Premium Essay

Aes Business Case Answer

In:

Submitted By maksvin
Words 337
Pages 2
AES Corporation historically used a very simple method that was used for all projects being examined, regardless of geographical location. The method worked well when implemented in the U.S., but when it began to be used to evaluate international projects, it was giving the company false NPV values. This evaluation method also failed to take into account increased WACC, currency risk, political risk, and sovereign risk, which resulted in projects that began to fail in the early 2000’s. By counting to use this flawed evaluation method the company destroyed its stock price and market capitalization, losing millions in stockholders equity in the process. This debt structure caused significant currency risk for both AES and it subsidiaries. Exhibit 6 shows that debt was denominated in USD for the subsidiaries, while they were bringing in revenues in foreign currencies. AES also lost cash flows when depreciation occurred since the money made by its subsidiaries was worth far less after devaluation of foreign currencies. Venerus evaluation method was a vast upgrade to what AES had been using in the past. His method took into account many more factors than the previous model. It allowed for the company to create a WACC for each project. Which allowed AES to capture the country-specific risks for each foreign market. This was a good idea because it allowed AES to also consider the market risk of each country. It does a much more adequate job in predicting realistic NPV of projects. Since we’re given the cash flows in exhibit 12 it is possible to compare the NPV for the projects. To calculate the cash flows at the original 12% discount rate, the 23.1% for Pakistan, and 6.45% for the U.S. it is easy to compare the differences in NPV. The original 12% discount would yield a NPV of $505.51 million, the Pakistan 23.1% discount rate would

Similar Documents

Premium Essay

Should a Computer Grade Your Essays?

...Case Study 11: Should a Computer Grade Your Essays? The case study discusses the April 2013 launch of Harvard/MIT’s joint venture MOOC (massively open online course) essay scoring program, utilizing AI (artificial intelligence) technology to grade educational essays and short answers, with immediate feedback and ability to revise, resubmit, and improve grades. In 2012, a group of colleagues, Les Perleman, Mark Shermis, and Ben Hamner, introduced over 16,000, K7-12 standardized school tests to the AES (automated essay scoring software) to compare results of hand-scored essays; the results appeared to produce a more accurate grade, however, no official statistical studies were performed to accurately maintain the claim. Essay Raters (e-Rater), developed by the Educational Testing Service (ETS), allowed Perelman to access, and analyze the technology. ETS uses vocabulary and content to score criteria, such as essay length, conjunctive adverb usage, and large word usage, in combination with paper and word length, words per sentence, and word complexity. The downside is the programs’ inability to differentiate factual from nonfactual information, intent, or meaning. Some educators banned to form the group, Professionals Against Machine Scoring of Student Essays in High-Stakes Assessment; they are concerned educators will reduce writing standards to conform to software constraints. Laudon & Laudon further discuss the probability of lost jobs due to computers taking the...

Words: 1500 - Pages: 6

Free Essay

Aes Case Study

...GRADUATE SCHOOL OF BUSINESS STANFORD UNIVERSITY S HR-3 FEBRUARY 1997 HUMAN RESOURCES AT THE AES CORPORATION: THE CASE OF THE MISSING DEPARTMENT Dennis Bakke, the CEO of AES, a company that develops, builds and operates electric power plants, sat in his office late in 1996 and thought about the question that was perennially posed to him: could AES, soon to have some 25,000 people located literally all over the world following a recent purchase of power plants in Kazakhstan, continue to operate with virtually no staff functions and, specifically, without any human resource staff anywhere in the corporation? The absence of centralized staff — or, for that matter, much staff at all — had been one of the themes guiding the design and operation of the corporation since its founding. The company, in addition to having no personnel department, had no public relations, legal, environmental, or strategic planning departments. Its chief financial officer, Barry Sharp, saw his job not so much as running a centralized finance function but rather as helping all the AES employees as they made important decisions about financing and investments in a very capital intensive business. But the company was becoming much larger and increasingly geographically dispersed. Perhaps those early decisions needed to be rethought. Could what worked for so long continue to work as the corporation grew and operated increasingly on a global basis? Could the advantages of flexibility and having virtually...

Words: 10340 - Pages: 42

Premium Essay

Corporate Finance Hw

...Portland State University School of Business Administration FIN 565: Cases in Corporate Finance Case Descriptions and Suggestions Fall 2010 As you review the case descriptions and read the cases, develop a plan for your analysis. The case report and presentation should include, but not be limited to, the suggested questions I have provided. Do not submit or present the case a simply a numbered series of answers to the questions. The case analysis must be a narrative report that includes the information needed to answer the questions. Financial Statement Analysis Identify the Industry – 2007 Substantive Issues This case provides financial statement data for 10 companies from 10 different industries from Thomson Banker One – Analytics. Using knowledge of the industries’ financial characteristics and financial rations, you are asked to match each of the 10 financial statement data sets to an appropriate industry. You are provided with common-sized income statements (all items scaled by revenues), common-sized balance sheets (all items scaled by total assets) and selected financial ratios. All data are averaged over three years – 2004 – 2006 – to smooth out one-time items. Pedagogical Objectives This case illustrates the difficulty of identifying a company in an industry since do few companies operate in a single homogeneous industry. It also serves to get each class member engaged with team members in an effort to determine the strengths of each member...

Words: 2525 - Pages: 11

Free Essay

Syllabus

...Analysis of Business Issues, Writing In the Disciplines (WID) BADM 2003W (95440): BADM_2003W.SEC.12 Tuesday Combined Class: SEMESTER: Spring 2014 LOCATION & TIME: Duques 353, Tuesday 11:10 AM-12:25 PM PROFESSOR: Dr. Bret Crane Department of Management Office: Funger Suite 315N Email: bretdcrane@gwu.edu Office Hours: Tuesdays 1:00-2 PM or by appointment TEACHING ASSISTANTS: |Erin Vander Wall | | |Leigha McReynolds | | |Mark De Cicco | | |Tess Strumwasser | | |Daniel Berkhout  | | |Sam Yates | | |Vicki Brown | | | ...

Words: 4096 - Pages: 17

Free Essay

Uh Ya Boy Is Cool

...Analysis of Business Issues, Writing In the Disciplines (WID) BADM 2003W (93752): BADM_2003W.SEC.11 Monday Combined Class: SEMESTER: Spring 2014 LOCATION & TIME: Funger 209, Monday 2:20 PM-3:35 PM PROFESSOR: Dr. Bret Crane Department of Management Office: Funger Suite 315N Email: bretdcrane@gwu.edu Office Hours: Tuesdays 1:00-2 PM or by appointment TEACHING ASSISTANTS & WRITING LABS: | | | |Section # |Begin |End |Day |TA |Email | |30 |08:00 AM |09:15 AM |Wed |Mark De Cicco |mdecicco@gwmail.gwu.edu | |31 |09:25 AM |10:40 AM |Wed |Mark De Cicco |mdecicco@gwmail.gwu.edu | |32 |10:50 AM |12:05 PM |Wed |Tess Strumwasser |tstrumwa@gwu.edu | |33 |12:15 PM |01:30 PM |Wed |Tess Strumwasser |tstrumwa@gwu.edu | |34 |01:40 PM |02:55 PM |Wed |Daniel Berkhout |berkhout@gwmail.gwu.edu | |35 |03:05 PM |04:20 PM |Wed |Daniel Berkhout |berkhout@gwmail.gwu.edu | |36 |04:30...

Words: 4144 - Pages: 17

Premium Essay

Production and 0perations Management

...UNIVERSITY SCHOOL OF BUSINESS DEPARTMENT OF EDUCATION COURSE DESCRIPTION: The content of this course is intended as introduction to the field of production and operations management. Production Operation Management [POM] techniques were initially developed for manufacturing organizations. However, as time went on, non-manufacturing firms have to contend with problems similar to those encountered in the manufacturing sector. Consequently, the scope of POM has expanded to cover both manufacturing and service organizations. It includes topics such as productivity, competitiveness, strategy, forecasting, quality management, product and service design etc. Learning objectives 1. To understand and comprehend the production and operations management terminology. 2. To develop certain quantitative skills, competencies, and points of view needed by organizations involved in the Input, Transformation and Output process. 3. To be able to adequately produce written assignment reports on operations management processes. CLASS CONDUCT All reports of assignments should be submitted on time. Class participation includes attendance, in-class assignments and participating in class discussions. Late reports of assignments and/or Late-homework will not be accepted. Lateness and absences will affect your grade. RECOMMENDED REFERENCES ✓ Books on Production/Operations Management (recent editions) STUDENT EVALUATION: • Case study presentation...

Words: 646 - Pages: 3

Free Essay

Csec 610 Final Exam

...University of Maryland University College Final Exam Question 1 a) If I were to engineer a product that could be used to spy on users, the first thing I would install would be a rootkit. A rootkit is a clandestine kind of software that is designed to conceal that fact that an operating system has been compromised. They ultimately allow viruses and malware to hide from usual methods of detection, and permits continued privileged access to a computer. Rootkits allow for full control over a system, which means that existing software can be modified including detection software. Rootkit detection is difficult because a rootkit is activated before the operating system boots up and is able to subvert the software intended to find it (Vacca, 2013, pp. 53-54). The next step would then be to install spyware and use the rootkit to disguise it as necessary files that anti-spyware software will overlook. Once a user purchases this product and it is connected, off-site agents will be able to start collecting files and data and have the ability to access and control the infected devices. b) As a technology procurer for an organization, it is very important to do your research on your vendors. The legitimacy of the vendor needs to be verified and their workforce, production lines and supply chains need to be checked to ensure they have appropriate security measures and monitoring in place to safeguard against malicious activity. A security vulnerabilities assessment needs to be...

Words: 5301 - Pages: 22

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Premium Essay

Windows Fundamentals

...server stores passwords in the database for three days. Answer: A Explanation: QUESTION NO: 2 In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). A. Subnetting B. NAT C. Firewall D. NAC E. VPN Answer: C,E Explanation: QUESTION NO: 3 Which of the following is the BEST approach to perform risk mitigation of user access control rights? A. Conduct surveys and rank the results. B. Perform routine user permission reviews. C. Implement periodic vulnerability scanning. D. Disable user accounts that have not been used within the last two weeks. Answer: B Explanation: 2 QUESTION NO: 4 Which of the following devices is BEST suited for servers that need to store private keys? A. Hardware security module B. Hardened network firewall C. Solid state disk drive D. Hardened host firewall Answer: A Explanation: QUESTION NO: 5 All of the following are valid cryptographic hash functions EXCEPT: A. RIPEMD. B. RC4. C. SHA-512. D. MD4. Answer: B Explanation: QUESTION NO: 6 Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? A. 802.1x B. DHCP C. 802.1q D. NIPS Answer: A Explanation: 3 QUESTION NO: 7 A targeted email...

Words: 14377 - Pages: 58

Premium Essay

International Finance

...describes the International Finance course at Harvard Business School for instructors considering adopting the associated material. The paper begins by arguing that the forces of globalization have fundamentally changed the scope and activities of firms thereby altering the practice of finance within these firms. As a consequence of an increasing reliance on tightly-integrated foreign operations, a parallel world of finance has been opened within every multinational firm and this world has, heretofore, been overlooked. The course materials are designed to address the many aspects of financial decision making within global firms prompted by these changes that are not addressed in traditional materials. The paper provides an overview of the structure of the course and its seven modules with particular emphasis on the three modules that constitute the core of the course. The paper also describes an analytical framework that has been developed through the creation of the course materials to guide critical financial decisions on financing, investment, risk management and incentive management within a multinational firm. This framework emphasizes the need to reconcile conflicting forces in order for multinational firms to gain competitive advantage from their internal capital markets. The paper concludes with a discussion of the course's pedagogical approach and detailed descriptions of all the course materials, including 19 case studies, corresponding teaching notes, several module...

Words: 25419 - Pages: 102

Free Essay

Fiction

...PROLOGUE Fortress of the Light Pedron Niall's aged gaze wandered about his private audience chamber, but dark eyes hazed with thought saw nothing. Tattered wall hangings, once battle banners of the enemies of his youth, faded into dark wood paneling laid over stone walls, thick even here in the heart of the Fortress of the Light. The single chair in the room heavy, high-backed, and almost a throne - was as invisible to him as the few scattered tables that completed the furnishings. Even the white-cloaked man kneeling with barely restrained eagerness on the great sunburst set in the wide planks of the floor had vanished from Niall's mind for the moment, though few would have dismissed him so lightly. Jaret Byar had been given time to wash before being brought to Niall, but both his helmet and his breastplate were dulled from travel and battered from use. Dark, deep-set eyes shone with a feverish, urgent light in a face that seemed to have had every spare scrap of flesh boiled away. He wore no sword - none was allowed in Niall's presence - but he seemed poised on the edge of violence, like a hound awaiting the loosing of the leash. Twin fires on long hearths at either end of the room held off the late winter cold. It was a plain, soldier's room, really, everything well made but nothing extravagant except for the sunburst. Furnishings came to the audience chamber of the Lord Captain Commander of the Children of the Light with the man who rose to the office; the...

Words: 244946 - Pages: 980

Premium Essay

Wage and Salary Chapter 1

...Milkovich−Newman: Compensation, Eighth Edition Front Matter 1. The Pay Model © The McGraw−Hill Companies, 2004 Chapter One The Pay Model Chapter Outline Compensation: Definition, Please? Society Stockholders Managers Employees Global Views—Vive la différence Forms of Pay Cash Compensation: Base Cash Compensation: Merit Pay/ Cost-of-Living Adjustments Cash Compensation: Incentives Long-Term Incentives Benefits: Income Protection Benefits: Work/Life Focus Benefits: Allowances Total Earnings Opportunities: Present Value of a Stream of Earnings Relational Returns from Work The Employment Relationship Combines Transactional and Relational Returns Variations in Transactional and Relational Expectations A Pay Model Compensation Objectives Four Policies Pay Techniques Book Plan Caveat Emptor—Be an Informed Consumer 1. Does the Research Measure Anything Useful? 2. Does the Study Separate Correlation from Causation? 3. Are There Alternative Explanations? Your Turn: Glamorous Internships? or House Elves? A friend of ours writes that she is in one of the touring companies of the musical Cats. In the company are two performers called “swings” who sit backstage during each performance. Each swing must learn five different lead roles in the show. During the performance, the swing sits next to a rack with five different costumes and makeup for each of the five roles. Our friend, who has a lead in the show, once hurt her shoulder during a dance number. She signaled to someone...

Words: 12471 - Pages: 50

Free Essay

Alpha Omega Ti File Server

...that are not appropriate for the specific client's business or will not take a business' operations into their planning as they routinely bring down an entire business while they perform routine maintenance on a server. That is unacceptable, interrupting productivity because it is "a better time for us" is the wrong answer. Alpha Omega Technical Industries around your business. We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth. With the model and upward mobility we have seen out of Alpha Omega Technical Industries it has experienced a of recent success and a need for growth The CIO of Alpha Omega Technical Industries has expressed an interest in expanding network storage while creating the ability to share files, access security logs and be able to archive data. SECTION II Installing Data Storage Network solutions a. NAS Servers The first step in this process is identifying the type of NAS storage that will be used. The type of NAS severs that will be used will be the TeraStation 7120r 96 TB/TS-2RZH96T12D X 6. “TeraStation 7120r Enterprise is a high performance 12-drive network storage solution ideal for businesses and demanding users requiring a reliable RAID based NAS and iSCSI storage solution for larger networks and business critical applications. With the powerful quad-core...

Words: 1043 - Pages: 5

Premium Essay

General Management

...several sections. Table 15-1  Elements of Organizational Structure 15.2 What are the major elements of an organizational structure? WORK SPECIALIZATION. Work specialization is the way in which tasks in an organization are divided into separate jobs. In some organizations, this categorization is referred to as a company’s division of labor. How many tasks does any one employee perform? To some degree, work specialization is a never-ending trade-off among productivity, flexibility, and worker motivation. Take an assembly line worker at Ford as an example. Henry Ford was perhaps the earliest (and clearly most well-known) believer in high degrees of work specialization. He divided tasks among his manufacturing employees to such a degree that each employee might only perform one single task, over and over again, all day long. Having only one task to perform allowed those employees to be extremely productive at doing that one thing. It also meant that training new workers was much easier when replacements were needed. However, there are trade-offs when organizations make jobs highly specialized. Highly specialized jobs can cause organizations to lose the ability associated with employees who can be flexible in what they do. By spending all their time performing specialized tasks well, employees fail to update or practice other skills. Accounting majors, for example, might specialize in taxes or auditing. Some larger companies might hire these graduates for their ability to do...

Words: 5802 - Pages: 24

Free Essay

Exam 2

...decision-making authority to the lowest possible level. Answer Correct Answer: centralized organizations; decentralized organizations Question 2 1.25 out of 1.25 points _____ is the tendency to ignore or avoid certain information, especially if that information is ambiguous. Answer Correct Answer: Selective perception Question 3 1.25 out of 1.25 points A local microbrewery is working on its methods of advertising, promoting and selling its product. This is an example of ________. Answer Correct Answer: a primary activity in the value chain Question 4 1.25 out of 1.25 points Which of the following did Nokia NOT do in responding to the crisis involving the fire at the Philips semiconductor plant, according to the Resilient Enterprise case? Answer Correct Answer: Threatened legal action against Philips if it didn't find alternative sources of supply Question 5 1.25 out of 1.25 points In most organizations, non-programmed decisions tend to be made by ________; while programmed decisions are made by ________. Answer Correct Answer: top managers; lower-level managers Question 6 0 out of 1.25 points Wernickskosherdills.com is in growth mode thanks to the tremendous demand for its product. Its executives must decide how much of its budget to allocate for hiring better salespeople, and how much to allocate for building new pickling facilities. This is an example of ________. Answer Correct Answer: priorities and multiple objectives Question...

Words: 2268 - Pages: 10