Skip to main content

再见! J.C. Penney,一个行将落幕的悲剧

J.C. Penney,一个有
着111年历史的美国著名百货店,一度曾是百货店中的楷模,门庭
若市,销售额很好,是寻常工薪家庭喜爱的购物之处。

可在三年前,J.C. Penney的老CEO隐退,董事会全出人意料的做出决定,花大价钱把
APPLE公司的运营总监Ron Johnson挖过来。在他们看来,此君对APPLE直营店的发展功
不可没,一定能将J.C. Penney带往新纪元 。果不其然,此人来了以后就要全盘改造J.
C. Penney的经营理念,取消顾客们喜欢的折扣,Coupon, 引进名牌,店中有店,把J.C.
Penney的店面也设计得更豪华,像Macy's看齐.....

可怜J.C. Penney毕竟不是Macy's,美国人民也就能afford一个Macy's。J.C. Penney在
Ron Johnson当CEO后销售直线下降,在昨晚公布的去年第四季度,百货业最关键的季
中,J.C. Penney:

亏损接近10亿美元
收入下降25%
裁员接近30%
网购下降34%,同期Macy's上升48%

华尔街已经预期J.C. Penney撑不过今年,开玩笑地说是时候准备墓碑了。业界也纷
感叹一个成功的企业,垮下来也会如此之快。而作为老婆favorite折扣店的J.C.
Penney,她已经至少2年没去了。

J.C. Penney,这个我才到美国就买过衣服的地方,就快结束了。这时候,我想起
Ron Johnson接管CEO时说的话: "All it takes is courage" Johnson told a packed
audience, "We can change a brand overnight."

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...