Premium Essay

Dual Digita Media

In:

Submitted By tlumanlan
Words 2061
Pages 9
CASE SUMMARY
Dual Digital Media is a Canadian based technology business which originally started as a family computer company that has become an international provider of digital media in many different forms. The company operated in 3 Canadian provinces and has expanded its operations nationally and internationally through the acquisition of smaller firms of similar vision aimed at both the consumer and business markets. In conjunction with these acquisitions DDM has acquired a range of payroll processing methods, systems, pay cycles and reporting structures. Currently, 11 staff oversees the payroll delivery for 1,238 employees at 5 different site locations.
DDM’s current business plan calls for all support operations to be centralized at the Head Office over the period of one year. The goal of this change is to sustain the expected growth of the company by reducing overhead costs for Payroll and Human Resources in each operational centre.
CASE SUMMARY GUIDELINES:
 What are the issues in this case?
Our objective is to determine the set up of a centralized payroll at the Head Office. To do this, the following existing payroll issues will have to be considered:
1. There are many payroll systems currently being used in the different operational centres (outsourced: ADP & Ceridian; in-house: Simply & ACCPAC; manually for management).
Analysis of the situation: Using a mix of in-house systems and outsourcing partners in a large company operating in nine sites, can make it difficult for the head office to get visibility into their individual payroll operations, ensure they are all compliant and in some cases, it is a struggle just to get basic data/information. Similarly, quality of service may vary widely from operation to operation, yet it can be hard to extract enough relevant data to make meaningful comparisons between the different operational centres

Similar Documents

Premium Essay

Apple, World's Most Valuable Company

...Apple has toppled Google as the world's most valuable brand Marketing Management – Assignment Case Study Report  CONTENTS CASE DESCRIPTION ...................................................................................................................................... - 3 INTRODUCTION ............................................................................................................................................. - 4 HISTORY .......................................................................................................................................................... - 5 CREDIBILITY CHECK .................................................................................................................................... - 6 HOW APPLE ACHIEVED IT? ......................................................................................................................... - 7 Constantly Improving Products ..................................................................................................................... - 7 Creating New Products .................................................................................................................................. - 7 High Margins ................................................................................................................................................. - 8 Distribution .....................................................................................................

Words: 3428 - Pages: 14

Premium Essay

Hello

...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...

Words: 23221 - Pages: 93

Premium Essay

Strategic Management

...Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Stephanie Wall Senior Acquisitions Editor: April Cole Editorial Project Manager: Claudia Fernandes Director of Marketing: Maggie Moylan Senior Marketing Manager: Nikki Ayana Jones Marketing Assistant: Gianna Sandri Senior Managing Editor: Judy Leale Production Project Manager: Kelly Warsak Senior Operations Supervisor: Arnold Vila Operations Specialist: Cathleen Petersen Creative Director: Blair Brown Senior Art Director: Kenny Beck Text Designer: LCI Design Cover Designer: LCI Design Cover Art: Svetoslav Iliev/Shutterstock.com Permission Specialist: Brooks Hill-Whilton Media Project Manager, Production: Lisa Rinaldi Senior Media Project Manager, Editorial: Denise Vaughn Full-Service Project Management and Composition: Integra Printer/Binder: RRD/Willard Cover Printer: Lehigh-Phoenix Color Text Font: 10/12, Times LT Std Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright © 2013, 2010, 2008 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval...

Words: 154599 - Pages: 619

Free Essay

Thought on Business

...file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT BUSINESS AT THE SPEED OF THOUGHT by bill Gates ALSO By BILL GATES The Road Ahead BUSINESS AT THE SPEED OF THOUGHT: USING A DIGITAL NERVOUS SYSTEM BILL GATES WITH COLLINs HEMINGWAY 0 VMNER BOOKS A Time Warner Company To my wife, Melinda, and my daughter, Jennifer Many of the product names referred to herein are trademarks or registered trademarks of their respective owners. Copyright (D 1999 by William H. Gates, III All rights reserved. Warner Books, Inc, 1271 Avenue of the Americas, New York, NY 10020 Visit our Web site at www.warnerbooks.com 0 A Time Warner Company Printed in the United States of America First Printing: March 1999 10 9 8 7 6 5 4 3 2 1 ISBN: 0-446-52568-5 LC: 99-60040 Text design by Stanley S. Drate lFolio Graphics Co Inc Except as file:///C|/Documents%20and%20Settings/Admini...SINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT (1 of 392)12/28/2005 5:28:51 PM file:///C|/Documents%20and%20Settings/Administrator/Deskto...0BILL%20-%20BUSINESS%20AT%20THE%20SPEED%20OF%20THOUGHT.TXT indicated, artwork is by Gary Carter, Mary Feil-jacobs, Kevin Feldhausen, Michael Moore, and Steve Winard. ACKNOWLEDGMENTS I first want to thank my collaborator, Collins Hemingway, for his help in synthesizing and developing the material in this book and for his overall management of this project. I want to thank four CEOs who read a late draft of the manuscript and...

Words: 146627 - Pages: 587

Free Essay

Avoiding Taxes - Essay

...Model SR7500/SR8500 User Guide AV Surround Receiver CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK) NO USER-SERVICEABLE PARTS INSIDE REFER SERVICING TO QUALIFIED SERVICE PERSONNEL The lightning flash with arrowhead symbol within an equilateral triangle is intended to alert the user to the presence of uninsulated “dangerous voltage” within the product’s enclosure that may be of sufficient magnitude to constitute a risk of electric shock to persons. The exclamation point within an equilateral triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product. IMPORTANT SAFETY INSTRUCTIONS READ BEFORE OPERATING EQUIPMENT This product was designed and manufactured to meet strict quality and safety standards. There are, however, some installation and operation precautions which you should be particularly aware of. 1. Read Instructions – All the safety and operating instructions should be read before the product is operated. Retain Instructions – The safety and operating instructions should be retained for future reference. Heed Warnings – All warnings on the product and in the operating instructions should be adhered to. Follow Instructions – All operating and use instructions should be followed. Cleaning – Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners...

Words: 44992 - Pages: 180