Free Essay

Fiction Corp Network Upgrade

In:

Submitted By jaga79
Words 1353
Pages 6
Fiction Corp Network Upgrade
Garima Shah
Strayer University
6.17.2014

Fiction Corp Network Upgrade
Wide-IP Corp
June 2014

Table of contents Executive summary Project goal Project scope Design requirements:

a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications
7. Current state of the network Logical design Physical design Results of network design testing Implementation plan with a project schedule Project budget with a return on investment calculation Design document appendix

Executive summary * Move Fiction Corporation’s data center to a new, state-of-the-art data center with improved networking capabilities to provide support and service to the existing organization, retail centers and any future expansion * Ensure Network security is reviewed and improved upon * Ensure minimal or zero network downtime for existing business operations during the move

Project goal * Seamless migration of the data center to the new location with minimal or zero disruption to the current business operations * Assess current security flaws and provide solutions to eliminate flaws * Quality assurance-monitor the status of remote systems and determine feasible success /failure toward seamless migration and updated network system

Project scope * The scope of the project is to migrate the existing data center to a new location; to assess and eliminate current security flaws in the network * Upgrade and improve redundancy of WAN via T1 & ISDN backup connectivity * The data center move will include 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers * Any network performance problems with existing applications will be addressed * SNMP management system should be configured to detect and report status of the remote systems or its communications link and the status of individual applications * Network migration not to exceed $500,000 budget provided

Design requirements:
Business Goals:-
Business goals of this project are related to the impact that this project is expected to have on the business functions.
Fiction’s management needs their data center to be migrated to their Headquarters.
New network infrastructure should have improvement in the uptime too.
Seamless migration of current data center to new location. Use network management tools to increase the efficiency and effectiveness of the IT department

Technical goals: * Scalability- Provide a network that can scale up to support future network expansions * Availability- Availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers * Network Performance-The new data center will center support 500 remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations, 24 hours a day with an annual uptime at 99.9 % * Security- Upgrade security to protect the network and remediate any security flaws * Usability-Network users can access the network and its services from all locations and have minimum impact to business operations during the data center move * Manageability- Availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers Setup of a backup ISDN link to establish redundancy Customer is responsible to procure and provide both T1 and ISDN connectivity to all locations

User communities and data stores
Fiction Corporation is a multi-department enterprise. Its data center hosts multiple categories of business and technical users. These are:-
Network administrators
Retail store administrators

Call center users

Warehouse administrators

Support team

Network Application
Current state of the network
The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet.

Logical design * The data center will be connected to the retail outlets via primary connection through T1 and ISDN as back up * The call center will have similar connection to the data center via primary connection through T1 and ISDN as back up * The inline SNMP monitoring will be configured prior to the external facing routers within the data center and the retail outlets * The retail operations also run WLANs that are on its own subnet. * The SNMP management system will provide ability to remotely manage the network at the retail locations and also provide network uptime status. * The three remote warehouses will be connected to the data center via primary connection through T1 and ISDN as back up

Physical design

Results of network design testing * Test objectives * To test effectiveness of new network design; higher network uptime availability and remote monitoring capability * Test acceptance criteria * Network availability between sites will be tested by switching back and forth between primary and secondary connectivity * Effective block of external and internal network intrusion * Effective network monitoring and network data capture by SNMP management tools * Testing tools * SNMP packet capture tool * CISCO IOS toolbox * Results and observations * To be documented as per accepted criteria

Implementation plan * Project schedule- Wide-IP has experts in project management. We believe in not just meeting but beating deadlines. Project schedule with tasks has been mentioned below:-
Phase1- Build data center, Install connectivity, Replicate critical business applications Phase2- Copy critical business applications into new data center and use new data center as sandbox environment to test applications. Complete after technical and business sign offs
Phase3-Staged movement of application and business services into new data center. This will be complete after all business services have completely moved to the new data center. Existing data center will be maintained online but not primarily in use.
Phase4- Monitoring of business services and applications from new data center for next three months.

Implementation plan-. During the initiating phase, we will have a kick-off meeting to gather all the stakeholders involved in this project. We will discuss each team member’s individual task critical to project completion. Critical milestones and objectives will be highlighted with necessary timelines and acceptance criteria * Fiction Corporation has detailed their needs of moving their servers without interruption (significant downtime) to their remote retail centers * The goal is to relocate Fiction Corporation’s datacenter to a new, state-of-the-art center with improved networking capabilities that run seamlessly both within the new facility and the company’s present retail centers * Fiction Corporation and its subsidiaries/business affiliates using the networking operations, have signed off on the finalization and acceptance document * Project Plan for moving the data center-in estimating the time needed to accomplish the move, we decided to work on a seven-day cycle. In doing so, the project timeline will have the complete 30 days * We have established three teams for the move: data security (which will handle the backup and storage of Fiction Corporation’s data), network installation (which will handle the dismantling and re-setup of servers and computers, as well as all wiring requirements for the new data center), and quality assurance (which will monitor the status of remote systems and determine feasible success/failure toward seamless integration of the updated network system, as well as the measured success of correcting security flaws in the system’s infrastructure).

Project budget with a return on investment calculation * Cost for network migration has been set at $500,000 * By enhancing the network and security, ready information is available about network uptime and the network is less vulnerable to intrusion * Higher network availability and redundancy will allow uninterrupted and secure network traffic for the business. Loss of network availability results in financial loss to the business

Design document appendix
VLAN: VLAN or virtual LAN is a logical concept that is used to separate parts of network. It is done to allow easy organization and prevent unauthorized access.
Frame relay: Frame relay is a protocol that is used over ISDN backup links. These are virtual links that are formed between remote sites. It helps in LAN formation.
Frame relay/T1 lease: Putting up a dedicated line is not a practical solution. So, service providers provide lines which can be used by consumers on a subscription basis or lease basis.

Reference:-
Retrieved from http://compnetworking.about.com/od/networkdesign/g/bldef_qos.htm
Oppenheimer, Priscilla(2011). Top-Down Network Design(3rd ed.) Pearson Learning Solutions.

Similar Documents

Premium Essay

Article Frito Lay

...generates itself? Perhaps theoretically, but not as a practical matter. Still, placing sustainable manufacturing in the context of assuring resource availability so operational capabilities are maintained, regardless of external disruptions, is intriguing. What would a food plant with net-zero impact look like? A close proximity sprawls across 283 acres of the Sonoran desert in Arizona. Part learning lab, part sustainability showcase, the Frito-Lay facility in Casa Grande is the focus of the snack food manufacturer’s ambitious goal of creating a blueprint for sustained production in a resource-strapped tomorrow. Most of the energy-generation and water-reclamation technology in Casa Grande can be found elsewhere in the Frito-Lay production network, but never before has such a comprehensive infrastructure been created. The result is a plant that pushes the limits of what is possible in energy and water self-sufficiency. Selection of Casa Grande came after an assessment of Frito-Lay’s 37 US facilities by the US Department of Energy’s National Renewable Energy Laboratory. Abundant real estate, Sunbelt location and middle-of-the-pack production size figured in the choice, but the pick also acknowledged the facility’s pedigree. Built in 1984, Casa Grande was a showcase of energy conservation for its day. Its systems and technologies earned it Food Engineering’s designation as 1985 Plant of the Year. Efficiency is relative, and the chip...

Words: 2984 - Pages: 12

Premium Essay

Strategic Leadership

...Strategic Leadership and Decision Making 16 ORGANIZATIONAL CULTURE One of the primary responsibilities of strategic leaders is to create and maintain the organizational characteristics that reward and encourage collective effort. Perhaps the most fundamental of these is organizational culture. But what do we really mean by organizational culture? What influence does it have on an organization? How does one go about building, influencing or changing an organization's culture? THE IMPACT OF CULTURE Why is culture so important to an organization? Edgar Schein, an MIT Professor of Management and author of Organizational Culture and Leadership: A Dynamic View, suggests that an organization's culture develops to help it cope with its environment. Today, organizational leaders are confronted with many complex issues during their attempts to generate organizational achievement in VUCA environments. A leader's success will depend, to a great extent, upon understanding organizational culture. Schein contends that many of the problems confronting leaders can be traced to their inability to analyze and evaluate organizational cultures. Many leaders, when trying to implement new strategies or a strategic plan leading to a new vision, will discover that their strategies will fail if they are inconsistent with the organization's culture. A CEO, SES, political appointee, or flag officer who comes into an organization prepared to "shake the place up" and institute sweeping changes...

Words: 5029 - Pages: 21

Premium Essay

Fake Encounters

...UCAVs) on the ground or in another vehicle. There are a wide variety of drone shapes, sizes, configurations, and characteristics. Historically, UAVs were simple remotely piloted aircraft, but autonomous control is increasingly being employed.[1] Their largest use is within military applications. UAVs are also used in a small but growing number of civil applications, such as firefighting or nonmilitary security work, such as surveillance of pipelines. UAVs are often preferred for missions that are too "dull, dirty, or dangerous" for manned aircraft. Contents  [hide]  * 1 History * 2 FAA designation * 3 Classification * 3.1 Classifications by the United States military * 3.1.1 US Air Force tiers * 3.1.2 US Marine Corps tiers * 3.1.3 US Army tiers * 3.1.4 Future Combat Systems (FCS) (US Army) classes * 3.1.5 Unmanned aircraft system * 4 Uses * 4.1 Remote sensing * 4.2 Commercial aerial surveillance * 4.3 Oil, gas and mineral exploration and production * 4.4 Transport * 4.5 Scientific research * 4.6 Armed attacks * 4.7 Search and rescue * 4.8 Conservation * 5 Design and development considerations * 5.1 Degree of autonomy * 5.2 Endurance *...

Words: 10057 - Pages: 41

Premium Essay

Information Rules

...Information Rules A STRATEGIC GUIDE TO THE NETWORK ECONOMY Carl Shapiro Hal R. Varian HARVARD BUSINESS SCHOOL PRESS BOSTON, MASSACHUSETTS Copyright © 1999 Carl Shapiro and Hai R. Varian All rights reserved Printed in the United States of America 03 02 01 00 99 5 Library of Congres§ Cataloging-in-Publication Data Shapiro, Carl. Information rules : a strategic guide to the network economy / Carl Shapiro and Hal R. Varian. p. cm. Includes bibliographical references and index. ISBN 0-87584-863-X (alk. paper) 1. Information technology—Economic aspects. 2. Information society. I. Varian, Hal R. II. Title. HC79.I55S53 1998 658.4'038—dc21 98-24923 GIF The paper used in this publication meets the requirements of the American National Standard for Permanence of Paper for Printed Library Materials Z39.49-1984. To Dawn, Eva, and Ben To Carol and Chris Contents Preface ix l The Information Economy 2 Pricing Information 19 3 Versioning Information 53 4 Rights Management 83 5 Recognizing Lock-In 103 6 Managing Lock-In 135 7 Networks and Positive Feedback 173 8 Cooperation and Compatibility 227 9 Waging a Standards War 261 297 10 Information Policy viii I Contents Further Reading 319 Notes 327 Bibliography 329 Index 335 About the Authors 351 Preface Luck led us to write this book. Each of us became economists because we wanted to apply our analytical training to better understand...

Words: 108016 - Pages: 433

Premium Essay

Information Rules

...informationInformation Rules A STRATEGIC GUIDE TO THE NETWORK ECONOMY Carl Shapiro Hal R. Varian HARVARD BUSINESS SCHOOL PRESS BOSTON, MASSACHUSETTS Copyright © 1999 Carl Shapiro and Hai R. Varian All rights reserved Printed in the United States of America 03 02 01 00 99 5 Library of Congres§ Cataloging-in-Publication Data Shapiro, Carl. Information rules : a strategic guide to the network economy / Carl Shapiro and Hal R. Varian. p. cm. Includes bibliographical references and index. ISBN 0-87584-863-X (alk. paper) 1. Information technology—Economic aspects. 2. Information society. I. Varian, Hal R. II. Title. HC79.I55S53 1998 658.4'038—dc21 98-24923 GIF The paper used in this publication meets the requirements of the American National Standard for Permanence of Paper for Printed Library Materials Z39.49-1984. To Dawn, Eva, and Ben To Carol and Chris Contents Preface ix l The Information Economy 2 Pricing Information 19 3 Versioning Information 53 4 Rights Management 83 5 Recognizing Lock-In 103 6 Managing Lock-In 135 7 173 Networks and Positive Feedback 8 Cooperation and Compatibility 9 Waging a Standards War 10 Information Policy 227 261 297 viii I Contents Further Reading 319 Notes 327 Bibliography 329 Index 335 About the Authors 351 Preface Luck led us to write this book. Each of us became economists because we wanted to apply our ...

Words: 108051 - Pages: 433

Premium Essay

Itsc

...Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS version numbers. 4. List some of the types of system configurations. 5. Explain the need and procedure for booting the system. 6. Explain the function of disk files. 7. Explain the function of and rules for file specifications. 8. List and explain the importance of the two types of computer files. 9. Describe the function and purpose of commands. 10. Compare and contrast internal and external commands. 11. Explain the function and purpose of the DIR, VER, and CLS commands. 12. Explain the purpose of and the procedure for using the DATE and TIME commands. 13. Explain the legal and ethical ramifications of copying disks that were not purchased. 14. Explain the purpose and function of the DISKCOPY command. 15. Explain the necessary steps to end a work session. Student Outcomes 1. Identify your system configuration. 2. Boot the system. 3. Use the DIR command to display the files on the screen. 4. Use the VER command to determine which version of Windows is being used. 5. Use the CLS command to clear the screen. 6. Use the DATE and TIME commands to set or change the date and time on the computer. 7. Make a copy of a disk. 8. End a computer work session. Chapter Overview Most people who use computers are really interested in application software. They want programs that are easy to use and that help them solve specific...

Words: 73166 - Pages: 293

Premium Essay

Multinational Corporation

...Multinational Corporations and Foreign Direct Investment This page intentionally left blank Multinational Corporations and Foreign Direct Investment Avoiding Simplicity, Embracing Complexity Stephen D. Cohen 1 2007 1 Oxford University Press, Inc., publishes works that further Oxford University’s objective of excellence in research, scholarship, and education. Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan Poland Portugal Singapore South Korea Switzerland Thailand Turkey Ukraine Vietnam Copyright # 2007 by Oxford University Press Published by Oxford University Press, Inc. 198 Madison Avenue, New York, New York 10016 www.oup.com Oxford is a registered trademark of Oxford University Press All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of Oxford University Press. Library of Congress Cataloging-in-Publication Data Cohen, Stephen D. Multinational corporations and foreign direct investment: avoiding simplicity, embracing complexity / Stephen D. Cohen. p. cm. Includes index. ISBN-13 978-0-19-517935-4; 978-0-19-517936-1 (pbk.) ISBN 0-19-517935-8; 0-19-517936-6 (pbk.) 1. International...

Words: 160016 - Pages: 641

Premium Essay

Mass Media

...Media History Contents 1 Introduction 1.1 Mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 1.1.2 1.1.3 1.1.4 1.1.5 1.1.6 1.1.7 1.1.8 1.1.9 Issues with definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forms of mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Professions involving mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Influence and sociology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ethical issues and criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 2 6 6 7 8 10 10 10 10 11 11 12 12 12 12 16 16 17 17 17 17 17 17 18 19 20 21 21 21 1.1.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.12 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.13 External links . . . . . . . . ....

Words: 146891 - Pages: 588

Free Essay

Multistate Accounting

...MULTISTATE CORPORATE TAX COURSE John C. Healy | Michael S. Schadewald 2014 EDITION CPE CoursE! BONUS Earn CPE Credit and stay on top of key Multistate Corporate Tax issues. Go to CCHGroup.com/PrintCPE 2014 EDITION MULTISTATE CORPORATE TAX COURSE John C. Healy | Michael S. Schadewald ii Contributors Authors ........................................................... John C. Healy, MST, CPA Michael S. Schadewald, PhD, CPA Technical Review ....................................................... Sharon Brooks, CPA Production Coordinator ................................................... Gabriel Santana Production ......................................................................... Lynn J. Brown Layout & Design..................................................................Laila Gaidulis This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. © 2013 CCH Incorporated. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 800 344 3734 CCHGroup.com No claim is made to original government works; however, within this Product or Publication, the following are subject to CCH’s copyright: (1) the gathering, compilation...

Words: 105989 - Pages: 424

Premium Essay

Ethics

...Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Microsoft, Windows 95, Windows 98, Windows 2000,...

Words: 204343 - Pages: 818

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503

Premium Essay

Manager

...Learning with Cases INTRODUCTION The case study method of teaching used in management education is quite different from most of the methods of teaching used at the school and undergraduate course levels. Unlike traditional lecture-based teaching where student participation in the classroom is minimal, the case method is an active learning method, which requires participation and involvement from the student in the classroom. For students who have been exposed only to the traditional teaching methods, this calls for a major change in their approach to learning. This introduction is intended to provide students with some basic information about the case method, and guidelines about what they must do to gain the maximum benefit from the method. We begin by taking a brief look at what case studies are, and how they are used in the classroom. Then we discuss what the student needs to do to prepare for a class, and what she can expect during the case discussion. We also explain how student performance is evaluated in a case study based course. Finally, we describe the benefits a student of management can expect to gain through the use of the case method. WHAT IS A CASE STUDY? There is no universally accepted definition for a case study, and the case method means different things to different people. Consequently, all case studies are not structured similarly, and variations abound in terms of style, structure and approach. Case material ranges from small caselets (a few paragraphs...

Words: 239776 - Pages: 960

Free Essay

Wildlife

...Wildlife Conservation Efforts in India Geography project [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] 2012 Nishant Aishwarya Roll Number - 26 Introduction Wildlife includes all non-domesticated plants, animals and other organisms. Domesticating wild plant and animal species for human benefit has occurred many times all over the planet, and has a major impact on the environment, both positive and negative. Wildlife can be found in all ecosystems. Deserts, forests, rain forests, plains, grasslands, and other areas including the most developed urban sites, all have distinct forms of wildlife. While the term in popular culture usually refers to animals that are untouched by human factors, most scientists agree that wildlife around the world is impacted by human activities. Humans have historically tended to separate civilization from wildlife in a number of ways including the legal, social, and moral sense. This has been a reason for debate throughout recorded history. Religions have often declared certain animals to be sacred, and in modern times concern for the natural environment has provoked activists to protest the exploitation of wildlife for human benefit or entertainment. Literature has also made use of the traditional human separation from wildlife. Foods, Pets, Traditional Medicine:...

Words: 23746 - Pages: 95

Premium Essay

Tongue and Quill

...The Tongue and Quill AFH 33-337 1 AUGUST 2004 Communication is an essential tool for the twenty-first century Air Force BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HANDBOOK 33-337 1 AUGUST 2004 Communications and Information THE TONGUE AND QUILL COMMUNICATING IS A POWERFUL TOOL FOR THE TWENTY-FIRST CENTURY AIR FORCE The Tongue and Quill is dedicated to every man and woman in today’s Air Force who will ever sling ink at paper, pound a keyboard, give a briefing, or staff a package to support the mission. Currently, The Tongue and Quill is widely used by Air Force military and civilian members, professional military school educators and students, and civilian corporations around the United States. As United States Air Force employees, it is important we communicate clearly and effectively to carry out our mission. This handbook together with AFMAN 33-326, Preparing Official Communications, will provide the necessary information to ensure clear communications— written or spoken. The use of the name or mark of any specific manufacturer, commercial product, commodity, or service in this publication does not imply endorsement by the Air Force To all you enthusiastic users worldwide, keep up the good fight! SUMMARY OF REVISIONS This revision improved organization; rearranged layout; updated quotes, art and word lists; and added material on preparing to write and speak, writing with focus, communicating to persuade, research, meetings, briefings and listening;...

Words: 125419 - Pages: 502

Free Essay

The Case of the Unidentified Company

...Invest. Innovate. Inspire. For a new India. ANNUAL REPORT 2014-15 India is at the threshold of a new era of growth and opportunity. This is driven by increasing economic activity, ongoing ‘Make in India’ initiatives and a demographically well-placed, aspirational society. Reliance Industries Limited (RIL) continues to be a partner in India’s ongoing journey towards economic and social well-being, and remains committed to investing in and innovating for India. RIL is striving to meet and exceed global benchmarks in product quality and customer service with inspiring ideas and strategic investments. From the manufacturing landscape to high-growth consumer service sectors, RIL is achieving superior outcomes that facilitate India’s drive for global leadership. RIL is delivering industry-leading performance through consistent efficiency in operations and prudent configuration of assets. RIL is making sizable capital investments, focusing on technology and expanding its level of services from the hydrocarbons sector to consumer businesses. RIL innovates for existing businesses and also focuses on developing new business models to deliver g g g y significant value for its growing stakeholder fraternity. In this effort, it collaborates with o s with leading global institutions to help usher in a n era of possibilities. global new is growing o RIL’s focus is to continue growing as a respons responsible organisation, thereby e inspiring progress in...

Words: 182744 - Pages: 731