Thursday, October 31, 2019

Virtual Business Design Assignment Example | Topics and Well Written Essays - 1500 words

Virtual Business Design - Assignment Example Problem Definition Since the Eurozone debt crisis that affected Portugal since 2010, the pharmaceutical industry in general and Olive Pharmaceuticals have been experiencing reduced profitability. As a result, it has become difficult to stay within the annual operating budgets. As part of the 2011 IMF bailout package, the Portuguese government has instituted heavy reductions in public expenditure which includes the public health care system. Olive Pharmaceuticals has been affected because of the growing public debt of hospitals and the cuts in pharmaceutical expenditure by the government. In 2012, public hospitals owed â‚ ¬1.5 billion to international pharmaceutical companies. In 2013, the public pharmaceutical expenditure was further reduced by â‚ ¬333 million, which makes pharmaceutical expenditure just 1 percent of GDP (Feria, 2012). As a result, sales to state hospital pharmacies have declined by 10% over the past two years (Feria, 2012). At the same time, operational costs have not reduced proportionally because of increase in energy costs and imported raw materials. The business mission of Olive Pharmaceuticals is to provide high quality oncology pharmaceutical products at affordable prices to consumers through efficient operations and continuous research. This is achieved through goals of keeping operating costs low and maintaining supply chain efficiency. The situation has implications for planning and organizing decisions for Olive Pharmaceuticals as it influences the decision about investing in research or selling generic products. Secondly, the supply chain may have to be reorganized for greater operational efficiency. Situation Analysis Impact of the Situation on Planning Planning is defined as the management function related to the determination of organizational goals and objectives and identifying tasks and resources to achieve those goals (Hill and McShane, 2006). The goal of Olive Pharmaceuticals is to grow its market share and profitabili ty by investing in research and efficient operations. Planning is conducted at different levels such as strategic planning, tactical planning and operational planning. The present situation has implications for planning at all levels. Strategic planning is concerned with decisions about which products to produce and which markets to serve (Carpenter, Bauer, & Erdogan, 2009). In the current situation, where the government is reducing expenditure on pharmaceutical products, the sales of oncology products will become expensive due to high costs. Rationing will further reduce profits while keeping costs the same. On the other hand, sales of generic drugs will increase due to lower prices to the consumer. The planning decisions to be made in this situation include the selection of whether to continue investment in researching new products or market generic drugs to reduce costs and increase sales. This would require careful analysis of the organizational mission and goals. Tactical plann ing is concerned with decisions made at the divisional level. These goals and plans are developed with a view to help the achievement of strategic level goals and plans (Daft, 2013). The challenge of reducing operational costs can be achieved through effective planning at the tactical level with the divisional managers assuming responsibility for staying within the operating budgets for their divisions. Finally, operational level planning is also relevant in the current situ

Tuesday, October 29, 2019

PRICING STRATEGIES Case Study Example | Topics and Well Written Essays - 500 words

PRICING STRATEGIES - Case Study Example roximately $5, it means that the employer can save (8*5=40 each year, 40*5,000= $200,000 by all the 5,000 employees) $50,000 per year in case two of each prescription is inappropriate (200,000-50,000= 150,000). This strategy will help employers save money and also improve the outcomes of patients as the quality of prescriptions will get better. This sort of strategy helps to cut the costs by providing the patients with the medication they require and not the prescription drugs, which will help the organizations efficiently utilizing the prescription drugs. This strategy will be undertaken by the help of the pharmacy claims that will pinpoint the high costs specified by the sponsors, diseases such as high cholesterol, cardiac diseases and asthma must be treated and medicated with the specific medication that will help the employers to slash the cost. These pharmacy claims will then be used for the identification of different patients and the medication they require. This strategy will also help in providing awareness and education to medical doctors in helping them improve the behavior related to their prescriptions that will result in better health care outcomes, as it will help the patients live an improved life as their needless health care costs are cut down, and better treatments are provided to them in accordance with their diagnosis. The use of the first line agents is essential in this program so that the awareness is spread about the use of â€Å"first line drug therapy† and offering samples to the prescription providers. The easy accessibility should be made possible by placing the first line agents at the pharmacies, so that the users should come to know about these agents and they can utilize these instead of branded medicines that are too expensive. It will help cut the cost of pharmacy but also it provides with the potential improvements in quality of care. This program has been followed by several organizations, and it made them cut their costs by

Sunday, October 27, 2019

Pel Company History

Pel Company History Pak Elektron was setup in 1956 as a Public Limited Company with the object of initially producing transformers, switchgears, and electric motors. AEG experts and PEL personnel carried out the designing and production of this equipment jointly. After the conclusion of joint venture agreement with AEG Saigol Group acquired the PEL COMPANY in October 1978. The company floated its shares to the general public and was listed on Karachi Stock Exchange (KSE) and Lahore Stock Exchange (LSE). In 1980, Appliances Division was established and in 1981 its starts the production of Window Type Air Conditioners with the technical collaboration of General Corporation of Japan. This air conditioner was well received in the market for its quality. Subsequently in 1987 the production of Refrigerators and Deep Freezers was started. In 1993 the company has started the assembly of Compressors for Refrigerators and Deep Freezers under technical collaboration with Messrs. NECCHI COMPRESSORI of Italy. It was in early 70s that PEL became known in overseas markets due to its quality. The company started its export to countries like Saudi Arabia, Abu Dhabi, Qatar etc. Later on PEL supplied electrical equipments to various other countries in the Middle East, Far East and Africa with great success. 1.2 Vision To providing engineering goods and services through continuous improvement 1.3 Mission Statement To provide quality products services to the complete satisfaction of our customers and maximize returns for all stakeholders through optimal use of resources, To focus on personal development of our employees to meet future challenges, To promote good governance, corporate values and a safe working environment with a strong sense of social responsibility CHAPTER NO 2 BUSINESS OPERATIONS This chapter has been divided in five section, Section one described the product in which PEL deal. In second section business operation analysis are given. In section third SWOT analysis is given. In fourth section future strategy is given. In fifth section competitive analysis is given. 2.1 Organizational Structure 2.1 Division of PEL There are two division of PEL: Power Division Appliances Division This division is comprised for four departments. 2.1.1 Power Division The most powerful revenue generating business unit of PAK Elektron, produces Transformers, Switchgears and Energy Meters for the public sector such as KESC Karachi Electric Supply Corporation, LESCO and PESCO. They provide these three products: Production Transformers Production Switchgears Production Energy Meters During the year 2006, PEL retained its market leadership in the Power Equipment market, increasing its market share from 33% in 2005 to 36% in 2006 in the switchgear market and also maintained share of 35% in 2006 as well in the energy meters market. PELs leadership in the Power Equipment market is largely due to its strong Research and Development knowledge and high product quality. 2.1.1.1 Production Transformers PEL has vast experience in design and manufacturing of standard and special purpose transformers up to 33kV and up to 6000kVA ratings. PELs transformers have been successfully type tested for Impulse voltage and short circuit tests at KEMA, (Holland), HVSC Lab, Rawat (Pakistan), NIP (Pakistan) and UET (Pakistan). 2.1.1.2 Production Energy Meters Another successful and most powerful department of power division is its energy meter production department that manufactures Electro-mechanical Energy Meters under license from ABB-USA.The quality of PEL meters has been certified by KEMA Laboratories (Holland) and conforms to IEC 521, SGS Yarsley, and U.K, has certified PEL Energy Meter plant for ISO 9002. Following types of meters are manufactured: Electro mechanical Single phase Three phase_ Direct connected STATIC /DIGITAL Single Phase Three Phase Directed connected 2.1.1.3 Production Switchgears Switchgears are one of the highly technical and specialized power products of PEL. They are produced for indoor and outdoor installations complying with international installation standards. A major customer for this product is WAPDA. The Company provides one year after sales service warranty to WAPDA, KESC and other customers. In Switchgear, PEL enjoys market share of 33 % while competitors are Alstom, Siemens and Fico. 2.1.1.4 Power Transformers Owing to massive growth in power sector, demand for power transformers is also growing proportionately for all ratings from 66KV to500 KV. PEL has stepped into this activity by starting the manufacturing of 132 KV transformers, being the most demanded rating, and for these purposes has formed a strategies partnership by signing the two agreements. Based on the demand forecast of Power Transformers for WAPDA, KESC and other projects, PELs market share is initially targeted to be 20%, growing in five years. 2.1.2 Appliances Division The Appliances Division of PEL is the pioneer manufacturer of electrical goods in Pakistan. The Divisions product portfolio comprises of air-conditioners, refrigerators, televisions, microwave ovens, and split air-conditions. PEL is one of the three leading players in the home appliances market. The Company is engaged in the manufacturing and/or marketing of the following home appliances. The Companys Appliances Division contributed significantly to its sales in 2005-06. The main reasons for this growth are increase in market sizes along with PELs strong brand image accompanied with its extensive dealership network spread nationwide with over one thousand outlets and an after sales service network with over 100 workshops. Another major reason for the increasing growth in the home appliances market is the easy availability of consumer financing at lower interest rates. PEL itself is involved in selling its products through a marketing wing for sales against consumer financing. Availability of Chinese products at very competitive prices has not proven to be that big a threat to the local industry. This is because of the improved quality of the local products and cost efficiencies due to economies in product and raw material purchases hence making the local products competitive with the Chinese imports. In 2005-06, the Appliances Division contributed around 53%to the Companys sales whereas the Power Division made up the remaining 47%. Refrigerators and Split air conditioners were the main source of revenue in the Appliances Division, whereas transformers and energy meters are the main revenue drivers in the Power Division. The Appliance Division accounted for 44% of Net Sales during the year ended June 30th 2007. Refrigerators and Split air conditioners were the main source of revenue in the Appliances. The Company is engaged in the manufacturing and/or marketing of the following home appliances. Manufacturing Trading Refrigerators Microwave Ovens Air Conditioners (Split) Conditioners (Window) Deep Freezer Floor Standing ACs Generators Washing Machines 2.2 Business Process Analysis (Industrial Analysis) 2.2.1 Transformers PEL has vast experience in design and manufacturing of standard and special purpose transformers. New technical designs for improved efficiency and quality against special orders of non-standard transformers are continuously being explored. These transformers are available for various applications. Distribution Transformers Auto Transformers Furnace Transformers Welding Transformers Transformers are normally supplied in a period of 3 4 months after the receipt of orders from respective distribution companies of WAPDA and varied supply time for private customers. The Company provides one year after sales service warranty to WAPDA, KESC and private sector customers. 2.2.2 Energy Meters PEL manufactures three types of energy meters; Single Phase and Poly Phase. The electro-mechanical energy meters are manufactured under license from ABB of USA. The quality of PEL meters has been certified by KEMA Laboratories of Holland. PEL meters are superior than others due to their ability to lower revenue losses through accurate precise operation and reduction of maintenance expenses. Single Phase energy meters provide maintenance-free operations over a long period and accurate measurement of electrical energy. Poly Phase energy meters improve load performance and precision accuracy. The meters require minimum maintenance and can withstand abuse from surges and magnetic tampering. Three phase digital electronic meter with dual tariff capability recently launched and supplies to WAPDA has begun this year. Energy meter orders from WAPDA are received annually and their supply period is 9 -10 months. Energy meters to KESC are supplied in a period of 3 4 months. The Company provides one year after sales service warranty to WAPDA, KESC and Others. 2.2.3 Switchgears Switchgears are one of the highly technical and specialized power products of PEL. They are produced for indoor and outdoor installations complying with international installation standards. A major customer for this product is WAPDA. The Company provides one year after sales service warranty to WAPDA, KESC and other customers. 2.2.4 Refrigerators PEL Refrigerators were introduced in 1987 with features such as VCM (Vinyl Coated Metal) coating; stylish finishing and auto drain systems. PEL refrigerators carry compressor made by Danfoss of Germany. The low noise compressor is extremely silent and keeps the refrigerator running smoothly. Furthermore, the compressor is resilient to fluctuations in voltage level, thereby proving to be a more durable product. PEL is actively involved in the manufacturing and trading of refrigerators, which is a major source of consistent growth. The refrigerators business contributes to 48% of the Companys sales and this trend is expected continue in years to come (which is reflected in the figures for 2005-06 in the table below). 2.3 SWOT Analysis 2.3.1 Strengths PEL has the following strengths and is in more competitive position in these areas than its competitors. Following are the main strong points of PEL. 2.3.1.1 Strong Brand Image PEL has created the strong brand image in the mind of the customers through higher quality and low price. The customers of the PEL always prefer to buy the PEL home appliances like WRAC split AC and refrigerators whenever they wanted to buy. 2.3.1.2 Strong Dealer Network It is also the plus point for the PEL that it has also developed the strong dealer network in the market. The dealers are always trying to sell the PEL appliance to the customers because they know there are high margin in the PEL products. They can get more money after selling the PEL products. The management of PEL also provides more incentives to their dealers than their competitors 2.3.1. 3 Free Customer Service PEL provides free customer service for one year to its customers. So the customers always buy the PEL products due to its free service and it becomes loyal customer for the PEL. PEL always provides help to their customers for repWRAC, Refrigerators and other items. PEL always make efforts to satisfy the customers. 2.3.1. 4 M Arket Leader In WRAC (Window Room Air Conditioner) It is another strong point that PEL is a market leader in WRAC. The window room air conditioner is more demanded by the customers than its competitors air conditioners because it has more durability in operating systems and cools the room in few minutes. PEL always strives to provide the innovative features in WRAC. PEL air conditioner is cheaper and has a higher quality than others WRAC. Thats why customers always purchase the PEL window air conditioner. 2.3.1.5 Leader In Power Division In Pakistan the PEL is almost leader in power division. Almost all power division are provided by PEL to wapda. 2.3.2 Weaknesses Overcome on these weaknesses then it can become a market leader in the home appliance. Like other companies PEL has some weaknesses in operating the business. If PEL loses some competitive edge in the following points: 2.3.2.1 Lack Of Advertisement PEL was a very lack of advertisement according to other appliances companies. So it is a big weakness of PEL. 2.3.2.2 Lack Of Product Range PEL has introduced more products of consumer items but there are more needs to develop new consumer items like PEL washing Machines, Vacuum cleaner and other items. Due to lack of product Range, Company cannot earn more profit because consumers have high demand of these products and they say that if company is investing in these products then we can keep all PEL items and we never need to keep others company products. 2.3.2.3 Financial Problems Sometimes PEL faces the financial problems because its stocks are so much piled up in the stores that create the problem of cash flow because when the stocks are not sold and the production is in process for 24 hours a day than the company faces such problems. 2.3.3 Opportunities For the PEL there are more opportunities for expansion the business. If PEL realize that opportunities then it will be more fruitful and profitable for the company. 2.3.3.1 Exploration of Market In Pakistan PEL has the opportunity to explore the market in all over the Pakistan. Even though PEL introduce its products in all cities of Pakistan but there are so many places that have the capacity to absorb the PELs products. 2.3.3.2 Increase in Product Range It is the main opportunity for the PEL that it can increase its product range that will be a more profitable for the company. There are more needs to develop new consumer items like PEL washing Machines, Vacuum cleaner and other items. Due to lack of product Range, Company cannot earn more profit because consumers have high demand of these products. 2.3.3.3 Export Opportunity PEL Company has also the opportunity to export their products in other international countries like UAE, SAUDI ARABIA, and other Arabic and African countries. 2.3.4 Threats PEL Company in such a competitive era has many threats as well. These threats are for the present situations and future. Company should make its policies and strategies according to these threats. So following are the main threats for the PEL: 2.3.4.1 Strong Competition There is very strong competition for the home appliance in the market. So every company tries to come in the number 1 position for achieving the maximum shares in the market. 2.3.4.2 Chinas Product Chinas products are another threat for the Pakistani companies because these products are cheaper than the Pakistani products. An even china product not well in quality but it is comparatively in low prices than the consumers home appliance that are manufactured by the indigenous company. 2.3.4.3 Price War As there is stiff competition in the home appliance market that will cause the price war. So every company reduces the prices of its products to increase the sales. It will not only reduce the profit margin of the company but also reduce the quality of products. So price war is the main threats for all the companies, which are operating in these products. 2.3.4.4 Instability Of Government The rapid changes in governments will become threats for the companies because every government adopts its own policies for the industries. So it increases the uncertainty for the investors who want to invest heavy amount in their new projects. 2.4 Future Strategy PEL is one of the most widely recognized brands in the domestic refrigerator market. It is the second largest local manufacturer and one of the leading brands. For the past four years the Companys market share growth averaged 2% per annum. With continuous efforts in RD, PEL is concentrating on quality of product and cost minimization. The Company is considering technical collaboration for value addition through planned capital expenditures. Increased sales of manufactured refrigerators coupled with sales of split air conditioners are the major factors contributing growth in the appliances business. Other products are also being introduced as a part of Companys strategy to broaden its product range. 2.5 Competitive Analysis The prices are concerned PEL is charging reasonable prices to its customer for all of its microwaves comparatively from others. Prices charged by National, which is a multinational firm, are very higher in comparison with others because it uses special Japanese parts in its microwaves and ensures high quality and performance and only rich class shows interest in National Products. According to the retailers information, people are satisfied with the prices charged by PAK Elektron but still their preferences go along with Dawlence microwaves because of its highly created awareness. CHAPTER NO 3 LEARNING AS STUDENT This chapter has been divided into four sections In section one, I have discussed my duties as a internee during internship, In the second section, I mentioned accomplishments, In the third section I briefed my problems which I faced during internship and in the last and fourth section I offered that how this internship experience impact on my carrier. 3.1 Learning and Duties In finance department there are three sections. Corporate section Leasing and pledge Budgeting 3.1.1 Corporate Section In corporate finance I worked in different units. Firstly, I learned that how letter of credit works in PEL. 3.1.1.1 L.C Section I started working for the Letter of Credit Section. They gave me an introduction and shared important points. Mr. Asad, Senior Executive supervised me in this section. Letter of Credit: A document issued mostly by a financial institution, used primarily in trade finance, which usually provides an permanent payment undertaking. The letter of credit can also be source of payment for a transaction, meaning that redeem the letter of credit will pay an exporter. Letters of credit are used primarily in international trade transactions of significant value, for deals between a supplier in one country and a customer in another. In such cases the International Chamber of Commerce Uniform Customs and Practice for Documentary Credits applies.The parties to a letter of credit are usually a beneficiary who is to receive the money, the issuing bank of whom the applicant is a client, and the advising bank of whom the beneficiary is a client. There are different types of LC: a) L.C at Sight: In L.C at sight, Our Company opens an L.C in a bank which provides a guarantee to the exporter that he will pay the due amount. Now, the exporter takes these documents to his bank and asks the bank to give him money so that he can start working on the required contract. When he fulfills the contract, he goes to his bank and provides the required documents to prove that he has fulfilled the contract. Now his bank sends these documents to our bank and our bank ask us to confirm the clarity of the documents and if cleared then these documents are called cleared documents. Then lastly we will pay the bank the due amount. b) Usance L.C: In usance L.C the contract between the two parties require the importer to pay in a longer term e.g. 3 or 6 months after receiving the material from exporter. Our bank will pay the contract amount after the agreed period. c) INLAND LCIn land LC means LC open in a same country. 3.1.1.2 Guarantees I started working on the Guarantees, Leasing, Finance against Merchandise and Cash Financing Section. They just gave me an introduction and shared important points. Mr. Tahir Mahmood, Senior Executive supervised me in this section. Guarantees Section: Secret behind PELs success and increasing market share is its guarantees section that actively works to get every order either for appliances or for power of the company by speedily participating for the contract with the help of Tender Bonds of Guarantees. Types of Guarantees Tender guarantee ( Bid guarantee ) Balance of payment guarantee Advance payment guarantee Performance bond guarantee 3.1.1.3 Long Term Loans PEL acquired a long-term loan to finance the import of machinery. Recently PEL has purchased some machinery from China for Digital Energy Meters. The process for long-term loan is explained in following. Preparation OF Feasibility Report: Following points are considered while preparing the feasibility report. Financial Statement Cost of the project. This includes operating assets (land, building, Vehicles, furniture, capital expenditure and means of finance) Project profit and loss account Projected statement of changes in financial position. Financial Analysis Pay back period of total investment Ratio analysis Breakeven analysis Schedules Sales forecast statement Total production cost. Working capital Loan repayment schedule Bank Feasibility Report Bank studies the feasibility report and prepare report and prepare its own feasibility report to see where it would be feasible to sanctioned loan to company or not. Offering the Letter: The bank, if it is satisfied with the feasibility report then send offering letter. It has, Amount sanctioned Mark up rate Charge over fixed assets Tenor Installment periodS Interest payment period Acceptance If company accepts the terms, it must respond with this period. Negotiation: Negotiation between bank and company takes place to change certain conditions of offer letter and it acceptable for both parties. A second draft of the offer letter is prepared with changes and signs of bank and CEO OF PAK ELEKTRON LIMITED. Creation of Charges: A charge is created in favor of the bank to secure its loan with following documents affidavit. It is an undertaking by the company that will follow all conditions. Form 10. It contains the particulars of assets against which charge is created. All the above documents are submitted with registrar against whom a Certificate of Registration of Mortgage is issued. Types of charges Exclusive Ranking Pari passu Loan Repayment Schedule: This schedule is prepared to show the mark up principal and total installment value for whole tenure. 3.1.1.4 PRE-Shipment Pre-shipment is the last section of the finance department. The pre-shipment report may be summarized in the following 5 tasks which are as follows: Tender Bidding Acceptance Purchase order Inspection 3.1.2 Leasing Section This section works in order to fulfill the corporate production, personnel and operational needs such as Machineries, Auto Mobiles and office equipments. It enters into the Buying Contracts always with the one who offers best terms and conditions as well as the best Internal Rate of Return to the Company. 3.1.2.1 Direct Leasing In case of auto mobiles, a bank makes the pay order and gives it to the dealer on the behalf of firm. Firm pay the principle plus interest in installment to bank. PEL can do leasing with AL-Baraka bank. They paid approximately 15%interes on them. 3.1.2.2 Indirect or Machinery Leasing Machinery is imported from china and other countries e.g. USA etc. incase of imported machinery PEL has an LC opened by particular bank. The LC issuing bank deals with the exporters bank and makes payment to it. In machinery dealing the import department of the company is involved. Import department informs finance that they do not have enough funds to make a lump sum payment of machinery, and then leasing facility is used. A third bank called the leasing bank (from whom PEL takes leasing facility) makes payment to issuing bank and acquires papers of the machinery. PEL then makes regular lease payments to the leasing bank and finally acquires the papers of the machinery. Leasing bank also sends external auditors to PEL to verify whether the machinery is actually of the value quoted, whether it is in proper condition, durability of the machinery etc. 3.1.2 Working Capital Finance This type of loan is secured against: Pledge Hypothecation 3.1.2.1 Pledge It may be constructive or actual. Constructive pledge is that in which goods are not taken by bank rather keep them in companys good own under its own security. In case of actual pledge, bank holds the possession of goods. Logistics: The logistics department comprises a part of the finance department. It is headed by Mr. M. Hanif and further consists of a senior accounts officer, two junior executives and two accountants. The basic task carried out by the persons working in the logistics section is: daily check on production daily check on stock (materials and finished goods) controlling the production plan for the future control on orders in hand Materials imported by PEL basically remains in bank custody. The bank makes payments for these materials to the foreign suppliers and releases them to PEL as per payments by them. The bank further higher mucaddam companies/clearing agents to watch over and monitor these materials. The materials are generally store in PEL premises. Material requirement for appliances and power good manufacturing are different hence their requisition are also different. PEL uses cash financing and various other credit facility provided by the bank. Raw materials are imported using the different financing facilities. Materials are then use to make finished goods. The materials when enter the production cycle a term as work-in-process (WIP). WIP is hypothecated and loans taken against it. Then a portion of finished goods produced are further pledged and payments for raw materials are made through it. The whole procedure must be carried out in a timely way with correct information reaching at the right time from factory to material section, so that materials may be requested and obtained at the right time without delay. 3.1.2.2 Hypothecation Of Stock In this the finance is given on work in process goods. 3.1.3 Budgeting Section Getting started from the first day after formal introduction of staff, MR. Masood Tahir, Manager Finance PEL assigned task to Mr. Amer Khawaja (Manager Budgeting) and Sheikh Zaigham Ali (Finance Executive) Finance Budgeting section of my supervision. Forecasting for next year He told me management prepared Sales plan Production plan Material purchase plan Direct labor F.O.H ( factory overhead) Selling expense /administrative expense Other income Financial cost Mr. Zaigham told me PEL has two Divisions 1st Power Division, which deals in the manufacturing of Distribution Transformers Power Transformer Power Project Electric meters Switch gears 2nd Appliances Division includes production of Refrigerators, Deep freezer, Micro-wave Ovens, Splits AC. Trading items (Imported goods) water dispensor, washing machine, window AC, T .V, Generator. Sales Plan Sales plan made by marketing department for appliance and power division. Forecasting Base on last five year sales which is approved by marketing G.M. Types of Sales Export sales ( Afghanistan , India) C.M.D ( Consumer marketing department e.g Govt employees ) Corporate sales ( Institutional e.g hospitals , colleges etc ) Private sales ( for bankers , G.M reference 50% discount ) Metro / Makro sales Production Plan Production plan made model wise for refrigerator, split AC, microwave oven and deep freezer. Material Purchase Plan For material purchase PEL open L/C. Direct Labour: Decide labor quantity required. Labor rate decided. Other Income Scrap sales B pair goods Financial Cost mark -up on borrowing demrage cost ( pay extra amount after exceeding the shipment days ) The beginning of every year with the help of forecasts and then latterly throughout the year they compare it with the actual transactions of these two divisions. I did Afterwards, he showed me the budgets of both divisions which are prepared at some price and cost calculations of Transformers for him and I also did different ratio analysis based on last year results. Then, I was assigned to compare the production budget of refrigerator section of the production department with the actual results yet achieved which I performed and show to him the variances till date. 3.2 Problems Encountered There was no such problem but at same time it was very confusing because they mostly prefer to tell orally rather to practical work that make us ambiguous in some manner when we want to learn more and more. 3.3 Accomplishment we were keen to know about different section of finance department specially in LC opening (letter of credit) how to get loan from banks and why made pledges. We frequently analyses the Lc. 3.4 How Experience Impact On My Career During my internship I learned lot of knowledge that is helpful in my future planning and future career. I learned how to interact with senior management and get their experience that is helpful in my career. Due to my internship habit of regularity and punctuality. 3.5 Knowledge Acquired I had chance of acquiring a lot of new knowledge because it was my first professional experience of working real world of financial brainstorming. It was great experience that how plans and decisions are made executed. It elaborate that how risk involve in each step of decision making and how efficiently management cope up themselves with their competenciese. Conclusion In the nutshell, I want to bring some new idea that PEL should initiate some social benefit programs and try build their Goodwill by participating in the society. I found that the people while purchasing for a certain item take great i

Friday, October 25, 2019

Soliloquy Essay - Theatre and Language in the Soliloquies of Shakespear

Theatre and Language in the Soliloquies of Hamlet  Ã‚      The first Folio is prefaced with an address to the reader to "Read him again and again". In terms of words and action, Hamlet is the most self conscious play about its own theatricality. Words and actions throughout the play are inextricably linked, as is the notion of "playing" a part. From the outset of the play we see evidence of the external show compared with the underlying reality. In Act One, Hamlet's speech to Gertrude (Nay seems...etc) shows us the Prince talking about actions that a man "might play" and also about what is "inside" him which "passes show". (NB "Action" in Elizabethan definition meant "acting") Throughout the play we see inner reality beneath the surface performances of not only Hamlet, but other characters, too. Hamlet has only "one-liners" at the beginning of the play until we hear his first soliloquy, which is an attempt to look at "that within, which passes show". The soliloquies create a bond between the character and the audience and were a dramatic convention inherited from Greek drama. By the time of Shakespeare they had moved away from commentaries on the plot and events of the play and had become illustrative of the inner thoughts of the character. In the soliloquy the character tells the truth as he perceives it, although "truth" is subjective and can have different meanings for different characters. In Hamlet we have seven soliloquies, five major and two smaller ones, and Hamlet's character is revealed through them as the play progresses.    Hazlitt - "This is that Hamlet the Dane...whom we remember...but all whose thoughts we know as well as we know our own..Reality is in the reader's mind..It is we who are Ham... ...so to the grave. Hamlet describes himself as "Crawling between earth and heaven". Shakespeare's audience would have had a physical picture of this before them, which added great weight to the imagery of his text, as of course would the scuffle over Ophelia's corpse. At the end of the play Hamlet stops musing and the language becomes very direct and simple, "there is a divinity.." "the readiness is all". In the final scene Hamlet "acts" in all senses of the word, and "theatre" takes over. The final speeches are terse and contain references to the theatricality of the occasion. he refers to the "mutes" (extras on stage) and the "audience to this act". Fortinbras commands him to be "carried to the stage", perhaps a last comment on a play which is characterised so much as actors playing to actors in a kind of Chinese box puzzle of outward show and inner secrets.   

Thursday, October 24, 2019

Mary Shelley’s Frankenstein Essay

   Frankenstein is a book about man’s thirst for knowledge, about the way he is not satisfied unless he knows all the wonders of the world. In many cases, this can lead to the destruction of a man’s soul, as it did to Victor Frankenstein. His quest to learn the secrets of heaven and earth ended in disaster. The monster was the embodiment of evil, bringing death and destruction wherever it laid foot. It brought death to Frankenstein’s family, in a pure quest for revenge. Symbolic of most evil, the monster was manmade. In many ways Mary Shelley’s life can be compared to that of Victor Frankenstein’s. Mary must have felt that wherever she went, evil followed, as those closest to her were snatched away. She portrayed this in Frankenstein as Victor’s family was destroyed by the monster, symbolic of the evil she felt followed her. Mary’s marriage is also represented in Frankenstein. Mary’s marriage to Percy Shelley was the happiest time of her life before he was killed. In the same way, Victor’s marriage to Elizabeth was the only joy he had felt in a long time, when just as suddenly she was murdered by the monster, again symbolising the evil that Mary felt killed her husband. Mary also describes very vividly the pain that Victor felt, leading us to believe that she must have felt the same pain and agony. She reveals this in many situations such as the quotes, ‘the overflowing misery I now felt, and the excess of agitation that I endured rendered me incapable of any exertion’ and, ‘a fiend had snatched from me every chance of future happiness; no creature had ever been so miserable as I was’. The ending of the story was that the death of Victor Frankenstein led the monster to believe that his work was done, and so the monster burned himself to death. The creation had ironically led to the death of the creator. Mary believed that in the event of a man’s demise, the evil inside him dies as well. Frankenstein contains a sad ending, with the destruction of a whole family due to a man’s insatiable quest for knowledge. Mary’s life also consisted of a sad ending, in which she was never as happy as she was when with her husband. She died a lonely death, without her loved ones surrounding her, the same fate shared by Victor Frankenstein. The monster in Frankenstein can be compared to the beast in Lord of the Flies. There are both similarities and differences. In both novels, the idea of a monster/beast represents the pure manifestation of evil. Mutually they lead to the destruction and death of those around them. They are equally spawned from the mind and hands of humans. They both originally spring from the minds of humans. To explain, in Lord of the Flies is the imagination of the boys representing evil, and in Frankenstein it is Victor’s wild imagination and thirst for intellect that leads to the creation of the monster. However, this can also be viewed as a particular dissimilarity. In Frankenstein, the monster is bodily real and physically inflicts harm on Victor’s family. However in Lord of the Flies the beast is just as deadly and evil, but is inside the children’s minds. William Golding was born in Cornwall in 1911. His family was progressive and it was the first source of influence for Golding’s talent. He studied physics and English literature at Marlboro and Oxford University of England. From the first years of his life, he faced the atrocities of war. Fuelled with stories his parents related to him about the first war, he took part in the second great war by joining the British Navy at 1940. After the war, William became a teacher at a boys school in Salisbury. Here, he started to act as a writer. He observed many children in their natural environment, and must have witnessed the negative side of a child’s nature countless number of times. This led him to write Lord Of The Flies which was his first published book. William Golding lived through the two biggest wars in history. During his time in the Navy, he had a constant reminder of the evil and brutality in the hearts of men. He saw countless lives lost around him, some belonging to his friends. It had been revealed to him that the pure evil inside a man can start world wars. This, along with his teaching experiences, was his incentive to write Lord Of The Flies. After surviving the war, he saw during his teaching that children were not bereft of evil either. Combining these two topics he wrote Lord Of The Flies, the conflict between humanity’s innate barbarism and the civilizing influence of reason. In the book, he portrays Jack as the embodiment of evil. It is Jack’s thirst for power that causes the breakdown of civilisation. In this way, Jack can be compared to Hitler. Jack did not want to stop murdering until the whole of Ralph’s group were killed. In the same way, Hitler did not want to stop until the world was rid of Jews. Jack’s tribe wore face paint whereas Hitler and the Nazis wore the sign of the Swastika on their arms. Jack is aided in his quest of destruction by Roger, who can be compared to the Nazis. Roger also represents pure evil and wrongness, moreso even than Jack. He derived sadistic pleasure from torturing pigs and the other boys on the island. Similarly, the Nazis tortured the Jews from which they obtained a sick sense of fulfilment. Roger is one of Jack’s most loyal helpers, and gladly carries out his orders, in the same manner the Nazis obeyed Hitler. The ending of the novel can be interpreted in two different ways. The first would be to interpret that William Golding does actually have a positive outlook on life and believes that the end of life will be a happy one. This can be portrayed as the naval officer who has come to end the evil and escape the boys from the clutches of death, and thus the arrival of authority seems like a happy and ironic ending. However if one digs deeper it is just a continuation from one war to another. Once all the boys get on the Navy cruiser, they’ll most likely just be subjected to more battle and fighting, this time on a worldwide level, due to the war taking place in the outside world. To conclude, the common theme in both novels was the evil in man. Both authors had their own experiences that led them to believe that evil resides amongst all of us. They both took their experiences and portrayed them in novels filled with symbolism. Mary Shelley believed that evil is constantly around us, and that no-one can escape. She believed that man has an evil inside of him so powerful that it can lead to the destruction of his own soul. William Golding’s understanding was that every man is born with evil inside him. He didn’t believe in man’s innocence after the second world war. He found that even children are not innocent, saying, ‘No one is innocent until the society and the way of his life make him to pretend that he’s innocent. But sometimes, when a man is facing a difficult situation then he will probably show his other nature, the dark and guilty nature. ‘ Shyam Kanabar Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Mary Shelley section.

Wednesday, October 23, 2019

Network Design Essay

The objective at hand was to build a network from the ground up. This was accomplished by breaking down all of the sections and building upon all previous assignments. This was a good course as I learned a lot about all of the different sections of building a network. The pros are now I know how to build a network on the design side from the ground up. I learned quite a bit about using a lot of the technologies associated with networking and it allowed me to learn quite a few new concepts. Some of the downfalls about this course and what I have learned are I did not feel I accomplished much as there is no hands on training associated with the course. I do not feel like concepts and design ideas are a great resource to actually learn how to use any of the systems but they do give a pretty good idea. Cabling SpecificationsEthernet is a Local Area Network (LAN) technology with a transmission rate of 10 Mbps and has a typical star topology. Computers and devices must wait-and-listen for transmission time on the network as only one device can transmit at any one time. In order to operate with this network strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple Access with Collision Detection). Each device on the network listens for the network to be clear before transmitting data. If more than one computer or device transmits data at the same time, then collisions occur. Once collisions are detected, all devices stop transmitting for a period of time until one of the devices senses the line is free and will then gain control of the line to transmit its data. Receiving devices just sit there waiting and listening for transmissions that are meant for them, which are determined by an IP (Internet Protocol) address. The main advantage to Ethernet is it is one of the cheapest networks to put into service. Compared to other hardware for Token Ring, Ethernet equipment such as hubs, switches, network interface cards, and cable (Cat5 common) is inexpensive. The main disadvantage to Ethernet is related to the collisions that occur on the network. Even though Ethernet cable (Cat5) is fairly inexpensive, it can become a cost issue if designing a large network as each device or computer requires its own cable connection to the central hub. Another disadvantage is distance limitation for node connections. The longest connection that can occur within an Ethernet network without a repeater is 100 meters. Today’s Ethernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the most part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) specification for Ethernet is 802.3 with three-part names designating the different types. For example, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps. Token RingToken was developed by IBM as an alternative to Ethernet. The network is physically wired in star topology, but is arranged in a logical ring. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is used. Access to the network is controlled by possession of a token that is passed around the ring from computer to computer as data can only travel in one direction at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to the transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds: 4 Mbps and 16 Mbps. The main advantage to Token Ring is there are never any collisions within the network, which makes it a highly reliable solution for high-traffic networks. The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware. FDDIFDDI (Fiber-Distributed Data Interface) is an architecture designed for high-speed backbones that operate at 100 Mbps, which are used to connect and extend LANs. A ring topology is used with two fiber optic cable rings. It  passes a token on both rings and in opposite directions. The specification for FDDI is designated by the American National Standards Institute as ANSI X3T9.5. The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, data is rerouted in the opposite direction using the other ring. It is also considered reliable because it uses a token-passing strategy. The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings. WirelessLocal Area Network (LAN) TopologiesA mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device being connected to every other device. The Internet uses a mesh topology to operate efficiently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive. A bus topology is a multipoint topology that entails each device being connected to a common link or path. The common link can be thought of as the backbone to the network. All devices typically connect to the backbone with a T-connector and coax cable. The main advantages of a bus topology are that it is easy to install and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a problem with the one backbone cable, then the entire network will no longer have the ability to communicate.  These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable short can cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Another disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal can travel down that cable. A ring topology means that each device is connected in a ring, or daisy-chain fashion, one after another. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device. The main advantage of a ring topology is that it is easy to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring. The star topology has each device in the network connected to a central device called a hub, which can actually be a hub or switch. All traffic must pass through the hub in order to communicate with any other device on the network. There is no direct communication between devices like in a mesh topology. One advantage to a star topology is any failure to one cable or device connected to the hub will not bring the entire network down. Repairs can be done to individual nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices can be added to the network without disrupting any of the current users. All that is required is an additional cable run from the device to the hub. One disadvantage includes cable costs because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.  Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network. Wide Area Network (WAN) DesignA WAN, also known as a Wide Area Network, is an essential part to bigger corporate networks most government networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running as one big network over a big geographical area. Although a WAN could cover very small distances, most WANs cover much larger geographical areas such as a country or possibly even the world. The largest WAN today would technically be the internet or the World Wide Web. The internet is, in short, one giant WAN because it consists of many smaller LANs and servers. Most WANs can cover a fairly large geographical area, but some, such as the World Wide Web can cover the globe. The United States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest ways to be able to do so. To be able to get on the internet, a subscriber must go through an ISP (Internet Service Provider) and they will give the subscriber access to the internet for a certain price every month. There are different ways to get access to the internet depending on the geographical location in which you live. A subscriber can go through dial up, which is one of the slowest methods, but it is also one of the most common. There is also DSL (Digital Subscriber Line) through most phone companies if they have access in the area and cable which is usually one of the fastest and most expensive methods to access the internet. The last common method is using a satellite to obtain access. This is usually the most expensive ways to access the internet because the equipment usually needs to be bought. When talking about telephone lines, we start getting into analog versus digital signals and degradation over longer distances. A telephone system works on analog signals. These work by a computer transmitting a digital  signal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and later being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a filter of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals. Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public systems such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking much faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming much more common. When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is defined as “latency is a measure of how fast a network is running. The term refers to the time elapsed between the sending of a message to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well. At the user level, latency issues may come from software malfunctions; at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.”Dos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These types of attacks are usually by hackers or someone who does not want others to access a certain service. There was a recent DoS threat on the CNN webpage as some hackers wanted CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services. There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is instead of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a simple fix to this problem is to defragment a hard drive. This can tremendously speed up a PC, because the files will be closer together and easier and quicker to access. On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of information and check how much time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line. In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and backup all of the data on the network as well, but this was an example of a crude network. Most companies also a very repetitious and redundant with their WANs. This is because they do not want a central failure point to bring the entire company to itÂ’s knees. There are usually multiple switches that can tie the  entire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason redundancy in this situation makes more than enough sense. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to transfer data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic. Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual Private Network). VPN technology is already built in to most operating systems and is very easy to implement. With bigger environments and corporations, a consideration for concentrated VPN hardware should be in place because of the simultaneous users and stress on the servers. There are a few different types of VPN including IPsec, PPTP and SSL. Once the connection from remote access has been made, you need to make sure the files are readily accessible for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. There  are other ways to allow access as well. Using remote desktop connection, the user has the ability to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. Network Remote AccessMost companies need to be able to access their work from many locations, including home and while traveling. The solution that allows them to access the network is one of two ways to access their network. The first is through a VPN (virtual private network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection; this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware. The definition from whatis.com about a VPN is “ virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization’s network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling  Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a â€Å"tunnel† that cannot be â€Å"entered† by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.”A VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the world with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of comfortable solutions, such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download the document. Network Business ApplicationsA second way to access oneÂ’s computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss. The explanation between these two pieces of technology is “with dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated. ”There are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to set  up and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone jack and they should be able to log in. The disadvantage of this is depending on where the user is long distance charges may apply and it could rank up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run. There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party support companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the headache that VPN’s can give due to different errors. There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up system because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companyÂ’s network through a VPN. Through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPN’s can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access. All in all, there are two very cost effective solutions at a companyÂ’s finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not need  to set up multiple accounts per user, or if they would rather have a better solution and save more money down the road. The choice also depends on the amount of users logging in at any given moment. Backup and Disaster RecoverySecurity, back ups and disaster recovery are all important very parts of all networks in today’s world. The problem with today is information on how to hack, destroy and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least have access to the Internet in the world, which is about 25% of the world’s population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the user’s side. There are other things that happen besides people trying to maliciously harm a user’s files and data. Accidents can happen and destroy data as well. There could be many things that can harm a user’s data such as a fire, earthquake, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings). There are other ways to store a user’s data as well. One way is to make a physical copy of everything needed on CD’s, DVD’s, Flash Drive or some other type of media and store it at a friend’s house or some other person’s house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be restored. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for redundancy which allows the customer more safety and easier access to all of their files. One of the first steps to a business that wishes to be very secure in all  that they do is to set up a backup and disaster recovery plan to start it all off. Like I stated earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies. They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can restore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com “the first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probability and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact. So in this company’s risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.”Another big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system. A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite a  bit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly. Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be broken in to. There are people out there that can be hired to try and break into a companies network. They get paid and let the company know what needs to be fixed so others can not break into it as well. In conclusion, a company can be nothing or brought to it’s knees with out it’s network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way. References About, Inc. (2004). Network topologies : bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http://compnetworking.about.com /library/weekly/aa041601a.htmBrain, M. (2004). How stuff works : how wifi works. Retrieved October 12, 2004,from http://computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp://www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp://www.pcworld.idg.com.au/index.php/id;988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtual Private Network. (n.d.).retrieved May 11, 2008, fromhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.html#VPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp://technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http://www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http://www.internetworldstats.com/stats.htm

Tuesday, October 22, 2019

The Cid

The Cid The Infants of CarriÂÆ' ³n and many other noble of all the kingdoms of Spain arrived at Valencia. The Cid did much honor to them. In individual it distinguished to his futures to sons-in-laws, the Infants. He sent that Pedro Bermudez and Muno Gustioz took care of and took care of the Infants personally.The weddings were celebrated in the great room of the palace. Throughout carpets, silk and purple were seen. The hour arrived and the horsemen of the Cid joined themselves there with great haste. The Infants inclined before the Cid and Do6na Jimena. Pondering the Cid said " Since we must do it, why we are it taking?" It ordered to Alvar Fanez that began the rite and that it gave to its daughters with its own hand. All to the church went later of Santa Maria where Don JerÂÆ' ³nimo, the bishop, gave its blessing.The Cid and his, to celebrate the event, made a great sample of their skill with the arms.Espaà ±ol: El Cid. Franà §ais : El Cid.Matches were made in a near sandy ground and, on the following day before eating, the horsemen broke seven wooden castles in the field.At the end of the fifteen days of celebration, the Cid gave rich gifts to all the present horsemen and these returned to their rich kingdoms and contentments. The Infants of CarriÂÆ' ³n remained to live in Valencia with their women and the Cid.

Monday, October 21, 2019

The Economic System of The Vikings

The Economic System of The Vikings Over the 300 years of the Viking Age, and with the expansion of the Norse landnm (new land settlements), the economic structure of the communities changed. In 800 AD, a well-off farmstead in Norway would have been primarily pastoral, based on the raising of cattle, pigs, and goats. The combination worked well in the homelands, and for a time in southern Iceland and the Faroe Islands. Livestock as Trade Goods In Greenland, pigs and then cattle were soon outnumbered by goats as conditions changed and the weather became harsher. Local birds, fish, and mammals became supplemental to the Viking subsistence, but also to the production of trade goods, on which the Greenlanders survived. Commodities to Currency By the 12th-13th centuries AD, cod fishing, falconry, sea mammal oil, soapstone and walrus ivory had become intense commercial efforts, driven by the need to pay taxes to kings and tithes to the church and traded throughout northern Europe. A centralized government in the Scandinavian countries increased the development of trading places and towns, and these commodities became a currency which could be converted into cash for armies, art, and architecture. Greenlands Norse in particular traded heavily on its walrus ivory resources, in the northern hunting grounds until the bottom fell out of the market, which may have led to the demise of the colony. Sources Barrett, James, et al. 2008 Detecting the medieval cod trade: a new method and first results. Journal of Archaeological Science 35(4):850-861. Commisso, R. G. and D. E. Nelson 2008 Correlation between modern plant d15N values and activity areas of Medieval Norse farms. Journal of Archaeological Science 35(2):492-504. Goodacre, S., et al. 2005 Genetic evidence for a family-based Scandinavian settlement of Shetland and Orkney during the Viking periods. Heredity 95:129–135. Kosiba, Steven B., Robert H. Tykot, and Dan Carlsson 2007 Stable isotopes as indicators of change in the food procurement and food preference of Viking Age and Early Christian populations on Gotland (Sweden). Journal of Anthropological Archaeology 26:394–411. Linderholm, Anna, Charlotte Hedenstiema Jonson, Olle Svensk, and Kerstin Lidà ©n 2008 Diet and status in Birka: stable isotopes and grave goods compared. Antiquity 82:446-461. McGovern, Thomas H., Sophia Perdikaris, Arni Einarsson, and Jane Sidell 2006 Coastal connections, local fishing, and sustainable egg harvesting: patterns of Viking Age inland wild resource use in Myvatn district, Northern Iceland. Environmental Archaeology 11(2):187-205. Milner, Nicky, James Barrett, and Jon Welsh 2007 Marine resource intensification in Viking Age Europe: the molluscan evidence from Quoygrew, Orkney. Journal of Archaeological Science 34:1461-1472. Perdikaris, Sophia and Thomas H. McGovern 2006 Cod Fish, Walrus, and Chieftains: Economic intensification in the Norse North Atlantic. Pp. 193-216 in Seeking a Richer Harvest: The Archaeology of Subsistence Intensification, Innovation, and Change, Tina L. Thurston and Christopher T. Fisher, editors. Studies in Human Ecology and Adaptation, volume 3. Springer US: New York. Thurborg, Marit 1988 Regional Economic Structures: An Analysis of the Viking Age Silver Hoards from Oland, Sweden. World Archaeology 20(2):302-324.

Sunday, October 20, 2019

How To Increase Reach With Video Marketing [Podcast]

How To Increase Reach With Video Marketing [Podcast] Video marketing: When you use it to grow your audience, it’s as much a science as it is an art. There are so many platforms, strategies, and networks how do you know where to focus your time, money, and energy for the biggest return? Today we’re talking to Mark Robertson, the co-founder of Little Monster Media, the founder of ReelSEO, and a digital video veteran. He’s going to talk to us about increasing your reach and growing your audience through video marketing. Some of the highlights of the show include: Information about Little Monster Media and what Mark does there. What platforms to focus on for people who are new to video marketing. How brands can build their audiences using YouTube and Facebook Video. How brands can follow the practices of publishers to see success when it comes to advertising and content marketing. Mark gives examples of brands that create compelling content without being â€Å"in your face.† How to know whether video is a medium you should use and harness, as well as stats on how video affects the brain in comparison to how text affects the brain. The importance of testing and measurement when it comes to getting your material in front of the right people. What measurements and technical details to pay attention to in order to succeed with video marketing. Powered by PodcastMotor Actionable Content Marketing powered by By 00:00/00:00 1x 100 > Download file Subscribe on iTunes Leave Review Share Links: Little Monster Media If you liked today’s show, please subscribe on iTunes to The Actionable Content Marketing Podcast! The podcast is also available on SoundCloud, Stitcher, and Google Play. Quotes by Mark: â€Å"I truly believe that every brand should be involved in video marketing or content marketing one way or another.† â€Å"What publishers do really well is understand how to tell a story they understand that engaging with the audience is important.† â€Å"Every brand should try video and it all comes down to strategy, audience, measurement and reiteration.†

Saturday, October 19, 2019

CSR strategy and win-win strategy Essay Example | Topics and Well Written Essays - 1000 words

CSR strategy and win-win strategy - Essay Example nization that invests in the chemical industry, corporate social responsibility is one of the most important factors that influence customer relationship and hence the profitability of the organization. A critical analysis of the organizational strategy will reveal the CSR strategies that Bayer Pharmaceutical Company has deployed and the way it has impacted on its business development strategies. First, the organization has invested in long term customer relationships by ensuring that customers benefit from quality products that the organization produces. Over time, the organization has invested in production of quality plastic materials as one of the CSR strategies to win customer loyalty. For an organization to win the long term loyalty of its customers, it is crucial for the organization to invest in quality products that serve the needs of the customers more satisfactorily (Crane, Palazzo, Spence & Matten, 2014). For a strong win-win approach, the organization needs to establish a symbiotic relationship in which both the customers and the organization have a mutual benefit. Customers are likely to remain loyal to organizations that satisfy their needs and protect quality. As such, the reason why Bayer Pharmaceutical Company has remained profitable is because they have provided quality products to win the loyalty of their customers. Bayer Pharmaceutical Company has used environmental friendly methods to attract customers to their business organization. A strong Corporate social responsibility strategies ensures that the organizational operation zero negative effects of the other stakeholders including the customers, the government and the environment. Since Bayer Pharmaceutical Company is a chemical based company, it releases a number of harmful chemicals that may have negative effects on the environment. However, the company has put enough efforts to ensure that the organization reduces its disposal of harmful chemicals in the environment. For instance, the

Friday, October 18, 2019

The importance of project plan Essay Example | Topics and Well Written Essays - 1750 words

The importance of project plan - Essay Example Planning a project involves the final project and all the support activities that assist in accomplishing the finished work. It also includes all the engineering, acquisition work and the management processes of the project. Any documentation and technical or non technical exchange of knowledge with the contractors also form part of the planning stage. Planning of any project also involves the cost estimates of the tools, facilities, consultancy, labor and interproject coordination that are involved while carrying out the project. Scheduling of a project involves identifying the internal dependencies and other external dependencies with a view of finding out how the sequence of events will follow in the completion of the project. It also involves identifying any constraints so that a project manager is able to give a window for unforeseen events. Scheduling can be done through using the Critical Path Analysis and the Gantt charts. Good and proper administrative work assist also in keeping records which can be used for future reference, they can act as tools for evaluation and a very effective way of communication. Any project manager must be able to do a documentation of the resources that they are using such as the schedule, quality, resources and the cost documentation of the whole project. A schedule document is a document that entails all the activities of the project as they are undertaken, when they should start and when they are expected to end. This information is usually represented in form of networ k diagrams; bar charts and tabular reports. Such kind of charts includes the Critical Path Analysis charts and the Gantt charts (Tinnirello 2000, 42). Cost documentation should also be undertaken to find out the cost effectiveness of a project .It involves documenting the actual expenses against the planned expenses in form of table up to a given point of the project. An S- curve is also normally drawn and it usually shows the differences in the actual expenditure and planned expenditure of the project. Quality documentation is also an important aspect of any project management. It deals with checking the quality of the work whether the work meets the set specifications or the customers set standards. The quality of work is normally reflected in form of diagrams, charts and matrices. The charts show the past and future performances of the work done .Other diagrams that are used include the Pareto, line and scatter graphs and these diagrams are normally show errors as they have occurred. Resource documentation refers to assigning and usage facilities, tools and supplies made .The usage of organizational charts and resource reports are used by the project managers to identify how they are being used. A project manger must be able to allocate and schedule tasks at the same time and where there are more resources than required, then the tasks must be scheduled. Resource leveling is a methodology that is used for rescheduling thus reducing potential conflicts. Quality Standards Quality refers to the ability of a project to conform to the set specifications or whether the project meets the standards set by the customer. Conformance means that control measures in developing a project must be put into place so that

Final refluction Assignment Example | Topics and Well Written Essays - 250 words

Final refluction - Assignment Example Secondly, it is vital to have a deeper understanding and connection between customers, suppliers, and distributors. Moreover, to gain customer confidence and loyalty, marketers should be strategic in that they produce customized goods for their clients and providing specialized services. Thirdly, to have an effective distribution channel means goods get to the customer at the right place and time. Marketers need to have strategic procedures that help select the right intermediaries (Dent, 2011). I liked the course as a whole; the lecturer had sufficient knowledge about the course and was well equipped with the right materials for the course. I also liked the style of teaching where all students were involved and participated. I would like to do more presentations as this helps me gain more confidence. In addition, I would also like the lecturer to organize a trip to one of the organizations that best practice what we learn in class. Finally, I would like to see the behavior of some students changed. Submitting late assignments should be discouraged. Nevertheless, the semester was great and I look forward to having another course with the same

A Comparison Among the Writings of Taylor, Palmer and Emerson Essay

A Comparison Among the Writings of Taylor, Palmer and Emerson - Essay Example It is the classic quandary: if an all-powerful God loved us, why does He allow a man to be harmed by evil? Taylor’s response reconciles God as all-good, man as a moral being, and evil as the result of human choice. Moral depravity is his sinful character, his â€Å"state of mind and heart† that pertains to â€Å"guilt† and â€Å"wrath†. God created man to be good, but at the same time allows man the choice of whether to be obedient to His divine will or to pursue his own selfish interests. Man is saved if he chooses to follow God’s will rather than his own. Sin, therefore, is seen as an integral part of salvation. By giving in to his moral depravity, man creates the evil, not God. However, because he has a choice, man can rise from this moral depravity and choose God, thereby meriting salvation. God did not create the evil, but by allowing man the freedom to choose evil he also afforded man the chance to choose well. This debunks the notion that God could have prevented all sin or at least the present degree of sin. In Taylor’s works, he speaks of God as a personal Father, with a mind and will whose intentions man tries to understand. God provides the opportunity for man to exercise his moral nature, that is, to choose the virtuous over the evil. The interaction between God and man is one of dynamic interaction, with God offering the choice and man taking the volition to make the choice. Palmer was more of a mystical writer. She espoused the experience of holiness as the road to sanctification. Holiness is seen as a mystical union with God. It is only when one abandons his own efforts and surrenders all to God that he gets to experience the faith necessary for him to live a sinless life. Sanctification is obtained when one is united with Christ, bathed in the blood of Christ, because it is only through Him that man can reach God.

Thursday, October 17, 2019

Annotated Bibiography Bibliography Example | Topics and Well Written Essays - 250 words

Bibiography - Annotated Bibliography Example This is a book that gives a succinct discussion of the criminal justice and the imperfection associated with it. Written by experienced criminologist, the books present essays that describe injustices such as wrongful conviction in various nations. The authors also outline a number of recommendations deemed as necessary to stop the trend where the innocent are being punished by the legal systems. Most important, the book gives an elaborate explanation of how exonerated individuals can be compensated. Throughout his essay, the author underscores the value of carrying out the right investigation process before charging suspects of crimes. Janet Roberts & Elizabeth Stanton. (2007, November 25). A Long Road Back After Exoneration, and Justice Is Slow to Make Amends. New York Times (Late Edition (east Coast), p. 1.38. Retrieved November 2, 2011, from ProQuest National Newspapers Core. (Document ID: 1387902671). In their article, Roberts and Stanton present reveal the challenges faced by people who have been released after being charged for crimes they never commuted. Reporting on a case of Vincent Moto, a man released from prisons 9 years after serving for a wrongful conviction. The authors also interviewed a number of people released from prison after DNA test found not guilty. The article further describes that most of the people exonerated from prison lacked compensation and had to contend with moving from one job to another. With more findings from the Innocence project, the article indicates that few people receive compensation after being exonerated. In his work, Lizotte examines the case of criminal sanctioning, which he believes to be characterized by discrimination. He further discusses three forms of discrimination that are found in the sentencing of prisoners. Using data from the Chicago trial, Lizotte reported that many of non-white were more likely to be incarcerated as compared to

Memoirs of a Geisha Essay Example | Topics and Well Written Essays - 1500 words

Memoirs of a Geisha - Essay Example In the latter part of the novel, the setting describes the dawning of the 20th century. Overall, Golden echoed the cultural, social, and political historical events in the East Asia through the memoirs of a typical entertainer. This essay functions as a review of Arthur Golden’s Memoir of a Geisha through an in-depth analysis of the novel’s literary elements and historical explorations on Japanese culture. Around 1600, until the late period of 1700s, geishas were men who used to perform and sang theatrical and artistic presentations.1 They were known then as professional entertainers and disciples of the visual arts. Later on, women entered into the world of geisha and became more prominent entertainers than men. Female geisha apply distinctive make up, wear elaborate hairstyles and fine-looking silk kimonos, and abide by the doctrines of obis and rules of propriety. They live in the abode of whoever bought them and finance their education. Their education and artistic training includes performing tea ceremonies, serving food and beverages, playing music and singing, conversation, and dancing. A geisha community has staffs who manage booking appearances and performances of geishas on private gatherings. In the advent of modernism, geisha has been becoming a remnant of Japan’s old society. Most female Japanese are now interested to and preoccupied by emerging career opportunitie s than becoming heirs of and perpetuating cultural traditions. In writing the Memoirs of a Geisha, beside from his academic studies on Japan’s cultural traditions and arts, Golden crucially used the information he elicited from a legendary geisha. He gathered such personal and historical details to bring a fictional novel into birth. That novel is now considered as a historical fiction because it tells a story of a fictional person from a far flung era, which is entirely

Wednesday, October 16, 2019

Annotated Bibiography Bibliography Example | Topics and Well Written Essays - 250 words

Bibiography - Annotated Bibliography Example This is a book that gives a succinct discussion of the criminal justice and the imperfection associated with it. Written by experienced criminologist, the books present essays that describe injustices such as wrongful conviction in various nations. The authors also outline a number of recommendations deemed as necessary to stop the trend where the innocent are being punished by the legal systems. Most important, the book gives an elaborate explanation of how exonerated individuals can be compensated. Throughout his essay, the author underscores the value of carrying out the right investigation process before charging suspects of crimes. Janet Roberts & Elizabeth Stanton. (2007, November 25). A Long Road Back After Exoneration, and Justice Is Slow to Make Amends. New York Times (Late Edition (east Coast), p. 1.38. Retrieved November 2, 2011, from ProQuest National Newspapers Core. (Document ID: 1387902671). In their article, Roberts and Stanton present reveal the challenges faced by people who have been released after being charged for crimes they never commuted. Reporting on a case of Vincent Moto, a man released from prisons 9 years after serving for a wrongful conviction. The authors also interviewed a number of people released from prison after DNA test found not guilty. The article further describes that most of the people exonerated from prison lacked compensation and had to contend with moving from one job to another. With more findings from the Innocence project, the article indicates that few people receive compensation after being exonerated. In his work, Lizotte examines the case of criminal sanctioning, which he believes to be characterized by discrimination. He further discusses three forms of discrimination that are found in the sentencing of prisoners. Using data from the Chicago trial, Lizotte reported that many of non-white were more likely to be incarcerated as compared to

Monday, October 14, 2019

Risk Management for Dementia Patient

Risk Management for Dementia Patient Company name:   SMART CARE  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Client Name: Mrs   Susan Smith  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Date of risk assessment:   22/2/17 What are the  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   hazards? Who might be harmed and how? What are you already doing? Do you need to do anything else to control this risk? Action by whom? Action by when? Review date Spillages Leaving objects in the walk ways The Dementia clients have mobility problems and may be injured if they trip over objects or slip on spillages. General good housekeeping is carried out. All areas well lit, including stairs. No trailing leads or cables. Staff keeps work areas clear, eg no boxes left in walkways, deliveries stored immediately. Better housekeeping in staff kitchen Needed, e.g. on spills. Arrange for loose carpet tile on second floor to be repaired /replaced. All staff, supervisor to monitor Manager 22/2/17 24/7/17 Impaired mobility Clients with mobility problems need assistance to go to and from treatments, if they don`t get assistance they will be stuck and would not benefit from treatment. Workers that assist clients risk back injuries if they don`t have aids helping them to carry out appropriate lifting and moving the clients. Clients with Dementia and mobility problems can face difficulties in getting in and out from the bed without help and this can make them feel isolated and powerless. Provide step free access like ramps and lifts. Beds that have remote control assistance which helps clients and workers to ensure safe transfers. Have two staff to lift someone from the bed to avoid back strains. Walking sticks and wheelchairs are provided. All beds have bed rails. Maintenance is carried out every three months to ensure rails are properly fitted. Magnetic (automatic) doors for easy access. Clean and smooth flooring. Keep hallways clear without obstructions. Hoists for safe and effective handling and movements of clients Grab rails in bathrooms and corridors Non slip carpets and tiles Report any malfunction in the beds straight away and remove that bed from use. Managers All   staff Cleaners Visitors Contractors Maintenance 31/03/2017 30/06/2017 Memory loss and confusion Clients with Dementia and Parkinson should be kept in safe and familiar environment because if they are in a crowed environment it causes them anxiety, distress and vulnerability. They may wander off and forget how to get back and may be subject to physical and emotional abuse. They may not be able to manage their finance and are subject to financial abuse They may not remember their relatives what means imposters may take advantage of that. Key workers are provided for a sense of familiarity. Maintain the same routine and avoid unnecessary changes. Doors have safety locks. Reception and corridors have CCTV cameras which is accessible to the receptionist. Offering outside activities with the key person. Offer assisting aid device in case of emergencies. Use facial and fingerprint recognition system for close relatives. Offer the assistance of a lawyer to help with advice in regards to finance. Keep pictures of the family members to avoid strangers take advantage of them. All staff Managers Participating organizations 15/03/2017 15/06/2017 Medication All clients in the care home that are on medication, nurses and doctors. If the wrong medication is prescribed than the client can die. The professionals can lose their rights to practice or be sanctioned. Clients with dementia may forget to take their medication or overdose themselves. All clients have medical files checked at admission. All medication is given only according to doctors recommendation. Control medication is signed by two nurses to avoid mistakes. Have a doctor available in the care home. Keep medication in a restricted area. Use of automated medication dispensers will help avoid overdose. Managers Nurses Cares 01/08/2017 01/02/2018 Nutrition All clients in the care home need to be provided with proper food and drinks. If they do not get the proper nutrition they can become sick or even die of starvation and dehydration. Provide a variety of food that are health and nutritious three times a day + two snacks. Water is available all the time. Allow certain clients chose their meal times and arrange for someone to be available to cater for them. Managers All staff 01/03/2017 01/06/2017 Personal Hygiene All clients, staff and visitors are affected if personal hygiene is not maintained because diseases can spread and a lot of people can get sick. Clients with dementia may neglect their personal hygiene because of the confusion and memory loss. Provide cleaning facilities like shower rooms, cleaning products like soap, shampoo and sterilizer gel. Provide PPE equipment for staff like gloves. Change bed linen every day. Provide better quality cleaning products. Ensure more checks on clients are done trough out the day. Managers All staff Clients 31/03/2017 01/07/2017 Violence/Aggression Clients, family and staff could face serious injures if they come in contact with a very aggressive client. Keep clients that have aggressive behavior separated from the rest of the clients and we offer them treatment and a key person that looks after them. Report and record changes on a daily basis to avoid separation on long term. Increase level of support, by employing more staff that can help the aggressive clients. Increasing the activities to stimulate changes in their behavior. All staff Managers Professionals 01/07/2017 01/02/2018 Laundry services The service user and care staff. If the service user`s beds and clothes are not being changed often enough because of incontinence clients can develop rashes and different kinds of illnesses. Staff can be contaminated with diseases if they do not manipulate the soiled laundry in a proper manner. Staff is provided with the correct PPE when providing care for the service user. Bedding is changed as soon as they are soiled and washed as soon as possible at a high temperature to avoid contamination. Water proof sheets are placed under the client to prevent linen getting soiled. Purchase of industrial washing machines would ensure the bedding is washed faster and the cleanliness would be better. All Staff Clients Managers 31/12/17 01/06/18