Saturday, February 29, 2020

Apple Inc In Malaysia Economics Essay

Apple Inc In Malaysia Economics Essay This stability is an important consideration in these times when it comes to do business. It is part of any business decisions in which a firm operate political landscape makes it an ideal stable country for new business ventures. ( see page ) Malaysia boasts one of south-east Asia’s most vibrant economies, the fruit of decades of industrial growth and political stability. Its multi-ethnic, multi-religious society encompasses a majority Muslim population in most of its states and an economically-powerful. ( see page ) The phenomenon of information sharing is usually associated with social cultural factors beyond information technology. An understanding of information sharing across cultures is still a major challenge and is likely to be more important as global systems are developed. Byars, L.( 1991) In some local cultures the survival of highly competitive organizations is dependent upon having trade secrets. A very good example of this is Malaysia. ( see page ) The technolo gy used within the Malaysia has improved dramatically this has happened especially within the information technology sector with more and more people being trained on how to use these sorts of technology (see page) Apple Inc as a successful company in the world wide market today and the strategies they applied in order to conduct their business smoothly. On which the study details will be based on. SWOT analysis Corporation which is the strength, weakness, opportunity, and threats. and applied to the problems facing Apple Inc, include the Porters five forces (see page ) Introductions Perhaps one of the most observations that grabbed my attention in the world was the phenomenon of the open trade or free trade. The simplest definition of free trade is; Trade between nations without protective customs tariffs. It is largely known that America is the biggest market in the world. Technology is the mother of trade. Where there are a high number of digits in a market, there we see technolo gy and prosperity. Life becomes more easy and safer. This creates Tech-Consumptive generation; a quick look at our recycling pin would proof that. Year after year the technology of the mobile industry has changed our life. We, for example without being completely aware of the social change that happened, became a subject of what the market want. Before, we were the force that lead the market. Now TV commercials, billboards and media bombardment are the ones own our paychecks .( Griffin, 2009) Year after year the technology of the mobile industry has changed our life. We, for example without being completely aware of the social change that happened, became a subject of what the market want. Before, we were the force that lead the market. As I have mentioned before, technology is the master of our life. The world had become small village. Time is the impending master not the distance any more. This constitute a huge change every where we look. My social relations and how it’s s haped is totally different ten years ago. America and Japan were the biggest labs which used to fill the global market with that abundance of inventions. It was G6 then G7 then G8 those are Group of the biggest economies in the world. This tells us that the global economy is boosting so does the individual’s life changes within.( Scholnick,2009)

Wednesday, February 12, 2020

Semiconductor manufacturing research paper Example | Topics and Well Written Essays - 3000 words

Semiconductor manufacturing - Research Paper Example These, however, largely depends on the source of the plasma. The available electric fields for this process is often externally applied though can also be internally generated as a result of the buildup of charge in the growing film surface or in the film itself. The electric fields (EF) are key to the process being that the transport of the charged particle, that is electrons and ions, between the plasma and oxide surface plus the oxide layer is largely dependent on their resulting effect. Fig 4 a) from [22] Shows an example of a relation of Si-O bond. It exactly shows FWHM, ?, of the Si–O bond stretching mode as a function of annealing temperature for SiOx (x ? 0.15) and (Si, C)Ox (x ? 0.15 and C ? 10 at.%) thin films. The oxidation rate in plasma anodization and oxidation is controlled by the oxidant transport through the growing-oxide layer. Usually, the externally applied electric fields often rise to over 1MV/cm. The oxidant transport and the strong electric fields come together to result into a plasma-assisted oxidation rates at significantly low temperatures and pressures with each being below 600oC and 1 Torr respectively. At atmospheric temperatures, more than 900oC, and pressure, dry oxygen usually have similar rates as those achieved in the process. Oxidation flux of silicon-silicon diode interface can be altered by varying the plasma parameters which includes power, frequency and pressure, and also changing the design of the reactor. This is so because these alter the anodization current and the electron concentration. Fig 4 b) from [22] Shows the log-log plots of the oxide thickness against oxidation time for O2 Remote Plasma Assisted Oxidation of Flat and vicinal Silicon. Advantages Remote-plasma assisted oxidation help in minimizing the duration and number of steps of high temperature processes to allow for the reduction of thermal budget involved with the fabrication of the present and future Integrated Circuits (ICs). It is also a low t emperature alternative that can be considered instead of the high-temperature processes. Concurrently, the fabrication of various thin-film transistors (TFTs) which are largely used in many flat panel displays requires the availability of low temperatures. This is because of the glass substrates that the displays use and therefore the need to perform a remote-plasma assisted oxidation of silicon. 2. SMIF boxes (pods) and Front Opening Unified Pods (FOUP) used to transport wafers during semiconductor device manufacturing. Standard Mechanical InterFace is a standard that has been adopted for the facilitation of transport of wafer. It is a technology dated back in 1980 and used in cleanroom environments as well as in the fabrication of semiconductor wafers. The SMIF boxes were originally designed in Hewlett-Packard by a group of engineers called ‘micronauts’. It is used to transport wafers during the manufacture of semiconductor device. It functions to isolate wafers from getting contaminated through provision of a mini environment with controlled parameters which include pressure, airflow and particle density. It is a completely sealed SMIF box and is therefore essential in moving wafers between different tools or minienvironments. Moreover, unlike the ‘ballroom’ concept by which an extremely clean environment, ultra-clean, is generally created in the whole room. The SMIF pods are kept

Saturday, February 1, 2020

Is current UK IT law relevant when applied to the cloud computing Dissertation

Is current UK IT law relevant when applied to the cloud computing - Dissertation Example Make recommendations as to how users of the cloud should approach the problem and recommendations for future change to the legislation. 4. The Main Deliverable(s): A critique of current IT law when it applies to cloud computing. A review of how cloud computing or will change the legal context for IT operations management. A set of recommendation for cloud computing users and suggested updates to UK IT law to deal with the problems that come from cloud computing. 5. The Target Audience for the Deliverable(s): Potential users of cloud computing IT legislators 6. The Work to be undertaken: In this research essay, I would concentrate on the following: How to use the services of CSPs without infringing the UK’s laws like Data Protection Act, etc. What are all the safeguards and protection mechanism to be undertaken while using CSP services? Recommendations to initiate adequate measures to safekeeping the data while they are stored with CSPs who are located outside UK jurisdiction. 7. Additional Information / Knowledge Required: The researcher should have additional knowledge on USA Patriot Act if UK companies want to use cloud services offered by US based companies like Microsoft, Amazon and Google Inc. Besides UK laws, the researcher should have extensive knowledge on European Data Protection Directive, intellectual property laws, contracts act, Criminal Procedure and Investigation Act, 1996 (CPIA, 1996) and so on. 8. Information Sources that Provide a Context for the Project: The information and data have been sourced for this project from previous empirical studies, peer viewed journals, books written on the subject on the subject by eminent authors, from online sources, and from sources available from the online libraries. 9. The Importance of the Project: Availing the services of a cloud service contractor and having lost the control over the data processing is an issue relating with security. The problems that emanate from the infringement of the data d emonstrate the confronts that the cloud customers witness when things go haphazard in the cloud atmosphere. Making an in-depth analysis of the risks associated is vital before venturing into the use of the service of a CSP and if the risks are controllable, managing them through incorporating appropriate clauses in the contract. Businesses should exercise more vigil and should not opt for cloud computing purely on the cost basis by ceding poignant control over their data, which may land them later for data infringement offences later. Further, by encrypting the data, business can adhere with residency and jurisdictional needs by maintaining the encryption keys within its jurisdiction in spite of the actual physical placement of the data. 10. The Key Challenge(s) to be overcome: The boiler plate CSP contract should be replaced by an authorised contract for CSP contracts which should have the following clauses: the security of the data of the business to be guaranteed by the cloud com puting service provider; the cloud service provider (CSP) should use data only for the purpose mentioned in the contract, and he should be held accountable if the data is either misused or for non-business purposes: the data handler to inform to the data owner immediately if there is any breach of data or security so as to take immediate precautionary steps by the service