Tag: 全国mm信息聚凤阁

Commoditisation danger for gluten-free breads

first_imgA leading gluten-free bakery supplier has warned that the category could become commoditised if supermarkets continue to push their own-label products.Nutrition Point which owns DS (dietary specials) bread and Trufree snacks and biscuits believes gluten-free faces a similar predicament to mainstream bread 10 years ago, before value and more diverse brands returned to the category. MD Chris Hook said there was already a nearly 70:30 split between own-label and brands, which was set to increase. Hook has refused to supply own-label products, while a few of the firm’s own products have even been delisted.”I’m beginning to feel a little bit vulnerable and am increasingly being expected to justify our existence,” he said. “We’re doing a lot of innovation, but the retailers say they want these products under own label why would I hand over the recipe and intellectual property rights?”Paddy Cronin, commercial director of United Central Bakeries, which produces both own-label and branded gluten-free bakery products, including the Genius range, said there was a place for both, as long as brands offered a point of difference. But he added that a degree of commoditisation could bring prices down. “Part of the problem is that production is in batch quantities, so you cannot get the same efficiencies as standard products.”Jeremy Woods, MD of Mrs Crimbles, had no plans to supply own-label. He said: “My job is to promote my brand and product range any category needs strong brands, as consumers want choice, and there’s still a role for them if you have good products.”last_img read more

Read more…

U.S. Reserves Right To Meet Cyber Attack With Force

first_imgBy Dialogo November 17, 2011 The United States reserves the right to retaliate with military force against a cyber attack and is working to sharpen its ability to track down the source of any breach, the Pentagon said in a report made public on Tuesday, November 15. The 12-page report to Congress, mandated by the 2011 Defense Authorization Act, was one of the clearest statements to date of U.S. cybersecurity policy and the role of the military in the event of a computer-borne attack. “When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country,” the report said. “We reserve the right to use all necessary means – diplomatic, informational, military and economic – to defend our nation, our allies, our partners and our interests.” Hostile acts, it said, could include “significant cyber attacks directed against the U.S. economy, government or military” and the response could use electronic means or more conventional military options. Cyberspace is a particularly challenging domain for the Pentagon. Defense Department employees operate more than 15,000 computer networks with 7 million computers at hundreds of locations around the world. Their networks are probed millions of times a day and penetrations have caused the loss of thousands of files. The report said the Defense Department was attempting to deter aggression in cyberspace by developing effective defenses that prevent adversaries from achieving their objectives and by finding ways to make attackers pay a price for their actions. “Should the ‘deny objectives’ element of deterrence not prove adequate,” the report said, “DoD (Department of Defense) maintains, and is further developing, the ability to respond militarily in cyberspace and in other domains.” Key to a military response is being able to quickly identify the source of an attack, particularly challenging due to the anonymous nature of the Internet, the report said. In an effort to crack that problem, the Pentagon is supporting research focusing on tracing the physical source of an attack and using behavior-based algorithms to assess the likely identity of an attacker, the report said. U.S. security agencies also are grooming a cadre of highly skilled cyber forensics experts and are working with international partners to share information in a timely manner about cyber threats, including malicious code and the people behind it, it said. Before moving to offensive action, the United States would exhaust all other options, weigh the risk of action against the cost of inaction and “act in a way that reflects our values and strengthens our legitimacy, seeking broad international support wherever possible,” the report said.last_img read more

Read more…

Credit union analytics comes of age: 9 essential guidelines

first_imgA fascinating new report by McKinsey & Company highlights that credit unions can drive organizational value by creating an analytics culture.The report recognizes that financial services analytics has reached a point where marketing was in the 1970’s for the banking sector. Prior to that time, sales and marketing initiatives for credit unions and banks were rare. In 2017, a credit union would find it difficult to survive without some level of marketing effort.Credit unions today are beginning to acknowledge the potential benefits of analytics. Some brave pioneers in the industry have already gained experience in this area. Now, analytics is poised to be a mainstream activity. To this point the authors admonish credit unions and banks to, “establish analytics as a business discipline”. The implication is organizations must make a serious commitment to building an analytics culture.What can a credit union do to support such a commitment? The report lists 10 essential guidelines. continue reading » 14SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblrlast_img read more

Read more…