28 minute read
7 Pros and Cons of Stock Market
Corporate Angle
Ms. Pradnya Santosh Koyande Portfolio Business Analyst, Bank OZK, Georgia
Advertisement
PROS AND CONS OF STOCK MARKET
The stock market is one of the primary sources of revenues used by individuals or corporations to expand or run their business entities. It plays an important role in the health of the economy; the economy has to be strong for a country and its citizen to prosper. An economist uses something called the technical analysis method and people who use these methods are also called chartist because they use charts to find trends in the stocks. Stock exchange is an important constituent of capital market. It constitutes that part of the capital market which is concerned with purchase and sale of the industrial, government and other securities. One primary advantage of stock trading is associated with superior long-term outcomes. Although it is very hard sometimes to predict the market price trends over a long time, for example, more than one trading quarter, stock market investments have high returns that can be informed of dividends or capital gains, as compared to bond and certificate of deposits. This is made better by the fact that the amount of loss from stock procured with cash is only limited to the aggregate sum of the early investment. Historically, stocks have averaged an annualized return of 10%. The stock market makes it easy to buy shares of companies. You can purchase them through a broker, a financial planner, or online. Once you've set up an account, you can buy stocks in minutes. Some online brokers such as Robinhood let you buy and sell stocks commission-free. The stock market allows you to sell your stock at any time. Economists use the term "liquid" to mean you can turn your shares into cash quickly and with low transaction costs.
Although stock trading has numerous advantages, proper use of appropriate economic policies can help to mitigate their effects. It is a very risky adventure, because of the volatility of market prices. Hence, unless individuals make correct predication before trading in their stocks, likelihoods of entities suffering great loses are high, as most factors that cause these fluctuations cannot be control by an investor. If buying stocks on your
own, you must research each company to determine how profitable you think it will be before you buy its stock. You must learn how to read financial statements and annual reports and follow your company's developments in the news. You also have to monitor the stock market itself, as even the best company's price will fall in a market correction, a market crash, or bear market. Stock prices rise and fall second-by-second. Individuals tend to buy high, out of greed, and sell low, out of fear.
It has been rightly said that the modern capitalistic economy cannot exist in the absence of wellorganized stock exchanges. It is because stock exchanges facilitate the necessary mobilization of capital required by companies in the business sector. In the modern times, a stock exchange has come to be recognized as the barometer of the economic progress of a nation. A stock exchange provides a ready market for the sale and purchase of existing securities. This facilitates the steady marketability of shares and debentures. It also provides price continuity to the investors regarding the securities they hold or intend to purchase. In a time of high and rising taxes, investment in stocks is one of the few ways by which a wage or salary earner can hope to become rich. As a result, the number of Americans who own shares has risen to 24 million. An estimated 76 million others own stock indirectly through their holdings in pension funds. Now that the market has become the prime source of a second income for many Americans, they are increasingly asking a puzzling question: What makes the market go up—and down? With so many people and so much money involved in investments, the market is inevitably fluttered by politics at home and alarms abroad, by racy tips and wild rumors that whisper along Wall Street. In many cases, such "inside" information reflects a broker's rationalization, a story confected for customers to account for a swing in paper profits. Consider Walmart, Amazon, and McDonald's. Walmart was originally a single-store business in Arkansas. Amazon.com began as an online bookseller in a garage. McDonald's was once a small restaurant that no one outside of San Bernardino, California, had ever heard of. How did these small companies grow from tiny, hometown enterprises to three of the largest businesses in the American economy? They raised capital by selling stocks.
In conclusion, although investing in the stock market can be a risky and time-consuming investment venture, it is important for individuals to note that it is one of the best investment opportunities because individuals can easily access and exit the stock market with easiness, regardless of the economic situation of a country.
About the Author:
Ms. Pradnya Santosh Koyande
She is an Indian residing in Georgia, United States. Previously worked at Accenture, went masters in US and now working at Bank OZK as a business analyst. She hold almost 5 years of experience in IT, management and analytics field.
Emerging Managers
Mr. Abhinav Tamrakar MBA, Batch 2020-2022 NITIE Mumbai, India
COLD SUPPLY CHAIN
Definition:
A cold chain is a temperature-controlled supply chain. An unbroken cold chain is an uninterrupted series of refrigerated production, storage and distribution activities, along with associated equipment and logistics, which maintain quality via a desired low-temperature range. It is used to preserve and to extend and ensure the shelf life of products, such as fresh agricultural produce, seafood, frozen food, photographic film, chemicals, and pharmaceutical products. Such products, during transport and when in transient storage, are sometimes called cool cargo. Unlike other goods or merchandise, cold chain goods are perishable and always en route towards end use or destination, even when held temporarily in cold stores and hence commonly referred to as "cargo" during its entire logistics cycle.
Uses
Cold chains are common in the food and pharmaceutical industries and also in some chemical shipments. One common temperature range for a cold chain in pharmaceutical industries is 2 to 8 °C (36 to 46 °F), but the specific temperature (and time at temperature) tolerances depend on the actual product being shipped.
Produce
Unique to fresh produce cargoes, the cold chain requires to additionally maintain product specific environment parameters which include air quality levels (carbon dioxide, oxygen, humidity and others).
Vaccines
The cold chain is used in the supply of vaccines to distant clinics in hot climates served by poorly developed transport networks. Disruption of a cold chain due to war may produce consequences similar to the smallpox outbreaks in the Philippines during the Spanish–American War, during which the distributed vaccines were inert due to lack of temperature control in transport. For vaccinations in particular, there are different types of cold chains. There is an ultralow, or deep freeze, cold chain for vaccines that require -70 degrees C. The Ebola and Pfizer–BioNTech COVID-19 vaccines require this level, as do some animal vaccinations, such as those for chickens. Next the frozen chain requires -20 degrees C.
Varicella and zoster vaccinations require this level. Then the refrigerated chain, which requires temperatures between two- and eight-degrees C. Most flu vaccinations only require refrigeration. In 2020 during the COVID-19 pandemic, vaccines being developed may need ultracold storage and transportation temperatures as cold as −70 °C (−94 °F), requiring what has been referred to as a "colder chain" infrastructure. This creates some issues of distribution for the Pfizer vaccine. It is estimated that only 25 to 30 countries in the world have the infrastructure for the required ultracold cold chain.
Validation
The cold chain distribution process is an extension of the good manufacturing practice (GMP) environment that all drugs and biological products are required to follow, and are enforced by the various health regulatory bodies. As such, the distribution process must be validated to ensure that there is no negative impact to the safety, efficacy or quality of the drug substance. The GMP environment requires that all processes that might impact the safety, efficacy or quality of the drug substance must be validated, including storage and distribution of the drug substance. A cold chain can be managed by a quality management system. Temperature data loggers and RFID tags help monitor the temperature history of the truck, warehouse, etc. and the temperature history of the product being shipped. They also can help determine the remaining shelf life. Also, temperature sensors may need to be National Institute of Standards and Technology (NIST) traceable depending on the body monitoring the cold chain.
Sectors using cold supply chain:
• Agriculture • Pharmaceutical • Floriculture • Poultry • Dairy
Challenges in the Cold Supply Chain:
• Preserve the adequate Storage & Handling
Conditions (temperature) throughout the Cold
Supply Chain. • Document the Storage Conditions (temperature) throughout the Cold Supply
Chain. • Maintain the Product Safety throughout the
Supply Chain (temperature, counterfeiting).
General Principles:
• The good quality of Cold Chain Products must be maintained throughout distribution networks. • The Quality Control/Assurance service must make sure that conditions of storage are observed at any moment, including transport. • Standardized Operation Procedures (SOPs) should describe all operations likely to affect the quality of Cold Chain Products or the distribution, including the reception of deliveries, storage and recording of storage conditions. • Instruments and equipments used should be adequate to ensure a good conservation and distribution of Cold Chain Products.
How to reach cold chain compliance
• Regulatory Gap Analysis • Personnel Training Review and Writing of
SOPs (related to Cold Chain, Storage &
Shipping) and Documentation • Temperature Mapping of Warehouse and
Storage areas • Qualification of Storage Equipment (Refrigerators/Freezers) • Temperature Profile Studies in Transport (for uncontrolled transports)
• Test, Design and Qualification of Cold Chain
Packaging Systems (outermost) • Monitoring Solutions for Storage Conditions of Cold Chain Products • Maintenance of Cold Chain Management and
Compliance.
Regulatory gap analysis
• The purpose of the cold chain gap analysis and its documentation is to verify and establish the pertinence of the cold chain regulations to the audited facility. • Verifications are made through a close collaboration of the Logistics, • Quality Assurance, Quality Control and
Shipping/Receiving depts. • Human Resources (Personnel) • Documentation • Procedures (SOPs) • Warehousing & Storage Area
• Shipping and packaging methods • Monitoring & Environmental Controls • Quality Agreements (e.g., Transportation
Contractual Agreements
PERSONNEL TRAINING
• Training on GMP and Cold Chain aspects, handling and storage of drug products • Trainings should be ensured by qualified people • Trainings should be in conformity with a written established program and training activities should be consigned in files • The effectiveness of the continuous training should be evaluated periodically • Staff working in areas where active, toxic, infectious or sensitizing products are • handled, should receive a specific training for this purpose • Formation of contractor’s personnel (transporters…)
Emerging Managers
Mr. Prakhar PGDBM, Batch 2018-2020, NMIMS.
MANAGEMENT IN OUR DAILY LIFE
Management is just not the topic to study, learn and implementing in our daily life. But it also plays a vital role in our daily lives as well. If we see in our home, we will find from our mother to housewife, they too are managing various things without the knowledge and studying about management. As the word itself represents managing the things or activities, it means that a work should be managed to reach to a certain goal or the ways of carrying out that activity to achieve the goal. Considering the situation, when our mother goes for shopping on every first day of the month, her primary goal is to purchase all the necessary stuffs at a reasonable price. She has a few questions build up in her mind like-what she should buy? From where to buy? How to reach there? Will she be able to reach back on time? And so on. To make her shopping success, she should think of these questions well in advance and these are a part of management. If we take another example of housewives, as soon she gets up in the morning, she has a number of activities to be performed alike house to be cleaned, clothes to be washed, her children to be helped in getting ready for the school, breakfast to be prepared, packed and handed over etc. If in the family, she may also have 3 persons to help her- her servant, mother-in-law, daughter. So, her aim will be to divide the work among those three in such a way all the work gets done in the right way and within appropriate time. So, we can learn how housewives are acting as a perfect example of Management, taking together all the people, to achieve the aim, to do the right things in given time. Above 2 examples we can conclude that management is very useful in day-to-day activities. Somewhere or the other we are using it – from preparing the exams, planning the holidays, studies, preparing home budget, celebrating social functions and so on. If we see than we all are the managers in some or the other way. At some areas there may be situations in the dayto-day activities where a manager may not find it useful to apply the known methods and principles and they may have to understand the nature of the situation and of the problem and then act or take a decision after careful thinking on the nature of the situation and the problem. They just need to apply
their skill and judgement rather using any method or principles known to them. Management means getting the things done with the active co-operation of the others. One must take a series of decisions to manage the activities properly. And it is not only a goal-directed activity or concerned with the co-ordination of work of different groups but also it is an economic activity and involves creative thinking. Similarly, for today’s college going students too need to balance their life with the help of Time Management.
“Time and Tide wait for none.”
This is a well-known proverb, which means a lot in life, especially for a Students’ life. As it shapes young minds into the sense of duty & directions of the discipline. How important is time management for students? • Goal setting: You need to base your every decision upon what you want to achieve in life.
Clear goals make solutions faster to come. • Decision-making: Which task to do, whom to meet, which essay to write today – persuasive or expository, what courses to start this month. Your every decision affects you and the world around you. If you can’t make decisions, you won’t understand the time and resources you’ll need to succeed.
• Planning: Your ability to plan gives you an idea of how much time you’ll spend on each task and how to organize your day, week, or even month accordingly.
• Communication: It enables you to build relationships with people, explaining to them why you can’t do this or that right now and delegating some tasks when possible.
• Stress management: Your ability to understand when it’s better to prevent the problem than deal with it after it’s occurred saves time by far.
• Prioritization: You’ll always have tons of things to do, but not all of them should be done right here and now. Your ability to prioritize tasks and ideas is what helps to manage time wisely. • Organization: Time management is also about deciding the right thing to do at the right time. When you’re not organized, you don’t know where to start and how to use time effectively.
• Self-awareness: Time management activities for college students are many, but none of them will work for you if you don’t know who you are and what you want from life. The more you know about yourself, the easier you’ll decide how to manage time best.
• Focus: Your problem is not lack of time but lack of direction. All people have 24 hours in a day, but only a few can ignore distractions and focus on significant tasks to complete. • Patience: Your ability to work with no rush matters, too. Let’s face it, we often have to spend even more time on revising something we did on-the-fly in the hope of time-saving.
We can see how management is needed in everyone’s life and how it helps each one of us, despite his profession, nature of work, his education etc.
Emerging Managers
CYBER SECURITY ON IOT
Abstract:
Importance of Cyber-Security on Internet of Things (IOT) explains the danger of cyberattack on a completely automated IOT environment in conglomerate, cooperates, industries and even our homes. This paper is meant to give you a glimpse of a dangerous and vulnerable world when IOT system is not completely secured. In this paper, you’ll go through different case studies about attack on an IOT environment which lead to disaster & also my research about how an IOT environment can be secured & what measures can be taken to avoid such attacks in future. This paper is not meant to give a bad impression of the great technology named IOT, but it is meant to give you the exposure of necessity to implement security in the system. If security is not kept as a priority then the company manufacturing it, the organizations which have implemented it & the users of those organization, all three come in great danger. As DATA IS NEW OIL, it’s very precious to secure it. I’ll discuss various points to implement security and ways to make such systems less vulnerable. It’s the duty of both user & companies to be aware of the attacks & the impact it leaves behind. Data leaks of big companies can lead to bankruptcy & loss of trust of users. The damages can be anything from an increase in electricity bill in IOT homes to destruction of entire smart cities.
The data which is being referred to in this paper are very technical data i.e., mainly hardware usage data, user login credentials, network or WI-FI passwords, computer passwords, data packets, voice recordings, restricted CCTV footage etc. Any confidential or military data is not in picture in this paper.
INTRODUTION:
We are on the edge of IoT-related products and services. We all know that the Internet of Things (IoT) has started to disturb enterprises, governments and consumers and is covering the way of an systematic revolution. From connecting home to self-driving cars, From smart phones to smart buildings soon, we will be able to connect any devices and be able to control every aspect of life. Internet of things in layman’s language can be defined as taking a machine (washing machine, AC, street light, car, TV, etc.), connecting them to internet via various sensors, actuators, microcontrollers, etc. According to the American research and advisory firm Gartner, it’s been said that there are 9.85 billion devices & by 2022, it'll grow to 70 billion devices. If all these devices are connected & they talk to each other, then the industry will benefit a lot from these devices as they’ll work efficiently. By this, we can say that IoT will soon change our way of living, learning, working and more. As more devices get interconnected, securing them all will be the huge obstacle. Software, Hardware and their connectivity will need to be secure for IoT objects to work successfully. Any connected object, from Washing machine to manufacturing bots, all can be hacked if security is not implemented. Once hackers gain control over any device, they can take over the object’s functionality and can steal the user’s digital data. Cyber security refers to the body of the technologies, processes and practices to protect computer networks, servers devices, programs and data from various numbers of attacks or unauthorized access. Cyber-attacks are the attacks on digital devices. Such attacks can also be done on an IOT environment which could result into huge destruction. Hence cybersecurity is raising concern between manufacturers & companies using such technologies. Protecting the user’s data is the number 1 priority of all the companies. So, a proper implementation of security is required at any cost. Basically, there are 3 major ways a system could be hacked i.e. Via Network, Application or Human error. Network hacking means that the attack is done by entering into the user’s network by gaining unauthorized access. Once the system is being hacked by the hacker, the hacker is into user’s network and hacker can access everything on the network. Application hack means the application itself contains a virus or malware already built in. All the hacker that needs, is that the application to be installed on any system. Once the application is installed, the virus does its job & the complete control of any device is in the hands of the hackers. From downloading a malware-infected attachment to Failing to Use a strong password, user faces an attack which is called Human error. These are the most popular way to hack an organization as not everybody is cyber experts. One wrong access given to the app can lead to Data leak. According to a study by IBM, human error is the main cause of 92% of cyber security breaches. In other words, if human error was somehow removed completely, 17 out of 20 chances of cyber hacking can reduce at some point. Hacking is the action of identifying the weakness of the computer system or a network
to exploit the security to gain the access of the user’s data. Some devices have default password set from the manufacturer itself, which is a bug, as every device can be hacked using default password. Once the hacker has control of any 1 device, he can tell other devices what to do & what not. This is possible because that's what IOT is all about, devices talking to each other without human interventions.
Literature survey:
We’ve all heard of cybersecurity concerns when it comes to IoT devices and there’s an intrinsic risk that comes with connecting more and more devices to the internet and to each other as well. Cyber security structure is some of the measures put forward to ensure that IoT is safe. Some several factors that might be the reasons for hacking the user’s device. These are: 1. Irregular update: Usually, IoT manufacturers update security patches periodically. The OS versions and security patches are also upgraded correspondingly.
Therefore, hackers get abundant time to crack the security protocols and steal user’s data easily. 2. Embedded passwords: IoT devices store set passwords, which helps the support users to troubleshoot OS problems or install necessary updates unexpectedly. However,
Hackers could use the feature for penetrating device security. 3. Automation: Often, Business and end-users uses the automation property of IoT systems for gathering information and data or simplifying business activities. However, if the harmful sites are not specified, integrated AI can access such information, which will allow threats to penetrate into the system. 4. Remote access: IoT devices uses various network protocols for remote access like
Wi-Fi, ZigBee, and Z-Wave. Usually, particular restrictions are not mentioned, which can be used to prevent cyber criminals. Therefore, Hackers could rapidly setup a malicious connection through these remote access protocols. 5. Wide variety of third-party applications:
Several software applications are available on the Internet, which can be utilized by organizations to perform specific operations. However, the authenticity of these applications could not be identified effortlessly. If end-users and employees install or access such applications, the threat agents will automatically enter into the system of the user and corrupt the embedded database. 6. Improper device authentication: Most of the IoT applications do not use authentication services to restrict or maximize network threats. Thereby,
Attackers enter through the main door and threaten privacy. 7. Weak Device monitoring: Usually, all the
IoT manufacturers configure special device identifiers to monitor and track devices.
However, some manufacturers or companies do not maintain security policy.
Therefore, tracking suspicious online activities become quite tricky and difficult. 8. Mobile Devices and Apps: The rapid growth of mobile devices drives an exponential growth in security risks. Every new smart phones, tablets or other mobile devices, open another door for a cyber-attack as each creates an additional vulnerable access point to networks. This inappropriate action is no secret to hackers who are ready and waiting with particularly targeted
malware and attacks recruiting mobile applications. Likewise, the perennial problem of lost and stolen devices will expand to include these new technologies and old ones that earlier flew under the radar of cyber security planning.
Methodology:
4. Keep the software and systems Up to
date: Usually, Cyber-attacks happen because the system or software are not fully up to date, leaving faults. Hackers exploit these faults, so Cyber criminals utilize these faults to gain access to the network of the user. Once they are in – it’s generally too late to take preventive action.
“EVERY DEVICE CAN BE HACKED”, if essential measures are not taken. Security is 5. Ensure Endpoint Protection: Endpoint Protection protects networks that are very important pillar of Internet of Things unexpectedly connected to the devices. (IoT) along with Cloud, Sensors and Mobile devices, tablets and laptops that are
Microcontrollers. IoT brought users massive connected to combined networks give benefits; however, some challenges come access way to security threats. These ways along with it. Cybersecurity and privacy need to be protected with endpoint risks are the foremost concerns of the protection software. researchers and security specialists cited.
These two are creating a considerable issue for many business organizations as well as References: public organizations. 1. Hassan, W.H. Current research on Internet of 1. Reduce the vulnerability of all devices by Things (IoT) security: A survey. Comput. Netw. changing their default passwords to pass- 2019, 148, 283–294. phrases in comparison with the latest 2. Monther, A.A.; Tawalbeh, L. Security
National Institute of Standards and techniques for intelligent spam sensing and
Technology (NIST) guidance. anomaly detection in online social platforms. 2. Put up a firewall: Firewalls are productive Int. J. Electr. Comput. Eng. 2020, 10, 2088–gatekeeper between the computers and the 8708. 4. internet, and 1 of the major hurdles to 3. Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, prevent the spread of cyber threats such as R.P.; Ni, W. Anatomy of threats to the Internet virus and malware. Set up a firewall device of things. IEEE Commun. Surv. Tutor. 2018, 21, accurately and try to check them frequently 1636–1675. [CrossRef]. to ensure that they have the latest software 4. Sadeghi, A.-R.; Wachsmann, C.; Waidner, M. updates installed, or they may not be Security and privacy challenges in industrial completely effective. internet of things. In Proceedings of the 2015 3. Control access: Make sure that an 52nd ACM/EDAC/IEEE Design Automation individual can only access data and services Conference (DAC), San Francisco, CA, USA, 8–12 for which they are authorized, Restrict June 2015; pp. 1–6. 12. access to unauthorized users and Limit 5. Izzat, A.; Chuck, E.; Lo’ai, T. The NICE Cyber access of data or services through Security Framework, Cyber Security application controls.
Management; Springer: Basel, Switzerland, 2020; ISBN 978-3-030-41987-5.
Emerging Managers
PRODUCTION PLANNING AND CONTROL IN TIMES OF COVID-19
The global production and supply chain system got severely disrupted due to widespread of the coronavirus pandemic (COVID-19). The COVID-19 pandemic has affected most of the transportation links and distribution mechanisms between suppliers, production facilities and customers. Therefore, it became imperative to discuss sustainable production and consumption pattern in the post-COVID19 pandemic era. Currently, most of the manufacturing and supply chain organisations are facing a lot of difficulty to anticipate the negative consequences of COVID-19. Most of the global markets are shrinking, and industrial managers are looking out for new materials and processes to maintain production. This resulted in national and global closure, shutting down of many manufacturing units, markets, and other activities of the supply chain. The Fortune 2020 report claimed that 94% of the Fortune 1000 companies had been affected by COVID-19 driven supply chain disruption. After the normalization of the COVID-19 situation, the manufacturing and transportation industry would find an opportunity for a huge sustainable transition and development in business processes. As mentioned earlier, the post-COVID-19 period would push organizations to move or shift production and supply chain systems in a more sustainable way. Therefore, it is highly essential to formulate enough institutional and operational policies for overcoming the production losses and improving the consumption pattern, which would further boost the economy. The availability and production of many essential items such as food, grocery, and pharmaceutical products are drastically reduced, and a huge mismatch between supply and demand is observed. However, the supply chain network showed poor resilience to this pandemic, and nearly 35% of the manufacturer reported its supply chain network failure due to
global coronavirus pandemic. Additionally, the technologies in the service industry helps to supply chain of raw and finished goods is also reduce the chances of the contagion of the disrupted due to trade and transport restrictions. COVID-19.
Due to such disruptive events, material shortage and delivery delays are often noticed This situation forces functioning with a reduced in the downstream supply chain, causing the workforce or limited workforce, which reduces ripple effect and resulting in reduced the productivity of the manufacturing process. performance in terms of service level, revenue, Therefore, to improve the human side of the and process productivity. manufacturing process, adequate safety measures are highly required. The postMostly all of the global manufacturing leaders pandemic production system requires are relatively resilient enough to shift their considering the social distancing at the production strategy to pandemic based workplace and adopts regular health requirements—the Indian government proposing monitoring for the workforce. The management various financial incentives for the development of sustainable production and consumption of of the MSMEs in the post COVID era. The next the essential and nonessential goods and significant obstacle among nations is related to services is a complex decision problem for the scheduling of the trained medical personnel, industry managers and policymakers during the work allocation, and vehicle scheduling for the pandemic situation more than before. medical personnel as well as infected people. This has been complemented by another set of The post COVID era opens an opportunity changes such as changes in production process window for the sustainable business transition, and methods, and standard operating procedures and raises the need to make supply and to maintain social distancing at the workplace. production system more resilient. The This puts an extra strain on achieving resilience of the firm's supply chain network productivity targets of each employees, as extra and manufacturing system is required to tackle time is needed in order to follow the new regime. the epidemic or such disruptive events. Therefore, an optimal and real inventory and Currently, in the production domain, the global work allocation is needed for the different phases and national production policies should be of the pandemic. revised. The situation has forced the manufacturing organizations to pause the The evaluation phase of a pandemic is the most production system for a longer time and search critical and needs proper mitigation strategies. for sustainable solutions to ensure smooth The evaluation of any epidemic can be viewed supply and operations from both the businesses from the perspective of future manufacturing and the customers' perspectives. The strategies adoption, contract policies, and manufacturing plants should shift all their network design to support the industry viability. manufacturing capabilities to digital Because of COVID-19, a lot of the global or manufacturing to reduce the number of local manufacturing industries are in the need to workforces and consonantly reduces the revive their production capacity and raw material chances of the pandemic situation. The sourcing. Service organizations should move to transportation industry severely faces a using digital technologies for handling customer shortage of drivers and vehicle connectivity. services. The implementation of digital
Therefore, an optimize supply chain network is required to serve the future.
ABOUT US
The word “Kaizen”, where “Kai” = change, “Zen” = good, which signifies change for better. In its birth place Japan, the word Kaizen is imbibed as a process that many small continuous changes in systems and policies bring effective results than few major changes. This methodology is applicable to every department across different sectors. Kaizen – The Official Operations Club of IBS Hyderabad has always been aspiring “Constant Change ad Evolvement”. We, as an organization work to inspire and aspire the student community for the betterment of the future.
KORE – Kaizen’s Operations and Research Entity, one of our primary wings provides the students a platform to improve and hone their technical competencies to meet the changing demands of the organizations. KORE’s sphere of influence includes Case Based Research, Consultancy, Live Projects and Workshop. LAKSHYA, an initiative of KORE focuses on improving the readers knowledge about Operations Management by providing insights in the form of articles on various operation techniques followed by different companies and also updating the emerging trends in the communities.
K PAVAN KUMAR REDDY EDITOR IN CHIEF - KORE Kaizen – IBS Hyderabad Batch 2020-22
LAKSHYA is an academic print and is not for any commercial sale. Reliability and Responsibility, for sources of data for the article vests with the respective authors. Please feel free to drop in your suggestions at kaizenclub.ibs@gmail.com
KORE: Kaizen’s Operations & Research Entity. Kaizen – The Official Operations Club of IBS Hyderabad
All Rights Reserved