Tariff Act, the policies offered by various companies are more or less the same. There is n ot much room for innovation in this category. ICICI Lombard too offers  Car Insurance  and  Two Wheeler Insurance. They are known to offer one of the best rates in the market. As the entire buying process is online and is instant, without any submission of documents or other formalities, people generally opt it for convenience. Travel Insurance Travel insurance is one of the most prominent sector of general insurance, especially overseas travel insurance and student medical insurance. ICICI Lombard offers various options in both the categories.The  Overseas Travel Plans  and  Student Medical Plans  offered cover medical and non-medical expenses, including compensation for flights hijacked and pre existing diseases in case of emergency. They charge on a per day basis if the travel is more than 7 days. ICICI Lombard has tied up with  United Health Group  to facilitate access to all its clinics while in U. S. The  Student Medical Plans  are accepted in almost univ ersities worldwide. They also have a section in their website,  University Search, where one can find specific plans for specific universities. All the above retail policies can be bought online, without any documentation through their website  www. icicilombard. com  . One can not only buy, but also manage and renew their insurance policies online. NRI ServicesICICI Lombard has developed insurance policies for  Non-resident Indians  that can be bought, renewed and tracked online. Parents' Health Insurance covers hospitalization and medical expenses incurred by parents of the policyholder in India. For parents' travelling outside India, ICICI Lombard offers a Parents' Overseas Travel Insurance policy. An  NRI  can insure his children/ dependents travelling abroad to study, under the Student Medical Insurance plan. Likewise, the Home Insurance and Car Insurance schemes enables an  NRI  to secure his assets in India. Channels Channel is the term used for the various approaches a company uses to tap its customers.ICICI Lombard uses a multi channel approach to ensure the sales, service and other allied activities are carried out in the most effective manner. Retail The Retail channel consists of sales executves, sales officers, brokers and agents. They are the one who are in direct contact with the customers and bring the innovative insurance solutions to their doorsteps. Online ICICI Lombard has developed a web-based system to meet all the pre and post-policy transaction. One can get quotes, buy, renew and track their policies onlin e through the website [www. icicilombard. com]. With the do-it-yourself architecture, the online channel is fast, convenient, easy to understand and operate. Technology ICICI use many type of advance technological software like Pinnacle 7. and Pinnacle7. 016. Among from this software ICICI bank uses the e-banking, core banking, mobile banking electronic display sy ICICI Bank was using Teradata for its data warehouse. However, due to its proprietary hardware, the cost of procurement, upgrades and administration was soaring. The closed box architecture of Teradata imposed restrictions on scalability. Secondly, querying and loading could not happen simultaneously. Queries could only be run during business hours because the loading of data had to take place during off-business hours. This meant that the refresh rate of EDW was delayed, so queries may not reflect the most current data.ICICI Bank was also dependent on Teradata for support and