Sunday, January 26, 2020
Data Multimedia Images
Data Multimedia Images Chapter I Introduction 1.1 What is meant by Multimedia Data? A number of data types can be characterized as multimedia data types. These data types are normally the essentials for the building blocks of core multimedia environments, platforms and integrating tools. The basic types can be described as text, images, audio, video and graphic objects. Following is a detailed explanation for the same. Text Text can be stored in a variety of different forms. In addition to American Standard Code for Information Interchange (ASCII) based files, text is usually stored in spreadsheets, annotations, processor files, databases and common multimedia objects. The task of text storage is becoming more and more complex due to the easy availability and abundance of Graphical User Interfaces (GUIs) and text fonts, permitting unique effects such as text color, text shade etc. Images Digitalized images are nothing but a string of pixels that signify an area in the userââ¬â¢s graphical exhibit. There is an immense variation in the quality and dimension of storage for motionless images. For motionless (still) images, the space overhead varies with respect to complexity, size, resolution and compression format used to store any given image. The frequently used and accepted image formats (file extensions) consist of bmp, jpeg, tiff and png. Audio Audio, being another frequently used data type is relatively space intensive. A minute of sound takes up to 3 Megabytes (MB) of space. Numerous methods can be deployed to compress an audio into suitable formats. Video Another data type which consumes majority of space is categorized as the digitalized video data type. Videos are normally stored as a series of frames, the capacity of which depends on its resolution. A solo video frame can take up to 1 MB of space. Continuous transfer rate is needed to get a reasonable video playback with its proper transmission, compression, and decompression. Graphic Objects This data type consists of unique data structures that can define 2D and 3D shapes which further helps in defining multimedia objects. Today one can use different formats for image applications and video-editing applications. To list few examples Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM) are graphic objects 1.2 How is Multimedia Data Different? Theoretically multimedia data should be considered like any regular data based on the data types for instance numbers, dates and characters. Though, there are a few challenges that arise from multimedia as described in [2]: Multimedia data is usually captured with various unreliable capturing techniques such as image processing. These multimedia processing techniques require capabilities for handling these various available methods of capturing content, this includes both automated and manual methods. In multimedia database, the queries created by the user rarely come back with textual answer. To a certain extent, the answer to user query is a compound multimedia presentation that the user can glance through at oneââ¬â¢s leisure. The size of the multimedia data being large not only affects the storage, retrieval but also the transmission of data. Time to retrieve information may be vital while accessing video and audio databases, for example Video on Demand. Automatic feature extraction and Indexing: User explicitly submits the attribute values of objects inserted into the database in contrast to advanced tools with conservative databases, such as image processing and pattern recognition tools for images to extract the various features and content of multimedia objects. Special data structures for storage and indexing are needed due to the large size of data. 1.3 Basic Approaches for Data Retrieval Data management is being implemented since long. Many approaches have also been invented for the same to manage and inquire various types of data in the computer systems. The commonly used approaches for data management comprise of conventional database system, information retrieval system, content based retrieval system and graph/ tree pattern matching. The details for the same are as follows: Conventional database system It is the most extensively used approach to manage as well as investigate structured data. Data in a database system must match to some predefined structures and limitations (schemaââ¬â¢s). The user should specify the data objects to be retrieved and the tables from which data has to be extracted. The user also has to predicate on which the retrieval of data will be based to formulate a database query. SQL, a query language has a restricted syntax and vocabulary that can be used for such databases. Information retrieval (IR) system This system is prominently used to search enormous text collections; where in the content of the data (text) is illustrated with the help of an indexer using keywords or a textual summary. The query demands are expressed in terms of keywords or natural language. For instance, searching for an image or video, the user is required to describe using words and also need means to store large amount of metadata in textual form. Content based retrieval (CBR) system This approach facilitates in the retrieval of multimedia objects from an enormous collection. The retrieval is based on various features such as color, texture and shape which can be extracted automatically from the objects. Though keyword can be considered a feature for textual data, conventional retrieval of information has a higher performance as compared to content-based retrieval. This is due to the fact that keyword has the demonstrated ability to characterize semantics while no other features have revealed convincing semantic describing capability. A key disadvantage of this particular approach is its lack of accuracy. Graph or tree pattern matching This particular approach seeks the retrieval of object sub-graphs from an object graph as per several designated patterns. Chapter II Data Structures for Multimedia Storage Many modern database applications deal with large amounts of multidimensional data. Multimedia content-based retrieval is one of the examples. Access Methods are essential in order to deal with multidimensional data efficiently. They are used to access selective data from a big collection. 2.1 Importance of Access Methods Efficient spatial selection support is the key purpose of access methods. These include range queries or nearest neighbour queries of spatial objects. The significance of these access methods and how they take into account both clustering techniques and spatial indexing is described by Peter Van Oosterom [3]. In the absence of a spatial index, every object in the database needs to be checked if it meets the selection criteria. Clustering is required to group the objects that are often requested together. Or else, many different disk pages will have to be fetched, resulting in a very slow response. For spatial selection, clustering implies storing objects that are not only close in reality but also close in computer memory instead of being scattered all over the whole memory. In conventional database systems sorting the data is the basis for efficient searching. Higher dimensional data cannot be sorted in an obvious manner, as it is possible for text strings, numbers, or dates. Principally, computer memory is one-dimensional. However, spatial data is 2D, 3D or even higher and must be organized someway in the memory. An intuitive solution to organize the data is using a regular grid just as on a paper map. Each grid cell has a unique name e.g. ââ¬â¢A1ââ¬â¢, ââ¬â¢C2ââ¬â¢, or ââ¬â¢E5ââ¬â¢. The cells are stored in some order in the memory and can each contain a fixed number of object references. In a grid cell, a reference is stored to an object whenever the object overlaps the cell. However, this will not be very efficient due to the irregular data distribution of spatial data because of which many cells will be empty while many others will be overfull. Therefore, more advanced techniques have been developed. 2.2 kd Trees A kd-tree or a k-dimensional tree is a space-partitioning data structure used for organizing points in a k-dimensional space. kd-trees are a useful for several applications such as searches involving a multidimensional search key like range searches and nearest neighbour searches. Kd-trees are a special case of Binary Space Partitioning (BSP) trees. A kd-tree only uses splitting planes that are perpendicular to one of the coordinate axes. This is different from BSP trees, in which arbitrary splitting planes can be used. In addition to this, every node of a kd-tree, from the root to the leaves, stores a point. Whereas in BSP trees, leaves are typically the only nodes that contain points. As a consequence, each splitting plane must go through one of the points in the kd-tree. [4] 2.2.1 Addition of elements to kd trees A new point is added to a kd tree in the same way as one adds an element to any other tree. At first, traverse the tree, starting from the root and moving to either the left or the right child depending on whether the point to be inserted is on the left or right side of the splitting plane. Once you get to a leaf node, add the new point as either the left or right child of the leaf node, again depending on which side of the nodeââ¬â¢s splitting plane contains the new point. 2.2.2 Deleting from kd trees Deletion is similar as in Binary Search Tree (BST) but slightly harder. Step1 find node to be deleted. Step2 two cases must be handled: (a) No children replace pointer to node by NULL (b) Has children replace node by minimum node in right subtree. If no right subtree exists then first move left subtree to become right subtree. [1] 2.3 Quad-trees Each node of a quad-tree is associated with a rectangular region of space. The top node is associated with the entire target space. Each non-leaf node divides its region into four equal sized quadrants, likewise, each such node has four child nodes corresponding to the four quadrants and so on. Leaf nodes have between zero and some fixed maximum number of points. 2.3.1 Simple definition of node structure of a point quad-tree qtnodetype = record INFO: infotype; XVAL: real; YVAL: real; NW, SW, NE, SE: *qtnodetype end Here, INFO is some additional information regarding that point . XVAL, YVAL are coordinates of that point. NW, SW, NE, SE are pointers to regions obtained by dividing given region. [1] 2.3.2 Common uses of Quad-trees Image Representation Spatial Indexing Efficient collision detection in two dimensions Storing sparse data, such as formatting information for a spreadsheet or for some matrix calculations. 2.3.3 Representing Image Using Quad-tree: [7] Let us suppose we divide the picture area into 4 sections. Those 4 sections are then further divided into 4 subsections. We continue this process, repeatedly dividing a square region by 4. We must impose a limit to the levels of division otherwise we could go on dividing the picture forever. Generally, this limit is imposed due to storage considerations or to limit processing time or due to the resolution of the output device. A pixel is the smallest subsection of the quad tree. To summarize, a square or quadrant in the picture is either : entirely one color composed of 4 smaller sub-squares To represent a picture using a quad tree, each leaf must represent a uniform area of the picture. If the picture is black and white, we only need one bit to represent the colour in each leaf; for example, 0 could mean black and 1 could mean white. Now consider the following image : The definition of a picture is a two dimensional array, where the elements of the array are colored points. Figure 2.3: First three levels of quad-tree Figure 2.4: Given Image This is how the above image could be stored in quad-tree. Figure 2.5: 88 pixel picture represented in a quad-tree Figure 2.6: The quad tree of the above example picture. The quadrants are shown in counterclockwise order from the top-right quadrant. The root is the top node. (The 2nd and 3rd quadrants are not shown.) 2.3.4 Advantages of Quad-trees: They can be manipulated and accessed much quicker than other models. Erasing an image takes only one step. All that is required is to set the root node to neutral. Zooming to a particular quadrant in the tree is also a one step operation. To reduce the complexity of the image, it suffices to remove the final level of nodes. Accessing particular regions of the image is a very fast operation. This is useful for updating certain regions of an image, perhaps for an environment with multiple windows. The main disadvantage is that it takes up a lot of space. 2.4 R-trees R-trees are N-dimensional extension of Binary trees, but are used for spatial access methods i.e., for indexing multi-dimensional information. They are supported in many modern database systems, along with variants like R+ -trees and R*-trees. The data structure splits space with hierarchically nested, and possibly overlapping, minimum bounding rectangles.[4] A rectangular bounding box is associated with each tree node. [5]à Bounding box of a leaf node is a minimum sized rectangle that contains allà the rectangles/polygons associated with the leaf node. Bounding box associated with a non-leaf node contains the bounding box associated with all its children. Bounding box of a node serves as its key in its parent node (if any) Bounding boxes of children of a node are allowed to overlap. 2.4.1 Structure of an R-tree node rtnodetype = record Rec1, .Reck : rectangle P1, .Pk : âËâ"rtnodetype end A polygon is stored in one node, and the bounding box of the node must contain the polygon. Since a polygon is stored only once, the storage efficiency of R-trees is better than that of k-d trees or quad-trees. The insertion and deletion algorithms use the bounding boxes from the nodes to ensure that close by elements are placed in the same leaf node. Each entry within a leaf node stores two-pieces of information; a way of identifying the actual data element and the bounding box of the data element. 2.4.2 Inserting a node 1. Find a leaf to store it, and add it to the leaf. To find leaf, follow a child (if any) whose bounding box contains bounding box of data item, else child whose overlap with data item bounding box is maximum 2. Handle overflows by splits. We may need to divide entries of an overfull node into two sets such that the bounding boxes have minimum total area. 2.4.3 Deleting a node 1. Find the leaf and delete object; determine new MBR. 2. If the node is too empty: Delete the node recursively at its parent Insert all entries of the deleted node into the R-tree 2.4.4 Searching R-trees Similarly, for searching algorithms, bounding boxes are used to decide whether or not to search inside a child node. Here we need to find minimal bounding rectangle. In this way, most of the nodes in the tree are never touched during a search. If the node is a leaf node, output the data items whose keys intersect the given query point/region Else, for each child of the current node whose bounding box overlaps the query point/region, recursively search the child. 2.5 Comparison of Different Data Structures [1] k-d trees are very easy to implement. However, in general a k-d tree consisting k nodes may have a height k causing complexity of both insertion and search in k-d trees to be high. In practice, path lengths (root to leaf) in k-d trees tend to be longer than those in point quad-trees because these trees are binary. R-trees have a large number of rectangles potentially stored in each node. They are appropriate for disk access by reducing the height of the tree, thus leading to fewer disk access. The disadvantage of R-trees is that the bounding rectangle associated with different nodes may overlap. Thus when searching an R-tree, instead of following one path (as in case of quad-tree), we might follow multiple path down the tree. This difference grows even more acute when range search and neighbour searches are considered. In case of point quad-trees, while performing search/insertion each case requires comparisons on two coordinates. Deletion in point quad-trees is difficult because finding a candidate replacement node for the node being deleted is not easy. Chapter III Metadata Metadata is data about data. Any data that is used to describe the content, condition, quality and other aspects of data for humans or machines to locate, access and understand the data is known as Metadata. Metadata helps the users to get an overview of the data. 3.1 Need of Metadata The main functions of metadata can be listed as follows: [8] Description To describe and identify data sources. These descriptions help create catalogs, index, etc., thereby improving access to them. Querying Formulation of queries. Administration To provide information to help manage and administrate a data source, such as when and how it was created, and who can legally access it. Preservation To facilitate data archival and preservation like data refreshing and migration, etc. Technical To indicate how a system functions or metadata behaves, such as data formats, compression ratios, scaling routines, encryption key, and security, etc. Use To indicate the level and type of use of data sources like multiversion, user tracking, etc. 3.2 Metadata in the Life Cycle of Multimedia Objects A multimedia object undergoes a life cycle consisting of production, organization, searching, utilization, preservation, and disposition. Metadata passes through similar stages as an integral part of these multimedia objects [8]: Creation Objects of different media types are created often generating data of how they were produced (e.g., the EXIF files produced by digital cameras) and stored in an information retrieval system. Associated metadata is generated accordingly for administrating and describing the objects. Organization Multimedia objects may be composed of several components. Metadata is created to specify how these compound objects are put together. Searching and retrieval Created and stored multimedia objects are subject to search and retrieval by users. Metadata provides aids through catalog and index to enable efficient query formulation and resource localization. Utilization Retrieved multimedia objects can be further utilized, reproduced, and modified. Metadata related to digital rights management and version control, etc. may be created. Preservation and disposition Multimedia objects may undergo modification, refreshing, and migration to ensure their availability. Objects that are out-of-date or corrupted may be discarded. Such preservation and disposition activities can be documented by the associated metadata. 3.3 Classification of Metadata Metadata directly affects the way in which objects of different media types are used. Classifying metadata can facilitate the handling of different media types in a multimedia information retrieval system. Based on its (in)dependence on media contents, metadata can be classified into two kinds, namely content independent and content-dependent metadata [8]: Content-independent metadata provides information which is derived independently from the content of the original data. Examples of content independent metadata are date of creation and location of a text document, type-of-camera used to record a video fragment, and so on. These metadata are called descriptive data. Content-dependent metadata depends on the content of the original data. A special case of content-dependent metadata is content-dependent descriptive metadata , which cannot be extracted automatically from the content but is created manually: annotation is a well-known example. In contrast, content-dependent non-descriptive metadata is based directly on the contents of data. 3.4 Image metadata Some of the image files containing metadata include Exchangeable image file format (EXIF) and Tagged Image File Format (TIFF). Having metadata about images embedded in TIFF or EXIF files is one way of acquiring additional data about an image. Image metadata are attained through tags. Tagging pictures with subjects, related emotions, and other descriptive phrases helps Internet users find pictures easily rather than having to search through entire image collections. A prime example of an image tagging service is Flickr, where users upload images and then describe the contents. Other patrons of the site can then search for those tags. Flickr uses a folksonomy: a free-text keyword system in which the community defines the vocabulary through use rather than through a controlled vocabulary. Digital photography is increasingly making use of metadata tags. Photographers shooting Camera RAW file formats can use applications such as Adobe Bridge or Apple Computers Aperture to work with camera metadata for post-processing. Users can also tag photos for organization purposes using Adobes Extensible Metadata Platform (XMP) language, for example. [4] 3.5 Document metadata Most programs that create documents, including Microsoft PowerPoint, Microsoft Word and other Microsoft Office products, save metadata with the document files. These metadata can contain the name of the person who created the file, the name of the person who last edited the file, how many times the file has been printed, and even how many revisions have been made on the file. Other saved material, such as document comments are also referred to as metadata. Document Metadata is particularly important in legal environments where litigation can request this sensitive information which can include many elements of private detrimental data. This data has been linked to multiple lawsuits that have got corporations into legal complications. [4] 3.6 Digital library metadata There are three variants of metadata that are commonly used to describe objects in a digital library: descriptive Information describing the intellectual content of the object, such as cataloguing records, finding aids or similar schemes. It is typically used for bibliographic purposes and for search and retrieval. structural Information that ties each object to others to make up logical units e.g., information that relates individual images of pages from a book to the others that make up the book. administrative Information used to manage the object or control access to it. This may include information on how it was scanned, its storage format, copyright and licensing information, and information necessary for the long-term preservation of the digital objects. [4] Chapter IV Text Databases Basic text comprises of alphanumeric characters. Optical character recognition (OCR) practices are deployed to translate analog text to digital text. The most common digital representation of characters is the ASCII code. For this, seven bits are required (eight bits might be used, where in the eighth bit is reserved for a special purpose) for each character. Storage space for a text document that is required is equivalent to the number of characters. For instance, a 15 page text document consisting of about 4000 characters generally consumes 60 kilobytes. Now days, structured text documents have become extremely popular. They comprise titles, chapters, sections, paragraphs, and so forth. A title can be presented to the user in a different format than a paragraph or a sentence. Different standards are used to encode structured information such as HTML and XML (hyper text markup language and extensible markup language) There are different approaches like Huffman and Arithmetic Coding, which can be used for text compression, but as the storage requirements are not too high, these approaches are not as important for text as they are for multimedia data. [10] 4.1 Text Documents A text document consists of identification and is considered to be a list of words. Likewise, a book is considered to be a document, and so is a paper in the events of a conference or a Web page. The key identification used for a book may be an ISBN number or the title of the paper together with the ISBN number of the conference event or a URL for a Web page. Retrieval of text documents does not normally entail the presentation of the entire document, as it consumes a large amount of space as well as time. Instead, the system presents the identifications of the chosen documents mainly along with a brief description and/or rankings of the document. 4.2 Indexing Indexing refers to the derivation of metadata from their documents and storage in an index. In a way, the index describes the content of the documents. The content can be described by terms like social or political for text documents. Also, the system utilizes the index to determine the output during retrieval. The index can be filled up in two ways, manually as well as automatically. Assigned terms can be added to documents as a kind of annotation by professional users such as librarians. These terms can be selected often from a prescribed set of terms, the catalog. A catalog describes a certain scientific field and is composed by specialists. One of the main advantages of this technique is that the professional users are aware of the acceptable terms that can be used in query formulation. A major drawback of this technique is the amount of work that has to be performed for the manual indexing process. Document content description can also be facilitated automatically resulting in what are termed as derived terms. One of the many steps required for this can be a step in which words in English text are identified by an algorithm and then put to lower case. Basic tools are used in other steps such as stop word removal and stemming. Stop words are words in the document which have a little meaning and most of the times include words like the and it. These stop words are erased from the document. Words are conflated to their stem in the document through stemming. As an example, the stemmer can conflate the words computer, compute and computation to the stem comput. 4.3 Query Formulation Query formulation refers to the method of representing the information need. The resultant formal representation of information is the query. In a wider perspective, query formulation denotes the comprehensive interactive dialogue between the system and the user, leading to both a suitable query and also a better understanding by the user of the information need. It also denotes the query formulation when there are no previously retrieved documents to direct the search, thus, the formulation of the preliminary query. It is essential to differentiate between the expert searcher and the relaxed end user. The expert searcher is aware of the document collection and the assigned terms. He/ she will use Boolean operators to create the query and will be able to adequately rephrase the same as per the output of the system. In case the result is too small, the expert searcher must expand the query, and in case if the result is too large, he/she must be able to make the query more restrictive. The communication of the need for information to the system in natural language interests the end user. Such a statement of the need for information is termed as a request. Automatic query formulation comprises of receiving the request and generating a preliminary query by the application of algorithms that were also used for the derivation of terms. In general, the query consists of a list of query terms. This list is accepted by the system and it composes a result set. The system can formulate a successive query based on this relevant feedback. 4.4 Matching The matching algorithm is mainly the most important part of an information retrieval system. This algorithm makes a comparison of the query against the document representations in the index. In the exact matching algorithm, a Boolean query, which is formulated by an expert searcher, defines precisely the set of documents that satisfy the query. The system generates a yes or a no decision for each document. In the case of an inexact matching algorithm, the system delivers a ranked list of documents. Users can traverse this document list to search for the information they need. Ranked retrieval puts the documents that are relevant in the top of the ranked list, thus, saving the time the user has to invest on reading those documents. Simple but effective ranking algorithms make use of the frequency allocation of terms over documents. Ranking algorithms that are based on statistical approaches, halve the time the user has to spend on reading those documents. Chapter V Image Databases Digital images can be defined as an electronic snapshot scanned from documents or taken of a scene, for example printed texts, photographs, manuscripts, and various artworks. Digital image is modeled and mapped as a grid of dots, pixels or commonly known picture elements. A tonal value is allocated to each of these pixels, which can be black, white, and shades of gray or color. Pixel itself is symbolized in binary code of zeros and ones. Computer stores these binary digits or bits corresponding to each pixel in a sequence and are later reduced to mathematical representation by compressing them. After compression these bits are interpreted and read to generate an analog output by the computer for display or printing purposes. Figure 5.1: As shown in this bitonal image, each pixel is assigned a tonal value, in this example 0 for black and 1 for white. To further describe the grayscale of a pixel one needs to say that one byte is of eight bits. For a color pixel one needs three colors of one bye each, these colors are red, green and blue. So, for a rectangular screen one can compute the amount of data required for the image using the formula: A = xyb Where A is the number of bytes needed, x is the number of pixels per horizontal line, y is the number of horizontal lines, and b is the number of bytes per pixel. Using this formulae for a screen with value of x being 800, y being 600, and for b being 3; A=xyb thus A = 1.44 Mbyte. Compression is required for this significant amount of data. Image compression is based on exploiting redundancy in images and properties of the human perception. Pixels in specific areas appear to be similar; this concept of similarity is called Spatial Redundancy. Humanââ¬â¢s views of images are tolerant r
Saturday, January 18, 2020
Organization ââ¬Åin the Newsââ¬Â Analysis Paper Essay
Company Overview Research in Motion, (RIM), is ââ¬Å"a global leader in wireless innovation, (which) revolutionized the mobile industry with the introduction of the BlackBerry solution in 1999â⬠[ (Research In Motion, 2011) ]. While RIM has no publically available mission statement [ (missionstudy, 2009) ], we can deduct the following: 1) From the aforementioned description, they are committed to innovation. 2) From the article we will discuss later on, they are seeking to strengthen relationships with developers 3) From past history, reputation, and numerous achieved certification; they wish to provide a highly secure means of communication through mobile devices While it is not possibly to quantify most of RIMââ¬â¢s operational goals we can try to establish what they may entail. A recent interview with new CEO Thorsten Heins points towards having their operative goals built around having an innovative culture that involves employees and develops them and having a top 3 market share globall y in the mobile market [ (BlackBerry, 2012) ]. Furthermore, they are also very focused on reducing their costs which is demonstrated by their announcement of a core optimization program and CORE on June 16, 2011. These programs were meant to analyze the companiesââ¬â¢ procedures and cut out overhead and redundancy [ (Research In Motion, 2011) ]. RIMââ¬â¢s competitors have been highly publicized and are listed by Yahoo Finance to be Nokia, Google, and Apple [ (Yahoo! Inc., 2012) ]. With RIM being in the mobile market, their consumer base is very broad selling to the general market. With such an advanced device the list of suppliers is vast as they need to provide all the parts from glass to processing chips and these suppliers are located around the world. Lastly, their key partnersà are mobile companies large and small such as Verizon, Sprint, Vodafone, and Orange. Having previously worked at RIM for a year I know these statements to be fact. Article Importance and Recap RIM is currently going through relatively tough times exemplified by, ââ¬Å"collapsing market shareâ⬠[ (Isaac, 2012) ] and their declining stock value. RIMââ¬â¢s shares were being traded mostly between the $14 and $17 range per share in the month of February to date compared to $144 a share in the summer of 2008 [ (Google, 2012) ]. As recently as 2009, RIM accounted for half of the US smartphone market share [ (Gardner, 2009) ], but latest reports have them only accounting for 6.5% of the US market [ (Miller, 2011) ]. This fall from grace from the once dominant organization of the mobile space creates interest from a wide range of stakeholders. Consumers are interested as many have used RIM products in the past and investors are interested as they have gained and lost many dollars from the organization. As the mobile space is a very broad market it means that there is going to be many opinionated individuals for very different reasons. Because of RIMââ¬â¢s high profile and past and present penetration in the general population, a new business strategy is very newsworthy and is something people will talk about. Mike Isaacââ¬â¢s article, ââ¬Å"RIM Claws Back Against Apple and Google With Free Tablets,â⬠covers RIMââ¬â¢s decision to give android app developers free playbook tablets so long as they make their app available on the Playbook ecosystem [ (Isaac, 2012) ]. The article starts with a quote from Nokia CEO Stephen Elop who describes the importance of a platformââ¬â¢s ecosystem or in laymanââ¬â¢s terms the amount of apps built for a platform. It further describes the relative lack of apps RIM has compared to Android, the Google platform, and iOS, the Apple platform. After stating the previously mentioned new strategy being employed by RIM, the article describes the reason for such aggressive tactics. The article lists the sales of RIMââ¬â¢s Blackberry playbook tablet being very disappointing, calling it a flop, as the main reason. The article lastly lists the other strategies that RIM has been employing to encourage app development citing extreme price cuts and Playbookââ¬â¢s virtual android environment which allows android apps to be easily transferred over to the Playbook. This is only possible due to the Android platform being an open OS meaning anyone can develop on it includingà competitors. With an organizational theory perspective, this article best articulates a manifestation of 2 important concepts in the mobile market: 1) A resource based approach of assessing organizational effectives with apps and app developers being the scarce resource of note 2) A description of the organizational ecosystem being that of ââ¬Ëpopulation ecologyââ¬â¢. This is demonstrated by the possible compatibility of Android and RIM platforms and the selection process of the market that is still happening most notably with the abandonment of HPââ¬â¢s webOS Resource Based Approach of Organizational Effectiveness The resource based approach to measuring organizational effectiveness focuses solely on an organizations ability to obtain scarce or key resources. The key measures of this approach are: * Ability to perceive and interpret the external environment * Ability to respond to environmental change * Bargaining position While RIMââ¬â¢s ability to obtain manufacturing resources is not being questioned, its ability to lure app developers and garner app creation is being put to the test. The tablet market itself is still maturing only having 19% penetration rate in the US and it is growing rapidly [ (Kopp, 2012) ]. RIM entered the market much later then their competitors with apple having released 2 iterations of their iPad before playbook had their initial launch. Currently, the iPad accounts for 57% of the market much due to the early release dates it had over competitors [ (Warner, 2012) ]. The rather quick emergence of the market may have exploited RIM to have a relatively slow response rate to changes in the environment as even when they did launch, the common perception of the playbook was that it was an unfinished product [ (Stevens, 2011) ]. Such offers as cutting their prices dramatically, and giving away playbooks to developers also proves that RIM currently has very little bargaining posi tion with those developers and they have to go to extremes in order to get traction on their development. By all definitions, this means that RIM is proving to be an ineffective organization by a resource based approach of assessments. If these aggressive measures are effective, the need for them will shrink as time goes on. The tactics are geared towards both increasing consumer bases toà create higher earning potential for developers and to encourage more app development with one time offers. More app development will mean higher adoption rates for consumers and the cycle goes on like this. This is in essence what RIM is trying to create; a snowball to roll down a mountain hoping momentum will take over at one point to create an avalanche. Although RIM currently stands as ineffective at collecting these resources, it is clear that they are trying hard to overcome their current shortcoming in assembling an ecosystem. Although a resource based approach still has the weakness of assuming a stable environment, which is far from the truth in the technological markets, it is actually a much more relevant measure to this situation then it would be to others. Usually a resource based approach lacks the consideration of consumer needs; in this case the scarce resource is created because of consumer needs. The ecosystem of the device became as important as the device itself in the tablet market. As an ecosystem doesnââ¬â¢t directly reflect internal processes or goal oriented approaches of assessment, a resource based approach is very effective in evaluating the creation of a value proposition to consumers in the tablet market. As the article stated, ââ¬Å"a tablet is only as good as the apps it runsâ⬠[ (Isaac, 2012) ]. The Organizational Ecosystem An organizational ecosystem can be described by the nature of the interactions between organizations with the environment and each other [ (Daft & Armstrong, 2009) ]. The ecosystem can be described by its interorganizational framework which is defined by how similar the organizations are to each other and whether they act competitively or cooperatively with each other [ (Daft & Armstrong, 2009) ]. Analyzing the current mobile market, it is apparent that the functions each of the platforms have are very similar some apps being available across all platforms and each having very similar functions. The only differentiation there is within the market is the platform they are on, and the form factor of the tablets. Because of the similarity in the tablets across the platforms, it can safely be assumed that the organizations are similar to each other. However, since the differentiation involves different platforms, it also means that they are acting competitively towards each other. While some platforms are very proprietary like iOS and Blackberry, Android is openà source allowing for anyone to develop on it. Certain apps are only available on one device or another and they do not generally share their apps with each other. This is much different if everyone was on one platform and they were being differentiated solely on the tablet hardware. In this circumstance they are pooling their scarce resources of app development and creation in the effort to create a much greater app library and stronger ecosystem. Currently they are each trying to produce their own ecosystems. Since this is the case, it can also be concluded that the companies are competitive towards each other. With both factors being determined, we can refer to the organizational framework know that the current tablet market is that of ââ¬Ëpopulation ecologyââ¬â¢. ââ¬ËPopulation ecologyââ¬â¢ market is defined by: * The emergence of new models to meet consumer needs * The process of ecological change including variation, the appearance of a new population of organization; selection, whether an organization can survive in the environment; and retention, the preservation and institutionalization of organizational forms * The choice of pursuing the general market or a niche within that market meaning being a generalist or specialist respectively The iPad was the first mainstream tablet to have emerged with a market launch date of April 3, 2010 [ (Apple, 2010) ]. This was the first emergence of a tablet business model which was very much an extension of the mobile model but with a new class of product. The tablet is a device that is small in design but has similar functionalities then a laptop. This more portable form factor was the identification of consumer needs. However, since this launch almost 2 years ago, 4 new OSââ¬â¢s of note have emerged being that of Blackberry OS, Android, WebOS and Windows OS. The key question to ask is how many OSââ¬â¢s can survive in the tablet market. If it is anything like the smartphone market, it is closer to 3 or 4 as demonstrated by market share [ (Smith, 2012) ]. With the emergence of 4 new OSââ¬â¢s and the original iOS this means that eventually one of these would have to default. On August 18th 2011 it was confirmed that WebOS would be the ill fated platform [ (Kumparak, 2011) ]. As WebOS was selected out by the market, it provided a little breathing room for RIM with the quickly expanding market and less competition. To avoid the same fate as WebOS, RIM is actively trying to work on creating their ecosystem as described in theà last section. The emergence of an open OS platform as Android also provided it opportunity to adapt their platform to try and include Android apps as well. Both of these tactics are described in the article. Whatââ¬â¢s Missing? While the article extensively covers a resource based approach of assessing an organizational effectiveness and describes the organizational ecosystem, it fails to well define the environmental uncertainty. It doesnââ¬â¢t consider the broader picture of the market and it could be made more in depth with the addition of an analysis of the environmental framework. Furthermore, it has a very micro approach focusing only on the struggles of RIM with app developers. The environment is a huge factor in technological companies and it could illustrate how important the right decisions are to future success and the wrong decisions to complete failure. To analyze the environmental framework we have to see two key factors: * The stability of the environment meaning the speed of change * The complexity of the environment As previously described, the tablet market is rapidly expanding and it is only 2 years old. Combine this with RIMââ¬â¢s dramatic change in market share over the past 3 years it strongly indicated that the environment is quick changing. The complexity of the environment can also be defined as complex one. This can be proven by RIM having to worry about not only manufacturing resources, and app development, but also the extensive testing they must complete in order for their devices to be compliant with regulations. With many different radio bands, Bluetooth compatibilities, wifi bands, java compliance, throughput testing, and active pursuit in both hardware and software, RIM has to deal with an endless amount of variables. The hardware alone would contain a list of suppliers that are wide but then they must further ensure that all the radio frequencies are properly calibrated and the software works seamlessly amidst the global demands of their products. The article called them a flop even though they had shipped in the hundreds of thousands of devices in 2011 [ (Isaac, 2012) ]. What this means to RIM is that even though they may be down on market share, the market can easily turn in their favor. However, this also means that the market can select them out. The high uncertainty described of the environment is the swordà that decides whether RIM will prosper or die. The article does briefly describe the release of BB10, which is RIMââ¬â¢s new OS to be released later this year. However, it doesnââ¬â¢t emphasize that it would be the newest OS on the market and it was able to create the OS in a year and a half years [ (BlackBerry, 2012) ]. With the unstable environment, this means that it could very well be the basis for which their future will be decided upon. The article has a gloomy outlook on RIMââ¬â¢s future but also concludes with ââ¬Å"perhaps it can find its way back to a seat at the mobile ecosystem table.â⬠Thi s last statement would be better reinforced with an environmental analysis. Bibliography Apple. (2010, March 5). iPad Available in US on April 3. Retrieved from Apple Press Info: http://www.apple.com/pr/library/2010/03/05iPad-Available-in-US-on-April-3.html BlackBerry. (2012, January 22). Meet Thorsten Heins the New President and CEO of Research In Motion. Retrieved from Youtube: http://www.youtube.com/watch?v=QUFwhpcrCTw Daft, R. L., & Armstrong, A. (2009). Organization Theory & Design. Toronto: Nelson Education Ltd. Gardner, W. D. (2009, August 19). RIM Owns Half Of U.S. Smartphone Market. Retrieved from InformationWeek: http://www.informationweek.com/news/personal-tech/smart-phones/219400707 Google. (2012, February 14). Research In Motion Limited (USA). Retrieved from Google Finance: https://www.google.com/finance?client=ob&q=NASDAQ:RIMM Isaac, M. (2012, February 3). RIM Claws Back Against Apple and Google With Free Tablets. Retrieved from Wired: http://www.wired.com/gadgetlab/2012/02/rim-ecosystems-blackberry-playbook/ Kopp, C. (2012, January 24). Tablets, E-Readers Double Market Penetration, Says Report. Retrieved from minyanville: http://www.minyanville.com/businessmarkets/articles/megaupload-anonymous-kim-dotcom-filesonic-tablets/1/24/2012/id/38996 Kumparak, G. (2011, August 18). Itââ¬â¢s Official: HP Kills Off w
Friday, January 10, 2020
Key Elements Of Corporate Governance Accounting Essay
Caltex was incorporated in 1936 as the consequence of a amalgamation between U.S. based oil companies Socal and Texaco. Caltex is the largest seller of crude oil merchandises and top convenience retail merchant in Australia. Caltex besides have operations in different states. The chief end of the concern is safe and dependable supply for all clients. We continue to construct our place as Australia ââ¬Ës taking provider of crude oil fuels by farther investing in our supply concatenation and selling assets. Caltex is an independent company listed on the Australian Securities Exchange ( ASX ) and incorporated in Australia. Chevron Corporation holds a 50 % involvement in Caltex Australia Limited. The staying 50 % ownership of Caltex is made up of more than 27,000 stockholders. Although Chevron has a big retention, Caltex operates with an independent board and direction. ( Caltex 2011 ) Corporate administration refers to the set of rules and procedures by which a company is governed. These rules provide guidelines sing the way in which the company can be controlled so that it can carry through its ends and aims in a mode that adds to the value of the company and is besides good for all stakeholders in the long term. Stakeholders would include everyone from the board of managers, stockholders to clients, employees and society. Corporate administration is concerned carry oning the concern with all unity, being crystalline, doing all necessary determinations, following with all the Torahs of the land and committedness of transporting concern in an ethical mode. More over corporate administration is besides known to be one of the standards that foreign investors are mostly depending on when make up one's minding on which companies to put in. Additionally, the portion of monetary value of the company is besides known to be positively influenced by corporate administratio n. ( Economictimes 2009 ) Cardinal Elementss of Corporate Governance For such big houses like Caltex, there are many cardinal elements of corporate administration that are important for the company and they help in guarding against corporate failures. These elements include: Transparency Conflict of involvements Issue of Integrity To guard against corporate failures these countries should be taken attention of in order to avoid any unanticipated amendss to the company.Transparency:Stakeholders will hold more assurance in the direction if a company is crystalline plenty and studies stuff facts in existent clip. Cost of capital would travel down because stakeholders will be more willing to put in the company. Jointly, all these factors enable the house ââ¬Ës productive capacity and productiveness to better ( Economybuilding 2011 ) . For investors, transparence provides greater protection in all facet of corporate administration. An investor would cognize how the house is executing if there is transparence in the organisation. In add-on to that transparence in compensation of employees and managers, gross revenues inducements and other human resource patterns decreases the opportunity for misdirection and unethical patterns, which may harm the house. Effective corporate administration besides helps attracts and retain employees ( Webster 2013 ) . Organizations must follow with the rules of transparence to carry on concern in true, just, symmetrical and timely mode all the information reflecting the direction and activities. These regulations should non be set merely as a formal construct of being of corporate administration regulations. ( Iconsejeros 2005 )Conflict of Interest:The companies which are non focussed towards the involvement of stockholders by and large experience failure because they value their involvement at the disbursal of others. In the long tally, to be successful a house requires protecting and valuing the involvements of stockholders instead than the house ââ¬Ës involvement. ( Turner n.d. ) Ranging from local to planetary, in public and corporate domain, struggle of involvement occurs at all degrees of administration. Decision doing procedures are frequently distorted by struggles of involvement and generate unfavourable or inappropriate results for the house, thereby sabotaging the operation of public establishments and markets. However, the current tendency towards ordinance, which seeks to forestall and pull off struggles of involvement, has its monetary value. The suppression of decision-making procedures, the loss of expertness among decision-makers and a barbarous circle of misgiving are the drawbacks. ( Handschin 2012 ) Large houses should hold a process established for the control and declaration of any struggle of involvement which may originate within the organisation. Audit commission or the Remunerations commissions should reexamine if any state of affairs of struggle of involvement arises between the company and its stockholders, managers or officers. ( Iconsejeros 2005 ) Stockholders can non supervise themselves the directors that they hire, so they appoint board of managers to do certain no struggle of involvement arises which may travel against the stockholders of the house. In order to avoid any failures house should do certain that their board is independent, resourceful and have the necessary experience to judge the actions of senior direction. ( Kayanga 2008 )Issue of Integrity:Presently, the chief issue in the field of corporate administration is non whether most listed companies follow the assorted commissariats but the chief focal point is whether the top direction of large organisations is seen as possessed of unity in the eyes of public. ( Applied-Corporate-Governance 2013 ) Recent high profile concern failures raise issues which are dejecting from many positions, domestic and international. These failures raised inquiries sing the responsibilities and patterns of managers, directors, hearers, attorneies, investing bankers, analysts and evaluation bureaus. Assurance sing cheque and balances support the operation of our market has been shaken severely. These issues threaten the credibleness of corporate and fiscal leading. The most major deductions of recent events of failure relate to corporate administration and public presentation of Board of Directors. Bottom line for all big organisations is that board is responsible for the entity ââ¬Ës unity as it is the ultimate authorization for the governed entity. Individually, every manager needs to take duty for the unity of the organisation he or she serves. Directors must see the organisation ââ¬Ës unity as an extension of their ain. ( Stalwart 2002 )
Thursday, January 2, 2020
Influences of the Forrester Effect and the Bullwhip Effect...
A supply chain management is the broad concept which includes the management of the entire supply chain from the supplier of raw materials through the manufacturer, wholesaler, and retailer to the end consumer. However, certain dynamics exist among firms in the supply chain thereby causing inaccuracies and volatility of orders from the retailer to the primary suppliers and that these cause for operations, say, readjustments further upstream in the supply chain. The Forrester effect and the bullwhip effect influence the supply chain directly or indirectly through the components in the supply chain like manufacturers, suppliers, wholesalers, distributors, retailers, and customers in many ways. Bullwhip effect, also known as Forresterâ⬠¦show more contentâ⬠¦For example, Kotler reports that trade deals and consumer promotion constitute 47% and 28% of distributors and manufacturers respectively of their total promotion budgets. Considering a situation when a product s price is pegged low through the price schemes, more would be bought by the customer than actually needed. As the price returns to normal, the customer stops buying in order to use up its inventory. This triggers an irregular buying pattern of the customer which does not reflect its consumption pattern, and the variation of the buying quantities is much bigger than the variation of the consumption rate leading to the bullwhip effect or Forrester effect. Such a practice was called the dumbest marketing ploy ever. 4. Rationing and short gaming: rationing usually becomes the norm when demands exceed supply. Manufacturers allocate the amount in proportion to the amount ordered. During rationing customers exaggerate their real needs when they order for fear that the orders might be in short supply.Customers overreaction in anticipation of shortages results when organisations and individuals make sound, rational economic decisions and game the potential rationing. The effect of this gaming is that little information is given to the supplier on theShow MoreRelatedBeer Distribution Game - A Review3866 Words à |à 16 PagesGameplay Experience of the Author and its Use of Complex System Management Principles Introduction The Root-Beer Distribution Game, as played by the author and used as the basis for this report, is an on-line adaptation of the Beer Distribution Game originally created in the 1960ââ¬â¢s by Jay Forrester, et al, of the MIT Sloan School of Management. A pioneer of computer engineering and considered the founder of System Dynamics, Forrester and the MIT Systems Dynamics Group devised the Beer DistributionRead MoreSupply Chain Management for Army35417 Words à |à 142 PagesAN ANALYSIS OF CLASS II SUPPLIES REQUISITIONS IN THE KOREAN ARMYââ¬â¢S ORGANIZATIONAL SUPPLY THESIS Cho, Min Cheol, Captain, Korea Army AFIT/GLM/ENS/09-04 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, orRead MoreToyota Supply Chain78751 Words à |à 316 PagesSUPPLY CHAIN MANAGEMENT A STRATEGIC APPROACH TO THE PRINCIPLES OF TOYOTAââ¬â¢S RENOWNED SYSTEM ANANTH V. IYER SRIDHAR SESHADRI ROY VASHER New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright à © 2009 by Ananth V. Iyer, Sridhar Seshadri, and Roy Vasher. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or
Subscribe to:
Posts (Atom)