...ASSIGNMENT #1 2 Question #1 - Given the business situation for Spectrum Brand. Explain. Spectrum Brands, the former Rayovac Corporation, went on a radical business transformation under David Jones’ management. According to Dictionary.com, to transform means to: “change in condition, nature, or character;; convert” (“Transform,” 2011, para. 2). The company that used to produce only batteries ventured into new businesses and currently operates in the market of pet products, personal grooming, and lawn and garden care (“The Buyout  Boom,” 2007). The diversification of products certainly required a new organization structure, which should be based on a matrix structure, or a multidivisional structure; since line, and line-and-staff structures would not be appropriate anymore for the required dynamic of the new company. It has been discovered that “[a]s companies grow and diversify, traditional line structures become difficult to coordinate, making communication difficult and decision making slow” (Ferrel, Hirt & Ferrel, 2009, p 247). Remember, you never end a paragraph with a quote. In a multidivisional structure, the company is organized in divisions, which are large groups that might be formed on the geography, product or customer basis; and within those divisions there may be departments also organized by customer, products, regions or a combination of those groups. This structure enables the decision process to be faster, since the managers...
Words: 1333 - Pages: 6
...Week 7 Disscusion "Network Security" Please respond to the following: • From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security. Select the two (2) most important and / or unique features of the chosen firewall, and explain the primary reasons why those features make the firewall a viable option in enterprises today. Justify your answer. ANSWER: I would use the Cisco ASA. I chosen the Cisco ASA firewall because I read an article in the past about it. I’m not all that familiar with the Cisco ASA, but I do recall some information. Plus Cisco is a popular organization and I usually use them as a resource because of their reputation and affiliation with the government and other large companies. The Cisco ASA firewall is a firewall that is used by the government and other large companies. As Cisco states, Cisco ASA Next-Generation Firewall Services include Cisco Application Visibility and Control (AVC), Web Security Essentials (WSE), and Intrusion Prevention System (IPS). Cisco ASA has the next-generation firewall capabilities and network-based security controls for end-to-end network intelligence and streamlined security operations. The Cisco ASA also allows the maximum connections per second with the lowest overhead. It has great features and benefits that any small or large organization can...
Words: 596 - Pages: 3
...Week 7 Discussion Welcome to Week 7 Discussions! Let's begin by discussing the difference between capital budgeting screening decisions and capital budgeting preference decisions. According to the text screening decision are determined when solutions are measured against “preset hurdles” (pg. 628). For example there are certain predetermined phases that a solution would have to pass in regards to making a final decision. For budgets, their maybe certain profit goals or certain costs that need to be met in order for a company to move forward on either instituting a new product or cutting a product. Preference decisions are made by measuring a solution to different alternative opportunities. I believe the decision is made from a team’s or individual’s preference after the solution has been challenged by each alternative opportunity. How important is employee "buy-in" in a project? Please provide examples of projects that you have seen succeed and fail due to employee buy-in. My company owns and develops the GRE which is now called the Revised General Test. It took 2 years for our company to revise the test along with many hours and sacrifices. The GRE is a test prospective graduate students seeking to get into schools who accept the test as a part of their admission’s process. The revised version was scheduled for a predetermined date but because it was not ready the powers that be (of my company) decided to continue the process of revision for the test. With that...
Words: 455 - Pages: 2
...HRM 530 Week 7 Discussion #1 "Training Assessment" Please respond to the following: • Imagine you are a new employee in a human resource (HR) department. Your first task is to develop a stress management seminar for the employees. Determine the topics that should be covered in the seminar. Support your selection of the topics. • Develop criteria to assist in selecting the vendor to use for the training. As a new employee in the HR department tasked with developing a seminar for stress management, I would first: Identify the training audience; ascertain the training needs in levels of importance; develop training programs that have been demonstrated to be successful and that are cost effective to the organization; create the programs and appropriate training hours needed and that are available; ensure time for feedback after training; ensure on the job training so that "lessons learned" can be used and demonstrated on the job. I would also cover workload, setting priorities, getting help when needed, and setting reasonable goals. The selected vendor I would use would be in the form of an informal presentation. Open ended discussions and participation would be encouraged. Feedback would be solicited at the end of the training. Lastly, surveys would be handed out at the end of the training to rate the training and/or garner improvements. Stewart, G.L. and Brown, K.G. Human Resource Management (2012) • Imagine you are a new employee in a human resource (HR) department...
Words: 947 - Pages: 4
...Assuming a case is capable of being heard by the U.S. Supreme Court, the first step, most of the time, is to file a lawsuit in your local state or federal court. The trial judge would hear evidence and consider legal arguments from each side before making a decision. If the judge decides all or part of the case against you, you can then appeal the case to a higher court. When you have appealed as far as possible, you can consider appealing to the U.S. Supreme Court. - The beginning process is to file a notice of appeal, rarely does a losing party have an automatic right of appeal. Usually there must be a legal basis for the appeal, an alleged material error in a trial, not just the fact that the losing party did not like the verdict. This filing marks the beginning of a time period in which the appellant must file a brief, a written argument containing their side's view of the facts and the legal arguments upon which they rely in seeking a reversal of the lower trial court. The appellee then has a specified time to file an answering brief. The appellant may then file a second brief answering the appellee's brief. A United States appellant court sometimes will make their decision only on the basis of a written briefs. In a civil case, either party may appeal to a higher court. In a criminal case, only the defendant has a right to an appeal in most states. (Some states give the prosecution a limited right to appeal to determine certain points of law. These appeals usually occur...
Words: 683 - Pages: 3
...Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center. Assignment 2: 21st Century Leadership Due Week 8 and worth 300 points The 20th and 21st centuries have produced many business leaders, such as corporate giants like Jack Welch of GE, Daymond John of FUBU, Steve Jobs of Apple, and Herb Kelleher of Southwest. In addition, many hip-hop moguls have risen to prominence, such as Sean Combs, aka P Diddy, of Bad Boy Records; Russell Simmons, founder of Def Jam; and Sean Carter, aka Jay Z, of Rock Nation. Regardless of their business models and industries, organizational leaders are expected to create realistic visions for their companies and the people that they guide. However, such visions often result in vastly different leadership styles. Therefore, experts have concluded that there is no one best leadership style geared towards guiding employees and companies to accomplishing organizational goals. Using the Internet and Strayer databases, research your favorite senior executive (CEO, CFO, COO, Director, President, Founder, etc.) from any organization that has made a strong impact on his or her industry (fashion, music, food, banking, technology, automotive, etc.). Write a six to eight (6-8) page paper in which you: Describe the overall leadership style(s) of your chosen senior executive...
Words: 644 - Pages: 3
...Violation of your copyright privileges, and how you feel knowing that thousands of users are simply copying and sharing your composition, for which they might have paid for otherwise. Peer-to-Peer (“P2P”) file sharing is a way of exchanging or transferring files of which you do not have permission to share can have serious consequences. We have worked hard to compose this new pop song and it is unfair that others are sharing and copying this song without paying for it. We are in the business of entertaining our fans but we are also a business and as such, we rely on the revenues generated from the sales of our music. • Enabling your case as a consideration in the purview of “fair use” under the law. Fair use is a concept that allows use of limited portions of a copyrighted work, without the permission of the copyright owner, for purposes such as scholarship, research, and criticism. Fair use does not mean that if you think it's fair that you should be able to use a work, it's okay. Rather, whether a particular use of copyrighted material is a fair use must be judged according to the four criteria in the Copyright Act: Purpose and character of the use (why do you want to use it?). Nature of the copyrighted work (what kind of work is it?). Amount and substantially used (how much do you want to copy?). Effect on the potential market for or value of the work (will your copying contribute to decreasing the value or demand for the work?). ...
Words: 417 - Pages: 2
...Think about someone in your workplace you consider an effective communicator. What characteristics and communication style makes this person an effective communicator? I do not work in a traditional workplace because I am currently a sportsman so it is a little bit difficult for me to compare the communication that happens between the international tennis association and myself to what goes on in a normal office. But I can still find an example to share with you. Players enter into tournaments that they want to compete in through a web site that is designed especially for this purpose. After the entry deadline, an acceptance list comes out with players that get into the tournament according to their rankings. There are players on the list that didn’t get in, but can still get in to the tournament if players withdraw before the beginning of the competition. There is a person in the tennis association that is responsible in communicating with players to let them know if they got into the tournament or not. The communication styles that they use are emails, phone calls, and updates on the web site. I think that for what needs to be done, the communication is effective because the person in charge always finds a way to get in touch with the players to let them know that they are able to compete in the tournament. With the level of technology today, everyone has a PC and a phone, so communicating this way is...
Words: 251 - Pages: 2
... TM Now wait for 45 seconds. 30 15 Let’s do it! 1. 6. - Click once when ready. seconds left 20 35 42 41 43 44 45 2 1 3 4 5 2. 3. 4. 5. - 7. That was 8. easy! 9. 10. © Tim Pettry, 2008 Take 45 seconds to memorize these new symbols for the numbers 1 – 10. X TM Write down as many of the new symbols as you can remember? Click when ready To check answers © Tim Pettry, 2008 TM Check your answers 1. 6. - 2. 3. 4. 5. © Tim Pettry, 2008 7. 8. 9. 10. - X Click to discuss when ready TM Click Discussion How many people got all 10 symbols correct? 9? 8? 7? 6? 5 and below? Were you distracted by the countdown on the left? Are there ever distractions when we are trying to learn? © Tim Pettry, 2008 TM Click Discussion continued Which symbols do most people get right? 1 – due to repetition 10 – Its different and it represents the Roman numeral “10” 5 – Its different 7 – Its similar to the number 7 Most people look for a pattern and have difficulty finding it in a short amount of time. We are looking at the pieces rather than the whole. This is sometimes referred to as “Silo Thinking” © Tim Pettry, 2008 TM Now, for you linear thinkers… Click 1 2 3 4 5 6 7 8 9 10 X...
Words: 696 - Pages: 3
...The Big Book of Huddle Energizers Ideas to enliven your huddle Contributed by employees of Citibank Singapore Table of Contents Service Value # 1 – Make Each Interaction Personal ................................................. 6 Energizer: Hebrew Numerology ................................................................................... 6 Energizer: Brain Teaser ............................................................................................... 9 Energizer: Human Treasure Hunt............................................................................... 10 Energizer: Secret Hat Trick ........................................................................................ 11 Energizer: Accentuate the Positive............................................................................. 11 Energizer: Name Game.............................................................................................. 11 Energizer: Heart to Heart ........................................................................................... 11 Energizer: Guess my Body Language ........................................................................ 11 Energizer: How to Say Hello in Different Languages ................................................. 12 Energizer: Good Morning Game ................................................................................ 12 Service Value # 2 – Maintain A Professional Image ...................................................
Words: 24325 - Pages: 98
...reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each segment. 5. Wire the outputs of the gates to the proper pin on the 7-segment display (refer to the datasheet for the 7-segment display you are using and remember to use a resistor instead of a jumper. 6. Attach 5V to both common anode pins of your 7-segment display (refer to the datasheet for the 7-segment display you are using). 7. Demonstrate number 0-9...
Words: 1151 - Pages: 5
...IS535 Discussion Week 7 Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. I see the key to defeating phishing attacks is a comprehensive and active education/training effort and a strident monitoring/notification capability to thwart those types of attacks. With this two pronged effort you both educate the firm and keep the firm informed on the latest phishing attacks or expected phishing attacks. What are the social and security issues for individuals and organizations relative to personal and business use of social media? One important factor of using social media for personal and business use is the degree at which it is controlled through the business networks and the ability to compartmentalize specific data. The problem arises with individuals who are so addicted to a specific social media they will find a way to access it no mater how stringent the measures are to control it. The only secure way to control social media in the work place is to block access through a firms wireless and hardwired networks. This is not a hard thing to do but in the age of the smartphone there could be many work a rounds in the individuals workplace. One such work a round that would impact the security issue is the ability now for smartphones to tether local computers and avoid a firms internal networks and security protocols and in...
Words: 255 - Pages: 2
...required to meet monthly demand | 1800 x 5 = 9000 | 1500 x 5 = 7500 | 1100 x 5 = 5500 | 900 x 5 = 4500 | 1100 x 5 = 5500 | 1600 x 5 = 8000 | | Hours produces by an operator per month | 22 x 8 = 176 | 19 x 8 = 152 | 21 x 8 = 168 | 21 x 8 = 168 | 22 x 8 = 176 | 20 x 8 = 160 | | Workers required per month | 9000 / 176 = 51 | 7500 / 152 = 49 | 5500 / 168 = 33 | 4500 / 168 = 27 | 5500 / 176 = 31 | 8000 / 160 = 50 | | Aggregate planning | Workers used | 27 | 27 | 27 | 27 | 27 | 27 | | Workers hired | 0 | 0 | 0 | 0 | 0 | 0 | | Workers fired | 3 | 0 | 0 | 0 | 0 | 0 | | Units produced | 27*22*8 /5 = 950 | 27*19*8 /5 = 821 | 27*21*8 /5 = 907 | 27*21*8 /5 = 907 | 27*22*8 /5 = 950 | 27*20*8 /5 = 864 | | Monthly inventory | 0 | 0 | 0 | 7 | 0 | 0 | | Units subcontracted | 1800 – 950 =850 | 1500 – 821= 679 | 1100-907 =193 | 0 | 1100-957 =143 | 1600-864=736 | 2601 | Full cost | Labor cost | 27*22*8*$4 =19000 | 27*19*8*$4 =16420 | 27*21*8*$4 =18140 | 27*21*8*$4 =18140 | 27*22*8*$4 =19000 | 27*20*8*$4 =17280 | 107980 | Material costs | 95000 | 82100 | 90700 | 90700 | 95000 | 86400 | 539900 | Hiring cost | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Firing cost | 3 x $250 = 750 | 0 | 0 | 0 | 0 | 0 | 750 | Inventory carrying cost | 0 | 0 | 0 | 11 | 0 | 0 | 11 | Sub contracting cost | 106250 | 84875 | 24125 | 0 | 17875 | 92000 | 325125 | Total cost | 221000 | 183395 | 132965 | 108851 | 131875 | 195680 | 973766 | Minimum workforce with sub contracting strategy...
Words: 676 - Pages: 3
...THE SUPPLY CHAIN MANAGEMENT CONCEPT 1. Discuss the differences between supply chain and supply chain management. A supply chain refers to the activities associated with the flow and transformation of goods from the raw material stage, through to the end user, as well as the associated information flows. Supply chains are not a new concept in the sense that through the years organizations have been dependent on suppliers and organizations have served customers. Although any organization can be part of a supply chain, supply chain management requires overt management efforts by the organizations in the supply chain. Moreover, supply chain management cannot be successful unless the participating companies adopt an enterprise-to-enterprise perspective. 2. Discuss the SCOR and GSCF models of supply chain management. The SCOR model identifies five key processes—plan, source, make, deliver, and return—associated with supply chain management. Each of the five processes indicates the important role of logistics in supply chain management. There are eight relevant processes in the GSCF model—customer relationship management, customer service management, demand management, order fulfillment, manufacturing flow management, supplier relationship management, product development management, and returns management. Logistics also plays an important role in the supply chain processes in the GSCF model. 3. What are four key attributes of supply chain management? The chapter...
Words: 1568 - Pages: 7
...Q13-7. What is a debenture? Why do you think that this is the most common form of corporate bond in the United States? Is it is much less commonly used elsewhere? A13-7. Corporations issue bonds to raise money to expand their businesses, cover operating costs, or finance corporate takeovers or reorganizations. Corporate bonds are debt obligations issued by corporations. Corporate bonds may be either secured or unsecured. Debentures are unsecured bonds, which means that bondholders have nothing but the corporation's promise that interest payments will be made on time, or made at all. This promise is often called "full faith and credit." Debentures are not backed by equipment, securities portfolios, mortgages on real estate, or any other specific assets. Instead of guaranteed collateral, debenture-holders are secured in their principal investment by the general credit of the issuer. Thus, while secured bondholders have priority over debenture-holders in the event of default or bankruptcy, debenture-holders have the same priority as other general creditors, such as banks, insurance companies and other financial institutions, and greater priority than shareholders of common or preferred stock. Debentures usually offer higher yields than secured bonds, which is the expected trade-off for increased risk to the principal investment. Debentures are the most common type of corporate bond. These bonds have no specific collateral such as real property or equipment, but are...
Words: 681 - Pages: 3