Free Essay

Bus 501 Module One Case Assignment

In:

Submitted By jrileyl
Words 1675
Pages 7
Trident University International
Module 1 Case Assignment ETH 501: Business Ethics
Dr. Mark Friske
24 November 2013

Introduction Adelphia Communications, one of the largest cable companies is the country at the time, is defunct as of 2006 due to multiple unethical decisions by the Rigas family. Any business, if subjected to unethical decision making to this extent, would be destined for failure and Adelphia Communications is no exception. The two main unethical actions that are highlighted are lying and stealing. Were these actions justified, deontologically speaking? How does Immanuel Kant’s categorical imperative apply to these two unethical actions in a business scenario?
The Scandal Adelphia was a cable television company formed in 1952 by John Rigas and two other partners. John Rigas eventually bought out the partners of the company and grew the business with his brother and sons making it a family business. In 1986 the company became publically listed and eventually became the fifth largest cable company in the United States before it filed for bankruptcy in 2002 due to internal corruption. One example of the internal corruption at Adelphia was the accounting techniques that were used by the Rigas family. Billions of dollars in debt and liabilities were hidden from the public and off of the financial reports to make the company appear in better shape than it actually was. The former cable television company also would alter the amount of earnings made in favor of the company to make the company seem in better financial shape than it actually was. Also, there were numerous examples of the Rigas family using the company funds with the intent of paying back later that were never noted on the financial statements. (Barlup, Hanne, & Stuart, 2009)
Two Key Problems Out of the numerous ethical problems that can be drawn from the Adelphia scandal two key ethical problems stand out. The first of these two main problems is the dishonesty of the founding and controlling members of the company, the Rigas family. As previously mentioned billions of dollars in debt and liabilities were hidden from the public and off of the financial reports to make the company appear in better shape as it actually was. The former cable television company also would alter the amount of earnings made in favor of the company to make the company seem in better financial shape than it actually was. In addition to those Adelphia also falsified operations statistics. During the trial James R. Brown, former vice president of finance, testified that; "I lied in person to investors when I met them. I lied in the company's filings. I lied in the company's press releases (Barlup, Hanne, & Stuart, 2009)." After the fall of the company it appeared that most of the financial information about the company was untruthful. The second of the two main problems is the fact that “the Rigas family used the company as a personal ‘piggy bank’.” (Barlup, Hanne, & Stuart, 2009) There are numerous accounts of the Rigas family using the shareholders money loosely without their knowledge. One example of the Rigas family using the company as a personal piggy bank was the purchase of an almost thirteen million dollar golf course built on the Rigas property. Another example of the Rigas family using the company as a personal piggy bank was the use of company jets for personal use. On one occasion a company plane was used to deliver a Christmas trees to John Rigas’ daughter in New York. After that tree was not good enough for her, John Rigas used the company plane again to deliver another one. (Barlup, Hanne, & Stuart, 2009) A company jet was once used for an African safari. (Markon & Frank, 2002) Ellen Rigas, John Rigas’ daughter, not connected to the company in any way, received millions of dollars to fund her personal ventures. A couple more examples of the use of company money for personal use were the purchase of timber rights for the family and funding of a local hockey team. Examples such as these were not mentioned in the financial statements; however some of the amounts were later added as a small footnote in the company fillings. (Barlup, Hanne, & Stuart, 2009)
Deontological Ethics Deontological ethic is essentially moral values that depend upon ones duty. Everyone has the duty to make the right decision or action. The question with deontological ethics, however, is to whom or what is that duty. Utilitarian ethics have an easier way of determining the choice or decision at hand. What maximizes the most amount of good for the most amount of people? Deontological ethics, however, makes decision independent of consequences for the majority or for one’s self. A deontologist makes a decision because it is right. Also, deontological decisions are found to be moral only if the motivation is moral. If the motivation is not ethical, then the action itself is not ethical regardless of how much good was done in the process of doing that action. (Deontological ethics, 2013)
Categorical Imperative Categorical Imperative is a philosophical concept of deontological ethics created in 1785 by German philosopher Immanuel Kant. Categorical Imperative requires that any action or inaction be unconditional and absolute for all parties involved. (Categorical Imperative, 2013) That being stated, categorical imperative requires that one only act if he or she would have that action become a universal law. An example of this type of imperative is “Thou shalt not lie”. This is different than the other type of imperative introduced by Kant, the Hypothetical Imperative. An example of a hypothetical imperative would be “Do not lie if you want people to trust you”. The difference is the ulterior motive at the end of the statement, which is the motivation for doing the right thing. The categorical imperative requires that you do something because it is ethical, not as a means to an end. (Categorical Imperative, 2013) Deontology & Adelphia Communications The first problem that the deontological framework of business ethics can be applied to regarding Adelphia Communications is the use of company funds and assets without the public’s knowledge. Deontology judges the morality of an action based on the action's adherence to a rule or duty. (Deontological ethics, 2013) The operators of a company have the duty to make money for the stockholder, not spend the money of the stockholders. Also, it was not the Rigas’ money and assets to use, it was the stockholders. For multiple reasons, deontologically speaking, this action of the Rigas family is unethical.

The second problem that the deontological framework of business ethics can be applied to regarding Adelphia Communications is the blatant lies told by the Rigas family to the public for almost twenty years. Deontology judges the morality of an action based on the action's adherence to a rule or duty. (Deontological ethics, 2013) The operators of a company have the duty to report the numbers of the company with honesty for the stockholders, not to lie to the stockholders. Also, it is against the rules to lie about those sorts of numbers per the Securities Exchange Act of 1934. (Securities Exchange Act Of 1934, 2013) For more than one reason, deontologically speaking, this specific action taken by the Rigas family is unethical.
Categorical Imperative & Adelphia Communications The first problem that Kant’s Categorical Imperative can be applied to regarding Adelphia Communications is the use of company funds and assets without the public’s knowledge. Kant’s Categorical Imperative requires that any action or inaction be unconditional and absolute for all parties involved. (Categorical Imperative, 2013) Using this imperative one would have to assume that it is ethical to use assets that do not belong to you. Obviously, this maxim is unethical. For this reason, this specific action taken by the Rigas family is unethical in regards to the categorical imperative. The second problem that Kant’s Categorical Imperative regarding Adelphia Communications is the blatant lies told by the Rigas family to the public for almost twenty years. Kant’s Categorical Imperative requires that any action or inaction be unconditional and absolute for all parties involved. (Categorical Imperative, 2013) Using this imperative one would have to assume that it is ethical for everyone to lie. This is also, obviously, unethical. Thus, once again, the actions of the Rigas family were unethical. Conclusion In summary, Adelphia Communications, one of the largest cable companies is the country at the time, is defunct as of 2006 due to multiple unethical decisions by the Rigas family. Any business, if subjected to unethical decision making to this extent, would be destined for failure and Adelphia Communications is no exception. The two main unethical actions that are highlighted are lying and stealing. Were these actions justified, deontologically speaking? No, they were not. The operators of a company have the duty to make money for the stockholder and to do so honestly, not spend the money of the stockholders and lie while doing it. How does Immanuel Kant’s categorical imperative apply to lying and cheating in a business scenario? Immanuel Kant’s categorical imperative states that both of the unethical decisions that were highlighted are unethical due to the fact that neither of the actions can be universal. At best these actions are hypothetical imperatives. If you want to ruin your company, then you should lie and steal.

References:
Barlaup, K., Hanne, I. D., & Stuart, I. (2009). Restoring trust in auditing: Ethical discernment and the Adelphia scandal.Managerial Auditing Journal, 24(2), 183-203. Retrieved on November 24, 2013 from ProQuest.
Categorical imperative (philosophy). (2013). Encyclopedia Britannica Online. Retrieved November 24, 2013, from: http://www.britannica.com/EBchecked/topic/99359/categorical-imperative
Deontological ethics. (2013). Encyclopedia Britannica Online. Retrieved November 24, 2013, from: http://www.britannica.com/EBchecked/topic/158162/deontological-ethics
Markon, J., & Frank, R. (2002, July 25). Adelphia officials are arrested, charged with ‘massive’ fraud – three in the Rigas family, two other executives held, accused of mass looting. The Wall Street Journal. Retrieved November 24, 2013 from ProQuest.

Securities Exchange Act Of 1934. (2013). Investopedia. Retrieved November 29, 2013, from

http://www.investopedia.com/terms/s/seact1934.asp

Similar Documents

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...

Words: 239771 - Pages: 960

Free Essay

Foundation Od Computing

...[pic] [pic] OF FOUNDATION OF COMPUTING MENU DRIVEN PROGRAM KEEPING STUDENTS COURSE SCHEDULE SUBMITTED TO: SUBMITTED BY: Ms. ASHU MITTAL HARVINDER SINGH ROLL NO:R714A21 CLASS:B.TECH(C S E) ACKNOWLEDGEMENT First and foremost I thank my teachers who have assigned me this term paper to bring out my creative capabilities. I express my gratitude to my parents for being a continuous source of encouragement and for their all financial aid given to me. I have like to acknowledge the assignment provided to me by the library staff of LOVELY PROFESSIONAL UNIVERSITY. My hard felt gratitude to my friends for helping me to complete my work in time. HARVINDER SINGH TABLE OF CONTENTS 1. INTRODUCTION 2. PROPOSED SYSTEM (i) DESCRIPTION (ii) SYSTEM REQUIREMENTS 3. REQUIREMENTS ANALYSIS 4. SYSTEM DESIGN 5. SOURCE CODE 6. TESTING 7. FUTURE SCOPE OF PROJECT INTRODUCTION C is a popular general purpose programming language. C language has been designed and developed by DENNIS RITCHIE at BELL LABORATORIES in 1972. It is an offspring of the “BASIC COMBINED PROGRAMMING LANGUAGE” called ‘B’ developed in the year 1960 at CAMBRIDGE UNIVERSITY. This language...

Words: 3352 - Pages: 14

Free Essay

Syllabus

...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...

Words: 13848 - Pages: 56

Free Essay

Master in Business Administration

...above or call 800.862.4522. Open SystemC, Open SystemC Initiative, OSCI, SystemC, and SystemC Initiative are trademarks or registered trademarks of Open SystemC Initiative, Inc. in the United States and other countries and are used with permission. All other trademarks are the property of their respective holders. Restricted Print Permission: This publication is protected by copyright and any unauthorized use of this publication may violate copyright, trademark, and other laws. Except as specified in this permission statement, this publication may not be copied, reproduced, modified, published, uploaded, posted, transmitted, or distributed in any way, without prior written permission from Cadence. This statement grants you permission to print one (1) hard copy of this publication subject to the following conditions: 1. The publication may be used solely for personal, informational, and noncommercial purposes; 2. The publication may not be modified in any way; 3. Any copy of the publication or portion thereof must include all original copyright, trademark, and other proprietary notices and this permission statement; and 4. Cadence reserves the right to revoke this authorization at any time, and any such use shall be discontinued immediately upon written notice from Cadence....

Words: 66266 - Pages: 266

Free Essay

Title

...Operating Instructions Proline Promass 83 HART Coriolis Mass Flow Measuring System 6 BA00059D/06/EN/14.12 71197481 Valid as of version V 3.01.XX (Device software) Proline Promass 83 Table of contents Table of contents 1 1.1 1.2 1.3 1.4 1.5 Safety instructions . . . . . . . . . . . . . . . . 5 Designated use . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation, commissioning and operation . . . . . . . . Operational safety . . . . . . . . . . . . . . . . . . . . . . . . . . Return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Notes on safety conventions and icons . . . . . . . . . . . 5 5 6 6 6 5.2 5.3 2 2.1 Identification . . . . . . . . . . . . . . . . . . . . 7 Device designation . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.1 Nameplate of the transmitter . . . . . . . . . . . . 8 2.1.2 Nameplate of the sensor . . . . . . . . . . . . . . . 9 2.1.3 Nameplate for connections . . . . . . . . . . . . 10 Certificates and approvals . . . . . . . . . . . . . . . . . . . 11 Registered trademarks . . . . . . . . . . . . . . . . . . . . . . 11 5.4 2.2 2.3 3 3.1 Installation . . . . . . . . . . . . . . . . . . . . . 12 Incoming acceptance, transport and storage . . . . . . 3.1.1 Incoming acceptance . . . . . . . . . . . . . . . . . 3.1.2 Transport . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.3 Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation conditions ...

Words: 29998 - Pages: 120

Premium Essay

Hhello

...STARTING OUT WITH Python ® Second Edition This page intentionally left blank STARTING OUT WITH Python ® Second Edition Tony Gaddis Haywood Community College Addison-Wesley Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Editor-in-Chief: Editorial Assistant: Vice President, Marketing: Marketing Manager: Marketing Coordinator: Vice President, Production: Managing Editor: Production Project Manager: Manufacturing Buyer: Art Director: Cover Designer: Cover Image: Media Editor: Project Management: Composition and Illustration: Printer/Binder: Cover Printer: Marcia Horton Michael Hirsch Stephanie Sellinger Patrice Jones Yezan Alayan Kathryn Ferranti Vince O’Brien Jeff Holcomb Kayla Smith-Tarbox Lisa McDowell Linda Knowles Joyce Cosentino Wells/JWells Design © Digital Vision Dan Sandin/Wanda Rockwell Sherill Redd, Aptara®, Inc. Aptara®, Inc. Edwards Brothers LeHigh-Phoenix Color/Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with permission, appear on the Credits page in the endmatter of this textbook. Copyright © 2012, 2009 Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication...

Words: 76897 - Pages: 308

Premium Essay

Heuy2Kj4

...the essentials of Linda Null and Julia Lobur JONES AND BARTLETT COMPUTER SCIENCE the essentials of Linda Null Pennsylvania State University Julia Lobur Pennsylvania State University World Headquarters Jones and Bartlett Publishers 40 Tall Pine Drive Sudbury, MA 01776 978-443-5000 info@jbpub.com www.jbpub.com Jones and Bartlett Publishers Canada 2406 Nikanna Road Mississauga, ON L5C 2W6 CANADA Jones and Bartlett Publishers International Barb House, Barb Mews London W6 7PA UK Copyright © 2003 by Jones and Bartlett Publishers, Inc. Cover image © David Buffington / Getty Images Illustrations based upon and drawn from art provided by Julia Lobur Library of Congress Cataloging-in-Publication Data Null, Linda. The essentials of computer organization and architecture / Linda Null, Julia Lobur. p. cm. ISBN 0-7637-0444-X 1. Computer organization. 2. Computer architecture. I. Lobur, Julia. II. Title. QA76.9.C643 N85 2003 004.2’2—dc21 2002040576 All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or any information storage or retrieval system, without written permission from the copyright owner. Chief Executive Officer: Clayton Jones Chief Operating Officer: Don W. Jones, Jr. Executive V.P. and Publisher: Robert W. Holland, Jr. V.P., Design and Production: Anne Spencer V.P., Manufacturing and...

Words: 118595 - Pages: 475

Free Essay

C++ Objects Solutions

...C++ LOCATION OF VIDEONOTES IN THE TEXT Chapter 1 Designing a Program with Pseudocode, p. 19 Designing the Account Balance Program, p. 24 Predicting the Output of Problem 30, p. 24 Solving the Candy Bar Sales Problem, p. 25 Using cout to Display Output, p. 32 Assignment Statements, p. 59 Arithmetic Operators, p. 61 Solving the Restaurant Bill Problem, p. 72 Using cin to Read Input, p. 75 Evaluating Mathematical Expressions, p. 81 Combined Assignment Operators, p. 102 Solving the Stadium Seating Problem, p. 151 Using an if Statement, p. 162 Using an if/else Statement, p. 172 Using an if/else if Statement, p. 175 Solving the Time Calculator Problem, p. 236 The while Loop, p. 249 The for Loop, p. 263 Nested Loops, p. 277 Solving the Ocean Levels Problem, p. 299 Defining and Calling Functions, p. 306 Using Function Arguments, p. 316 Value-Returning Functions, p. 326 Solving the Markup Problem, p. 380 Creating a Class, p. 391 Creating and Using Class Objects, p. 393 Creating and Using Structures, p. 436 Solving the Car Class Problem, p. 480 Accessing Array Elements, p. 487 Passing an Array to a Function, p. 517 Two-Dimensional Arrays, p. 526 Solving the Chips and Salsa Problem, p. 567 Performing a Binary Search, p. 580 Sorting a Set of Data, p. 587 Solving the Lottery Winners Problem, p. 616 (continued on next page) Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 LOCATION OF VIDEONOTES IN THE TEXT Chapter 10 Pointer Variables...

Words: 11246 - Pages: 45

Free Essay

Rute Linux Tutorial

...2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned one thing from traveling, it was that the way to get things done was to go ahead and do them. Don’t talk about going to Borneo. Book a ticket, get...

Words: 159689 - Pages: 639

Free Essay

Test

...Contents At a Glance I Advanced UNIX Programming with Linux Advanced Linux Programming 1 Getting Started 3 2 Writing Good GNU/Linux Software 17 3 Processes 45 4 Threads 61 5 Interprocess Communication 95 II Mastering Linux 6 Devices 129 7 The /proc File System 147 8 Linux System Calls 167 9 Inline Assembly Code 189 10 Security 197 11 A Sample GNU/Linux Application 219 III Appendixes A Other Development Tools 259 B Low-Level I/O 281 C Table of Signals 301 D Online Resources 303 E Open Publication License Version 1.0 305 F GNU General Public License 309 Advanced Linux Programming Mark Mitchell, Jeffrey Oldham, and Alex Samuel www.newriders.com 201 West 103rd Street, Indianapolis, Indiana 46290 An Imprint of Pearson Education Boston • Indianapolis • London • Munich • New York • San Francisco Advanced Linux Programming Copyright © 2001 by New Riders Publishing FIRST EDITION: June, 2001 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. International Standard Book Number: 0-7357-1043-0 Library of Congress Catalog Card Number: 00-105343 05 04 03 02 01 7 6 5 4 3 2 1 Interpretation of the printing code:The rightmost doubledigit number is the year of the book’s printing; the rightmost single-digit...

Words: 80064 - Pages: 321

Premium Essay

Scp and Sap Apo

...Supply Chain Management and Advanced Planning Hartmut Stadtler ´ Christoph Kilger (Eds.) Supply Chain Management and Advanced Planning Concepts, Models, Software and Case Studies Third Edition With 173 Figures and 56 Tables 12 Professor Dr. Hartmut Stadtler FG Produktion und Supply Chain Management FB Rechts- und Wirtschaftswissenschaften TU Darmstadt Hochschulstraûe 1 64289 Darmstadt Germany stadtler@bwl.tu-darmstadt.de Dr. Christoph Kilger j&m Management Consulting AG Kaiserringforum Willy-Brandt-Platz 5 68161 Mannheim Germany christoph.kilger@jnm.de Cataloging-in-Publication Data Library of Congress Control Number: 2004110194 ISBN 3-540-22065-8 Springer Berlin Heidelberg New York ISBN 3-540-43450-X 2nd edition Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2000, 2002, 2005 Printed...

Words: 180845 - Pages: 724

Free Essay

Websphere Service Registry and Repository , Used for Soa Governance on Bpm

...Front cover WebSphere Service Registry and Repository Handbook Best practices Sample integration scenarios SOA governance Chris Dudley Laurent Rieu Martin Smithson Tapan Verma Byron Braswell ibm.com/redbooks International Technical Support Organization WebSphere Service Registry and Repository Handbook March 2007 SG24-7386-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (March 2007) This edition applies to Version 6, Release 0, Modification 0.1 of IBM WebSphere Service Registry and Repository (product number 5724-N72). © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 163740 - Pages: 655

Premium Essay

Word

...Army Regulation 350–1 Training Army Training and Leader Development Rapid Action Revision (RAR) Issue Date: 4 August 2011 Headquarters Department of the Army Washington, DC 18 December 2009 UNCLASSIFIED SUMMARY of CHANGE AR 350–1 Army Training and Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National ...

Words: 129456 - Pages: 518

Premium Essay

Cataolog

...ork2012 - 2013 Catalog A Message from the President “Sullivan University is truly a unique and student success focused institution.” I have shared that statement with numerous groups and it simply summarizes my basic philosophy of what Sullivan is all about. When I say that Sullivan is “student success focused,” I feel as President that I owe a definition of this statement to all who are considering Sullivan University. First, Sullivan is unique among institutions of higher education with its innovative, career-first curriculum. You can earn a career diploma or certificate in a year or less and then accept employment while still being able to complete your associate, bachelor’s, master’s or doctoral degree by attending during the day, evenings, weekends, or online. Business and industry do not expand or hire new employees only in May or June each year. Yet most institutions of higher education operate on a nine-month school year with almost everyone graduating in May. We remained focused on your success and education, and continue to offer our students the opportunity to begin classes or to graduate four times a year with our flexible, year-round full-time schedule of classes. If you really want to attend a school where your needs (your real needs) come first, consider Sullivan University. I believe we can help you exceed your expectations. Since words cannot fully describe the atmosphere at Sullivan University, please accept my personal invitation to visit and experience...

Words: 103133 - Pages: 413

Premium Essay

Police

...BELHAVEN UNIVERSITY Jackson, Mississippi A CHRISTIAN UNIVERSITY OF LIBERAL ARTS AND SCIENCES FOUNDED IN 1883 CATALOGUE 2014-2015 EFFECTIVE JUNE 1, 2014 Directory of Communication Mailing Address: Belhaven University 1500 Peachtree St. Jackson, MS 39202 Belhaven University 535 Chestnut St. Suite 100 Chattanooga, TN 37402 Belhaven University 7111 South Crest Parkway Southaven, MS 38671 Belhaven University – LeFleur 4780 I-55 North Suite 125 Jackson, MS 39211 Belhaven University 15115 Park Row Suite 175 Houston, TX 77084 Belhaven University Online 1500 Peachtree St. Box 279 Jackson, MS 39202 Belhaven University 1790 Kirby Parkway Suite 100 Memphis, TN 38138 Belhaven University 4151 Ashford Dunwoody Rd. Suite 130 Atlanta, GA 30319 Belhaven University 5200 Vineland Rd. Suite 100 Orlando, FL 32811 Traditional Admission Adult and Graduate Studies Admission – Jackson Atlanta Chattanooga Desoto Houston Memphis Orlando Alumni Relations/Development Belhaven Fax Business Office Campus Operations Integrated Marketing Registrar Student Life Security Student Financial Planning Student Development Online Admission Online Student Services (601) 968-5940 or (800) 960-5940 (601) 968-5988 or Fax (601) 352-7640 (404) 425-5590 or Fax (404) 425-5869 (423) 265-7784 or Fax (423) 265-2703 (622) 469-5387 (281) 579-9977 or Fax (281) 579-0275 (901) 896-0184 or Fax (901) 888-0771 (407) 804-1424 or Fax (407) 367-3333 (601) 968-5980 (601) 968-9998 (601) 968-5901 (601) 968-5904 (601) 968-5930 (601) 968-5922...

Words: 151104 - Pages: 605