Follow posts tagged #external in seconds.Sign up
Business Resolutions: External Influences
Last week, we examined at how looking at the internal strengths and weaknesses of your business can help you develop resolutions for bettering your company in the new year. Today, we are going to look at the external strengths and weakness (Opportunities and Threats) of the SWOT diagram. (Click here for last week’s blog about SWOT and internal influencers).
Opportunities and Threats are the strengths and weaknesses that the environment surrounding your business exhibits. Internally, you will be able to determine many business resolutions for your company. But, ignoring the external factors can leave room for error.
An example of an opportunity would be a potential client and/or new business. By considering how a new business venture can benefit your company in the new year, you can create a resolution that benefits your business through an external source.
There are, however, negative external influences. A threat, like a competitor, can prohibit growth in the new year. It is important for you to take note of your biggest competition in 2011, how they did better than you (and you than them), and consider sources of new threat in 2012.
Preparation is key, and knowing your areas of strengths and weaknesses inside and outside of the company will prepare your business for 2012 success.
I has a computer problem and need your help!
Hello all, so I’m tryin to get my external harddrive to work with my macbook and I keep getting this whenever I try to format and partition it: “Partition failed with the error:
POSIX reports: The operation couldn’t be completed. Cannot allocate memory”
does anybody know how to fix this???!? It’s driving me bananas!
If you know how then you’re a saint and I’ll bake ya a cake for solving it.
September 14 - US Pass the Taiwan Airpower Modernization Act
I got this email - supposedly from my Chairman going by the AOL (heh) email address used as the sender. It was a very poorly constructed email, although the subject matter was clever. Two days earlier, my organization had put out a press release, urging Congress to pass TAMA. The subject was exactly the text of the PR headline, except cutting out a few words to imply that it had actually passed. The link in the email led to a malicious .zip file, hosted on the hacked web server of a company that sells fake brand items (bags, shoes, etc.). That made me laugh, given that I usually name the screenshots for this blog “fake_something.jpg.”
The timing was bad, as it was right in the lead-up to our defense conference. So I didn’t get a chance to process this email (submit to VirusTotal, analyze headers, etc.), but I thought I would post the screenshot anyway.