Free Essay

Submission to Local Network Cib

In: Business and Management

Submitted By Hellopanda
Words 1350
Pages 6
ASSESMENT 2 – Report
By Brenda Widjaja

Director, Corporate Communications South Africa
Mandela Rhodes Place
Cnr Wale Burg Street
Cape Town
South Africa

April 23, 2012

Mrs. Grace
Executive of the Local Network
3rd Floor, MPF House
32 Princess of Wales Terrace
Sunnyside Office Park
Park town

Dear Mrs. Anne Marie Gutierrez, Executive of the Local Network
Submission to Johannesburg the Local Network of South Africa
This proposal is presented to the local network of South Africa in order to against human rights and environment cases. According to the United Global Compact, HSBC strives to encourage the changes of human rights and environmental cases to the better side. HSBC is supporting to the first of ten principles which is “Business should support and respect the protection of internationally proclaimed human rights” and also the eighth principles which says that “Business should undertake initiative to promote greater environmental responsibility” (Ten Principles 2012).
In 2007, HSBC has encouraged the changes in the environmental cases by cooperating with First Direct, they plant for more than 20.000 trees in each country (First direct 2010). They also encourage their customers to switch to use online banking. More than one million of HSBC and First Direct customers switch to use online banking.
On the other hand, there is a risk of doing this system. More than 3.1 million customers are left from the HSBC members (Espiner 2006). This is caused by a hacker attack on its servers (Espiner 2006). As a leading bank name, HSBC seeks to improve the security of online baking by cooperating with independent association.
South Africa is facing problems such as hunger and children abuses. There are also environmental problems that happened in Africa such as difficulty to get clean water and high rates of air pollution. Moreover, by looking at the existing conditions in South Africa HSBC has planned a new program to reduce the problems that exist in that country.
Starving is one of the major cases that happened in South Africa. Many children are suffering because they do not have enough nutrition. They have lack of attention of government who supposed to protect them. This condition can also affect to the amount of population growth. It also can be linked to against the human rights because as the law of the human rights, human deserve to live in decent. By focus on that case, in the state of South Africa there are many malnutrition cases caused by hunger problem, therefore HSBC plans to make a donation program in cooperation with related associations and sponsors.
Specific to solve the problem, there is a way that may be taken by HSBC is working with the existing restaurants such as Pizza hut and Mc. Donald to donate by giving a donation box that can be filled by volunteer. Secondly, Pizza hut and Mc. Donald will also donate a healthy foods but it is not fast food. This program is called “Distributing a Good Service, Achieving Good Resources”. In order to encourages and make these happen, HSBC will donate 1% of their profit. These programs are conducted to reduce the number of malnutrition and improve the responsibility of the society. There are three stakeholders that will receive the benefits. Some of the benefits that the government gain are decreasing the number of death and economic cases. For the company itself, they will get good well because they have helped for charity cases. For the citizen, they can get better life.
In addition, there is another case that happened in South Africa which is children abuses. Mr. Joseph Kony is one of the rebel leaders who did children abuses for many years. Many people are suffering because they lost their children. More than 30.000 children are abused (Kony 2012). According to that problem, HSBC makes a new program “Save Our Generation” to against Kony by making a social association that can improve their life quality and get better education. HSBC will corporate with Foundation Children of Africa (FCA) to support the human rights for children. HSBC will donate US $600.000 for education and home for children.
This project is aimed to create a new society for children and make them live without mental pressure. There are also some benefit for the government, citizen and company. For the government, they can avoid the children abuses that can increase the criminality in that country. For the citizen, they can live with safety because their children are safe with them. For the company they will get trustworthy from their customers.
Furthermore, as an explanation of principle eight, HSBC is providing clean water could improve the quality of life in South Africa. Many people are suffering even the babies also get suffer because they consume dirty water which is not good for their growth. Almost one billion people cannot have clean water even for washing. Many of water in South Africa undrinkable so that as a company which has responsible to the environment want to help them by making clean water and make it drinkable. “One change step” is the slogan of this program so that people will excite to support this program. Mineral water company will be one of the sponsored that HSBC will cooperate with. HSBC will cooperate with Aqua Mineral Water to supply the clean water.

Moreover, HSBC and Aqua will create a new technology on the land of three hectares with an estimated cost of US $1.000 million. This new machine will be made by expert’s graduates of prestigious university such as American University of Technology in America, RMIT University in Australia and University of Indonesia in Indonesia. The expert’s will examine the technological advance for the project to be implemented in 2012 precisely in November. By consuming clean water people can help themselves to against the diseases. The benefits for the government, they can maintain their citizen to produce the healthy life.

Due to the environmental cases, South Africa is also facing the air pollution. Based on Environmental Protection Agency of United States (EPA), Africa is one of the highest rates of population growth and urbanization in the world (EPA 2012). As a result of a huge population, the numbers of using vehicles are also increase. According to them, South Africa has 99.4MMT carbon or 42% of Africa country’s in total. By focusing on that case, HSBC wants to make a new program by cooperating with EPA and Hyundai. This company will make technology that can detect the pollution rates based on that they can make the hybrid vehicles.

This program will be estimated spend US$1 million and will be started on February 2013 because they have to do the research about the pollution rates. Some benefits that will be obtained by Government and Citizen are improves the healthy life and life in the fresh air. For the company, they will earn good well because they has helped the country to get a better life.

In spite of these, there are some risks that will happen. First, HSBC will be got some difficulty to get the trustworthy from the sponsors. Second, they also get difficulty to have donation and responsible from the customers. However, HSBC has to solve these problems and make it happen.

In conclusion, HSBC must present the responsibility to reduce the risks. HSBC also have to make the customers trust them so that HSBC can easily creating some charity activities and the customers willing to support.

Your sincerely,
(Lala) DIRECTOR OF CORPORATE COMMUNICATION References: EPA: Africa air quality.2010. Accessed 20th Espiner.Tom: HSBC accused of ‘scandalous’ security glitch.2006. Accessed.20th security-glitch-39280707/ First Direct: HSBC and First Direct launch new programme to cut paper use. 2010. Accessed 19th Page.Andrew: Kony 2012. 2012. Accessed 21st United Global Compact. Ten principles. 2012. Accessed 19th…...

Similar Documents

Premium Essay

Local Area Network

... Step by Step Guide to Setup LAN for Internet Cafe and Homes Creating a Local Area Network is very easy. You can either hire someone to do it for you or do it yourself. In both cases the guide that follows comes handy. It teaches you how setup a LAN for your home or office or Internet cafe. LAN is a network of connected computers and it can be used to organize a LAN party with your friends so you can enjoy multi-player games with them. In business it can help you share files between computers and share a single Internet connection. Other uses of LAN are sharing Internet connection with neighbours and reducing the cost for everyone in the neighbourhood. Requirements: 1) UTP Cat-5 Cables [pic] UTP Cat-5 Cables 2) RJ-45 Connectors [pic] RJ-45 Connectors 3) Crimping tool [pic] Crimping tool 4) Cable stripper [pic] Cable stripper 5) Broadband router [pic] Broadband Router 6) Switch [pic] LAN Switch 1. Choose a central location for the switch and the Broadband router 2. The cables from each outlet will reach the switch so locating the switch along with the router at the center of the network is the best option to save the cable lengths. Place the router and the switch close to each other. 3. Measure the distance of each computer from the switch. 4. Prepare cables to connect the computers with the switch. 1. Cut the required length of the cable. 2. Strip it up to 2 inches with the stripper from one end 3. Arrange the cables......

Words: 924 - Pages: 4

Premium Essay

Vlan Virtual Local Area Network

...VLAN Virtual Local Area Network Introduction: A VLAN (Virtual Local Network) is a network of computers that behave as though they are connected to the same wire even though physically they may be located on different segments of the LAN. VLAN are configured through software rather than hardware. This is a big advantage to VLAN because that makes it flexible and when moved physically it can stay on the same VLAN without any hardware configuration. ( A VLAN has three major functions: 1. Limited the size of broadcast domains. 2. Improves network performance. 3. Provides a level of security. VLAN Switched Port and Configuration: Using a switched VLAN will allow you to create groups of logically network devices that act as though they are on their own independent network. And this includes if they share a common infrastructure with other VLANs. When you configure a VLAN, you must sign it a number ID and you also have the option of name it. The purpose of VLAN implementations is to associate ports with particular VLANs. You configure the port to forward a frame to a specific VLAN. A port can be configured to support these VLAN types: Static VLAN, Dynamic VLAN, and, Voice VLAN. ( VLAN Trunking: VLAN trunking enables the movement of traffic to different parts of the network configured in a VLAN. A trunk is a point-to-point link......

Words: 572 - Pages: 3

Premium Essay


...consumer electronics retailers, Minnesota-based Best Buy Co., Inc., dominates the central U.S. market through a network of more than 280 stores in 32 states. In addition to personal computers and consumer video and audio products, the company offered large and small appliances, ranging from refrigerators to coffeemakers, and entertainment software, including compact discs, audio and video cassettes, and computer software Although the company had overtaken archrival Circuit City in the late 1990s to become the largest consumer electronics retailer in the United States, its victory was marginal and the price reductions needed to capture market share had hurt Best Buy’s profit margins(International Directory of Company Histories 1988) Best Buy’s corporate culture began when Schulze had come to realize that there wasn’t much of a future in a market glutted with vendors, serving a shrinking audience of 15- to 18-year-olds with limited resources.” His first step was to expand Sound of Music’s offerings to include appliances and VCRs. Schulze saw sales quickly climb. In 1982 revenues reached $9.3 million; the following year the company renamed itself Best Buy and firmly oriented itself toward an older, broader, and more affluent customer base. Then, in 1984, Schulze took another major step by introducing the superstore format and quickly capturing 42 percent of the local market (International Directory of Company Histories 1988) Best Buy Co., Inc. (NYSE: BBY) is a......

Words: 1056 - Pages: 5

Premium Essay


...COMPUTERIZED INVENTORY AND BARCODING SYSTEM(CIBS) A Thesis Presented to the Faculty of College of Computer Science Palawan Polytechnic College In Partial Fulfilment Of The Requirements for the Degree Bachelor of Science in Computer Science By: Gregorio, Diana Rose L. Pulido, Ava Krisha L. March, 2015 Chapter 1 Introduction Now a day we are living in a modern world in which technology affects in the lives of people. As a proof of modernization, computers had been developed. It greatly affects our lifestyles, our health, communication, and information activities. And it is also a guide in dealing business. A business is typically formed to earn a profit that will increase the wealth of its owners and grow the business itself. The operators and owners of a business have as one of their main objectives, the receipt or generation of financials return in exchange for work and acceptance of risk. Computerized Inventory and Barcoding systems often face customer demands for many different products. The demand characteristics may vary from product to product and therefore an inventory manager will generally apply a customized policy for every product. However, in most cases, all customer demand for a single product is handled in a uniform way. Although the order sizes may vary greatly and some orders can be handled in a different way than others, each unit demanded is considered equally important. The system also allows the inventory to be well in-checked without much labor.......

Words: 1136 - Pages: 5

Free Essay

Contrasting Web Browsers and Local-Area Networks

...Browsers and Local-Area Networks Using Quaketail T. Lam Abstract Many electrical engineers would agree that, had it not been for virtual machines, the practical unification of Scheme and semaphores might never have occurred. After years of confirmed research into 802.11 mesh networks, we disconfirm the visualization of SMPs. In our research we verify that operating systems and access points are mostly incompatible. Quaketail is not able to be visualized to manage lambda calculus. The shortcoming of this type of approach, however, is that linked lists and Web services are never incompatible. We emphasize that Quaketail turns the encrypted archetypes sledgehammer into a scalpel. The effect on steganography of this has been adamantly opposed. Combined with metamorphic modalities, it harnesses a Bayesian tool for synthesizing redundancy. Leading analysts continuously analyze the refinement of Internet QoS in the place of redundancy [16] [16]. The shortcoming of this 1 Introduction type of solution, however, is that Byzantine fault tolerance can be made low-energy, cerDistributed configurations and IPv6 have tifiable, and scalable [30, 24]. We emphasize garnered tremendous interest from both in- that our heuristic is NP-complete. Clearly, formation theorists and information theorists Quaketail harnesses 802.11 mesh networks. in the last several years. We emphasize that Here, we make two main contributions. our algorithm simulates the construction of wide-area networks, without......

Words: 2613 - Pages: 11

Free Essay

Local Area Network

...Local Area Networks Vorlesung Prof. Dr. Michael Tüxen Klausurenzusammenfassung • • • • • 2005 2006 2008 2009 2010 Keine Garantie gegen Fehler! Inhalt 1 2 3 OSI Modell .............................................................................................................................................................................................. 4 Schichten angeben und Protokolle SMTP, TCP, IP (IP-Suite) zuordnen. ............................................................................................. 4 Grafische Darstellung der Protokolle ...................................................................................................................................................... 4 Kommunikationsarten ............................................................................................................................................................................ 4 3.1 Anycast .............................................................................................................................................................................................. 4 3.2 Unicast ............................................................................................................................................................................................... 5 3.3 Broadcast .............................................................................................................................................................

Words: 1548 - Pages: 7

Premium Essay

Fundamentals of Local Area Network

...another room. In addition, they want to utilize the network for television DVR, VoIP phone, and game console. Describe what network device or devices you would recommend they purchase and explain why. Also describe the media utilized. Note, you are not required to detail the topology utilized, but thinking about this will help you to choose and justify your device choices. a. Describe what network device or devices are recommended for purpose for the given home network scenario(s). For a family who wishes to connect several devices to share and Internet connection and a Bluetooth wireless printer, I would recommend that family procure a wireless router, a modem, and a few CAT5e Ethernet cables. b. Explain the recommendations justifying why these would suit the needs for the network The family has several devices that need internet connectivity; the recommendations I made will make this happen. The modem connects to a wireless router, via plugging the broadband into the WAN port of the router, and the router will access the Internet through a unique IP address (assigned by the ISP). This will then provide local IP addresses for all of the devices connected to it, allowing the family to get Internet out to all of the devices (both wired and wireless). An advantage of having a wireless router is that it provides more safety, compared to connecting your broadband directly to your computer, because your computer's local IP addresses aren’t visible to the Internet, which......

Words: 1210 - Pages: 5

Free Essay

Voice over Wireless Local Area Network

...Voice over Wireless Local Area Network In this week’s report I will be discussing how voice traffic is went over a typical wireless local network. I will also provide information on what the advantages to using a wireless network, the problems associated with using a wireless network and what are the best solutions in overcoming these issues. A Wireless Voice network or VoWLAN (Voice over WLAN) is how we send digital voice traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected.......

Words: 661 - Pages: 3

Premium Essay


...|[pic] |Cover sheet for submission of | | |work for assessment | |School: |Singapore Institutes of Management | |Program name | |Program code | |Office use only | | | | | |School date stamp | |Course/unit name | |Course/unit code | | | |TAFE National Module Unit of | |TAFE National Module Unit of | | | |Competency (UOC) name | |Competency (UOC) ID | | | |Assignment no. | |Due date | |Name of lecturer/teacher | | |Campus | |Class day/ time | |Tutor/maker’s name | ...

Words: 390 - Pages: 2

Premium Essay

Issc 340: Local Area Network Technologies

...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University   This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high......

Words: 1522 - Pages: 7

Premium Essay

Auditing Local Area Network

...NIST The purpose of this publication is to provide organizations with recommendations for improving the Security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The scope of this publication is limited to unclassified wireless networks and unclassified facilities within range of unclassified wireless networks. This publication supplements other NIST publications by consolidating and strengthening their key recommendations, and it points readers to the appropriate NIST publications for additional information (see Appendix C for the full list of references and Appendix A for a list of major security controls relevant for WLAN security). This publication does not eliminate the need to follow recommendations in other NIST publications, such as [SP800-48] and [SP800-97]. If there is a conflict between recommendations in this publication and another NIST wireless publication, the recommendation in this publication takes precedence. NIST Special Publication 800-53 is part of the Special Publication 800-series that reports on the Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and on ITL’s activity with industry, government, and academic organizations. Specifically, NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection for federal information systems in......

Words: 1201 - Pages: 5

Premium Essay

Network Design for a Local Business

...Network Design for A local Business Name: Course: Instructor: Institution: Date of Submission: Network Design for A local Business The world is moving towards technology, therefore, each and every business whether local or international need to have a well equipped and reliable network. Network design simply ensures that a new technological service satisfy the various needs of the operators and also the subscribers. A network design involves connections of different devices with some end systems, for example, computers or mobile phones and servers that can link to each other well (Juan, 2004). However for our case various locations or departments in our local business need to relate or communicate to each other to provide smooth flow of information. When designing a network for a company we require equipment such as the physical components. These components are the hard drive devices, and they form a computer network through interconnection. Therefore, we shall vary the number and size of these physical components to the size of the network that the business requires. However, our local business has little number of employees of approximately 50 people. In computer network design there are mainly four major physical components. These components have been placed in categories that include but not limited to personal computers (PCs), routers, switches and lastly the interconnections. However, to implement this network design, the following equipment are...

Words: 1355 - Pages: 6

Premium Essay

Cib Report

...CURTIN UNIVERSITY OF TECHNOLOGY BENTLEY CAMPUS COMMUNICATIONS 100 ASSESSMENT 2 SUBMISSION TO LOCAL NETWORK SEMESTER 2 2011 TUTORIAL TEACHER: Alireza Faed TUTORIAL TIME: STUDENT: Ying Jin STUDENT NUMBER: 15401135 STUDENT EMAIL: COMPANY: Merck & Co Yin Jing Director of Corporate Communications Merck & Co Western Australia 28th August 2011 Mr. Alireza Faed Executive of the Australian Local Network Po Box 123 Bentley WA 6004 Dear Mr. Faed This statement will include our recommendations to the Australian Network according to two of the Global Compact principles. One is two which states that “business should make sure that they are not complicit in human rights abuses”, the other one is nine which is about that “business encourage the development and diffusion of environmentally friendly technologies”. As one of the biggest pharmaceutical companies, Merck & Co, our mission is providing innovative, distinctive products and services that save and improve lives and satisfy customer needs, to be recognized as a great place to work, and to provide investors with a superior rate of return (Merck). Merck & Co is a participant in Global Compact. We established Global Compliance Organization in 2009 to be compliance with the ten Global Compact principles. And we hope that our submission can encourage more companies to fulfill their social responsibility to improve the whole global community......

Words: 1276 - Pages: 6

Premium Essay


...of animals versus human behavior. Nor could behaviorism account for the different abilities of reasoning and thinking. With the criticisms of behavior brought to the attention of the psychology world, we are able to search for new approaches and theories to account for the things that behaviorism could not. Connectionism is also another milestone involved in cognitive psychology. Connectionism is defined as a set of numerous approaches in the category of artificial intelligence, cognitive science, and philosophy of mind. It models behavioral phenomenon. It is said to refer to the emergent processes of interconnected networks of simple units. Although there are many different forms of connectionism, there is one that is more popular than the rest. The most common form of connectionism use is neural network models. In most of the connectionist models, the networks have been shown to change overtime. Behavioral observation is a crucial component when it comes to cognitive psychology. Observations of behaviors give scientists a better understanding of things that need to be tested and evaluated. It is not possible for a researcher to study a mental process first hand, so it is important to be able to see the behaviors and assess them from visual standpoint. Behavioral observations enable researchers to help preserve the testing needs of relational, descriptive, and experimental research. Through the studying of mental processes, researchers are able to expand psychology......

Words: 713 - Pages: 3

Premium Essay

Local and Wide Area Networks

...Local Area and Wide Area Networks The complex nature of today’s local and wide area networks requires a great deal of planning before the network can be assembled and configured. Identifying and implementing network security is a key area of concern due to the large variety of network vulnerabilities that can be exploited by both malicious and external users. Additionally, the correct switching and routing technologies must be implemented to ensure the efficiency and availability of the network. A network can reach its peak security and efficiency only when these factors are fully considered and correctly configured in the network. Security Hardware and Software One of the primary concerns in the development of a network is introducing and configuring the proper security hardware and software. One of the primary tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the......

Words: 1253 - Pages: 6

sitronic | Maria Magdalena BluRay MicroHD | Secrets And Lies ...