Saturday, August 31, 2019

Supply Chain and Risk Management

Introduction Like economies and financial markets, as supply chains grow more global and interconnected, they get more exposed to disruptions and risks. Moreover, the supply chain speed exacerbates the problem. Even minor miscalculations can have major consequences as the impact spreads like viruses throughout the complex supply chain networks. Hence, it is vital to build smarter supply chains and address the issues that pose a challenge to this objective. These risk factors can effect productivity, economy and band image of the company so it is very important to identify and manage these problems on right time. Risk is a set of unexpected or unpredictable event that directly or indirectly affects the efficient working of an organization. † So to avoid this situation there should be a effective risk management process which can help the company to work efficiently and effectively Risk management can be defined as Risk management is an important function in business industry. It is an entrepreneurial need which caters all the solution which are needed for the efficient working of an organization to achieve is goals. It helps the management to understand the root cause of the problem and all possible ways by which it can be solved.Risk management process About The Company Cipla is one of the pioneer’s in the Indian Pharmaceutical Industry. The company was first started in 1935 and throughout its long journey of 75years has introduced many life-changing and innovative drugs to serve humanity while supporting, improving and enriching millions of lives worldwide. Cipla has 50 manufacturing plants with its headquarters situated in Mumbai, India. Its current stable has over 1200 products in current production which can cure almost every illness known to man.Cipla boasts the world’s largest range of respiratory medicines, dosage forms and devices for the management of asthma and other respiratory illnesses. The company is well known for providing co nsistently high quality of medical updates and patient education material to help patients as well as doctors in their respective environments. The company had also setup a dedicated center which carried on research and education on respiration named the Chest Research Foundation (CRF) in Pune, India. The company has also pioneered revolutionary medicines for treatment of cancer, AIDS, hepatitis A, B and C. ardiovascular disease, arthritis, diabetes, weight control, depression and many other health conditions, distributing its product to almost every country. Recently the company had researched and created a medicine called QVIR that can cure AIDS and can be used for both first and second line treatment of HIV-AIDS. Currently, 40% of the worlds HIV patients undergoing anti AIDS therapy are taking Cipla Drugs. Pain Points with QVIR Cipla is well known for is innovations in the field of pharmaceutical but not so for its supply chain and impeccable delivery.This was also the case with the recently launched QVIR which had not been effectively distributed or consumed at the right time. Every year around 5 -7 % of the patients failed their first line treatment because the dose was unavailable and wasn’t there at the stipulated treatment time. For a drug priced at a paltry sum of $ 3 and the life changing benefits of containing four drugs in one single strip, it never served its intended purpose. From our qualitative data collection method we understood that the pain points facing Cipla in the delivery of QVIR were as follows: * Inventory levels are too high and/or misplaced Spending is too high, either indirect or direct categories * Cash-to-cash cycles are too long * Lean manufacturing and quality goals are not being met – potentially accompanied by excess waste generated or scarce resources used Cipla’s Supply Chain Cipla has over 180 manufacturing plant across the world out of which 50 manufacturing plants manufacture QVIR. Cipla also manufac turing some of its own raw material in three of its own factors situated in Mumbai, Himachal Pradesh and Karnataka states of India.For some of the raw materials of QVIR, Cipla also conducts import/export trade with some of its local and international suppliers located in India, Germany, USA, UK, Italy, France, Australian, South Africa and South Korea Chine and Japan. Cipla has its export market in 180 countries of which its main customers are USA, Germany, South Africa, New-Zealand, Australia, China, Sri Lanka, Singapore and Japan. The transportation is carried out internationally via ship and air and domestically either by road or rail. Value Stream Mapping for QVIRThe Top challenges of Cipla’s Supply Chain for QVIR After conducting our initial investigation, assessment and analysis we were able to group the top challenges of Cipla’s supply chain into 3 major components: * Supply Chain Visibility * Increasing Customer Demands * Globalization Supply Chain Visibility Th ere is an inherent lack of willingness to share information and collaborate effectively. Inhibitive organization silos are widespread across Cipla where individuals are too busy to share within the organization and among supply chain networks.This leads to misaligned performance measures, ineffective integration and collaboration not viewed as important. Namita Kelwa, Partner Management director who is also a champion of change within Cipla says, â€Å"When we talk about supply chain visibility, it does not simply mean visibility into your own supply chain and your own shipments. It means visibility among partners, which enables collaborative decision making closer to the customer. This is both a science (managing the technology) and an art (using the information and metrics for competitive advantage). Partial and experimental adoption is widespread in visibility, but extensive adoption is still very low. Increasing Customer Demands Customers are almost always last on the list for synchronizing supply & demand. Cipla as an organization has forgotten to identify that customers continue to have aggressive demands for differentiated products & services, while their own product lifecycles have been shortening. According to Garima Singh, vice president of consumer products, â€Å"We must combine SCM with CRM†¦ get supply chain staff thinking in terms of a commercial customer mindset.Bringing the customer perspective into all facets of SCM will push us to further supply chain excellence† Remaining competitive in developing a new product or service also has the following challenges such as cross function cooperation, product/service innovation and proper allocation of resources. There should be a further integration of customer demands from inception to delivery – the entire Cipla global supply chain network focused on the end customer. Globalization Globalization for many businesses including Cipla is the complexities of interconnectivity.The imp act of global sourcing has led Cipla to experience delivery issues in the form of unreliable commitments especially in the case of the QVIR drugs. It has also resulted in larger than anticipated lead times and quality issues. While looking for lower cost sourcing options, Cipla should pave the way for constantly updated and differentiated business models and distribution strategies. Identifying Risk factors Supplier Risks In the supply chain management of the pharmaceutical industry the selection of supplier should be done very carefully because the raw material can directly affect the finished drug.In CIPLA API Plants the ingredient are manufactured as per Regulatory requirements like USFDA, WHO, MHRA, and TGA and but these API plants are not enough for 50 manufacturing plant so they need external suppliers to provide other ingredients such as Diluants, binding agents, colorant, lubricant and granulating agents. 1. Imports The major risk associated with the import is the availabili ty of the raw material at right time. Some of the delay includes: * Delay in movement of cargo * Custom handling * Delay in processing documents due to system error at Seaport/Airport. Continuous holidays, strike by laborers customs may delay clearances. 2. Inferior Quality of supply Quality is very important in case of any pharmaceutical manufacturing as it directly deals with the life of the people therefore it is governed by many regulations. The inferior Quality of the raw material can increases the risk of waste in the final steps of manufacturing. Some of the adverse effects would be * Breaking and rusting of tables * Short shelf life * Less potency * Side effect to patents * Batch rejection * Market complain Packaging RisksPackaging material for QVIR is one of the important concerns which can not be compromised on the terms of availability and quality, a special packing is needed for the QVIR since it is a four in one drug packing which contain a kit of Tenofovir, Emtricitabi ne, Atazanavir and Ritonavir. If the packaging material is not available in that situation * The raw material shelf life will increase ( as kept in stores) * Productivity will decrease * Unable to fulfill order on time * Holding of batch can increase the reanalysis cost Production Risks 1. Malfunctioning of MachineryIn CIPLA entire process of manufacturing is automated. So efficient working of the machines is essential in that manufacturing process any malfunctioning of machine can lead to increase the production time and cost. 2. Human error Although in the company most of the production process is automated, there is still chance of human error due to negligence of the employee who operates the machines. This can lead to serious problem not only to the company but to the employee himself some of the common human errors are: * Improver gowning * Negligence in handling of material * Improper documentation * Negligence in following SOPs Negligence in maintain personal hygiene * Negli gence in clearing the apparatuses * Negligence during handling chemicals * Negligence during operating machines The human error can led up to some serious problems such as * can cause damage to the life of others * wastage of material * wastage of time * can damage the machine * can lead to batch failure 3. Quality Risks Quality of the QVIR is an important concern for CIPLA pharmaceutical because it directly deals with the life of the customers moreover the industry is highly regulated so it is extremely necessary to produce products with high quality.The inferior quality of drug can cause * Batch rejection * Market complain * Economic lose * Lose of company reputation * As the industry is highly regulated by government law inferior quality can lead to close done of organization Storage Risks Improper storage of the drug special QVIR can lead to serious problems not only to the manufacturer but also to there customers. Some of the common storage risks are * Drug contamination * Drug deterioration * Batch rejection * Market complain * Reduce the self life of drug etc Demand Side Risks 1. Forecasting ErrorsForecasting errors can lead to serious problems related to the long lead times, over production, demand analysis, short life cycle, and order placement in the value chain which lead to bullwhip effect. Forecast error can affect the whole supply chain from the beginning till the end affecting the entire resources in inventory, facilities, transportation, sourcing, pricing and information management so there should be a proper forecast analysis. 2. Transportation Risk The main risk factors involved after the batch is moved out of factor is the transportation risk. The major problem during the transportation process is Tracking the shipment * Delay of the shipment * Product contamination * Stock clearness 3. Information Sharing Risks Information sharing is the foundation on which supply chain processes work. Without information sharing manager cannot indentify th e demand related to the product and the amount to be produced. Information systems will help the manager to know how the inventory is flowing in the supply chain and how the stocks are maintained. Moreover in the production process the flow of information help to minimize the risk and maintain the quality of the product. Risk AnalysisRoot Cause Analysis The root cause analysis can help CIPLA mangers to identify and correct the root causes which may lead to the identified risks Below Fish Bone diagram is used to perform the root cause analysis for Cipla – After conducting the root cause, we were able to establish certain glaring problems in the supply & demand of QVIR such as supplier selection, non-availability of resources, machinery problems, improper management SCM Specific Brainstorming A periodic ‘All Hands’ session has to be conducted with the entire supply chain team of QVIR at Cipla.These sessions could be either fortnightly or monthly basis. During these sessions, members of the team are encouraged to ask several sets of questions related to improvement and transformation of a SMARTER Supply Chain. Some possible questions include: * Do you have real time visibility into the cost & performance of your supply chain both inside and across organizational boundaries? * Are you able to collaborate with your upstream and downstream trading partners on changing supply and demand conditions? Have you exploited rapid ROI opportunities relating to inventory optimization, demand forecasting, network design, and procurement spend? * What are your inventory levels vs. peers, your cash-to cycle time vs. peers? * Is your business able to quickly and directly make changes to supply chain processes and policies based on identified savings opportunities? * Have you balanced your cost reduction initiatives against customer requirements and supply chain risk including those related to sustainability issues? * Would cost reduction quick wins allow inves ting in future necessary SC capabilities?By predicting the risk components while brainstorming and doing the root cause analysis, there are also other risks during production which is more human error and packaging error. As part of the analysis for this assignment, we’ve also assessed the risks during production and how that risk can be controlled Risk Mitigation Supplier Risk Mitigation To overcome all the relative problems with the supplier Cilpa management needs to:- 1. Planning 2. Supplier selection 3. Supplier evaluation 4. Performance measurement 5. Feedback and communication Production Risk MitigationMalfunctioning of the machinery Malfunctioning of machinery in the production process can be overcome by- * Regularly checking and maintaining the working of the machines. The machines should be checked after each batch production. * Special engineers should be hired for the maintenance job with deep knowledge * The checking and maintenance process should be added into th e standard operating process and proper validation process should be conducted for the clearing process for each machine. * There should be a proper training process for the employees who are operating the machines.This will not only prevent the risk in the production process but also help in maintaining the quality of the product. Human error risk The human error can be minimized by providing proper – * training to the employee * maintaining proper standard operating procedures * automating the process where possible * providing proper documentation Packaging Risk Mitigation To minimize the risk in the packing and packaging process Cipla has to move out from the traditional model to more technological side. * Photo scanning system * Ratio frequency identification system and ePedigrees technologyPhoto scanning system is a modern way of minimizing risk in the packaging line by using photo scanning system. Cipla can eliminate the risk on cross labeling, miss printing and over p rinting of the labels this will minimize the risk of batch rejection by the customer in different country Advantage of using Photo Scanner System 1. Minimize the risk cross labeling 2. Minimize the risk of miss print related with date of expire, date of manufacturing and dose to be taken 3. Minimize the waste 4. Safe time 5. Increases the efficacy of the production line.Radio Frequency identification system (RFID) and ePedigees technology is a modern way of thinking in supply chain of Pharmaceutical industry. RFID is a better solution to minimize the risk associated with packaging and delivering, inventory management forecasting, monitoring and collecting data. In this process the RFID tag is attached to the product and than it can be tracked any where in the entire supply chain. The tag transfer electronic information through radio frequency electromagnetic ways that can be read from several meters away.Unlike the traditional bar code system there is no need of aligning the product in front of the reader. There is no chance of data error with this system In this system the electronic documents know as ePedigree are generated. These E pedigee have all the historical information regarding the product movement in the supply chain which makes it easy to monitor the product and remove optical in the supply chain. Advantages of using RFID * Improve Forecasting and Planning * Reduce Out-Of-Stock Conditions * eliminate excess and missing inventory as well as reduce losses and write * Improves Decision-Making Improve Customer Experience. * Reduce Theft * Increase Efficiency of production process * Improves Asset Utilization and Visibility Quality and storage risk mitigation Quality management play most crucial role in the pharmaceutical industry so a systemic monitoring and evaluation of quality in the production process is necessary to reduce the risk associated with the quality of the product This can only be achieved by following strict quality protocols at each st age. The Quality assurance team and the Quality control term should monitor – * The quality of the raw material purchase Storage condition of the raw material and the finished product * The standard operating procedure of the production process * Proper cleaning of the machines as per validation * Quality of the packaging material * SOP for labeling and packaging * Proper storage of the finished good with correct labeling At each step of quality management data should be collected and reports should be generated to identify where the problem is occurring in the supply chain and how to mitigate those problems simultaneously. Demand Side Risk Mitigation Transportation risk mitigation To minimize the risk related to the transportation there should be a proper selection of the transporter as per GMP requirement * There should be a proper procedure to select the logistic supplier * Proper communication * Regular inspection Information flow risk Technology plays an important role t o minimize the risk factor in the information flow. Use of certain ERP tools such as SAP and ORACLE can help CIPLA minimize the risk. Moreover using RFID the electronic documents – epidgees make the flow of information quite easier and quicker.Recommendation The supply chain of the future for Cipla would be Smarter. It would be Instrumented, Interconnected & Intelligent. Flexibility will be the watchword for cost containment, Visibility will become vital, Risk would be managed systematically, and customer input would permeate the supply chain. The smart map of this new supply chain for Cipla would help in the following: * Integrated real-time transactions (ERP) with business intelligence * Multi-partner collaboration platform * Dynamic supply & demand balancing Predictive sense-and-respond event detection & resolution * Probability-based risk management * Supply chain risk analysis & mitigation models * Risk-adjusted inventory optimization * Environmental strategies & policie s with sustainability models for usage impact analysis: Carbon. Energy, Water, Waste * Customer-segmented product lifecycle management * Real-time consumption & replenishment programs * Optimized pipeline inventory * Variable cost structures that fluctuate with market demand * Outsourcing non-differentiating functions Global â€Å"centers of excellence† to optimize capability and delivery * Asset management strategy & global execution Conclusion By employing the risk mitigating factors for this supply chain and leveraging on the data collected, deep supply chain management expertise, methods and analytical tools Cipla can quickly assess current inventory situations for inventory optimization realizing 30-50% inventory reduction, significantly improve demand forecasting accuracy 10-30% and provide direction to reduce spend 5-20%.With the futuristic instrumented, interconnected and intelligent smarter supply chain, smart devices, sensors and actuators can capture real-time data including: shelf-level replenishment, forecasts and orders, pipeline inventory and shipment lifecycle status. Advanced instrumentation will â€Å"sense-and-respond† demand and supply signal notification with thresholds to determine corrective actions from disturbances and there would be more â€Å"self-correcting†, â€Å"self-actuating† transactions.With the new smarter supply chain model and future integration of sustainability principles our desire with this assignment is to have the supply chain emerge as a major business tool that can help control costs, manage risks and make profit in a fully responsible manner. Much of the opportunity to address related energy, water and waste management costs rests on the supply chain.

Friday, August 30, 2019

Chapter 1 Payroll System Essay

Business may be understood as the organize efforts of enterprise to supply consumers with goods and services for a profit; they treat their customers right, so they will be able to experience meaningful way. They respect the clients, it creates the opportunity for them to resolve the problem or issue and make them comfortable. They provide excellent service and enthusiastically satisfaction to their clients. * Organizational structure PRESIDENT Provide leadership to position the company at the forefront of the industry. Develop a strategic plan to advance the company’s mission and objectives and to promote revenue, profitability, and growth as an organization. It oversees company operations to ensure the production efficiency, quality, service, and cost-effective management of resources. FIRM MANAGER Overall responsible for the Firm office, employees, and in monitoring all the Income and Expenses of the store under the firm. He is also responsible for leading or coordinating the strategic planning functions of the company. HUMAN RESOURCES MANAGERS Responsible for managing the employees, supervises the activities of one or more functional areas within Human Resources Department, and provides consultation and technical direction within the assigned functional areas of Human Resources. HUMAN RESOURCES ADMINISTATION ASSITANT Responsible for the 201 files on the Rank and File employees and monitor the efficiency and attitude of all the employees under the Firm. * Existing System Overview A system analyst combines knowledge of information systems and business that will meet business needs. Individuals in this profession may come from a technical or business background. They often specialize in a particular business area such as financial, accounting, and scientific for which they have expertise. * Existing System Manpower * Existing System Outline * Existing System Flowchart * Statement of the Problem There can be human errors such as typographical mistakes; such mistakes that might lead to problems in the final tallying of the balance sheets. There can also be issues in accounting if the transactions are not updated on a daily basis. The accountant may forget to make entries of data of previous dates. * Project Objective/s The primary objective of any organization is to maximize profits and wealth attribution to the owners of the firm. The main objective of Human Resources Management is to manage the workers and employees in an enterprise in the best manner. Human Resources Management is to maintain effective communication with employees so that the management may be passed to the employees and the problems and grievances of workers may also be communicated to the management. * Significance of the Study 1. For the Company * Studying business allows you to understand strategy, marketing, finance, accounting, and managing people. By having an understanding of how these things work may find that you are better equipped to work in some jobs. Even if you don’t end up specifically working in one of those areas, it will help you to understand what other people working on. It also gives you credibility. 2. For Future Researcher 3. For the Proponents * Scope and Limitation This study is concentrated in First Integrated Repriorment Management and Consultancy, involving the Human Resources Department on how their payroll system goes and the process itself.

Thursday, August 29, 2019

Cadbury Case Study

INTRODUCTION TO MARKETING (BHO1171) – Sem 2, 2012 Individual Case Study (15%) Due Date: Week 7 (29/8/2012, Wednesday 5pm) Students will be evaluated on how well they analyze the case study by applying the right theories and concepts. The case topic is â€Å"Chocolate consumers feel guilty for the wrong reasons†. At the end of the case study, there are a number of questions in which students need to find answers and justifications. Students need to write a formal business report with a length of 2000 words using 12 pt fonts and 1. 5 spacing.The report must be handed in Week 7 (refer to the due date stated above). Please do not only focus on the article and the texts in getting the answers. Students are advised to refer to at least four (4) academic journals, with additions of materials from newspapers, magazines and Internet websites in analyzing and interpreting the case study questions. They need to acknowledge any borrowed citations or any information under reference lists by using Harvard Referencing System (Please refer to Communication Skills Handbook). Your report must be submitted to Turnitin and cleared.The allowable percentage of match is 25%. Upon uploading, please exclude the table of content, reference and bibliography lists. Do not forget to  attach together the first page of the Turnitin digital receipt on top of the hardcopy of your assignment. PLEASE DO NOT SHARE YOUR ANSWERS AND REFERENCES WITH YOUR FRIENDS. ASSIGNMENTS WITH HIGH PERCENTAGE OF MATCH (BASED ON TURNITIN REPORT) WILL BE PENALIZED! Sample of a Business Report (with word limits as an approximate guide for each section) Declaration Form† Cover Page (can be downloaded from ELearn) Turnitin digital receipt (first page)Cover Page †¢ Report Title: Individual Case Study – â€Å"Chocolate consumers feel guilty for the wrong reasons† †¢ Prepared for: Name of Lecturer & Tutor Victoria University †¢ Prepared/Written by:Student Name VU ID No. †¢ Date of Submission: †¢ Tutorial Group: Executive Summary †¢ Inclusive of the:Introduction of the report Content of the report Conclusion and recommendations of the report †¢ Should be written only after analysis is completed. †¢ Do not repeat by using the same sentences and words as the ones used in the report. †¢ Must spell out and explain the summary instead of just â€Å"out-lining† it. Should not be exceeding one page length and paragraphing is encouraged. †¢ Guide – Approximate word count = 300 – 400 Table of Contents †¢ Titles and subtitles †¢ Page numbers †¢ Appendices (if attached) †¢ Must be typed and not handwritten 1. 0 Introduction (Must include these four main components) †¢ Purpose of writing the report †¢ Short summary of the case study †¢ Relevant marketing theory definition and explanation (Briefly) †¢ Guide – Approximate word count =300 – 400 (Make use o f paragraphs) 2. 0 Problems/issues Identification 3. 0 Analysis †¢ No Assumptions and No own opinions!Only proven facts will be accepted. Every statement made must be referenced and listed under bibliography page and reference list. †¢ Do not use â€Å"I†, â€Å"We† when writing reports. Do not personalize the report but instead use third party language. †¢ Guide – Approximate word count =500 – 600 4. 0 Recommendations/Choices of solutions †¢ List the courses of action, which, the writer, think, is the most appropriate to the firm †¢ Be specific and not general in giving suggestions. †¢ Must be related to the facts mentioned in the case study article. †¢ Guide – Approximate word count =400 . 0 Conclusion †¢ Brief presentation of the major findings that have been discovered within the content of the report. (Do not repeat the things you have mentioned in the content because a summary IS NOT a conclusion! ) â⠂¬ ¢ Guide – Approximate word count =200 List of References †¢ The reference list at the end of the report should be alphabetically ordered. †¢ You are required to refer to at least 4 academic journal articles and also to some numbers of texts, magazine/newspaper articles and websites. (Please refer to the Communication Skills Handbook on how to write referencing)IMPORTANT NOTE! YOU CAN ONLY USE THE ACADEMIC JOURNALS, WHICH CAN BE OBTAINED FROM DATABASES LIKE EBSCOHOST, EMERALD AND ETC. PLEASE REFER TO THE REFERENCE LIBRARIAN FOR FURTHER DETAILS. YOU CANNOT SEARCH FOR THESE MATERIALS USING WIKIPEDIA, GOOGLE OR YAHOO SEARCH. Appendices (optional) †¢ Should be kept at minimum †¢ If it is so detailed and long, put it into the content of report †¢ Give each appendix a number and a title and enter it into the Table of Contents †¢ Do not put in any of the journal articles that you have used for your report Note: 1.Students are to write using formal, bu siness-like tone for this report. This means there should be no usage of â€Å"I†, â€Å"We†, and â€Å"You† in this report. 2. They are also encouraged to write clear and concise expression of English language. 3. There should be a logical flow of sequence. 4. The report should also be free from excessive spelling and grammatical errors. Hence, before submission, proofreading must be done. 5. Please also write the word count at the end of the report (after the conclusion section). INTRODUCTION TO MARKETING (BHO 1171) Individual Case Study (15%) Marking Sheet Semester 2, 2012 CRITERION |Very Good |Good |Satisfactory (met min. |Inadequate |Not addressed / Weak |Mark | | | | |requirements) | | | | |Introduction and |The issue/problem chosen is |The issue/problem chosen is |The issue/problem chosen is |The issue/problem chosen has |The ssue/problem is not |/2 | |problem/issue identification |appropriate and is clearly stated in|appropriate with elaboration |appropr iate |limited relevance |identified | | |(2%) |the assignment with justification | | | | | | |Problem analysis and | |Can analyse a range of |Can evaluate the reliability of |Can analyse a limited range of |Fails to analyse information. /5 | |justification (5%) |Can critically review evidence and |information, select appropriate|information using defined |information. Limited & only |Fails to evaluate or use | | | |analyse situations using a wide |techniques of evaluation. |techniques. Has given a factual |partially accurate evaluation of |techniques of evaluation, or | | | |range of techniques appropriate to |Appropriate issue/problem is |&/or conceptual knowledge base |information using defined |evaluations are totally invalid | | | |the topic.Thorough explanation of |explained and analysed | |techniques | | | | |the chosen issue/problem and is well| | | | | | | |analysed | | | | | | |Formulation of alternatives |Recommendations with reliability, |Clearly explained |Relevant recom mendations made |Vague recommendations, limited |No recommendations or are |/3 | |or possible solutions and |validity & significance |recommendations which relate | |solutions |obscured by poor mechanics | | |recommendations (3%) | |closely to the case | | | | | | |Fluent writing style appropriate to |Language fluent. Grammar & |Language mainly fluent. Grammar &|Meaning apparent, but language |Meaning unclear &/or grammar |/2 | |English expression |document. Grammar & spelling |spelling accurate |spelling mainly accurate |not always fluent.Grammar &/or |&/or spelling contain frequent | | |(sentence/paragraph |accurate | | |spelling contain errors |errors | | |construction, spelling, | | | | | | | |grammar and punctuation) (2%)| | | | | | | |Use of relevant references | |Demonstrates wide range of |Uses some appropriate literature |Uses only very limited |Fails to use relevant literature|/3 | |and referencing in written |Demonstrates wide range of reading |reading from a variety of | material in the assignment. |appropriate literature material |material in the assignment. | | |report (3%) |including from academic peer |credible sources. Referencing |Referencing is mainly accurate. |in the assignment. Some attempt |Referencing is absent/ | | | |reviewed journals in the appropriate|is mainly accurate | |at referencing. unsystematic | | | |area. Referencing is consistently | | | | | | | |accurate both within & at end of | | | | | | | |document | | | | | | ———————– TOTAL: /15

Wednesday, August 28, 2019

Delivery Service in Houston Research Paper Example | Topics and Well Written Essays - 750 words

Delivery Service in Houston - Research Paper Example Most of the public services in the city of Houston are offered by the state government and funded through several governmental and private sources. The east side of Houston City is the least inhabited area of Houston and the area is served by the government with transport provided through trams and buses which are subsidized by the government (Rauscher 77). Another area is the Inner Loop East which is served with public transport; this section is characterized by several housing projects which have been initiated by private developers with the interest of providing housing to the city’s residents (Mech 43). Inner Loop South is another area in the city of Houston and this region consists of black and white population with the sector predominantly occupied by black population. Inner Loop West is another area in the city of Houston whereby most of the city’s people reside in, this section is mainly served by houses built using public funds (Leonard 94). The other remaining areas of the North and West sides of Houston are well developed in terms of infrastructure and this presents very few challenges in development. In most areas of Houston, the youth are excluded in the public programs and thus a major intervention program is to be designed to cater for the youth (Chung 56). Young people especially those loving in home care homes are very vulnerable in their pursuit for better lives as grown people. Youth Program in Houston The youth are among the most vulnerable people in the society today and the role they play in the society is extremely important. In the city of Houston, there are very many young people who live in foster homes. These children are of mixed race and gender but they do face the same challenges in the pursuit of living good lives. One of the biggest challenges that these children face is that of finding ways and means of fending for their daily needs. As a result, a Preparation for Adult Living (PAL) program was initiated to cater f or the needs of these young people as they grow to become adults (Bales 88). This program focused on youths who were transitioning from state care homes into independent young people in the society. The program was based at the Houston Alumni and Youth Center (HAY) on the North side of Houston (Garrett 41). The program is to be funded from different sources including the US Department of Labor’s Employment and Training administration. The program would also source funds from well known US grants groups and from private companies interested in training young people (Watson 60). In sourcing funds the program would also rely on sponsorships from large American Corporations like Chevron Texaco or Exxon Mobil which supports community based projects (Pearson 82). Since the program is community based with intentions of helping young people it is important for stakeholders in this project to conduct fundraising initiatives. The program is meant to benefit young people who have been a bandoned or rescued and cared for in foster homes. As a result, several employees will be hired to take care of these children and these employees will include teachers, religious leaders, care givers and mentors (Brooks 45). All these people will be important in the educating these youths on different aspects of life and at the same time mentoring the youth on important issues in the life empowerment. In the implementation of the project, the stakeholders will link

Tuesday, August 27, 2019

Relationship Essay Example | Topics and Well Written Essays - 500 words - 1

Relationship - Essay Example All of us, more often than not, have been subject to peer pressure in workplace. So, through this topic I wanted to explain some of the stages that many people like me have to go through to develop a good relation with a coworker who is intent on degrading you. I would be telling about the starting of our relationship, the enmity and back-stabbing challenges, the effect it had on both our lives and then the friendship. A new job just like a new relation bring excitement with it. But that balloon of excitement is punctured when you make an enemy on a very first day, either by choice or coincidence. There would always be someone in the workplace who would not exactly appreciate you. Similarly there was this person who was a few months senior but pretending to be my boss. I always thought he appreciated my work that is why I used to get ‘a lot’ of work but soon I realized he was bullying me into doing his work. I confronted him and it got loud. A point to remember is that insulting someone always put a huge negative pressure on a relation. So then it started him making fun of me in front of everyone or anyone. And me messing with his work, but one day I went too far and almost got him fired. That brought me back to my senses and as an ‘I am sorry’ present I did a particularly hard project for him as he was having some personal issue. I did it out of remorse but it touched a vital cord in his heart. And from then onwards all enmity and jealousy ceased to exist. So, the journey from enmity to a lifelong friendship made me realize that workplace stress due to peer pressure is something we can help if we try. My coworker and I became lifelong friends not because I helped him in need, but because we made an effort to stop the enmity, jealousy and back stabbing for a more comfortable environment. So, I rephrase my first question,

Evolution of the Global Economic Environment Research Paper

Evolution of the Global Economic Environment - Research Paper Example As global trade has grown over the last 20 years, both in terms of global productivity and absolute means, China has sustained their share of global trade and substantially increased their share of global exports of produced goods (Lin 2001). From 1990-2010, at merely more than 10.4 percent (Lin 2001, slide 4), China’s share of global exports was significant. The multinational business is usually perceived as a major motivator for the system of the globalization of production. This is justifiable, because the presence of the multinational business is, in principle, grounded on earlier and major foreign investment (Ostry & Alexandroff 2003). Furthermore, the past two decades have witnessed a dramatic boost in the operations of multinational businesses in China. Recent reports indicate that there are roughly 65,000 transnational corporations at present (Milberg 2004, 45). Their economic effect can be evaluated through varied approaches. Foreign partners, in 2001, comprised more than 50 million workers in comparison to more than 20 million in 1990 (Milberg 2004, 45). According to the UNCTAD (2002, 1 as cited in Milberg 2004, 45), foreign partners presently comprise about one-third of global exports and one-tenth of global GDP. Between the 1980s and the 1990s, FDI’s share in international gross capital formation increased by two-thirds; for China, the rise was by about three-quarters. FDI massively rose in the 1990s, even though it dropped abruptly in 2001 due to the global recession and weakening of stock markets (Lin 2001). Hence the reduction in the flows of FDI was tilted toward advanced nations. FDI to China and other developing nations increased 4 percent from 1980 to 2001, and China’s share of world FDI climbed significantly from the early 1990s to 2001 (Ostry & Alexandroff 2003). Nevertheless, this increase has not been sufficient to make a difference in the share of the developing nations of the global reserves of FDI, which, according to UNCTAD (2000 as cited in Milberg 2004, 46), has changed roughly 35% over the past two decades. China, in the 1990s hardly made it on the international economic scale. However, China was able to improve its status in international trading after roughly two decades, making her the current second most advanced economy in the world (Lin 2001). The trade of China, in the 1990s, was an insignificant presence in world trade. After two decades, the country is presently the biggest global exporter of goods, with a rate of annual export growth at 18 percent (Lin 2001, slide 6). Due to this massive development in China’s role in international trading, trade structure has been altered. It is the contention of this paper that the transformation in trade structure, or with intensified trade in intermediate rather than final products, instead of expansion in the volume of trade that establishes globalization as a relevant occurrence in terms of the development of strategies for economic growth. This transformation in the structure of trade is the outcome of the appearance of global trading systems, wherein bits and pieces of a product are manufactured in various places all over the world.

Monday, August 26, 2019

New Equality Act 2010 Essay Example | Topics and Well Written Essays - 2750 words

New Equality Act 2010 - Essay Example However, they are not well embraced in the modern times. It is believed that all people are equal regardless of their gender and race. As such, governments have been pushing for equality policies across the world. The United Kingdom parliament introduced the equality act 2010. This act was based on a number of laws and acts that had been introduced in the United Kingdom in the past. Despite its introduction, equality is yet to be achieved in the workplace (Varkaik, 2005). There are many challenges facing the implementation of this act. The equality act 2010 promises to equate all people regardless of their gender and race in the workplace but faces many challenges in the implementation, which need to be addressed accordingly. History of Equality Act 2010 The vision and objectives of the equality act 2010 were proposed back in the 1960s. It had been realized that some groups, gender, and races were discriminated against in the United Kingdom in many sectors. Some people were paid less in the workplace; others had challenges getting jobs because they belonged to a certain race and others because of their gender. The equal pay act of the 1970 was the first law to be passed regarding this. According to this law, people doing the same workload in the same department are required to be paid the same amount regardless of their gender and race. ... No employer or institution would discriminate any person basing on these grounds (United Kingdom Legislation, 2013). Disability act of 1995 also forms a part of the equality act 2010. Disabled people should have equal opportunities to employment basing on this law. The Equality Law 2010 (Work Place) The passing of the Equality Act 2010 was embraced by many people across the United Kingdom. However, there are serious concerns about whether anything will change. Experts have been documenting everything that has been happening after passing of the vital acts which form a part of the Equality Act 2010. They have confirmed that indeed, not a lot of changes have been documented after the passing of those acts. No wonder some people have been questioning what has been happening in the last four decades from the time the Equal Pay act was passed in 1970. The very things the parliament meant to protect people from have been happening right under their eyes. Discrimination This is one of the l argest problems in the United Kingdom in the current times. Despite the passing of laws to reduce discrimination, research indicates otherwise (Favre, Grainger and Brewer, 2011). Women and minority races in the United Kingdom are the most affected. Women do not have equal opportunities with men in the work place (Verkaik, 2008). While many men are employed in well paying permanent jobs, only a few women are employed. The other women are employed in low paying part time (Lee, 2002). In fact, only about 30% on average women are employed in the permanent well paying jobs. The percentage of women in the low paying part time jobs is 79%. This clearly indicates that most

Sunday, August 25, 2019

Law of Evidence. write of silence Essay Example | Topics and Well Written Essays - 1250 words

Law of Evidence. write of silence - Essay Example However, as observed in R v Beckles, such inferences cannot be used to establish guilt. The House of Lords in R v Webber of 2004 that pursuant to Section 34 facts may include any fact that is an issue at the trial and tendered by the defendant in his or her defence. Moreover, facts will include any explanation or fact that the defendant would have logically raised at an earlier stage of the criminal proceedings. According to the ruling in R v Ali, the only recourse a defendant may have is to either deny culpability at the police station or to prepare a statement setting out his or her defence so as to preserve the right to raise the defence at trial. The right to a fair trial guaranteed by Article 6 of the ECHR demands however, that prosecutors bear the burden of proof. It was ruled in R v Condron that directions to the jury must be given with caution emphasizing the right to silence. The Judicial Studies Board established 6 points intended to ensure that adverse inferences contained in section 34 do not contradict Article 6. The 6 points correspond with the 6 requirements for adverse inferences as laid doing in R v Argent and are: There must be proceedings. Failure to mention a fact must predate the charge or when being charged. The omission must have occurred while being questioned under caution. The questions must have related to determining who committed the offence. The omitted fact must be one subsequently used in defence at the trial. The omitted fact must be one that accused was logically expected to mention. The courts have tried to set limits to what amounts as a new fact and to preserve the defendant’s right to remain silent. For example in R v McGarry, the defendant was charged with causing grievous bodily harm. In a written statement taken by the police, the defendant claimed that he acted in self-defence and did not answer police questions. At his trial, the defendant testified to facts substantiating and building on his claim of self-defen ce. The trial judge said that he was not inviting the jury to draw an adverse inference since D had not raised a new fact but did state that it was up to the jury to determine whether or not they wished to draw an adverse inference. The defendant was convicted and appealed. The appeal was allowed because the trial judge had a duty to direct the jury that they were not at liberty to hold the defendant’s failure to answer police questions since he did not rely on a new fact. R v B (MT) partially deals with circumstances in which a defendant may not be aware that a new fact may provide him or her with a defence. In this case the defendant was accused of sexual raping his stepdaughter, a minor and another girl under the age of 16. When questioned by the police, the defendant could not identify a motive for the girls to lie. However, at trial, his stepdaughter testified that she resented the defendant and did not want him to live with her mother. The defendant used this informatio n in his defence. The trial judge directed the jury that they could draw an adverse inference from this if they felt that it was reasonable for the defendant to raise the issue of motive while being questioned by police. The defendant was convicted and upon appeal, the Court of Appeal allowed the appeal on the grounds that the fact relied on was not a fact that the defendant could have known when questioned by the police. Likewise in Murray v UK before the European Court of Human Rights it was held

Saturday, August 24, 2019

Myth as a Precursor to History Essay Example | Topics and Well Written Essays - 1750 words

Myth as a Precursor to History - Essay Example History is something different altogether, history is not used to explain natural phenomenon's or uncover aspects of daily life. History is fact that typically cannot be augured. It has evidence, it is fact. Ken Dowden states "History is what myth isn't.What history tells is true or else it would not be history, only failed history. What myth tells us is in some way false or it would be history"2 Myths can be said to have graduations of credibility, Dowden uses the example of the myth of Athena being born from Zeus head and compares it to Agamemnon's expedition to Troy to show that there are different levels of credibility in myth. As obviously there was never a women born from a man's head. Yet it is suggested that there was a Trojan War and Agamemnon's expedition to Troy has a place in history. In the example of Dowdens, we can see that myth can be a herald to history, as many believed that Homer's epic poem, The Iliad, was based not on a historical reality, but on mythical heroes. Heinrich Schliemann held a different view, believing in Homers war, he combined studies of Homeric text and fieldwork and published observations about Mycenae and the location of Troy in 1869.Although Schlie mann's arcelogical techniques were brought under criticism by many, ("Schliemann's excavations at Troy were not a good model of archaeological technique. Only solid structures were noticed and recorded, and they were rapidly demolished to reveal earlier features."3) Schliemann's aim was to identify the geographic setting of Homers Iliad only from literature and he brought the Greek Bronze Age and its antecedents to light for the first time. Not content with his identification of Troy, he also dug at Mycenae and revealed an unknown prehistoric civilization. The Japanese creation myth started out with the earth being a formless void of nothing but muddy water. From that water a green shoot sprung and inside it was the first god, who made all the other gods. Out of all he created though, Izagami and Izanami were the most perfect. The islands of Japan were formed when Izagami poked his staff through the clouds to see what was on the surface of the earth. As he lifted the staff from the muddy water, clumps of mud fell on top of the water and formed into the islands of Japan. The pair went down to the earth, and everywhere they went, flowers and plants sprouted. They had four children. One was the sun, one was the moon, one lived in the water and created storms and such, and from the fourth, the line of the emperors of Japan was established. In the Egyptian creation myth, most of the details are very similar to the Japanese myth. The world starts out covered in water, from one god all the others are created, and two of the gods, Osiris and Isis, sort of led all the rest. From them came all the rulers of Egypt, just like how in the Japanese myth Izanami and Izagami had a child who eventually had a child who was the first emperor of Japan. In the African origin myth of how leopards became spotted, the leopard invites fire over for dinner.  

Friday, August 23, 2019

Ethical issues - New centry financial corporation Case Study

Ethical issues - New centry financial corporation - Case Study Example These decisions prompted the stakeholders of the company to quit thus leading to its bankruptcy. It is notable that the ethical issues associated with New Century Financial Corporation were damaging to various groups of people in the subprime mortgage industry. The groups included mortgagors, investment banks, and mortgage brokers, rating agencies, lenders and investors (Palepu, Srinivasan & Sesia, 2009). The low quality of loans that the company offered affected the Mortgagors (borrowers). Investment banks realized massive losses from the money they had invested by offering New Century Financial Corporation mortgages. Mortgage brokers also made losses by conducting business with the corporation. Lenders and investors, likewise, realized massive losses due to New Century Financial Corporations misuse of their funds. By 2005, the subprime market was already experiencing advancement both in technology and loan quality. However, New Century Financial Corporations management failed to adapt to these changes. Instead, the companys performance continued to deteriorate due to a poor management. Most of the decisions New Century Financial undertook based on efficiency. The company ensured that the distribution of its securities to investors was favorable. It also terminated loan applications for efficiency due to the withdrawal of its lenders. The companys decisions and operations were associated with various ethical issues. First, it was unethical for New Century Financial Corporation to lack proper documentation of its operations. Proper documentation would enable the company to keep perfect records. Secondly, the corporation had an ethical issue in the valuation of the loans it was selling. For instance, the management was unable to account for purchase of its mortgage loan reserves. Next, the loan quality offered by New Century Financial Corporation was an ethical issue. The company

Thursday, August 22, 2019

Form and Structure Essay Example for Free

Form and Structure Essay As an AS drama group, we carried out certain exercises on narrative structure, to identify ourselves with that used in the play. For instance, we each acted out a scene, illustrating an everyday activity such as waking and getting up. We then narrated these scenes first in the first person narrative, then in the third. This enabled us to identify with how Brecht wished his actors to perform, as by narrating our own actions in the third person narrative, we were detaching ourselves from the parts we were playing, and so were not thinking emotionally what should this character think and feel now, but rather thought, how should this character appear. This also enabled us to understand how the process of taking photographs of scenes and trying to identify what was occurring within that scene, helped Brecht decide if his actors were performing correctly. The Verfremdungseffekte were designed to expose the familiar; Brechts actors were to present things in their concrete reality so that the audience would be encouraged to think about what had given rise to situation depicted, in this case Hitlers, or Uis rise to power, and therefore consider ways to change those conditions in the future. * The Resistible Rise of Arturo Ui is divided into 15 scenes, some of which are subdivided into several sections identified by letters. These 15 scenes are then divided almost equally into 2 acts. This symmetry gives the play a degree of continuity, enabling it to flow smoothly. Scene 8 displays a structure unique from that of other scenes throughout the play. It is the scene in which the innocent fish is on trial for potentially burning down Hooks warehouse. He is being tried before a corrupt judge caused by the manipulation of the judicial system by Ui and his underlings. This scene is divided into seven parts, a to g. Each of these parts is shorter in length than that preceding it, hence quickening the pace of the play and building tension within the scene. The shortening sections also highlight Fishs plunge into a prison sentence, that which he is undeserving of.

Wednesday, August 21, 2019

Canadian Women and the Second World War Essay Example for Free

Canadian Women and the Second World War Essay The changing roles of women throughout history has been drastic, and none more so than the period during and after World War II. The irrevocable changes that occurred once the war started and women went to work were unprecedented. In the end, the changing role of Canada’s women during the War was the beginning of a chain reaction of events that have forever changed the Canadian workplace and also that of men’s archaic views on the capabilities of women in general. Many look back to the period during the war in which women were encouraged to get out of the kitchen and go to work, and wonder how a five year period could be so instrumental in forever changing the norms of society? Two authors, who attempt to sift through a mountain of information and provide a clear picture in response to this question, are Jeff Keshen and Ruth Roach Pierson. Both authors paint a slightly different picture from the piles of papers, minutes, war diaries and publications that covered that pivotal period during World War II where so many Canadians women found their voice and their freedom from domesticity. Canadian Women and the Second World War Ruth Roach Pierson’s essay is written with purely the perspective of women in mind, and the article itself is geared towards a female audience. The writer briefly describes the conditions of Canada at the onset of the war and the societal views of the role of women. Although there are no quoted references sited for this essay, there was a vast amount of alternative reading where I am sure one could draw numerous conclusions. Even with the lack of references, I did find this essay the most compelling especially, given the current climate of women in the work force. Ruth Roach Pierson describes in great detail the plight women faced during the war, when they were encouraged by the government and the needs of their families to get out and help support their families financially while all of the men were away at war. She goes on to describe the working conditions and child care situations for working women which were less than adequate. As a member of the Canadian Forces and a woman, the most interesting part of the article for me was the descriptions of how women became a uniformed part of the military and how all three branches of service came to assimilate women into active duty and the roles they were allowed to serve in. Throughout the essay, we were told about the deplorable conditions, the lack of equality the women faced in the workplace, and the stereotypes that were attached to women that proved very difficult and almost impossible to overcome. At most concern was the inequality found between men and women’s pay, benefits and allowances throughout the World War II era and beyond. The lack of equal pay for equal work caused great contention for women and still does to this day (although it is not quite as blatant in the civilian workforce today). The argument of the writer is that the roles taken on by women during the war forever changed the roles of women in society. I agree with her argument. Had it not been for the war, and the call to work and the military, things would be very different in our society for women, even today. The war was the instrument to get Canadian women to work, and once there, women found their voices to fight the inequality with respect to working conditions and pay, and paved the way for the next generation of women to continue to work and fight for an equal playing field with their male counterparts . Revisiting Canada’s Civilian Women during World War II Jeff Keshen’s essay is without a doubt written from a man’s perspective without much sympathy to the plight civilian women experienced during the World War II era. This article is very well written and cites over 100 references, making for a very factual account of the times. This article was geared more towards what contributions were made by civilian women versus the article by Ruth Roach Pierson which put most of the focus on women’s roles within the military. Jeff Keshen’s article explains how the media plays a of the time played a pivotal role in doing two things specifically, one was to get the women out to work, support their families and contribute to the war cause. The second countered the last by telling women were over and over told how important their role in the home was. Throughout this article the writer makes numerous references towards how the government of Canada attempted to do the right thing towards female workers during the war, but it also shows how the government’s heart wasn’t into it, thus just making offers to female workers just to appease their complaints for the time being until the war was over. The government was terrible on providing financial support to women whose husbands were away at war, offering only meager amounts of their pay each month, thus forcing more women into the workforce. The article goes on to further explain how during the war, women felt empowered by their circumstances and how once the war was over that women continued to fight towards equality and many refused to ‘go back to the kitchen’ after the war and further challenged the norms by continuing to work. In conclusion, the most compelling argument found during both articles was the willingness of women to move forward and support their families, no matter the cost or the inequalities found between their male counterparts. I have always heard said that ‘women are the backbone of society’. Now, this may not be entirely true in the year 2011 with the shared roles of women and men in families, but it certainly can be said for the years during World War II. Women were faced with the challenge of having their spouses and breadwinners away from home, and they were also faced with the uncertainty of their safe return home to their families. When you couple this with the call from their government and society to join the work force to help the war effort and take over the roles of the men in society while they were away. Eagerly the women answered that call, and stepped up to take over the roles the men used to hold before the war. Not only were they working full-time jobs, but they were still in charge of their households and raising their children and taking over and completing the roles of husband and fathers for an extremely long period of time.

Tuesday, August 20, 2019

Wireshark Network Protocol Analyzer Information Technology Essay

Wireshark Network Protocol Analyzer Information Technology Essay Todays networks are typically very stable. The problem is they arent static. Management and users are constantly demanding new technologies, new services, and better performance, which inevitably require changing infrastructure, deploying new applications, and dealing with security. And in the process network administrator needs to control IT costs and minimize disruption to the organization and also need to be able to clearly see all aspects of network to accurately assess the impact of adding new technologies and services and to make sure it is delivering maximum performance. And now-a-days there are wide variety of software and hardware products available that help network system administrators manage a network. Network management covers a wide area as well as local area network which mainly based on three different principles, which are : Performance: reduce blockage in the network. Reliability: keeps the network and the services that the network provides up and available for all the users .It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Security: Makes the network protected from unauthorized users and outside world. Functions that are execute as part of network management accordingly include controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network, network planning, predetermined traffic routing to support load balancing, cryptographic key distribution authorization, configuration management, fault management, security management, performance management, bandwidth management, analytics. There are a variety of network monitoring tools available in the market to be used depending on the size and requirements of the organisation. OBJECTIVE The intention of this report is to have a in depth study and estimation of network management tools that allow us to observe and manage the performance and function of networks effectively and efficiently, to produce a short report detailing the benefits of implementing Network Management. The tools which have been used in this report are Fluke Protocol Inspector, Wireshark network protocol analyzer, SNMP Browser Utility and Network inspector. FLUKE OPTIVIEW ANALYZER AND WIRESHARK NETWORK PROTOCOL ANALYZER A network protocol analyzer is a vital part of a network administrators toolkit. Network protocol analysis is the truth serum of network communications. If you want to find out why a network device is functioning in a certain way, use a protocol analyzer to sniff the traffic and expose the data and protocols that pass along the wire. Fluke and Wireshark network protocol analyzer offers insights into what is happening not only over the WAN, but also on the local area network (LAN) at each location. Information pertaining to traffic flows, protocols, and even individual data packets can authorize the IT organization responsible for the network to keep it operating at peak performance. Fluke and wireshark are tools to admin computer networks and they helps in monitoring and troubleshooting the network. In addition, they also helps in observe the status of devices, errors, warnings, and changes. Fluke and wireshark, the network analyzers are fast performing and compatible with almost eve ry operating system of windows. To observe the activities and the performance of these network analyzer program, a small network has been assembled: Figure 2.1 TEST NETWORK The minimal equipment for using Protocol Inspector/analyzer to observe the performance and applications of a network properly, is made up of two routers, two switches and two hosts. A class B addressing scheme has been used on the network. Two routers namely R1 and R2 respectively represent two different sites. R1 is using 172.17.0.1/30, R2 is using 172.17.0.2/30 and both the routers are connected through 172.17.0.0/24. To make easily understand only two users have been used. User1 and user2 are respectively on 172.17.1.100 and 172.17.2.100. Summary View of Fluke OptiView Analyzer The program opens in the Summary View. This view shows several windows used by the tool. The Resource Browser window in the upper left corner shows the only monitoring network device. The Monitor View, which is in the main window on the upper right, monitors one resource per window in a variety of viewing options. The Stop (red colour tab) in the upper-left corner of the Monitor View window confirms that no monitoring is occurring. Figure 6.1 Start the Monitor / Capture process To start the monitoring / capturing process, use the Start button or Module -> Start from the menu system. The Utilization chart should start showing activity like the graphic below: Figure 6.2 The word ARM(green colour tab) should appear where Stop had been before. If opening the Module menu, notice that Stop is now an option while Start is muted. The tabs at the bottom of the window show the resulting data in a variety of forms. Click on each and note the result. Transmit (Tx), Alarms, and Alarm Log will be blank. The following is the Received (Rx) frames, which indicates that Broadcast and Multicast frames are being received, but they may not show any Unicasts. Figure 6.3 Using the console connection to the router, ping the monitoring host, and notice that Unicast frames appear. Unfortunately, the errors shown in the third column will not appear in the lab exercise unless a traffic generator like the Fluke Networks OptiView product has been added. Now ,for the Detail View window click on the Detail View button in the toolbar or double click anywhere on the Monitor View chart. This will open a second window that should look something like the following, after maximizing the Utilization / Errors Strip Chart (RX) window. In a detail view there are few options we can see : MAC Statistics Frame size distribution Protocol Distribution Host Table Network Layer Host table Application layer host table Host matrix Network layer matrix Expert view MAC STATISTICS Mac Statistics tells us about the module type and speed used on the system. It provides important information like Network utilization, total bytes of data received. It also provides the different types of frames travelling across the network. Figure 2.2 Mac Statistics As shown in Error: Reference source not found, the total numbers of 1,555 frames were received. Further more there were 152 broadcast frames, 322 multicast frames and 1,081 unicast frames sent over the network. There were no errors found and a total of 122,453 bytes of data was received with an effective 0.003% network utilisation. FRAME SIZE DISTRIBUTION Frames on a network are classified according to size. Frame size distribution tells us the frames across the network and their size. Figure 2.3 FRAME SIZE DISTRIBUTION The picture above shows the frame size distribution over the test network. On the basis of size frames have been classified in to 8 different categories. The maximum average frame size is 65-127. PROTOCOL DISTRIBUTION Protocol distribution tells the number of protocols operating over the particular network and also at what percentage a protocol is working in terms of transferring data. Figure 2.4 Protocol Distribution The figure above shows different types of protocols on the network and the percentage of each protocol on the right of the graph and on the left side are different tabs, by clicking on each one of them an individual percentage of each protocol can be monitored. HOST TABLE Host table gives us a picture of the traffic generation on the network and the MAC address of the devices receiving the traffic. It tells us the maximum traffic host and the minimum traffic host. Figure 2.4 HOST TABLE In the picture above it shows percentage of traffic based on the number of frames coming in to the host. On the right hand side it shows the MAC addresses of the different hosts. It also tells us about the broadcast and the STP traffic. NETWORK LAYER HOST TABLE The Network Layer Host Table tells us about the packets, errors and bytes for each station at network layer. It allows decoding the packets based on their network layer address. So it helps the network managers to troubleshoot at the host level. Figure 2.5 NETWORK LAYER HOST TABLE The figure above shows the packets coming in to the hosts at the network layer based on their IP addresses. It also tells us that there are 5 IP hosts and no IPX hosts on the network.  [1]   APPLICATION LAYER HOST TABLE Application layer host table tracks packets, errors and bytes on an application specific basis. It traces packet activity of a particular application. It helps network managers to monitor bandwidth utilization on the network. Figure 2.6 APPLICATION LAYER HOST TABLE The figure above shows the operation of the different applications by the host. It shows the usage of the bandwidth in percentage by each application. HOST MATRIX Host Matrix shows the communication between two or more MAC addresses/ hosts. Hosts could be talking to more than one host at the same time which can be defined by the graph below: Figure 2.7 HOST MATRIX Figure 2.7 shows different hosts communicating to each other and at what percentage they are sending and receiving data on the network, which helps an engineer in bandwidth allocation to various hosts on the network. NETWORK LAYER MATRIX Network Layer Matrix shows the total data packets between a pair of systems by the network layer protocol. It shows the protocol specific traffic between the hosts. Figure 2.7 NETWORK LAYER MATRIX The figure above shows the conversations between the different pair of hosts. It shows the communication between two IP addresses and their bandwidth utilization. EXPERT VIEW Expert view shows different kinds of data capturing on the network on a single screen where the network engineer can monitor the user activities to make the network more responsive and reliable. Figure 2.8 EXPERT VIEW OVERVIEW Figure 2.9 Expert View of Data Link layer Figure 2.10 EXPERT VIEW OF SESSION LAYER Figure 2.11 EXPERT VIEW OF NETWORK LAYER The figures above show the output of different layers of OSI model. It also shows the protocol distribution across the network and utilisation of the different applications for file transfers like HTTP, ARP and others. It also identifies errors and any broadcast or multicast on the network. PROTOCOL OPERATIONS Network inspector tool is also used to investigate the operation of different protocols like; ICMP TFTP TELNET DHCP RIP/OSPF/IGRP ICMP (internet Control Message Protocol) ICMP stands for Internet Control Message protocol. It is one of the very important internet protocols, it is used by the a network administrators to monitor network connections ICMP SUCCESSFUL PING ICMP is the tool used to check the connectivity also known as PING (Packet Internetwork Gropper) which sends and receives echo request. PING successful means that device is in a reachable distance, when host receives the echo request it reply to it this means the destination is reachable. This process is explained in the figures below Figure 0.1: ICMP ECHO REQUEST Figure 0 .1 shows it is an Echo request by the host 192.168.2.2 to the destination 192.168.1.2 all across the network. Figure 0.2: ICMP ECHO REPLY The Echo reply to the request is shown in the figure above. It is clearly visible that the 32 bit data packet was sent to the host 192.168.1.2 and the source 192.168.2.2 sends it as a reply the host 192.168.1.2 as the same 32 bytes which means no data was lost and both can communicate without loosing any data. ICMP PING TIMEOUT Another common message while trying to ping a host or address is Ping Timeout. Ping times out when destination IP address does not exist, network inspector displays the following result for ping time out. Figure 0.3: REQUEST TIMED OUT Figure 0 .3 shows that when the engineer tries to ping an address which does not exists on the network, ARP protocol broadcasts this request with MAC address FFFFFFFFFFF to find the destination address, but when it does not get any response because the address is not there on the network the Ping Request, Times out after some time. ICMP NETWORK UNRECHABLE Network Unreachable means the network which we are trying to reach is not available for communication. This could happen due to numerous reasons, if the interface is down for some reason, if in case of using RIP it is at a distance more than 15 hops from the source or if the destination address does not exist in the routing table of the router. Fluke network inspector helps network manager to find the reason behind the network failure as explained in the figures below n Figure 0.4: ECHO REQUEST FOR THE IP ADDRESS OUTSIDE THE NETWORK ADDRESS Figure 0.5: DESTINATION UNRECHABLE REPLY Figure 0 .4 explains a network engineer sending an Echo Request to the address 192.168.3.1 which is not within the network and Figure 0 .5 shows if the address is not on the network or routing table of the router it sends a message Host Unreachable. ICMP Ping Time Out is different from ICMP Ping Network Unreachable because when the host sends a data to an address, it then waits for the reply from the destination. If after some time the reply does not come back this means the data is going to the destination address but cannot receive any updates or data from that destination, it displays the message Request Timed out. On the other hand when host sends data to the address which does not has not entry in the routing table of any of the routers, the data will not be sent anywhere and the message comes out as Destination Host Unreachable TFTP TFTP or Trivial File Transfer Protocol is very easy and simple to implement as it takes very less memory. It is a connectionless service that uses UDP (User Datagram Protocol). It is faster than FTP. It is used on routers, switches and some hosts that support TFTP for the purpose of transferring the file. Figure 0.6: TFTP FILE COPYING Figure 0.7: TFTP In the above figure it is clearly visible that the source port is 56882 and destination port is 69 which is used for (Trivial File transfer). This diagram also proves that TFTP uses UDP to transfer of files along the network. In the second portion TFTP is captured where it shows the file transferred is sdm-config. TELNET Telnet is a utility to access a device remotely over the network. It can be used for many purposes. Telnet works with TCP/IP. Whenever we access a device remotely, a connection has to establish using a Three Way Handshake process. ESTABLISHING A TELNET SESSION Synchronization between hosts is done by an exchange of connection establishing segments that carry SYNs. The Synchronization requires each side to send its own (ISNs Initial Sequence Numbers) and to receive a conformation of it in an Acknowledgement (ACK) from the other host. Each host also receives each others ISN and send a conformation as ACK this process is called a Three Way Handshake THREE WAY HANDSHAKE Host A send its ISN (Seq = X) to start the session, it is received by the Host B who then send its own ISN (Seq = Y) and also sends (ACK = X+1) to Host A, when Host A receives the ACK it do the same as Host B adds 1 to the ISN received and send (ASK = Y+1) back to the Host B which establishes the TELNET session (see Figure 0 .72). Sends SYN SEQ = Y ACK = X + 1) Host A Host B Sends SYN (Seq = X) Receive SYN (Seq = X) Receive SYN SEQ = Y ACK = X +1) Sends ACK (ACK = Y +1) Receive ACK (ACK = Y +1) Figure 0.72: THREE WAY HANDSHAKE Diagram taken from CCNA 1 2 Companion Guide Figure 0.8: THREE WAY HANDSHAKE Figure 0 .8 shows the Three Way Handshake. Each host sends an ISN and in reply other host add 1 to it and sends it back as an acknowledgement. Fluke Network Inspector allows network administrator to see this process and monitor any unauthorized attempts. Figure 0.9: FIRST STAGE OF THREE WAY HANDSHAKE In Figure 0 .9 Client sends the request to synchronise its ISN to the telnet server, it then specifies its initial sequence and adds 1 to it. Figure 0.10: SECOND STAGE OF THREE WAY HANDSHAKE Figure 0 .10 shows that the ACK packet has been sent back to the host and at the same time another packet for its SYN has also been sent to establish a connection. Figure 0.11: THIRD STAGE OF THREE WAY HANDSHAKE Figure 0 .11 shows that the server just now received a packet from the host and the connection is now established between them for further more data transfers. DATA CAPTURING Fluke network inspector helps network manager to monitor and capture the data being transferred between the devices once the telnet session is active, though it can be a lengthy process to see the whole data but it can be really helpful in troubleshooting typical problems. Data is captured in only one letter at a time which can be seen in the following diagram. Figure 0.12: DATA CAPTURING In the figure above letter I has been captured which is a part of password while accesing the device remotely. Thus Fluke tool helps network engineer to monitor each and every bit of data travelling across the network. . Figure 0.13: LOGGED ON THROUGH TELNET Figure 0 .13 shows the successful remote log on to the router R2. Now here all the data transferred will be captured by the Fluke tool inspector. TERMINATING A TELNET SESSION Terminating a TELNET connection is a must for security reasons. It again takes Three Way Handshake process. This process can be monitored in Fluke Inspector as we will see this in the diagrams below (see Figure 0 .14). Figure 0.14: FIRST STAGE TERMINATION In Figure 0 .14 the request for the termination of the session has been sent, next figure will show the acknowledgment received by the server. Figure 0.15: SECOND STAGE TERMINATION In Figure 0 .15 server receives the request and sends an acknowledgment for the termination of the session. Figure 0.16: THIRD STAGE TERMINATION Figure 0 .16 shows the third and the last stage of terminating the telnet session. LIMITATIONS OF TELNET TELNET is not very secure process as it is over the internet and the data is not encrypted which can be easily hacked and the information can be lost. Secondly TELNET involves TCP/IP only, and hence is not compatible with other protocols. Unauthorised users can on to log on to the network and can damage the configuration files, which can affect the performance of the network and can result in less reliable network. To prevent this remote access can be restricted to certain ports so that only authorised individual can log on remotely which helps in reducing the chances of and intrusion on the network. DHCP (Dynamic Host Configuration Protocol) DHCP allows hosts on the network to obtain an IP address dynamically. Network engineer configures a DHCP server for the network defining a pool of IP address to be allocated to a particular range of hosts. Whenever a host requests an IP address, server automatically assigns the address. When a DHCP client comes online it sends a DHCP Discover broadcast message. After sending a DHCP Discover, client moves into a select state. Client then takes the offer from the DHCP server, it then receives the first response and sends the DHCP Request packet and asks for how long it can keep that address without renewing it, then server acknowledges the request and sends DHCP ACK packet. At this stage the client gets into the bound stage and starts using the IP address. The flow chart below (see Figure 0 .17) describes the whole process. Clint Boots Initialize State Select DHCP ACK DHCP Request Request DHCP Discover Bound Figure 0.17: FLOW CHART FOR DHCP Diagram taken from CCNA 1 2 Companion Guide DHCP DISCOVER Protocol Inspector tool can be used to monitor the whole process step by step. Figure 0.18: DISCOVER Figure 0 .18 shows the client has been discovered by a DHCP server by its broadcast. At this point it does not have any IP Address. DHCP OFFER DHCP server makes an IP address offer to the client. Figure 0.19: DHCP OFFER In Figure 0 .19 an offer made by server to accept 192.168.2.3 as an IP address. CLIENT REQUEST A request from the host is sent to the DHCP server for an IP address Figure 0.20: DHCP REQUEST In Figure 0 .20 host negotiates for the lease time for the IP address offered by the DHCP server. DHCP ACKNOWLEDGMENT DHCP server then sends an acknowledgment packet. Figure 0.21: ACKNOWLEDGMENT Figure 0 .21 shows the IP Address 192.168.2.3 has been accepted by the client as new IP address. DHCP RELEASE DHCP server issues an IP address to the client which can been seen in the Figure 0 .22 Figure 0.22: DHCP RELEASE RIP (Routing Information protocol) The Routing Information Protocol (RIP) is a dynamic routing protocol used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP) using the distance-vector routing algorithm. Devices running RIP sends the information of all the connected devices in the network every 30 seconds to keep the network reachable and connected. RIP has two versions. Fluke network inspector tool tells about the connected routers and the hops, with there IP address. All this information is very useful in troubleshooting. Figure 0.23: RIP ROUTING INFORMATION PROTOCOL Figure 0 .23 explains the routing process. It shows that the port used for routing is UDP 17. Only two routers are connected to each other. It also tells us which version or RIP is running and at what distance both router are as in HOPS COUNT as visible the first one is 1 Hop far from the host and second one is 2 Hops from the host it sends the routing information every 30 seconds. Another thing is that RIP can only support 15 Hops per network. SNMP (Simple Network Management Protocol) This protocol operates at the network layer of the OSI model where it exchanges the management information among the devices installed in the network. It is very clear from its name that this protocol is used to manage network devices such as routers, Switches Hubs, modems, and systems. It is used to monitor different user activities over the network. SNMP helps network engineer to monitor and identify any faults on the network and helps to solve these problem for better connectivity. A network managed by the SNMP consist of the following Managed devices: Devices used on the network such as Routers, Switches Hubs, modems, systems and servers etc. Agents: Agent is software which is used to operate the managed devices. Network-management systems: They provide the processing and memory required for the network management, there can be one or more network-management systems on a managed network GETIF UTILITY The SNMP operation can be monitored by the network engineer with the use of Protocol inspector and a utility called OPTIVIEW using a freely available browser utility called GETIF. GETIF is a network tool which is based on windows GUI; it is very helpful to gather the graphical information of SNMP devices. It provides information like Parameters, Interfaces Connected, Routing Tables, Trace Route and Network length. . GETIF PARAMETERS After loading up the GETIF utility type in the router IP address in the host name box of the parameter window the result will be as following. Figure 0.24: GETIF PARAMETER In Figure 0 .24 it is shown once the router IP Address has been typed in and START button has been pressed in the Parameter Tab of GETIF utility, it gives us the information like the router name and IP Address, router description, and also shows the SNMP port number which is 161. SNMP GET Fluke network inspector tool can be used with GETIF utility to see the data retrieved from SNMP agent. To retrieve this information select MBrowser tab on the GETIF window and then select the SNMP option from the graphical tree, it gives us all the required information shown below. Figure 0.25: SNMP GET SNMP SET When a single item is selected in MBrowser of GETIF utility, start the network protocol inspector to monitor the data transfer. When the name of the router is changed by using GETIF utility it will be shown on the Network Inspector Utility as well SNMP TRAP Fluke Network Inspector tool along with GETIF utility has the ability to diagnose the error on the network, To see the result on the Network Inspector tool if the network engineer can physically take the serial cable out from the router port and disconnect the communication in the network the Network Inspector tool identify this error and displays it on the tools screen for the network engineers urgent attention Figure 0.26: SNMP TRAP In Figure 0 .26 the status of the serial connection is show to down this is due to the serial cable being unplugged from the port. GRAPHYCAL MONITORING IN GETIF This is another option in GETIF utility to monitor the network bandwidth consumption and the percentage of the different protocols. It can be seen in the following figures. Figure 0.27: SNMP GRAPHYCAL MONITORING In Figure 0 .27 two graphs have been shown, in these graphs only ICMP packet has been monitored to show the operation of the protocol. In top half of the fig graph starts from the 0 and then gradually goes up due to the increase in the ICMP PINGs. A sudden drop can also be seen while the graph is increasing this is due to the term Request Timed Out in the ping in the second half you can see the decrease in the graph and this is due to when the pings were cancelled one by one. BENEFITS OF FLUKE NETWORK INSPECTOR TOOL Fluke Network Inspector allows network engineer to provide reliable, and desirable connectivity to the organisation, it saves time and money by effective resource management. It also provide better knowledge to the network engineer about the devices installed on the network which helps to find the faults and fix them easily. Fluke Network Inspector provides a solution for monitoring and analysing the network which can be very helpful to the organisations to get desirable and reliable connectivity of their network. It also allows the network engineer to protect the network from any unauthorized users and gives a freedom of managing the network remotely. Fluke Network Inspector Tool helps in performing major functions of the network management which includes: Fault Management Configuration Management Accounting Management Performance Management Security Management All these functions have been explained briefly in this report FAULT MANAGEMENT The process of identifying, diagnosing a problem on the network and resolving it is called fault management. The problem could be of any kind from faulty cables to defective hardware. In other words, it is a very important for the effective operations of a network and to provide the connectivity among the users of a company, An intelligent network engineer will detect the fault in the network in very less time and fix the problem fast. Fault management is a very reliable tool for providing the connectivity for the network. Fault management is very useful to the network administrator as they can keep an eye on the network from anywhere in the network and resolve the issues quickly. Apart from automatic updates about the fault on the network, network administrator can be informed by the users. Network administrator can send ping packets to identify the problem. If a network administrator cannot reach a certain device remotely like when administrator pings a device and gets no reply there could be number of reasons, fault management helps in finding solution to such problems, so that the network is available all the time. Whenever there is a fault on the network it will be known to the network operator by using SNMP (Simple Network Management Protocol) it also rate the problem as if the problem is of high risk to the network or to the low risk, but will keep on sending information to the network administrator about the fault in the network till the time it has be resolved and will send a notification of error resolved. CONFIGURATION MANAGEMENT Configuration management is all about handling the configurations of the network devices. It involves maintaining a database of the network devices, and providing reports of the data travelling over these devices. Keeping the record of the configured devices on the network is called configuration management. Configuration management can help a network administrator to install different software for the better communication among the network. The data base of the configuration management includes different entries like, the devices used, the version numbers and the device capabilities. By using configuration management a network administrator can increase the devices on the network, can provide or deny access to the certain number of users or a group on a particular network. Remote sites can be configured by using different techniques, access can be restricted to certain area of the network for specified users, or if required interfaces can be brought down or up by using the configuration. ACCOUNTING MANAGEMENT Account management helps in managing the utilization of network resources, which further leads to a more productive network. One of the functions of the accounting management is to distinguish between inter and intra -domain accounting data and route them to the respective device, for the session record containing Network Access Identifier, this packet can be routed by examining the NAI to save this packet to be broadcasted over the whole network and utilizing the bandwidth. Accounting management involves the monitoring of the users activities on the network at an individual or at a group level which helps in providing better communication and also reduces the fault generation which can cause loss of data. It allows network engineer to keep track of the bandwidth utilisation w

A Change of Heart Essay -- Personal Narrative Writing

A Change of Heart Stepping through the revolving glass doors of the hospital felt like entering a completely different world. With my arms crossed over my chest, I followed my parents though the never-ending, eggshell white hallways. My nostrils burned from the fumes of cleaners and sterility. Lovely paintings and luscious plants filled the walkways, trying to mask the hollow, empty feeling that most visitors felt. We passed two types of people along the way to our destination: the kind that strolled by while flashing everyone big, cheery smiles, and the people who kept their gaze straight ahead ignoring your mere existence; I preferred the latter. I did not belong in this place. This was a place for the sick, a place where people went to die. My grandfather did not belong here. We continued walking as my thoughts slipped away to a more pleasant time in my life. I pictured our family tradition of traveling to my grandparents' home every Sunday afternoon. Their quaint little home, white washed with baby blue shutters welcomed any stranger and had a faint honeysuckle aroma that soothed the weariest of souls. We ate lunch together with my grandfather and grandmother sitting like kings and queens at opposite ends of the table. Then everyone gathered in the family room and spent the late afternoon playing games and catching up on the big events of the week. My grandfather spent his time playing with each grandchild one at a time so we would feel special. Anyone could tell that he loved his job as a grandparent. His eyes twinkled with delight and his smile never faded as he spent time with us. He loved throwing us up in the air with his powerful arms, until we squealed with delight as our stomachs flew above our heads. ... ... take a step forward. The situation glimmered with a stream of hope. Reaching his hand out to me, I edged even closer and placed my hand atop his. At that moment, I knew that everything would turn out okay. My grandfather had changed physically but not mentally. I needed his smile to assure me of that. A calming feeling came over me as I walked through the revolving doors and out of the hospital into the bright sunshine. Removing the 200 pounds of iron that sat on my heart and leaving behind the massive building which housed the source of my troubles felt welcoming. I walked away from the situation knowing that my grandfather's personality or love for me did not change. However, my attitude shifted from looking at my grandfather as not being acceptable, to understanding that the only thing that had changed was his physical appearance; he was still the same.

Monday, August 19, 2019

Management Internal/External Factors Essay -- essays research papers fc

The Internal/External Factors of Management – Wal-Mart Stores, Inc.   Ã‚  Ã‚  Ã‚  Ã‚  In today’s world management must consider a wide variety of factors in order to establish an effective management plan. Wal-Mart Stores, Inc. is the world’s largest company and number one retailer, with this success a company this large needs to not only to look internally for solutions to their management objectives, they must also look outside of their business for additional resources. With the increase of technology and the easy access to virtually any information, Wal-Mart Stores, Inc. must be prepared to react to the multitude of demands made by consumers and suppliers. The rapid change of the retail industry from brick and mortar stores to Internet purchases Wal-Mart Stores, Inc. has been able to stay attractive to the buying public. Wal-Mart Stores, Inc. has accomplished this through a highly sophisticated inventory tracking system that enables the stores, including the Internet, to have in stock exactly what the consumers are looking for. Ac cording to Hoover’s Online Wal-Mart Stores, Inc has expanded to about 4,700 stores including about 1,500 discount stores, 1,650 combination discount and grocery stores (Wal-Mart Supercenters in the US and ASDA in the UK) and 532 membership-only warehouse stores (Sam’s Club) (2003). With the introduction of a foreign market their management plan must encompass the rules and regulations of doing business in a foreign country. With the invention of their tracking and identification system, called Radio Frequency Identification (RFID), Wal-Mart Stores, Inc. has exerted control over their entire inventory and enables the workers to identify and locate merchandise more readily for the customers. E-Commerce has increased the ease of purchasing for consumers; Wal-Mart Stores, Inc. has a web site that allows for the ease and convenience of purchasing almost every item in the store over the Internet. Wal-Mart Stores, Inc. has been very innovative in meeting the needs of their cl ientele, with the Supercenters, it is basically one stop shopping for all of your household and grocery needs, without the hassles of stopping at two stores when you run your errands.   Ã‚  Ã‚  Ã‚  Ã‚  As a highly respected private employer, Wal-Mart is committed to uphold diversity. Wal-Mart is fully committed to respect their employees... ...er innovation that Wal-Mart Stores, Inc., has adopted is its frame delay data network. This allows for Wal-Mart stores to catalog and examine every transaction that is made so that they will be able to keep their finger on the pulse of the customers’ buying patterns. With this they can tract how much of a certain item customers buy and then relay that information on to the supplier. For example, if customers are buying four of the same item, then Wal-Mart can advise the supplier of this information and then the supplier can package the item in groups of four. Through innovation Wal-Mart Stores, Inc., has redefined the basic dimension of the retail Industry. Works Cited About Wal-Mart. â€Å"Wal-Mart International.† 8 November 2003. http://www.walmartstores.com/wmstore/wmstore/Mainabout.jsp?BV_SessionID=@@@ Aisner, James E. â€Å"Rapid Response: Inside the Retailing Revolution.† Harvard Business School Working Knowledge on the Web. Winter 1999. http://www.e-proximity.com/cream/HBS%20retail.htm Biesada, A. (2003) Wal-Mart Stores, Inc. Hoover’s Online. Retrieved November 8, 2003 from: http://www.hoovers.com/free/co/factsheet.xhtml Dash30. Wal-Mart Takes on The Web. 8 Oct. 2003 . Management Internal/External Factors Essay -- essays research papers fc The Internal/External Factors of Management – Wal-Mart Stores, Inc.   Ã‚  Ã‚  Ã‚  Ã‚  In today’s world management must consider a wide variety of factors in order to establish an effective management plan. Wal-Mart Stores, Inc. is the world’s largest company and number one retailer, with this success a company this large needs to not only to look internally for solutions to their management objectives, they must also look outside of their business for additional resources. With the increase of technology and the easy access to virtually any information, Wal-Mart Stores, Inc. must be prepared to react to the multitude of demands made by consumers and suppliers. The rapid change of the retail industry from brick and mortar stores to Internet purchases Wal-Mart Stores, Inc. has been able to stay attractive to the buying public. Wal-Mart Stores, Inc. has accomplished this through a highly sophisticated inventory tracking system that enables the stores, including the Internet, to have in stock exactly what the consumers are looking for. Ac cording to Hoover’s Online Wal-Mart Stores, Inc has expanded to about 4,700 stores including about 1,500 discount stores, 1,650 combination discount and grocery stores (Wal-Mart Supercenters in the US and ASDA in the UK) and 532 membership-only warehouse stores (Sam’s Club) (2003). With the introduction of a foreign market their management plan must encompass the rules and regulations of doing business in a foreign country. With the invention of their tracking and identification system, called Radio Frequency Identification (RFID), Wal-Mart Stores, Inc. has exerted control over their entire inventory and enables the workers to identify and locate merchandise more readily for the customers. E-Commerce has increased the ease of purchasing for consumers; Wal-Mart Stores, Inc. has a web site that allows for the ease and convenience of purchasing almost every item in the store over the Internet. Wal-Mart Stores, Inc. has been very innovative in meeting the needs of their cl ientele, with the Supercenters, it is basically one stop shopping for all of your household and grocery needs, without the hassles of stopping at two stores when you run your errands.   Ã‚  Ã‚  Ã‚  Ã‚  As a highly respected private employer, Wal-Mart is committed to uphold diversity. Wal-Mart is fully committed to respect their employees... ...er innovation that Wal-Mart Stores, Inc., has adopted is its frame delay data network. This allows for Wal-Mart stores to catalog and examine every transaction that is made so that they will be able to keep their finger on the pulse of the customers’ buying patterns. With this they can tract how much of a certain item customers buy and then relay that information on to the supplier. For example, if customers are buying four of the same item, then Wal-Mart can advise the supplier of this information and then the supplier can package the item in groups of four. Through innovation Wal-Mart Stores, Inc., has redefined the basic dimension of the retail Industry. Works Cited About Wal-Mart. â€Å"Wal-Mart International.† 8 November 2003. http://www.walmartstores.com/wmstore/wmstore/Mainabout.jsp?BV_SessionID=@@@ Aisner, James E. â€Å"Rapid Response: Inside the Retailing Revolution.† Harvard Business School Working Knowledge on the Web. Winter 1999. http://www.e-proximity.com/cream/HBS%20retail.htm Biesada, A. (2003) Wal-Mart Stores, Inc. Hoover’s Online. Retrieved November 8, 2003 from: http://www.hoovers.com/free/co/factsheet.xhtml Dash30. Wal-Mart Takes on The Web. 8 Oct. 2003 . Management Internal/External Factors Essay -- essays research papers fc The Internal/External Factors of Management – Wal-Mart Stores, Inc.   Ã‚  Ã‚  Ã‚  Ã‚  In today’s world management must consider a wide variety of factors in order to establish an effective management plan. Wal-Mart Stores, Inc. is the world’s largest company and number one retailer, with this success a company this large needs to not only to look internally for solutions to their management objectives, they must also look outside of their business for additional resources. With the increase of technology and the easy access to virtually any information, Wal-Mart Stores, Inc. must be prepared to react to the multitude of demands made by consumers and suppliers. The rapid change of the retail industry from brick and mortar stores to Internet purchases Wal-Mart Stores, Inc. has been able to stay attractive to the buying public. Wal-Mart Stores, Inc. has accomplished this through a highly sophisticated inventory tracking system that enables the stores, including the Internet, to have in stock exactly what the consumers are looking for. Ac cording to Hoover’s Online Wal-Mart Stores, Inc has expanded to about 4,700 stores including about 1,500 discount stores, 1,650 combination discount and grocery stores (Wal-Mart Supercenters in the US and ASDA in the UK) and 532 membership-only warehouse stores (Sam’s Club) (2003). With the introduction of a foreign market their management plan must encompass the rules and regulations of doing business in a foreign country. With the invention of their tracking and identification system, called Radio Frequency Identification (RFID), Wal-Mart Stores, Inc. has exerted control over their entire inventory and enables the workers to identify and locate merchandise more readily for the customers. E-Commerce has increased the ease of purchasing for consumers; Wal-Mart Stores, Inc. has a web site that allows for the ease and convenience of purchasing almost every item in the store over the Internet. Wal-Mart Stores, Inc. has been very innovative in meeting the needs of their cl ientele, with the Supercenters, it is basically one stop shopping for all of your household and grocery needs, without the hassles of stopping at two stores when you run your errands.   Ã‚  Ã‚  Ã‚  Ã‚  As a highly respected private employer, Wal-Mart is committed to uphold diversity. Wal-Mart is fully committed to respect their employees... ...er innovation that Wal-Mart Stores, Inc., has adopted is its frame delay data network. This allows for Wal-Mart stores to catalog and examine every transaction that is made so that they will be able to keep their finger on the pulse of the customers’ buying patterns. With this they can tract how much of a certain item customers buy and then relay that information on to the supplier. For example, if customers are buying four of the same item, then Wal-Mart can advise the supplier of this information and then the supplier can package the item in groups of four. Through innovation Wal-Mart Stores, Inc., has redefined the basic dimension of the retail Industry. Works Cited About Wal-Mart. â€Å"Wal-Mart International.† 8 November 2003. http://www.walmartstores.com/wmstore/wmstore/Mainabout.jsp?BV_SessionID=@@@ Aisner, James E. â€Å"Rapid Response: Inside the Retailing Revolution.† Harvard Business School Working Knowledge on the Web. Winter 1999. http://www.e-proximity.com/cream/HBS%20retail.htm Biesada, A. (2003) Wal-Mart Stores, Inc. Hoover’s Online. Retrieved November 8, 2003 from: http://www.hoovers.com/free/co/factsheet.xhtml Dash30. Wal-Mart Takes on The Web. 8 Oct. 2003 .