Sunday, May 24, 2020

IPSec and Network Security Essay - 669 Words

IPSec is a framework which utilizes a set of IETF protocols to offer end-to-end IP security using strong encryption, public and private key pair cryptography. IPSec secures communication links that could experience network security issues like corruption, eavesdropping, misused data etc (Pezeshki et al 2007) when not secured. However, using IPSec tends to also have an adverse effect on router utilization and overall network performance. One of the major issues with IPSec is performance degradation and throughput (Berger, 2006) which goes back to the complex authentication and encapsulation techniques. Data protection tends to increase required bandwidth; security transformation reduces performance and delays data processing and†¦show more content†¦Adding IPSec VPN technology appears to come with high data processing cost and additional complexity. IPSec is slow in establishing connection. This adds to delay in establishing authenticated connections degrading network service levels and user productivity (Pezeshki, et al.2007). Using IKE initially to negotiate security usually increases time of connection by one to three seconds depending on the network rounding time, policy design and required load on system to establish connection. IPSec protection tends to adds overheads to IP packets. The use of IKE, ESP, Cryptography and digital signature generation and Diffie-Hellman computations (Shue, et al 2007; Fujimoto and Takenaka, 2006) all cause overheads and this increases network utilization and reduces effective throughput especially when multiple clients connect to it simultaneously. The interaction of IPSec VPNs and firewalls in practice may cause problems (Berger, 2006; Adeyinka, 2008b). A strict firewall policy may prevent adoption of IPSec packets. This is because ESP and AH encapsulates IP payloads by adding security header to each packet making it difficult to interpret IPSec protected packets by existing network management. The presence of NAT could also lead to a wrong process of IP packets because NAT devices checks and modifies the packet port address which is encrypted by IPSec packet (Mei and Zhang, 2009). Interoperability is another issue with IPSec VPNShow MoreRelatedIpsec Or Ip Security Is A Merit Protocol728 Words   |  3 Pages1. INTRODUCTION IPsec or IP Security is a merit protocol used to deliver secure data connection. The motive of the paper is to introduce VPN and IPsec with different VPN over IPsec applications. 1.1. Virtual Private Network Overview VPN is a Virtual Private Network, a network within the original network which won’t require a separate links or communication lease lines for data transmissions. VPN uses a shared or public unsecured network to transfer the data from one end to another end through properRead MoreA Interview On Virtual Private Network1242 Words   |  5 PagesBN305 Virtual Private Networks Student name: Gjorgji Babarovski Student ID: MIT 140626 Teacher name: Paul Carnie â€Æ' â€Å"VPN, or virtual private network, is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company s internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure thatRead MoreRemote Access Solution Proposal853 Words   |  3 Pagesto be a high priority for our organization over the long-term. Defining The Technology Platform For Telecommuting To enable a successful telecommuting strategy, networking protocols for Virtual Private Networks (VPNs), suggested configurations for those protocols and the resulting networks, encryption technologies and authentication methods need to be taken into account. The following sections of this proposal define each of these technology-based considerations from a protocol, configurationRead MoreSecurity Domain and Strategies1171 Words   |  5 PagesSecurity Domain and Strategies The Richman Company is a successful and prosperous firm with branches in eight locations throughout the country and Canada. To support its growth, the company uses both an intranet and an extranet network. These networks are essential to the successful operation of the company because they provide the means of communicating with all employees, who use the intranet to enroll in company benefit programs. These networks also allow all of the company’s business partnersRead MoreThe Implementation Of A Ipsec Tunnel1454 Words   |  6 Pages To allow the regional offices to pass traffic securely a GRE IPsec tunnel will be created between offices. This will allow all data to be encrypted prior to being sent out to the internet. This will prevent unauthorised reading or manipulation of sensitive data. The UK office will have two tunnels, one to each branch office. In order for the remote branches to communicate with each other their traffic will pass through the head office. The i nitial part of the configuration is the addition of GRERead MoreLayer 2 Tunnelling Protocol Research Paper948 Words   |  4 Pagesencryption so more often it is used together with IPsec and called as L2TP/IPsec. When IPsec is running in conjunction with L2TP then IPsec, AH and ESP will provide the security services. SSL and TLS SSL and TLS protocols use TCP port 443 and it is a transport layer protocol. SSL and TLS uses various types of cryptographic features that provides digital signatures, integrity and confidentiality. While communicating between client and server unlike IPsec, SSL/TLS provides cipher suites to outline theRead MoreIPsec and VPN1397 Words   |  6 Pagesï » ¿IPSec Internet Protocol Security (IPsec) is a set of protocol for establishment of securing Internet Protocol (IP) communications. Safety on data was established through process of authentication and encryption of each IP packet in every communication session. At the beginning of the session, mutual authentication between agents will established and cryptographic keys to be used will arbitrated during the session. IPsec can be applied in protecting data flows not only between pair of hosts andRead MoreVirtual Network : Virtual Private Network Essay1477 Words   |  6 Pagestechnology VPN (Virtual Private Network) has established strong recognition among IT people and every administrator is committed to organize VPN-channels for employees working outside the office. Virtual Private Network is an association of individual machines, or virtual LAN network, which ensures the integrity and security of data transmitting. It has the properties of a dedicated private network and allows data transfer between two computers via an intermediate network such as Internet. VPN has aRead MoreVpn Services : A Virtual Private Network1657 Words   |  7 Pagesfrontier of network security. The days when having a secure office network meant your servers were behind locked doors is long gone. Everyday companies must deflect outside attacks from people down the street and across the globe. One of the biggest threats is man in the middle attacks, where an outside party can intercept vital information being sent from one device to another before it reaches it’s destination. The solution to this problem lies in creating a Virtual Private Network, or VPN, toRead MoreInternet Protocol Version 6 : Ipv6 And The Future Of The Internet828 Words   |  4 Pagesgrowth and address security concerns through packet-level encryption and stepped-up authentication. It would also allow routers to better manage traffic flow through such features as packet labeling. (The Tortured History of Internet Protocol v6). The need for IPv6 is growing by the day. There are good amount of reasons why the migration of IPv6 is not only desirable, but necessary in days to come. Some of the areas were IPv6 benefit from are reduced address space, advanced security features, enhanced

Thursday, May 14, 2020

The School For Prison Pipeline - 1834 Words

Introduction Throughout the U.S. there has been a cycle that keeps being repeated. That cycle is known as the school-to-prison pipeline where students are punished based off the policies that have been made by the school districts and court of law. Consequently, minorities have been disproportionately punished by schools and the justice system. You may be aware that the funding towards the school district is underfunded which leads to less resources and policies that enforce inequality of race throughout the school system. For example, 30 teachers had to be laid off due to budget cuts as well as a reduction of $350,000 in textbook purchases. This allowed less resources for students to get a better education. The less funded district is typically filled with minorities whom are affected by the school-to-prison pipeline. This essay will explain how policies are unfairly enforced in the school to prison pipeline, and the disproportion in punishment students of color receive. Setting the stage for school policies In the past, the rise of school violence created a fear for state and federal legislation so they took strict action on creating policies to ensure security throughout public schools. â€Å"The 1980’s and 1990’s spawned fear and media reports of young people, often minorities, committing horrific crimes, wilding events, and gang violence† (Mallet). In contradiction, most shootings in the past occurred in â€Å"safe† school districts- white, suburban, and middle class areasShow MoreRelatedThe School to Prison Pipeline2688 Words   |  11 PagesThe School to Prison Pipeline: The Criminalization of American Students The School to Prison Pipeline: The Criminalization of American Students Kimberly N. Wright Western Governors University Introduction Your permanent record! The thing that was held over most of our heads when we were in school. Your teacher or maybe your parents threatened that your bad behavior was going to end up on your â€Å"permanent record† and ruin your life. We shrugged them off, thoughtRead MoreThe School Of Prison Pipeline Essay2154 Words   |  9 PagesThe school-to-prison pipeline in the United States is a figure of speech used to describe the increasing patterns of interaction students have with the juvenile and adult criminal justice systems as a consequence of procedures used by many school systems. A specific procedure would be the zero tolerance policies and the use of officers in schools. Currently in today’s American schools many children of color are being unfairly judged and treated by the public school systems zero tolerance policiesRead MoreThe School Of Prison Pipeline Essay1441 Words   |  6 Pagespublic schools around the country is the school to prison pipeline epidem ic. The school to prison pipeline is a term used to describe how students are being pushed out of public school and into the criminal justice system. This epidemic is a result of the education system’s zero tolerance policy that enforces harsh punishments for misbehaving students. Although its goal was to eliminate misbehavior, studies have shown that the increased disciplinary actions have resulted in a modified school environmentRead MoreThe School For Prison Pipeline978 Words   |  4 Pageswhat has become a pressing question, is what is to become of the future if our youth are behind bars instead of in schools? Youth today are being pushed into the criminal justice system at an alarming rate. This issue is known as the school to prison pipeline ─ the rapid rate at which children are pushed out of schools and into the criminal justice system. The school to prison pipeline is a term that came into use by activists in the late 1970’s and has gained recognition throughout the years as theRead MoreSchool to Prison Pipeline1948 Words   |  8 Pagesï » ¿ Topic: School-to-Prison Pipeline Research Paper What is meant by the school-to-prison pipeline? What are ways to address this problem? The school-to-prison pipeline is a devastating part of reality for all too many students. The pipeline in definition is simply a term representing the tendency for certain students to easily end up in prison during or shortly after schooling. To decrease this tendency, it is important that teachers are aware of the issue andRead MoreSchool to Prison Pipeline2888 Words   |  12 PagesSchool-to-Prison Pipeline: Does the Current Educational System Demonize or Criminalize Our Youth? In today’s society our children go down one of two paths: become successful or become criminals. The question then must be asked: have we allowed our children to be tracked down such opposite paths by using discipline as an excuse? There may well be an argument that ultimately the school and prison system have nothing to do with one another; however, I believe they have become one in the sameRead MoreAlternatives For School And Prison Pipeline962 Words   |  4 PagesAlternatives to School-to-Prison Pipeline Changes to Viewing the System This problem in Americas school system does not have to continue this way. There are changes that can be made and policies that need to be changed in order to provide the proper access to education for all students. The Association of Mexican America Educators presents research done with educators of low-income Latino students and what they believe needs to be changed to provide well for students. The article shares four mainRead MoreBreaking The School Of Prison Pipeline859 Words   |  4 PagesBreaking the School-to-Prison Pipeline How would you feel if the outcome of your interaction with authority depended on whether you were black, Latino, or white? Unfortunately, police brutality is the sad reality that many black and Latino boys experience in their childhood. The disadvantages of their upbringing results to the reinforcement of societal restrictions on their success. On a positive note, education becomes salvation to marginalized group because it provides them means to escape theRead MoreThe Juvenile Justice School To Prison Pipeline634 Words   |  3 Pagesrelationship between educational institutions and the juvenile justice system which was once created to protect children, has displayed an ultimatum for minors through â€Å"zero tolerance† policies which results in sending individuals through the school to prison to pipeline. Studies have shown that these zero tolerance policies are not beneficial to students or the educational environment that should be guaranteed to children. Opponents argue that the policies promote safety, but through this research it canRead MoreLiterature Review Of School To Prison Pipeline970 Words   |  4 Pagessimilar to my question, â€Å"How is School to Prison Pipeline affecting juveniles around the United States?†. In 2014, Fader wrote an article called A Promising Approach to Narrowing the School-to-Prison Pipeline: The WISE Arrest Diversion Program. In the article, it mentions how the school to prison pipeline came about and how hard it is for a student who enters the school to prison pipeline to get out of it, there’s a stigma to the kids once they have entered the pipeline. By having an afterschool program

Wednesday, May 6, 2020

Adidas and its Ethical and CSR - 1441 Words

Ethics and corporate Social responsibility:- Ethics is defined as what is right and what is wrong. Every business should behave ethically. The moral principles that guide the way a business behaves are business Ethics. Ethics are moral guidelines to people or to an organisation which govern good behaviour. So behaving ethically is doing what is morally right. Doing an ethical business may always be not profitable but it will be more beneficial to company and the people involved in company as well as the people who are getting influenced by the company. If a company is acting ethically then it is trying to differentiate between right and wrong and then chose the right decision for everyone. It is very easy it identify any unethical†¦show more content†¦It provides a conceptual framework that enables Adidas stakeholders — from its 50,000 employees on through to suppliers, customers and communities — to better and more easily understand, assess and realize the multinational footwear and sportswear companyâ⠂¬â„¢s sustainability goals. Adidas 4Ps approach:- Recently Adidas have launched waterless dying technology known as DryDye technology. This technology instead of consuming 25 litters of water necessary to dye one t-shirt, the DryDye technology uses none–instead, the dye is injected using compressed carbon dioxide. The result is a garment using not only 50 percent less chemicals and energy, but in the long run has a lower environmental impact because the CO2-based dye actually lingers in the fabric longer. This concept helps in reduction of consumption of water in dying process. Before Adidas used to produce large number of samples for marketing purpose and we all know that samples produced where all wasteful. Now designers and marketers in Adidas are using Virtual technology which is far better and cost effective. In comparison to 2010 they have reduced the number of samples produced to 600000 in 2011/2012. It helps to save lot more of resources which would have being used in production of samples. Grievances in the supply chain via SMS, Recently in Adidas one of the largest footwear suppliers in Indonesia agreed to a pilotShow MoreRelatedReasons for CSR assignment2046 Words   |  9 Pagesï » ¿ This assignment will be based around Adidas, an argument will be contextualised regarding Adidas’s Social and Economic responsibility and why an organisation like Adidas chooses to deal with the externalities in the organisation, the drives of Adidas’s values and ethical approaches will also be assessed, including an overall conclusion based on my opinion of Adidas as a sustainable organisation. Corporate Social Responsibility (CSR) is defined by Carroll as being split into four possibilitiesRead MoreOutsourcing Practices of Adidas, Converse, Nike, and Reebok1079 Words   |  4 PagesOutsourcing Practices of Adidas, Converse, Nike and Reebok Introduction Apparel and shoe manufacturers continued to offload the more costly yet easily replicated part so their business models to concentrate on brand building, marketing, sales and attaining greater distribution channels globally. These are the pressures all apparel and shoe manufacturers face, and it is particularly challenging in the athletic show industry (Kynge, 2009). Adidas, Converse, Nike and Reebok have been outsourcingRead MoreThe Potential Benefits of Csr Relative to the Costs for Businesses and Their Stakeholders.1223 Words   |  5 PagesCSR is how companies control their business processes to provide an overall positive impact on society. There are many factors that determine how socially responsible a business is, but alongside these are the benefits and costs relating to the level of CSR produced in this essay, I will be analysing companies from the retail industry and a car manufacturer to discuss the potential costs and benefits to both business and their stakeholders of CSR. The Body Shop is well known for being an extremelyRead MoreCorporate Social Responsibility : Nike1312 Words   |  6 PagesWith enormous ethical issues and pressures facing the industry, many corporations have turned to enacting policies regarding corporate social responsibility. By adopting activities that work to aid society and the environment, corporations ultimately increase profits and improve brand image. Several organizations in the apparel industry have used socially responsible activities to rebuild reputations. Today, according to Nike’s official website, they define their â€Å"Nike Responsibility† as: â€Å"ExploreRead MoreNike Csr3496 Words   |  14 PagesNike CSR Corporate social responsibility can be defined as the economic, legal, ethical, and discretionary expectations that society has of organisations at a given point in time (Carroll and Buchholtz 2003, p. 36). The concept of corporate social responsibility means that organizations have moral, ethical, and philanthropic responsibilities in addition to their responsibilities to earn a fair return for investors and comply with the law. A traditional view of the corporation suggests that itsRead MoreCorporate Social Responsibility And Its Impact On The Companys Daily Activities1266 Words   |  6 PagesBalance has to perform in order to have stronger and more successful CSR policy in the company. New Balance was founded in the early twentieth century by a waiter named William J. Riley and in 1972 it was bought by its current owners James and Anna Davis. As the owners of the company they managed to lead it to the fourth biggest brand in the shoe industry today. The footwear industry that contains super brands like Nike, Adidas and more is considered to be very competitive and it faces many challengesRead MoreCorporate Social Responsibilities of Reebok3923 Words   |  16 Pagescommon practice of outsourcing in nations that lack comprehensive regulation and knowledge in labour standards has become a global concern due to violation of employees’ working condition and welfare. Consequently, a trend of increasing awareness in ethical governance attracted global attention while posing the question: how to effectively transform the notion of corporate social responsibility, consideration of social consequences from business decisions, to these profit-driven MNEs? Currently, theRead MoreCorporate Social Responsibility Of The International Organization1562 Words   |  7 PagesMohammed Bin Hamman was charged for bribery. FIFA’s stakeholders were, impacted, affecting 4 main Sponsors, Visa, who stand to be exposure to â€Å"fraud and money laundering† that could impact the organizations credibility, (Gibby, T. 2015, Coca-Cola, Adidas, and Emirates Airlines who were â€Å"disappointed† by the â€Å"issues surrounding the administration† and â€Å"warned that the ethics scandal which is impacting the game needs to be addressed†, CNN Wire Staff (2015), other stakeholders, Member Associations toRead MoreHow Can A Company Measure Its Competitive Advantage?1561 Words   |  7 Pagesor providing a higher quality through differentiation that costs more than the competitors product. In fact, companies that compete in the same industry and core business, such as Sony, Samsung, and Philips in the audiovisual industry, or Nike, adidas, and Puma in the clothing manufacturing industry, should understand the nature of the market and analyze the key factors that differentiate each one from the others. a company gain a competitive advantage in the market if: †¢ A company competes throughRead MoreA Financial Ratio Quarterly Trend Analysis of Nike, Inc.4463 Words   |  18 Pages †¢ Researching a company with such level of recognition supported easier access to information for internationally based team members. †¢ NIKE athletic shoes also supported the group’s ability to make comparisons with another company such as Adidas; †¢ Knowing that the company started very small and grew to what seems a limitless boundary seemed intriguing to us and promoted a desire to understand their financial growth. The team chose three significant websites: MSN Money, NIKE and Yahoo

Tuesday, May 5, 2020

IT Management Issues for Collection - myassignmenthelp.com

Question: Discuss about theIT Management Issues for Collection andOrganization. Answer: Monet is a group of five holiday resorts that have merged their operations for the purpose of bringing more value to their customers and increasing their profit margins. The group provides its clients with an alternative method of booking as compared to the popular ones being used in the market. The main difference between their booking platform and the other popular ones are that clients get to deal with the group directly without having to go through any third party providers. An information system is a system which has been organized for the purpose of storage, collection, organization and communication of information (Bird, 2010). Computer information systems are systems which are comprised of computers and people who process and interpret information which is given to them. Information technology is the utilization of computers of retrieving, storing, transmitting, studying and manipulation of data. Monet group decided to use a single website to help their clients in their booking needs. The website which enables users to gain information on their various rates and booking destinations is what is referred to as an information system (McNurlin et al, 2009). The operations that are used and implemented to ensure the website is running and users can be able to make bookings is the act of harnessing information technology to bring more value to its clients as they increase their profits. Management decisions are a comprehensive list of actions that have been agreed upon by the management of a company after careful consideration of facts and the business environment in which they are in. From the following case study it can be concluded that the single holiday resorts had foreseen or were experiencing a lot of issues in doing business. For them to think of coming together to form a group of holiday resorts meant that they had deliberated both together and independently and establishe d that they would be in a better placed position to increase their profits by joining forces. They would also be able to bring more value to their customers as a merged group instead of them being independent. The group having merged together knew that in order for them to offer good rates and a personalized experience to their clients they would need to come up with their own booking platform such as a website. The use of their own booking platform would enable the group to control the design of the website, its content and the general overall experience a client would have when interacting with their website (McKeen Smith, 2003). Clients would get good prices and an exemplary experience because the merged group would not need to use the services of a third part such as booking.com who usually take a percentage from every booking which is made. Money Loyalty is a customer loyalty scheme in which the group has come up with that will be used to reward the customers who are loyal to them by giving them discounts on any bookings or meals they may have while on tour. They can also get free meals and tours so that they can know how much the group appreciates them for giving them the opportunit y to serve them. The customer loyalty scheme is also a way in which they can lure in more clients. If clients become aware of the benefits that come with being a loyal member of the group they are attracted to the group and would prefer to give them business as compared to other hospitality resorts who do not offer any rewards or appreciation to their loyal clientele (Rhane, 2009). There are interactive tools which can be implemented to ensure that customers can be able to choose which tours they would like to go on. It is said there is nothing better than the real thing. The use of pictures to give clients a description of what they can expect in a tour has been in use for many years. Pictures usually tell the story of the tour and its beautiful sceneries. With advancements in technology clients can be able to come closer and experience various destinations in a more realistic way (Zuppo, 2016). The use of virtual reality in giving clients a virtual tour of the various destinations being offered can give them a more personalized feel of what they should expect. This will also enable them to make a good choice in terms of the places they wish to tour based on their tastes and preferences. A video tour of the various destinations can also be done to give the clients a feel of the various destinations being offered at the comfort of their homes through the Monet booking website (Kedar, 2009). The video tour can be a video guide which is done by an individual or the group based on the actual experience of someone who has visited the various destinations before. The tour can give clients a good picture of what they can expect and which is the best destination for them based on their preference. Pictures with a paranoma effect can also be used to illuminate the various destinations being offered. Such pictures are geared towards clients who prefer a pictorial view of where they are going. The paranoma tools are used to make the pictures have wider angles so that they look continuous and they can give clients up to a 360 degree view of all the destinations being offered for them to choose to tour on (Ralston, Hemmendinger Reilly, 2000). An enterprise resource planning (ERP) system is a system that is integrated with the main business processes in a company to provide an updated view of the business operations. An ERP systems enables a company which is utilizing it to have the ability to store, manage, collect and interpret data from their business operations (Dmaithan, 2016). Monet group is planning to have an integrated ERP system developed. This ERP system will be to help them manage their business processes for the purpose of ensuring they can serve their client efficiently. The ERP system will help them track their business resources and for them to have an updated status of their business commitments. The ERP will help the group serve their clients better in that all the business processes which occur within the group will be tracked and monitored to ensure there is never a gap which comes up. An example is monitoring the stock levels in the holiday resorts. The ERP will be able to show the current stock levels and easily update the business that they may need to restock their supplies so that they can meet the needs of their clients. An ERP system has many benefits which include organizing the workflows of an organization. An ERP system can be compromised of several applications such as an inventory control system and a payroll system all in one integrated unit. This will enable all the operations and workflows of the various departments within the group to be streamlined allowing very efficient workflows in running their business (Shaul Tauber, 2012). The ERP system can be accessed by anyone in the company. This is very beneficial in that users will not need to keep calling other departments to confirm stock levels or bookings availability. Everything will be updated on the ERP system where all employees can source for information and ease their workflows. The system will also ensure that clients can book rooms which are available only. If the rooms are full the client will be advised on this and they can choose other rooms being offered. The utilization of an ERP system within an organization plays a key role in the improvement of customer satisfaction (Butler, 2012). When most of the work is automated through the ERP system clients are able to interact with the business and gain the services they need with a lot of ease. The employees of the business are also in a position to serve their clients better because a huge load of their work is handled by the system. The ERP system also helps the company track their business operation s and needs (Mureell, 2005). In every business there needs a lot of planning to ensure that the business runs smoothly and delivers adequately to the needs of their clients. The ERP system can produce reports which can be analyzed and give the group a detail report of what they use in a period of time. It shows them when the peak season is and that is when they should order a lot of inventory and when it is low seasons and they should order minimal inventory to help them satisfy their needs and those of their clientele. Monet group has commissioned the creation of a web 4.0 level ultra-intelligent portal which is new and will help customers to be able to self-manage their accounts. The portal will also enable clients to customize their booking and shopping experience. A web 4.0 is an electronic agent that is intelligent and has the ability to recognize when you are in front of it. The agent utilizes little cameras which can be used for facial recognition to identify you and you can be able to pass on your personality to it as it learns from your preferences (Fowler Rodd, 2016). In essence this means that when Monet implement the Web 4.0 agent their clients will be able to interact with a very intelligent system that can learn based on their preferences and come up with results of the best destinations for them. The intelligent system will be able to pair a user with a unique destination based on their personality and preferences. Such a system can be very attractive to clients because all the work will be done for them all they will have to do is pack their bags and head off to their destinations (Chaudhuri, 2004). Advancements in technology are what bring about improved and intelligent systems for use in various aspects including business. Monet group have a website in which clients can be able to view the tours and accommodation they offer. The introduction of a Web 4.0 intelligent portal will improve the experience customers have while interacting and booking for the services Monet group offers. Clients will be able to manage their account on the portal which is very convenient for them (Olofson, 2009). They will be able to login to the system and view all the services being offered by Monet group and they can book when they wish to travel and the destination they intend to go to. The clients will also have the ability to customize their booking and shopping experience. For the clients this will mean they will have a lot of independence in designing and choosing the way in which they shop and book Monet group services. The clients can choose based on their preference on the products they wis h and the intelligent system will generate similar bookings and shopping items that are close to their chosen options or preferences. A web 4.0 portal for Monet group will mean that they have gone a step forward in improving the customer service experience in which they offer their clients. It will also mean that they will not have to employ a lot of labor in booking or shopping assistance for the clients (Ward, 2006). This is because the intelligent system will guide users appropriately on how to use the portal. The portal will also enable Monet group to gain more clients because it will eliminate any form of human limits the labor force might have had. The company will have the system running all the time, day and night which means that clients can login to the portal at any time and do their bookings and shopping even when the business representatives are not in the office. The direction Monet group is taking is a critical business development objective so that they may be able to grow their business and serve their clients effectively. They have considered the needs of their clients and adapted to them using advancements in technology to ensure that they remain relevant to their clientele. The merging of the five resorts into one group helps them save on cost by sharing on the resources they need such as developing a web 4.0 portal and having an ERP system (Welk, 2000). These systems being implemented independently by a single company can be very expensive and their merger has in effect improved their business by bringing more value to their clients. References Bird M. (2010). Modern Management Guide to Information Technology. Create Space. Butler J. G. (2012). A History of Information Technology and Systems. University of Arizona. Chaudhuri P. P. (2004). Computer Organization and Design. PHI Learning. Dmaithan A. (2016). Antecedents of ERP systems implementation success: a study on Jordanian healthcare sector. Journal of Enterprise Information Management. Emeralad 29 (4): 549. Fowler J Rodd E. (2016). Web 4.0: The Ultra Intelligent Electronic Agent is Coming. Retrieved from biothink.com. Kedar S. (2009). Database Management Systems. Technical Publications. McKeen J. D. Smith H. A. (2003). Making IT Happen: Critical Issues in IT Management. Wiley Series in Information Systems. McNurlin B. et al. (2009). Information Systems Management in Practice. Prentice Hall Mureell S. G. (2005). E-Business and ERP: Rapid Implementation and Project Planning. John Wiley and Sons Inc. p. 9. Olofson C.W. (2009). A Platform for Enterprise Data Services. IDC. Ralston A., Hemmendinger D. Reilly E. D. (2000). Encyclopedia of Computer Science. Nature Publishing Group. Rhane T. (2009). IT Managers and Project Management, PM HUT. Shaul L. Tauber D. (2012). CSFs along ERP life-cycle in SMEs: a field study. Industrial Management and Data Systems. 112 (3): 360 - 384. Ward P., Dafoulas G. S. (2006). Database Management Systems. Cengage Learning EMEA. Welk M. (2000). Computer Science and Communications. Dictionary. Springer Zuppo C. M. (2016). Defining ICT in a Boundaryless World: The Development of a Working Hierarchy. International Journal of Managing Information Technology.