Posts

Upward Flow of Communication

• Communication that flows to a higher level in an organization is called upward communication. • It provides feedback on how well the organization is functioning. • The subordinates use upward communication to convey their problems and performances to their superiors. • The subordinates also use upward communication to tell how well they have understood the downward communication. • It can also be used by the employees to share their views and ideas and to participate in the decision-making process. By Eve, FIMS University of Nairobi

HOW BONDS WORK

Bonds are commonly referred to as fixed income securities and are one of three  classes individual investors are usually familiar with, along with stocks and cash equivalents. Many corporate and government bonds are publicly traded; others are traded only over-the-counter or privately between the borrower and lender. When companies or other entities need to raise money to finance new projects, maintain ongoing operations, or refinance existing debts, they may issue bonds directly to investors. The borrower (issuer) issues a bond that includes the terms of the loan, interest payments that will be made, and the time at which the loaned funds (bond principal) must be paid back ( maturity date ). The interest payment (the coupon) is part of the return that bondholders earn for loaning their funds to the issuer. The interest rate that determines the payment is called the  coupon rate . The initial price of most bonds is typically set at  par , usually...

BENEFITS OF MERGERS

1. Economies of scale. It occurs when a larger firm with increased output can reduce average costs. Lower average costs enable lower prices for consumers. Different economies of scale include: Bulk buying – A bigger firm can get a discount for buying large quantities of raw materials Financial – better rate of interest for large company Organisational – one head office rather than two is more efficient A merger can enable a firm to increase in size and gain from many of these factors. 2. International competition . Mergers can help firms deal with the threat of multinationals and compete on an international scale. This is increasingly important in an era of global markets. 3. Mergers may allow greater investment in R&D  T he new firm will have more profit which can be used to finance risky investment . This can lead to a better quality of goods for consumers. This is important for industries such as pharmaceuticals which require a lot of i...

Mobile Phone Hacking Applications & Techniques

What is Phone hacking It is the practice or action of getting unauthorized access to information and data stored in another individual’s phone. The level of access you can get depends on your abilities. Why should someone hack into a cell phone? 1.  How to hack a cell phone to protect your kid · The latest statistics have shown that a huge number of kids, especially teenagers own a cell phone. · Parents want their kids to have a cell phone so they can call them whenever they want to hear their voice and determine their location. ·           However, owning a cell phone as a kid brings some risks too. · First of all, kids can be tricked by people with bad intentions when they use text messages or when they use the Internet. · Additionally, kids can decide to skip school and not answer their phones when their parents are calling. ·           These are some of the situations when you definitely want to know ...

SYSTEM HACKING

System Access —   System access is the ability for an unauthorized intruder to gain access to a system or device for which the intruder does not have an account or a password. —   Entering or accessing systems to which one does not have access usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked. System Access Techniques —   System Access (also known as System Hacking ) follows: foot printing / Reconnaissance phase. —   System-hacking phase in a single pass - It involves using a methodical approach that includes: ◦       cracking passwords, ◦       escalating privileges, ◦       executing applications, ◦       covering tracks - concealing evidence, and then ◦       Pushing into a more involved attack.  By Eve, The University of Nairo...

BUSINESS PROCESS RE-ENGINEERING

Business Process Re-engineering also commonly known as BPR involves the radical redesign of core business processes to achieve dramatic improvements in productivity, cycle times and quality. In BPR, companies start with a blank sheet of paper and rethink existing processes to deliver more value to the customer. They typically adopt a new value system that places increased emphasis on customer needs. Companies reduce organizational layers and eliminate unproductive activities in two key areas. -First, they redesign functional organizations into cross-functional teams. -Second, they use technology to improve data dissemination and decision making. How Business Process Re-engineering works: Business Process Re-engineering is a dramatic change initiative that contains five major steps that managers should take: ·          Refocus company values on customer needs ·          Redesign core process...

ETHICAL HACKING

    Most people think hackers have extraordinary skill and knowledge that allow them to hack into computer systems and find valuable information. The term hacker conjures up images of a young computer whiz who types a few commands at a computer screen and poof! the computer spits out passwords, account numbers and other confidential data.     In reality, a good hacker, or security professional acting as an Ethical Hacker , just has to understand how a computer system works and know what tools to employ in order to find a security weakness. Most ethical hackers are in the business for hacking for profit, an activity known as Penetration Testing or Pen Testing . Pen testing is usually conducted by a security professional to identify security risks and vulnerabilities in systems and networks.     The purpose of identifying risks and vulnerabilities is so that a counter measure can be put in and the risk mitigated to some degree. Ethical ...