...The Recalcitrant Director at Byte Products, Inc.: Corporate Legally versus Corporate Responsibility Background of the Company Byte Products Incorporated is a ficticious company and as a result, information regarding the company itself and the environment, at the time of the case, is not available for research. This case, prepared by Professors from Indiana Universty and Cornell Uuniversity, conceals the true identity of the name of the firm, individuals, location and financial information for anonymity. Summary The case of the recalcitrant director at Byte's Products Inc, brings to focus a conflict between Archie Carroll's proposed theory of responsibilities of a business firm, namely legal responsibility and social responsiblity. Byte Products Incorporated, a publicly traded company, headquartered in Midwest United States of America, is primarily involved in the local production of electronic components for computers used in sophisticated businesses and engineering applications. A publicly traded company, the majority of stockholders are the initial owners of Byte when it was a private company. O perated by a hierachy structure with the Board of Directors ( 4 inside members and 7 outside members) at the top level; Jim Elliott is the Chief Executive Officer and Chairman of the Board. Regarded as one of the largest-volume suppliers of specialized components, this firm, performing at a consistent revenue-increase level for the past six years holds some 32% market...
Words: 1025 - Pages: 5
...The Recalcitrant Director at Byte Products, Inc.: Corporate legality versus corporate responsibility About the Company BYTES PRODUCTS, Inc. is an American based company involved in the production of electronic components incorporated in personal computers, mostly used for business and engineering applications. The company has three plants at different locations in the U.S.A, which totals a current sale of about $265 million and has a market share of approximately 32%, making them the leader in the industry. Summary Mr. James M. Elliot, the CEO and Chairman of the Board at Bytes Products, Inc, noticed that the company was beginning to face a number of crises. The existing three plants run on a 3–shift working schedule of 24hours a day and 7 days a week using up all possible production hours. It has now come to the attention of Mr. Elliot that even if the three existing plans are running at its maximum production level, there is still a high product demand percentage that is not being met. The company’s overall supply is unable to meet the demands of its customers which can cause a negative impact on the company’s by not being able to maintain its current market share. Therefore, because of this dilemma Mr. Elliott has returned to the drawing board in search of a solution to this problem. Mr. Elliott then made the decision to construct another manufacturing plant to produce sufficient product to meet the demands of the customers. In order for this new manufacturing plant...
Words: 1425 - Pages: 6
...words to make a book meaningful) Computers Use Random Access Technology - Data Can Be Accessed in Any Order at Any Time Regardless of Storage Position or Time of Creation. Binary: the digital language of computers. This language is composed of an alphabet containing only 2 “letters” known as bits. Any work done on a modern computer from word processing to digital audio is translated to this language. Bit: the smallest form of information in the language of computers. It is represented as a zero or a one. A bit can be considered a letter in the digital language of binary. Byte: a “word” of information in binary. It is made of a number bits determined by the bit rate. 8 bits is usually = 1 byte on modern computers. Bit rate: the number of “letters” or bits in a digital word or byte. An example of a 16 bit digital word in binary could be (01010101 10101010). * 8 bits = 1 byte * 1024 bytes = 1 kilobyte (210) * 1024 kilobytes = 1 megabyte (220) * 1024 megabytes = 1 gigabyte (230) CPU - abbreviation of central processing unit, the CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU...
Words: 1145 - Pages: 5
...CS5.5 Master Collection release notes Adobe® Creative Suite® 5.5 Master Collection Read Me Welcome to Master Collection. This document contains late-breaking product information, updates, and troubleshooting tips not covered in the Master Collection documentation. Creative Suite 5.5 Master Collection components Minimum system requirements Install your software Uninstall your software Trial software Electronic licensing Registration information Font installation Known issues Customer care Other resources Creative Suite 5.5 Master Collection components Adobe® Photoshop® CS5.1 Extended Adobe® Illustrator® CS5.1 Adobe® InDesign® CS5.5 Adobe® Acrobat® 10.0 Professional Adobe® Flash® Catalyst™ CS5.5 Adobe® Flash® Professional CS5.5 Adobe® Flash® Builder™ 4.5 Premium Adobe® Dreamweaver® CS5.5 Adobe® Fireworks® CS5.1 Adobe® Contribute® CS5.1 Adobe® Premiere® Pro CS5.5 Adobe® After Effects® CS5.5 Adobe® Audition® CS5.5 Adobe® OnLocation™ CS5.1 Adobe® Encore® CS5.1 Adobe® Bridge CS5.1 Adobe® Device Central CS5.5 Adobe® Media Encoder CS5.5 Adobe® Extension Manager Integrates with Adobe® CS Live online services* 1 *Adobe CS Live services are complimentary for a limited time and include Adobe® BrowserLab, Adobe® CS Review, Acrobat.com, Adobe® Story and SiteCatalyst® NetAverages† Learn more. Minimum system requirements Windows® Intel® Pentium® 4 or AMD Athlon® 64 processor (Intel Core™ i3, i5, or i7 or or AMD Phenom® II recommended); Intel Core 2 Duo or AMD Phenom II required...
Words: 5375 - Pages: 22
...memorandum 9 Bibliography 10 Executive summary This report highlights the start of the entrepreneurial journey of Steve Jobs – the founder of Apple. The Apple journey started off as a partnership. Steve Jobs and Steve Wozniak had been friends for some time, having met in 1971, when their mutual friend, Bill Fernandez, introduced 21-year-old Wozniak to 16-year-old Jobs. Jobs managed to interest Wozniak in assembling a machine and selling it. They bootstrapped for the first product – Apple I. Mike Markkula was the first angel investor who showed belief in the product and the team. Markkula had made his fortune as a marketing manager at Fairchild Semiconductor and Intel, retiring at age 32. In 1977, Steve Jobs met with Markkula and convinced him that personal computers were an exciting opportunity. Markkula invested $250,000 in Apple for a one-third stake in the company and served as president from 1981-83. With Mike’s guidance and funding Apple ceased to be a partnership and was incorporated on April 1, 1976. Apple investors had a traditional exit through an initial public offering in 1980. When Apple went public, it generated more capital than any IPO since Ford Motor Company in 1956 and instantly created more millionaires (about 300) than any company in history. Several venture capitalists cashed out, reaping billions in long-term capital gains. Job was a perfectionist and had a very detail oriented approach to his venture. He was...
Words: 3280 - Pages: 14
...Milk, Fruit & Nut, Crackle, Temptations, 5 Star, Perk & Celebrations Gift boxes. • Sugar Confectionery – Cadbury Dairy Milk Eclairs is one of the leading brands in this category. It is amongst the largest éclair brands in the market in terms of value share. Cadbury also owns Halls (which was acquired as a part of the global acquisition of the Adams business from Pfizer in 2003). Halls is amongst the largest brands in its segment of Minty/ Breath freshness brands in India. • Food Drinks – Cadbury’s Bournvita is a leading brand in the brown drinks segment of milk/ malted food products. Cadbury’s other products include Drinking Chocolate and Cocoa powder. Overall share in the malted food drinks market is estimated to be around 19 per cent. Cadbury in India Cadbury India is a wholly owned subsidiary of Cadbury Schweppes which has operated in the country for more than 55 years. It was originally incorporated as a wholly owned subsidiary of Cadbury Schweppes Overseas Ltd in 1948. The company today employs nearly 2,000 people across India. Cadbury India is the No. 1 confectionery company with a 70 per cent market share...
Words: 904 - Pages: 4
...modulated and sent. 2.1.2 RECEIVER SECTION Here in the receiver section, the FM signal sent from the transmitter section is received by the FM receiver and fed to the controller and a battery is used to supply power to the controller. The output from the controller is fed to the motor driver circuit which intern is connected to the motor. 2.2 BLOCK DIAGRAM RECEIVER SECTION 2.3 Hardware Description The hardware part mainly consists of the components that are used in designing the vehicle i.e., a prototype model which moves in four directions. The major sections in this hardware part are the transmitter section and the receiver section; in both of these sections a microcontroller called AT89S52 is incorporated. 2.4 Software Description Keil Micro Vision is an integrated development environment used to create software to be run on embedded systems (like a microcontroller). It allows for such software to be written either in assembly or C programming languages and for that software to be simulated on a computer before being loaded onto the microcontroller. 2.5 CONCLUSION Thus the generation of the block diagram and its description has been dealt in this chapter using hardware and its implementation using software. CHAPTER 3 3.1 DESCRIPTION OF AT89S52 Looking back into the history of microcomputers, one would at first come across the development of...
Words: 4350 - Pages: 18
...so have a quick rate of consumption, and a high return. FMCG can broadly be categorized into three segments which are: 1. Household items as soaps, detergents, household accessories, etc, 2. Personal care items as shampoos, toothpaste, shaving products, etc and finally 3. Food and Beverages as snacks, processed foods, tea, coffee, edible oils, soft drinks etc. Global leaders in the FMCG segment are Nestlé, ITC, Hindustan Unilever Limited, Reckitt Benckiser, Unilever, Procter & Gamble, Cadbury India Coca-Cola, Carlsberg, Kleenex, General Mills, Pepsi, Gillette, Nirma etc. Strengths: 1. Low operational costs 2. Presence of established distribution networks in both urban and rural areas 3. Presence of well-known brands in FMCG sector Opportunities: 1. Untapped rural market 2. Rising income levels, i.e. increase in purchasing power of consumers 3. Large domestic market- a population of over one billion 4. Export potential 5. High consumer goods spending Weaknesses: 1. Lowers cope of investing in technology and achieving economies of scale, especially in small sectors 2. Low exports levels 3."Me-too" products, which illegally mimic the labels of the established brands. These products narrow the scope of FMCG products in rural and semi-urban market. Threats: 1. Removal of import restrictions resulting in replacing of domestic brands 2. Slow down in rural demand 3. Tax and regulatory structure COMPANY PROFILE NIRMA Date of Establishment | 1969 | Market...
Words: 3571 - Pages: 15
...K. Bushnell. Wozniak finishes work on the Apple 1 at the time when he was working for Hewlett Packard and made them an offer for $800 for a machine that runs BASIC. HP at that time turns down the offer. After that, they decided to cut the price to $666.66 and exhibited the computer at the Home Brew Computer Club meeting. Paul Terrell, president of Byte Shop Chain was impressed by the new invention and placed an order for 50 pieces. The order was delivered before the deadline. After short period of time Ronald Wayne decides to leave the company making Steve Jobs, Steve Wozniak the primary founders of the company. This was the first big order that Apple got. In the same year, both of them came up with Apple II. It dint attract any buyers. At this time the company was facing a financial crisis and needed funding. A Steve job asks his former boss to help him find some investors who had interest in the project. Nolan Bushnell, who was his former boss introduces Steve jobs to Mike Markkula , who then went on to play a major role in the companies formation and operations for over 20 years. In 1977 Apple Computer Inc was legally incorporated. Mike invests $92,000 in Apple and promises that he would continue to keep pooling in money for the future operations of Apple. With this money, Apple Inc went on to introduce Apple II publically with...
Words: 1650 - Pages: 7
...PROJECT REPORT ON CADBURY INDIA LTD. SCOPE OF THE PROJECT This project was undertaken to show Cadbury’s marketing mix and actually how they employ the 4P strategies- Product, Place, Price and Promotion in real world scenario. Thisproject provides us with exposure to Chocolate confectionery, Beverages, Biscuits, Gum and Candy in India which is one of the most promising segments in India today. We studied the strategies employed by Cadbury India Limited that makes it the market leader and suggested few recommendations of our own. INTRODUCTION Cadbury India Ltd. is now a part of Kraft Foods.Chicago-headquartered Kraft Foods acquired Cadbury last January for $18.9 billion. Cadbury India operates in five categories – Chocolate confectionery, Beverages, Biscuits, Gum and Candy. In the Chocolate Confectionery business, Cadbury has maintained its undisputed leadership over the years. Some of the key brands are Cadbury Dairy Milk, Bournvita, 5 Star, Perk, Bournville, Celebrations, Gems, Halls, Éclairs, Bubbaloo, Tang and Oreo. Their core purpose "make today delicious" captures the spirit of what they are trying to achieve as a business. In India, Cadbury began its operations in 1948 by importing chocolates. After over 60 years of existence, it today has six company-owned manufacturing facilities at Thane, Induri (Pune) and Malanpur (Gwalior), Bangalore and Baddi (Himachal Pradesh), Hyderabad and 4 sales offices (New...
Words: 3503 - Pages: 15
...1. INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered in this chapter only describe the first of many steps necessary for better security in any number of situations. This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. I would like to say at the outset that this paper is very focused on terms, concepts, and schemes in current use and is not a treatise of the whole field. No mention is made here about pre-computerized crypto schemes, the difference between a substitution and transposition...
Words: 7926 - Pages: 32
...Everyday enormous amount of data is being produced worldwide. Companies capture trillions of bytes of information about their customers, suppliers, and operations. IT organizations are exploring the analytics technologies to explore web-based data sources and extract value from the social networking boom. The organizations are trying to leverage Big Data by trying to make sense from the data that they have and by securing it. Already the forward thinking players of the banking, insurance, manufacturing, retail, wholesale, healthcare, communications, transportation, construction, utilities, and education are successfully using big data by exploiting meaningful information from all the data they have and using that information in formulating their strategic moves. The Volvo Car Corporation (VCC) is the well-known auto manufacturer founded in 1927 in Gothenburg, Sweden. The Volvo Car Corporation drives product design, quality, cost reduction, and customer satisfaction through data-driven decision-making. The aggregate data volume is large and growing rapidly. In keeping with then-prevailing standards for IT architecture, the company originally began collecting this data in a dedicated data mart. The Volvo Car Corporation wanted to create an effective marketing campaign to tie in with the popular Twilight movie franchise and to create an interactive game would connect to global audience. The idea for the game was that users could play to win a new Volvo XC60 car. In an effort...
Words: 1273 - Pages: 6
...Taipei 221 Taiwan Company Perspectives: Acer ranks among the world's top five branded PC vendors, designing and marketing easy, dependable IT solutions that empower people to reach their goals and enhance their lives. History of Acer Incorporated Read more: Acer Incorporated - Company Profile, Information, Business Description, History, Background Information on Acer Incorporated http://webcache.googleusercontent.com/search?q=cache:GLjJKFtD2DAJ:www.referenceforbusiness.com/history2/90/AcerIncorporated.html+determine+what+strategies+acer+can+apply+to+become+the+world's+third+largest+pc+company+behind+Dell+and+Hewlett+Packard&cd=4&hl=en&ct=clnk&gl=us#ixzz12MuHMLNY Acer Incorporated is Taiwan's leading exporter and the world's fifth largest computer manufacturer. The company designs, manufactures, and sells computer hardware and software products; it ranks among the world's largest manufacturers of individual components such as keyboards, motherboards, set-up boxes, storage drives, monitors, CD-ROM drives, keyboards, printers, scanners, and software. Acer's nearly 30 years of growth results primarily from its business of manufacturing and assembling branded and contract PCs in several locations throughout the world. The company sells its products through dealers and distributors in more than 100 countries. Taiwan's high-tech industry pioneer Stan Shih cofounded Acer. Over the years Shih guided his company through several corporate restructuring processes as well as financial ups...
Words: 4290 - Pages: 18
...USA Today by Gannett Company On 20th April 1982 - announced the first copies of USA Today In 1985 - became the second largest newspaper in the America In 17th April 1995 - Launced USA Today Online In 2000 - The paper redesign In 2009 - Newspaper have closed shop or reduced publications day and adapt to online only Norfatahiyah Bt Md Sulhaimi 1110937 USA Today Become a more serious newspaper with improved journalism Raising public awareness and move into profitability USAToday.com Readers interacted with the journalist and given opportunity to voice their opinion Continuous strategy of marketing innovation USA Today Product Innovation Promotional Innovation Distribution Innovation USAToday.com Added blogs Really Simple Syndication(RSS) Pod casting No Demand for the newspaper will decrease because customer just get news from USAToday.com Strength Weaknesses Opportunities Threats Huge media conglomerate with Gannett Gannett's capabilities in high-tech graphic design High fixed costs Weak profit margin Increasing numbers of white-collar workers Failure of competition to innovate and innovate rapidly Online news threaten to cannibalize printed news Competition from other newspaper, national and local Fast delivery the news Design through customer preference Limitation when it saturated Move to USA Today Online Lose readers of the population ages over the next 10 to 30 years Economic factor such as higher newsprint costs https://www.scribd...
Words: 1620 - Pages: 7
...A Abstract: A Java keyword used in a class definition to specify that a class is not to be instantiated, but rather inherited by other classes. An abstract class can have abstract methods that are not implemented in the abstract class, but in subclasses. Abstract class: A class that contains one or more abstract methods, and therefore can never be instantiated. Abstract classes are defined so that other classes can extend them and make them concrete by implementing the abstract methods. Abstract method: A method that has no implementation. Abstract Window Toolkit (AWT): A collection of graphical user interface (GUI) components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all native platforms. Largely supplanted by the Project Swing component set. See also Swing. Access control: The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints. ACID: The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability. Actual parameter list: The arguments specified in a particular method call. See also formal parameter list. API: Application Programming Interface. The specification of how a programmer writing an application accesses the behavior and state of classes and objects. Applet: A component that typically...
Words: 6835 - Pages: 28