Premium Essay

Hardware Scientific Technology

In:

Submitted By ehilario
Words 412
Pages 2
HARDWARE SCIENTIFIC TECHNOLOGY

a. The minimum transfer price per unit of part#89661-02K23 that the manager of the Parts subsidiary would agree shall be the market price of $75. Having the full authority over decisions involving transactions with internal or external customers and suppliers and being operating at full capacity, the Parts subsidiary shall be motivated to continue selling externally for $75 in order to maintain their profit.
b. The maximum transfer price per unit of Part #89661-02K23 that the manager of Assembly subsidiary would be $75. An offer from a national distributor to buy a 5 million computer engine modules will put the Assembly subsidiary from below capacity to full capacity operation. In full capacity, fixed cost is being absorbed by all units so per unit cost will become lower, thus giving the chance for them to make profit.
c. Hardware Scientific Technology Inc. as a whole would have no benefit if part#89661-02K23 is transferred from the Parts subsidiary to the Assembly subsidiary at full cost per unit of $50 because in full costing approach Parts subsidiary will always have no profit and no loss except there will be any mark-up cost added and Assembly subsidiary having the transfer price for part#89662-02K23 of $50 plus the total cost of $375 is only equal to $425 price offered by national distributor, thus, no profit and no loss as well.
d. If the Parts subsidiary is not operating at full capacity and has an idle capacity to provide the remaining requirements of part#89661-02K23 to Assembly subsidiary without affecting the external sales, it would benefit the Hardware Scientific Technology Inc. as a whole because the minimum transfer price Parts subsidiary charged to Assembly subsidiary is lower which will be based on variable cost without the lost contribution margin on an outside sales.
e. Since both subsidiaries operate as

Similar Documents

Free Essay

My Exec

...Executive Summary Overview AgaMatrix is a development stage venture based in Boston offering proprietary Digital Signal Processing (DSP) technology that dramatically improves the functionality and performance of biosensor devices. AgaMatrix's core DSP algorithms solve a number of immediate problems in the medical devices market by significantly boosting the performance of biosensors without costly specialized hardware and additional chemicals. Initially, AgaMatrix will sell to medical device makers, specifically, home blood glucose monitors and hospital point-of-care blood analyzers. AgaMatrix anticipates achieving positive cash flow by year three with future target healthcare segments to include the large immunoassay and implantable biosensor sectors; as well as other vertical industries that heavily rely on biosensors, such as the military chemical agent detection, environmental air/water quality monitoring, and industrial processing sectors. Problem – Glucose Monitors Are Burdensome, Painful To Use Many diabetic patients fail to use home blood glucose devices as prescribed because the regimen is too burdensome or too physically painful. Four to seven times a day, a patient must puncture his or her finger to draw blood onto a test strip for insertion into the glucose biosensor. The average compliance rate for testing is less than 1.5 times a day, resulting in the acceleration of complications caused by diabetes, such as blindness, stroke, and heart and kidney failure. In...

Words: 1321 - Pages: 6

Premium Essay

The Survey and Future Evolution of Green Computing

...2011 IEEE/ACM International Conference on Green Computing and Communications The Survey and Future Evolution of Green Computing Qilin Li Production and Technology Department Sichuan Electric Power Science and Research Institute Chengdu, Sichuan, P.R.China li_qi_lin@163.com Mingtian Zhou School of Computer Science and Technologies University of Electronic Science and Technology Chengdu, Sichuan, P.R.China mtzhou@uestc.edu.cn Although green computing is becoming increasingly important in IT systems, it presents challenging problems to system designers. Designers need to take into account energy consumption during the phase of system design and to find solutions to reduce it. Green computing involves all aspects of IT systems, such as chips, system architectures, compilers, operating systems, communication networks and application services, and so on[1]. Further, these aspects are interdependent and complicated. As a result, building lowcost and low-power-consumption systems is a challenging and important activity. Such a new computing paradigm introduces new technical challenges to system designers. In light of today’s requirements for green computing, we present latest research efforts that attempt to deal with them and indicate still open issues. We thus discuss the connotation of green computing and sketch our view on the next generation of IT systems for green computing. We further identify key issues relevant to green computing and evaluate different approaches to...

Words: 2936 - Pages: 12

Premium Essay

Sci 110 Assignment 1 Applications of the Scientific Method

...SCI 110 Assignment 1 Applications of the Scientific Method Click Link Below To Buy: http://hwcampus.com/shop/sci-110-assignment-1-applications-scientific-method/ The scientific method is a body of techniques for investigating phenomena, acquiring new knowledge, or correcting and integrating previous knowledge. The scientific inquiry is a way to investigate things and purpose explanation for their observations. Data is gathered, hypothesis suggested, and observations recorded. Several different troubleshooting methods already exist but according to CompTIA; there are six steps to solve a problem. Drawing a parallel these steps are all included into the scientific method, but how? Scientific method CompTIA troubleshooting Method, Ask a Question - Identify the problem, Do Background research - Establish a theory of probable cause, Construct Hypothesis Test - the theory to determine the cause, Test your hypothesis by Doing experiment - Establish a plan of action to resolve the problem and implement a solution, Analyze your Data and draw a Conclusion - Verify full system functionality and if applicable implement preventive solution, Communicate your result Document -findings, actions, and outcomes. How these affect our daily job, life or activities? In the Information Technologies (IT) field, we are constantly using the scientific method to solve various problems. Let take a real example: One of ours customer called and state that her computer stop to working this...

Words: 1280 - Pages: 6

Premium Essay

Student Performance

...Conclusion Advanced electronics and computer technology has undoubtedly revolutionized the way engineering sciences and technologies are effectively transferred globally in the shortest amount of time possible. These resources benefit those countries with competitive advantages in labor resources and are producing a variety of goods for the world markets. The engineering academic community currently has access to a wide range of material on the internet. This has led to an explosion of information, particularly with regard to current research and teaching methods. Engineering is suited to the use of educational technologies ranging from simulating dangerous environments, to replacing laboratory and factories difficult to maintain and impossible to walk through.(2) The use of computers in engineering education allows practical experiences and help in data analysis. Although, work would often be impossible without computers, there are many advantageous in the utilization of computers in teaching and learning but, there are many difficulties in using the new technologies. A few of these disadvantages are lack of appropriate software and hardware, lack of time, technical support and technical expertise on behalf of the instructors, etc.(1) One issue remains the same; a less developed country’s technological diffusion rates remain the determinant factor in the successful utilization of scientific knowledge transferred to these countries...

Words: 435 - Pages: 2

Free Essay

Sci 110 Assignment 1 Applications of the Scientific Method

...SCI 110 Assignment 1 Applications of the Scientific Method Click Link Below To Buy: http://hwcampus.com/shop/sci-110-assignment-1-applications-scientific-method/ The scientific method is a body of techniques for investigating phenomena, acquiring new knowledge, or correcting and integrating previous knowledge. The scientific inquiry is a way to investigate things and purpose explanation for their observations. Data is gathered, hypothesis suggested, and observations recorded. Several different troubleshooting methods already exist but according to CompTIA; there are six steps to solve a problem. Drawing a parallel these steps are all included into the scientific method, but how? Scientific method CompTIA troubleshooting Method, Ask a Question - Identify the problem, Do Background research - Establish a theory of probable cause, Construct Hypothesis Test - the theory to determine the cause, Test your hypothesis by Doing experiment - Establish a plan of action to resolve the problem and implement a solution, Analyze your Data and draw a Conclusion - Verify full system functionality and if applicable implement preventive solution, Communicate your result Document -findings, actions, and outcomes. How these affect our daily job, life or activities? In the Information Technologies (IT) field, we are constantly using the scientific method to solve various problems. Let take a real example: One of ours customer called and state that her computer stop to working this...

Words: 1280 - Pages: 6

Premium Essay

Introduction to Software Engineering

...INTRODUCTION TO SOFTWARE ENGINEERING Have you ever noticed how the invention of one technology can have profound and unexpected effects on other seemingly unrelated technologies, on commercial enterprises, on people and even on culture as a whole? This phenomenon often called:- “THE LAW OF UNINTENDED CONSEQUENCES”. Today, computer software is the single most important technology on the world stage, and software is also a prime example of the “Law of Unintended Consequences”. No one could have foreseen that over the past 50 years, software become embedded in system of all kinds. i.e. Banking, Medical, Transportation, Entertainment and so on. And if we believe in the Law of Unintended Consequences, there are many more effects that we can not yet predict! As software’s importance has grown, the software community has continually attempted to develop technologies that will make it easier, faster and less expensive to build and maintain high quality computer programs. Some of the Software technologies are targeted at a Specific Application Domain (e.g. Web site design and implementation). Others focus on a Technology Domain (e.g. O.O System and programming) and still these are Broad-based software Applications domain (e.g. Operating Systems such as Linux), However we have yet to develop a Software technology that targeted to all the likelihood of one arising in the future is small. WHAT IS COMPUTER SOFTWARE? Computer Software is the product that Software...

Words: 2757 - Pages: 12

Free Essay

Cluster Computing

...solution for a problem. Over the past decade, cluster technologies have been developed that allow multiple low cost computers to work in a coordinated fashion to process applications. The economics, performance and flexibility of compute clusters makes cluster computing an attractive alternative to centralized computing models and the attendant to cost, inflexibility, and scalability issues inherent to these models. Many enterprises are now looking at clusters of high-performance, low cost computers to provide increased application performance, high availability, and ease of scaling within the data center. Interest in and deployment of computer clusters has largely been driven by the increase in the performance of off-the-shelf commodity computers, high-speed, low-latency network switches and the maturity of the software components. Application performance continues to be of significant concern for various entities including governments, military, education, scientific and now enterprise organizations. This document provides a review of cluster computing, the various types of clusters and their associated applications. This document is a high-level informational document; it does not provide details about various cluster implementations and applications. 1.1.1 Cluster Computing Cluster computing is best characterized as the integration of a number of off-the-shelf commodity computers and resources integrated through hardware, networks, and software to behave...

Words: 5312 - Pages: 22

Premium Essay

Poohead

...about their willingness to clone a human. Should technology be developed that allows this? Why or why not? With our world’s technology growing at a substantial rate, there should be limitations placed on what can be done to the human body. I believe the technology to clone human beings is far too valuable to be overlooked. However, there should be laws and limitations to these types of technology due to how dangerous it could be if it got in the wrong hands. Our world’s history shows that mankind is capable of controlling and regulating such dangerous technologies for example nuclear weapons. 2. Should we continue to spend money on technology that exists to enhance our capabilities when so many ills of society still exist? I believe technology is what helps the world really develop and improve. There will always be tradeoffs as to what we should spend our money on but technology is always a safe bet as it modernizes and simplifies previously difficult tasks. 3. Should technology progress to a point where you could replace body parts with "superior" hardware, should it be allowed? Consider this: if/when a means of providing perfect 20/20 sight to someone who is blind is available should a person with little or no sight limitation have the right to have the same technology to improve their sight to better to than perfect? What types of enhancements (if any) should be permitted to a healthy human? I believe if technology were to progress to a point where body parts would...

Words: 534 - Pages: 3

Premium Essay

Rfid

...International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 ISSN 2229-5518 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. Abstract In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions. Keywords: RFID, Lecture, Attendance, Passive tag, Reader INTRODUCTION T he emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on the...

Words: 3596 - Pages: 15

Free Essay

Grid Computing

...Grid computing Modern society as a large-scale scientific and engineering computing need, forcing the computer must constantly improve its computing speed and storage capacity. History has shown that development of the computer, in order to achieve better processing performance, in addition to improve the speed of the hardware, the system must continue to improve the structure, especially when the components of the speed limit, which will become the focus of . Thus, the super parallel computer has become the master of complex scientific computing. However, the super computer-centric computing model has obvious deficiencies, and is currently being subjected to challenge. Although it is a super computer processing power of the "giant", but its cost is extremely expensive and usually only a few state-level sectors such as aerospace, military, meteorological and other departments have the ability to configure such a device. And as people encounter in their daily work more and more complex business computing, there is an urgent need for data-processing capabilities more powerful computers, while the price of supercomputers clearly prevented it from entering areas of work of ordinary people. So, people started looking for a low cost and superior data processing capability computing model, scientists have been trying to find the ultimate answer - Grid Computing (Grid computing). Grid is an integrated computing environment and resources, or a pool of computing resources. Grid is an...

Words: 526 - Pages: 3

Premium Essay

Network Systems

...INDRODUCTION Networking operating system It is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare. Multiuser File Sharing A network operating system manages concurrent requests from clients and provides the security necessary in a multiuser environment. A file sharing component is installed in each client machine that interacts with the server to share files and applications as well as devices on the network such as printers, faxes and modems. Peer-to-Peer In a Peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. A peer-to-peer network sets all connected computers equal; they all share the same abilities to utilize resources available on the network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system...

Words: 1924 - Pages: 8

Premium Essay

Big Data Landscape

...International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 ISSN 2250-3153 1 Big Data Landscape Shubham Sharma Banking Product Development Division, Oracle Financial Services Software Ltd. Bachelor of Technology Information Technology, Maharishi Markandeshwar Engineering College Abstract- “Big Data” has become a major source of innovation across enterprises of all sizes .Data is being produced at an ever increasing rate. This growth in data production is driven by increased use of media, fast developing organizations, proliferation of web and systems connected to it. Having a lot of data is one thing, being able to store it, analyze it and visualize it in real time environment is a whole different ball game. New technologies are accumulating more data than ever; therefore many organizations are looking forward to optimal ways to make better use of their data. In a broader sense, organizations analyzing big data need to view data management, analysis, and decision-making in terms of “industrialized” flows and processes rather than discrete stocks of data or events. To handle these aspects of large quantities of data various open platforms had been developed. Index Terms- Big Technologies,Tools Data, Landscape,Open Platforms, nearly 500 exabytes per day .To put the numbers in perspective this is equivalent to 5×1020 bytes per day. Almost 200 times higher than all the sources combined together in the world. To handle this huge chunk of...

Words: 3643 - Pages: 15

Free Essay

T2 City Analysis

...like to engage Mercer to conduct a customized survey focus on labor market, talent supply, government benefits and compensation data in those cities. Mercer 2 Project Scope Based on mutual agreement with Microsoft (MSFT) HR team, Mercer will search the information by the following dimensions in 10 target cities, Suzhou, Hangzhou, Nanjing, Dalian, Xian, Chengdu, Wuhan, Tianjin, Qingdao and Wuxi. Meanwhile, Beijing will be set as benchmark city. – Talent Availability Talent Pool Presence of Competitor – College CS/Math Graduates Quality of Math and Science Education Quality of Scientific Research Institution University/Industry research collaboration Public expenditure on education as % of GDP Expenditure on R&D as % of GDP Proximity to city – City Factor City Hybrid Ranking Operating cost Cost of Labor Software Engineer Hukou Management Quality of Living Environment Software Technology Parks City Infrastructure Mercer 3 Talent Availability Talent Availability Introduction Talent Pool – The talent distribution analysis is based on Mercer 2nd-tier city Hitech Industry Total Remuneration Database (TRD) . – We only present the R&D related function data, such as software...

Words: 19587 - Pages: 79

Free Essay

Fault Tolerance in Wsn

...Table of Content TABLE OF CONTENT ........................................................................................................................... 1 ABSTRACT ............................................................................................................................................ 2 INTRODUCTION .................................................................................................................................... 3 FAULT TOLERANCE IN WSN .............................................................................................................. 4 LITERATURE REVIEW .......................................................................................................................... 6 RESEARCH OBJECTIVES .................................................................................................................... 7 METHODOLOGY ................................................................................................................................... 8 SIGNIFICANCE .................................................................................................................................... 10 LIMITATION ......................................................................................................................................... 10 POTENTIAL CONTRIBUTIONS (IMPLICATION OF RESEARCH) .................................................... 11 REFERENCES ..................................................

Words: 3094 - Pages: 13

Premium Essay

Aims and Objectives of Research Project

...|Research and Development Skills |May 7 | | |2014 | | | | Table of Contents Aims and Objectives: 2 Review of Current State of Proposed Area: 4 Major Milestones and Deliverables: 5 Scientific Risk Analysis: 7 Resources Needed and Architecture: 8 Architecture 9 Ethical, Legal, Professional Issues and Academic Misconduct: 10 Code of Ethics: 11 Bibliography 11 Aims and Objectives: The main of this study is to develop software that will allow voice command to be converted into text and then to be displayed on the output monitor or to be converted into command to perform a particular action, the primary aim will be to perform adequate amounts of research in the field of voice recognition in order to develop such tool that can be used to convert speech to text and voice to text command for a particular system to perform a task. The main objectives to achieve this will be to have a clear development plan with a clear software development cycle, having the software development cycle will not be enough on its own and constant monitoring...

Words: 3015 - Pages: 13