Plants, factories and mills that use power-driven machinery and equipment are typical in the manufacturing industry. However, it also includes home-based businesses that make hand-crafted goods, as well as bakeries, candy stores and custom tailors that produce and sell their goods onsite. The manufacturing industry is a great tool that drives the nation's economy; it can eliminate the unemployment rate of the country and increase the GDP at the same time. In the past decade it has been an instrument for economic growth for some countries. They own a large share in the market. They are the ones who utilize the use of technology that is available. Scientific and technological breakthroughs are stirred by linking creative minds. This things will boost up foreign investment in the country.
In few years time, the Employment in manufacturing is likely to grow at about the same rate as in the rest of the economy during the next few years. In terms of GDP, the industry is anticipate to slightly outpace mainly economic growth. Industries within manufacturing that are forecast to show stronger-than-average growth include food, beverage and computers, electronic products and other forms of manufacturing.
I. Threat of new Entry
New entry barriers are very low since manufacturing industry is very big. It is expensive to enter the industry since the technology being used is advance. Many threats to long run survival come from companies that do not yet exist or have a presence in a given industry or market. The threat of new entrants forces top management to monitor the trends, especially in technology, that might give rise to new
References: Blakley, Bob & Heath, Craig. Security Design Patterns. The Open Group, 2004. Web site: www.opengroup.org/security/gsp.htm (2005). Engineering for Failure. ACM Queue 2, 8 (November 2004). Gall, John. The Systems Bible. Walker, MN: The General Systemantics Press, 2002. Hoglund, Greg & McGraw, Gary. Exploiting Software: How to Break Code. Boston, MA: Addison-Wesley, 2004. Initial comment: Paul Robinson. Risks Digest 23.73. Web Site: http://groups-beta.google.com/group/comp.risks/browse_thread/thread/73c62e9990da828a?hl=en (2005) IT Threats in 2006. (2006). Retrieved April 23 2008, from net-security.org Web site: www.net-security.org/article.php?id=885 Manufacturing Threats. (2007). Retrieved April 23 2008, from medialens.org Web site: www.medialens.org/alerts/07/071218_manufacturing_threats_sudan.php Manufacturing. (2008). Retrieved April 23 2008, from Wikipedia.com Web site: http://www.aids.org/info/testing.html Neumann, Peter G. Principled Assuredly Trustworthy Composable Architectures (Final Report to DARPA, CDRL A001).Menlo Park, CA: Computer Science Laboratory, SRI International, December, 28, 2004. site: http://www.csl.sri.com/users /neumann/chats4.html. Porters 5 Forces. (2007). Retrieved April 23 2008, from themanager.org Web site: www.themanager.org/Models/p5f.htm US Manufacturing Forecast Update. (2008). Retrieved April 23 2008, from IDC.com Web site: www.idc.com/MI/getdoc.jsp?containerId=30680