Thursday, November 28, 2019
The Importance of Caching in WordPress
When it comes to optimizing your website, the role of caching in WordPress can never be underestimated. Quite a lot has been talked about caching on the internet in general. Yet, it still remains a relatively lesser utilized feature among a large section of the WordPress user base.What exactly is caching all about? We know that it can speed up our websites, but is there more to it? How should we employ caching to boost the performance of our WordPress websites? Are there any specific considerations to bear in mind?This article will answer all of the above questions related to caching in WordPress:The importance of caching in WordPressWhat is caching?To begin with, let us take a moment to familiarize ourselves with the process of caching in general.In simple terms, caching refers to the process of creating static versions of your content, and serving that to visitors. Static pages are generally rendered quickly in browsers. This leads to faster performance of your website.In WordPress , rendering or fetching a page (or post or custom post type) requires back and forth queries to be sent to and from the database. Now, more often than not, you will create a post or a page and then you wont be updating it everyday. Caching creates static copies of your post or page, and serves that to visitors. This way, the back and forth queries to and from the database can be avoided, thereby reducing the server load.The benefits of cachingThere are various benefits of caching in WordPress, such as: First up, it enhances the speed and performance of your website. Static cached files load faster than dynamic database queries, and this leads to faster and better performance of your website. Caching can also help reduce the load on your hosting server. This can save server memory and I/O operations. As a result, caching is fast becoming a vital feature, especially for folks with limited hosting plans. Faster websites do not just load fast, but also get a favorable rank with search e ngines. This, obviously, depends heavily on other metrics as well, such as the quality of your content and your SEO settings. But all other things being constant, a website that loads faster will getter a better pagerank than a slower one. Google has confirmed that it takes pagespeed in consideration. Cached websites provide for a better user experience overall. A faster site helps users browse better. Furthermore, cached site means that the users bandwidth is also saved (albeit by a nominal margin), since static cached pages are less in terms of filesize as compared to dynamic requests. To make this happen, your caching solution must make use of combined and minified JavaScript and CSS, apart from just basic page caching. Impressed already? But how do you enable caching in WordPress? The easiest way to do so is by means of plugins. There are several free and premium WordPress plugins out there that help you to enable caching on your website. We shall take a look at some of the key ones here:Popular WordPress caching pluginsWP Super Cache WP Super Cache Author(s): AutomatticCurrent Version: 1.7.0Last Updated: August 16, 2019wp-super-cache.1.7.0.zip 86%Ratings 30,859,198Downloads WP 3.1+Requires WP Super Cache is a free WordPress plugin with over a million active installations. It generates static HTML files for your WordPress site. This way, your website functions faster than a non-cached site.WP Super Cache is a simple plugin, but it offers good scope for customization as well. You can also make it work in sync with your CDN service. WP Super Cache is a safe bet if you are new to caching in WordPress and are looking for a plugin that is under steady development,W3 Total Cache W3 Total Cache Author(s): Frederick TownesCurrent Version: 0.10.1Last Updated: September 11, 2019w3-total-cache.0.10.1.zip 86%Ratings 17,209,595Downloads WP 3.2+Requires W3 Total Cache is another extremely popular caching plugin for WordPress users, with over a million ac tive sites. Unlike other cache plugins, W3 Total Cache does more than just generation of static pages. It can also help you minify and compress your scripts, and leverage various other tools to further speed up your site.Demo videoAs expected, W3 Total Cache is a rather complicated plugin with a slightly steeper learning curve. If you are relatively newer to WordPress caching plugins, this one might be overkill for you.WP Fastest Cache WP Fastest Cache Author(s): Emre VonaCurrent Version: 0.8.9.8Last Updated: September 22, 2019wp-fastest-cache.0.8.9.8.zip 96%Ratings 12,735,516Downloads WP 3.3+Requires WP Fastest Cache generates static HTML pages of your content to speed up page load times. In addition to WordPress caching, it also offers various performance optimization options, such as the ability to minify HTML and CSS and speed up JS scripts.WP Fastest Cache also supports GZip compression that can be used to reduce the size of files sent from your server. This plugin is f ree, but is backed by a premium version that comes with added features, such as the ability to integrate with CDN services.Cache Enabler Cache Enabler WordPress Cache Author(s): KeyCDNCurrent Version: 1.3.4Last Updated: May 14, 2019cache-enabler.zip 86%Ratings 520,324Downloads WP 4.6+Requires Cache Enabler is a relatively newer WordPress plugin. It offers an extremely simple and easy to use interface. In other words, this pluginà does what it is meant to do cache your content and serve static cached pages to visitors.Cache Enabler is probably meant for you if you need a simple cache solution. This plugin does not involve heavy configuration or settings. It simply works out of the box. On the other hand, if you are used to something that offers granular control over every aspect of caching, Cache Enabler might seem rather unimpressive to you.Note that since Cache Enabler is a new plugin, it is way less popular than the other entries on this list (currently, it has over 60 00 active installs).Comet Cache Comet Cache Author(s): WP SharksCurrent Version: 170220Last Updated: May 20, 2019comet-cache.170220.zip 90%Ratings 395,422Downloads WP 4.2+Requires Comet Cache offers caching features such as generation of static HTML pages, as well as optimization features like GZip compression. It supports both browser and server-side caching. Currently, Comet Cache has over 30,000 active installs.Comet Cache also has a Pro version, that lets you do stuff such as integrate with CDN services, run custom PHP code, enforce canonical URLs, etc. The Comet Cache interface is slightly confusing though, and not as clean as that of the other plugins on this list. You might need some time before you get used to it.WP RocketWP Rocket is a premium solution, but it has been proven to deliver perhaps the best results out of all WordPress caching tools on the market. (This is probably the charge money.)WP Rocket is easy to set up, and also offers more individual features c ompared to the other plugins on this list. It is also the caching solution that we use on this very blog.ConclusionCaching in WordPress is very much like every other optimization and performance related tweak. It needs to be done together with other measures to truly work. If you really want to speed up your site, you should also go through these quick wins for site speed.Having a good cache solution always helps. If your site fails to load fast, you will lose business and visitors. As such, you should consider setting up a cache plugin on your site at the earliest.Which WordPress cache plugin do you use and why? Share your views in the comments below!Free guide5 Essential Tips to Speed Up Your WordPress SiteReduce your loading time by even 50-80% just by following simple tips.
Sunday, November 24, 2019
Victim in Late Elementary and Early Secondary Education Essays
Early Risk Factors for Being a Bully, Victim, or Bully/Victim in Late Elementary and Early Secondary Education Essays Early Risk Factors for Being a Bully, Victim, or Bully/Victim in Late Elementary and Early Secondary Education Essay Early Risk Factors for Being a Bully, Victim, or Bully/Victim in Late Elementary and Early Secondary Education Essay Essay Topic: Elementary 26 Nov. 2012 Early risk factors for being a bully, victim, or bully/victim in late elementary and early secondary education. The longitudinal TRAIL study By Danielle EMC Jansen, Rene Veenstra, Johan Ormel, Frank C Verhulst and Sijmen A Reijeveld This research discusses the influence of early risk factors on later involvement in bullying. In the beginning of the article, the authors mentioned that while bullying is a serious problem in school all over the world, the most researches on bullying focus on characteristics of children at the moment they already are involved in bullying. Thus there are limited data regarding the impact of early risk factors in bullying. They examined the influence of preschool behaviors, family characteristics, and parental mental health on bullying and victimization. Their examination includes obtaining data of family characteristics, parental mental health and retrospectively on childrenââ¬â¢s preschool behavior with survey method. Then, they measured the schoolmateââ¬â¢s reports for involvement of adolescents in bullying or victimization at age 11 and 13. 5. As the research conclusion, variety of aspects such as behavior in preschool, emotional problem, motor problem, socio-economic status, and family breakup, are linked to the involvement in bullying at a later age. The authors emphasize that focusing on risk groups in early age enhances prevention of bullying and its consequences. In this article, the authors are indicating the problem that bullying is a significant issue all over the world, and that there are only limited evidence that associate features of children background before they were involved in bullying. As a solution to this problem, the authors wanted to seek the risk factors; especially before children begin social relationship. They designed their research to examine the impact of the childrenââ¬â¢s background during the preschool age on bullying at the early teen age. The study subjectsââ¬â¢ family characteristics include parental mental health, and preschool behavioral, emotional problem and motor problem. I believe this research design is appropriate for the solution of the problem. The ethods of sampling they use were survey and peer nomination from schoolmates; survey is to measure childrenââ¬â¢s background in preschool hood, peer nomination is to measure involvements in bullying as being bully, bully/victim, or victim. I assume that the sampling methods are appropriate because there are limited contaminations such as experimenterââ¬â¢s bias or base rate problems. The possible confounding variables are gender, diagnoses of development disorders, stress level, and history of heredity mental disease through family. When measuring the behavior, the gender is always the possible confounding variable. Boys and Girls have different preferences of toys, ways of playing, and tension level. The diagnoses of development disorders such as ADD or ADHD are major confounding variables for the measuring childrenââ¬â¢s behavior as well. The main limitation of the data collection was that they used retrospective reports of preschool behavior. As a result, parental report may have been affected by inaccuracies in their memory. Other than that, I could say that the data gathering method is reliable and also valuable because the results were based on facts. As a result of their research, preschool children with aggressiveness were more likely to be a bully, bully/victim, and victim. Preschool children with good motor skill were more likely to be bully and less likely to be victim. Children from low socioeconomic status families were more likely to be bully, bully/victim, and victim. Children from intact two parent families were more likely to be uninvolved in bullying. After considering the entire research outcomes, the authors concluded that certain aspects from children in preschool are related to involvement in bullying at a later age. Thus I could say that the evidence substantiated this conclusion. Focusing on risk at an early age can enhance the prevention of bullying. The research results are very interesting and informative. It helped me as a parent, to realize the importance of preschool social and environmental factors of bullying at later ages. I chose this article for the discussion on this short paper because I am interested in parenting techniques. The way to raise children without involvement of bullying, neither being a bully nor a victim. I do not want my children to get involved with any fears or sadness in school caused by bullying. I believe many often parents feel the same way. I have never experienced any aspect of bullying during my early school age. However I have heard of many stories about bullying in our school and resulted in psychological trauma or injury. I believe that being strong physically and emotionally are very important to escape from bullies. Joining sports clubs is one of the great ways to become stronger physically and emotionally. My four year old son, has recently has joined a flag football team. Being a member of this team will help him obtain the physical ability and emotional development. After he learned how to efficiently run faster and move quickly, he achieved well during the games. When he did well during games, he was encouraged by positive feedbacks from adults. The positive feedback from adults is powerful tools that will help him build up confidence. Another great aspect of being a part of sports team is the opportunity to gain social skill such as fairness, care, respect, and responsibility. Being a fair and trustworthy player is very important for sportsmanship. Coaches and older players are always encouraging children to be fair and trustworthy. Practicing with the same teammates two to three times a week helps children to build a powerful trust and make great relationship with their teammates. Children can learn many lessons from small societies like a sports team to prepare for their real life. Another thing that I learned from this research article is the importance of family environment. I realize that children are very sensitive to their family characteristics and affected easily from negative family factors such as fighting among parents and family break ups. I remembered the time when I was a child, I hated when my mother and father were arguing in front of me. I was sad and unhappy hearing their fighting voices. Thus I can easily imagine how sad to be in the middle of parental conflict in their childhood. To provide the environment without anxiety from parental conflicts, mental issues or family break up is very important for make a strong and mentally stable person.
Thursday, November 21, 2019
No fixed topic Essay Example | Topics and Well Written Essays - 2250 words
No fixed topic - Essay Example The four famous composers of this period included Dunstable, Despres, Ockeghem, and Dufay. Following the beginning of tradition in the sixteenth century, many people who were interested in music readily associated themselves with the classical music leading to the abandonment of the model system of the harmonic music. Many music composers shifted from composing harmony music and started composing classical. Composers moved away from composing these traditional types of music, which had lasted for over three hundred years introducing a strong sensation in songs with a definite tonal key (Gangwere 256). This was also termed as a golden period since many masses, anthems, motets, and madrigals followed this new form of music. In addition, this high demand of music lead to the establishment of instrumental music especially keyboard music, which was in the form of fantasies, variation, and dance movements. Some of the note-composers who emerged during this period included Dowland, Byrd, Vi ctoria, Lassus, Cardoso, and many others. During 11th century, one of the genius music composers Guido applied the concept of music to stringed instruments. His diatonic scale, which had eight full tones and seven intervals with two semitones, was the first keyboard to be in use. This type of keyboard had only twenty keys. There are no reliable historical sources showing the first person who applied the concept of the chromatic scale. Later on in 1548, Guiseppe Zarlino added the remaining two semitones to his keyboard. During the sixteenth century, almost every keyboard manufacturers used chromatic scale, which the same thing associated with the modern pianos. Since the development of keyboard, many amendments have been made to the chromatic keyboard to perfect its performance. In 1811, Dr. Krause constructed an improved keyboard whose semitones were of the same level, and all the keys had a uniform color. Later, another piano maker from Vienna constructed a keyboard in the form of concave. The aim of constructing concave-formed keyboard was to follow the learning of the keyboard playersââ¬â¢ arm. This is evidence that, the modern keyboard has gone through many amendment, especially the concept of the keys layout. The layout of the whole and semi-tones has evolved over centuries (Gangwere 272). 5. Examine how Enlightenment philosophy and the spirit of capitalism influenced the music of the Classical period. The enlightenment age began in 17th through the 18th century. This was a cultural movement, which started first in Europe and later in the America. The main purpose of enlightenment age was to bring change to the society helping people abandon their traditional believes and cultural practices, and advancing their living standards through scientific measures. It promoted scientific knowledge, which brought intellectual change hence opposing traditional cultures like power abuses by churches and state. This idea of enlightenment had many impacts on culture , politics, and western government. Enlightenment philosophy had great impacts on art. It brought some emphasis on learning whereby arts and music became widespread especially among the middle class people. It also led to the establishment of many study areas where literature, philosophy, science, and expensive art
Wednesday, November 20, 2019
Change Management Methods Essay Example | Topics and Well Written Essays - 2000 words
Change Management Methods - Essay Example When an organization changes its overall strategy for success, adds or removes a major portion of its management or changes its management practice, the effect can be felt. It also occurs when an organization evolves through various life cycles, just like people must successfully evolve through various life cycles. ââ¬Å"For organizations to develop, they often must undergo significant change at various points in their development. That's why the topic of organizational change and development has become widespread in communications about business, organizations, leadership, and managementâ⬠.There are different types of organizational change, including planned and unplanned. Change management involves a considerable amount of planning and requires insightful implementation. And above all, the people who are affected by the change must be consulted and involved in the entire process. If you want to enforce a change one can usually find a lot of people related problems arising out of it. One must remember that the change must be achievable, measurable and realistic. Organization-wide change in corporations should involve the Board of Directors. Whether the members are closely involved in the process of change or not; they should at least be aware of the change project and monitor if the results are being achieved.Changes in management can be divided into two categories. One is based on individual change while the other is based on the organization. There a re few principles of change management.
Sunday, November 17, 2019
Slang and Its Relation to Society Essay Example | Topics and Well Written Essays - 2000 words
Slang and Its Relation to Society - Essay Example Slang words or phrases were met with aversion and displeasure, as opposed to nowadays when people find no hesitation in using slang expressions in everyday conversations. Some used to believe that words like gambler and conundrum should be forbidden1. During the Middle Ages, where there was a great deal of difference in pronunciations between many regions, was when the word ââ¬Ëslangââ¬â¢ actually came into being. It was unlike the slang we use today because then it only represented the various ways in which the people delivered their speech in the same language. Then in the 16th century, the English Criminal Cant came into being, which was the language mostly used by convicts, and was more close to the slang we use today. Gradually, this form of communication became popular and was believed to be a language without reason or order2. But as time passed, slang began to develop. Scholars such as Walt Whitman regarded anything that sounded new, as slang. It gained popularity and w as no longer deemed as the language of thugs or foreigners and also caught the attention of popular writers. In todayââ¬â¢s world, slang is mostly used by subculture groups whose members want to appear distinct from others. They use certain codes and terms which are regarded as slang and can only be understood by the people belonging to their group. It separates them from the common population and somehow deepens their affiliation with the group. By using their own informal way of conversing, they feel a sense of belonging and attachment to the other members. Each subculture group has its own slang. Whether itââ¬â¢s the doctors, lawyers, teenagers or criminal, all of them have their own way of communicating with each other, and it acts as a distinguishing factor between them. Medical slang is the kind used by doctors and their staff, to converse among themselves, without letting the patient or other people know what they are talking about. ââ¬ËWhatââ¬â¢s up?ââ¬â¢ is a n extremely popular slang used widely by people of all ages? It is used to merely learn what the other person is up to. Slang has become significantly popular among criminals and drug dealers. As they have to keep their conversations restricted and private in the presence of other people, an extensive list of slang phrases has been created by them to replace the standard terms. In Oliver Twist of Charles Dickens, the conspirator is named Fagin. Therefore from then on, Fagin has become parallel to a partner in crime. Gamblers and dealers have also come up with their own slang expressions. A gambler might use various terms to notify his fellow team player of the current status of the game or what move the person will be making next. Slang has been described as verbal invention keeping in mind the cultural framework3. Although slang has gained popularity over time, even today it has mixed views amongst the masses. Some consider as useful and applicable in almost any situation, while ot hers consider it as rebellious. People who support slang often consider it as a reflection of the intelligence and witticism of the person who uses it and senses it as a clever variation in the standard language. Other people, however, criticize the use of slang and believe that it ruins the impression one person has on the other.
Friday, November 15, 2019
Vulnerability Assessment and Penetration Testing Comparison
Vulnerability Assessment and Penetration Testing Comparison Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any organizations as result of increasing attacks. There exists different approaches to mitigate various security risks are defensive coding, hardening (Firewall), Monitoring and auditing. This solutions found more towards prevention of attacks or of monitoring types of. Vulnerability assessment and Penetration testing are two approaches widely used by organizations to assess web application security. Both solutions are different and complimentary to each other. In this paper comparison of these two approaches are provided. Authors found that penetration testing is better compare to vulnerability assessment as it exploits vulnerability, while vulnerability assessment is superior in terms of coverage over penetration testing. General Terms Vulnerability Measurement, Penetration Testing Keywords Attack, Vulnerability, Security Risk, VAPT, 1. INTRODUCTION Web application usage has increased as more and more services are available on web. Business using Web applications is also increasing day by day. On other side, web application based attacks have increased. Web application have become main target of attackers. Major impact of attacks is data loss or financial loss or reputation loss. Various types of countermeasures exists to protect system against attacks like defensive coding, firewall, Intrusion detection system etc. [15]. The solution exists in two categories: proactive and reactive. To secure web applications, thorough study of vulnerabilities is required. Study will help in taking effective actions. Vulnerability measurement and Penetration testing are widely used approaches by organizations for web application security assessment. In this paper, authors have compared vulnerability assessment and penetration testing. The rest of the paper is organized as follows. Vulnerability assessment is discussed in section 2, Penetration testing is discussed in Section 3. Section 4 describes comparison between vulnerability assessment and penetration testing. Conclusion is described in section 5. 2. Current Web Application Security Trends The number of internet users and websites are increasing rapidly in recent years [9]. Approximately 66% of web applications have problem as per Gartner. According to sophisticated vulnerability assessment tools 60% vulnerabilities can be found in most of web applications [12]. Security measures most commonly applied for web application security are firewalls, Intrusion Detection System (IDS), Anti-virus System and defensive coding [14][15]. This solution either requires developer skills or efforts in common [15]. These solutions provide a way to assess system, while organizations need a way to assess security countermeasure assessment. It is also necessary to assess web application periodically against security risks in order to take effective actions. 3. Vulnerability Assessment Vulnerability is a weakness or flaw in a system. Reasons for vulnerability existence are weak password, coding, input validation, misconfiguration etc. Attacker tries to discover vulnerability and then exploit it. Vulnerability assessment is a proactive and systematic strategy to discover vulnerability. It is used to discover unknown problems in the system. It is also required by industry standard like DSS PCI from compliance point of view. Vulnerability assessment is achieved using scanners. It is a hybrid solution, which combines automated testing with expert analysis. Figure 1: Vulnerability Assessment Process Vulnerability assessment is a one step process ( Refer to figure 1). We will learn more details about vulnerability assessment in section 5. 4. Penetration Testing A penetration testing evaluates the security of a computer system or network by simulating an attack. It is a proactive and systematic approach for security assessment. Figure 1: Penetration Testing Process Penetration testing is a two steps process (refer to figure 2). We will learn more details about penetration in next section. 5. Comparison 5.1 Generic 5.2 Resource Requirements 5.3 Testing 5.4 Results 5.5 Limitations Major limitations of Vulnerability Assessments are: à ¯Ã¢â¬Å¡Ã · Cannot identify potential access path à ¯Ã¢â¬Å¡Ã · Provides false positive à ¯Ã¢â¬Å¡Ã · Requires high technical skills for tester à ¯Ã¢â¬Å¡Ã · Hybrid solution à ¯Ã¢â¬Å¡Ã · Cannot exploit flaws Major limitations of Penetration testing are: à ¯Ã¢â¬Å¡Ã · Identifies potential access paths à ¯Ã¢â¬Å¡Ã · Identifies only those which poses threats à ¯Ã¢â¬Å¡Ã · May not identify obvious vulnerability à ¯Ã¢â¬Å¡Ã · Cannot provide information about new vulnerabilities à ¯Ã¢â¬Å¡Ã · Cannot identify server side vulnerabilities 6. Conclusion With the exception of coverage, penetration testing is superior to vulnerability management. Key benefits of penetration testing over vulnerability assessment are: Technical capability required in penetration testing is low compare to vulnerability assessment Can be used runtime With penetration testing we can detect, confirm and exploit vulnerability. With penetration testing can determine the resulting impact on the organisation. For effective security, it is important to understand vulnerability in details. Both are complimentary strategies to each other and proactive. We suggest to use both together. 7. REFERENCES Vulnerability Assessment and Penetration Testing: http://www.veracode.com/ security/vulnerability-assessment-and-penetration-testing John Barchie, Triware Net world Systems, Penetration Testing vs. Vulnerability Scanning: http://www.tns.com/PenTestvsVScan.asp Penetration Testing Limits http:// www.praetorian.com/blog/penetration-testing-limits Vulnerability Analysis, http://www.pentest-standard.org/index.php/ Vulnerability Analysis Open Web Application Security Project, https://www.owasp.org/index.php/Category: Vulnerability Penetration Testing: http://searchsoftwarequality .techtarget.com/definition/penetration-testing Vulnerability Assessment and Penetration Testing: http://www.aretecon.com/aretesoftwares Ankita Gupta, Kavita, Kirandeep Kaur: Vulnerability Assessment and Penetration Testing, International Journal of Engineering Trends and Technology- Volume4 Issue3- 2013, ISSN: 2231-5381 Page 328-330 Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt and Andrew J.C. Blyth: PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Originally published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010 available at : http://ro.ecu.edu.au/icr/16 You Yu, Yuanyuan Yang, Jian Gu, and Liang Shen, Analysis and Suggestions for the Security of Web Applications,, International Conference on Computer Science and Network Technology, 2011, 978-1-4577-1587-7/111, IEEE Andrey Petukhov, Dmitry Kozlov, Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing, https://www.owasp.org/images/3/3e/OWASP-AppSecEU08-Petukhov.pdf accessed on 31st January 2015 Parvin Ami, Ashikali Hasan: Seven Phrase Penetration Testing Model,International Journal of Computer Applications (0975 ââ¬â 8887),Volume 59ââ¬â No.5, December 2012 Aileen G. Bacudio, Xiaohong Yuan, Bei-Tseng Bill Chu, Monique Jones,an overview of penetration testing, International Journal of Network Security Its Applications (IJNSA), Vol.3, No.6, November 2011 DOI :10.5121/ijnsa.2011.3602 Jignesh Doshi, Bhushan Trivedi, Assessment of SQL Injection Solution Approaches, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 10, October 2014 ISSN: 2277 128X 1
Tuesday, November 12, 2019
Case Study On NOL Essay examples -- Business Analysis Strategy
Introduction In November 1997, the acquisition of APL by NOL was successful. As compared to the larger US based APL; NOL was a small Singapore firm. Through this acquisition, it appeared that NOL was ready to become an industry leader in the shipping industry. Thus this acquisition is a strategy through which NOL buys a controlling, 100 per cent, interest in APL with the intent of making the acquired firm a subsidiary business within its portfolio. Thus APL became a wholly owned subsidiary of Singapore based NOL, a global transportation and logistics company engaged in shipping and related businesses. Below is the study of the problems and strategies that NOL faced or is facing during the acquisition and integration of APL. Issues/Challenges facing NOL/APL 1) Agency Relationships There were separate management structures maintained in the group with the CEO of NOL in Singapore and CEO in the United States reporting to the group CEO. This separation between owners and manager creates an agency relationship. This exist when one or more persons (the principal or principals) hire another person or persons) as decision making specialist to perform a service. In the modern corporation, managers must understand the links between these relationship and the firms effectiveness. The agency relationship between managers and their employees is important as this is related directly to how the firmââ¬â¢s strategies are implemented. This separation between ownership and managerial control in this instance can be problematic as the principal and the agents have different interests and goals. In a large publicly traded corporation such as NOL/APL, shareholders (principals) lack direct control when the CEOs (agents) make decisions t... ...el ââ¬â with its focus on yield, value-added services, high asset utilization and cost management In Terminals, we are focused on boosting productivity and capacity in areas targeted by our Container Shipping business. Our Logistics unit is driving for synergistic growth, developing and securing its links to Container Shipping Core competency Best in the world at moving and managing containerized trade, providing a lifeline for the global economy. APL Resources Tangible Technological State of the art information technology Intangible Reputational 150 years of shipping tradition Capabilities Provide worldwide coverage across all the major trade lanes. Industry-leading schedule reliability Human Resources Excellent customer service Core competency Seamless global connectivity
Subscribe to:
Posts (Atom)