Wednesday, October 30, 2019

MARKETING ESSAY QUESTION Example | Topics and Well Written Essays - 2000 words

MARKETING QUESTION - Essay Example 538). Most marketers today are experiencing difficulties with effective and systematic planning due to a number of market forces such as globalization, fierce competition among market players, radical changes in technology and changing consumer behavior. This piece of research work presents a brief study on systematic approach to marketing planning from the perspective of contemporary international marketing contexts. This paper reviews relevant literatures to critically evaluate the statement â€Å"A systematic approach to marketing planning is essential to successfully inform the marketing decisions made within a contemporary international company†. Marketing planning Planning is basically a systematized method of relating to the future (Cateora and Graham, 2007, p. 317) and therefore many literatures have considered marketing planning as all rational, incremental and intuitive processes that guides a firm’s marketing activities to its future (Greenley, Hooley and Sau nders, 2004, p. 933). Dibb and Simkin (1996, p. 3) who provided a clear and systematic approach to marketing planning defined it as a systematic process that involves assessing marketing opportunities and resources, determines marketing goals and develops future plan for implementation and control. Traditionally, literatures described marketing planning as a model of logical-sequential decision making that incorporates a firm’s objectives, strategies, tactics and control. Greenley, Hooley and Saunders (2004, p. 933) pointed that this explanation to marketing planning has focused on what marketing planning decisions could be and not on how they could be made. They emphasized that marketing planning is used to pursue dynamic marketing opportunities in order to guide a firm’s marketing to its future. In today’s rigorously competitive marketing contexts, market opportunities keep on changing and hence firms need to adopt their plans with a view to pursue these dynam ic opportunities. Marketing planning involves deciding on significant marketing strategies that help the firm achieve its overall strategic objectives and future goals. A marketing planning is required for each business, each product and each brand (Armstrong and Kotler, 2005, p. 59). A Systematic approach to Marketing Planning A systematic approach to marketing planning has been considered to be the most difficult of all marketing tasks since it involves bringing together all the various marketing elements in to coherent and realistic plan (McDonald, 2007, p. 9). A systematic marketing planning necessarily requires certain degree of organizational procedures and compromise between conflicting objectives. McDonald (1992, p. 5) identified ‘lack of systematic approach to marketing planning’ as one of the most difficult barriers to marketing planning. Marketers need to design and implement most appropriate planning system for their firms. As McDonald (1992, p. 14) pointed, a marketing planning system is essential to ensure that all key issues are systematically

Sunday, October 27, 2019

Introduction To Service Industry Restaurants Marketing Essay

Introduction To Service Industry Restaurants Marketing Essay The food service industry continues to grow in volume and revenue every year and typically divides itself into two categories: full-service restaurants and fast-food restaurants. Each individual restaurant is in competition with other food service operations within the same geographical area. The fast food restaurant industry is highly competitive. McDonalds competes with other restaurants through the quality, variety and value perception of food products offered. McDonalds Corporations main competition comes from other fast-food restaurants; most notably, YUM! Brands Inc, Wendys International, Dominos and Burger King. Figure1: The total revenues of the major players in the fast food industry (www.ycharts.com) The figure represents the market share of McDonalds in the fast food industry. McDonalds Corporation (MCD) has company operated and franchise restaurants all over the world. They are the leading global food service retailer by means of over 30,000 restaurants in more than 117 countries, serving about 50 million people every day. Franchising plays a major role in McDonalds system with 26,216 were operated by franchisees (including 19,020 operated by conventional franchisees, 3,160 operated by developmental licensees and 4,036 operated by foreign affiliated markets (affiliates)-primarily in Japan) and 6,262 were operated by the company. Their total revenue in 2009 was $ 23 billion. McDonalds success in the fast food industry stems from their main success factors which are branded affordability, menu variety and beverage choice, convenience and daypart expansion, ongoing restaurant reinvestment and operations excellence. These success factors are used to promote McDonalds brand image, p rovide customers with quality products and differentiate themselves from other competitors like YUM Brands (YUM owns brands like KFC, Pizza Hut, Taco Bell and Long John Silver) After extensive research, analysis and valuation, it is found that McDonalds corporation is currently an undervalued company and rated as a Market Outperform and thus I recommend this stock as a Buy. Executive Summary The food service industry is one of high competition; however, McDonalds has been able to obtain the position as the leader in market capitalization with a market capital of $74.6B in 2009. While McDonalds has deployed high amounts of capital, the company manages its asset base with high inventory turnover while also maintaining cost efficiency. Industry Demand Drivers: The market of the food service industry attributes much of its growth to global sales and revenue. Despite tough environment, McDonalds delivered an exceptional year of growth, posted strong sales and increased market share around the world. In 2009, global comparable sales increased 3.8 percent, fueled by solid gains in the United States (+2.6 percent), Europe (+5.2 percent), Asia/Pacific, Middle East and Africa (+3.4 percent), Latin America (+5.3 percent) and Canada (+5.8 percent). Earnings per share for the year increased 9 percent to $4.11 (13 percent in constant currencies), while consolidated operating income increased 6 percent (10 percent in constant currencies). We also returned $5.1 billion to shareholders through share repurchases and dividends paid, bringing our three-year cash return total to $16.6 billion-notably at the high end of our stated target of $15 to $17 billion for the years 2007 through 2009. Globally, McDonalds caters and adapts to different cultures and societies, while still providing them with the same McDonalds experience. With a significant portion of McDonalds sales derived from international stores, foreign denominated sales should generate additional earnings leverage given the weakening of the US dollar against other currencies. McDonalds is well positioned: McDonalds is able to maintain a loyal customer base, and compete with the existing competitors by introducing variation to their menu, such as the Dollar Value Menu. Also, in order to adhere to a more concerned health concise society, McDonalds has implemented holistic approach which consists of High-Quality Choices for customers, Consumer-Friendly Nutrition Information and communicate responsibly. The Happy Meal, which has been a long standing childs favorite, now has options such as fruit instead of French Fries and all white meat chicken nuggets. As for one McDonalds company goals is to adhere to outstanding customer service, strengthens the maintenance of long standing customers, as well as develop new relationships with customers of a new generation. Franchising business model: Within Fast Food restaurants franchise models are common. Franchise models can grow faster using others capital. Franchises have to be pay rent and royalties based on a percent of sales along with minimum rent payments, and initial fees. On the other hand, company-owned models have greater control over pricing, operations and can close underperforming restaurants more quickly. In 2009 the total no of franchised restaurants was 26,216 compared to 25,465 in 2008 and the number of company operated restaurants decreased by 3.6%. The total revenue from franchises in 2009 was $7,286.2 Million an increase in 4% compared to 2008. McDonald Franchises Revenue from Franchises Key challenges and Adaptability Intensity of competition: Competitors of the industry also try to compete with similar products; therefore, leading to price wars. McDonalds created a Dollar Value Menu, in response to competitors such as Wendys 99 cent menu. Overall, the industry has tried various product differentiations in order to accumulate greater market share, but most consumers are drawn to the classics. McDonalds is doing more and more to compete with health focused restaurants like Subway. Nutritionist and other leading experts have been hired to join the McDonalds team in order to ensure that the correct items are added to the menu, while still keeping and improving the classics that they are famous for. For example, the chicken nuggets that we all grew up on are now 100% white meat. McDonalds is flexible in their menu to conform to the changing tastes of society. Bargaining Power of Suppliers: In recent years the industry has had a small problem with beef, because of the outbreak of the mad cow disease. This problem raised the cost of beef in Europe tremendously but the cost actually went up around the world because of the beef shortage in Europe. The suppliers that sell to McDonalds have a strong voice also because of the fact that the switching cost for McDonalds as a whole would be so tremendous, so any problems or disputes would be worked out with there suppliers. Comparative Ratio Analysis Ratio analysis helps us analyze the financial trends of previous years and extrapolate those trends into future years for McDonalds and its core competitors within the industry. It is divided into three areas: fundamentals, growth and profitability, and capital structure of the company. Liquidity ratios are used to determine how liquid the firm is, and how it will meet its obligations. This also helps us determine how risky the firm is by determining if the company is employing an adequate amount of liability or risk to generate profit. Profitability ratios give us the perspective profitability of the firm is operating. The ratios will help in accurately valuing the company at its current condition, compare its performance against competitors, and project the future results of the company. Fundamentals of McDonalds (MCD) vs. YUM Brands (YUM) Table 1 Financial Condition Company Industry Average SP 500 Debt/Equity Ratio 0.74 1.82 1.13 Current Ratio 1.4 1.3 1.4 Quick Ratio 1.3 1.2 1.2 Interest Coverage 30.6 18.8 28.0 Leverage Ratio 2.1 3.8 3.8 Book Value/Share 13.12 11.95 22.35 The industry average is calculated as an average of competitor brands like YUM, Burger King and Wendys. Current ratio: Since 1999 McDonalds has experienced a steady increase in their current ratio. The present current ratio of 1.4 is higher compared to industry average of 1.3. This increase shows that McDonalds has more ability to pay off their short term debts from the sale of their currents assets. Overall, McDonalds is in fairly good shape because their current ratio is growing. Receivables Turnover: McDonalds has consistently been well below its competitors YUM with accounts receivables turnover. This means that they arent collecting their accounts receivables as promptly as their competitors. This prevents McDonalds from reinvesting and expanding their restaurants which is a major source of revenue. This also allows for a greater chance of default on their accounts receivables. Asset Utilization: This ratio indicates how profitable a company is relative to its total assets. The return on assets (ROA) ratio illustrates how well management is employing the companys total assets to make a profit. The higher the return, the more efficient management is in utilizing its asset base. McDonalds Asset Turnover has consistently been lower than its competitor YUM since 1999. Debt to Equity Ratio: The debt-equity ratio is another leverage ratio that compares a companys total liabilities to its total shareholders equity. McDonalds has maintained a fairly low Debt to Equity Ratio of 0.74 which means that the company has an efficient amount of equity that can cover the cost of its liabilities compared to Yum of 3.14 or the industry average of debt to equity ratio of 1.82. Book value per share: This is an indication of how much shareholders are paying for the net assets of a company. McDonalds book value of 13.12 is higher than the industry average (11.95) or YUM (3.05) Net Income: The net income for McDonalds suffered a dip of 23% in 2007 but recovered in the year 2008, 2009. The total net income in 2009 was $ 4,555 Million compared to YUM who had a net income of $1071Million Shareholders Equity: Shareholders equity represents the amount by which a company is financed through common and preferred shares. The average Shareholders Equity for MCD is $13,287M compared to YUM who has a $709M. Dividend: MCD has consistently grown in dividends over the years. This is one of the most attractive features of MCD. Comparing the dividends of MCD and YUM, MCD has 25% increase on YTY compared to YUM who has only 14%. Growth and Profitability Table 2 Investment Returns % Company Industry Average SP 500 Return On Equity 34.8 48.2 21.4 Return On Assets 16.2 13.1 7.5 Return On Capital 17.6 15.4 10.0 Return On Equity (5-Year Avg.) 22.7 29.0 16.4 Return On Assets (5-Year Avg.) 11.4 10.1 7.6 Return On Capital (5-Year Avg.) 13.0 12.5 10.3 The industry average is calculated as an average of competitor brands like YUM, Burger King, and Wendys. Revenue Growth: The global recession has affected the revenue of both the companies. By year 2009 the consumer demand and currency exchanges have helped recover to pre-recessionary levels. EPS and Growth: The portion of a companys profit allocated to each outstanding share of common stock. Earnings per share serve as an indicator of a companys profitability. The EPS for MCD is 4.11 which have increased from 9% from the previous year while the EPS for YUM is 2.26. The growth of EPS has been fluctuating due to the global economic crises. Profit Margin: A higher profit margin indicates a more profitable company that has better control over its costs compared to its competitors. MCD has a profit margin of 20% compared to Yum is 10%. Return on Equity (ROE): Return on equity measures a corporations profitability by revealing how much profit a company generates with the money shareholders have invested. The ROE for MCD is 34.8 which is less than the industry average of 48.2. From the above figure we can infer for 2009 the ROE for YUM is 180%, but this has not been consistent over the years. For a long term investor this is not good. Capital Structure Charts Table 3 Price Ratios Company Industry Average SP 500 Current P/E Ratio 16.4 20.9 22.4 P/E Ratio 5-Year High NA 6.8 15.8 P/E Ratio 5-Year Low NA 3.2 2.4 Price/Sales Ratio 3.21 2.33 2.03 Price/Book Value 5.30 7.11 3.21 Price/Cash Flow Ratio 12.70 11.90 13.80 The industry average is calculated as an average of competitor brands like YUM, Burger King, and Wendys. Market Capital: Market capitalization represents the public consensus on the value of a companys equity. McDonalds in 2009 had a market capital of $67.3B compared to YUM brand that had a market capital of $16.35B. It also represents the market estimate of a companys value, based on perceived future prospects, economic and monetary conditions. Price to Earnings Ratio: A stock with a high P/E ratio means that investors are expecting higher earnings growth in the future compared to the overall market, as investors pay more for todays earnings in anticipation of future earnings growth. From the table 2 McDonalds PE is 16.4, which is below the industry average of 20.4. However there are limitations since the ratio depends on the earnings per share. McDonalds earnings per share of 4.24 are above the industry average of 1.43. Price to Book Value: This ratio used to compare a stocks market value to its book value. A lower P/B ratio could mean that the stock is undervalued. From the above figure McDonald has a stable P/B ratio compared to the Yum. From table 3 the P/B ratio for McDonald is 5.31 which is below the industry average of 7.11. Price to Sales ratio: The P/S ratio measures the price of a companys stock against its annual sales. From table 3 we can understand that the P/S ratio for McDonalds is 3.21 compared to the industry average of 2.33. This means that the investor would be paying $3.21 for every dollar of McDonalds sales. Price to Cash Flow Ratio: This ratio compares the stocks market price to the amount of cash flow the company generates on a per-share basis. McDonalds has a Price/Cash Flow ratio of 12.70 which is higher than the industry average of 11.90. Conclusion In our overall analysis of McDonalds Corporation using a variation of methods and models, we have conclusively found that McDonalds is currently undervalued in the market and is a Buy. The Method of Comparables was used, which included such ratios as: Price/Earnings, Price/Book, Price/Sales, and Price Earnings growth ratio valuations. The ratio valuations were calculated by finding the industry average and using a varying of other factors to project an expected share price. The industry average is calculated as an average of competitor brands like YUM, Burger King, and Wendys. Price to Book Ratio $ Industry Average of Price to Book value 7.11 Current Book Value of McDonald 13.12 Estimated price of share $93.28 Current Market Price 69.37 Trailing Price to Earnings Ratio Industry Average of Trailing Price to Earnings Ratio 17.9 Current McDonalds earnings per share $4.11 Estimated Market price $73.59 Current Market Price 69.37 Dividends Yield Ratio Analysis Industry Dividend Average (%) 2.73 McDonald Dividend per share 2.2 Expected share price found by dividing McDonalds (Dividends per share)/ (Industry average Dividends yield ratio) $80.50 Current Market price $69.37 Forward Price to Earnings Ratio Industry Average of Forward Price to Earnings Ratio 14.73 Current McDonalds earnings per share $4.11 Estimated price of share $60.54 Current Market Price 69.37 All Data obtained from Yahoo finance on 13/016/2010 From the above calculation the estimated price of McDonald is between $60.54 $93.28. However McDonalds corporation has faced previous law suits on being held accountable for obesity, similarly following the litigation process of cigarettes and tobacco companies. The courts ruled against this issue in McDonalds favor, making this a remote future risk factor. In addition, MCD in its effort to be a more socially responsible corporate citizen, by supporting a healthier society, has developed light and healthy menu items in order to give customers additional eating options and in doing so, broadening the array of its customer base while offering its existing customer base with healthier menu options.

Friday, October 25, 2019

Physical Activity and Weight Control :: Health Fitness Weight Loss Essays

Physical Activity and Weight Control Regular physical activity is an important part of effective weight loss and weight maintenance. It also can help prevent several diseases and improve your overall health. It does not matter what type of physical activity you perform--sports, planned exercise, household chores, yard work, or work-related tasks--all are beneficial. Studies show that even the most inactive people can gain significant health benefits if they accumulate 30 minutes or more of physical activity per day. Based on these findings, the U.S. Public Health Service has identified increased physical activity as a priority in Healthy People 2000, our national objectives to improve the health of Americans by the year 2000. Research consistently shows that regular physical activity, combined with healthy eating habits, is the most efficient and healthful way to control your weight. Whether you are trying to lose weight or maintain it, you should understand the important role of physical activity and include it in your lifestyle. How Can Physical Activity Help Control My Weight? Physical activity helps to control your weight by using excess calories that otherwise would be stored as fat. Your body weight is regulated by the number of calories you eat and use each day. Everything you eat contains calories, and everything you do uses calories, including sleeping, breathing, and digesting food. Any physical activity in addition to what you normally do will use extra calories. Balancing the calories you use through physical activity with the calories you eat will help you achieve your desired weight. When you eat more calories than you need to perform your day's activities, your body stores the extra calories and you gain weight (a). When you eat fewer calories than you use, your body uses the stored calories and you lose weight (b). When you eat the same amount of calories as your body uses, your weight stays the same (c). Food scales Any type of physical activity you choose to do--strenuous activities such as running or aerobic dancing or moderate-intensity activities such as walking or household work--will increase the number of calories your body uses. The key to successful weight control and improved overall health is making physical activity a part of your daily routine. What Are the Health Benefits of Physical Activity? In addition to helping to control your weight, research shows that regular physical activity can reduce your risk for several diseases and conditions and improve your overall quality of life.

Thursday, October 24, 2019

Human Resource Management Notes

09/06/11 Human Resource Management Notes #1 A. Management vs. Leadership: ManagementLeadership Planning and Budgeting * What do we need? * How much time/money? | Establishing Direction: * What do you see? * What’s your vision? | Organizing/Staffing * Hiring the right people * Or delegating tasks | Aligning People: * Target followers * Share ideas/vision| Controlling and Problem-Solving * Keeping things working * Or addressing Issues| Motivating and Inspiring * Convince others * Get them on board| Maintain Predictability and Order * Monitor progress * Achieve results| Produce Change * End Result|B. We watched the video and took notes on the idiosyncratic conductor’s leadership and management style relating to his orchestras. The Four Interpreations of Organizational Processe HRM Notes #2 A. What is the Four Frames? i. The Four Frames is a method developed by Lee G Bolman and Terrence E. Deal by which organizational situations are viewed. This analytical tool reveals the veiled aspects of an organization’s dynamics B. What are the Four Frames? 1. Structural Frame 2. Human Resource Frame 3. Political Frame 4. Symbolic Frame C. Characteristics of the Four Frames: Structural * Metaphor = a machine * All about division of labor * Delegating roles * Involves a clear hierarchy * Exact processes * Setting Goals * Human Resources * Metaphor = a family * Open communication * Grow/Improve Skills * Identify bias/limitations * Resolve conflicts * Informal relationships * Political * Metaphor = Jungle * Competition * Power * Scarce resources * Bargaining * Advocating/forming coalition * Symbolic * Metaphor = Temple * Values * Rituals * Image * Brand * Culture * Heroes * Meaning * Intuition D. Processes: * Strategic Planning: Structural = strategeties to set objectives and coordinate resources * Human Resources = Gathering to promote participation * Political = Arenas to air conflicts and realign power * Symbolic = Ritual to signal responsibility, produce symbols, negotiate meanings * Decision-Making: * Structural = Rational sequence to produce right decision * Human Resources = Open process to produce commitment * Political = Opportunity to gain or exercise power * Symbolic = Ritual to confirm values and provide opportunities for bonding * Reorganizing: Structural = Realign roles and responsibilities to fit tasks and environment * Human Resources = Maintain balance between human needs and formal roles * Political = Redistribute power and form new coalitions * Symbolic = Maintain image of accountability and responsiveness; negotiate new social orer * Evaluating: * Structural = Ways to distribute rewards or penalties and control performance * Human Resources = A process for helping individuals grow and improve * Political = Opportunity to exercise power * Symbolic = Occasion to play roles in shared ritual * Approaching conflict: Structural = Maintain organizational goals by having authorities resolve conflict * Human Resources = Devel op relationships by having individuals confront conflict * Political = Develop power by bargaining, forcing, or manipulating others to win * Symbolic = Develop shared values and use conflict to negotiate meaning * Goal Setting: * Structural = Keep organization headed in right direction * Human Resources = Keep people involved and communication open * Political = Provide opportunity for individuals and groups to make interests known * Symbolic = Develop symbols and shared values * Communication: Structural = Transmit facts and information * Human Resources = Exchange information, needs, and feelings * Political = Influence or manipulate others * Symbolic = Tell stories * Meetings: * Structural = Formal occasions for making decisions * Human Resources = Informal occasions for involvement, sharing feelings * Political = Competitive occasions to win points * Symbolic = Sacred occasions to celebrate and transform culture * Motivation: * Structural = Economic incentives * Human Resources = Growth and self-actualization * Political = Coercion, manipulation, and seduction * Symbolic = symbols and celebration

Wednesday, October 23, 2019

The Piercer

S w 908M57 The Piercer Colleen Sharen and Nicole Nolan wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization.To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University o f Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail [email  protected] uwo. ca. Copyright  © 2008, Ivey Management Services Version: (A) 2008-08-22 â€Å"Don’t forget, your business idea pitch is due in two weeks, † said Professor Sharen at the end of class. Jessica Pierce turned to look at her project team mate, Ashley Mound.Jessica and Ashley were fourth-year management and organizational studies students at Brescia University College, taking an introduction to entrepreneurship course. Ashley and Jessica had developed an idea for the assignment: a personal safety alarm that both shrieked and flashed lights when the person carrying it set off the alarm function. Given the concern that many people had over personal safety, it seemed like a great business idea. In order to present their idea, they needed to show that there was a market for this product and that they had a way to sell it to consumers.The problem was that they did not really know how or where to start to get the information that they needed. They had a lot of work to do to be ready to present their project in the next two weeks. THE ASSIGNMENT The business pitch assignment was challenging. Sharen had asked students to deve lop an interesting business idea and present it to a panel of potential investors. These investors included a successful serial entrepreneur, a business consultant who practised in the area of small- and medium-size enterprises, an owner of a marketing and advertising services business and a business professor.The students were asked to present an innovative idea, show why it would be successful in the market place, demonstrate potential markets, show the business model and sell themselves to the investors as entrepreneurs. The investors were instructed to view their investments as seed money to enable the students to further develop business plans and prototypes of their ideas. The students weren’t required to complete a financial analysis for this assignment. Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 Page 2 9B08M057The investors were asked to assess project ideas on the basis of the feasibility of the idea and whether they believed that t he entrepreneurs would be able to deliver. They could consider the appeal of the idea itself, the logistics and operations required to run the business, the effectiveness of the business plan, the longterm viability of the business or the size of the market. The assignment would be graded 50 per cent based on how much money the teams received from the investors and 50 per cent on the quality of their presentation by the professor. THE IDEA The Piercer was a small device that hung on a chain worn around the neck.When activated, The Piercer emitted a piercing sound that traveled for approximately 500 meters, as well as a bright flashing light. To deactivate The Piercer, the wearer had to push two buttons simultaneously. This was to prevent an attacker from being able to deactivate the device. The piercing noise and the bright flashing light were designed to scare away attackers and attract those who might assist the person being attacked. In the situation of imminent attack, a person would not have to rely on their voice or bring a whistle to their mouth to signal for help.Ashley and Jessica had researched costs and thought that by manufacturing in China, they could make The Piercer for $2 and sell it for $7. 50 wholesale, with a retail price of $14. 95. The idea made sense to Ashley and Jessica. It fit with recent social and demographic trends as aging baby boomers began to need assistance with injuries and falls, and with increased general concerns about health, safety and violence. WHAT NEXT? Jessica and Ashley thought that they had a good idea. Now they had to prove it. What were the target markets for this product? How big were they?Which ones should they choose? How should they sell to them? What proportion of the target market should they expect to capture? Where should they look for information to help them make these decisions? A SIMPLE GUIDE TO INFORMATION RESOURCES AND EVALUATION Ashley and Jessica must do secondary research to be able to evaluate and implement their idea. They will need to consider 1) how to evaluate resources, 2) how to develop effective search strategies and 3) how to identify proprietary resources that support the case for this business. 1. How to Evaluate ResourcesInformation is available everywhere, and for this reason, Jessica and Ashley need to be able to discriminate between good and poor quality information. Appropriate information usage for an academic project includes evaluating and assessing resources for reliability and credibility. Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 Page 3 9B08M057 Goals ? ? ? ? ? Ashley and Jessica should be able to locate and differentiate free versus proprietary web resources. They should be able to identify a quality website. They should be able to evaluate books and other print resources for quality and reliability.They should understand the difference between scholarly and non-scholarly articles and resources. They should be able to cite information properly. Free Versus Proprietary Web Resources Many students think that the World Wide Web has the answers for everything. While the web can have valuable information, students pay (through their tuition) to have access to quality proprietary information resources. Ashley and Jessica could examine some free web sites to help them. For example, associations, company information and government information can be very helpful, as long as the user knows how to determine the quality of a website.Quality Web Sites Anyone anywhere can make a website. Just because it is on the web, does not mean it is good quality or reliable. When Ashley and Jessica are evaluating websites, they need to consider: Who is providing the information? ? Is it a government institution, a university or a company? ? Does the url make sense (e. g. .org, . edu, . on. ca)? ? Does the owner of the website have anything to gain by providing the information? ? Does the owner of the website have good c redentials? ? Has anyone updated the website recently? Note that Wikipedia is not necessarily a reliable resource.Anyone anywhere can modify these pages. While it might be a place to find some resources or links, students should not cite Wikipedia as a reliable resource in an academic paper. The University of Alberta put together a good web evaluation checklist: http://www. library. ualberta. ca/instruction/science/evalweb. pdf For a more comprehensive list on evaluating web resources, see the bibliography on the topic: http://www. lib. vt. edu/help/instruct/evaluate/evalbiblio. html Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 Page 4 9B08M057Evaluating Other Resources Ashley and Jessica need to be critical of all the resources they use, not just websites. Ideally, they should be able to discriminate between proprietary and non-proprietary websites, scholarly and non-scholarly resources and evaluate the quality of any book used. Things for Ashley and Jessica to consider include: ? Who published the book or made the information available? ? How old is the information? ? Has the information been updated recently? ? Is the information peer reviewed? Does this matter? ? Did the library buy and recommend the resource? Is the author credible? Scholarly Versus Non-Scholarly Resources An academic library will provide access to both scholarly and non-scholarly resources. Scholarly work generally refers to published work that has been through a peer review process. Especially in the field of business, there are many practitioner resources. Therefore, Jessica and Ashley need to be aware of the type of information they are gathering. For example, industry trends, say from Standard and Poors NetAdvantage, is not a scholarly resource, yet the information within them could be valuable.Alternatively, ProQuest ABI Inform Global provides access to scholarly articles. Ashley and Jessica may also consider the relative value of evidence or fact ver sus opinion. Students should not read things and trust that what they are reading is accurate. Students should think about the rigor with which the argument is made and the evidence presented. ? Is there evidence to back up a claim? ? Has the evidence been collected in a reliable way? ? Is the author stating an opinion without backing up his or her ideas? Citing Work It is important that Ashley and Jessica cited their work properly, to avoid accidental plagiarism.Some of the more confusing things to cite include Statistics Canada data or online information. Statistics Canada has a website that describes systematically how to cite its tables, publications or other datasets: http://www. statcan. ca/english/freepub/12-591-XIE/12-591-XIE2006001. htm In addition, most academic libraries will have information about citation procedures, or will have copies of publication manuals available for borrowing. Any librarian can be asked about citation procedures. Purchased by Gaia Cuccarini (gaia . [email  protected] it) on March 21, 2013 Page 5 9B08M057 2. How to Develop Search StrategiesGoals ? ? ? ? Ashley and Jessica should know the difference between searching in different search fields, such as the abstract field and title field They should be able to use this technology to search the unique fields They should be able to use the â€Å"AND,† â€Å"OR,† or â€Å"NOT† features of a search engine to help narrow their search. They should understand what truncation and proximity search strategies are, and how that influences a search. Most search engines that index information have similar features. If Ashley and Jessica understand the concepts in searching, they can apply them to any search engine.Take Advantage of Search Fields For example, records in an index have many different fields such as keywords, title, author, publication title, document title, abstract, full document, date, author, etc. It is often possible to specify what part of the recor d to search in, which helps to be more specific with the search. Searching an entire text document may retrieve less meaningful records than a search of just abstracts. Use Boolean Search Strategies Using â€Å"AND† and â€Å"OR† can be helpful in expanding or narrowing a search. AND narrows a search and OR expands it. Using the term â€Å"NOT† can also be helpful, but should be limited.For example, searching for beer companies will retrieve companies on diamonds (DeBeers). Excluding the term â€Å"diamond† from a search on beer companies could be helpful in narrowing one’s search. Truncation and Proximity Many search engines allow for truncation and proximity searching. In ProQuest, an asterisk symbol will truncate. For example, if one types â€Å"leader*† into a search box, records with leader, leaders and leadership will be retrieved. This helps capture all variations of a word. Proximity searching refers to how close two words are togeth er in a document.Presumably, if two words are close together in a document, they are more likely to have something to do with each other. In ProQuest, a â€Å"w/1† or â€Å"w/2† (â€Å"w/3,† etc. ) facilitates proximity searching. For example, if Ashley or Jessica typed â€Å"organizational w/3 learning† in the search box, they will retrieve documents where the word â€Å"organizational† is within three words of â€Å"learning. † Find Creative Ways In There are many different ways to find information. Knowing a company name or a competitor’s name is convenient. Taking advantage of key words (or subject terms) also is a good way to search.Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 Page 6 9B08M057 It is also a good idea to brainstorm for synonyms prior to beginning a search. Being d eliberate about a search strategy and deciding on what concepts to combine can really help make the search go easier. Sea rching is iterative as well. One is advised to read some articles to learn the jargon of the topic, then go back and do the search again using the subject jargon. Most librarians will help on developing a search strategy! 3. How to Identify Proprietary Resources GoalsAshley and Jessica should be able to identify library resources and understand what type of information they can find in various types of resources. The following databases are some of the library databases that Ashley and Jessica could consider. They could also go to the library (or call or e-mail) and ask for assistance. Library staff will know what resources the library has, if there are any other resources that may be of use and how to access and use the resources. Finding Background Scholarly Articles ProQuest ABI Inform Global is a database that indexes business and management journal articles.Most of the articles are available in full text, and both scholarly and non-scholarly articles are available. The search b ox in ProQuest has a drop-down menu on the right that allows users to search in specific fields. For example, users can search the title, abstract, author, company or publication fields. Scopus is a database that indexes articles on the social sciences, life sciences, physical sciences and health sciences. For the purposes of a business or entrepreneurship project, searching only the social sciences category would be appropriate. This resource indexed scholarly articles.Google Scholar is a free resource that indexes scholarly information from the World Wide Web. There is an advanced search engine feature to help specify a search. Many academic institutions integrate access to full text articles with Google Scholar. This means that any article the student has access to via the library, is also available to them via Google Scholar. Because Google Scholar is integrated with library resources, the student will likely need to either be on campus, or logged into the off-campus proxy serve r to take advantage of these services.If they are off campus or not logged into the proxy server the student can still search Google Scholar, but access to full text resources may be limited. Finding News and Magazine Articles Factiva is a database that indexes newspapers and magazines. While this resource does not index scholarly articles, it is a broad resource that captures current global news and events. LexisNexis has a comprehensive database that indexes newspapers and magazines. significant Canadian content indexed there. Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 There is alsoPage 7 9B08M057 Finding Industry Trends Several databases including Standard & Poors NetAdvantage, Mintel and Marketline provide reports on industry trends. These databases provide regularly updated reports on broad industries. Each database tends to report on different industries, so students would have to do some trial and error research to find relevant reports. Stu dents may find their topic is too narrow for these reports. The Financial Post Investor Suite is a database that provides industry information from a Canadian perspective. Finding Company InformationCompany information may be important for a project such as The Piercer, especially for researching competitors. MarketLine provides company information, including financial information, company descriptions and a list of competitors. Similarly, Hoovers provides comprehensive company descriptions. Not all companies are in both resources, therefore checking both resources is recommended for company research. Marketing and Advertising The World Advertising Research Center (WARC) is a resource that provides access to information about marketing and advertising, as well as to case studies of winning ad campaigns.Such a resource could be helpful in this context to see if other, similar products have been marketed, and if so, how they have been marketed. There is scholarly and non-scholarly inf ormation in this resource. Technology Information Both eMarketer and Forrester have information about technology trends. There may be information about the Internet, emerging technologies or electronic marketing. Statistics and Demographics Statistics Canada provides access to demographic data. Many secondary educational institutions participate in the Data Liberation Initiative.This means that information a member of the public would have to pay for, can be retrieved for free by a student. Students, through the academic library website, can use data for research. For more information about accessing statistics, students can talk to their subject librarian. Some resources that Statistics Canada has that might be useful to find demographics include the Market Research Handbook, Canadian Business Patterns, CANSIM data, Census data, and Canadian Social Trends, among others. There are other resources available via www. statcan. ca such as Community Profiles.Data are available down to gr oupings of the population of about 2,000 to 7,000 people, meaning students can find demographic data for each 2,000- to 7,000-person neighbourhood across the country. Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013 Page 8 9B08M057 Global Information Although global research may not be as important for a product such as The Piercer, other entrepreneurial projects may require researching the global market. Economic Intelligence Unit, Global Market Information Database and Business Monitor Online are three resources that provide global market and industry information.Other Helpful Resources Students are encouraged to use the World Wide Web to help them find good information. For example, city homepages often have information about setting up a business. Association websites also can have helpful information. Also, banks have entrepreneurial information on their websites. In addition, many books in the library explain how to develop small business plans or provide information on entrepreneurship. Purchased by Gaia Cuccarini (gaia. [email  protected] it) on March 21, 2013

Tuesday, October 22, 2019

3 Sentences with Unnecessary Semicolons

3 Sentences with Unnecessary Semicolons 3 Sentences with Unnecessary Semicolons 3 Sentences with Unnecessary Semicolons By Mark Nichol Semicolons, used to separate two independent clauses or two or more words and/or phrases in a list when at least one phrase is itself a list whose items are separated by commas, are sometimes erroneously employed when those conditions do not exist. Here are three such sentences, each followed by a discussion and a revision. 1. The regulation extends the civil market abuse regime to new markets and instruments; adds extraterritorial scope; and introduces a new offence of attempted market manipulation. A long sentence that lists several things with extended phrasing does not merit semicolons; commas are sufficient the separate the elements: â€Å"The regulation extends the civil market abuse regime to new markets and instruments, adds extraterritorial scope, and introduces a new offence of attempted market manipulation.† 2. The organization saw an opportunity to connect more clearly with a multitude of stakeholder expectations; position risk in the context of an enterprise’s performance, rather than as the focus of an isolated exercise; and enable organizations to become more anticipatory. This sentence does not require semicolons, either- â€Å"rather than as the focus of an isolated exercise† is clearly parenthetical to the second item, not part of a list within a list: â€Å"The organization saw an opportunity to connect more clearly with a multitude of stakeholder expectations, position risk in the context of an enterprise’s performance, rather than as the focus of an isolated exercise, and enable organizations to become more anticipatory.† (Notice how each item begins with a verb, signaling a clear syntactical structure.) 3. Advances in digital technologies- including intelligent devices and machines; virtual reality; mobile technologies; cloud computing; social business; and smart grids, factories, and cities in an app-centric world- are driving disruptive change. Only one item in this list itself consists of a list, and it is the last item, so no confusion about the organization of the sentence is likely: â€Å"Advances in digital technologies- including intelligent devices and machines, virtual reality, mobile technologies, cloud computing, social business, and smart grids, factories, and cities in an app-centric world- are driving disruptive change.† An alternative is to set the final item apart from the others: â€Å"Advances in digital technologies- including intelligent devices and machines, virtual reality, mobile technologies, cloud computing, and social business, as well as smart grids, factories, and cities, in an app-centric world- are driving disruptive change.† This version also avoids the cluttered look of a semicolon-laden sentence, though it makes the sentence slightly more complex. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:How to Structure A Story: The Eight-Point ArcTaser or Tazer? Tazing or Tasering?48 Writing Prompts for Middle School Kids

Monday, October 21, 2019

Information Security Standards for Internal Revenue Service

Information Security Standards for Internal Revenue Service Information Revenue Service (IRS) is an American agency that collects taxes and enforces the tax laws that guide the entire process. Since the agency is handling information deemed confidential, it has employed numerous securities standards in enhancing confidentiality of their data.Advertising We will write a custom research paper sample on Information Security Standards for Internal Revenue Service specifically for you for only $16.05 $11/page Learn More The information security standards at IRS have abroad perspective; the security components include physical security program, Privacy, Information Protection and Data Security (PIPDS), Information Technology (IT) Security, and National and Personal Security Information (Internal Revenue Manual, n.d.). Information privacy at IRS remains a key issue in enhancing taxpayers’ confidence. The purpose of physical security program is to offer protection to the lives of employees and the entire management of IRS. IRS protects its information through data security, physical security, and sensitive procedures of handling documents. These complex procedures ensure that these resources are not accessible to third parties. Third parties ease to data accessibility can cause risk and harm. In enhancing information security, IRS ensures that the security procedures are in line with the federal regulations of disclosure, access, disposition, and use of information. Under this program, there are authorities that ensure the employees and contractors meet the outlined standards fully. For instance, The Privacy Act of 1974 prohibits information disclosure from public records without a written acceptance from the concerned person. The Act follows a specified rule regarding allowing an individual to access any information. The rule clarifies on the timing fee and location under which the body can authenticate one to view the data (Internal Revenue Manual, n.d.). Although one has a right to get access to any of the agency’s records, an exemption prohibits information access by the public. If on request for information availability on a format that is already available, the agency is free to supply such information on a format that is reproducible. Additionally, IRS conducts annual security briefings to its employees in order to familiarize them with their security responsibilities. The agency only grants access to sensitive information on a need-to-know basis, and the employees remain responsible for providing security to all information to enhance trust among the public. The agency has a Physical Security Handbook that outlines guidelines on minimum information security standards that allow flexibility for developing higher standards for meeting different requirements. The management at IRS implements these policies on physical security.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In Information Technology (IT) Security, IRS’s systems and applications are secured (Internal Revenue Manual, n.d.). The IT Security creates, updates, and maintains information. This system enhances the security of information that the taxpayers have given to IRS thus averting issues of unauthorized information access. Clearly, information security starts with improving physical security of the organization. On Privacy, Information Protection, and Data Security (PIPDS), IRS uses modern technological applications to protect the taxpayers’ personal identifiable information. The agency uses these data according to the applicable laws and Presidential Directives (Internal Revenue Service (IRS), 2013). This step enhances confidence among the American taxpayers. Notably, PIPDS Programs and Policies carry out implementation of varied programs that boost information security standards. For instance, the Privacy Impact Assessments (PIAs) carries out th e overall assessment of both the internal and external threats that can compromise information confidentiality. This program follows the guidelines in the E-Government Act of 2002. Further, Information Protection program protects taxpayers from identity theft. The policies and procedures avoid access of data by hackers. Incident Management Program (IMP) is a program that takes necessary steps and responses in case of data losses especially personally identifiable data. IMP also responds to data disclosure, breach, and theft. IRS prevents third parties from accessing taxpayers’ private information. IRS launched IMP after the President’s Identity Theft Task Force recommendations of data loss notification. Notably, it is a requirement for employees to report any disclosure, theft, and loss of information within an hour. This reporting time limit is meant to minimize the possibility of compromising personal information thus can be used in committing fraudulent activities. However, an employee has to confirm the identity of the caller before reporting the incident within the stipulated one hour. This step helps in confirming if the caller is a taxpayer or not (US Tax Center, n.d.). The PIPDS office monitors and regulates Live Data Testing Reviews. The regulations restrict live data testing without prior written approval; this responsibility lies with the PIPDS office. Taxpayers who perform online transactions through computers are protected from fraudulent cases by the Online Fraud Detection Prevention. The launched phishing program conducts a global monitoring of those who access their websites; in case of malicious occurrences, the program reports to the central system for immediate intervention.Advertising We will write a custom research paper sample on Information Security Standards for Internal Revenue Service specifically for you for only $16.05 $11/page Learn More Markedly, IRS has ensured safety of their data by usin g these programs. In addition, IRS assigns pseudonyms to all their employees. Pseudonyms are false identity names; they ensure safety of employees. In online transactions, such names make it difficult for trackers to identify the personal information of the employees. IRS policies require that an employee must give adequate justifications to why he/she wants to use the pseudonym. Employees have to register these pseudonyms with the managers; this is for accountability purposes. IRS also runs the Unauthorized Access (UNAX) program. UNAX program offers employees’ awareness on consequences of compromising data like losing the public’s confidence (Internal Revenue Manual, n.d.). There is also strict legislation on breaching of Personally Identifiable Information (PII). Personal safety also comprises of harassment, taxpayer contacting an employee with no legitimate communication, and taxpayer’s aggression towards IRS employees. The well-guided procedure on the use of pseudonyms shows the extent at which IRS puts into concern its information security standards. On its key principles, IRS works towards protecting individuals’ rights to privacy. IRS can distribute these data only when they are authorized by federal legislation. The employees can be allowed to access these taxpayers’ data. In case of information leakage to wrong or unauthorized persons during this process, these groups of people become liable. The law requires them not to leak any taxpayer’s information in any format, either electronic formats or hardcopy documents, to any person. The agency goes ahead to conduct in-house trainings to these groups of people in order to remind them of their daily expectations. Moreover, the senior management is always in the forefront in ensuring that the employees adhere to the privacy policy and data security procedures. In case of non-compliance, the senior management applies penalties in line with the IRS policy and guidelin es. The IRS Privacy Principles include the following: It is a public trust to protect employees and taxpayers’ privacies, information are only collected upon request from the tax management, these information are used for a specific purpose, and reliable information are to be obtained from individuals who relate to them (Internal Revenue Service Topics Page, n.d.). In their services and roles, IRS stipulates that its employees, visitors and contractors must adhere to the federal privacy guidelines. IRS system owners are expected to be formulating and promoting effective and efficient information protection, employee and taxpayer policy, and information security programs.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The different divisions in IRS enhance service delivery as specialization does increases work output. The information security standard is enhanced through IRS partnership with Government Liaison and Disclosure. The partnership ensures that the privacy policy applied in the agency is in accordance with the Privacy Act of 1974. It also facilitates the development and distribution of periodical reviews that update the changes on information protection policy. The Information Security Standards for IRS uphold privacy of data. However, monitoring of people as they access information in the internet shows that privacy is at the same time not fully upheld. The idea of tracking for collecting statistical data is revoking the same provisions of information security as it results to tracking (IRS Has Improved Controls but Needs to Resolve Weaknesses, 2013). From this point of view, information in the World Wide Web seems to expose a persons privacy such as location and computer information l ike internet protocol address. Although IRS has made tremendous steps towards achieving total information protection, it still requires effective implementation of the information security program. Some of the components of security, which have not met their targets or operated effectively, include the IRS procedure of testing on the financial system. Data privacy is essential in element in any organization. IRS should ensure that all their security programs are effective thus working towards meeting their objectives. In the end, the improved services will raise taxpayers’ confidence, trust, and loyalty. References IRS Has Improved Controls but Needs to Resolve Weaknesses. (2013, March 15).U.S. Government Accountability Office (U.S. GAO). Web. Internal Revenue Manual. (n.d.).  Internal Revenue Service. Web. Internal Revenue Service (IRS). (2013, March 7).  USA.gov: The U.S. Governments Official Web Portal. Web. Internal Revenue Service Topics Page. (n.d.).  USA TODAY: L atest World and US News USATODAY.com. Web. US Tax Center. (n.d.).  US Tax Center | File Your Tax Return Online, Tax Extension, Tax Forms, Tax Help. Web.

Sunday, October 20, 2019

Take in Stride

Take in Stride Take in Stride Take in Stride By Maeve Maddox A reader is curious about the expression â€Å"to take in stride†: What exactly does it mean and where does the expression come from? The verb stride is one of those lovely old words to survive from Old English. As an intransitive verb, stride means to walk with long or extended steps. The word connotes confidence and purpose. The past tense is strode; the past participle is stridden. The word is frequent in tales of knighthood: From out of the forest strides Merlin, dramatic, cape flowing When [the Green Knight] came to the water he would not wade it, but sprang over with the pole of his axe and strode boldly over the brent that was white with snow. The White Knight had stridden  confidently forward, armor glinting in the sun Stride is alive and well in contemporary contexts: From the start there was something about Woods’ air of invincibility that rubbed me the wrong way as I  watched him stride  down a fairway. It was a case of playing for pride when The Reds strode out onto the field for the final metro of the spring season. The verb bestride is not much used by modern writers, but can be found in literature. It means â€Å"to straddle or to step across.† For example, one bestrides a horse. A victor bestrides his enemy as he stands above him with a foot at each side of the prostrate body. Cassius vividly describes the ambitious Caesar as a giant standing high above ordinary people: Why, man, he doth bestride the narrow world Like a Colossus, and we petty men Walk under his huge legs and peep about To find ourselves dishonorable graves. As a noun, stride refers to a long step taken in walking: Having a longer stride can give you the edge you need when it comes to competing in a race.   In late 2007, the crossing [of Ladd Creek] was simply a long stride from one large rock to another. Idioms like â€Å"take in stride† are based on the noun. Here are the most common: to take in stride: to accept advances or setbacks as normal, to be dealt with as they arise. The image is of a person walking along without stopping for distractions. Examples: Successful traders take losses in stride. There was a time when Americans  took political  cartoons  in stride Paul Ryan  takes  fame and hecklers  in stride. to get into stride/to hit one’s stride: to reach a comfortable and efficient pace. Runners use this idiom in a literal sense to refer to getting into stride before reaching their optimum pace. Figuratively, it refers to the process of settling into a new job or situation. Examples: But Higuain is not the only striker who has struggled to get into his stride in front of goal in this tournament. How Long Did It Take To Hit Your Stride? to make strides: to make progress Lauvao making  strides  as he adjusts  to  Washingtons offense Future MBAs  Make Career Strides to break stride: to deviate from a steady pace while walking, running, or marching. This is another sports term that may be used literally. Figuratively, â€Å"to break stride† would be to pause or stop whatever one is doing. Paper blowing across the track can cause a horse to break stride. Rocco followed with a spiel that I clocked at five minutes and that never broke stride or, to my ear, approached coherence. to put off stride: to cause someone to deviate from a steady stride or movement in sports; to interfere with someone’s expected progress; to disconcert. The horse left his feet and was thrown  off stride  for a brief time. We like people who can laugh at themselves, who can find something risible in the news, and who may put an opponent off stride with some anecdotal jibes. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:50 Handy Expressions About HandsSocial vs. Societal20 Names of Body Parts and Elements and Their Figurative Meanings

Saturday, October 19, 2019

Report Essay Example | Topics and Well Written Essays - 1000 words

Report - Essay Example This is determined by the direction of the moment (Bansal, 2001). When the moment on the left of the force is clockwise and the moment on the right of the force is anticlockwise, the moment generated is considered positive. However, this causes the beam to bend and is also called the sagging moment. There are two types of loads, which cause moments on beams. These are either concentrated loads or distributed loads. Distributed loads have the weight spread over the significant length of the beam. However, the concentrated loads have their weight placed on one point of the entire beam. The shearing force in the beam is the chance that at that point, the beam is likely to slide laterally against the other portion of the beam. The diagrams below best explain the relationship between beams which have uniform weight distribution, their bending moments, and their shearing force distribution along the length. For a beam whose length is denoted as l with a distributed weight of w supported on both ends: The total weight acting on the beam is W*L= WL The reactive forces at both supports of the beam are obtained to be WL/2 (for each end of the beam) In order for the moments to be calculated, the force on the beam is assumed to be acting on the middle of the beam (L/2) (Bansal, 2001; Kassimali, 2010). The moments calculated about a point X length from the left of the beam, will be denoted as: (WL/2)*X – (WX)*X/2 = WL/2 * (L - X) The maximum shearing force will be WL/2, and the minimum shearing force will be –WL/2. There is no shear at the centre L /2. The moment is greatest here, according to the analysis. This can be found by replacing X with L/2 to give: M= (WL/4)*(L - L/2) = WLL/8 The ultimate limit state allows that the load allowed on the beam be 1.33*W, where W is the weight of the first plastic deformation of the beam. Thus, the initial load allowed on the beam, considering the ultimate limit state design, should consider that the beam is subjected to elasticity up to a certain extent (Kassimali, 2010). The solution W = 5KN + 1 KN = 6 KN L = 4000mm = 4M Shearing force: Wl/2 =6000N * 4m* 0.5 = 12000NM 12 KNM The maximum moment: WLL/8 = ( 6000*4*4) / 8 = 12000NM The ultimate weight allowed is, 1.33 * 6000 = 7980 N Question 2 The U-values are sum of all the thermal resistances of the materials used in the construction of the walls of buildings. This is also described as the sum of the inverse of all the thermal resistances in the materials used in constructing buildings. Thermal resistivity is a measure of a material’s property to fight the transfer of heat across a material, with a temperature difference across it. These values are obtained from already set British standards, published by the British Standard Institute. The units for this property are (m2k)/W. Fabric heat loss in materials occurs when there is a temperature difference between two different sides of that material. Due to the difference, the material experienc es a process of heat transfer from the hot side to the cold side. In the construction industry, it is important to obtain the heat loss values in order to know how to heat up buildings in winter, to a desirable temperature. The units for the U value are W/m2K, which is the reciprocal of the thermal resistivity (Yogesh & Jaluria, 2003). The thermal resistivity of the dense brickwork – 1.6 Thermal resistivity of wool batts - 0.048 Thermal conductivity of glass –

Friday, October 18, 2019

Has no topic Essay Example | Topics and Well Written Essays - 1250 words

Has no topic - Essay Example The Muslims settled on lands that had their own artworks and traditions, as a result, there was a blend between two cultures, original Muslims and Iranian cultures, which came together to form the first piece of artwork by these two communities. Artists who worked in Iranian cultures continued their arts but now worked under Muslim leadership. Islamic art has shown brilliance in its presentation because choice of colors is always great and there is a good combination of form and design thereby creating an immediate response on the viewers. This kind of presentation has made Islamic art too hard to resist and it is clearly becoming one of the finest art works in history (Hillenbrand 33). Islamic artists have succeeded in combining both animal and human figures in their works making them more appealing. Motifs can be seen on decorated surfaces of objects forming part of the artwork or patterns (Fehervari 6). Islamic art evolved through several stages, some of which are discussed below Abbasid Period (750-1258) In this period, concentration of Islamic cultural and political views changed and people engaged in more activities in Iraq. It is during this period that better styles of art emerged and greater techniques came up which later spread all over the Muslim community influencing artworks to a great extent (Arnold 14). Two cities of Samarra and Baghdad all copied this new trend in arts. In Samarra, particularly, great advancements were made in art and painting as surfaces were curved in different ways, a technique later called beveled style. Later in the 10th century, political unity of Abbasid became weak, and it lost control over several sections of Iran and Egypt. An example of art work during this period is shown below: This is a representation of Samarra and shows. The beveled style can be depicted from this piece of work shown by smoothening of its surfaces. The Almohad and Almoravid Periods (1062-1269) As a new Islamic power, Almohad and Almoravid took pa rt of Morocco in North Africa and established its capital at Marrakesh in 1062 (Metropolitan Museum of Art 30). They also took control at other parts of Africa in Algeria and Sahara. They did away with most Islamic arts and established their own in these territories. After establishing their territories, Almoravids later weakened and their part was taken by the Almohads. They schematized ornaments and utilized the use of designed geometry. Some outstanding works by Almohad are shown in the mosque built in Sevilla. An example of this period’s artwork is shown below: This is a fragment displaying an enormous image with gazelles and many other animals around it. It is an expression of the skills possessed by early Muslim artists. Ayyubid period (1171 – 1260) This period had its leadership in Salah al – Din. In his reigns he called an end to Fatimid Caliphate replacing it with Ayyubid. This artwork was majorly concentrated on metal works and used fragment design to decorate its works. They specialized in ceramics and metals in an attempt to decorate the Muslim culture and bring people to understand art work deeper. In addition, they took part in a lot of building activities, building different structures in Egypt and Syria. Their most outstanding work is in Cairo: the fortified citadels. In

Quality and environmental management systems 333 Essay

Quality and environmental management systems 333 - Essay Example This paper explores possible ways in which Timmerhus UK Ltd. could integrate its QMS and EMS into a single complete management system. It also looks at possible environmental aspects of the company, suitable objectives, targets and relevant environmental programmes as well as auditing arrangements that will be necessary for the integrated management system. How Timmerhus UK Ltd Could Integrate Its QMS and EMS into One Complete Management System There are numerous models and strategies that Timmerhus UK Ltd could use to integrate its QMS and EMS into a single comprehensive management system. vonAhsen and Funck (2001) suggest three fundamental models and strategies that organisations can utilise in the implementation and assessment of their management systems. These models include Integration model founded on ISO 9001 Integration model founded on ISO 14001 The European Foundation for Quality Management (EFQM) model. There are different approaches or strategies that corporations could t ake towards integrating management systems that already have. The following approaches are available for organisations aiming to integrate their management system: A company can first establish a quality management system then add to it environmental management system, which is consistent with vonAhsen and Funck’s ISO 9001-based model. Starting with the implementation of environmental management system followed by quality management system, which ascribes to vonAhsen and Funck’s model based on ISO 14001. Simultaneously establishment of environmental management system (EMS) and Quality management system (QMS) ISO 14001-based Integration Model Based on ISO 14001, environmental management systems focus absolutely on environmental aspects of an organisation. According to this model, environmental management system is first implemented and then quality system is added on to it. The approach demands that all processes be documented in terms of environmental aspects and quali ty. ISO 9001- Based Integration Model Unlike ISO 14001-based integration model, ISO 9001-based integration model requires an organisation to develop integrated management system on the basis of ISO 9001 followed by incorporation of environmental factors and any other relevant elements to the organisation (BS EN ISO 9001:2008 2008). The European Foundation for Quality Management (EFQM) Model This model was established in 1992 as an organisational assessment framework for companies seeking European Quality Award. Timmerhus UK Ltd can make use of the EFQM excellence model to integrate its QMS and EMS. An organisation ca optimise from this model by developing comprehensive understanding of its major concepts, which may change with organisational improvement and development. Some of the main concepts of EFQM include: Attainment of results, which are satisfactory to all stakeholders of the company Creation of sustainable customer value Good leadership and purpose consistency Management vi a a series of autonomous, but interdependent management systems Focus on development of employees through engagement to optimise the contribution of employees Creation of a continuous learning organisation environment Establishing and sustaining value-added alliances Enforcing corporate social responsibility by surpassing the minimum regulatory requirements and expectations of stakeholders The EFQM model

Gender and Sexual Violence Essay Example | Topics and Well Written Essays - 1500 words

Gender and Sexual Violence - Essay Example Stotzer (p. 172) discusses that according to surveys of transsexuals, there seems to a significant number of sexual assault incidents, including rape, especially for the younger transsexuals. The most common forms of violence against transsexuals include unwanted sexual activity with about 60% of these incidents being forced intercourse (Stotzer, p. 172). These transsexuals are often victims due to their perceived non-conformity to the standards of society. The motivation for these sexual assaults includes hatred and negative attitudes towards the transgenders (Stotzer, p. 172). Victims are quick to declare that they are often victims of sexual assault or rape and mostly due to homophobia and hate. They also feel that they are often victims of sexual assault because of their gender identity, their gender expression, and their transgender status (Stotzer, p. 172). Abuse is also often carried out by various people, mostly strangers. Police officers, parents, siblings, neighbors, friend s, and other relatives are also often the perpetrators of the abuse (Stotzer, p. 173). Most acts of violence include sexual assaults, harassment, and in some cases, muggings. Unfortunately, some are carried out by persons known to the victim (Stotzer, p. 174). Some of these offenders include fathers, stepfathers, mothers, stepmothers, current spouse/partners, brother, siblings, or a former spouse or partner (Stotzer, p. 174). Other perpetrators not closely known to victims include landlords, tenants, ‘pick-ups,’ security personnel, and in some cases, service providers. Murphy (p. 7) further discusses that violence against lesbians and gays are the most apparent dangers which these individuals face. However, they are also likely to face structural violence and episodic violence. Structural violence against gay men is often caused by heteroxism which basically embodies a system that degrades homosexuals for their behavior and their identity (Murphy, p. 7). Psychological h eteroxism is often linked with individuals’ attitudes and behaviors and cultural heteroxism often refers to their societal customs and institutions, including their religion and laws (Murphy, p. 7). The cultural heteroxism is the most common cause for violence as it can also lead to discrimination against these lesbians and gays in their housing and employment. Murphy (p. 7) cites the cases of Margarethe Cammemeyer, a military veteran who was dismissed from the army after years of exemplary service to her country; also the case of Sherry Barone who faced opposition from a cemetery who refused to include the epitaph ‘life partner’ on the headstone of her deceased partner (Murphy, p. 7). More indirect incidents of discrimination are perpetuated against gays and lesbians; and those who often decide to reveal their sexuality end up being dismissed, demoted from their work or driven out of their homes. The causes of gender violence seem to stem from preconceived notio ns and assumptions of gender. Specifically, these assumptions are based on the expectations for each gender which often refer to extremely different behavior, mostly referring to dominant males and subordinate females (Perry, p. 417). Violence is considered to be a way by which males can impose their authority and dominance over women; and it seems to be expected for men to enforce such violence in order to keep women in line (Perry, p. 417).

Thursday, October 17, 2019

Case Study Analysis Essay Example | Topics and Well Written Essays - 2000 words - 1

Case Study Analysis - Essay Example Babcock conducted wide level strategic changes specifically in areas of process re-engineering, management restructuring as well as people’s management. Efforts were successful and within first year of performance Babcock managed to generate efficiencies in excess to targets across the board without compromising any security risks and services. Babcock over years developed successful relationship with all stakeholders resulting Faslane to become home base for the entire UK submarine fleet. The case assessment herein provides the review of the strategic measures exercised by Babcock for the purpose in relevance to academic management literature. CASE STUDY ANALYSIS The strategic changes undertaken by Babcock from 2002 to 2010 changed the strategic model of Faslane. Broadly, the change has been taken in the areas of process re-engineering, people’s management with flattening management structure etc. The section provides the assessment of the referred changed from three a spect as discussed as follows: Describe the Strategic Change Context In 2002 The change undertaken at Babcock has can be defined as the transformational change among options set out below: (Balogun, J. (2001) Transformational change requires changing in believes and the culture in all (Johnson, Whittington, & Scholes, 2011). As noted in the description people at Faslane were more towards Inwards River fencing than actually intending to serve the Navy. John Howie the managing director of Babcock then also declared that efficiencies in the project are to be explored by changing the mindset of the people serving at Faslane to delivering services with minimum possible cost. Babcock adopted the strategic path for change with intense consideration adhered to factors that are sensitive to firm. These considerations were given to underlying situation of the firm within outer, middle and internal context as follows: (Balogun, J. (2001) Changes undertaken were strictly aligned to maintain wit h the organisational context as focus. Therefore, focus was made changing attitudes and processes than organisation. Low level changes were timed on first place with managerial transformation in later phase. Scope was maintained to change the attitudes towards jobs than changing jobs or people. Such as processes were engineered to ensure value addition to the processes ensuring critical steps preserved while eliminating wastes and redundancies. Almost entire staff was moved towards change with exploring change and efficiency possibilities and capabilities across the board. Small level readiness of employees for changed were enhanced with consistent communication and increased sharing of power. Restructuring, top-down path and participative approach, management leveraging support to understand the value addition paradigm of serving with least possible expense, leadership and involvement of change action team formed the defining characteristics of the strategic change design implement ed by Babcock at Faslane. For such change implementation Babcock undertook measures that consistently increased the strength of factors that appreciated and supported change (Milicevic & Ilic, 2010). In line with Lewin’s Force field analysis (Thompson & Martin, 2010), John undertook measures that also weakened the forces resisting change. Change drivers originally strengthened from the Babcok gaining contract for the job. Further, consistent contact with stakeholder ensuring the enhanced quality of service while reducing bureaucratic pressures from employees also

Enterprise Risk Management at Google Research Paper

Enterprise Risk Management at Google - Research Paper Example Google has emerged as the front-runner in the market through its search engine and despite the present recessionary trends, the Company reported gross revenues for the third quarter of 2008 of $5.4 billion, which reflects an increase of 3% compared to the second quarter of 2008 and an increase of 31% compared to the same period last year (www.google.com/ financial release). But the Company also faces an increasing level of challenges on grounds of privacy and cultural issues on its websites.   ERP has been defined has been defined as â€Å"the discipline by which an organization in any industry assesses, controls, exploits, finances, and monitors risks from all sources for the purpose of increasing the organizations short- and long-term value to its stakeholders.† (www.casact.org, p 10). Before many of the accounting scandals such as the one at Enron erupted, risk assessment standards were considered a separate niche from regulating and auditing standards. But this has now been made a part of corporate governance, which is important in ensuring the economic health of corporations. Including risk assessment as a part of corporate governance provides investors the opportunity to periodically assess any potential risks that may arise. The Treadway Commission (COSO) issued a landmark report, in which it identified internal control measures that were necessary to ensure financial accountability and transparency in corporate governance. The three primary objectives of internal control according to this report are: 1) efficient and effective operations, (2) accurate financial reporting, and (3) compliance with laws and regulations.     

Wednesday, October 16, 2019

Case Study Analysis Essay Example | Topics and Well Written Essays - 2000 words - 1

Case Study Analysis - Essay Example Babcock conducted wide level strategic changes specifically in areas of process re-engineering, management restructuring as well as people’s management. Efforts were successful and within first year of performance Babcock managed to generate efficiencies in excess to targets across the board without compromising any security risks and services. Babcock over years developed successful relationship with all stakeholders resulting Faslane to become home base for the entire UK submarine fleet. The case assessment herein provides the review of the strategic measures exercised by Babcock for the purpose in relevance to academic management literature. CASE STUDY ANALYSIS The strategic changes undertaken by Babcock from 2002 to 2010 changed the strategic model of Faslane. Broadly, the change has been taken in the areas of process re-engineering, people’s management with flattening management structure etc. The section provides the assessment of the referred changed from three a spect as discussed as follows: Describe the Strategic Change Context In 2002 The change undertaken at Babcock has can be defined as the transformational change among options set out below: (Balogun, J. (2001) Transformational change requires changing in believes and the culture in all (Johnson, Whittington, & Scholes, 2011). As noted in the description people at Faslane were more towards Inwards River fencing than actually intending to serve the Navy. John Howie the managing director of Babcock then also declared that efficiencies in the project are to be explored by changing the mindset of the people serving at Faslane to delivering services with minimum possible cost. Babcock adopted the strategic path for change with intense consideration adhered to factors that are sensitive to firm. These considerations were given to underlying situation of the firm within outer, middle and internal context as follows: (Balogun, J. (2001) Changes undertaken were strictly aligned to maintain wit h the organisational context as focus. Therefore, focus was made changing attitudes and processes than organisation. Low level changes were timed on first place with managerial transformation in later phase. Scope was maintained to change the attitudes towards jobs than changing jobs or people. Such as processes were engineered to ensure value addition to the processes ensuring critical steps preserved while eliminating wastes and redundancies. Almost entire staff was moved towards change with exploring change and efficiency possibilities and capabilities across the board. Small level readiness of employees for changed were enhanced with consistent communication and increased sharing of power. Restructuring, top-down path and participative approach, management leveraging support to understand the value addition paradigm of serving with least possible expense, leadership and involvement of change action team formed the defining characteristics of the strategic change design implement ed by Babcock at Faslane. For such change implementation Babcock undertook measures that consistently increased the strength of factors that appreciated and supported change (Milicevic & Ilic, 2010). In line with Lewin’s Force field analysis (Thompson & Martin, 2010), John undertook measures that also weakened the forces resisting change. Change drivers originally strengthened from the Babcok gaining contract for the job. Further, consistent contact with stakeholder ensuring the enhanced quality of service while reducing bureaucratic pressures from employees also

Tuesday, October 15, 2019

Devotion of St Augustine to the Sacrament of Penance Essay

Devotion of St Augustine to the Sacrament of Penance - Essay Example At a very impressionable age Augustine was quite impressed and influenced by Cicero’s dialogue â€Å"Hortensius† and therefore left to Carthage for further studies in rhetoric. He was very unfortunate as he gave up his Christian faith and practiced the Manichaean faith which really broke his mother’s heart when she heard about it. Augustine lived a hedonistic lifestyle in his youth and hence developed a close relationship with a young woman who remained his concubine for fifteen years and got a son by her named Adeodatus. By the age of thirty, Augustine had carved an enviable niche for himself in the Latin world. â€Å"Confessions† written by Saint Augustine, gives us a vivid account of the pagan life he had led as well as his spiritual transformation as a devout Christian. The word â€Å"Confessions†, take on two meanings – one is to confess ones sins before God and the other is to acknowledge the truth about God. Therefore â€Å"Confessions†, can be taken as praise and glory to God Our Father. (Warner, Rex 1963) Augustine is considered as one of the most steadfast and important figures in Christianity and is considered as a great saint and a patron of the St. Augustine religious order. In Book One, Augustine tells us of how he hated going to school and used to get beaten by his elders. He also claimed dishonest victories and pilfered things from his parents and traded them with other children. He was also gluttonous and had other disgusting habits. Finally, when realization comes to him he cries out to the lord in despair saying, â€Å"Oh, God! Woe to the sins of men! When a man cries thus, thou showest him mercy, for thou dids’t create the man and not the sin in him†. In his ‘Confessions’, St. Augustine tells us of how he lived a dangerous and precarious life and it was only because of Ambrose that he was brought back to the Christian faith. Referring to the topic of

Monday, October 14, 2019

Apple lnc

Apple lnc Apple lnc, is an American multinational corporation that designs and manufactures consumer electronics and computer products. The companys well-known products include the Macintosh computers, the IPod and the iPhone. This company was established in Cupertino, California on April 1, 1976. On January, 1977, the company had been incorporated as the name called Apple Computer, lnc. for over 30 years. The company have decided to change their companys name to Apple lnc.. Apple lnc. operates more than 250 retail shops in nine countries and an online store. It has about 35,000 employees in the whole world and had worldwide annual sales of $32.48 billion dollars at the end of the year 2008. (Seekingalpha.com,2009) According to the research in 2009, Apple lnc. has a high market share for about 7.96%. (www.apple.com ,2009) 1.2 Theory Product: Business must make sure that their products are meeting the needs of their customers. Their product must be suitable for their customers. (HALL,D, et al, P75) Price: The pricing policy that a business chooses is often a reflection of the market at which it is aiming. Prices will not always be set at the level which will maximize sales or short-run profits. (HALL,D, et al, P75) Promotion: There is a number of promotional methods a business can use including above the line promotions. (HALL,D, et al, P75) Place: This refers to the means by which the product will be distributed to the consumer. (HALL,D, et al, P75) Market segmentation: Breaking down a market into sub-groups with similar characteristics is known as Market Segmentation. (HALL,D, et al, P75) 1.3 Aims Fortunately, the report will recommend the theory of Marketing and Business. Thirdly, the next purpose of this report is to try to explain one of the ads for IPod.(Figure 1) Then, this report is going to investigate why the Ads has been product like its style and type. According to this report, the writer is going to state how this Ad work in the market. Finally, the final goal is to predict the future development of Apple lnc. 3. Findings 3.1 Color First of all, it is clear that there are many different background colors in IPods ads, such as pink, red, blue and yellow. It is a random color for the background in all of the IPods ads and the color will never changeless. On the basis of this ad, the background color is pink, a color which is very romantic. 3.2 Spokesman IPods ads never use the same spokesman. The person in the ads are always in black whether they are men, women or children. In this ad, there is a pretty girl in the ad who is in black and this become another selling point. The consumer will never find out who the man or woman is because it is in black. 3.3 Production This is an ad for IPod nano, which is one of the most important product in Apple lnc. IPod nano is a MP3 which is very small and fashion. Thus, in their ads it is always a white IPod nano in the spokesmans hands or pockets. Therefore, black and white become a contrast color so that it can be easy to see that the colors of IPod and person are completely different from each other. Consumers can see different person with different IPod nano, but not other MP3 or MP4. 3.4 Catchphrase The catchphrase for this ad is, The best just got better. 3.5 Price According to the internet, the price of IPod nano is higher than other MP3s. For an 8GB IPod nano, it will cost the consumers $149 dollars or more than 1000 yuan and 16GB IPod attend to a price at $179.00 dollars.(APPLE STORE, US) 4. Discussion 4.1 Color According to Color Wheel Pro See Color Theory in Action, Red is the color of fire and blood, so it is associated with energy, strength, power, determination as well as passion desire and love. Red is a very emotionally intense color. It enhances human metabolism, increases respiration rate, and raises blood pressure. Red also brings text and images to the foreground. Pink is a color which is an embranchment of red, it means signifies romance, love, and friendship which is denotes feminine qualities and passiveness. (Color Wheel Pro) This ads background color is pink so that consumers can notice that this production is filled with energy and power which is very suitable for the youth. Contributed to there are many kinds of background color, the place can change to every kind of places. Every color represents a place, which means that the consumer can use the IPod nano anywhere and anytime they like. 4.2 Spokesman Spokesman, definition from Ansewers.com, Spokesman is a man who speaks on behalf of another or others. (Spokesman, Dictionary) Consumers can not recognize the spokesman in this ad because she is in black. The company does not care about whether the spokesman is famous or not because their propagandistic main point is their production, IPod. The black color stand for every kinds of person can use IPod. There are no circumscriptions whether the consumers are old or young, boy or girl. It means that everyone can use IPod anyplace. 4.3 Marketing mix 4.3.1 Price According to Business Studies (Hall, D et al), Price will not always be set at the level which will maximize sales or short-run profits. It means that IPod should have different of prices level for the consumers to buy. The price can not be the same because every consumer has their own demand. The demand will decrease if the price never changes or the product is always the same as before. Compare with other MP3s, IPods price is higher than other products. According to store.apple.com, for an 8GB IPod nano, it will cost you $149 dollars and 16GB IPod attend to a price at $179.00 dollars.(APPLE STORE, US) The price urge IPod to be the best brand in MP3. Relative to other MP3s in China, it can be easy seen that the price is very high so that it become valuable production in China. 4.3.2 Place According to Business Studies (Hall ,D et al), Place refers to the means by which the product will be distributed to the consumer. The main idea in this Ad depend on consumers is able to use IPod nano everywhere. The size and weight become the superiority of IPod which is better than any other MP3. The Ad show this idea from the place where the consumers put their IPod in. 4.3.3 Promotion According to Business Studies (Hall ,D et al), there is a number of promotional methods a business can use including above the line promotions. The Apple lnc. dose the same work on promotion as other companies. Sometimes they hold sales promotion in retail space, therefore, it become a chance to get sponsorship for their advertising. Sale promotion is a function which the consumers prefer to attend because they will buy products in low price. Sales at the expense of profits is a good way to make profits. 4.4 Catchphrase The catchphrase for this ad is, The best just got better. This is a sentence which is short but deep thinking. The word best and better can be easily change in to anything as the company like. The consumers become able to put more interest in the product which the company what to sell. 5. Recommendations To summarize, This Ad is suitable for IPod because of its exquisite idea. Based on the above discussion, IPod will become the youths first choice because its fashion and superiority. The fact have proved that Ipod is now the best mp3 for the youth. Never theless, if the company do not compare with others, its lifecycle will be end. Apple lnc. is reviving by brought up new products and changing target market. From different kinds of Ipods, it definitely shows that expand target market is very necessary for every company. The Ad has play an important role in attracting consumers and increasing market share. Because of its superiority Ad, IPod has become one of the best MP3 in the world. However, the developing market are never fully explored in a short period of time, it is still a good chance for Apple lnc. to expand their company size and making good advertisement might be a good choice. In a word, there is a good way for all the company to expand themselves and the target market. 6. References http://seekingalpha.com/article/115797-apple-inc-f1q09-qtr-end-12-27-08-earnings-call-transcript?source=front_page_transcriptspage=-1 (access at 2009) http://www.apple.com/pr/library/2008/10/21results.html (access at 2009) http://baike.baidu.com/view/14874.htm (access at 2009) http://store.apple.com/us/browse/home/shop_ipod/family/ipod_nano?mco=MTAyNTQzMjM (access at 2009) http://www.answers.com/topic/spokesman (access at 2009) Hall, D., R, Jones, C. Raffo, A. Anderton (2008 4th p75), publication: British Library Cataloguing

Sunday, October 13, 2019

Ford Motor Company Supply Chain Strategy Essay -- Ford business Strate

Ford Motor Company Supply Chain Strategy Background In 1913, Henry Ford revolutionized product manufacturing by introducing the first assembly line to the automotive industry. Ford’s hallmark of achievement proved to be a key competence for the motor company as the low cost of the Model T attracted a broader, new range of prospective car-owners. However, after many decades of success, customers have become harder to find. Due to relatively new threats to the industry, increasing numbers of cars and trucks are parked in dealer lots and showrooms creating an alarming trend of stagnation and profit erosion. Foreign-based automakers, such as Toyota and Honda, have expanded operations onto domestic shores and, in turn, have wrestled market share from American automakers. As a direct result, unit over-capacity has steadily risen, while heightened competition and diverse product lines have led to increasing customer demands. To answer these threats, Ford has made recent attempts to transform its dated vertical integration production model into a maneuverable, efficient supply chain. Emphasizing methods such as Just-In-Time (JIT) inventory, Total Quality Management (TQM), and Synchronous Material Flow (SMF), Ford has derived a multi-tiered system of supply. The tier system consists of numerous generic suppliers, â€Å"tier two† and below, who are managed by â€Å"tier one† vehicle sub-system suppliers. The â€Å"tier one† suppliers, by nature, are completely dependent upon Ford’s survival since the provided sub-system component is specific solely to Ford. Dell and Virtual Integration Despite the revamping effort, Ford remains plagued with prolonged Order-To-Delivery (OTD) time periods, congested inventories and error-ridden procurement processes. Upon investigation, these troublesome issues appear to be well addressed by the radically new direct business model of the Dell Computer Corporation. Dell differentiates itself through the utilization of virtual integration, an efficient and effective direct business model facilitated by electronic business providing Build-To-Order (BTO) products directly to customers. The process begins with the customer specifying exactly which features are to be included in the desired computer. Dell, then, buys components from several different suppliers via Internet-based JIT ordering. By using Dell’s process of JIT ordering , misal... ...ndustry by integrating a direct supply network. Ford’s goal of TQM could be easily met by implementing a variation of Dell’s already successful virtual integration business model. Fostering cooperation through incentives is key since compliance of supply chain partners is necessary to gain first-mover advantage. Conclusion In today’s competitive environment, it is important for any business to focus on the customer and to provide unique value in order to achieve a sustainable competitive advantage. Without virtual integration, competitive advantage is lost. Successful implementation of virtual integration initiatives allows supplier companies, which are performing only certain processes, to work together as one entity. Therefore, operations become more efficient by reducing inventory, assuring quality, and reducing delivery time. More importantly, the organization maintains the ability to thrive in a competitive marketplace by achieving increased customer satisfaction through unique and strategic core competences. Virtual integration will redefine corporations and , eventually, entire industries as supply chains evolve into a new business model of cooperation and sharing.