Blackhole

In: Business and Management

Submitted By anyesha
Words 9921
Pages 40
The black hole of South-East Asia: strategic decision making in an informational void

George T. Haley Senior Lecturer, Faculty of Business, Queensland University of Technology, Brisbane, Australia Chin-Tiong Tan Associate Professor, Faculty of Business Administration, National University of Singapore, Singapore

Proposes that most managers and researchers acknowledge that emerging and newly industrialized markets do not have the same quantity of secondary data as the longindustrialized economies of North America and Western Europe. Presents the results of a search of available, business-related, secondary data on South-East Asia’s rapidly growing economies; highlights how this dearth of data has resulted in an informational void that affects the practice of strategic management in the region. Also delineates how regional managers cope with and adapt to the informational void, and to the region’s fastchanging business, cultural and competitive environments, by developing their unique, highly-intuitive style of strategic management. Finally provides some suggestions to bridge this informational void for management practice and for future research.

The authors thank the Guest Editor, Dr Usha C.V. Haley, two anonymous reviewers, and Comet, for their excellent comments and suggestions.

Management Decision 34/9 [1996] 37–48 © MCB University Press [ISSN 0025-1747]

An old adage posits that the quality of one’s decisions depends on the quality of one’s information. The more complex the situation, the more important that one has appropriate data to analyse, to understand the situation better, and to make an optimal decision. Few organizations demonstrate more complexity than multinational corporations (MNCs), and few environments show more complexity than South-East Asia. Yet, with respect to the information necessary for sound strategic decision making,…...

Similar Documents

One Genre Fits All?

...horror and action in the film through the use of techniques such as; suspenseful non-diegetic sounds, low saturation, violence etc. Being a hard Sci-Fi Film, the addition of elements from the thriller, horror and action genres fit well with the idea of being stuck on a planet with aliens. A very important element that allows Science Fiction to be unique even though it has other genres integrated through it is that no matter what the cross genre in the film, a Sci-Fi movie always makes a social comment (usually about the future) and also often has a strong female protagonist. Both of these elements appeal to people of modern society as they can relate to it. These can be seen in Scott Ridley’s film Alien and Geraldine Stowe’s short story Blackhole. Scott Ridley’s 1979 film Alien is as Roger Ebert reviews ‘a great original.’ The famous hard sci-fi movie ticked all the boxes as to what’s in sci-fi movie with its sci-fi look of a metallic spaceship and robotic commanders making it appeal to many people. ‘At its most fundamental level, Alien is a movie about things that can jump out of the dark and kill you.’ states Ebert. We see the cross genre classification used with elements of the horror and thriller genres integrated through the film. Ridley carefully uses film techniques from these genres such as suspense and low saturation from the second the title and catch phrase ‘In Space no one can hear you scream’ come on screen. There are many social comments made throughout......

Words: 1302 - Pages: 6

Intro to Physical Science

...the spectrum we observe from stars beyond the interstellar gas. The further a star is, the more absorption will be observed since the light has passed through more of the interstellar medium. Period-luminosity relation: Some stars are regular pulsators. The physics of their pulsations is such that the period of one oscillation is related to the luminosity of the star. If we measure the period of such a star, we calculate its luminosity. From this, and its apparent magnitude, we can calculate the distance. See: Allen J.,Boyd P. (1997,April 15) One of the new techniques used for direct measurement is the Radio Astronomy technique.This technique precisely measures the linear and angular size of a disk material orbiting the galaxy’s central blackhole by the use of the radio signals observed by the telescopes. James Braatz of the National Radio Astronomy Observatory (NRAO) quoted “"We measured a direct, geometric distance to the galaxy, independent of the complications and assumptions inherent in other techniques," see Thompson A.(2009,June 8). A significant tool used in astronomy is the telescope and recently the worlds largest radio telescope-the Atacama Large Millimeter Array (ALMA) is operational in the Chilean dessert this telescope is a linked array of 66 dishes, capable of resolving a golf ball at nine miles. That’s ten times the Hubble space telescope’s resolution! How does the ALMA see so far, so accurately? It has one of the most powerful special-use supercomputers,......

Words: 1119 - Pages: 5

Seminar

...entries of all reachable nodes in the network. The entries in routing tables are of the form: < Destination, Next Hop, No. of hops, Sequence Number >. Sequence number is used to maintain freshness. The route table is used to route data packets destined for a particular node and to respond to ROUTE REQUEST. The advantage of AODV over DSR is that, a data packet does not need to contain whole route to the destination. • Symmetric Key Cryptograpy. • Public Key Cryptograpy. • Authentication and Digital Signatures. • Hash and Message Authentication Codes (MAC) • Man-in-the-middle attack, Denial of Service Attack • Jamming. • Snooping. • Flood Storm attack. • Packet Modifications and Dropping. • Repeater attack. • Identity Impersonation. • BlackHole attack. • Wormhole attack. 4 Security MANETs Problems in • Rushing attack. MANETs are much more vulnerable to attack than wired network. This is because of the following reasons All these attacks are discussed in further subsections: : • Open Medium - Eavesdropping is more easier than in wired network. • Dynamically Changing Network Topology - Mobile Nodes comes and goes from the network, thereby allowing any malicious node to join the network without being detected. • Cooperative Algorithms - The routing algorithm of MANETs requires mutual trust between nodes which violates the principles of Network Security. • Lack of Centralized Monitoring - Absence of any centralized infrastructure prohibits any monitoring agent......

Words: 7859 - Pages: 32

Networkin

...through the Broadwing backbone. (4) Attacking BGP  Misconfigurations  Misconfigurations are quite common in practice, and they can cause the same problems that an attack could cause.  April 25 1997: AS7007 flooded the Internet with incorrect advertisements, announcing AS7007 as the origin of the best path to essentially the entire Internet.  April 7 1998: AS8584 announced about 10,000 prefixes it did not own.  April 6 2001: AS15412 announced about 5,000 prefixes it did not own.  Attacking assumptions  Attackers have already compromised and taken complete control of one or more BGP speakers.  Objectives of an attacker  Blackholing: occurs when a prefix is unreachable from a large portion of the Internet.  Intentional blackhole routing is used to enforce private and non-allocated IP ranges.  Malicious blackholing refers to false route advertisements that aim to attract traffic to a particular router and then drop it.  Redirection: occurs when traffic flowing to a particular network is forced to take a different path and to reach an incorrect, potentially also compromised, destination.  Subversion: is a special case of redirection in which the attacker forces the traffic to pass through a certain link with the objective of eavesdropping or modifying the data.  Instability: can be caused by successive advertisements and withdrawals for the same network.  Fraudulent Origin Attacks  A malicious AS can advertise incorrect information through BGP UPDATE......

Words: 4513 - Pages: 19

Manet

...in MANETs can be di¬vided into two categories: ¢ Route Logic Compromise: Incorrect routing control messages are injected into the network to damage routing logic. ¢ Traffic Distortion Attack: All attacks that pro-hibits data packets to transfer from the source to the destination, either selectively or collectively comes under the category of Traffic Distortion At-tack. This type of attack can snoop network traf¬fic, manipulate or corrupt packet header or con¬tents, block or reply transmissions for some mali¬cious purposes. The list of some of the attacks in MANETs is as follows: ¢ Jamming. ¢ Snooping. ¢ Flood Storm attack. ¢ Packet Modifications and Dropping. ¢ Repeater attack. ¢ Identity Impersonation. ¢ BlackHole attack. ¢ Wormhole attack. ¢ Rushing attack. All these attacks are discussed in further subsections: 4.1 Jamming Accidentally or Intentionally, interference can happen with radio waves of MANETs, because WLANs use unlicensed radio frequencies (ISM band ). Other elec-tromagnetic devices operating in the infrared or 2.4 GHz radio frequency can overlap with WLAN traffic. If attacker has a powerfull transmitter, he/she can gen-erate a radio signal strong enough to overwhelm weaker signals, disrupting communications. This condition is called jamming. Jammers can be of two types: ¢ High power pulsed full band jammers. ¢ Low power partial-band jammers. Jamming attacks can be mounted from a location re-mote from the targeted......

Words: 8182 - Pages: 33

Blackhole

...10 Effective Teaching Techniques: How to capture and maintain your student in Science and Mathematics. Tip #1: Engage • Engage the students in material that has personal relevance and is meaningful i.e. real life examples and problems Tip #2: Variety • Give the students assignments that involve a variety of learning styles Research with books Technology Hand on Experiments Tip #3: Students Teaching • Provide times when students can teach each other the material within the classroom i.e. group presentations – Leadership – Ownership – Mastery Test #4: Review • Every other day or so, allot 10 minutes at the beginning of each class for students to discuss among themselves what they learned in previous lessons. Tip #5: Reward system • Implement a reward system for students to encourage them to take their learning outside the classroom • Reward students who can apply the material to real life examples • Reward students who improve from test to test • Reward students who engage in group discussions outside of the classroom to discuss ideas on how to use their knowledge to solve problems. Tip #6: Goals • Help students establish short term, self referenced goals at the beginning of the term and have them check up midterm to see if they are still on track to accomplishing their goals Tip #7: Stimulate group work • At the end of each class, present the students with a “challenge for the night” and allow students to work in groups of 3 or 4 to......

Words: 361 - Pages: 2

Tech Lag

...house, gets lost, tells me to go to addresses that don’t exist (like Starbucks that has been closed down). Transition: Speaking of dates..have you ever been on a date and your date is on their cell phone the entire time? II.Main Point: Who needs friends or dates? A. Support: 1. Going on dates with someone's cell phone 2. Too busy taking pictures (instagramming) of dinner instead of enjoying the taste B. Support: Have you ever been tried talking to your friends while they're texting? Having to repeat yourself a million times. Transition: What is that friend even doing on their cell phone? Looking up random useless information right? III.Main Point: Information Blackhole A. Support: Let me just go online for a second..10 hours later..WHAT HAPPENED and WHY DO I KNOW ALL THIS USELESS INFORMATION B. Support: 1. You can’t think of where you’ve seen a certain actor, so you go on the internet to try to find what movie they were in 2. What ends up happening is you look up their IMBD (a website showing all of their acting history) and you find out EVERY movie they’ve ever been in, and now you know all this useless information that’s taken you about 8 hours to read and find. CONCLUSION I. Summary: Technology sucks! We rely too heavily on it. Distracting – useless information. It’s taken over our daily lives, we need to get out and interact......

Words: 483 - Pages: 2

Ntc 360 Network and Telecommunications Concepts

...that may or may not contain information about nodes and domains. Some of these records have special assignments like the Start of Authority (SOA) record which is a special record included in every database file, these are sometimes called zone files. The SOA supplies certain basic information about the zone and is included in both forward and reverse zone files. The next resource record is the Name Server Record (NS). This record delegates a DNS zone to use the given authoritative name servers. NS was determined in RFC 1035. A third resource record is the Address (A) record, this resource returns a 32-bit IPv4 address, and is most commonly used to map host names to an IP address of the host, but can also be used for DNS block lists or blackhole lists (DNSBL) or storing subnet masks in RFC 1101. Further information regarding “A” can be found in RFC 1035. The Canonical Name Record (CNAME) resource detailed in RFC 1035 monitors’ alias of one name to another: DNS lookup will continue by retrying the lookup with the new name when determined. This is done by the Pointer Record (PTR). The PTR points to a CNAME but unlike a CNAME, DNS processing does not proceed, just the name is returned. The most common use is for implementing reverse DNS lookup but PTR can also be used for things like DNS-SD or DNS based service discovery. 4. For the following IP routing protocols: spell out their acronym, mark as distance-vector or link-state routing protocol, and mark as classful or......

Words: 2399 - Pages: 10

Netw 204 Entire Course Devry Latest

...store-and-forward. You are required to come up with advantages and disadvantages of using both cut-through and store-and-forward. What would your list entail? Provide support for each item in your list. (10 points) 3. Explain how each of the following commands below will impact the switched network? Which command is the default command used when setting up port-security on a Cisco switch? (10 points) Week 2 Homework Assignment VLAN 1. A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table. (10 points) 2. Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer (10 points) 3. List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range? (10 points) Week 3 Homework Assignment Inter-VLAN Routing 1. A Given the network diagram below. Enter the commands, including the router prompt, to configure the router, for router-on-a-stick. (10 points) 2. Given the network diagram below. Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. (10 points) 3. The organization added a new VLAN, VLAN......

Words: 1612 - Pages: 7

Netw 204 Entire Course Devry New

...store-and-forward. You are required to come up with advantages and disadvantages of using both cut-through and store-and-forward. What would your list entail? Provide support for each item in your list. (10 points) 3. Explain how each of the following commands below will impact the switched network? Which command is the default command used when setting up port-security on a Cisco switch? (10 points) Week 2 Homework Assignment VLAN 1. A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table. (10 points) 2. Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer (10 points) 3. List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range? (10 points) Week 3 Homework Assignment Inter-VLAN Routing 1. A Given the network diagram below. Enter the commands, including the router prompt, to configure the router, for router-on-a-stick. (10 points) 2. Given the network diagram below. Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. (10 points) 3. The organization added a new VLAN, VLAN......

Words: 1613 - Pages: 7

Netw 204 Entire Course Devry New

...store-and-forward. You are required to come up with advantages and disadvantages of using both cut-through and store-and-forward. What would your list entail? Provide support for each item in your list. (10 points) 3. Explain how each of the following commands below will impact the switched network? Which command is the default command used when setting up port-security on a Cisco switch? (10 points) Week 2 Homework Assignment VLAN 1. A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table. (10 points) 2. Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer (10 points) 3. List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range? (10 points) Week 3 Homework Assignment Inter-VLAN Routing 1. A Given the network diagram below. Enter the commands, including the router prompt, to configure the router, for router-on-a-stick. (10 points) 2. Given the network diagram below. Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. (10 points) 3. The organization added a new VLAN, VLAN......

Words: 3225 - Pages: 13

None

...WHOIS database. # # ARIN WHOIS data and services are subject to the Terms of Use # available at http://www.arin.net/whois_tou.html 192.168.0.103 Using 0 day old cached answer (or, you can get fresh results). Hiding E-mail address (you can get results with the E-mail address). OrgName: Internet Assigned Numbers Authority OrgID: IANA Address: 4676 Admiralty Way, Suite 330 City: Marina del Rey StateProv: CA PostalCode: 90292-6695 Country: US NetRange: 192.168.0.0 - 192.168.255.255 CIDR: 192.168.0.0/16 NetName: PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED NetHandle: NET-192-168-0-0-1 Parent: NET-192-0-0-0-0 NetType: IANA Special Use NameServer: BLACKHOLE-1.IANA.ORG NameServer: BLACKHOLE-2.IANA.ORG Comment: This block is used as private address space. Comment: Addresses from this block can be used by Page 15 of 20 Comment: anyone without any need to coordinate with Comment: IANA or an Internet registry. Addresses from Comment: this block are used in multiple, separately Comment: operated networks. Comment: This block was assigned by the IETF in the Comment: Best Current Practice document, RFC 1918 Comment: which can be found at: Comment: http://www.rfc-editor.org/rfc/rfc1918.txt RegDate: 1994-03-15 Updated: 2010-03-15 OrgAbuseHandle: IANA-IP-ARIN OrgAbuseName: Internet Corporation for Assigned Names and......

Words: 3055 - Pages: 13

Netw 204 Entire Course Latest

...store-and-forward. You are required to come up with advantages and disadvantages of using both cut-through and store-and-forward. What would your list entail? Provide support for each item in your list. (10 points) 3. Explain how each of the following commands below will impact the switched network? Which command is the default command used when setting up port-security on a Cisco switch? (10 points) Week 2 Homework Assignment VLAN 1. A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table. (10 points) 2. Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer (10 points) 3. List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range? (10 points) Week 3 Homework Assignment Inter-VLAN Routing 1. A Given the network diagram below. Enter the commands, including the router prompt, to configure the router, for router-on-a-stick. (10 points) 2. Given the network diagram below. Enter the commands, including the switch prompt, to configure S1 to forward VLAN traffic. (10 points) 3. The organization added a new VLAN, VLAN......

Words: 1848 - Pages: 8

Technical Paper and Seminar Report

...Only Reactive Protocols 3 Security basics are considered in this article, as they are extensively studied and used in MANETs. Among many Reac- Before proceeding further, the reader should have the tive Routing Protocols, only two of them are described knowledge of following terminologies of Network Secubelow as they are mostly studied. rity: 2 • Symmetric Key Cryptograpy. • Public Key Cryptograpy. • Snooping. • Authentication and Digital Signatures. • Flood Storm attack. • Hash and Message Authentication Codes (MAC) • Packet Modifications and Dropping. • Man-in-the-middle attack, Denial of Service Attack 4 • Jamming. • Repeater attack. Security MANETs Problems • Identity Impersonation. • BlackHole attack. in • Wormhole attack. • Rushing attack. MANETs are much more vulnerable to attack than wired network. This is because of the following reasons All these attacks are discussed in further subsections: : 4.1 • Open Medium - Eavesdropping is more easier than in wired network. Jamming Accidentally or Intentionally, interference can happen with radio waves of MANETs, because WLANs1 use unlicensed radio frequencies (ISM band2 ). Other electromagnetic devices operating in the infrared or 2.4 GHz radio frequency can overlap with WLAN traffic. If attacker has a powerfull transmitter, he/she can generate a radio signal strong enough to overwhelm weaker signals, disrupting communications. This condition......

Words: 7796 - Pages: 32

Supermassive Blackholes

... as known as stellar mass black holes, and generally don’t grow much bigger than roughly 20 miles in size. Gravitational collapse occurs when an object's internal pressure is insufficient to resist the object's own gravity. For stars this usually occurs either because a star has too little "fuel" left to maintain its temperature through stellar nucleosynthesis, or because a star that would have been stable receives extra matter in a way that does not raise its core temperature. In either case the star's temperature is no longer high enough to prevent it from collapsing under its own weight (the ideal gas law explains the connection between pressure, temperature, and volume). (wikipedia.org, 2011) Supermassive blackholes lurking at the heart of galaxies, are billions, even trillions miles in size. Many theories abound as to how supermassive black holes formed. One theory suggests that the Universe cooled enough for the first stars to form out of the original hydrogen and helium. This was pure material, unpolluted by previous generations of stars. Astronomers have calculated that these first stars, called Population III, would have a maximum rate that they could gather material together to form a star. But what if there was much more gas around? With a regular star, material comes in relatively slowly, creating a central mass. With enough mass, the star ignites, and this creates and outward pressure that stops further......

Words: 2334 - Pages: 10

Randy Orton | Site Problems | Gameloft