Thursday, October 10, 2019

Newton Electronics Limited

After three years of development, the company has finally been able to complete research on and development of the new hearing aid and the product, having successfully passed through all statutory and voluntary tests and procedures, is now ready for commercial production. In this regard, the company has three viable options in front of it. These are: 1. Commence commercial production on its own accord. 2. Outsourcing manufacturing and marketing to a third party under a license arrangement. 3. Selling Patent rights to a third party.This reports aims to undertake a holistic financial analysis of these three options and, from a financial management perspective, conclude which option is in the best interests of the company’s shareholders. Results The results of the NPV analysis reveal the following results: Analysis, Additional Considerations & Verdict: The NPV analysis (see appendix) clearly reveals that Option 2 (allowing a third party to manufacture the product and market it un der a license arrangement) is financially the best option as it allows for a greater inflow of cash.This is also in line with the company’s core competencies. The company has been generally geared at research and development and may lack the entrepreneurial skill and expertise when it comes to manufacture and market the product. Moreover, another plus point is that the company would not have to pump in any capital immediately if it chose option 2. Thus, as rational investors, the company would prefer less risk per unit of return. When comparing option 2 with option 1, the company finds itself taking less risks and hence generating more returns.The decision between option 2 and option 3 is a tricky one, although seemingly straightforward. With option 3, the company effectively shifts the whole element of operating risk on the third party, against a guaranteed payment in two equal installments. BPP states that â€Å"this reduces the return but also the risk, as financial manag ement theory contends the return and risk relationship† (2007, pp. 95-98). From a financial risk management point of view, the only risk that the company is then exposed to is the default risk of the third party failing to make a timely payment of the second installment.Here is where the interesting aspect comes in. Although default risk also exists with Option 2, that is, the third party would fail to make timely royalty payments, Rasheed states that â€Å"a licensing arrangement and an outright sale of the patent rights would differ legally as to what recourse the company would have in the case of default. † (2009, pp. -54). From the surface of it, if the third party defaults under a license arrangement to pass on royalty payments, the company could always cancel the license or initiate penalizations on the third party by way of the licensing agreement.Thus, the company can compel the third party, on its own accord, to resume payments or to offer something else in ret urn, maybe an equity stake at attractive levels. However, a default on a sale would be a long drawn out legal battle that would increase the time frame of the proceeds being received altogether, incurring legal costs and making NPV fall. Thus, for the high return and low risk profile and the legal recourse that it offers, option 2 is the best option that the company should undertake.

Wednesday, October 9, 2019

Malicious Code Cyber Attacks

The use of internet and networks have various advantages where companies can increase cost efficiency by sharing resources and crucial data can be shared and backed up on various locations. The network of a company though quite important in modern times is prone to various cyber attacks which target the financial and sensitive sectors of a company. A potential hacker could target the network of a company in various ways if there is a security loophole in the company network. The various cyber attack threats a company faces include cracking, malicious code, back door, sniffer, TCP hijacking, mail bombs and other threats.The nature of such a threat, its effect on the network, problems caused by the attack and the countermeasures available to the company is explained. Cyber Attacks Using Malicious Code The most common type of cyber attacks involves malicious code. A hacker encodes a piece of code using some programming language and attaches an executable file to an email or sends this f ile to potential targets using an internet messenger service. The code usually creates a loophole in the network infrastructure of the company and the hacker can easily access any data or files available on the intranet of the company that is not shared with the general public.The hacker can easily access financial, personal and other sensitive information from the network of the company and misuse it in various ways. The sensitive data may include the industrial secrets of the company, the personal files of employees, financial information regarding the company and marketing policies and plans. When a company is attacked through malicious code, a person would receive an email or instant message requiring the person to open a file which would be executed and embedded in the network infrastructure and the company would face various problems (T., Sachs, Devost, Shaw, & Stroz, 2004). The level of severity of these problems may be minimum or maximum. The hacker would have access to the marketing and financial procedures of the company and could black-mail the company or provide this data to the competitors of the company. Another major problem caused by this attack would be the malfunctioning or stoppage of any crucial software which is necessary for running business operations. Personal information of the employees including names, telephone numbers and addresses would be compromised and would create a personal threat to them as well.The cyber attack could launch a companywide malfunction of hardware and software limiting the operations of the company, as today almost all operations are dependent on computers. The code could change critical information relating to business operations such as input data for various operating processes. The company can stop and prevent these cyber attacks in various ways. The malicious code technique of attack usually involves a file which is transferred through emails, instant messengers, loopholes in the firewall framework and da ta transfers from insecure websites and sources.The attacks can be prevented by filtering content received over the internet through emails and instant messengers. Antivirus, intrusion detection and content filtering programs can be implemented to limit transfer of malicious software or code. The employees of the company should be trained in this regard and should be made aware of the potential dangers of malicious code and the sources it can come from. The firewalls implemented in the company should be tested and audited with test scenarios to guarantee the safety of these firewalls.All backup of data should be kept in safe and secure locations which is not available on the network of the company. When the attack does occur there should be contingency plans available to cope with the effects of this attack and operating procedures should be defined well ahead of time to deal with such threats. Intrusion detection and prevention systems should be implemented at all levels of the net work to increase the safety and security of the network (GFI, 2009). Conclusion Cyber attacks are very common in modern times and there are various types of threats and these methods and types changing with the pace of time.Individuals and companies also need to be updated on the various new methods, techniques and prevention for such attacks. If there is a cyber attack on an individual or a company, it could result in adverse consequences including loss of crucial data and loss of financial resources. To prevent and limit the frequency and probability of these attacks various protection and safeguard tools such as antivirus and intrusion detection should be implemented. References GFI. (2009). Targeted Cyber Attacks. Cary: GFI. T. , P. , Sachs, M. , Devost, M. G. , Shaw, E. , & Stroz, E. (2004). Cyber Adversary Characterization. Burlington: Syngress.

Professional writing assignment Essay Example | Topics and Well Written Essays - 750 words

Professional writing assignment - Essay Example eminars, attributing Occupational Safety and Health Administration (OSHA) programs for the participants (EHS Today, â€Å"2011 Americas Safest Companies†). The discussion henceforth intends to focus on the criteria used by EHS today in order to rate the safety initiatives or programs executed by the companies. With this concern, the recently top rated companies’ profiles will be discussed in the essay which would assist in identifying the appropriate reasons owing to which they were characterized as America’s Safest Companies. Correspondingly, the most important attributes will also be identified, which are quite vital to be considered by a future safety professional. EHS Today focuses on certain specified attributes when rating a company on the basis of their efficiency to preserve safest working environment. On the basis of the mentioned criteria and by considering the nominated companies’ safety operations, EHS Today tends to rate them as American’s Safest Corporation (EHS Today, â€Å"2011 Americas Safest Companies†). The criteria which are majorly followed by EHS can be identified as follows: Buffalo Gap Instrumentation & Electrical Company (BGI&E): BGI&E, in its recent safety measures, had implemented Floor Assistant Safety Team (F.A.S.T) program. It was identified as a kind of mentoring program where every employee is monitored continuously offering them complete scope to identify realistic issues performing regular safety inspections and safety analysis under the supervision of a mentor (EHS Today, â€Å"Buffalo Gap Instrumentation & Electrical Co. Inc is named an America’s Safest Company Winner†). Caterpillar Incorporation: Caterpillar Incorporation is an American construction company. In order to improve its safety measures in respect to its operations, the company had launched four safety initiatives in the year 2011 which are, It has been majorly owing to the efficiency of these initiatives that the company was rated as America’s Safest

Monday, October 7, 2019

MGMT436 U4 DB2 Research Paper Example | Topics and Well Written Essays - 250 words

MGMT436 U4 DB2 - Research Paper Example These structures are mandatory for an organization to retain its market relevance. Additionally, technology provides unique and complex opportunities to change. From the changes experienced in the modern business market, it is an obvious assumption that technology has been a positive influence in organizational change. The market has grown significantly as practices have become more relevant and competitive. This has increased the quality of goods and services available in the market. Most software used in organizational change is based on their ability to develop effective ways to improve business structures. For instance, an organization requires software that determines the most effective marketing structure in regards to cost and consumer preference. In addition, an organization may develop its IT systems to increase their business connectivity (Carnaghan & Klassen, 2010). Technology has been fully responsible for the growth of the modern corporate world. This trend will not change as more companies are embracing the need to consider technology as a tool for change. In addition, the positive influence on companies will be more exceptional as more ways to make technology more influential have been developed (Carnaghan & Klassen,

Sunday, October 6, 2019

Raymond Carver, Analytical paper Essay Example | Topics and Well Written Essays - 1250 words

Raymond Carver, Analytical paper - Essay Example The story tries to explore the notion of different people about love, the uncertainty they face in their love life and the common ideological conflicts they face. In addition, one can see a certain degree of effort from the part of Carver to show the hollowness of the so called ‘true-love’ and its short term nature. The basic ideology the writer tries to express through this story in which nothing happens seems to be that every ‘true love’ contains a certain degree of selfishness as a basic element, and this selfishness haunts every person at varying degrees. In the story, four people sit around a table in an afternoon and start discussion on the topic love while drinking gin. The four people, Terri, her husband Mel, the writer and his wife Laura engage in a discussion on the true meaning of love, though Mel leads the discussion. While Terri and Mel seem to have differences in opinion on the subject, and a greater degree of insecurity too, the other people a ppear strong in their attachment. However, one can see exhibition of selfishness reaching the extent of violence and even killing exhibited by some characters. The first factor that needs to be analyzed seems to be the degree of selfishness expressed by each character. The former love of Terri deserves that place. His love turned a physical obsession with violence. The man loved Terri so much that he even tried to kill her. Terri knows it was love and even now, after marrying Mel, she says ‘I know it was’. As she says it, one can see a rise in the feeling of insecurity faced by Mel and he even strongly argues that true love is spiritual in nature and it has nothing to do with physical. One can see his humble efforts to prove that what Terri got from her first lover was not love. However, Terri seems to possess little idea about the feeling of insecurity her husband faces, or is totally neglecting it, stating again and again that her first lover loved her very much. It s eems from the story that the couple, though sit and drink together, lives in two different poles and have little common consensus. The story makes it clear that though Mel does not like his wife meeting her former lover, she visited him again on his death bed. She accepts the fact that she and Mel spent many days in the fear of that man attacking them, but, even then, she keeps a ‘soft corner’ for him against the wishes of her husband. However, she feels happy, contented, and satisfied in the fact that her husband does not like to talk to his first wife Majorie. She happily explains to others that Mel wishes that Majorie be married again or dies. Thus, the writer succeeds in picturizing how selfishness and obsession are intermingled in the feeling of love. In addition, it shows the female ability to feel for two people at the same time. Terri, based on her personal convenience, jumps from one to another totally ignoring the impact of her activities on the others. Terri even now knows that her first lover loved her and knows very well that Mel loves her. However, she still goes on keeping sentiments for the former lover and yet prefers to live with Mel as it does not involve physical violence. Thus, she adopts a position that is good to no one. Her behavior seems annoying Mel a great deal and that seems to be the reason for his admiration of the narrator’s wife Laura and saying to Laura â€Å"if I did not have Terri, I would fall in love with you†. However, this statement instantly hurts Terri and

Saturday, October 5, 2019

Law for Business Essay Example | Topics and Well Written Essays - 1750 words

Law for Business - Essay Example Either the acceptance of an offer may be a statement of agreement, or, if the offer invites acceptance in this way, a performance of an act requested in the terms of the offer. It is important to note that acceptance is the final and unqualified acceptance and it must be according to the types and the requirements of the offer hence acceptance must exactly match the offer. Other forms of acceptance of an offer may be spoken, written, by action and an acceptance is never acceptance when there is silence and assumption. For example, if one tells a neighbor kid that if the kid mows the offeror’s lawn, the offeror will pay $50.00, and the kid does actually mow the lawn. The act of mowing constitutes the manifestation of the kid’s assent hence constituting an acceptance given the offer presented and the terms upon which it is presented. For a contract based on offer and acceptance to be binding and enforceable by law, the terms must be capable of determination in the same co urts of law in a way that it is clear that the parties assent was given to the same terms of agreement. The terms must be in the position of being able to manifest themselves or be determined determined objectively. They may be written, or sometimes oral, although some kinds of contracts require writing as evidence of the agreement to be enforced in the courts of law. What is an offer? In an offer the offerer decides to make an offer and goes further vto communicate the offer. The offeree is then left with the responsibility of either accepting or rejecting the offer of which they have to communicate the acceptance in the case they decide to accept the offer with the terms around it Fisher v Bell [1961] 1 QB 394. The offerer then decides to receive the acceptance and the contract remains binding. An offer therefore can be defined as definite promise to be bound upon some specific terms, making it be a proposition by one party to another party on fixed terms that are fixed or in a po sition of being fixed. This is with the intention that it will be binding when accepted by the offeree in either of the forms prescribed for acceptance. In fact, a definite offer does not need to be made to a specific person, this is because it can be made to a particular class of persons or the world in general and it would remain binding if all the requirements were adhered. An  offer  is actually an expression of willingness to contract on certain terms, made with the intention that it shall become binding as soon as the person to whom it is addressed, the â€Å"offeree† [G.H. Tretel, The Law of Contract, 10th edn, p.8], accepts it. The â€Å"expression† referred to in the definition of an offer may take different forms, such as a letter, newspaper, fax, email and even conduct, as long as it communicates the basis on which the offeror is prepared to contract. The â€Å"intention† referred to in the definition is objectively judged and only determinable by courts. The English case of Smith v. Hughes (1871) LR 6 QB 597 emphasizes that the important thing is not the party’s real intentions but; how a reasonable person would view the situation making. This makes an offer not to be so specific to an individual. This is mainly due to common sense as each party would not wish to breach his side of the contract, if it would make him or her culpable to damages, it would especially be contrary to the principle of certainty and clarity in

Friday, October 4, 2019

Individual Case Study Analysis Essay Example | Topics and Well Written Essays - 2000 words - 2

Individual Case Study Analysis - Essay Example Such problems arise between foreign exchange workers and local supervisors and organizations, with psychological, and personal value implications. The Assistant Language Teachers (ALTs) from the UK, US and Canada have come into conflict with a supervisor and alienation from the staff at the Soto Board of Education, in the course of their service under the Japan Exchange and Teaching (JET) Program. There are a number of contributory causes on both sides, having to do with the expectations and perceptions of JET participants and those of the supervisor. A lack of understanding and appreciation of cross-cultural differences, failure of group formation, and misconceptions in decision making processes, are sought to be remedied by supervisory support, program modifications, and clarification of expectations, intended to diminish the adverse effects of these circumstances. 2.0 Introduction – The Case Situation Kelly, a Canadian, had been working for six months at the Soto Board of E ducation office in Japan as an Assistance Language Teacher (ALT). She is one of four ALTs, the other three being from the US, the UK, and another from Canada. The main complaint of the four was the breach of their work contracts when the reduction of their vacation leave credits for those days they were ill, which should have instead been properly deducted out of their sick leaves. This event was only the most recent in a progression of other incidents, which generally involve the imposition by the group’s supervisor, Mr. Higashi, of his unilateral decisions on the working conditions and assignments of the four ALTs. Mr. Higashi’s orders were apparently inconsistent with the stipulations of the Contract of English Teaching Engagement under which the ALTs were employed, and were felt by them to be attempts to intimidate them into complying with the more onerous work ethic customary of the typical Japanese worker (Lewicki, et al., 2003). 3.0 Relevant decision and issues The relevant decision to be made is: What steps should upper management take to relieve the periodic tensions between ALTs and their Japanese supervisor and create greater symbiosis between them, in order to achieve the goals of the JET? The relevant issues to be discussed are the following: (1) Personal values and culture; and (2) Psychology of the JET supervisor (the decision maker) 4.0 Analysis 4.1 Requisite to comply with the JET contract At the outset, it should be clarified that Mr. Higashi may not arbitrarily assign absences due to illnesses to vacation leave credits because (a) Article 12 Section 1 of the contract defines the sick leave as the holiday properly for the purpose of illness or injury; and (b) vacation leave may only be granted upon the election of the JET participant (in this case, the ALTs); it should be applied for by the participant at least three days in advance, pursuant to Article 11 Section 2. Nowhere in the contract does it state that a supervisor may un ilaterally apply vacation leaves at his own discretion. The ALTs must therefore be